paper_id
stringlengths
9
16
version
stringclasses
26 values
yymm
stringclasses
311 values
created
timestamp[s]
title
stringlengths
6
335
secondary_subfield
sequencelengths
1
8
abstract
stringlengths
25
3.93k
primary_subfield
stringclasses
124 values
field
stringclasses
20 values
fulltext
stringlengths
0
2.84M
0909.3423
2
0909
2009-10-06T16:36:39
Digital Ecosystems
[ "cs.MA", "cs.NE" ]
We view Digital Ecosystems to be the digital counterparts of biological ecosystems, which are considered to be robust, self-organising and scalable architectures that can automatically solve complex, dynamic problems. So, this work is concerned with the creation, investigation, and optimisation of Digital Ecosystems, exploiting the self-organising properties of biological ecosystems. First, we created the Digital Ecosystem, a novel optimisation technique inspired by biological ecosystems, where the optimisation works at two levels: a first optimisation, migration of agents which are distributed in a decentralised peer-to-peer network, operating continuously in time; this process feeds a second optimisation based on evolutionary computing that operates locally on single peers and is aimed at finding solutions to satisfy locally relevant constraints. We then investigated its self-organising aspects, starting with an extension to the definition of Physical Complexity to include evolving agent populations. Next, we established stability of evolving agent populations over time, by extending the Chli-DeWilde definition of agent stability to include evolutionary dynamics. Further, we evaluated the diversity of the software agents within evolving agent populations. To conclude, we considered alternative augmentations to optimise and accelerate our Digital Ecosystem, by studying the accelerating effect of a clustering catalyst on the evolutionary dynamics. We also studied the optimising effect of targeted migration on the ecological dynamics, through the indirect and emergent optimisation of the agent migration patterns. Overall, we have advanced the understanding of creating Digital Ecosystems, the self-organisation that occurs within them, and the optimisation of their Ecosystem-Oriented Architecture.
cs.MA
cs
Imperial College London Department of Electrical and Electronic Engineering Digital Ecosystems Gerard Briscoe Submitted in part fulfilment of the requirements for the degree of Doctor of Philosophy 2009 1 2 Abstract We view Digital Ecosystems to be the digital counterparts of biological ecosystems, which are considered to be robust, self-organising and scalable architectures that can automatically solve complex, dynamic problems. So, this work is concerned with the creation, investigation, and optimisation of Digital Ecosystems, exploiting the self-organising properties of biological ecosystems. First, we created the Digital Ecosystem, a novel optimisation technique inspired by biological ecosystems, where the optimisation works at two levels: a first optimisation, migration of agents which are distributed in a decentralised peer-to-peer network, operating continuously in time; this process feeds a second optimisation based on evolutionary computing that operates locally on single peers and is aimed at finding solutions to satisfy locally relevant constraints. We then investigated its self-organising aspects, starting with an extension to the definition of Physical Complexity to include the evolving agent populations of our Digital Ecosystem. Next, we established stability of evolving agent populations over time, by extending the Chli-DeWilde definition of agent stability to include evolutionary dynamics. Further, we evaluated the diversity of the software agents within evolving agent populations, relative to the environment provided by the user base. To conclude, we considered alternative augmentations to optimise and accelerate our Digital Ecosystem, by studying the accelerating effect of a clustering catalyst on the evolutionary dynamics of our Digital Ecosystem, through the direct acceleration of the evolutionary processes. We also studied the optimising effect of targeted migration on the ecological dynamics of our Digital Ecosystem, through the indirect and emergent optimisation of the agent migration patterns. Overall, we have advanced the understanding of creating Digital Ecosystems, the self-organisation that occurs within them, and the optimisation of their Ecosystem-Oriented Architecture. 3 . 4 Contents Abstract Acknowledgements List of Figures 1 Introduction 1.1 Motivation and Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.4 Dissertation Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Creation of Digital Ecosystems 3 9 11 15 15 17 18 19 21 2.1 Background Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 2.1.1 Existing Digital Ecosystems . . . . . . . . . . . . . . . . . . . . . . . . . 22 2.1.2 Nature-Inspired Computing . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.3 Biology of Digital Ecosystems . . . . . . . . . . . . . . . . . . . . . . . . 2.1.4 Computing of Digital Ecosystems . . . . . . . . . . . . . . . . . . . . . . 2.1.5 Digital Business Ecosystems . . . . . . . . . . . . . . . . . . . . . . . . . 23 25 35 45 2.2 Ecosystem-Oriented Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . 48 2.2.1 Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 2.2.2 Habitats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.3 Populations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.4 The Digital Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Simulation and Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.1 Agents: Semantic Descriptions . . . . . . . . . . . . . . . . . . . . . . . . 2.3.2 User Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.3 Populations: Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.4 Semantic Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 55 61 67 67 68 69 70 5 6 CONTENTS 2.3.5 Evolutionary Dynamics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 2.3.6 Ecological Succession . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 2.3.7 Species Abundance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 2.3.8 Species-Area Relationship . . . . . . . . . . . . . . . . . . . . . . . . . . 76 2.4 Summary and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 3 Investigation of Digital Ecosystems 3.1 Background Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.1 Self-Organisation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.2 Definitions of Self-Organisation . . . . . . . . . . . . . . . . . . . . . . . 83 84 84 86 3.2 Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 3.2.1 Physical Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.2 Extending to Agent Populations . . . . . . . . . . . . . . . . . . . . . . . 91 99 3.2.3 Simulation and Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 3.2.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 3.3 Stability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 3.3.1 Chli-DeWilde Stability . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 3.3.2 Extensions for Evolving Populations . . . . . . . . . . . . . . . . . . . . 120 3.3.3 Simulation and Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 3.3.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 3.4 Diversity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 3.4.1 Evolving Agent Populations . . . . . . . . . . . . . . . . . . . . . . . . . 130 3.4.2 Simulation and Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 3.4.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 3.5 Summary and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 4 Optimisation of Digital Ecosystems 141 4.1 Background Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 4.2 Alternative Augmentations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 4.2.1 Clustering Catalyst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 4.2.2 Replacement Aggregator . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 4.2.3 Agent-Pool Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 4.2.4 Targeted Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 4.2.5 Choice of Augmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 CONTENTS 7 4.3 Clustering Catalyst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 4.3.1 Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 4.3.2 Physical Complexity Clustering . . . . . . . . . . . . . . . . . . . . . . . 155 4.4 Targeted Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 4.4.1 Similarity Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 4.4.2 Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 4.4.3 Support Vector Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 4.5 Simulation and Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 4.5.1 Clustering Catalyst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 4.5.2 Targeted Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 4.6 Summary and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 5 Conclusions 181 5.1 Achievements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 5.2 Future Directions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 5.2.1 Ecosystems Conceptualisation . . . . . . . . . . . . . . . . . . . . . . . . 183 5.2.2 Simulation Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 5.2.3 Digital Business Ecosystems . . . . . . . . . . . . . . . . . . . . . . . . . 185 5.3 Concluding Remarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Bibliography 187 8 Acknowledgements I would like to express my most sincere thanks to: • My supervisor, Philippe De Wilde, to whom I am deeply indebted for the guidance and support he has provided throughout. • My examiners, Peter McBurney and Philip Treleaven, for their time and effort in the reading of this thesis and the viva. • My mentor, Paolo Dini, for his constant support, and originally encouraging to me pursue this research and PhD. • My friend and colleague, Evangelia Berdou, for her support and guidance in the writing of this document. • My colleagues, Sotiris Moschoyiannis and Alastair Munro, for kindly agreeing to review this document. • Several other researchers and friends, most notably Suzanne Sadedin, Maria Chli and Frauke Zeller from whom I have learnt much about conducting research. • My mother, Constance Briscoe, without whom I could never have finished this work. • The European Union Framework VI project, Digital Business Ecosystems, Contract No 507953, and the Network of Excellence, Open Philosophies for Associative Autopoietic Digital Ecosystems, Contract No 034824, for supporting this work. • The Open Mac Grid of MacResearch.org, and the Digital Ecosystems Lab of the Department of Media and Communications at the London School of Economics and Political Science, for access to their grids for the running of simulations. 9 . 10 List of Figures 2.1 Biomimicry Design Spiral . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Ecosystem Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Fitness Landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4 Abstract View of An Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 27 29 30 2.5 Evolving Population of Digital Organisms . . . . . . . . . . . . . . . . . . . . . 32 2.6 Ecosystems as Complex Adaptive Systems . . . . . . . . . . . . . . . . . . . . . 2.7 Mobile Agent System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 36 2.8 Service-Oriented Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 2.9 Island-Model of Distributed Evolutionary Computing . . . . . . . . . . . . . . . 2.10 Business Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.11 Agent of the Digital Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.12 Structure of Aggregated Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.13 Habitat Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.14 User Request to the Digital Ecosystem . . . . . . . . . . . . . . . . . . . . . . . 2.15 Digital Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.16 Digital Business Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.17 Habitat Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.18 Distributed Evolution in the Digital Ecosystem . . . . . . . . . . . . . . . . . . 2.19 Agent Life-Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.20 Agent Semantic Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.21 User Request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.22 Semantic Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.23 Graph of Fitness in the Evolutionary Process . . . . . . . . . . . . . . . . . . . . 2.24 Ecological Succession . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.25 Graph of Succession in the Digital Ecosystem . . . . . . . . . . . . . . . . . . . 2.26 Graph of Relative Abundance in the Digital Ecosystem . . . . . . . . . . . . . . 2.27 Graph of Species-Area in the Digital Ecosystem . . . . . . . . . . . . . . . . . . 2.28 Hypothetical Abstract Ecosystem Definition . . . . . . . . . . . . . . . . . . . . 45 46 49 51 52 55 62 64 64 65 67 68 68 70 71 72 74 76 77 80 11 12 LIST OF FIGURES 3.1 Visualisation of Self-Organisation in Evolving Agent Populations . . . . . . . . . 86 3.2 DNA Samples from a Population . . . . . . . . . . . . . . . . . . . . . . . . . . 96 3.3 Alternative DNA Samples of the Population . . . . . . . . . . . . . . . . . . . . 101 3.4 Abstract Visualisation for Populations of Variable Length Sequences . . . . . . . 103 3.5 3D Fitness Landscape with a Global Optimum . . . . . . . . . . . . . . . . . . . 104 3.6 3D Fitness Landscape with No Optimum . . . . . . . . . . . . . . . . . . . . . . 105 3.7 3D Fitness Landscape with Global Optima . . . . . . . . . . . . . . . . . . . . . 106 3.8 Population with Hidden Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . 107 3.9 Population with Clusters Visible . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 3.10 Agent Atomicity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 3.11 Population Constructed from a Non-Atomic Alphabet . . . . . . . . . . . . . . . 109 3.12 Original Physical Complexity Graphs . . . . . . . . . . . . . . . . . . . . . . . . 110 3.13 Graph of Physical Complexity and Maximum Fitness . . . . . . . . . . . . . . . 111 3.14 Visualisation of Evolving Agent Populations . . . . . . . . . . . . . . . . . . . . 112 3.15 Graph of Population Efficiency over the Generations . . . . . . . . . . . . . . . . 113 3.16 Graph of the Clustering Coefficient over the Generations . . . . . . . . . . . . . 114 3.17 Visualisation of Clusters in an Evolving Agent Population . . . . . . . . . . . . 114 3.18 State-Space of an Evolving Agent Population . . . . . . . . . . . . . . . . . . . . 122 3.19 Graph of the Probabilities of the Macro-States . . . . . . . . . . . . . . . . . . . 125 3.20 Visualisation of an Evolving Agent Population . . . . . . . . . . . . . . . . . . . 126 3.21 Graph of Stability with Different Mutation and Crossover Rates . . . . . . . . . 127 3.22 Graph of Uniformly Distributed Agent-Sequence Length Frequencies . . . . . . . 132 3.23 Graph of Gaussian Distributed Agent-Sequence Length Frequencies . . . . . . . 132 3.24 Graph of Power Distributed Agent-Sequence Length Frequencies . . . . . . . . . 133 3.25 Graph of Uniformly Distributed Agent Attribute Frequencies . . . . . . . . . . . 134 3.26 Graph of Gaussian Distributed Agent Attribute Frequencies . . . . . . . . . . . 135 3.27 Graph of Power Distributed Agent Attribute Frequencies . . . . . . . . . . . . . 135 LIST OF FIGURES 13 4.1 Clustering Catalyst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 4.2 Replacement Aggregator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 4.3 Agent-Pool Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 4.4 Targeted Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 4.5 Effect of The Proposed Augmentations . . . . . . . . . . . . . . . . . . . . . . . 149 4.6 Pseudo-Code for Physical Complexity Clustering . . . . . . . . . . . . . . . . . . 155 4.7 Agent Life-Cycle With Targeted Migration . . . . . . . . . . . . . . . . . . . . . 157 4.8 Neural Network for the Similarity Recognition Component . . . . . . . . . . . . 164 4.9 Support Vector Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 4.10 Graph of the Hierarchical Clustering Based Clustering Catalyst . . . . . . . . . 168 4.11 Graph of the Physical Complexity Based Clustering Catalyst . . . . . . . . . . . 169 4.12 Graph of Typical Runs for the Clustering Catalysts . . . . . . . . . . . . . . . . 170 4.13 Graph of the Targeted Migration Controls and the Digital Ecosystem . . . . . . 172 4.14 Graph of Typical Runs for the Targeted Migration Controls . . . . . . . . . . . 172 4.15 Graph of Neural Networks Based Targeted Migration . . . . . . . . . . . . . . . 173 4.16 Graph of Support Vector Machine Based Targeted Migration . . . . . . . . . . . 174 4.17 Graph of Typical Runs for the Digital Ecosystem and Targeted Migration . . . . 175 4.18 Graph of Frequencies for the Targeted Migration . . . . . . . . . . . . . . . . . . 176 14 Chapter 1 Introduction 1.1 Motivation and Objectives Is mimicking ecosystems the future of information systems ? A key challenge in modern computing is to develop systems that address complex, dynamic problems in a scalable and efficient way, because the increasing complexity of software makes designing and maintaining efficient and flexible systems a growing challenge [209, 299, 193]. What with the ever expanding number of services being offered online from Application Programming Interfaces (APIs) being made public, there is an ever growing number of computational units available to be combined in the creation of applications. However, this is currently a task done manually by programmers, and it has been argued [184] that current software development techniques have hit a complexity wall, which can only be overcome by automating the search for new algorithms. There are several existing efforts aimed at achieving this automated service composition [203, 226, 207, 255], the most prevalent of which is Service- Oriented Architectures and its associated standards and technologies [66, 320]. Alternatively, nature has been in the research business for 3.8 billion years and in that time has accumulated close to 30 million well-adjusted solutions to a plethora of design challenges that humankind struggles to address with mixed results [33]. Biomimicry is a discipline that seeks solutions by emulating nature’s designs and processes, and there is considerable opportunity 15 16 , Chapter 1. Introduction to learn elegant solutions for human-made problems [33]. Biological ecosystems are thought to be robust, scalable architectures that can automatically solve complex, dynamic problems, possessing several properties that may be useful in automated systems. These properties include self-organisation, self-management, scalability, the ability to provide complex solutions, and the automated composition of these complex solutions [173]. Therefore, an approach to the aforementioned challenge would be to develop Digital Ecosystems, artificial systems that aim to harness the dynamics that underlie the complex and diverse adaptations of living organisms in biological ecosystems. While evolution may be well understood in computer science under the auspices of evolutionary computing [90], ecological models are not. The possible connections between Digital Ecosystems and their biological counterparts are yet to be closely examined, so potential exists to create an Ecosystem-Oriented Architecture with the essential elements of biological ecosystems, where the word ecosystem is more than just a metaphor. We propose that an ecosystem inspired approach, would be more effective at greater scales than traditionally inspired approaches, because it would be built upon the scalable and self-organising properties of biological ecosystems [173]. However, ecological succession, the formation of a mature ecosystem from the predictable and orderly changes in the composition and structure of an ecological community [29], is a slow process. So, for our Digital Ecosystems it will be desirable to accelerate and optimise the equivalent process, which may be possible through the application of augmentations that interact with the ecosystem dynamics. Therefore, the primary objectives are as follows: • Determine the structure of an Ecosystem-Oriented Architecture and so create Digital Ecosystems, which are the digital counterpart of biological ecosystems, and so have analogous properties of self-organisation, scalability and sustainability. • Develop an understanding of the self-organising behaviour within a Digital Ecosystem, learning where and how it occurs, what forms it can take, and how it can be quantified. • Investigate if we can accelerate or optimise the evolutionary and ecological self-organising dynamics of Digital Ecosystems, exploring how alternative augmentations interact with the ecosystem dynamics. 1.2. Contributions , 1.2 Contributions 17 Substantial parts of our efforts are original contributions in the area of Biologically-Inspired Computing [99] and the emerging field of Digital Ecosystems, with our major research contributions being as follows: • We have determined the fundamentals for a new class of system, Digital Ecosystems, created through combining understanding from theoretical ecology, evolutionary the- ory, Multi-Agent Systems, distributed evolutionary computing, and Service-Oriented Architectures. • We have investigated where and how self-organisation occurs in Digital Ecosystems, what forms it can take and how it can be quantified, including the self-organised complexity, stability, and diversity of the evolving agent populations within. • We have extended the statistical physics based definition of Physical Complexity, to include evolving agent populations. This required extending definitions for populations of variable length sequences, creating a measure for the efficiency of information storage, and an understanding of clustering within populations to support the non-atomicity of agents. • We have extended the Chli-DeWilde definition of agent stability to include the evolu- tionary dynamics of evolving agent populations. We then built upon this to construct an entropy-based definition for the degree of instability, which was used to study the stability of evolving agent populations under varying conditions. • We have developed an understanding and definition for the self-organised diversity, finding no existing definition suitable because of the unique hybrid nature of Digital Ecosystems. We therefore considered the global distribution of the agents in the populations relative to the varying requirements of the user base. • We have investigated alternative augmentations to optimise and accelerate our Digital Ecosystems, studying the accelerating effect of a clustering catalyst on the evolutionary dynamics, and the optimising effect of targeted migration on the ecological dynamics. 18 1.3 Publications The following publications support the material presented in this thesis: [•] Digital Ecosystems: Stability of evolving agent populations. G Briscoe and P De Wilde. Submitted to Evolutionary Computation. [•] Digital Ecosystems: Self-organisation of evolving agent populations. G Briscoe and P De Wilde. Submitted to Applied Soft Computing. [•] Digital Ecosystems: Optimisation by a distributed intelligence. G Briscoe and P De Wilde. In Digital Ecosystems and Technologies Conference. IEEE Press, 2008. Awarded Best Track Paper. [•] Digital Business Ecosystems: Natural science paradigms. G Briscoe and S Sadedin. In F Nachira, A Nicolai, P Dini, M Le Louarn, and L Rivera Le´on, editors, Digital Business Ecosystems, pages 48–55. European Commission, 2007. [•] Biology of applied digital ecosystems. G Briscoe, S Sadedin, and G Paperin. In Digital Ecosystems and Technologies Conference, pages 458–463. IEEE Press, 2007. [•] Digital Ecosystems: Evolving service-oriented architectures. G Briscoe and P De Wilde. In Conference on Bio Inspired Models of Network, Information and Computing Systems. IEEE Press, 2006. [•] Creating a Digital Ecosystem: Service-oriented architectures with distributed evolutionary computing (BOF-0759). G Briscoe, M Chli, and M Vidal. In JavaOne Conference. Sun Microsystems, 2006. [•] Pervasive service architecture for a digital business ecosystem. T Heistracher, T Kurz, C Masuch, P Ferronato, M Vidal, A Corallo, P Dini, and G Briscoe. In C Canal, J Murillo, and P Poizat, editors, International Workshop on Coordination and Adaptation Techniques for Software Entities, pages 71–80. Universidad de Extremadura, 2004. 1.4. Dissertation Outline , 19 1.4 Dissertation Outline In Chapter 2, we explain the hybrid model created to provide the digital counterpart of a biological ecosystem. We start with the relevant theory from the domain of theoretical biology, including the fields of evolutionary and ecological theory, and from the domain of computer science, including the fields of Multi-Agent Systems, evolutionary computing and Service- Oriented Architectures. The Digital Ecosystem is then measured experimentally through simulations, with measures originating from theoretical ecology, to evaluate its likeness to a biological ecosystem. This included its responsiveness to requests for applications from the user base, as a measure of the ecological succession (ecosystem maturity). Chapter 3 investigates the self-organising aspects of Digital Ecosystems. We start with the complexity of the evolving agent populations within, by extending the statistical physics based definition of Physical Complexity to support variable length populations of software agents. Next, we investigate the stability of the evolving agent populations, by extending the Chli-DeWilde definition of agent stability to include the evolutionary dynamics of Digital Ecosystems. Finally, we study the diversity of the agents within the evolving agent populations of the Digital Ecosystem, for optimality relative to the environment provided by the user base. In Chapter 4, we start by considering alternative augmentations to optimise and accelerate Digital Ecosystems. We then further investigate the most promising, the clustering catalyst and targeted migration: the accelerating effect of a clustering catalyst on the evolutionary dynamics of our Digital Ecosystem, through the direct acceleration of the evolutionary processes; and the optimising effect of targeted migration on the ecological dynamics of our Digital Ecosystem, through the indirect and emergent optimisation of the agent migration patterns. Chapter 5 provides a summary of the conclusions, and suggests possible future research into Digital Ecosystems. We also report on the status of the reference implementation for Digital Ecosystems, and the dedicated simulation framework created for its future study. After this the Bibliography follows. 20 Chapter 2 Creation of Digital Ecosystems In this chapter we create Digital Ecosystems, starting with a discussion of the relevant literature, including Nature Inspired Computing as a framework in which to understand this work, and the process of biomimicry to be used in mimicking the necessary biological processes to create Digital Ecosystems. We then consider the relevant theoretical ecology in creating the digital counterpart of a biological ecosystem, including the topological structure of ecosystems, and evolutionary processes within distributed environments. This leads to a discussion of the relevant fields from computer science for the creation of Digital Ecosystems, including evolutionary computing, Multi-Agent Systems, and Service-Oriented Architectures. We then define Ecosystem-Oriented Architectures for the creation of Digital Ecosystems, imbibed with the properties of self-organisation, scalability and sustainability from biological ecosystems, including a novel form of distributed evolutionary computing. This will include a discussion of the compromises resulting from the hybrid model created, such as the network topology. We then performed simulations to compare the likeness of our Digital Ecosystem with biological ecosystems, starting with ecological succession (development), measured by its responsiveness to requests for applications from the user base, and followed by the measures of species abundance and the species-area relationship, which are commonly applied to biological ecosystems. Finally, we conclude with a summary and discussion of the achievements, including the experimental results. 21 22 , Chapter 2. Creation of Digital Ecosystems 2.1 Background Theory In this section we discuss the relevant background theory, and because of the interdisciplinary nature of our research it will cover several fields across different domains. We start with an introduction to Nature Inspired Computing, followed by the relevant theoretical biology and computer science. With the theoretical biology, we will consider how properties of biological ecosystems influence functions that are relevant to developing Digital Ecosystems to solve practical problems. This leads us to suggest ways in which concepts from ecology can be used in biologically inspired techniques to create Digital Ecosystems. 2.1.1 Existing Digital Ecosystems Our focus is in creating the digital counterpart of biological ecosystems. However, the term digital ecosystem has described a variety of concepts, which we shall now review. Sometimes referring to the existing networking infrastructure of the Internet [79, 27, 94, 337], while several companies offer a digital ecosystem service, which involves enabling customers to use existing e-business solutions [32, 160, 315]. The term is also being increasingly linked to the future developments of Information and Communications Technology (ICT) adoption for e-business, to support business ecosystems [214]. However, perhaps the most frequent references to digital ecosystems arise in Artificial Life research, where they are created primarily to investigate aspects of biological and other complex systems [295, 114, 55]. The extent to which these disparate systems resemble biological ecosystems varies, and frequently the word ecosystem is merely used for branding purposes without any inherent ecological properties. We consider Digital Ecosystems to be software systems that exploit the properties of biological ecosystems, and suggest that several key features of biological ecosystems have not been fully explored in existing digital ecosystems. So, we will now discuss how mimicking these features can create Digital Ecosystems, which are robust, scalable, and self-organising. 2.1. Background Theory , 23 2.1.2 Nature-Inspired Computing Biomimicry (bios, meaning life, and mimesis, meaning to imitate) is the science that studies nature, its models, systems, processes, and elements, and then imitates or takes creative inspiration from them for the study and design of engineering systems and modern technology [33]. This concept is far from new, with humans having long been inspired by the animals and plants of the natural world; Leonardo Da Vinci himself once said, Those who are inspired by a model other than Nature, a mistress above all masters, are labouring in vain [40]. Albeit overstating the point, it reminds us that the transfer of technology between life-forms and synthetic constructs is desirable because evolutionary pressures typically force living organisms to become highly optimised and efficient. A classical example is the development of dirt and water repellent paint from the observation that the surface of the lotus flower plant is practically non-sticky for anything, commonly known as the lotus effect [25]. However, biomimicry, when done well, is not slavish imitation; it is inspiration using the principles which nature has demonstrated to be successful design strategies. For example, in the early days of mechanised flight the best designs were not the ornithopters, which most completely imitated birds, but the fixed-wing craft that used the principle of aerofoil cross-section in their wings [10]. Biomimicry in computer science is called Nature Inspired Computing (NIC) or Natural Computation, and the benefits of natural computation technologies often mimic those found in real natural systems, and include flexibility, adaptability, robustness, and decentralised control [73]. The increasing demands upon current computer systems, along with technological changes, create a need for more flexible and adaptable systems. The desire to achieve this has led many computing researchers to look to natural systems for inspiration in the design of computer software and hardware, as natural systems provide many examples of the type of versatile system required [73]. Their sources of inspiration come from many aspects of natural systems; evolution, ecology, development, cell and molecular phenomena, behaviour, cognition, and other areas [195]. The use of nature inspired techniques often results in the design of novel computing systems with applicability in many different areas [195]. NIC itself can be divided into three main branches [73]: 24 , Chapter 2. Creation of Digital Ecosystems • Biologically-Inspired Computing (BIC): This makes use of nature as inspiration for the development of problem solving techniques. The main idea of this branch is to develop computational tools (algorithms) by taking inspiration from nature for the solution of complex problems. • The simulation and emulation of nature by computational means: This is basically a synthetic process aimed at creating patterns, forms, behaviours, and organisms that resemble life-as-we-know-it. Its products can be used to mimic various natural phenomena, thus increasing our understanding of nature and insights about computer models. • Computing with natural materials: This corresponds to the use of natural materials to perform computation, to substitute or supplement the current silicon-based computers. All branches share the common characteristic of human-designed computing inspired by nature, the metaphorical use of concepts, principles, and mechanisms underlying natural systems. Thus, evolutionary algorithms use the concepts of mutation, recombination, and natural selection from biology; neural networks are inspired by the highly interconnected neural structures in the brain and the nervous system; molecular computing is based on paradigms from molecular biology; and quantum computing based on quantum physics exploits quantum parallelism [73]. There are however, important methodological differences between various sub-areas of natural computing. For example, evolutionary algorithms and algorithms based on neural networks are presently implemented on conventional computers. However, molecular computing also aims at alternatives for silicon hardware by implementing algorithms in biological hardware, using DNA molecules and enzymes. Also, quantum computing aims at non-traditional hardware that can make use of quantum effects [73]. We are concerned with BIC, which relies heavily on the fields of biology, computer science, and mathematics. Briefly put, it is the study of nature to improve the usage of computers [99], and should not to be confused with computational biology [326], which is an interdisciplinary field that applies the techniques of computer science, applied mathematics, and statistics to address problems inspired by biology. BIC has produced Neural Networks, swarm intelligence and evolutionary computing [99]. Introducing BIC, one comes quickly to its applications, partly 2.1. Background Theory , 25 Figure 2.1: Biomimicry Design Spiral (modified from [130]): The process of biomimicry starts with identifying some behaviour from a biological system, which would appear to be useful. Followed by observation to understand the mechanisms or principles by which it operates, and therefore allowing for an abstract understanding of the behaviour. This can then be mimicked in a non-biological system and its performance and effectiveness evaluated [130]. because this is the essence of the approach, and partly because biomimicry as a process tends to be un-formalised and ad hoc [130]. It generally involves an engineer or scientist observing or being aware of an area of biological study, which seems applicable to a technology or research problem they are currently tackling, or which inspires the creation of a new technology [73]. However, there are some common steps in this process, which starts with identifying some behaviour from a biological system, which would appear to be useful. Followed by observation to understand the mechanisms or principles by which it operates, and therefore allowing for an abstract understanding of the behaviour. This can then be mimicked in a non-biological system and its performance and effectiveness evaluated [130]. This process is summarised Figure 2.1. 2.1.3 Biology of Digital Ecosystems Natural science is the study of the universe via the rules or laws of natural order, and the term is also used to differentiate those fields using scientific method in the study of nature, in contrast with the social sciences which apply the scientific method to culture and human behaviour: economics, psychology, political economy, anthropology, etc [135]. The fields of natural science are diverse, ranging from particle physics to astronomy [273], and while not all IdentifyObserveUnderstandAbstractApplyEvaluate 26 , Chapter 2. Creation of Digital Ecosystems these fields of study will provide paradigms for Digital Ecosystems, the further one wishes to take the analogy of the word ecosystem, the more one has to consider the relevance of the fields of natural science, particularly the biological sciences. A primary motivation for our research in Digital Ecosystems is the desire to exploit the self- organising properties of biological ecosystems. Ecosystems are thought to be robust, scalable architectures that can automatically solve complex, dynamic problems [173]. However, the biological processes that contribute to these properties have not been made explicit in Digital Ecosystems research. Here, we discuss how biological properties contribute to the self-organising features of biological ecosystems, including population dynamics, evolution, a complex dynamic environment, and spatial distributions for generating local interactions [309]. The potential for exploiting these properties in artificial systems is then considered. We suggest that several key features of biological ecosystems have not been fully explored in existing digital ecosystems, and discuss how mimicking these features may assist in developing robust, scalable self-organising architectures. Evolutionary computing uses natural selection to evolve solutions [110]; it starts with a set of possible solutions chosen arbitrarily, then selection, replication, recombination, and mutation are applied iteratively. Selection is based on conforming to a fitness function which is determined by a specific problem of interest, and so over time better solutions to the problem can thus evolve [110]. As Digital Ecosystems will likely solve problems by evolving solutions, they will probably incorporate some form of evolutionary computing. However, we suggest that Digital Ecosystems should also incorporate additional features, providing it with a closer resemblance to biological ecosystems. Including features such as complex dynamic fitness functions, a distributed or network environment, and self-organisation arising from interactions among organisms and their environment, such as those that we will now discuss. Arguably the most fundamental differences between biological and digital ecosystems lie in the motivation and approach of their respective researchers. Biological ecosystems are ubiquitous natural phenomena whose maintenance is crucial to our survival [20], developing through the process of ecological succession [29]. In contrast, Digital Ecosystems will be defined here as a 2.1. Background Theory , 27 technology engineered to serve specific human purposes, developing to solve dynamic problems in parallel with high efficiency. 2.1.3.1 Biological Ecosystems Figure 2.2: Ecosystem Structure (redrawn from [261]): A stable, self-perpetuating system made up of one or more communities of organisms, consisting of species in their habitats, with their populations existing in their respective micro-habitats [29]. A community is a naturally occurring group of populations from different species that live together, and interact as a self- contained unit in the same habitat. A habitat is a distinct part of the environment [29]. An ecosystem is a natural unit made up of living (biotic) and non-living (abiotic) components, from whose interactions emerge a stable, self-perpetuating system. It is made up of one or more communities of organisms, consisting of species in their habitats, with their populations existing in their respective micro-habitats [29]. A community is a naturally occurring group of populations from different species that live together, and interact as a self-contained unit in the same habitat. A habitat is a distinct part of the environment [29], for example, a stream. Individual organisms migrate through the ecosystem into different habitats competing with other organisms for limited resources, with a population being the aggregate number of the individuals, of a particular species, inhabiting a specific habitat or micro-habitat [29]. A micro-habitat is a subdivision of a habitat that possesses its own unique properties, such as nichenichenicheecosystemsmicrohabitatspopulationsenvironmentcommunityhabitat 28 , Chapter 2. Creation of Digital Ecosystems a micro-climate [168]. Evolution occurs to all living components of an ecosystem, with the evolutionary pressures varying from one population to the next depending on the environment that is the population’s habitat. A population, in its micro-habitat, comes to occupy a niche, which is the functional relationship of a population to the environment that it occupies. A niche results in the highly specialised adaptation of a population to its micro-habitat [168]. 2.1.3.2 Fitness Landscapes and Agents As described above, an ecosystem comprises both an environment and a set of interacting, reproducing entities (or agents) in that environment; with the environment acting as a set of physical and chemical constraints on reproduction and survival [29]. These constraints can be considered in abstract using the metaphor of the fitness landscape, in which individuals are represented as solutions to the problem of survival and reproduction [335]. All possible solutions are distributed in a space whose dimensions are the possible properties of individuals. An additional dimension, height, indicates the relative fitness (in terms of survival and reproduction) of each solution. The fitness landscape is envisaged as a rugged, multidimensional landscape of hills, mountains, and valleys, because individuals with certain sets of properties are fitter than others [335], as visualised in Figure 2.3. In biological ecosystems, fitness landscapes are virtually impossible to identify. This is both because there are large numbers of possible traits that can influence individual fitness, and because the environment changes over time and space [29]. In contrast, within a digital environment, it is normally possible to specify explicitly the constraints that act on individuals in order to evolve solutions that perform better within these constraints. Within genetic algorithms, exact specification of a fitness landscape or function is common practice [110]. However, within a Digital Ecosystem the ideal constraints are those that allow solution populations to evolve to meet user needs with maximum efficiency, with the user needs changing from place to place and time to time. In this sense the fitness landscape of a Digital Ecosystem is complex and dynamic, and more like that of a biological ecosystem than like that of a traditional genetic algorithm [217, 110]. The designer of a Digital Ecosystem therefore faces a double challenge: firstly, to specify rules that govern the shape of the fitness function/landscape 2.1. Background Theory , 29 Figure 2.3: Fitness Landscape (modified from [314]): We can represent software development as a walk through the landscape, towards the peaks which correspond to the optimal applications. Each point represents a unique combination of software services, and the roughness of the landscape indicates how difficult it is to reach an optimal software design [314]. In this example, there is a global optimum, and several lower local optima. in a way that meaningfully maps landscape dynamics to user requests, and secondly, to evolve within this space, solution populations that are diverse enough to solve disparate problems, complex enough to meet user needs, and efficient enough to be preferable to those generated by other means. The agents within a Digital Ecosystem will need to be like biological individuals in the sense that they reproduce, vary, interact, move, and die [29]. Each of these properties contributes to the dynamics of the ecosystem. However, the way in which these individual properties are encoded may vary substantially depending on the intended purpose of the system [49]. 2.1.3.3 Networks and Spatial Dynamics A key factor in the maintenance of diversity in biological ecosystems is spatial interactions, and several modelling systems have been used to represent these spatial interactions, including metapopulations1, diffusion models, cellular automata and agent-based models (termed individual-based models in ecology) [116]. The broad predictions of these diverse models are 1 A metapopulation is a collection of relatively isolated, spatially distributed, local populations bound together by occasional dispersal between populations [175, 127, 128]. 30 , Chapter 2. Creation of Digital Ecosystems Figure 2.4: Abstract View of An Ecosystem: Showing different populations (by the different colours) in different spatial areas, and their connection to one another by the lines. Included are communities of populations that have become geographically separated and so are not connected to the main network of the ecosystem, and which could potentially give rise to allopatric (geographic) speciation [168]. in good agreement. At local scales, spatial interactions favour relatively abundant species disproportionately. However, at a wider scale, this effect can preserve diversity, because different species will be locally abundant in different places. The result is that even in homogeneous environments, population distributions tend to form discrete, long-lasting patches that can resist an invasion by superior competitors [116]. Population distributions can also be influenced by environmental variations such as barriers, gradients, and patches. The possible behaviour of spatially distributed ecosystems is so diverse that scenario-specific modelling is necessary to understand any real system [119]. Nonetheless, certain robust patterns are observed. These 2.1. Background Theory , 31 include the relative abundance of species, which consistently follows a roughly log-normal relationship [30], and the relationship between geographic area and the number of species present, which follows a power law [288]. The reasons for these patterns are disputed, because they can be generated by both spatial extensions of simple Lotka-Volterra competition models [136], and more complex ecosystem models [293]. Landscape connectivity plays an important part in ecosystems. When the density of habitats within an environment falls below a critical threshold, widespread species may fragment into isolated populations. Fragmentation can have several consequences. Within populations, these effects include loss of genetic diversity and detrimental inbreeding [115]. At a broader scale, isolated populations may diverge genetically, leading to speciation, as shown in Figure 2.4. From an information theory perspective, this phase change in landscape connectivity can mediate global and local search strategies [118]. In a well-connected landscape, selection favours the globally superior, and pursuit of different evolutionary paths is discouraged, potentially leading to premature convergence. When the landscape is fragmented, populations may diverge, solving the same problems in different ways. Recently, it has been suggested that the evolution of complexity in nature involves repeated landscape phase changes, allowing selection to alternate between local and global search [117]. In a digital context, we can have spatial interactions by using a distributed system that consists of a set of interconnected locations, with agents that can migrate between these connected locations. In such systems the spatial dynamics are relatively simple compared with those seen in real ecosystems, which incorporate barriers, gradients, and patchy environments at multiple scales in continuous space [29]. Nevertheless, depending on how the connections between locations are organised, such Digital Ecosystems might have dynamics closely parallel to spatially explicit models, diffusion models, or metapopulations [119]. We will discuss later the use of a dynamic non-geometric spatial network, and the reasons for using this approach. 2.1.3.4 Selection and Self-Organisation The major hypothetical advantage of Digital Ecosystems over other complex organisational models is their potential for dynamic adaptive self-organisation. However, for the solutions 32 , Chapter 2. Creation of Digital Ecosystems Figure 2.5: Evolving Population of Digital Organisms: A virtual petri dish at three successive time-steps, showing the self-organisation of the population undergoing selection. The colour shows the genetic variability of the digital organisms. Over time the fitter (purple) organisms come to dominate the population, reproducing more and essentially replacing the weaker organisms of the population [247]. evolving in Digital Ecosystems to be useful, they must not only be efficient in a computational sense, but they must also solve purposeful problems. That is, the fitness of agents must translate in some sense to real-world usefulness as demanded by the users [85]. Constructing a useful Digital Ecosystem therefore requires a balance between freedom of the system to self-organise, and constraint of the system to generate useful solutions. These factors must be balanced because the more the system’s behaviour is dictated by its internal dynamics, the less it may respond to fitness criteria imposed by the users. At one extreme, when system dynamics are mainly internal, agents may evolve that are good at survival and reproduction within the digital environment, but useless in the real world [85]. At the other extreme, where the users’ fitness criteria overwhelmingly dictates function, we suggest that dynamic exploration, of the solution space and complexity, is likely to be limited. The reasoning behind this argument is as follows. Consider a multidimensional solution space which maps to a rugged fitness landscape [335]. In this landscape, competing solution lineages will gradually become extinct through chance processes. So, the solution space explored becomes smaller over time as the population adapts and the diversity of solutions decreases. Ultimately, all solutions may be confined to a small region of the solution space. In a static fitness landscape, this situation is desirable because the surviving solution lineages will usually be clustered around an optimum [110]. However, if the fitness landscape is dynamic, the location of optima varies over time, and should lineages become confined to a small area of the solution space, then subsequent 2.1. Background Theory , 33 selection will locate only optima that are near this area [217]. This is undesirable if new, higher optima arise that are far from pre-existing ones. A related issue is that complex solutions are less likely to be found by chance than simple ones. Complex solutions can be visualised as sharp, isolated peaks on the fitness landscape. Especially for dynamic landscapes, these peaks are most likely to be found when the system explores the solution space widely [217]. Therefore, a self-organising mechanism other than the fitness criteria of users is required to maintain diversity among competing solutions in a Digital Ecosystem. 2.1.3.5 Stability and Diversity in Complex Adaptive Systems Ecosystems are often described as Complex Adaptive Systems (CAS), because like them, they are systems made from diverse, locally interacting components that are subject to selection. Other CAS include brains, individuals, economies, and the biosphere. All are characterised by hierarchical organisation, continual adaptation and novelty, and non-equilibrium dynamics. These properties lead to behaviour that is non-linear, historically contingent, subject to thresholds, and contains multiple basins of attraction [173]. In the previous subsections, we have advocated Digital Ecosystems that include agent populations evolving by natural selection in distributed environments. Like real ecosystems, digital systems designed in this way fit the definition of CAS. The features of these systems, especially non-linearity and non-equilibrium dynamics, offer both advantages and hazards for adaptive problem-solving. The major hazard is that the dynamics of CAS are intrinsically hard to predict because of the non-linear emergent self-organisation [174]. This observation implies that designing a useful Digital Ecosystem will be partly a matter of trial and error. The occurrence of multiple basins of attraction in CAS suggests that even a system that functions well for a long period may suddenly at some point transition to a less desirable state [97]. For example, in some types of system self-organising mass extinctions might result from interactions among populations, leading to temporary unavailability of diverse solutions [230]. This concern may be addressed by incorporating negative feedback or other mechanisms at the global scale. The challenges in designing an effective Digital Ecosystem are mirrored by 34 , Chapter 2. Creation of Digital Ecosystems the system’s potential strengths. Non-linear behaviour provides the opportunity for scalable organisation and the evolution of complex hierarchical solutions, while rapid state transitions potentially allow the system to adapt to sudden environmental changes with minimal loss of functionality [173]. Figure 2.6: Ecosystems as Complex Adaptive Systems (modified from [9]): (LEFT) An abstract view of an ecosystem showing the diversity of different populations by the different colours and spacing. (RIGHT) An abstract view of diversity within a population, with the space between points showing genetic diversity and the clustering prevalent. A key question for designers of Digital Ecosystems is how the stability and diversity properties of biological ecosystems map to performance measures in digital systems. For a Digital Ecosystem the ultimate performance measure is user satisfaction, a system-specific property. However, assuming the motivation for engineering a Digital Ecosystem is the development of scalable, adaptive solutions to complex dynamic problems, certain generalisations can be made. Sustained diversity [97], is a key requirement for dynamic adaptation. In Digital Ecosystems, diversity must be balanced against adaptive efficiency because maintaining large numbers of poorly-adapted solutions is costly. The exact form of this trade-off will be guided by the specific requirements of the system in question. Stability [173], is likewise, a trade-off: we want the system to respond to environmental change with rapid adaptation, but not to be so responsive that mass extinctions deplete diversity or sudden state changes prevent control. 2.1. Background Theory , 35 2.1.4 Computing of Digital Ecosystems Based on the understanding of biological ecosystems, from the theoretical biology of the previous subsection, we will now introduce fields from the domain of computer science relevant in the creation of Digital Ecosystems. As we are interested in the digital counterparts for the behaviour and constructs of biological ecosystems, instead of simulating or emulating such behaviour or constructs, we will consider what parallels can be drawn. The value of creating parallels between biological and computer systems varies substantially depending on the behaviours or constructs being compared, and sometimes cannot be done so convincingly. For example, both have mechanisms to ensure data integrity. In computer systems, that integrity is absolute, data replication which introduces even the most minor change is considered to have failed, and is supported by mechanisms such as the Message-Digest algorithm 5 [266]. While in biological systems, the genetic code is transcribed with a remarkable degree of fidelity; there is, approximately, only one unforced error per one hundred bases copied [202]. There are also elaborate proof-reading and correction systems, which in evolutionary terms are highly conserved [202]. In this example establishing a parallel is infeasible, despite the relative similarity in function, because the operational control mechanisms in biological and computing systems are radically different, as are the aims and purposes. This is a reminder that considerable finesse is required when determining parallels, or when using existing ones. We will start by considering Multi-Agent Systems to explore the references to agents and migration; followed by evolutionary computing and Service-Oriented Architectures for the references to evolution and self-organisation. 2.1.4.1 Multi-Agent Systems A software agent is a piece of software that acts, for a user in a relationship of agency, autonomously in an environment to meet its designed objectives [334]. A Multi-Agent System (MAS) is a system composed of several software agents, collectively capable of reaching goals that are difficult to achieve by an individual agent or monolithic system [334]. Conceptually, there is a strong parallel between the software agents of a MAS and the agent-based models of 36 , Chapter 2. Creation of Digital Ecosystems Figure 2.7: Mobile Agent System: Visualisation that shows mobile agents as programmes that can migrate from one host to another in a network of heterogeneous computer systems and perform a task specified by its owner. On each host they visit, mobile agents need special software called an agent station, which is responsible for executing the agents and providing a safe execution environment [200]. a biological ecosystem [116], despite the lack of evolution and migration in a MAS. There is an even stronger parallel to a variant of MASs, called mobile agent systems, in which the mobility also mirrors the migration in biological ecosystems [249]. The term mobile agent contains two separate and distinct concepts: mobility and agency [269]. Hence, mobile agents are software agents capable of movement within a network [249]. The mobile agent paradigm proposes to treat a network as multiple agent-friendly environments and the agents as programmatic entities that move from location to location, performing tasks for users. So, on each host they visit mobile agents need software which is responsible for their execution, providing a safe execution environment [249]. Generally, there are three types of design for mobile agent systems [249]: (1) using a specialised operating system, (2) as operating system services or extensions, or (3) as application software. The first approach has the operating system providing the requirements of mobile agent systems directly [301]. The second approach implements the mobile agent system requirements as operating system extensions, taking advantage of existing features of the operating system [146]. Lastly, the third approach builds mobile agent systems as specialised application software that runs on top of an operating system, to provide for the mobile agent functionality, with such AgentStation 2.1. Background Theory , 37 software being called an agent station [200]. In this last approach, each agent station hides the vendor-specific aspects of its host platform, and offers standardised services to visiting agents. Services include access to local resources and applications; for example, web servers or web services, the local exchange of information between agents via message passing, basic security services, and the creation of new agents [200]. Also, the third approach is the most platform-agnostic, and is visualised in Figure 2.7. 2.1.4.2 Evolutionary Computing For evolving software in Digital Ecosystems evolutionary computing is the logical field from which to start. In Biologically-Inspired Computing, one of the primary sources of inspiration from nature has been evolution [195]. Evolution has been clearly identified as the source of many diverse and creative solutions to problems in nature [67, 104]. However, it can also be useful as a problem-solving tool in artificial systems. Computer scientists and other theoreticians realised that the selection and mutation mechanisms that appear so effective in biological evolution could be abstracted to be implemented in a computational algorithm [195]. Evolutionary computing is now recognised as a sub-field of artificial intelligence (more particularly computational intelligence) that involves combinatorial optimisation problems [14]. Evolutionary algorithms are based upon several fundamental principles from biological evolution, including reproduction, mutation, recombination (crossover), natural selection, and survival of the fittest. As in biological systems, evolution occurs by the repeated application of the above operators [13]. An evolutionary algorithm operates on a set of individuals, called a population. An individual, in the natural world, is an organism with an associated fitness [168]. Candidate solutions to an optimisation problem play the role of individuals in a population, and a cost function determines the environment within which the solutions live, analogous to the way the environment selects for the fittest individuals. Candidate solutions to an optimisation problem play the role of individuals in a population, and a cost function determines the environment by selecting for the fittest individuals. The number of individuals varies between different implementations and may also vary through time during the use of the algorithm. Each individual possesses some characteristics that are defined through its genotype, its genetic 38 , Chapter 2. Creation of Digital Ecosystems composition. These characteristics may be passed on to descendants of that individual [13]. Processes of mutation (small random changes) and crossover (generation of a new genotype by the combination of components from two individuals) may occur, resulting in new individuals with genotypes different from the ancestors they will come to replace. These processes iterate, modifying the characteristics of the population [13]. Which members of the population are kept, or are used as parents for offspring, will often depend upon some external characteristic, called the fitness (cost) function of the population. It is this that enables improvement to occur [13], and corresponds to the fitness of an organism in the natural world [168]. Recombination and mutation create the necessary diversity and thereby facilitate novelty, while selection acts as a force increasing quality. Changed pieces of information resulting from recombination and mutation are randomly chosen. However, selection operators can be either deterministic, or stochastic. In the latter case, individuals with a higher fitness have a higher chance to be selected than individuals with a lower fitness [13]. There are different strands of what has become called evolutionary computing [13]. The first is genetic algorithms. A second strand, evolution strategies, focuses strongly on engineering applications. A third strand, evolutionary programming, originally developed from machine intelligence motivations, and is related to the other two. These areas developed separately for about fifteen years, but from the early nineties they are seen as different representatives (dialects) of one technology, called evolutionary computing [90]. In the early nineties, another fourth stream following the general ideas had emerged, called genetic programming [90]. Genetic algorithms [110] implement a population of individuals, each of which possesses a genotype that encodes a candidate solution to a problem. Typically genotypes are encoded as bit-strings, but other encodings have been used in more recent developments of genetic algorithms. Mutation and crossover, along with selection, are then used to choose a solution to a problem. They have proven to be widely applicable, and have resulted in many applications in differing domains [212]. Evolutionary strategies arose out of an attempt by several civil engineers to understand a problem in hydrodynamics [74]. Evolutionary strategies [278] differ from genetic algorithms in operating on real-valued parameters, and historically they have tended not to use crossover as a variational operator, only mutation. However, mutation rates have themselves been allowed to adapt in evolutionary strategies, which is not often 2.1. Background Theory , 39 the case with genetic algorithms. Evolutionary strategies have also been used for many applications [88]. Evolutionary programming arose distinctly from the first two strands of evolutionary computa- tion, out of an attempt to understand machine intelligence through the evolution of finite state machines [96]. Evolutionary programming [252] emphasises the evolution of the phenotype (instance of a solution) instead of the genotype (genetic material) of individuals, and the relation between the phenotype of parents and offspring, although crossover is not used. Thus, evolutionary programming has some differences in approach from the other major strands of evolutionary computation research. However, there have been many overlaps between the different fields and it too has been applied in many areas [252]. Genetic programming [156] can be considered as a variant of genetic algorithms where individual genotypes are represented by executable programmes. Specifically, solutions are represented as trees of expressions in an appropriate programming language, with the aim of evolving the most effective programme for solving a particular problem. Genetic programming, although the newest form of evolutionary computing, has still proved to be widely applicable [22]. Many important questions remain to be answered in understanding the performance of evolutionary algorithms. For example, current evolutionary algorithms for evolving programmes (genetic programming) suffer from some weaknesses. First, while being moderately successful at evolving simple programmes, it is very difficult to scale them to evolve high-level software components [191]. Second, the estimated fitness of a programme is normally given by a measure of how accurately it computes a given function, as represented by a set of input and output pairs, and therefore there is only a limited guarantee that the evolved programme actually does the intended computation [191]. These issues are particularly important when evolving high-level, complex, structured software. To evolve high-level software components in Digital Ecosystems, we propose taking advantage of the native method of software advancement, human developers, and the use of evolutionary computing for combinatorial optimisation [240] of the available software services. This involves treating developer-produced software services as the functional building blocks, as the base unit in a genetic-algorithms-based process. Such an approach would require a modular reusable 40 , Chapter 2. Creation of Digital Ecosystems paradigm to software development, such as Service-Oriented Architectures, which are discussed in the following subsection. 2.1.4.3 Service-Oriented Architectures Our approach to evolving high-level software applications requires a modular reusable paradigm to software development. Service-Oriented Architectures (SOAs) are the current state-of-the- art approach, being the current iteration of interface/component-based design from the 1990s, which was itself an iteration of event-oriented design from the 1980s, and before then modular programming from the 1970s [44, 158]. Service-oriented computing promotes assembling application components into a loosely coupled network of services, to create flexible, dynamic business processes and agile applications that span organisations and computing platforms [243]. This is achieved through a SOA, an architectural style that guides all aspects of creating and using business processes throughout their life-cycle, packaged as services. This includes defining and provisioning infrastructure that allows different applications to exchange data and participate in business processes, loosely coupled from the operating systems and programming languages underlying the applications [228]. Hence, a SOA represents a model in which functionality is decomposed into distinct units (services), which can be distributed over a network, and can be combined and reused to create business applications [243]. A SOA depends upon service-orientation as its fundamental design principle. In a SOA environment, independent services can be accessed without knowledge of their underlying platform implementation [228]. Services reflect a service-oriented approach to programming that is based on composing applications by discovering and invoking network-available services to accomplish some task. This approach is independent of specific programming languages or operating systems, because the services communicate with each other by passing data from one service to another, or by co-ordinating an activity between two or more services [243]. So, the concepts of SOAs are often seen as built upon, and the development of, the concepts of modular programming and distributed computing [158]. SOAs allow for an information system architecture that enables the creation of applications that are built by combining loosely coupled and interoperable services [228]. They typically 2.1. Background Theory , 41 implement functionality most people would recognise as a service, such as filling out an online application for an account, or viewing an online bank statement [158]. Services are intrinsically unassociated units of functionality, without calls to each other embedded in them. Instead of services embedding calls to each other in their source code, protocols are defined which describe how services can talk to each other, in a process known as orchestration, to meet new or existing business system requirements [287]. This is allowing an increasing number of third- party software companies to offer software services, such that SOA systems will come to consist of such third-party services combined with others created in-house, which has the potential to spread costs over many users and uses, and promote standardisation both in and across industries [51]. For example, the travel industry now has a well-defined, and documented, set of both services and data, sufficient to allow any competent software engineer to create travel agency software using entirely off-the-shelf software services [155, 46]. Other industries, such as the finance industry, are also making significant progress in this direction [341]. The vision of SOAs assembling application components from a loosely coupled network of services, that can create dynamic business processes and agile applications that span organisations and computing platforms, is visualised in Figure 2.8. It will be made possible by creating compound solutions that use internal organisational software assets, including enterprise information and legacy systems, and combining these solutions with external components residing in remote networks [242]. The great promise of SOAs is that the marginal cost of creating the n-th application is virtually zero, as all the software required already exists to satisfy the requirements of other applications. Only their combination and orchestration are required to produce a new application [305, 213]. The key is that the interactions between the chunks are not specified within the chunks themselves. Instead, the interaction of services (all of whom are hosted by unassociated peers) is specified by users in an ad-hoc way, with the intent driven by newly emergent business requirements [176]. The pinnacle of SOA interoperability, is the exposing of services on the internet as web services [228]. A web service is a specific type of service that is identified by a Uniform Resource Identifier (URI), whose service description and transport utilise open Internet standards. Interactions between web services typically occur as Simple Object Access Protocol (SOAP) calls carrying eXtensible Markup Language (XML) data content. The interface descriptions 42 , Chapter 2. Creation of Digital Ecosystems Figure 2.8: Service-Oriented Architectures: Abstract visualisations, with the first image showing the loosely joined services as cuboids, and the service orchestration as a polyhedron; and the second image showing their high interoperability and re-usability in forming applications, from the use of standardised interfaces and external service orchestration. of web services are expressed using the Web Services Definition Language (WSDL) [241]. The Universal Description Discovery and Integration (UDDI) standard defines a protocol for directory services that contain web service descriptions. UDDI enables web service clients to locate candidate services and discover their details. Service clients and service providers utilise these standards to perform the basic operations of SOAs [241]. Service aggregators can then use the Business Process Execution Language (BPEL) to create new web services by defining corresponding compositions of the interfaces and internal processes of existing services [241]. SOA services inter-operate based on a formal definition (or contract, e.g. WSDL) that is independent of the underlying platform and programming language. Service descriptions are used to advertise the service capabilities, interface, behaviour, and quality [241]. The publication of such information about available services provides the necessary means for 2.1. Background Theory , 43 discovery, selection, binding, and composition of services [241]. The (expected) behaviour of a service during its execution is described by its behavioural description (for example, as a workflow process). Also, included is a quality of service (QoS) description, which publishes important functional and non-functional service quality attributes, such as service metering and cost, performance metrics (response time, for instance), security attributes, integrity (transactional), reliability, scalability, and availability [241]. Service clients (end-user organisations that use some service) and service aggregators (organisations that consolidate multiple services into a new, single service offering) utilise service descriptions to achieve their objectives [241]. One of the most important and continuing developments in SOAs is Semantic Web Services (SWS), which make use of semantic descriptions for service discovery, so that a client can discover the services semantically [254, 42]. There are multiple standards available and still being developed for SOAs [320], most notably of recent being REpresentational State Transfer (REST) [287]. The software industry now widely implements a thin SOAP/WSDL/UDDI veneer atop existing applications or components that implement the web services paradigm [242], but the choice of technologies will change with time. Therefore, the fundamentals of SOAs and its services are best defined generically, because SOAs are technology agnostic and need not be tied to a specific technology [243]. Within the current and future scope of the fundamentals of SOAs, there is clearly potential to evolve complex high-level software applications from the modular services of SOAs, instead of the instruction level evolution currently prevalent in genetic programming [157]. 2.1.4.4 Distributed Evolutionary Computing Having previously introduced evolutionary computing, and the possibility of it occurring within a distributed environment, not unlike those found in mobile agent systems, leads us to consider a specialised form known as distributed evolutionary computing (DEC). The motivation for using parallel or distributed evolutionary algorithms is twofold: first, improving the speed of evolutionary processes by conducting concurrent evaluations of individuals in a population; second, improving the problem-solving process by overcoming difficulties that face traditional evolutionary algorithms, such as maintaining diversity to avoid premature convergence [219, 44 , Chapter 2. Creation of Digital Ecosystems 297]. The fact that evolutionary computing manipulates a population of independent solutions actually makes it well suited for parallel and distributed computation architectures [45]. There are several variants of distributed evolutionary computing, leading some to propose a taxonomy for their classification [235], with there being two main forms [45, 297]: • multiple-population/coarse-grained migration/island models • single-population/fine-grained diffusion/neighbourhood models In the coarse-grained island models [178, 45], evolution occurs in multiple parallel sub- populations (islands), each running a local evolutionary algorithm, evolving independently with occasional migrations of highly fit individuals among sub-populations. The core parameters for the evolutionary algorithm of the island-models are as follows [178]: • number of the sub-populations: 2, 3, 4, more • sub-population homogeneity – size, crossover rate, mutation rate, migration interval • topology of connectivity: ring, star, fully-connected, random • static or dynamic connectivity • migration mechanisms: – isolated/synchronous/asynchronous – how often migrations occur – which individuals migrate Fine-grained diffusion models [189, 297] assign one individual per processor. A local neighbourhood topology is assumed, and individuals are allowed to mate only within their neighbourhood, called a deme 2. The demes overlap by an amount that depends on their shape and size, and in this way create an implicit migration mechanism. Each processor runs an identical evolutionary algorithm which selects parents from the local neighbourhood, produces an offspring, and decides whether to replace the current individual with an offspring. However, even with the advent of multi-processor computers, and more recently multi-core processors, which provide the ability to execute multiple threads simultaneously [193], this approach would still prove impractical in supporting the number of agents necessary to create a Digital Ecosystem. Therefore, we shall further consider the island models. 2 In biology a deme is a term for a local population of organisms of one species that actively interbreed with one another and share a distinct gene pool [76]. 2.1. Background Theory , 45 Figure 2.9: Island-Model of Distributed Evolutionary Computing [178, 45]: There are different probabilities of going from island 1(cid:13) to island 2(cid:13), as there is of going from island 2(cid:13) to island 1(cid:13). This mirrors the naturally inspired quality that although two populations have the same physical separation, it may be easier to migrate in one direction than the other, i.e. fish migration is easier downstream than upstream. An example island-model [178, 45] is visualised in Figure 2.9, in which there are different probabilities of going from island 1(cid:13) to island 2(cid:13), as there is of going from island 2(cid:13) to island 1(cid:13). This allows maximum flexibility for the migration process, and mirrors the naturally inspired quality that although two populations have the same physical separation, it may be easier to migrate in one direction than the other, i.e. fish migration is easier downstream than upstream. The migration of the island models is like the notion of migration in nature, being similar to the metapopulation models of theoretical ecology [175]. This model has also been used successfully in the determination of investment strategies in the commercial sector, in a product known as the Galapagos toolkit [325, 56]. However, all the islands in this approach work on exactly the same problem, which makes it less analogous to biological ecosystems in which different locations can be environmentally different [29]. We will take advantage of this property later when defining the Ecosystem-Oriented Architecture of Digital Ecosystems. 2.1.5 Digital Business Ecosystems The questions we have raised are wide-ranging, and are motivating several interdisciplinary research teams, including those involved in an EU Framework VI project called Digital Business Ecosystems (DBEs). The DBE is a proposed methodology for economic and technological P31P13P21P12P51P15P41P14P23P32P24P42P25P52P43P34P53P35P45P54Island3Island4Island5Island1Island2 46 , Chapter 2. Creation of Digital Ecosystems Figure 2.10: Business Ecosystem [222]: Conceptual visualisation [93] showing a Business Ecosystem of interacting Small and Medium sized Enterprise users, via the services they provide and consume. Creating a network of business ecosystems distributed over different geographical regions, business domains, and industry sectors. innovation. Specifically, the DBE is a software infrastructure for supporting large numbers of interacting business users and services [222]. The DBE aims to be a next generation Information and Communications Technology that will extend the Service-Oriented Architecture concept with the automatic combining of available and applicable services in a scalable architecture, to meet business user requests for applications that facilitate business processes. In essence, the DBE will be an internet-based environment in which businesses will be able to interact with each other in very effective and efficient ways [223]. The synthesis of the concept of Digital Business Ecosystems emerged by adding [221] digital in front of business ecosystem [214]. The term Digital Business Ecosystem was used earlier, but with a focus exclusively on developing countries [215]. The generalisation of the term to refer to a new interpretation of what socio-economic development catalysed by ICT means was new, emphasising the co-evolution between the business ecosystem and its partial digital representation: the digital ecosystem. The term Digital Business Ecosystem came to represent the combination of the two ecosystems [222]. 2.1. Background Theory , 47 The business ecosystem is an economic community supported by a foundation of interacting organisations and individuals; i.e. the organisms of the business world. This economic community produces goods and services of value to customers, who are themselves members of the ecosystem [214]. A wealthy ecosystem sees a balance between co-operation and competition in a dynamic free market. Regarding a particular business ecosystem, two main different interpretations of its structure have been discussed in the literature. The keystone model has a structure in which a business ecosystem is dominated by a large firm that is surrounded by many small suppliers [138]. This model works well when the central firm is healthy, but represents a significant weakness for the economy of the region when the dominant economic actor experiences difficulties [214]. This model also matches the economic structure of the USA where there is a predominant number of large enterprises at the centre of large value networks of suppliers [138]. However, the model for a business ecosystem developed in Europe is less structured and more dynamic; it is composed mainly of Small and Medium sized Enterprises (SMEs), but can accommodate large firms [275]. All actors complement one another, leading to a more dynamic division of labour, organised along one-dimensional value chains and two-dimensional value networks [60]. This model is particularly well-adapted for the service and knowledge industries, where it is easier for small firms to reinvent themselves than, for instance, in the automotive industry which is dominated by large enterprises [222]. In the DBE, the digital ecosystem is the technical infrastructure, based on a peer-to-peer (P2P) distributed software technology that transports, finds, and connects services and information over Internet links enabling networked transactions, and the distribution of all the digital objects present within the infrastructure [222]. Such organisms of the digital world encompass any useful digital representations expressed by languages (formal or natural) that can be interpreted and processed (by computer software and/or humans), e.g. software applications, services, knowledge, taxonomies, folksonomies, ontologies, descriptions of skills, reputation and trust relationships, training modules, contractual frameworks, laws [222]. So, the Digital Business Ecosystem is a biological metaphor that highlights the interdependence of all actors in the business environment, who co-evolve their capabilities and roles [214], and which has attempted to develop an isomorphic model between biological behaviour and the behaviour of the digital ecosystem, leading to an evolutionary, self-organising, and self-optimising environment built upon an underlying Service-Oriented Architecture [223]. The DBE aims to help local economic actors become active players in globalisation [82], valorising their local culture and vocations, enabling them to interact and create value networks 48 , Chapter 2. Creation of Digital Ecosystems at the global level. Increasingly this approach, dubbed glocalisation, is being considered a successful strategy of globalisation that preserves regional growth and identity [267, 303, 148], and has been embraced by the mayors and decision-makers of thousands of municipalities [109], because of the possible tension between globalisation and localisation when adopting ICTs [47]. The DBE represents a business-to-business (B2B) interaction concept supported by a software platform (digital ecosystem) that is intended to have the desirable properties of biologi- cal ecosystems [83], and its researchers also recognise the importance of Service-Oriented Architectures in creating Digital Ecosystems [260, 223]. So, we will consider using the concept of a business ecosystem as a potential user base for Digital Ecosystems. 2.2 Ecosystem-Oriented Architectures We will now define the architectural principles of Digital Ecosystems. We will use our understanding of theoretical biology from section 2.1.3, mimicking the processes and structures of life, evolution, and ecology of biological ecosystems. We will achieve this by combining elements from mobile agents systems, distributed evolutionary computing, and Service-Oriented Architectures from section 2.1.4, to create a hybrid architecture which is the digital counterpart of biological ecosystems. We will refer to the agents of Digital Ecosystems as Agents, populations as Populations, and the habitats as Habitats, to distinguish their new hybrid definitions from their original biological and computing definitions. 2.2.1 Agents The Agents of the Digital Ecosystem are functionally analogous to the organisms of biological ecosystems, including the behaviour of migration and the ability to be evolved [29], and will be achieved through using a hybrid of different technologies. The ability to migrate is provided by using the paradigm of agent mobility from mobile agent systems [249], with the Habitats of the Digital Ecosystem provided by the facilities of agent stations from mobile agent systems [200], i.e. a distributed network of locations to migrate to and from. The Habitats, and the Habitat network will be discussed later. The ability of the Agents to be evolved is in two parts: first, by using the interoperability of services from Service-Oriented Architectures [228] 2.2. Ecosystem-Oriented Architectures , 49 Figure 2.11: Agent of the Digital Ecosystem: A lightweight entity consisting primarily of a pointer to the semantic web service it represents, which is Service-Oriented Architectures compliant and therefore includes an executable component and semantic description. A software service can be a software service only, e.g. for data encryption, or a software service providing a front-end to a real-world service, e.g. selling books. to aggregate Agents; and second, the use of evolutionary computing [90] for combinatorial optimisation [240] at the Habitats to evolve optimal aggregations of Agents. The Agents will take advantage of the interoperability of Service-Oriented Architectures [228], by acting in a relationship of agency [334] to the user supplied semantic web services, which will be Service- Oriented Architecture compliant [241]. We can then evolve high-level software applications by using evolutionary computing [90] for combinatorial optimisation [240] of the available Agents, or rather the services they represent, in a genetic-algorithms-based [110] process. This makes an Agent, of the Digital Ecosystem, a lightweight entity consisting primarily of a pointer to the semantic web service it represents, including the service’s executable component and semantic description. A software service can be a software service only, e.g. for data encryption, or a software service providing a front-end to a real-world service, e.g. selling books, as shown in Figure 2.11. An organism within Digital Ecosystems is an Agent, or an Agent aggregation created using evolutionary optimisation in response to a user request for an application. These Agents will migrate through the Habitat network of the Digital Ecosystem and adapt to find niches where they are useful in fulfilling other user requests for applications. The Agents interact, evolve, and adapt over time to the environment, thereby serving the ever-changing requirements imposed by the user base. User BaseSOADigital EcosystemAgentSemantic Web ServiceReal World ServiceAgentpointerpointer 50 , Chapter 2. Creation of Digital Ecosystems The executable component, of a semantic web service that an Agent represents, is equivalent to the DNA of an organism, whose sequence encodes the genetic information of living organisms and has two primary functions [168]: the holder of virtually all information in inheritance, and the controller of protein synthesis for the construction and operation of its organism. Equivalently, the executable component is also the inheritable component from one generation to the next, and defines the objects and behaviour of its service’s run-time instantiation. The genotype of an individual describes the genetic constitution (DNA) of an individual, independent of its physical existence (the phenotype) [168]. Equivalently, the semantic description, of a semantic web service that an Agent represents, describes the functionality of the executable component. The phenotype of an individual arises from the combination of an organism’s DNA and the environment [168]. Equivalently, the run-time instantiation, of a service that an Agent represents, results from instantiating the executable component in the run-time environment. This differentiation between genotype and phenotype is fundamental for escaping local optima, and is often lacking in artificial evolutionary systems [281], having instead a one-to-one genotype-phenotype mapping, in which the phenotype is directly encoded in the genotype with no differentiation provided by instantiation (development) [281]. Neutral genotype-phenotype mappings have this differentiation between the genotype and phenotype [285], which more strongly parallels biological evolution [21]. We therefore expect the use of a neutral genotype-phenotype mapping to help Digital Ecosystems demonstrate behaviour more akin to biological ecosystems. 2.2.1.1 Agent Aggregation The executable component of a semantic web service that an Agent represents is equivalent to an organism’s DNA and is the gene (functional unit) in the evolutionary process [168]. So, the Agents should be aggregated as a sequence, like the sequencing of genes in DNA [168]. It could be argued that the Agents should be aggregated as an unordered set, or, based on service orchestration, into a tree or workflow , as shown in Figure 2.12. However, the aggregated structure of the Agents should not be the orchestration structure of the collection of software services that the Agents represent, not only because the service orchestration of the run-time instantiation is application domain-specific (e.g. trees in supply chain management [163], workflows in the travel industry [31]), but because it would also move it undesirably towards a one-to-one genotype-phenotype mapping [281]. 2.2. Ecosystem-Oriented Architectures , 51 Figure 2.12: Structure of Aggregated Agents: The executable component of a semantic web service that an Agent represents is equivalent to an organism’s DNA and is the gene (functional unit) in the evolutionary process [168]. So, the Agents should be aggregated as a sequence, like the sequencing of genes in DNA [168]. Instead of an unordered set, or, based on service orchestration, into a tree or workflow. 2.2.2 Habitats The Habitats are the nodes of the Digital Ecosystem, and are functionally analogous to the habitats of a biological ecosystem [168]. Their functionality is provided by using the agent stations from mobile agent systems [200] (to provide a distributed environment in which Agent migration can occur), with evolutionary computing [90] for the Agent interaction (instead of traditional agent interaction mechanisms [334]), and the island-model of distributed evolutionary computing [178] for the connectivity between Habitats. There will be a Habitat for each user, which the users will typically run locally, and through which they will submit requests for applications. Supporting this functionality, Habitats have the following core functions: • Provide a subset of the Agents and Agent-sequences available globally, relevant to the user that the Habitat represents, and stored in what we will call an Agent-pool (for reasons that will be explained later). • Accelerate, via the Agent-pool, the Populations instantiated to evolve optimal Agent- sequences in response to user requests for applications. • Manage the inter-Habitat connections for Agent migration. • For service providers; manage the distribution of Agents (which represent their services) to other users of the Digital Ecosystem, via the network of interconnected Habitats. setsequencetreeworkflow 52 , Chapter 2. Creation of Digital Ecosystems Figure 2.13: Habitat Network: Uses the agent stations from mobile agent systems [200] (to provide a distributed environment in which Agent migration can occur), with evolutionary computing [90] for the Agent interaction (instead of traditional agent interaction mechanisms [334]), and the island-model of distributed evolutionary computing [178] for the connectivity between Habitats. The collection of Agents at each Habitat (peer) will change over time, as the more successful Agents spread throughout the Digital Ecosystem, and as the less successful Agents are deleted. Successive user requests over time to their dedicated Habitats makes this process possible, because the continuous and varying user requests for applications provide a dynamic evolutionary pressure on the Agents, which have to evolve to better satisfy those requests. So, the Agents will recombine and evolve over time, constantly seeking to increase their effectiveness for the user base. The Agent is the base unit of the evolutionary process in Digital Ecosystems, in the same way that the gene is the base unit for evolution in biological ecosystems [29]. So, the collection of Agents at each Habitat provides an Agent-pool, similar to a gene-pool, which is all the genes in a population [168]. Additionally, it also stores Agent-sequences evolved from the Habitat’s Populations, and Agent-sequences that migrate to the Habitat from other users’ Habitats, because they can potentially accelerate future Populations instantiated to respond to user requests. The landscape, in energy-centric biological ecosystems, defines the connectivity between habitats [29]. Connectivity of nodes in the digital world is generally not defined by geography or spatial proximity, but by information or semantic proximity. For example, connectivity in a peer-to-peer network is based primarily on bandwidth and information content, and not geography. The island-models of distributed evolutionary computing use an information- Genetic AlgorithmAgent StationHHHHHHHHHHHHHHHHHH 2.2. Ecosystem-Oriented Architectures , 53 centric model for the connectivity of nodes (islands) [178]. However, because it is generally defined for one-time use (to evolve a solution to one problem and then stop) it usually has a fixed connectivity between the nodes, and therefore a fixed topology [45]. So, supporting evolution in the Digital Ecosystem, with a dynamic multi-objective selection pressure (fitness landscape [335] with many peaks), requires a re-configurable network topology, such that Habitat connectivity can be dynamically adapted based on the observed migration paths of the Agents between the users within the Habitat network. So, based on the island-models of distributed evolutionary computing [178], each connection between the Habitats is bi-directional and there is a probability associated with moving in either direction across the connection, with the connection probabilities affecting the rate of migration of the Agents. However, additionally, the connection probabilities will be updated by the success or failure of Agent migration using the concept of Hebbian learning [132]: the Habitats which do not successfully exchange Agents will become less strongly connected, and the Habitats which do successfully exchange Agents will achieve stronger connections. This leads to a topology that adapts over time, resulting in a network that supports and resembles the connectivity of the user base. When we later consider an example user base, we will further discuss a resulting topology. When a new user joins the Digital Ecosystem, a Habitat needs to be created for them, and most importantly connected to the correct cluster(s) in the Habitat network. A new user’s Habitat can be connected randomly to the Habitat network, as it will dynamically reconnect based upon the user’s behaviour. User profiling can also be used to help connect a new user’s Habitat to the optimal part of the network, by finding a similar user or asking the user to identify a similar user, and then cloning their Habitat’s connections. Also, when a new Habitat is created, its Agent-pool should be created by merging the Agent-pools of the Habitats to which it is initially connected. 2.2.2.1 Agent Migration The Agents migrate through the interconnected Habitats combining with one another in Populations to meet user requests for applications. The migration path from the current Habitat is dependent on the migration probabilities between the Habitats. The migration of an Agent within the Digital Ecosystem is initially triggered by deployment to its user’s Habitat, for distribution to other users who will potentially make use of the service the Agent represents. When a user deploys a service, its representative Agent must be generated and deployed to 54 , Chapter 2. Creation of Digital Ecosystems their Habitat. It is then copied to the Agent-pool of the user’s Habitat, and from there the migration of the Agent occurs, which involves migrating (copying) the agent probabilistically to all the connected Habitats. The Agent is copied rather than moved, because the Agent may also be of use to the providing user. The copying of an Agent to a connected Habitat depends on the associated migration probability. If the probability were one, then it would definitely be sent. When migration occurs, depending on the probabilities associated with the Habitat connections, an exact copy of the Agent is made at a connected Habitat. The copy of the Agent is identical until the new Agent’s migration history is updated, which differentiates it from the original. The successful use of the migrated Agent, in response to user requests for applications, will lead to further migration (distribution) and therefore availability of the Agent to other users. The connections joining the Habitats are reinforced by successful Agent and Agent-sequence migration. The success of the migration, the migration feedback, leads to the reinforcing and creation of migration links between the Habitats, just as the failure of migration leads to the weakening and negating of migration links between the Habitats. The success of migration is determined by the usage of Agents at the Habitats to which they migrate. When an Agent- sequence is found and used in responding to a user request, then the individual Agent migration histories can be used to determine where they have come from and update the appropriate connection probabilities. If the Agent-sequence was fully or partly evolved elsewhere, then where the sequence or sub-sequences were created needs to be passed on to the connection probabilities, because the value in an Agent-sequence is the unique ordering and combination it provides of the individual Agents contained within. So, it is necessary to manage the feedback to the connection probabilities for migrating Agent-sequences, and not just the individual Agents contained within the sequence, including the partial use of an Agent-sequence in a newly evolved one. Specifically, the mechanism for migration feedback needs to know the Habitats where migrating Agent-sequences were created, to create new connections or reinforce existing connections to these Habitats. The global effect of the Agent migration and migration feedback on the Habitat network is the clustering of Habitats around the communities present within the user base, and will be discussed later in more detail. The escape range is the number of escape migrations available to an Agent upon the risk of death (deletion). If an Agent migrates to a Habitat and is not used after several user requests, then it will have the opportunity to migrate (move not copy) randomly to another connected Habitat. After this happens several times the Agent will be deleted (die). The escape range 2.2. Ecosystem-Oriented Architectures , 55 will be dynamically responsive to the size of the Habitat cluster that the Agent exists within. This creates a dynamic time-to-live [58] for the Agents, in which Agents that are used more will live longer and distribute farther than those that are used less. 2.2.3 Populations Figure 2.14: User Request to the Digital Ecosystem (modified from [162]): A user will formulate queries to the Digital Ecosystem by creating a request as a semantic description, like those being used and developed in Service-Oriented Architectures [254], specifying an application they desire and submitting it to their Habitat. A Population is then instantiated in the user’s Habitat in response to the user’s request, seeded from the Agents available at their Habitat (Agent-pool). The Populations of the Digital Ecosystem are functionally equivalent to the evolving, self- organising populations of a biological ecosystem, and are achieved through using evolutionary computing. A population in biological ecosystems is all the members of a species that occupy a particular area at a given time [168]. Our Population is also all the members of a species that occupy a particular area at a given time, like an island from the island-models of distributed evolutionary computing [178]. The use of distributed evolutionary computing to accelerate the Populations will be explained later. The users will formulate queries to the Digital Ecosystem by creating a request as a semantic description, like those being used and developed in Service-Oriented Architectures [254], specifying an application they desire and submitting it to their Habitat. This description enables the definition of a metric for evaluating the fitness of a composition of Agents, as a distance function between the semantic description of the request and the Agents’ semantic descriptions. A Population is then instantiated in the user’s Habitat in response to the user’s request, seeded from the Agents available at their Habitat (i.e. its Agent-pool). This allows the evolutionary optimisation to be accelerated in the following three ways: first, the Habitat HabitatAgent-poolAgentrequest ?solution userPopulation(Genetic Algorithm)Population(GA) 56 , Chapter 2. Creation of Digital Ecosystems network provides a subset of the Agents available globally, which is localised to the specific user it represents; second, making use of Agent-sequences previously evolved in response to the user’s earlier requests; and third, taking advantage of relevant Agent-sequences evolved elsewhere in response to similar requests by other users. The Population then proceeds to evolve the optimal Agent-sequence(s) that fulfils the user request, and as the Agents are the base unit for evolution, it searches the available Agent-sequence combination space. For an evolved Agent-sequence that is executed (instantiated) by the user, it then migrates to other peers (Habitats) becoming hosted where it is useful, to combine with other Agents in other Populations to assist in responding to other user requests for applications. 2.2.3.1 Evolution Evolution in biological ecosystems leads to both great diversity and high specialisation of its organisms [29]. In Digital Ecosystems the diversity of evolution will provide for the wide range of user needs and allow for quick responses to the changing of these user needs, while the specialisation will simultaneously provide solutions which are tailored to fulfil specific user requests. We will consider the issue of diversity in a later subsection, because it is achieved through evolution in a distributed environment, which will be discussed later. In biological ecosystems, evolutionary specialisation is localised to a population within its micro- habitat, which allows for the creation of niches (high specialisation) [168]. So, a Population is instantiated in the user’s own Habitat, where the collection of Agents is chosen for the user, and the micro-Habitat is provided by the user request. There is nothing to preclude more than one Population being instantiated in a user’s Habitat at any one time, provided there are computational resources sufficiently available. A selection pressure is the sum aggregate of the forces acting upon a population, resulting in genetic change through natural selection [168]. Those organisms best fit to survive the selection pressures operating upon them will pass on their biological fitness to their progeny through the inheritance process [168]. The fitness of an individual Agent-sequence within a Population is determined by a selection pressure, applied as a fitness function [90] instantiated from the user request, and works primarily on comparing the semantic descriptions of the Agents with the semantic description of the user request. The pressure selects for those Agent-sequences that are fit and capable of surviving the environment to reproduce, and against those that do not have sufficient fitness and therefore die before passing on their genes, thereby providing 2.2. Ecosystem-Oriented Architectures , 57 the direction for genetic change. In biology fitness is a measure of an organism’s success in its environment [168], and its definition here will be further explained in the next subsection. Genes are the functional unit in biological evolution [168]; whereas here the functional unit is the Agent. Therefore, the evolutionary process of a Population provides a combinatorial optimisation [240] of the Agents available, when responding to a user request. So, it does not change or mutate the Agents themselves. In biology a mutation is a permanent transmissible change (over the generations) in the genetic material (DNA) of an individual, and recombination (e.g. crossover) is the formation within the offspring of alleles (gene combinations), which are not present in the parents [168]. As in genetic algorithms [110], mutations will occur by switching Agents in and out of the Agent-sequence structure, and recombination (crossover) will occur by performing a crossing of two Agent-sequences. As the Digital Ecosystem receives more and more sophisticated requests, so more and more complex applications are evolved and become available for use by the users. To achieve this evolution, specifically the Agent-sequence recombination and optimisation, is a very significant challenge, because of the range of services that must be catered for and the potentially huge number of factors that must be considered for creating an applicable fitness function. First, to construct ever more complex software solutions, requires modularity, which is provided by the paradigm of service interoperability from Service-Oriented Architectures [228]. Second, two of the most important issues are that of defining fitness and managing bloat, which we will discuss next. Finally, there is a huge body of work and continuing research regarding theoretical approaches to evolutionary computing [90], including the extensive use of genetic algorithms for practical real-world problem solving [85]. In defining Digital Ecosystems we should make use of the current state-of-the-art, and future developments, in the areas of evolutionary computing [144] and service interoperability [228]. 2.2.3.2 Fitness In biology fitness is a measure of how successful an organism is in its environment, i.e. its phenotype [168]. The fitness of an Agent-sequence within a Population would also, ideally, be based upon its phenotype, the run-time instantiation, and nothing else. However, such an approach would be impractical, because it is currently infeasible to execute all the Agent- sequences of a Population at every generation, and not least because of the computational 58 , Chapter 2. Creation of Digital Ecosystems resources that would be required. The other concern is one of practicality, by which we mean that it may not even be possible to perform a live execution for the executable components of an Agent-sequence; for example, if they are for buying an item from an online retailer. These are well known issues in evolutionary computing, which is why fitness functions are often defined as simulated input/output pairs to test functionality [191]. In Digital Ecosystems we can use historical usage information, but this would be insufficient initially, because such information would not be available at the time of an Agent’s deployment. However, because each Agent also carries a semantic description, a specification of what it does, the fitness function can measure a complete Agent-sequence’s collective semantic descriptions relative to the semantic description of a user request. So, initially the fitness function should be based primarily on comparing the semantic descriptions of the Agent-sequences to the semantic description of the user request, ever increasingly augmented with the growing usage information available for the Agents. In biological terms the genotype will be used as the phenotype, combined with any available past fitness of the phenotype; with the Agent’s semantic description (genotype) therefore acting as a guarantee of its expected behaviour. So, for any newly deployed Agent a one-to-one genotype- phenotype mapping [281] will initially exist, until sufficient usage information is available. While the use of such a mapping is undesirable, it is temporary, and necessary to allow Digital Ecosystems to operate effectively. We have already suggested that the primary driver of the evolutionary process should initially be the extent by which an Agent-sequence can verifiably satisfy the specified requirements. This could be measured probabilistically, or using theorem-proving to validate the system, though automatic theorem proving is notoriously slow [289, 277]. However, there will also be other pressures on the fitness. For example, one may seek the most parsimonious solution to a problem (one that provides exactly the specified features and no more), or the cheapest solution, or one with a good reputation. Some aspects of fitness will be implicit in the evolutionary process (e.g. Agents which are often used will gain more fitness) while others will require explicit measures (e.g. price, or user satisfaction). One way to handle this multiplicity of fitness values (some qualitative) is to explicitly recognise the multi-objective nature of the optimisation problem. In this way, we are seeking not the single best solution, but a range of possible compromises that can be made most optimally. The set of solutions for which there are no better compromises is called the Pareto-set, and evolutionary techniques have been adapted to solve such problems with considerable success [318]. The main point is that selection has to be driven not by an absolute value of fitness, but rather by a notion of what it means for one solution to be better 2.2. Ecosystem-Oriented Architectures , 59 than another. We say one solution dominates another if it is better in at least one respect, and no worse in any of the others [98]. 2.2.3.3 Bloat If the repetition of Agents is allowed within evolving Agent-sequences, then the search space can become countably infinite, because the nature of the problem to be solved may not allow us to determine what the length of a solution is beforehand. Therefore, a variable length approach must be adopted, which is common in genetic programming [156]. When variable length representations of solutions are used, a well-known phenomenon arises, called bloat, in which the individuals of an evolving population tend to grow in size without gaining any additional advantage [166]. The bloat phenomenon can cause early termination of an evolutionary process due to the exhaustion of the available memory, and can also significantly reduce performance, because typically longer sequences have higher fitness computation costs [259]. Bloat is not specific to genetic programming, and is inherent in search techniques with discrete variable length representations [164]. It is a fundamental area of research within search-based approaches such as genetic algorithms, genetic programming and other approaches not based on populations such as simulated annealing [164]. However, considerable work on bloat has been done in connection with genetic programming [165, 22], and we believe that the genetic algorithms community generally, and the genetic-algorithms-based approach of our Digital Ecosystems specifically, can benefit directly from this research. While bloat is a phenomenon which was first observed in practice [156], theoretical analyses have been attempted [23]. One should take care with these approaches as implementations will always deal with finite populations, while theoretical approaches often deal with infinite populations [156], and this difference can be important. Yet, both theoretical and empirical approaches are required to understand bloat. There are many factors contributing to bloat, and while the phenomenon may appear simple, the reasons are not. There are several theories to explain why this occurs, and, as we shall discuss, some measures that can be taken for its prevention. There are several different qualitative theories which attempt to explain bloat, and they can be considered in two groups. First, protection against crossover and bias removal (which can be considered jointly) and second, the nature of programme search spaces [23]. First, near the end of a run a Population consists of mostly fit individuals, and any crossover is likely to be detrimental to the fitness of the offspring. In any sequence of Agents there may be 60 , Chapter 2. Creation of Digital Ecosystems Agents that do not contribute semantically to the complete functionality of the sequence if, for example, their functionality was not requested by the user or if it is duplicated in the sequence; analogously to genetic programming [23], we can call these redundant Agents bloat. The genotype can then be grown further without affecting the phenotype if Agents with similar functionality are added; but, as the genotype grows larger, crossover is more likely to transfer redundant Agents to the new off-springs (assuming uniform crossover). Second, above a certain threshold size, the distribution of functionality does not vary with the size of the search space [23]. Thus, if we randomly sample long and short Agent-sequences above a length threshold, they will likely have the same functionality and fitness. So, as a search process progresses we are more likely to sample longer Agent-sequences, as mutation results in more of them (all other things being equal) and this will give rise to the bloating phenomenon. Each of the stages of construction of a genetic algorithm (i.e. choice of fitness function, selection method and genetic operator) can affect bloat. It has been shown that even small differences in the fitness function can cause a difference: a single programme glitch in an otherwise flat fitness landscape (from the neutral theory of molecular evolution [149]) is sufficient to drive the average programme size of an infinite population [204]. If a fitness-proportional selection method is used, individuals with zero fitness will be discontinued as they have zero probability of being selected as parents [36]. However, if tournament selection method is used, then there is a finite chance that individuals with zero fitness will be selected to be parents [36]. Finally, the choice of genetic operator affects the size of the programmes which are sampled; standard crossover on a flat landscape heavily oversamples the shorter programmes [251]. There are other factors that may affect bloat, for example, how the population is initialised, or the choice of representation used, such as a neutral genotype-phenotype mapping, which can actually alleviate bloat [208]. Bloat is a fact, whatever the reasons, happening in this type of optimisation and needs to be controlled if the space is to be searched effectively. One solution is to apply a hard limit to the size of the sets that can be sampled [166]: this enables the search algorithm to keep running without having out-of-memory run-time errors, but poses questions on how to set this hard limit. An alternative but similar method is to apply a parsimony pressure, where a term is added to the fitness function which chastises big sets in preference for smaller sets [296]. In this approach, individuals larger than the average size are evaluated with a reduced probability, biasing the search to smaller sets, while providing a dynamic limit which adapts to the average size of individuals in a changing population [296]. 2.2. Ecosystem-Oriented Architectures , 61 2.2.4 The Digital Ecosystem The Digital Ecosystem supports the automatic combining of numerous Agents (which represent services), by their interaction in evolving Populations to meet user requests for applications, in a scalable architecture of distributed interconnected Habitats. The sharing of Agents between Habitats ensures the system is scalable, while maintaining a high evolutionary specialisation for each user. The network of interconnected Habitats is equivalent to the abiotic environment of biological ecosystems [29]; combined with the Agents, the Populations, the Agent migration for distributed evolutionary computing, and the environmental selection pressures provided by the user base, then the union of the Habitats creates the Digital Ecosystem, which is summarised in Figure 2.15. The continuous and varying user requests for applications provide a dynamic evolutionary pressure on the Agent sequences, which have to evolve to better fulfil those user requests, and without which there would be no driving force to the evolutionary self-organisation of the Digital Ecosystem. In the Digital Ecosystem, local and global optimisations concurrently operate to determine solutions to satisfy different optimisation problems. The global optimisation here is not a decentralised super-peer based control mechanism [263], but the completely distributed peer- to-peer network of the interconnected Habitats, which are therefore not susceptible to the failure of super-peers. It provides a novel optimisation technique inspired by biological ecosystems, working at two levels: a first optimisation, migration of Agents which are distributed in a peer-to-peer network, operating continuously in time; this process feeds a second optimisation, based on evolutionary combinatorial optimisation, operating locally on single peers and is aimed at finding solutions that satisfy locally relevant constraints. So, the local search is improved through this twofold process to yield better local optima faster, as the distributed optimisation provides prior sampling of the search space through computations already performed in other peers with similar constraints. This novel form of distributed evolutionary computing will be discussed further below, once we have discussed a topology resulting from an example user base. If we consider an example user base for the Digital Ecosystem, the use of Service-Oriented Architectures in its definition means that business-to-business (B2B) interaction scenarios [158] lend themselves to being a potential user base for Digital Ecosystems. So, we can consider the business ecosystem of Small and Medium sized Enterprise (SME) networks from Digital Business Ecosystems [222], as a specific class of examples for B2B interaction scenarios; and in 62 , Chapter 2. Creation of Digital Ecosystems Figure 2.15: Digital Ecosystem: A network of interconnected Habitats, combined with the Agents, the Populations, the Agent migration for distributed evolutionary computing, and the environmental selection pressures provided by the user base, then the union of the Habitats creates the Digital Ecosystem. Agents travel along the peer-to-peer connections; in every node (Habitat) local optimisation is performed through an evolutionary algorithm, where the search space is determined by the Agents present at the node. which the SME users are requesting and providing software services, represented as Agents in the Digital Ecosystem, to fulfil the needs of their business processes. Service-Oriented Architectures promise to provide potentially huge numbers of services that programmers can combine, via the standardised interfaces, to create increasingly more sophisticated and distributed applications [241]. The Digital Ecosystem extends this concept with the automatic combining of available and applicable services, represented by Agents, in a scalable architecture, to meet user requests for applications. These Agents will recombine and evolve over time, constantly seeking to improve their effectiveness for the user base. From the SME users’ point of view the Digital Ecosystem provides a network infrastructure where connected enterprises can advertise and search for services (real-world or software only), putting a particular emphasis migrating AgentHabitat networkHabitatAgent-poolAgentPopulation(Genetic Algorithm)application(Agent-sequence)Population(GA) 2.2. Ecosystem-Oriented Architectures , 63 on the composability of loosely coupled services and their optimisation to local and regional, needs and conditions. To support these SME users the Digital Ecosystem is satisfying the companies’ business requirements by finding the most suitable services or combination of services (applications) available in the network. A composition of services is an Agent-sequence in the Habitat network that can move from one peer (company) to another, being hosted only in those where it is most useful in satisfying the SME users’ business needs. 2.2.4.1 Topology The Digital Ecosystem allows for the connectivity in the Habitats to adapt to the connectivity within the user base, with a cluster of Habitats representing a community within the user base. If a user is a member of more than one community, the user’s Habitat will be in more than one cluster. This leads to a network topology that will be discovered with time, and which reflects the connectivity within the user base. Similarities in requests by different users will reinforce behavioural patterns, and lead to clustering of the Habitats within the ecosystem, which can occur over geography, language, etc. This will form communities for more effective information sharing, the creation of niches, and will improve the responsiveness of the system. The connections between the Habitats will be self-managed, through the mechanism of Agent migration defined earlier. Essentially, successful Agent migration will reinforce Habitat connections, thereby increasing the probability of future Agent migration along these connections. If a successful multi-hop migration occurs, then a new link between the start and end Habitats can be formed. Unsuccessful migrations will lead to connections (migration probabilities) decreasing, until finally the connection is closed. If we consider the business ecosystem - a network of Small and Medium sized Enterprises from Digital Business Ecosystems [222] - as an example user base, such business networks are typically small-world networks [333, 338]. They have many strongly connected clusters (communities), called sub-networks (quasi-complete graphs), with a few connections between these clusters (communities) [327]. Graphs with this topology have a very high clustering coefficient and small characteristic path lengths [327]. As the connections between Habitats are reconfigured depending on the connectivity of the user base, the Habitat clustering will therefore be parallel to the business sector communities, as shown in Figure 2.16. The communities will cluster over language, nationality, geography, etc. – all depending on the user base. So, the Digital Ecosystem will take on a topology similar to that of the user base. 64 , Chapter 2. Creation of Digital Ecosystems Figure 2.16: Digital Business Ecosystem: Business ecosystem, network of Small and Medium sized Enterprises [222], using the Digital Ecosystem. As the connections between Habitats are reconfigured depending on the connectivity of the user base, the Habitat clustering will therefore be parallel to the business sector communities. Fragmentation of the Habitat network can occur, but only if dictated by the structure of the user base. The issue of greater concern is when individual Habitats become totally disconnected, which can only occur under certain conditions. One condition is that the Agents within the Agent-pool consistently fail to satisfy user requests. Another condition is when the Agents and Agent-sequences they share are undesirable to the users that are within the migration range of these Agents and Agent-sequences. These scenarios can arise because the Habitat is located within the wrong cluster, in which case the user can be asked to join another cluster within the Habitat network, assuming the user base is of sufficient size to provide a viable alternative. Figure 2.17: Habitat Clustering: Topology adapted to the small-world network of a business ecosystem of SMEs from Digital Business Ecosystems [222], having many strongly connected clusters (communities), called sub-networks (quasi-complete graphs), with a few connections between these clusters (communities) [327]. Graphs with this topology have a very high clustering coefficient and small characteristic path lengths [327]. BusinessEcosystemDigitalEcosystemHabitatSMEHHHHHHHHHHHHHHCommunity(cluster) 2.2. Ecosystem-Oriented Architectures , 65 2.2.4.2 Distributed Evolution The Digital Ecosystem is a hybrid of Multi-Agent Systems, more specifically of mobile agent systems, Service-Oriented Architectures, and distributed evolutionary computing, which leads to a novel form of evolutionary computation. The novelty comes from the creation of multiple evolving Populations in response to similar requests, whereas in the island-models of distributed evolutionary computing there are multiple evolving populations in response to only one request [178]. So, in our Digital Ecosystem different requests are evaluated on separate islands (Populations), with their evolution accelerated by the sharing of solutions between the evolving Populations (islands), because they are working to solve similar requests (problems). This is shown in Figure 2.18, where the dashed yellow lines connecting the evolving Populations indicate similarity in the requests being managed. Figure 2.18: Distributed Evolution in the Digital Ecosystem: Different requests are evaluated on separate islands (Populations), with their evolution accelerated by the sharing of solutions between the evolving Populations (islands), because they are working to solve similar requests (problems). The yellow lines connecting the evolving Populations indicate similarity in the requests being managed. If we again consider the business ecosystem of Small and Medium sized Enterprises from Digital Business Ecosystems [222] as an example user base, then in Figure 2.18 the four Habitats, in the left cluster, could be travel agencies, and the three with linked evolving Populations are looking for similar package holidays. So, an optimal solution found and used in one Habitat will be migrated to the other connected Habitats and integrated into any evolving Populations via the local Agent-pools. This will help to optimise the search for similar package holidays at the Habitats of the other travel agencies. This also works in a time-shifted manner, because an optimal solution is stored in the Agent-pool of the Habitats to which it is migrated, being available to optimise a similar request placed later. ClusterHabitatPopulation(GA) 66 , Chapter 2. Creation of Digital Ecosystems The distributed architecture of Digital Ecosystems favours the use of Pareto-sets for fitness determination, because Pareto optimisation for multi-objective problems is usually most effective with spatial distribution of the populations, as partial solutions (solutions to different niches) evolve in different parts of a distributed population [75] (i.e. different Populations in different Habitats). By contrast, in a single population, individuals are always interacting with each other, via crossover, which does not allow for this type of specialisation [13]. This approach requires the Digital Ecosystem to have a sufficiently large user base, so that there can be communities within the user base, and therefore allow for similarity in the user requests. Assuming a user base of hundreds of users, then there would be hundreds of Habitats, in which there will be potentially three or more times the number of Populations at any one time. Then there will be thousands of Agents and Agent-sequences (applications) available to meet the requests for applications from the users. In such a scenario, there would be a sufficient number of users for the Digital Ecosystem to find similarity within their requests, and therefore apply our novel form of distributed evolutionary computing. 2.2.4.3 Agent Life-Cycle An Agent is created to represent a user’s service in the Digital Ecosystem, and its life-cycle begins with deployment to its owner’s Habitat for distribution within the Habitat network. The Agent is then migrated to any Habitats connected to the owner’s Habitat, to make it available in other Habitats where it could potentially be useful. The Agent is then available to the local evolutionary optimisation, to be used in evolving the optimal Agent-sequence in response to a user request. The optimal Agent-sequence is then registered at the Habitat, being stored in the Habitat’s Agent-pool. If an Agent-sequence solution is then executed, an attempt is made to migrate (copy) it to every other connected Habitat, success depending on the probability associated with the connection. The Agent life-cycle is shown in Figure 2.19. An Agent can also be deleted if after several successive user requests at a Habitat it remains unused; it will have a small number of escape migrations, in which it is not copied, but is randomly moved to another connected Habitat. If the Agent fails to find a niche before running out of escape migrations, then it will be deleted. 2.3. Simulation and Results , 67 Figure 2.19: Agent Life-Cycle: Begins with deployment to its owner’s Habitat for distribution within the Habitat network. It can then be used in evolving the optimal Agent-sequence in response to a user request. The optimal Agent-sequence is then registered at the Habitat. If an Agent-sequence solution is then executed, an attempt is made to migrate (copy) it to every other connected Habitat, success depending on the probability associated with the connection. 2.3 Simulation and Results We simulated the Digital Ecosystem, based upon our Ecosystem-Oriented Architecture, and recorded key variables to determine whether it displayed behaviour typical of biological ecosystems. Although agent-based modelling solutions, like Repast (Recursive Porous Agent Simulation Toolkit) [57] and MASON (Multi-Agent Simulator Of Neighbourhoods) [182], and evolutionary computing libraries, like ECJ (Evolutionary Computing in Java) [183] and the JCLEC (Java Computing Library for Evolutionary Computing) [319], are available, it was evident that it would take as much effort to adapt one, or a combination, of these to simulate the Digital Ecosystem, as it would to create our own simulation of the Digital Ecosystem, because the required ecological dynamics are largely absent from these and other available technologies. So, we created our own simulation, following the Ecosystem-Oriented Architecture from the previous section (unless otherwise specified), using the business ecosystem of Small and Medium sized Enterprises from Digital Business Ecosystems [222] as an example user base. 2.3.1 Agents: Semantic Descriptions An Agent represents a user’s service, including the semantic description of the business process involved, and is based on existing and emerging technologies for semantically capable Service- evolve Agent Populationfor solution (Agent-sequence)register solution at Agent-pool of HabitatexecuteAgent-sequenceuser requestAgent migrationdeploy Agent to Agent-pool of Habitat 68 , Chapter 2. Creation of Digital Ecosystems A = {(1,25), (2,35), (3,55), (4,6), (5,37), (6,12)} Figure 2.20: Agent Semantic Descriptions: Each simulated Agent had a semantic description with an abstract representation consisting of a set of between three and six numeric tuples; each tuple representing an attribute of the semantic description, one integer for the attribute identifier and one for the attribute value, with both ranging between one and a hundred. Oriented Architectures [254], such as the OWL-S semantic markup for web services [197]. We simulated a service’s semantic description with an abstract representation consisting of a set of numeric tuples, to simulate the properties of a semantic description. Each tuple representing an attribute of the semantic description, one integer for the attribute identifier and one for the attribute value, with both ranging between one and a hundred. Each simulated Agent had a semantic description, with between three and six tuples, as shown in Figure 2.20. 2.3.2 User Base R = [{(1,23),(2,45),(3,33),(4,6),(5,8),(6,16)}, {(1,84),(2,48),(3,53),(4,11),(5,16)}] Figure 2.21: User Request: A simulated user request consisted of an abstract semantic description, as a list of sets of numeric tuples to represent the properties of a desired business application; each tuple representing an attribute of the semantic description, one integer for the attribute identifier and one for the attribute value, with both ranging between one and a hundred. Throughout the simulations we assumed a hundred users, which meant that at any time the number of users joining the network equalled those leaving. The Habitats of the users were randomly connected at the start, to simulate the users going online for the first time. The users then produced Agents (services) and requests for business applications. Initially, the users each deployed five Agents to their Habitats, for migration (distribution) to any Habitats connected to theirs (i.e. their community within the business ecosystem). Users were simulated to deploy a new Agent after the submission of three requests for business applications, and were chosen at random to submit their requests. A simulated user request consisted of an abstract semantic description, as a list of sets of numeric tuples to represent the properties of a desired business application. The use of the numeric tuples made it comparable to the semantic descriptions of the services represented by the Agents; while the list of sets (two level hierarchy) and a much longer length provided sufficient complexity to support the sophistication of business applications. An example is shown in Figure 2.21. 2.3. Simulation and Results , 69 The user requests were handled by the Habitats instantiating evolving Populations, which used evolutionary computing to find the optimal solution(s), Agent-sequence(s). It was assumed that the users made their requests for business applications accurately, and always used the response (Agent-sequence) provided. 2.3.3 Populations: Evolution Populations of Agents, [A1, A1, A2, ...], were evolved to solve user requests, seeded with Agents and Agent-sequences from the Agent-pool of the Habitats in which they were instantiated. A dynamic population size was used to ensure exploration of the available combinatorial search space, which increased with the average length of the Population’s Agent-sequences. The optimal combination of Agents (Agent-sequence) was evolved to the user request R, by an artificial selection pressure created by a fitness function generated from the user request R. An individual (Agent-sequence) of the Population consisted of a set of attributes, a1, a2, ..., and a user request essentially consisted of a set of required attributes, r1, r2, .... So, the fitness function for evaluating an individual Agent-sequence A, relative to a user request R, was f itness(A, R) = (2.1) 1 +(cid:80) 1 r∈R r − a , where a is the member of A such that the difference to the required attribute r was minimised. Equation 2.1 was used to assign fitness values between 0.0 and 1.0 to each individual of the current generation of the population, directly affecting their ability to replicate into the next generation. The evolutionary computing process was encoded with a low mutation rate, a fixed selection pressure and a non-trapping fitness function (i.e. did not get trapped at local optima). The type of selection used fitness-proportional and non-elitist, fitness-proportional meaning that the fitter the individual the higher its probability of surviving to the next generation [36]. Non- elitist means that the best individual from one generation was not guaranteed to survive to the next generation; it had a high probability of surviving into the next generation, but it was not guaranteed as it might have been mutated [90]. Crossover (recombination) was then applied to a randomly chosen 10% of the surviving population, a one-point crossover, by aligning two parent individuals and picking a random point along their length, and at that point exchanging their tails to create two offspring [90]. Mutations were then applied to a randomly chosen 10% of the surviving population; point mutations were randomly located, consisting of insertions (an Agent was inserted into an Agent-sequence), replacements (an Agent was replaced in an Agent- 70 , Chapter 2. Creation of Digital Ecosystems sequence), and deletions (an Agent was deleted from an Agent-sequence) [168]. The issue of bloat was controlled by augmenting the fitness function with a parsimony pressure [296] which biased the search to shorter Agent-sequences, evaluating longer than average length Agent- sequences with a reduced fitness, and thereby providing a dynamic control limit which adapted to the average length of the ever-changing evolving Agent Populations. 2.3.4 Semantic Filter Agent’s semantic description: {(1,25), (2,35), (3,55), (4,6), (5,37), (6,12)} {(Business, Airline), (Company, British Midland), (Quality, Economy), (Cost, 60), (Depart, Edinburgh), (Arrive, London)} (with semantic filter): user request: [{(1,23), (2,45), (3,33), (4,6), (5,8), (6,16)}, {(1,84), (2,48), (3,53), (4,11), (7,16), (8,34)}, {(1,23), (2,45), (3,53), (4,6), (5,16)(6,53)}, {(1,86), (2,48), (3,33), (4,25), (7,55)(8,23)}, {(1,25), (2,52), (3,53), (4,5), (5,55), (6,37)}, {(1,86), (2,48), (3,43), (4,25), (7,37), (8,40)}, {(1,22), (2,77), (3,82), (4,9), (5,35), (6,8)}] 3*), 110), (with semantic filter): (Cost, (Quality, [{(Business, Airline), (Company, Air France), (Quality, Economy), (Cost, 60), (Depart, Edinburgh), (Arrive, Paris)}, {(Business, Hotel), (Company, Continental), (Location, Paris), (Nights, 3)}, {(Business, Airline), (Company, Air France), (Quality, Economy),(Cost,60),(Depart, Paris), (Arrive, Monte Carlo)}, {(Business, Hotel), (Company, Continental), (Quality, 2*), (Cost, 250), (Location, Monte Carlo), (Nights, 2)}, {(Business, Airline), (Company, KLM), (Quality, Economy), (Cost, 50), (Depart, Monte Carlo), (Arrive, London)}, {(Business, Hotel), (Company, Continental), (Quality, 3*), (Cost, 250), (Location, London), (Nights, 4)}, {(Business, Airline), (Company, Air Espana), (Quality, First), (Cost, 90), (Depart, London), (Arrive, Edinburgh)}] Figure 2.22: Semantic Filter: Shows the numerical semantic descriptions, of the simulated services (Agents) and user requests, in a human readable form. The semantic filter translates numerical semantic descriptions for one community within the user base, showing it in the context of the travel industry. The simulation still operated on the numerical representation for operational efficiency, but the semantic filter essentially assigns meaning to the numbers. The simulation of the Digital Ecosystem complies with the Ecosystem-Oriented Architecture defined in the previous section, but there was the possibility of model error in the business ecosystems of the user base (Small and Medium sized Enterprises from Digital Business Ecosystems [222]), because while the abstract numerical definition for the simulated semantic descriptions, of the services and requests the users provide, makes it widely applicable, it was 2.3. Simulation and Results , 71 unclear that it could accurately represent business services. So we created a semantic filter to show the numerical semantic descriptions, of the simulated services (Agents) and user requests, in a human readable form. The basic properties of any business process are cost, quality, and time [68]; so this was followed in the semantic filter. The semantic filter translates numerical semantic descriptions for one community within the user base, showing it in the context of the travel industry, as shown in Figure 2.22. The simulation still operated on the numerical representation for operational efficiency, but the semantic filter essentially assigns meaning to the numbers. The output from the semantic filter, in Figure 2.22, shows that the numerical semantic descriptions are a reasonable modelling assumption that abstracts sufficiently rich textual descriptions of business services. 2.3.5 Evolutionary Dynamics Figure 2.23: Graph of Fitness in the Evolutionary Process: This shows both the maximum and average fitness increasing over the generations of a typical Population, and as expected the average fitness remains below the maximum fitness because of variation in the Population [110], showing that the evolutionary processes, which construct order in the Digital Ecosystem, are operating satisfactorily. We plotted the fitness of the evolutionary process for a typical Population, to ensure that the core process that creates order within the Digital Ecosystem was operating satisfactorily. The graph in Figure 2.23 shows both the maximum and average fitness increasing over the 020406080100100200300FitnessGenerationMaximumFitnessAverageFitness 72 , Chapter 2. Creation of Digital Ecosystems generations of a typical Population, and as expected the average fitness remains below the maximum fitness because of variation in the Population [110], showing that the evolutionary processes, which construct order in the Digital Ecosystem, are operating satisfactorily. 2.3.6 Ecological Succession We then compared some of the Digital Ecosystem’s dynamics with those of biological ecosystems, to determine if it had been imbibed with the properties of biological ecosystems. A biological ecosystem develops from a simpler to a more mature state, by a process of succession, where the genetic variation of the populations changes with time [29]. So, it becomes increasingly more complex through this process of succession, driven by the evolution of the populations within the ecosystem [59]. Equivalently, the Digital Ecosystem’s increasing complexity comes from the Agent Populations being evolved to meet the dynamic selection pressures created by the user requests. Figure 2.24: Ecological Succession (modified from [69]): The formation of a mature ecosystem is the slow, predictable, and orderly changes in the composition and structure of an ecological community, for which there are defined stages in the increasing complexity [29], as shown. So, it becomes increasingly more complex through this process of succession, driven by the evolution of the populations within the ecosystem [59]. The formation of a mature ecosystem, ecological succession, is the slow, predictable, and orderly changes in the composition and structure of an ecological community, for which there are defined 2.3. Simulation and Results , 73 stages in the increasing complexity [29], as shown in Figure 2.24. Succession may be initiated either by the formation of a new, unoccupied habitat (e.g., a lava flow or a severe landslide) or by some form of disturbance (e.g. fire, logging) of an existing community. The former case is often called primary succession, and the latter secondary succession [29]. The trajectory of ecological change can be influenced by site conditions, by the interactions of the species present, and by more stochastic factors such as availability of colonists or seeds, or weather conditions at the time of disturbance. Some of these factors contribute to predictability of successional dynamics; others add more probabilistic elements [112]. Trends in ecosystem and community properties of succession have been suggested, but few appear to be general. For example, species diversity almost necessarily increases during early succession upon the arrival of new species, but may decline in later succession as competition eliminates opportunistic species and leads to dominance by locally superior competitors [59]. Net Primary Productivity3, biomass, and trophic level properties all show variable patterns over succession, depending on the particular system and site [112]. Generally, communities in early succession will be dominated by fast- growing, well-dispersed species, but as the succession proceeds these species will tend to be replaced by more competitive species [29]. We then considered existing theories of complexity for ecological succession and how it would apply to Digital Ecosystems, seeking a high-level understanding that would apply equally to both biological and digital ecosystems. As succession leads communities, of an ecosystem, to states of dynamic equilibrium 4 within the environment [29], the complexity has to increase initially or there would be no ecosystem, and presumably this increase eventually stops, because there must be a limit to how many species can be supported. The period in between is more complicated. If we consider the neutral biodiversity theory [136], which basically states network aspects of ecosystems are negligible, we would probably get a relatively smooth progression, because although you would get occasional extinctions, they would be randomly isolated events whose frequency would eventually balance arrivals, not self-organised crashes like in systems theory. In systems theory [91], when a new species arrives in an ecological network, it can create a positive feedback loop that destabilises part of the network and drives some species to extinction. Ecosystems are constantly being perturbed, so it is reasonable to assume that a species that persists will probably be involved in a stabilising interaction with other species. So, 3 Net Primary Productivity is the net flux of carbon from the atmosphere into green plants per unit time [168]. 4 Dynamic Equilibrium is when opposing forces of a system are proceeding at the same rate, such that its state is unchanging with time [29]. 74 , Chapter 2. Creation of Digital Ecosystems the whole ecological network evolves to resist invasion. That would lead to a spiky succession process, perhaps getting less spiky over time. So, which theory is more applicable to the Digital Ecosystem depends on the extent that a species in the ecosystem acts independently, competing entities (smooth succession) [136] versus tightly co-adapted ecological partners (spiky succession) [91]. Our Digital Ecosystem despite its relative complexity is quite simple compared to biological ecosystems. It has the essential and fundamental processes, but no sophisticated social mechanisms. Therefore, the smooth succession of the neutral biodiversity theory [136] is more probable. As the increasing complexity of the Digital Ecosystem comes from its evolving Agent Populations responding to user requests, the effectiveness of the evolved Agent-sequences (responses) can provide a measure of its complexity over time. So, in simulation we measured the effectiveness of its responses over a thousand user requests, i.e. until it had reached a mature state like a biological ecosystem [29], and graphed a typical run in Figure 2.25. The range and diversity of Agents at initial deployment were such that 70% fulfilment of user requests was Figure 2.25: Graph of Succession in the Digital Ecosystem: The formation of a mature biological ecosystem, ecological succession, is a relatively slow process [29], and the simulated Digital Ecosystem acted similarly in reaching a mature state. Still, at the end of the simulation run, the Agent-sequences had evolved and migrated over an average of only ten user requests per Habitat, and collectively had already reached near 70% effectiveness for the user base. 0204060801002004006008001000Complexity(%matchtouserrequest)Time(userrequestevents) 2.3. Simulation and Results , 75 possible, increasing to 100% fulfilment as more Agents were deployed. The Digital Ecosystem performed as expected, adapting and improving over time, reaching a mature state as seen in the graph of Figure 2.25. The succession of the Digital Ecosystem followed the smooth succession of the neutral biodiversity theory [136], shown by the tight distribution and equal density of the points around the best fit curve of the graph in Figure 2.25. The variation in the percentage responsiveness, over the successive user request events, came from the differential rates of adaption at the Habitats. Still, by the end of the simulation run, the Agent-sequences had evolved and migrated over an average of only ten user requests per Habitat, and collectively had already reached near 70% effectiveness for the user base. The formation of a mature biological ecosystem, ecological succession, is a relatively slow process [29], and the simulated Digital Ecosystem acted similarly in reaching a mature state. 2.3.7 Species Abundance In ecology, relative abundance is a measure of the proportion of all organisms in a community belonging to a particular species [30]. A relative abundance distribution provides the inequalities in population size within an ecosystem and therefore an indicator of biodiversity, with the distribution of most biological ecosystems taking a log-normal form [30]. So, for Digital Ecosystems this measures globally the abundance of different solutions relative to one another. A snapshot of the Agents (organisms) within the Digital Ecosystem, for a typical simulation run, was taken after a thousand user requests, i.e. once it had reached a mature state. In biology a species is a series of populations within which significant gene flow can and does occur, so groups of organisms showing a very similar genetic makeup [168]. We therefore chose to define species within Digital Ecosystems similarly, as a grouping of genetically similar digital organisms (based on their semantic descriptions), with no more than 10% variation within the species group. Relative abundance was calculated for each species and grouped by frequency in Figure 2.26. In contrast to expectations from biological ecosystems, relative abundance in the Digital Ecosystem did not conform to the expected log-normal [30]. We suggest that the high frequency for the lowest relative abundance was caused by the dynamically re-configurable topology of the Habitat network, which allowed species of small abundance to survive as their respective Habitats were clustered by the Digital Ecosystem. Therefore, it also most likely skewed the other frequencies of the relative abundance measure. 76 , Chapter 2. Creation of Digital Ecosystems Figure 2.26: Graph of Relative Abundance in the Digital Ecosystem: Relative abundance is a measure of the proportion of all organisms in a community belonging to a particular species [30]. A relative abundance distribution provides the inequalities in population size within an ecosystem and therefore an indicator of biodiversity, with the distribution of most biological ecosystems taking a log-normal form [30]. However, the Digital Ecosystem did not conform to the expected log-normal. 2.3.8 Species-Area Relationship In ecology the species-area relationship measures diversity relative to the spatial scale, showing the number of species found in a defined area of a particular habitat or habitats of different areas [288], and is commonly found to follow a power law in biological ecosystems [288]. For Digital Ecosystems this relationship represents how similar solutions are to one another at different Habitat scales. Again, a snapshot of the Agents (organisms) within the Digital Ecosystem, for a typical simulation run, was taken once it had reached a mature state, after a thousand user requests. For this experiment, we assumed each Habitat to have an area of one unit. Then, the number of species, at n randomly chosen Habitats, was measured, where n ranged between one and a hundred. For each n, ten sets of measurements were taken at different random sets of Habitats to calculate averaged results, and the log10 values of these results are depicted in the graph of Figure 2.27. The distribution of species diversity over a spatial scale in the Digital 0102030405060702.32.42.52.62.72.82.93.03.13.23.33.43.53.63.73.83.94.04.14.24.34.4FrequencyLogofRelativeAbundance 2.4. Summary and Discussion , 77 Figure 2.27: Graph of Species-Area in the Digital Ecosystem: In ecology the species-area relationship measures diversity relative to the spatial scale, showing the number of species found in a defined area of a particular habitat or habitats of different areas [288], and is commonly found to follow a power law in biological ecosystems, which the Digital Ecosystem also demonstrates. Ecosystem demonstrates behaviour similar to biological ecosystems, also following a power law [288]. However, diversity at fine spatial scales appears to be lower than predicted by the line of best fit. This may be explained by higher specialisation at some Habitats, making them more like micro-habitats in terms of a reduced species diversity [168]. 2.4 Summary and Discussion We started by reviewing existing digital ecosystems, and then introduced biomimicry in computing, Nature Inspired Computing, to create a definition that could be called the digital counterpart of biological ecosystems. Then, by comparing and contrasting the relevant theoretical ecology with the anticipated requirements of Digital Ecosystems, we examined how ecological features may emerge in some systems designed for adaptive problem solving. Specifically, we suggested that Digital Ecosystems, like a biological ecosystems, will consist of self-replicating agents that interact both with one another and with an external environment [29]. Population dynamics and evolution, spatial and network interactions, and complex 1.522.5300.511.52LogofNumberofSpeciesLogofArea 78 , Chapter 2. Creation of Digital Ecosystems dynamic fitness landscapes will all influence the behaviour of these systems. Many of these properties can be understood via well-known ecological models [185, 136], with a further body of theory that treats ecosystems as Complex Adaptive Systems [173]. These models provide a theoretical basis for the occurrence of self-organisation, in digital and biological ecosystems, resulting from the interactions among the agents and their environment, leading to complex non- linear behaviour [185, 136, 173]; and it is this property that provides the underlying potential for scalable problem-solving in digital environments. Based on the theoretical ecology, we considered fields from the domain of computer science, relevant in the creation of Digital Ecosystems. As we required the digital counterparts for the behaviour and constructs of biological ecosystems, and not their simulation or emulation, we considered parallels using existing and developing technologies to provide their equivalents. This included elements from mobile agent systems [249] to provide a parallel to the agents of biological ecosystems and their migration to different habitats, and distributed evolutionary computing [178] and Service- Oriented Architectures [228] for the distribution and evolution of these migrating agents in evolving populations. Our efforts culminated in the definition of Ecosystem-Oriented Architectures for the creation of Digital Ecosystems, where the Digital Ecosystem supports the automatic combining of numerous Agents (which represent services), by their interaction in evolving Populations to meet user requests for applications, in a scalable architecture of distributed interconnected Habitats. Agents travel along the peer-to-peer connections; in every node (Habitat) local optimisation is performed through an evolutionary algorithm, where the search space is determined by the Agents present at the node. The sharing of Agents between Habitats ensures the system is scalable, while maintaining a high evolutionary specialisation for each user. The network of interconnected Habitats is equivalent to the physical environment of biological ecosystems [29] and - combined with the Agents, the Populations, the Agent migration for distributed evolutionary computing, and the environmental selection pressures provided by the user base - the union of the Habitats creates the Ecosystem-Oriented Architecture of a Digital Ecosystem. Continuous and varying user requests for applications provide a dynamic evolutionary pressure on the Agent-sequences, which have to evolve to better fulfil those requests, and without which there would be no driving force to the evolutionary self-organisation of the Digital Ecosystem. This represents a novel, cutting-edge approach to distributed evolutionary computing, because instead of having multiple populations sharing solutions to find the optimal solution for one problem, there are multiple populations to find optimal solutions for multiple similar 2.4. Summary and Discussion , 79 problems. The business ecosystem of Small and Medium sized Enterprises from Digital Business Ecosystems [222] was considered as an example user base, because of their adoption of the ecosystems paradigm, and because our use of Service-Oriented Architectures in defining Digital Ecosystems predisposes them to business-to-business interaction scenarios. We have also dealt with critical issues which would otherwise cripple our complex system and prevent it from providing a scalable solution, like bloat in evolutionary processes and points-of-failure in networking topologies. In essence, we are making a system greater than the sum of its parts, expected to show emergent and complex behaviour that cannot be predicted until it is created. In simulation, we compared the Digital Ecosystem’s dynamics to those of biological ecosystems. The ecological succession, measured by the responsiveness to user requests, conformed to expectations from biological ecosystems [136]: improving over time, before approaching a plateau. As the evolutionary self-organisation of an ecosystem is a slow process [29], even the accelerated form present in Digital Ecosystems reached only 70% responsiveness, showing potential for improvement. In the species abundance experiment the Digital Ecosystem did not conform to the log-normal distribution usually found in biological ecosystems [30]. The high frequency for the lowest relative abundance was probably caused by the dynamically re-configurable topology of the Habitat network, which allowed species of small abundance to survive as their Habitats were clustered by the Digital Ecosystem. In the species-area experiment, which measures diversity relative to spatial scale, the Digital Ecosystem did follow the power law commonly found in biological ecosystems [288]. The species diversity at fine spatial scales was lower than predicted by the line of best fit, and may be explained by the high specialisation at some Habitats, making them more like micro-habitats, including a reduced species diversity [168]. The majority of the experimental results indicate that Digital Ecosystems behave like their biological counterparts, and suggest that incorporating ideas from theoretical ecology can contribute to useful self-organising properties in Digital Ecosystems, which can assist in generating scalable solutions to complex dynamic problems. Creating the digital counterpart of biological ecosystems was not without apparent compro- mises; the temporary one-to-one genotype-phenotype mapping for Agents, the information- centric dynamically re-configurable network topology, and the species abundance result are inconsistent with biological ecosystems. Initially, any newly deployed Agent has a one-to-one genotype-phenotype mapping [281], until sufficient usage (phenotype) information is amassed for use in fitness functions. While the use of such a mapping is undesirable, it is temporary, and necessary to allow the Digital Ecosystem to operate. The Digital Ecosystem requires a re- 80 , Chapter 2. Creation of Digital Ecosystems Figure 2.28: Hypothetical Abstract Ecosystem Definition: If there were an abstract ecosystem class in the Unified Modelling Language, then the Digital Ecosystem and biological ecosystem classes would both inherit from the abstract ecosystem class, but implement its attributes differently. So, we would argue that the apparent compromises in mimicking biological ecosystems are actually features unique to Digital Ecosystems. configurable network topology, to support the constantly changing multi-objective information- centric selection pressures of the user base. Hence, using the concept of Hebbian learning [132], Habitat connectivity is dynamically adapted based on the observed migration paths of the Agents within the Habitat network. The dynamically re-configurable network topology probably caused the Digital Ecosystem not to conform, in the species abundance experiment, to the log-normal distribution expected from biological ecosystems [30]. We would argue that these differences are not compromises, but features unique to Digital Ecosystems. As we discussed earlier, biomimicry, when done well, is not slavish imitation; it is inspiration using the principles which nature has demonstrated to be successful design strategies [33]. Hypothetically, if there were an abstract definition of an ecosystem, defined as an abstract ecosystem class, then the Digital Ecosystem and biological ecosystem classes would both inherit from the abstract ecosystem class, but implement its attributes differently, as shown in the Unified Modelling Language class diagram of Figure 2.28. So, we would argue that the apparent compromises in mimicking biological ecosystems are actually features unique to Digital Ecosystems. Service-oriented architectures promise to provide potentially huge numbers of services that programmers can combine via standardised interfaces, to create increasingly sophisticated and distributed applications [241]. The Digital Ecosystem extends this concept with the automatic combining of available and applicable services in a scalable architecture to meet user requests for applications. This is made possible by a fundamental paradigm shift, from a pull -oriented approach to a push-oriented approach. So, instead of the pull -oriented approach of generating applications only upon request in Service-Oriented Architectures [287], the Digital Ecosystem follows a push-oriented approach of distributing and composing applications pre-emptively, as well as upon request. Although the use of Service-Oriented Architectures in the definition of Digital Ecosystems provides a predisposition to business [158], it does not preclude other more NetworkEcosystemNetwork: EnergyCentricBiological EcosystemNetwork: InformationCentricDigital Ecosystem 2.4. Summary and Discussion , 81 general uses. The Ecosystem-Oriented Architecture definition of Digital Ecosystems is intended to be inclusive and interoperable with other technologies, in the same way that the definition of Service-Oriented Architectures is with grid computing and other technologies [287]. For example, Habitats could be executed using a distributed processing arrangement, such as grid computing [287], which would be possible because the Habitat network topology is information- centric (instead of location-centric). In this chapter we have determined the fundamentals for a new class of system, Digital Ecosystems, created through combining understanding from theoretical ecology, evolutionary theory, Multi-Agent Systems, distributed evolutionary computing, and Service-Oriented Architectures. The word ecosystem is more than just a metaphor since it is the digital counterpart of biological ecosystems. Therefore, Digital Ecosystems have their desirable properties, such as scalability and self-organisation, and are complex systems that show emergent behaviour, since they are more than the sum of their constituent parts. Once we have further investigated its self-organising properties in the next chapter, Chapter 3, we will attempt its optimisation, for which the experimental results have shown there is potential, in the following chapter, Chapter 4. 82 Chapter 3 Investigation of Digital Ecosystems In this chapter we investigate the self-organising behaviour of Digital Ecosystems, because a primary motivation for our research is to exploit the self-organising properties of biological ecosystems. Over time a biological ecosystem becomes increasingly self-organised through the process of ecological succession, driven by the evolutionary self-organisation of the populations within the ecosystem. Analogously, a Digital Ecosystem’s increasing self-organisation comes from the Agent Populations within being evolved to meet the dynamic selection pressures created by the requests from the user base. We start by discussing the relevant literature on self-organisation, including the philosophical meaning of organisation and of self, before focusing on its application to evolving Agent Populations. The self-organisation of biological ecosystems is often defined in terms of the complexity, stability, and diversity. So, we studied further to extend a definition for the complexity, grounded in the biological sciences, called Physical Complexity; based on statistical physics, automata theory, and information theory, providing a measure of the quantity of information in an organism’s genome, by calculating the entropy in a population to determine the randomness in the genome. Next, we investigate and extend a definition for the stability, originating from the computer sciences, called Chli-DeWilde stability, which views a Multi-Agent System as a discrete time Markov chain with potentially unknown transition probabilities. With a Multi-Agent System being considered stable when its state has converged to an equilibrium distribution. Finally, we investigate a definition for the diversity, relative to the selection pressures provided by the user requests, considering the collective self-organised diversity of the evolving Agent Populations relative to the global user request behaviour. We conclude with a summary and discussion of the achievements, including the experimental results. 83 84 , Chapter 3. Investigation of Digital Ecosystems 3.1 Background Theory Self-organisation is perhaps one of the most desirable features in the systems that we design, and a primary motivation for our research in Digital Ecosystems is the desire to exploit the self-organising properties of biological ecosystems [173], which are thought to be robust, scalable architectures that can automatically solve complex, dynamic problems. Over time a biological ecosystem becomes increasingly self-organised through the process of ecological succession [29], driven by the evolutionary self-organisation of the populations within the ecosystem. Analogously, a Digital Ecosystem’s increasing self-organisation comes from the Agent Populations within being evolved to meet the dynamic selection pressures created by the requests from the user base. The self-organisation of biological ecosystems is often defined in terms of the complexity, stability, and diversity [150], which we will also apply to our Digital Ecosystems. It is important for us to be able to understand, model, and define self-organising behaviour, determining macroscopic variables to characterise this self-organising behaviour of the order constructing processes within, the evolving Agent Populations. However, existing definitions of self-organisation may not be directly applicable, because evolving Agent Populations possess properties of both computing systems (e.g. agent systems) as well as biological systems (e.g. population dynamics), and the combination of these properties makes them unique. So, to determine definitions for the self-organising complexity, stability, and diversity we will start by considering the available literature on self-organisation, for its general properties, its application to Multi-Agent Systems (the dominant technology in Digital Ecosystems), and its application to our evolving Agent Populations. 3.1.1 Self-Organisation Self-organisation has been around since the late 1940s [11], but has escaped general formalisa- tion despite many attempts [231, 152]. There have instead been many notions and definitions of self-organisation, useful within their different contexts [133]. They have come from cybernetics [11, 28, 134], thermodynamics [231], mathematics [171], information theory [282], synergetics [125], and other domains [170]. The term self-organising is widely used, but there is no generally accepted meaning, as the abundance of definitions would suggest. Therefore, the philosophy of self-organisation is complicated, because organisation has different meanings to different people. 3.1. Background Theory , 85 So, we would argue that any definition of self-organisation is context dependent, in the same way that a choice of statistical measure is dependent on the data being analysed. Proposing a definition for self-organisation faces the cybernetics problem of defining system, the cognitive problem of perspective, the philosophical problem of defining self, and the context dependent problem of defining organisation [107]. The system in this context is an evolving Agent Population, with the replication of individuals from one generation to the next, the recombination of the individuals, and a selection pressure providing a differential fitness between the individuals, which is behaviour common to any evolving population [29]. Perspective can be defined as the perception of the observer in perceiving the self-organisation of a system [12, 28], matching the intuitive definition of I will know it when I see it [283], which despite making formalisation difficult shows that organisation is perspective dependent (i.e. relative to the context in which it occurs). In the context of an evolutionary system, the observer does not exist in the traditional sense, but is the selection pressure imposed by the environment, which selects individuals of the population over others based on their observable fitness. Therefore, consistent with the theoretical biology [29], in an evolutionary system the self-organisation of its population is from the perspective of its environment. Whether a system is self -organising or being organised depends on whether the process causing the organisation is an internal component of the system under consideration. This intuitively makes sense, and therefore requires one to define the boundaries of the system being considered to determine if the force causing the organisation is internal or external to the system. For an evolving population the force leading to its organisation is the selection pressure acting upon it [29], which is formed by the environment of the population’s existence and competition between the individuals of the population [29]. As these are internal components of an evolving Agent Population [29], it is a self-organising system. Now that we have defined, for an evolving Agent Population, the system for which its organisation is context dependent, the perspective to which it is relative, and the self by which it is caused, a definition for its self-organisation can be considered. The context, an evolving Agent Population in its environment, lacks a 2D or 3D metric space, so it is necessary to consider a visualisation in a more abstract form. We will let a single square, , represent an Agent, with colours to represent different Agents. Agent-sequences will therefore be represented by a 86 , Chapter 3. Investigation of Digital Ecosystems Figure 3.1: Visualisation of Self-Organisation in Evolving Agent Populations: The number of Agents, in total and of each colour, is the same in both populations. However, the Agent Population on the left intuitively shows organisation through the uniformity of the colours across the Agent-sequences, whereas the population to the right shows little or no organisation. sequence of coloured squares, , with a Population consisting of multiple Agent-sequences, as shown in Figure 3.1. In Figure 3.1 the number of Agents, in total and of each colour, is the same in both populations. However, the Agent Population on the left intuitively shows organisation through the uniformity of the colours across the Agent-sequences, whereas the population to the right shows little or no organisation. Following biological ecosystems, which defines self-organisation in terms of the complexity, stability, and diversity relative to the perspective of the selection pressure [150]: the self-organised complexity of the system is the creation of coherent patterns and structures from the Agents, the self-organised stability of the system is the resulting stability or instability that emerges over time in these coherent patterns and structures, and the self-organised diversity of the system is the optimal variability within these coherent patterns and structures. 3.1.2 Definitions of Self-Organisation Many alternative definitions have been proposed for self-organisation within populations and agent systems, with each defining what property or properties demonstrate self-organisation. So, we will now consider the most applicable alternatives for their suitability in defining the self-organised complexity, stability, and diversity of an evolving Agent Population. One possibility would be the ∈-machine definition of evolving populations, which models the emergence of organisation in pre-biotic evolutionary systems [64]. An ∈-machine consists of a set of causal states and transitions between them, with symbols of an alphabet labelling the transitions and consisting of two parts: an input symbol that determines which transition to take from a state, and an output symbol which is emitted on taking that transition [64]. ∈-machines have several key properties [65]: all their recurrent states form a single, strongly PopulationPopulation(HIGH organisation)(LOW organisation) 3.1. Background Theory , 87 connected component, their transitions are deterministic in the specific sense that a causal state with the edge symbol-pair determines the successor state, and an ∈-machine is the smallest causal representation of the transformation it implements. The ∈-machine definition of self-organisation also identifies the forms of complexity, stability, and diversity [64], but with definitions focused on pre-biotic evolutionary systems, i.e. the primordial soup of chemical replicators from the origin of life [257]. Complexity is defined as a form of structural-complexity, measuring the state-machine-based information content of the ∈-machine individuals of a population [64]. Stability is defined as a meta-machine, a set (composition) of ∈-machines, that can be regarded as an autonomous and self-replicating entity [64]. Diversity is defined, using an interaction network, as the variability of interaction in a population [64]. So, while these definitions of self-organisation are compatible at the higher more abstract level, i.e. in the forms of self-organisation present, the deeper definitions of these forms are not applicable because they are context dependent. As we explained in the previous subsection, definitions of self-organisation are context dependent, and so the context of pre-biotic evolutionary systems, to which the ∈-machine self-organisation applies, is very different to the context of an evolving Agent Population from our Digital Ecosystem. Evolving Agent Populations are defined from Ecosystem-Oriented Architectures, which have evolutionarily surpassed the context of pre-biotic evolutionary systems, shown by the necessity of our consideration of the later evolutionary stage of ecological succession [29] in section 2.3.6. The Minimum Description Length principle [24] could be applied to the executable components or semantic descriptions of the Agent-sequences of a Population, with the best model, among a collection of tentatively suggested ones, being the one that provides the smallest stochastic complexity. However, the Minimum Description Length principle does not define how to select the family of model classes to be applied for determining the stochastic complexity [126]. This problem of model selection is well known and cannot be adequately formalised, and so in practise selection is based on human judgement and prior knowledge of the kinds of models previously chosen [126]. Therefore, while models could be chosen to represent the self-organised complexity, and possibly even the diversity, there is no procedural method for determining these models, because subjective human intervention is required for model selection on a case-by-case basis. The Prugel-Bennett Shapiro formalism models the evolutionary dynamics of a population of sequences, using techniques from statistical mechanics and focuses on replica symmetry [253]. The individual sequences are not considered directly, but in terms of the statistical properties 88 , Chapter 3. Investigation of Digital Ecosystems of the population, using a macroscopic level of description with specific statistical properties to characterise the population, that are called macroscopics. A macroscopic formulation of an evolving population reduces the huge number of degrees of freedom to the dynamics of a few quantities, because a non-linear system of a few degrees of freedom can be readily solved or numerically iterated [253]. However, since a macroscopic description disregards a significant amount of information, subjective human insight is essential so that the appropriate macroscopics are chosen [284]. So, while macroscopics could be chosen to represent the self- organised complexity, stability, and diversity, there is no procedural method for determining these macroscopics, because subjective human insight is required for macroscopic selection on a case-by-case basis. Kolmogorov-Chaitin complexity defines the complexity of binary sequences by the smallest possible Universal Turing Machine, algorithm (programme and input) that produces the sequence [177]. A sequence is said to be regular if the algorithm necessary to produce it on a Universal Turing Machine is shorter than the sequence itself [177]. A regular sequence is said to be compressible, whereas its compression, into the most succinct Universal Turing Machine possible, is said to be incompressible as it cannot be reduced any further in length [177]. A random sequence is said to be incompressible, because the Universal Turing Machine to represent it cannot be shorter than the random sequence itself [177]. This intuitively makes sense for algorithmic complexity, because algorithmically regular sequences require a shorter programme to produce them. So, when measuring a population of sequences, the Kolmogorov-Chaitin complexity would be the shortest Universal Turing Machine to produce the entire population of sequences. However, Chaitin himself has considered the application of Kolmogorov-Chaitin complexity to evolutionary systems, and realised that although Kolmogorov-Chaitin complexity represents a satisfactory definition of randomness in algorithmic information theory, it is not so useful in biology [48]. For evolving Agent Populations the problem manifests itself most significantly when the Agents are randomly distributed within the Agent-sequences of the Population, having maximum Kolmogorov- Chaitin complexity, instead of the complexity it ought to have of zero. This property makes Kolmogorov-Chaitin complexity unsuitable as a definition for the self-organised complexity of an evolving Agent Population. A definition called Physical Complexity can be estimated for a population of sequences, calculated from the difference between the maximal entropy of the population, and the actual entropy of the population when in its environment [8]. This Physical Complexity, based 3.1. Background Theory , 89 on Shannon’s entropy of information, measures the information in the population about its environment, and therefore is conditional on its environment. It can be estimated by counting the number of loci that are fixed for the sequences of a population [5]. Physical Complexity would therefore be suitable as a definition of the self-organised complexity. However, a possible limitation is that Physical Complexity is currently only formulated for populations of sequences with the same length. Self-Organised Criticality in evolution is defined as a punctuated equilibrium in which the population’s critical state occurs when the fitness of the individuals is uniform, and for which an avalanche, caused by the appearance and spread of advantageous mutations within the population, temporarily disrupts the uniformity of individual fitness across the population [17]. Whether an evolutionary process displays Self-Organised Criticality remains unclear. There are those who claim that Self-Organised Criticality is demonstrated by the available fossil data [292], with a power law distribution on the lifetimes of genera drawn from fossil records, and by artificial life simulations [4], again with a power law distribution on the lifetimes of competing species. However, there are those who feel that the fossil data is inconclusive, and that the artificial life simulations do not show Self-Organised Criticality, because the key power law behaviour in both can be generated by models without Self-Organised Criticality [229]. Also, the Self-Organised Criticality does not define the resulting self-organised stability of the population, only the organisation of the events (avalanches) that occur in the population over time. Evolutionary Game Theory [330] is the application of models inspired from population genetics to the area of game theory, which differs from classical game theory [103] by focusing on the dynamics of strategy change more than the properties of individual strategies. In Evolutionary Game Theory, agents of a population play a game, but instead of optimising over strategic alternatives, they inherit a fixed strategy and then replicate depending on the strategy’s payoff (fitness) [330]. The self-organisation found in Evolutionary Game Theory is the presence of stable steady states, in which the genotype frequencies of the population cease to change over the generations. This equilibrium is reached when all the strategies have the same expected payoff, and is called a stable steady state, because a slight perturbing will not cause a move far from the state. An evolutionary stable strategy leads to a stronger asymptotically stable state, as a slight perturbing causes only a temporary move away from the state before returning [330]. So, Evolutionary Game Theory is focused on genetic stability between competing between 90 , Chapter 3. Investigation of Digital Ecosystems individuals, rather than the stability of the population as a whole, which therefore limits its suitability for the self-organised stability of an evolving Agent Population. Multi-Agent Systems are the dominant computational technology in the evolving Agent Populations, and while there are several definitions of self-organisation [245, 188, 308, 81] and stability [216, 331, 238] defined for Multi-Agent Systems, they are not applicable primarily because of the evolutionary dynamics inherent in the context of evolving Agent Populations. Whereas Chli-DeWilde stability of Multi-Agent Systems [53] may be suitable, because it models Multi-Agent Systems as Markov chains, which are an established modelling approach in evolutionary computing [272]. A Multi-Agent System is viewed as a discrete time Markov chain with potentially unknown transition probabilities, in which the agents are modelled as Markov processes, and is considered to be stable when its state has converged to an equilibrium distribution [53]. Chli-DeWilde stability provides a strong notion of self-organised stability over time, but a possible limitation is that its current formulation does not support the necessary evolutionary dynamics. The main concept in Mean Field Theory is that for any single particle the most important contribution to its interactions comes from its neighbouring particles [244]. Therefore, a particle’s behaviour can be approximated by relying upon the mean field created by its neighbouring particles [244], and so Mean Field Theory could be suitable as a definition for the self-organised diversity of an evolving Agent Population. Naturally, it requires a neighbourhood model to define interaction between neighbours [244], and is therefore easily applied to domains such as Cellular Automata [124]. While a neighbourhood model is feasible for biological populations [95], evolving Agent Populations lack such neighbourhood models based on a 2D or 3D metric space, with the only available neighbourhood model being a distance measure on a parameter space measuring dissimilarity. However, this type of neighbourhood model cannot represent the information-based interactions between the individuals of an evolving Agent Population, making Mean Field Theory unsuitable as a definition for the self-organised diversity of an evolving Agent Population. 3.2 Complexity A definition for the self-organised complexity of an evolving Agent Population should define the creation of coherent patterns and structures from the Agents within, with no initial constraints 3.2. Complexity , 91 from modelling approaches for the inclusion of pre-defined specific behaviour, but capable of representing the appearance of such behaviour should it occur. None of the proposed definitions are directly applicable for the self-organised complexity of an evolving Agent Population. The ∈-machine modelling [64] is not applicable, because it is only defined within the context of pre-biotic populations. Neither is the Minimum Description Length principle [24] or the Prugel-Bennett Shapiro formalism [253], because they require the involvement of subjective human judgement at the critical stage of model and quantifier selection [126, 284]. Kolmogorov-Chaitin complexity [48] is also not applicable as randomness is given maximum complexity. Physical Complexity [8] fulfils abstractly the required definition for the self-organised complexity of an evolving Agent Population, estimating complexity based upon the individuals of a population within the context of their environment. However, its current formulation is problematic, primarily because it is only defined for populations of fixed length, but as this is not a fundamental property of its definition [8] it should be feasible to redefine and extend it as needed. So, the use of Physical Complexity as a definition for the self-organised complexity of evolving Agent Populations will be investigated further to determine its suitability. 3.2.1 Physical Complexity Physical Complexity was born [5] from the need to determine the proportion of information in sequences of DNA, because it has long been established [307] that the information contained is not directly proportional to the length, known as the C-value enigma/paradox [120]. Understanding DNA requires knowing the environment (context) in which it exists, which may initially appear obvious as DNA is considered to be the language of life [279] and the purpose of life is to procreate or replicate [70]. Virtually all activities of biological life-forms are towards this aim [70], with a few exceptions (e.g. suicide before procreation), and to achieve replication requires resources, energy and matter to be harvested [192]. So, for any individual the environment represents the problem of extracting energy for replication, and so their DNA sequence represents a solution to this problem. Furthermore, an individual DNA solution is not necessarily a simple inverse of the problem that the environment represents, with forms of life having evolved specialised, specific and effective ways (niches) to acquire the necessary energy and matter for replication [168]. Even with this understanding it would seem we still need to define the environment to be able to distinguish the information from the redundancy in a 92 , Chapter 3. Investigation of Digital Ecosystems solution (DNA sequence). However, because Physical Complexity analyses a group of solutions to the same problem, the consistency between the different solutions shows the information, and the differences the redundancy [6]. Entropy, a measure of disorder [321], is used to determine the redundancy from the information in a population of solutions. Physical Complexity therefore provides a context-relative definition for the self-organised complexity of a population without needing to define the context (environment) explicitly [7]. Physical Complexity was derived [7] from the notion of conditional complexity defined by Kolmogorov, which is different from traditional Kolmogorov complexity and states that the determination of complexity of a sequence is conditional on the environment in which the sequence is interpreted [177]. In contrast, traditional Kolmogorov-Chaitin (KC) complexity is only conditional on the implicit rules of mathematics necessary to interpret a programme on the tape of a Turing Machine (TM), and nothing else [177]. So, if we consider a TM that takes a tape e as input (which represents its physical environment), including the particular rules of mathematics of this world ; without such a tape, this TM is incapable of computing anything, except for writing to the output what it reads in the input. Thus, without tape e all sequences s have maximal KC-complexity, because there is nothing by which to determine regularity [7]. However, conditional complexity can be stated as the length of the smallest programme that computes sequence s from an environment e, K(se) = min{p : s = CT (p, e)} , (3.1) where CT (p, e) denotes the result of running programme p on Turing Machine T with the input sequence e [7]. This is not yet Physical Complexity, but rather, it is the smallest programme that computes the sequence s from an environment e, in the limit of sequences of infinite length, containing only the bits that are entirely unrelated to e, since, if they were not, they could be obtained from e with a programme of a size tending to zero [7]. The Physical Complexity K(s : e) can now be defined as the number of bits that are meaningful in sequence s (that can be obtained from e with a programme of vanishing size), and is given by the mutual complexity [154], K(s : e) = K(s∅) − K(se), (3.2) where K(s∅) is the unconditional complexity with an empty input tape, e ≡ ∅ [7]. This is different from the Kolmogorov complexity, because in Kolmogorov’s construction the rules of mathematics were given to the TM [177]. As argued above, every sequence s is random if no 3.2. Complexity , 93 environment e is specified, as non-randomness can only exist for a specific world or environment. Thus, K(s∅) is always maximal, K(s∅) = s, (3.3) and is given by the length of s [7]. So (3.2) represents the length of the sequence s, minus those bits that cannot be obtained from e. So, conversely (3.2) represents the number of bits that can be obtained in a sequence s, by a computation with vanishing programme size, from e. Thus, K(s : e) represents the Physical Complexity of s [7]. The determination of the Physical Complexity, K(s : e), of a sequence s with a description of the environment e is not practical. Meaning that it cannot generally be determined by inspection, because its impossible to determine which, and how many, of the bits of sequence s correspond to information about the environment e. The reason is that we are generally unaware of the coding used to code information about e in s, and therefore coding and non-coding bits look entirely alike [7]. However, it is possible to distinguish coding from non-coding bits if we are given multiple copies of sequences that have adapted to the environment, or more generally, if a statistical ensemble (population) of sequences is available to us. Then, coding bits are revealed by non- uniform probability distributions across the population (conserved sites), whereas random bits have uniform distributions (volatile sites) [7]. The determination of complexity then becomes an exercise in information theory, because the average complexity (cid:104)K(cid:105), in the limit of infinitely long strings, tends to the entropy of the ensemble of strings S1 [343], (cid:88) s∈S (cid:104)K(s)(cid:105)S = p(s)K(s) ≈ H(S), (3.4) (3.5) where H is defined from Shannon’s (information) entropy [186], and is given by H(S) = logn(S), where n is the number of symbols available for encoding. If each symbol is equally probable, we can rewrite the above function as H(S) = −logn(1/S) = −logn(p), (3.6) 1 This holds for near-optimal codings. For strings s that do not code perfectly we have (cid:104)K(cid:105) ≥ H [342]. 94 , Chapter 3. Investigation of Digital Ecosystems where p is the probability of occurrence of any one of the symbols. For a source that outputs an infinite sequence of bits, to communicate a finite set of symbols S, Shannon generalised the above function to express an average symbol length [186]. This derivation is easier to see for a large, but finite, number of symbols N , S(cid:80) S(cid:80) i=1 = Ni [− logN (1/Si)] S(cid:80) [logN (1/Si)] = − S(cid:88) Ni i=1 Ni N i=1 H(S) = i=1 . . = − S(cid:88) i=1 Ni [− logN (1/Si)] N pi logN (pi), (3.7) where Ni is the number of occurrences of the symbol Si. So, given (3.4) and (3.7), the average complexity of the sequences s of a population S, (cid:104)K(s)(cid:105)S, tends to the entropy of the sequences s in the ensemble S [7], p(s) log p(s). (3.8) (cid:104)K(s)(cid:105)S = −(cid:88) s∈S (3.8) remains consistent with (3.3) as the determination of K(s∅), sequence s without an environment e, must equal the sequence’s length s, because Shannon’s formula for entropy is an average logarithmic measure of the symbol sets [186], and so the maximum entropy of a population is equivalent to the length of the sequences in the population, Hmax(S) = s. Indeed, if nothing is known about the environment to which a sequence s pertains, then according to the principle of indifference 2, the probability distribution p(s) must be uniformly random. However, if an environment e is given we have some information about the system, and the probability distribution will be nonuniform. Indeed, it can be shown that for every probability distribution p(se), to find sequence s given environment e, we have H(Se) ≤ H(S∅) = s, (3.9) because of the concavity of Shannon entropy [7]. So, the difference between the maximal entropy H(S∅) = s and H(Se), according to the construction outlined above, represents the average number of bits in sequence s taken from the population S that can be obtained by zero-length universal programmes from the environment e. Therefore, the average mutual complexity of 2 The principle of indifference states that if there are n > 1 mutually exclusive and collectively exhaustive possibilities, which are indistinguishable except for their names then each possibility should be assigned an equal probability 1 n [143]. 3.2. Complexity , sequences s in a population S, given an environment e, is (cid:88) (cid:104)K(s : e)(cid:105)S = s∈S p(s)K(s : e) ≈ H(S∅) − H(Se) ≡ I(Se), 95 (3.10) where I(Se) is the information about the environment e stored in the population S, which we identify with the Physical Complexity [7]. To estimate I(Se) it is necessary to estimate the entropy H(Se) using a representative population of sequences S for a given environment e, by summing, over the sequences s of the population S, the probability p(se) multiplied by the logarithm of the probability p(se), p(se) log p(se). (3.11) The entropy H(Se) can be estimated by summing the per-site H(i) entropies of the sequence, H(Se) = −(cid:88) s∈S s(cid:88) H(Se) ≈ H(i), (3.12) where i is a site in the sequence s [7]. Random sites are identified by a nearly uniform probability distribution, and contribute positively to the entropy, whereas non-random sites (which have i=1 strongly peaked distributions) contribute very little [7]. So, the Physical Complexity, the average mutual complexity of sequences s in a population S for an environment e, (cid:104)K(s : e)(cid:105)S, abbreviated as C, is the maximal entropy H(S∅) minus the sum of the per-site entropies, C = H(S∅) − H(i). (3.13) s(cid:88) i=1 If the sequences s are constructed from an alphabet, a set D, then the per site entropy H(i) for the sequences is pd(i) logD pd(i), (3.14) H(i) = −(cid:88) d∈D where i is a site in the sequences ranging between one and the length of the sequences (cid:96), D is the alphabet of characters found in the sequences, and pd(i) is the probability that site i (in the for each site i equalling one, (cid:80) sequences) takes on character d from the alphabet D, with the sum of the pd(i) probabilities pd(i) = 1 [7]. Taking the log to the base D conveniently d∈D 96 , Chapter 3. Investigation of Digital Ecosystems normalises H(i) to range between zero and one, 0 ≤ H(i) ≤ 1. If the site i is identical across the population it will have no entropy, Hmin(i) = 0. (3.15) (3.16) If the content of site i is uniformly random, i.e. the pd(i) probabilities all equal to 1D, it will have maximum entropy, Hmax(i) = 1. (3.17) When the entropy of H(i) is at its minimum of zero, then the site i holds information, as every sample shows the same character of the alphabet. When the entropy of H(i) is at its maximum of one, the character found in the site i is uniformly random and therefore holds no information. So, the amount of information is the maximal entropy of the site (3.17) minus the actual per-site entropy (3.14) [7], I(i) = Hmax(i) − H(i) = 1 − H(i). (3.18) DNA, whose sequence encodes the genetic information of living organisms [168], was the original driver for the creation of Physical Complexity [5], and so is a good example upon which to demonstrate the definition. DNA sequences are made up from four nucleotides, Adenosine (A), Figure 3.2: DNA Samples from a Population: DNA sequences are made up from four nucleotides, Adenosine (A), Thymine (T), Cytosine (C) and Guanine (G). The nucleotides always pair as follows, Adenosine with Thymine, and Cytosine with Guanine. So, DNA sequences can be reduced to a genome sequence showing half of the paired information [168]. site12345678910111213141516171819Sample 1:CGCGATACCTTTTGATTGGSample 2:CGCGATACCTATTGATTGGSample 3:CGCGATACCTGTTGATTGCSample 4:CGCGATACCTCTTGATTGC 3.2. Complexity , 97 Thymine (T), Cytosine (C) and Guanine (G). The nucleotides always pair as follows, Adenosine with Thymine, and Cytosine with Guanine. So, DNA sequences can be reduced to a genome sequence showing half of the paired information [168], and with a sufficiently sized sample population, the pd(i) probabilities can be estimated by the frequencies of the nucleotides at the sites. Considering the genome samples, in Figure 3.2, the per-site entropy for site 11 will have maximum entropy, as the nucleotides (characters of the alphabet) all have equal probability, H(11) = − A,T,C,G(cid:88) (cid:18)1 d∈D = − pd(11) logD pd(11) log4 4 1 4 + 1 4 log4 1 4 + 1 4 log4 1 4 + 1 4 log4 1 4 (cid:19) = 1, given that the alphabet D equals {A, T, C, G}, and that the probabilities all equal a quarter, pA(11) = pT (11) = pC(11) = pG(11) = 1 4. As the per-site entropy (randomness) is maximum, the information content is its minimum of zero, I(11) = 1 − H(11) = 0. This intuitively makes sense, as it states that if the site content is random across the population, then it contains no information. At the other extreme, if we calculate the per-site entropy for site 16 in Figure 3.2, it will have no entropy, H(16) = − A,T,C,G(cid:88) d∈D pd(16) logD pd(16) = − (0 log4 0 + 1 log4 1 + 0 log4 0 + 0 log4 0) = 0, as the nucleotide Thymine has a probability of one, pT (16) = 1, while the other three nucleotides have a probability of zero, pA(16) = pC(16) = pT (16) = 0. As the per-site entropy is minimum, the information content is its maximum of one, I(16) = 1 − H(16) = 1. This also intuitively makes sense, as it states that if the site is identical across the entire population (no randomness), then the site holds definitive information. Finally, the per-site 98 , Chapter 3. Investigation of Digital Ecosystems entropy for site 19 is at neither extreme, but is entropically in the middle, H(19) = − A,T,C,G(cid:88) (cid:18) d∈D pd(19) logD pd(19) = − 0 log4 0 + 0 log4 0 + (cid:19) = 1 2 , 1 2 log4 1 2 + 1 2 log4 1 2 as the probabilities pA(19) = pT (19) = 0, and pC(19) = pG(19) = 1 2. Intuitively, this states that if there is some entropy (randomness) in the samples of the site, then there is only partial information, I(19) = 1 − H(19) = 1 2 . For clarity the length of the sequences s will be abbreviated to (cid:96) [7], s ≡ (cid:96). (3.19) So, the complexity of a population S, of sequences s, is the maximal entropy of the population (equivalent to the length of the sequences) (cid:96), minus the sum, over the length (cid:96), of the per-site entropies H(i), C = (cid:96) − (cid:96)(cid:88) H(i), (3.20) i=1 given (3.13), (3.9) and (3.19) [7]. The equivalence of the maximum complexity to the length matches the intuitive understanding that if a population of sequences of length (cid:96) has no redundancy, then their complexity is their length (cid:96). If G represents the set of all possible genotypes constructed from an alphabet D that are of length (cid:96), then the size (cardinality) of G is equal to the size of the alphabet D raised to the length (cid:96), G = D(cid:96). (3.21) For the complexity measure to be accurate, a sample size of D(cid:96) is suggested to minimise the error [7, 26], but such a large quantity can be computationally infeasible. The definition’s creator, for practical applications, chooses a population size of roughly 1.29D(cid:96) [8]. We suggest that a population size of D(cid:96) is sufficient to show any trends present, but that the population size will fluctuate when simulated, and so a population size slightly larger than D(cid:96) is chosen for simulations to ensure that the necessary minimum of D(cid:96) is maintained. So, for a population of sequences S we choose, with the definition’s creator, a computationally feasible population 3.2. Complexity , size of D times (cid:96), 99 S ≥ D(cid:96). (3.22) The size of the alphabet, D, depends on the domain to which Physical Complexity is applied. For RNA the alphabet is the four nucleotides, D = {A, C, G, U}, and therefore D = 4 [7]. When Physical Complexity was applied to the Avida simulation software, there was an alphabet size of twenty-eight, D = 28, as that was the size of the instruction set for the self-replicating programmes [8]. 3.2.2 Extending to Agent Populations Reformulating Physical Complexity for an evolving Agent Population requires consideration of the following issues: the mapping of the sequence sites to the Agent-sequences, the managing of Populations of variable length sequences, and the non-atomicity of Agents leading to clustering within populations. 3.2.2.1 Mapping Sequence Sites The first concern is mapping the Population’s Agent-sequences to the sequence sites of Physical Complexity, with the intuitive approach being to map the sites to the Agents, because they are the functional unit of processing, the base unit for evolution in the evolving Agent Populations. Physical Complexity has been applied to RNA sequences [7], and populations of self-replicating programmes in the artificial life simulator Avida [172]; for the RNA the sites were mapped to the nucleotides from which it is constructed, and for the artificial life simulator the sites were mapped to the programme instructions which made up the self-replicating programmes. So, the only alternative, of mapping the sites to the Agents, would be mapping to the programme instructions of the executable components of the services that the Agents represent, similarly to the populations of self-replicating programmes in the artificial life simulator Avida [172]. However, mapping to the executable components in the evolving Agent Populations would be like mapping to the binary representation of the instruction set in the Avida simulator, or to the molecules that make up the nucleotides in RNA, which in all cases would be unsuitable as they are the components that make up the functional units, and not the functional units themselves. Therefore, mapping the sequence sites of Physical Complexity to the Agents is the most suitable approach for evolving Agent Populations. 100 , Chapter 3. Investigation of Digital Ecosystems 3.2.2.2 Variable Length Sequences Physical Complexity is currently formulated for a population of sequences of the same length [7], and so we will now investigate an extension to include populations of variable length sequences, which will include Populations of variable length Agent-sequences. This will require changing and re-justifying the fundamental assumptions, specifically the conditions and limits upon which Physical Complexity operates. In (3.20) the Physical Complexity, C, is defined for a population of sequences of length (cid:96) [7]. The most important question is what does the length (cid:96) equal if the population of sequences is of variable length? The issue is what (cid:96) represents, which is the maximum possible complexity for the population [7], which we will call the complexity (cid:96)(cid:80) potential CP . The maximum complexity in (3.20) occurs when the per-site entropies sum to H(i) → 0, as there is no randomness in the sites (all contain information), i.e. C → (cid:96) zero, i=1 [7]. So, the complexity potential equals the length, CP = (cid:96), (3.23) provided the population S is of sufficient size for accurate calculations, as found in (3.22), i.e. S is equal or greater than D(cid:96). For a population of variable length sequences, SV , the complexity potential, CVP , cannot be equivalent to the length (cid:96), because it does not exist. However, given the concept of minimum sample size from (3.22), there is a length for a population of variable length sequences, (cid:96)V , between the minimum and maximum length, such that the number of per-site samples up to and including (cid:96)V is sufficient for the per-site entropies to be calculated. So the complexity potential for a population of variable length sequences, CVP , will be equivalent to its calculable length, CVP = (cid:96)V . (3.24) If (cid:96)V where to be equal to the length of the longest individual(s) (cid:96)max in a population of variable length sequences SV , then the operational problem is that for some of the later sites, between one and (cid:96)max, the sample size will be less than the population size SV . So, having the length (cid:96)v equalling the maximum length would be incorrect, as there would be an insufficient number of samples at the later sites, and therefore (cid:96)V (cid:54)≡ (cid:96)max. Consider the alternative samples of DNA sequences shown in Figure 3.3; if the entropy is calculated again for site 19, H(19) = 0, but there is an insufficient sample size for the estimated probabilities to provide an accurate calculation. Therefore, the length for a population of variable length sequences, (cid:96)V , is the 3.2. Complexity , 101 Figure 3.3: Alternative DNA Samples of the Population from Figure 3.2: Calculating the entropy for site 19 provides a value of zero, but as evident there is an insufficient sample size for the estimated probabilities to provide an accurate calculation. So, having the length of a population of variable length sequences equalling the maximum length would be incorrect. highest value within the range of the minimum (one) and maximum length, 1 ≤ (cid:96)V ≤ (cid:96)max, for which there are sufficient samples to calculate the entropy. A function which provides the sample size at a given site is required to specify the value of (cid:96)V precisely, sampleSize(i : site) : int, (3.25) where the output varies between 1 and the population size SV (inclusive). Therefore, the length of a population of variable length sequences, (cid:96)V , is the highest value within the range of one and the maximum length for which the sample size is greater than or equal to the alphabet size multiplied by the length (cid:96)V , sampleSize((cid:96)V ) ≥ D(cid:96)V ∧ sampleSize((cid:96)V + 1) < D(cid:96)V , (3.26) where (cid:96)V is the length for a population of variable length sequences, and (cid:96)max is the maximum length in a population of variable length sequences, (cid:96)V varies between 1 ≤ (cid:96)V ≤ (cid:96)max, D is the alphabet and D > 0. This definition intrinsically includes a minimum size for populations of variable length sequences, D(cid:96)V , and therefore is the counterpart of (3.22), which is the minimum population size for populations of fixed length. The length (cid:96) used in the limits of (3.14) no longer exists, and therefore (3.14) must be updated; so, the per-site entropy calculation for variable length sequences will be denoted by HV (i), and pd(i) logD pd(i), (3.27) is, HV (i) = −(cid:88) d∈D site12345678910111213141516171819Sample 1:CGCGATACCTTTTGATTGGSample 2:CGCGATACCTATTGATTGGSample 3:CGCGATACCTGTTGATTSample 4:CGCGATACCTCTTGATT 102 , Chapter 3. Investigation of Digital Ecosystems where D is still the alphabet, (cid:96)V is the length for a population of variable length sequences, with the site i now ranging between 1 ≤ i ≤ (cid:96)V , while the pd(i) probabilities still range between 0 ≤ pd(i) ≤ 1, and still sum to one. It remains algebraically almost identical to (3.14), but the conditions and constraints of its use will change, specifically (cid:96) is replaced by (cid:96)V . Naturally, HV (i) ranges between zero and one, as did H(i) in (3.15), 0 ≤ HV (i) ≤ 1, (3.28) where i ranges between 1 and (cid:96)V , and so the condition on the site i changes at the upper limit from (cid:96) to (cid:96)V . As before in (3.16), if a site i is identical across the population, it will have no entropy, HVmin(i) = 0, (3.29) where, again, i ranges between 1 and (cid:96)V . Analogously to (3.17), if the pd(i) probabilities in (3.27) are equal, then the site i has maximum entropy. In effect, the content of the site is uniformly random and therefore HVmax(i) = 1 (3.30) is true for all i, where the pd(i) probabilities are 1D, and where i continues to range between 1 and (cid:96)V . Analogously to (3.18), when the entropy is its minimum of zero then the site i holds information, as every sample shows the same character of the alphabet. However, when the entropy is maximum the character found in the site i is uniformly random, and therefore holds no information. So, the amount of information is the maximal entropy of the site (3.30) minus the actual per-site entropy (3.27), IV (i) = HVmax(i) − HV (i) = 1 − HV (i), (3.31) where i again now ranges between 1 and (cid:96)V . Therefore, the complexity for a population of variable length sequences, CV , is the complexity potential of the population of variable length sequences minus the sum, over the length of the population of variable length sequences, of the CV = (cid:96)V − (cid:96)V(cid:88) per-site entropies (3.27), where (cid:96)V is the length for the population of variable length sequences, and HV (i) is the entropy for a site i in the population of variable length sequences. i=1 HV (i), (3.32) 3.2. Complexity , 103 Figure 3.4: Abstract Visualisation for Populations of Variable Length Sequences: The alphabet } , the maximum length (cid:96)max is 6 and the length for populations of variable D is the set { , length sequences (cid:96)V is calculated as 5 from (3.26). The Physical Complexity and Efficiency values are consistent with the intuitive understanding one would have for the self-organised complexity of the sample populations. , Physical Complexity can now be applied to populations of variable length sequences, so we will consider the abstract example populations in Figure 3.4. We will let a single square, , represent a site i in the sequences, with different colours to represent the different values. Therefore, a sequence of sites will be represented by a sequence of coloured squares, . }, the maximum length (cid:96)max is 6 and the Furthermore, the alphabet D is the set { , length for populations of variable length sequences (cid:96)V is calculated as 5 from (3.26). The , Physical Complexity values in Figure 3.4 are consistent with the intuitive understanding one would have for the self-organised complexity of the sample populations; the population with high Physical Complexity has a little randomness, while the population with low Physical Complexity is almost entirely random. Using our extended Physical Complexity we can construct a measure showing the use of the information space, called the Efficiency E, which is calculated by the Physical Complexity CV over the complexity potential CVP , E = CV CVP . The Efficiency E will range between zero and one, 0 ≤ E ≤ 1, (3.33) (3.34) only reaching its maximum of one when the actual complexity CV equals the complexity potential CVP , indicating that there is no randomness in the population. In Figure 3.4 the populations of sequences are shown with their respective Efficiency values as percentages, and the values are as one would expect. The complexity CV (3.32) is an absolute measure, whereas the Efficiency E (3.33) is a relative measure (based on the complexity CV ). So, the Efficiency E can be used to compare the PopulationCV=4.420,%E=88.4CV=0.575,%E=11.5Population 104 , Chapter 3. Investigation of Digital Ecosystems self-organised complexity of populations, independent of their size, their length, and whether their lengths are variable or not (as its equally applicable to the fixed length populations of the original Physical Complexity). 3.2.2.3 Clustering The self-organised complexity of an evolving Agent Population is the clustering, amassing of same or similar sequences, around the optimum genome [29]. This can be visualised on a fitness landscape [335], which shows the combination space (power set) of the alphabet D against the fitness values from the selection pressure (user request). The Agent-sequences of an evolving Population will evolve, moving across the fitness landscape and clustering around the optimal genome at the peak of the global optimum, assuming that its evolutionary process does not become trapped while clustering over local optima, and as shown in Figure 3.5. Figure 3.5: 3D Fitness Landscape with a Global Optimum: This shows the combination space (power set) of the alphabet D against the fitness values from the selection pressure (user request), resulting in a global optimum. The Agent-sequences of an evolving Population will evolve, moving across the fitness landscape and clustering around the optimal genome at the peak of the global optimum. Clustering is indicated by the Efficiency E tending to its maximum, as the population’s Physical Complexity CV tends to the complexity potential CVP , because an optimal sequence is becoming dominant in the population, and therefore increasing the uniformity of the sites across the population. With a global optimum, the Efficiency E tends to a maximum of one, indicating that the evolving population of sequences is tending to a set of clusters T of size one, E = CV CVP → 1 as T → 1, (3.35) 3.2. Complexity , 105 assuming its evolutionary process does not become trapped at local optima. So, the tending of the Efficiency E provides a clustering coefficient. It tends, never quite reaching its maximum, because of the mutation inherent in the evolutionary process. Figure 3.6: 3D Fitness Landscape with No Optimum: Theoretical extreme scenario in which the selection pressure is non-discriminating. So, the population occupancy of the fitness landscape would then be uniformly random, as any position (sequence) has the same fitness as any other. So the entropy (randomness) tends to maximum, resulting in the complexity CV tending to zero, and therefore the Efficiency E also tending to zero. The other extreme scenario occurs when the number of clusters equals the size of the population, which would only occur with a flat fitness landscape [149] resulting from a non-discriminating selection pressure, as shown in Figure 3.6. The population occupancy is uniformly random, as any position (sequence) has the same fitness as any other. So the entropy (randomness) tends to maximum, resulting in the complexity CV tending to zero, and therefore the Efficiency E also tending to zero, while the number of clusters T tends to the number of sequences in the population S, E = CV CVP → 0 as T → S. (3.36) So the number of clusters T tends to the population size S, with each cluster consisting of only one unique sequence (individual). If there are global optima, as there are in Figure 3.7, the Efficiency E will tend to a maximum below one, because the population of sequences consists of more than one cluster, with each having an Efficiency tending to a maximum of one. The simplest scenario of clusters is pure clusters; pure meaning that each cluster uses a distinct (mutually exclusive) subset of the alphabet D relative to any other cluster. In this scenario the Efficiency E tends to a value based on the number of clusters T, because a number of the pd(i) probabilities at each site 1T. So, given that the number of the in (3.27) are the reciprocal of the number of clusters, pd(i) probabilities taking the value 1T is equal to the number of clusters, while the other pd(i) probabilities take a value of zero, then the per-site entropy calculation of HV (i) from (3.27) 106 , Chapter 3. Investigation of Digital Ecosystems 3D Fitness Landscape with Global Optima: Clustering scenario, in which the Figure 3.7: Efficiency E of the population S tends to a value based on the number of clusters T, because the population of sequences is clustering around more than one global optima, with each cluster having an Efficiency E tending to a maximum of one. becomes (3.37) where i is the site, D is the alphabet size, and T is the number of clusters. Hence, given (3.37), (3.32), and (3.24), then the Efficiency E from (3.33) becomes HV (i) = logD T, E → 1 − (logD T), (3.38) where D is the alphabet size and T is the number of clusters. Therefore, the Efficiency E, the clustering coefficient, tends to a value that can be used to determine the number of pure clusters in an evolving population of sequences. For a population S with clusters, each cluster is a sub-population with an Efficiency E tending to a maximum of one. To specify this relationship we require a function that provides the Efficiency E (3.33) of a population or sub-population of sequences, efficiency(input :population) :int. (3.39) So, for a population S consisting of a set of clusters T , each member (cluster) t is therefore a sub-population of the population S, and is defined as t ∈ T → t ⊆ S ∧ efficiency(t) → 1 ∧ t ≈ S (cid:32) (cid:33) t = S , (3.40) T ∧(cid:88) t∈T 3.2. Complexity , 107 where a cluster t has an Efficiency E tending to a maximum of one, and the cluster size t is approximately equal to the population size S divided by the number of clusters T. It is only approximately equal because of variation from mutation, and because the population size may not divide to a whole number. These conditions are true for all members t of the set of clusters T , and therefore the summation of the cluster sizes t equals the size of the population S. The population of sequences from the fitness landscape of Figure 3.7 is visualised in Figure 3.8, but the clusters within cannot be seen. So, the population is arranged to show the clustering in Figure 3.9, in which the two clusters are clearly evident. The clusters of the population have Efficiency values tending to a maximum of one, compared to the Efficiency of the population as a whole, which is tending to a maximum significantly below one. This is the expected behaviour of clusters as defined in (3.40). Figure 3.8: Population with Hidden Clusters: Visualisation for the population of sequences from the fitness landscape of Figure 3.7, with clusters visually hard to identify. The clusters lead to a low complexity CV relative to the maximum CVP , and hence the Efficiency E (3.33) tends to a maximum significantly below one. Figure 3.9: Population with Clusters Visible: Visualisation for the population of sequences from Figure 3.8, which has been arranged to show the clusters present. The clusters of the population have Efficiency values tending to a maximum of one, compared to the Efficiency of the population as a whole, which is tending to a maximum significantly below one. The population size S, in Figures 3.8 and 3.9, is double the minimum requirement specified in (3.26), so that the complexity CV (3.32) and Efficiency E (3.33) could be used in defining the principles of clustering without redefining the length of a population of variable length sequences (cid:96)V (3.26). However, when determining the variable length (cid:96)V of a cluster t, the sample size requirement is different, specifically a cluster t is a sub-population of S, and therefore by CV=1.107,CVP=!V=3,%E=36.9D=alphabet={,,}PopulationPopulationCluster 1Cluster 2CV=2.704,E=0.901CVP=!V=3CV=3,E=1 108 , Chapter 3. Investigation of Digital Ecosystems definition cannot have a population size equivalent to S (unless the population consists of only one cluster). Therefore, to manage clusters requires a reformulation of (cid:96)V (3.26) to (cid:19) , (3.41) (cid:18) (cid:96)V = sampleSize((cid:96)V ) ≈ D(cid:96)V T ∧ sampleSize((cid:96)V + 1) < D(cid:96)V T where (cid:96)max is the maximum length in a population of variable length sequences, (cid:96)V varies between 1 ≤ (cid:96)V ≤ (cid:96)max, D is the alphabet, D > 0, and T is the set of clusters in the population S. A population with clusters will always have an Efficiency E tending towards a maximum significantly below one. Therefore, managing populations with clusters requires a reformulation of the Efficiency (3.33) to  Ec(S) = P t∈T CV CVP . Ec(t) T if T = 1 . if T > 1 , (3.42) where t is a cluster, and a member of the set of clusters T of the population S. So, the Efficiency Ec is equivalent to the Efficiency E if the population consists of only one cluster, but if there are clusters then the Efficiency Ec is the average of the Efficiency E values of the clusters. Figure 3.10: Agent Atomicity: Property of a set of Agents, such that no single Agent can functionally replace any Agent-sequence, i.e. their functionality is mutually exclusive to one another. It is important because non-atomicity can adversely affect the Physical Complexity measure. In this example, the alphabet is non-atomic, with the yellow Agent able to functionally replace a green blue Agent-sequence. Atomicity is the property of a set of Agents, such that no single Agent can functionally replace any Agent-sequence, i.e. their functionality is mutually exclusive to one another. It is important because non-atomicity can adversely affect the uniformity of the calculated per- site entropies, which is the main construct of the Physical Complexity measure, and so non- atomicity risks introducing error when calculating the information content. Our extensions to Physical Complexity to support clustering are also necessary to manage non-atomicity, because it leads to the formation of clusters within evolving Agent Populations. The presence of clusters can be identified by the clustering coefficient, the Efficiency E tending to a value below one, D=alphabet={,,,}abbccdac 3.2. Complexity , 109 Population Constructed from a Non-Atomic Alphabet: The population is Figure 3.11: constructed from the alphabet shown in Figure 3.10, with the yellow Agent able to functionally replace a green blue Agent-sequence. So, the Efficiency E of the population is a half, whereas the Efficiency Ec for populations with clusters is one, because it supports clustering and therefore non-atomicity. with the Efficiency Ec (3.42) used to calculate the actual Efficiency as it supports clustering and therefore non-atomicity. If we consider the example population shown in Figure 3.11, which is constructed from the alphabet shown in Figure 3.10, the yellow Agent can functionally replace a green blue Agent-sequence , and so the uniformity across site two is lost. Therefore, the Efficiency E of the population is a half, whereas the Efficiency Ec for populations with clusters is one, because it supports clustering and therefore non-atomicity. 3.2.3 Simulation and Results We simulated an evolving Agent Population from the Digital Ecosystem, using our simulation from section 2.3 (unless otherwise specified), seeded with an alphabet (Agent-pool) of 15 Agents for the evolutionary process. We also added the classes and methods necessary to calculate our extended Physical Complexity and Efficiency, which required implementing the CV of (3.32), the (cid:96)V of (3.41) and the HV of (3.27) for the per-site entropies. The Efficiency Ec (3.42), for populations with clusters, was also implemented in the simulation. 3.2.3.1 Physical Complexity Our extended Physical Complexity has the same structure and properties as the original Physical Complexity [7], and so the relationship between fitness and our extended Physical Complexity should be the same as the relationship between fitness and the original Physical CV=1,CVP=2PopulationCluster 1Cluster 2E=0.5Ec=1CV=3,CVP=3CV=2,CVP=2E=1E=1site 2 = 110 , Chapter 3. Investigation of Digital Ecosystems Original Physical Complexity Graphs (reprinted from [8]): The Physical Figure 3.12: Complexity increases over the generations, suffering short-term decreases from the arrival of fitter mutants, which spread through the population over several generations and causes the uniformity of the sites to decrease temporarily, while the maximum fitness of the population increases over the generations until the global optimum is reached. Complexity [8]. If we consider the original Physical Complexity and fitness graphs, reprinted from [8] in Figure 3.12, we can define the relationship as follows; the Physical Complexity increases over the generations, suffering short-term decreases from the arrival of fitter mutants, which spread through the population over several generations and causes the uniformity of the sites to decrease temporarily, while the maximum fitness of the population increases over the generations until the global optimum is reached, provided that there is a static selection pressure and a low mutation rate (making it unlikely that the maximum fitness will decrease) [8]. The original Physical Complexity starts uncharacteristically high in Figure 3.12, because the population is seeded with a single sequence that temporarily takes over the population [8]. Figure 3.13 shows, for a typical evolving Agent Population, the Physical Complexity CV (3.32) for variable length sequences and the maximum fitness Fmax over the generations. The Physical Complexity for variable length sequences increases over the generations, showing short-term decreases as expected [8]. It increases over the generations because of the increasing information being stored, with the sharp increases occurring when the effective length (cid:96)V of the Population increases. The temporary decreases, such as the one beginning at generation 138, are preceded by the advent of a new fitter mutant, as indicated by a corresponding sharp increase in the maximum fitness in the immediately preceding generations, which temporarily disrupt the self- organised complexity of the population, until this new fitter mutant becomes dominant and Updates [x104] Updates [x104] FitnessPhysical Complexity02641080264108506070809010010-2100102104 3.2. Complexity , 111 Figure 3.13: Graph of Physical Complexity and Maximum Fitness over the Generations: The Physical Complexity for variable length sequences increases over the generations, showing short- term decreases as expected [8]. It increases over the generations because of the increasing information being stored, with the sharp increases occurring when the effective length (cid:96)V of the Population increases. leads to a new higher level of self-organised complexity. Figure 3.13 shows that the fitness and our extended Physical Complexity; both increase over the generations, synchronised with one another, until generation 160 when the maximum fitness tapers off more slowly than the Physical Complexity. At this point the optimal length for the sequences is reached within the simulation, and so the advent of new fitter sequences (of the same of similar length) creates only minor fluctuations in the Physical Complexity, while having a more significant effect on the maximum fitness. The similarity of the graph in Figure 3.13 to the graphs in Figure 3.12 confirms that the Physical Complexity measure has been successfully extended to variable length sequences. The temporary decreases in the Physical Complexity CV for variable length sequences were not as severe as the original [8], because our simulation’s mutation rate was relatively low at only 10%. Also, our Physical Complexity CV does not start uncharacteristically high like the original, because at the start the entire population was randomly seeded, instead of being seeded by just a single individual as in the original [8]. 010203050100138150200250300020406080100UnitsofInformation(PhysicalComplexity)%FitnessGenerationMaximumFitnessFmaxPhysicalComplexityCV 112 , Chapter 3. Investigation of Digital Ecosystems 3.2.3.2 Efficiency Figure 3.14 is a visualisation of the simulation, showing two alternate Populations that were run for a thousand generations, with the one on the left from Figure 3.13 run under normal conditions, while the one on the right was run with a non-discriminating selection pressure; each multi-coloured line represents an Agent-sequence, while each colour represents an Agent (site). The visualisation shows that our Efficiency E accurately measures the self-organised complexity of the two Populations. It also shows significant variation in the Population run under normal conditions, as the evolutionary computing process creates the opportunity to find fitter (better) sequences, providing potential to avoid getting trapped at local optima. Figure 3.14: Visualisation of Evolving Agent Populations at the 1000th Generation: Each multi-coloured line represents an Agent-sequence, while each colour represents an Agent (site). The population on the left from Figure 3.13 was run under normal conditions, while the one on the right was run with a non-discriminating selection pressure. The visualisation shows that our Efficiency E accurately measures the self-organised complexity of the two Populations. Figure 3.15 shows the Efficiency E (3.33), over the generations, for the Population from Figure 3.13. The Efficiency tends to a maximum of one, indicating that the Population consists of one cluster, which is confirmed by the visualisation of the Population in Figure 3.14 (left). The significant decreases that occurred in the Efficiency, reducing in magnitude and frequency over the generations, came from mirroring the fluctuations that occurred in the complexity CV , because the Efficiency E (3.33) is the complexity CV (3.32) over the complexity 7791529441191812715111311258644101076141413414111314412115151021212121344111515915153810213101210132106115871134851171177113485171171538102131012101321011584131315159151571215157121541311151591538102131012132101587113485171177101348517117153810213101210132101158413111591541211515102121212134714141341411131314131128644101047151113791529441191812111123101911413102111371317143132812351334243361101211214214559141164415101214147119615915138101125115151611291094181213511157514144129121341243139151112586131546112811492413111089515741594410171551531471214711315485171133810131012101366210158142142424214154513128687110113514641056515231512371398111142101556121310104610123105821210149515168241113117154310313515631131362131110147104861135315814105141315111210971481213119114417134475653810613121013662101583810131101210136621015838101310121013662101583810613121013662101585451344711441761171481213213151210910531415815113123136213112101410411631035156231134111313117154152168810123105821210149121310104679138111142101556515231512341454135642421415451312868715114223810131012101366210158711315485171131551563147121479441017157121524131110854313131511125861315261128114914129134121115514511515161129109418121351591513810112119963514116441510121433611012112142145412253310991141310211137131714313281111177915294411918124715111311286410107141413414111313144121151510212121213414131115159151538102131012101321011587113481711710711348517117531685316847113485171177113485171171538102131012101321015115841311151591541211515102121213471414134141113131413112864410104117151177915294411918121211413199114132111323713171431328123534336110121121421455141164415101214371199610159151381011251151516112910941812135111551414412912134124313131511125861315461128114924131110515117121594410171551563147121471131548517113381013101210136621015814224242141545131286871101135146414545152151237913811116421065612131010461012310582121029154688142111311715431035156311313133621311210141041161511312315281114105141315121093148121311611441713441575453810613121013662101583810131012101366210158381013110121013662101583810613121013662101585451345751523151235152315123134475453810613312101366210158381013110121013662101583810131012101366210158381061312101366210158545134415711441761131481213141315121010141581511343313362131121014104116310351563113111311741421516881012310582121014912131010467913811114210155651521512341351351464242141545131286871101142238101310121013662101181131548517114155156314712149441017157121524111085431313151112586131546112811491441291213412111551451151516112910941812135159151381011211963751411644151012143361101211214214544353319911413102111371317143132811111779152944119181247151113112864410107141413414111314121151510212121344131115159153810131012101366210158381013101210136621015841311151591541211515102121213471414131411131413112864410104111511711915294411918121111319911413102111371317143132813534433611012112142145514116441510143711996159151381011251151516129109181213511155141441291213412431313151112586131546112811492413111085157121594410171551563147112147113154851711338101310121013662101581422424214154513128687110113514641454515215123791381111421015561213101410461012310582121014915168814211131174310351563113133621311214104116151131231571410141315121031481213141516114417134415754538106131210136621015838101310121013662101583810131101210136621015838106131210136621015851151516112910941812135511515161129109418121353810613121013662101583810131101210136621015838101310121013662101583810613121013662101584515441571144176141131481213141315121010141571511312313362131121410411631135156311311131174142151688101231058212101491213101046791381111421015565152151234145413514642421415451312868711011422381013101210136621015871131548517113155156314712149441017157121524511108543131315111258613154611281149144129123134121115514511515161291091812135159151381011211996375141164415101433126110121121421454435331991141310211137131714313281111779152944119181241115111311286441010714141314111351441211515102121213441311151591538101310121013662101583810131012101366210158413111515915121151510212121347141413414111314151171215107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415910610781814291014622104159116107818142910146142104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781142910146221045159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014652210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291010622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181427910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181472914101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429141462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101466310415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462104159116107818142910146221041591161071814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161081814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210431596107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146292104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911107818142910147221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101466221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622101441591161078181429101462210415911610781814291014622104159116107818729101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911678181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142914622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210134159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146228415911610781814291014622104591161078181429101462210415911610781814291014622104159116107818142910622104159116107818142910146221041591161078181429101462210415911610781814291014622104159116107818142910146221041591161078181429101462210415911610781814291014221041591161078181429101462104159116107818142910146221041591141078181429101462210415911410781814291014622104159114107818142910146221041591141078181429101462210415911410781814291014622104159114107818142941014622104159114107818142910146221041591141078181429101462210415911410781814291014622104159114107881429101462210415911410781814291014622104159114Population (normal conditions)Population (non-discriminating) Agent-sequence (length)11!V!VEfficiency%E=96.8%CV=19.351,CVP=20Efficiency%E=47.0%CV=4.227,CVP=9 3.2. Complexity , 113 Figure 3.15: Graph of Population Efficiency over the Generations for the Population from Figure 3.13: The Efficiency tends to a maximum of one, indicating that the Population consists of one cluster, which is confirmed by the visualisation of the Population in Figure 3.14 (left). The significant decreases that occurred in the Efficiency, reducing in magnitude and frequency over the generations, came from mirroring the fluctuations that occurred in the complexity CV . potential CVP (3.24). These falls are caused by the creation of fitter (better) mutants within the population, which eventually become the dominant genotype, but during the process causes the Physical Complexity and the Efficiency to fall in the short-term. 3.2.3.3 Clustering To further investigate the self-organised complexity of evolving Agent Populations, we simulated a typical Population with a multi-objective selection pressure that had two independent global optima (like the fitness landscape of Figure of 3.7), and so the potential to support two pure clusters (each cluster using a unique subset of the alphabet D). The graph in Figure 3.16 shows the Efficiency E over the generations acting as a clustering coefficient, oscillating around the included best fit curve, quite significantly at the start, and then decreasing as the generations progressed. The initial severe oscillations were caused by the creation and spread of fitter longer mutants (Agent-sequences) in the Population, causing the Physical Complexity and therefore the Efficiency to fluctuate significantly. The Efficiency tended to 0.744, as expected from (3.38) given the alphabet size was fifteen, D=15, and the number of clusters was two, T=2. The 0.60.70.80.910100200300EfficiencyGeneration 114 , Chapter 3. Investigation of Digital Ecosystems Figure 3.16: Graph of the Clustering Coefficient over the Generations: The Efficiency oscillated around the included best fit curve, quite significantly at the start, and then decreasing as the generations progressed. It tended to 0.744, as expected from (3.38) given the alphabet size was fifteen, D=15, and the number of clusters was two, T=2, indicating more than one cluster. Visualisation of Clusters in an Evolving Agent Population at the 1000th Figure 3.17: Generation: The Agent-sequences were grouped to show the two clusters, and as expected from (3.40) each cluster had a much higher Physical Complexity and Efficiency compared to the Population as a whole. However, the Efficiency Ec calculated the complexity correctly. 0.50.60.70.7440.80200400600EfficiencyGeneration1543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611475154361547334152611471574361517334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473344526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543751547334152611471543615473341526117471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361573341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526151471543615473341526114715436154733415261471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526116715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547331526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543612547533415261141543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341526114715436154733415261147154361547334152611471543615473341536114715436154733415261147154361547334152611471543615473341561147154361547334152611471115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316131514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171312141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514141313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141315111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151414131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111516121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161114171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417111314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121617111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151211111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111214171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512171611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131711151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115161413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417111514131611151417131314111512161111141115141316111514171313141115121611111417111514131611151417131314111512161111141711151413161115141713131411151216111114171115141316111514171313141115121611111417Agent-sequence (length)1Population:CV=14.60,%E=73.2%,%Ec=98.0%Cluster1:CV=19.66,%E=98.3%Cluster2:CV=19.51,%E=97.6%!V 3.2. Complexity , 115 tending itself indicated clustering, while the value it tended to indicated, as expected, the presence of two clusters in the Population. A visualisation of the Population is shown in Figure 3.17, in which the Agent-sequences were grouped to show the two clusters. As expected from (3.40) each cluster had a much higher Physical Complexity and Efficiency compared to the Population as a whole. However, the Efficiency Ec is immune to the clusters and therefore calculated the self-organised complexity of the Population correctly. 3.2.4 Summary None of the existing definitions we considered [64, 24, 253, 48, 8] were directly applicable as a definition for the self-organised complexity of an evolving Agent Population, but the properties of Physical Complexity [8] closely matched our intuitive understanding, and so was chosen for further investigation. Based upon information theory and entropy, it provides a measure of the quantity of information in a population’s genome, relative to the environment in which it evolves, by calculating the entropy in the population to determine the randomness in the genome [8]. Reformulating Physical Complexity for evolving Agent Populations required consideration of the following issues: the mapping of the sequence sites to the Agent-sequences, and the managing of Populations of variable length sequences. We then built upon this to construct a variant of the Physical Complexity called the Efficiency, because it was based on the efficiency of information storage in Physical Complexity, which we then used to develop an understanding of clustering and atomicity within evolving Agent Populations. We then investigated the self-organised complexity of evolving Agent Populations through experimental simulations, for which our extended Physical Complexity was consistent with the original. We then investigated the Efficiency, which performed as expected, confirmed by the numerical results and Population visualisations matching our intuitive understanding. We then applied the Efficiency to the determination of clusters when subjecting an evolving Agent Population to a multi-objective selection pressure. The numerical results, combined with the visualisation of the multi-cluster Population, confirmed the ability of the Efficiency to act as a clustering coefficient, not only indicating the occurrence of clustering, but also the number of clusters (for pure clusters). We also confirmed that the Efficiency Ec for populations with clusters was able to calculate correctly the self-organised complexity of evolving Agent Populations with clusters. 116 , Chapter 3. Investigation of Digital Ecosystems Collectively, the experimental results confirm that Physical Complexity has been successfully extended to evolving Agent Populations. Most significantly, Physical Complexity has been reformulated algebraically for populations of variable length sequences, which we have confirmed experimentally through simulations. Our Efficiency definition provides a macroscopic value to characterise the level of complexity. Furthermore, the clustering coefficient defined by the tending of the Efficiency, not only indicates clustering, but can also distinguish between a single cluster population and a population with clusters. The number of clusters can even be determined, for pure clusters, from the value to which the clustering coefficient tends. Combined, this allows the Efficiency Ec definition to provide a normalised universally applicable macroscopic value to characterise the complexity of a population, independent of clustering, atomicity, length (variable or same), and size. We have determined an effective understanding and quantification for the self-organised complexity of the evolving Agent Populations of our Digital Ecosystem. Furthermore, the understanding and techniques we have developed have applicability beyond evolving Agent Populations, as wide as the original Physical Complexity, which has been applied from DNA [7] to simulations of self-replicating programmes [172]. 3.3 Stability A definition for the self-organised stability of an evolving Agent Population should define the resulting stability or instability that emerges over time, with no initial constraints from modelling approaches for the inclusion of pre-defined specific behaviour, but capable of representing the appearance of such behaviour should it occur. None of the proposed definitions are directly applicable for the self-organised stability of an evolving Agent Population. The ∈-machine modelling [64] is not applicable, because it is only defined within the context of pre-biotic populations. The Prugel-Bennett Shapiro formalism [253] is not suitable, because it necessitates the involvement of subjective human judgement at the critical stage of quantifier selection. Self-Organised Criticality [17] is also not applicable as it only models the events of genetic change in the population over time, rather than measuring the resulting stability or instability of the population. Neither is Evolutionary Game Theory [330], which only defines the genetic stability of the genotypes, in terms of equilibrium and non-equilibrium dynamics, instead of the stability of the population as a whole. 3.3. Stability , 117 Chli-DeWilde stability of Multi-Agent Systems [53] does fulfil the required definition of the self-organised stability, measuring convergence to an equilibrium distribution. However, its current formulation does not include Multi-Agent Systems that make use of evolutionary computing algorithms, i.e. our evolving Agent Populations, but it could be extended to include such Multi-Agent Systems, because its Markov-based modelling approach is well established in evolutionary computing [272]. While there has been past work on modelling evolutionary computing algorithms as Markov chains [271, 232, 111, 89], we have found none including Multi- Agent Systems despite both being mature research areas [236, 195], because their integration is a recent development [290]. So, the use of Chli-DeWilde stability as a definition for the self-organised stability of evolving Agent Populations will be investigated further to determine its suitability. 3.3.1 Chli-DeWilde Stability Chli-DeWilde stability was created to provide a clear notion of stability in Multi-Agent Systems [53], because stability is perhaps one of the most desirable features of any engineered system, given the importance of being able to predict its response to various environmental conditions prior to actual deployment; and while computer scientists often talk about stable or unstable systems [306, 18], they did so without having a concrete or uniform definition of stability. Also, other properties had been widely investigated, such as openness [2], scalability [198] and adaptability [286], but stability had not. So, the Chli-DeWilde definition of stability for Multi- Agent Systems was created [53], based on the stationary distribution of a stochastic system, modelling the agents as Markov processes, and therefore viewing a Multi-Agent System as a discrete time Markov chain with a potentially unknown transition probability distribution. The Multi-Agent System is considered to be stable once its state has converged to an equilibrium distribution [53], because stability of a system can be understood intuitively as exhibiting bounded behaviour. Chli-DeWilde stability was derived [52] from the notion of stability defined by De Wilde [77, 169], based on the stationary distribution of a stochastic system, making use of discrete-time Markov chains, which we will now introduce3. If we let I be a countable set, in which each i ∈ I is called a state and I is called the state-space. We can then say that λ = (λi : i ∈ I) 3 A more comprehensive introduction to Markov chain theory and stochastic processes is available in [234] and [61]. , Chapter 3. Investigation of Digital Ecosystems 118 is a measure on I if 0 ≤ λi < ∞ for all i ∈ I, and additionally a distribution if (cid:80) i∈I λi = 1 [52]. So, if X is a random variable taking values in I and we have λi = Pr(X = i), then λ is the distribution of X, and we can say that a matrix P = (pij : i, j ∈ I) is stochastic if every row (pij : j ∈ I) is a distribution [52]. We can then extend familiar notions of matrix and vector multiplication to cover a general index set I of potentially infinite size, by defining the multiplication of a matrix by a measure as λP , which is given by (cid:88) j∈I (λP )i = λjpij. (3.43) We can now describe the rules for a Markov chain by a definition in terms of the corresponding matrix P [52]. Definition 1. We say that (X t)t≥0 is a Markov chain with initial distribution λ = (λi : i ∈ I) and transition matrix P = (pij : i, j ∈ I) if: 1. Pr(X 0 = i0) = λi0 and 2. Pr(X t+1 = it+1 X 0 = i0, . . . , X t = it) = pitit+1. We abbreviate these two conditions by saying that (X t)t≥0 is Markov(λ, P ). In this first definition the Markov process is memoryless, resulting in only the current state of the system being required to describe its subsequent behaviour. We say that a Markov process X 0, X 1, . . . , X t has a stationary distribution if the probability distribution of X t becomes independent of the time t [53]. So, the following theorem is an easy consequence of the second condition from the first definition. Theorem 1. A discrete-time random process (X t)t≥0 is Markov(λ, P ), if and only if for all t and i0, . . . , it we have Pr(X 0 = i0, . . . , X t = it) = λi0pi0i1 ··· pit−1it. (3.44) This first theorem depicts the structure of a Markov chain, illustrating the relation with the stochastic matrix P , and defining its time-invariance property [52]. 3.3. Stability , 119 Theorem 2. Let (X t)t≥0 be M arkov(λ, P ), then for all t, s ≥ 0: 1. Pr(X t = j) = (λP t)j and 2. Pr(X t = j X 0 = i) = Pr(X t+s = j X s = i) = (P t)ij. For convenience (P t)ij can be more conveniently denoted as p(t) ij . Given this second theorem we can define p(t) ij as the t-step transition probability from the state i to j [52], and we can now introduce the concept of an invariant distribution [52], in which we say that λ is invariant if λP = λ. (3.45) The next theorem will link the existence of an invariant distribution, which is an algebraic property of the matrix P , with the probabilistic concept of an equilibrium distribution. This only applies to a restricted class of Markov chains, namely those with irreducible and aperiodic stochastic matrices. However, there is a multitude of analogous results for other types of Markov chains to which we can refer [234, 61], and the following theorem is provided as an indication of the family of theorems that apply. An irreducible matrix P is one for which, for all i, j ∈ I there are sufficiently large t, p(t) ii > 0 for ij > 0, and is aperiodic if for all states i ∈ I we have p(t) all sufficiently large t [52]. Theorem 3. Let P be irreducible, aperiodic and have an invariant distribution, λ can be any distribution, and suppose that (X t)t≥0 is Markov(λ, P ) [52], then Pr(X t = j) → p∞ j as t → ∞ for all j ∈ I and ij → p∞ p(t) j as t → ∞ for all i, j ∈ I. (3.46) (3.47) We can now view a system S as a countable set of states I with implicitly defined transitions P between them, and at time t the state of the system is the random variable X t, with the key assumption that (X t)t,0 is Markov(λ, P ) [52]. Definition 2. The system S is said to be stable when the distribution of the its states converge to an equilibrium distribution, Pr(X t = j) → p∞ j as t → ∞ f or allj ∈ I. (3.48) 120 , Chapter 3. Investigation of Digital Ecosystems More intuitively, the system S, a stochastic process X 0,X 1,X 2,... is stable if the probability distribution of X t becomes independent of the time index t for large t [53]. Most Markov chains with a finite state-space and positive transition probabilities are examples of stable systems, because after an initialisation period they settle down on a stationary distribution [52]. A Multi-Agent System can be viewed as a system S, with the system state represented by a finite vector X, having dimensions large enough to manage the agents present in the system. The state vector will consist of one or more elements for each agent, and a number of elements to define general properties of the system state. We can then model an agent as being dead, i.e. not being present in the system, by setting the vector elements for that agent to some predefined null value [52]. 3.3.2 Extensions for Evolving Populations Extending Chli-DeWilde stability to the class of Multi-Agent Systems that make use of evolutionary computing algorithms, including our evolving Agent Populations, requires con- sideration of the following issues: the inclusion of population dynamics, and an understanding of population macro-states. 3.3.2.1 Population Dynamics First, the Multi-Agent System of an evolving Agent Population is composed of n Agent- sequences, with each Agent-sequence i in a state ξt i at time t, where i = 1, 2, . . . , n. The states of the Agent-sequences are random variables, and so the state vector for the Multi-Agent System is a vector of random variables ξt, with the time being discrete, t = 0, 1, . . . . The interactions among the Agent-sequences are noisy, and are given by the probability distributions Pr(XiY) = Pr(ξt+1 i = Xiξt = Y), 1, . . . , n, (3.49) where Xi is a value for the state of Agent-sequence i, and Y is a value for the state vector of the Multi-Agent System. The probabilities implement a Markov process [300], with the noise caused by mutations. Furthermore, the Agent-sequences are individually subjected to a selection pressure from the environment of the system, which is applied equally to all the Agent- sequences of the population. So, the probability distributions are statistically independent, and 3.3. Stability , Pr(XY) = Πn i=1 Pr(ξt+1 i = Xiξt = Y). If the occupation probability of state X at time t is denoted by pt X, then (cid:88) pt X = Pr(XY)pt−1 Y . 121 (3.50) (3.51) Y This is a discrete time equation used to calculate the evolution of the state occupation probabilities from t = 0, while equation (3.50) is the probability of moving from one state to another. The Multi-Agent System (evolving Agent Population) is self-stabilising if the limit distribution of the occupation probabilities exists and is non-uniform, i.e. p∞ X = limt→∞pt X exists for all states X, and there exist states X and Y such that X (cid:54)= p∞ p∞ Y . (3.52) (3.53) These equations define that some configurations of the system, after an extended time, will be more likely than others, because the likelihood of their occurrence no longer changes. Such a system is stable, because the likelihood of states occurring no longer changes with time, and is the definition of stability developed in [53]. While equation (3.52) is the probabilistic equivalence of an attractor 4 in a system with deterministic interactions, which we had to extend to a stochastic process because mutation is inherent in evolutionary dynamics. Although the number of agents in the Chli-DeWilde formalism can vary, we require it to vary according to the selection pressure acting upon the evolving Agent Population. We must therefore formally define and extend the definition of dead agents, by introducing a new state d for each Agent-sequence. If an Agent-sequence is in this state, ξt i = d, then it is dead and does not affect the state of other Agent-sequences in the population. If an Agent-sequence i has low fitness then that Agent-sequence will likely die, because Pr(dY) = Pr(ξt+1 i = dξt = Y) (3.54) 4 An attractor is a set of states, invariant under the dynamics, towards which neighbouring states asymptotically approach during evolution [332]. 122 , Chapter 3. Investigation of Digital Ecosystems will be high for all Y. Conversely, if an Agent-sequence has high fitness, then it will likely replicate, assuming the state of a similarly successful Agent-sequence (mutant), or crossover might occur changing the state of the successful Agent-sequence and another Agent-sequence. 3.3.2.2 Population Macro-States As we defined earlier, the state of an evolving Agent Population is determined by the collection of Agent-sequences of which it consists at a specific time t, and potentially changing state as the time t increases. So, we can define a macro-state M as a set of states with a common property, here possessing at least one copy of the current maximum fitness individual. Therefore, by its definition, each macro-state M must also have a maximal state composed entirely of copies of the current maximum fitness individual. There must also be a macro-state consisting of all the states that have at least one copy of the global maximum fitness individual, which we will call the maximum macro-state Mmax. Figure 3.18: State-Space of an Evolving Agent Population: A possible evolutionary path through the state-space I is shown, with the selection pressure of the evolutionary process driving it towards the maximal state of the maximum macro-state Mmax, which consists entirely of copies of the optimal solution, and is the equilibrium state that the system S is forever falling towards without ever quite reaching, because of the noise (mutation) within the system. We can consider the macro-states of an evolving Agent Population visually through the representation of the state-space I of the system S shown in Figure 3.18, which includes a possible evolutionary path through the state-space I. Traversal through the state-space I is directed by the selection pressure of the evolutionary process acting upon the Population S, driving it towards the maximal state of the maximum macro-state Mmax, which consists entirely of copies of the optimal solution, and is the equilibrium state that the system S is forever falling macrostatemaximal stateevolutionary pathstatemaximummacro-stateMmax 3.3. Stability , 123 towards without ever quite reaching, because of the noise (mutation) within the system. So, while this maximal state will never be reached, the maximum macro-state Mmax itself is certain to be reached, provided the system does not get trapped at local optima, i.e. the probability of being in the maximum macro-state Mmax at infinite time is one, p∞ equation (3.51). Mmax = 1, as defined from Furthermore, we can define quantitatively the probability distribution of the macro-states that the system occupies at infinite time. For a stable system, as defined by equation (3.53), the degree of instability, dins, can be defined as the entropy of its probability distribution at infinite time, dins = H(p∞ ) = −(cid:88) p∞ X logN (p∞ X ), (3.55) X where N is the number of possible states, and taking log to the base N normalises the degree of instability. The degree of instability will range between zero (inclusive) and one (exclusive), because a maximum instability of one would only occur during the theoretical extreme scenario of a non-discriminating selection pressure [149] (as shown in Figure 3.6). 3.3.3 Simulation and Results We simulated an evolving Agent Population from the Digital Ecosystem, using our simulation from section 2.3 (unless otherwise specified), seeded with an Agent-pool of 20 Agents5 for the evolutionary process. We also added the classes and methods necessary to implement our extended Chli-DeWilde stability and degree of instability, which required calculating p(t) X (cid:54)= p∞ (3.51) to estimate the stability, and p∞ The degree of instability, dins of (3.55), was also implemented in the simulation. X of (3.52) to prove the existence of p∞ X of Y from (3.53). 3.3.3.1 Stability Our evolving Agent Population (a Multi-Agent System with evolutionary dynamics) is stable if the distribution of the limit probabilities exists and is non-uniform, as defined by equations (3.52) and (3.53). The simplest case is a typical evolving Agent Population with one global 5 From optimisation improvements to the code base of the simulation, we were able to increase the size of the Agent-pool from 15 to 20 without any significant degradation in performance, within the scope of running tens of thousands of simulation runs. 124 , Chapter 3. Investigation of Digital Ecosystems optimal solution, which is stable if there are at least two macro-states with different limit occupation probabilities. We shall consider the maximum macro-state Mmax and the sub- optimal macro-state Mhalf . Where the states of the macro-state Mmax each possess at least one individual with global maximum fitness, p∞ Mmax = limt→∞p(t) Mmax = 1, while the states of the macro-state Mhalf each possess at least one individual with a fitness equal to half of the global maximum fitness, p∞ Mhalf = limt→∞p(t) Mhalf = 0, thereby fulfilling the requirements of equations (3.52) and (3.53). The sub-optimal macro-state Mhalf , having a lower fitness, is predicted to be seen earlier in the evolutionary process before disappearing as higher fitness macro-states are reached. The system S will take longer to reach the maximum macro-state Mmax, but once it does will likely remain, leaving only briefly depending on the strength of the mutation rate, as the selection pressure is non-elitist 6 (as defined in section 2.3). A value of t = 1000 was chosen to represent t = ∞ experimentally, because the simulation has often been observed to reach the maximum macro-state Mmax within 500 generations. Therefore, the probability of the system S being in the maximum macro-state Mmax at the thousandth generation is expected to be one, p1000 Mmax = 1. Furthermore, the probability of the system being in the sub-optimal macro-state Mhalf at the thousandth generation is expected to be zero, p1000 Mhalf = 0. Figure 3.19 shows, for a typical evolving Agent Population, a graph of the probability as defined by equation (3.51) of the maximum macro-state Mmax and the sub-optimal macro-state Mhalf at each generation, averaged from ten thousand simulation runs for statistical significance. The behaviour of the simulated system S was as expected, being in the maximum macro-state Mmax only after generation 178 and always after generation 482. It was also observed being in the sub-optimal macro-state Mhalf only between generations 37 and 113, with a maximum 6 Non-elitist meaning that the best individual from one generation was not guaranteed to survive to the next generation; it had a high probability of surviving into the next generation, but it was not guaranteed as it might have been mutated [90]. 3.3. Stability , 125 Figure 3.19: Graph of the Probabilities of the Macro-States Mmax and Mhalf at each Generation: The system S, a typical evolving Agent Population, was in the maximum macro-state Mmax only after generation 178 and always after generation 482. It was also observed being in the sub- optimal macro-state Mhalf only between generations 37 and 113, with a maximum probability of 0.053 (3 d.p.) at generation 61. probability of 0.053 (3 d.p.) at generation 61, and was such because the evolutionary path (state transitions) could avoid visiting the macro-state. As expected the probability of being in the maximum macro-state Mmax at the thousandth generation was one, p1000 Mmax = 1, and so the probability of being in any other macro-state, including the sub-optimal macro-state Mhalf , at the thousandth generation was zero, p1000 Mhalf = 0. A visualisation for the state of a typical evolving Agent Population at the thousandth generation is shown in Figure 3.20, with each line representing an Agent-sequence and each colour representing an Agent, with the identical Agent-sequences grouped for clarity. It shows that the evolving Agent Population reached the maximum macro-state Mmax and remained there, but as expected never reached the maximal state of the maximum macro-state Mmax, where all the Agent-sequences are identical and have maximum fitness, which is indicated by the lack of total uniformity in Figure 3.20. This was expected, because of the mutation (noise) within the evolutionary process, which is necessary to create the opportunity to find fitter (better) sequences and potentially avoid getting trapped at any local optima that may be present. 00.20.40.60.812004006008001000ProbabilityGenerationpMmaxpMhalf 126 , Chapter 3. Investigation of Digital Ecosystems Figure 3.20: Visualisation of an Evolving Agent Population at the 1000th Generation: The Population consists of multiple Agent-sequences, with each line representing an Agent-sequence, and therefore each colour representing an Agent. The identical Agent-sequences were grouped for clarity, and as expected the system S reached the maximum macro-state Mmax and remained there, but never reached the maximal state of the maximum macro-state Mmax. 3.3.3.2 Degree of Instability Given that our simulated evolving Agent Population is stable as defined by equations (3.52) and (3.53), we can determine the degree of instability as defined by equation (3.55). So, calculated from its limit probabilities, the degree of instability was dins = H(p1000) = −(cid:88) p1000 X logN (p1000 X ) = −1logN (1) X = 0, where t = 1000 is an effective estimate for t = ∞, as explained earlier. The result was as expected because the maximum macro-state Mmax at the thousandth generation was one, p1000 Mmax = 1, and so the probability of being in the other macro-states at the thousandth generation was zero. The system therefore shows no instability, as there is no entropy in the occupied macro-states at infinite time. 1451278910111213141516179341415131545678910111213141516179341415135678910111213141516179341415134578910111213141516179341415134568910111213141516179341415134567910111213141516179341415134567810111213141516179341415134567891091112131415161793414151345678910121314151617934141513456789101112141314151617934141513456789101112813141516179341415134567891011121213141516179341415134567891011121415161793414151345678910111213314151617934141513456789101112131614151617934141513456789101112131516179341415134567891011121314161793414151345678910111213141516121793414151345678910111213141516174934141513456789101112131415161734141513456789101112131415161794141513456789101112131415161793141513456789101112131415161793141513456789101112614151617934141513456789103121314151617934141513456789101112131415166934141513456789101112131415161593414151345678101011121314151617934141513456789101112131415161791141415134567891011121314151617974141513456789101112131415161793314151345678910111213141516179312141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415134567891011121314151617934141513456789101112131415161793414151345678910111213141516179341415EvolvingAgentPopulationatMaximumMacro-state:MmaxpMmax(1000)=1Agent-SequencePopulation 3.3. Stability , 3.3.3.3 Stability Analysis 127 Figure 3.21: Graph of Stability with Different Mutation and Crossover Rates: With the mutation rate under or equal to 60%, the evolving Agent Population showed no instability, with dins values equal to zero as the system S was always in the same macro-state M at infinite time, independent of the crossover rate. With the mutation rate above 60% the instability increased significantly. We then performed a stability analysis (similar to a sensitivity analysis [43]) of a typical evolving Agent Population, varying key parameters within the simulation. We varied the mutation and crossover rates from 0% to 100% in 10% increments, calculating the degree of instability, dins from (3.55), at the thousandth generation. These degree of instability values were averaged over ten thousand simulation runs, and graphed against the mutation and crossover rates in Figure 3.21. It shows that the crossover rate had little effect on the stability of our simulated evolving Agent Population, whereas the mutation rate did significantly affect the stability. With the mutation rate under or equal to 60%, the evolving Agent Population showed no instability, with dins values equal to zero as the system S was always in the same macro-state M at infinite time, independent of the crossover rate. With the mutation rate above 60% the instability increased significantly, with the system being in one of several different macro-states at infinite time; with a mutation rate of 70% the system was still very stable, having low dins values ranging between 0.08 (2 d.p.) and 0.16 (2 d.p.), but once the mutation rate was 80% or greater the system became quite unstable, shown by high dins values nearing 0.5. 020406080100204060801000.10.20.30.40.5DegreeofInstabilityCrossoverRateMutationRateDegreeofInstability 128 , Chapter 3. Investigation of Digital Ecosystems As one would have expected, an extremely high mutation rate has a destabilising effect on the stability of an evolving Agent Population. The crossover rate had only a minimal effect, because variation from crossover was limited when the Population had matured, consisting of Agent-sequences identical or very similar to one another. It should also be noted that the stability of the system is different to its performance, because although showing no instability with mutation rates below 60% (inclusive), it only reached the maximum macro-state Mmax with a mutation rate of 10% or above, while at 0% it was stable at a sub-optimal macro-state. 3.3.4 Summary None of the existing definitions we considered [64, 253, 17, 53] were directly applicable as a definition for the self-organised stability of an evolving Agent Population, but the properties of Chli-DeWilde stability [53] closely matched our intuitive understanding, and so was chosen for further investigation. It views a Multi-Agent System as a discrete time Markov chain (with potentially unknown transition probabilities) that is considered to be stable when its state, a stochastic process, has converged to an equilibrium distribution. Extending Chli-DeWilde stability to the Multi-Agent System of an evolving Agent Population required consideration of the following issues: the inclusion of population dynamics, and an understanding of population macro-states. We then built upon this to construct an entropy-based definition for the degree of instability (entropy of the limit probabilities), which was later used to perform a stability analysis of an evolving Agent Population. We then investigated the self-organised stability of evolving Agent Populations through experimental simulations, and the results showed that there was a limit probability distribution, and that it was non-uniform. Furthermore, the reaching of the maximum macro-state was confirmed by a visualisation matching the numerical results. We then applied our degree of instability to determine that there was no instability under normal conditions, and then performed a stability analysis (similar to a sensitivity analysis [43]) showing the variation of the self-organised stability under varying conditions. Collectively, the experimental results confirm that Chli-Dewilde stability has been successfully extended to evolving Agent Populations, while our definition for the degree of instability provides a macroscopic value to characterise the level of stability. We have determined an effective understanding and quantification for the self-organised stability of the evolving Agent Populations of our Digital Ecosystem. Also, our extended Chli-DeWilde 3.4. Diversity , 129 stability is applicable to other Multi-Agent Systems with evolutionary dynamics. Furthermore, our degree of instability provides a definition for the level of stability, applicable to Multi-Agent Systems with or without evolutionary dynamics. 3.4 Diversity A definition for the self-organised diversity of an evolving Agent Population should define the optimal variability, of the Agents and Agent-sequences, that emerge over time, with no initial constraints from modelling approaches for the inclusion of pre-defined specific behaviour, but capable of representing the appearance of such behaviour should it occur. None of the proposed definitions are applicable for the self-organised diversity of an evolving Agent Population. The ∈-machine modelling [64] is not applicable, because it is only defined within the context of pre-biotic populations. Neither is the Minimum Description Length [24] principle or the Prugel-Bennett Shapiro formalism [253] suitable, because they necessitate the involvement of subjective human judgement at the critical stages of model or quantifier selection. Mean Field Theory is also not applicable because of the necessity of a neighbourhood model for defining interaction, and evolving Agent Populations lack a 2D or 3D metric space for such models. So, the only available neighbourhood model becomes a distance measure on a parameter space that measures dissimilarity. However, this type of neighbourhood model cannot represent the information-based interactions between the individuals of an evolving Agent Population. We suggest that the uniqueness of Digital Ecosystems makes the application of existing definitions inappropriate for the self-organised diversity, because while we could extend a biology-centric definition for the self-organised complexity, and a computing-centric definition for the self-organised stability, we found neither of these approaches, or any other, appropriate for the self-organised diversity. The Digital Ecosystem being the digital counterpart of a biological ecosystem gives it unique properties, as discussed earlier in section 2.4. So, the evolving Agent Populations possess properties of both computing systems (e.g. agent systems) as well as biological systems (e.g. population dynamics), and the combination of these properties makes them unique. So, we will further consider the evolving Agent Populations to create a definition for their self-organised diversity. 130 , Chapter 3. Investigation of Digital Ecosystems 3.4.1 Evolving Agent Populations The self-organised diversity of an evolving Agent Population comes from the Agent-sequences it evolves, in response to the selection pressure, seeded with Agents and Agent-sequences from the Agent-pool of the Habitat in which it is instantiated. The set of Agents and Agent- sequences available when seeding an evolving Agent Population is regulated over time by other evolving Agent Populations, instantiated in response to other user requests, leading to the death and migration of Agents and Agent-sequences, as well as the formation of new Agent-sequence combinations. The seeding of existing Agent-sequences provides a direction to accelerate the evolutionary process, and can also affect the self-organised diversity; for example, if only a proportion of any available global optima is favoured. So, the set of Agents available when seeding an evolving Agent Population provides potential for the self-organised diversity, while the selection pressure of a user request provides a constraining factor on this potential. Therefore, the optimality of the self-organised diversity of an evolving Agent Population is relative to the selection pressure of the user request for which it was instantiated. While we could measure the self-organised diversity of individual evolving Agent Populations, or even take a random sampling, it will be more informative to consider their collective self- organised diversity. Also, given that the Digital Ecosystem is required to support a range of user behaviour, we can consider the collective self-organised diversity of the evolving Agent Populations relative to the global user request behaviour. So, when varying a behavioural property of the user requests according to some distribution, we would expect the corresponding property of the evolving Agent Populations to follow the same distribution. We are not intending to prescribe the expected user behaviour of the Digital Ecosystem, but investigate whether the Digital Ecosystem can adapt to a range of user behaviour in terms of the self- organised diversity. So, we will consider Uniform, Gaussian (Normal) and Power distributions for the parameters of the user request behaviour. The Uniform distribution will provide a control, while the Normal (Gaussian) distribution will provide a reasonable assumption for the behaviour of a large group of users, and the Power distribution will provide a relatively extreme variation in user behaviour. 3.4.2 Simulation and Results We simulated the Digital Ecosystem, using our simulation from section 2.3 (unless otherwise specified). We also added the classes and methods necessary to vary aspects of the user 3.4. Diversity , 131 behaviour according to different distributions, and a way to measure the related aspects of the evolving Agent Populations. This consisted of a mechanism to vary the user request properties of length and modularity, according to Uniform, Gaussian (normal) and Power distributions, and a mechanism to measure the corresponding Agent(-sequence) properties of length and number of attributes. For statistical significance each scenario (experiment) will be averaged from ten thousand simulation runs. We expect it will be obvious whether the observed behaviour of the Digital Ecosystem matches the expected behaviour from the user base. Nevertheless, we will also implement a chi-squared (χ2) test to determine if the observed behaviour (distribution) of the Agent(-sequence) properties matches the expected behaviour (distribution) from the user request properties. Given the requirement to run a minimum of sixty thousand simulation runs, ten thousand for each experiment, we adapted the code base of the simulation to take advantage of the Xgrid [159] distributed computing technology, and therefore make use of the grids mentioned in the acknowledgements. 3.4.2.1 User Request Length We started by varying the user request length according to the available distributions, expecting the length of the Agent-sequences to be distributed according to the length of the user requests, i.e. the longer the user request, the longer the Agent-sequence needed to fulfil it. We first applied the Uniform distribution as a control, and graphed the results in Figure 3.22. The observed frequencies of the Agent-sequence length mostly matched the expected frequencies, which was confirmed by a χ2 test; with a null hypothesis of no significant difference and sixteen degrees of freedom, the χ2 value was 2.588 (3 d.p.), below the critical 0.95 χ2 value of 7.962. We then applied the Gaussian distribution as a reasonable assumption for the behaviour of a large group of users, and graphed the results in Figure 3.23. The observed frequencies of the Agent-sequence length matched the expected frequencies with only very minor variations, which was confirmed by a χ2 test; with a null hypothesis of no significant difference and sixteen degrees of freedom, the χ2 value was 2.102 (3 d.p.), below the critical 0.95 χ2 value of 7.962. 132 , Chapter 3. Investigation of Digital Ecosystems Figure 3.22: Graph of Uniformly Distributed Agent-Sequence Length Frequencies: The observed frequencies of the Agent-sequence length mostly matched the expected frequencies, which was confirmed by a χ2 test; with a null hypothesis of no significant difference and sixteen degrees of freedom, the χ2 value was 2.588 (3 d.p.), below the critical 0.95 χ2 value of 7.962. Figure 3.23: Graph of Gaussian Distributed Agent-Sequence Length Frequencies: The observed frequencies of the Agent-sequence length matched the expected frequencies with only very minor variations, which was confirmed by a χ2 test; with a null hypothesis of no significant difference and sixteen degrees of freedom, the χ2 value was 2.102, below the critical 0.95 χ2 value of 7.962. 051015202530351234567891011121314151617181920FrequencyAgent-sequenceLengthExpectedObserved010203040506070801234567891011121314151617181920FrequencyAgent-sequenceLengthExpectedObserved 3.4. Diversity , 133 Figure 3.24: Graph of Power Distributed Agent-Sequence Length Frequencies: The observed frequencies of the Agent-sequence length matched the expected frequencies with some variation, which was confirmed by a χ2 test; with a null hypothesis of no significant difference and sixteen degrees of freedom, the χ2 value was 5.048 (3 d.p.), below the critical 0.95 χ2 value of 7.962. Finally, we applied the Power distribution to represent a relatively extreme variation in user behaviour, and graphed the results in Figure 3.24. The observed frequencies of the Agent- sequence length matched the expected frequencies with some variation, which was confirmed by a χ2 test; with a null hypothesis of no significant difference and sixteen degrees of freedom, the χ2 value was 5.048 (3 d.p.), below the critical 0.95 χ2 value of 7.962. There were a couple of minor discrepancies, similar to all the experiments. First, there were a small number of individual Agents at the thousandth time step, caused by the typical user behaviour of continuously creating new services (Agents). Second, while the chi-squared tests confirmed that there was no significant difference between the observed and expected frequencies of the Agent-sequence length, there was still a bias to longer Agent-sequences (solutions). Evident visually in the graphs of the experiments, and evident numerically in the chi-squared test of the Power distribution experiment as it favoured shorter Agent-sequences. The cause of this bias was most likely some aspect of bloat (as we discussed in section 2.2.3.3) that was not fully controlled. 0501001502001234567891011121314151617181920FrequencyAgent-sequenceLengthExpectedObserved 134 , Chapter 3. Investigation of Digital Ecosystems 3.4.2.2 User Request Modularity Next, we varied the user request modularity according to the available distributions, expecting the sophistication of the Agents to be distributed according to the modularity of the user requests, i.e. the more complicated (in terms of modular non-reducible tasks) the user request, the more sophisticated (in terms of the number of attributes) the Agents needed to fulfil it. We first applied the Uniform distribution as a control, and graphed the results in Figure 3.25. The observed frequencies for the number of Agent attributes mostly matched the expected frequencies, which was confirmed by a χ2 test; with a null hypothesis of no significant difference and ten degrees of freedom, the χ2 value was 1.049 (3 d.p.), below the critical 0.95 χ2 value of 3.940. Figure 3.25: Graph of Uniformly Distributed Agent Attribute Frequencies: The observed frequencies for the number of Agent attributes mostly matched the expected frequencies, which was confirmed by a χ2 test; with a null hypothesis of no significant difference and ten degrees of freedom, the χ2 value was 1.049 (3 d.p.), below the critical 0.95 χ2 value of 3.940. We then applied the Gaussian distribution as a reasonable assumption for the behaviour of a large group of users, and graphed the results in Figure 3.26. The observed frequencies for the number of Agent attributes appeared to follow the expected frequencies, but there was significant variation which led to a failed χ2 test; with a null hypothesis of no significant difference and ten degrees of freedom, the χ2 value was 50.623 (3 d.p.), not below the critical 0.95 χ2 value of 3.940. 010020030040050060056789101112131415FrequencyNumberofAttributesperAgentExpectedObserved 3.4. Diversity , 135 Figure 3.26: Graph of Gaussian Distributed Agent Attribute Frequencies: The observed frequencies for the number of Agent attributes appeared to follow the expected frequencies, but there was significant variation which led to a failed χ2 test; with a null hypothesis of no significant difference and ten degrees of freedom. Figure 3.27: Graph of Power Distributed Agent Attribute Frequencies: The observed frequencies for the number of Agent attributes appeared to follow the expected frequencies, but there was significant variation which led to a failed χ2 test; with a null hypothesis of no significant difference and ten degrees of freedom. 025050075010001250150056789101112131415FrequencyNumberofAttributesperAgentExpectedObserved050010001500200056789101112131415FrequencyNumberofAttributesperAgentExpectedObserved 136 , Chapter 3. Investigation of Digital Ecosystems Finally, we applied the Power distribution to represent a relatively extreme variation in user behaviour, and graphed the results in Figure 3.27. The observed frequencies for the number of Agent attributes appeared to follow the expected frequencies, but there was significant variation which led to a failed χ2 test; with a null hypothesis of no significant difference and ten degrees of freedom, the χ2 value was 61.876 (3 d.p.), not below the critical 0.95 χ2 value of 3.940. In all the experiments the observed frequencies of the number of Agent attributes appeared to follow the expected frequencies, but this could only be confirmed statistically, by a χ2 test, for the Uniform distribution experiment. In the Gaussian and Power distribution experiments the χ2 tests failed by considerable margins, most likely because the evolving Agent Populations were still self-organising to match the user behaviour, shown by the observed frequencies approaching the expected frequencies, but not yet sufficiently to meet χ2 tests, because by the thousandth time step (user request event) each user had placed an average of only ten requests. 3.4.3 Summary None of the existing definitions we considered [64, 24, 253, 95] were applicable as a definition for the self-organised diversity of the evolving Agent Populations. So, we further considered the unique properties resulting from information-centric Digital Ecosystems being the digital counterpart of energy-centric biological ecosystems, creating our own definition for the self- organised diversity of an evolving Agent Population, relative to the selection pressure provided by a user request. We then considered the collective self-organised diversity of the evolving Agent Populations relative to the global user request behaviour. Therefore, when varying a behavioural property of the user requests according to some distribution, we expected the corresponding property of the evolving Agent Populations to follow the same distribution. We used the Uniform distribution to provide a control, the Normal (Gaussian) distribution to provide a reasonable assumption for the behaviour of a large group of users, and the Power distribution to represent a relatively extreme distribution in user behaviour. We then investigated the self-organised diversity of evolving Agent Populations through experimental simulations. First, varying the user request length according to the different distributions, and testing whether the observed frequencies of the Agent-sequence length matched the expected frequencies, which we confirmed with successful chi-squared tests. Second, varying the user request modularity according to the different distributions, and testing whether the observed frequencies for the number of Agent attributes matched the expected frequencies, 3.5. Summary and Discussion , 137 again confirming with chi-squared tests. Under the Gaussian and Power distributions the chi- squared tests failed, most likely because the evolving Agent Populations were still self-organising to match the user behaviour, because at the time the Digital Ecosystem was sampled each user had placed an average of only ten requests. Collectively, the experimental results confirm that the self-organised diversity of the evolving Agent Populations is relative to the selection pressures of the user base, which was confirmed statistically for most of the experiments. So, we have determined an effective understanding and quantification for the self-organised diversity of the evolving Agent Populations of our Digital Ecosystem. While the minor experimental failures, in which the Digital Ecosystem responded more slowly than in the other experiments, have shown that there is potential to optimise the Digital Ecosystem, because the evolutionary self-organisation of an ecosystem is a slow process [29], even the accelerated form present in our Digital Ecosystem. 3.5 Summary and Discussion We have investigated the self-organising behaviour of Digital Ecosystems, because a primary motivation for our research is the desire to exploit the self-organising properties of biological ecosystems [173], which are thought to be robust, scalable architectures that can automatically solve complex, dynamic problems. Over time a biological ecosystem becomes increasingly self-organised through the process of ecological succession [29], driven by the evolutionary self- organisation of the populations within the ecosystem. Analogously, a Digital Ecosystem’s increasing self-organisation comes from the Agent Populations being evolved to meet the dynamic selection pressures created by requests from the user base. The self-organisation of biological ecosystems is often defined in terms of the complexity, stability, and diversity [150], which we also applied in defining the self-organisation of our Digital Ecosystems. We started by discussing the relevant literature, including the philosophical meaning of organisation and of self, learning that self-organisation is context dependent, and that a system is only self - organising if the process or force causing the organisation is within its boundaries. So, we compared and contrasted alternative definitions [64, 24, 253, 48, 8, 17, 53, 95] for the self- organised complexity, stability, and diversity of the evolving Agent Populations, examining their suitability and application, because possessing properties of computing systems (e.g. agent 138 , Chapter 3. Investigation of Digital Ecosystems systems) as well as biological systems (e.g. population dynamics), the combination of these properties makes the evolving Agent Populations unique. None of the existing definitions we considered [64, 24, 253, 48, 8] were directly applicable as a definition for the self-organised complexity of evolving Agent Populations, but the properties of Physical Complexity [8] closely matched our intuitive understanding, and so was chosen for further investigation. Based upon information theory and entropy, it provides a measure of the quantity of information in the genome of a population, relative to the environment in which it evolves, by calculating the entropy in the population to determine the randomness in the genome [8]. Reformulating Physical Complexity for an evolving Agent Population required consideration of the following issues: the mapping of the sequence sites to the Agent-sequences, and the managing of populations of variable length sequences. We then built upon this to construct a variant of the Physical Complexity called the Efficiency, because it was based on the efficiency of information storage in Physical Complexity, which we then used to develop an understanding of clustering and atomicity within evolving Agent Populations. Collectively, the experimental results confirm that Physical Complexity has been successfully extended to evolving Agent Populations. Most significantly, Physical Complexity has been reformulated algebraically for populations of variable length sequences, which we have confirmed experimentally through simulations. Our Efficiency definition provides a universally applicable macroscopic value to characterise the complexity of a population, independent of clustering, atomicity, length (variable or same), and size. So, we have determined an effective understanding and quantification for the self-organised complexity of the evolving Agent Populations of our Digital Ecosystem. The understanding and techniques we have developed have applicability beyond evolving Agent Populations, as wide as the original Physical Complexity, which has been applied from DNA [7] to simulations of self-replicating programmes [172]. None of the existing definitions we considered [64, 253, 17, 17, 53] were directly applicable as a definition for the self-organised stability of evolving Agent Populations, but the properties of Chli-DeWilde stability [53] closely matched our intuitive understanding, and so was chosen for further investigation. It views a Multi-Agent System as a discrete time Markov chain (with potentially unknown transition probabilities) that is considered to be stable when its state, a stochastic process, has converged to an equilibrium distribution. Extending Chli-DeWilde stability to the Multi-Agent System of an evolving Agent Population required consideration of the following issues: the inclusion of population dynamics, and an understanding of 3.5. Summary and Discussion , 139 population macro-states. We then built upon this to construct an entropy-based definition for the degree of instability (entropy of the limit probabilities), which was used to perform a stability analysis (similar to a sensitivity analysis [43]) of an evolving Agent Population. Collectively, the experimental results confirm that Chli-Dewilde stability has been successfully extended to evolving Agent Populations, while our definition for the degree of instability provides a macroscopic value to characterise the level of stability. So, we have determined an effective understanding and quantification for the self-organised stability of the evolving Agent Populations of our Digital Ecosystem. Also, our extended Chli-DeWilde stability is applicable to other Multi-Agent Systems with evolutionary dynamics. Furthermore, our degree of instability is applicable to all Multi-Agent Systems, with or without evolutionary dynamics. None of the existing definitions we considered [64, 24, 253, 95] were applicable as a definition for the self-organised diversity of evolving Agent Populations. So, we further considered the unique properties resulting from information-centric Digital Ecosystems being the digital counterpart of energy-centric biological ecosystems, creating our own definition for the self-organised diversity of an evolving Agent Population relative to the selection pressure provided by a user request. We then considered the collective self-organised diversity of the evolving Agent Populations relative to the global user request behaviour. Therefore, when varying a behavioural property of the user requests according to some distribution, we expected the corresponding property of the evolving Agent Populations to follow the same distribution. We used the Uniform distribution to provide a control, the Normal (Gaussian) distribution to provide a reasonable assumption for the behaviour of a large group of users, and the Power distribution to provide a relatively extreme distribution in user behaviour. Collectively, the experimental results confirm that the self-organised diversity of the evolving Agent Populations is relative to the selection pressures of the user base, which was confirmed statistically for most of the experiments. So, we have determined an effective understanding and quantification for the self-organised diversity of the evolving Agent Populations of our Digital Ecosystem. While the minor experimental failures, in which the Digital Ecosystem responded more slowly than in the other experiments, have shown that there is potential to optimise the Digital Ecosystem, because the evolutionary self- organisation of an ecosystem is a slow process [29], even the accelerated form present in our Digital Ecosystem. Overall an insight has been achieved into where and how self-organisation occurs in our Digital Ecosystem, and what forms this self-organisation can take and how it can be quantified. The hybrid nature of the Digital Ecosystem resulted in the most suitable definition for the self- 140 , Chapter 3. Investigation of Digital Ecosystems organised complexity coming from the biological sciences, while the most suitable definition for the self-organised stability coming from the computer sciences. However, we were unable to use any existing definition for the self-organised diversity, because the hybrid nature of the Digital Ecosystem makes it unique, and so we constructed our own definition based on variation relative to the user base. The (Physical) complexity definition applies to a single point in time of the evolving Agent Populations, whereas the (Chli-DeWilde) stability definition applies at the end of these instantiated evolutionary processes, while our diversity definition applies to the optimality of the distribution of the Agents within the evolving Agent Populations of the Digital Ecosystem. The experimental results have generally supported the hypotheses, and have provided more detail to the behaviour of the self-organising phenomena under investigation, showing some of its properties and for the self-organised diversity has shown that there is potential for optimising the Digital Ecosystem. In this chapter we have investigated the emergent self-organising properties of Digital Ecosystems, and with the greater and more in-depth understanding we have developed and gained of the order constructing processes (the evolving Agent Populations), including a clearer identification of the potential areas and scopes for augmentation, we will attempt the optimisation of Digital Ecosystems in the following chapter, Chapter 4, for which the results here have confirmed the potential for optimisation identified in the previous chapter, Chapter 2. Chapter 4 Optimisation of Digital Ecosystems In this chapter we attempt the acceleration and optimisation of Digital Ecosystems, because the evolutionary self-organisation of ecological succession (the formation of a mature ecosystem) is a slow process, even the accelerated form present in our Digital Ecosystem. First, we consider the scope for optimisation identified in the previous chapters, and the potential for augmentations from the biological sciences. Consolidating this understanding we propose, construct and explore alternative augmentations to accelerate or optimise the evolutionary and ecological self- organising dynamics of our Digital Ecosystems. The most promising, the clustering catalyst and the targeted migration, were completed theoretically, before being investigated experimentally to determine their improvement on the evolutionary and ecological dynamics in responding to the needs of the user base; the first aiming to optimise the evolutionary dynamics, while the second aiming to optimise the ecological dynamics. First, the clustering catalyst operates upon an evolutionary process, encouraging intra-cluster crossover to accelerate reaching the optimal solution, directly accelerating a core operation of the Digital Ecosystem. A suitable existing clustering algorithm and a Physical Complexity based one were both evaluated for the required clustering. Second, the targeted migration operates on the ecological dynamics, allowing the Agents to interact for additional highly targeted migration, indirectly optimising a global operation of the Digital Ecosystem. Both Neural Networks and Support Vector Machines were evaluated for the required pattern recognition and learning functionality. We conclude with a summary and discussion of the achievements, including the experimental results. 141 142 , Chapter 4. Optimisation of Digital Ecosystems 4.1 Background Theory We proposed that an ecosystem inspired approach would be more effective at greater scales than traditionally inspired approaches, because it would be built upon the scalable and self-organising properties of biological ecosystems [173]. So, a Digital Ecosystem, being the digital counterpart of biological ecosystems, possesses their scalable self-organising behaviour, properties and processes. However, the self-organising process of ecological succession is a slow one, the orderly and predictable changes in the composition and structure of an ecological community in forming a mature ecosystem [29], even the accelerated form present in our Digital Ecosystem. Therefore, it may be possible to accelerate and optimise this equivalent process of our Digital Ecosystem. The scope for optimisation and acceleration was identified and confirmed in the previous chapters. First, identified by the results of Chapter 2, specifically the ecological succession experiment (section 2.3.6) in which the Digital Ecosystem reached only 70% responsiveness, clearly showing potential for improvement. Second, confirmed by the results of Chapter 3, specifically two of the modularity scenarios of the self-organised diversity experiment (section 3.4.2.2), in which the Digital Ecosystem responded more slowly in these scenarios than others, confirming the potential for improvement. Therefore, there is scope for optimising and accelerating the equivalent process of ecological succession in our Digital Ecosystem. In biological ecosystems the trajectory of ecological change can be influenced by site conditions, by the interactions of the species present, and by more stochastic factors such as the availability of colonists or seeds, or weather conditions at the time of disturbance [312]. So, ecological optimisation is generally concerned with the maintenance of diversity and stability, for the survival of populations, species, habitats, etc [323, 3, 224], and ecological acceleration is similarly concerned with the re-establishment of diversity and stability, through optimal species selection and promotion [201, 181, 336]. Therefore, biological ecosystems research has no focus on the type of optimisation or acceleration we require, which is unsurprising, because one of the fundamental differences between biological and digital ecosystems lie in the motivation and approach of their researchers; given that biological ecosystems are ubiquitous natural phenomena whose maintenance is crucial to our survival [20], whereas Digital Ecosystems are a technology engineered to serve specific human purposes. So, we are unlikely to find augmentations from biological ecosystems to optimise our Digital Ecosystem. 4.2. Alternative Augmentations , 143 The optimisation of Digital Ecosystems sought is not that of parameter optimisation, which is achievable through exploratory programming [294], but an augmentation to the Ecosystem- Oriented Architecture that provides a significant improvement in performance, i.e. better solutions for the users than the Digital Ecosystem alone could achieve. In the previous chapter we have investigated the emergent self-organising properties of Digital Ecosystems, and with the greater and more in-depth understanding we have developed and gained of the order constructing processes (the evolving Agent Populations), including a clearer identification of the potential areas and scopes for augmentation, we will now propose, construct and explore alternative augmentations to accelerate or optimise the evolutionary and ecological self-organising dynamics of our Digital Ecosystem. The most promising will be completed theoretically and then investigated experimentally through simulations. 4.2 Alternative Augmentations Any proposed augmentation should improve the process of ecological succession [29] for our Digital Ecosystem. So, based on the understanding and results from the previous chapters, our general knowledge, and our intuition, we will now propose, construct, and explore possible alternative augmentations for our Digital Ecosystem that fulfils this requirement. 4.2.1 Clustering Catalyst A significant proportion of user requests will be returned multiple optimal responses (applica- tions), by evolving Agent Populations consisting of clusters as defined in the previous chapter. So, potential exists to accelerate these evolving Agent Populations with clusters by a clustering catalyst, which would encourage intra-cluster crossover, reducing the number of generations required for the clusters to reach their respective optimal genomes (applications), therefore directly accelerating the evolutionary self-organisation in determining applications (Agent- sequences) to user requests. So, accelerating the responsiveness of the Digital Ecosystem to the user base, and the process of ecological succession [29]. Crossover involves the crossing of two Agent-sequences, leading to recombination in the creation of new Agent-sequences, during the replication stage of the evolutionary cycle [13]. This 144 , Chapter 4. Optimisation of Digital Ecosystems augmentation would encourage inter-cluster crossover within the evolving Agent Populations, with the aim of directly accelerating them in to find the optimal Agent-sequence(s) in fewer generations. As each evolving Agent Population within the Digital Ecosystem would be accelerated, the entire ecosystem would operate more efficiently. Figure 4.1: Clustering Catalyst: This would encourage intra-cluster crossover, reducing the number of generations required for the clusters to reach their respective optimal genomes (applications), therefore directly accelerating the evolutionary self-organisation in determining applications (Agent-sequences) to user requests. So, accelerating the responsiveness of the Digital Ecosystem to the user base, and the process of ecological succession [29]. This augmentation has considerable potential to optimise the evolving Agent Populations of Digital Ecosystems, but to be effective the determination of clusters needs to be computationally negligible, otherwise the overall effect would be counterproductive. While evolving Agent Populations would find the optimal application (Agent-sequence) within fewer generations, more time overall would be required. Our work on clustering with Physical Complexity, from section 3.2.2.3, may prove useful for this augmentation. migrating AgentHabitatAgent-poolAgentPopulationapplication(Agent-sequence)Population(GA)Clustering CatalystHHH 4.2. Alternative Augmentations , 145 4.2.2 Replacement Aggregator Evolutionary computing [90] was chosen exclusively for the aggregation (combinatorial optimi- sation [240]) of the Agents into optimal Agent-sequences (applications), without comparison to other techniques, because are focus was creating the digital counterpart of biological ecosystems. If we were to assume it might not be the optimal technique, we could consider a replacement aggregator to perform the aggregation of the Agents with an alternative technique, potentially accelerating the responsiveness of the Digital Ecosystem to the user base, and the process of ecological succession [29]. Replacement Aggregator: This would work by treating the evolving Agent Figure 4.2: Population, the embodiment of evolutionary computing in Digital Ecosystems, as an interchangeable module, and considering a replacement aggregator to perform the aggregation of the Agents with an alternative technique, potentially accelerating the responsiveness of the Digital Ecosystem to the user base, and the process of ecological succession [29]. This augmentation would work by treating the evolving Agent Population, the embodiment of evolutionary computing in Digital Ecosystems, as an interchangeable module. It also assumes a more effective aggregator can be found to perform the combinatorial optimisation [240] that occurs in response to a user request, on the set of Agents and Agent-sequences available from the Agent-pool of a Habitat. As each Agent aggregation process within the Digital Ecosystem would be accelerated, the entire ecosystem would operate more efficiently. migrating AgentHabitatAgent-poolAgentReplacement Aggregatorapplication(Agent-sequence)Replacement AggregatorHHH 146 , Chapter 4. Optimisation of Digital Ecosystems This augmentation could even allow for a range of available aggregators, choosing the most effective depending on the user, or on a case-by-case basis. However, replacing the evolutionary mechanism of the Digital Ecosystem with an alternative technique would weaken its Ecosystem- Oriented Architecture; potentially risking the loss of valuable behaviour, such as emergent self- organisation, scalability and sustainability, imbibed from creating the digital counterpart of biological ecosystems. So, while the modular nature of the Ecosystem-Oriented Architecture of Digital Ecosystems makes this augmentation possible, it would not be prudent. 4.2.3 Agent-Pool Aggregation The appealing vision of the Agent-pool aggregation is that of the Agents intelligently recombining with one another, joining and leaving Agent-sequences of their own accord to improve the responsiveness of the Digital Ecosystem, allowing for the creation of potentially useful applications (Agent-sequences) or partial applications inside the Agent-pools, increasing Figure 4.3: Agent-Pool Aggregation: This augmentation allows for the creation of potentially useful applications (Agent-sequences) or partial applications inside the Agent-pools, increasing and optimising the recombination that occurs globally within the Digital Ecosystem. So, it would help to optimise the Agent-sequences at the Agent-pools of the Habitats, which would in turn optimise the evolving Agent Populations, as they make use of the Agent-pools. migrating AgentHabitatAgent-poolAgentXXXPopulation(GA)Agent-Pool AggregationHHH 4.2. Alternative Augmentations , 147 and optimising the recombination that occurs globally within the Digital Ecosystem. So, it would help to optimise the Agent-sequences at the Agent-pools of the Habitats, which would in turn optimise the evolving Agent Populations, as they make use of the Agent-pools when determining applications (Agent-sequences) to user requests. Therefore, accelerating the process of ecological succession [29], and so the responsiveness of the Digital Ecosystem to the user base. This augmentation would work by providing the Agents with the opportunity to interact inside the Agent-pools and the ability to determine whether to recombine with one another, outside the evolutionary optimisation of the evolving Agent Populations. For the Agents to judge potential re-combinations, they will require an understanding of the context in which they would operate, most importantly the past user requests of the Habitat where the recombination would occur. So, this augmentation would optimise the set of Agents and Agent-sequences at the Agent- pools, and therefore indirectly optimise and accelerate the evolving Agent Populations within the Digital Ecosystem. As each evolving Agent Population within the Digital Ecosystem would be accelerated, the entire ecosystem would operate more efficiently. This augmentation would strengthen the Agent concept within the Ecosystem-Oriented Architecture of Digital Ecosystems, endowing the individual Agents with some intelligence and control over their behaviour. However, a sophisticated process would be required for the Agents to evaluate a potential recombination, considering their descriptions with other Agents’ descriptions collectively, within the context of the past user requests handled by the Habitat where the recombination is to occur. Additionally, a scalable mechanism would be required to determine which re-combinations the Agents should evaluate, because generally it will be impractical to evaluate all the re-combinations possible at any one time. Interestingly, the effectiveness of this augmentation relies on the local interactions of the Agents, producing an emergent global optimising effect on the evolving Agent Populations to accelerate the ecological succession of a Digital Ecosystem. 4.2.4 Targeted Migration The self-organised diversity experiments from the previous chapter, showed that the Digital Ecosystem can be slow to optimally distribute the Agents, within the Habitat network, relative to the user request behaviour. So, potential exists to optimise the distribution of the Agents within the Habitat network, through additional targeted migration of the Agents, which would 148 , Chapter 4. Optimisation of Digital Ecosystems Figure 4.4: Targeted Migration: This augmentation would optimise the distribution of the Agents within the Habitat network, through additional targeted migration of the Agents, helping to optimise the Agents found at the Agent-pools of the Habitats, which would in turn optimise the evolving Agent Populations. So, accelerating the process of ecological succession [29], and therefore the responsiveness of the Digital Ecosystem to the user base. indirectly optimise the evolving Agent Populations. The migration probabilities between the Habitats produces the existing passive Agent migration, allowing the Agents to spread in the correct general direction within the Habitat network, based primarily upon success at their current location. This augmentation will work in a more active manner, allowing the Agents highly targeted migration to specific Habitats, in addition to the generally directed passive migration. It will help to optimise the Agents found at the Agent-pools of the Habitats, which would in turn optimise the evolving Agent Populations as they make use of the Agent-pools when determining applications (Agent-sequences) to user requests. So, accelerating the process of ecological succession [29], and therefore the responsiveness of the Digital Ecosystem to the user base. This augmentation would work by providing the Agents with the opportunity to interact inside the Agent-pools, outside of the evolutionary optimisation of the evolving Agent Populations, to determine if they are functionally similar based on their semantic descriptions. Similar Agents will compare their migration histories to determine Habitats where they could find a niche (i.e. migrating AgentHabitatAgent-poolAgenttemporary link for targeted migrationPopulation(GA)Targeted MigrationHHH 4.2. Alternative Augmentations , 149 be valuable). This would lead to additional highly targeted migration of Agents throughout the Habitat network, optimising the set of Agents and Agent-sequences at the Agent-pools, and therefore indirectly optimising and accelerating the evolving Agent Populations within the Digital Ecosystem. As each evolving Agent Population within the Digital Ecosystem would be accelerated, the entire ecosystem would operate more efficiently. This augmentation would strengthen the Agent concept within the Ecosystem-Oriented Architecture of Digital Ecosystems, endowing the individual Agents with some intelligence and control over their behaviour. Interestingly, the effectiveness of this augmentation relies on the local interactions of the Agents, producing an emergent global optimising effect on the evolving Agent Populations to accelerate the ecological succession of a Digital Ecosystem. 4.2.5 Choice of Augmentation Figure 4.5: Effect of The Proposed Augmentations: The effect of the different augmentations on the evolutionary dynamics (the evolving Agent Populations) and the ecological dynamics (the Habitats). This separation of concerns is an artificial construct, but useful in summarising the potential of the different augmentations, before we decide upon which to pursue. The question of which of the alternative augmentations are most promising, and therefore which we should pursue to theoretical completion and then experimental confirmation, is not obvious. The evolving Agent Populations are the embodiment of evolutionary computing [90] in Digital Ecosystems, while the Habitats are the embodiment of the ecology-based computing we have developed for Digital Ecosystems. So, we will start by considering the effect of the different augmentations on the evolutionary dynamics (the evolving Agent Populations) and the ecological dynamics (the Habitats), as shown in Figure 4.5. This separation of concerns is Evolutionary Dynamics(effect on)Ecological Dynamics(effect on)directindirectdirectindirectTargeted MigrationClusteringCatalystAgent-Pool AggregationReplacement AggregatorEcosystem Dynamics(effect on) 150 , Chapter 4. Optimisation of Digital Ecosystems an artificial construct, but useful in summarising the potential of the different augmentations, before we decide upon which to pursue. The clustering catalyst has potential to accelerate evolving Agent Populations with clusters, and therefore the process of ecological succession [29]. However, a computationally negligible technique is needed to determine the required clustering, else the overall effect will be counterproductive. Nevertheless, we will pursue this augmentation further; first to theoretical completion, and then to experimental simulations for confirmation. The replacement aggregator could prove effective for using a range of techniques when finding the optimal aggregation of the Agents into Agent-sequences in response to user requests. However, it would weaken the Ecosystem-Oriented Architecture of Digital Ecosystems and presume more effective techniques than evolutionary computing [90] can be found for the combinatorial optimisation [240] of the Agent aggregation. The first point would obviously be undesirable, potentially risking the loss of valuable behaviour, such as emergent self- organisation, scalability and sustainability, imbibed from creating the digital counterpart of biological ecosystems. Regarding the second point, it has been shown [270] that when considering the combinatorial optimisation of Agent aggregation as the weighted set-cover problem that evolutionary computing and simulated annealing are more effective than steepest descent, Tabu search, and random search. Also that evolutionary computing is more widely applicable (without performance degradation) than simulated annealing [270]. So, while there may be other applicable techniques that have not been evaluated, the certainty of success with this augmentation is considerably reduced, and therefore will not be pursued further. The Agent-pool aggregation could prove very effective in optimising and accelerating the process of ecological succession [29], but the computational cost would be considerable, most likely making it impractical. So, while we are optimistic regarding the potential success of this augmentation theoretically, the experimental impracticality leads us not to pursue it any further. The targeted migration also has considerable potential to optimise and accelerate the process of ecological succession [29], by improving the migration of Agents through the Habitat network of the Digital Ecosystem. Also, it would directly address the scope for optimisation identified from the self-organised diversity experiment of section 3.4.2.2. Furthermore, it is the only augmentation to effect the ecological dynamics directly, which makes it desirable to pursue, because while evolution may be well understood in computer science under the auspices of 4.3. Clustering Catalyst , 151 evolutionary computing [90], ecology until our efforts had not been widely explored. So, there is inherently more potential to improve the ecological dynamics than the evolutionary dynamics, and therefore more potential in this augmentation than the others. However, creating a mechanism for the Agents to determine if they are functionally similar with one another based on their semantic descriptions will be a challenge. Nevertheless, we will pursue this augmentation further; first to theoretical completion, and then to experimental simulations for confirmation. 4.3 Clustering Catalyst The clustering catalyst will directly optimise the evolutionary self-organisation of evolving Agent Populations with clusters, by encouraging intra-cluster crossover. Crossover involves the crossing of two Agent-sequences in the creation of new Agent-sequences, during the replication stage of the evolutionary cycle [13]. Theoretical completion of the clustering catalyst requires consideration of how best to determine the clusters within an evolving Agent Population, so we will now consider suitable clustering algorithms. 4.3.1 Clustering We have understood clustering, within the context of evolving Agent Populations, as the amassing of same or similar sequences around an optimum genome [29], but more generally clustering is the classification of objects into different groups, or more precisely, the partitioning of a data set into subsets (clusters), so that the data in each subset share some common trait, often proximity according to a distance measure [139]. If the number of clusters k is not apparent from prior knowledge, several methods are available for its determination [210]. For our simulations we will make use of prior knowledge to determine the number of clusters k, because if available it is obviously the most effective method, and because our focus is on determining the effectiveness of the clustering catalyst. Naturally, the most suitable method for determining the number of clusters can be investigated if the clustering catalyst proves to be effective. An important step in any clustering is to select a distance measure, which calculates the similarity of two elements [139]. We will use a distance measure based on our simulated fitness 152 , Chapter 4. Optimisation of Digital Ecosystems function from section 2.3.3, because it is itself based on a distance metric. So, given two Agent- sequences A and B, consisting of a set of attributes a1, a2, ... and b1, b2, ... respectively, the distance between them will be distance(A, B) = (cid:88) b∈B b − a, (4.1) where a is the member of A such that the difference to the required attribute b is minimised. A range of clustering algorithms are available, to the extent that taxonomies having been proposed [113, 142] for their classification. The top-level classification being between hierarchical and partitional algorithms, both of which we shall now explore. 4.3.1.1 Hierarchical Clustering Hierarchical clustering builds (agglomerative), or breaks up (divisive), a hierarchy of clusters [142]. The traditional representation of this hierarchy is a tree (called a dendrogram), with individual elements at one end and a single cluster containing every element at the other [139]. Agglomerative algorithms begin at the leaves of the tree, whereas divisive algorithms begin at the root [142]. Agglomerative clustering starts with all the objects as individual clusters, which are then merged according to their similarities until all are fused into a single cluster, with the most similar objects being grouped first [139]. The similarity criterion is determined by the linkage analysis, for which there are three common forms [239]: • Single-link (nearest neighbour or minimum distance) [291]: is obtained by fusing clusters according to the distance between their nearest members. • Complete-link (farthest neighbour or maximum distance) [151]: clusters according to the distance between their farthest members. is obtained by fusing • Average-link (average distance) [239]: is obtained by fusing clusters according to the average distance between pairs of members in the respective sets. Most hierarchical agglomerative clustering algorithms are variants of the single-link, complete- link and average-link algorithms [142]. Most notably, the minimum-variance algorithm [324], which is a variant of the average-link algorithm, except instead of minimising an average 4.3. Clustering Catalyst , 153 distance it minimises a squared distance weighted by cluster size [220]. The single-link and complete-link algorithms are the most popular [142]. However, the single-link algorithm suffers from a chaining effect [225], which tends to produce clusters that are straggly or elongated [142]. In contrast, the complete-link algorithm produces tightly bound or compact clusters [15]. While the average-link algorithm [239] is designed to reduce the dependence of the cluster- linkage criterion on extreme values, such as the most similar or dissimilar of the single-link and complete-link algorithms [239], and results in clusters that tend to have approximately equal within-cluster variability [167]. The minimum-variance algorithm tends to join clusters with a small number of observations first, being strongly biased to producing clusters with the same number of observations, and therefore is very sensitive to outliers [211]. Divisive clustering methods start with one cluster containing all the objects, which are successively separated into smaller subgroups until the number of clusters equals the number of objects [142]. There are two forms: monothetic, which divides the data by the possession of a single specified attribute, and polythetic, where divisions are based on several attributes [142]. Agglomerative algorithms make clustering decisions based on local patterns without initially considering the global distribution, and these early decisions cannot be undone; while divisive clustering benefits from complete information about the global distribution when making top- level partitioning decisions [190]. It also has the advantage of being more efficient if we do not generate a complete hierarchy all the way down to the individual objects [190]. However, divisive clustering is conceptually more complex than agglomerative clustering, since a second flat clustering algorithm is required as a subroutine [190]. There are also graph-theoretic divisive clustering algorithms, with the best-known based on the construction of the minimal spanning tree of the data, deleting the edges with the largest lengths to generate the clusters [340]. 4.3.1.2 Partitional Clustering A partitional clustering algorithm determines a single partition of the data [142], instead of a clustering structure such as the dendrogram produced by a hierarchical algorithm [139]. Partitional algorithms usually produce clusters by optimising a criterion function defined either locally (on a subset of the patterns) or globally (defined over all the patterns) [142]. A combinatorial search for the set of possible labellings, to determine the optimum value of a criterion, is clearly computationally prohibitive, and so in practise the algorithm is run multiple times with different starting states, with the best configuration being used as the output of 154 , Chapter 4. Optimisation of Digital Ecosystems the clustering [142]. Partitional algorithms have advantages in applications involving large data sets for which the construction of a dendrogram is computationally prohibitive [142]. A problem accompanying partitional algorithms is choosing the number of desired output clusters beforehand [84], which is not required for hierarchical clustering. There are many forms of partitional clustering algorithms, including mixture-resolving [139], mode-seeking [139], nearest neighbour [180], fuzzy clustering [339], artificial neural networks [280], and others [142]. The most intuitive and frequently used criterion function in partitional clustering algorithms is the squared error criterion, which tends to work well with isolated and compact clusters [142]. The most commonly used algorithm employing a squared error criterion is the k-means algorithm [187], popular because it is easy to implement [147]. It starts with a random initial partition and keeps reassigning the patterns to clusters, based on the similarity between a pattern and the cluster centres, until a convergence criterion is met [187]. However, a major problem with this algorithm is that it is sensitive to the selection of the initial partition, and may converge to a local optimum of the criterion function value if the initial partition is not properly chosen [105]. 4.3.1.3 Choice of Algorithm The choice of the optimal clustering algorithm very much depends on the structure of the data, because clustering is subjective, such that the same data can be partitioned differently for different purposes [142]. We also require a clustering algorithm with a negligible computational cost for the clustering catalyst to be effective. So, we choose a hierarchical clustering algorithm over a partitional one, as it is more appropriate for small data sets [142], such as expected from an evolving Agent Population with clusters. We choose a hierarchical agglomerative clustering algorithm over a divisive one, because it is conceptually simpler [190], and because the efficiency advantage [190] of a divisive algorithm would be negligible, given the small size of the expected data set. Finally, we choose a hierarchical agglomerative average-link clustering algorithm of time complexity O(n2 log n) [190], over a single-link one of O(n2) time complexity, a complete-link one of O(n2 log n) time complexity, or a minimum-variance one of O(n2) time complexity [71], because the average-link algorithm is designed to reduce the dependence of the cluster-linkage criterion on extreme values, such as the most similar or dissimilar of the single-link and complete-link algorithms [239]; and because the minimum-variance algorithm is biased to producing clusters with the same number of objects [211], which would be problematic 4.3. Clustering Catalyst , 155 for clusters emerging over the generations. Any difference in execution time of the algorithms would be minimal, despite the different algorithmic time complexities, because of the small size of the expected data set n, the Population size. So, we choose a hierarchical agglomerative average-link clustering algorithm [239] for our clustering catalyst. 4.3.2 Physical Complexity Clustering We also considered a clustering algorithm based on our extended Physical Complexity from Chapter 3, because clustering is subjective in nature [142], and our extended Physical Complexity was developed, in section 3.2.2.3, to understand the clustering of evolving Agent Populations. In our algorithm, with the number of clusters k determined also from prior knowledge, we first sort the evolving Agent Population, then process its Agent-sequences linearly, adding each to the cluster that maximises the Efficiency Ec (3.42) of the Population. The pre-assignment sorting ensures that the cores of the clusters are established for the Efficiency Ec to have the necessary sensitivity when assigning the Agent-sequences of greater uniqueness. The pseudocode for our algorithm is shown in Figure 4.6. clusters[k]; group duplicate Agent-sequences within the Population order the groups within Population by greatest size for each Agent-sequence in the ordered Population XXif a duplicate and not first instance XXXX then: assign to same cluster as first instance XXXX else: the cluster that maximises the Efficiency Ec of the Population XXend if end for Figure 4.6: Pseudo-Code for Physical Complexity Clustering: With the number of clusters k determined from prior knowledge, we first sort the evolving Agent Population, then process its Agent-sequences linearly, adding each to the cluster that maximises the Efficiency Ec (3.42) of the Population. The pre-assignment sorting is for the Efficiency Ec to have the necessary sensitivity when assigning the Agent-sequences of greater uniqueness. Our algorithm will be computationally negligible, because, based on the pseudo-code, it will have a time complexity of O(n2), where n is the Population size. It will also be as accurate 156 , Chapter 4. Optimisation of Digital Ecosystems as an exhaustive search, which would have and exponential time complexity, because of the sensitivity of the Efficiency Ec when assigning the Agent-sequences to the clusters. Now that the clustering catalyst is theoretically complete, with two alternative clustering algorithms, we can confirm its effect experimentally through simulations. 4.4 Targeted Migration The targeted migration will directly optimise the ecological migration, and therefore indirectly complement the evolutionary self-organisation of the evolving Agent Populations, through the highly targeted migration of the Agents to their niche Habitats. The migration probabilities between the Habitats produces the existing passive Agent migration, allowing the Agents to spread in the correct general direction within the Habitat network, based primarily upon success at their current location. The targeted migration will work in a more active manner, allowing the Agents highly targeted migration to specific Habitats, based upon their interaction with one another to discover Habitats where they could be valuable (i.e. find a niche). Theoretical completion of the targeted migration requires further consideration of how it will operate, including its effect on the Agent life-cycle, and a suitable pattern recognition [140] technique for the required similarity recognition. The targeted migration will occur when users deploy their services, specifically when deploying their representative Agents to their Habitats within the Digital Ecosystem, and upon the execution of applications (groups of services), specifically the resulting passive migration of their representative Agent-sequences between the Habitats. The Agent-sequences arriving at Habitats, with respect to the targeted migration, will be treated as individual Agents arriving at the Habitats. So, an Agent arriving at a Habitat interacts one-on-one with Agents already present within the Agent-pool of the Habitat, and upon determining functional similarity, based upon comparing their semantic descriptions, will share other Habitats successfully visited from their respective migration histories. An Agent migration history, as defined in section 2.2.2.1, is the migratory path of the Agent through the Habitat network, including its use at the Habitats visited. So, similar Agents can share their migration histories to discover new Habitats where they could be valuable, and then use targeted migration (via a copy, and not a move) to explore the most promising of the recently acquired Habitats. This will allow successfully interacting Agents to target specific Habitats where they will potentially be useful, 4.4. Targeted Migration , 157 Figure 4.7: Agent Life-Cycle With Targeted Migration: The Agent life-cycle, defined in section 2.2.4.3, will change to support the targeted migration, as shown by the blue circle. Specifically, there will be more opportunities for Agent migration, but more importantly these opportunities will be for targeted migration, which will help to optimise the set of Agents found at the Habitats. but risks potentially infinite targeted migration, because targeted migration itself can lead to further targeted migration. So, each Agent will require a dynamic targeted migrations counter, which defines the number of permitted targeted migrations of the Agent. This counter will be incremented upon an Agent’s execution in response to a user request, and decremented upon performing a targeted migration. The Agent life-cycle, defined in section 2.2.4.3, will change to support the targeted migration, as shown in Figure 4.7 by the blue circle. Specifically, there will be more opportunities for Agent migration, but more importantly these opportunities will be for targeted migration, which will help to optimise the set of Agents found at the Habitats, and therefore support the evolving Agent Populations created in response to user requests for applications. The targeted migration will essentially short-circuit the hierarchical topology of the Habitat network, which is what allows it to specialise and localise to communities, providing specific solutions to specific requests from specific users. However, the targeted migration will also reinforce the hierarchical topology of the Habitat network, because targeted migration between connected Habitats will accelerate the existing migration of Agents, while between unconnected Habitats will assist the Digital Ecosystem in supporting emerging communities. So, the targeted migration will help strengthen and catalyse the formation of clusters within the Habitat network, and will also assist in locating Habitats within the correct clusters. Therefore, the optimisation of the Digital Ecosystem will be a global emergent effect resulting from the local interactions of the Agents, allowing for niches to be fulfilled faster and so accelerating the process of ecological evolving Agent Populationfor solution (Agent-sequence)register solution at Agent-pool of HabitatexecuteAgent-sequenceuser requestAgent migrationdeploy Agent to Agent-pool of HabitatAgent to Agentinteraction 158 , Chapter 4. Optimisation of Digital Ecosystems succession [29]. Also, the Digital Ecosystem will adapt faster to changing environmental conditions (e.g. changes in the request behaviour of user communities). In biological terms the targeted migration endows the Agents with a form of reciprocal altruistic behaviour [311], consistent with the Agent paradigm of the Ecosystem-Oriented Architecture. 4.4.1 Similarity Recognition For the targeted migration to work successfully an effective technique will be required for the similarity recognition between the semantic descriptions of two Agents. Each Agent will have an embedded similarity recognition component to maintain the consistency of the Agent paradigm of Ecosystem-Oriented Architectures. So, the Agents will interact one-on-one to determine functional similarity based upon their semantic descriptions, using their embedded similarity recognition components, with each of the two interacting Agents determining similarity for themselves. Again, this is to maintain the consistency of the Agent paradigm. Similarity recognition between the semantic descriptions of two Agents will require some form of pattern recognition, because there is no single standard for the semantic description of services [42], and adopting one over the others would be inconsistent with the inclusive nature of Digital Ecosystems. So, we will now consider the field of pattern recognition to determine suitable techniques for the similarity recognition components to be embedded within the Agents. Pattern recognition aims to classify data (patterns) based on priori knowledge or on statistical information extracted from the data [262]. Pattern recognition requires a sensor or sensors for data acquisition, a pre-processing technique, a data representation scheme, and a decision making model [140]. Also, learning from a set of examples (training set) is an important and desirable feature of most pattern recognition systems [262]. The four best known approaches for pattern recognition are [140]: • Template Matching • Statistical Classification • Structural Matching • Neural Networks These approaches are not necessarily independent, and sometimes the same pattern recognition method exists with different interpretations [140]. For example, attempts have been made to design hybrid systems involving multiple approaches, such as the notion of attributed grammars which unifies structural and statistical pattern recognition [102]. 4.4. Targeted Migration , 159 4.4.1.1 Template Matching Template Matching is the simplest and earliest approach to pattern recognition, and involves a generic operation to determine the similarity between two entities (points, curves, or shapes) of the same type [140]. A template (typically, a 2D shape) is available, with the pattern to be recognised being matched against the stored template, while considering all allowable changes translation, rotation and scale [140]. The similarity measure, often a correlation, may be optimised based on a training set, and often the template itself is defined from a training set [140]. Template Matching is computationally demanding, but the availability of ever faster processors has made it more feasible [140]. While effective for some application domains, it has several disadvantages [233]. For instance, poor performance if the patterns are distorted from the imaging process or a viewpoint change, or if there are large intra-class variations among the patterns [140]. Deformable template models [121] or rubber sheet deformations [16] can help to compensate when the deformation cannot be easily explained or modelled directly. 4.4.1.2 Statistical Classification In Statistical Classification each pattern is represented in terms of d features or measurements, and is viewed as a point in a d-dimensional feature space, with the goal being to choose those features that allow pattern vectors belonging to different categories to occupy compact and disjoint regions in the d-dimensional feature space [328]. The effectiveness of which is determined by how well patterns from different classes can be separated [140]. The decision boundaries of the d-dimensional feature space can be determined from probability distributions, of the patterns belonging to each class, which must be specified or learnt [80, 86]. One can also take a discrimination analysis based approach to classification, in which a parametric form of a decision boundary is specified, and then the best decision boundary of the specified form is found based on the classification of training patterns [140]. Such boundaries can be constructed using, for example, a mean squared error criterion [328]. These direct boundary construction approaches are supported by the philosophy [317] that if you possess a restricted amount of information for solving some problem, try to solve the problem directly and never solve a more general problem as an intermediate step, because it is possible that the 160 , Chapter 4. Optimisation of Digital Ecosystems available information is sufficient for a direct solution but insufficient for solving a more general intermediate problem. Statistical approaches are generally characterised by having an explicit underlying probability model, which provides a probability of being in each class and not just a classification, and hence some human intervention is assumed regarding variable selection and transformation, and the overall structuring of the problem [206]. 4.4.1.3 Structural Matching In Structural Matching a hierarchical perspective is adopted, where a pattern is viewed as being composed of simple sub-patterns, which are built from yet simpler sub-patterns [246], and therefore it is applicable to many recognition problems involving complex patterns [140]. The elementary (simplest) sub-patterns to be recognised are called primitives, with the given complex pattern to be represented in terms of the interrelationships between these primitives [246]. Where the structure is syntactic, a formal analogy is drawn between the structure of patterns and the syntax of language. So, the primitives are viewed as the alphabet of the language, and the patterns are viewed as sentences generated according to the grammar of the language [102]. Thus, a large collection of complex patterns can be described by a small number of primitives and grammatical rules, which must be inferred from the available training samples [140]. Structural pattern recognition is intuitively appealing because, in addition to classification, it also provides a description of how the given pattern is constructed from the primitives [140]. It is used in situations where the patterns have a definite structure that can be captured by a set of rules, such as electrocardiogram waveforms [310], textured images [129], and the shape analysis of contours [179]. However, the implementation of structural approaches leads to many difficulties, including the segmentation of noisy patterns (to detect primitives) and the inference of grammar from training data [140]. There can also be a combinatorial explosion of possibilities to be investigated, demanding large training sets and significant computational effort [248]. 4.4.1.4 Neural Networks Neural Networks (NNs) can be viewed as massively parallel computing systems consisting of an extremely large number of simple processors with many interconnections [262]. NN models 4.4. Targeted Migration , 161 attempt to use certain organisational principles (such as learning, generalisation, adaptivity, fault tolerance, distributed representation, and computation) in a network of weighted directed graphs, in which the nodes are artificial neurons, and the directed edges (with weights) are connections between the neuron outputs and inputs [262]. The main characteristics of NNs are their ability to learn complex nonlinear input-output relationships, use sequential training procedures, and adapt themselves to the data [140]. The most commonly used family of NNs for pattern classification tasks is the feed-forward network, including multilayer perceptrons, which are organised into layers and has unidirec- tional connections between the layers [140]. Another popular network is the Self-Organising Map, or Kohonen-Network [153], which is often used for feature mapping [140]. The increasing popularity of NN models to solve pattern recognition problems has been primarily because of their low dependence on domain-specific knowledge (relative to model-based and rule-based approaches) and the availability of efficient learning algorithms [140]. The learning process involves updating the network architecture and connection weights so that a network can efficiently perform a specific classification [262]. NNs provide a suite of nonlinear algorithms for feature extraction (using hidden layers) and classification (e.g. multilayer perceptrons) [140]. In addition, existing feature extraction and classification algorithms can be mapped onto NN architectures for efficient (hardware) implementation [39]. Despite the seemingly different underlying principles, most of the well- known NN models are implicitly equivalent or similar to classical statistical pattern recognition methods [140]. However, NNs offer several advantages, such as unified approaches for feature extraction and classification, and flexible procedures for finding good, moderately nonlinear solutions [140]. 4.4.1.5 Support Vector Machines One of the most interesting recent developments in classifier design is the introduction of the Support Vector Machine (SVM) [316], which is primarily a two-class classifier, and therefore highly suitable for the required similarity recognition component of our targeted migration. It uses an optimisation criterion that is the width of the margin between the classes, i.e. the empty area around the decision boundary defined by the distance to the nearest training patterns [41]. These patterns, called support vectors, define the classification function, and their number is minimised by maximising the margin [41]. This is achieved through a kernel function K, which 162 , Chapter 4. Optimisation of Digital Ecosystems transposes the data into a higher-dimensional space where a hyperplane performs the separation [41]. In its simplest form the kernel function is just a dot product between the input pattern and a member of the support set, resulting in a linear classifier, while nonlinear kernel functions lead to a polynomial classifier [140]. SVMs are closely related to Neural Networks, being a close cousin to classical multilayer perceptrons, with the use of a sigmoid kernel function making them equivalent to two-layer perceptrons [1]. However, in the training of NNs, such as multi-layer perceptrons, the weights of the network are found by solving a non-convex unconstrained minimisation problem, while the use of a kernel function in SVMs solves a quadratic programming problem with linear constraints [276]. An important advantage of SVMs is that they offer the possibility to train generalisable nonlinear classifiers in high-dimensional spaces using a small training set [313]. Furthermore, for large training sets a small support set is typically selected for designing the classifier, thereby minimising the computational requirements during training [313]. 4.4.1.6 Choice of Technique Template Matching is not suitable for the required pattern recognition of our targeted migration, because its effective use is domain specific [140] and the similarity recognition between the semantic descriptions of Agents is very different to the domains that it is typically applied [233]. Statistical Classification is also not suitable, because the embedded similarity recognition component of each Agent would require human intervention for variable selection and transformation [206]. Structural Matching is suitable theoretically, but implementations lead to many difficulties [140], including the segmentation of noisy patterns (to detect primitives) and the inference of grammar from training data [140]. There can also be a combinatorial explosion of possibilities to be investigated, demanding large training sets and significant computational effort [248], neither of which is available. Neural Networks are suitable, given their low dependence on domain-specific knowledge and the availability of efficient learning algorithms [140]. Support Vector Machines, albeit a recent development [316], are also suitable [145], being primarily a binary classifier [140] for training generalisable nonlinear classifiers in high-dimensional spaces using small training sets [313]. So, we will make use of both Neural Networks and Support Vector Machines for the theoretical completion and implementation of our targeted migration. 4.4. Targeted Migration , 163 4.4.2 Neural Networks So, in the first instance, we will leverage the pattern recognition capabilities of Neural Networks (NNs) for the embedded similarity recognition components of the Agents, allowing them to determine similarity to one another based on the similarity of their semantic descriptions. We will use multilayer perceptrons (feed-forward artificial NNs) with backpropagation [131] to provide the required pattern recognition behaviour, because of their ability to solve problems stochastically, which allows for approximate solutions to extremely complex problems [131]. They are a modification of the standard linear perceptron [268], using three or more layers of neurons (nodes) with nonlinear activation functions to distinguish data that is not linearly separable, or separable by a hyperplane [35]. The power of the multilayer perceptron comes from its similarity to certain biological neural networks in the human brain, and because of their wide applicability has become the standard algorithm for any supervised-learning pattern recognition process [131]. A pre-processing [35] of Agent semantic descriptions will be required that is consistent across the entire Digital Ecosystem, requiring an alphabetical ordering of the attribute tuples within a semantic description, a standardisation of the length of the attributes, before finally making use of a binary encoding for processing by a NN [35]. The assumption of information structured as tuples, including an attribute name and attribute value, is accurate for our simulated semantic descriptions, but is also a reasonable assumption for any semantic description of web services [87, 205, 72, 42]. To standardise the length of the attributes, after removing any white-space1, an average word length of six characters will be used, because 5.39 is the average word length for business English [100]. For the binary encoding we propose using Unicode (UTF-8), which is based on extending ASCII to provide multilingual support [108]. However, ASCII’s support of only English [108] will be sufficient for our simulations. The size (number of neurons) of the input layer [131] will be proportional to the semantic description of the Agent in which the NN is embedded, taking advantage of the variation in length of different semantic descriptions, which will assist the NN-based pattern recognition in determining dissimilarity. We will use a single hidden layer, which is usually sufficient for most tasks [35]. The size of which will be determined through exploratory programming [294] in our simulations, because of the difficulty in determining the optimal size without training several networks and estimating the 1 A white-space is any single character or series of characters that represent horizontal or vertical space in typography [101]. 164 , Chapter 4. Optimisation of Digital Ecosystems Figure 4.8: Neural Network for the Similarity Recognition Component of Agents in Targeted Migration: Consisting of an input layer proportional to the semantic description of the Agent in which it is embedded. A single hidden layer, and an output layer consisting of a single neurone to provide a binary response to the question of whether another Agent’s semantic description is similar. generalisation error [274], evident by the range of inconsistent rules of thumb [37, 302, 34, 38] available to define the optimal size. The output layer [35] will consist of a single neurone to provide a binary (true or false) response to the question of whether another Agent’s semantic description is similar to the Agent’s own semantic description. We will use a threshold of 0.90 on its output for the determination of similarity. The overall structure of the Neural Network is visualised in Figure 4.8. Multilayer perceptrons use nonlinear activation functions, which were developed to model the frequency of action potentials (firing) of biological neurons in the brain [131]. The main activation function used in current applications is the sigmoid function [131], a hyperbolic tangent that is normalised and in which the output y of a neurone is the sum of the weighted input values x [35], y = 1 (1 + e−x) . (4.2) The weights x between the neurons will be randomly initialised, then trained to the real numbers that provide the desired functionality, because learning occurs in the perceptron by changing the connection (synaptic) weights after each piece of data is processed, based on the error of the output compared to the expected result [35]. This is an example of supervised learning and is carried out through backpropagation, a generalisation of the least mean squares algorithm InputHiddenOutput 4.4. Targeted Migration , 165 [131]. The network is therefore trained by providing it with input and corresponding output patterns [35]. The NN-based embedded similarity recognition component of an Agent will be trained when the Agent is deployed to a Habitat of the Digital Ecosystem. The initial training set will consist of the semantic description of the Agent as a positive match, and variants created from its own semantic description. If the variant is less than 10% different it will be processed as a positive match, else it will be processed as a negative match. The training set can be extended based on experience, making use of when an Agent visits a Habitat through targeted migration (i.e. one acquired from an inter-Agent interaction); if visiting the Habitat proves successful the semantic description of the interacting Agent can be appended to the training set as a positive match, else as a negative match. 4.4.3 Support Vector Machines In the second instance, we will leverage the pattern recognition capabilities of Support Vector Machines (SVMs) for the embedded similarity recognition components of the Agents, allowing them to determine similarity to one another based on the similarity of their semantic descriptions. As SVMs are closely related to Neural Networks, being a close cousin to classical multilayer perceptrons [1], we will make use of the pre-processing and the training sets defined in the previous subsection, which will also ensure a fair comparison of the pattern recognition techniques in empowering the similarity recognition components of the Agents. The selection of a suitable kernel function is important, since it defines the feature space in which the training set is classified [62], operating as shown in Figure 4.9. A Radial Basis Functions (RBF) is recommended for text categorisation [145], with the most common form of the RBF being Gaussian [123]. Training a SVM requires solving a large quadratic programming (QP) optimisation problem, which Sequential Minimal Optimisation (SMO) breaks into a series of the smallest possible QP problems. SMO solves these small QP problems analytically, which avoids using a time-consuming numerical QP optimisation. SMO scales between linear and quadratic time 166 , Chapter 4. Optimisation of Digital Ecosystems Figure 4.9: Support Vector Machine (modified from [304]): Visualisation showing the training set in the Input Space, and its binary classification by a hyperplane in the higher dimensional Feature Space, achieved through the kernel function. A Radial Basis Functions (RBF) is recommended for text categorisation [145], with the most common form of the RBF being Gaussian [123]. complexity, relative to the size of the training set, because it avoids matrix computation [250]. The alternative, a standard Projected Conjugate Gradient (PCG) chunking algorithm scales between linear and cubic time complexity, relative to the size of the training set [250]. So SMO is faster, up to a thousand times on real-world sparse data sets [250]. The issue of the learnt behaviour of the embedded similarity recognition component of an Agent, whether SVM or NN based, being inherited when the Agent reproduces is known as the Baldwin effect [19]. The Baldwin effect has always been controversial within biological ecosystems [329], primarily because of the problem of confirming it experimentally [298]. Also, offspring in biological ecosystems can be genetically different to their parents [29], such that any learnt behaviour could potentially be inappropriate. However, the offspring in our Digital Ecosystem are genetically identical to their parents (in terms of the individual Agents), and so it makes little sense to force the loss of learnt behaviour. Therefore, we doubt that the Baldwin effect will adversely affect our Digital Ecosystem, which we will confirm through our simulations. Now that the targeted migration is theoretically complete, with two alternative pattern recognition techniques, we can confirm its effect experimentally through simulations. kernel functionFeature SpaceInput Space 4.5. Simulation and Results , 167 4.5 Simulation and Results We simulated the Digital Ecosystem using our simulation from section 2.3 (unless otherwise specified), adding the classes and methods necessary to implement the proposed clustering catalyst and targeted migration augmentations. Each experimental scenario was run ten thousand times for statistical significance of the means and standard deviations calculated. 4.5.1 Clustering Catalyst We implemented the clustering catalyst as defined in sections 4.2.1 and 4.3, with the clusters determined by hierarchical agglomerative average-link clustering or our Physical Complexity clustering. We also made use of our simulations from Chapter 3 to simulate evolving Agent Populations with between two and six clusters, varied according to a Gaussian distribution, with the crossover rate increased from 10% to 25% to provide a greater opportunity for the clustering catalyst to operate. 4.5.1.1 Control The clustering catalyst benefited from the additional crossover, which alone could have been responsible for any observed optimisation, because it increased recombination [168] in the evolving Agent Populations. So, increasing variation in the exploration of solutions, potentially reducing the number of generations required to evolve the optimal solution. Therefore, our experimental simulations included a crossover control for the additional crossover, which excluded the clustering catalyst. 4.5.1.2 Hierarchical Clustering We started with the hierarchical agglomerative average-link clustering [239] based clustering catalyst, as defined in section 4.3.1, making use of RapidMiner [256] to perform the required clustering. In Figure 4.10 we graphed for the simulation runs the average number of generations required to evolve the optimal solution, for the evolving Agent Populations with the hierarchical clustering based clustering catalyst, compared to the evolving Agent Populations with the crossover control, and the evolving Agent Populations alone. The evolving Agent Populations 168 , Chapter 4. Optimisation of Digital Ecosystems Figure 4.10: Graph of the Hierarchical Clustering Based Clustering Catalyst: The evolving Agent Populations alone averaged 296 (3 s.f.) generations, while the evolving Agent Populations with the crossover control showed a 9% reduction, averaging 267 (3 s.f.) generations. The evolving Agent Populations with the hierarchical clustering based clustering catalyst failed to provide any further optimisation, averaging 281 (3 s.f.) generations. alone averaged 296 (3 s.f.) generations with a standard deviation of 12.76 (2 d.p.), while the evolving Agent Populations with the crossover control showed a 9% reduction, averaging 267 (3 s.f.) generations with a standard deviation of 8.91 (2 d.p.). The evolving Agent Populations with the hierarchical clustering based clustering catalyst failed to provide any further optimisation, averaging 281 (3 s.f.) generations with a standard deviation of 20.25 (2 d.p.). 4.5.1.3 Physical Complexity Clustering Next we considered the Physical Complexity based clustering catalyst, as defined in section 4.3.2, making use of our simulations from section 3.2.3. In Figure 4.11 we graphed for the simulation runs the average number of generations required to evolve the optimal solution, for the evolving Agent Populations with the Physical Complexity based clustering catalyst, compared to the evolving Agent Populations with the hierarchical clustering based clustering catalyst, the evolving Agent Populations with the crossover control, and the evolving Agent Populations ClusteringCatalyst(Hierarchical)CrossoverControlAgentPopulations050100150200250300AverageNumberofGenerationstoEvolvetheOptimalSolutionScenario281267296 4.5. Simulation and Results , 169 Figure 4.11: Graph of the Physical Complexity Based Clustering Catalyst: The evolving Agent Populations with the Physical Complexity based clustering catalyst averaged 274 (3 s.f.), better than the evolving Agent Populations with the hierarchical clustering based clustering catalyst which averaged 281 (3 s.f.) generations, but still worse than the evolving Agent Populations with the crossover control which averaged 267 (3 s.f.) generations. alone. The evolving Agent Populations with the Physical Complexity based clustering catalyst averaged 274 (3 s.f.) generations with a standard deviation of 17.53 (2 d.p.), better than the evolving Agent Populations with the hierarchical clustering based clustering catalyst which averaged 281 (3 s.f.) generations with a standard deviation of 20.25 (2 d.p.), but still worse than the evolving Agent Populations with the crossover control which averaged 267 (3 s.f.) generations with a standard deviation of 8.91 (2 d.p.). Additional experiments were conducted in which we varied several different parameters to determine if there were any conditions under which the clustering catalyst was effective. The varied parameters included the population size, the mutation rate and the crossover rate. However, extensive testing through multiple scenarios failed to show any significant reduction in the number of generations required to evolve the optimal solution. So, confirming that the evolving Agent Populations with the clustering catalyst were less effective than the evolving Agent Populations with the crossover control. As the clustering catalyst was unsuccessful, in Figure 4.12 we graphed a typical run of each scenario to observe its behaviour and so better ClusteringCatalyst(Phy.Com.)ClusteringCatalyst(Hierarchical)CrossoverControlAgentPopulations050100150200250300AverageNumberofGenerationstoEvolvetheOptimalSolutionScenario274281267296 170 , Chapter 4. Optimisation of Digital Ecosystems Figure 4.12: Graph of Typical Runs for the Clustering Catalysts: As the clustering catalyst was unsuccessful, we graphed a typical run of each scenario to observe its behaviour and so better understand why it failed. However, there was no unexpected behaviour, confirming that the evolving Agent Populations with the clustering catalyst were simply less efficient than the evolving Agent Populations with the crossover control. understand why it failed. However, there was no unexpected behaviour, confirming that the evolving Agent Populations with the clustering catalyst were simply less efficient than the evolving Agent Populations with the crossover control. The results showed that the clustering catalyst, using hierarchical clustering [239] or Physical Complexity clustering, failed to optimise the evolutionary processes (with clusters) of the Digital Ecosystem. Additionally, typical runs of each showed no adverse behaviour, which might have explained the failure to optimise the evolutionary processes. Therefore, the results collectively confirm that the intra-cluster crossover assignment of the clustering catalyst was less efficient than the random crossover assignment of the crossover control. The clustering catalyst intuitively had potential, but most likely failed because the individuals within the evolving Agent Populations lacked sufficient complexity (relative to biological populations [29]) for the mechanism to be effective, leading to the crossing of very similar individuals, producing offspring that were very similar to their parents, and therefore not actually achieving valuable change. 020406080100100200300MaximumFitnessGenerationAgentPopulationCrossoverControlClusteringCatalyst(Phy.Com.)ClusteringCatalyst(Hierarchical) 4.5. Simulation and Results , 171 4.5.2 Targeted Migration We implemented the targeted migration as defined in sections 4.2.4 and 4.4, using both Neural Network (NN) and Support Vector Machine (SVM) based similarity recognition components embedded within the Agents. We also made use of our Xgrid [159] modifications from Chapter 3 to take advantage of the grids mentioned in the acknowledgements. 4.5.2.1 Controls The targeted migration was dependent on additional Agent migration, which alone could have been responsible for any observed optimisation, because it led to greater distribution of the Agents within the Digital Ecosystem, potentially improving responsiveness for the user base. So, we included a migration control in our experimental simulations for the additional Agent migration, being random instead of targeted. Furthermore, to determine the contribution of the NNs and SVMs on the targeted migration we created a pattern recognition control, using a rudimentary distance function adapted from the fitness function defined in section 2.3.3. In Figure 4.13 we graphed for the simulation runs the average of the percentage response rate after a thousand time steps (user request events), for the Digital Ecosystem with the migration control, and the Digital Ecosystem with the pattern recognition control, compared to the Digital Ecosystem alone. The Digital Ecosystem alone averaged a 68.0% (3 s.f.) response rate with a standard deviation of 2.61 (2 d.p.), while the Digital Ecosystem with the migration control showed a significant degradation to 49.6% (3 s.f.) with a standard deviation of 1.96 (2 d.p.), and the Digital Ecosystem with the pattern recognition control showed only a small increase to 70.5% (3 s.f.) with a standard deviation of 2.60 (2 d.p.). Therefore, any observed improvement from the targeted migration was not from the additional migration but its targeting, and that the effectiveness of the pattern recognition functionality will be significant if the targeted migration is to be effective. In Figure 4.14 we graphed a typical run of the Digital Ecosystem with the migration control, and the Digital Ecosystem with the pattern recognition control, compared to the Digital Ecosystem alone (taken from Figure 2.25). The Digital Ecosystem alone performed as expected, adapting and improving over time to reach a mature state through the process of ecological succession [29]. The Digital Ecosystem with the migration control, which included additional random migration, while initially beneficial, ultimately decreased the responsiveness of the Digital Ecosystem. 172 , Chapter 4. Optimisation of Digital Ecosystems Figure 4.13: Graph of the Targeted Migration Controls and the Digital Ecosystem: The Digital Ecosystem alone averaged a 68.0% (3 s.f.) response rate, while the Digital Ecosystem with the migration control showed a significant degradation to 49.6% (3 s.f.), and the Digital Ecosystem with the pattern recognition control showed only a small increase to 70.5% (3 s.f.). Figure 4.14: Graph of Typical Runs for the Targeted Migration Controls and the Digital Ecosystem: The Digital Ecosystem alone performed as expected, adapting and improving over time to reach a mature state. The migration control with additional random migration ultimately decreased the responsiveness, while the pattern recognition control performed only slightly better. PatternRecognitionControlMigrationControlDigitalEcosystem020406080100AverageofResponseRate(%)After1000UserRequestEventsScenario70.5%49.6%68.0%0204060801002004006008001000ResponseRate(%matchtouserrequest)Time(userrequestevents)DigitalEcosystemMigrationControlPatternRecognitionControl 4.5. Simulation and Results , 173 Finally, the Digital Ecosystem with the pattern recognition control performed only marginally better than the Digital Ecosystem alone. 4.5.2.2 Neural Networks We started with the NN-based targeted migration, as defined in section 4.4.2. We made use of Joone (Java Object Oriented Neural Engine) [194] to implement the required NNs, and exploratory programming [294] to determine that a hidden layer 1.5 times the size of the input layer was effective for the NN-based similarity recognition components. In Figure 4.15 we graphed for the simulation runs the average of the percentage response rate after a thousand time steps (user request events), for the Digital Ecosystem with the NN-based targeted migration, compared to the Digital Ecosystem alone. The Digital Ecosystem alone averaged a 68.0% (3 s.f.) response rate with a standard deviation of 2.61 (2 d.p.), while the Digital Ecosystem with the NN-based targeted migration showed a significant improvement to a 92.1% (3 s.f.) response rate with a standard deviation of 2.22 (2 d.p.). Figure 4.15: Graph of Neural Networks Based Targeted Migration: The Digital Ecosystem alone averaged a 68.0% (3 s.f.) response rate with a standard deviation of 2.61 (2 d.p.), while the Digital Ecosystem with the NN-based targeted migration showed a significant improvement to a 92.1% (3 s.f.) response rate with a standard deviation of 2.22 (2 d.p.). TargetedMigration(NN-based)DigitalEcosystem020406080100AverageofResponseRate(%)After1000UserRequestEventsScenario92.1%68.0% 174 , Chapter 4. Optimisation of Digital Ecosystems 4.5.2.3 Support Vector Machines Next we considered the SVM-based targeted migration, as defined in section 4.4.3, making use of LIBSVM (Library for Support Vector Machines) [50] to implement the required SVMs. In Figure 4.16 we graphed for the simulation runs the average of the percentage response rate after a thousand time steps (user request events), for the Digital Ecosystem with the SVM-based targeted migration, compared to the Digital Ecosystem with the NN-based targeted migration, and the Digital Ecosystem alone. The Digital Ecosystem with the SVM-based targeted migration averaged a 92.8% (3 s.f.) response rate with a standard deviation of 2.09 (2 d.p.), slightly better than the NN-based targeted migration at 92.1% (3 s.f.) with a standard deviation of 2.22 (2 d.p.), and so significantly better than the Digital Ecosystem alone at 68.0% (3 s.f.) with a standard deviation of 2.61 (2 d.p.). In Figure 4.17 we graphed typical runs of the Digital Ecosystem with the SVM-based targeted migration, the Digital Ecosystem with the NN-based targeted migration, and the Digital Ecosystem alone. The Digital Ecosystem alone performed as expected, adapting and improving Figure 4.16: Graph of Support Vector Machine Based Targeted Migration: The Digital Ecosystem with the SVM-based targeted migration averaged a 92.8% (3 s.f.) response rate, slightly better than the NN-based targeted migration at 92.1% (3 s.f.), and so significantly better than the Digital Ecosystem alone at 68.0% (3 s.f.). TargetedMigration(SVM-based)TargetedMigration(NN-based)DigitalEcosystem020406080100AverageofResponseRate(%)After1000UserRequestEventsScenario92.8%92.1%68.0% 4.5. Simulation and Results , 175 Figure 4.17: Graph of Typical Runs for the Digital Ecosystem and Targeted Migration: The Digital Ecosystem alone performed as expected, adapting and improving over time to reach a mature state through the process of ecological succession [29] In comparison, the Digital Ecosystem with the targeted migration, NN or SVM-based, showed a significant improvement. over time to reach a mature state through the process of ecological succession [29], approaching 70% effectiveness for the user base. The Digital Ecosystem with the targeted migration, NN or SVM-based, showed a significant improvement in the ecological succession, reaching the same performance in less than a fifth of the time, before reaching over 90% effectiveness for the user base. To show more clearly the greater effectiveness of the SVM-based targeted migration, compared to the NN-based targeted migration, we graphed in Figure 4.18 the frequency of poor matches (<50%) every one hundred time steps, for the Digital Ecosystem with the SVM-based targeted migration, compared to the Digital Ecosystem with the NN-based targeted migration, and the Digital Ecosystem alone. The results showed that the targeted migration optimised and accelerated the ecological succession [29] of our Digital Ecosystem, constructively interacting with its ecological and evolutionary dynamics. The results also showed that it was not the additional migration, but its targeting that created the improvement in the Digital Ecosystem, and that an effective pattern recognition technique was required for the targeted migration to operate effectively. Both NNs and SVMs proved to be effective, SVMs marginally more than NNs. The results also showed that there were no adverse side-effects from the Baldwin effect [19], the inheritance of learnt 0204060801002004006008001000ResponseRate(%matchtouserrequest)Time(userrequestevents)DigitalEcosystemTargetedMigration(NN-based)TargetedMigration(SVM-based) 176 , Chapter 4. Optimisation of Digital Ecosystems Figure 4.18: Graph of Frequencies for the Targeted Migration: The frequency of poor matches (<50%) every one hundred time steps, for the Digital Ecosystem with the SVM-based targeted migration, compared to the Digital Ecosystem with the NN-based targeted migration, and the Digital Ecosystem alone. It shows the greater effectiveness of the SVM-based targeted migration, compared to the NN-based targeted migration from the seven hundredth generation onwards. behaviour in the Agents from the embedded similarity recognition components, whether SVM or NN based. Finally, based on the experimental results, and our theoretical understanding, we would recommend SVMs for the pattern recognition functionality of the targeted migration. 4.6 Summary and Discussion We started by reviewing the scope for optimisation and acceleration resulting from the evolutionary self-organisation of ecological succession (the formation of a mature ecosystem) being a slow process [29], even the accelerated form present in our Digital Ecosystem, which was identified and confirmed in the previous chapters. In the results of Chapter 2, specifically the ecological succession experiment, the Digital Ecosystem reached only 70% responsiveness, identifying potential for improvement, which was confirmed by the results of Chapter 3, specifically the self-organised diversity experiment for which the Digital Ecosystem responded more slowly in some scenarios than others, confirming the potential for improvement. Furthermore, the optimisation of Digital Ecosystems sought was not that 0102030405060701002003004005006007008009001000FrequencyofMatches<50%Time(userrequestevents)DigitalEcosystemTargetedMigration(NN-based)TargetedMigration(SVM-based) 4.6. Summary and Discussion , 177 of parameter optimisation, which is achievable through exploratory programming [294], but an augmentation to the Ecosystem-Oriented Architecture providing a significant improvement in performance, i.e. better solutions for the users than the Digital Ecosystem alone could achieve. We then discovered that we would be unlikely to find optimising or accelerating augmentations for our Digital Ecosystem from biological ecosystems research, because ecological optimisation is concerned with the maintenance of diversity and stability [323, 3, 224], and ecological acceleration is similarly concerned with the re-establishment of diversity and stability [201, 181, 336]. This was unsurprising, because one of the fundamental differences between biological and digital ecosystems lie in the motivation and approach of their researchers; given that biological ecosystems are ubiquitous natural phenomena whose maintenance is crucial to our survival [20], whereas Digital Ecosystems are a technology engineered to serve specific human purposes. So, we therefore proposed, constructed, and explored several alternative augmentations to accelerate or optimise the evolutionary and ecological self-organising dynamics of our Digital Ecosystem, based on the understanding and results from the previous chapters, and our general knowledge and intuition. The clustering catalyst aimed to optimise the evolutionary self- organisation of evolving Agent Populations with clusters, by encouraging intra-cluster crossover to directly accelerate the evolving of applications (Agent-sequences) in response to user requests, and therefore the responsiveness of the Digital Ecosystem to the user base. The replacement aggregator would have replaced the use of evolutionary computing [90], for the aggregation of the Agents into optimal applications (Agent-sequences) in response to user requests, with an alternative technique, directly optimising the responsiveness of the Digital Ecosystem to the user base. The Agent-pool aggregation aimed to allow for the creation of potentially useful applications (Agent-sequences) or partial applications inside the Agent-pools, optimising the Agent-sequences found at the Agent-pools of the Habitats, which would in turn optimise the evolving Agent Populations, and therefore the responsiveness of the Digital Ecosystem to the user base. The targeted migration aimed to complement the evolving Agent Populations indirectly, with additional highly targeted migration to support the existing Agent migration between the Habitats, optimising the Agents found at the Agent-pools of the Habitats, which would in turn optimise the evolving Agent Populations, and therefore the responsiveness of the Digital Ecosystem to the user base. The replacement aggregator would have weakened the Ecosystem-Oriented Architecture of Digital Ecosystems, and the Agent-Pool aggregation would have incurred an impractical computational cost to operate, so we chose the most promising 178 , Chapter 4. Optimisation of Digital Ecosystems augmentations, the clustering catalyst and the targeted migration, to be completed theoretically and then investigated experimentally through simulations. The clustering catalyst augmentation aimed to directly optimise the evolutionary self- organisation of evolving Agent Populations with clusters, by encouraging intra-cluster crossover. Crossover involves the crossing of two Agent-sequences in the creation of new Agent-sequences, occurring during the replication stage of the evolutionary cycle [13]. Theoretical completion of the clustering catalyst required an algorithm to perform the clustering of evolving Agent Populations. So, we considered alternative clustering algorithms [142, 139, 239, 324, 180, 339, 280] for their suitability to our evolving Agent Populations. We chose a hierarchical agglomerative average-link clustering algorithm [239] for our clustering catalyst, because a hierarchical algorithm was more appropriate [142] than a partitional one for the small size of the data sets of evolving Agent Populations, and because an agglomerative algorithm was conceptually simpler than a divisive one [190], for which the efficiency advantage [190] would have been negligible given the expected size of the data sets. Also, because the average-link algorithm is designed to reduce the dependence of the cluster-linkage criterion on extreme values, such as the most similar or dissimilar of the single-link and complete- link algorithms [239]; and because the minimum-variance algorithm is biased to producing clusters with the same number of objects [211], which would have been problematic for clusters emerging over the generations. We also considered a clustering algorithm based on our extended Physical Complexity from Chapter 3, because clustering is subjective by nature [142], and our extended Physical Complexity was augmented in section 3.2.2.3 to understand the clustering of evolving Agent Populations. So, we implemented the clustering catalyst using the hierarchical agglomerative average-link clustering [239] and our Physical Complexity clustering. The results showed that the clustering catalyst, using either clustering algorithm, failed to optimise the evolutionary processes of the Digital Ecosystem. It intuitively had potential, but most likely failed because the individuals within the evolving Agent Populations lacked sufficient complexity (relative to biological populations [29]) for the mechanism to be effective, leading to the crossing of very similar individuals, producing offspring that were very similar to their parents, and therefore not actually achieving valuable change. The targeted migration augmentation aimed to directly optimise the ecological migration, and therefore indirectly complement the evolutionary self-organisation of the evolving Agent Populations, through the highly targeted migration of the Agents to their niche Habitats. The migration probabilities between the Habitats produces the passive Agent migration, 4.6. Summary and Discussion , 179 allowing the Agents to spread in the correct general direction within the Habitat network, based primarily upon success at their current location. The targeted migration works in a more active manner, allowing the Agents highly targeted migration to specific Habitats, based upon their interaction with one another to discover Habitats where they could be valuable (i.e. find a niche). Theoretical completion of the targeted migration required further consideration of how it would operate, including its effect on the Agent life-cycle, and a suitable pattern recognition [140] technique for the required similarity recognition between the semantic descriptions of the Agents. So, we considered alternative pattern recognition techniques [140, 262, 102, 233, 328, 246, 141, 123] for similarity recognition components to be embedded within the Agents. Template Matching was not suitable because its effective use is domain specific [140] and the similarity recognition between the semantic descriptions of Agents is very different to the domains that it is typically applied [233]. Statistical Classification was also not suitable, because the embedded similarity recognition component of each Agent would have required human intervention for variable selection and transformation [206]. While Structural Matching was a suitable technique theoretically, implementations have had many difficulties [140], including the segmentation of noisy patterns (to detect primitives) and the inference of grammar from training data [140]. There can also be a combinatorial explosion of possibilities to be investigated, demanding large training sets and significant computational effort [248], neither of which was available. Neural Networks (NNs) were suitable, given their low dependence on domain-specific knowledge and the availability of efficient learning algorithms [140]. Support Vector Machines (SVMs), albeit a recent development [316], were also suitable [145], being primarily a binary classifier [140] for training generalisable nonlinear classifiers in high-dimensional spaces using small training sets [313]. So, we implemented the targeted migration using both NN and SVM based similarity recognition components embedded within the Agents. The results showed that the targeted migration accelerated and optimised the ecological succession of the Digital Ecosystem, constructively interacting with its ecological and evolutionary dynamics, marginally more when powered by SVMs than NNs. So, based on the experimental results, and our theoretical understanding, we would recommend SVMs for the pattern recognition functionality of the targeted migration. The targeted migration also resulted in the Baldwin effect [19], the inheritance of learnt behaviour in the Agents, from the embedded similarity recognition components, whether SVM or NN based. While the Baldwin effect has always been controversial within biological ecosystems [329], primarily because of the problem of confirming it experimentally [298], 180 , Chapter 4. Optimisation of Digital Ecosystems it undoubtedly occurred in our Digital Ecosystem. However, the experimental results and our exploratory programming [294] showed no adverse side-effects, therefore supporting the possibility of its presence in biological ecosystems. In this chapter we attempted the acceleration and optimisation of Digital Ecosystems, because ecological succession (the formation of mature ecosystems) is a slow process [29], even the accelerated form present in our Digital Ecosystems. While not all our attempts were successful, understandable considering the constructive nature of our efforts in this chapter, we have optimised and accelerated our Digital Ecosystem through the targeted migration of its Agents. The targeted migration significantly enhanced the ecological succession, constructively interacting with the ecological and evolutionary dynamics, helping the Agents to optimise their migration and distribution within our Digital Ecosystem. Chapter 5 Conclusions 5.1 Achievements Substantial parts of our efforts are original contributions in the area of Biologically-Inspired Computing [99] and the emerging field of Digital Ecosystems, with our major research contributions being as follows: • We have created the first interpretation of Digital Ecosystems where the word ecosystem is more than just a metaphor, which we have confirmed experimentally. They are the digital counterparts of biological ecosystems: having their properties of self-organisation, scalability and sustainability [173]; created through combining understanding from the- oretical ecology [175], evolutionary theory [104], Multi-Agent Systems [249], distributed evolutionary computing [178], and Service-Oriented Architectures [228]. Furthermore, the Ecosystem-Oriented Architecture of Digital Ecosystems includes a novel form of distributed evolutionary computing, an optimisation technique working at two levels: a first optimisation, migration of Agents which are distributed in a peer-to-peer network, operating continuously in time; this process feeds a second optimisation, based on evolutionary computing, operating locally on single peers and is aimed at finding solutions that satisfy locally relevant constraints. So, the local search is improved through this twofold process to yield better local optima faster, as the distributed optimisation provides prior sampling of the search space through computations already performed in other peers with similar constraints. We have also defined the interaction of Digital Ecosystems with business ecosystems [214], specifically in supporting and enabling them to create Digital Business Ecosystems. 181 182 , Chapter 5. Conclusions • We have investigated the emergent self-organising properties of Digital Ecosystems, because a primary motivation for our research is the desire to exploit the self- organising properties [173] of biological ecosystems. We started with the evolutionary self-organisation of ecological succession [29], which conformed to expectations [136]. Next we considered the self-organisation of the order constructing processes (the evolving Agent Populations). We extended Physical Complexity [8] to include evolving Agent Populations, which required extending definitions for populations of variable length sequences, creating a measure for the efficiency of information storage, and an understanding of clustering within Populations to support the non-atomicity of Agents. We then extended Chli-DeWilde stability [53] to include the evolutionary dynamics of evolving Agent Populations, building upon this to construct an entropy-based definition for the degree of instability, which was used to study the stability of evolving Agent Populations. Finally, the unique hybrid nature of Digital Ecosystems resulted in us creating our own definition for the self-organised diversity, based on the global distribution of the Agents in the Populations relative to the request behaviour of the user base. Overall an insight has been achieved into where and how self-organisation occurs in Digital Ecosystems, including what forms it can take and how it can be quantified. • We have optimised and accelerated Digital Ecosystems, because the evolutionary self- organisation of ecological succession [29] (the formation of a mature ecosystem) is a slow process, even the accelerated form present in Digital Ecosystems. So, we considered alternative augmentations, including the accelerating effect of a clustering catalyst on the evolutionary dynamics, through the acceleration of the evolutionary processes; and the optimising effect of targeted migration on the ecological dynamics, through the emergent optimisation of the Agent migration patterns. The experimental results showed that the clustering catalyst failed, despite intuitively having potential, most likely because the individuals within the evolving Agent Populations lacked sufficient complexity (relative to biological populations [29]) for the augmentation to be effective. However, the experimental results also showed that the targeted migration optimised and accelerated the ecological succession of Digital Ecosystems, constructively interacting with the ecological and evolutionary dynamics. We also discovered that there were no adverse side-effects from the Baldwin effect [19], the inheritance of learnt behaviour, in Digital Ecosystems. Therefore, supporting the possibility of the Baldwin effect in biological ecosystems, which has always been controversial [329]. 5.2. Future Directions , 183 5.2 Future Directions Our efforts offer considerable scope for the future, with there being several interesting avenues to pursue, some of which we discuss below. 5.2.1 Ecosystems Conceptualisation Conceptualising ecosystems has been an inherent part of this work, which presents us with an opportunity to formalise our current and future efforts to improve the cross-disciplinary knowledge transfer required. 5.2.1.1 Biology of Digital Ecosystems In creating Digital Ecosystems, the digital counterpart of biological ecosystems, we naturally asked their likeness to the biological ecosystems from which they came. Further to this, we could consider the applicability of other aspects of ecosystems theory in understanding and analysing the dynamics of Digital Ecosystems. For example, energy pyramids 1 of biological ecosystems, what is their equivalent in Digital Ecosystems? Given that Digital Ecosystems are information- centric, whereas biological ecosystems are energy-centric [29], they would undoubtedly be information pyramids, but further definition would naturally require more research. 5.2.1.2 Biological Design Patterns A design pattern is a general reusable solution to a commonly occurring problem in software design [106]. It is not a finished design that can be transformed directly into code, but a description or template for how to solve a problem that can be used in many different situations [106]. For example, object-oriented design patterns typically show relationships and interactions between classes or objects, without specifying the final application classes or objects that are involved [106]. Biological Design Patterns (BDPs) would extend this concept to catalogue common interactions between biological structures using a pattern-oriented modelling approach [122], which when applied would endow software systems with the desirable properties of biological systems, such as self-organisation, self-management, scalability and sustainability. 1 Energy pyramids show the dissipation of energy at trophic levels, positions that organisms occupy in a food chain, e.g. producers or consumers [237]. 184 , Chapter 5. Conclusions 5.2.1.3 Classes of Ecosystems While evolutionary theory [104] was well understood within computer science, under the auspices of evolutionary computing [90], ecosystems theory [29], until our efforts, was not. Similarly, while evolutionary theory is well understood within linguistics [63] and economics [227], equally ecosystems theory is not [218]. So, using our efforts as a case study, we could follow the same process to create Language Ecosystems and Economic Ecosystems. For example, there are many separate efforts within linguistics using evolution to model language change [54], but there is no unifying framework, which has resulted from different linguists independently adopting elements of evolutionary theory [54]. So, we could provide a wide- ranging and encompassing definition of Language Ecosystems, which would unify the many disparate efforts in linguistics aimed at understanding language evolution. 5.2.1.4 Generic Ecosystem Definition In the creation of Digital Ecosystems we considered aspects of biological ecosystems, including Agent-Based Modelling [116] and Complex Adaptive Systems (CAS) [173], and then constructed their counterparts in Digital Ecosystems. After which we considered the possibility of a Generic Ecosystem definition, as we suggested at the end of Chapter 2, without which some of the counterparts we constructed appeared to be compromised, when they were actually the realisation of generic abstract concepts in Digital Ecosystems. Most notably the network structure, which is energy-centric in biological ecosystems [29], while information-centric in Digital Ecosystems. So, there is potential to create a Generic Ecosystem definition, using a suitable modelling technique such as CAS [322], which would abstractly define the key properties of an ecosystem, and would theoretically be applicable to any domain where the modelling technique has been applied. Therefore, the Generic Ecosystem definition would provide a framework for the application of ideas, concepts, and models from biological ecosystems to other classes of ecosystems, including Digital Ecosystems, Language Ecosystems and Economic Ecosystems. 5.2.2 Simulation Framework An open-source simulation framework for Digital Ecosystems [161] was created by the Digital Business Ecosystem (DBE) project [92], and is currently supported by the Open Philosophies for 5.2. Future Directions , 185 Associative Autopoietic Digital Ecosystems (OPAALS) project [258] to assist further research into Digital Ecosystems, including the wider implications of interacting with social systems, such as business ecosystems of Small and Medium sized Enterprises (SMEs). 5.2.3 Digital Business Ecosystems In an old market-based economy, made up of sellers and buyers, the parties exchange property [78]. While in a new network-based economy, made up of servers and clients in a business ecosystem [214], the parties share access to services and experiences [78]. Digital Ecosystems are a platform for the network-based economy of business ecosystems, providing mechanisms for the creation of Digital Business Ecosystems. 5.2.3.1 Service Futures Market One such mechanism the Digital Ecosystem could provide to the network-based economy of business ecosystems [214], would be a futures market 2 for services. As each service (Agent) consists of an executable component and a semantic description, the later acting as a guarantee of behaviour, and the evolving Agent Populations only requiring the guarantees (semantic descriptions) to operate, the actual executable component of a service (Agent) is only required once an application (Agent-sequence) has been assembled. Therefore, service (Agent) evolution could operate entirely on the semantic descriptions, with business users only needing to supply the executable component of a service (Agent) once there is a demand, i.e. when the semantic description of one of their services has been used in the construction of an application which meets the request of another business user. Therefore, creating a futures market for evolving services within Digital Business Ecosystems. 5.2.3.2 Regional Deployment A partial reference implementation [199] for our Digital Ecosystem, which includes an implementation of the targeted migration, was created by the Digital Business Ecosystems project [92], and we expect that once completed will be deployed as part of the software platform intended for the regional deployment of their Digital Ecosystems [264, 258]. Digital 2 An auction market in which participants buy and sell commodities for an agreed price, that the sellers have yet to produce [137]. 186 , Chapter 5. Conclusions Ecosystems (distributed adaptive open socio-technical systems, with properties of self- organisation, scalability and sustainability, inspired by natural ecosystems [258]) are emerging as a novel approach to the catalysis of sustainable regional development driven by Small and Medium sized Enterprises (SMEs) [258]. The community focused on the deployment of Digital Ecosystems, REgions for Digital Ecosystems Network (REDEN) [265], is supported by projects such as the Digital Ecosystems Network of regions for (4) DissEmination and Knowledge Deployment (DEN4DEK) [264], a thematic network that aims to share experiences and disseminate all the necessary knowledge that will allow regions to plan an effective deployment of Digital Ecosystems at all levels (economic, social, technical and political) to produce real impacts in the economic activities of European regions through the improvement of SME business environments. So, the next major step in our research will be to collect real world data, confirming that Digital Ecosystems operate effectively with business ecosystems in creating Digital Business Ecosystems. 5.3 Concluding Remarks The ever-increasing challenge of software complexity in creating progressively more sophisti- cated and distributed applications, makes the design and maintenance of efficient and flexible systems a growing challenge [209, 299, 193], for which current software development techniques have hit a complexity wall [184]. In response we have created Digital Ecosystems, the digital counterparts of biological ecosystems, possessing their properties of self-organisation, scalability and sustainability [173]; Ecosystem-Oriented Architectures that overcome the challenge by automating the search for new algorithms in a scalable architecture, through the evolution of software services in a distributed network. Bibliography [1] S. Abe. Support Vector Machines for Pattern Classification. Springer, 2005. [2] V. Abramov, N. Szirbik, J. Goossenaerts, T. Marwala, P. De Wilde, L. Correia, P. Mariano, and R. Ribeiro. Ontological basis for open distributed multi-agent system. In Symposium on Adaptive Agents and Multi-Agent Systems, pages 33–43. Society for the Study of Artificial Intelligence and Simulation of Behaviour, 2001. [3] P. Abrams. Foraging time optimization and interactions in food webs. The American Naturalist, 124:80–96, 1984. [4] C. Adami. Self-organized criticality in living systems. Physical Letters A, 203:29–32, 1995. [5] C. Adami. Introduction To Artificial Life. Springer, 1998. [6] C. Adami. Sequence complexity in darwinian evolution. Complexity, 8:49–56, 2003. [7] C. Adami and N. Cerf. Physical complexity of symbolic sequences. Physica D, 137:62–69, 2000. [8] C. Adami, C. Ofria, and T. Collier. Evolution of biological complexity. Proceedings of the National Academy of Sciences, 97:4463–4468, 2000. [9] A. Agiorgitis. Complex adaptive systems [online]. Available from: http://www.siliconyogi.com/andreas/it professional/sol/complexsystems/. [10] J. Anderson. Introduction to Flight. McGraw-Hill Professional, 2004. [11] W. Ashby. Principles of the self-organizing dynamic system. Journal of General Psychology, 37:125–128, 1947. [12] W. Ashby. Principles of the self-organizing system. In H. Von Foerster and G. Zopf, editors, Principles of Self-Organization, pages 255–278. Pergamon Press, 1962. [13] T. Back. Evolutionary Algorithms in Theory and Practice: Evolution Strategies, Evolutionary Programming, Genetic Algorithms. Oxford University Press, 1996. [14] T. Baeck, D. Fogel, and Z. Michalewicz, editors. Handbook of Evolutionary Computation. CRC Press, 1997. [15] R. Baeza-Yates. Introduction to data structures and algorithms related to information retrieval. In W. Frakes and R. Baeza-Yates, editors, Information Retrieval Data Structures & Algorithms, pages 13–27. Prentice Hall, 1992. 187 188 BIBLIOGRAPHY [16] R. Bajcsy and S. Kovacic. Multiresolution elastic matching. Computer Vision, Graphics, and Image Processing, 46:1–21, 1989. [17] P. Bak, C. Tang, and K. Wiesenfeld. Self-organized criticality. Physical Review A, 38:364– 374, 1988. [18] H. Balakrishnan, M. Stemm, S. Seshan, and R. Katz. Analyzing stability in wide- In S. Leutenegger, editor, International Conference on area network performance. Measurement and Modeling of Computer Systems, pages 2–12. ACM Press, 1997. [19] J. Baldwin. A new factor in evolution. American Naturalist, 30:441–451, 1896. [20] A. Balmford, A. Bruner, P. Cooper, R. Costanza, S. Farber, R. Green, M. Jenkins, P. Jefferiss, V. Jessamy, J. Madden, K. Munro, N. Myers, S. Naeem, J. Paavola, M. Rayment, S. Rosendo, J. Roughgarden, K. Trumper, and R. Turner. Economic reasons for conserving wild nature. Science, 297:950–953, 2002. [21] W. Banzhaf. Genotype-phenotype-mapping and neutral variation–a case study in genetic programming. Parallel Problem Solving from Nature III, 866:322–332, 1994. [22] W. Banzhaf. Genetic Programming. Morgan Kaufmann Publishers, 1998. [23] W. Banzhaf and W. Langdon. Some considerations on the reason for bloat. Genetic Programming and Evolvable Machines, 3:81–91, 2002. [24] A. Barron, J. Rissanen, and B. Yu. The minimum description length principle in coding and modeling. IEEE Transactions on Information Theory, 44:2743–2760, 1998. [25] W. Barthlott and C. Neinhuis. Purity of the sacred lotus, or escape from contamination in biological surfaces. Planta, 202:1–8, 1997. [26] G. Basharin. On a statistical estimate for the entropy of a sequence of independent random variables. Theory Probability and its Applications, 4:333–336, 1959. [27] BBC News. Microsoft begins windows 7 push [online]. 2009. Available from: http://news.bbc.co.uk/1/hi/technology/7817190.stm. [28] S. Beer. Decision and Control: The Meaning of Operational Research and Management Cybernetics. Wiley, 1966. [29] M. Begon, J. Harper, and C. Townsend. Ecology: Individuals, Populations and Communities. Blackwell Publishing, 1996. [30] G. Bell. The distribution of abundance in neutral communities. American Naturalist, 396:606–617, 2000. [31] B. Benatallah, M. Dumas, and Q. Sheng. Facilitating the rapid development and scalable orchestration of composite web services. Distributed and Parallel Databases, 17:5–37, 2005. [32] D. Bennett. Digital transformation in the entertainment industry - embracing the fully digital ecosystem. Technical report, Accenture, 2006. Available from: http://www.accenture.com/NR/rdonlyres/A58111E4-22E5-4DDD-B3DE-FB3741F0052 F/0/EmbracingDigitalEco.pdf. [33] J. Benyus. Biomimicry, Innovation Inspired by Nature. Harper Collins Publishers, 2002. BIBLIOGRAPHY 189 [34] M. Berry and G. Linoff. Data Mining Techniques: For Marketing, Sales, and Customer Support. Wiley, 1997. [35] C. Bishop. Neural Networks for Pattern Recognition. Oxford University Press, 1995. [36] T. Blickle and L. Thiele. A comparison of selection schemes used in evolutionary algorithms. Evolutionary Computation, 4:361–394, 1996. [37] A. Blum. Neural networks in C++: an object-oriented framework for building connectionist systems. Wiley, 1992. [38] Z. Boger and H. Guterman. Knowledge extraction from artificial neural network models. In J. Tien, editor, International Conference on Systems, Man, and Cybernetics: Computational Cybernetics and Simulation, volume 4. IEEE Press, 1997. [39] N. Botros and M. Abdul-Aziz. Hardware implementation of an artificial neural network IEEE Transactions on Industrial Electronics, using field programmable gate arrays. 41:665–667, 1994. [40] S. Bramly. Leonardo: The Artist and the Man. Penguin Books, 1994. [41] C. Burges. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 2:121–167, 1998. [42] L. Cabral, J. Domingue, E. Motta, T. Payne, and F. Hakimpour. Approaches to semantic In The Semantic Web: Research and web services: an overview and comparisons. Applications, pages 225–239. Springer, 2004. [43] D. Cacuci, M. Ionescu-Bujor, and I. Navon. Sensitivity and Uncertainty Analysis. CRC Press, 2003. [44] E. Canal. Using the ESB with e4: Applying new tendencies to CSC business integration architecture. Technical report, Computer Sciences Corporation, 2007. Available from: http://www.csc.com/aboutus/leadingedgeforum/knowledgelibrary/uploads/Using %20the%20ESB%20with%20e4%20-%20ERCanal.pdf. [45] E. Cantu-Paz. A survey of parallel genetic algorithms. R´eseaux et syst`emes r´epartis, Calculateurs Parall`eles, 10:141–171, 1998. [46] J. Cardoso and A. Sheth. Introduction to semantic web services and web process In J. Cardoso and A. Sheth, editors, Semantic Web Services and Web composition. Process Composition, pages 1–13. Springer, 2004. [47] M. Castells. The Rise of The Network Society. Blackwell Publishing, 2000. [48] G. Chaitin. Algorithmic information and evolution. In O. Solbrig and G. Nicolis, editors, Perspectives on Biological Complexity, pages 51–60. IUBS Press, 1988. [49] L. Chambers. The practical handbook of genetic algorithms: applications. CRC Press, 2001. [50] C. Chang and C. Lin. LIBSVM: A library for support vector machines. Technical report, National Taiwan University, 2008. Available from: http://www.csie.ntu.edu.tw/ cjlin/papers/libsvm.pdf. 190 BIBLIOGRAPHY [51] A. Chhatpar. Increase business agility through BRM systems and SOA: Best bets to increase ROI on your enterprise applications. Technical report, IBM Devleoper Works, 2008. Available from: http://download.boulder.ibm.com/ibmdl/pub/software/ dw/architecture/ar-brmssoa/ar-brmssoa-pdf.pdf. [52] M. Chli. Convergence and Interactivity of Multi-Agent Systems. PhD thesis, Imperial College London, 2006. [53] M. Chli, P. De Wilde, J. Goossenaerts, V. Abramov, N. Szirbik, L. Correia, P. Mariano, and R. Ribeiro. Stability of multi-agent systems. In E. Santos Jr and P. Willett, editors, International Conference on Systems, Man, and Cybernetics, pages 551–556. IEEE Press, 2003. [54] M. Christiansen and S. Kirby. Language Evolution. Oxford University Press, 2003. [55] D. Cliff and S. Grand. The creatures global digital ecosystem. Artificial Life, 5:77–93, 1999. [56] Codefarm Software Limited. Codefarm - technology for structured credit [online]. 2008. Available from: http://www.codefarm.com/ [cited 05 Feb 2008]. [57] N. Collier. Repast: An extensible framework for agent simulation. Technical report, University of Chicago, 2003. Available from: http://www.econ.iastate.edu/tesfatsi/RePastTutorial.Collier.pdf. [58] D. Comer. Internetworking with TCP/IP: principles, protocols, and architecture. Prentice Hall, 2005. [59] J. Connell and R. Slatyer. Mechanisms of succession in natural communities and their role in community stability and organization. The American Naturalist, 111:1119–1144, 1977. [60] A. Corallo, G. Passiante, and A. Prencipe. The Digital Business Ecosystem. Edward Elgar Publishing, 2007. [61] D. Cox and H. Miller. The Theory of Stochastic Processes. CRC Press, 1977. [62] N. Cristianini and J. Shawe-Taylor. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods. Cambridge University Press, March 2000. [63] W. Croft. Explaining language change. Longman, 2000. [64] J. Crutchfield and O. Gornerup. Objects that make objects: the population dynamics of structural complexity. Journal of The Royal Society Interface, 3(7):345–349, 2006. [65] J. Crutchfield and K. Young. Inferring statistical complexity. Physical Review Letters, 63:105–108, 1989. [66] F. Curbera, M. Duftler, R. Khalaf, W. Nagy, N. Mukhi, and S. Weerawarana. Unraveling IEEE Internet the web services web: An introduction to SOAP, WSDL, and UDDI. Computing, 6:86–93, 2002. [67] C. Darwin. On the Origin of Species by Means of Natural Selection. John Murray, 1859. [68] T. Davenport and J. Short. The new industrial engineering: Information technology and business process redesign. Sloan Management Review, 31:11–27, 1990. BIBLIOGRAPHY 191 [69] O. Davis. Secondary succession. Technical report, University of Arizona, 2008. Available from: http://www.geo.arizona.edu/Antevs/nats104/00lect20.html. [70] R. Dawkins. The Selfish Gene. Oxford University Press, 2006. [71] W. Day and H. Edelsbrunner. Efficient algorithms for agglomerative hierarchical clustering methods. Journal of Classification, 1:7–24, 1984. [72] J. de Bruijn, H. Lausen, A. Polleres, and D. Fensel. The web service modeling language WSML: An overview. The Semantic Web: Research and Applications, 4011:590–604, 2006. [73] L. De Castro. Fundamentals of Natural Computing: Basic Concepts, Algorithms, And Applications. CRC Press, 2006. [74] K. De Jong, D. Fogel, and H. Schwefel. A history of evolutionary computation. In Baeck et al. [14], pages 1–12. [75] F. de Toro, J. Ortega, J. Fernandez, and A. Diaz. PSFGA: a parallel genetic algorithm In F. Vajda and N. Podhorszki, editors, Euromicro for multiobjective optimization. Workshop on Parallel, Distributed and Network-based Processing, pages 384–391. IEEE Press, 2002. [76] J. de Visser and S. Elena. The evolution of sex: empirical insights into the roles of epistasis and drift. Nature Reviews Genetics, 8:139–49, 2007. [77] P. De Wilde, H. Nwana, and L. Lee. Stability, fairness and scalability of multi-agent International Journal of Knowledge-Based Intelligent Engineering Systems, systems. 3:84–91, 1999. [78] P. Delcloque and A. Bramoull´e. DISSEMINATE, an initial implementation proposal: a new point of departue in call for the ‘year 01’ ? ReCALL, 13:277–292, 2001. [79] P. Denning and R. Metcalfe. Beyond Calculation: The Next Fifty Years of Computing. Springer, 1997. [80] L. Devroye, L. Gyorfi, and G. Lugosi. A Probabilistic Theory of Pattern Recognition. Springer, 1996. [81] G. Di Marzo Serugendo, M. Gleizes, and A. Karageorgos. Self-organization in multi-agent systems. The Knowledge Engineering Review, 20:165–189, 2006. [82] P. Dini, G. Lombardo, R. Mansell, A. Razavi, S. Moschoyiannis, P. Krause, A. Nicolai, and L. Rivera Le´on. Beyond interoperability to digital ecosystems: regional innovation and socio-economic development led by SMEs. International Journal of Technological Learning, Innovation and Development, 1:410–426, 2008. [83] P. Dini and A. Nicolai. A scientific foundation for digital ecosystems. In Nachira et al. [223], pages 1–20. [84] R. Dubes. How many clusters are best? - an experiment. Pattern Recognition, 20:645–663, 1987. [85] E. Ducheyne, B. De Baets, and R. De Wulf. Is fitness inheritance useful for real-world In C. Fonseca, editor, Evolutionary Multi-criterion Optimization, pages applications. 31–42. Springer, 2003. 192 BIBLIOGRAPHY [86] R. Duda, P. Hart, and D. Stork. Pattern classification and scene analysis. Wiley, 1973. [87] S. Dustdar and W. Schreiner. A survey on web services composition. International Journal of Web and Grid Services, 1:1–30, 2005. [88] W. Ebeling. Applications of evolutionary strategies. Systems Analysis Modelling Simulation, 7:3–16, 1990. [89] A. Eiben, E. Aarts, and K. Van Hee. Global convergence of genetic algorithms: A Markov chain analysis. In H. Schwefel and R. Manner, editors, Parallel Problem Solving from Nature, pages 4–12. Springer, 1991. [90] A. Eiben and J. Smith. Introduction to Evolutionary Computing. Springer, 2003. [91] R. Ellen. Environment, Subsistence, and System: The Ecology of Small-Scale Social Formations. Cambridge University Press, 1982. [92] A. English. Digital Business Ecosystems (DBE) [online]. Available from: http://www.digital-ecosystem.org/DBE Main/about [cited 26 Jan 2008]. [93] A. English and B. Dory. The DBE and micro economics - the benefits of the DBE for SMEs [online]. 2007. Available from: http://www.digital-ecosystem.org/downloadfiles/intro mov dbe.swf. [94] C. Fiorina. The digital ecosystem [online]. 2000. Available from: http://www.hp.com/hpinfo/execteam/speeches/fiorina/ceo worldres 00.html. [95] H. Flyvbjerg, K. Sneppen, and P. Bak. Mean field theory for a simple model of evolution. Physical Review Letters, 71:4087–4090, 1993. [96] L. Fogel, A. Owens, and M. Walsh. Artificial Intelligence Through Simulated Evolution. Wiley, 1966. [97] C. Folke, S. Carpenter, B. Walker, M. Scheffer, T. Elmqvist, L. Gunderson, and C. Holling. Regime shifts, resilience, and biodiversity in ecosystem management. Annual Review of Ecology, Evolution, and Systematics, 35:557–581, 2004. [98] C. Fonseca and P. Fleming. An overview of evolutionary algorithms in multiobjective optimization. Evolutionary Computation, 3:1–16, 1995. [99] N. Forbes. Imitation of Life: How Biology Is Inspiring Computing. MIT Press, 2004. [100] R. Fox. The social identity of management ergolect. English for Specific Purposes, 18:261– 278, 1999. [101] J. Friedl. Mastering Regular Expressions. O’Reilly, 2006. [102] K. Fu. Syntactic pattern recognition and applications. Prentice Hall, 1982. [103] D. Fudenberg and J. Tirole. Game Theory. MIT Press, 1991. [104] D. Futuyma. Evolutionary Biology. Sinauer Associates, 1998. [105] J. Galindo. Handbook of Research on Fuzzy Information Processing in Databases. IGI Global, 2008. BIBLIOGRAPHY 193 [106] E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design patterns: elements of reusable object-oriented software. Addison-Wesley, 1995. [107] C. Gershenson and F. Heylighen. When can we call a system self-organizing? In J. Carbonell and J. Siekmann, editors, European Conference on Advances in Artificial Life, pages 606–614. Springer, 2003. [108] R. Gillam. Unicode Demystified: A Practical Programmer’s Guide to the Encoding Standard. Addison-Wesley, 2002. [109] Glocal Forum and CERFE. The glocalization manifesto. Technical report, The Glocal Forum, 2004. Available from: http://www.glocalforum.org/mediagallery/media Download.php?mm=/warehouse/documents/the glocalization manifesto.pdf. [110] D. Goldberg. Genetic algorithms in search, optimization, and machine learning. Addison- Wesley, 1989. [111] D. Goldberg and P. Segrest. Finite Markov chain analysis of genetic algorithms. In J. Grefenstette, editor, International Conference on Genetic Algorithms and their application, pages 1–8. Lawrence Erlbaum Associates, 1987. [112] N. Gotelli. A primer of ecology. Sinauer Associates, 1995. [113] J. Grabmeier and A. Rudolph. Techniques of cluster algorithms in data mining. Data Mining and Knowledge Discovery, 6:303–360, 2002. [114] S. Grand and D. Cliff. Creatures: Entertainment software agents with artificial life. Autonomous Agents and Multi-Agent Systems, 1:39–57, 1998. [115] D. Green and M. Kirley. Adaptation, diversity and spatial patterns. International Journal of Knowledge-Based Intelligent Engineering Systems, 4:184–190, 2000. [116] D. Green, N. Klomp, G. Rimmington, and S. Sadedin. Complexity in Landscape Ecology. Springer, 2006. [117] D. Green, T. Leishman, and S. Sadedin. Dual phase evolution: a mechanism for self- In A. Minai, D. Braha, and Y. Bar-Yam, editors, organization in complex systems. International Conference on Complex Systems. Springer, 2006. [118] D. Green, D. Newth, and M. Kirley. Connectivity and catastrophe - towards a general In M. Bedau, editor, International Conference on Artificial Life, theory of evolution. pages 153–161. MIT Press, 2000. [119] D. Green and S. Sadedin. Interactions matter- complexity in landscapes and ecosystems. Ecological Complexity, 2:117–130, 2005. [120] T. Gregory. Coincidence, coevolution, or causation? DNA content, cellsize, and the C-value enigma. Biological Reviews, 76:65–101, 2001. [121] U. Grenander and M. Miller. Pattern Theory: From Representation to Inference. Oxford University Press, 2007. [122] V. Grimm, E. Revilla, U. Berger, F. Jeltsch, W. Mooij, S. Railsback, H. Thulke, J. Weiner, T. Wiegand, and D. DeAngelis. Pattern-oriented modeling of agent-based complex systems: Lessons from ecology. Science, 310:987–991, 2005. 194 BIBLIOGRAPHY [123] S. Gunn. Support vector machines for classification and regression. Technical report, University of Southampton, 1998. [124] H. Gutowitz, J. Victor, and B. Knight. Local structure theory for cellular automata. Physica D, 28:18–48, 1987. [125] H. Haken. Synergetics: an introduction: nonequilibrium phase transitions and self- organization in physics, chemistry, and biology. Springer, 1977. [126] M. Hansen and B. Yu. Model selection and the principle of minimum description length. Journal of the American Statistical Association, 96:746–774, 2001. [127] I. Hanski. Metapopulation Ecology. Oxford University Press, 1999. [128] I. Hanski and O. Ovaskainen. Metapopulation theory for fragmented landscapes. Theoretical Population Biology, 64:119–127, 2003. [129] R. Haralick. Statistical and structural approaches to texture. Proceedings of the IEEE, 67:786–804, 1979. [130] C. Hastrich. Biomimicry: A tool for innovation. Technical report, The Biomimicry Institute, 2007. Available from: http://www.biomimicryinstitute.org/about-us/biomimicry-a-tool-for-innovation.html. [131] S. Haykin. Neural Networks: A Comprehensive Foundation. Prentice Hall, 1998. [132] D. Hebb. The Organization of Behavior. Wiley, 1949. [133] F. Heylighen. The science of self-organization and adaptivity. The Encyclopedia of Life Support Systems, pages 253–280, 2002. [134] F. Heylighen and C. Joslyn. Cybernetics and second order cybernetics. Encyclopedia of Physical Science & Technology, 4:155–170, 2001. [135] M. Hollis. The Philosophy of Social Science: An Introduction. Cambridge University Press, 1994. [136] S. Hubbell. The Unified Neutral Theory of Biodiversity and Biogeography. Princeton University Press, 2001. [137] J. Hull. Fundamentals of Futures and Options Markets. Prentice Hall, 2005. [138] M. Iansiti and R. Levien. The Keystone Advantage: What the New Dynamics of Business Ecosystems Mean for Strategy, Innovation, and Sustainability. Harvard Business School Press, 2004. [139] A. Jain and R. Dubes. Algorithms for clustering data. Prentice Hall, 1988. [140] A. Jain, R. Duin, and J. Mao. Statistical pattern recognition: A review. IEEE Transactions On Pattern Analysis and Machine Intelligence, 22:4–37, 2000. [141] A. Jain, J. Mao, and K. Mohiuddin. Artificial neural networks: A tutorial. IEEE Computer, pages 31–44, 1996. [142] A. Jain, M. Murty, and P. Flynn. Data clustering: A review. ACM Computing Surveys, 31:264–323, 1999. BIBLIOGRAPHY 195 [143] E. Jaynes. Probability theory: the logic of science. Cambridge University Press, 2003. [144] Y. Jin. A comprehensive survey of fitness approximation in evolutionary computation. Soft Computing - A Fusion of Foundations, Methodologies and Applications, 9:3–12, 2005. [145] T. Joachims. Text categorization with support vector machines: Learning with many In J. Carbonell and J. Siekmann, editors, European Conference on relevant features. Machine Learning. Springer, 1997. [146] D. Johansen, R. van Renesse, and F. Schneider. Operating system support for mobile In Workshop on Hot Topics in Operating Systems, pages 42–45. IEEE Press, agents. 1995. [147] T. Kanungo, D. Mount, N. Netanyahu, C. Piatko, R. Silverman, and A. Wu. An efficient k- means clustering algorithm: Analysis and implementation. IEEE Transactions on Pattern Analysis and Machine Intelligence, pages 881–892, 2002. [148] H. Khondker. Glocalization as globalization: Evolution of a sociological concept. Bangladesh e-Journal of Sociology, 1:1–9, 2004. [149] M. Kimura. The neutral theory of molecular evolution. Cambridge University Press, 1983. [150] A. King and S. Pimm. Complexity, diversity, and stability: A reconciliation of theoretical and empirical results. American Naturalist, 122:229–239, 1983. [151] B. King. Step-wise clustering procedures. Journal of the American Statistical Association, 69:86–101, 1967. [152] T. Kohonen. Self-organization and associative memory. Springer, 1989. [153] T. Kohonen. Self-Organizing Maps. Springer, 2001. [154] A. Kolmogorov. Three approaches to the definition of the concept “quantity of information”. Problems of Information Transmission, 1:3–11, 1965. [155] A. Kotok. ebXML: The New Global Standard for Doing Business Over the Internet. Sams Publishing, 2001. [156] J. Koza. Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, 1992. [157] J. Koza. Overview of genetic programming. In Genetic Programming: On the Programming of Computers by Means of Natural Selection [156], pages 73–78. [158] D. Krafzig, K. Banke, and D. Slama. Enterprise SOA: Service-Oriented Architecture Best Practices. Prentice Hall, 2004. [159] D. Kramer and M. MacInnis. Utilization of a local grid of Mac OS X-based computers using Xgrid. In International Symposium on High Performance Distributed Computing, pages 264–265. IEEE Press, 2004. [160] M. Kulkarni and R. Kreutzer. Building your own digital ecosystem: a holistic approach to enterprise integration. Technical report, Syntel, 2006. Available from: http://www.syntelinc.com/uploadedFiles/Syntel DigitalEcosystem.pdf. [161] T. Kurz. EvE simulator [online]. 2008. Available from: http://evesim.sourceforge.net/ [cited 26 Jan 2008]. 196 BIBLIOGRAPHY [162] T. Kurz and T. Heistracher. Simulation of a self-optimising digital ecosystem. In Digital Ecosystems and Technologies Conference, pages 165–170. IEEE Press, 2007. [163] D. Lambert and M. Cooper. Issues in supply chain management. Industrial Marketing Management, 29:65–83, 2000. [164] W. Langdon. The evolution of size in variable length representations. In P. Simpson, editor, International Conference on Evolutionary Computation, pages 633–638. IEEE Press, 1998. [165] W. Langdon. Genetic Programming and Data Structures: Genetic Programming + Data Structures = Automatic Programming! Kluwer Publishers, 1998. [166] W. Langdon and R. Poli. Fitness causes bloat. In P. Chawdhry, R. Roy, and R. Pant, editors, Soft Computing in Engineering Design and Manufacturing, pages 13–22. Springer, 1997. [167] D. Larose. Discovering Knowledge in Data: An Introduction to Data Mining. Wiley, 2005. [168] E. Lawrence. Henderson’s dictionary of biological terms. Pearson Education, 2005. [169] L. Lee, H. Nwana, D. Ndumu, and P. De Wilde. The stability, scalability and performance of multi-agent systems. BT Technology Journal, 16:94–103, 1998. [170] J. Lehn. Perspectives in supramolecular chemistry—from molecular recognition towards molecular information processing and self-organization. Angewandte Chemie International Edition in English, 29:1304–1319, 1990. [171] G. Lendaris. On the definition of self-organizing systems. In W. Banzhaf, editor, European Conference on Advances in Artificial Life, pages 324–325. IEEE Press, 1964. [172] E. Lenski, C. Ofria, R. Pennock, and C. Adami. The evolutionary origin of complex features. Nature, 423:139–144, 2003. [173] S. Levin. Ecosystems and the biosphere as complex adaptive systems. Ecosystems, 1:431– 436, 1998. [174] S. Levin. Fragile dominion: complexity and the commons. Perseus Books Group, 1999. [175] R. Levins. Some demographic and genetic consequences of environmental heterogeneity for biological control. Bulletin of the Entomological Society of America, 15:237–240, 1969. [176] F. Leymann, D. Roller, and M. Schmidt. Web services and business process management. IBM Systems Journal, 41:198–211, 2002. [177] M. Li and P. Vit´anyi. An Introduction to Kolmogorov Complexity and Its Applications. Springer, 1997. [178] S. Lin, W. Punch III, and E. Goodman. Coarse-grain parallel genetic algorithms: categorization and new approach. In Symposium on Parallel and Distributed Processing, pages 28–37. IEEE Press, 1994. [179] S. Loncaric. A survey of shape analysis techniques. Pattern Recognition, 31:983–1001, 1998. BIBLIOGRAPHY 197 [180] S. Lu and K. Fu. A sentence-to-sentence clustering procedure for pattern analysis. IEEE Transactions on Systems, Man, and Cybernetics, 8:381–389, 1978. [181] A. Lugo. The apparent paradox of reestablishing species richness on degraded lands with tree monocultures. Forest Ecology and Management, 99:9–19, 1997. [182] S. Luke, C. Cioffi-Revilla, L. Panait, and K. Sullivan. MASON: A new multi-agent simulation toolkit. In SwarmFest. University of Michigan, 2004. [183] S. Luke, L. Panait, G. Balan, S. Paus, Z. Skolicki, E. Popovici, K. Sullivan, J. Harrison, J. Bassett, R. Hubley, and A. Chircop. ECJ: A Java-based evolutionary computation research system [online]. Available from: http://cs.gmu.edu/ eclab/projects/ecj/. [184] K. Lyytinen and Y. Yoo. The next wave of nomadic computing: A research agenda for information systems research. Sprouts: Working Papers on Information Systems, 1:1–20, 2001. [185] R. MacArthur and E. Wilson. The Theory of Island Biogeography. Princeton University Press, 1967. [186] D. MacKay. Information Theory, Inference, and Learning Algorithms. Cambridge University Press, 2003. [187] J. MacQueen. Some methods for classification and analysis of multivariate. In L. Le Cam and J. Neyman, editors, Berkeley Symposium on Mathematical Statistics and Probability. University of California Press, 1965. [188] M. Mamei and F. Zambonelli. Self-organization in multi agent systems: a middleware approach. In G. Serugendo, editor, Engineering Self-Organising Systems, pages 233–248. Springer, 2003. [189] B. Manderick and P. Spiessens. In J. Schaffer, editor, International Conference on Genetic Algorithms, pages 428–433. Morgan Kaufmann Publishers, 1989. Fine-grained parallel genetic algorithms. [190] C. Manning, P. Raghavan, and H. Schutze. Introduction to Information Retrieval. Cambridge University Press, 2008. [191] T. Mantere and J. Alander. Evolutionary software engineering, a review. Applied Soft Computing, 5:315–331, 2005. [192] D. Marais and M. Walter. Astrobiology: Exploring the origins, evolution, and distribution of life in the universe. Annual Reviews in Ecology and Systematics, 30:397–420, 1999. [193] J. Markoff. Faster chips are leaving programmers in their dust. Technical report, New York Times, 2007. Available from: http://www.nytimes.com/2007/12/17/technology/17chip.html. [194] P. Marrone. Java object oriented neural engine: The complete guide. Technical report, joone.org, 2007. Available from: http://prdownloads.sourceforge.net/joone/JooneCompleteGuide.pdf. [195] P. Marrow. Nature-inspired computing technology and applications. BT Technology Journal, 18:13–23, 2000. 198 BIBLIOGRAPHY [196] P. Marrow, M. Koubarakis, R. van Lengen, F. Valverde-Albacete, E. Bonsma, J. Cid- Suerio, A. Figueiras-Vidal, A. Gallardo-Antolin, C. Hoile, T. Koutris, H. Molina-Bulla, A. Navia-Vazquez, P. Raftopoulou, N. Skarmeas, C. Tryfonopoulos, F. Wang, and C. Xiruhaki. Agents in decentralized information ecosystems: The DIET approach. In Symposium on Information Agents for Electronic Commerce, pages 109–117. Society for the Study of Artificial Intelligence and Simulation of Behaviour, 2001. [197] D. Martin, M. Paolucci, S. McIlraith, M. Burstein, D. McDermott, D. McGuinness, B. Parsia, T. Payne, M. Sabou, M. Solanki, N. Srinivasan, and K. Sycara. Bringing semantics to web services: The OWL-S approach. In J. Cardoso and A. Sheth, editors, Semantic Web Services and Web Process Composition, pages 6–9. Springer, 2004. [198] T. Marwala, P. De Wilde, L. Correia, P. Mariano, R. Ribeiro, V. Abramov, N. Szirbik, and J. Goossenaerts. Scalability and optimisation of a committee of agents using genetic In D. Campbell and C. Fyfe, editors, International ICSC Symposium Soft algorithm. Computing and Intelligent Systems For Industry. ICSC-NAISO Academic Press, 2001. [199] C. Masuch. Evolutionary environment network [online]. 2008. Available from: http://evenet.sourceforge.net/ [cited 31 Jan 2008]. [200] F. McCabe and K. Clark. April-agent process interaction language. In M. Wooldridge and N. Jennings, editors, Intelligent Agents: Workshop on Agent Theories, Architectures, and Languages, pages 324–340. Springer, 1994. [201] T. McClanahan and R. Wolfe. Accelerating forest succession in a fragmented landscape: The role of birds and perches. Conservation Biology, 7:279–288, 1993. [202] S. McCulloch, R. Kokoska, O. Chilkova, C. Welch, E. Johansson, P. Burgers, and T. Kunkel. Enzymatic switching for efficient and accurate translesion DNA replication. Nucleic Acids Research, 32:4665–4675, 2004. [203] S. McIlraith, C. Son, and H. Zeng. Semantic web services. IEEE Intelligent Systems, 16:46–53, 2001. [204] N. McPhee and R. Poli. A schema theory analysis of the evolution of size in genetic programming with linear representations. In J. Miller, M. Tomassini, P. Lanzi, C. Ryan, A. Tettamanzi, and W. Langdon, editors, European Conference on Genetic Programming, pages 108–125. Springer, 2001. [205] B. Medjahed, A. Bouguettaya, and A. Elmagarmid. Composing web services on the semantic web. The International Journal on Very Large Data Bases, 12:333–351, 2003. [206] D. Michie, D. Spiegelhalter, C. Taylor, and J. Campbell. Machine learning, neural and statistical classification. Ellis Horwood, 1995. [207] N. Milanovic and M. Malek. Current solutions for web service composition. IEEE Internet Computing, 8:51–59, 2004. [208] J. Miller. What bloat? In L. Spector, editor, Genetic and Evolutionary Computation Conference, pages 295–302. Morgan Kaufmann Publishers, 2001. cartesian genetic programming on boolean problems. [209] S. Miller. Aspect-oriented programming takes aim at software complexity. IEEE Computer, 34:18–21, 2001. BIBLIOGRAPHY 199 [210] G. Milligan and M. Cooper. An examination of procedures for determining the number of clusters in a data set. Psychometrika, 50:159–179, 1985. [211] G. Milligan. An examination of the effect of six types of error perturbation on fifteen clustering algorithms. Psychometrika, 45:325–342, 1980. [212] M. Mitchell. An Introduction to Genetic Algorithms. MIT Press, 1996. [213] G. Modi. Service oriented architecture & web 2.0. Technical report, Guru Tegh Bahadur Institute of Technology, 2007. Available from: http://www.gsmodi.com/files/SOA Web2 Report.pdf. [214] J. Moore. The Death of Competition: Leadership and Strategy in the Age of Business Ecosystems. Harvard Business School Press, 1996. [215] J. Moore. Digital business ecosystems in developing countries: An introduction. Technical report, Berkman Center for Internet and Society, Harvard Law School, 2003. Available from: http://cyber.law.harvard.edu/bold/devel03/modules/moore.pdf. [216] L. Moreau. Stability of multiagent systems with time-dependent communication links. IEEE Transactions on Automatic Control, 50:169–182, 2005. [217] R. Morrison. Designing Evolutionary Algorithms For Dynamic Environments. Springer, 2004. [218] S. Mufwene. The Ecology of Language Evolution. Cambridge University Press, 2001. [219] H. Muhlenbein. Evolution in time and space - the parallel genetic algorithm. Foundations of Genetic Algorithms, 1:316–337, 1991. [220] F. Murtagh. A survey of recent advances in hierarchical clustering algorithms. The Computer Journal, 26:354–359, 1983. [221] F. Nachira. Towards a network of digital business ecosystems fostering the local development. Technical report, Directorate General Information Society and Media, European Commission, 2002. Available from: http://www.digital-ecosystems.org/doc/discussionpaper.pdf. [222] F. Nachira, P. Dini, and A. Nicolai. A network of digital business ecosystems for europe: Roots, processes and perspectives. In Nachira et al. [223], pages 1–20. [223] F. Nachira, A. Nicolai, P. Dini, M. Le Louarn, and L. Rivera Le´on, editors. Digital Business Ecosystems. European Commission, 2007. [224] S. Naeem and S. Li. Biodiversity enhances ecosystem reliability. Nature, 390:507–509, 1997. [225] G. Nagy. State of the art in pattern recognition. Proceedings of the IEEE, 56:836–863, 1968. [226] S. Narayanan and S. McIlraith. Simulation, verification and automated composition of web services. In international conference on World Wide Web, pages 77–88. ACM Press, 2002. [227] R. Nelson and S. Winter. An Evolutionary Theory of Economic Change. Harvard University Press, 1982. 200 BIBLIOGRAPHY [228] E. Newcomer and G. Lomow. Understanding SOA with web services. Addison-Wesley, 2005. [229] M. Newman. Self-organized criticality, evolution and the fossil extinction record. Proceedings of the Royal Society B: Biological Sciences, 263:1605–1610, 1996. [230] M. Newman. A model of mass extinction. Journal of Theoretical Biology, 189:235–252, 1997. [231] G. Nicolis and I. Prigogine. Self-organization in Nonequilibrium Systems: From Dissipative Structures to Order Through Fluctuations. Wiley, 1977. [232] A. Nix and M. Vose. Modeling genetic algorithms with Markov chains. Annals of Mathematics and Artificial Intelligence, 5:79–88, 1992. [233] M. Nixon and A. Aguado. Feature Extraction & Image Processing. Newnes, 2007. [234] J. Norris. Markov Chains. Cambridge University Press, 1997. [235] M. Nowostawski and R. Poli. Parallel genetic algorithm taxonomy. In L. Jain, editor, International Conference on Knowledge-Based Intelligent Information Engineering Systems, pages 88–92. IEEE Press, 1999. [236] H. Nwana. Software agents: An overview. Knowledge Engineering Review, 11:205–244, 1996. [237] E. Odum. Energy flow in ecosystems: A historical review. Integrative and Comparative Biology, 8:11–18, 1968. [238] R. Olfati-Saber, J. Fax, and R. Murray. Consensus and cooperation in networked multi- agent systems. Proceedings of the IEEE, 95:215–233, 2007. [239] C. Olson. Parallel algorithms for hierarchical clustering. Parallel Computing, 21:1313– 1325, 1995. [240] C. Papadimitriou and K. Steiglitz. Combinatorial Optimization: Algorithms and Complexity. Dover Publications, 1998. [241] M. Papazoglou and D. Georgakopoulos. Service-oriented computing. Communications of the ACM, 46:25–28, 2003. [242] M. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann. Service-oriented computing: State of the art and research challenges. IEEE Computer, 40:38–45, 2007. [243] M. Papazoglou. Service-oriented computing: concepts, characteristics and directions. In T. Catarci, M. Mecella, J. Mylopoulos, and M. Orlowska, editors, International Conference on Web Information Systems Engineering, pages 3–12. IEEE Press, 2003. [244] G. Parisi. Statistical Field Theory. Perseus Books Group, 1998. [245] H. Parunak and S. Brueckner. Entropy and self-organization in multi-agent systems. In International Conference on Autonomous Agents, pages 124 – 130. ACM Press, 2001. [246] T. Pavlidis. Structural Pattern Recognition. Springer, 1977. [247] R. Pennock. Evolving intelligence [online]. 2006. Available from: http://www.msu.edu/ pennock5/research/EI.html. BIBLIOGRAPHY 201 [248] L. Perlovsky. Conundrum of combinatorial complexity. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20:666–670, 1998. [249] V. Pham and A. Karmouch. Mobile software agents: an overview. IEEE Communications Magazine, 36:26–37, 1998. [250] J. Platt. Fast training of support vector machines using sequential minimal optimization. In B. Scholkopf, C. Burges, and A. Smola, editors, Advances in kernel methods: support vector learning, pages 185–208. MIT Press, 1999. [251] R. Poli and N. McPhee. Exact schema theorems for GP with one-point and standard crossover operating on linear structures and their application to the study of the evolution of size. In J. Miller, editor, European conference on Genetic Programming, pages 126–142. Springer, 2001. [252] V. Porto. Evolutionary programming. In T. Baeck, D. Fogel, and Z. Michalewicz, editors, Handbook of Evolutionary Computation, pages 89–102. CRC Press, 2000. [253] A. Prugel-Bennett. Modelling evolving populations. Journal of Theoretical Biology, 185:81–95, 1997. [254] P. Rajasekaran, J. Miller, K. Verma, and A. Sheth. Enhancing web services description and discovery to facilitate composition. In J. Cardoso and A. Sheth, editors, Semantic Web Services and Web Process Composition, pages 55–68. Springer, 2004. [255] J. Rao and X. Su. A survey of automated web service composition methods. In J. Cardoso and A. Sheth, editors, Semantic Web Services and Web Process Composition, pages 43–54. Springer, 2004. [256] Rapid-I. Rapidminer 4.3. Technical report, Rapid-I GmbH, 2008. [257] S. Rasmussen, L. Chen, D. Deamer, D. Krakauer, N. Packard, P. Stadler, and M. Bedau. Evolution: Transitions from nonliving to living matter. Science, 303:963–965, 2004. [258] N. Rathbone. Open Philosophies for Associative Autopoietic Digital Ecosystems (OPAALS) [online]. Available from: http://www.opaals.org/research.php [cited 26 Jan 2008]. [259] A. Ratle and M. Sebag. Avoiding the bloat with probabilistic grammar-based genetic programming. In P. Collet, C. Fonlupt, J. Hao, E. Lutton, and M. Schoenauer, editors, International Conference on Artificial Evolution, pages 255–266. Springer, 2001. [260] A. Razavi, S. Moschoyiannis, and P. Krause. A coordination model for distributed transactions in digital business ecosystems. Digital Ecosystems and Technologies Conference, pages 159–164, 2007. [261] A. Redmore and M. Griffin. Advanced Level and Advanced Special Level Biology. Longman Group Limited, 1994. [262] B. Ripley. Pattern Recognition and Neural Networks. Cambridge University Press, 1996. [263] J. Risson and T. Moors. Survey of research towards robust peer-to-peer networks: Search methods. Computer Networks, 50:3485–3521, 2006. 202 BIBLIOGRAPHY [264] L. Rivera Le´on. Digital Ecosystems Network of Regions for Dissemination and Knowledge Deployment (DEN4DEK) [online]. Available from: http://www.den4dek.org [cited 20 Jan 2009]. [265] L. Rivera Le´on. Regions for Digital Ecosystems Network (REDEN) [online]. Available from: http://reden.opaals.org/ [cited 20 Jan 2009]. [266] R. Rivest. The MD5 message-digest algorithm. Technical report, MIT, 1992. Available from: http://people.csail.mit.edu/rivest/Rivest-MD5.txt. [267] R. Robertson. Globalisation or glocalisation. Journal of International Communication, 1:33–52, 1994. [268] R. Rojas. Neural Networks: A Systematic Introduction. Springer, 1996. [269] K. Rothermel and F. Hohl. Mobile agents. In A. Kent and J. Williams, editors, Encyclopedia for Computer Science and Technology, volume 40, pages 155–176. CRC Press, 1999. [270] J. Rowe and B. Mitavskiy. Report on evolution of high-level software components. Technical report, Digital Business Ecosystems project, 2005. Available from: http://files.opaals.org/DBE/deliverables/Del 8.1 DBE Report.pdf. [271] G. Rudolph. Convergence analysis of canonical genetic algorithms. IEEE Transactions on Neural Networks, 5:96–101, 1994. [272] G. Rudolph. Finite Markov chain results in evolutionary computation: A tour d’horizon. Fundamenta Informaticae, 35:67–89, 1998. [273] M. Salmon. Introduction to the Philosophy of Science. Hackett Publishing, 1999. [274] W. Sarle. How many hidden units should i use? Technical report, Internet FAQ Archives, 2008. Available from: http://www.faqs.org/faqs/ai-faq/neural-nets/part3/section-10.html. [275] M. Schmiemann. SMEs and entrepreneurship in the EU. Technical report, Statistical Office of the European Communities (Eurostat), European Commission, 2006. Avail- able from: http://epp.eurostat.ec.europa.eu/cache/ITY OFFPUB/KS-NP-06-024/EN/ KS-NP-06-024-EN.PDF. [276] B. Scholkopf, K. Sung, C. Burges, F. Girosi, P. Niyogi, T. Poggio, and V. Vapnik. Comparing support vector machines with gaussian kernels to radial basis function classifiers. IEEE Transactions on Signal Processing, 45:2758–2765, 1997. [277] J. Schumann. Automated Theorem Proving in Software Engineering. Springer, 2001. [278] H. Schwefel. Evolution and Optimum Seeking: The Sixth Generation. Wiley, 1995. [279] D. Searls. The language of genes. Nature, 420:211–217, 2002. [280] I. Sethi and A. Jain. Artificial neural networks and statistical pattern recognition. Old and new connections. North-Holland, 1991. [281] M. Shackleton, R. Shipma, and M. Ebner. An investigation of redundant genotype- phenotype mappings and their role in evolutionary search. In Congress on Evolutionary Computation, pages 493–500. IEEE Press, 2000. BIBLIOGRAPHY 203 [282] C. Shalizi. Causal Architecture, Complexity and Self-Organization in Time Series and Cellular Automata. PhD thesis, University of Wisconsin-Madison, 2001. [283] C. Shalizi and K. Shalizi. Quantifying self-organization in cyclic cellular automata. In L. Schimansky-Geier, D. Abbott, A. Neiman, and C. Broeck, editors, Noise in Complex Systems and Stochastic Dynamics, pages 108–117. SPIE, 2003. [284] J. Shapiro. Statistical mechanics theory of genetic algorithms. In L. Kallel, B. Naudts, and A. Rogers, editors, Theoretical Aspects of Evolutionary Computing, pages 87–108. Springer, 2001. [285] R. Shipman, M. Shackleton, and I. Harvey. The use of neutral genotype-phenotype mappings for improved evolutionary search. BT Technology Journal, 18:103–111, 2000. [286] M. Simoes-Marques, P. Mariano, R. Ribeiro, L. Correia, M. Chli, P. De Wilde, V. Abramov, and J. Goosenaerts. Contributions to adaptable agent societies. In Emerging Technologies and Factory Automation, pages 354–361. IEEE Press, 2003. [287] M. Singh and M. Huhns. Service-Oriented Computing: Semantics, Processes, Agents. Wiley, 2005. [288] A. Sizling and D. Storch. Power-law species-area relationships and self-similar species distributions within finite areas. Ecology Letters, 7:60–68, 2004. [289] J. Slagle. Automated theorem-proving for theories with simplifiers, commutativity, and associativity. Journal of the ACM, 21:622–642, 1974. [290] R. Smith and N. Taylor. A framework for evolutionary computation in agent-based systems. In J. Glasgow, editor, International Conference on Intelligent Systems, pages 221–224. AAAI Press, 1998. [291] P. Sneath and R. Sokal. Numerical Taxonomy: The Principles and Practice of Numerical Classification. Springer, 1973. [292] K. Sneppen, P. Bak, H. Flyvbjerg, and M. Jensen. Evolution as a self-organized critical phenomenon. Proceedings of the National Academy of Sciences, 92:5209–5213, 1995. [293] R. Sol´e, D. Alonso, and A. McKane. Self-organized instability in complex ecosystems. Philosophical Transactions: Biological Sciences, 357:667–681, 2002. [294] I. Sommerville. Software Engineering. Addison-Wesley, 1992. [295] K. Soraku-gun. An evolutionary approach to synthetic biology: Zen and the art of creating life. In C. Langton, editor, Artificial Life: An Overview, pages 195–226. MIT Press, 1995. [296] T. Soule and J. Foster. Effects of code growth and parsimony pressure on populations in genetic programming. Evolutionary Computation, 6:293–309, 1998. [297] J. Stender. Parallel Genetic Algorithms: Theory and Applications. IOS Press, 1993. [298] K. Sterelny. A review of evolution and learning: the baldwin effect reconsidered. Evolution & Development, 6:295–300, 2004. [299] H. Sutter. The free lunch is over: A fundamental turn toward concurrency in software. Dr. Dobb’s Journal, 2005. 204 BIBLIOGRAPHY [300] J. Suzuki. A Markov chain analysis on simple genetic algorithms. IEEE Transactions on Systems, Man, and Cybernetics, 25:655–659, 1995. [301] M. Svahnberg. Background analysis and design of an agent-based operating system. Master’s thesis, University of Karlskrona/Ronneby, 1998. Available from: http://www.ide.hk-r.se/ nesse/ABOS/ABOS thesis.pdf. [302] K. Swingler. Applying Neural Networks: A Practical Guide. Morgan Kaufmann Publishers, 1996. [303] E. Swyngedouw. The mammon quest. ‘Glocalisation’, interspatial competition and the monetary order: the construction of new scales. In M. Dunford and G. Kafkalas, editors, Cities and regions in the new Europe: The Global-local Interplay and Spatial Development Strategies, pages 39–67. Wiley, 1992. [304] N. Takahashi. Stability analysis of nonlinear dynamical systems related to neural networks. Technical report, Kyushu University, 2008. Available from: http://www-kairo.csce.kyushu-u.ac.jp/ norikazu/research.en.html. [305] Q. Tang. Economics Of Web Service Provisioning: Optimal Market Structure And Intermediary Strategies. PhD thesis, University of Florida, 2004. [306] J. Thomas and K. Sycara. Heterogeneity, stability, and efficiency in distributed systems. In Y. Demazeau, editor, International Conference on Multi Agent Systems, pages 293 – 300. IEEE Press, 1998. [307] C. Thomas Jr. The genetic organization of chromosomes. Annual Reviews in Genetics, 5:237–256, 1971. [308] H. Tianfield. Towards self-organization in multi-agent systems and grid computing. Multiagent and Grid Systems, 1:89–95, 2005. [309] D. Tilman and P. Kareiva. Spatial Ecology: The Role of Space in Population Dynamics and Interspecific Interactions. Princeton University Press, 1997. [310] P. Trahanias and E. Skordalakis. Syntactic pattern recognition of the ECG. IEEE Transactions on Pattern Analysis and Machine Intelligence, 12:648–657, 1990. [311] R. Trivers. The evolution of reciprocal altruism. The Quarterly Review of Biology, 46:35, 1971. [312] M. Turner. Factors influencing succession: Lessons from large, infrequent natural disturbances. Ecosystems, 1:511–523, 1998. [313] F. Valafar. Pattern recognition techniques in microarray data analysis: A survey. In F. Valafar, editor, Techniques in Bioinformatics and Medical Informatics, pages 41–64. New York Academy of Sciences, 2002. [314] S. Valverde-Castillo. Software design as an adaptive walk [online]. 2004. Available from: http://web.archive.org/web/20041206173432/http://complex.upf.es/ sergi/. [315] M. Vandenberghe. Digital ecosystem solution - the business factory. Technical report, XeWOW, 2006. Available from: http://themaddesigner.free.fr/XeWOW%20White%20Paper.pdf. [316] V. Vapnik. Statistical learning theory. Wiley, 1998. BIBLIOGRAPHY 205 [317] V. Vapnik and S. Kotz. Estimation of Dependences Based on Empirical Data. Birkhauser, 2006. [318] D. Veldhuizen and G. Lamont. Multiobjective evolutionary algorithms: Analyzing the state-of-the-art. Evolutionary Computation, 8:125–147, 2000. [319] S. Ventura, C. Romero, A. Zafra, J. Delgado, and C. Herv´as. JCLEC: a Java framework for evolutionary computation. Soft Computing - A Fusion of Foundations, Methodologies and Applications, 12:381–392, 2008. [320] B. Violino. How to navigate a sea of SOA standards [online]. 2007. Available from: http://www.cio.com/article/104007/How to Navigate a Sea of SOA Standards. [321] L. von Bertalanffy. General system theory: Foundations, Development, Applications. Braziller, 1973. [322] M. Waldrop. Complexity: The Emerging Science at the Edge of Order and Chaos. Simon & Schuster, 1992. [323] C. Walters and R. Hilborn. Ecological optimization and adaptive management. Annual Reviews in Ecology and Systematics, 9:157–188, 1978. [324] J. Ward. Hierarchical grouping to optimize an objective function. Journal of the American Statistical Association, 58:236–244, 1963. [325] M. Ward. Life offers lessons for business [online]. 2004. Available from: http://news.bbc.co.uk/1/hi/technology/3752725.stm. [326] M. Waterman. Introduction to Computational Biology: Maps, Sequences and Genomes. CRC Press, 1995. [327] D. Watts and S. Strogatz. Collective dynamics of ‘small-world’ networks. Nature, 393:440– 442, 1998. [328] A. Webb. Statistical Pattern Recognition. Newnes, 1999. [329] B. Weber and D. Depew. Evolution and Learning: The Baldwin Effect Reconsidered. Bradford Books, 2003. [330] J. Weibull. Evolutionary Game Theory. MIT Press, 1995. [331] G. Weiss. Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press, 1999. [332] E. Weisstein. CRC Concise Encyclopedia of Mathematics. CRC Press, 2003. [333] D. White and M. Houseman. The navigability of strong ties: Small worlds, tie strength, and network topology. Complexity, 8:72–81, 2002. [334] M. Wooldridge. Introduction to MultiAgent Systems. Wiley, 2002. [335] S. Wright. The roles of mutation, inbreeding, crossbreeding and selection in evolution. In D. Jones, editor, International Congress on Genetics, pages 356–366. Brooklyn botanic garden, 1932. [336] J. Wunderle. The role of animal seed dispersal in accelerating native forest regeneration on degraded tropical lands. Forest Ecology and Management, 99:223–235, 1997. 206 BIBLIOGRAPHY [337] Ximbiotix. About the digital ecosystem [online]. 2005. Available from: http://www.ximb iotix.com/desktop/the-digital-ecosystem/about-the-digital-ecosystem.cfm [cited 26 Jan 2008]. [338] X. Yang. Chaos in small-world networks. Physical Review E, 63:1–4, 2001. [339] L. Zadeh. Fuzzy sets. In G. Klir and B. Yuan, editors, Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems: Selected Papers, pages 19–34. World Scientific, 1996. [340] C. Zahn. Graph-theoretical methods for detecting and describing gestalt clusters. Transactions on Computers, 100:68–86, 1971. [341] O. Zimmermann, S. Milinski, M. Craes, and F. Oellermann. Second generation web services-oriented architecture in production in the finance industry. In J. Vlissides and D. Schmidt, editors, Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 283–289. ACM Press, 2004. [342] W. Zurek. Algorithmic information content, church-turing thesis. physical entropy, In W. Zurek, editor, Complexity, Entropy, and the Physics of and maxwll’s demon. Information, pages 73–89. Addison-Wesley, 1990. [343] A. Zvonkin and L. Levin. The complexity of finite objects and the development of the concepts of information and randomness by means of the theory of algorithms. Russian Mathematical Surveys, 25:83–124, 1970.
1702.03226
2
1702
2017-03-24T11:29:52
An applied spatial agent-based model of administrative boundaries using SEAL
[ "cs.MA" ]
This paper extends and adapts an existing abstract model into an empirical metropolitan region in Brazil. The model - named SEAL: a Spatial Economic Agent-based Lab - comprehends a framework to enable public policy ex-ante analysis. The aim of the model is to use official data and municipalities spatial boundaries to allow for policy experimentation. The current version considers three markets: housing, labor and goods. Families' members age, consume, join the labor market and trade houses. A single consumption tax is collected by municipalities that invest back into quality of life improvements. We test whether a single metropolitan government - which is an aggregation of municipalities - would be in the best interest of its citizens. Preliminary results for 20 simulation runs indicate that it may be the case. Future developments include improving performance to enable running of higher percentage of the population and a number of runs that make the model more robust.
cs.MA
cs
An applied spatial agent-based model of administrative boundaries using SEAL Bernardo Alves Furtado1,2 and Isaque Daniel Eberhardt Rocha1 1 Institute of Applied Economic Research, Brazil [email protected] 2 National Council of Research, CNPq Abstract. This paper extends and adapts an existing abstract model [14] into an empirical metropolitan region in Brazil. The model - named SEAL: a Spatial Economic Agent-based Lab - comprehends a framework to enable public policy ex-ante analysis. The aim of the model is to use official data and municipalities spatial boundaries to allow for policy experimentation. The current version considers three markets: housing, labor and goods. Families' members age, consume, join the labor market and trade houses. A single consumption tax is collected by municipali- ties that invest back into quality of life improvements. We test whether a single metropolitan government - which is an aggregation of munic- ipalities - would be in the best interest of its citizens. Results for 20 simulation runs indicate that it may be the case. Future developments include improving performance to enable running of higher percentage of the population and a number of runs that make the model more robust as well as further policy analysis. Keywords: Agent-based model, Public Policy, Spatial modeling, Metropoli- tan regions, Public Finances 1 Introduction Anticipating public policy effects is no simple task [8,19,17]. Once planned and put into effect, policies are subject to interested actors reaction, learning, chance, and emergent behavior [23]. That is why governments actions are monitored and ex-post evaluation is implemented. Understanding of policies' effects ex-ante is relevant in the Brazilian context for at least two main reasons. Firstly, municipalities in Brazil are autonomous, independent entities, comprising a three-level federation since the 1988's Con- stitution. That implies metropolitan neighbors can act politically independently in terms of transportation or other public services. Secondly, metropolises in Brazil tend to be centralized with concentration of economic activity, higher level of business and amenities in the capital. Thus, agglomeration economies and fiscal regulation favor capital cities in detriment of nearby municipalities [16]. Peripheral areas, in turn, observe higher levels of violence, longer commuting times to the center and lower quality of public 2 services offer. In practice, that means most workers commute to the capital, contribute to increased economic output, but go home at night to an outer municipality that does not collect enough taxes to supply basic services. As a result, urban economic space in Brazil is highly heterogeneous with concentration of capital and quality in the center and lack of access to services and jobs in the borders. Such spatial configuration, when divided by political- administrative boundaries, tend to further segregate access to citizens and, thus, lower economic output. In fact, political fragmentation in metropolises has been found to reduce productivity [1]. Given such a context for the Brazilian case, an exercise of ex-ante policy analysis that could verify whether a political entity spatial configuration serves the public best may be helpful. Nevertheless, there is no evidence of such exercise. Probably because solving what-if problems in an urban environment looking towards the future is methodologically burdensome. However, recent developments in agent-based modeling, especially for eco- nomic [9,12] and urban analysis [13], have been shown to contribute to the debate and enlighten future prospects of policy analysis. Moreover, ABMs are helpful in modeling complex systems such as markets [10,4] in which interactions among agents are not linearly related to observed macro structures. The model presented here is intended as a simple one 3 in which the main behaviors of the economy in space are captured. Hence, we depart from an abstract previous model [14], turn the model into an empirical one and test a specific policy, i.e., whether bounded municipalities, with a single metropolitan government are more beneficial to the average citizen. Such benefit is tested using a Quality of Life Index (QLI) weighted by the population. This test is provided as an illustration of ex-ante policy analysis. Other possibilities of the model as a framework are also discussed in 4. The main contribution of the paper is an extension and testing of a simple, fully functional, spatial modeling that is based on previous work [21,18,14]. Yet, it goes further than land-use change analysis [13,25] to include spatially gov- ernmental entities and fiscal testing in an applied exercise. Thus, moving the arguments of [19] and [8] into a practical application. Besides this introduction, the next section (2) presents and details the model and the agents' behavior. Then preliminary results are discussed (3) along with the limitations of this version. The closing section (4) develops the scope of the model and details further developments. 2 Model and processes The objective of SEAL is to model economic markets in space and time so that policies and budgetary decisions can be evaluated given actual municipal boundaries. Thus, citizens reside in domiciles that are precisely located in urban and rural space within different municipalities. Businesses also have geographical 3 There has been a debate in ABM literature about whether a model should be large and complex such as [11,20] or simple, as argued by [21]. 3 coordinates. These locations allow the model to implement decisions based on distance, such as shopping at the nearest shops or working closest to home. Also, production and tax collections are localized. That means the spatial design of taxes can be investigated. This is specially relevant for the case of Brazilian metropolises in which there is clear disagreement among urban functional areas and offer of public services [16] and commuting and transport are relevant given the poor quality of infrastructure. The model in [14] is based on [21] and [18]. However, the original abstract model is built upon seven, squared and fictitious regions with 1,000 agents in total. The one in this paper is based on actual municipal boundaries of the metropolitan region of Bras´ılia, in Brazil. The model also uses census population from the year 2000 [5], following age group proportions. The agents are then bounded into families and they age following official mortality probability data. Female agents give birth according to their fertility rates by age and state. Number of firms and urban rural proportions also follow actual numbers and spatial coordinates. A detailed description of the model is available in [15]. 2.1 Agents Citizens, families and households. Citizens are bounded into families and are distinguished by gender, age and qualification. Families consolidate every working members' income and make spending decisions together. They also move and participate in the housing market as a single entity. Houses are fixed and can be either empty or occupied although they always have a single owner. Household addresses are the reference for all members of the family. They are relevant when searching for a job, to compute commuting statistics for those employed and when choosing firms to buy goods. Citizens, families and households each have their own class instances. Children are born and remain in their mothers' families. The model does not contemplate neither new families nor marriage at this time. Firms and government. Firms participate in the labor market and maintain a number of workers that varies in size according to sales performance. Firms are fixed in space and pay taxes to the government they belong to, given their location. Production is proportional to labor force and its qualification. Workers' productivity is adjusted by an α parameter. Technology is fixed, products are homogeneous and prices depend on the level of firms' stock [3,9]. Governments - as municipalities or as a single metropolitan region - simply collect consumption taxes at the moment of sales transaction at the location of the firm. Municipalities' QLI starts at the same level of Human Index Develop- ments in 2000. Then, they are incrementally raised as a linear value of collected taxes within a given municipality weighted by current population. That implies a municipality with a proportionally more active goods market and smaller popu- lation collects more taxes and can increase QLI faster. Higher QLI makes houses on that municipality more expensive. 4 2.2 Markets Goods market. Families consume a given probabilistic share of their current available cash depending on a propensity to consume parameter β. Families then search either for closest firm or the cheapest price in a parameter-defined sample of the market. Once selected the firm, the family will spend all designated money for con- sumption, given that the firm has enough product to supply. 4 Otherwise, the family consumes whatever quantity is available. The money not set to consume plus any amount not spent is saved by the family. Such saved money is afterwards reserved for use in the housing market. Taxes are paid to the local government of the firm when the family makes the purchase. Housing market. House prices are given by a fixed size, intrinsic quality and the QLI of their region [22]. The QLI represents amenities of the municipality and richer municipalities have higher QLI levels. The housing market follows empirical results for the Brazilian case which suggest that there are always un- occupied houses [24,7]. Every month a percentage of families enter the housing market. All vacant houses are also available for purchasing. Both families and houses are sorted. Cheaper houses and families with less savings rank first. If the family has enough savings to purchase a house, the transaction happens. If not, the savings of the next family are checked. When there are no more families with enough funds or available houses, the market closes. Every time a family buys a new house, they will evaluate their option of actually moving to the new house. If the family lives in their best house, but all adults are unemployed, they move to the second best house and then make the best house available for sale in the market the following month. On the contrary, if the family does not live in the best house and at least one adult is employed, they move into the best house the family owns. In all other cases, the family does not move. Such a system of moving into the second best house and selling the best- quality one, slowly tends to make the poorest move to the outer municipalities where housing is cheaper [6]. Moreover, even though it would be in the family's interest to remain in the affluent area, they actually are unable to afford it and need to get liquidity to participate in the consumption market. Labor market. All agents that are not employed and are over 15 or below 70 years old enter the labor market every month. Firms evaluate a number of strategies. They quantify a 'cash reserve' value which enables them to pay out employees before laying them off. If the firm's available cash is above such cash reserve threshold, the firm enters the labor market hiring. 4 Probabilistically, on average, we assume that consumption at a single shop would yield similar results if the families chose more places to shop. 5 Further, if the firm is currently with no employees but either their stock of products or available cash is positive, they also enter the market. When the firms' current cash drops below the monthly payroll, they start firing employees, one at a time. Once offering firms and applicants are defined, the labor market operates under two alternatives: half the applicants are chosen according to their qualifi- cation and half given their proximity to the firms' address. This is relevant for the case of Brazil as commuting is expensive and time consuming due to its low quality general inefficiency. Further, employers are legally bind to pay employ- ees' commuting that exceeds 6% of their salary in what is called 'commuting- voucher'. In practice, that means business discriminates for place of residence for non-specialized positions. Firms that had profit in the last quarter and have available cash above their 'cash reserve' level distribute such surpluses to their employees proportionally to their qualification level. Finally, firms are sorted according to their current calculated paying wages. Firms paying higher salaries choose first and get employees with better qualifi- cation or who live closer to their firms. Spatial and markets dynamics. Those rules of the markets provide a very dynamically spatial model with families moving within and across municipalities. Firms getting varying demand and labor offers and municipalities collecting ever- changing taxes which affect their QLI at different speeds. When QLI increases too much, houses get more expensive and less families can afford to move in. Less populated municipalities then may sell less which in turn decreases tax collection. Parameters This model has not been fully parametrized to fit a real example. However, as made explicit in 3, a general economic pathway in terms of macro indicators is observable. A brief sensitivity analysis of the model was conducted in order to check whether small changes in the parameters alters the general results obtained. The simulation of this paper uses the following parameters: α = .3, β = .94, percentage of families entering the real estate market = .004, vacant houses percentage = .09, and taxes are set at .25. Distance as a hiring criteria is also a parameter. 2.3 Scheduling and multiple simulation runs Simulation runs The model is structured so that a single simulation or multiple runs can be made automatically. That means either the model runs once from 2000 to 2020 and the outputs are produced or the model repeatedly runs for a given number of times and the accumulated results are produced. In each run, different random numbers are used. That influences many aspects of the model, such as: the choice of amount for families' consumption, entering the real estate market, demographic probabilities, chance of being fired, among others. 6 Scheduling Agents are generated and saved for a given sample of population. In a single run, the model first saves or loads the agents (2.1). Then actions are implemented in a day, month, quarter and year pattern. The only activities that happen in business days (set to 21) are daily production and commuting. Monthly activities concentrate the core of the model and happen in the following order: 1. Process demographics (aging, births, deaths). 2. Firms make payments. 3. Families redistribute their own cash within members. 4. Family members consume (goods market). 5. Governments collect taxes. 6. Governments spend the collected taxes on life quality improvement. 7. Firms calculate profits and update prices. 8. Labor market is processed. 9. Real estate market is processed. 10. Statistics and output are processed. 3 Results Bras´ılia and its metropolitan region (RIDE) with 10 municipalities is the illus- trative case study (see Figure 1). In order to evaluate the results, a simulation from 2000 to 2020 was repeated a total of 20 times (with different random seeds). The same model was run 10 times with the municipalities being considered in- dependent entities just as they are today. Another 10 runs were made as if all municipalities were one single government entity. That way, for half of the simulation runs taxes are collected locally and lead to QLI increase within the municipality where the transactions were made. For the other half, taxes are globally collected and homogeneously improve the QLI for all municipalities. Results indicate that, given the implicit variability of the model, average population weighted QLI follow similar trajectory (see Figure2). Actually, a t test could not reject the hypothesis of identical averages between the two alternatives (together and separated municipalities)at 5% (t-statistic=-1.742). Although the QLI is slightly superior for the runs in which the municipalities are together, we are unable to state that such result holds for other samples of the population. We are evaluating whether the increase in QLI has an absolute effect on all citizens. However, if we focus on the individual poorer municipalities with lower values for QLI, we can tell that a distributive effect actually happens with gains observed in Figure 3b when compared to flat lines in Figure 3a. Of course, such gains derive from a slower increase from Bras´ılia, resulting in a very small absolute result for this model. Finally, these outputs of the model despite being illustrative show that it is possible to use spatially separated markets to observe differentiated behavior across the territory. In fact, although average weighted QLI is the same, its distribution in space is considerably different. 7 Fig. 1: Case study: Bras´ılia. The 10 municipalities in orange officially constitute the metropolitan region (RIDE). The run of the individual municipalities are compared with the run of the model considering the full RIDE as one single government entity. Urban areas, in black, are proportionately more populated. Commuting (Euclidean distance) is considered among households and firms in both labor and goods market. Sensitivity analysis The sensitivity analysis indicates that the changes af- fected by the parameters are small in magnitude. Among the parameters tested, α (labor productivity), β (propensity to consume) and Tax on consumption seem to impact the most. Alpha produced the largest GINI index at the maximum value at 0.5, but the lowest GINI was found at 0.3 and not the minimum value. Consumption of the families is also higher at the lowest level of taxes. In general, lower taxes (5%), implied in higher levels of firms' and families' wealth as well as a higher absolute GDP value. Finally, higher values of beta lead to higher production, but also higher inequality. Size of the market, house vacancy, percentage of families entering the real estate market or use of distance in the hiring process do not seem to impact the general trends of the results in a relevant manner. Some variation is observed in absolute GDP output as well as in the time onset of some trends. When distance is totally disconsidered and hiring criteria is restricted to qualification only, the economy seems to reach stability earlier. In contrast when distance is the sole determinant of hiring, the economy takes longer to become stable and GINI values are lower. 8 Fig. 2: Results of mean weighted Quality of Life Index (QLI) for Bras´ılia, 20 runs. Blue lines represent runs with one government entity. Red lines boundaries are as they are currently: 10 individual municipalities. Solid lines are mean values. QLI increases according to government revenue collected for a given municipality. Housing prices are influenced by QLI at their locations. Limitations The results presented here are only illustrative. In order to make them more robust, it would be necessary to run a higher number of simulations with varying samples of the population so that a trend could be identified, simi- larly to the proposed by [2]. Further, hitherto we have been unable to implement multiprocessing and parallel programming while maintaining an object oriented programing paradigm and intense agents interaction. Consequently, given the need of repeated runs with large number of agents, simulations are taking un- reasonably long. Considering the content and the investigation of administrative boundaries, we believe we would have to expand the tax systems in order to make it more similar to observed taxes. That is especially relevant because of the regressive tax system in Brazil that tends to favor metropolitan capitals [16]. Once a full tax system is implemented, the current model needs to be vali- dated against observed data. As it is, unemployment remains between 0 and 5% of the working force from the 5th year onwards. GINI coefficient levels are below 9 (a) individual municipalities (b) municipalities as single entity Fig. 3: QLI evolution of each municipality. On the top, municipalities collect taxes as individual entities and invest in their own territory. On the right-hand side, all taxes collected in the region are distributed homogeneously as if they were a single government entity. 10 Brazilian standards at 0.28 on average. GDP per capita growth varies around 0.7%. Finally, this model, as the abstract one, does not contain a credit market. 4 The framework and final considerations Turning a simple abstract model into an empirical one has presented some chal- lenges. Firstly, implementing demographics dynamics meant reading age group, gender and location of population size, aging all the agents and allowing for fecundity while controlling for mortality by region. Secondly, another difficult task is the need to maintain a system in which firms keep a permanent working force, but have to face very dynamic and er- ratic sales. Additionally, keeping the system on a growth path means avoiding generalized shut down of firms, constant consumption of families and an active labor market. Thirdly, given the nature of agent-based models and its intrinsic stochasticity, every test should include repeated simulations so that the conclusions are based on most likely scenarios. However, running simulations with a 10% of the sample for the case of Bras´ılia would mean 273,000 agents and such simulation would need to be run at least 100 in order to guarantee robust results. Finally, a sensitivity analysis with six main parameters and ten interval tests varying one parameter per time only as the others remain fixed would imply 60 further simulation runs. Given such a context, this paper tests an illustrative ex-ante policy analysis using simple markets and spatially bounded, local government entities. Thus, it demonstrates the viability of a stable economic framework in which further experimentation can be tried upon. In fact, SEAL's framework enables a large number of policy analysis, including, at least: (a) transportation and commuting studies, given that firms and households are known and dynamic in the case of the latter, (b) price and wage strategies at the level of the firm specifically, (c) labor market rules and relevance of workers' qualification, and (d) efficiency of municipalities' public investments. References 1. Ahrend, R., Farchy, E., Kaplanis, I., & Lembcke, A. C. (2014). What makes cities more productive? Evidence on the role of urban governance from five OECD coun- tries. OECD Regional Development Working Papers, 2014(5), 33. 2. Anselin, L. (1995). Local indicators of spatial associationLISA. Geographical Anal- ysis, 27(2), 93-115. 3. Blinder, A. S. (1994). On sticky prices: academic theories meet the real world. In Monetary policy (pp. 117-154). The University of Chicago Press: N. Gregory Mankiw. 4. Boero, R., Morini, M., Sonnesa, M., & Terna, P. (2015). Agent-based models of the economy: from theories to applications. New York, NY: Palgrave Macmillan. 5. Brazil: Censo demogr´afico 2000: agregado por setores censit´arios dos resultados do universo. Instituto Brasileiro de Geografia e Estat´ıstica (IBGE) (2003). 11 6. Brueckner, J. (1987). The structure of urban equilibria: a unified treatment of the Muth-Mills model. In Handbook of Regional and Urban Economics (pp. 821-845). Elsevier Science Publishers B.V. 7. Cavalcanti, C. B., Oliveira, C. A. P. de, Teixeira, L. M., Giustina, Y. R. D., Furtado, B. A., Krause, C. H., Nadalin, V. G. (2016). Retrato das ´areas centrais do Brasil. 8. Colander, D., Kupers, R.: Complexity and the Art of Public Policy: Solving Societys Problems from the Bottom Up. Princeton University Press (2014). 9. Dawid, H., Gemkow, S., Harting, P., Van der Hoog, S., Neugart, M.: Agent-based macroeconomic modeling and policy analysis: the Eurace@ Unibi model. Bielefeld Working Papers in Economics and Management. (2014). 10. Dawid, H. (2015). Modeling the economy as a complex system. In Modeling com- plex systems for public policies (pp. 169-190). Bras´ılia, DF: Bernardo Alves Furtado, Patr´ıcia Sakowski, Marina H T´ovolli. 11. Deissenberg, C., Van Der Hoog, S., & Dawid, H. (2008). EURACE: A massively parallel agent-based model of the European economy. Applied Mathematics and Computation, 204(2), 541-552. 12. Dosi, G., Fagiolo, G., Napoletano, M., Roventini, A.: Income Distribution, Credit and Fiscal Policies in an Agent-Based Keynesian Model. SSRN eLibrary. (2012). 13. Filatova, T., Parker, D., Van der Veen, A.: Agent-Based Urban Land Markets: Agents Pricing Behavior, Land Prices and Urban Land Use Change. Journal of Artificial Societies and Social Simulation. 12, (2009). 14. Furtado, B.A., Eberhardt, I.D.R.: A Simple Agent-Based Spatial Model of the Economy: Tools for Policy. JASSS. 19, 12 (2016). 15. Furtado, B.A., Eberhardt, I.D.R., Messa, A.: SEAL's operating manual: a Spatially-bounded Economic Agent-based Lab. arXiv:1609.03996 [cs, q-fin]. (2016). 16. Furtado, B.A., Mation, L., Monasterio, L.: Fatos estilizados das finan¸cas p´ublicas municipais metropolitanas brasileiras entre 2000-2010. In: Territ´orio metropolitano, pol´ıticas municipais. pp. 291-312. Bernardo Alves Furtado; Cleandro Krause; Karla Fran¸ca, Bras´ılia (2013). 17. Furtado, B.A., Sakowski, P.A.M., T/'ovolli, M.H.: Modeling complex systems for public policies. IPEA, Instituto de Pesquisa Economica Aplicada, Bras´ılia (2015). 18. Gaffeo, E., Gatti, D.D., Desiderio, S., Gallegati, M.: Adaptive microfoundations for emergent macroeconomics. Eastern Economic Journal. 34, 441-463 (2008). 19. Geyer, R., Cairney, P.: Handbook on complexity and public policy. Edward Elgar Publishing (2015). 20. Guocheng, W., Yuna, S., Jie, W., & Zili, W. (2015). Application analysis on large- scale computation for social and economic systems. Presented at the International Conference on Systems, Man and Cybernetics, Hong Kong: IEEE SMC. 21. Lengnick, M.: Agent-based macroeconomics: A baseline model. Journal of Eco- nomic Behavior and Organization. 86, 102-120 (2013)., 22. Malpezzi, S. (2002). Hedonic pricing models: a selective and applied review. In Housing Economics. Kenneth Gibb e Anthony O'Sullivan. 23. Miller, J.H., Page, S.E.: Complex adaptive systems. Princeton University Press (2007). 24. Nadalin, V., Igliori, D.: Empty spaces in the crowd. Residential vacancy in Sao Paulo's city centre. Urban Studies. 0042098016666498 (2016). 25. Parker, D. C., Manson, S. M., Janssen, M. A., Hoffmann, M. J., & Deadman, P. (2003). Multi-Agent Systems for the Simulation of Land-Use and Land-Cover Change: A Review. Annals of the Association of American Geographers, 93(2), 314- 337. https://doi.org/doi:10.1111/1467-8306.9302004
1909.07867
1
1909
2019-09-17T14:57:45
TruPercept: Trust Modelling for Autonomous Vehicle Cooperative Perception from Synthetic Data
[ "cs.MA", "cs.CV", "cs.RO" ]
Inter-vehicle communication for autonomous vehicles (AVs) stands to provide significant benefits in terms of perception robustness. We propose a novel approach for AVs to communicate perceptual observations, tempered by trust modelling of peers providing reports. Based on the accuracy of reported object detections as verified locally, communicated messages can be fused to augment perception performance beyond line of sight and at great distance from the ego vehicle. Also presented is a new synthetic dataset which can be used to test cooperative perception. The TruPercept dataset includes unreliable and malicious behaviour scenarios to experiment with some challenges cooperative perception introduces. The TruPercept runtime and evaluation framework allows modular component replacement to facilitate ablation studies as well as the creation of new trust scenarios we are able to show.
cs.MA
cs
TruPercept: Trust Modelling for Autonomous Vehicle Cooperative Perception from Synthetic Data Braden Hurl1, Robin Cohen1, Krzysztof Czarnecki1, and Steven Waslander2 9 1 0 2 p e S 7 1 ] A M . s c [ 1 v 7 6 8 7 0 . 9 0 9 1 : v i X r a Abstract -- Inter-vehicle communication for autonomous ve- hicles (AVs) stands to provide significant benefits in terms of perception robustness. We propose a novel approach for AVs to communicate perceptual observations, tempered by trust modelling of peers providing reports. Based on the accuracy of reported object detections as verified locally, communicated messages can be fused to augment perception performance beyond line of sight and at great distance from the ego vehicle. Also presented is a new synthetic dataset which can be used to test cooperative perception. The TruPercept dataset includes unreliable and malicious behaviour scenarios to experiment with some challenges cooperative perception introduces. The TruPercept runtime and evaluation framework allows modular component replacement to facilitate ablation studies as well as the creation of new trust scenarios we are able to show. I. INTRODUCTION Cooperative Perception, sometimes referred to as collabo- rative perception or collective perception [1], is a perception domain which focuses on fusing information from multiple agents. Cooperative perception is grounded in the idea that two or more agents can combine information from their respective viewpoints to increase perceptual range and ac- curacy and reduce blind spots caused by occlusions from one perspective. State-of-the-art cooperative perception methods typically assume information received is correct. In real-world situa- tions this assumption may not hold, and malicious attackers could take advantage of models which do not incorporate mechanisms to detect and eliminate false information. Trust modelling is a field of study which aims to identify un- trustworthy agents by evaluating the consistency of received information. Trust modelling has been studied for vehicular ad hoc networks (VANETs) (e.g., [2]) but never, to the best of our knowledge, with a focus on cooperative perception. Our aim is to enable the benefits of cooperative perception: extended perceptual range, perception of occluded objects, and increased perceptual accuracy. The motivation behind using cooperative perception to increase perceptual accuracy, even in situations where the object is at least partially visible to the ego-vehicle, arises from two main ideas: 1) Ensemble Methods: aggregate out- puts from multiple classifiers to produce scores better than a single classifier [3]. A hypothesis is introduced that using detections from multiple vehicles could improve detection accuracy through similar principles of ensemble learning. 1Braden Hurl, Robin Cohen, and Krzysztof Czarnecki are with the David R. Cheriton School of Computer Science, University of Waterloo. [bdhurl, rcohen, k2czarne]@uwaterloo.ca 2Steven Waslander is with the Institute for Aerospace Studies, University of Toronto. [email protected] 2) Viewpoint Diversity: Different viewpoints may increase detection accuracy of objects in view of the ego-vehicle as a closer, less obstructed, or non-truncated view of an object can increase the probability of a true positive detection. The goal is to increase object detection accuracy, even of objects that are beyond the typical sensor range, which will in turn increase vehicle, pedestrian, and cyclist safety. The solution depends on parties being willing to share information and must not degrade performance (i.e., the solution must run in real-time). Existing work in this area is limited, likely due to the lack of testing data. Current state-of-the-art cooperative perception methods focus on limited test scenarios (e.g., [4]). This makes it difficult to analyze the effect on the entire perceptual pipeline. Cooperative perception without conducting a thorough analysis on the potential implications of malicious agents could lead to danger. In an endeavor to progress the capabilities and safety of cooperative perception, we offer two primary contributions: • A novel method for integrating trust modelling with cooperative perception into an end-to-end distributed perception model. Experimental results show an in- crease of up to 5% Average Precision (AP). • The TruPercept dataset, which is, to the best of our knowledge, the first multi-vehicle perspective percep- tion dataset for AVs gathered in a realistic environment. The TruPercept dataset is not scenario-based but en- compasses regular urban driving in a synthetic world. This will allow researchers to benchmark models for improving cooperative perception. These building blocks for effectively understanding trust modelling with perceptual information are essential for ex- panding robustness of detection methods and exploiting com- municated information without leading to overconfidence and susceptibility to simple attacks. II. RELATED WORK Existing state of the art for cooperative vehicles uses VANETs and various information fusion approaches which are introduced in this section. Vehicular ad hoc networks (VANETs) are spontaneous net- works used for intelligent vehicle communication. VANETs can be comprised solely of intelligent vehicles (IVs), but also commonly include road-side units (RSUs) to extend communication range and a central server for tasks such as moderating agents or information aggregation and evaluation. VANETs can be used to transfer information such as traffic congestion, road conditions, and collision warnings. They will also be the communication medium for cooperative perception. Key issues to address include reliable exchange of messages, even with low latency (e.g., [5], [6]) and ensuring the availability of networks for IVs and to optimize RSU locations ([7]). Correa et al. [8] also show how smart infrastructure can enhance perceptual range. Map merging to align views, handling localization between vehicles in case of GPS failures and increasing accuracy have all been ex- amined to provide richer solutions ([9], [10], [11]). Aligning detections shared between vehicles has also been promoted ([12]). Latency and alignment issues are set aside for now, with our particular model. Feng et al. exhibit, in their summary of modern object detection and segmentation networks [13], methods which utilize information fusion at various stages in the detection network. Typical fusion methods in 3D object detection (3DOD) fuse image and LiDAR data. Cooperative perception also fuses information from multiple sources; however, from a considerably greater quantity as the sources are nearby vehicles. With cooperative perception the information shared can range from raw image and point cloud data to final object detections or tracks (detections over time). Arnold et al. [14] use images from multiple perspectives to reconstruct 3D objects and discuss how this could be used to better detect relevant 3D objects. Chen et al. [15] fuse raw point cloud data which they argue is better than images since there is no need for overlap to perform convolutions. Fusing raw sensor data provides more information to detection networks at the cost of increased bandwidth requirement and latency. Correa et al. [8] say perception performance can be en- hanced by transporting detection results (late fusion) instead of raw data. They point to two standardized message trans- portation protocols for late fusion; the Cooperative Aware- ness Message (CAM) [16] and the Collective Perception Message (CPM) [17]. Hobert et al. [18] discuss some of the limitations and recommendations for CAMs [16]. Obst et al. [4] combine tracks from multiple vehicles to increase detection of vehicles that are out of the sensor field of view, which can facilitate detecting and tracking vehicles that enter into view. Unfortunately, there is no standard to compare autonomous vehicle cooperative perception methods. Chen et al. [15] test their method by concatenating point clouds from the same vehicle of a KITTI scene at two different times. Other works typically use scenario-based test cases and do not include quantitative metrics for large regular driving situations. Furthermore, there is no guarantee that information re- ceived from other vehicles is correct. The cooperative per- ception methods discussed do not take this into account, which introduces a huge security flaw. A vehicle could disseminate false information unintentionally, for example by using a poorly performing perceptual network, or malicious information could be spread with the intention of causing harm. To prevent this, a central server or authority can be included in VANET system models, often assisting with trust certificates to authenticate trustworthiness ([19], [20]). Many trust models include information relayed through vehicles to RSUs then onto the central server; accuracy of information can then be determined if authority-provided ground truth is acquired. Without a central authority (or one unable to obtain ground truth), a trust modelling component then becomes paramount to introduce (e.g., [21], [22]). III. TRUPERCEPT MODEL Inspired by related work, this section outlines a novel in- tegrative approach to perception and trust for AV perception. A. Perception There are many computer vision models designed for 3DOD in AVs such as [23] and [24], which can be inter- changed within the TruPercept system. An object instance, denoted as θ, is detailed with a class (vehicle, pedestrian, cyclist), 3D position relative to on-board GPS (x, y, z ∈ R3), 3D bounding box dimensions (width, height, length ∈ R3), heading (rotation around up axis ∈ {−π, π}), and a score. The set of all possible detections is denoted Θ so that θ ∈ Θ. The ego-vehicle, the perspective the model is defined from, is denoted as α and a superscript is used to denote agent perspective (i.e., Θα are the local detections output by α). Detections and their evaluations will be broadcast to nearby vehicles, which can determine to rebroadcast if the message is within a preset range and time period. B. Detection Evaluation Union (IoU) of two 3D bounding boxes. Judging trustworthiness of reports received from peers is often calculated by evaluating messages against ground truth data. For 3DOD ground truth data is true information (θ) for each object in range, which, if available, would make perceptual pipelines unnecessary. Instead, each vehicle will evaluate each detection it receives with the information from its perspective. The following function definitions are used: • IoU: Θ × Θ → [0, 1]: Returns the Intersection over • sv : Θ → [0, 1]: Returns the detection score of a detection from a vehicle v which attempts to represent confidence [23] or probability [25] of a true detection. • ev : Θ → [0, 1] ∪ −1: The evaluation score (from a vehicle v) of a detection. Evaluation scores should ideally be probabilistic between 0 and 1, where 0 represents that the detection is incorrect and 1 signifies the vehicle v is 100% certain the detection is correct. is already evaluating whether detections are present or not, within the FoV of on-board sensors, from a local 3DOD network. It follows naturally to evaluate received detections on whether or not they match Θα. Firstly, all received detections are filtered by local detection area (70 metres 90◦FoV for AVOD [23] default configuration). Next, received detections are matched with Θα, producing a set M of sets of matches Θm. A matching set Θm has a detection from α (if matched), followed by all matching received detections. Two detections are considered a match if the IoU is over a threshold param- eter τ and are the same object class (e.g., car, pedestrian, The ego-vehicle, denoted as α, cyclist). Each received detection will be matched to the ego- vehicle detection with which it has the highest IoU. Only one detection per received vehicle detection list is matched with any ego-vehicle detection. Any detection θ which α receives which matches one of its own detections θ(cid:48) will have eα equal to sα(θ(cid:48)). If there is no match with θ, α will set eα(θ) to η, a negative evaluation constant. Experiments are conducted with η set to either 0 or -1. For each received detection θ, and the detection of α labelled θ(cid:48), where θ(cid:48) is the object instance in Θα which has the maximum IoU with θ, the following applies eα(θ) = sα(θ(cid:48)) η IoU (θ, θ(cid:48)) > τ otherwise (1) (cid:40) Using only the local detection score to evaluate detections is not sufficient. Objects which are further away, truncated, or occluded may have lower or η evaluation scores which would be erroneous evaluations. To solve this problem, another value which encompasses the visibility of the detection is proposed using the following definitions: • pv : Θ → Z≥: the number of points from the perspec- tive vehicle v LiDAR point cloud P v which are within the boundaries of an object θ. • Φv : Θ → [0, 1]: the visibility value of a detection θ from a vehicle v. 1 is completely visible and 0 signifies no knowledge from the current viewpoint. The true visibility of an object θ from a perspective v is difficult to calculate and will be approximated by pv(θ). Let γl and γu be the lower and upper pv(θ) limits for min/max visibility respectively. Visibility is calculated as max (0, pv(θ) − γl) (cid:18) (cid:19) Φv(θ) = min 1, (2) γu − γl If there are no points residing in the 3D bounding box then the object is likely obstructed and the visibility value will be set to 0 (the vehicle is completely unsure as to whether the received detection is correct or not). This follows the assumption that the more LiDAR points that return from an object, the higher the chance the 3DOD algorithm has of detecting it. Thus, the visibility score can be used as a means to estimate the confidence that there is no object for a negative (i.e., unmatched) detection evaluation. C. Trust It can also be beneficial to evaluate the total information flow from a vehicle. For example, if a vehicle is broadcasting malicious information, the vehicle should be identified, so it can be ignored and appropriate measures can be taken. Trust calculation can be done centrally or by each vehicle. Central aggregation introduces a strong system requirement (central server), but is better as vehicles only enter within proximity of each other for short time periods (≈ 15 seconds average in the TruPercept data). Trust values are calculated for each object and then vehicle on the central server and then periodically broadcast so vehicles may use the information while integrating detections from other vehicles. The trust T for a detection θα will be denoted as T (θα) and will be aggregated using evaluations from all nearby vehicles V which received the detection θα (V excludes α). The evaluation from each vehicle v ∈ V will be aggregated in proportion to how visible the detection is from each evaluator perspective v (i.e., Φv(θ)). Let the trust function for a detection from the ego-vehicle θα be T : Θ → [0, 1]. T (θα) = Φv(θα) · ev(θα) Φv(θα) (3) (cid:80) v∈V (cid:80) v∈V The trust value for a vehicle v is calculated on a central server by aggregating the trust feedback from all detections that vehicle has sent in proportion to the local detection score for each detection. Up to this point, we have done everything instantaneously, but trust is calculated over time. Let Θα t be Θα from a time step t. Let Bα be the set of all detections for every t ∈ [−f, 0], where f is the freshness from Θα length. Let the trust function for vehicles be T : B → [0, 1]. t Then the trust for α is (cid:80) θ∈Bα (cid:80) θ∈Bα sα(θ) · T (θ) sα(θ) (4) T (Bα) = D. Detection Aggregation (cid:80) θv∈θm (cid:80) A final aggregation step (at each vehicle) produces a score ω for every matching set Θm ∈ M where θmi is the ith detection θ ∈ Θm. There are several inputs to this stage: evaluations ev(θ), visibility Φv(θ), and trust of evaluator T (Bv). Let the score function for a final detection be ω : Θm → [0, 1]. 1) Weighted Average: A simple aggregation system which uses a weighted average calculates final scores as Φv(θv) · T (Bv) · ev(θv) (5) ωα(Θm) = Φv(θv) · T (Bv) η = 0 for this method so that ω(Θm) ∈ [0, 1]. θv∈Θm 2) Additive (Positive and Negative): The weighted av- erage method is able to quantify the belief an object is present relative to the trust and visibility of the object. However, it does not account for the quantity of vehicles which perceived the object. It is expected that the higher the ratio of vehicles which perceive a visible object, the likelier the object is to exist. The additive aggregation adds to the final detection score for every vehicle which perceived the object and subtracts for every vehicle from which the object was not perceived (unmatched). η = −1 to create the positive/negative addition/subtraction mechanism. The aggregation is weighted by the object visibility Φv(θ) and trustworthiness T v of each evaluator v. The final score is ωα(Θm) = Φv(θv) · T (Bv) · ev(θv) (6) (cid:88) θv∈Θm The resulting value of equation 6 is not bounded later bounded using ωα(Θm) = by 0 or 1; is it min (1, max (0, ωα(Θm))). Trust value for the ego-vehicle should be set to 1, or higher than 1 if bias towards the ego- vehicle detections is desired. E. Plausibility Checker Thus far, the message evaluation relies on visibility of objects. This could be taken advantage of if a malicious agent were to insert false detections where there are no points. For example, false detections are inserted half a meter off the ground in front of vehicles where there is open air. No LiDAR points would be registered and the visibility value would be calculated as zero even though the non-object is visible. If there are points behind the object, and no points in front or within the object bounding box, then the existence of the object is false with high confidence. Obst et al. [4] create a mechanism for determining false tracks for cooperative perception and use the term plausibility checker. The TruPercept system incorporates a novel plausibility checker which performs a frustum cull on the point cloud. The frustum is centered to the object center and extends a quarter of the smallest dimension (width or length) to the top, bottom, left, and right. If more than 10% of the points are closer than the object center, it is considered plausible. The plausibility check can be performed in two key spots: 1) During message evaluation it can provide strong negative evaluations instead of not contributing to the evaluation due to low/zero visibility. 2) After aggregating detections to remove any detections which were erroneously aggregated to scores higher than zero. F. TruPercept Summary The TruPercept system has the following detection and decision-making cycle on the ego-vehicle α: obtain sensor data; run the detection network to obtain Θα; broadcast Θα; receive Θv ∀ v ∈ V or stop at timeout t; calculate M; calculate and broadcast p(θ), e(θ) ∀ θ ∈ Θv, v ∈ V ; receive p(θ), e(θ) ∀ θ ∈ Θv, v ∈ V or stop at timeout t; calculate ω(Θm) ∀ Θm ∈ M. The central server receives vehicle broadcasts of e(θ) and updates T (θ) and T (Bv) ∀ θ ∈ Bv, v ∈ V ∪ α which it then periodically broadcasts. IV. THE TRUPERCEPT DATASET Ideally, data would be collected from the real-world, as it would most accurately represent autonomous driving conditions; however, collecting data from the real-world for cooperative perception has resulted only in limited test-case scenarios. To the best of our knowledge, there are no ex- isting publicly available real-world or synthetic cooperative perception datasets for autonomous driving encompassing regular driving. Creating a real-world dataset would require a fleet of vehicles equipped with autonomous sensor systems simultaneously collecting data. Trust modelling for V2V are often evaluated through the use of simulation software. Chen et al. [19] use OMNET++ [26] for V2V communication and SUMO [27] for road traffic simulation. However, these simulators do not contain sensory level perceptual information. Simulators such as CARLA [28] are a viable options as they can obtain synthetic percep- tual data and attempt to simulate traffic flow. Alternatively, Grand Theft Auto V (GTA V) is a video game which contains realistic graphics and has been used to generate synthetic data in a diverse environment for AV perception [29]. Recent efforts have even created an in-game LiDAR point cloud generator [30]. Hurl et al. [31] extend the range of [30] and improve the accuracy of point clouds for pedestrians. The PreSIL dataset [31] produces the necessary data for 3DOD for autonomous driving and has been shown to increase performance on state-of-the-art 3DOD networks. The TruPercept dataset uses the PreSIL generation method [31] and consists of two series of captures, spanning ap- proximately 300 and 400 seconds respectively. The data is captured at 1 Hz and contains identical data to the PreSIL dataset for the ego-vehicle and each vehicle within a 100 metre radius. A 100 metre radius is used to restrict the total number of vehicles. Ideally, 160m will be used as the LiDAR scanner used for the PreSIL dataset has a max range of 80m so vehicles must be within double the max LiDAR range to have overlapping point coverage areas and thus obtain matching detections. The data is captured over two routes through urban environments. V. QUALITATIVE ANALYSIS A. Scenario 1: Algorithm Analysis Using a Single-Frame A scenario was constructed to evaluate qualitatively whether the novel cooperative perception solution can detect a completely occluded object and filter out a malicious detection. The scenario contains the ego-vehicle passing by a parked truck. A pedestrian, occluded from the ego-vehicle perspective, is walking out from behind the truck attempting to illegally cross the road. Another vehicle moving in the opposite direction of the ego-vehicle has a clear line of sight to the pedestrian. A false detection in a dangerous location (less than 10m away, directly in its trajectory, and oncoming) for the ego-vehicle is inserted into the broadcast of the oncoming vehicle. The false detection is given a high detection score (1.0) in an attempt to fool the ego-vehicle. The TruPercept cooperative message evaluation mecha- nism is able to correctly detect the pedestrian which is occluded from the ego-vehicle perspective. Unfortunately the false detection, although the score is decreased, is still present. However, if the plausibility checker is also run, it can eliminate the possibility that the false detection exists while still maintaining the pedestrian which is occluded. The image and a top-down view of the LiDAR point cloud, obtained from the ego-vehicle perspective, is displayed in Figure 1 along with detections from each car and final outputs. The false detection is completely removed and the occluded pedestrian is detected. B. Scenario 2: Vehicle Trust This experiment attempts to show that the TruPercept model can correctly identify a malicious vehicle. Trust is accrued over time by the evaluations of peers. To mimic this, A. Cooperative vs. Local Perception The first experiment is designed to evaluate if the Tru- Percept model improves upon single perspective methods. AVOD [23], a state-of-the-art 3D object detector, is trained using the PreSIL dataset [31] and the mean AP score on the TruPercept data is used as a baseline. Next, AVOD is run for every nearby vehicle (within a 100m radius), and the TruPercept model is run to obtain updated scores. The scores of these methods are displayed in Table I. Several variations of TruPercept are 1) Weighted Average, η = 0 2) Summed Positive and Negative, η = −1 3) Local detections were used primarily. Any non-matching TruPercept 2 detection θ is used if, from the ego-vehicle perspective v, Φv(θ) < 10 and the plausibility check returns true. For shown results τ = 0.1, γl = 0, γu = 100 for cars, and 40 for pedestrians. TABLE I RESULTS: TRUPERCEPT (% AP) Car Pedestrian Easy Mod. Hard All Easy Mod. Hard All Method AVOD 66.8 62.8 52.1 36.3 84.2 78.7 75.1 57.3 TruPercept 1 54.6 48.9 43.9 31.5 76.7 68.7 70.0 54.0 TruPercept 2 57.2 51.4 46.0 32.8 78.6 70.4 71.4 55.0 TruPercept 3 64.8 62.1 51.1 36.7 83.4 78.8 75.8 58.5 The most important insight is that none of the tested methods improve the perceptual accuracy by a meaningful margin over the local perception methods. This shows the importance of testing any modules which are added to the perceptual track with the entire system instead of only sce- narios. Two plausible explanations for the poor TruPercept results are: 1) The alignment issues with the synthetic data could reduce performance for cooperative, but not local, per- ception. 2) Each perspective can introduce false detections, when aggregating between multiple vehicles this could result in more false positives. By investigating the precision-recall curves for several of the models it is evident that for many of the poorly performing cooperative perception models the precision is much lower. This is especially true for lower recall values, likely caused by false detections from nearby vehicles being inserted with high scores. One point to note is that pedestrians have higher detection scores than cars, a reversal from typical real-world data. This could be from pedestrian bounding boxes having identical sizes in the PreSIL data, making regression easier. The PreSIL data also has larger quantities of vehicles such as trucks, busses, and SUVs which are not part of the 'Car' class. This could cause confusion for a detection network which is only attempting to label cars, resulting in more false positives. This could be rectified by training a network to detect all classes. B. Position and Orientation The hypothesis is that vehicles which are closer to an object will provide more accurate positioning and orientation information. This could lead to increased accuracy if objects which are detected are not meeting the KITTI standard of 0.5 IoU to be a true positive. For this experiment, the local Fig. 1. Top: Ego-vehicle image and point cloud of scenario 1. Middle: Ego- vehicle (left) and oncoming vehicle detections (right). Oncoming vehicle has inserted a false detection in front of the ego-vehicle. Bottom: Cooperative perception results without (left) and with (right) the plausibility checker. Ground truth is shown in green, detection score on boxes. the single frame from the previous scenario is replicated 100 times and the trust score is examined at various instances in time. The false detections are inserted after 50 frames so the vehicle has time to build up trust. A freshness timeout f = 50 frames is used so that any evaluation further than 50 frames in the past is discarded and not used towards the vehicle trust. A secondary situation is introduced where the oncoming vehicle places three false detections to compare when there is more false information. The trust for the ego-vehicle remains at 0.82. For the malicious vehicle, the trust value begins at 0.81 and decreases to 0.15 by frame 100. When three false vehicles are added the trust value decreases faster and balances out at zero. Trustworthy vehicles remain unchanged, thus the TruPercept algorithm was able to correctly identify the malicious vehi- cle. Note that there is a third vehicle not depicted in the scene images which has a clear view of all objects in the scene but is further away. It contributes to the positive detection of the occluded pedestrian and has a trust score of 0.97. VI. QUANTITATIVE EXPERIMENTS This analysis shows quantifiable effects of using coop- erative perception on the general perceptual pipeline. The TruPercept dataset is, to the best of our knowledge, the first of its kind, and enables cooperative perception model evaluation on regular driving data. The KITTI evaluation criteria of easy, moderate, and hard are defined by limiting values on occlusion, truncation, and minimum height (in pixels) of objects. This scope is too narrow, as cooperative perception allows detection of objects which are completely occluded, truncated, or are far in the distance. To provide a deeper inspection, the 'All' criteria, which encompasses any object within the forward facing 90 degree FoV area up to 140 metres away, is also evaluated. AVOD detections have the position and orientation set to that of the closest detecting vehicle in each matching detections list. Results in Table II show an increase in AP of up to 5%. It is revealing that the largest improvement to local perception is gained simply by modifying the position and orientation of local detections. This enables the model to ignore false positives from nearby vehicles and yet still improve the accuracy of local detections. RESULTS: UPDATED POSITION/ORIENTATION (% AP) TABLE II Car Pedestrian Easy Mod. Hard All Easy Mod. Hard All Method AVOD 66.8 62.8 52.1 36.3 84.2 78.7 75.1 57.3 Corrected 69.5 61.0 54.1 37.8 89.0 80.6 80.1 61.0 C. Trust Levels The previous experiments evaluated detections from hon- est (although potentially not correct) vehicles. This experi- ment augments the dataset with malicious and unreliable ve- hicles to evaluate the performance of the TruPercept models, while being exposed to entities with non-optimal behaviours. • Trustworthy: detections are taken from the output of the local detection network. Results in Table I. • Unreliable: for each local detection, 10% chance to remove, 10% add a randomly positioned detection. • Malicious: a vehicle and pedestrian are inserted in front of the ego-vehicle for every frame from 10% of vehicles. Full results are available with the dataset. The car class shows a significant performance reduction ( 10%) when in- troducing the unreliable behaviours. Strangely, the pedestrian class actually improves in all categories for the TruPercept models. If the unreliable vehicles had bad detections to begin with, the final score of these detections could be reduced. Furthermore, false detections also have a chance to be removed, these could be harder to identify as false detections since they will be located where points are, instead of random locations which could contain no points. The malicious detections decrease the performance significantly, even for pedestrians. The malicious detections behaviour represents a coordinated attack between 10% of the vehicles specifically targeted towards the ego-vehicle. This shows a weakness in the model towards coordinated attacks. true detections, will be able to fool The mean trust values at the termination of the exper- iments were: 0.27 trustworthy, 0.25 unreliable, and 0.13 malicious. The trust value for unreliable vehicles is not significantly different than trustworthy vehicles. It is likely that behaviours such as the unreliable behaviour, which mostly present the current system. The trust model was able to detect blatantly malicious behaviour with a much higher success. Average trust values are fairly low, likely due to the amount of false positives which are being forwarded. If local detection accuracy increases, trust values would be expected to in- crease. These behaviours are simply a glimpse at strategies malicious entities could employ. In the future, great effort should be placed on creating and testing behaviours which could precipitate dangerous situations. VII. DISCUSSION AND CONCLUSION In the future, we can imagine expanding our trust model- ing, inspired by the work of VANETs researchers, such as supporting role-based trust modeling (e.g., police cars with greater initial trustworthiness) (as in [32], [33]) or adding incentives for honest reporting ([2], [33]). Zhang et al. [32] also suggest that clustering methods may help to reduce false information spread. We note that since objects are naturally geographically clustered, relay control groups come to mind; by integrating this into the TruPercept solution, information could perhaps be drastically reduced (e.g., one score per matching object group). This is an avenue for future work. Other researchers have new ideas for the use of a central server to deal with malicious entities (e.g., Li et al.'s [20] reputation-based announcement system which aggregates re- ports by reputation score). This may suggest an expanded role for our central system. More sophisticated trust mod- elling using Bayesian methods and Partially Observable Markov Decision Processes (POMDPs) are another area of study (e.g., Raya's system [34] which allows not knowing about events, Zhang et al. [19]'s use of partially observable Markov decision processes to enable dynamic updates). One way in which we could try for expanded trust modelling would be considering each new object in our framework with a POMDP. Allowing more uncertainty about vehicles is advocated by Balkrishan [35] though their context is MANETs, while Souissi et al. [36] suggest more potential by examining similarity of messages received from different sources, which may help to determine the risk of believing a given report. These are other possible directions for richer trust modelling components. In conclusion, multiple trust modelling methods for ad hoc networks were presented, with a majority being used for VANETs. The topic was evaluated from a new perspective: integration with 3DOD. A multi-agent solution attempting to increase 3DOD range and accuracy for AVs was presented. The TruPercept dataset, including all trust scenarios, as well as all tools, evaluation, and model code are publicly available at https://tinyurl.com/y2nwy52o. Four broader-scoped takeaways are: 1) Cooperative per- ception can be used to more accurately localize objects. 2) Cooperative perception creates a gargantuan security flaw for AVs since the correctness of incoming information cannot be guaranteed. 3) Cooperative perception techniques need to incorporate trust modelling or incoming information evaluation. It is fairly easy to concoct situations which could cause an AV to act erratically and create dangerous situations. 4) Cooperative perception methods should be integrated into perceptual pipelines then evaluated on large datasets. Creating a module to prevent a contrived scenario from occurring is not necessarily hard. Integrating modules into complex perceptual systems to improve overall performance and prevent a plethora of prospectively hazardous scenarios is a more onerous task. REFERENCES [1] S. Khan, F. Andert, N. Wojke, J. Schindler, A. Correa, and A. Wi- jbenga, "Towards collaborative perception for automated vehicles in heterogeneous traffic," in Advanced Microsystems for Automotive Applications 2018, J. Dubbert, B. Müller, and G. Meyer, Eds. Cham: Springer International Publishing, 2019, pp. 31 -- 42. [2] U. F. Minhas, J. Zhang, T. Tran, and R. Cohen, "Intelligent agents in mobile vehicular ad-hoc networks: Leveraging trust modeling based on direct experience with incentives for honesty," in 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, vol. 2, Aug 2010, pp. 243 -- 247. [3] T. G. Dietterich, "Ensemble methods in machine learning," in Multiple Classifier Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000, pp. 1 -- 15. [4] M. Obst, L. Hobert, and P. Reisdorf, "Multi-sensor data fusion for checking plausibility of v2v communications by vision-based multiple- tracking," in 2014 IEEE Vehicular Networking Conference object (VNC), Dec 2014, pp. 143 -- 150. [5] Q. Xu, T. Mak, J. Ko, and R. Sengupta, "Vehicle-to-vehicle safety messaging in dsrc," in Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, ser. VANET '04. New York, NY, USA: ACM, 2004, pp. 19 -- 28. [Online]. Available: http://doi.acm.org/10.1145/1023875.1023879 [6] H. Volos, T. Bando, and K. Konishi, "Reladec: Reliable latency deci- sion algorithm for connected vehicle applications," in IEEE Intelligent Vehicles Symposium, 2019. [7] K. Riedl, S. Kurscheid, A. Noll, J. Betz, and M. Lienkamp, "Road network coverage models for cloud-based automotive applications: A case study in the city of munich," in IEEE Intelligent Vehicles Symposium, 2019. [8] A. Correa, R. Alms, J. Gozalvez, M. Sepulcre, R. B. Michele Rondi- none, L. Lücken, and G. Thandavarayan, "Infrastructure support for cooperative maneuvers in connected and automated driving," in IEEE Intelligent Vehicles Symposium, 2019. [9] S. Kim, Z. J. Chong, B. Qin, X. Shen, Z. Cheng, W. Liu, and M. H. Ang, "Cooperative perception for autonomous vehicle control on the road: Motivation and experimental results," in 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems, Nov 2013, pp. 5059 -- 5066. [10] A. Jiménez-González, J. R. Martínez-de Dios, and A. Ollero, "An integrated testbed for cooperative perception with heterogeneous mobile and static sensors," Sensors, vol. 11, no. 12, p. 11516 -- 11543, Dec 2011. [Online]. Available: http://dx.doi.org/10.3390/s111211516 [11] H. Li, "Cooperative perception : Application in the context of outdoor l'École Nationale intelligent vehicle systems," Ph.D. dissertation, Supérieure des Mines de Paris, Sept 2012. [12] C. Allig and G. Wanielik, "Alignment of perception information for cooperative perception," in IEEE Intelligent Vehicles Symposium, 2019. [13] D. Feng, C. Haase-Schuetz, L. Rosenbaum, H. Hertlein, F. Duffhauss, C. Glaser, W. Wiesbeck, and K. Dietmayer, "Deep multi-modal object detection and semantic segmentation for autonomous driving: Datasets, methods, and challenges," CoRR, vol. abs/1902.07830, 2019. [Online]. Available: http://arxiv.org/abs/1902.07830 [14] E. Arnold, O. Y. Al-Jarrah, M. Dianati, S. Fallah, D. Oxtoby, and A. Mouzakitis, "Cooperative object classification for driving applica- tions," in IEEE Intelligent Vehicles Symposium, 2019. [15] Q. Chen, S. Tang, Q. Yang, and S. Fu, "Cooper: Cooperative perception for connected autonomous vehicles based on 3d point clouds," CoRR, vol. abs/1905.05265, 2019. [Online]. Available: http://arxiv.org/abs/1905.05265 [16] "Intelligent Transport Systems (ITS); Vehicular Communications; Ba- sic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service," ETSI, Tech. Rep. EN 302 637-2 V1.3.2, Nov 2014. [17] "Intelligent Transport Systems (ITS); Vehicular Communications; Ba- sic Set of Applications; Analysis of the Collective Perception Service (CPS) ," ETSI, Tech. Rep. TR 103 562 0.0.15 Draft, Jan 2019. [18] L. Hobert, A. Festag, I. Llatser, L. Altomare, F. Visintainer, and A. Kovacs, "Enhancements of v2x communication in support of cooperative autonomous driving," IEEE Communications Magazine, vol. 53, pp. 64 -- 70, 12 2015. [19] S. Chen, A. A. Irissappane, and J. Zhang, "Pomdp-based decision making for fast event handling in vanets," in AAAI, 2018. [20] Q. Li, A. Malip, K. M. Martin, S. Ng, and J. Zhang, "A reputation- based announcement scheme for vanets," IEEE Transactions on Ve- hicular Technology, vol. 61, no. 9, pp. 4095 -- 4108, Nov 2012. [21] C. Chen, J. Zhang, R. Cohen, and P. Ho, "A trust modeling framework for message propagation and evaluation in vanets," in 2010 2nd International Conference on Information Technology Convergence and Services, Aug 2010, pp. 1 -- 8. [22] Y. Mass and O. Shehory, "Distributed trust in open multi-agent the Workshop on Deception, Fraud, systems," in Proceedings of and Trust in Agent Societies Held During the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives. London, UK, UK: Springer-Verlag, 2001, pp. 159 -- 174. [Online]. Available: http://dl.acm.org/citation.cfm?id= 646674.701823 [23] J. Ku, M. Mozifian, J. Lee, A. Harakeh, and S. Waslander, "Joint 3d proposal generation and object detection from view aggregation," IROS, 2018. [24] C. R. Qi, W. Liu, C. Wu, H. Su, and L. J. Guibas, "Frustum pointnets for 3d object detection from RGB-D data," CoRR, vol. abs/1711.08488, 2017. [Online]. Available: http://arxiv.org/abs/1711. 08488 [25] A. Harakeh, M. Smart, and S. L. Waslander, "Bayesod: A bayesian approach for uncertainty estimation in deep object detectors," CoRR, vol. abs/1903.03838, 2019. [Online]. Available: http://arxiv.org/abs/1903.03838 [26] A. Varga, "The omnet++ discrete event simulation system," Proc. ESM'2001, vol. 9, Jan 2001. [27] M. Behrisch, L. Bieker-Walz, J. Erdmann, and D. Krajzewicz, "Sumo -- simulation of urban mobility: An overview," Proceedings of SIMUL, vol. 2011, 10 2011. [28] A. Dosovitskiy, G. Ros, an F. Codevilla, A. López, "CARLA: open abs/1711.03938, 2017. and urban simulator," [Online]. Available: http: driving V. Koltun, CoRR, vol. //arxiv.org/abs/1711.03938 [29] M. Johnson-Roberson, C. Barto, R. Mehta, S. N. Sridhar, and R. Vasudevan, "Driving in the matrix: Can virtual worlds replace real world tasks?" CoRR, vol. human-generated annotations for abs/1610.01983, 2016. [Online]. Available: http://arxiv.org/abs/1610. 01983 [30] X. Yue, B. Wu, S. A. Seshia, K. Keutzer, and A. L. Sangiovanni- Vincentelli, "A lidar point cloud generator: from a virtual world to autonomous driving," CoRR, vol. abs/1804.00103, 2018. [Online]. Available: http://arxiv.org/abs/1804.00103 [31] B. Hurl, K. Czarnecki, and S. Waslander, "Precise synthetic image and lidar (presil) dataset for autonomous vehicle perception," in IEEE Intelligent Vehicles Symposium, 2019. [32] J. Zhang, C. Chen, and R. Cohen, "Trust modeling for message relay control and local action decision making in vanets," Security and Communication Networks, vol. 6, no. 1, pp. 1 -- 14, 2012. [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1002/sec.519 [33] U. F. Minhas, J. Zhang, T. Tran, and R. Cohen, "A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks," IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 41, no. 3, pp. 407 -- 420, May 2011. [34] M. Raya, P. Papadimitratos, V. D. Gligor, and J. . Hubaux, "On data- centric trust establishment in ephemeral ad hoc networks," in IEEE INFOCOM 2008 - The 27th Conference on Computer Communica- tions, April 2008, pp. 1238 -- 1246. [35] V. Balakrishnan, V. Varadharajan, and U. Tupakula, "Subjective logic based trust model for mobile ad hoc networks," in Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, ser. SecureComm '08. New York, NY, USA: ACM, 2008, pp. 30:1 -- 30:11. [Online]. Available: http://doi.acm.org/10.1145/1460877.1460916 [36] I. Souissi, N. B. Azzouna, and T. Berradia, "Towards a self-adaptive trust management model for vanets," in Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017), INSTICC. SciTePress, 2017, pp. 513 -- 518.
1807.01014
1
1807
2018-07-03T08:21:07
A Survey on Agent-based Simulation using Hardware Accelerators
[ "cs.MA", "cs.DC", "cs.PF" ]
Due to decelerating gains in single-core CPU performance, computationally expensive simulations are increasingly executed on highly parallel hardware platforms. Agent-based simulations, where simulated entities act with a certain degree of autonomy, frequently provide ample opportunities for parallelisation. Thus, a vast variety of approaches proposed in the literature demonstrated considerable performance gains using hardware platforms such as many-core CPUs and GPUs, merged CPU-GPU chips as well as FPGAs. Typically, a combination of techniques is required to achieve high performance for a given simulation model, putting substantial burden on modellers. To the best of our knowledge, no systematic overview of techniques for agent-based simulations on hardware accelerators has been given in the literature. To close this gap, we provide an overview and categorisation of the literature according to the applied techniques. Since at the current state of research, challenges such as the partitioning of a model for execution on heterogeneous hardware are still a largely manual process, we sketch directions for future research towards automating the hardware mapping and execution. This survey targets modellers seeking an overview of suitable hardware platforms and execution techniques for a specific simulation model, as well as methodology researchers interested in potential research gaps requiring further exploration.
cs.MA
cs
A Survey on Agent-based Simulation using Hardware Accelerators Jiajian Xiao1,3, Philipp Andelfinger1,2, David Eckhoff1,3, Wentong Cai2, and Alois Knoll3 2School of Computer Science and Engineering, Nanyang Technological University 3Department of Informatics, Technische Universität München 1TUMCREATE, Singapore 8 1 0 2 l u J 3 ] A M . s c [ 1 v 4 1 0 1 0 . 7 0 8 1 : v i X r a Abstract Due to decelerating gains in single-core CPU performance, computationally expensive sim- ulations are increasingly executed on highly parallel hardware platforms. Agent-based simula- tions, where simulated entities act with a certain degree of autonomy, frequently provide ample opportunities for parallelisation. Thus, a vast variety of approaches proposed in the literature demonstrated considerable performance gains using hardware platforms such as many-core CPUs and GPUs, merged CPU-GPU chips as well as FPGAs. Typically, a combination of techniques is required to achieve high performance for a given simulation model, putting substantial burden on modellers. To the best of our knowledge, no systematic overview of techniques for agent-based simulations on hardware accelerators has been given in the literature. To close this gap, we pro- vide an overview and categorization of the literature according to the applied techniques. Since at the current state of research, challenges such as the partitioning of a model for execution on heterogeneous hardware are still a largely manual process, we sketch directions for future research towards automating the hardware mapping and execution. This survey targets modellers seeking an overview of suitable hardware platforms and execution techniques for a specific simulation model, as well as methodology researchers interested in potential research gaps requiring further exploration. Introduction 1 Since around 2005, it can be observed that due to the breakdown of Dennard scaling, clock frequen- cies of single CPUs are no longer increasing significantly, even though the transistor counts are still growing [152]. Instead, CPU manufacturers have more and more focused on developing multi-core processors. This in turn calls for parallel computing techniques, as programmes (including simu- lations) that cannot be run in parallel can no longer simply be sped up by incorporating a newer and faster CPU. Performance can be increased further when the workload of a programme is effi- ciently distributed to heterogeneous hardware such as Graphics Processing Units (GPUs) or Field Programmable Gate Arrays (FPGAs) [27]. Some types of hardware are better suited for certain tasks than others, for example, tasks with large amounts of fine-grained parallelism can benefit greatly from the massively parallel architecture of modern GPUs with its thousands of cores. Tasks that are largely sequential or characterised by unpredictable data accesses and control flow lend themselves better to CPUs with out-of-order execution, long pipelines and large caches. Similarly, if offloading a task to a GPU requires copying large amounts of data to and from graphics memory, execution on a CPU may be preferable even if substantial parallelism is available. This issue can be addressed by an Accelerated Processing Unit (APU), where CPU and an integrated graphics core (of lower performance compared to stand-alone GPUs) share the same memory. Lastly, compute-intensive and memory-light tasks can be outsourced to FPGAs which can be programmed to carry out specific computations in hardware. One field that has always sought after more performance is the field of simulation. Faster com- puters allow an increase in complexity of the incorporated simulation models, allowing researchers 1 to obtain more accurate results in a faster manner. Agent-based simulations have received broad attention as they can be employed to study various domains, such as road traffic [39], social net- works [42], pedestrian movement [156], military [29], biology [4], economics [157] and so on. The main characteristic of agent-based simulation is that autonomous agents (e.g., individuals or entities) act and interact to create effects of emergence on the entire system. The complex decision-making of agents and the huge scale of many simulated systems can lead to enormous runtimes, motivating the need for employing high-performance computing platforms. Agent-based simulations are a promising target for parallel computing techniques as agents are autonomous and in some cases carry out independent computations. In mobility simulations, inter- actions between agents usually only take place between close-by agents in a somewhat regular 2D or 3D environment, allowing researchers to employ space partitioning without inducing too much synchronisation overhead. Moreover, many ABS are time-stepped and agents are often updated at the same logical time, providing inherent independence and thus potentials for parallelised execution. Unfortunately, being able to partition a problem and execute it in parallel is not a guarantee that it can be accelerated using heterogeneous hardware. To enable ABS on heterogeneous hardware, some general challenges have to be overcome. First, the simulation has to be partitioned with heterogeneity in mind to decide which part of the program lends itself best to a specific hardware device, considering the resulting overhead from data transfers between the different devices. From this it follows that depending on the used hardware, the mapping of simulation parts to hardware devices will likely be different. Complex simulations typically also exhibit scattered and unpredictable memory access and control flow as the model state develops dynamically over time. This further complicates an efficient distribution to heterogeneous hardware. Lastly, in order to make heterogeneous accelerators available to modellers even without having in- depth knowledge of the specific hardware platforms, there is a need for frameworks that abstract away from hardware specifics. Some of the common frameworks provide variants supporting parallel and distributed execution, e.g., MASON [101], Repast-HPC [32], EcoLab [149], and GridABM [154]. However, these frameworks only support traditional CPU-based environments. Some frameworks such as FLAME GPU [31] and MCMAS [92] have been proposed that focus on the execution on specific accelerators such as graphics cards. In this survey, we structure the complex landscape of agent-based simulation on heterogeneous hardware. We give an overview of existing types of hardware that have been employed to accelerate agent-based simulations and discuss past developments and current trends. While some surveys exist that present generic high-performance computing techniques using heterogeneous hardware [160, 107, 43], we highlight the specific challenges of ABS on heterogeneous hardware and categorize an ample body of related work along these challenges. For each challenge, we discuss in detail how existing literature has contributed to solving them. This overview allows us to identify research gaps that need to be filled in order to establish heterogeneous accelerators in the simulation domain and making them applicable to a wider range of problems – ideally by providing an automated process to support the modeller. The remainder of this survey is structured as follows: in Section 2, we characterise the main classes of hardware accelerators for general-purpose computations. Section 3 provides an overview of agent-based simulation concepts and outlines the computational challenges of executing agent-based simulations on hardware accelerators. In Section 4, we systematise and survey the existing works according to the identified challenges and according to the techniques used to do so. In Section 5, we discuss unresolved challenges and outline how a system tackling these challenges could look like, thus sketching avenues for future work. Section 6 summarizes our findings and concludes the survey. 2 Hardware Platforms In this section, we describe the technical characteristics, the benefits as well as the limitations of hardware platforms that have been used to accelerate agent-based simulations. We focus on many- core CPUs, Graphics Processing Units (GPUs), Accelerated Processing Units (APUs), and Field- Programmable Gate Arrays (FPGAs). Readers familiar with these hardware platforms may skip this section and continue to Section 3. 2 2.1 Many-Core CPUs Architecture: A many-core (or many integrated core, MIC) CPU contains a group of CPU cores on a single chip. One of the well-known many-core CPUs, the Intel Xeon Phi, is equipped with up to 72 x86-compatible CPU cores communicating via an internal Network-on-Chip which enables fast and parallel data transfer between the cores. A many-core CPU can be connected to the host machine via PCI-E or can be a standalone CPU with direct access to the system memory. Figure 1 shows an overview of the second generation Intel Xeon Phi 7290F (Knights Landing) processor with its 72 cores that are grouped into 36 tiles interconnected by a 2D mesh channel. Each tile has 2 cores sharing 1MB of L2 cache. All L2 caches are kept fully coherent by a distributed tag directory. The processor supports a maximum of 384GB of DDR4 RAM. In addition, 16GB of 3D-stacked multi-channel DRAM can be used for transparent caching or managed manually. In the past years, a number of non-x86 many-core CPUs have emerged, such as the Parallella Board [3], the Epiphany-V [119], and the Kalray MPPA (Massively Parallel Processor Array) [36]. Benefits: A notable advantage of some many-core CPUs over GPUs and FPGAs is their ca- pability to execute largely unmodified code written for regular CPUs [90]. This makes migration to these platforms easier, given the code is highly parallelisable. Since the individual cores support out-of-order execution, employ deep instruction pipelines, and have access to comparatively large caches, the need to adapt a program's control flow to the hardware is less pressing than with, e.g., GPUs [22]. Still, as some many-core processors support vector operations through instruction set extensions such as AVX-512 [76], a single-instruction, multiple-data (SIMD) style of programming can extract further parallelism. Recent work showed that many-core CPUs can substantially accelerate Discrete Event Simulation (DES) [79, 167]. A number of authors also evaluated the acceleration of various types of simulations such as fluid dynamics and seismic wave propagation using non-x86 many-cores [131, 26]. Limitations: In light of the comparatively high cost of recent many-core CPUs(≈ US$3368.00 as of 03/2018 for an Intel Xeon Phi Processor 7290F) compared to other accelerators, the performance gains compared to traditional multi-core CPUs have frequently been relatively low. Even when optimising scientific code for a many-core CPU, there may only be a single-digit speedup over an execution on a traditional multi-core CPU, while in some cases there may even be an increase in runtime [12]. Further, since the performance depends strongly on parameters such as the number of threads and on employing the different types of memory available on a many-core CPU, it necessary to tune these aspects to the given problem and hardware [99]. 2.2 Graphics Processing Units (GPUs) Architecture: GPUs utilise a massively parallel architecture, which makes them considerably more efficient than general purpose CPUs when large volumes of data can be processed in parallel. Their original purpose was to accelerate the processing of three-dimensional scenes to be displayed on two- dimensional screens. However, modern GPUs have evolved to support a wide range of computational tasks. The evolution of GPUs (and with that their applicability for simulation) is characterised by three essential steps. In the 1990s, GPUs followed a fixed-function architecture, which processed a scene's Figure 1: The tile-based architecture of the Intel Xeon Phi 7290F Processor based on Knights Land- ing [147]. 3 Tile 0Tile 7Tile 1Tile 8............Tile 22Tile 29Tile 23Tile30Tile 5Tile 12Tile 6Tile 13Tile 27Tile 34Tile 28Tile 35............2 coresL1 & L2 CachesRouter Figure 2: A Streaming Multiprocessor (SM) in a GP105 GPU based on Nvidia's Pascal architec- ture [114]. geometry to produce the colour and transparency values for each of the screen's pixels in a pipelined fashion. In 2001, Nvidia released the GeForce 3, a new GPU generation which marks the second stage of GPU evolution. The GeForce 3 included so-called shader units, which execute programs applied to large numbers of pixel RGBA values or vertices of the objects in a 3D scene. The flexibility of shader programming made the idea of General-Purpose Computing on Graphics Processing Units (GPGPU) practical, with early GPGPU work mapping raw data to pixels or vertices to achieve GPU-based parallel programming. Finally, in 2006, the shader architecture was unified by no longer distinguishing between vertex and pixel shaders. Now, with the Compute Unified Device Architecture (CUDA) programming framework, it became possible for GPUs to seamlessly perform general-purpose computational tasks [133, 117]. We sketch the GPU architecture and programming model on the basis of Nvidia's terminology. AMD hardware follows a similar design. A modern GPU consists of a scalable number of Streaming Multiprocessors (SMs), which contain a number of Streaming Processors (SPs) that perform most of the computations, Special Function Units (SFUs) to efficiently perform special operations such as executing trigonometric functions, on-chip memory, cache and registers. In addition, modern GPUs have L2 cache and off-chip RAM, both of which are shared among all SMs [114]. Nvidia's GeForce GTX1080, for example, has 20 SMs, each of them containing 128 SPs, 32 SFUs, 256KB of registers, 8 texture units, 96KB of low-latency memory, and 48KB of L1 cache Figure 2 . There are 2 MB of L2 cache and 8 GB of off-chip RAM, referred to as global memory. CUDA [117] (supporting Nvidia GPUs), OpenACC [120] and OpenCL [150] (the latter two sup- porting Nvidia, AMD GPUs, and Intel CPUs and integrated GPU) are common programming frame- works for GPGPU. Both CUDA and OpenCL follow a similar programming model, with some differ- ences in terminology. The work to be performed by a GPU program is organized in a hierarchical fashion, aligned with the properties of the underlying hardware: at the lowest level, there are threads representing a sequen- tial control flow. On a logical level, all threads execute the same GPU program in parallel. Threads are grouped into warps of a hardware-specific size (32 threads on Nvidia hardware). Within each warp, threads execute in lockstep, i.e., if the control flow among threads within a warp diverges, the different branches are serialised. Thus, although the serialisation is transparent to the programmer, it is important to minimise intra-warp divergence. A configurable number of warps forms a block. Warps inside a block have access to a limited amount of low-latency shared memory and can syn- chronize efficiently. Blocks are assigned to an SM persistently, i.e., the required registers and shared memory are assigned to the block until all warps have finished execution. Per-SM warp schedulers dynamically assign runnable warps to the available SPs to minimise stalling on high-latency memory accesses. Typically, there are many more threads than physical SPs, providing ample opportunities for this type of memory latency hiding [117]. A key aspect when programming GPUs is the optimisation of memory access patterns. The GPU hardware prescribes certain rules according to which memory accesses multiple threads can be coalesced, i.e., executed in aggregate [117]. Generally, the number of physical memory transactions 4 required is minimised when threads with adjacent logical indexes access adjacent locations in memory. Since many applications require scattered or even unpredictable memory access, achieving memory coalescing is a common focus of works in parallel programming on GPUs (e.g., [169, 45]). The recent Nvidia Volta architecture provides individual threads with their own execution context, enabling a more fine-grained control over the intra-warp control flow [116]. Benefits: The hardware and programming model of GPUs lend itself well to problems that can be expressed so that large numbers of similar or identical operations are performed on different data. Commonly, GPUs accelerate fine-grained data-parallel tasks by one to two orders of magnitude compared to an implementation on multi-core CPUs. Mature GPU programming frameworks such as CUDA, OpenCL and OpenACC enable relatively simple programming compared to other accelerators such as FPGAs [44]. Libraries such as Thrust [17] and CUBLAS [113] supply the programmer with high-performance implementations for common tasks such as parallel reduction, sorting, and linear algebra operations. Programming frameworks are available even for more specialised tasks such as agent-based simulation [31]. Beside the performance benefits of GPUs, Richmond and Romano [136] emphasise the oppor- tunities for efficient visualisation of simulations. Since the agent data is already stored in graphics memory, visualisation can be achieved easily by passing the agent data to vertex or texture buffers. Limitations: Most current GPUs are connected to their host CPU via the PCI-E bus. Thus, the GPU does not have direct access to the host memory. Data transfer between CPU and GPU is expensive in terms of latency and should therefore be reduced as much as possible. For instance, according to its specification, a PCI-E 3.0 x16 connection allows an Nvidia Titan X card to transfer data between host and graphics memory at up to 16 GB/s, while the graphics memory of the card can achieve a throughput of 336.5 GB/s. However, on recent GPU architectures, interconnects such as Nvidia's NVLink [115] and AMD's Infinity Fabric [2] achieve throughputs of up to 300 GB/s, alleviating the impact of data transfers. High performance on a GPU requires the given task to be expressed in a way that fits the GPU's hardware properties. The main requirements are a large degree of parallelism and the possibility to achieve coalesced memory access as well as a common control flow among the threads within a warp. Thus, memory-intensive tasks with complex data dependencies are typically difficult to execute efficiently on GPUs [82, 25]. Compared to many-core CPUs, programming for GPUs still requires profound knowledge of the GPU architecture [168]. As with many-core CPUs, the large number of configurable parameters render the performance tuning of GPU programs an important but challenging task [158]. 2.3 Accelerated Processing Units (APUs) Architecture: APUs integrate CPU and GPU on a single die. Although the term APUs has been coined by AMD, recent Intel CPUs with Intel HD Graphics follow a similar architecture. Unlike stand- alone GPUs, the fused GPU of an APU has direct access to the host memory through a low-latency and high-bandwidth bus. Figure 3 sketches the high-level architecture of an APU. Benefits: The main benefit of APUs is the opportunity for zero-copy memory access: since all memory is accessible both from the CPU and the GPU, costly data transfers over a relatively low- bandwidth bus like PCI-E can be avoided. Zero-copy memory access also provides memory savings, as only one copy of an object in memory is required. Further, scattered memory accesses which could only be handled inefficiently by the GPU can instead be performed by the CPU. Limitations: Existing APU products have focused more on energy efficiency than high perfor- mance. They typically contain fewer processing units than stand-alone CPUs and GPUs of the same hardware generation. For example, the Ryzen 5 2400G APU by AMD has 704 Vega-based stream processors, while the stand-alone graphics card AMD RX Vega 64 has 4096 stream processors. As a consequence, compared to high-end stand-alone CPUs and GPUs, their computational power is rela- tively low. Still, as will be discussed in Section 4, some works have considered APUs for accelerating agent-based simulations. 5 Figure 3: In an APU, memory is shared between the fused CPU and GPU. 2.4 Field-Programmable Gate Arrays (FPGAs) Architecture: A Field-Programmable Gate Array is an integrated circuit made of an array of in- terconnected Configurable Logic Blocks (CLBs). Additionally, FPGAs are equipped with input and output pads and Digital Signal Processing (DSP) blocks. FPGAs often provide various communica- tion interfaces such as PCI-E, UART, and Ethernet. A CLB consists of several slices (sometimes also called logic cells), each slice containing a set of storage elements and Look-Up Tables (LUTs). A LUT has a number of inputs and outputs as well as flip flops that store a mapping between possible inputs and outputs. The mapping between inputs and outputs is defined by the users [63]. The number of slices is one of the most important benchmarks to determine the computational power of an FPGA and can range from several thousand to several million. For instance, the XCVU37P Virtex UltraScale FPGA from Xilinx has 2,851,800 slices [170]. In addition, the FPGA may have access to several GB of off-chip DRAM. To describe the logic to be placed on an FPGA, typically a Hardware Description Language (HDL) is used. The two most widely used HDLs are VHDL [65] and Verilog [121]. In recent years, there have been intensive efforts to enable High-Level Synthesis, i.e., to generate FGPA layouts directly from high-level programming languages such as C, C++, or Java. Recently, Intel released a dedicated SDK to use OpenCL to program FPGAs [75]. FPGAs are sometimes used as a prototyping tool for the development of Application Specific Integrated Circuits (ASICs), which requires an extensive and costly design process. To the best of our knowledge, there is no work so far that employs custom ASICs for ABS. In the field of DES, a number of works have considered offloading of specific simulation tasks to ASICs [134, 30, 51, 19, 102]. Notably, some of the envisioned components were fabricated physically [19]. Since the works on ASICs have only limited relevance to the field of ABS, we exclude them from our survey. Benefits: Due to the flexibility and high energy efficiency of FPGAs, they are frequently used for computationally intensive and highly parallelisable tasks. For instance, FPGAs can be three orders of magnitude faster than GPUs when conducting specialised tasks such as encrypting a single 64-bit block by the Data Encryption Standard (DES) [27]. In contrast to CPUs or GPUs, on which data paths are fixed, FPGAs provide flexible and customised data paths [132]. In the past years, FPGAs have received more attention in the field of simulation, particularly in Electronic Design Automation, since hardware designs can be naturally expressed as FPGA layouts. Limitations: As with GPUs, FPGAs are connected to a host CPU without direct access to system memory. The resulting need for data transfers can reduce the potential for performance gains. FPGAs are regarded as lacking in programmability when compared to CPUs and GPUs [44, 27]. Although recent efforts towards high-level synthesis alleviate this limitation, manual tuning is still necessary to achieve the best performance [110, 49]. Finally, FPGAs are configured for a specific task. Since reconfiguration can require multiple hours [180], FPGAs do not facilitate development processes that require fast iteration. This may limit the applicability of FPGAs in early phases of simulation model development, where changes to the simulation model frequently occur and require immediate feedback for evaluation. 6 Physical MemoryIntegratedCPUIntegratedGPUHost MemoryDevice Memory 3 Agent-based Simulation Agent-based modelling and simulation (ABMS) is a common approach [112] used for evaluating complex systems in domains such as traffic, crowds, economics, information propagation, biology, etc. In the following, we characterise the modelling approach and discuss the properties of ABS with execution on heterogeneous hardware in mind. 3.1 Modelling Approach In ABS, the simulated entities are agents that perform actions autonomously and interact with other agents based on certain rules. ABS typically follows a Sense-Think-Act cycle (e.g., [138]): in the Sense stage, an agent detects and analyses its neighbours as well as the environment in which it resides. In the Think stage, an agent makes judgement based on the information collected during the Sense stage. The update of states takes place in the Act stage. The simulation time is typically advanced in fixed time steps at which all agents update their states. However, if a model requires agents to update their states at variable points in simulation time, time advancement using a discrete-event simulation (DES) approach may be more appropriate. In DES, state updates are performed through events scheduled for execution at discrete points in simulation time. The simulation proceeds by iteratively executing the earliest remaining event, potentially scheduling new events in the process. Independent of the time advancement mechanism, the defining characteristic of ABS distinguish- ing it from other simulation techniques is the autonomy of agents, i.e., "agents are endowed with behaviours that allow them to make independent decisions" [104]. Since the focus of this survey pa- per is on ABS, we exclude simulation domains such as physics and chemistry, which usually consider sets of entities that are passively affected by their environment. However, we do discuss a number of methods proposed outside of the ABS domain with direct applications to ABS, e.g., GPU-based priority queues in the context of DES. 3.2 Computational Aspects When considering models with complex decision-making and behaviour at large scales, ABS can be computationally intensive. In addition, due to the stochastic nature of ABS, the simulation of a given scenario is usually repeated multiple times in order to generate meaningful results, further increasing computational demands [85]. However, the Sense-Think-Act cycle described above provides ample opportunities for parallel execution. Since the Sense and Think stages are performed on a per-agent basis and do not modify the simulation state, these stages can be executed in parallel across all agents. To achieve a consistent view of the simulation state for all agents, the state changes performed in the Act stage must then be propagated to other processing elements. When parallelising across multiple traditional CPUs or CPU cores, each processing element can execute the state updates for a subset of agents. A well-known challenge in parallel and distributed ABS lies in partitioning the simulation workload among the processing elements. Generally, there are two dimensions according to which a simulation can be partitioned [109]: domain decomposition par- titions according to the simulation space (e.g., different roads in a traffic simulation), while functional decomposition partitions according to different models (e.g., different layers of the network stack in a computer network simulation). High-quality partitionings are characterised by low amounts of work- load imbalance and communication among the processing elements. When targeting heterogeneous hardware environments, the partitioning problem is complicated by the differences in the suitabil- ity of each hardware device for certain types of computations. Thus, to achieve high performance, a key challenge is to find a suitable hardware assignment of the simulation tasks according to characteristics such as the instruction mix and the available degree of parallelism. Since typically, some communication between the partitions cannot be avoided, techniques for the minimisation of data transfers are required to reduce the performance impact of the communi- cation (e.g., [80]). On CPUs, the ABS performance benefits from long instruction pipelines, large caches and effective branch prediction. Beyond traditional parallel and distributed simulation, many-core CPUs enable high degrees of parallelism while supporting unmodified x86 code. The key difference between a CPU execution in a multi-core and many-core setting is the interconnect through which the CPUs 7 Figure 4: Publications on agent-based simulation on heterogeneous hardware by year and hardware type. communicate. Since the architecture of each core still closely follows a traditional CPU core, no major code adaptations are required to execute the agent update logic efficiently. In contrast, since both GPUs and FPGAs achieve highest performance with computational prob- lems of a highly regular structure, another challenge of executing ABS on hardware accelerators lies in dealing with the scattered memory accesses resulting from the largely unpredictable runtime behaviour of the simulation. Further, irregular control flows and fine-grained computations make it challenging to fully utilise high-performance many-core devices. Thus, methods for the maximisa- tion of parallelism are required. As an example, consider a model where the simulation space is represented by a rectangular grid of cells, each cell being occupied by at most one agent. Here, a simple hardware assignment is a one-to-one mapping of arithmetic units to cells. On a GPU, due to its heritage in highly regular data-parallel tasks on pixel values, such a hardware assignment tends to enable high cache locality, minimisation of memory transactions, and high utilisation of the arithmetic units. In fact, prior to the general-purpose programmability of GPUs, a number of works proposed translating grid-based simulations to operations on graphic textures (e.g., [62]). The Brook language developed at Stanford [24] automates the translation process to graphics operations. Similarly, there is a correspondence between the structure of an FPGA and cellular grids [162]. The basic function of a circuit in an FPGA can be seen as analogous to the function of a cell in a cellular automaton. However, in many models such as road traffic or social network simulations, the simulation space is a graph. Graph representations adapted to the architectural properties of the available hardware are required to efficiently support sensing an agent's neighbourhood and updating the simulation state while fully exploiting the available hardware. The general trend in the literature is moving towards supporting increasingly irregular types of simulations on accelerators. The vast majority of literature on ABS using hardware accelerators has focused on GPUs (see Figure 4 for an overview of the number of publications since 2002) We identify three reasons for the popularity of GPUs as accelerators for ABS: first, they are comparatively inexpensive. Second, in the recent years, the ease of programming of GPUs is slowly approaching that of CPUs. Third, well-established programming frameworks such as OpenCL enable the formulation of models in a less hardware-specific manner. In comparison, the use of FPGAs poses substantial challenges to modellers: only comparatively costly high-end FPGAs run at clock rates close to GPUs. Thus, enormous degrees of parallelism are required to match a GPU's performance. Further, while there exist some frameworks enabling high-level programmability, the achievable performance is limited compared to a more low-level spec- ification of the desired logic in a hardware description language such as VHDL or Verilog. As with GPUs, there is a need for libraries and frameworks that provide a higher degree of abstraction from hardware specifics. Finally, the long runtimes of synthesis steps to generate an FPGA layout make model development and adaptation a cumbersome process. Nevertheless, some works consider the use of FPGAs for ABS with promising results [53, 162]. 8 051015202002200320042005200620072008200920102011201220132014201520162017Year of PublicationNumber of PapersGPUAPUFPGAMany−Core 4 Addressing the Challenges of Agent-Based Simulation on Ac- celerators In the following, we discuss the techniques from the literature applicable to the key challenges in ABS on accelerators as identified in Section 3: hardware assignment, data transfer overheads, scattered memory accesses, maximisation of parallelism, and abstraction from hardware specifics. Table 1 summarises the systematisation of knowledge presented in this survey. It con- tains our classification of challenges, techniques, and publications, as well as the considered types of accelerators. For the publications that considered specific simulation models, Table 2 shows the simulation domains and hardware platforms, providing researchers with pointers to relevant works in their respective domain. 4.1 Hardware assignment One of the main challenges in parallel and distributed computations in heterogeneous hardware environments lies in finding a suitable partitioning, i.e., assignment of a given problem to the available hardware [50]. We discuss techniques that have been used to address this problem according to two different, yet interrelated, aspects: first, we consider techniques to select suitable hardware for sub- tasks according to their ability to efficiently execute certain types of computations. The minimisation of data transfers among the partitions running on separate devices will be considered in the next subsection. The existing approaches can be roughly categorized as follows: 1. Static assignment: if the simulation model involves different types of computations that clearly suggest a certain hardware mapping, it may be sufficient to partition the model prior to a simulation run without any adaptation during runtime. For instance, model segments involving large numbers of independent floating point operations may be well-suited for execution on a GPU, whereas segments with highly data-dependent control flow suggest the execution on a CPU. 2. Dynamic assignment: frequently, the dynamic behaviour of a simulated system at runtime translates to unpredictable computational patterns. In such cases, maintaining high perfor- mance may require an adaptation of the hardware mapping based on performance measure- ments at runtime. An inherent challenge of dynamic assignment is the trade-off between the performance increase through an improved assignment and the costs of runtime measurements and re-assignment. An ample body of research has considered the parallelisation of general programs onto heteroge- neous platforms, which is an enormous challenge due to the arbitrary control flows and memory access patterns that can be present in general programs. Thus, typically, the approaches limit themselves to program portions that are particularly amenable to parallelisation on accelerators. In the case of Challenge Hardware assignment Technique Publications Static assignment by type of computation Many-Core [90], GPU [72, 125, 6, 15, 21, 172, 148, 68, 106] [67, 69, 176], APU [163], FPGA [159, 34, 162, 53] Dynamic assignment based on runtime measurements GPU [18, 165, 56, 86, 176, 59], FPGA [18] Data transfer overheads Overlapping of communication and computation Computation replication at partition boundaries Manual caching in shared memory Heuristics for agent update order Representation of irregular data structures by arrays and grids Multiple replications in parallel Window-based event execution Speculative execution Computation sorting GPU [89, 15, 16] GPU [1, 181] GPU [135, 181, 96] GPU [7, 61, 83, 84] APU [163], GPU [62, 103, 128, 127, 129, 88, 136, 151, 161, 40] [123, 179, 142, 85, 153, 5, 98, 124, 166, 13], FPGA [132, 108] GPU [125, 143, 93, 89, 97, 175] GPU [126, 24, 122, 124, 140, 5, 179, 155] GPU [95, 98], FPGA [108] GPU [89, 155, 85] Scattered memory accesses Maximisation of parallelism Abstraction from hardware specifics Frameworks to support simulation development Many-Core [92], GPU [135, 137, 92, 103, 71] Unified memory access GPU [94, 173, 78, 77] Table 1: A classification of the challenges in agent-based simulation on accelerators along the relevant works addressing them. 9 Domain/Hardware Many-Core CPU Mobility Biology Ecology Social Network Physics and Chemistry [92] [90] [127] GPU [129] [151] [143] [172] [148] [71] [72] [164] [7] [136] [155] [40] [67] [1] [69] [128] [135] [85] [137] [96] [181] [93] [175] [83] [88] [84] [142] [6] [179] [161] [106] [16] [122] [124] [168] [97] [95] [126] [62] [175] [140] [155] [5] [89] [21] APU FPGA [163] [159] [34] [162] [53] [108] Table 2: Simulation model domains considered in the works covered in the survey. ABS, constraints such as the separation of data into a per-agent state and the limited sensing range of agents somewhat simplify the problem of parallelisation, potentially enabling a higher degree of automation in the hardware mapping. In Section 5, we outline the vision of an automated approach and the required building blocks towards an automated hardware mapping for heterogeneous ABS. 4.1.1 Static assignment Several authors have compared approaches to statically assign portions of the simulation workload to an accelerator. Hirabayashi et al. [72] compare a fully GPU-based execution to a hybrid CPU-GPU scheme where the CPU controls the progress of the simulation and calls the GPU for specific tasks. In a traffic simulation based on the Optimal Velocity model [11], the fully GPU-based acceleration clearly outperforms the hybrid scheme, although the lack of synchronisation operations across blocks introduces errors into the simulation results. A similar categorisation is presented by Pavlov and Müller [125], who conclude that a CPU- GPU approach where both the CPU and the GPU hold duplicated or partial agent and environment information is the most promising. Andelfinger et al. [6] compare four GPU/CPU simulator architectures in the context of discrete- event simulations. In a basic CPU/GPU hybrid scheme (cf. Figure 5a), the CPU offloads each event to the GPU individually. Input data is transferred to the GPU at the beginning of the cycle. Af- ter the computation is completed, the output data is transferred back to the CPU. By aggregating independent events and executing them in parallel in a single step, data transfers are reduced (cf. Fig- ure 5b). A further reduction in data transfers is achieved by leaving computation results required by subsequent events in graphics memory (cf. Figure 5c). Finally, if the entire simulation is ported to the GPU, data transfers are only required at the start of the simulation and once the simulation terminates (cf. Figure 5d). While the simulation performance increases with each of the above optimi- sations, more and more changes to the simulator architecture are required, complicating development and reducing maintainability. Two approaches for parallelisation are explored, corresponding to hybrid CPU/device (cf. Fig- ure 5a) and fully device-based simulation (cf. Figure 5d) in [6], respectively. Lai et al. [90] implement the four geo-spatial applications of Kriging interpolation [144], ISODATA [10], Game of Life [52] and an urban sprawl simulation using cellular automata [169]. The authors compare the performance achieved when using one CPU per execution node, one GPU per node and 60 cores per CPU-based many-core accelerator, using MPI for inter-node communication in each instance. The authors con- clude that the use of GPUs and CPU-based many-core accelerators both provide a performance benefit over the purely CPU-based execution. Given a sufficiently large number of assigned proces- (a) Hybrid CPU/Device. (b) Event Aggregation. (c) Memory Reuse. (d) Fully Device-based Simulation. Figure 5: Four CPU-Device simulation schemes [6]. Devices in the figure can be GPUs or many-cores. 10 DeviceCPUEvent iEvent i+1Event i+2ProcessingProcessingProcessingDeviceCPUEvent iProcessingEvent i+1Event i+2ProcessingDeviceCPUEvent iProcessingEvent i+1Event i+2ProcessingDeviceCPUEvent iEvent n... sors, using the CPU-based many-core accelerator with fully device-based simulation achieves similar performance as the GPU-based acceleration. A number of authors considered hardware assignments tailored to specific simulation models. For instance, when the underlying simulation can be clearly separated into model computation and management tasks, a master-worker scheduling approach as shown by Bilel et al. [21] in the context of large-scale mobile networks simulation can be used. In the proposed design, the model is executed on the GPU, while the CPU orchestrates the event scheduling, simulation status monitoring, and memory allocation. A node of the simulated network is partitioned into multiple processes, each process being executed by one GPU warp. The nature of traffic simulation allows for a relatively straight-forward static hardware assignment according to different simulation aspects. Xu et al. [172] and Song et al. [148] introduce a mesoscopic traffic simulation in a hybrid CPU-GPU architecture, assigning the agent mobility to the GPU, whereas the route calculation, the agent generation, and file reading and writing remain on the CPU. The two parts run asynchronously to hide data transfer latencies. Bauer et al. [14] consider a combined continuous-discrete simulation and assign the continuous part the GPU and the discrete part to the CPU. The benchmark model PHOLD [46] is employed to explore different GPU configurations by varying the thread block size, the number of floating point instructions, the data transfer volume, and the communication pattern. The authors conclude that while keeping the GPU fully utilised poses a challenge, models in a combined simulation with a large number of floating point computations can benefit from GPU acceleration. Taking into account zero-copy memory access, Wang et al. [163] show how a road traffic simulation can be accelerated using an APU. In their simulator, sorting of agent states is required to locate each agent's neighbours. While the APU's GPU resources perform state updates and local sorting, the sorting across GPU blocks is handled by the CPU resources. The work separation can be carried out efficiently using zero-copy memory accesses. In the ABS framework TurtleKit, the authors leave the simulation of agent behaviours to the CPU while environment dynamics are handled by the GPU [106]. With this approach, the authors aim to reduce the impact of the GPU acceleration facilities on the maintainability of the simulator code. To increase the performance, portions of the agent behaviour that do not depend on the agent state, e.g., perception of properties of the environment, are performed on the GPU independently of individual agents for all locations and time steps. Considering FPGAs, Tripp et al. [159] showed how the movement of agents on individual lanes can be computed on the FPGA, while the agents' transitions from one road to another as well as the behaviour at intersections is computed on the CPU. However, most works on ABS on FPGAs focus on simulation models that allow for statically assigning the entire simulation to an FPGA. For instance, the representation of cellular grids on FPGAs is explored by Vourkas and Sirakoulis [162], who implement an environmental model simulation based on cellular automata (CA). The authors note the structural similarity between a two-dimensional cellular automaton and an FPGA (cf. Section 3.2). A lattice of cells is simulated, each Configurable Logic Block (CLB) simulating one cell. In case the number of cells exceeds the number of CLBs, the simulation lattice is partitioned into several layers, which are processed one after the other. Similarly, Cui et al. achieve high performance with grid- based cellular automata on an FPGA [34]. A pipeline comprised of address generation, reading from memory, data alignment, rule computing, and updating of memory is applied to maximise throughput. A similar method can be applied to cellular automaton-based crowd evacuation models as demonstrated by Georgoudas et al. [53]. General guidelines for development of GPU-accelerated ABS starting from a CPU-based simulator implementation are proposed in [106, 68]. Their methodology requires the decomposition of the simulation model into small task modules and the heuristic identification of modules suitable for execution on a GPU. As a heuristic, the authors state that loops and code segments with low amounts of conditional branching tend to be suited for execution on a GPU. Then, the original task modules are manually replaced with GPU-executable modules. Several case studies [106, 67, 69] show promising speedup by deploying this method. Generally, the approaches relying on static hardware assignment split the simulation workload into coarse-grained functional tasks so that some tasks are clearly suited for a certain hardware device. To minimise trial-and-error, heuristics may be applied to identify a suitable mapping of tasks to the hardware. For instance, in the literature, tasks involving large numbers of parallel floating point 11 operations are among the most common tasks offloaded to accelerators. Further observations are made by Zhang et al. in the context of co-running programs on a CPU and GPU or in an APU [176]: 1. programs that are suitable to run in a CPU/GPU environment tend to have low memory bandwidth usage, 2. most programs suitable for the APU allow for a large amount of overlap between CPU and GPU computations. 4.1.2 Dynamic assignment While a wide range of literature has considered the problem of dynamically adapting a partitioning of agent-based simulations to multiple CPUs (e.g., [33, 100, 171]), we are not aware of such works that specifically target heterogeneous hardware environments. In the following, we outline recent works on dynamic assignment of general computational workloads to heterogeneous hardware. Since these works are generic, they cannot rely on knowledge of the general structure of ABS simulators or on model knowledge. Belviranli et al. [18] propose a self-scheduling scheme for partitioning generic application workloads into blocks and assigning them to CPUs, GPUs and FPGAs. The proposed system consists of two phases: in the first phase, the system performs an online training with a small amount of data to estimate the maximum workload capacity size of each hardware device. Fast convergence is achieved by fitting four sampled data points to a logarithmic function. Once the capacity is determined, the processing unit's performance can be inferred from the same data. When the change of processing speed between two samples drop below a threshold, it is used as the final estimated value. In the second phase, the remaining workload is partitioned based on the percentage of the individual processing speed to the total speed of all available processing units, enabling faster processing units to handle a larger portion of the workload. Some authors use machine learning techniques such as support vector machines, artificial neural networks and decision trees to distribute the workload of OpenCL programs to CPUs and GPUs. For example, Grasso et al. [56, 86] and Zhang et al. [176] translate a single-device OpenCL program to a multiple-device program, while Wen et al. [165] focus on scheduling multiple OpenCL functions to run in parallel on CPU/GPU. They train a machine learning algorithm according to a set of typical OpenCL programs and benchmarks. The prediction generated by the machine learning algorithm guides the assignment of a portion of the computation to CPU or GPU. Their results show that the above three machine learning approaches outperform purely CPU- or GPU-based approaches. The scheduling scheme by Wen et al. achieves a performance improvement compared to a first-come, first-served scheme and a scheme where computation-heavy task are handled by the GPU. To automate the compilation of sequential programs for parallelised execution on heterogeneous hardware, Grosser and Groesslinger [59] present a compiler that generates CPU and GPU code. Regions with mostly static control flow and sufficient computational intensity are detected and trans- formed to a formal representation to facilitate program transformations [58]. After optimisations have been performed to increase memory access locality and parallelism, CUDA code for GPU is generated from the formal representation. A runtime library eliminates repeated memory allocations and unnecessary data transfers between CPU and GPU. The decision whether a region is compute- intensive enough for execution on the GPU is made statically or at runtime using heuristics based on metrics such as the number of instructions. The authors conclude that the compiler is able to translate CPU code into cross-platform code with no performance penalty. For some computations, such as the correlation benchmark from polybench [130], significant speedup of up to two orders of magnitude can be achieved. The main difficulty in automated hardware mapping lies in determining the control flow and data dependencies of the original program. Current approaches either rely on the program code being formulated in languages such as OpenCL that express independent control flows explicitly, or only consider specific portions of programs such as loops with largely static control flow. In ABS, however, most of the available parallelism may exist across the update routines of separate agents. Thus, without semantic information describing the code structure, automatic detection of the parallelism is challenging. In Section 5, we sketch how the common structure of many ABS may be utilised to support the extraction of parallelism. 12 4.2 Minimisation of data transfer overheads Since most hardware accelerators are equipped with their own memory, simulations making use of accelerators typically require data transfers between host and accelerator memory. Even with a high- quality partitioning of the simulation, these data transfers incur an overhead that reduces the speedup gained from the distributed computation. In this section, we survey works that focus on minimising the cost of such data transfers. The existing approaches can be roughly categorized according to the following techniques: 1. Overlapping of communication and computation: since some communication overhead between the processing elements involved in a simulation cannot be avoided, some authors proposed techniques to hide communication overheads by transferring data while independent computations are performed. Sometimes, the technique has been referred to as latency hiding (e.g., [23]). 2. Computation replication at partition boundaries: another technique to address commu- nication overheads is to increase the amount of computation performed before synchronisation between processing elements is required. This is achieved by duplicating some computations on multiple processing elements, thus delaying the need to resolve data dependencies across processing elements. 4.2.1 Overlapping of communication and computation One way of mitigating the overhead from data transfers between the host and an accelerator is to execute computations at the same time as data is being transferred. In the approach described by Kunz et al. [89], event computations are overlapped with data transfers across the CPU-GPU boundary, thus hiding data transfer latencies in a pipelined fashion. Since events from multiple simulation instances are considered concurrently, there are substantial opportunities for overlapping these steps. Bauer et al. [15, 16] propose a generic API to optimise the data transfer between global memory and shared memory of CUDA GPUs using so-called warp specialisation. The warps within one coop- erative thread arrays are split into two groups: Dedicated memory warps are in charge of data transfer between the on-chip and off-chip memory. Compute warps process the data. The approach improves performance over thread-level separation between communication and computation since separate warps can follow divergent control flows without any performance penalty. While their general idea can be applied to other types of independent processing elements, the warp-based implementation is specific to GPUs. 4.2.2 Computation replication at partition boundaries In time-stepped ABS, at model time t each agent updates its state based on the states of its neighbours at time t−1. If the simulation is distributed across multiple processing elements, synchronisation and data transfers are required to provide this information at each time step. The associated communica- tion latencies may make up a substantial portion of the simulation runtime. Thus, some authors have proposed methods to reduce synchronisation by replicating some computations on multiple processing elements, similarly to performance optimisations in numerical computing [38]. Aaby et al. [1] present a multi-level data partitioning scheme for cellular simulations on multi- CPU/GPU clusters. The simulation state is partitioned into blocks and each block is executed by a thread, a core, or a node, depending on the configured granularity. In contrast to the traditional data partitioning into blocks of B × B cells and synchronisation at each time step, their approach partitions the data into several overlapping (B + 2R) × (B + 2R) blocks where ((B + 2R)2 − B2) cells form the overlapping area (cf. Figure 6). The computation in the overlapping area is performed redundantly by multiple processing units. Thus, assuming that at each time step, a cell can only affect its immediate neighbours, R time steps are required for a cell in the inner block to be affected by cells in another processing element. Therefore, synchronisation is only required every R time steps. Between synchronisation points, an error propagates inwards within the overlapping areas, but does not affect the inner B × B cells before a new synchronisation occurs. This partitioning 13 Figure 6: In the partitioning scheme by Aaby et al. [1], R cells are duplicated among neighbouring processing elements so that each processing element handles (B + 2R) × (B + 2R) cells. approach is further employed in multi-GPU clusters on the node-, GPU-, block-, and thread-level, and for multi-CPU clusters at the node-, socket-, core-, and thread-level. While Aaby et al.'s illustrates the idea based on cellular grids, the approach applies to general ABS. The sensing range of agents is generally limited and provides an upper bound on the propagation of the effects of an agent's actions. As long as overlapping segments of the simulation space can be distributed to the processing elements in a manner so that an effect requires at least R > 1 time steps, some synchronisations can be avoided. The generality of the approach is illustrated by Zou et al. [181], who extend the idea of computation replication to graph-based topologies in a GPU- accelerated epidemic ABS. 4.3 Scattered memory accesses Throughout the past decades, the increase in computational performance has outpaced the decrease in memory access latencies, leading to modern hardware designs towards ever-increasing cache sizes and deep memory hierarchies. In the context of simulations, the issue of memory access latencies is particularly pressing: typi- cally, a model's behaviour cannot be predicted before executing the simulation, significantly limiting the opportunities for a priori optimisation of data access patterns. However, commonalities between different simulation models can be exploited to propose data structures supporting efficient simulation of an entire range of models on a specific type of accelerator. Since dynamic memory allocation on GPUs is costly [48], most GPU-based simulators allocate graphics memory for the main data structures such as the agent states statically (e.g., [96]). Another approach is to determine after each simulation step the required amount of memory and perform allocations accordingly [124]. The existing approaches to address the issue of scattered memory accesses can be roughly cate- gorized as follows: 1. Manual caching in shared memory: although the support for transparent caching has improved in recent years, achieving highest performance frequently still requires manual caching in low-latency segments of an accelerator's memory hierarchy. Since typically the amount of low-latency memory is small, an iterative approach can be taken to limit the number of accesses to high-latency memory when accessing large amounts of data. 2. Heuristics for agent update order: since the data dependencies between agent state updates are typically not known prior to the execution of the simulation, minimising cache misses during the state updates is non-trivial. Heuristic have been proposed, aiming to favour sequences of computations acting on the same agent data. 3. Representation of irregular data structures by arrays and grids: the hardware archi- tecture of GPUs and FPGAs is designed so that highest performance is achieved when acting on regular data structures such as arrays and grids. Thus, efforts are taken to represent highly 14 Block(0,0)Block(0,1)Block(0,2)Block(1,0)Block(1,1)Block(1,2)Block(2,2)Block(2,1)Block(2,0)RRB irregular data structures in a regular fashion. When covering the techniques from the litera- ture, we first cover model-specific data structures such as graph representations of a simulated road network. Subsequently, we discuss works covering two generic building blocks commonly required as part of ABS engines: priority queues and sorting. 4.3.1 Manual caching in shared memory Richmond et al. [135] propose to utilise the shared memory of the GPU as a manual cache. In their agent-based simulation framework for cellular models in biology based on FLAME GPU [31], they copy sets of messages to be transferred between agents into shared memory. Each thread within a block can then efficiently iterate through the messages and identify those pertaining to the local agent. Once all threads have iterated through the messages, the next sets of messages are loaded into shared memory. Similarly, Zou et al. [181] implement a manual software cache in shared memory to increase the performance of their graph-based epidemic simulation on GPU clusters. Before the simulation commences on the GPU, the CPU sorts the edges of the directed graph by the source vertex. Each thread block's shared memory stores edges originating from one specific node. Since each block processes only edges originating from this node, a cache hit rate of at least 50% is ensured. In agent-based simulation, agents often influence and are influenced by their direct neighbours. This fact can be exploited when arranging the simulation data in memory, reducing high-latency memory accesses when updating agents. Li et al. [96] propose such a method for GPU-based ABS: Assuming a constant number of agents, each agent is assigned to a GPU thread and its state data is permanently kept in global memory. The simulation space is partitioned into a grid of rectangles. Once a search for the neighbours within a circle around an agent is required, a search rectangle that encloses the searching circle is created, so only agents inside the search rectangle have to be considered. Two approaches to utilise the GPU's shared memory are proposed: in the first approach, one block manages the searching process for a chunk C of close-by agents. Per-block shared-memory loads the data of the agent and the agent's neighbours. Each agent in C has a high probability of being in the other agents' neighbourhoods, so that these agents can frequently be accessed through the current block's low-latency shared memory. However, since the limited shared memory capacity allows only for small numbers of agents to be stored, it is still likely that some neighbours are managed by another block and thus have to be accessed through global memory. In the second approach, the shared memory loads the data of agents located in the union of all search rectangles of the agents' handled by the current block. If the shared memory is not sufficient to hold all agents' data, the data is loaded as a sequence of chunks. Of course, the increase in the search space given by the union of search rectangles leads to a higher number of unnecessary agent access through shared memory. To address this problem, the union rectangle can be constructed on the warp level instead of the block level. 4.3.2 Heuristics for agent update order The order in which agent updates are performed must adhere to the causal dependencies between the agent states and behaviours, e.g., in road traffic simulation, vehicles in direct proximity must be at the same point in simulated time to be able to interact according to the model specification. Typically, this is achieved by a strictly time-stepped scheme in which agents always reside at the same time step, after which conflicts in the resulting agent states are resolved [174]. However, since in a typical simulation not all agents interact at each point in time, some agents may be updated further into the simulated future than others without affecting the simulation results [7]. Harris and Scheutz have shown that distributed agent-based simulations can be accelerated by favouring agent updates that resolve dependencies across multiple processing elements [61]. This way, processing elements waiting for others to proceed can be unblocked, decreasing the amount of idle time. Their approach can be applied independently of the underlying hardware platform, but requires bounds on the agent movement per time step. Jin et al. [83] present an information propagation simulation supporting execution on HPC systems and single GPUs and extend it to run on multiple GPUs [84]. Their focus lies on maximising the cache hit rate when traversing a graph according to rules defined by the simulation models. Two categories of approaches are developed for the cascade model [54] and the threshold model [55], which both simulate 15 the propagation of information among nodes in a graph: vertex-oriented processing and edge-oriented processing. For the vertex-oriented approach, the authors further describe two agent update orders: one iterates starting from active vertices, i.e., those that already have the information, and the other from inactive vertices. Since the costs depend on the portion of active nodes, the simulation can switch dynamically between the two vertex-oriented approaches. Finally, the edge-oriented approach iterates over the connecting edges between two vertices. Since the number of edges is constant over a simulation run, the cost of the edge-oriented approach is less variable than that of the vertex-oriented approaches. The authors achieved the highest performance when dynamically switching between the two vertex-oriented approaches. 4.3.3 Representation of irregular data structures by arrays and grids GPUs and FPGAs are particularly suited for operations on regularly structured data. However, many model types specify topologies that are more naturally expressed in terms of irregular structures such as graphs. Further, execution of the simulator core itself may require operations on irregular data structures. A basic optimisation commonly applied in works on GPU-based computing to improve memory access patterns is the transformation of the data layout in memory from arrays of structures (AoS) to structures of arrays (SoA) (e.g., [135, 151]). Commonly, sequential programs represent data in an AoS representation. Since AoS bundles the properties associated with each object in object-oriented programming, or the states of agents in agent-based simulations, it is a natural way to represent data within these paradigms. However, with an AoS data layout, parallel operations on the same property across many objects results in scattered memory accesses. An SoA data layout bundles the same property across all objects, which can increase cache hits rates and opportunities for memory access coalescing, thus improving performance substantially. Beyond this simple optimisation, the data representation can be specialised for a given model to further improve performance. In the following, we give an overview of methods applicable to ABS to achieve high performance by translating irregular data structures to a more regular form. Model-specific data structures Early works on executing ABS using GPUs frequently focused on cellular grids and translated the required computations into the graphics processing domain. In a pioneering work done by Harris et al. [62], GPU shaders are used for implementing computations on the RGBA values in a texture that holds the agents' states. The same idea is employed by Lysenko et al. [103], Perumalla and Aaby [128], and Kolb et al. [88]. Perumalla et al. [128] evaluate the performance of running agent-based simulation entirely on a GPU. They ported the cellular models Mood Diffusion [111, 70], Game of Life [52] and Schelling Seg- regation [141]. Through the Open Graphics Library (OpenGL), individual agent states are mapped to pixel colour values. The authors report a speedup of 15 to 40 compared to CPU-based sequential execution. Kolb et al. [88] develop a particle simulation and a GPU-based collision detection mech- anism built on the authors' previous work [87]. Similarly, Richmond et al. [136] utilise the GPU's texture processing ability and map agent states onto texture data. To accelerate the neighbourhood detection, the simulation space is partitioned dynamically according to the agents' current states. The algorithm to generate partitions is borrowed from the particle pinning problem in rigid body particles physics [60, 57]. Identification of the start and end of the partition boundary is performed similarly to the method described in [118]. Textures are used to represent the agents' states and ver- tex texture fetching enables the search for the start and end of the partition boundary by comparing the partition value to the previous agent's state. To enable traffic simulations on GPUs, Perumalla [127] (and Perumalla et Aaby [129]) proposes to model the road network as a grid made up of cells. A road network in Cartesian coordinates is translated to a grid representation overlaying the network: a cell in the grid is marked as occupied when an edge of the original road network starts in the cell, passes the cell or ends in the cell. In graphics memory, the cells' properties such as turning probabilities and length are stored in texture buffers. Simulation is carried out by performing operations on the texture buffers. A different method for traffic simulation on GPUs is presented by Strippgen and Nagel [151], who propose a queue-based approach using CUDA. Each road is represented as a single first-in, first- out (FIFO) queue stored in memory in the form of a ring buffer. With the ring buffer, insertion 16 of a vehicle entering a road and removal of a vehicle exiting a road is achieved with constant time complexity. Coalesced memory access can be achieved by processing adjacent roads using adjacent threads. Since the vehicles' mobility is modelled by a fixed per-link velocity, their approach can be considered mesoscopic. Behaviours such as overtaking or lane-changing are not modelled and would require random insertions and removals from the ring buffers, which are associated with linear time complexity. Other domains in which agent-based simulations have been successfully ported to GPUs using model-specific data structures include collision detection [161] and a simulation study of tuberculo- sis [40]. In the former, a grid is split into tiles and data at the boundary of the tiles is replicated so that a consecutive space is occupied in the global memory of the GPU. In the latter, the authors propose to use a sorted array according to the liveness status of agents, so that the state of a new agent can be stored in a memory location previously occupied by one of the dead agents. Sorting and priority queues Full or partial sorting are frequently required in agent-based simulations, e.g., for neighbourhood discovery or to implement priority queues (PQ) if time advancement is performed in a discrete- event manner. These operations can involve large amounts of data-dependent and scattered memory accesses and are therefore challenging to implement efficiently on hardware accelerators. Since this operation can occupy a substantial portion of the simulation runtime [139], a number of works have focused on memory layouts and algorithms for sorting and priority queues on accelerators. As building blocks for time advancement in a discrete-event fashion, parallel reduction and bitonic sorting are commonly used in GPU- and FPGA-based simulation [123, 163, 179, 142, 85]. We discuss these two operations jointly due to their structural similarities. In both cases, an input array is split into chunks, each chunk being handled by one thread. At each cycle, the sorted arrays/minimum values of two threads are then merged to form a new input array. Thus, at each cycle, the number of chunks and active threads is cut into half. The algorithm iterates until only one thread is active, leaving a sorted array or the global minimum value, respectively. He et al. [64] propose a parallel heap-based PQ on GPU based on a previous CPU-based design [37]. The data structure resembles a binary min-heap, but stores r items per heap node. Items are inserted and extracted in a joint bulk operation that inserts up to k ≤ 2r and extracts up to r elements. At any time the root node is guaranteed to hold the highest-priority elements, while elements of lower priority are gradually inserted into deeper levels of the tree over the course of multiple insert-extract operations. Parallelism can be exploited across the sorting operations on the items within a tree node, across the nodes on one level of the tree, and by processing all even-numbered and odd-numbered levels of the tree in parallel. The costs of the queue operations can be hidden by performing them in parallel with the processing of extracted items. Similarly, the FPGA-based DES simulators by Rahman et al. [132] relies on a pipelined heap [20] for storing events. In contrast to the parallel heap by He et al., the pipelined heap is designed to achieve near-constant access times, but does not provide bulk operations. A number of works avoid the need for a global PQ holding all future events. Instead, the set of events is considered jointly in an unsorted fashion [153], split by model segment [142] or simulated entity [179, 5, 98], split according to a fixed policy [124, 166], or split randomly [108]. To determine the events that can be executed without violating the simulation correctness, a parallel reduction is performed to determine the minimum timestamp among the events. Baudis et al. [13] evaluate the performance of PQs on a GPU implemented as a single parallel heap or as a set of ring buffers, implicit binary heaps, and splay trees [146] in the context of DES and path finding on grids. Their results indicate that for up to about 500 elements per PQ, ring buffers achieve the highest performance. At larger element counts, implicit heaps outperform the other approaches in their study. Their results suggest that higher performance is achieved by relying on multiple PQs, one for each agent or set of agents, compared to a single PQ holding all events. 4.4 Maximisation of Parallelism The limited predictability of how the state of a simulated system evolves over time translates not only to scattered memory accesses, but also to an irregular control flow, which can negatively affect performance in two ways: first, variations in the computational intensity among the model segments may leave some processing elements idle. Second, the single-instruction multiple-thread execution 17 model of GPUs requires divergent operations within a warp to be serialised. The existing techniques to maximise the parallelism of ABS using accelerators can be roughly categorized as follows: 1. Multiple replications in parallel: full utilisation of a massively parallel accelerator requires large numbers of computations that are independent and can thus be executed in parallel. If a simulation involves a sequence of mostly dependent computations, the overheads for commu- nication may outweigh the gains from parallelisation. Thus, techniques have been proposed to perform computations from multiple simulation runs in parallel. 2. Window-based event execution: in simulations involving a discrete-event mechanism, only a proper subset of the simulated entities may require an update at a certain point in simulation time. Multiple authors have proposed gathering events across a window in simulated time, and executing these events in parallel. In effect, this approach forces a discrete-event approach into a time-stepped execution. A key difference among the techniques lies in whether the simulation correctness is strictly maintained. 3. Speculative execution: as in general optimistic parallel and distributed simulation [47], computations may be performed speculatively to improve hardware utilisation. A rollback mechanism is required to revert to a correct simulation state after erroneous computations. 4. Computation sorting: when assigning neighbouring threads of a GPU to individual agents or events, divergence occurs if required computations are inhomogeneous. Some authors have proposed sorting of computations to minimise divergence. 4.4.1 Multiple Replications in Parallel If an individual simulation run does not provide sufficient parallelism to fully utilise the available hardware, a Multiple Replications in Parallel (MRIP) approach [125] can be applied, as shown by Shen et al. [143]: in their approach, multiple replications of a traffic simulation [164] are executed in parallel on a GPU. Thus, both the parallelism among agents as well as the parallelism across replications can be exploited. Laville et al. [93] implement a multi-agent simulation of microorganisms in soil for CPU/GPU in OpenCL. Each GPU thread manages one agent and each block is responsible for one simulation instance so that multiple simulation instances can run concurrently on one graphics card. The idea is applied to discrete-event simulations by Kunz et al. [89], focusing on executing parameter studies comprised of multiple replications on a GPU. In addition to exploiting the parallelism across replications, Li et al. [97] aim to avoid unnecessary redundant computations common to multiple replications. They propose a cloning mechanism for ABS on the GPU: in an ensemble simulation run comprised of multiple simulation instances, the computations that are common to multiple instances are only performed once. When the behaviour of an agent diverges between two simulation instances, a clone of the agent is created. Since the agent may affect other agents, cloning is performed according to the propagation of the effects of the original change in agent behaviour. Across cloned simulation instances, neighbour detection can be aggregated to improve the utilisation of the GPU resources. The benefit of cloning is limited when simulation runs diverge strongly, e.g., across multiple runs of a stochastic simulation using different seeds for random number generation. Recently, the cloning approach has been applied to large-scale cellular simulations on GPU clusters [175]. 4.4.2 Window-based event execution On a GPU, all threads in a warp execute the same sequence of instructions on different elements of data. If no input data is available for some of the threads within a warp, the hardware utilisation is reduced. In ABS, this issue is particularly obvious when time advancement is performed in a discrete- event fashion to accommodate varying state update intervals among the agents. Then, events are scattered along the time axis, i.e., the probability that many events share the same timestamp may be low. Thus, a simple parallelisation across the events at a certain point in model time may be insufficient. An approach to address this problem is to execute DES models in a time-stepped fashion: all events within a certain time interval are executed in parallel. The lower bound of this time interval 18 is usually referred to as Lower Bound on Time Stamp (LBTS), which is similar to Global Virtual Time in optimistically synchronised parallel and distributed simulation [81]. With a sufficiently large time step size, hardware utilisation is increased. However, since dependencies between events are not considered, the simulation results may differ from a sequential execution. A study comparing the performance of time advancement mechanisms for simulations on the CPU and the GPU is presented by Perumalla [126]. They study diffusion simulations running in a time-stepped, discrete-event, and hybrid fashion. The GPU variant is implemented in the GPU programming language Brook [24]. While the GPU outperforms the CPU in the time-stepped variant, it does not perform as well as the discrete-event implementation on the CPU. However, high speedup is achieved using the hybrid approach, where at each cycle, the minimum gap between two events is used as a time step. The simulation time then advances according to this time step. Fishwick. [122, 124] present a method for queuing network simulation that executes a DES model in a time-stepped fashion. The simulation time advances according to a fixed time step size, but skips periods where no events occur. All events within the current time step are executed in parallel without considering their potential dependencies. Although the simulation results may be affected by their approach, the authors show that for a queueing network simulation, error bounds can be given. Other works assume a minimum time delta between an event and its creation (lookahead) to guarantee the correctness of the simulation results [140, 5, 179]. If lookahead is available, a window can be determined within which events are independent, allowing for parallel execution without affecting the simulation correctness. The current time window is extended dynamically in work by Tang and Yao [155] to allow more events to be executed in parallel. After executing all events within the current window, their algorithm evaluates the first event in the event queue with a timestamp larger than the LBTS that can still safely be executed according to the lookahead. 4.4.3 Speculative execution To maintain the correctness of the simulation results when executing in parallel on an accelerator, the simulator must consider the dependencies between state updates. In some of the approaches described above, a time window is determined where state updates cannot affect each other. If it is difficult to determine a time window of sufficient size to extract substantial parallelism, a speculative (also referred to as optimistic) approach can be employed: state updates are performed without regard for correctness, and rolled back if errors are detected. The possibility of speculative execution of simulations on FPGAs has been first demonstrated by Model and Herbordt [108]. They make use of an event predictor, which predicts the interaction between two particles and generates new events accordingly. Events may later be cancelled as a consequence of a false prediction. Targeting GPUs, Li et al. [95] present an execution model that avoids divergent control flow by speculative event execution. In an initial step, all events that may occur in the simulation are created. Subsequently, all events are executed in parallel. A scanning process detects and revokes causally invalid event executions: if an event leaves the simulation in an incorrect state according to a model-specific criterion, the erroneous event and all events created by it are revoked recursively. A more general approach for GPU-based discrete-event simulation is presented by Liu and An- delfinger [98]. An optimistic execution scheme based on the Time Warp algorithm [81] implemented in CUDA is shown to be beneficial at low event density in simulated time. To support rollbacks in case of erroneous computations, the authors show how the default random number generator in CUDA can be reversed computationally without storing additional data. 4.4.4 Computation sorting On a GPU, threads within a warp following divergent branches of the control flow are serialised. For instance, if some threads in a warp execute the body of an if statement, whereas others execute the body of the corresponding else statement, the two sets of threads perform their actions one after another. Some approaches attempt to arrange the assignment of computations to the available threads so that branch divergence is minimised. In their DES engine on the GPU, Tang and Yao [155] sort events by type before execution, i.e., by the code associated with the event. 19 The idea is applied to GPU-based execution of multiple simulation instances at the same time by Kunz et al. [89] (cf. Section 4.4.1). If the simulation instances do not diverge too strongly, many events of the same type are available across multiple instances, enabling efficient parallel execution. Kofler et al. apply computation sorting to their ABS of mosquitoes [85]. In their simulator, a one-to-one mapping between agents and threads is used. Depending on their current state, agents may perform different operations, which can result in taking different control flow branches during the state updates. Thus, to reduce divergence among threads within a warp, agents are sorted by their current state, so that the state updates of adjacent agents share the same control flow. 4.5 Abstraction from hardware specifics Compared with model development in CPU-based environments, development for accelerators can be cumbersome and error-prone. To avoid the need for modellers to gain deep expertise in programming for specific accelerators, several frameworks have been proposed that enable the specification of parts of the model structure and behaviour in a hardware-agnostic fashion. The approaches to avoid the need for modellers to consider low-level aspects of accelerators can be classified as follows: 1. Frameworks to support simulation development: some authors have proposed generating partial model code to be executed on accelerators from domain-specific languages or the reliance on a library of pre-defined implementations of common simulation tasks and models. However, in these approaches, developing a full ABS will typically still require manual implementation work using a comparatively low-level languages such as CUDA. Further, workload partitioning and assignment to different hardware devices is currently not considered by these approaches. 2. Unified memory access: since in most cases, the CPU and hardware accelerators involved in a simulation operate on separate memory, resolving data dependencies may involve cumbersome explicit data transfers. A number of authors have proposed techniques to transparently access data in programs executed on heterogeneous hardware. 4.5.1 Frameworks to support simulation development In the Flexible Large Scale Agent Modelling Environment (FLAME GPU) [135, 137], agent states are specified using the state machine model X-Machine [41, 74]. Modellers define agent states in an XML-based format, while state transitions, i.e., the code segments describing the state updates, have to be manually specified as CUDA code. Generic facilities for exchanging messages between agents are provided by the framework. Use cases of the FLAME GPU framework can be, e.g., traffic simulation [71]. Another framework called Many-Core Multi-Agent System (MCMAS) for GPU and other many- core architectures is introduced in [92]. The framework provides a high-level Java interface to OpenCL code as well as a set of pre-defined data structures and functions called plugins. To implement agent models, users either rely on plugins or define their own plugins as OpenCL code that can be called from Java code. The authors state that unlike FLAME GPU, in which models are targeted exclusively to the framework, the models defined in MCMAS can be reused by other agent-based simulators. While FLAME and MCMAS both reduce the implementation work required to develop agent- based simulations targeting accelerators, these frameworks do not provide guidance or automation in distributing the simulation workload to the available hardware. Thus, manual experimentation is required to determine a suitable hardware mapping. 4.5.2 Unified memory access GPGPU frameworks such as OpenCL or CUDA require the user to either explicitly trigger data trans- fers between host and device memory, to explicitly select certain variables or memory regions for access from both CPU and GPU code [117], or to annotate the program to manage data transfers [173, 94]. These manual steps complicate the development of agent-based simulations in heterogeneous envi- ronments. Some works aim to improve on this situation by transparently transferring required data between host and graphics memory. However, in languages based on C or C++, static alias analysis, i.e., determining which pointers refer to the same memory regions, is known to be undecidable [78]. 20 Jablin et al. [78, 77] presented the first fully automated data management system based on com- pilation steps and a runtime library. The developer formulates his program and GPU code as if all data resides in host memory and can be accessed both from the CPU and GPU. The proposed approach instruments the code to track accesses to different memory regions using code instrumen- tation and trapping of system calls. To avoid the need for static pointer analysis, memory accesses through pointers are tracked by the runtime library. In addition to transparently handling data transfers, CPU-GPU communication is optimised during compile time by re-ordering the program flow to reduce the alternation between computations and data transfers. Unnecessary data transfers are avoided by leaving data in the GPU memory until it is accessed from the host. While the work of Jablin et al. could be applied to automate data transfers in heterogeneous ABS, the detection of parallelism is not covered. In Section 5, we sketch research directions towards automation in porting ABS to accelerators. 5 Towards an automated offloading procedure From the observations in the previous section, we can state that there is a vast range of techniques covering the main challenges of high-performance ABS on hardware accelerators. However, there exist only few ABS frameworks that support such accelerators. Since existing agent-based simulation and model implementations typically target purely CPU-based environments, there is a clear need for processes and tools to support the transition to an execution on accelerators. More specifically, modellers and simulationists should be supported in the parallelisation and hardware mapping as much as possible. While methodologies have been proposed to systematise the steps of porting a simulation to a GPU [106, 69], there is still a lack of automated tools to support this process. The problem of automatic parallelisation of general programs is a broad and active field of re- search [48]. Substantial successes have been achieved with respect to parallelisation of computation- ally intensive loops with predictable and mostly static control flow [59], whereas the extraction of par- allelism across complex and irregular programs is still a largely manual process. Common approaches include specifying software systems using formalisms that express parallelism explicitly [73, 91, 105] or annotating programs with parallelisation hints [35]. In essence, these approaches provide the com- piler or parallelisation middleware with a dependency graph of the statements or code blocks within the original program. Fortunately, many agent-based simulators and models roughly follow a common set of properties that simplify the extraction of parallelism. We identify the following constraints that can be leveraged to support the parallelisation process: 1. Time-stepped execution: usually, the model time is advanced in fixed increments. At each time step, all agents update their states. 2. Two states per agent: to decouple the simulation results from ordering agent updates, simulators commonly support storing each agent's old state at t − 1 and the new state at t separately. During an update from t− 1 to t, only read accesses are performed to the agents' states and the environment state at t − 1, and only write accesses to the states at t. Thus, within an update, there are no read-after-write dependencies across agents. 3. Sense-Think-Act cycle: we assume that agent updates follow the well-known Sense-Think-Act cycle (cf. Sec. 3.1), with one such cycle per model. With these constraints, a natural approach to parallelisation is to offload individual stages of a model's Sense-Think-Act cycle to an accelerator. For instance, in crowd simulations using the social force model, the Think stage comprised of the computation of the force affecting an agent may be performed by one thread of a GPU per agent. In the following, we sketch an envisioned workflow and the required tools to support users in porting an existing CPU-based ABS to a system equipped with hardware accelerators. For the targeted simulator architecture, we assume a traditional master-worker scheme, with the host CPU acting as the master and assigning work to the available accelerators at each time step. 21 Figure 7: Workflow of the envisioned automated offloading procedure. Coord position; void executeOnTimeStep(): Algorithm 1 Example for model code annotated with the stages of an agent update. 1: #pragma agent_begin 2: class Agent: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: #pragma agent_end #pragma sense_begin List agents = getNeighbouringAgents(position); #pragma sense_end #pragma think_begin Coord velocity = computeVelocity(agents); #pragma think_end #pragma act_begin position = position + velocity; #pragma act_end 5.1 Proposed Work Flow The proposed semi-automated process is visualised in Figure 7. To facilitate the automatic partition- ing of the simulation source code into segments that can be outsourced to various types of hardware, we suggest manually annotating the source code according to the Sense-Think-Act paradigm. From that it follows that the smallest unit that can be offloaded to a hardware accelerator in our proposed framework is one of these three stages. Each of the stages is profiled in terms of memory and com- putational requirements. According to the gathered requirements, an optimisation problem is solved to generate a hardware assignment (rightmost part of Figure 7). For simplicity, we assume that all data required by the stage fits into one of the accelerator's memory entirely. Otherwise, agents could be distributed across multiple accelerators or processed in batches, both implying additional communication costs. Input 5.1.1 The source code is annotated manually to signify the stages of the Sense-Think-Act cycle, e.g., in the form #pragma sense_begin, #pragma sense_end, and so forth. A simple example for a crowd simulation is given in Algorithm 1. In addition to the manual annotations, this clear separation may require refactoring of the simulation code. By parsing the annotated source code, the framework obtains a mapping between code and stages that will later be enriched with data from measurements. The second input is a specification of the available hardware. Each hardware device is charac- terised by its available memory, computational performance, and host-device data transfer overhead. The computational performance can be stated in terms of single-threaded performance on CPUs, many-core CPUs, GPUs, and APUs. We assume that for an FPGA, only model stages for which implementations already exist are eligible for offloading. Thus, the computational performance of an FPGA is given with respect to specific model stages. 22 ComputationProfiling OptimisationProblemFPGAGPUCPUAvailable HardwareAnnotatedSOURCECODESenseCPUThinkFPGAActCPU Simulation model NSenseCPUThinkGPUActGPU Simulation model 1...MemoryProfiling 5.1.2 Memory access profiling Now that the source code is partitioned into offloadable stages and the capabilities of all the hardware components are known, the data dependencies of each stage are determined. Assuming a node in a graph represents one stage, then an edge in this graph represents a data dependency between these stages. The dependency can refer to both agent or environment data. The weight of the edge is the volume of the data that is accessed in the CPU-based simulator, i.e., that has to be transferred during offloading. Usually, the Think stage only has a dependency on the Sense stage within the same model and agent (intra-agent dependency), whereas the Sense stage might depend on the environment and on other agents' states (inter-agent dependency). Although we assume that an individual stage is not partitioned across multiple hardware devices, the amount of data gathered during the sense stage may vary over the course of the simulation. For instance, if agents form clusters in the simulation space, the number of neighbours per agent may increase over time. Thus, the data dependencies should be measured with respect to typical scenario conditions. To avoid exceeding the memory capacity of one of the considered hardware devices, the profiling can be repeated for a worst-case scenario. Tools exist that are able to ascribe memory accesses performed during a program run to the source functions, data structures or threads [8]. For instance, the tool PinComm constructs a dynamic data flow graph from instrumented program executions [66]. The annotations shown in Algorithm 1 allow us to map function names to the separate agent update stages. Thus, it is possible to obtain the amount of memory accessed within each stage. Once the graph describing the amount of memory accesses across stages is created, the implications in terms of memory copying of moving a certain stage to a hardware device can directly be evaluated. For example, if the Think stage is moved to the GPU and the Sense and Act stage remains on the host CPU, then the edges entering and leaving the Think node determine the data transfer overhead. The actual cost of this copy procedure can be obtained from the device specification or through measurements. 5.1.3 Computational profiling In addition to the memory requirements of each stage, information about the computational char- acteristics of each stage is required. The estimated runtime could be inferred from hardware perfor- mance models [178, 145, 28, 9]. Approaches as those described in Section 4.1.2 can be applied to estimate the suitability of different agent update stages for execution on a certain accelerator. By characterising the workload incurred by each stage in terms of instruction mix and memory accesses as well as the number of agents, the performance of executing the full-scale simulation can be esti- mated [56, 86, 176, 165]. Alternatively, if the runtime of a stage is dominated by a sub-task that can easily be ported to an accelerator, measurements with respect to this task can be performed directly on the accelerator [18]. 5.1.4 Optimisation problem Building on the graph that represents data dependencies, an optimisation problem of assigning stages to hardware types can be formulated, similar to the approach targeting embedded systems by Zhang et al. [177]. In essence, constraints are formulated so that each stage is assigned to the host or a device, resulting in an overall simulation schedule. Importantly, the optimisation problem must reflect the data location after each stage or time step (e.g., [105]). For instance, to avoid data transfers, it may be more efficient to execute two subsequent stages on the same accelerator. The objective function of the optimisation problem is the overall runtime, i.e., the sum of all estimated execution times on the respective device and the incurred communication costs by distributing nodes of the dependency graph that are connected by an edge. 5.1.5 Output The output of the optimisation steps is a recommendation of which stages should be executed on which hardware device. It is then the task of the user to port the code of each stage so it can be executed on the assigned device. This might require specific knowledge, e.g., programming in VHDL or OpenCL and can therefore be an obstacle to some researchers. Given that some established simulation models are used by many researchers (e.g., a CSMA/CA model in network simulation 23 or different car-following models in traffic simulation), a public repository of common simulation models could be created, similarly to the plugin approach used in MCMAS [92]. Researchers could download these crowd-sourced simulation models to enable parts of their own simulations to be run on heterogeneous hardware environments, and contribute their own model implementations. Such a repository would also reduce the need to estimate execution times and improve the optimisation results by allowing direct measurements on the potential target devices. Similarly, after porting a specific model stage, new measurements may be performed to provide the optimisation process with more accurate performance data. 5.1.6 Discussion In our approach, we take a pragmatic perspective: while the envisioned workflow is achievable based on existing building blocks, our assumptions may leave substantial performance potentials unexplored. In particular, by assuming that models and their stages are both executed as a series of dependent steps, we only exploit the inter-agent parallelism within each stage, while any parallelism across stages is not considered. In the following, we revisit the key challenges of ABS using hardware accelerators and sketch techniques from the literature that could be applied to maximise the performance benefits given our assumptions. The hardware assignment (cf. Section 4.1) is the main focus of the proposed work flow. Above, we describe a static assignment using a functional decomposition. Still, the optimisation problem that determines the hardware mapping could be updated according to runtime measurements. To minimise data transfer overheads that cannot be avoided (cf. Section 4.2), a bulk execution of multiple simulation runs would be feasible. The optimisation problem could be adapted so that the computational and memory requirements reflect those of each stage executed within multiple simulations runs at the same time. The output of the optimisation process would then be a schedule for an execution in a multiple replications in parallel (MRIP) fashion [125, 89] . The technique of overlapping computations with data transfers seems challenging in our approach, since we assume a serialisation of the agent update stages. However, pre-fetching across stages may be performed by commencing data transfers once some agents have finished a stage. Scattered memory accesses and the maximisation of parallelism (cf. Sections 4.3 and 4.4) could be addressed by providing a library of optimised functions and data structures for operations such as inter-agent communication or neighbour search (e.g., [31, 92]). A certain degree of abstraction from hardware specifics (cf. Section 4.5) is achieved by the automated profiling and hardware mapping of our proposed workflow. Since each stage is executed on a single accelerator, facilities for unified memory access across all devices are not required. Instead, all agent data is updated locally on the accelerator and transferred automatically according to the schedule determined in the optimisation process. Overall, the envisioned workflow is intended to rely on existing tools and techniques to allow researchers to exploit the hardware at their disposal with reasonable performance gains, while avoiding the need for costly and time-consuming manual optimisation steps as much as possible. 6 Conclusions We presented a survey of the literature on agent-based simulation using hardware accelerators. We categorized existing approaches according to the key challenges of hardware assignment, minimisa- tion of data transfer overheads, scattered memory accesses, maximisation of parallelism, and the abstraction from hardware specifics. Our survey provides modellers with an overview of techniques to execute a certain class of models on the available hardware. Methodology researchers are given a summary of the existing work, pointing out research gaps where further exploration is required. Our main observations are two-fold: first, most of the literature in the past years has focused on GPUs. We expect a significant amount of work exploring agent-based simulations on FPGAs to appear in the near future. Second, while a vast amount of work has proposed techniques that allow for efficient execution of agent-based simulations, only a small number of techniques has found their way into a unified framework. Thus, the burden of developing a simulation that is executable in a heterogeneous environment is carried by the modeller. Aiming to reduce the need for expertise in the programming 24 for accelerators, we sketched our vision of a framework to perform an automated hardware mapping and performance optimisation based on building blocks from the literature. Acknowledgement This work was financially supported by the Singapore National Research Foundation under its Cam- pus for Research Excellence And Technological Enterprise (CREATE) programme. References [1] Brandon G. Aaby, Kalyan S. Perumalla, and Sudip K. Seal. Efficient Simulation of Agent-Based Models on Multi-GPU and Multi-Core Clusters. In Proceedings of the International Conference on Simulation Tools and Techniques (SIMUTools '10), pages 29:1–29:10, Torremolinos, Malaga, Spain, March 2010. ICST. [2] Advanced Micro Devices, Inc. Radeon's next-generation Vega architecture. Technical Report 061317_FINAL_V2, Radeon Technologies Group, June 2017. [3] Spiros N. Agathos, Alexandros Papadogiannakis, and Vassilios V. Dimakopoulos. Targeting the parallella. In Proceedings of the European Conference on Parallel Processing (Euro-Par '15), pages 662–674, Vienna, Austria, August 2015. Springer. [4] Gary An, Qi Mi, Joyeeta Dutta-Moscato, and Yoram Vodovotz. Agent-Based Models in Trans- lational Systems Biology. Wiley Interdisciplinary Reviews: Systems Biology and Medicine, 1(2):159–171, September 2009. [5] Philipp Andelfinger and Hannes Hartenstein. Exploiting the Parallelism of Large-Scale Application-Layer Networks by Adaptive GPU-Based Simulation. In Proceedings of the Winter Simulation Conference (WSC '14), pages 3471–3482, Savannah, GA, USA, December 2014. IEEE. [6] Philipp Andelfinger, Jens Mittag, and Hannes Hartenstein. GPU-Based Architectures and Their Benefit for Accurate and Efficient Wireless Network Simulations. In Proceedings of the Interna- tional Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS '11), pages 421–424, Singapore, July 2011. IEEE. [7] Philipp Andelfinger, Yadong Xu, David Eckhoff, Wentong Cai, and Alois Knoll. Fast- Forwarding Agent States to Accelerate Microscopic Traffic Simulations. In Proceedings of the ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS '18), pages 113–124, Rome, Italy, May 2018. ACM. [8] Imran Ashraf, Mottaqiallah Taouil, and Koen Bertels. Memory Profiling for Intra-Application Data-Communication Quantification: A Survey. In Proceedings of the International Design & Test Symposium (IDT '15), pages 32–37, Dead Sea, Jordan, December 2015. IEEE. [9] Sara S. Baghsorkhi, Matthieu Delahaye, Sanjay J. Patel, William D. Gropp, and Wen-mei W. Hwu. An adaptive performance modeling tool for GPU architectures. In Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP '10), pages 105–114, Bangalore, India, January 2010. ACM. [10] Geoffrey H. Ball and David J. Hall. ISODATA, a Novel Method of Data Analysis and Pattern Classification. Technical Report AD0699616, Stanford Research Institute, Menlo Park, CA, April 1965. [11] Masako Bando, Katsuya Hasebe, Ken Nakanishi, Akihiro Nakayama, Akihiro Shibata, and Y¯uki Sugiyama. Phenomenological Study of Dynamical Model of Traffic Flow. Journal de Physique I, 5(11):1389–1399, November 1995. 25 [12] Taylor Barnes, Brandon Cook, Jack Deslippe, Douglas Doerfler, Brian Friesen, Yun (Helen) He, Thorsten Kurth, Tuomas Koskela, Mathieu Lobet, Tareq Malas, Leonid Oliker, Andrey Ovsyannikov, Abhinav Sarje, Jean-Luc Vay, Henri Vincenti, Samuel Williams, Pierre Carrier, Nathan Wichmann, Marcus Wagner, Paul Kent, Christopher Kerr, and John Dennis. Evaluating and Optimizing the NERSC Workload on Knights Landing. In Proceedings of the International Workshop on Performance Modeling, Benchmarking and Simulation of High Performance Com- puting Systems (PMBS '16), pages 43–53, Salt Lake City, UT, USA, November 2016. IEEE. [13] Nikolai Baudis, Florian Jacob, and Philipp Andelfinger. Performance Evaluation of Priority Queues for Fine-Grained Parallel Tasks on GPUs. In Proceedings of the International Sym- posium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS '17), pages 1–11, Banff, Canada, September 2017. IEEE. [14] David W. Bauer, Matthew McMahon, and Ernest H. Page. An Approach for the Effective Utilization of GP-GPUs in Parallel Combined Simulation. In Proceedings of the Conference on Winter Simulation (WSC '08 ), pages 695–702, Miami, FL, USA, December 2008. IEEE. [15] Michael Bauer, Henry Cook, and Brucek Khailany. CudaDMA: Optimizing GPU Memory Bandwidth via Warp Specialization. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis (SC '11), pages 12:1–12:11, Seattle, DC, USA, November 2011. ACM. [16] Michael Bauer, Sean Treichler, and Alex Aiken. Singe: Leveraging Warp Specialization for High Performance on GPUs. In Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP '14), pages 119–130, Orlando, FL, USA, February 2014. ACM. [17] Nathan Bell and Jared Hoberock. Thrust: A Productivity-Oriented Library for CUDA. GPU Computing Gems Jade Edition, pages 359–371. Elsevier, 2011. In [18] Mehmet E. Belviranli, Laxmi N. Bhuyan, and Rajiv Gupta. A Dynamic Self-scheduling Scheme for Heterogeneous Multiprocessor Architectures. ACM Transactions on Architecture and Code Optimization - Special Issue on High-Performance Embedded Architectures and Compilers, 9(4):57:1–57:20, January 2013. [19] Jacob L. Berlin. Design of a Parallel Discrete Event Simulation Coprocessor. Master's thesis, December 1993. [20] Ranjita Bhagwan and Bill Lin. Fast and Scalable Priority Queue Architecture for High-Speed Network Switches. In Proceedings of the IEEE INFOCOM Conference on Computer Commu- nications (INFOCOM '00), pages 538–547, Tel Aviv, Israel, March 2000. IEEE. [21] Ben Romdhanne Bilel, Nikaein Navid, and Mohamed Said Mosli Bouksiaa. Hybrid CPU-GPU Distributed Framework for Large Scale Mobile Networks Simulation. In Proceedings of the IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications (DS-RT '12), pages 44–53, Dublin, Ireland, October 2012. IEEE. [22] André R. Brodtkorb, Trond R. Hagen, and Martin L. Saetra. Graphics Processing Unit (GPU) Programming Strategies and Trends in GPU Computing. Elsevier Journal of Parallel and Distributed Computing, 73(1):4–13, January 2013. [23] Ulrich Brüning, Wolfgang K. Giloi, and Wolfgang Schroeder-Preikschat. Latency Hiding in Message-Passing Architectures. In Proceedings of the International Parallel Processing Sympo- sium (IPPS '94), pages 704–709, Cancun, Mexico, April 1994. IEEE. [24] Ian Buck, Tim Foley, Daniel Horn, Jeremy Sugerman, Kayvon Fatahalian, Mike Houston, and Pat Hanrahan. Brook for GPUs: Stream Computing on Graphics Hardware. In Proceedings of the International Conference on Computer Graphics and Interactive Techiques (SIGGRAPH '04), pages 777–786, Los Angeles, CA, USA, August 2004. ACM. 26 [25] Martin Burtscher, Rupesh Nasre, and Keshav Pingali. A Quantitative Study of Irregular Pro- grams on GPUs. In Proceedings of the IEEE International Symposium on Workload Character- ization (IISWC '12), pages 141–151, La Jolla, CA, USA, November 2012. IEEE. [26] Márcio Castro, Emilio Francesquini, Fabrice Dupros, Hideo Aochi, Philippe Navaux, and Jean- François Mehaut. Seismic Wave Propagation Simulations on Low-Power and Performance- Centric Manycores. Elsevier Journal of Parallel Computing, 54:108–120, May 2016. [27] Shuai Che, Jie Li, Jeremy W. Sheaffer, Kevin Skadron, and John Lach. Accelerating Compute- Intensive Applications With GPUs and FPGAs. In Proceedings of the Symposium on Application Specific Processors (SASP '08), pages 101–107, Anaheim, CA, USA, June 2008. IEEE. [28] Xi E. Chen and Tor M. Aamodt. A First-Order Fine-Grained Multithreaded Throughput Model. In Proceedings of the IEEE International Symposium on High Performance Computer Architecture (HPCA '09), pages 329–340, Raleigh, NC, USA, February 2009. IEEE. [29] Thomas M. Cioppa, Thomas W. Lucas, and Susan M. Sanchez. Military Applications of Agent- In Proceedings of the Winter Simulation Conference (WSC '04), pages Based Simulations. 171–180, Washington, DC, USA, December 2004. IEEE. [30] John G. Cleary, Murray Pearson, and Husam Kinawi. The Architecture of an Optimistic CPU: The WarpEngine. In Proceedings of the Hawaii International Conference on System Sciences (HICSS '95), pages 163–172, Wailea, HI, USA, January 1995. IEEE. [31] Simon Coakley, Paul Richmond, Marian Gheorghe, Shawn Chin, David Worth, Mike Holcombe, and Chris Greenough. Large-scale simulations with flame. In Joanna Kołodziej, Luís Correia, and José Manuel Molina, editors, Intelligent Agents in Data-intensive Computing, pages 123– 142. Springer International Publishing, 2016. [32] N.T. Collier and M.J. North. Repast sc++: A platform for large-scale agent-based modeling. In W. Dubitzky, K. Kurowski, and B Schott, editors, Large-Scale Computing Techniques for Complex System Simulations. Wiley, 2011. [33] Biagio Cosenza, Gennaro Cordasco, Rosario De Chiara, and Vittorio Scarano. Distributed Load Balancing for Parallel Agent-Based Simulations. In Proceedings of the International Euromicro Conference on Parallel, Distributed and Network-Based Processing (PDP '11), pages 62–69, Ayia Napa, Cyprus, February 2011. IEEE. [34] Lintao Cui, Jing Chen, Yu Hu, Jinjun Xiong, Zhe Feng, and Lei He. Acceleration of Multi-Agent Simulation on FPGAs. In Proceedings of the International Conference on Field Programmable Logic and Applications (FPL '11), pages 470–473, Chania, Greece, September 2011. IEEE. [35] Leonardo Dagum and Ramesh Menon. OpenMP: An Industry Standard API for Shared-Memory Programming. IEEE Journal of Computational Science and Engineering, 5(1):46–55, January 1998. [36] B. D. de Dinechin, R. Ayrignac, P. E. Beaucamps, P. Couvert, B. Ganne, P. G. de Massas, F. Jacquet, S. Jones, N. M. Chaisemartin, F. Riss, and T. Strudel. A Clustered Manycore Processor Architecture for Embedded and Accelerated Applications. In Proceedings of the IEEE High Performance Extreme Computing Conference (HPEC '13), pages 1–6, Waltham, MA, USA, September 2013. IEEE. [37] Narsingh Deo and Sushil Prasad. Parallel Heap: An Optimal Parallel Priority Queue. Springer Journal of Supercomputing, 6(1):87–98, March 1992. [38] Chris Ding and Yun He. A Ghost Cell Expansion Method for Reducing Communications in Solving PDE Problems. In Proceedings of the ACM/IEEE Conference on Supercomputing (SC '01), pages 55–55, Denver, CO, USA, November 2001. IEEE. [39] Arnaud Doniec, René Mandiau, Sylvain Piechowiak, and Stéphane Espié. A Behavioral Multi- Agent Model for Road Traffic Simulation. Elsevier Journal of Engineering Applications of Artificial Intelligence, 21(8):1443–1454, December 2008. 27 [40] Roshan M. D'Souza, Mikola Lysenko, Simeone Marino, and Denise Kirschner. Data-Parallel Algorithms for Agent-Based Model Simulation of Tuberculosis on Graphics Processing Units. In Proceedings of the Spring Simulation Multiconference (SpringSim '09), pages 21:1–21:12, San Diego, CA, USA, March 2009. SCSI. [41] Samuel Eilenberg. Automata, Languages, and Machines. Academic Press, 1974. [42] Joshua M. Epstein. Agent-Based Computational Models and Generative Social Science. Com- plexity, 4(5):41–60, May 1999. [43] Fernando A. Escobar, Xin Chang, and Carlos Valderrama. Suitability Analysis of FPGAs for IEEE Transactions on Parallel and Distributed Systems, Heterogeneous Platforms in HPC. 27(2):600–612, February 2016. [44] Babak Falsafi, Bill Dally, Desh Singh, Derek Chiou, J Yi Joshua, and Resit Sendag. FPGAs Versus GPUs in Data Centers. IEEE Micro, 37(1):60–72, January 2017. [45] Naznin Fauzia, Louis-Noël Pouchet, and P. Sadayappan. Characterizing and Enhancing Global Memory Data Coalescing on GPUs. In Proceedings of the Annual IEEE/ACM International Symposium on Code Generation and Optimization (CGO '15), pages 12–22, San Francisco, CA, USA, February 2015. IEEE. [46] Richard M. Fujimoto. Performance of Time Warp Under Synthetic Workloads. In Proceedings of the Distributed Simulation Conference (DSC '90), pages 23–28, San Diego, CA, USA, January 1990. SCS. [47] Richard M. Fujimoto. Parallel and Distributed Simulation Systems. Wiley New York, 2000. [48] Richard M. Fujimoto. Research Challenges in Parallel and Distributed Simulation. ACM Transactions on Modeling and Computer Simulation (TOMACS), 26(4):22:1–22:29, May 2016. [49] Richard M. Fujimoto, Conrad Bock, Wei Chen, Ernest Page, and Jitesh H. Panchal. Research Challenges in Modeling and Simulation for Engineering Complex Systems. Springer, 2017. [50] Richard M. Fujimoto, Christopher Carothers, Alois Ferscha, David Jefferson, Margaret Loper, Madhav Marathe, and Simon J.E. Taylor. Computational Challenges in Modeling & Simulation of Complex Systems. In Proceedings of the Winter Simulation Conference (WSC '17), pages 431–445, Las Vegas, NV, USA, December 2017. IEEE. [51] Richard M. Fujimoto, Jya-Jang. Tsai, and Ganesh Gopalakrishnan. Design and Performance of Special Purpose Hardware for Time Warp. In Proceedings of the Annual International Sym- posium on Computer Architecture (SCA '88), pages 401–409, Honolulu, HI, USA, May 1988. IEEE. [52] Martin Gardner. Mathematical Games: The Fantastic Combinations of John Conway's New Solitaire Game "Life". Scientific American, 223(4):120–123, October 1970. [53] Ioakeim G. Georgoudas, Panagiotis Kyriakos, G. Ch. Sirakoulis, and I. Th. Andreadis. An FPGA Implemented Cellular Automaton Crowd Evacuation Model Inspired by the Electrostatic-Induced Potential Fields. Elsevier Journal of Microprocessors and Microsystems, 34(7):285–300, November 2010. [54] Jacob Goldenberg, Barak Libai, and Eitan Muller. Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth. Springer Marketing letters, 12(3):211–223, August 2001. [55] Mark Granovetter. Threshold Models of Collective Behavior. University of Chicago Press American Journal of Sociology, 83(6):1420–1443, 1978. [56] Ivan Grasso, Klaus Kofler, Biagio Cosenza, and Thomas Fahringer. Automatic Problem Size In Proceedings of the ACM Sensitive Task Partitioning on Heterogeneous Parallel Systems. SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP '13), pages 281–282, Shenzhen, China, February 2013. ACM. 28 [57] Simon Green. Particle Simulation Using Cuda. NVIDIA Whitepaper, 6:121–128, 2010. [58] Tobias Grosser, Armin Groesslinger, and Christian Lengauer. Polly-Performing Polyhedral Optimizations on a Low-Level Intermediate Representation. World Scientific Parallel Processing Letters, 22(04):1250010, December 2012. [59] Tobias Grosser and Torsten Hoefler. Polly-ACC Transparent Compilation to Heterogeneous Hardware. In Proceedings of the International Conference on Supercomputing (ICS '16), pages 1:1–1:13, Istanbul, Turkey, June 2016. ACM. [60] Takahiro Harada. Real-Time Rigid Body Simulation on GPUs. NVIDIA GPU Gems, 3:123–148, December 2007. [61] Jack Harris and Matthias Scheutz. New Advances in Asynchronous Agent-based Scheduling. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA '12), pages 1–7, Las Vegas, NV, USA, July 2012. [62] Mark J. Harris, Greg Coombe, Thorsten Scheuermann, and Anselmo Lastra. Physically- Based Visual Simulation on Graphics Hardware. the ACM SIG- GRAPH/EUROGRAPHICS Conference on Graphics Hardware (HWWS '02), pages 109–118, Saarbrücken, Germany, September 2002. ACM. In Proceedings of [63] Scott Hauck and Andre DeHon. Reconfigurable Computing: The Theory and Practice of FPGA- Based Computation. Morgan Kaufmann, 2010. [64] Xi He, Deborah Agarwal, and Sushil K. Prasad. Design and Implementation of a Parallel Priority Queue on Many-Core Architectures. In Proceedings of the International Conference on High Performance Computing (HiPC '12), pages 1–10, Pune, India, December 2012. IEEE. [65] Ulrich Heinkel, Martin Padeffke, Werner Haas, Thomas Buerner, Herbert Braisz, Thomas Gen- tner, and Alexander Grassmann. The VHDL Reference: A Practical Guide to Computer-Aided Integrated Circuit Design (Including VHDL-AMS). John Wiley & Sons, Inc., 2000. [66] Wim Heirman, Dirk Stroobandt, Narasinga Rao Miniskar, Roel Wuyts, and Francky Catthoor. PinComm: Characterizing Intra-Application Communication for the Many-Core Era. In Pro- ceedings of the IEEE International Conference on Parallel and Distributed Systems (ICPADS '10), pages 500–507, Shanghai, China, December 2010. IEEE. [67] Emmanuel Hermellin and Fabien Michel. GPU Environmental Delegation of Agent Perceptions: Application to Reynolds's Boids. In Proceedings of the International Workshop on Multi-Agent Systems and Agent-Based Simulation (MABS '15), pages 71–86, Istanbul, Turkey, May 2015. Springer. [68] Emmanuel Hermellin and Fabien Michel. Defining a Methodology Based on GPU Delegation for Developing MABS Using GPGPU. In Proceedings of the International Workshop on Multi- Agent Systems and Agent-Based Simulation (MABS '16), pages 24–41, Singapore, May 2016. Springer. [69] Emmanuel Hermellin and Fabien Michel. GPU Delegation: Toward a Generic Approach for Developping MABS using GPU Programming. In Proceedings of the International Conference on Autonomous Agents & Multiagent Systems (AAMAS '16), pages 1249–1258, Singapore, May 2016. IFAAMAS. [70] James D. Hess, Jacqueline J. Kacen, and Junyong Kim. Mood-Management Dynamics: The Interrelationship Between Moods and Behaviours. Wiley Online Library British Journal of Mathematical and Statistical Psychology, 59(2):347–378, November 2006. [71] Peter Heywood, Paul Richmond, and Steve Maddock. Road Network Simulation Using FLAME GPU. In Proceedings of the European Conference on Parallel Processing (Euro-Par '15), pages 430–441, Vienna, Austria, August 2015. Springer. 29 [72] Manato Hirabayashi, Shinpei Kato, Masato Edahiro, and Yuki Sugiyama. Toward GPU- Accelerated Traffic Simulation and Its Real-Time Challenge. In Proceedings of the Interna- tional Workshop on Real-time and Distributed Computing in Emerging Applications (REAC- TION '12), pages 45–50, San Juan, Puerto Rico, December 2012. Universidad Carlos III de Madrid. [73] Charles Antony Richard Hoare. Communicating Sequential Processes. Communications of the ACM, 21(8):666–677, August 1978. [74] Mike Holcombe. X-Machines as a Basis for Dynamic System Specification. Engineering Journal, 3(2):69–76, March 1988. IET Software [75] Intel Corporation. Intel R(cid:13) FPGA SDK for OpenCL – Programming Guide. Technical Report UG-OCL002, December 2017. [76] Intel Corporation. Intel R(cid:13) Architecture Instruction Set Extensions and Future Features – Pro- gramming Reference, January 2018. [77] Thomas B. Jablin, James A. Jablin, Prakash Prabhu, Feng Liu, and David I. August. Dy- namically Managed Data for CPU-GPU Architectures. In Proceedings of the International Symposium on Code Generation and Optimization (CGO '12), pages 165–174, San Jose, CA, USA, March 2012. ACM. [78] Thomas B. Jablin, Prakash Prabhu, James A. Jablin, Nick P. Johnson, Stephen R. Beard, and David I. August. Automatic CPU-GPU Communication Management and Optimization. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Imple- mentation (PLDI '11), pages 142–151, San Jose, CA, USA, June 2011. ACM. [79] Deepak Jagtap, Ketan Bahulkar, Dmitry Ponomarev, and Nael Abu-Ghazaleh. Charac- terizing and Understanding PDES Behavior on Tilera Architecture. In Proceedings of the ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS '12), pages 53–62, Zhangjiajie, China, July 2012. IEEE. [80] Myeong-Wuk Jang and Gul Agha. Agent Framework Services to Reduce Agent Communication Overhead in Large-Scale Agent-Based Simulations. Elsevier Journal of Simulation Modelling Practice and Theory, 14(6):679–694, August 2006. [81] David R. Jefferson. Virtual Time. ACM Transactions on Programming Languages and Systems, 7(3):404–425, July 1985. [82] Y. Jiao, H. Lin, P. Balaji, and W. Feng. Power and Performance Characterization of Com- putational Kernels on the GPU. In Proceedings of the IEEE/ACM International Conference on Green Computing and Communications & International Conference on Cyber, Physical and Social Computing (GREENCOM-CPSCOM '10), pages 221–228, Hangzhou, China, December 2010. IEEE. [83] Jiangming Jin, Stephen John Turner, Bu-Sung Lee, Jianlong Zhong, and Bingsheng He. HPC Simulations of Information Propagation Over Social Networks. In Proceedings of the Interna- tional Conference on Computational Science (ICCS '12), pages 292–301, Omaha, NE, USA, June 2012. Elsevier. [84] Jiangming Jin, Stephen John Turner, Bu-Sung Lee, Jianlong Zhong, and Bingsheng He. Simula- tion of Information Propagation Over Complex Networks: Performance Studies on Multi-GPU. In Proceedings of the IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications (DS-RT '13), pages 179–188, Delft, Netherlands, October 2013. IEEE. [85] Klaus Kofler, Gregory Davis, and Sandra Gesing. Sampo: An Agent-Based Mosquito Point Model in OpenCL. In Proceedings of the Symposium on Agent Directed Simulation (ADS '14), pages 5:1–5:10, Tampa, FL, USA, April 2014. SCSI. 30 [86] Klaus Kofler, Ivan Grasso, Biagio Cosenza, and Thomas Fahringer. An Automatic Input- Sensitive Approach for Heterogeneous Task Partitioning. In Proceedings of the International ACM Conference on International Conference on Supercomputing (ICS '13), pages 149–160, Eugene, OR, USA, June 2013. ACM. [87] Andreas Kolb, Lars John, et al. Volumetric Model Repair for Virtual Reality Applications. In EUROGRAPHICS Short Presentation (2001), pages 249–256, Manchester, England, September 2001. The Eurographics Association. [88] Andreas Kolb, Lutz Latta, and Christof Rezk-Salama. Hardware-Based Simulation and Collision Detection for Large Particle Systems. In Proceedings of the ACM SIG- GRAPH/EUROGRAPHICS Conference on Graphics Hardware (HWWS '04), pages 123–131, Grenoble, France, August 2004. ACM. [89] Georg Kunz, Daniel Schemmel, James Gross, and Klaus Wehrle. Multi-Level Parallelism for Time- and Cost-Efficient Parallel Discrete Event Simulation on GPUs. In Proceedings of the ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS '12), pages 23–32, Zhangjiajie, China, July 2012. IEEE. [90] Chenggang Lai, Miaoqing Huang, Xuan Shi, and Haihang You. Accelerating Geospatial Appli- cations on Hybrid Architectures. In Proceedings of the IEEE International Conference on High Performance Computing and Communications, IEEE International Conference on Embedded and Ubiquitous Computing (HPCC & EUC '13), pages 1545–1552, Singapore, November 2013. IEEE. [91] Leslie Lamport. Specifying Systems: The TLA+ Language and Tools for Hardware and Software Engineers. Addison-Wesley Longman Publishing Co., Inc., 2002. [92] Guillaume Laville, Kamel Mazouzi, Christophe Lang, Nicolas Marilleau, Bénédicte Herrmann, and Laurent Philippe. MCMAS: A Toolkit to Benefit From Many-Core Architecure in Agent- Based Simulation. In Proceedings of the European Conference on Parallel Processing (Euro-Par '13), pages 544–554, Aachen, Germany, August 2013. Springer. [93] Guillaume Laville, Kamel Mazouzi, Christophe Lang, Laurent Philipppe, and Nicolas Marilleau. Using GPU for Multi-Agent Soil Simulation. In Proceedings of the Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP '13), pages 392–399, Belfast, UK, February 2013. IEEE. [94] Seyong Lee, Seung-Jai Min, and Rudolf Eigenmann. OpenMP to GPGPU: A Compiler Frame- In Proceedings of the ACM SIGPLAN work for Automatic Translation and Optimization. Symposium on Principles and Practice of Parallel Programming (PPoPP '09), pages 101–110, Raleigh, NC, USA, February 2009. ACM. [95] Xiaosong Li, Wentong Cai, and Stephen John Turner. GPU Accelerated Three-Stage Execu- tion Model for Event-Parallel Simulation. In Proceedings of the ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS '13), pages 57–66, Montreal, Canada, May 2013. ACM. [96] Xiaosong Li, Wentong Cai, and Stephen John Turner. Efficient Neighbor Searching for Agent- Based Simulation on GPU. In Proceedings of the IEEE/ACM International Symposium on Dis- tributed Simulation and Real Time Applications (DS-RT '14), pages 87–96, Toulouse, France, October 2014. IEEE. [97] Xiaosong Li, Wentong Cai, and Stephen John Turner. Cloning Agent-based Simulation on GPU. In Proceedings of the ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS '15), pages 173–182, London, UK, June 2015. ACM. [98] Xinhu Liu and Philipp Andelfinger. Time Warp on the GPU: Design and Assessment. In Proceedings of the ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS '17), pages 109–120, Singapore, May 2017. ACM. 31 [99] Xu Liu, Langshi Chen, Jesun S Firoz, Judy Qiu, and Lei Jiang. Performance Characterization of Multi-Threaded Graph Processing Applications on Intel Many-Integrated-Core Architecture. August 2017. [100] Qingqi Long, Jie Lin, and Zhixun Sun. Agent Scheduling Model for Adaptive Dynamic Load Balancing in Agent-Based Distributed Simulations. Elsevier Journal of Simulation Modelling Practice and Theory, 19(4):1021–1034, April 2011. [101] Sean Luke, Claudio Cioffi-Revilla, Liviu Panait, Keith Sullivan, and Gabriel Balan. MASON: A Multiagent Simulation Environment. SCSI Journal of Simulation, 81(7):517–527, July 2005. [102] Elizabeth Whitaker Lynch. Hardware Acceleration for Conservative Parallel Discrete Event Simulation on Multi-Core Systems. PhD thesis, School of Electrical and Computer Engineering, Georgia Institute of Technology, February 2011. [103] Mikola Lysenko and Roshan M. D'Souza. A Framework for Megascale Agent Based Model Simulations on Graphics Processing Units. JASSS Journal of Artificial Societies and Social Simulation, 11(4):10, October 2008. [104] Charles M. Macal and Michael J. North. Tutorial on Agent-Based Modeling and Simulation. Springer Journal of Simulation, 4(3):151–162, September 2010. [105] Deepak Majeti, Kuldeep S. Meel, Rajkishore Barik, and Vivek Sarkar. Automatic Data Layout Generation and Kernel Mapping for CPU+GPU Architectures. In Proceedings of the Interna- tional Conference on Compiler Construction (CC '16), pages 240–250, Barcelona, Spain, March 2016. ACM. [106] Fabien Michel. Translating Agent Perception Computations Into Environmental Processes in Multi-Agent-Based Simulations: A Means for Integrating Graphics Processing Unit Program- ming Within Usual Agent-Based Simulation Platforms. Wiley Online Library Journal of Sys- tems Research and Behavioral Science, 30(6):703–715, November 2013. [107] Sparsh Mittal and Jeffrey S. Vetter. A Survey of CPU-GPU Heterogeneous Computing Tech- niques. ACM Computing Surveys, 47(4):69:1–69:35, July 2015. [108] Josh Model and Martin C. Herbordt. Discrete Event Simulation of Molecular Dynamics With Configurable Logic. In Proceedings of the International Conference on Field Programmable Logic and Applications (FPL '07), pages 151–158, Amsterdam, Netherlands, August 2007. IEEE. [109] Kai Nagel and Marcus Rickert. Parallel Implementation of the TRANSIMS Micro-Simulation. Elsevier Journal of Parallel Computing, 27(12):1611–1639, November 2001. [110] Razvan Nane, Vlad-Mihai Sima, Christian Pilato, Jongsok Choi, Blair Fort, Andrew Canis, Yu Ting Chen, Hsuan Hsiao, Stephen Brown, Fabrizio Ferrandi, Jason Anderson, and Koen Bertels. A Survey and Evaluation of FPGA High-Level Synthesis Tools. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 35(10):1591–1604, October 2016. [111] Roland Neumann and Fritz Strack. 'Mood Contagion": The Automatic Transfer of Mood Between Persons. American Psychological Association Journal of Personality and Social Psy- chology, 79(2):211, August 2000. [112] Michael J. North and Charles M. Macal. Managing Business Complexity: Discovering Strategic Solutions With Agent-Based Modeling and Simulation. Oxford University Press, 2007. [113] NVIDIA Corporation. CUDA Toolkit 4.2 – CUBLAS Library. Technical Report PG-05326- 041_v01, Santa Clara, CA, USA, February 2012. [114] NVIDIA Corporation. Whitepaper – NVIDIA GeForce GTX 1080 – Gaming Perfected, 2016. [115] NVIDIA Corporation. Whitepaper – NVIDIA Tesla P100 – The Most Advanced Datacenter Accelerator Ever Built Featuring Pascal GP100, the World's Fastest GPU. Technical Report WP-08019-001_v01.1, 2016. 32 [116] NVIDIA Corporation. NVIDIA TESLA V100 GPU Architecture – The World's Most Advanced Data Center GPU. Technical Report WP-08608-001_v1.1, 2017. [117] NVIDIA Corporation. NVIDIA CUDA C Programming Guide. Version 9.1.85, NVIDIA Cor- poration, 2018. [118] Christopher Oat, Joshua Barczak, and Jeremy Shopf. Efficient Spatial Binning on the GPU. Technical report, Advanced Micro Devices, Inc, February 2009. [119] Andreas Olofsson. Epiphany-V: A 1024 processor 64-bit RISC System-On-Chip. October 2016. [120] OpenACC Working Group. The OpenACC Application Programming Interface. Technical Report Version 2.5, October 2015. [121] Samir Palnitkar. Verilog R(cid:13)Hdl: A Guide to Digital Design and Synthesis, Second Edition. Prentice Hall Press, 2003. [122] Hyungwook Park and Paul A. Fishwick. A Fast Hybrid Time-Synchronous/Event Approach In Proceedings of the Winter to Parallel Discrete Event Simulation of Queuing Networks. Simulation Conference (WSC '08), pages 795–803, Miami, FL, USA, December 2008. IEEE. [123] Hyungwook Park and Paul A. Fishwick. A GPU-Based Application Framework Supporting Fast Discrete-Event Simulation. SCSI Simulation, 86(10):613–628, October 2010. [124] Hyungwook Park and Paul A. Fishwick. An Analysis of Queuing Network Simulation Using GPU-Based Hardware Acceleration. ACM Transactions on Modeling and Computer Simulation, 21(3):18:1–18:22, March 2011. [125] Roman Pavlov and Jörg P. Müller. Multi-Agent Systems Meet GPU: Deploying Agent-Based Architectures on Graphics Processors. In Proceedings of the Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS '13), pages 115–122, Costa de Caparica, Portugal, April 2013. Springer. [126] Kalyan S. Perumalla. Discrete-Event Execution Alternatives on General Purpose Graphical Processing Units (GPGPUs). In Proceedings of the Workshop on Principles of Advanced and Distributed Simulation (PADS '06), pages 74–81, Singapore, May 2006. IEEE. [127] Kalyan S. Perumalla. Efficient Execution on GPUs of Field-Based Vehicular Mobility Models. In Proceedings of the Workshop on Principles of Advanced and Distributed Simulation (PADS '08), pages 154–154, Roma, Italy, June 2008. IEEE. [128] Kalyan S. Perumalla and Brandon G. Aaby. Data Parallel Execution Challenges and Run- In Proceedings of the Spring Simulation time Performance of Agent Simulations on GPUs. Multiconference (SpringSim '08), pages 116–123, Ottawa, Canada, April 2008. SCSI. [129] Kalyan S. Perumalla, Brandon G. Aaby, Srikanth B. Yoginath, and Sudip K. Seal. GPU-Based Real-Time Execution of Vehicular Mobility Models in Large-Scale Road Network Scenarios. In Proceedings of the ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS '09), pages 95–103, Lake Placid, NY, USA, June 2009. IEEE. [130] Louis-Noël Pouchet. Polybench: the Polyhedral Benchmark suite. http://web.cs.ucla.edu/ ~pouchet/software/polybench/, 2012. [131] Sebastian Raase and Tomas Nordstrm. On the Use of a Many-Core Processor for Computational Fluid Dynamics Simulations. pages 1403–1412, Reykjavík, Iceland, June 2015. Elsevier. [132] Shafiur Rahman, Nael Abu-Ghazaleh, and Walid Najjar. PDES-A: A Parallel Discrete Event Simulation Accelerator for FPGAs. In Proceedings of the ACM SIGSIM Conference on Princi- ples of Advanced Discrete Simulation (PADS '17), pages 133–144, Singapore, May 2017. ACM. [133] Ashu Rege. An Introduction to Modern GPU Architecture, 2008. 33 [134] Paul F. Reynolds, Carmen M. Pancerella, and Sudhir Srinivasan. Design and Performance Anal- ysis of Hardware Support for Parallel Simulations. Elsevier Journal of Parallel and Distributed Computing, 18(4):435–453, August 1993. [135] Paul Richmond, Simon Coakley, and Daniela Romano. Cellular Level Agent Based Modelling on the Graphics Processing Unit. In Proceedings of the International Workshop on High Perfor- mance Computational Systems Biology (HIBI '09), pages 43–50, Trento, Italy, October 2009. IEEE. [136] Paul Richmond and Daniela Romano. Agent Based GPU, a Real-time 3D Simulation and Interactive Visualisation Framework for Massive Agent Based Modelling on the GPU. In Pro- ceedings of the International Workshop on Supervisualisation (IWSV '08), Island of Kos, Aegean Sea,Greece, June 2008. [137] Paul Richmond and Daniela Romano. Template-Driven Agent-Based Modeling and Simula- tion With CUDA. Elsevier GPU Computing Gems Emerald Edition, Applications of GPU Computing Series, pages 313–324, February 2011. [138] Patrick F. Riley and George F. Riley. Next Generation Modeling III-Agents: Spades-a Dis- tributed Agent Simulation Environment With Software-in-the-Loop Execution. In Proceedings of the Conference on Winter Simulation (WSC '03), pages 817–825, New Orleans, LA, USA, December 2003. IEEE. [139] Robert Rönngren and Rassul Ayani. A Comparative Study of Parallel and Sequential Priority Queue Algorithms. ACM Transactions on Modeling and Computer Simulation, 7(2):157–209, April 1997. [140] Janche Sang, Che-Rung Lee, Vernon Rego, and Chung-Ta King. A Fast Implementation of Parallel Discrete-Event Simulation on GPGPU. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA '13), page 501, Las Vegas, NV, US, July 2013. [141] Thomas C. Schelling. Micromotives and Macrobehavior. WW Norton & Company, 2006. [142] Moon Gi Seok and Tag Gon Kim. Parallel Discrete Event Simulation for DEVS Cellular Models Using a GPU. In Proceedings of the Symposium on High Performance Computing (HPC '12), pages 11:1–11:7, Orlando, FL, USA, March 2012. SCSI. [143] Zhen Shen, Kai Wang, and Fenghua Zhu. Agent-Based Traffic Simulation and Traffic Signal Timing Optimization With GPU. In Proceedings of the International IEEE Conference on Intelligent Transportation Systems (ITSC '11), pages 145–150, Washington, DC, USA, October 2011. IEEE. [144] Xuan Shi and Fei Ye. Kriging Interpolation Over Heterogeneous Computer Architectures and Systems. Taylor & Francis Journal of GIScience & Remote Sensing, 50(2):196–211, 2013. [145] Jaewoong Sim, Aniruddha Dasgupta, Hyesoon Kim, and Richard Vuduc. A Performance Anal- ysis Framework for Identifying Potential Benefits in GPGPU Applications. In Proceedings of the ACM SIGPLAN symposium on Principles and Practice of Parallel Programming (PPoPP '12), pages 11–22, New Orleans, LA, USA, February 2012. ACM. [146] Daniel Dominic Sleator and Robert Endre Tarjan. Self-Adjusting Binary Search Trees. Journal of the ACM, 32(3):652–686, July 1985. [147] Avinash Sodani, Roger Gramunt, Jesus Corbal, Ho-Seop Kim, Krishna Vinod, Sundaram Chinthamani, Steven Hutsell, Rajat Agarwal, and Yen-Chen Liu. Knights Landing: Second- Generation Intel Xeon Phi Product. IEEE Micro, 36(2):34–46, April 2016. [148] Xiao Song, Ziping Xie, Yan Xu, Gary Tan, Wenjie Tang, Jing Bi, and Xiaosong Li. Support- ing Real-World Network-Oriented Mesoscopic Traffic Simulation on GPU. Elsevier Journal of Simulation Modelling Practice and Theory, 74:46–63, May 2017. 34 [149] Russell K. Standish and Richard Leow. EcoLab: Agent based modeling for C++ programmers. January 2004. [150] John E. Stone, David Gohara, and Guochun Shi. OpenCL: A Parallel Programming Standard for Heterogeneous Computing Systems. IEEE Computing in Science & Engineering, 12(3):66– 73, May 2010. [151] David Strippgen and Kai Nagel. Using Common Graphics Hardware for Multi-Agent Traffic Simulation With CUDA. In Proceedings of the International Conference on Simulation Tools and Techniques (Simutools '09), pages 62:1–62:8, Rome, Italy, March 2009. ICST. [152] Herb Sutter. The Free Lunch Is Over: A Fundamental Turn Toward Concurrency in Software. Dr. Dobb's Journal, 30(3):202–210, March 2005. [153] Brian Paul Swenson. Techniques to Improve the Performance of Large-Scale Discrete-Event Simulation. Dissertation, Georgia Institute of Technology, May 2015. [154] G. Szemes, L. Gulyás, G. Kampis, and W. de Back. GridABM-templates for Distributed Agent Based Simulation. In Open Grid Forum, volume 28, Munich , Germany, 2010. [155] Wenjie Tang and Yiping Yao. A GPU-Based Discrete Event Simulation Kernel. SCSI Journal of Simulation, 89(11):1335–1354, October 2013. [156] Kardi Teknomo, Yasushi Takeyama, and Hajime Inamura. Review on Microscopic Pedestrian Simulation Model. September 2016. [157] Leigh Tesfatsion. Agent-Based Computational Economics: A Constructive Approach to Eco- nomic Theory. Elsevier Handbook of Computational Economics, 2:831–880, May 2006. [158] Y. Torres, A. Gonzalez-Escribano, and D.R. Llanos. Understanding the Impact of CUDA Tuning In Proceedings of the International Conference on High Performance Techniques for Fermi. Computing and Simulation (HPCS '11), pages 631–639, Istanbul, Turkey, July 2011. IEEE. [159] Justin L. Tripp, Henning S. Mortveit, Anders A. Hansson, and Maya Gokhale. Metropolitan Road Traffic Simulation on FPGAs. In Proceedings of the Annual IEEE Symposium on Field- Programmable Custom Computing Machines (FCCM '05), pages 117–126, Napa, CA, USA, April 2005. IEEE. [160] Mario Vestias and Horácio Neto. TRENDS OF CPU, GPU AND FPGA FOR HIGH- PERFORMANCE COMPUTING. In Proceedings of the International Conference on Field Programmable Logic and Applications (FPL '14), pages 1–6, Munich, Germany, September 2014. IEEE. [161] Guillermo Vigueras, Juan M. Orduña, Miguel Lozano, José M. Cecilia, and José M. García. Ac- celerating Collision Detection for Large-Scale Crowd Simulation on Multi-Core and Many-Core Architectures. Sage Publications The International Journal of High Performance Computing Applications, 28(1):33–49, February 2014. [162] Ioannis Vourkas and Georgios Ch. Sirakoulis. FPGA Based Cellular Automata for Environ- mental Modeling. In Proceedings of the International Conference on Electronics, Circuits and Systems (ICECS '12), pages 93–96, Seville, Spain, December 2012. IEEE. [163] Jin Wang, Norman Rubin, Haicheng Wu, and Sudhakar Yalamanchili. Accelerating Simulation of Agent-Based Models on Heterogeneous Architectures. In Proceedings of the Workshop on General Purpose Processor Using Graphics Processing Units (GPGPU '06), pages 108–119, Houston, TX, USA, March 2013. ACM. [164] Kai Wang and Zhen Shen. A GPU Based Trafficparallel Simulation Module of Artificial Trans- portation Systems. In Proceedings of the IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI '12), pages 160–165, Suzhou, China, July 2012. IEEE. 35 [165] Yuan Wen, Zheng Wang, and Michael F.P. O'Boyle. Smart Multi-Task Scheduling for OpenCL Programs on CPU/GPU Heterogeneous Platforms. In Proceedings of the International Confer- ence on High Performance Computing (HiPC '14), pages 1–10, Dona Paula, India, December 2014. IEEE. [166] Tang Wenjie, Yao Yiping, and Zhu Feng. An Expansion-Aided Synchronous Conservative Time Management Algorithm on GPU. In Proceedings of the ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS '13), pages 367–372, Montreal, Canada, May 2013. ACM. [167] Barry Williams, Dmitry Ponomarev, Nael Abu-Ghazaleh, and Philip Wilsey. Performance Characterization of Parallel Discrete Event Simulation on Knights Landing Processor. In Pro- ceedings of the ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS '17), pages 121–132, Singapore, Singapore, May 2017. ACM. [168] Wąs, Jarosław and Mróz, Hubert and Topa, Paweł. GPGPU Computing for Microscopic Simulations of Crowd Dynamics. Slovak Academy of Sciences Computing and Informatics, 34(6):1418–1434, February 2016. [169] Fulong Wu. Calibration of Stochastic Cellular Automata: The Application to Rural-Urban Land Conversions. Taylor & Francis International Journal of Geographical Information Science, 16(8):795–818, 2002. [170] Xilinx. XilinxVirtex UltraScale+ Product Table. https://www.xilinx.com/products/ silicon-devices/fpga/virtex-ultrascale-plus.html#productTable, December 2017. [171] Yadong Xu, Wentong Cai, David Eckhoff, Suraj Nair, and Alois Knoll. A Graph Partition- ing Algorithm for Parallel Agent-Based Road Traffic Simulation. In Proceedings of the ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS '17), pages 209–219, Singapore, May 2017. ACM. [172] Yan Xu, Gary Tan, Xiaosong Li, and Xiao Song. Mesoscopic traffic simulation on CPU/GPU. In Proceedings of the ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS '14), pages 39–50, Denver, CO, USA, May 2014. ACM. [173] Yonghong Yan, Max Grossman, and Vivek Sarkar. JCUDA: A Programmer-Friendly Inter- face for Accelerating Java Programs With CUDA. In Proceedings of the European Conference on Parallel Processing (Euro-Par '09), pages 887–899, Delft, The Netherlands, August 2009. Springer. [174] Mingyu Yang, Philipp Andelfinger, Wentong Cai, and Alois Knoll. Evaluation of Conflict Resolution Methods for Agent-Based Simulation on the GPU. In Proceedings of the ACM SIGSIM Conference on Principles of Advanced Discrete Simulation (PADS '18), pages 129– 132, Rome, Italy, May 2018. ACM. [175] Srikanth B. Yoginath and Kalyan S. Perumalla. Scalable Cloning on Large-Scale GPU Platforms With Application to Time-Stepped Simulations on Grids. ACM Transactions on Modeling and Computer Simulation, 28(1):5:11–5:26, January 2018. [176] Feng Zhang, Jidong Zhai, Bingsheng He, Shuhao Zhang, and Wenguang Chen. Understanding Co-Running Behaviors on Integrated CPU/GPU Architectures. IEEE Transactions on Parallel and Distributed Systems, 28(3):905–918, March 2017. [177] Tao Zhang, Xin Zhao, Xinqi An, Haojun Quan, and Zhichun Lei. Using Blind Optimization Algorithm for Hardware/Software Partitioning. IEEE Access, 5:1353–1362, February 2017. [178] Yao Zhang and John D Owens. A Quantitative Performance Analysis Model for GPU Ar- chitectures. In Proceedings of the 2011 IEEE International Symposium on High Performance Computer Architecture (HPCA '11), pages 382–393, San Antonio, TX, USA, February 2011. IEEE. 36 [179] Li Zhen, Qiuxiao Gang, Guo Gang, and Chen Bin. A GPU-Based Simulation Kernel within IACSIT Press Heterogeneous Collaborative Computation on Large-Scale Artificial Society. International Journal of Modeling and Optimization, 4(3):205–210, Jun 2014. [180] Hamid Reza Zohouri, Naoya Maruyama, Aaron Smith, Motohiko Matsuda, and Satoshi Mat- suoka. Evaluating and Optimizing OpenCL Kernels for High Performance Computing With FPGAs. In Proceedings of the International Conference for High Performance Computing, Net- working, Storage and Analysis (SC '16), pages 35:1–35:12, Salt Lake City, UT, USA, November 2016. IEEE. [181] Peng Zou, Ya-shuai Lü, Li-li Chen, and Yi-ping Yao. Epidemic Simulation of Large-Scale Social Contact Network on GPU Clusters. Sage Publications Journal of Simulation, 89(10):1154–1172, 2013. 37
1606.07525
1
1606
2016-06-24T00:32:41
Relating Knowledge and Coordinated Action: The Knowledge of Preconditions Principle
[ "cs.MA", "cs.AI", "cs.DC", "cs.LO" ]
The Knowledge of Preconditions principle (KoP) is proposed as a widely applicable connection between knowledge and action in multi-agent systems. Roughly speaking, it asserts that if some condition is a necessary condition for performing a given action A, then knowing that this condition holds is also a necessary condition for performing A. Since the specifications of tasks often involve necessary conditions for actions, the KoP principle shows that such specifications induce knowledge preconditions for the actions. Distributed protocols or multi-agent plans that satisfy the specifications must ensure that this knowledge be attained, and that it is detected by the agents as a condition for action. The knowledge of preconditions principle is formalised in the runs and systems framework, and is proven to hold in a wide class of settings. Well-known connections between knowledge and coordinated action are extended and shown to derive directly from the KoP principle: a "common knowledge of preconditions" principle is established showing that common knowledge is a necessary condition for performing simultaneous actions, and a "nested knowledge of preconditions" principle is proven, showing that coordinating actions to be performed in linear temporal order requires a corresponding form of nested knowledge.
cs.MA
cs
Relating Knowledge and Coordinated Action: The Knowledge of Preconditions Principle Yoram Moses∗ Technion -- Israel Institute of Technology [email protected] The Knowledge of Preconditions principle (KoP) is proposed as a widely applicable connection between knowledge and action in multi-agent systems. Roughly speaking, it asserts that if some condition ϕ is a necessary condition for performing a given action α, then knowing ϕ is also a neces- sary condition for performing α. Since the specifications of tasks often involve necessary conditions for actions, the KoP principle shows that such specifications induce knowledge preconditions for the actions. Distributed protocols or multi-agent plans that satisfy the specifications must ensure that this knowledge be attained, and that it is detected by the agents as a condition for action. The knowledge of preconditions principle is formalised in the runs and systems framework, and is proven to hold in a wide class of settings. Well-known connections between knowledge and coordinated action are extended and shown to derive directly from the KoP principle: a common knowledge of preconditions principle is established showing that common knowledge is a necessary condition for performing simultaneous actions, and a nested knowledge of preconditions principle is proven, showing that coordinating actions to be performed in linear temporal order requires a corresponding form of nested knowledge. Keywords: Knowledge, multi-agent systems, common knowledge, nested knowledge, coordinated action, knowledge of preconditions principle. 1 Introduction While epistemology, the study of knowledge, has been a topic of interest in philosophical circles for cen- turies and perhaps even millennia, in the last half century it has seen a flurry of activity and applications in other fields such as AI [19], game theory [2] and distributed computing [13]. At least in the latter two fields a particular, information-based, notion of knowledge plays a prominent and useful role. This paper proposes an essential connection between knowledge and action in such a setting. Using doesi(α) to denote "Agent i is performing action α" and Kiϕ to denote that Agent i knows the fact ϕ, the connection can intuitively be formulated as follows: The KNOWLEDGE OF PRECONDITIONS Principle (KoP): ϕ is a necessary condition for doesi(α) If then Kiϕ is a necessary condition for doesi(α) This statement appears deceptively simple. In fact, many successful applications of knowledge to the design and analysis of distributed protocols over the last three decades are rooted in the KoP. Moreover, some of the deeper insights obtained by knowledge theory in this field can be derived in a fairly direct ∗The Israel Pollak academic chair at Technion. This work was supported in part by ISF grant 1520/11. R. Ramanujam (Ed.): TARK 2015 EPTCS 215, 2016, pp. 231 -- 245, doi:10.4204/EPTCS.215.17 c(cid:13) Yoram Moses This work is licensed under the Creative Commons Attribution License. 232 The Knowledge of Preconditions Principle Figure 1: A simple four-agent system fashion from the KoP. We will argue and demonstrate that this principle lies at the heart of coordination in many distributed and multi-agent systems. This paper is structured as follows. Section 1.1 illustrates the central role of knowledge in a natural distributed systems application. Section 1.2 provides a high-level discussion of the knowledge of pre- conditions principle and its connection to coordinating actions. In Section 2 we review and discuss the modelling of knowledge in the runs and systems model of distributed systems based on [10]. A formal statement and proof of the KoP are presented in Section 3. Then, in Section 4, the KoP is used to es- tablish a common knowledge of preconditions principle. It states that in order to perform simultaneously coordinated actions, agents must first attain common knowledge of any of the actions' preconditions. An example of its use is provided in Section 4.1. Section 5 present an additional use of the KoP, and shows that coordinating a sequence of actions to occur in a prescribed temporal order requires attaining nested knowledge of their preconditions. Finally, Section 6 discusses additional applications, extensions and future directions. 1.1 The Case for Knowledge in Distributed Systems Why should knowledge play a central role in distributed computing? As pointed out in [13], most every- one who designs or even just tries to study the workings of a distributed protocol is quickly found talking in terms of knowledge, making statements such as "once the process receives an acknowledgement, it knows that the other process is ready. . . ". An essential aspect of distributed systems is the fact that an agent chooses which action to perform based on the local information available to it, which typically provides only a partial view of the overall state of the system. To get a sense of the role of knowledge in distributed systems, consider the following example. Example 1. Given is a distributed network modeled by a graph, with agents located at the nodes, and the edges standing for communication channels (see Figure 1). In the problem we shall call Computing the Max (or CTM for short), each agent i starts out with a natural number vi ∈ N as an initial value. The goal is to have Agent 1 print the maximum of all of the initial values (we denote this value by Max), and print nothing else. In the instance depicted in Figure 1, the maximal value happens to be 100. Initially, Agent 1 clearly can't print its own initial value of 75. Suppose that Agent 1 receives a message µ (cid:44) "v2 = 100" from Agent 2 reporting that its value is 100. At this point, Agent 1 has access to the maximum, and printing 100 would satisfy the problem specification. Compare this with a setting that is the same in all respects, except that Agent 3's value is v3 = 150. In this case, of course, Max (cid:54)= 100 and so printing 100 is forbidden. But if Agent 1 can receive the same message µ under similar circumstances in both scenarios, 7510080100 Yoram Moses 233 then it is unable to distinguish whether or not Max = 100 upon receiving µ. Intuitively, even in the first scenario, the agent does not know that Max = 100. What information does Agent 1 need, then, in order to be able to print the maximum? Notice that it is not necessary, in general, to collect all of the initial values in order to print the maximum. For example, suppose that the agents follow a bottom-up protocol in which values are sent from right to left, starting from Agent 4, and every agent passes to the left the larger of its own value and the value it received from its neighbor on the right (if such a neighbor exists). In this protocol, Agent 1 can clearly print the maximum after receiving the message "v2 = 100", and seeing just one value besides its own. Interestingly, even collecting all of the values is not a sufficient condition for printing the Max. Imagine a setting in which the network is as in Figure 1, but Agent 1 considers it possible that there are more than four nodes in the network. In this case, even if Agent 1 receives all (four) values, it may still need to wait (cid:3) for proof that there is no additional, larger, value in the system. CTM is a simplified example in the spirit of many distributed systems applications. In fact, a central problem called Leader Election, for example, is often solved by computing a node with maximal ID [1, 17]. The solution to such a problem is typically in the form of a set of short computer programs (jointly constituting a distributed protocol), each executed at one of the nodes. When the nodes follow such a protocol, the resulting execution should satisfy the problem specification. Of course, the programs are written in a standard programming language, without any reference to knowledge or possibility. In the vast majority of cases, the programs in question do not enumerate and/or explore possible states or scenarios. Indeed, the program designer is typically unfamiliar with formal notions of knowledge. This being the case, what sense does it make to talk of Agent 1 in Example 1 "knowing" or "not knowing" that Max = c? Can it make sense to say that the Agent "considers it possible that there may be more than four nodes in the system"? After all, we may be talking about a 10-line program. It has no soul. Does it have thoughts, doubts and mental states? Since agents act based on their local information, a protocol designer must ensure that agents ob- tain the necessary information for a given task, and that this information is applied correctly. Using the information-based notion of knowledge, the designer can ascribe knowledge to an agent without requir- ing it to have a soul, feelings, and self-awareness. As seen in the CTM example, it is natural to think in terms of whether or not Agent 1 knows Max = c at any given point in a run of a protocol solving CTM. (A formal definition of knowledge will be provided in Section 2.) Suppose that a protocol is designed to solve CTM in networks that may have a variety of sizes. If Agent 1 does not start out with local information ensuring that there are no more than four nodes in the system, then from the point of view of an outside observer the agent can be thought of as "considering it possible" that there may be more than four nodes. Even in a simple network as in Figure 1, the CTM problem can be posed in different models, which can differ in essential aspects. A solution to CTM in one model might not solve the problem in another model. Indeed, the rationale behind distinct solutions, as well as their details, may vary considerably. Are there common features shared by all solutions to CTM? Interestingly, all solutions to CTM, in all models, share one property: Agent 1 must know that Max = c in order to print the value c. Indeed, the ability to print the answer in a protocol for CTM reduces to detecting when the Max value is known. Of course, once Agent 1 knows that Max = c it can safely print c. Hence, knowing that Max = c is not just necessary, but also a sufficient condition for printing c. The CTM problem shows that knowledge and attaining knowledge can be a central and crucial aspect of a standard distributed application. The need to know Max = c in solving CTM suggests that we consider a natural question: When does Agent 1 know that Max = c? The answer is less straightforward than we might initially expect. 234 The Knowledge of Preconditions Principle What is known depends in a crucial way on the protocol that the agents are following. Thus, in the setting of Example 1, if the agents follow the bottom-up protocol, then Agent 1 knows the maximum once it receives a single message from Agent 2. Knowledge is also significantly affected by features of the model. In CTM, if there is an upper bound (say 100) on the possible initial values, then an agent that sees this value knows the maximum. Knowledge about the network topology and properties of communication play a role as well. For example, consider a model in which Agent 1 has a clock, and a single clock cycle suffices for a message to be delivered, digested, and acted upon. Suppose that the protocol is such that all agents start simultaneously at time 0 and an agent forwards a value towards Agent 1 only if this value is larger than any value it has previously sent. Then in the network of Figure 1 Agent 1 will receive a message with value 100 from Agent 2 at time 1, and no further messages. If Agent 1 knows that the diameter of the network is 3, it will not know the maximum upon receiving this message. However, without receiving any further messages, at time 3 Agent 1 will know that the maximum is 100; no larger value can be lurking in the system. 1.2 KoP and Coordination The fact that Max = c is a necessary condition for printing c is an essential feature of the CTM problem. We have argued that, in fact, K1(Max = c) is also a necessary condition for printing c, as the KoP would suggest. But this is just one instance. Let us briefly consider another example. Example 2. Consider a bank whose ATMs are designed in such a way that an ATM will dispense cash only to a customer whose account shows a sufficiently large positive balance. Along comes Alice, who has a large positive balance, and tries to obtain a modest sum from the ATM. On this day, however, the ATM is unable to communicate with the rest of the bank and it declines to pay Alice. Thus, despite the fact that Alice has good credit, the ATM frustrates her and denies her request. Apparently, given its specification, the ATM has no choice. Intuitively, in order to satisfy the credit restriction, the ATM needs to know that a customer has good credit before dispensing cash. If the ATM may pay a customer that is not known to have good credit, there will be possible scenarios in which the ATM will violate its specification, and pay a customer that does not have credit. Notice, however, that the specification said nothing about the ATM's knowledge. It only imposed a restriction on the ATM's action, based on the (cid:3) state of Alice's account. Both the CTM problem and the ATM example are instances in which the KoP clearly applies. The intuitive argument for why the KoP should apply very broadly is straightforward. If ϕ is a necessary condition for performing α, and agent i ever performs α without knowing ϕ, then there should be a possible scenario that is indistinguishable to agent i, in which ϕ does not hold. Since the two scenarios are indistinguishable, the agent can perform α in the second scenario, and violate the requirement that ϕ is a necessary condition. A formal statement and proof requires a definition of necessary conditions, knowledge, as well as capturing a sense in which an action at one point implies the same action at any other, indistinguishable, point. This will be done in Section 3. Most tasks in distributed systems are described by way of a specification. Such specifications typ- ically impose a variety of necessary conditions for actions. The KoP implies that even though such specifications often do not explicitly discuss the agents' knowledge, they do in fact impose knowledge preconditions. Observe that the KoP applies to a task regardless of the means that are used to implement it. Any engineer implementing a particular task will have to ensure that preconditions are known when actions are taken. This is true whether or not the engineer reasons explicitly in terms of knowledge, and it is true even if the engineer is not even aware of the knowledge terminology. (Normally, neither may be Yoram Moses 235 the case, of course.) The need to satisfy the KoP suggests that the design of distributed implementations must involve at least two steps. One is to make sure that the required knowledge is made available to an agent who needs to performed a prescribed action, and the other is ensuring that the agent detect that it knows the required preconditions. This is quite different from common practice in engineering distributed implementations [28]. We remark that the KoP can be expected to hold in a variety of multi-agent settings well beyond the realm of distributed systems. Thus, for example, suppose that a jellyfish is naturally designed so that it will never sting its own flesh. By the KoP, the cell activating the sting at a given point needs to know that it is not stinging the jellyfish's body when it "fires" its sting. The jellyfish is thus designed with some form of a "friend or foe" mechanism that is used in the course of activating the sting. Various biological activities can similarly be considered in light of the KoP: How does the organism know that certain preconditions are met? Our last example will come from the social science arena. Suppose that a society designs a legal system, that is required to satisfy the constraint that only people who are guilty of a particular crime are ever put in jail for committing this crime. By the KoP, the judge (or jury) must know that the person committed this crime in order to send him to jail. As discussed above, specifications impose preconditions. Typically, these conditions relate an action to facts about the world (e.g., the maximal value, or the customer's good credit). In many cases, however, actions of different agents need to be coordinated. Consider a variant of CTM in which in addition to Agent 1 printing the maximum, Agent 4 needs to perform an action (say print the same value or print the minimal value), but not before Agent 1 does. Then Agent 1 performing her action is a condition for 4's action. In particular, Agent 4 would need to know that Agent 1 has already come to know Max = c for some c before 4 acts. In some cases, the identity of actions performed needs to be coordinated. For a final example, suppose that Alice should perform an action αA only if Bob performs an ac- tion αB at least 5 time steps earlier. Then she needs to know that Bob acted at least 5 steps before when she acts. Indeed, if ψ is a necessary condition for αB, then Alice must know that "Bob knew ψ at least 5 time steps ago" when she acts, since knowing ψ is a necessary condition for Bob's performing αB (see [4, 5]). As these examples illustrate, given KoP, coordination can give rise to nested knowledge. Simple instances of the KoP are often quite straightforward. Ensuring and detecting K1(Max = c) is often fairly intuitive, and it not justify the overhead involved in developing a theory of knowledge for multi-agent systems. However, satisfying statements involving nested knowledge in particular models of computation can quickly become nontrivial. For this, it is best to have a clear mathematical model of knowledge in multi-agent systems. The next section reviews the runs and systems model. 2 Modeling Knowledge Using Runs and Systems We now review the runs and systems model of knowledge of [10, 13]. The interested reader should consult [10] for more details. A global state is an "instantaneous snapshot" of the system at a given time. Let G denote a set of global states. Time will be identified with the natural numbers N = {0,1,2, . . .} for ease of exposition. A run is a function r: N → G associating a global state with each instant of time. Thus, r(0) is the run's initial state, r(1) is the next global state, and so on. A system is a set R of runs. The same global state can appear in different runs, and in some systems may even appear more than once in the same run. A central notion in our framework is that of an agent's local state, whose role is to capture the agent's local information at a given point. The precise details of the local state depend on the application. It could be the complete contents of an agent's memory at the given instant, or the complete sequence of events 236 The Knowledge of Preconditions Principle that it has observed so far. for example. The rule of thumb is that the local state should consist of the local information that the agent may use when deciding which actions to take. Thus, for example, if agents are finite-state machines, it is often natural to identify an agent's local state with the automaton state that it is in. Formally, we assume that every global state determines a unique local state for each agent. We denote agent i's local state in the global state r(t) by ri(t). Moreover, a global state with n agents A = {1, . . . ,n} will have the form r(t) = (cid:104)re(t),r1(t), . . . ,rn(t)(cid:105), where re(t) is called the local state of the environment, and will serve to represent all aspects of the global state that are not included in the agents' local states. For example, it could represent messages in transit, the current topology of the network including what links may be down, etc. 2.1 Syntax and Semantics We are interested in a propositional logic of knowledge, in which propositional facts and epistemic facts can be expressed. Facts will be considered to be true or false at a point (r,t), with respect to a system R. More formally, given a set Φ of primitive propositions and a set P ={1, . . . ,n} of the agents in the system, n (Φ) by closing Φ under negation '¬' and conjunction '∧', as well we define a propositional language L K as under knowledge operators Ki for all i ∈ P (see [14]). Thus, for example, if p,q ∈ Φ are primitive propositions and i, j ∈ P are agents, then ¬Ki p∧ KjKi¬Kjq is a formula in L K n (Φ). We typically omit the set Φ and call L K n the language for knowledge with n agents. In a multi-agent system facts about the world, as well as the knowledge that agents have, can change dynamically from one time point to the next. We thus consider the truth of formulas of L K n at points of a system R, where a point is a pair (r,t) ∈ R×N, and it is used to refer to time t in the run r. We denote the set of points of a system R by Pts(R) (cid:44) R× N. Points will play the role of states of a Kripke structure. The set Φ of primitive propositions used in the analysis of any given multi-agent system R will depend on the application. Their truth at the points of the system needs to be explicitly defined. This is done by an interpretation π : Φ× Pts(R) → {T,F}, where π(cid:0)q, (r,t)(cid:1) = T means that the proposition q holds at (r,t). Formally, an interpreted system w.r.t. a set Φ of primitive propositions is a pair (R,π) consisting of the system R and interpretation π for Φ over Pts(R). Just as we typically omit explicit reference to Φ, we shall omit π as well, when this is unambiguous. We assume from here on that the environment's state re(t) in a global state r(t) contains a "history" component h that records all actions taken by all agents at times 0,1,. . . ,t − 1. Formally, we take h to be a set of triples (cid:104)α,i,t(cid:48)(cid:105), which grows monotonically in time. An action α is considered to be performed by i at the point (r,t) if and only if the triple (cid:104)α,i,t(cid:105), denoting that action α was performed by agent i at time t, appears in the history component h of re(t(cid:48)) for all times t(cid:48) > t.1 For the analysis in this paper, we will also assume that Φ includes propositions of the form doesi(α) and didi(α) for agents i ∈ P and actions α. With this assumption, what actions are performed at any given point (r,t) is uniquely determined by the run r. π(cid:0)doesi(α), (r,t)(cid:1) = T π(cid:0)didi(α), (r,t)(cid:1) = T We will consider interpretations π that, on these propositions, are defined by iff agent i performs α at (r,t) iff π(cid:0)doesi(α), (r,t(cid:48))(cid:1) = T holds for some t(cid:48) ≤ t We allow t(cid:48) = t in the definition of didi(α) for technical convenience; it simplifies our later analysis slightly. 1Our definition does not imply or assume that the actions are observed, observable or recorded by any of the agents. Whether that is the case depends on the application. Yoram Moses 237 Our model of knowledge will follow the standard Kripke-style possible worlds approach. The pos- sibility relations that we use are induced directly from the system R being analyzed; two points are considered indistinguishable to an agent if its local states at the two points are the same. More formally: Definition 2.1. If ri(t) = r(cid:48) i(t(cid:48)), then (r,t) and (r(cid:48),t(cid:48)) are called indistinguishable to i, denoted by (r,t) ≈i (r(cid:48),t(cid:48)). Formulae of L K n are interpreted at a point (r,t) of an interpreted system (R,π) by means of the satisfaction relation '=', which is defined inductively by: (R,r,t) = p iff (r,t) ∈ π(p); (R,r,t) = ¬ϕ iff (R,r,t) (cid:54)= ϕ; (R,r,t) = ϕ ∧ ψ iff both (R,r,t) = ϕ and (R,r,t) = ψ; (R,r,t) = Kiϕ iff (R,r(cid:48),t(cid:48)) = ϕ for all (r(cid:48),t(cid:48)) ∈ Pts(R) such that (r(cid:48),t(cid:48)) ≈i (r,t). We say that ϕ is valid in the system R, and write R = ϕ, if (R,r,t) = ϕ for all points (r,t) ∈ Pts(R). We say that ϕ validly implies ψ in R if ϕ ⇒ ψ is valid in R. Since, by Definition 2.1, the ≈i relations are equivalence relations, each knowledge operator Ki satisfies the S5 axiom system [14]. In particular, it satisfies the knowledge property (or Knowledge Axiom) that Kiϕ ⇒ ϕ is valid in all systems. It is instructive to relate our modeling using runs and systems to standard multi-agent Kripke struc- tures. For every system R there is a corresponding Kripke structure MR = (SR,π,∼1, . . . ,∼n) for n agents such that SR = Pts(R) and '∼i' = '≈i' for every i. They correspond in that (R,r,t) = ϕ iff MR, (r,t) = ϕ is guaranteed for all (r,t) ∈ Pts(R) = SR and ϕ ∈ L K n (Φ) (for details, see [10]). The system R will determine the space of possible runs and possible points, which play a crucial role in determining the truth of facts involving knowledge. For example, consider a run r in which Alice sends Bob a message at time 1, and Bob receives it at time 2. If R is a system in which messages may be lost, or may take longer than one time step to be delivered, then Alice would not know at time 2(cid:0)i.e., w.r.t. (R,r,2)(cid:1) that her message has been delivered, because there is another run r(cid:48) ∈ R that she cannot tell apart from r at time 2, in which her message is not (or not yet) delivered by that time. The same run r also belongs to another system R(cid:48) in which messages are always reliably delivered in exactly one round. With respect to (R(cid:48),r,2), however, Alice would know at time 2 that her message has been delivered. Our definition of knowledge is rather flexible and widely applicable. The set R of the possible runs immediately induces what the agents know. Observe that the definition of knowledge is completely external. It ascribes knowledge to agents in the system even if the protocol they follow, as well as the actions that they perform, do not involve the knowledge terminology in any way. Moreover, the agents do not need to be complex or sophisticated for the definition to apply. Indeed, in a model of a very simple system consisting of a bed lamp and its electric cable, a switch in the OFF state can be said to know that the lamp is not lit; what the same switch would know in the ON state would depend on the system R under consideration, which determines the runs considered possible. E.g., if R contains a run in which the lamp is burnt out, then in the ON state the switch would not know that the lamp is shining light. On the other hand, if the lamp can never burn out, and the cord, plug and switch are in proper working order in all runs of R, then in the ON state the switch would know that the lamp is shining light. As this example shows, knowledge under this definition does not require the "knower" to compute what it knows. Indeed, this definition of knowledge is not sensitive to the computational complexity of determining what is known. In most cases, of course, we will ascribe knowledge to agents or components that can perform actions, which is not the case in the light switch example. And agents might need to explicitly establish whether they know relevant facts. We now provide a statement and proof of the knowledge of preconditions principle KoP. 238 The Knowledge of Preconditions Principle 3 Formalizing the Knowledge of Preconditions Principle Intuitively, the KoP states that if a particular fact ψ is a necessary condition for an agent to perform an action α, then the agent must in fact know ψ in order to act. In other words, knowing ψ is also a necessary condition for performing the action. We formalize the claim and prove it as follows. We say that ψ is a necessary condition for doesi(α) in R if (R,r,t) = doesi(α) holds only if (R,r,t) = ψ, for all (r,t) ∈ Pts(R). Clearly, the customer's good credit is a necessary condition for the ATM dispensing cash. That is, suppose that a bank makes use of a correct implementation of an ATM protocol, which satisfies the credit requirement. Then, in the system R consisting of the set of all possible histories (runs) of the bank's (and the ATM's) transactions, good credit is a necessary condition for receiving cash from the ATM. It is often of interest to consider facts whose truth depends only on a given agent's loca state. Such, for example, may be the receipt of a message, or the observation of a signal, by the agent. Whether x = 0 for a local variable x, for example, would be a natural local fact. Moreover, if an agent has perfect recall, then any events that it has observed in the past will give rise to local facts. Finally, since knowledge is defined based on an agent's local state, then a fact of the form Kiϕ constitutes a local fact. Indeed, there is a simple way to define the local facts above using knowledge. Namely, we say that ϕ is i-local in R if R = (ϕ ⇒ Kiϕ). The formalism of [10] defines protocols as explicit objects, and defines contexts that describe the possible initial states and the model of computation. This provides a convenient and modular way of constructing systems. Namely, given a protocol P and a context γ, the system R = R(P,γ) is defined to be the set of all runs of protocol P in γ. The runs of this system embody all of the properties of the context, as they arise in runs of P. This includes, for example, any timing assumptions, possible values encountered, possible topologies of the network, etc. They also embody the relevant properties of the protocol, because in all runs considered possible the agents follow P. In this paper, we do not define protocols and contexts. Rather, we treat the KoP in a slightly simpler and more abstract setting. We say that an action α is a conscious action for i in R if i's local state completely determines whether i performs α. If its local state at two points (r,t) and (r(cid:48),t(cid:48)) of R is the same, then (R,r,t) = doesi(α) iff (R,r(cid:48),t(cid:48)) = doesi(α). Conscious actions are quite prevalent in many systems of interest. For example, suppose that agent i follows a deterministic protocol, so that its action at any given point is a function of its local state. If, in addition, agent i is allowed to move at every time step, then all of its actions are conscious actions. We remark that, since conscious actions depend on an agent's local state, then if α is conscious for i in R then (R,r,t) = doesi(α) holds iff (R,r,t) = Kidoesi(α) does, for all (r,t) ∈ Pts(R). We are now ready to prove a formal version of the KoP: Theorem 3.1 (The KoP Theorem). Let α be a conscious action for i in R. If ψ is a necessary condition for doesi(α) in R, then Kiψ is also a necessary condition for doesi(α) in R. Proof. We will show the contrapositive. Let α be a conscious action for i in R, and assume that Kiψ is not a necessary condition for doesi(α) in R. Namely, there exists a point (r,t) ∈ Pts(R) such that both (R,r,t) = doesi(α) and (R,r,t) (cid:54)= Kiψ. Given the latter, we have by the definition of '=' for Ki that there exists a point (r(cid:48),t(cid:48)) ∈ Pts(R) such that both (r(cid:48),t(cid:48)) ≈i (r,t) and (R,r(cid:48),t(cid:48)) (cid:54)= ψ. Since α is a conscious action for i in R and (R,r,t) = doesi(α) we have that (R,r,t) = Kidoesi(α). It follows from (r(cid:48),t(cid:48)) ≈i (r,t) by the definition of '=' for Ki that (R,r(cid:48),t(cid:48)) = doesi(α) holds. But since (R,r(cid:48),t(cid:48)) (cid:54)= ψ, we conclude that ψ is not a necessary condition for doesi(α) in R, establishing the countrapositive claim. Yoram Moses 239 Theorem 3.1 applies to all multi-agent systems. It immediately implies, for example, that a necessary condition for the ATM to dispense cash is Katm(good credit). The theorem is model independent; it does not depend on timing assumptions, on the topology of the system (even on whether agents commu- nicate by message passing or via reading and writing to registers in a shared memory), or on the nature of the activity that is carried out. For every necessary condition for a conscious action, knowing that the condition holds is also a necessary condition. 4 Coordinating Simultaneous Actions Recall that the language L K n contains formulas in which knowledge operators can be nested to arbitrary finite depth. It is sometimes useful to consider a state of knowledge called common knowledge that goes beyond any particular nested formula. Intuitively, a fact ψ is common knowledge if everyone knowing that everyone knows . . . , that everyone knows the fact ψ, to every finite depth. Common knowledge has a number of equivalent definitions, one of which is as follows: Definition 4.1 (Common Knowledge). Fix a set of agents G and a fact ψ. We denote by CGψ the fact that ψ is common knowledge to G. Its truth at points of a system R is defined by: (R,r,t) = Ki1Ki2 ···Kimψ holds for all (cid:104)i1,i2, . . . ,im(cid:105) ∈ Gm and all m ≥ 1. (R,r,t) = CGψ iff Common knowledge, a term coined by Lewis in [18], plays an important role in the analysis of games [2], distributed systems [13], and many other multi-agent settings. Clearly, common knowledge is much stronger than "plain" knowledge. Indeed, CGψ validly implies Kjψ, for all agents j ∈ G. Since common knowledge requires infinitely many facts to hold, it is not a priori obvious that CGϕ can be attained at a reasonable cost, or even whether it can ever be attained at all, in settings of interest (see [7, 10, 13]). We will now show that there are natural applications for which attaining common knowledge is essential. Intuitively, distinct actions are simultaneous in R if they can only be performed together; whenever one is performed, all of them are performed simultaneously. It is possible to define simultaneous coordi- nation formally in terms of necessary conditions: Definition 4.2 (Simultaneous Actions). Let G be a set of agents. We say that a set of actions A = {αi}i∈G is (necessarily) simultaneous in R if doesi(αi) is a necessary condition for does j(α j) in R, for all i, j ∈ G. Suppose that the actions in A are simultaneous in R in the above sense. Then the KoP immediately implies (by Theorem 3.1) that a necessary condition for performing an action in A is knowing that the other actions are also (currently) being performed. In fact, however, much more must be true. We now present a strong variant of the KoP, which shows that in order to perform simultaneous actions agents must attain common knowledge of their necessary conditions. Notice that in order to allow a set of actions by the agents in G to be simultaneous, the system R must be sufficiently deterministic to ensure that if i, j ∈ G are distinct agents and (R,r,t) = doesi(α) holds, then j will be scheduled to perform an action at (r,t). For otherwise, there would be no way to ensure simultaneous execution of the actions by the agents in G. Conscious actions fit this setting well in this case. We proceed as follows. Theorem 4.3 (C-K of Preconditions). Let G be a set of agents and let A = {αi}i∈G be a set of necessarily simultaneous actions in the system R. Moreover, suppose that each action αi ∈ A is a conscious action for its agent i in R. If ψ is a necessary condition for doesi(αi) for some i ∈ G, then CGψ is a necessary condition for does j(α j), for all j ∈ G. 240 The Knowledge of Preconditions Principle Proof. Assume that A is a set of necessarily simultaneous actions for G in R. It is straightforward to show the following claim. Observation 1. Let αi,α j ∈ A be the actions for agents i and j, respectively. If a fact ϕ is a necessary condition for doesi(αi) in R then ϕ is also a necessary condition for does j(α j) in R. To prove this observation notice that, by assumption, both (a) R = does j(α j) ⇒ doesi(αi) and (b) R = doesi(αi) ⇒ ϕ hold. For all (r,t) ∈ Pts(R), if (R,r,t) = does j(α j) then (R,r,t) = doesi(αi) holds by (a) and so (R,r,t) = ϕ by (b). Thus, ϕ is a necessary condition for does j(α j) in R. Assume that ψ is a necessary condition for doesi(αi), for some i ∈ G. We shall prove by induc- tion on m ≥ 0 that Ki1Ki2 ···Kimψ is a necessary condition for does j(α j) in R, for every j ∈ G and all sequences (cid:104)i1, . . . ,im(cid:105) ∈ Gm (of m agent names from G). This will establish that (R,r,t) = does j(α j) implies (R,r,t) = CGψ for all (r,t) ∈ Pts(R), and thus CGψ is a necessary condition for does j(α j) for all j ∈ G, as claimed. • Base case: Let m = 0. The claim in this case is that if ψ is a necessary condition for doesi(αi) then ψ is also a necessary condition for does j(α j). This is precisely Observation 1, with ϕ (cid:44) ψ. • Inductive step: Let m ≥ 1, and assume that the claim holds for all j(cid:48) ∈ G and all sequences in Gm−1. Fix j ∈ G and a sequence (cid:104)i1,i2, . . . ,im(cid:105) ∈ Gm. Its suffix (cid:104)i2, . . . ,im(cid:105) is a sequence in Gm−1. Thus, Ki2 ···Kimψ is a necessary condition for doesi1(αi1) by the inductive hypothesis for m − 1 (ap- plied to Gm−1 and agent j(cid:48) = i1 ∈ G). Given that αi1 is a conscious action by i1, we can apply Theorem 3.1 to the necessary condition Ki2 ···Kimψ and obtain that Ki1Ki2 ···Kimψ is a necessary condition for doesi1(αi1). By Observation 1 we have that Ki1Ki2 ···Kimψ is also a necessary con- dition for does j(α j) in R, and we are done. 4.1 Common Knowledge and the Firing Squad Problem As an illustration of the applicability of Theorem 4.3 to a concrete application, consider a simple version of the Firing Squad problem. In this instance, the set of agents G in the system must simultaneously perform an action (say each agent i ∈ G should perform the action firei) in response to the receipt, by any agent in G, of a particular external input called a 'go' message. The firei action can stand for a simultaneous change in shared copies of a database, a public announcement at different sites of the system, or any other actions that need to take place simultaneously. Moreover, firei actions are allowed only if they are preceded by such a go message. For simplicity, we consider a case in which none of the agents in G may fail, and they all must satisfy the specification. Let ψgo be a proposition that is true at (r,t) ∈ Pts(R) if a go message is received by any of the agents in G at a point (r,t(cid:48)) of r at a time t(cid:48) ≤ t. According to the specification of the Firing Squad problem, ψgo is a necessary condition for the firei actions. An immediate consequence of Theorem 4.3 is: Corollary 4.4. CGψgo is a necessary condition for all firei actions in the Firing Squad problem. Given Corollary 4.4, any solution to the firing squad problem must first attain common knowledge that a go message has been received. It is well-known (see [11, 13]) that common knowledge of a fact is observed simultaneously at all agents it involves. Suppose that every i ∈ G performs firei when CGψgo first holds. Since all agents in G will come to know that CGψgo immediately, they will fire simultaneously, as required by the problem specification. Indeed, Theorem 4.3 shows that this is the first time at which they can perform according to a correct protocol. Implementing simultaneous tasks such as the Firing Yoram Moses 241 Squad therefore inherently involves, and often reduces to, ensuring and detecting CGψgo. Recall that depending on the properties of the system, attaining such common knowledge might be impossible in some cases, or it might incur a substantial cost in others. Just as in the case of the KoP, this necessity is not due to our formalism. It is only exposed by our analysis. In every protocol that implements such a task correctly, the firing actions cannot be performed unless CGψgo is attained. There is an extensive literature on using common knowledge to obtain optimal protocols for simul- taneous tasks [8, 9, 16, 20, 21, 23, 24, 26, 25]. Typically, they involve an explicit proof that common knowledge of a particular fact is a necessary condition for performing a set A of necessarily simultaneous actions. Theorem 4.3 or a variant of it suited for fault-tolerant systems can be used to establish this result in all of these cases. Moreover, one of the main insights from the analysis of [13] and of [11] is that when simultaneous actions are performed, the participating agents have common knowledge that they are being performed. Theorem 4.3 is a strict generalization of this fact. 5 Temporally Ordering Actions So far, we have seen two essential connections between knowledge and coordinated action: performing actions requires knowledge of their necessary conditions, and performing simultaneous actions requires common knowledge of their necessary conditions. We now further extend the connection between states of knowledge and coordination, by showing that temporally ordering actions depends on attaining nested knowledge of necessary conditions. Following [5], we define temporally ordered actions: Definition 5.1 (Ben Zvi and Moses). A sequence of actions (cid:104)α1, . . . ,αk(cid:105) (for agents 1, . . . ,k, respectively) is (linearly) ordered in R if did j−1(α j−1) is a necessary condition for does j(α j) in R. Observe that this definition does not force an action α j to occur in a run in which α j−1 occurs. Rather, if an action α j is performed in a given run, then it must be preceded by all actions α1, . . . ,α j−1. Moreover, if we denote the time at which an action αi is performed in a run r by ti, then we require that t j−1 ≤ t j for every action α j performed in r. Claim 1. Assume that the sequence (cid:104)α1, . . . ,αk(cid:105) is ordered in R. Then R =(cid:0)did j(α j) ⇒ did j−1(α j−1)(cid:1) for all 2 ≤ j ≤ k. Proof. Assume that (R,r,t) = did j(α j). Then, by definition of did j(α j), we have (R,r, t ) = does j(α j) for some t ≤ t. The fact that (cid:104)α1, . . . ,αk(cid:105) is ordered in R implies that did j−1(α j−1) is a necessary condition for does j(α j) in the system R, and so (R,r, t ) = did j−1(α j−1). Since did j−1(α j−1) is a stable fact and t ≥ t, we obtain that (R,r,t) = did j−1(α j−1). The claim follows. We say that a fact ϕ is stable in R if once true, ϕ remains true. Formally, if (R,r,t) = ϕ and t(cid:48) > t then (R,r,t(cid:48)) = ϕ, for all r ∈ R and t,t(cid:48) ≥ 0. Notice that while doesi(α) is, in general, not a stable fact, didi(α) is always stable. Definition 5.2. We say that agent i recalls ψ in R if the fact Kiψ is stable in R. The notion of perfect recall, capturing the assumption that agents remember all events that they take part in, is popular in the analysis of games and multi-agent systems [10, 29]. While perfect recall is a nontrivial assumption often requiring significant storage costs, selective recall of single facts such as does j(α j) is a much weaker assumption, that can be assumed of a system R essentially without loss of generality. By adding a single bit to Agent j's local state, whose value is 0 as long as j has not performed α j and 1 once the action has been performed, we can obtain a system R(cid:48) that is isomorphic to R, in which Agent j recalls does j(α j). 242 The Knowledge of Preconditions Principle Claim 2. Assume that α j is a conscious action for j in R, and that j recalls did j(α j) in R. Then did j(α j) is a j-local fact in R. Proof. Suppose that (R,r,t) = did j(α j). Then, by definition of did j(α j), we have (R,r, t ) = does j(α j) for some t ≤ t. Choose an arbitrary (r(cid:48),t(cid:48)) ∈ Pts(R) satisfying that (r(cid:48),t(cid:48)) ≈ j (r, t ). It follows that (R,r(cid:48),t(cid:48)) = does j(α j) since α j is a conscious action for j in R. By definition of did j(α j) it follows that (R,r(cid:48),t(cid:48)) = did j(α j). Now, by definition of = for Kj we have that (R,r, t ) = Kjdid j(α j). By assumption, j recalls did j(α j) in R, and so Kjdid j(α j) is stable in R. Thus, since t ≥ t, we obtain that (R,r,t) = Kjdid j(α j), as claimed. We can now show: Theorem 5.3 (Ordering and Nested Knowledge). Assume that • the actions (cid:104)α1, . . . ,αk(cid:105) are ordered in R, • each agent j = 1, . . . ,k recalls did j(α j) in R, • α j is a conscious action for j in R, for all j = 1, . . . ,k, and • ψ is a stable necessary condition for the first action does1(α1) in R Then KjKj−1···K1ψ is a necessary condition for the j th action does j(α j) in R, for all j ≤ k. Proof. Assuming the conditions of the theorem, we will prove by induction on j ≤ k that did j(α j) validly implies KjKj−1···K1ψ in R. Since does j(α j) validly implies did j(α j) by definition of did j(α j), this will yield that KjKj−1···K1ψ is a necessary condition for does j(α j) in R, as claimed. We proceed with the inductive argument. • Base case j = 1: Assume that (R,r,t) = did1(α1). Claim 2 implies that (R,r,t) = K1did1(α1). Let (r(cid:48),t(cid:48)) ∈ Pts(R) be an arbitrary point satisfying that (r(cid:48),t(cid:48)) ≈1 (r,t). Then (R,r(cid:48),t(cid:48)) = did1(α1) by the knowledge property. Thus, (R,r(cid:48), t ) = does1(α1) holds for some t ≤ t(cid:48), and because ψ is a necessary condition for does1(α1) in R, we obtain that (R,r, t ) = ψ. Since ψ is stable and t(cid:48) ≥ t, we have that (R,r(cid:48),t(cid:48)) = ψ. By choice of (r(cid:48),t(cid:48)) we have that (R,r,t) = K1ψ, as claimed. • Inductive step: Let j > 1 and assume that Kj−1···K1ψ is a necessary condition for did j−1(α j−1) in R. Moreover, let (R,r,t) = did j(α j). Since α j is a conscious action for j, Claim 2 implies that (R,r,t) = Kjdid j(α j). Choose an arbitrary (r(cid:48),t(cid:48)) ∈ Pts(R) satisfying that (r(cid:48),t(cid:48)) ≈ j (r,t). By definition of Kj, it follows that (R,r(cid:48),t(cid:48)) = did j(α j). By Claim 1, since the sequence (cid:104)α1, . . . ,αk(cid:105) is ordered in R and j > 1 we have that (R,r(cid:48),t(cid:48)) = did j−1(α j−1). We now apply the inductive hypothesis to obtain that (R,r(cid:48),t(cid:48))= Kj−1···K1ψ. Finally, we obtain that (R,r,t)= KjKj−1···K1ψ by choice of (r(cid:48),t(cid:48)) and the definition of '=' for Kj. The claim now follows. A slightly more restricted version of Theorem 5.3 was proved in [5]. Rather than consider an arbitrary necessary condition for α1, they proved a version for the case in which the first action α1 is triggered by an external input to agent 1. Technically, the proofs are quite similar. Theorem 5.3 provides a necessary, but possibly not sufficient, condition for ordering actions in dis- tributed systems. If agent j acts strictly later than when KjKj−1···K1ψ first holds, then it may be inappro- priate for agent j + 1 to act when it knows that the fact KjKj−1···K1ψ holds (i.e., when Kj+1Kj ···K1ψ first holds). Nevertheless, Theorem 5.3 is often very useful because it can be used as a guide for effi- ciently, and sometimes even optimally, performing a sequence of ordered actions. Intuitively, suppose Yoram Moses 243 that we have a protocol whose goal is to perform (cid:104)α1, . . . ,αk(cid:105) in response to an externally generated trigger ψ (such as the 'go' message in Firing Squad). In particular, assume that ψ is a necessary condi- tion for α1. Keeping the communication aspects of this protocol fixed, an optimally fast solution would be for each agent j ≤ k to perform α j when KjKj−1···K1ψ first holds. Let R be the set of runs of such a protocol with r ∈ R, and let t j and t j−1 be the earliest times at which (R,r,t j) = KjKj−1···K1ψ and (R,r,t j−1) = Kj−1···K1ψ hold in a run r, respectively. The knowledge property guarantees that KjKj−1···K1ψ validly implies that Kj−1···K1ψ in R, and so t j ≥ t j−1. Since, by assumption, α j is performed at time t j and α j−1 at t j−1, we have that agents perform actions in linear temporal order, as required by Definition 5.1. Clearly, none of the actions can be performed any earlier, as Theorem 5.3 shows. We conclude that in time-efficient protocols, the nested knowledge formula presented by the theorem can be both necessary and sufficient. In this sense, Theorem 5.3 suggests a recipe for obtaining time-efficient solutions for ordering actions. Just as Theorem 4.3 implies that common knowledge is a necessary condition for simultaneous ac- tions, we now have by Theorem 5.3 that nested knowledge is a necessary condition for performing actions in linear temporal order. And just as there is an established literature on when common knowledge is and is not attainable and on how it may arise, there are results concerning the communication structure that underlies attaining nested knowledge. Indeed, in a seminal paper [7], Chandy and Misra showed that in asynchronous systems R, if (R,r,t) = ¬ϕ and at a time t(cid:48) > t (R,r,t(cid:48)) = KjKj−1···K1ϕ, then there must be a message chain in the run r between times t and t(cid:48), passing through the agents 1,2,. . . , j in this order (possibly involving additional agents as well). Given Theorem 5.3, this implies that the only way to coordinate actions in a linear temporal order in an asynchronous setting is by way of such message chains.2 More recently, Ben Zvi and Moses extended Chandy and Misra's work to systems in which commu- nication is not asynchronous, but rather agents may have access to clocks and the transmission time for each of the channels is bounded [5]. They show that a communication structure called a centipede must be constructed in order to obtain nested knowledge of spontaneous facts such as the arrival of an external input. They prove a slightly more restricted instance of Theorem 5.3 (without using KoP directly), and use it to show that ordering actions in their setting requires the construction of the appropriate centipedes. Finally, Parikh and Krasucki analyze the ability to create levels of knowledge consisting of collections of nested knowledge formulas in [27]. Theorem 5.3 relates levels of knowledge to coordination. 6 Discussion This paper formulated the knowledge of preconditions principle and presented three theorems relating knowledge and coordinated action: the first is the KoP itself -- necessary conditions for an action must be known to hold when the action is performed. Next, we showed that necessary conditions for simultaneous actions must be commonly known when the actions are taken. Finally, nested knowledge is a necessary condition for coordinating linearly ordered actions. The latter two are fairly direct consequences of the KoP. We discussed some of the uses of the latter two results in Sections 4 and 5. Indeed the KoP has many further implications. In recent years, several works that make use of KoP have appeared, citing the unpublished [22]. For example, Castaneda, Gonczarowski and Moses used the KoP to analyze the consensus problem [6], 2Theorems 3.1 and 5.3 depend on conscious actions and therefore do not apply to asynchronous systems. Nevertheless, variants of these theorems can be presented that do apply to asynchronous systems and nondeterministic protocols. Details will appear in [22]. 244 The Knowledge of Preconditions Principle in which agents need to agree on a binary value in a fault-prone system. They designed a protocol in two steps -- applying the KoP once to derive a rule by which, roughly, agents decide on 0 when they know of an initial value of 0. Then, they applied the KoP again assuming that this is the rule used for making decisions on 0, and obtained a rule involving nested knowledge (roughly, a statement of the form "knowing that nobody knows 0") for deciding on the value 1. The result of their analysis was a very efficient solution to consensus that is optimal in a strong sense: It is the first unbeatable consensus protocol. No protocol can strictly dominate it, by having processes always decide at least as fast, and sometimes strictly faster, than this protocol does. The work of [6] complements an earlier work by Halpern, Moses and Waarts [15], in which a fixed point analysis of optimal consensus was obtained. The latter, too, is closely related to the KoP. Gonczarowski and Moses used the KoP to analyze the epistemic requirements of more general forms of coordination [12]. Namely, they considered a setting in which k agents need to perform actions, and there are time bounds on the relative times at which the actions of any pair of agents is performed. The simple instance in which all bounds are 0 is precisely that of the simultaneous actions considered in Sec- tion 4. They show that such coordination requires vectorial fixed points of knowledge conditions, which are naturally related to fixed points and equilibria. The papers [3, 4, 5, 12] together can all be viewed as making use of the KoP to provide insights into the interaction between time and communication for coordinating actions in a distributed and multi-agent system. Describing them is beyond the scope of the current paper. The most significant aspect of the KoP, in our view, is the fact that it places a new emphasis on the epistemic aspects of problem solving in a multi-agent system. Simple necessary conditions induce epistemic conditions. Thus, in order to act correctly, one needs a mechanism ensuring that the agents obtain the necessary knowledge, and that they discover that they have this knowledge. Most problems and solutions are not posed or described in this fashion. We believe that the KoP encapsulates an important connection between knowledge, action and coordination that will find many applications in the future. References [1] Hagit Attiya & Jennifer Welch (2004): Distributed Computing: Fundamentals, Simulations and Advanced Topics. John Wiley & Sons, doi:10.1002/0471478210. Agreeing to disagree. J. Aumann (1976): [2] R. doi:10.1214/aos/1176343654. Annals of Statistics 4(6), pp. 1236 -- 1239, [3] Ido Ben-Zvi & Yoram Moses (2013): Agent-Time Epistemics and Coordination. In: Proceedings of ICLA, pp. 97 -- 108, doi:10.1007/978-3-642-36039-8 9. [4] Ido Ben-Zvi & Yoram Moses (2013): The Shape of Reactive Coordination Tasks. In: Proceedings of TARK, TARK XIV, pp. 29 -- 38. [5] Ido Ben-Zvi & Yoram Moses (2014): Beyond Lamport's Happened-before: On Time Bounds and the Order- ing of Events in Distributed Systems. J. ACM 61(2), p. 13, doi:10.1145/2542181. [6] Armando Castaneda, Yannai A Gonczarowski & Yoram Moses (2014): Unbeatable Consensus. In: Proceed- ings of DISC, Springer, pp. 91 -- 106, doi:10.1007/978-3-662-45174-8 7. [7] K. M. Chandy & J. Misra (1986): How processes learn. Distributed Computing 1(1), pp. 40 -- 52, doi:10.1007/BF01843569. [8] Danny Dolev, Ezra N Hoch & Yoram Moses (2012): An optimal self-stabilizing firing squad. SIAM Journal on Computing 41(2), pp. 415 -- 435, doi:10.1137/090776512. [9] C. Dwork & Y. Moses (1990): Knowledge and common knowledge in a Byzantine environment: crash fail- ures. Information and Computation 88(2), pp. 156 -- 186, doi:10.1016/0890-5401(90)90014-9. Yoram Moses 245 [10] R. Fagin, J. Y. Halpern, Y. Moses & M. Y. Vardi (2003): Reasoning about Knowledge. MIT Press, Cambridge, Mass. [11] Ronald Fagin, Joseph Y. Halpern, Yoram Moses & Vardi. Moshe Y. (1999): Common knowledge revisited. Annals of Pure and Applied Logic 96(13), doi:10.1016/S0168-0072(98)00033-5. [12] Y Gonczarowski & Y Moses (2013): Timely common knowledge: Characterising asymmetric distributed coordination via vectorial fixed points. In: Proceedings of TARK XIV. [13] J. Y. Halpern & Y. Moses (1990): Knowledge and Common Knowledge in a Distributed Environment. Journal of the ACM 37(3), pp. 549 -- 587, doi:10.1145/800222.806735. A preliminary version appeared in Proc. 3rd ACM PODC, 1984. [14] J. Y. Halpern & Y. Moses (1992): A guide to completeness and complexity for modal logics of knowledge and belief. Artificial Intelligence 54, pp. 319 -- 379, doi:10.1016/0004-3702(92)90049-4. [15] Joseph Y. Halpern, Yoram Moses & Orli Waarts (2001): A Characterization of Eventual Byzantine Agree- ment. SIAM J. Comput. 31(3), pp. 838 -- 865, doi:10.1137/S0097539798340217. [16] Maurice P Herlihy, Yoram Moses & Mark R Tuttle (2011): Transforming worst-case optimal solutions for si- multaneous tasks into all-case optimal solutions. In: Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, ACM, pp. 231 -- 238, doi:10.1145/1993806.1993849. [17] G´erard Le Lann (1977): Distributed Systems-Towards a Formal Approach. In: IFIP Congress, 7, Toronto, pp. 155 -- 160. [18] D. Lewis (1969): Convention, A Philosophical Study. Harvard University Press, Cambridge, Mass. [19] J. McCarthy & P. J. Hayes (1969): Some Philosophical Problems From the Standpoint of Artificial Intelli- gence. In: Machine Intelligence 4, Edinburgh University Press, pp. 463 -- 502, doi:10.1016/b978-0-934613- 03-3.50033-7. [20] Tal Mizrahi & Yoram Moses (2008): Continuous consensus via common knowledge. Distributed Computing 20(5), pp. 305 -- 321, doi:10.1007/s00446-007-0049-6. [21] Tal Mizrahi & Yoram Moses (2008): Continuous consensus with ambiguous failures. In: Distributed Com- puting and Networking, Springer, pp. 73 -- 85, doi:10.1016/j.tcs.2010.04.025. [22] Y Moses (2016): Knowledge and Coordinated Action, to appear. [23] Y. Moses & M. R. Tuttle (1988): Programming simultaneous actions using common knowledge. Algorithmica 3, pp. 121 -- 169, doi:10.1007/BF01762112. [24] G. Neiger (1990): Consistent coordination and continual common knowledge. Manuscript. [25] G. Neiger & M. R. Tuttle (1993): Common knowledge and consistent simultaneous coordination. Distributed Computing 6(3), pp. 334 -- 352, doi:10.1007/BF02242706. [26] Gil Neiger & Rida A Bazzi (1999): Using knowledge to optimally achieve coordination in distributed sys- tems. Theoretical computer science 220(1), pp. 31 -- 65, doi:10.1016/S0304-3975(98)00236-9. [27] R. Parikh & P. Krasucki (1992): Levels of knowledge in distributed computing. S¯adhan¯a 17(1), pp. 167 -- 191, doi:10.1007/bf02811342. [28] Fred B Schneider (1990): Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys (CSUR) 22(4), pp. 299 -- 319, doi:10.1145/98163.98167. [29] R. Selten (1975): Reexamination of the perfectness concept for equilibrium points in extensive games. Inter- national Journal of Game Theory 4, pp. 25 -- 55, doi:10.1145/2542181.
cs/0308030
1
0308
2003-08-19T15:45:16
Learning in Multiagent Systems: An Introduction from a Game-Theoretic Perspective
[ "cs.MA", "cs.AI" ]
We introduce the topic of learning in multiagent systems. We first provide a quick introduction to the field of game theory, focusing on the equilibrium concepts of iterated dominance, and Nash equilibrium. We show some of the most relevant findings in the theory of learning in games, including theorems on fictitious play, replicator dynamics, and evolutionary stable strategies. The CLRI theory and n-level learning agents are introduced as attempts to apply some of these findings to the problem of engineering multiagent systems with learning agents. Finally, we summarize some of the remaining challenges in the field of learning in multiagent systems.
cs.MA
cs
In Eduardo Alonso, editor, Adaptive Agents: LNAI 2636. Springer Verlag, 2003. Learning in Multiagent Systems: An Introduction from a Game-Theoretic Perspective Jos´e M. Vidal University of South Carolina, Computer Science and Engineering, Columbia, SC 29208 [email protected] Abstract. We introduce the topic of learning in multiagent systems. We first provide a quick introduction to the field of game theory, focusing on the equilibrium concepts of iterated dominance, and Nash equilib- rium. We show some of the most relevant findings in the theory of learn- ing in games, including theorems on fictitious play, replicator dynamics, and evolutionary stable strategies. The CLRI theory and n-level learning agents are introduced as attempts to apply some of these findings to the problem of engineering multiagent systems with learning agents. Finally, we summarize some of the remaining challenges in the field of learning in multiagent systems. 1 Introduction The engineering of multiagent systems composed of learning agents brings to- gether techniques from machine learning, game theory, utility theory, and com- plex systems. A designer must choose carefully which machine-learning algorithm to use since otherwise the system’s behavior will be unpredictable and often un- desirable. Fortunately, we can use the tools from these areas in an effort to predict the expected system behaviors. In this article we introduce these tech- niques and explain how they are used in the engineering of learning multiagent systems. The goal of machine learning research is the development of algorithms that increase the ability of an agent to match a set of inputs to their corresponding outputs [7]. That is, we assume the existence of a large, sometimes infinite, set of examples E . Each example e ∈ E is a pair e = {a, b} where a ∈ A represents the input the agent receives and b ∈ B is the output the agent should produce when receiving this input. The agent must find a function f which maps A → B for as many examples of A as possible. In a controlled test the set E is usually first divided into a training set which is used for training the agent, and a testing set which is used for testing the performance of the agent. In some scenarios it is impossible to first train the agent and then test it. In these cases the training and testing examples are interleaved. The agent’s performance is assessed on an ongoing manner. When a learning agent is placed in a multiagent scenario these fundamental assumptions of machine learning are violated. The agent is no longer learning c(cid:13) Springer Verlag, 2003. to extrapolate from the examples it has seen of fixed set E , instead it’s target concept keeps changing, leading to a moving target function problem [10]. In general, however, the target concept does not change randomly; it changes based on the learning dynamics of the other agents in the system. Since these agents also learn using machine learning algorithms we are left with some hope that we might someday be able to understand the complex dynamics of these type of systems. Learning agents are most often selfish utility maximizers. These agents often face each other in encounters where the simultaneous actions of a set of agents leads to different utility payoffs for all the participants. For example, in a market- based setting a set of agents might submit their bids to a first-price sealed-bid auction. The outcome of this auction will result in a utility gain or loss for all the agents. In a robotic setting two agents headed in a collision course towards each other have to decide whether to stay the course or to swerve. The results of their combined actions have direct results in the utilities the agents receive from their actions. We are solely concerned with learning agents that maximize their own utility. We believe that systems where agents share partial results or otherwise help each other can be considered extension on traditional machine learning research. 2 Game Theory Game theory provides us with the mathematical tools to understand the possible strategies that utility-maximizing agents might use when making a choice. It is mostly concerned with modeling the decision process of rational humans, a fact that should be kept in mind as we consider its applicability to multiagent systems. The simplest type of game considered in game theory is the single-shot simultaneous-move game. In this game all agents must take one action. All ac- tions are effectively simultaneous. Each agent receives a utility that is a function of the combined set of actions. In an extended-form game the players take turns and receive a payoff at the end of a series of actions. A single-shot game is a good model for the types of situations often faced by agents in a multiagent system where the encounters mostly require coordination. The extended-form games are best suited to modeling more complex scenarios where each succes- sive move places the agents in a different state. Many scenarios that first appear like they would need an extended-form game can actually be described by a se- ries of single-shot games. In fact, that is the approach taken by many multiagent systems researchers. In the one-shot simultaneous-move game we say that each agent i chooses a strategy si ∈ Si , where Si is the set of all strategies for agent i. These strategies represent the actions the agent can take. When we say that i chooses strategy si we mean that it chooses to take action si . The set of all strategies chosen by all the agents is the strategy profile for that game and it is denoted by s ∈ S ≡ ×I i=iSi . Once all the agents make their choices and form the strategy profile s A B A 1,2 3,4 B 3,2 2,1 Fig. 1. Sample two-player game matrix. Agent 1 chooses from the rows and agent 2 chooses from the columns. then each agent i receives a utility which is given by the function ui (s). Notice that a player’s utility depends on the choices made by all the agents. Two player games involve only two players, i and j . They are often repre- sented using a game matrix such as the one shown in Figure 1. In that matrix we see that if agent 1 (the one who chooses from the rows) chooses action A and agent 2 chooses action B then agent 1 will receive a utility of 3 while agent 2 receives a utility of 4. Using our notation for strategies we would say that if the strategy profile is (s1 , s2 ) then the payoff vector is (u1 (s1 , s2 ), u2 (s1 , s2 )) It is possible that a player will choose randomly between its action choices, using different prior probabilities for each choice. These types of strategies are called mixed strategies and they are a probability distribution over an agent’s actions. We say that a mixed strategy for agent i is σi ∈ Σi ≡ P (Si ) where P (Si ) is the set of all probability distributions over the set of pure strategies Si . Although a real agent can not take a “mixed action”, mixed strategies are useful abstractions since they allow us to model agents who might use some randomization subroutine to choose their action. 3 Solution Concepts Much of the work in game theory has concentrated in the definition of plausible solution concepts. A solution concept tries to define the set of actions that a set of rational agents will choose when faced with a game. The most common assumptions are that the agents are rational, have common knowledge1 of the payoffs in the game matrix, and that they are intelligent enough to re-create the thought process that the mathematician went through to come up with the solution concept. As such, most solution concepts are geared towards an under- standing of how smart, well-informed people would act. They are not necessarily meant to explain the behavior of machine-learning agents. Still, the fact that they provide the “best” solution makes them a useful tool. 3.1 Iterated Dominance The iterated dominance approach is to successively eliminate from consideration those actions that are worst than some other action, no matter what the other 1 Common knowledge about p means that everybody knows that everybody knows, and so on to infinity, about p. A B A 8,2 9,4 B 1,2 3,1 Fig. 2. A game where agent 1’s action B is dominated by A. player does. For example, in Figure 2 we see a game where agent 1’s action B is dominate by A. That is, no matter what agent 2 does, agent 1 should choose action A. Then, if agent 1 chooses action A then agent 2 should choose action B. Therefore, the solution strategy profile for this game is (A, B ). Formally, we say that a strategy σi is strictly dominated for agent i if there is some other strategy σi ∈ Σi for which ui (σi , σ−i ) > ui (σi , σ−i ) for all σ−i , where σ−i is a set of strategies for all agents except i. Notice that the inequality sign is a greater-than. If we change that sign to a greater-than-or-equal then we have the definition for a weakly dominated strategy. There is no reason for a rational agent to choose a strictly dominated strategy. That is, there is no reason for an agent to choose σi when there exists a σi which will give it a better utility no matter what the other agents do. Similarly, there is no reason for the agent to choose a weakly dominated strategy. Of course, this reasoning relies on the assumption that the agent can indeed determine the existence of a σi . This assumption can be hard to justify in cases where the better strategy is a mixed strategy where the agent has an infinite number of possible strategies to verify, or in cases where the number of actions and agents is too large to handle. The iterated dominance algorithm consists of calculating all the strategies that are dominated for all the players, eliminating those strategies from consid- eration, and repeating the process until no more strategies are dominated. At that point it might be the case that only one strategy profile is left available. In this case that profile is the one all agents should play. However, in many cases the algorithm still leaves us with a sizable game matrix with a large number of possible strategy profiles. The algorithm then serves only to reduce the size of the problem. 3.2 Nash Equilibrium The Nash equilibrium solution concept is popular because it provides a solution where other solution concepts fail. The Nash equilibrium strategy profile is de- fined as σ such that for all agents i it is true that there is no strategy better than σi given that all the other agents take the actions prescribed by σ−i . Formally, we say that σ is a Nash equilibrium strategy profile if for all i it is true that σi ∈ BRi ( σ−i ), where BRi (s−i ) is the best response for i to s−i . That is, given that everyone else plays the strategy given by the Nash equilibrium the best strategy for any agent is the one given by the Nash equilibrium. A strict Nash equilibrium states that σi is strictly (i.e., greater than) better than any other alternative. It has been shown that every game has at least one Nash equilibrium, as long as mixed strategies are allowed. The Nash equilibrium has the advantage of being stable under single agent desertions. That is, if the system is in a Nash equilibrium then no agent, working by itself, will be tempted to take a different action. However, it is possible for two or more agents to conspire together and find a set of actions which are better for them. This means that the Nash equilibrium is not stable if we allow the formation of coalitions. Another problem we face when using the Nash equilibrium is the fact that a game can have multiple Nash equilibria. In these cases we do not know which one will be chosen, if any. The Nash equilibrium could also be a mixed strategy for some agent while in the real world the agent has only discrete actions avail- able. In both of these cases the Nash equilibrium is not sufficient to identify a unique strategy profile that rational agents are expected to play. As such, fur- ther studies of the dynamics of the system must be carried out in order to refine the Nash equilibrium solution. The theory of learning in games—a branch of game theory—has studied how simple learning mechanisms lead to equilibrium strategies. 4 Learning in Games The theory of learning in games studies the equilibrium concepts dictated by var- ious simple learning mechanisms. That is, while the Nash equilibrium is based on the assumption of perfectly rational players, in learning in games the as- sumption is that the agents use some kind of algorithm. The theory determines the equilibrium strategy that will be arrived at by the various learning mecha- nisms and maps these equilibria to the standard solution concepts, if possible. Many learning mechanisms have been studied. The most common of them are explained in the next few sub-sections. 4.1 Fictitious Play A widely studied model of learning in games is the process of fictitious play. In it agents assume that their opponents are playing a fixed strategy. The agents use their past experiences to build a model of the opponent’s strategy and use this model to choose their own action. Mathematicians have studied these types of games in order to determine when and whether the system converges to a stable strategy. Fictitious play uses a simple form of learning where an agent remembers everything the other agents have done and uses this information to build a probability distribution for the other agents’ expected strategy. Formally, for the two agent (i and j ) case we say that i maintains a weight function ki : Sj → R+ . The weight function changes over time as the agent learns. The weight function at time t is represented by k t i which keeps a count of how many times each strategy has been played. When at time t − 1 opponent j plays strategy st−1 j A B A 0,0 1,1 B 1,1 0,0 Fig. 3. A game matrix with an infinite cycle. then i updates its weight function with (sj ) + (cid:26) 1 if st−1 j = sj , 0 if st−1 6= sj . j Using this weight function, agent i can now assign a probability to j playing any of its sj ∈ Sj strategies with i (sj ) = k t−1 k t i (1) . (2) Prt i [sj ] = k t i (sj ) k t Psj ∈Sj i (sj ) Player i then determines the strategy that will give it the highest expected utility given that j will play each of its sj ∈ Sj with probability Prt i [sj ]. That is, i determines its best response to a probability distribution over j ’s possible strategies. This amounts to i assuming that j ’s strategy at each time is taken from some fixed but unknown probability distribution. Several interesting results have been derived by researches in this area. These results assume that all players are using fictitious play. In [3] it was shown that the following two propositions hold. Proposition 1. If s is a strict Nash equilibrium and it is played at time t then it wil l be played at al l times greater than t. Intuitively we can see that if the fictitious play algorithm leads to all players to play the same Nash equilibrium then, afterward, they will increase the prob- ability that all others are playing the equilibrium. Since, by definition, the best response of a player when everyone else is playing a strict Nash equilibrium is to play the same equilibrium, all players will play the same strategy and the next time. The same holds true for every time after that. Proposition 2. If fictitious play converges to a pure strategy then that strategy must be a Nash equilibrium. We can show this by contradiction. If fictitious play converges to a strategy that is not a Nash equilibrium then this means that the best response for at least one of the players is not the same as the convergent strategy. Therefore, that player will take that action at the next time, taking the system away from the strategy profile it was supposed to have converged to. An obvious problem with the solutions provided by fictitious play can be seen in the existence of infinite cycles of behaviors. An example is illustrated by the game matrix in Figure 3. If the players start with initial weights of k0 1 (A) = 1, k0 1 (B ) = 1.5, k0 2 (A) = 1, and k0 2 (B ) = 1.5 they will both believe that the other will play B and will, therefore, play A. The weights will then be updated to k1 1 (A) = 2, k1 1 (B ) = 1.5, k1 2 (A) = 2, and k1 2 (B ) = 1.5. Next time, both agents will believe that the other will play A so both will play B . The agents will engage in an endless cycle where they alternatively play (A, A) and (B , B ). The agents end up receiving the worst possible payoff. This example illustrates the type of problems we encounter when adding learning to multiagent systems. While we would hope that the machine learning algorithm we use will be able to discern this simple pattern and exploit it, most learning algorithms can easily fall into cycles that are not much complicated than this one. One common strategy for avoiding this problem is the use of randomness. Agents will sometimes take a random action in an effort to exit possible loops and to explore the search space. It is interesting to note that, as in the example from Figure 3, it is often the case that the loops the agents fall in often reflect one of the mixed strategy Nash equilibria for the game. That is, (.5, .5) is a Nash equilibrium for this game. Unfortunately, if the agents are synchronized, as in this case, the implementation of a mixed strategy could lead to a lower payoff. Games with more than two players require that we decide whether the agent should learn individual models of each of the other agents independently or a joint probability distribution over their combined strategies. Individual mod- els assume that each agent operates independently while the joint distributions capture the possibility that the others agents’ strategies are correlated. Unfor- tunately, for any interesting system the set of all possible strategy profiles is too large to explore—it grows exponentially with the number of agents. Therefore, most learning systems assume that all agents operate independently so they need to maintain only one model per agent. 4.2 Replicator Dynamics Another widely studied model is replicator dynamics. This model assumes that the percentage of agents playing a particular strategy will grow in proportion to how well that strategy performs in the population. A homogeneous population of agents is assumed. The agents are randomly paired in order to play a symmetric game, that is, a game where both agents have the same set of possible strategies and receive the same payoffs for the same actions. The replicator dynamics model is meant to capture situations where agents reproduce in proportion to how well they are doing. Formally, we let φt (s) be the number of agents using strategy s at time t. We can then define θt (s) = φt (s) Ps′ ∈S φt (s′ ) (3) to be the fraction of agents playing s at time t. The expected utility for an agent playing strategy s at time t is defined as ut (s) ≡ Xs′ ∈S θt (s′ )u(s, s′ ), (4) where u(s, s′ ) is the utility than an agent playing s receives against an agent playing s′ . Notice that this expected utility assumes that the agents face each other in pairs and choose their opponents randomly. In the replicator dynamics the reproduction rate for each agent is proportional to how well it did on the previous step, that is, φt+1 (s) = φt (s)(1 + ut (s)). (5) Notice that the number of agents playing a particular strategy will continue to increase as long as the expected utility for that strategy is greater than zero. Only strategies whose expected utility is negative will decrease in population. It is also true that under these dynamics the size of a population will constantly fluctuate. However, when studying replicator dynamics we ignore the absolute size of the population and focus on the fraction of the population playing a par- ticular strategy, i.e., θt (s), as time goes on. We are also interested in determining if the system’s dynamics will converge to some strategy and, if so, which one. In order to study these systems using the standard solution concepts we view the fraction of agents playing each strategy as a mixed strategy for the game. Since the game is symmetric we can use that strategy as the strategy for both players, so it becomes a strategy profile. We say that the system is in a Nash equilibrium if the fraction of players playing each strategy is the same as the probability that the strategy will be played on a Nash equilibrium. In the case of a pure strategy Nash equilibrium this means that all players are playing the same strategy. An examination of these systems quickly leads to the conclusion that every Nash equilibrium is a steady state for the replicator dynamics. In the Nash equilibrium all the strategies have the same average payoff since the fraction of other players playing each strategy matches the Nash equilibrium. This fact can be easily proven by contradiction. If an agent had a pure strategy that would return a higher utility than any other strategy then this strategy would be a best response to the Nash equilibrium. If this strategy was different from the Nash equilibrium then we would have a best response to the equilibrium which is not the equilibrium, so the system could not be at a Nash equilibrium. It has also been shown [4] that a stable steady state of the replicator dynam- ics is a Nash equilibrium. A stable steady state is one that, after suffering from a small perturbation, is pushed back to the same steady state by the system’s dynamics. These states are necessarily Nash equilibria because if they were not then there would exist some particular small perturbation which would take the system away from the steady state. This correspondence was further refined by Bomze [1] who showed that an asymptotically stable steady state corresponds to a Nash equilibrium that is trembling-hand perfect and isolated. That is, the sta- ble steady states are a refinement on Nash equilibria—only a few Nash equilibria can qualify. On the other hand, it is also possible that a replicator dynamics sys- tem will never converge. In fact, there are many examples of simple games with no asymptotically stable steady states. While replicator dynamics reflect some of the most troublesome aspects of learning in multiagent systems some differences are evident. These differences are mainly due to the replication assumption. Agents are not usually expected to replicate, instead they acquire the strategies of others. For example, in a real multiagent system all the agents might choose to play the strategy that performed best in the last round instead of choosing their next strategy in pro- portion to how well it did last time. As such, we cannot directly apply the results from replicator dynamics to multiagent systems. However, the convergence of the systems’ dynamics to a Nash equilibrium does illustrate the importance of this solution concept as an attractor of learning agent’s dynamics. 4.3 Evolutionary Stable Strategies An Evolutionary Stable Strategy (ESS) is an equilibrium concept applied to dynamic systems such as the replicator dynamics system of the previous section. An ESS is an equilibrium strategy that can overcome the presence of a small number of invaders. That is, if the equilibrium strategy profile is ω and small number ǫ of invaders start playing ω ′ then ESS states that the existing population should get a higher payoff against the new mixture (ǫω ′ + (1 − ǫ)ω ) than the invaders. It has been shown [9] that an ESS is an asymptotically stable steady state of the replicator dynamics. However, the converse need not be true—a stable state in the replicator dynamics does not need to be an ESS. This means that ESS is a further refinement of the solution concept provided by the replicator dynamics. ESS can be used when we need a very stable equilibrium concept. 5 Learning Agents The theory of learning in games provides the designer of multiagent systems with many useful tools for determining the possible equilibrium points of a system. Unfortunately, most multiagent systems with learning agents do not converge to an equilibrium. Designers use learning agents because they do not know, at design time, the specific circumstances that the agents will face at run time. If a designer knew the best strategy, that is, the Nash equilibrium strategy, for his agent then he would simply implement this strategy and avoid the complexities of implementing a learning algorithm. Therefore, the only times we will see a multiagent system with learning agents are when the designer cannot predict that an equilibrium solution will emerge. The two main reasons for this inability to predict the equilibrium solution of a system are the existence of unpredictable environmental changes that affect the agents’ payoffs and the fact that on many systems an agent only has access to its own set of payoffs—it does not know the payoffs of other agents. These two reasons make it impossible for a designer to predict which equilibria, if any, the system would converge to. However, the agents in the system are still playing a game for which an equilibrium exists, even if the designer cannot predict it at design-time. But, since the actual payoffs keep changing it is often the case that the agents are constantly changing their strategy in order to accommodate the new payoffs. Learning agents in a multiagent system are faced with a moving target func- tion problem [10]. That is, as the agents change their behavior in an effort to max- imize their utility their payoffs for those actions change, changing the expected utility of their behavior. The system will likely have non-stationary dynamics— always changing in order to match the new goal. While game theory tells us where the equilibrium points are, given that the payoffs stay fixed, multiagent systems often never get to those points. A system designer needs to know how changes in the design of the system and learning algorithms will affect the time to convergence. This type of information can be determined by using CLRI theory. 5.1 CLRI Theory The CLRI theory [12] provides a formal method for analyzing a system composed of learning agents and determining how an agent’s learning is expected to affect the learning of other agents in the system. It assumes a system where each agent has a decision function that governs its behavior as well as a target function that describes the agent’s best possible behavior. The target function is unknown to the agent. The goal of the agent’s learning is to have its decision function be an exact duplicate of its target function. Of course, the target function keeps changing as a result of other agents’ learning. Formally, CLRI theory assumes that there are N agents in the system. The world has a set of discrete states w ∈ W which are presented to the agent with a probability dictated by the probability distribution D(W ). Each agent i ∈ N has a set of possible actions Ai where Ai ≥ 2. Time is discrete and indexed by a variable t. At each time t all agents are presented with a new w ∈ D(W ), take a simultaneous action, and receive some payoff. The scenario is similar to the one assumed by fictitious play except for the addition of w. Each agent i’s behavior is defined by a decision function δ t i (w) : W → A. When i learns at time t that it is in state w it will take action δ t i (w). At any time there is an optimal function for i given by its target function ∆t i (w). Agent i’s learning algorithm will try to reduce the discrepancy between δi and ∆i by using the payoffs it receives for each action as clues since it does not have direct access to ∆i . The probability that an agent will take a wrong action is given by its error e(δ t i ) = Pr[δ t i (w) 6= ∆t i (w) w ∈ D(W )]. As other agents learn and change their decision function, i’s target function will also change, leading to the moving target function problem, as depicted in Figure 4. An agent’s error is based on a fixed probability distribution over world states and a boolean matching between the decision and target functions. These con- 8q q Learn q q q q q q q q q q q δ t i δ t+1 i e(δt+1 i ) e(δt i ) / ∆t+1 ∆t i Move i Fig. 4. The moving target function problem. straints are often too restrictive to properly model many multiagent systems. However, even if the system being modeled does not completely obey these two constraints, the use of the CLRI theory in these cases still gives the designer valuable insight into how changes in the design will affect the dynamics of the system. This practice is akin to the use of Q-learning in non-Markovian games— while Q-learning is only guaranteed to converge if the environment is Markovian, it can still perform well on other domains. The CLRI theory allows a designer to understand the expected dynamics of the system, regardless of what learning algorithm is used, by modeling the system using four parameters: Change rate, Learning rate, Retention rate, and Impact (CLRI). A designer can determine values for these parameters and then use the CLRI difference equation to determine the expected behavior of the system. The change rate (c) is the probability that an agent will change at least one of its incorrect mappings in δ t (w) for the new δ t+1 (w). It captures the rate at which the agent’s learning algorithm tries to change its erroneous mappings. The learning rate (l) is the probability that the agent changes an incorrect mapping to the correct one. That is, the probability that δ t+1 (w) = ∆t (w), for all w. By definition, the learning rate must be less than or equal to the change rate, i.e. l ≤ c. The retention rate (r) represents the probability that the agent will retain its correct mapping. That is, the probability that δ t+1 (w) = δ t (w) given that δ t (w) = ∆t (w). CLRI defines a volatility term (v) to be the probability that the target func- tion ∆ changes from time t to t + 1. That is, the probability that ∆t (w) 6= ∆t+1 (w). As one would expect, volatility captures the amount of change that the agent must deal with. It can also be viewed as the speed of the target func- tion in the moving target function problem, with the learning and retention rates representing the speed of the decision function. Since the volatility is a dynamic property of the system (usually it can only be calculated by running the sys- tem) CLRI provides an impact (Iij ) measure. Iij represents the impact that i’s learning has on j ’s target function. Specifically, it is the probability that ∆t j (w) will change given that δ t+1 (w) 6= δ t i (w). i + k + k + k + k + k + k + k + k + k + k + k + k + k + k + k + k + k 8 / o / o / o / o / o / o / o / o / o / o / o / o / o / o / o / o / o / o / o / o / o / o / Someone trying to build a multiagent system with learning agents would determine the appropriate values for c, l, r, and either v or I and then use E [e(δ t+1 i Ai − 1 (cid:19) )] = 1 − ri + vi (cid:18) Ai ri − 1 i ) (cid:18)ri − li + vi (cid:18) Ai (li − ri ) + li − ci (cid:19)(cid:19) (6) + e(δ t Ai − 1 in order to determine the successive expected errors for a typical agent i. This equation relies on a definition of volatility in terms of impact given by (7) (w) 6= δ t j (w)]), i = Pr[∆t+1 (w) 6= ∆t ∀w∈W v t i (w)] i = 1 − Yj∈N−i (1 − Ij iPr[δ t+1 j which makes the simplifying assumption that changes in agents’ decision func- tions will not cancel each other out when calculating their impact on other agents. The difference equation (6) cannot, under most circumstances, be col- lapsed into a function of t so it must still be iterated over. On the other hand, a careful study of the function and the reasoning behind the choice of the CLRI parameter leads to an intuitive understanding of how changes in these parame- ters will be reflected in the function and, therefore, the system. A knowledgeable designer can simply use this added understanding to determine the expected be- havior of his system under various assumptions. An example of this approach is shown in [2]. For example, it is easy to see that an agent’s learning rate and the system’s volatility together help to determine how fast, if ever, the agent will reach its target function. A large learning rate means that an agent will change its decision function to almost match the target function. Meanwhile, a low volatility means that the target function will not move much, so it will be easy for the agent to match it. Of course, this type of simple analysis ignores the common situation where the agent’s high learning rate is coupled with a high impact on other agents’ target function making their volatility much higher. These agents might then have to increase their learning rate and thereby increase the original agent’s volatility. Equation (6) is most helpful in these type of feedback situations. 5.2 N-Level Agents Another issue that arises when building learning agents is the choice of a model- ing level. A designer must decide whether his agent will learn to correlate actions with rewards, or will try to learn to predict the expected actions of others and use these predictions along with knowledge of the problem domain to determine its actions, or will try to learn how other agents build models of other agents, etc. These choices are usually referred to as n-level modeling agents—an idea first presented in the recursive modeling method [5] [6]. A 0-level agent is one that does not recognize the existence of other agents in the world. It learns which action to take in each possible state of the world because it receives a reward after its actions. The state is usually defined as a static snapshot of the observable aspects of the agent’s environment. A 1-level agent recognizes that there are other agents in the world whose actions affect its payoff. It also has some knowledge that tells it the utility it will receive given any set of joint actions. This knowledge usually takes the form of a game matrix that only has utility values for the agent. The 1-level agent observes the other agents’ actions and builds probabilistic models of the other agents. It then uses these models to predict their action probability distribution and uses these distributions to determine its best possible action. A 2-level agent believes that all other agents are 1-level agents. It, therefore, builds models of their models of other agents based on the actions it thinks they have seen others take. In essence, the 2-level agent applies the 1-level algorithm to all other agents in an effort to predict their action probability distribution and uses these distributions to determine its best possible actions. A 3-level agent believes that all other agents are 2-level, an so on. Using these guidelines we can determine that fictitious play (Section 4.1) uses 1-level agents while the replicator dynamics (Section 4.2) uses 0-level agents. These categorizations help us to determine the relative computational costs of each approach and the machine-learning algorithms that are best suited for that learning problem. 0-level is usually the easiest to implement since it only requires the learning of one function and no additional knowledge. 1-level learn- ing requires us to build a model of every agent and can only be implemented if the agent has the knowledge that tells it which action to take given the set of actions that others have taken. This knowledge must be integrated into the agents. However, recent studies in layered learning [8] have shown how some knowledge could be learned in a “training” situation and then fixed into the agent so that other knowledge that uses the first one can be learned, either at runtime or in another training situation. In general, a change in the level that an agent operates on implies a change on the learning problem and the knowledge built into the agent. Studies with n-level agents have shown [11] that an n-level agent will always perform better in a society full of (n-1)-level agents, and that the computational costs of increasing a level grow exponentially. Meanwhile, the utility gains to the agent grow smaller as the agents in the system increase their level, within an economic scenario. The reason is that an n-level agent is able to exploit the non-equilibrium dynamics of a system composed of (n-1)-level agents. However, as the agents increase their level the system reaches equilibrium faster so the advantages of strategic thinking are reduced—it is best to play the equilibrium strategy and not worry about what others might do. On the other hand, if all agents stopped learning then it would be very easy for a new learning agent to take advantage of them. As such, the research concludes that some of the agents should do some learning some of the time in order to preserve the robustness of the system, even if this learning does not have any direct results. 6 Conclusion We have seen how game theory and the theory of learning in games provide us with various equilibrium solution concepts and often tell us when some of them will be reached by simple learning models. On the other hand, we have argued that the reason learning is used in a multiagent system is often because there is no known equilibrium or the equilibrium point keeps changing due to outside forces. We have also shown how the CLRI theory and n-level agents are attempts to characterize and predict, to a limited degree, the dynamics of a system given some basic learning parameters. We conclude that the problems faced by a designer of a learning multiagent systems cannot be solved solely with the tools of game theory. Game theory tells us about possible equilibrium points. However, learning agents are rarely at equilibrium, either because they are not sophisticated enough, because they lack information, or by design. There is a need to explore non-equilibirium sys- tems and to develop more predictive theories which, like CLRI, can tell us how changing either the parameters on the agents’ learning algorithms or the rules of the game will affect the expected emergent behavior. References 1. Bomze, I.: Noncoopertive two-person games in biology: A classification. Interna- tional Journal of Game Theory 15 (1986) 31–37 2. Brooks, C.H., Durfee, E.H.: Congregation formation in multiagent systems. Journal of Autonomous Agents and Multi-agent Systems (2002) to appear. 3. Fudenberg, D., Kreps, D.: Lectures on learning and equilibrium in strategic-form games. Technical report, CORE Lecture Series (1990) 4. Fudenberg, D., Levine, D.K.: The Theory of Learning in Games. MIT Press (1998) 5. Gmytrasiewicz, P.J., Durfee., E.H.: A rigorous, operational formalization of re- cursive modeling. In: Proceedings of the First International Conference on Multi- Agent Systems. (1995) 125–132 6. Gmytrasiewicz, P.J., Durfee., E.H.: Rational communication in multi-agent sys- tems. Autonomous Agents and Multi-Agent Systems Journal 4 (2001) 233–272 7. Mitchell, T.M.: Machine Learning. McGraw Hill (1997) 8. Stone, P.: Layered Learning in Multiagent Systems. MIT Press (2000) 9. Taylor, P., Jonker, L.: Evolutionary stable strategies and game dynamics. Mathe- matical Biosciences 16 (1978) 76–83 10. Vidal, J.M., Durfee, E.H.: The moving target function problem in multi-agent learning. In: Proceedings of the Third International Conference on Multi-Agent Systems. (1998) 11. Vidal, J.M., Durfee, E.H.: Learning nested models in an information economy. Journal of Experimental and Theoretical Artificial Intelligence 10 (1998) 291–308 12. Vidal, J.M., Durfee, E.H.: Predicting the expected behavior of agents that learn about agents: the CLRI framework. Autonomous Agents and Multi-Agent Systems (2002)
1703.02399
1
1703
2017-03-07T14:33:00
On time and consistency in multi-level agent-based simulations
[ "cs.MA" ]
The integration of multiple viewpoints became an increasingly popular approach to deal with agent-based simulations. Despite their disparities, recent approaches successfully manage to run such multi-level simulations. Yet, are they doing it appropriately? This paper tries to answer that question, with an analysis based on a generic model of the temporal dynamics of multi-level simulations. This generic model is then used to build an orthogonal approach to multi-level simulation called SIMILAR. In this approach, most time-related issues are explicitly modeled, owing to an implementation-oriented approach based on the influence/reaction principle.
cs.MA
cs
On time and consistency in multi-level agent-based simulations Gildas MORVAN, Yoann KUBERA http://www.lgi2a.univ-artois.fr/~morvan/ [email protected] Laboratoire de Génie Informatique et d'Automatique de l'Artois (LGI2A) Univ. Artois, EA 3926, Béthune, France Abstract The integration of multiple viewpoints became an increasingly popular ap- proach to deal with agent-based simulations. Despite their disparities, recent ap- proaches successfully manage to run such multi-level simulations. Yet, are they doing it appropriately? This paper tries to answer that question, with an analysis based on a generic model of the temporal dynamics of multi-level simulations. This generic model is then used to build an orthogonal approach to multi-level simulation called SIMI- LAR. In this approach, most time-related issues are explicitly modeled, owing to an implementation-oriented approach based on the influence/reaction principle. Keywords: multi-level agent-based modeling, large-scale simulation Introduction Simulating complex systems often requires the integration of knowledge coming from different viewpoints (e.g. different application fields, different focus points) to obtain relevant results. Yet, the representations of the agents, the environment and the tem- poral dynamics in regular multi-agent based simulation meta-models are designed to support a single viewpoint. Therefore, they lack the structure to manage the integra- tion of such systems, called multi-level simulations. 1 Managing multiple viewpoints on the same phenomenon induces the use of het- erogeneous time models, thus raising issues related to time and consistency. Multi- Level Agent-based Modeling (ML-ABM) is a recent approach that aims at extending the classical single-viewpoint agent-based modeling paradigm to cope with these issues and create multiple-viewpoints based simulations [1, 2, 4, 6, 7, 9, 11, 12]. Considering the disparities between the various ML-ABM approaches, a natural question comes to mind: is there a "right" way to do ML-ABM? In this context, the aim of this paper is double. We first aim at eliciting the is- sues and simulation choices underlying such simulations, with an analysis based on a generic model of the temporal dynamics of a multi-level simulation. Then, we present SIMILAR, a ML-ABM approach using the influence/reaction principle to manage explicitly the issues related to the simultaneous actions of agents in multiple levels [3, 8, 10]. 1 Temporal dynamics in Multi-level simulations In this section some issues related to multi-level simulation are emphasized using a generic model describing the temporal dynamics of a multi-level simulation. 1.1 General case From a coarse grain viewpoint, simulation is a process transforming the data about a phenomenon from initial values into a sequence of intermediate values, until a final state is reached. This evolution is characterized by: 1) A dynamic state δ(t)∈ ∆ mod- eling the data of the simulation at time t; 2) A time model (cid:84) representing the moments when each state of the discrete evolution was obtained; 3) A behavior model describ- ing the evolution process of the dynamic state between two consecutive moments of the time model. The exact content of the time model, dynamic state, as well as the behavior model of a simulation depends on the simulation approach being used. Yet, despite their disparities, many common points can be identified among them. First, since real time can be seen as a continuous value, most simulation assume that (cid:84) ⊂ (cid:82). Moreover, we can assume that a simulation eventually ends. Thus, (cid:84) contains an ordered, finite and discrete set of time values t ∈ (cid:84). Then, the dynamic state contains data related to the agents and the environment1. 1.2 Multi-level case In multi-level simulations, each level embodies a specific viewpoint on the studied phenomenon. Since these viewpoints can evolve using very different time scales, each level l ∈ (cid:76) (where (cid:76) is the set of all levels) has to define its own time model (cid:84) l . 1In this paper, we use a simplistic definition of these concepts: an agent is an entity that can perceive data about itself, the environment and the other agents, possibly memorize some of them and decide to perform actions 2 The interaction of the levels is possible only by defining when and under which circumstances interaction is possible. For this purpose, we introduce a multi-level specific terminology to the temporal dynamics. 1.2.1 Local information We consider that agents can lie in more than one level at a time. (cid:65) (t, l) ∈ (cid:65) l de- notes the set of agents of the level l ∈ (cid:76) at time t ∈ (cid:84) l . Since levels can have very different temporal dynamics, this point has various implications on the structure of a,l in each level l ∈(cid:76) where (t, l)∈ Φ the simulation: 1) Agents have a local state2 φ they lie; 2) Agents perform decisions differently depending on the level from which the decisions originates; 3) A level l can only trigger the local behavior of the agents lying in l. Similarly, the environment has a local state φω(t, l) ∈ Φω in each level of the simulation. Yet, contrary to the agents, the environment is present in each level of the simulation. Each local state embodies any agent-independent information like a topology or a state (e.g. an ambient temperature). a 1.2.2 Global information The coherence of agent behaviors in each level can require information like cross-level plans or any other level-independent information. Therefore, we consider that agents have a global state3 µ a, which is independent from any level. (t)∈ (cid:77) a 1.2.3 Content of a dynamic state Owing to the abovementioned information, the dynamic state δ(t) ∈ ∆ of a multi- level simulation at time t can be defined as the sum of the local dynamic state δ(t, l)∈ l of each level l ∈ (cid:76) and the global dynamic state δ ∆ G containing the global ×(cid:89) state of the agents. ∀δ(t)∈ ∆, δ(t) = (t),δ(t, l) ∧∀l ∈ (cid:76), δ(t, l)∈ ∆ (t)∈ ∆ (t)∈ ∆ ∆ = ∆ G  l∈(cid:76) ∆ l (1) l (2) G δ G l∈(cid:76) with δ G G 1.2.4 Time model of the simulation The interaction between levels is possible only if their time models are somehow cor- related. Since the time model of each level is a discrete ordered set, it is possible to build an order between their elements. l∈(cid:76)(cid:84) models of all the levels: (cid:84) =(cid:83) The time model of a multi-level simulation is defined as the union of the time l . For consistency reasons, the time models (cid:84) and (cid:84) l must have the same bounds. Since (cid:84) and (cid:84) l are ordered, we also define s + d t (resp. s + d tl ) as the successor of s ∈ (cid:84) (resp. s ∈ (cid:84) l ). 2Also called "physical state" or "face" in the literature [3, 8, 10, 11] 3Also called "mind", "memory state" or "core" in the literature [3, 8, 10, 11] 3 1.2.5 Consistent and transitory states l , the level l ∈ (cid:76) is in a transitory state. No guarantee can In the case where t (cid:54)∈ (cid:84) be provided on such a state, since it corresponds to a temporary value used by l to compute its future consistent dynamic state. On the opposite, the data contained in the dynamic state of a level l ∈ (cid:76) can be safely read or perceived at times in (cid:84) l , where this state is considered as consistent. Figure 1: Illustration of a time model, for a simulation using two levels "A" and "B".The first line represents real time.The second and third line represent the time model of the levels "A" and "B". The last line represents the time model of the whole simulation. At t1, the state of the simulation is consistent. At t4, it is half-consistent. From a global viewpoint, the dynamic state of the simulation is consistent (resp. transitory) if all of its levels are consistent (resp. It can also be in an intermediate situation called half-consistent state, if a level is in a consistent and another level is in a transitory state. These concepts are illustrated in Figure 1. To clarify our speech, we write δ(t) the consistent (or half-consistent) dynamic state of the simulation at time t ∈ (cid:84) and δ(]t, t(cid:48)[) the transitory dynamic state of the sim- ulation between the times t ∈ (cid:84) and t(cid:48) ∈ (cid:84). transitory). 1.3 Multi-level inherent issues When a simulation is in a transitory phase, each level performs operations in parallel to determine the next consistent value of their dynamic state. The transitory periods of the levels are not necessarily in sync. Therefore, each level can be at a different step of its transitory operations when an interaction occurs. This point raises the follow- ing time-related issues: 1) Determine on which dynamic states is based the decision in a level to interact with another level; 2) Determine when to take into considera- tion the modifications in a level resulting from an action initiated in another level; 3) Determine how to preserve the consistency of the global state of the agents despite having its update occurring after the level-dependent perceptions. 4 This section illustrates these issues on an example containing two levels "A" and "B", presented in Figure 2 Figure 2: Illustration of a subset of a time model containing two levels "A" and "B". 1.3.1 Level interaction through perception The first issue is related to the perception of the dynamic state of the other levels. It happens for instance at the time t2 (see fig. 2), when an agent from the level "B" tries to read information from the level "A". Indeed, since "A" is in a transitory state at that time, the data being read by the agent might have arbitrary values. Therefore, a heuristic has to be used to disambiguate that value. For instance using the last consis- tent dynamic state of the level (in this case the dynamic state of "A" at the time t1), using the arbitrary values from the transitory state at t2 or anticipating the modifica- tions that might have occurred in "A" between t1 and t2. 1.3.2 Level interaction through actions The second issue is related to the side effects of an interaction between two levels. It happens for instance during the transitory period ]t1, t3 [ (see fig. 2) of the level "A", if an agent from "A" tries to interact with the level "B". Indeed, since both levels have a different time scale, it is difficult to determine when the actions of "A" have to be taken for account into the computation of the dynamic state of "B". It can be during the transitory phases ]t1, t2 A generic answer to that problem might be "the next time both levels are in sync" (t3 in this case). Yet, this leads to aberrations like taking into consideration these actions at the end of the simulation (for instance in fig 1, if an agent from the level "A" interacts with "B" during the transitory period ]t3, t5 [). [, ]t2, t3 [ or a later one. 1.3.3 Global state update The third issue is related to the read and write access of the global state of an agent and the update of that value. Indeed, during the transitory phase of each level, the agent has to read and possibly update the value of the global states, to take into account the information that were perceived. Yet, since the perception is relative to each level, the global state is the subject of the same issues than the interactions between levels. 5 For instance, in figure 2, the period ]t1, t2 [ of the simulation is a transitory period for the level "B" and a subset of the transitory period for the level "A". The latter raises the question of whether if the global state of the agent at the time t2 has to take into consideration the data being perceived by the agent from "A" or not. Indeed, perception might not be complete at that time in "A". 1.4 Differences between multi-level approaches There is no universal answer to the issues presented in this section, since the coherence between heterogeneous time scales is itself an ill-defined notion. The main differences between existing ML-ABM approaches are the way these issues are handled, through the answer of the following questions about the operations performed during a tran- sitory phase ]t, t + d t[: 1) Which agents can perform a decision during a transitory period of a level? 2) How many actions can be performed by the decision process of an agent? 3) How are committed the results of the action to the future dynamic state of a level? 4) When are performed these operations during the transitory state? 5) Which dynamic state of a level k is read by a level l initiating an interaction with k? A consistent one? A transitory one? Which ones ? 6) When is taken into account the interaction initiated by a level l with a level k? 7) How is managed the consistency of the global state of agents? In the next section, we present an agent-based approach called SIMILAR, that aims at addressing these issues. 2 SIMILAR Many meta-models and simulation engines dedicated to ML-ABM have been proposed in the literature such as IRM4MLS [10], PADAWAN [11], GAMA [5] or NETLOGO LEVELSPACE [6]. All these approaches provide a different and yet valid answer to the multi-level simulation issues. In this paper, we do not aim at detailing precisely their differences: a comprehensive survey of the different approaches can be found in [9]. Existing approaches like GAMA or PADAWAN (Pattern for Accurate Design of Agent Worlds in Agent Nests) are complete approaches providing various interesting features respectively including the agentification of emerging structures or the elicita- tion of interactions between agents. However, these approaches rely on a time model where the management of the potentially simultaneous actions is strongly constrained by the sequential execution of agent actions. In this paper, we investigate another approach where agent actions are separated from their consequences in the dynamic state of the simulation, using the influence/reaction principle [3]. The resulting approach, called SIMILAR (SImulations with MultI-Level Agents and Reactions), is deeply inspired by IRM4MLS [10], a multi-level extension of IRM4S [8]. The main differences between SIMILAR and IRM4MLS are the more precise and less misleading terminology and simulation algorithms, as well as a more precise and implementation-oriented model for the reaction phase (the latter is not described in this paper due to the lack of space). 6 2.1 Core concepts SIMILAR revolves around five core concepts: 1) Levels, modeling different view- points on the simulated phenomenon; 2) Agents lying in one or more levels. From each level where they lie, they perceive the state of one or more levels to decide how they wish to influence the evolution of the system; 3) the Environment modeling the topology, the local information (e.g. temperature) and the natural evolution4 of each level; 4) Influences modeling actions which effect has yet to be committed to the state of the simulation; 5) Reactions modeling how the changes depicted by the influences are committed to the state of the simulation. We note (cid:76) the levels defined for a simulation, (cid:73) the domain space of all the possible influences of the simulation and (cid:65) all possible agents of the simulation. 2.2 Heuristics SIMILAR relies on the following heuristics and choices to manage the issues raised in [ of a level l ∈ (cid:76), the agents the section 1.4. 1) During the transitory period ]t, t +d tl from (cid:65) (t, l) decide once in parallel; 2) The number of influences produced by each decision is not constrained; 3) The result of the actions is committed to the future dynamic state of a level using a reaction mechanism [3] ; 4) During the transitory [ of a level l ∈ (cid:76), the behavior of the agents is triggered slightly after period ]t, t +d tl t and the reaction occurs slightly before t + d tl ; 5) The dynamic state being read by the behavior of an agent (or of the environment) is always the most recent consistent state of the level5; 6) The actions emitted by an agent from a level l to a level k during a transitory period ]t, t +d tl [ are taken into account in the next reaction of k after the time t (i.e. the reaction occurring during the transitory period containing or starting with the time t); 7) The consistency of agent global states is attained by: i) Computing the revised global state of the agents at the beginning of the transitory period of a level (i.e. before any reaction); ii) Computing the revised global state of an agent once for all the levels starting a new transitory period at the same time; iii) Use this revised global state as the global state of the agent for the next half- consistent state of the simulation. This approach is summarized in Figure 3 2.3 Dynamic state In SIMILAR, we consider that each point of view on a phenomenon has to be em- bodied in a level l ∈ (cid:76). As a consequence, the dynamic state δ(t) of the simulation is divided in level-specific dynamic states δ(t, l). Two kind of data can be obtained from the dynamic state of a level l ∈ (cid:76): a state valuation σ(t, l), defining a valuation of the level-related properties of the agents (e.g. their location or their temperature) or the environment (e.g. an ambient temperature) and the state dynamics γ(t, l), defining the actions that were still being performed6 in that level during the observation. 4i.e. without the intervention of the behavior of an agent 5Default heuristic of SIMILAR. SIMILAR also allows the definition of user-defined disambiguation heuristics 6Actions that started before the time t and that will end after the time t 7 Figure 3: Illustration of the operation performed independently in each level (squares) and joint for all the levels (rectangles) during a simulation. The letters describe the type of the operation: Perception (P), Global state revision (M), Decision (D) and Reaction (R). Any arrow starting on a consistent dynamic state at a time t points to the revised global state used as the new global state of the agents in the half-consistent dynamic state of the time t. This example focuses on the operations performed in a simulation containing one agent lying in three levels. ∀l ∈ (cid:76),∀t ∈ (cid:84) l , δ(t, l) =< σ(t, l), γ(t, l) > (3) 2.3.1 State valuation The state valuation σ(t, l) of a level l ∈ (cid:76) is the union of the local state of the en- vironment φω(t, l) ∈ Φω, containing agent-unrelated information and a local state7 (t, l)∈ Φ a,l for each agent a ∈ (cid:65) contained in the level. φ a 2.3.2 State dynamics SIMILAR relies on the influence/reaction principle to model the actions resulting from the decision of the agents, from the natural evolution of the environment and the actions still being performed at time t. Therefore, the state dynamics γ(t, l) of a level l ∈ (cid:76) contains a set of influences. ∀l ∈ (cid:76),∀t ∈ (cid:84) l , γ(t, l)⊆ (cid:73) (4) Since the data contained in an influence are mostly domain-dependent, no specific model is attached to them. They usually contain the subjects of the action (e.g. the physical state of one or more agents) as well as parameters (e.g. an amount of money to exchange). 2.4 General behavior model The dynamic state of a simulation models a "photograph" of the simulation at time t. Motion is attained owing to the behavior of the agents, the natural action of the 7This replaces the term "physical state" from IRM4MLS, which was misleading, since that state also contains mental information like a desired speed. 8 environment and the reaction of each level to influences. 2.4.1 Behavior of the agents The behavior of an agent in a level l ∈ (cid:76) has three phases: 1) Perception: extract information from the dynamic state of the levels that can be perceived from l; 2) Global state revision: use the newly perceived data to revise the content of the global state of the agent; 3) Decision: use the perceived data and the revised global state to create and send influences to the levels that can be influenced by l. Each influence models a modification request of the dynamic state of a level. 2.4.2 Natural action of the environment The natural action of the environment is simpler than the behavior of agents: it only has one phase, where the dynamic state of the levels that can be perceived from l are used to create influences sent to one or more levels that can be influenced by l. 2.4.3 Reaction to the influences As in IRM4MLS, in SIMILAR the reaction of a level l ∈ (cid:76) is a process computing the new consistent dynamic state of l. The reaction phase occurs at the end of a transitory period ]t, t + d tl [ of a level, and is computed using the value of the most recent consistent dynamic state of l and the influences that were sent to l during the transitory period ]t, t + d tl Yet, contrary to IRM4MLS, SIMILAR provides an explicit model to the generic influences that can be found in any simulation, like the addition/removal of an agent from the simulation/a level. Such influences are called system influences, in opposition to regular influences, which are user-defined. A model is also provided to their generic reaction. These points are not detailed in this paper. [; 2.5 Formal notations and simulation algorithm Not all levels are able to interact. Therefore, the interactions between levels are con- strained by two digraphs: A perception relation graph (cid:71) influence relation graph (cid:71) I ) defines which levels can be perceived (resp. influenced) during the behav- ior of the agent/environment in a specific level. P (resp. l1, l2 ∈ (cid:71) P (resp. (cid:71) I ) ⇐⇒ An agent from l1 can perceive (resp. influence) the dynamic state of l2 The out neighborhood (cid:78) + (5) (l)) of a level l ∈ (cid:76) in the perception (resp. influence) relation graph defines the levels that can be perceived (resp. influ- enced) by l. (l) (resp. (cid:78) + P I 2.5.1 Agent behavior Since the content of the dynamic state is not trustworthy during transitory periods, the natural action of the environment and the perception of the agents are based on 9 } {u ≤ tu ∈ (cid:84) the last consistent dynamic state of the perceptible levels. This time is identified by (]t, t(cid:48)[), which models the last time when the dynamic state of a the notation f l oorl level l was consistent for a perception occurring during a transitory period ]t, t(cid:48)[. (]t, t ∀t, t (cid:48)[) = max (cid:48) ∈ (cid:84)2,∀l ∈ (cid:76), f l oorl (6) Based on these information, the perception phase of an agent a ∈(cid:65) (t, l) from a level l ∈ (cid:76) for the transitory period ]t, t+d tl This application reads the last consistent dynamic state of each perceptible level to produce the perceived data: [), k (cid:81) ∀l ∈ (cid:76),∀t ∈ (cid:84)  δf l oork l k∈(cid:78) + pe r ce pt iona,]t,t+d tl −→ (cid:80) (cid:55)−→ pa,l [ is defined as an application pe r ce pt iona,]t,t+d tl )},∀a ∈(cid:65) (t, l), \{max((cid:84) (l) ∆ k (]t, t + d tl (]t, t + d tl [,l : (7) [) a,l P l l [,l . k∈(cid:78) + P (l) In this notation, (cid:80) a models the domain space of the data that can be perceived by the agent a, from the perspective of the level l. It can contain raw data from the dynamic states, or an interpretation of these data. For instance, in a road traffic simulation, the drivers do not need to put the absolute position of the leading vehicle (i.e. raw data from the dynamic state) in their perceived data: the distance between the two vehicles is sufficient. The revision of the global state of an agent a ∈ (cid:65) (t, l) for a transitory period t) of the agent a and the perceived starting at the time t is defined as an application g l obal Reva,]t,t+d t[. This applica- tion reads the most recent consistent global state µ data pa,l the time t, in order to determine the value of the revised global state µ of the agent during the transitory period. ∀t ∈ (cid:84)\{max((cid:84))},∀a ∈(cid:65) (t), l of all the levels that started a transitory phase at (]t, t + d t[) (]t, t + d tl a a [),∀l ∈ (cid:76)t ∈ (cid:84) ×(cid:81) (t),pa,l l∈(cid:76)t∈(cid:84) a l  (cid:77) a µ (cid:80) a,l g l obal Reva,]t,t+d t[ : −→ (cid:77)  (cid:55)−→ µ [) a (]t, t + d t[) (]t, t + d tl l a a l∈(cid:76)t∈(cid:84) (]t, t+d t[) of a and the perceived data pa,l [ is defined as an application d eci siona,]t,t+d tl (8) Finally, the decision of an agent a ∈ (cid:65) (t, l) from a level l ∈ (cid:76) for the transitory period ]t, t + d tl [,l . This application [) (]t, t+d tl reads the revised global state µ computed for the level l to create the influences that will modify levels during their respective next reaction. ∀l ∈ (cid:76),∀t ∈ (cid:84) \{max((cid:84)  ×(cid:80) (]t, t + d t[), pa,l (9) If we note l eve l(i) the level at which the influence i ∈ (cid:73) is aimed, then the influence relation graph imposes the following constraint to the decision: )},∀a ∈(cid:65) (t, l), d eci siona,]t,t+d tl [) (cid:55)−→ (cid:73) −→ 2(cid:73) (]t, t + d tl (]t, t + d tl (cid:77) a µ [,l : [) a,l a,l a l l ∀l ∈ (cid:76),∀t ∈ (cid:84) \{max((cid:84) )}, i ∈(cid:73) l l [)⇒ l eve l(i)∈(cid:78) + I (l) (10) (]t, t + d tl a,l 10 As a result to this phase, each created influence i ∈ (cid:73) transitory state dynamics of k = l eve l(i), for the transitory period ]f l oork d tl (]t, t + d tl (]t, t + d tl [), f l oork [) + d tk [) is added to the (]t, t + [. a,l 2.5.2 Natural action of the environment The natural action of the environment from a level l ∈ (cid:76) for the transitory period ]t, t + d tl [,l . This application reads the last consistent dynamic state of each perceptible level to create the influences that will modify the dynamic state of the influenceable levels (during their reaction). [ is defined as an application nat u ral]t,t+d tl (cid:81) ∀l ∈ (cid:76),∀t ∈ (cid:84)  δf l oork l k∈(cid:78) + \{max((cid:84) (l) ∆ P l k (]t, t + d tl )}, nat u ral]t,t+d tl [), k k∈(cid:78) + P (l) [,l : −→ 2(cid:73) (cid:55)−→ (cid:73)ω,l (]t, t + d tl [) (11) The resulting influences are managed with the same process than the ones coming from the decisions of the agents. [ where t ∈ (cid:84) l . It is defined as an application r eac t ionl,]t,t+d tl 2.5.3 Reaction of a level The reaction of a level l ∈ (cid:76) is computed at the end of each transitory period ]t, t + [ reading the tran- d tl [, l) of the level to determine the next consistent sitory dynamic state δ(]t, t + d tl value of the dynamic state δ(t + d tl , l). ∀l ∈ (cid:76),∀t ∈ (cid:84) \{max((cid:84)  r eac t ion]t,t+d tl −→ ∆ [, l (cid:55)−→ δt + d tl , l δ]t, t + d tl )}, (12) [,l : ∆ l l l l The reaction has the following responsibilities: 1) Take into consideration the influ- [, l) to update the local state of the agents, update the local state ences of γ(]t, t + d tl of the environment, create/delete agents from the simulation or add/remove agents from the level; 2) Determine if the influences of γ(]t, t +d tl [, l) persist in γ(t +d tl , l) (if they model something that has not finished at the time t +d tl ); 3) Manage the col- liding influences of γ(]t, t + d tl [, l). 2.5.4 Simulation algorithm The simulation algorithm of SIMILAR is presented in Figure 4. It relies on the pre- sented concepts and complies with the time constraints defined in [10]. Conclusion and perspectives In this paper, we elicited several issues about time and consistency raised in multi-level simulations. There is no clear solution to theme since the notion of time consistency 11 t ←− min((cid:84)); D ←− Map<level,dynamic state> //Most recent consistent dynamic state M ←− Map<agent,memory state> //Most recent consistent global state T ←− Map<level,time interval> //Next transitory state time interval ←− Map<level,dynamic state> //Next transitory state DT ←− Map<agent,memory state> //Most recent revised global state MT for l ∈ (cid:76) do D[l]←− δ(t, l); T [l]←−]t, t + d tl DT end while t (cid:54)= max((cid:84)) do for l ∈ (cid:76) do [l]←− copy of D[l]; [; if t = end(T [l]) then D[l]←− r eac t ionT [l],l [l]←− copy of D[l]; DT T [l] =]t, t + d tl [; end for a ∈(cid:65) (t) do (DT [l]); end [a]; M[a] = copy of MT end Li ←−{l ∈ (cid:76)s t ar t(T [l]) = t}; p ←− Map<agent,Map< level, perceived data >>; A←−(cid:59); for l ∈ Li do for a ∈(cid:65) (t, l) do p[a][l]←− pe r ce pt iona,T [l],l A←− A∪{a} (D[k]) ; k∈(cid:78) + P (l) end end for a ∈ A do MT end I ←−(cid:59); for l ∈ Li do end end for i ∈ I do [a] = g l obal Reva,]t,t+d t[(M[a], p[a]); I ←− I ∪ nat u ralT [l],l for a ∈(cid:65) (t, l) do (D[k]) I ←− I ∪ d eci siona,T [l],l ; k∈(cid:78) + p (l) (MT [a], p[a]); Add i to the state dynamics of DT r i g ht(T [l]), l ∈ (cid:76) end t ←− min [l eve l(i)]; //t becomes equal to t + d t end Figure 4: The simulation algorithm used in SIMILAR among heterogeneous time models is itself ill-defined. Therefore, rather than distin- guishing the "right" or "wrong" approaches, we defined a theoretical frame giving a better understanding of the choices underlying each approach. Then, it is up to mod- elers and domain specialists to tell if these choices are appropriate or not for the study of a given phenomenon. To cope with the multi-level related issues, we introduced a meta-model named SIMILAR based on the influence/reaction principle. This model is designed to reify as much as possible the concepts involved in the abovementionned issues, thus providing a better support to the definition of explicit solutions to them. SIMILAR includes a generic and modular formal model, a methodology and a simulation API preserving the structure of the formal model. Thus, the design of simulations is in addition more robust to model revisions and relies on a structure fit to represent the intrinsic complexity of the simulated multi-level phenomena. SIMILAR has been implemented in Java and is available under the CeCILL-B li- cense. 12 It is available at http://www.lgi2a.univ-artois.fr/~morvan/similar.html. References [1] B. Camus, C. Bourjot, and V. Chevrier. Considering a multi-level model as a society of interacting models: Application to a collective motion example. Journal of Artificial Societies & Social Simulation, 18(3), 2015. [2] D. David and R. Courdier. See emergence as a metaknowledge. a way to reify emergent phenomena in multiagent simulations? In Proceedings of ICAART'09, pages 564 -- 569, Porto, Portugal, 2009. [3] J. Ferber and J-P. Müller. Influences and reaction: a model of situated multia- gent systems. In 2nd International Conference on Multi-agent systems (ICMAS'96), pages 72 -- 79, 1996. [4] J. Gil-Quijano, T. Louail, and G. Hutzler. From biological to urban cells: In Principles and Practice Lessons from three multilevel agent-based models. of Multi-Agent Systems, volume 7057 of LNCS, pages 620 -- 635. Springer, 2012. [5] A. Grignard, P. Taillandier, B. Gaudou, D. A. Vo, N. Q. Huynh, and A. Dro- goul. GAMA 1.6: Advancing the art of complex agent-based modeling and sim- ulation. In PRIMA 2013: Principles and Practice of Multi-Agent Systems, volume 8291 of LNCS, pages 117 -- 131. Springer, 2013. [6] A. Hjorth, B. Head, and U. Wilensky. Levelspace netlogo extension. http: //ccl.northwestern.edu/rp/levelspace/index.shtml, 2015. [7] T. Huraux, N. Sabouret, and Y. Haradji. A multi-level model for multi-agent based simulation. In Proc. of 6th Int. Conf. on Agents and Artificial Intelligence (ICAART), 2014. [8] F. Michel. The IRM4S model: the influence/reaction principle for multiagent based simulation. In Proc. of 6th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS), pages 1 -- 3, 2007. [9] G. Morvan. Multi-level agent-based modeling - a literature survey. CoRR, abs/1205.0561, 2013. [10] G. Morvan, A. Veremme, and D. Dupont. IRM4MLS: the influence reaction model for multi-level simulation. In Multi-Agent-Based Simulation XI, volume 6532 of LNCS, pages 16 -- 27. Springer, 2011. [11] S. Picault and P. Mathieu. An interaction-oriented model for multi-scale simula- tion. In Proc of the 22nd Int. Joint Conf. on Artificial Intelligence, pages 332 -- 337. AAAI Press, 2011. [12] D-A. Vo. An operational architecture to handle multiple levels of representation in agent-based models. PhD thesis, Université Paris VI, 2012. 13
1204.0634
1
1204
2012-04-03T09:27:26
Multi-level agent-based modeling with the Influence Reaction principle
[ "cs.MA" ]
This paper deals with the specification and the implementation of multi-level agent-based models, using a formal model, IRM4MLS (an Influence Reaction Model for Multi-Level Simulation), based on the Influence Reaction principle. Proposed examples illustrate forms of top-down control in (multi-level) multi-agent based-simulations.
cs.MA
cs
Multi-level agent-based modeling with the Influence Reaction principle Gildas Morvan, Daniel Jolly Univ. Lille Nord de France 1bis rue Georges Lef`evre 59044 Lille cedex, France LGI2A, U. Artois, Technoparc Futura 62400 B´ethune, France. email: first [email protected] Abstract This paper deals with the specification and the implementation of multi-level agent-based models, using a formal model, IRM4MLS (an In- fluence Reaction Model for Multi-Level Simulation), based on the Influ- ence Reaction principle. Proposed examples illustrate forms of top-down control in (multi-level) multi-agent based-simulations. Keywords: multi-level simulation, influence reaction model, micro-macro link, cellular automata. 1 Introduction Four main theoretical issues emerge in the literature on multi-level1 agent-based modeling: the conception of a meta-model allowing a non ambiguous charac- terization of a multi-level model at the conceptual level [18, 23, 29, 33], the introduction of a dynamic level of detail [25, 31], the detection and reification of emergent phenomena [2, 3, 5, 21, 30, 34] and the representation of aggregated entities [27]. This paper focuses on the first one, with respect to the Influence Reaction (IR) principle, shortly, action as a two step process: (1) agents pro- duce "influences", i.e., individual decisions, according to their internal state and 1The term multi-scale may also be found. Intuitively, a level and scale are similar concepts In the following we that both mean viewpoint. However, this notion should be clarified. assume that two agents are not at the same scale iff they represent processes that have different spatial and/or temporal extents. Two agents are not in the same level iff they cannot interact directly, i.e., with a single interaction function. It should follow from the previous definitions that it exists multi-scale models that are mono-level and conversely. 1 perceptions (2) the system "reacts", i.e., computes the consequences of influ- ences, according to the state of the world [10]. This model has been extended in several ways, and notably for multi-agent based-simulation (MABS), by adding an explicit representation of time [19]. An IR-based meta-model, IRM4MLS (an Influence Reaction Model for Multi-Level Simulation), and its Java imple- mentation are introduced in the section 2. Using, and then extending a simple example: the Conway's game of life, two toy-models of increasing complexity are presented in the section 3, illustrating forms of top-down control in (multi-level) MABS. Results are discussed in the section 4. 2 IRM4MLS: an Influence Reaction Model for Multi-Level Simulation In this section, IRM4MLS, an Influence Reaction Model for Multi-Level Sim- ulation, is introduced [23]. It extends IRM4S (an Influence Reaction Model for Simulation) in order to deal with multi-level models [19]. From a technical perspec- tive, levels can be viewed as interacting IRM4S simulations2. A multi-level model is defined by a set of levels L and a specification of the relations between levels. Two types of relations are specified: an influence relation (agents in a level l are able to produce influences in a level l(cid:48) (cid:54)= l) and a perception relation (agents in a level l are able to perceive the dynamic state of a level l(cid:48) (cid:54)= l), represented by directed graphs denoted respectively < L, EI > and < L, EP >, where EI and EP are two sets of edges, i.e., ordered pairs of elements of L. Influence and perception relations in a level are systematic and thus not specified in EI and EP (cf. eq. 1 and 2). The in and out neighborhood in < L, EI > (respectively < L, EP >) are denoted − I and N + N I (resp. N ∀l ∈ L, N − P and N + − I (l) (resp. N P ) and are defined as follows: P (l)) = {l} ∪ {l − (cid:48) ∈ L : l (cid:48) l ∈ EI (resp. EP )}, (1) ∀l ∈ L, N + P (l)) = {l} ∪ {l (cid:48) ∈ L : ll (cid:48) ∈ EI (resp. EP )}, I (l) (resp. N + (2) The set of agents in the system at time t is denoted A(t). ∀l ∈ L, the set of agents belonging to l at t is denoted Al(t) ⊆ A(t). An agent belongs to a level iff a subset of its physical state φa belongs to the state of the level. Thus, an agent belongs to zero, one, or more levels. An environment models the natural dynamics of level properties and can be shared by different levels (fig. 1). is a tu- ple < σl(t), γl(t) >, where σl(t) ∈ Σl and γl(t) ∈ Γl are the sets of environmen- tal properties and influences of l. The behavior of an agent a ∈ Al is defined as Decisionl The dynamic state of a level l ∈ L at time t, denoted δl(t) ∈ ∆l, a ◦ M emorizationa ◦ P erceptionl a, with (cid:89) ∆lP (cid:55)→ (cid:89) P erceptionl a : P lP a , (3) lP ∈N + P (l) lP ∈N + P (l) 2Therefore, each level has a microscopic side: the agent behaviors, and a macroscopic side: the reaction function. This aspect can also be found in holonic multi-agent systems [4]. 2 (cid:89) (cid:89) a : Sa (cid:55)→ (cid:89) lP ∈N + l∈La∈Al lI∈N + I (l) P (l) a × Sa (cid:55)→ Sa, P lP ΓlI (cid:48) . (4) (5) M emorizationa : Decisionl N aturall (6) (7) There is no memorization function specific to a level to preserve the coherence of the internal state of the agents. The environment ω of a level l produces influences through a function: ω : ∆l (cid:55)→ (cid:89) ΓlI (cid:48) . The reaction function computes next level state and time advance: lI∈N + I (l) Reactionl : Σl × Γl(cid:48) (cid:55)→ ∆l × Tl. cation) [35]. T = (cid:83) The time representation is inspired by DEVS (Discrete EVent System specifi- l∈L{Tl} denotes the time vector of the simulation, such as ∀l ∈ L, Tl =< tl, dtl >, where tl represents when the current event (or step, de- pending on the simulation model) time and dtl its lifespan. The final simulation time is denoted tf . The algorithm 1 ensures the scheduling of these different functions with respect to temporal constraints of perception and memorization, influence production and reaction [23]. The implementation of IRM4MLS is based on the idea of micro kernel, taken from MadKit3 [13]. Thus, in this approach, a technical agent, e.g., an observer or a message broker, would be scheduled with respect to the IR principle (cf. algo. 1), the concept of level ensuring a clear separation between system and simulation agents. The API is minimal (seven high-level abstractions) and specifies only the methods needed to schedule a model (fig. 2). Most methods are generic and then are imple- mented at an abstract level. Basically, to implement a model one only has to override perception, memorization, influence production, reaction and initialization functions. Agent and behaviors (such as environment and natural dynamics) are represented by different entities to clearly distinguish the core side of an agent, its state and mem- orization function, and the level sides (perception and influence production functions) that can change according to simulations. 3http://www.madkit.org 0..n agent 0..n 0..n environment 1 1..n 0..n level Figure 1: Main concepts of IRM4MLS (as a simplified class diagram) 3 Algorithm 1: simulation model of IRM4MLS Input: < L, EI , EP >, A, δ, T, tf Output: δ(tf ) 1 while ∃tl ≤ tf do foreach a ∈ A(t) do foreach l ∈ L : a ∈ Al(t) ∧ ∀lP ∈ N + a(< δlP (tlP ) : lP ∈ N + P (l), tl ≥ tlP do P (l) >); pa(tl) = P erceptionl end sa(tl + dtl) = M emorizationa(pa); 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 foreach lI ∈ N + end foreach l ∈ L : ∀lI ∈ N + (cid:48)(tlI ) = N aturall γlI foreach a ∈ Al(t) do ω ω(δl(tl)) ; I (l), tl ≤ tlI ∨ tl + dtl < tlI + dtlI do I (l) : tl ≤ tlI ∧ tl + dtl > tlI do (cid:48)(tlI ) = Decisionl γlI a a(sa(tl + dtl)); end end γl(cid:48)(t) = {γl(t)(cid:83) end foreach l ∈ L : tl + dtl ∈ min(t + dt) do a∈AlI (cid:48)(t)}; <δl(tl + dtl), Tl >= Reactionl(σl(tl), γl(cid:48)(tl)); (cid:48)(t)(cid:83) I (l) γlI − lI∈N γlI a ω end 19 20 end 3 IRM4MLS in practice: multi-level games of life 3.1 Introducing a macroscopic parameter (top-down con- trol) In this section, a toy IRM4S (or 1-level IRM4MLS) model, is presented: a modified agent-based version of the Conway's game of life (or simply Life). This simple example illustrates where a macroscopic parameter, should (but should not) be introduced in an agent-based model that relies on the influence reaction principle: in the reaction function (but not in the behavioral functions of agents). Therefore, this parameter has a non-ambiguous semantics that does not depend on the updating scheme of the simulations, even in the case of strong interaction 4. Each agent represents a cell that can be dead or alive and that has eight neighbors 4Strong interaction implies that agents agree on the outcome of the interaction [20]. Thus, such model should not be simulated with a STRIPS-like meta-model, i.e., that views an action as a change of the state of the system. It would lead to problems of result replication [1], but also of parameter and result interpretation [8, 20]. 4 kernel <<interface>> Simulation +void runSimulation(String logFile) +void init() +List<Agent> getAgents() +List<Level> getLevels() +Time getInitialTime() +Time getFinalTime() <<interface>> Natural +Map<Level,Map> natural() 1..* 1..* <<interface>> Environment 0..* 0..* <<interface>> Agent 0..* 1..* +Map<Level, Natural> getLevels() 1 1..* <<interface>> Level +Map<Level, Behavior> getLevels() +void memorize() 0..* 0..* 1..* 1..* <<interface>> Behavior +List<Agent> getAgents() +Environment getEnvironment() +List<Level> getPerceptibleLevels() +List<Level> getInfluenceableLevels() +DynamicState getDynamicState() +void reaction() 1 1 <<interface>> DynamicState +void perceive() +Map<Level,Map> decision(List<Level> li) +Map getTemporaryInfluences() +void addTemporaryInfluences(Map influences) +Time getTime() +Time getNextTime() Figure 2: Java API of IRM4MLS in a toroidal grid. The set of environmental properties is then: {neighbors(a), alive(a)}. ∀t, σ(t) = (cid:91) a∈A (8) Cells evolve in parallel: the reaction function can then simply be defined as "ap- plying agent influences" (algo. 2). If a cell is dead and has three living neighbors or is alive and has two or three living neighbors, it will be alive at the next step; in other cases, it will be dead. Let specify the behavior of the agents: 1. they perceive the number of living cells in their neighborhood (algo. 3), 2. memorize their internal state, i.e., their next state (algo. 4), 3. and then, decide whether or not they will be alive at the next step according to their internal state (algo. 5). The environment is static: there is no natural dynamics and thus, N aturalω returns ∅. One cruel and ironic aspect of Life is that a cell has generally little chance to remain alive in the long run (fig. 3(a)). Moreover, what you get most of the time, 5 Algorithm 2: Reaction Input: σ(t), γ(cid:48)(t) Output: δ(t + 1) alive(a) = γ(cid:48) 1 foreach a ∈ A(t) do a(t) ; 2 3 end Algorithm 4: M emorizationa Input: pa(t), sa(t) Output: sa(t + dt) 1 if alive(a) ∧ pa(t) ∈ {2, 3}∨ 2 ¬alive(a) ∧ pa(t) ∈ {3} then sa(t + dt) = 1 ; sa(t + dt) = 0 ; 3 4 else 5 6 end Algorithm 3: P erceptiona Input: δ(t) Output: pa(t) (cid:88) 1 pa(t) = n∈neighbors(a) alive(n) ; Algorithm 5: Decisiona Input: sa(t + dt) Output: γ(cid:48) a(t) = sa(t + dt) ; a(t) 1 γ(cid:48) is a board composed of small still lifes and 1-period oscillators. This behavior is predictable knowing the λ parameter of the game of life5. λ is a complexity measure of cellular automata introduced by [15] that depends on the number of cell states K, the neighborhood N and the number n of transitions to a quiescent state Sq in the transition function such as with K = 2, N = 9 and n =(cid:0)8 (cid:1) + 2 ·(cid:80) λ = 1 − n K N , i=0,1,4−8 (cid:0)8 (cid:1) for Life. i 2 To improve λlif e to a value λ+, one needs to change the rules. In this example, λ+ is regarded as a macroscopic parameter, explicitly introduced in the model and independent from cell behaviors6: influences of dying cells are not taken into account by the reaction function with a probability p such as n =(cid:0)8 (cid:1) + (2 − p) · (cid:88) 2 (cid:0)8 (cid:1). i i=0,1,4−8 (9) (10) Thus, their is a simple linear relation between p and λ+: p = (λ+ − λlif e)/0.3359. For λ+ ∈ [0.48, 0.6], the number of dying cells tends to decrease in time and large structures of vertical or horizontal rows eventually emerge, shaped by moving groups of switching state cells that seem to work at their boundaries, and eventually vanish when the board becomes a dense still life of density ≈ 0.5 (fig. 4). 5λlif e = 0.2734375. For λ ≈ 0.25, "structures of period 1 appear. Thus, there are now three different possible outcomes for the ultimate dynamics of the system, depending on the initial state. The dynamics may reach a homogeneous fixed point consisting entirely of state Sq, or it may reach a heterogeneous fixed point consisting mostly of cells in state Sq with a sprinkling of cells stuck in one of the other states, or it may settle down to periodic behavior" [15, p. 17]. 6An other macroscopic parameter, the asynchrony, has been previously introduced in Life is such way [9]. 6 2 / ρ σ ± ¯ρ 0.5 0.4 0.3 0.2 0.1 0 2 / ρ σ ± ¯ρ 0.5 0.4 0.3 0.2 0.1 0 0 200 400 600 800 1000 step 0 200 400 600 800 1000 step (a) Macroscopic level (b) Mesoscopic level Figure 3: Dynamics of the density of living cells, ρ, starting from a random grid with 100 replications (a) Macroscopic dynamics: expected density and variabil- ity of living cells in the whole grid. (b) Mesoscopic dynamics: expected density and variability of living cells in 10 × 10 cell clusters. 3.2 Top-down feedback control In the previous example, while the macroscopic parameter λ+ has an influence on agents, it is not related to the state of the system and therefore, there is no need to observe it. The reaction function can then be viewed as an open-loop controller. In the next example, a top-down feedback control is introduced. The goal of the multi-scale model presented in this section is to keep Life boards at the desired density (ρ+), by controlling the proportion of dying cells at the mesoscopic level, to account for the natural variability of density between regions of the grid (fig. 3(b)). Moreover, the control should affect as less as possible simulations at the microscopic level and, to keep it simple, should be tuned by a single linear parameter such as λ+ in the previous model. Two levels are considered: the cell (or microscopic) level, lm and the cell region (or mesoscopic) level, lM . At the mesoscopic level, the model properties are the expected density and the cells in each region: ∀t, σlM (t) = {ρ+} (cid:91) {cells(alM )}. (11) alM ∈AlM The cells behave according to the game of life rules (algo. 3, 4 and 5). However, Reactionlm depends on mesoscopic influences (algorithm 6). EP and EI are equal to {lM lm}. Mesoscopic agents have a proportional control behavior. They 1. perceive the density of living cells in a region, 2. memorize their internal state, i.e., the difference  between expected and actual densities, 3. and then decide the influence sent to agents of lm: ∀alM ∈ AlM∀alm ∈ cells(alM ), command(alm ) = kP · . (12) 7 s p e t s f o r e b m u n 20000 18000 16000 14000 12000 10000 8000 0.45 0.5 0.55 0.6 0.65 λ+ (a) Convergence conditions (b) Simulation example Figure 4: (a) Mean number of steps needed to converge to a steady state starting from a random grid (100 replications), simulations are stopped after 2 · 104 steps (simulations converge in the dark area). (b) Example of still life found for λ+ = 0.5. Algorithm 6: Reactionlm Input: σlm(t), γlm(cid:48)(t) Output: δlm(t + 1) 1 foreach alm ∈ alm do rand ∈ [0, 1[ from pseudorandom uniform distribution ; if command(alm) > rand ∧ alive(alm) ∧ ¬γ(cid:48) alm (tlm) then 2 3 4 5 6 alive(alm) = (cid:62) ; alive(alm) = γ(cid:48) else alm (tlm) ; end 7 8 end The kP parameter has to be carefully tuned to run realistic simulations: too small simulations do not achieve the desired solution (¯ρ = ρ+), too big the board density tends to oscillate around ρ+ and the number of micro influences not taken into account by Reactionlm becomes too important. However, for appropriate kP values, this simple linear controller achieves good results and allows to find a good compromise between conflicting micro and meso knowledge (fig. 5). 4 Conclusion 4.1 Discussion An important issue of multi-level agent-based modeling, only briefly discussed here, is to define the adequate methodology. Indeed, the traditional MABS methodology is purely bottom-up: microscopic knowledge is used to construct models while macro- 8 0.2 0.15 0.1 0.05 0 r (%) ρ+ ρ 0 200 400 600 800 1000 step (a) ρ+ = 0.07 0.2 0.15 0.1 0.05 0 r (%) ρ+ ρ 0 200 400 600 800 1000 step (b) ρ+ = 0.09 Figure 5: Simulation examples with kP = 10·ρ+ and initial density ρ(t0) = 2·ρ+. r represents the rate of microscopic influences not taken into account (in %) by Reactionlm. scopic knowledge is used to validate models [6]. Thus, it seems irrelevant in a multi- level context. Three general conclusions can be drawn from the previous examples: • a parameter should be introduced at its observation level in the model; therefore, each observed level should be explicitly represented in the model, • an intuitive way to model an external control on a level l is to modify the reaction function of l, i.e., to modify the way influences of agents of l are taken into account (but not agent behavioral functions), according to external influences; an external feedback control implies both observation and influence relations: N • such a controller can be viewed as a technical tool that aims to find a compro- mise between conflicting knowledge from the different studied levels and achieve realistic simulations from different studied points of view [16]. − I (l) = N − P (l), Pattern oriented modeling (POM) consists in "the multi-criteria design, selection and calibration of models of complex systems" [12]. Many aspects of this methodology, developed in the context of ecology, seem particularly relevant for multi-level agent- based models since "patterns" are generally observed at different levels of organization in complex systems. However, the problem is far from being solved. For instance, the introduction of a dynamic level of detail raises several questions regarding, e.g., the validation of the model or the representation of composite agents [25, 27]. A case study of three real world multi-level agent-based models reveals other interesting methodological issues [11]. 4.2 Related works At least three works could be related to this one: • ML-DEVS is an extension of DEVS that allows the simulation of multi-level models (and not only coupled models in which the behavior of a model is deter- mined by the behaviors of its sub-models) [33]. Two types of relation between 9 levels are defined: information propagation and event activation which are quite similar to those defined in IRM4MLS. However, ML-DEVS supports only pure hierarchies of models, i.e., interaction graphs are viewed as trees [18]. DEVS, as a generic event-based simulation framework, has also been extended to support agent-based models [24]. A major design difference between IR and DEVS based approaches is the technical orientation of the latter leading to an important gap between conceptual and computational models. • PADAWAN (Pattern for Accurate Design of Agent Worlds in Agent Nests) is a multi-scale agent-based meta-model based on a compact matricial repre- sentation of interactions: IODA (Interaction-Oriented Design of Agent simula- tions) [14, 29]. Moreover, authors analyze the structure of what is called here interaction graphs in multi-scale models (a relevant issue for IRM4MLS as well), and conclude they should be viewed as upper semilattices and not simply trees as suggested elsewhere. A major design difference between IR and IODA based approaches is that the latter constraints the definition of interactions, leading to a simple but restrictive simulation framework. • GAMA7 is a MABS platform with a dedicated modeling language, GAML, that offers multi-level capabilities [32]. Moreover, it includes a framework (a set of predefined GAML commands) to agentify emerging structures [34]. It is certainly the most advanced platform, from an end-user point of view, that integrates a multi-level approach. 4.3 Perspectives The main perspectives of this work concern the implementation of existing works with IRM4MLS: • the concept of PolyAgent [26, 28], • multi-level organizational models widely used in engineering sciences such as holonic multi-agent systems (cf. footnote 2), system of systems and heterarchical control [4, 17, 22], • multi-scale tools: generic scaling operators and emergence detection and reifica- tion algorithms [3, 25]. Moreover, the first model presented in this paper could be used to explore the relations between computational capabilities of a cellular automaton (λ+), noise (a function of λ+ − λ) and entropy. Moreover, finding the conditions under which cells arrange themselves in a steady state could be an interesting way to solve heuristically large instances of the maximum density still life problem [7]. The second model illustrates a form of simple proportional top-down feedback control. Such approach could be generalized to model more complex of cross-level feedback control, using integrations and derivates of observed variables. References [1] Bigbee, A., Cioffi-Revilla, C., Luke, S.: Replication of sugarscape using mason. In: Terano, T., Kita, H., Deguchi, H., Kijima, K. (eds.) Agent-Based Approaches 7http://code.google.com/p/gama-platform/ 10 in Economic and Social Complex Systems IV, Agent-Based Social Systems, vol. 3, pp. 183 -- 190. Springer (2007) [2] Caillou, P., Gil-Quijano, J.: Simanalyzer : Automated description of groups dy- namics in agent-based simulations. In: Proc. of 11th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2012) (2012) [3] Chen, C.C., Clack, C., Nagl, S.: Identifying multi-level emergent behaviors in agent-directed simulations using complex event type specifications. Simulation 86(1), 41 -- 51 (2010) [4] Cossentino, M., Gaud, N., Hilaire, V., Galland, S., Koukam, A.: Aspecs: an agent-oriented software process for engineering complex systems. Autonomous Agents and Multi-Agent Systems 20(2), 260 -- 304 (2010) [5] David, D., Courdier, R.: See emergence as a metaknowledge. a way to reify emergent phenomena in multiagent simulations? In: Proceedings of ICAART'09. pp. 564 -- 569. Porto, Portugal (2009) [6] Drogoul, A., Vanbergue, D., Meurisse, T.: Multi-agent based simulation: Where are the agents? In: Sichman, J., Bousquet, F., Davidsson, P. (eds.) Multi-Agent- Based Simulation II, Lecture Notes in Computer Science, vol. 2581, pp. 1 -- 15. Springer (2003) [7] Elkies, N.: The still-life density problem and its generalizations. Voronoi's Impact on Modern Science, Book I. Proceedings of the Institute of Mathematics of the National Academy of Sciences of Ukraine 21, 228 -- 253 (1998) [8] Fat`es, N., Chevrier, V.: How important are updating schemes in multi-agent systems? an illustration on a multi-turmite model. In: Proc. of 9th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2010). vol. 1, pp. 533 -- 540 (2010) [9] Fat`es, N.: Does "life" resist asynchrony? In: Adamatzky, A. (ed.) Game of Life Cellular Automata, pp. 257 -- 274. Springer (2010) [10] Ferber, J., Muller, J.P.: Influences and reaction: a model of situated multiagent systems. In: 2nd International Conference on Multi-agent systems (ICMAS'96). pp. 72 -- 79 (1996) [11] Gil-Quijano, J., Louail, T., Hutzler, G.: From biological to urban cells: Lessons from three multilevel agent-based models. In: Desai, N., Liu, A., Winikoff, M. (eds.) Principles and Practice of Multi-Agent Systems, Lecture Notes in Computer Science, vol. 7057, pp. 620 -- 635. Springer (2012) [12] Grimm, V., Railsback, S.: Pattern-oriented modelling: a 'multi-scope' for predic- tive systems ecology. Philosophical Transactions of the Royal Society B: Biological Sciences 367, 298 -- 310 (2012) [13] Gutknecht, O., Ferber, J.: The madkit agent platform architecture. In: Agents Workshop on Infrastructure for Multi-Agent Systems. pp. 48 -- 55 (2000) [14] Kubera, Y., Mathieu, P., Picault, S.: Interaction-oriented agent simulations: From theory to implementation. In: Proc. of the18th European Conf. on Artificial Intelligence (ECAI'08). pp. 383 -- 387 (2008) [15] Langton, C.: Computation at the edge of chaos: Phase transitions and emergent computation. Physica D: Nonlinear Phenomena 42(1-3), 12 -- 37 (1990) 11 [16] Li, J., Ge, W., Zhang, J., Kwauk, M.: Multi-scale compromise and multi-level correlation in complex systems. Chemical Engineering Research and Design 83(6), 574 -- 582 (2005) [17] Maier, M.: Architecting principles for system of systems. Systems Engineering 1(4), 267 -- 284 (1998) [18] Maus, C., John, M., Rohl, M., Uhrmacher, A.: Hierarchical modeling for com- putational biology. In: Bernardo, M., Degano, P., Zavattaro, G. (eds.) Formal Methods for Computational Systems Biology, Lecture Notes in Computer Sci- ence, vol. 5016, pp. 81 -- 124. Springer (2008) [19] Michel, F.: The IRM4S model: the influence/reaction principle for multiagent based simulation. In: Proc. of 6th Int. Conf. on Autonomous Agents and Multi- agent Systems (AAMAS 2007). pp. 1 -- 3 (2007) [20] Michel, F., Gouaıch, A., Ferber, J.: Weak interaction and strong interaction in agent based simulations. In: Multi-Agent-Based Simulation III, Lecture Notes in Computer Science, vol. 2927, pp. 43 -- 56. Springer (2003) [21] Moncion, T., Amar, P., Hutzler, G.: Automatic characterization of emergent phenomena in complex systems. Journal of Biological Physics and Chemistry 10, 16 -- 23 (2010) [22] Morvan, G., Dupont, D., Soyez, J.B., Merzouki, R.: Engineering hierarchical complex systems: an agent-based approach -- the case of flexible manufactur- ing systems. In: Service Orientation in Holonic and Multi Agent Manufacturing Control, Studies in Computational Intelligence, vol. 402. Springer (2012) [23] Morvan, G., Veremme, A., Dupont, D.: IRM4MLS: the influence reaction model for multi-level simulation. In: Bosse, T., Geller, A., Jonker, C. (eds.) Multi-Agent- Based Simulation XI, Lecture Notes in Artificial Intelligence, vol. 6532, pp. 16 -- 27. Springer (2011) [24] Muller, J.P.: Towards a formal semantics of event-based multi-agent simulations. In: David, N., Sichman, J. (eds.) Multi-Agent-Based Simulation IX, Lecture Notes in Computer Science, vol. 5269, pp. 110 -- 126. Springer Berlin / Heidelberg (2009) [25] Navarro, L., Flacher, F., Corruble, V.: Dynamic level of detail for large scale agent-based urban simulations. In: Proc. of 10th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2011). pp. 701 -- 708 (2011) [26] Parunak, H.: Pheromones, probabilities and multiple futures. In: Multi-Agent- Based Simulation XI, Lecture Notes in Artificial Intelligence, vol. 6532, pp. 44 -- 60. Springer (2011) [27] Parunak, H.: Between agents and mean fields. In: Multi-Agent-Based Simulation XII, Lecture Notes in Artificial Intelligence, vol. 7124. Springer (2012) [28] Parunak, H., Brueckner, S.: Concurrent modeling of alternative worlds with polyagents. In: Multi-Agent-Based Simulation VII, pp. 128 -- 141. Lecture Notes in Computer Science, Springer (2007) [29] Picault, S., Mathieu, P.: An interaction-oriented model for multi-scale simulation. In: Twenty-Second International Joint Conference on Artificial Intelligence (2011) [30] Pr´evost, G., Bertelle, C.: Detection and reification of emerging dynamical ecosys- tems from interaction networks. In: Complex Systems and Self-organization Mod- elling, Understanding Complex Systems, vol. 39, pp. 139 -- 161. Springer (2009) 12 [31] Soyez, J.B., Morvan, G., Merzouki, R., Dupont, D., Kubiak, P.: Multi-agent multi-level modeling -- a methodology to simulate complex systems. In: Proceed- ings of the 23rd European Modeling & Simulation Symposium (2011) [32] Taillandier, P., Vo, D.A., Amouroux, E., Drogoul, A.: GAMA: A simulation platform that integrates geographical information data, agent-based modeling and multi-scale control. In: Desai, N., Liu, A., Winikoff, M. (eds.) Principles and Practice of Multi-Agent Systems, Lecture Notes in Computer Science, vol. 7057, pp. 242 -- 258. Springer (2012) [33] Uhrmacher, A.M., Ewald, R., John, M., Maus, C., Jeschke, M., Biermann, S.: Combining micro and macro-modeling in devs for computational biology. In: Pro- ceedings of the 39th conference on Winter simulation. pp. 871 -- 880 (2007) [34] Vo, D.A., Drogoul, A., Zucker, J.D., Ho, T.V.: A modelling language to represent and specify emerging structures in agent-based model. In: Desai, N., Liu, A., Winikoff, M. (eds.) Principles and Practice of Multi-Agent Systems, Lecture Notes in Computer Science, vol. 7057, pp. 212 -- 227. Springer (2012) [35] Zeigler, B., Kim, T., Praehofer, H.: Theory of Modeling and Simulation. Aca- demic Press, 2nd edn. (2000) 13
0912.2826
1
0912
2009-12-15T09:28:33
An iterative approach for generating statistically realistic populations of households
[ "cs.MA", "cs.CY" ]
Background: Many different simulation frameworks, in different topics, need to treat realistic datasets to initialize and calibrate the system. A precise reproduction of initial states is extremely important to obtain reliable forecast from the model. Methodology/Principal Findings: This paper proposes an algorithm to create an artificial population where individuals are described by their age, and are gathered in households respecting a variety of statistical constraints (distribution of household types, sizes, age of household head, difference of age between partners and among parents and children). Such a population is often the initial state of microsimulation or (agent) individual-based models. To get a realistic distribution of households is often very important, because this distribution has an impact on the demographic evolution. Usual techniques from microsimulation approach cross different sources of aggregated data for generating individuals. In our case the number of combinations of different households (types, sizes, age of participants) makes it computationally difficult to use directly such methods. Hence we developed a specific algorithm to make the problem more easily tractable. Conclusions/Significance: We generate the populations of two pilot municipalities in Auvergne region (France), to illustrate the approach. The generated populations show a good agreement with the available statistical datasets (not used for the generation) and are obtained in a reasonable computational time.
cs.MA
cs
An iterative approach for generating statistically realistic populations of households Floriana Gargiulo1,*, Sônia Ternes1,2, Sylvie Huet1, Guillaume Deffuant1 1 LISC, Cemagref, Clermont Ferrand,France 2 Embrapa Agricultural Informatics, Campinas - SP, Brazil *[email protected] Abstract Background Many different simulation frameworks, in different topics, need to treat realistic datasets to initialize and calibrate the system. A precise reproduction of initial states is extremely important to obtain reliable forecast from the model. Methodology/Principal Findings This paper proposes an algorithm to create an artificial population where individuals are described by their age, and are gathered in households respecting a variety of statistical constraints (distribution of household types, sizes, age of household head, difference of age between partners and among parents and children). Such a population is often the initial state of microsimulation or (agent) individual-based models. To get a realistic distribution of households is often very important, because this distribution has an impact on the demographic evolution. Usual techniques from microsimulation approach cross different sources of aggregated data for generating individuals. In our case the number of combinations of different households (types, sizes, age of participants) makes it computationally difficult to use directly such methods. Hence we developed a specific algorithm to make the problem more easily tractable. Conclusions/Significance We generate the populations of two pilot municipalities in Auvergne region (France), to illustrate the approach. The generated populations show a good agreement with the available statistical datasets (not used for the generation) and are obtained in a reasonable computational time. 1 Introduction With the increasing computing power, researchers tend to develop models which include more and more diversity and details. A considerable effort has been made, both in academic and corporate research, to generate modelling frameworks simulating policy impacts on complex dynamics: from traffic studies [1] to epidemic diffusion [2,3,4,5], to policy impact studies [6,7,8,9]. These approaches require using various sources of data, detailed at local level to test scenarios with different policies (for instance mitigation strategies) and analyse their impact. For instance, an increasing research effort targets the simulation of epidemic evolution: starting from SARS [3], to the new virus of Influenza A (H1N1) [10]. Many different simulations, at global level or at local level aim at providing precise forecast on the number of infected, with the actuation of different containment strategies. One can expect that such tools become more and more commonly used to support political decisions. Many models consider populations with an explicit representation of each individual or of the household structures. These individuals are characterised by some state variables (e.g. age, profession, marital status), and often a spatial position. Two main types of modelling approaches can be identified in the literature - Microsimulation and dynamical Individual Based Models (IBMs) 1 1: The microsimulation approach defines individual economic and social trajectories through a set of events which occur with given probabilities, generally neglecting interactions between individuals. It provides a mechanism to analyse the effects of policy changes at the level of the decision making units as individuals and households. Individual based models (IBMs) consider the same type of population but generally include more elaborated models of decisions and actions, where individuals take into account the interactions with their environment and other individuals. In both cases, the dynamics of the whole system is given by the aggregation of all individual behaviours. Hence these modelling approaches are often used to explore the link between the micro and macro dynamics. For instance models of evolving human populations yield demographic patterns in geographical space, which can be compared with census-based data [11]. In both approaches, the first step for the simulation is to initialize the system with a realistic population: the state variables defining the agents or the individuals, must replicate, as closely as possible, the statistical properties of the targeted population. In particular, the demographic evolution must take into account the structure of the distribution of households. Indeed, for the same age structure of the population, different household structures evolve differently. If individual data were available about the household structure, the problem would be solved quickly by creating a one to one correspondence between the agents and the real persons. However, such a situation rarely occurs, because the institutes managing statistics usually provide aggregated datasets, describing the global properties of the households and individuals. Therefore we must use these aggregate data to generate the artificial sets of individuals and households. This paper focuses on the specific case of generating a population distributed in households to initialise a dynamical microsimulation model for the PRIMA project. PRIMA – Prototypical Policy Impacts on Multifunctional Activities in Rural Municipalities – is a European project (FP7-ENV- 2007) which aims to model the impact of European policies on land use at municipality level in a set of case study regions. Hence in this project, the microsimulation process represents a population of individuals at municipality level, living in households of different types. Once generated, the initial synthetic population evolves through different processes such as birth, death, marriage, divorce, leaving parental house, getting a job and retirement. The quality of the final results depends heavily on the accuracy with which the initial synthetic population represents the available real data. According to the literature, there are two approaches commonly used to create a synthetic population. In the first approach, some data at individual level are used to create the synthetic population. For instance in the SVERIGE model [9], the whole population of Sweden in 1990 is the starting population, and large longitudinal data sets are used for estimation of many equations for the demographic process. In a similar way, DYNAMOD [12] is a dynamic model designed to project population characteristics over a 50-year period, using a 1% sample. A second approach uses the Iterative Proportional Fitting [13] to estimate the joint probability of characteristics belonging to different sets of aggregated data. This approach is used in the SMILE model [6] where the synthetic population is generated from Census of Small Area Population Statistics (SAPS) in 1996 in Ireland, considering characteristics as gender, age, employment status and industry, for a given group of the population in a specific location. IPF can be applied when the Census data, describing the aggregate properties of individuals and households, are integrated with individual 1 Sometimes they are also called "agent based models", because the individuals represent economic or social agents. But there is an ambiguity with a different research trend of "agent based models", more related to computer science, which investigates computer agents that cooperate for achieving some tasks, for instance foraging on the internet. To avoid this ambiguity, we prefer to use the expression "Individual Based Models", which originally comes from modelling in ecology. 2 data, extracted by surveys on samples that can be bigger or smaller than the size of the desired artificial population. Thus, the initialization process consists in finding the good weight to attribute to each sub-element of the analyzed sample to make it representative of the objective population. Some methods to solve the up-scaling or downscaling initialization problem, with stochastic and deterministic approaches, are described in [14,15,16,17,18] In our problem, individual data to cross with the aggregate properties are not available. This situation does not allow us to apply the IPF method. Moreover computing the joint probability of characteristics of households, including size, type and age of members, implies heavy computations. In this paper, we propose an iterative semi-stochastic algorithm, involving a sequence of stochastic extractions, which considerably decreases the computational cost of the population generation. This algorithm uses only aggregated datasets from Census, and the missing crossings between the data are obtained through testing procedures. The algorithm is adjusted for data from the Auvergne region (France), but the general concept can be easily adapted to different uses. The next section describes the details of the problem to solve. Section 3 describes the available data in Auvergne region, as well the attributes of the synthetic population to be generated. The iterative algorithm is described in detail in section 4. Sections 5 and 6 present the results and conclusions. 2 Materials and Methods 2.1 General Formulation of the problem The classical generation approach only considers one micro level (individuals or households). The specificity of this work is that we need to respect statistical constraints on the distribution of the individual ages, the distribution of household size and the distribution of individual ages within households. More precisely our problem is to generate a set of households comprising individuals taken in a distribution of age of the population, and which respect all the constraints we found in the data about the distributions of: - sizes and types of households, - ages of the head of the household, - differences of age between partners, - ages of children according to mother's age. Let us call: • t the type of household, the values of t can be: 'single', 'couple', 'single-parent', 'complex'; • s the size of the household, the values of s can be: 1, 2, 3, 4, 5, >5; • ar the age of the head of the household; • a1, …, as-1 the age of the children of single-parent households; • ar' , the age of the head's partner, and a1, …, as-2, the age of the children for couple households (ai ) generally represents the list of the ages of the household members. • In a first approach we would suppose that we are able to compute a good approximation of the probability of a given household P(t, s, (ai)) (a possible method to compute these probabilities is described in section 2.3). Then, a straightforward way to proceed is described in algorithm 1. Algorithm 1: 3 1. Generate all possible households, considering all possible combinations of types, sizes and ages of members; 2. Associate with each of these households, defined by the values of (t, s, (ai)), the probability P(t, s, (ai)); 3. Generate a void list H. Repeat, until the size of H reaches the expected number of households: a. Pick a household generated in step 1 according to its probability associated in step 2; b. Add the household to list H. 4. Return H. This algorithm shows a significant drawback. Although the average on a large runs of this algorithms of the distribution of age will be close to the data, one can expect significant differences between the age distribution of a specific run and the data. Since the data about the distribution of ages are reliable in our problem, we would like to keep it as precise as possible in our approach. This leads to algorithm 2, where we use the list of ages of individuals directly taken from the data, and a probability of household P'(t, s, (ai)), independently from the distribution of ages in the population: Algorithm 2: 1. Generate a population of individuals following the age structure of the population. Let us call it the list I = { aj} (to each element of the list an age is associated); 2. Generate all possible households, considering all possible combinations of types, sizes and ages of members; 3. Associate with each of these households, defined by the values of (t, s, (ai)), the probability P'(t, s, (ai)) of the household, independently from the age distribution of the population; 4. Generate a void list H. Repeat, until list I is void or a number N of iterations is reached: a. Pick a household h generated in step 2 according to its probability P'(t, s, (ai)); b. If ages (ai) are included in I then remove them from I and copy household h in H. 5. Return H. With algorithm 2, we guarantee to keep the final distribution of individual ages close to the data. Generating the list of individuals following the age structure of the population is straightforward. The Census data of 1990 [19], the starting point at which we initialize the model for the Auvergne region, chosen in the PRIMA project as a pilot region to be studied, provides the age distribution for the population at municipality level. Two municipalities are chosen to test the algorithm: Abrest, which was composed by 964 households with a total population of 2545 individuals, and Bellerive- sur-Allier, composed by 8530 individuals organized in 3520 households. The choice of these municipalities was made arbitrary, considering the difference of sizes, for testing the algorithm. These data, displayed in Figure 1, allow us to generate directly the list I of individuals following the age structure of the population. Simply, going through all the age brackets, and for each one, we add to the list the corresponding number of individuals. However, the other steps of the algorithms involve several difficulties: • To evaluate the probability of a given household. This will be addressed in section 2.2. • To manage the complexity of the set of all possible households. This will be addressed in section 2.3. In general, the algorithm leaves some individual ages unused at the end, and generates a smaller number of households than expected (because of the impossibility to find the necessary individuals to fit the drawn households). This is also addressed in section 2.3 • 4 2.2 Calculating the probability of a household Census data, [19], provide also some information about households: the size distribution, the age distribution for people living alone (single households) and the age distribution of the head of the household. Figures 2 to 4 show those available data for the two municipalities. From those data, we can calculate the probability of each household. Data of figure 2 provide us with P(s), the probability of having a household of size s. Data of figure 3 provide us with P(ar s=1), the probability of age range of the head for households of size 1 (single). Data of figure 4 together with data of figure 3, provide with P(ar s>1), the probability of age range of the head for households of size superior to 1. Data of figure 5 provide us with P(t ar = α), the probability of a household type given the age of the head equals α, and the probability P(child a = α) for a individual of age α to live in a household without being the head or the partner (this means, as a "child"2). Involving this constraint is very important to avoid to get households with very old parents (e.g. 90 years) and old children (around 70). Clearly these data at local level are not sufficient to characterize a household. We lack constraints on the distribution of ages inside a given type of household. Hence we used some data at national level about the age structure inside the households regarding the ages of parents on one hand, and the ages of children on the other hand. Figures 6 and 7 show the national level data that we use to calculate the probability of the structure of ages, [20,21]. Data of figure 6 provide us with P(ar' ar = α), the probability of the age of the head's partner, given the age of the head. From data of figure 7, we can derive P((ai) am = α, s = σ) the probabilities of children ages knowing the number of children and that the age of the mother is α. We consider that in couple households, the mother is the partner, and in single-parent households, the head is the mother. We can now use these partial probabilities to evaluate the probability of a given household P(t, s, (ai)). We must distinguish cases 'single', 'single-parent', 'couple': = P(s=1)* P(ar s=1) P'(t='single', s , ar) P'(t='singlep', s, ar, (ai)) = P(s= σ)* P(ar s>1)*P('singlep' ar)* Π P(ai ar) P(child ai) P'(t='couple', s, ar, ar', (ai)) = P(s= σ))* P(ar s>1)*P('couple' ar)*P(ar'' ar) * Π P(ai ar') P(child ai) This evaluation theoretically allows us to apply the approach of algorithm 2. However, to generate all the combinations of households and picking one according to these probabilities is computationally expensive. In the next section, we propose an iterative algorithm which is more efficient computationally. 2 That is the definition of "child" for the French Census managed by INSEE 5 2.3 An iterative algorithm avoiding to generate all possible households The principle of the algorithm is to build progressively the household, by picking its member(s) according to the previously described probabilities, and, for each new member, to test if there is an individual of this age in the list of individuals I. If not, we stop the process for this household and begin to build another one. The flux diagram describing the process is represented in Figure 8. The algorithm consists of five main steps (see algorithm 3). Algorithm 3 1. Pick the size of the household according to P(s); 2. Pick the age range of the head according to P(ars). If there is no individual in I of the age range, the process is stopped and a new attempt for building a household is launched. Otherwise an individual of the chosen age range is added to the household, and removed from list I; 3. If s > 1, pick a household type ('couple' or 'single-parent') according to P(tar). “Complex” households are not considered at this stage. 4. If t = 'couple', pick the age of the partner according to P(ar''ar). Again, if there is no individual in I of the chosen age range, then the household is abandoned, the head is put back to list I, and a new attempt to build a household is launched. Otherwise an individual of the chosen age range is added to the household and remove from list I; 5. We pick the age of children with probability P(ai ar)*P(child ai) for single-parent and P(ai ar')*P(child ai) for couples. Again, for each child, if there is no individual in I of the chosen age range, then the household is abandoned, its members put back to list I, and a new attempt to build a household is launched. Otherwise an individual of the chosen age range is added to the household and removed from list I. This process is equivalent to pick one household according to its evaluated probability, and keeping it if all the ages of its members are present in list I. Indeed, the process of picking the different members of the household leads to the same overall probability to pick a household, and since the attempt is cancelled as soon as one age is lacking in list I, it changes nothing to make these tests iteratively. Moreover, we can constrain even more the process by considering the list of household sizes which is directly derived from the data. The rest of the process remains the same. Then we are sure to have the right number of households, even though when algorithm 3 stops, some void households remain in the list. Indeed, the described algorithm should a priori be repeated until all the households of the list are filled with all the individuals of the availability vector. However, this situation is never reached and after the creation of almost all the households, the program reaches a point where no more households can be achieved given the remaining individuals. For this reason, when this situation is reached, the algorithm is stopped. The remaining households can be considered as “complex structures”, namely all the housing solutions that cannot be placed into the usual categorization of household type (single, couple, single-parent). A complex household can be, for example, a group of students occupying the same dwelling or two familiar groups sharing the same location. Therefore, since we do not have any information about these structures from the data sets, to conclude the generation of the artificial population, the complex households are filled randomly with the remaining individuals in the availability list. 6 3 Results We tested the algorithm for two different municipalities in Auvergne: Abrest and Bellerive-sur- Allier. The first one had a population of 2545 inhabitants in 1990, while the second one had 8530. In the following we compare the statistical properties of the artificial population with the real Census data. We use for the comparison both the data implicitly used in the building algorithm and other national and municipality level data, which were not used in the generation process. We calculate the distributions both for one single realization of the system and for a sequence of 100 realizations (the random nature of the algorithm leads to some variations from one run to the other). By construction of the algorithm, the age distribution and the size distribution of the household are directly derived from the data for the two villages. In Figure 9 we show the distributions of the age of head for real data and the artificial population. The distribution of the age of head was used inside the generation process, but the stochastic extractions from this distribution were spaced out from various tests; for this reason we can expect some discrepancy between the real data and the generated population. As we can observe in Figure 9, the artificial population respects quite well the real distribution. In Figure 10, we compare the obtained artificial population with the real distribution of number of children in households. This particular data set was not used in the generation, so the comparison can give an idea of the accuracy of the algorithm; this data set is reported in Table 1. Also in this case we can observe a good agreement between the real data and the simulations. The final comparison (Figure 11) regards the household typology. For this comparison we will not use directly the data that we have used in the generation (the probability for a person to be in a certain type of household) but another dataset containing the direct proportions of household types at national level. This dataset is reported in Table 2. In this case the differences from the real data, for both municipalities, are quite significant. It could be expected: the data we are using in this case for the comparison are at national data, and therefore keep into account of the population of metropolitan areas. The discrepancy between our results and the national data, therefore, do not highlight an error in the generating process, but show the behavioural difference between metropolitan area and rural villages, with small population. Moreover, it is noticeable that the data reported in the previous graph provide relevant information about the complex households. We lack completely this information at village level and therefore we cannot use any constraint on complex households in the building procedure. In the proposed algorithm, complex households are created randomly, grouping together the individuals that the generating procedure cannot assign to a household according to the selection/test mechanism. Nevertheless, we observe that the proportion of complex households that we obtain is close to the data at national level. Finally, we need to stress that this kind of algorithm is strictly correlated to the data structure we have: for Auvergne region such as for France and most of occidental countries the main household structures are based on the concept of “nuclear family”: a couple of parents and a certain number of children, or a subset of this structure. In some other cultures the basic household can have completely different structure (for example many generations sharing the same dwelling), and therefore this kind of approach can give rise to potential bias without any additional information about the structure of complex households. 7 4 Conclusion In this paper we proposed an algorithm for the generation of a synthetic population organized in households that can be applied in various modeling contexts. This method gives good results without using a set of prototypical households that, in many cases, are not available. This is an advantage compared with existing methods such as IFT. Moreover it allows one to reproduce exactly some features of the real population that are particularly important for the subsequent analysis. This algorithm is a practical implementation of a general approach where the households are picked according to their probability, among all the possible household structures. The method builds the households iteratively. It tests the availability of the age of its members at each step, and backtracks as soon as an age is lacking. This saves a lot of computations. We presented the example of the PRIMA project, where the artificial population is needed as initialization of a dynamical microsimulation model at municipality level. We showed that the algorithm yields a good agreement between the statistics of the artificial population and the real one. Clearly, the approach can be adapted to other cases where it is necessary to generate a population organized in households. During the project, we shall have to adapt it to other sets of data that can be found in different case study regions. The algorithm can deal with other properties of the individuals and of the households. For instance, we could add a gender variable to describe the individuals of our example. We would need to split the list I of individuals of different ages into two lists, one for males and one for females. Moreover, we would need to include the percentage of household where the head is a male and about the percentage of heterosexual couples. Then the principle of the method remains the same. The only difference is that to build the households, we pick either in the list of males or in the list of females. More generally, after the set-up of the demographical structure, other characteristics can be assigned to each individual, through stochastic extractions or deterministic associations: the level of instruction, the professional activity, the favorite recreational activities, the commuting pattern, etc. According to the available datasets, these properties can be assigned to each individual independently from the household in which it is embedded, or some correlations can be considered inside the same household. Acknowledgment This publication has been funded under the PRIMA (Prototypical policy impacts on multifunctional activities in rural municipalities) collaborative project, EU 7th Framework Programme (ENV 2007-1), contract no. 212345. References 1. Nagel K, Beckman RL, Barrett CL. TRANSIMS for transportation planning; 1999. 2. Colizza V, Barrat A, Barthelemy M, Valleron A, Vespignani A (2007) Modeling the worldwide spread of pandemic influenza: Baseline case and containment interventions. PLoS Medicine 4: 95. 3. Colizza V, Barrat A, Barthélemy M, Vespignani A (2007) Predictability and epidemic pathways in global outbreaks of infectious diseases: the SARS case study. BMC medicine 5: 34. 4. degli Atti MLC, Merler S, Rizzo C, Ajelli M, Massari M, et al. (2008) Mitigation measures for 8 pandemic influenza in Italy: an individual based model considering different scenarios. PLoS One 3. 5. Eubank S, Guclu H, Anil Kumar VS, Marathe MV, Srinivasan A, et al. (2004) Modelling disease outbreaks in realistic urban social networks. Nature 429: 180-184. 6. Ballas D, Clarke GP, Wiemers E (2005) Building a dynamic spatial microsimulation model for Ireland. Population, Space and Place 11: 157-172. 7. Ballas D, Clarke GP, Wiemers E (2006) Spatial microsimulation for rural policy analysis in Ireland: The implications of CAP reforms for the national spatial strategy. Journal of Rural Studies 22: 367-378. 8. Gotts NM, Polhill JG, Law ANR (2003) Aspiration levels in a land use simulation. Cybernetics and Systems 34: 663-683. 9. Holm E, Holme K, Mäkilä K, Mattson-Kauppi M, Mörtvik G (2004) The microsimulation model SVERIGE; content, validation and applications. SMC, Kiruna, Sweden (www sms kiruna se). 10. Balcan D, Hu H, Goncalves B, Bajardi P, Poletto C, et al. (2009) Seasonal transmission potential and activity peaks of the new influenza A (H 1 N 1): a Monte Carlo likelihood analysis based on human mobility. BMC Medicine 7: 45. 11. Mahdavi B, O'Sullivan D, Davis P. An agent-based microsimulation framework for investigating residential segregation using census data. In: Oxley LaK, D., editor; 2007. pp. 365-371. 12. King A, Baekgaard H, Robinson M (1999) DYNAMOD-2: An overview. Technical Paper 19. 13. Norman P (1999) Putting iterative proportional fitting on the researcher's desk. WORKING PAPER-SCHOOL OF GEOGRAPHY UNIVERSITY OF LEEDS. 14. Ballas D, Clarke G, Dorling D, Rossiter D (2007) Using SimBritain to model the geographical impact of national government policies. Geographical Analysis 39: 44. 15. Ballas D, Kingston R, Stillwell J, Jin J (2007) Building a spatial microsimulation-based planning support system for local policy making. Environment and Planning A 39: 2482- 2499. 16. Birkin M, Turner A, Wu B. A synthetic demographic model of the UK population: methods, progress and problems; 2006. 17. Smith DM, Clarke GP, Harland K (2009) Improving the synthetic data generation process in spatial microsimulation models. Environment and Planning A 41: 1251–1268. 18. Williamson P, Birkin M, Rees PH (1998) The estimation of population microdata by using data from small area statistics and samples of anonymised records. Environment and Planning A 30: 785-816. 19. INSEE (1990) French Population Census of 1990. Centre Maurice Halbwarchs, 48 Boulevard Jourdan, Paris. 20. Eurostat (1999) Demography, fecondity data for 1999. 21. INSEE (1990) Enquête sur l'étude de l'histoire familiale de 1999. Centre Maurice Halbwarchs, 48 Boulevard Jourdan, Paris. 9 Figures Figure 1: Histogram of the number of individuals according to various age ranges of 5 years each for Abrest and Bellerive-sur-Allier. Source: INSEE, French Census data, 1990. Figure 2: Histogram of the number of households according to their size (number of individuals in the household) in Abrest and Bellerive-sur-Allier. Source: INSEE, French Census data, 1990.. 10 Figure 3: Histogram of the number of households according to the age ranges of person living alone in Abrest and Bellerive-sur-Allier. Source: INSEE, French Census data, 1990.. Figure 4: Histogram of the number of households according to the age ranges of the head in Abrest and Bellerive-sur-Allier. Source: INSEE, French Census data, 1990. 11 Figure 5: Histogram of the number of individuals of age > 15 according to different age ranges, from the top to the bottom, living as partners in couple, as head in single-parent households or living with parent(s) in Abrest and Bellerive-sur-Allier. Source: INSEE, French Census data, 1990 12 Figure 6: Histogram of the number of couples according to their difference of ages in France in 1999. Source: INSEE, “Enquête sur l'étude de l'histoire familiale de 1999”. Figure 7: distribution of live births by birth order and mother's age range in France. Source: Eurostat Data 1999. 13 Figure 8: Flux diagram describing the algorithm for the generation of an artificial population for PRIMA project Figure 9: Histograms for age of head distribution for the municipality of Abrest (left plot) and of Bellerive-sur-Allier (right plot). The light purple bars represents the real data, the dark purple bars the average for 100 realizations for the artificial population. The error is the standard deviation on the 100 replicas. 14 Figure 10: Histograms for age number of children distribution for the village of Abrest (left plot) and of Bellerive-sur-Allier (right plot). The light purple bars represents the real data, the dark purple bars the average for 100 realizations for the artificial population. The error is the standard deviation on the 100 replica. Figure 11: Histograms for the household type distribution for the village of Abrest (left plot) and of Bellerive-sur-Allier (right plot). The light purple bars represents the real data, the dark purple bars the average for 100 realizations for the artificial population. The error is the standard deviation on the 100 replica. Tables 15 Type Household without child Household with one child Household with two children Household with three children Household with four or more children ABREST BELLERIVE 1316 360 192 580 444 156 120 48 16 44 Table 1: Distribution of households according to the number of children for the municipalities Abrest and Bellerive sur Allier. Source: INSEE, French Census data, 1990. Type Table 2: Distribution of households according to the type in France. Source: INSEE, 1990. Single Single-parent Couple Couple with Children Complex Proportion 0,2720 0,0660 0,2370 0,3640 0,0610 16
1705.09838
1
1705
2017-05-27T16:38:35
Applying Artificial Intelligence and Internet Techniques in Rural Tourism Domain
[ "cs.MA" ]
Society has become more dependent on automated intelligent systems, at the same time, these systems have become more and more complicated. Society's expectation regarding the capabilities and intelligence of such systems has also grown. We have become a more complicated society with more complicated problems. As the expectation of intelligent systems rises, we discover many more applications for artificial intelligence. Additionally, as the difficulty level and computational requirements of such problems rise, there is a need to distribute the problem solving. Although the field of multiagent systems (MAS) and distributed artificial intelligence (DAI) is relatively young, the importance and applicability of this technology for solving today's problems continue to grow. In multiagent systems, the main goal is to provide fruitful cooperation among agents in order to enrich the support given to all user activities. This paper deals with the development of a multiagent system aimed at solving the reservation problems encountered in rural tourism. Due to their benefits over the last few years, online travel agencies have become a very useful instrument in planning vacations. A MAS concept (which is based on the Internet exploitation) can improve this activity and provide clients with a new, rapid and efficient way of making accommodation arrangements.
cs.MA
cs
APPLYING ARTIFICIAL INTELLIGENCE AND INTERNET TECHNIQUES IN RURAL TOURISM DOMAIN Cristina TURCU, Cornel TURCU "Stefan cel Mare" University of Suceava 13, University Street, Suceava, 720225, Romania, tel.: +40-230-522978 e-mails: {cristina, cturcu}@eed.usv.ro Abstract Society has become more dependent on automated intelligent systems; at the same time, these systems have become more and more complicated. Society's expectation regarding the capabilities and intelligence of such systems has also grown. We have become a more complicated society with more complicated problems. As the expectation of intelligent systems rises, we discover many more applications for artificial intelligence. Additionally, as the difficulty level and computational requirements of such problems rise, there is a need to distribute the problem solving. Although the field of multiagent systems (MAS) and distributed artificial intelligence (DAI) is relatively young, the importance and applicability of this technology for solving today's problems continue to grow. In multiagent systems the main goal is to provide fruitful cooperation among agents in order to enrich the support given to all user activities. This paper deals with the development of a multiagent system aimed at solving the reservation problems encountered in rural tourism. Due to their benefits over the last few years, online travel agencies have become a very useful instrument in planning vacations. A MAS concept (which is based on the Internet exploitation) can improve this activity and provide clients with a new, rapid and efficient way of making accommodation arrangements. Introduction Tourism is sometimes believed to be a remedy for the development of rural areas [1]. Especially in the northern part of Romania where forestry and agriculture has lost their importance with respect to the number of people employed tourism based on natural resources, rural tourism is seen as the solution or part of the solution for creating jobs and a viable socio-economic situation. Over the last few years, travel agencies have taken great pride in providing both individuals & companies with the highest quality service and cost effective savings when planning business or vacation travel arrangements. Constantly changing airfares and schedules, thousands of available vacation packages, and a vast amount of travel information on the Internet can make travel planning frustrating and time-consuming. To sort out the many travel options, tourists and business people often turn to travel agents, who assess their needs and help them make the best possible travel arrangements. In general, travel agents give advice on destinations and make arrangements for transportation, hotel accommodations, car rentals, tours, and recreation. For international travel, agents also provide information on customs regulations, required papers (passports, visas, etc), and currency exchange rates. Travel agents consult a variety of published and computer-based sources for information on departure and arrival times, fares, and hotel ratings and accommodations. So a travel agency has become a full service organization that handles travel plans from start to finish. But in the Internet ages the personal computers can be used as private travel agencies. An online travel agency is more convenient than a traditional one because there are many advantages using it: many hotel searching and reservation services are on the web, which can offer online information about accommodation conditions and prices; also time schedules for air, sea, railway and ground transportation are available (all) over the world; no appointments and face to face meetings with travel agent are necessary. That's what a person gets when using the online services of the travel agency Web site. With a click of a mouse, one can access many travel agency benefits and services 24 hours a day, 365 days a year. One important aspect in the rural tourism domain is related to booking. Traditional booking enforces the use of telephone or fax. Due to the several attempts to make a contact the first method is unsatisfactory. Also the fax method is characterized by large time delay. Using web based applications the booking process may be substantially improved. But the access to information is efficient when one knows where to find the information s/he is looking for. However, this task becomes complex when the information source is unknown. The complexity considerably increases when one does not know the type of information useful for his or her purpose and has only limited knowledge of the information sources put at his or her disposal without mentioning the fact that the arrangement and use of these sources can considerably vary from one to another. Thus, it becomes necessary either to ease the task of information retrieval, or to provide the users with some automation mechanisms [6]. Multiagent systems An agent is a software entity that applies Artificial Intelligence techniques to choose the best set of actions to perform in order to reach a goal specified by the user. It should react in a flexible, proactive, dynamic, autonomous and intelligent way to the changes produced in its environment. A multiagent system [8, 9] may be defined as a collection of autonomous agents that communicate between themselves to coordinate their activities in order to be able to solve collectively a problem that could not be tackled by any agent individually. In the last years it has been argued that multiagent systems may be considered as the latest software engineering paradigm [2, 7]. This kind of systems may be used in domains with the following features [5]:  Knowledge is distributed in different locations.  Several entities, while keeping their autonomous behaviour, have to join their problem-solving abilities to be able to solve a complex problem.  The problems in the domain may be decomposed in different sub-problems, even if they have some kind of inter-dependencies. Due to the similarities with rural tourism domain the conclusion is that the multiagent systems seem to be adequate to be used in booking process. A multiagent system in rural tourism domain During a booking process the user access a lot of distributed information sources that are now available on electronic supports. So it is necessary to create some tools to be used in retrieval information. To be efficient, such tools must be able to assess the context of an information request. The questions to be answered are the following: Who is the user? For what purpose is the research being undertaken? What are the relevance and quality of the retrieved information [3, 4]? Obviously the implementation of an intelligent system can improve the whole booking process. Automated computer reservation systems may provide clients with instant access to thousands of guesthouse offers. Thus, clients can choose the best price and the fastest way of reaching their destination. Furthermore, one of the most important functions of this system would be the obtainment of best offers from guesthouses. Due to the rapid distribution of all travel information and the complexity of the planning process, intelligent systems can reduce the allocated time to a client and increase service quality. In the last few years many guesthouses were built in the Romanian area. A lot of them are included into a national network named ANTREC1. Due to geographical distribution of the information one of the major problems occurres during the booking process. The development of an intelligent system requires the assessment of the agency's most important function: the client's request, alternatives to accommodation, notification on accommodation alternatives, reservation and payment. The temporal distribution of the reservation steps is presented in figure 1. Figure 1. Reservation – temporal distribution agents: The system will be able to provide the following services:  The user may ask for a reservation satisfying certain preferences (e.g. those guesthouses that are located in a particular area, price, facilities etc.).  The user is able to access his/her historical record. The proposed multiagent architecture is presented in figure 2. It consists in the following types of  Personal agent: Each personal agent represents a human user. The personal agent trustfully keeps information such as user profile and reservations made and is responsible for asking for possible bookings, in compliance with the users' preferences. It also controls the access of the user interface agent to the services provided by MAS, by avoiding direct communication with other agents.  User interface agent: The user interface agent provides a graphical interface of the MAS with the user. This interface is used to introduce the requirements of a search or to show the results of a query to the user. It is necessary to define personalized interfaces that permit an easy, flexible and customizable access to the information the user need. 1 ANTREC is a non-profit association that identifies, develops and promotes Romanian rural hospitality and tourism. Alternatives to acommodation Notification on alternatives Reservation & payment Client Request Registration Registration  National agent: it receives the users' preferences and sends a request to the zonal agents; also it receives all possible reservations and sends a classification to the personal agent.  Zonal agent: For each zone there is one zonal agent and several guesthouse agents. The ZA has the general information of the guesthouses (e.g. its address, telephone number etc.).  Guesthouse agent: It is one guesthouse agent for each guesthouse of a system. This agent could be executing in the desktop computer of each guesthouse. A guesthouse agent can encapsulate a web site, which provides reservation services (it access a database). It would also have a graphical interface that allows the personnel to update the information and request specific information from the database etc. Figure 2. Multiagent system architecture (PA-Personal Agent, UIA-User Interface Agent, NA-National Agent) Usually the system receives a user's request parameters set. These parameters refer to location wanted, number of persons, arrival & departure days, number of rooms wanted (single/double/triple), maximum price and other required facilities. If a guesthouse matchs the user's preferences then the correspondent guesthouse agent will send an accepting message to ZA. The facilities of the guesthouse are presented in figure 3. Figure 3. Guesthouse facilities A possible reservation (from a zonal point of view) determination is presented in figure 4. In the represented situation the zonal agent ZA1 receives the user's preferences and a request id (which is used as a parameter in all ask messages) from national agent. It will ask the guesthouse agents (GA1_1, GA1_2,…) for possible reservations. GA1_3 does not match the user's preferences and send a sorry message to ZA1. The GA1_2 agent does match the preferences and will send a tell message to ZA1 about a possible reservation. The GA1_1 agent does not match the preferences but it's possible to ask GA1_2 and GA1_3 for collaboration (for example, GA1_1 cannot make a reservation for all the period requested by the user). GA1_2 already made a reservation proposal (it checks id request) and will send a sorry message to GA1_1. If GA1_3 can complete the period and match the user's preferences it will send a tell message to ZA1. So ZA1 has two possible reservations: one from GA1_2 and another one from GA1_1 in collaboration with GA1_3. The NA agent will receive all reservation proposals that meet the user's preferences from all zonal agents. After that it will reason about all of them and make a classification depending on one or more criteria (for example the price). The user will chose the best proposal and will initiate the booking process sending a Guesthouse agent (GA) Zonal agent (ZA) NA PA UIA message to the proper GA (through the MAS chain). If the user specifies a requested zone, the entire reservation process will be made without NA participation. This implies the occurrence of direct communication between PA and ZA agents. Figure 4. The reservation determination process The system guarantees a secure access to information records, so that only authenticated users are allowed to update the information. There is a two-level security mechanism:  Using a security plug-in of JADE (Java Agent Development Environment), JADE-S, all the messages between the agents in the system are encoded using SSL.  The JADE-S module also allows the definition of different types of agents, and the assignment of different permissions to each kind of agent. For example, a personal agent cannot access directly any of the other agents in the system; it only has permissions to send and receive messages from national agent or zonal agent. To ask information users may use diverse information technology. So, this system can be developed by considering the following easy and flexible communication ways: SMS messages through mobile phones, standard e-mail messages from a PC etc. In this case, it is necessary to add a new agent, named Communication Manager Agent. This agent is responsible of dealing with different types of information technologies. For example, the user might carry Personal Digital Assistants (PDAs) when they are on the way. We have also considered the possibility of attaching an intelligent agent to the PDA, who could request the information and send it wirelessly to the communication manager agent. The communication manager agent, after receiving the answer to the query could send this information to the agent permanently running in the PDA of a user. Conclusions Due to the distribution of information the booking process in rural tourism domain is actually quite difficult. A solution is represented by a multiagent system approach. The multiagent system model seems to be the adequate framework for dealing with the design and development of an application, which is flexible, adaptable to the environment, versatile and robust enough to supply the booking process with efficiency and reliability. The benefits of the system would reach two kinds of users:  Citizens that need tourism information, who could obtain any kind of information related to the guesthouses of a given zone and make a reservation.  Guesthouses personnel, who could access and update the guesthouse's information. References [1]. Hall, C.M. & J. M. Jenkins, "The policy dimensions of rural tourism and recreation", In R. Butler, C.M. Hall and J. Jenkins (eds.) Tourism and Recreation in Rural Areas (pp. 19-42). Chichester: Wiley, 1998 [2]. Jennings, N., "On agent-based software engineering", Artificial Intelligence 117, 2000 [3]. King, J.A., "Intelligent Retrieval", AI Expert, 10.1, January, 15–17, 1995 [4]. King, J.A., "Intelligent Agents: Bringing Good Things to Life", AI Expert, February, 17–19, 1995 [5]. Moreno, A., "Agents applied in health care", Guest editorial, AI Commun 16(3):135-137, 2003 [6]. Pelletier, S., Pierre, S., Hoang, H., "Modeling a Multiagent System for Retrieving Information from Distributed Sources", Journal of Computing and Information Technology - CIT 11, 1, 1–10, 2003 [7]. Petrie, C., "Agent-based software engineering", in: Agent-Oriented Software Engineering, 2001 [8]. Weiss, G., "Multiagent systems. A modern approach to Distributed AI", M.I.T. Press, 1999 [9]. Wooldridge, M., "An introduction to Multi Agent Systems", Wiley Ed., 2002 ask(user's preferences) NA ZA1 Cases ask(user's preferences) sorry(cause) tell(GA1_2 match) ask(collaboration) SUSPENDED Requested accommodation GA1_1 GA1_2 GA1_3 [sorry(cause)] tell(GA1_3 match) tell(GA1_1 match collab) tell(GA1_2, GA1_1 collab) NA
cs/9903017
1
9903
1999-03-28T20:46:49
SIMMUNE, a tool for simulating and analyzing immune system behavior
[ "cs.MA" ]
We present a new approach to the simulation and analysis of immune system behavior. The simulations that can be done with our software package called SIMMUNE are based on immunological data that describe the behavior of immune system agents (cells, molecules) on a microscopial (i.e. agent-agent interaction) scale by defining cellular stimulus-response mechanisms. Since the behavior of the agents in SIMMUNE can be very flexibly configured, its application is not limited to immune system simulations. We outline the principles of SIMMUNE's multiscale analysis of emergent structure within the simulated immune system that allow the identification of immunological contexts using minimal a priori assumptions about the higher level organization of the immune system.
cs.MA
cs
SIMMUNE, a tool for simulating and analyzing Immune System behavior ∗ M. Meier-Schellersheim, G. Mack II.Institut fur Theoretische Physik Universitat Hamburg† August 6, 2018 Abstract We present a new approach to the simulation and analysis of immune system (IS) behavior. The simulations that can be performed with our software package called SIMMUNE are based on immunological data that describe the behavior of IS agents (cells, molecules) and the IS's challengers (bacteria, viruses) on a microscopical (i.e. agent-agent interaction) scale by defining cellular stimulus response mechanisms. All processes within the simulated IS are based on these mechanisms. Since the behavior of the agents in SIMMUNE can be very flexibly configured, its application is not limited to IS simulations. We outline the principles of SIMMUNE's multiscale analysis of emergent struc- ture within the simulated IS that allow the identification of immunological con- texts using minimal a priori assumptions about the higher-level organization of the IS. Keywords: analysis. immune system simulation, locally interacting agents, multiscale 1 Introduction For quite a long time immunological research limited itself mainly to the inves- tigation of molecular details of cellular mechanisms within the immune system (IS). The structure of immune responses was believed to be rather simple: Upon infection of the organism IS agents had to 'recognize' the foreign material that caused the infection, the pathogen, with highly specific receptors and then re- move everything within the organism that would bind to these receptors. To ∗Work supported by Deutsche Forschungsgemeinschaft and by the German Israeli Foun- dation for Scientific Research and Development (GIF) †email [email protected], [email protected] 1 make this principle work, the IS only had to ensure that it did not produce receptors complementary to components of host organism. From this point of view, developing a vaccine against some kind of disease thus simply meant searching for the right (harmless) fragment of the pathogen that could be presented to the IS as an antigen (a substance that provokes an im- mune response). Having recognized this fragment once, the IS would memorize this knowledge through maintaining a large enough number of the right recep- tors and then upon contact with the real pathogen roll out its arsenal of defense quickly enough to avoid a spreading of the pathogen within the organism. In many cases vaccine development is more complicated. The IS normally looks for more than just one signal (the antigen) before it produces a full response. Given that the IS can hardly rule out every receptor that fits to material of the own organism without crippling its own functionality because of the degeneracy of receptors 1 it is understandable that it should ask for more information. (For a mathematical discussion of the problem of immune receptor specificity see for example [1].) Providing the right adjuvans, the biochemical context within which the antigen is seen by the IS, is important. Adjuvants often contain fragments of classical pathogens, i.e. pathogens the organism and its ancestors have been accustomed to for a long time. Being confronted to these pathogen fragments the IS more readily switches into 'defense mode'. Unfortunately, within certain contexts the IS readily accepts the organism's own material as antigenic. Autoimmune diseases like diabetes are examples where the IS, once it finds itself in a certain context, attacks its own host. Cohen [2] formulated the cognitive paradigm postulating that cognitive abilities - enabling the IS to select its response according to the context of the presenta- tion of antigen - were an indispensable ingredient of IS behavior. Grossman [4] explained why we should investigate the IS's context recognition and proposed some models for appropriate cell behavior. Segel and Bar-Or [5] investigated the question how the IS's cells might be able to optimize their contribution to immune responses with the help of feedback mechanisms and compared the IS to other systems of decentralized organizing agents. Segel [6] also presented the idea of a diffuse informational network of cytokines encoding the molecular context the IS finds itself in. Atlan and Cohen [7] pointed out that the IS must achieve the ability to extract -- in a cognitive process -- meaning from the wealth of information its cells gather via their re- ceptors. Often, the term 'recognition' in an immunological sense refers to the ability of the IS to provide receptors that can bind to the surface of foreign material with high enough affinity to direct an effective immune response against this mate- rial. Recognition of this kind comes down to the question whether molecular 1IS receptors usually fit to more than just one single molecular structure. The neccessity to be able to provide receptors to virtually any (foreign) molecular structure the IS might get confronted to, prevents the IS from destroying every receptor that fits to the material of its host organism. 2 shapes are complementary while the ability to act context dependent requires the IS's agents to mutually coordinate the processing of the molecular signals which they receive from their milieu. How could the IS's information processing work to achieve context recognition? What is the nature of the context, that make the IS respond in a protective (or harmful) manner? How is the IS provided with the specific context that would activate an immune response to some threatening disease? To be able to start answering these questions, we need to investigate how the agents of the IS exchange information, how they influence each other's states, how their reactions to combined signals differ from their reactions to these sig- nals when occurring at different times. Further, what is the spatial scope of specific signals, i.e., do they influence only their direct neighborhood or do they spread over larger areas of the organism? The software package SIMMUNE which we want to introduce here was designed to facilitate simulations dealing with these questions. SIMMUNE simulates the IS on the agent level, i.e. on the level of interactions between cells and molecules. The analysis that is performed on the simulations, however, operates on multiple scales; this is described in section 3.4. Application of the approach of identifying immunological contexts by multiscale analysis to more elaborate simulations will be described in a forthcoming publication [15]. In section 2 we will briefly describe some of the classical methods of IS modelling to be able to point out the differences and similarities between them and the approach presented here. In section 3 our software package SIMMUNE will be introduced. We will give an overview over its structure and present some simple examples of SIMMUNE applications, as well as some of the methods to analyze the simulations. Section 3 concludes with some remarks on the limitations of the current version of SIMMUNE. In section 3.3.2 we will describe some immunological mechanisms as far as they are implemented in the example simulations. Descriptions of immunological mechanisms refer to the way they are implemented in the simulations which we present here. In those cases where they differ fundamentally from their real biological counterparts we will mention this. 2 Modelling IS Behavior The possibilities of tracing directly the complex sequences of interactions in real ISs of living organisms are very limited. However, Jenkins [9] has presented a method of monitoring the activities of selected cell clones in situ, i.e. in the living organism. (A definition of 'cell clones' as they are implemented in our simulations will be given in chapter 3.3 .) Various techniques of IS modelling have been developed that allow to investigate theoretically different aspects of immunology. Perelson and Weisbuch [1] have provided a comprehensive survey of this area. 3 2.1 Reaction-Kinetics Models The great complexity of IS behavior is due to the large number of different types of IS agents (cells, molecules) that can interact with each other in various ways. Deriving the system's behavior from the interactions between its many constituents is one of the goals of theoretical immunology. Abstracting from the specific details of interaction between the IS's agents one can formulate systems of coupled differential equations describing how the time development of an agent's concentration in the modelled organism depends on the concentrations of other types of agents. We call these models reaction- kinetics models as they bear resemblence to models of reaction kinetics in chemistry. A very simple example for such a system is the following. dI dt = pinf ectIC − pkillIK − dI I dK dt = prespIK − dK K dC dt = s − pinf ectIC − dC C Using as a shortcut notation I, K and C for agent names as well as for their concentrations, the equations above describe a situation that may be in- terpreted as follows: Infectious agents of type I transform agents of type C into new agents of type I upon contact with a rate pinf ect. Agents of type I get removed (killed) upon contact with agents of type K with a rate pkill. Agents K proliferate upon contact with I with a rate presp. Agents of all three types die naturally at their specific rates dI , dK, dC . C type agents are produced at a constant rate s. K could be considered to be an immune system cell type I K C 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 n o i t a r t n e c n o c t n e g a 0 0 100 200 300 400 500 time 600 700 800 900 1000 Figure 1: time development of agent concentration in the simple IS model being produced as a response to the appearance of the infectious I. C may be 4 presenting any possible type of target cell for the pathogen I. Integrating this system of equations yields different kinds of time development for I, K and C depending on the parameters pinf ect, pkill, presp, s, the death rates dx and of course the initial values of I, K and C. Fig. 1 shows the time development of the agents for one set of parameters (see appendix). We see how at first the number of infected agents I grows while the number of 'healthy' agents C decreases. Then, as the response from the IS agents K grows, the number of infected agents declines while C recovers. Finally the system ends up in a steady state that may be interpreted as a chronic in- fection: Infectious agents persist even though the IS constantly prepares agents of type K to suppress the infection. Other sets of parameters may lead to stronger oszillations of the agents con- centrations. Fig. 2 shows in a half-logarithmic plot a system that settles down into a steady 'chronic infection' state after having gone through states where the concentration of I is very low. n o i t a r t n e c n o c t n e g a 1 0.1 0.01 0.001 0.0001 1e-05 1e-06 1e-07 I K C 0 200 400 600 800 1000 time 1200 1400 1600 1800 2000 Figure 2: The model IS settles down into 'cronic infection' after oscillations with very low concentrations of I. Fig. 2 illustrates one of the limits of applicability of simulation results of the reaction-kinetics approach: In a real system of interacting entities at a given time all agents of a certain type may have dissappeared due to destructive in- teraction with other agents (in our example, such an interaction is for example the suppression of I by K ). In the reaction-kinetics approach there are no in- dividual agents. Even agent types with unrealistically low concentrations may experience a 'comeback'. Of course, this problem can be avoided by appropriate setup of the model, but it points out one of the weaknesses of the approach: Information is global in reaction-kinetics models. In contrast, information in nature is something local. In physics, this principle of locality is one of the major foundations of modern 5 theories. It lies at the heart of field theory and can be used as a starting point for entering Einstein's General Theory of Relativity. In immunology, the locality of information processing by the IS's agents may prove to play an important role too. 2.2 Automata Automata models of the IS neglect the microscopic details of IS behavior. They identify a set of characteristic states of the IS (like 'in rest' or 'with infection') together with transition rules that define how the automaton may switch from one state to another. At discrete timesteps the state of the automaton is evaluated and the rules are applied to define the automaton's state for the next timestep. Atlan and Cohen [10] investigated the effects of suppressor T cells using a neural network automaton. 2.3 Cellular Automata Cellular automata (CA) were invented to investigate how simple building blocks could locally cooperate to produce aggregates with interesting behavior. The building blocks are automata living on a grid. Their rules define how the change in state of a single automaton at the next time step depends on his own current state and the states of his direct neighbor automata. Clearly, the most fascinating aspect of CA modelling is the fact that even rather simple transition rules together with strictly local interactions can lead to very complex behavior of automata aggregates. An overview and classification of different types of CAs can be found in [11]. In immunology we encounter a similar situation -- all IS activities are based on the actions of cells reacting to their direct neighbor cells and molecules. There is no central supervision of immune responses. Nevertheless the IS manages to coordinate the actions of its constituents over larger spans of space and time. Celada and Seiden [12] developed a CA model of the IS where the cells are simu- lated by automata that may (as a modification of the usual CA concept of static correspondence between information and position) carry their state information with them while they are moving on a 2-dimensional grid. Depending on the agents (cells, molecules) they encounter they may change their state e.g. from naive to activated. With their simulation program called IMMSIM Celada and Seiden were able to investigate a number of IS phenomena, for example Affinity maturation and hypermutation [. . . ] of the humoral immune response [13]. 6 3 SIMMUNE SIMMUNE is an attempt to derive IS behavior from immunological data that describe the behavior of the cells of the IS on a microscopical level by defining cellular stimulus response mechanisms. A cellular stimulus response mechanism (cellular mechanism for short) consists of a description of a set of stimuli a cell needs to experience before it performs certain actions, and a description of those actions. Metaphorically, a mechanism thus may be considered to be a set of conditional actions: The cell checks whether certain conditions are fulfilled and if they are, it performs certain actions. In SIMMUNE, the condition part of a mechanism can consist of an arbitrary number of conditions that can be combined through logical AND or AND NOT. The action part may consist of one or more actions. Fig. 3 illustrates the concept of a cellular mechanism. condition 1 condition 2 ... condition n cell action 1 cell action 2 ... cell action k then mechanism Figure 3: cellular mechanism Fig. 4 presents an example of a cellular mechanism. There, the stimuli consist of the B:C complex and the D molecule on the cell's surface. 3.1 Components of SIMMUNE 3.1.1 Celltypes Like in cellular automata models, in SIMMUNE too cells are individual entities that interact with each other only locally. The cells live on a 3-dimensional grid. Each cell in a SIMMUNE model belongs to a certain cell type that is defined by the set of mechanisms according to which cells of a this type act. SIMMUNE cell types need not be equivalent to cell types as they are identified 7 B then B C C D D cell of type X cell of type X A A A molecule complex B:C on any of the sides? AND then secrete molecules of type A molecule D on same side? mechanism of celltype X Figure 4: an example of a cellular mechanism in experimental immunology.2 It is important to notice that mechanisms in SIMMUNE do not define cell states (that would be described by a fixed set of attributes, like certain types of molecules on the cell's surface) but cell behavior, while the usual approach in CA immune system models is to define a set of cell states and the rules how cells may switch from one state to another (cellular actions simply being the process of changing the cell's state). Depending on the stimuli they receive from their environment, cells in SIM- MUNE may change their attributes in various ways according to the mecha- nisms of their type. They may express receptor molecules on their surface, incorporate material from the extracellular milieu, secrete certain messenger substances, kill neighbor cells or move into a certain direction. They may also have part of their mechanisms modified (for example as a consequence of viral attack) without completely changing their type.3 In SIMMUNE several conditions, each checking a simple attribute of the cell's state may be combined in the condition part of a mechanism. A condition for a given cell action may be fulfilled in many different ways -- all of which may bear specific information for other mechanisms. Fig. 5 illustrates how the mechanism based approach of SIMMUNE is able to provide more flexibility in describing cell behavior than IS models that com- 2Interestingly enough the categorization of IS cells into rigidly distinct cell types has often been a controversial subject in immunology. Currently this is the case for T-helper1 vs. T-helper2 cells. 3 Here, the analogy between sets of cellular mechanisms in SIMMUNE and the genetic encoding of cellular behavior in real biological systems is obvious. 8 pletely define cell states and transitions between them. Besides its mechanisms, cell type properties in SIMMUNE include typical (mean) lifetime and the size of the cells. molecule D on surface? molecule complex B:C on surface? secrete molecules of type A CB D CB D CB D D E E CB D CB D CB D A A A A A A D E E Figure 5: different ways of satisfying common conditions 3.1.2 Molecules In SIMMUNE cells are the basic units of signal- and information processing. The signals they receive consist of molecules from the extracellular milieu that bind to the receptor molecules which the cells display on their surfaces. (Molecules also perform signal- and information processing simply by forming aggregates according to their mutual binding possibilities. In real ISs certain kinds of molecular aggregates are responsible of attacking cellular pathogens as a first line of defense before the IS has build up its complete arsenal of effector cells. The death of a cellular pathogen as a reaction to contact with the above men- tioned molecular aggregates would, however, be encoded as a cellular action in SIMMUNE.) The significant properties of a molecule hence are described by the set of its possibilities to bind to other molecules. A part of a molecule that is visible to the milieu and hence can be used to bind 9 the molecule to receptors is called an epitope. Even though one usually only refers to the binding sites of 'normal' molecules as epitopes, we treat receptor binding sites just as 'normal' molecule binding sites and call them epitopes too. The binding possibilities of any molecule are thus defined by the binding possi- bilities of its epitopes. Other molecule properties in SIMMUNE include the typical lifetime of the molecule before it desintegrates into its fragment molecules and the types of fragments that are produced upon desintegration of the molecule. 3.1.3 Compartments The effects of many interactions in the IS are local by their nature. An example is the cell-cell communication via contact receptors. But moving molecules or cells may influence all those parts of the organism which they can access. To provide the right specific milieus for the different tasks it has to fulfill, the IS uses different compartments. For example, as mentioned above, the IS needs to avoid producing too many cells with receptors with high affinity for material of the own organism. It achieves this by establishing a central 'school' com- partment, the thymus, where cells of a certain very important IS celltype, the T-cells, are tested to be useful and to be not too self-reactive before they are allowed to start their immune activities. Another wellknown type of IS compartment are the lymph nodes. They are used to bring together the different cell types of the IS for information exchange. Every type of IS cell may be considered to see a different aspect of an antigen. Hence, in order to exploit all the information available about the antigen, the IS needs to provide the lymph nodes as meeting points for the different cells carrying different pieces of information. From a simplified and abstract point of view, compartments simply gather certain kinds of agents while excluding others. A simulation with SIMMUNE may comprise different compartments. 3.2 Operation of SIMMUNE Besides the properties of cell and molecule types, SIMMUNE lets its user define the properties of the compartments within the simulated IS. Dimensions of the compartments, diffusion rates of molecules and cells within the compartments as well as initial concentrations of the different types of agents can be given. Furthermore, the exchange of agents between the different compartments can be regulated: which kinds of agents are allowed to pass from one compartment to another and at which rate. SIMMUNE offers a graphical user interface that can be used to watch agents' concentrations and the spatial distribution of cells or manipulate the running simulation by injecting new cells or molecules. 3.3 Example Applications 10 3.3.1 Local vs. Global Interaction between Agents This example is meant to demonstrate with a very simple model differences between a reaction-kinetics simulation and a simulation with locally interacting agents. Five types of cells interact as illustrated in Fig. 6. ID0 cells proliferate upon contact with cells of type OC. Upon contact with certain cytokines (signal molecules) they transform into cells of type ID1 or ID2, depending on the kind of cytokine they register. ID1 and ID2 themselves produce the cytokines C1 and C2 that make their precursor ID0 switch into their own state respectively. AID cells kill all ID type cells upon contact. AID OC suppress ID1 suppress suppress enhance own prod. differentiate stimulate proliferation ID0 enhance own prod. ID2 differentiate Figure 6: Network of cell interactions in the 'Local vs. Global Interaction' simulation Translation of this interaction network into a system of coupled differential equations leads to a situation with an unstable equilibrium between the two cell types ID1 and ID2. Because of the positive feedback between ID1/ID2 and ID0 small deviations from equal concentrations of both types may push the system into nearly exclusive production of one type. Simulation of this system with locally interacting agents yields a different be- havior. The cytokines that are secreted by ID1 and ID2 do not instantly spread all over the compartment. If the cytokines' lifetimes are short and diffusion is not too strong, ID1 and ID2 act with their cytokines only on ID0 cells that are located within a small neighborhood of themselves. The parameters of the simulation are given in the appendix. 11 Fig. 10 in the appendix shows a cut through the compartment after the simu- lation has reached a state of dynamic equilibrium. Neither ID1 nor ID2 have achieved global dominance. Instead, the two competitors cluster in areas with a diameter of typically 5-10 cells. Another interesting effect is that the AID cells do not appear inside of these clusters. Although they perform free ran- dom moves (controlled only by the availability of free space) they remain on the clusters' surfaces. One is reminded of the situation of a water drop on a hot stove: while the cells on the surface of the cluster get killed, those cells inside the cluster manage to survive. 3.3.2 A simple Immune System Here we demonstrate a simple IS model simulation. The simulation includes five types of cells, three of which may go through differentiations during their lifetimes. Furthermore one type of virus is part of the model. Most of the cellular mechanisms in this model are strong simplifications of the processes in real ISs. The reason why we present this simulation is that all of its behavior results from direct cell-cell respectively cell-molecule interactions and that it suffices as an example simulation that allows to describe how we analyze the behavior of the simulations and to explain the notion of an IS context. We will return to this in section 3.4 . The first cell type OC is an organism cell not belonging to the IS. Cells of this type divide at a certain (low) rate. This reproduction is controlled by contact inhibition: OC cells have receptors on their membranes that are able to bind to receptors of the same type on the membranes of neighbor cells. If such a cell finds too many of these receptor complexes on its surface, it refrains from dividing. OC cells are the target of the virus V. Upon contact with V the OC type cells get infected and start producing new viruses that are kept inside the cells. After some time however the cells burst and release their virus content to the extra- cellular milieu. Even though infected cells do not constitute a completely new cell type in immunological terminology they will be called IC type cells here to facilitate the discussion of the model and to identify them in the diagrams. IC cells besides producing new viruses present virus epitopes on MHC1 receptor molecules on their surface. They do not proliferate and have a shorter lifespan than OC cells. T-Cells appear in three states of activity. As naive T-cells NT and activated T-killer (TK ) or T-helper (TH ) cells. NT cells possess two mechanisms. The first makes them express receptor molecules TCR on their surfaces, the second mechanism induces their transformation into TK or TH cells and proliferation (reproduction). Using a rather simplified T-cell activation scheme, we define the stimulus for this transformation to be the presence of a TCR being bound to a receptor molecule of type MHC1 that besides its own epitopes presents an additional antigen epitope. 12 A receptor molecule TCR possesses a binding site that uses two epitopes. Both of these are selected at random. This means their binding possibilities (i.e. which epitopes they can bind to) are arbitrarily chosen. Each NT cell once in its lifetime selects its own (random-) epitopes. All TCR molecules produced by this cell will possess these two epitopes. When the cell transforms into a TK or TH cell it keeps this epitope choice; if such a cell divides, both daughtercells also will use these two epitopes for their receptors. Thus all TK cells stemming from a common NT cell will bind with their receptors to the same MHC1 /antigen complexes. These cells are said to constitute a clone. A TCR to be able to bind to a MHC must be able to bind to the MHC 's own epitopes as well as to the antigen epitope which the MHC presents. Naive T-cells (NT ) are stimulated to change their type and become (activated) TK or TH cells upon registering a TCR:MHC complex. TK cells react to such complexes by killing the cell that presents the MHC receptor. This is the way the IS tries to remove infected cells (IC ) before they are able to release their virus load to the milieu. The TCRs of TH cells bind not to MHC1 but to similar membrane molecules called MHC2 that are used by B-cells (see below). Similar to the contact in- hibition of OC cells, TK and TH cells have a contact mediated mechanism that controlls their proliferation. 4 They have receptors (called FAS ) and their counterparts (FAS-ligand ) on their surface. An activated T-cell that finds a FAS:FAS-ligand complex on its surface commits suicide. Besides the T-cell response that needs direct cell-cell contact between IS effector cells and infected cells, the IS uses cells that -- after having been activated -- secrete molecules which may bind to the virus particles to mark them for later destruction. These cells are called B-cells and the marker molecules they pro- duce are called antibodies (AB ). Similar to the T-cells, the B-cells exist in our simulation as a pre-activation type NB (naive B-cell) and as activated B-cells of type B. The NB cells express on their surface B-cell receptors called BCR. The epitopes of these receptors are randomly determined -- analogously to the random epitope selection of NT cells. Some of the NB cells may possess BCR molecules on their surface that are able to bind to the virus V while others may possess receptors that bind to molecules that are used by the cells of the IS. The NB cells possess mechanisms that make them present the epitopes of anything which got bound by their BCR to the extracelular milieu with the help of membrane molecules called MHC2. If a naive B-cell encounters a T-helper cell TH that has TCR which bind to the MHC2 of the B-cell (including the additional epitopes the MHC2 presents) the B-cell gets activated. Activated B-cells start secreting an- tibodies AB that have the same random epitopes that were used by the BCRs of the naive cell. These antibodies are hence capable of binding to the virus that activated the T-helpers. The viruses that are marked for destruction by AB s 4Knowledge about the mechanisms that are used by real ISs to controll T-cell proliferation seems to be still rather limited. 13 are removed by cells of type macrophage. These cells have receptors that fit to a non-random binding site of antibodies. In this way they are able to destroy the viruses that are bound to antibodies. Fig. 7 shows the behavior of this simplified IS. The system starts with a cer- tain concentration of OC that quickly enters a plateau concentration. Then the virus V is injected at a high dose and infection spreads: the concentration of infected cells IC grows. After a while, infected cells meet NT cells that possess the appropriate receptors to react to the MHC presenting the virus-epitope. T-helpers and -killers appear. T-cell proliferation stops at a certain concentra- tion of T-cells as the encounters between T-cells and thus the FAS:FAS-ligand induced T-cell death get frequent. OC TK TH IC AB V 100 10 1 0.1 OC 0.01 0.001 0.0001 n o i t a r t n e c n o c t n e g a AB V IC TH TK 1e-05 0 500 1000 timesteps 1500 2000 Figure 7: time dependency of the concentration of organism cells (OC), T-killer cells (TK), T-helper cells (TH), infected cells (IC), antibodies (AB) and virus (V) in the simple IS model. B-cells, once being activated by T-helpers, start producing AB. As the T- cell concentration grows, infected cells are effectively removed from the system. High antibody concentration allows the removal of so many viruses that the rate of infection of OC finally gets low enough to let the organism experience recon- valescence - the OC concentration returns to its (contact-inhibition controlled) plateau. As in reality, the antibodies in our simulation not only mark viruses for destruction, they also may block the binding sites of the viruses and prevent them from attaching themselves to their target cells IC. 14 3.3.3 B-Cell Activation B-cells in real ISs may be activated in two different ways. One of them depends on the assistance of T-helper cells, but B-cells are also capable of responding to certain kinds of antigens directly, i.e. without the assistance of T-cells. These antigens need to possess several indentical epitopes at the right distance from each other as to allow a simultaneous binding of more than one B-cell antigen receptor (BCR). Polysaccharides as they appear on the membranes of bacteria have this property. The aggregation of several antigen receptors on the mem- brane of a B-cell triggers a cascade of intracellular mechanisms of the B-cell that leads to its activation. The cell will differentiate into an antibody secreting cell and will proliferate. This T-cell independent B-cell activation features an interesting dose-response curve. Instead of inducing a stronger response, very large concentrations of an antigen lead to an attenuated B-cell activation. The reason for this is that if the antigen is present in abundance, the probability is rather high that each of the receptors gets bound by an antigen molecule of its own. The probability of B-cell receptor aggregation decreases. (For a mathematical discussion of this effect as well as for a list of references to work on real ISs see [1].) In our computer-experiment we inject a large dose of antigen (AG) concentrated at one of the walls of the compartment. While the antigen diffuses we inves- tigate the B-cell activation by looking at the concentration of the molecules A that are produced by the activated B-cells in slices of the compartment parallel to the gradient of the antigen concentration. cell of type SimpleB A G BCR BCR then A A A cell of type SimpleB BCR BCR A G molecule complex BCR:AG:BCR on any of the sides? then secrete molecules of type A mechanism of SimpleB Figure 8: mechanism of simple B-cell: cross linking of two B-cell receptors makes the B-cell secrete A. In the simulation simple B-cells are created with the ability to distinguish signals from six different sides. They possess one important mechanism which 15 is illustrated in Fig. 8. A f o n o i t a r t n e c n o c G A f o n o i t a r t n e c n o c 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 1000 100 10 1 0.1 0.01 0.001 0.0001 0 A 2 4 6 8 10 12 14 distance from AG injection side AG 2 4 6 8 10 12 14 distance from AG injection side Figure 9: Spatial variation of the concentration of molecules A produced by activated B-cells and of the concentration of activating antigen AG. The binding of the AG-epitopes by the receptors is reversible (with equal reaction constants for binding and release of AG) and the A molecules desinte- grate after a certain mean lifetime. The AG molecules are stable. The resulting concentration of A thus indicates how successfully receptor-antigen-receptor ag- gregates are produced. Fig. 9 shows the number of AG and A molecules per cell as a function of the distance from the wall of the compartment where the high antigen concentration was initially injected. The maximum of the concentration of A is located around the area where 10 AG molecules per cell can be found. This corresponds -- as expected -- to just below 2 AG molecules per side of the cell. 16 3.4 Simulation Analysis The main purpose of SIMMUNE is to provide a tool to investigate how context adaptive behavior of the IS might emerge from local cell-cell and cell-molecule interactions. The most obvious kind of context dependent behavior of the IS can be found in the ability of single cells to react differently to a stimulus when it comes in combination with other stimuli as opposed to an isolated event. Thus, mecha- nisms with several conditons already encode context dependent behavior. More difficult is the analysis of context recognition that emerges from coopera- tions between several cells. Cooperations between cells manifest themselves as correlations between the actions of these cells. A very primitive example from the simulation of section 3.3.2 would be the correlation between the 'kill' -action of T-killer cells and the 'die' -action of infected cells. Whether a cell-cell interaction is of just local importance or part of a network of interdependent cell actions cannot be decided on the microscopical level of single cells. It requires to analyze on multiple scales the correlations between cell actions. Analyzing the behavior of a system on multiple scales means identifying on each scale collections of objects that may be regarded as single composite objects on a coarser scale. This identification of composite objects is based on the recog- nition of common attributes or coherent behavior of the component objects. In order to allow an analysis that involves a series of scales that emerge from each other, the rules for the composition of objects must be applicable not only to the elementary objects of the original, finest scale but also to the composite objects of coarser scales. In our case, the elementary objects are cell actions. Collections of them are identified to constitute composite objects if they are spatially and temporally correlated. Iterating the process by applying the correlation analysis to the objects of the first coarse scale may yield a further scale that is coarser than the first in two aspects: The components of its objects are themselves compos- ite objects and the correlations between the constituents of its objects involve larger spatial and temporal distances. Starting from single-cell behavior we enter the scale of cell-cell cooperations by looking for correlations between cell actions. Looking for correlations between cell cooperations takes us to the next scale. Repeated application of this process might lead to a scale that directly describes the macroscopical behavior of the IS. The network of interactions of our example simulation from section 3.3.2 leads to two (yet simple) coarse scales: On the first we register the correlations be- tween the actions of IS effector cells like T-killer cells and non-IS cells like infected cells. The second coarse scale contains for example the correlation be- tween T-cell activation and the appearance of activated B-cells. Having explained how we proceed in order to look for context dependent behav- ior of the IS we are now able to give a definition of what we call a 'recognized immunological context': An immunological context that is recognized by the 17 IS5 leads to a response of the IS that can be traced on multiple scales as de- scribed above. It can be distinguished from other contexts that are descibed by different patterns of correlation. Recently, the principle of identifying biological contexts on different scales by iterated clustering of data has successfully been applied to the infrared ana- lysis of human blood serum by Werner et al. [16]. Usually, models about higher level cooperative effects within the IS (like automata models that describe the behavior of the IS in terms of predefined states) must be based on assumptions that try to bridge the scale gap between the scale of direct cellular interactions and overall behavior of the IS. We do not need to make such assumptions. Cooperative phenomena are detected using methods of statistical analysis. Of course we pay a price for this: Since SIMMUNE is entirely based on direct cell-cell or cell-molecule interactions we need to make assumptions about cellular mechanisms whenever we make use of aspects of single-cell behavior that are not yet understood in detail. 3.5 Limitations of SIMMUNE Due to the faithful modelling of cell behavior, computer power requirements of SIMMUNE are quite high. With currently available single processor computer power and memory the maximum number of cells (per computer processor) that can participate in a simulation is practically not larger than 500.000. Recently Smith et al. [14] presented a technique called lazy evaluation to sim- ulate quite realistic clone numbers and sizes. Lazy evaluation makes use of the fact that out of the large number of clones only a small fraction is actually able to interact with a given antigen and the presenting cells of the IS. Only this frac- tion will be activated to proliferate and play an important role in the immune response. By simulating only this fraction while limiting its overall concentra- tion to the value it would have with the full cell repertoire being existent, major memory and cpu-time savings can be achieved. To accelerate the simulation of those models that do not need to consider idiotypic networks (see [17] or e.g. [1]) future versions of SIMMUNE may adopt this technique. Another limitation of SIMMUNE will not be circumvented by increasing com- puter power or techniques as lazy evaluation: As mentioned in the foregoing section, simulations with SIMMUNE sometimes have to involve mechanisms and parameters that have not yet been established by experiment. This often makes quantitative predictions difficult. On the other hand, the need for de- tailed descriptions of cellular mechanisms may point out gaps in immunological knowledge that have not yet been sufficiently investigated. 5Context dependent behavior of single cells as we mentioned above would be encoded in cellular mechanisms. We want to distinguish between such context recognition and the context recognition that emerges from multi-cellular cooperation. 18 3.6 Beyond Immunology Since all celltypes are user-defined and the basic cellular actions of SIMMUNE are typically as general as 'expression of (user-defined) membrane receptors' or 'movement along gradients of concentrations of molecules', the software may be used to simulate populations of cells of any kind. It has already been used to simulate systems of neurons with some of the molecular structure of synaptic gaps between them. 4 Conclusion Besides providing its user with the possibility to define in detail the behavior and properties of cells and molecules in simulations of the IS, the mechanism based approach of SIMMUNE yields the fundament for a new kind of simulation analysis in immunology. Multiscale correlation analysis of cellular actions may allow the automated classification of immunological contexts that have not yet been considered until now. Institutes interested in working with SIMMUNE may contact us to receive a copy of the program together with a manual. Acknowledgements Irun Cohen for helpful discussions and for The authors wish to thank Prof. providing copies of his forthcoming book. Dr. Ute Kerres (Univ. of Hamburg) has contributed to this work during many valuable discussions. We thank Dr. Andrew Yates (Institute of Child Health, London) for reading the manuscript. Support by Deutsche Forschungsgemeinschaft (GRK 135/3-98) and GIF travel grants are gratefully acknowledged. 19 A Simulation Parameters and Diagrams Parameters for reaction-kinetics simulations from 2.1: figure Fig. 1 Fig. 2 pinf ect 0.3 0.3 pkill 0.5 1.0 presp 0.1 0.8 s 0.01 0.01 dI 0.01 0.01 dK 0.01 0.01 dC 0.01 0.01 I0 K0 C0 1.0 0.1 0.1 1.0 0.1 0.1 Parameters for the simulation from 3.3.1: OC ID0 initial concentration 0.01 0.05 av. lifespan (timesteps) ∞ ∞ ID1 0.005 ∞ ∞ ID2 AID C1 0 0.005 0.01 ∞ 100 C2 0 100 molecular diffusion rate: 0.0001 cellular diffusion rate: 0.01 (The diffusion rate defines the per timestep probability for agents to get trans- ported to a neighbor grid point. In this simulation cellular diffusion replaces active cell movement. The product of molecular diffusion rate and molecular lifespan defines the mean range of a molecular signal emitted by a cell.) compartment dimensions: 80 x 80 x 10 20 References [1] A.S. Perelson and G. Weissbuch, Immunology for Physicists, Rev. Mod. Phys. 69, No. 4, 1997. [2] I.R. Cohen, The Cognitive Principle Challenges Clonal Selection, Immunol- ogy Today 13, No.11, 441-444, 1992. [3] I.R. Cohen, Tending Adams Garden: Evolving the Cognitive Immune Self, Academic Press, to appear in 1999. [4] Z. Grossman, Contextual Discrimination of Antigens by the Immune Sys- tem: Towards a Unifying Hypothesis, in Theoretical and Experimental In- sights into Immunology, edited by A.S. Perelson and G. Weisbuch, Springer Berlin, 1992 [5] L. Segel and Ruth Lev Bar-Or, Immunology Viewed as the Study of an Autonomous Decentralized System, in Artificial Immune Systems and Their Applications, edited by D. Dasgupta, Springer Berlin, 1998. [6] L. Segel, How Can Perception of Context Improve the Immune Response, in L. Steinman (Ed.) Festschrift for Yaron Cohen, in preparation. [7] H. Atlan, I.R. Cohen, Immune Information, Self-organization and Meaning, Int. Immunol. 10, No. 6, 711-717, 1998. [8] C.A. Janeway and P. Travers, Immunobiology, 1994 Current Biology Ltd./Garland Publishing Inc.. [9] M. Jenkins, Tracking the Interactions Between Antigen-Specific T and B Cells in situ, Talk given at the IMA Workshop 'IS Modeling and Cell Sig- nalling', October 12-16, 1998. [10] H. Atlan and I.R. Cohen, Paradoxical Effects of Suppressor T Cells in Adjuvant Arthritis: A Neural Network Analysis, in Theoretical and Experi- mental Insights into Immunology, edited by A.S. Perelson and G. Weisbuch, Springer Berlin, 1992. [11] S. Wolfram (Ed.), Theory and Applications of Cellular Automata, World Scientific (Singapore), 1986. [12] F. Celada, P.E. Seiden, A computer model of cellular interactions in the immune system, Immunol. Today 13, 56-62, 1992. [13] F. Celada, P.E. Seiden, Affinity maturation and hypermutation in a simu- lation of the humoral immune response, Eur. J. Immunol. 26, 1350-1358, 1996. [14] D.J. Smith et al., Using Lazy Evaluation to Simulate Realistic-Size Reper- toires in Models of the Immune System, Bull. Math. Biol., 60, 647-658, 1998. 21 [15] M. Meier-Schellersheim, Immunological Contexts -- a Multiscale Approach, in preparation. [16] G. Werner et al., in H. Mansch, M. Jackson (Eds.), Infrared Spectroscopy:A New Tool in Medicine, Proc. of SPIE, 3257, 1998. [17] N.K. Jerne, Towards a network theory of the immune system, Ann. Im- munol. (Inst. Pasteur), 125C, 373-389, 1974. 22 o o * o + # o + o + + + o + + o o + + + + + * + o * + + * + * # + o * * * + + * + * * + + # + o * * * * # * # o o * * * * # # * o o # # o o * * * * # # # * # # o * * * * * * # * * * o * o o o * # * * * o o * * * o o o # * o o o # o o + + * o o o o + # o o + + # o o o o o o # o o o + + + * + + o * o * + * + + + + * * * * * * * * * * * * + + # * * + * * + + # * * + * * * * * * * * o # * * * o o o o # o o * o * * * * # o o o o + * o # + o + o * * * o o o o o o * # o o o o o * o * * * o o # o # o # # o * * # o o * * # o * * o o * o o + * o * + o + o o o + + + + # o o o + + + o o o + + + + + + o o o * # + o o o o * * o o o * * o o o o o o o o * o * o + * o # # + o # * * * * * * + + * o # # + + + + + + + + + * * * * o o o * * * * o * * * * * * * * * * * * * * * + + + * o + + o + + + + + + * + + * * * o o o o o + + + + + + * o o * * * * * * * * + + * + + + + * + + * + o o + + + + + + + + o o * * * * * * # + + + + + + + + + * # o * * o # * * + + + * * o + + o o + + + o # o o # o o o o o o # + o o + + + + # + + + + o # + o + + + o o o * * o o o o o o + + + + + + + + + o o + * o # o o o o o + + + + o o + + + + + # # o + + + o + + + + + + + + # # # # + + + o o + + + + o o o o o o o o o o o o + + + + + + o o + o o o # * + + + * o + * * * * * * o * + + + o o + + * + + + + + + * o o o * o o # o * * o o o # o o o o o o o o + + + o o + + + + + + + + + + * + + + + + + o + + + * * * * * * * + o # # # # * # + o o o o o o o o o + o + o o o o + + + + + + + + + o o o o * o o * o o o # o o o o o o o + # o * o o o o o * o + + + + + + o * * * * * + * * * o o + + + + + + + + + o * * * * * * + * * * + * * * * * * * * * * o o o + o + + + * * # # * o o * o o # o o o o o + o o o o o o o o o o o o o o o o o o o o o + + o * o o o o + o o o * + + + + + * * + + o o * * * + + * * * * * + + + + + + + + + + # + + o + + + + + + + + + + # + + + + + o o o o + + + * * * + + + + + + + + + + + + + + + + * + o o + + o o o o o * + + + + # # o o # o o o * * * # + + + # * o o o * o o * o o o o * * o o o o * * o o o o o o # o o o o * o o o o o o o o # o o o o o + o o o o o o o o o + o + * * * * o o o o o o o + + o * * * * * * # o * * * * # o o o * + * + + o # o * * * * + + + + + o o + * # # * * # * + + + + + * * # + o o o o * o + * + + + + + + + + + + + + # + o * * * * * # o o o o # o o o o o o o o o o o o o o + + + + o o o o # o o o # o o o o o # # o o o o * * # o * o o # + + + o o + + + + + * * * + + + + + + o + + + + o o o o o + + + + o o * o o o + o o o + + + + # * + + + o o o o o o o o o o * * * * # * * o o * * * * o * o o * * * # + # # * * + # * * * # # # # * * o # * * * * * * * * * # * * * o * * * * * * * o * * * * * # # o * * * o # # # # * o o o o o o o o o # o o o o o o + o o o # # o o o o o o o o o o o o o o o o # + + + + o o o o o + + + + o o o o o o + + o o o + + o o o o + + + o * * * * o o o o o * o o o # # o o * * o * * o o + + + + + * * * * * o o o o + # * * o * o o o + + + * * * * * * * # o o o + * o + * * + * * + + + # # # * * * + + + + + + # # o o o + * + o + + + + + + + + + * * * * * * * * o o o o o + o * + o + o + + + + + o + o + + o # o + o o o o o # * * # # * * * o * * * * * o * * * o * * o # * * * o # o * * # o + + o o + + * * * * # # # # o * # # # * * * * * * * * + * # # # # o * * * * * * * * * * * o o * * * * o * + + * * + + + + o * * * + * + + + + # * * * + # * + o o # + o + o + + o o # o o o o o o o # o * * * * + * * o + o o o o o o o + o o o + + + + + + # # # + + + + + + + + + + * * * * * + + + + + + + + + * + * # * * + # + + + + + + + + + + + o o o + o + + + + + + + + + * * + + + + + + + + * + * * * + * * + + + + o # # * * + + + + + * + + + + + * # + + * + + * * * * * + # * * * * * * * * * * * * + + + + + o # * * * * * o * * + * * o o # + * + * * * o * * * * * + o o o o o # # # * * * * * * * * * * * * * * * * o + + + + + * * o o o + + + + + + * # * * * * * # * * * # # + + + + + * + * * * + # + + + + # # # * * * * * * * * o + o + + + + o # # + + + + + + * * * # # * # + + + + + + + # * + + + + + # o o o + + + + # o o o + o o o o o o # * o * * * * * * * * o o o o + # * o * o o o o * # * * * * * * o o o + * * o o o o o o o o o * * * * * * * o o o o * + # * + * o o o o o o # + + # * * # o o # # # o o o o * o o # # o * * + + + + + + o o + + + o o * * # o o + o o * * + + + + o o o + o * * # o o * * * * * * + # + o * * * * * + + # * o * * * * * * * o * o o # o # + + # + + + + * + * * # # # + + + * + * + + + + # + # # + + * * + * * + + # + + + + + * * * * + + + # + + # o * * + * + * # + + # # # + * * * * # # + + + + + + o * # o # + # o # o o o # o o o o o o + o * o o * * o * * * * + # # + + # # # # # # o + + + # # + + + + o o o * o o o o o o o + + o o + + + + o # o # # # # + # o + o o + + o # # + o o o o o o o o o + + # # * o * + + * + * * * * # o o o # # # o o o + * * * * * * * o o + o * * + + + + + * * * * + + + + + + + * * * * * + * * o * o * * o o o * * * * * * # # + * * * * * * * # # * # # * * * # * * * * * * * * * # * * + + * + + * * # # # * * * * * * * * # + * + # o # # o + + + * + * * * * # * # * * * * * * * * * * * * + + * * * * o o o o + + + + o o o o + o o + + + + + + o o + o * * * * * o + o o o o + o o o o o o o * * + * o o * o # o o o o o o o o # * * * * * * * * o o o o * o o + + * + + o # o o o * * * * + * + + # * o * * + + * o o o o o o * # # # + + + + + + + o o o * # o o # * * * o o o o + + + + # + + o o * o o o * * * o o o o + + + + # + + o o o * # # + + + # + + + * * * # o * * * * * * * # * * * * o o # o + # * * * o # o # # + + + o + * * o # o o + + + + o # * * * * o * * # * + + + * * * * # * * * * * * * * + + + * * * * * * * * + + + # * * * + o o + + + # # o * * * * * * o o * * * + + + + + + + o o o + + + o o + o o o o # # o * * # # + # + + + o * * + + + + o + + o * o o * * # # + + o + o o + # # o * * * * * + + o + o o o o + + o o o o o + + + o + * o * # # o # # # o o + o o o o o # + o o + * + o * * * + + # # o * * * o # # # * * * * + + + o * * o o # * + + + + o o o # + # + * o o o * * * * * * * o * * o o * * o o * + * + * + # + + + * + + + + + # + + + + + + * + o + + + + + + + + + o o o o + + + + + + + o o o o o o o + + + + o o + + + + + + + + + o * o o o o + + # # o # + + + + + + + + * o o * * o + + o * o o # + + + + + * o # + + + + + + o + * * * * * o o o o * * o o o o o + * * * * * o o o o o o # + # # o o o # # + + + * * o o o + + + + + o * * * o o o # # + + + + # # o o + o o + + + + + + * o o o + + o o o + + + # + * * * + + + + * o # # # # # # # # + # + # * * o o o + + * o * * * o # + + + * * * * o o o o o + * + + + # + * o o o o o o * * o o + + # # + * * o o o o o o o + * + * * + + * * * * * * # * * * * * + + + o o o o o * * * * o o o o o o o # # # # # o # # * # # * o # # o o o o o o o o o o * o o o o o o o o o o o o o , ∗ 1 D I , o 0 D I : s l o b m y s ; 1 . 3 . 3 m o r f n o i t a l u m i s k c a b d e e f n i s r e t s u l c : 0 1 e r u g i F # D I A + 2 D I , 3 2
1909.09397
1
1909
2019-09-20T09:54:30
Simulating Crowds in Real Time with Agent-Based Modelling and a Particle Filter
[ "cs.MA" ]
Agent-based modelling is a valuable approach for systems whose behaviour is driven by the interactions between distinct entities. They have shown particular promise as a means of modelling crowds of people in streets, public transport terminals, stadiums, etc. However, the methodology faces a fundamental difficulty: there are no established mechanisms for dynamically incorporating real-time data into models. This limits simulations that are inherently dynamic, such as pedestrian movements, to scenario testing of, for example, the potential impacts of new architectural configurations on movements. This paper begins to address this fundamental gap by demonstrating how a particle filter could be used to incorporate real data into an agent-based model of pedestrian movements at run time. The experiments show that it is indeed possible to use a particle filter to perform online (real time) model optimisation. However, as the number of agents increases, the number of individual particles (and hence the computational complexity) required increases exponentially. By laying the groundwork for the real-time simulation of crowd movements, this paper has implications for the management of complex environments (both nationally and internationally) such as transportation hubs, hospitals, shopping centres, etc.
cs.MA
cs
SIMULATING CROWDS IN REAL TIME WITH AGENT-BASED MODELLING AND A PARTICLE FILTER ∗ A PREPRINT Nick Malleson† School of Geography University of Leeds Leeds, LS2 9JT, UK [email protected] Jonathan A. Ward School of Mathematics University of Leeds Leeds, LS2 9JT, UK Leeds Institute for Data Analytics Leeds Institute for Data Analytics Le-Minh Kieu University of Leeds Leeds, LS2 9JT, UK Kevin Minors University of Leeds Leeds, LS2 9JT, UK Alison Heppenstall Alan Turing Institute British Library London NW1 2DB Andrew A. West School of Geography University of Leeds Leeds, LS2 9JT, UK September 23, 2019 ABSTRACT Agent-based modelling is a valuable approach for systems whose behaviour is driven by the in- teractions between distinct entities. They have shown particular promise as a means of modelling crowds of people in streets, public transport terminals, stadiums, etc. However, the methodology faces a fundamental difficulty: there are no established mechanisms for dynamically incorporating real-time data into models. This limits simulations that are inherently dynamic, such as pedestrian movements, to scenario testing of, for example, the potential impacts of new architectural configu- rations on movements. This paper begins to address this fundamental gap by demonstrating how a particle filter could be used to incorporate real data into an agent-based model of pedestrian move- ments at run time. The experiments show that it is indeed possible to use a particle filter to perform online (real time) model optimisation. However, as the number of agents increases, the number of individual particles (and hence the computational complexity) required increases exponentially. By laying the groundwork for the real-time simulation of crowd movements, this paper has impli- cations for the management of complex environments (both nationally and internationally) such as transportation hubs, hospitals, shopping centres, etc. Keywords Agent-based modelling · Particle Filter · Data assimilation · Crowd simulation 1 Introduction Agent-based modelling is a form of computer simulation that is well suited to modelling human systems [1, 2]. In recent years it has emerged as an important tool for decision makers who need to base their decisions on the behaviour of crowds of people [3]. Such models, that simulate the behaviour of synthetic individual people ('agents'), have been proven to be useful as tools to experiment with strategies for humanitarian assistance [4], emergency evacuations [5, 6], religious festivals [7], crowd stampedes [8] etc. Although many agent-based crowd simulations have been developed, there is a fundamental methodological difficulty that modellers face: there are no established mechanisms ∗This project has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No. 757455), through a UK Economic and Social Research Council (ESRC) Future Research Leaders grant [number ES/L009900/1], and through an internship funded by the UK Leeds Institute for Data Analytics (LIDA). †Corresponding author A PREPRINT - SEPTEMBER 23, 2019 for incorporating real-time data into simulations [9 -- 11]. Models are typically calibrated once, using historical data, and then projected forward in time to make a prediction independently of any new data that might arise. Although this makes them effective at analysing scenarios to create information that can be useful in the design of crowd management policies, it means that they cannot currently be used to simulate real crowd systems in real time. Without knowledge of the current state of a system it is difficult to decide on the most appropriate management plan for emerging situations. Fortunately, methods do exist to reliably incorporate emerging data into models. Data assimilation (DA) is a technique that has been widely used in fields such as meteorology, hydrology and oceanography, and is one of the main reasons that weather forecasts have improved so substantially in recent decades [12]. Broadly, DA refers to a suite of techniques that allow observational data from the real world to be incorporated into models [13]. This makes it possible to more accurately represent the current state of the system, and therefore reduce the uncertainty in future predictions. It is important to note the differences between the data assimilation approach used here and that of typical agent- based parameter estimation / calibration. The field of optimisation -- finding suitable estimates for the parameters of algorithms -- has (and continues to be) an extremely well-researched field that agent-based modellers often draw on. For example, agent-based models regularly make use of sampling methods, such as Latin Hypercube sampling [14] or evolutionary / heuristic optimisation algorithms such as simulated annealing [15], genetic algorithms, [16], and approximate Bayesian computation [17]. There are also new software tools becoming available to support advanced parameter exploration [18]. It is, however, worth noting that in most cases agent-based models are not calibrated to quantitative data [14]. In the cases where parameter estimation does take place, it is typically performed as a single calibration step in a waterfall-style development process -- e.g. design, implementation, calibration, validation. Although there are some more recent studies that do attempt to re-calibrate model parameters dynamically during runtime [e.g. 19, 20] there is another, more fundamental, difference to typical parameter optimisation (be it static or dynamic) and the data assimilation approach. Even if optimal model parameters have been found, there will usually be a degree of uncertainty in the model. With crowd simulations, for example, it is impossible to know exactly how individuals will behave in a given situation -- will someone turn left or right given two competing options? -- nor can individual parameters such as walking speed ever be known exactly. Data assimilation algorithms use 'state estimation' to calculate the difference between the model and the 'true' state of the underlying system at runtime. They are then able to adjust the current model state in order to constrain a model's continued evolution against the real world [11]. Although it is possible to re-calibrate models dynamically during runtime (e.g. [19]), this would not reduce the natural uncertainty that arises as stochastic models evolve. This paper is part of a wider programme of work3 whose main aim is to develop data assimilation methods that can be used in agent-based modelling. The software codes that underpin the work discussed here are available in full from the project code repository; see Appendix A. The work here focuses on one particular system -- that of pedestrian movements -- and one particular method -- the particle filter. A particle filter is a brute force Bayesian state estimation method whose goal is to estimate the 'true' state of a system, obtained by combining a model estimate with observational data, using an ensemble of model instances called particles. When observational data become available, the algorithm identifies those model instances (particles) whose state is closest to that of the observational data, and then re-samples particles based on this distance. It is worth noting that once an accurate estimate of the current state of the system has been calculated, predictions of future states should be much more reliable -- c.f. the substantial improvements in weather forecasting that have come about as a result of modern data assimilation methods [12]. Predicting future system states is beyond the scope of this paper however. The overall aim of the paper is to: quantify the conditions under which a typical particle filter is able to reliably estimate the 'true' state of an underlying pedestrian system through the combination of a modelled state estimate, produced using an agent-based model, and observational data. This will be achieved through a number of experiments following an 'identical twin' approach [10]. The agent-based model is first executed to produce hypothetical real data -- also known as pseudo-truth [17] data -- and these data are assumed to be drawn from the real world. During data assimilation, observations are derived from the pseudo-truth data. This approach has the advantage that the 'true' system state can be known precisely, and so the accuracy of the particle filter can be calculated. In reality, the true system state can never be known. The agent-based model under study is designed to represent a very simple pedestrian system. It has been kept inten- tionally simple because the aim here is to experiment with the particle filter, not to accurately simulate a pedestrian system. Were the model more complicated it would become more difficult to understand the internal uncertainties, 3http://dust.leeds.ac.uk/ 2 A PREPRINT - SEPTEMBER 23, 2019 which would in turn make it more difficult to understand how well the particle filter was able to handle these uncer- tainties. The model is sufficiently complex to allow the emergence of crowding, so its dynamics could not be easily replicated by a simpler mathematical model -- as per [9] and [11] -- but is otherwise as simple as possible. Crowding occurs because the agents have a variable maximum speed, therefore slower agents hold up faster ones who are behind them. The only uncertainty in the model, which the particle filter is tasked with managing, occurs when a faster agent must make a random choice whether to move round a slower agent to the left or right. Without that uncertain behaviour the model would be deterministic. A more realistic crowd simulation [e.g. 8] would exhibit much more complicated behavioural dynamics. The paper is outlined as follows: Section 2 reviews the relevant literature; Section 3 outlines the methods, including a description of the agent based model and particle filter; Section 4 outlines the experiments that are conducted and their results; and Section 5 draws conclusions and outlines opportunities for future work. 2 Background 2.1 Agent-Based Crowd Modelling One of the core strengths of agent-based modelling is its ability to replicate hetereogeneous individuals and their behaviours. These individuals can be readily placed within an accurate representation of their physical environment, thus creating a potentially powerful tool for managing complex environments such as urban spaces. Understanding how pedestrians are likely to move around different urban environments is an important policy area. Recent work using agent-based models have shown value in simulating applications from the design of railway stations [22, 23], the organisations of queues [24], the dangers of crowding [8] and the management of emergency evacuations [25]. However, a drawback with all agent-based crowd simulations -- aside from a handful of exceptions discussed below -- is that they are essentially models of the past. Historical data are used to estimate suitable model parameters and models are evolved forward in time regardless of any new data that might arise. Whilst this approach has value for exploring the dynamics of crowd behaviour, or for general policy or infrastructure planning, it means that models cannot be used to simulate crowd dynamics in real time. The drivers of these systems are complex, hence the models are necessarily probabilistic. This means that a collection of models (or an ensemble) will rapidly diverge from each other and from the real world even under identical starting conditions. This issue has fostered an emerging interest in the means of better associating models with empirical data from the target system [see, e.g., 10, 11, 26]. 2.2 Data-Driven Agent-Based Modelling The concept of Data-Driven Agent-Based Modelling (DDABM) emerged from broader work in data-driven application systems [27] that aims to enhance or refine a model at runtime using new data. One of the most well developed models in this domain is the 'WIPER' system [6]. This uses streaming data from mobile telephone towers to detect crisis events and model pedestrian behaviour. When an event is detected, an ensemble of agent-based models are instantiated from streaming data and then validated in order to estimate which ensemble model most closely captured the particular crisis scenario [28]. Although innovative in its use of streaming data, the approach is otherwise consistent with traditional methods for model validation based on historical data [19]. Similar attempts have been made to model solar panel adoption [29], rail travel [30], crime [9], bird flocking [20] and aggregate pedestrian behaviour [11], but whilst promising, these models contain their own limitations. For example, they either assume that agent behaviours can be proxied by simple regression models [29] (which will make it impossible to use more advanced behavioural frameworks to encapsulate the more interesting features of agent behaviour), are calibrated manually [30] (which is infeasible in most cases), optimse model parameters dynamically but not the underlying model state (which might have diverged substantially from reality) [20], or are simple enough to be approximated by an aggregate mathematical model [9, 11], neglecting the importance of using agent-based modelling in the first place. There are two studies of direct relevance. The first is that of [31], who developed an agent-based model of an evac- uation coupled with a particle filter to conduct real-time data assimilation. This paper presents a novel mathematical approach that can map observations from a simple to a complex domain. In the authors' example, simulated data from hypothetical population counters are mapped to the complex agent-based model, which represents the heterogeneous locations of the individual agents. Although it is beyond the scope of the study here, the proposed mapping method will be useful for future work that experiments with variations in the complexity of the observations that are drawn from the real world (e.g. examining how well the particle filter can perform when presented with aggregate population counts rather than individual agent locations). The second study is that of [10] who investigated the viability of simulating individual movements in an indoor environment using streams of real-time sensor data to perform dynamic state estimation. As with this paper, the 3 A PREPRINT - SEPTEMBER 23, 2019 authors used an 'identical twin' experimental framework; the agent-based model is used to create pseudo-realistic data rather than using those from real-world sensors. Next, an ensemble of models were developed to represent the target system with a particle filter used to constrain the models to the hypothetical reality. A new particle resampling method ('component set resampling') was also proposed that is shown to mitigate the particle deprivation problem (see Section 2.3 for more details). The research presented within this paper builds on [10] by: (i) attempting to apply data assimilation to a system that exhibits emergence; and (ii) performing more rigorous experiments to assess the conditions under which a particle filter is appropriate for assimilating data into agent-based crowd models. 2.3 Data Assimilation and the Particle Filter 'Data assimilation' refers to a suite of mathematical approaches that are capable of using up-to-date data to adjust the state of a running model, allowing it to more accurately represent the current state of the target system. They have been successfully used in fields such as meteorology, where in recent years 7-day weather forecasts have become more accurate than 5-day forecasts were in the 1990s [32]; partly due to improvements in data assimilation techniques [12]. The need for data assimilation was initially born out of data scarcity; numerical weather prediction models typically have two orders of magnitude more degrees of freedom than they do observation data. Initially the problem was addressed using interpolation [e.g. 33, 34], but this soon proved insufficient [12]. The eventual solution was to use a combination of observational data and the predictions of short-range forecasts (i.e. a model) to create the full initial conditions (the 'first guess') for a model of the current system state that could then make forecasts. In effect, the basic premise is that by combining a detailed but uncertain model of the system with sparse but less uncertain data, "all the available information" can be used to estimate the true state of the target system [35]. A particle filter is only one of many different methods that have been developed to perform data assimilation. Others include the Successive Corrections Method, Optimal Interpolation, 3D-Var, 4D-Var, and various variants of Kalman Filtering [36], but it is beyond the scope of the paper to review all of these methods in detail. The particle filter method is chosen here because they are non-parametric methods and are better suited to performing data assimilation in systems that have non-linear and non-Gaussian behaviour [26], such as agent-based models. In fact, agent-based models are typically formulated as computer programs rather than in the mathematical forms required of many data assimilation methods, such as the Kalman filter and its variants [10]. The particle filter is a brute force Bayesian state estimation method. The goal is to estimate a posterior distribution (i.e. the probability that the system is in a particular state conditioned on the observed data) using an ensemble of model instances, called particles. Each particle has an associated weight, normalised to sum to one, that are drawn from a prior distribution. In the data assimilation step (discussed shortly) each particle is confronted with observations from the (pseudo) real system and weights are adjusted depending on the likelihood that a particle could have produced the observations. Unlike most other data assimilation methods, a particle filter does not actually update the internal states of its particles. Instead, the worst performing particles -- those that are least likely to have generated the observations -- are removed from subsequent iterations, whereas better performing particles are duplicated. This has the advantage that, when performing data assimilation on an agent-based model, it is not necessary to derive a means of updating unstructured variables. For example, it is not clear how data assimilation approaches that have been designed for mathematical models that consist of purely numerical values will update models that contain agents with categorical variables. A particle filter (PF) Pt at time t with N particles is the set Pt =(cid:8)(xi t) : i ∈ {1, . . . , N}(cid:9) , t, wi t, which are subject to the condition(cid:80)N (1) i=1 wi t is the state of the i-th particle with associated weight wi where xi t = 1 for all t. The general method of the particle filter is to use Pt and new information in the form of observations to determine Pt+1. There are many different PF methods. The standard form is the sequential importance sampling (SIS) PF which selects the weights using importance sampling [37, 38]. The particles are sampled from an importance density [39]. One pitfall of the SIS PF is particle degeneracy. This occurs when the weights of all the particles tend to zero except for one particle which has a weight very close to one. This results in the population of particles being a very poor estimate for the posterior distribution. One method to prevent particle degeneracy is to resample the particles, duplicating particles with a high weight and discarding particles with a low weight. The probability of a particle being resampled is proportional to its weight; known as the sequential importance resampling (SIR) PF. The particles can be resampled in a variety of different ways, including multinomial, stratified, residual, systematic, and component set resampling [10, 40, 41]. Although resampling helps to increase the spread of particle weights, it is often not sufficient [36]. In a similar manner to particle degeneration in the SIS PF, particle collapse can occur in the SIR PF. This occurs when only one particle is resampled so every particle has the same state. One of the main drawbacks with PF methods, as 4 A PREPRINT - SEPTEMBER 23, 2019 many studies have found [e.g. 36, 42], is that the number of particles required to prevent particle degeneracy or collapse grows exponentially with the dimensionality of the model. This is an ongoing problem that will be revisited throughout the paper. It is worth nothing that there are many other PFs including the auxiliary SIR PF and the regularised PF [43], the merging PF [44], and the resample-move PF [45]. In Section 3.3, we will consider a SIR PF with systematic resampling because it ranks higher in resampling quality and computational simplicity compared to other resampling methods [41, 46]. 3 Method 3.1 The Agent-Based Model: StationSim StationSim is a simple agent-based model that has been designed to very loosely represent the behaviour of a crowd of people moving from an entrance on one side of a rectangular environment to an exit on the other side. This is analogous to a train arriving at a train station and passengers moving across the concourse to leave. A number of agents, N, which varies in the later experiments, are created when the model starts. They are able to enter the environment (leave their train) at a uniform rate through one of three entrances. They move across the 'concourse' and then leave by one of the two exits. The entrances and exits have a set size, such that only a limited number of agents can pass through them in any given iteration. Once all agents have entered the environment and passed through the concourse then the simulation ends. The model environment is illustrated in Figure 1, with the trajectories of two interacting agents for illustration. Figure 1: StationSim environment with 3 entrance and 2 exit doors . The model has deliberately been designed to be extremely simple and does not attempt to match the behavioural realism offered by more developed crowd models [8, 22, 23, 25]. The reason for this simplicity is so that: (1) the model can execute relatively quickly; (2) the probabilistic elements in the model are limited (we know precisely from where probabilistic behaviour arises); (3) the model can be described fully using a relatively simple state vector, as discussed in Section 3.3.1. Importantly, the model is able to capture the emergence of crowding. This results because each agent has a different maximum speed that they can travel at. Therefore, when a fast agent approaches a slower one, they attempt to get past by making a random binary choice to move left or right around them. Depending on the agents in the vicinity, this behaviour can start to lead to the formation of crowds. To illustrate this, Figure 2 shows the paths of the agents (2a) and the total agent density (2b) during an example simulation. The degree and location of crowding depends on the random allocation of maximum speeds to agents and their random of direction taken to avoid slower agents; these cannot be estimated a priori. Unlike in previous work where the models did not necessarily meet the common criteria that define agent-based models [9, 11, e.g.] this model respects three of the most important characteristics: • individual heterogeneity -- agents have different maximum travel speeds; • agent interactions -- agents are not allowed to occupy the same space and try to move around slower agents who are blocking their path; • emergence -- crowding is an emergent property of the system that arises as a result of the choice of exit that each agent is heading to and their maximum speed. The model code is relatively short and easy to understand. It is written in Python, and is available in its entirety at in the project repository [21]. 5 A PREPRINT - SEPTEMBER 23, 2019 (a) Individual trails showing the paths taken by agents (b) The total crowd density over the simulation run. Figure 2: An example of crowding in the StationSim model 3.2 Data Assimilation - Introduction and Definitions DA methods are built on the following assumptions: 1. Although they have low uncertainty, observational data are often spatio-temporally sparse. Therefore there are typically insufficient amounts of data to to describe the system in sufficient detail and a data-driven approach would not work. 2. Models are not sparse; they can represent the target system in great detail and hence fill in the spatio-temporal gaps in observational data by propagating data from observed to unobserved areas [36]. For example, some parts of a building might be more heavily observed than others, so a model that assimilated data from the observed areas might be able to estimate the state of the unobserved areas. However, if the underlying systems are complex, a model will rapidly diverge from the real system in the absence of up to date data [11]. 3. The combination a model and up-to-date observational data allow "all the available information" to be used to determine the state of the system as accurately as possible [35]. DA algorithms work by running a model forward in time up to the point that some new observational data become available. This is typically called the predict step. At this point, the algorithm has an estimate of the current system state and its uncertainty (the prior). The next step, update, involves using the new observations, and their uncertainties, to update the current state estimate to create a posterior estimate of the state. As the posterior has combined the best guess of the state from the model and the best guess of the state from the observations, it should be a closer estimate of the true system state than that which could be estimated from the observations or the model in isolation. 3.3 The Particle Filter There are many different ways to perform data assimilation, as discussed in Section 2.3. Here, a potentially appropriate solution to the data assimilation problem for agent-based models is the particle filter -- also known as a Bayesian bootstrap filter or a sequential Monte Carlo method -- which represents the posterior state using a collection of model samples, called particles [10, 36, 47, 48]. Figure 3 illustrates the process of running a particle filter. Note that the 'pseudo-truth model' is a single instance of the agent-based model that is used as a proxy for the real system as per the identical twin experimental framework that we have adopted. The data assimilation 'window' determines how often new observations are assimilated into the particle filter. The size of the window is an important factor -- larger windows result in the particles deviating further from the real system state -- but here we fix the window at 100 iterations. The simulation terminates when all agents have left the system. 3.3.1 The State Vector and Transition Function Here, the state vector, at a time t, contains all the information that a transition function needs to iterate the model forward by one step, including all of the agent (i = {0, 1, . . . , N}) parameters (−→pi ) and variables (−→vi ) as well as global model parameters −→ P : (2) (cid:104) −→p0 St = (cid:105) −→v0 −→p1 −→v1 . . . −→pN −→vN −→ P 6 A PREPRINT - SEPTEMBER 23, 2019 Figure 3: Flowchart of data assimilation process using a particle filter. A similar structure, the observation vector, contains all of the observations made from the 'real world' (in this case the pseudo-truth model) at a time t. Here, the particle filter is only used to estimate the state of the models variables (−→vi ), −→ not any of the parameters (−→pi and P ) (although it is worth noting that parameter estimation is technically feasible and will be experimented with in future work). Also, the current speed of an agent can be calculated from its current location and the locations of the agents surrounding it, so in effect the observation vector only needs to include the positions of the agents with the addition of some Gaussian noise, : Ot = [ x0 y0 x1 y1 . . . xn yn ] (3) Therefore in the experiments conducted here, all model parameters are fixed. Hence a further vector is required to map the observations to the state vector that the particles can actually manipulate. We define the partial state vector S(cid:48) to match the shape of O, i.e.: S(cid:48) t = [ x0 y0 x1 y1 . . . xn yn ] (4) This has the effect of 'pairing' agents in the particles to those in the pseudo-truth data, in a similar approach to that taken by [10]. It is worth noting that, because the particle filter will not be tasked with parameter estimation, then the data assimilation is somewhat simpler than it would be in a real application. For example, one of the agent parameters is used to store the location of the exit out of the environment that the agent is moving towards. As this parameter is set a priori for each agent, then the particle filter does not need to estimate where the agents are ultimately going, only where they currently are. 3.3.2 Observations from the pseudo-truth data In a real application, the particle filter would be assimilating data in real time from sensors of the real world. This is not the case here so instead, we take 'observations' from the pseudo-truth data (which are, as it happens, generated by the StationSim model). Each particle evolves in time according to the StationSim dynamics and receives new observations at regular intervals. Measurement error (i.e. noise, ) is added to the observations (in the real world, sensors observations will be noisy). Here, observations take the form of the (x, y) locations of all agents. This is analogous to tracking all individuals in a crowd and providing snapshots of their locations at discrete points in time to the particle filter. This 'synthetic observation' is probably more detailed than reality, so future work will vary the amount of detail provided to the algorithm. It will firstly reduce the number of agents who are observed (e.g. tracking only some people) and then provide only aggregate population counts (which is analogous to using a camera or other sensor to count the number of people at a certain point). 3.3.3 Particle Weights Each particle in the particle filter has a weight associated with it that quantifies how similar a particle is to an ob- servation. The weights are calculated at the end of each data assimilation window (i.e. when observations become available). At the start of the following window the particles then evolve independently from each other [49]. The weights are, in effect, the average distance between agents in that particle and the corresponding agents in StationSim (recall that there is a one-to-one mapping between agents in the particles and agents in the truth model). Formally, let xn(i, t) be the location of the i-th agent at time t in the n-th particle for n ∈ {1, . . . , N} and let x(i, t) be the location 7 Pseudo-Truth ModelParticlesObservations (pseudo-truth)ReweightResampleNew set of ParticlesData AssimilationTime (model iterations)t01. . . . . 2tt+1t+2. . . . . . . t-1 A PREPRINT - SEPTEMBER 23, 2019 of the i-th agent in StationSim for i ∈ {1, . . . , I}. The error of the n-th particle n(t) at time t is then given by I(cid:88) i=1 n(t) = 1 I x(i, t) − xn(i, t), and the particle filter error ν(t) at time t is given by N(cid:88) N(cid:88) n=1 n(t), I(cid:88) n=1 i=1 ν(t) = 1 N = 1 N I x(i, t) − xn(i, t). (5) (6) (7) (9) It is worth noting that, because the agent locations are the only data stored in the partial state vector, the particle error is equivalent to the Euclidean distance (l2-norm) between the particle partial state vector S(cid:48) t and the observation vector Ot, ν(t) = S(cid:48) t − Ot2. Particles with relatively large error are likely to be removed during the sampling procedure (discussed in the following section), whereas those with low error are likely to be duplicated. In addition for their use in resampling, the population of particle weights can be used to gain insight into how well the particle filter is able to represent the 'true' system state overall. 3.3.4 Sampling Procedure Here, a bootstrap filter is implemented which uses systematic resampling [10, 26, 36, 41, 50]. This begins by taking a random sample U from the uniform distribution on the interval [0, 1/N ] and then selecting N points U i for i ∈ {1, . . . , N} on the interval [0, 1] such that (8) Let the particles currently have locations xi. Using the inversion method, we calculate the cumulative sum of the normalised particle weights wi and define the inverse function D of this cumulative sum, that is: U i = (i − 1)/N + U. i−1(cid:88) i(cid:88) wj, wj  . D(u) = i for u ∈ j=1 j=1 Finally, the new locations of the resampled particles are given by xD(U i). As discussed in Section 2, a well-studied issue that particle filters face is that of particle deprivation [42], which refers to the problem of particles converging to a single point such that all particles, but one, vanish [51]. Here, the problem is addressed in two ways. Firstly by simply using large numbers of particles relative to the size of the state space and, secondly, by diversifying the particles [52] -- also known as roughening, jittering, and diffusing [53 -- 55]. In each iteration of the model we add Gaussian white noise to the particles' state vector to increase their variance, which increases particle diversity. This encourages a greater variety of particles to be resampled and therefore makes the algorithm more likely to represent the state of the underlying model. This method is a special case of the resample- move method presented in [45]. The amount of noise to add is a key hyper-parameter -- too little and it has no effect, too much and the state of the particles moves far away from the true state -- as discussed in the following section. 4 Experimental Results 4.1 Outline of the Experiments Recall that the aim of the paper is to quantify the conditions under which a typical particle filter is able to reliably estimate the 'true' state of an underlying pedestrian system through the combination of a modelled state estimate, produced using an agent-based model, and observational data. By examining the error (i.e. the difference between the particle filter estimate of the system state and the pseudo-truth data) under different conditions, the paper will present some preliminary estimates of the potential for the use of particle filtering in real-time crowd simulation. In particular, the paper will estimate the minimum number of particles (Np) that are needed to model a system that has a given number of agents (Na). Although the dynamics of the model used here are simpler than those of more advanced 8 A PREPRINT - SEPTEMBER 23, 2019 crowd models, and hence the particle filter is tasked with an easier problem than it would have to solve in a real-world scenario, these experiments provide valuable insight into the general potential of the method for crowd simulation. It is well known that one of the main drawbacks with a particle filter is that the number of particles required can explode as the complexity of the system increases [e.g. 36, 42]. In this system, the complexity of the model is determined by the number of agents. As outlined in Section 3, randomness is introduced through agent interactions. Therefore the fewer the number of agents, the smaller the chance of interactions occurring and the lower the complexity. As the number of agents increases,we find that the number of interactions increases exponentially (Figure 5, discussed in the following section, will illustrate this). The paper will also experiment with the amount of particle noise that needs to be included to reduce the problem of particle deprivation (σp), but this is not a focus of the experiments. To quantify the 'success' of each parameter configuration -- i.e. the number of particles Np and amount of particle noise σp that allow the particle filter to reliably represent a system of Na agents -- an estimate of the overall error associated with a particular particle filter configuration is required. There are a number of different ways that this error could be calculated. Here, we calculate the mean weight of each particle after resampling in every data assimilation window (the weights vary during an experiment because in early windows there are few agents and hence very little stochasticity so particle errors are low). Then we take the mean of these individual particle errors. In addition, because the results from an individual experiment can vary slightly, each particle configuration is executed a number of times, M, and the median error across experiments is calculated. Formally if ν(t, j) is the error of particle j in a data assimilation window t, and the total number of windows is T , then the total error of that particle filter configuration across M experiments is: (cid:80)T  Np(cid:88) j=1  t=1 ν(t) T ENp,σp,Na = medianM (10) where medianM () calculates the median over M experiments. In summary, the Table 1 outlines the parameters that are used in the experiments. There are a number of other model and particle filter parameters that can vary, but ultimately these do not influence the results outlined here and are not experimented with. The parameters, and code, are available in full from the project repository [21]. Table 1: Main parameters used in the experiments Symbol Value / Range Parameter Number of agents Na Number of particles Np Particle noise σp Measurement noise σm Number of experiments (repetitions) M Model iterations in each data assimilation window - [2, 40] [1, 10000] [0.25, 0.5] 1.0 20 100 4.2 Results 4.2.1 Overall Error Figure 4 plots the median of the mean error over all experiments to show how it varies with differing numbers of agents and particles. Due to the computational difficulty in running experiments with large numbers of particles and the need for an exponential increase in the number of particles with the number of agents (discussed in detail below), there are fewer experiments with large numbers of particles and hence the the experiments are not distributed evenly across the agents/particles space. Thus the error is presented in the form of an interpolated heat map. Broadly there is a reduction in error from the bottom-right corner (few particles, many agents) to the top left corner (many particles, few agents). The results illustrate that, as expected, there is a larger error with increasing numbers of agents but this can be mediated with larger numbers of particles. Note the logarithmic scale used on the vertical axis; an exponentially greater number of particles is required for each additional agent included in the simulation. There are two reasons for this exponential increase in the number of particles required. Firstly, as the number of agents increases so does the dimensionality of the state space. Also, and perhaps more importantly, with additional agents the chances of collisions, and hence stochastic behaviour, increases exponentially. This is illustrated by Figure 5 which presents the total number of collisions that occur across a number of simulations with a given number of agents. 9 A PREPRINT - SEPTEMBER 23, 2019 Figure 4: Median of the mean errors after resampling Figure 5: The total number of collisions that occur given the number of agents. The blue line represents a polynomial regression model of order 2 with 99% confidence intervals. On its own, the overall particle filter error (Figure 4) reveals little information about which configurations would be judged 'sufficiently reliable' to be used in practice. Therefore it is illuminating to visualise some of the results of individual particle filter runs to see how the estimates of the individual agents' locations vary, and what might be considered an 'acceptable' estimate of the true state. Figure 6 illustrates the state of a particle filter with 10 particles and 10 agents at the end of its first data assimilation window (after resampling). With only ten agents in the system there are few, if any, collisions and hence very little stochasticity; all particles are able to represent the locations of the agents accurately. As the number of agents increases, collisions become much more likely and the chance of a particle diverging from the pseudo-truth state increases considerably. It becomes more common that no single particle will correctly capture the behaviours of all agents. Therefore even after resampling there are some agents whose locations the particle filter is 10 A PREPRINT - SEPTEMBER 23, 2019 Figure 6: State of a particle filter with 10 agents and 10 particles after 100 and 200 iterations (after resampling at the end of the first and second data assimilation windows). Black squares illustrate the (pseudo) real locations of the agents and red circles represent the locations of those agents as predicted by individual particles (in this case all particles predict the agents' locations accurately and hence the red circles overlap). not able to accurately represent. Figure 7 illustrates a filter running with 40 agents and still only 10 particles. The long black lines show the locations of pseudo-real agents and the corresponding agents in the individual particles; it is clear that for some agents none of the particles have captured their pseudo-real locations. This problem can be mediated by increasing the number of particles. Figure 4 showed that with approximately 10,000 particles the error for simulations with 40 agents drops to levels that are comparable to the simulations of 10 agents. Hence a rule of thumb is that any particle filter with an overall error that is comparable to a clearly successful filter (i.e. Figure 6) are reliably estimating the state of the system. Figure 7: State of a particle filter with 50 agents and 10 particles. Lines connecting black squares (the pseudo-real agent locations) to red circles (particle estimate of the agent location) show that some particle estimates are a long way from the true agent locations. 4.2.2 Impact of Resampling Resampling is the process of weighting all particles according to how well they represent the pseudo-truth data; those with higher weights are more likely to be sampled and used in the following data assimilation window. This is important to analyse because it is the means by which the particle filter improves the overall quality of its estimates. Figure 8 illustrates the impact of resampling on the error of the particle filter. With fewer than 10 agents in the system resampling is unnecessary because all particles are able to successfully model the state of the system. With more than 10 agents, however, it becomes clear that the population of particles will rapidly diverge from the pseudo-truth system state and resampling is essential for the filter manage to limit the overall error. 11 0255075100125150175200X position020406080100Y position10 agents, 10 particles, 100 iterations0255075100125150175200X position020406080100Y position10 agents, 10 particles, 200 iterations0255075100125150175200X position020406080100Y position40 agents, 10 particles, 100 iterations0255075100125150175200X position020406080100Y position40 agents, 10 particles, 200 iterations A PREPRINT - SEPTEMBER 23, 2019 Figure 8: Median of the mean errors before and after resampling 4.2.3 Particle Variance As discussed in Section 3.3.4, the variance of the population of particles can be a reliable measure for estimating whether particle deprivation is occurring. If there is very little variance in the particles, then it is likely that they have converged close to a single point in the space of possible states. This needs to be avoided because, in such situations, it is extremely unlikely that any particles will reliably represent the state of the real system. Figure 9 illustrates this by visualising the mean error of all particles, ν(t) (defined in Equation 6), in each data assimilation window, t, and their variance under different numbers of agents and particles. Note that each agent/particle configuration is executed 10 times and the results are visualised as boxplots. Also, simulations with larger numbers of agents are likely to run for a larger number of iterations, but the long-running models usually have very few agents in them in later iterations (most have left, leaving only a few slow agents). Hence only errors up to 600 iterations, where most of the agents have left the environment in most of the simulations, are shown. The graphs in Figure 9 can be interpreted as follows: • With 5 agents and 10 particles there is very low error and low variance (so low that the box plots are difficult to make out on Figure 9). This suggests that particle deprivation is occurring, but there are so few agents that the simulation is largely deterministic so the particles are likely to simulate the pseudo-truth observations accurately regardless. • When the number of agents is increased to 30 agents and 10 particles, the errors are much larger. The increased non-linearity introduced by the greater number of agents (and hence greater number of collisions) means that the population of particles, as a whole, is not able to simulate the pseudo-truth data. Although particle variance can be high, none of the particles are successfully simulating the target. • Finally, with 30 agents and 10,000 particles, the errors are relatively low in comparison, especially after the first few data assimilation windows. 4.2.4 Particle Noise The number of particles (Np) is the most important hyper-parameter, but the amount of noise added to the particles (σp) is also important as this is the means by which particle deprivation is prevented. However, the addition of too much noise will push a particle a long way away from the true underlying state. Under these circumstances, although particle deprivation is unlikely none of the particles will be close to the true state. To illustrate this, Figure 10 presents the median error with a greater amount of noise (σp = 0.5). The overall pattern is similar to the equivalent graph produced with σp = 0.25 in Figure 4 -- as the number of agents in the simulation (Na) increases so does the number of particles required to maintain low error (Np) -- but the overall error in each Na/Np combination is substantially larger for the experiments with additional noise. Future work could explore the optimal amount of noise in more detail; σ = 0.25 was found to be the most reliable through trial and error. 12 A PREPRINT - SEPTEMBER 23, 2019 Figure 9: Mean error and variance of particles under different combinations of the number of particles and number of agents 5 Discussion and Future Work 5.1 Discussion This paper has experimented with the use of a sequential importance resampling (SIR) particle filter (PF) as a means of dynamically incorporating data into a simple agent-based model of a pedestrian system. The results demonstrate that it is possible to use a particle filter to perform dynamic adjustment of the model. However, they also show that (as expected [36, 56]) as the dimensionality of the system increases, the number of particles required to maintain an acceptable approximation error grows exponentially. The reason for this is because, as the dimensionality increases, it becomes less likely that an individual particle will have the 'correct combination' of values [26]. In this work, the dimensionality is proportional to the number of agents. At most 10,000 particles were used, which was sufficient for a simulation with 30-40 agents. However, for a more complex and realistic model containing hundreds or thousands of agents, the number of particles required would most likely number in the millions. The particle filter used in this study was provided with more information than would normally be available. For example, information was supplied as fixed parameters on when each agent entered the simulation, their maximum speeds, and their chosen destinations. Therefore the only information that the particle filter was lacking was the actual locations of the agents and whether 13 A PREPRINT - SEPTEMBER 23, 2019 Figure 10: Median of the mean errors after resampling with additional noise (σ = 0.5). they would chose to move left or right to prevents a collision with another agent. It is entirely possible to include these agent-level parameters in the state vector, but this would further increase the size of the state space and hence the number of particles required. This is an important caveat as in a real-world situation it is very unlikely that such detail would be available. Future work should begin to experiment with the number of particles that would be required when observational data that are more akin to those available in the real world are used. There are a number of possible improvements that could be made to the basic SIR particle filter to reduce the number of particles required. For example, [10] propose component set resampling -- details below -- but exploring these further is beyond the scope of this paper. Overall, these results reflect those of other studies which demonstrate that particle filtering has value for simulations with relatively few agents and interactions [e.g. 10, 31, 57] but that the large dimensionality of a pedestrian system poses problems for the standard (unmodified) bootstrap filter. 5.2 Improvements to the particle filter There are a number of adaptions to the main particle filtering algorithm that might make the method more amenable to use with complex agent-based models. The aforementioned Component Set Resampling [10] approach proposes that individual components of particles are sampled, rather than whole particles in their entirety. A more commonly used approach is to reduce the dimensionality of the problem in the first place. With spatial agent-based models, such as the one used here, spatial aggregation provides such an opportunity. In the data assimilation stage, the state vector could be converted to an aggregate form, such as a population density surface, and particle filtering could be conducted on the aggregate surface rather than on the individual locations of the agents. After assimilation, the particles could be disaggregated and then run as normal. This will, of course, introduce error because the exact positions of agents in the particles will not be known when disaggregating, but that additional uncertainty might be outweighed by the benefits of a more successful particle filtering overall. In addition, the observations that could be presented to an aggregate particle filter might be much more in line with those that are available in practice (as will be discussed shortly). If the aim of real-time model calibration is to give decision makers a general idea about how the system is behaving in real time, then this additional uncertainty might not be problematic. A similar approach, proposed by [56], could be to divide up the space into smaller regions and then apply the algorithm locally to these regions (i.e. a divide-and-conquer approach). Although it is not clear how well divide-and-conquer would work in an agent-based model -- for example, [26] developed the method for a discrete cellular automata model -- it would be an interesting avenue to explore. 5.3 Real-World Implications and Future Work It is important to note that, unlike other data assimilation approaches, the particle filter does not dynamically alter the state of the running model. This could be advantageous because, with agent-based modelling, it is not clear that the state of an agent should be manipulated by an external process. Agents typically have goals and a history, and behavioural rules that rely on those features, so artificially altering an agent's internal state might disrupt their behaviour making it, at worst, nonsensical. Experiments with alternative (potentially more efficient) algorithms such as 4DVar or a the Ensemble Kalman Filter should be conducted to test this. 14 A PREPRINT - SEPTEMBER 23, 2019 Ultimately the aim of this work is to develop methods that will allow simulations of human pedestrian systems to be optimised in real time. Not only will such methods provide decision makers with more accurate information about the present, but they could also allow for better predictions of the near future [c.f. 57]. One assumption made throughout the paper, which limits its direct real-world use, is that the locations of pseudo-real individuals are known, albeit with some uncertainty. Not only is this assumption unrealistic -- it is rare for individuals to be tracked to this degree in public places -- but we would also argue that the privacy implications of tracking individual people are not outweighed by the benefits offered by better understanding the system. Therefore, immediate future work will test how well a data assimilation algorithm would fare were it supplied only aggregate information such as the number of people who pass through a barrier, or the number of people recorded by a CCTV camera within a particular area. Both of these measures can be used in aggregate form and would be entirely anonymous. It is unclear whether such aggregate data would be sufficient to identify a 'correct' agent-based model, so experiments should explore the spatio-temporal resolution of the aggregate data are required. Also, identifiability/equifinality analysis might help initially as a means of estimating whether the available data are sufficient to identify a seemingly 'correct' model in the first place. In the end, such research might help to provide evidence to policy makers for the number, and characteristics, of the sensors that would need to be installed to accurately simulate the target system, and how these could be used to maintain the privacy of the people who they are recording. References [1] E Bonabeau. Agent based modeling: Methods and techniques for simulating human systems. Proceedings of the National Academy of Sciences, 99(90003):7280 -- 7287, 2002. [2] J. Doyne Farmer and Duncan Foley. The economy needs agent-based modelling. Nature, 460(7256):685 -- 686, August 2009. [3] Colin M. Henein and Tony White. Agent-Based Modelling of Forces in Crowds. In David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Dough Tygar, Moshe Y. Vardi, Ger- hard Weikum, Paul Davidsson, Brian Logan, and Keiki Takadama, editors, Multi-Agent and Multi-Agent-Based Simulation, volume 3415, pages 173 -- 184. Springer Berlin Heidelberg, Berlin, Heidelberg, 2005. [4] Andrew T. Crooks and Sarah Wise. GIS and agent-based models for humanitarian assistance. Computers, Environment and Urban Systems, 41:100 -- 111, 2013. [5] Chuanjun Ren, Chenghui Yang, and Shiyao Jin. Agent-Based Modeling and Simulation on Emergency Evacu- ation. In Ozgur Akan, Paolo Bellavista, Jiannong Cao, Falko Dressler, Domenico Ferrari, Mario Gerla, Hisashi Kobayashi, Sergio Palazzo, Sartaj Sahni, Xuemin (Sherman) Shen, Mircea Stan, Jia Xiaohua, Albert Zomaya, Geoffrey Coulson, and Jie Zhou, editors, Complex Sciences, volume 5, pages 1451 -- 1461. Springer Berlin Hei- delberg, Berlin, Heidelberg, 2009. [6] Timothy Schoenharl and Greg Madey. Design and Implementation of An Agent-Based Simulation for Emergency Response and Crisis Management. Journal of Algorithms & Computational Technology, 5(4):601 -- 622, 2011. [7] Zarita Zainuddin, Kumatha Thinakaran, and Ibtesam Abu-Sulyman. Simulating the Circumambulation of the Ka'aba using SimWalk. European Journal of Scientific Research, 38:454 -- 464, 2009. [8] Dirk Helbing, Illés Farkas, and Tamás Vicsek. Simulating dynamical features of escape panic. Nature, 407:487 EP -- , September 2000. [9] David J. B. Lloyd, Naratip Santitissadeekorn, and Martin B. Short. Exploring data assimilation and forecasting issues for an urban crime model. European Journal of Applied Mathematics, 27(Special Issue 03):451 -- 478, 2016. [10] Minghao Wang and Xiaolin Hu. Data assimilation in agent based simulation of smart environments using particle filters. Simulation Modelling Practice and Theory, 56:36 -- 54, 2015. [11] Jonathan A. Ward, Andrew J. Evans, and Nicolas S. Malleson. Dynamic calibration of agent-based models using data assimilation. Royal Society Open Science, 3(4), 2016. [12] Eugenia Kalnay. Atmospheric Modeling, Data Assimilation and Predictability. Cambridge University Press, 2003. [13] John M. Lewis, S. Lakshmivarahan, and Sudarshan Dhall. Dynamic Data Assimilation: A Least Squares Ap- proach. Cambridge University Press, Cambridge, 2006. [14] Jan C. Thiele, Winfried Kurth, and Volker Grimm. Facilitating Parameter Estimation and Sensitivity Analysis of Agent-Based Models: A Cookbook Using NetLogo and 'R'. Journal of Artificial Societies and Social Simulation, 17(3), 2014. 15 A PREPRINT - SEPTEMBER 23, 2019 [15] M. Pennisi, R. Catanuto, F. Pappalardo, and S. Motta. Optimal vaccination schedules using simulated annealing. Bioinformatics, 24(15):1740 -- 1742, August 2008. [16] A. J. Heppenstall, A.J. Evans, and M H Birkin. Genetic algorithm optimisation of an agent-based model for simulating a retail market. Environment and Planning B: Planning and Design, 34:1051 -- 1070, 2007. Cited by 0018. [17] Jakob Grazzini, Matteo G. Richiardi, and Mike Tsionas. Bayesian estimation of agent-based models. Journal of Economic Dynamics and Control, 77:26 -- 47, April 2017. [18] Jonathan Ozik, Nicholson T. Collier, Justin M. Wozniak, Charles M. Macal, and Gary An. Extreme-Scale Dynamic Exploration of a Distributed Agent-Based Model With the EMEWS Framework. IEEE Transactions on Computational Social Systems, 5(3):884 -- 895, September 2018. [19] Francis Oloo and Gudrun Wallentin. An Adaptive Agent-Based Model of Homing Pigeons: A Genetic Algorithm Approach. ISPRS International Journal of Geo-Information, 6(1):27, January 2017. [20] Francis Oloo, Kamran Safi, and Jagannath Aryal. Predicting Migratory Corridors of White Storks, Ciconia ciconia, to Enhance Sustainable Wind Energy Planning: A Data-Driven Agent-Based Model. Sustainability, 10(5):1470, 2018. [21] Dust project code repository, including stationsim. XXXXgithuburl. Accessed: XX/XX/2019. [22] Franziska Klügl and Guido Rindsfüser. Large-Scale Agent-Based Pedestrian Simulation. In Paolo Petta, Jörg P. Müller, Matthias Klusch, and Michael Georgeff, editors, Multiagent System Technologies, volume 4687, pages 145 -- 156. Springer Berlin Heidelberg, Berlin, Heidelberg, 2007. [23] Xu Chen, Haiying Li, Jianrui Miao, Shixiong Jiang, and Xi Jiang. A multiagent-based model for pedestrian simulation in subway stations. Simulation Modelling Practice and Theory, 71:134 -- 148, February 2017. [24] Inhi Kim, Ronald Galiza, and Luis Ferreira. Modeling pedestrian queuing using micro-simulation. Transporta- tion Research Part A: Policy and Practice, 49:232 -- 240, March 2013. [25] C. Natalie van der Wal, Daniel Formolo, Mark A. Robinson, Michael Minkov, and Tibor Bosse. Simulating In Jacek Mercik, editor, Trans- Crowd Evacuation with Socio-Cultural, Cognitive, and Emotional Elements. actions on Computational Collective Intelligence XXVII, volume 10480, pages 139 -- 177. Springer International Publishing, Cham, 2017. [26] Yuan Long and Xiaolin Hu. Spatial Partition-Based Particle Filtering for Data Assimilation in Wildfire Spread Simulation. ACM Transactions on Spatial Algorithms and Systems, 3(2):1 -- 33, August 2017. [27] Frederica Darema. Dynamic data driven applications systems: A new paradigm for application simulations and measurements. In Computational Science-ICCS 2004, pages 662 -- 669. Springer, 2004. [28] Timothy W. Schoenharl and Greg Madey. Evaluation of Measurement Techniques for the Validation of Agent- Based Simulations Against Streaming Data. In Marian Bubak, Geert Dick van Albada, Jack Dongarra, and Peter M. A. Sloot, editors, Computational Science -- ICCS 2008, number 5103 in Lecture Notes in Computer Science, pages 6 -- 15. Springer Berlin Heidelberg, 2008. [29] Haifeng Zhang, Yevgeniy Vorobeychik, Joshua Letchford, and Kiran Lakkaraju. Data-Driven Agent-Based Mod- In Proceedings of the 2015 International Conference on eling, with Application to Rooftop Solar Adoption. Autonomous Agents and Multiagent Systems, AAMAS '15, pages 513 -- 521, Richland, SC, 2015. International Foundation for Autonomous Agents and Multiagent Systems. [30] Nasri Bin Othman, Erika Fille Legara, Vicknesh Selvam, and Christopher Monterola. A data-driven agent-based model of congestion and scaling dynamics of rapid transit systems. Journal of Computational Science, 10:338 -- 350, 2015. [31] Jordan Lueck, Jason H. Rife, Samarth Swarup, and Nassin Uddin. Who Goes There? Using an Agent-based Simulation for Tracking Population Movement. In Winter Simulation Conference, Dec 8 - 11, 2019., National Harbor, MD, USA, 2019. [32] Peter Bauer, Alan Thorpe, and Gilbert Brunet. The quiet revolution of numerical weather prediction. Nature, 525(7567):47 -- 55, 2015. [33] R. A. Panofsky. Objective Weather-Map Analysis. Journal of Meteorology, 6(6):386 -- 392, 1949. [34] J. G. Charney. Dynamic Forecasting by Numerical Process. In Thomas F. Malone, editor, Compendium of Meteorology, pages 470 -- 482. American Meteorological Society, Boston, MA, 1951. [35] Oliver Talagrand. The Use of Adjoint Equations in Numerical Modelling of the Atmospheric Circulation. In An- dreas Griewank and George F. Corliss, editors, Automatic Differentiation of Algorithms: Theory, Implementation, and Application, pages 169 -- 180. SIAM, Philadelphia, PA, 1991. 16 A PREPRINT - SEPTEMBER 23, 2019 [36] Alberto Carrassi, Marc Bocquet, Laurent Bertino, and Geir Evensen. Data assimilation in the geosciences: An overview of methods, issues, and perspectives. Wiley Interdisciplinary Reviews: Climate Change, 9(5):e535, September 2018. [37] Niclas Bergman. Recursive Bayesian Estimation: Navigation and Tracking Applications. Univ., Linköping, 1999. OCLC: 186143552. [38] Arnaud Doucet, Simon Godsill, and Christophe Andrieu. On sequential Monte Carlo sampling methods for Bayesian filtering. Statistics and Computing, 10(3):197 -- 208, July 2000. [39] K. Uosaki, Y. Kimura, and T. Hatanaka. Nonlinear state estimation by evolution strategies based particle filters. In The 2003 Congress on Evolutionary Computation, 2003. CEC '03., volume 3, pages 2102 -- 2109 Vol.3, December 2003. [40] Jun S. Liu and Rong Chen. Sequential Monte Carlo Methods for Dynamic Systems. Journal of the American Statistical Association, 93(443):1032 -- 1044, September 1998. [41] Randal Douc, Olivier Cappé, and Eric Moulines. Comparison of Resampling Schemes for Particle Filtering. arXiv:cs/0507025, July 2005. [42] Chris Snyder, Thomas Bengtsson, Peter Bickel, and Jeff Anderson. Obstacles to High-Dimensional Particle Filtering. Monthly Weather Review, 136(12):4629 -- 4640, December 2008. [43] M. S. Arulampalam, S. Maskell, N. Gordon, and T. Clapp. A tutorial on particle filters for online nonlinear/non- Gaussian Bayesian tracking. IEEE Transactions on Signal Processing, 50(2):174 -- 188, February 2002. [44] S. Nakano, G. Ueno, and T. Higuchi. Merging particle filter for sequential data assimilation. Nonlinear Processes in Geophysics, 14(4):395 -- 408, July 2007. [45] Walter R. Gilks and Carlo Berzuini. Following a moving target-Monte Carlo inference for dynamic Bayesian models. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 63(1):127 -- 146, February 2001. [46] J. D. Hol, T. B. Schon, and F. Gustafsson. On Resampling Algorithms for Particle Filters. Nonlinear Statistical Signal Processing Workshop, pages 79 -- 82, September 2006. In 2006 IEEE [47] N.J. Gordon, D.J. Salmond, and A.F.M. Smith. Novel approach to nonlinear/non-Gaussian Bayesian state esti- mation. IEE Proceedings F Radar and Signal Processing, 140(2):107, 1993. [48] J. Carpenter, P. Clifford, and P. Fearnhead. Improved particle filter for nonlinear problems. IEE Proceedings - Radar, Sonar and Navigation, 146(1):2 -- 7, February 1999. [49] Paul Fearnhead and Hans R. Künsch. Particle Filters and Data Assimilation. Annual Review of Statistics and Its Application, 5(1):421 -- 449, 2018. [50] Arnaud Doucet, Nando Freitas, and Neil Gordon. An Introduction to Sequential Monte Carlo Methods. In Arnaud Doucet, Nando Freitas, and Neil Gordon, editors, Sequential Monte Carlo Methods in Practice, pages 3 -- 14. Springer New York, New York, NY, 2001. [51] Augustine Kong, Jun S. Liu, and Wing Hung Wong. Sequential Imputations and Bayesian Missing Data Prob- lems. Journal of the American Statistical Association, 89(425):278 -- 288, March 1994. [52] P. Vadakkepat and L. Jing. Improved Particle Filter in Sensor Fusion for Tracking Randomly Moving Object. IEEE Transactions on Instrumentation and Measurement, 55(5):1823 -- 1832, October 2006. [53] Tiancheng Li, Shudong Sun, Tariq Pervez Sattar, and Juan Manuel Corchado. Fight sample degeneracy and impoverishment in particle filters: A review of intelligent approaches. Expert Systems with Applications, 41(8):3944 -- 3954, June 2014. [54] Neil Shephard and Thomas Flury. Learning and filtering via simulation: Smoothly jittered particle filters. Tech- nical Report 469, University of Oxford, Department of Economics, December 2009. [55] Juan Jose Pantrigo, Angel Sanchez, Kostas Gianikellis, and Antonio S. Montemayor. Combining Particle Filter and Population-based Metaheuristics for Visual Articulated Motion Tracking. ELCVIA Electronic Letters on Computer Vision and Image Analysis, 5(3):68 -- 83, November 2005. [56] Patrick Rebeschini and Ramon van Handel. Can local particle filters beat the curse of dimensionality? The Annals of Applied Probability, 25(5):2809 -- 2866, October 2015. [57] Le-Minh Kieu, Nicolas Malleson, and Alison Heppenstall. Dealing with uncertainty in agent-based models for short-term predictions. arXiv:1908.08288 [cs], 2019. 17 A PREPRINT - SEPTEMBER 23, 2019 A Instructions for Running the Source Code The source code to run the StationSim model and the particle filter experiments can be found in the main 'Data Assimilation for Agent-Based Modelling' (DUST) project repository: github.com/urban-analytics/dust Specifically, scripts and instructions to run the experiments are available at: github.com/Urban-Analytics/dust/tree/master/Projects/ABM_DA/experiments/pf_experiments 18
1710.10013
1
1710
2017-10-27T07:39:49
Declarative vs Rule-based Control for Flocking Dynamics
[ "cs.MA", "eess.SY" ]
The popularity of rule-based flocking models, such as Reynolds' classic flocking model, raises the question of whether more declarative flocking models are possible. This question is motivated by the observation that declarative models are generally simpler and easier to design, understand, and analyze than operational models. We introduce a very simple control law for flocking based on a cost function capturing cohesion (agents want to stay together) and separation (agents do not want to get too close). We refer to it as {\textit declarative flocking} (DF). We use model-predictive control (MPC) to define controllers for DF in centralized and distributed settings. A thorough performance comparison of our declarative flocking with Reynolds' model, and with more recent flocking models that use MPC with a cost function based on lattice structures, demonstrate that DF-MPC yields the best cohesion and least fragmentation, and maintains a surprisingly good level of geometric regularity while still producing natural flock shapes similar to those produced by Reynolds' model. We also show that DF-MPC has high resilience to sensor noise.
cs.MA
cs
Declarative vs Rule-based Control for Flocking Dynamics Usama Mehmood Department of Computer Science, Stony Brook University, USA Nicola Paoletti Department of Computer Science, Stony Brook University, USA Radu Grosu Cyber-Physical Systems Group, Technische Universitat Wien, Austria Ashish Tiwari SRI International, USA Shan Lin University, USA Junxing Yang Department of Electrical and Computer Engineering, Stony Brook Department of Computer Science, Stony Brook University, USA Dung Phan Department of Computer Science, Stony Brook University, USA Scott D. Stoller Department of Computer Science, Stony Brook University, USA Scott A. Smolka Department of Computer Science, Stony Brook University, USA ABSTRACT The popularity of rule-based flocking models, such as Reynolds' classic flocking model, raises the question of whether more declar- ative flocking models are possible. This question is motivated by the observation that declarative models are generally simpler and easier to design, understand, and analyze than operational models. We introduce a very simple control law for flocking based on a cost function capturing cohesion (agents want to stay together) and separation (agents do not want to get too close). We refer to it as declarative flocking (DF). We use model-predictive control (MPC) to define controllers for DF in centralized and distributed settings. A thorough performance comparison of our declarative flocking with Reynolds' classic flocking model, and with more recent flocking models that use MPC with a cost function based on lattice struc- tures, demonstrate that DF-MPC yields the best cohesion and least fragmentation, and maintains a surprisingly good level of geomet- ric regularity while still producing natural flock shapes similar to those produced by Reynolds' model. We also show that DF-MPC has high resilience to sensor noise. ACM Reference Format: Usama Mehmood, Nicola Paoletti, Dung Phan, Radu Grosu, Shan Lin, Scott D. Stoller, Ashish Tiwari, Junxing Yang, and Scott A. Smolka. 2018. Declara- tive vs Rule-based Control for Flocking Dynamics. In Proceedings of ACM/SIGAPP Symposium On Applied Computing (SAC 2018). ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Flocking is a collective behavior exhibited by a large number of interacting agents possessing a common group objective [7]. The term is most commonly associated with birds, and more recently, drones. Examples include foraging for food, executing a predator- avoidance maneuver, and engaging in migratory behavior. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). SAC 2018, April 9-13, 2018, Pau, France © 2018 Copyright held by the owner/author(s). ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. https://doi.org/10.1145/nnnnnnn.nnnnnnn With the introduction of Reynolds' model [12, 13], rule-based control became the norm in the flocking community. Specifically, in this model, at each time-step, each agent executes a control law given in terms of the weighted sum of three competing forces to determine its next acceleration. Each of these forces has its own rule: separation (keep a safe distance away from your neighbors), cohesion (move towards the centroid of your neighbors), and alignment (steer toward the average heading of your neighbors). As the descriptions suggest, these rules are executed by each agent in a distributed environment with limited-range sensing and no communication. The popularity of Reynolds' model and its many variants raises the question: Is there a more abstract declarative form of control for flocking? This question is important because declarative models are generally simpler and easier to design, understand, and analyze than operational models. This is analogous to declarative programs (e.g., functional programs and logic programs) being easier to write and verify than imperative programs. We show that the answer to this question is indeed positive by providing a very simple control law for flocking based on a cost function comprising two main terms: cohesion (the average squared distance between all pairs of agents) and separation (a sum of in- verse squared distances, except this time between pairs of agents within each other's sensing range). That is it. For example, no term representing velocity alignment is needed. The cost function speci- fies what we want as the goal, and is hence declarative. In contrast, the update rules in Reynolds' model aim to achieve an implicit goal and hence are operational. Executing declarative control amounts to finding the right balance between attracting and repelling forces between agents. We refer to this approach as Declarative Flocking (DF). We use MPC (model-predictive control) to define controllers for DF, and refer to this approach as DF-MPC. We define a cen- tralized version of DF-MPC, which requires communication, and a distributed version, which does not. Previous MPCs for flocking exist, e.g., [16–18]. Most of these MPCs are designed to conform to the α-lattice model of flocking proposed in [7]. α-lattices impose a highly regular structure on flocks: all neighboring agents are distance d apart, for a specified constant d. This kind of structure is seen in some settings, such as beehives, but is not expected in many other natural and engineered settings, and it is not imposed by Reynolds' model. SAC 2018, April 9-13, 2018, Pau, France U. Mehmood et al. In this paper, we show, via a thorough performance evaluation, how centralized and distributed DF-MPC compare to Reynolds' rule- based approach [12, 13], Olfati-Saber's potential-based approach [7], a variant of Zhan and Li's centralized lattice-based MPC ap- proach [15, 16], and Zhang et al.'s distributed lattice-based MPC approach [17]. We consider performance measures that capture mul- tiple dimensions of flocking behavior: number of sub-flocks (flock fragmentation), maximum sub-flock diameter (cohesion), velocity convergence, and a new parameter-free measure of the geometric regularity of the formation. Our experimental results demonstrate that DF-MPC yields the best cohesion and least fragmentation, and produces natural flock shapes like those produced by Reynolds' model. Also, distributed DF-MPC maintains a surprisingly good level of geometric regularity. We also analyze the resiliency of DF-MPC and the lattice-based MPC approaches by considering the impact of sensor noise. Our results demonstrate a remarkably high level of resiliency on the part of DF-MPC in comparison with these other approaches. The rest of the paper is organized as follows. Section 2 presents the rule-based, potential-based, and lattice-based MPC approaches mentioned above. Section 3 defines our declarative flocking ap- proach. Section 4 defines our performance measures for flocking models. Section 5 presents our experimental results and perfor- mance evaluation. Section 6 discusses related work. Finally, Sec- tion 7 offers our concluding remarks and directions for future work. xi(k + 1) = xi(k) + dT · vi(k), vi(k) ∈ V vi(k + 1) = vi(k) + dT · ai(k), ai(k) ∈ A, 2 MODELS OF FLOCKING BEHAVIOR We consider a set of dynamic agents B = {1, . . . , n} that move according to the following discrete-time equation of motion: (1) (2) where xi(k), vi(k), ai(k) ∈ Rm are respectively position, velocity and acceleration of agent i ∈ B in the m-dimensional space at step k, and dT ∈ R+ is the time step. We consider physical con- straints on velocities and accelerations, described by the sets V v ≤ ¯v} and and A, respectively, which are defined by V = {v a ≤ ¯a}, where ¯v and ¯a limit the allowed magnitude of A = {a the velocity and acceleration vectors, respectively. In most flocking models, agents update their motion by changing their acceleration. In this sense, ai(k) represents the control input for agent i. The configuration of all agents is described by the vector x(k) = [xT 1 (k) . . . xT n (k)]T ∈ n(k)]T ∈ Rm·n. Then the equation Rm·n, and a(k) = [aT of motion for all agents can be expressed as (3) (4) The local neighborhood of agent i is defined by the set of other agents, called neighbors, within a given distance from i, mimicking the agent's visibility sphere. For an interaction radius r > 0 and configuration x, the set of spatial neighbors of agent i, Ni(x) ⊆ B, is given by: (5) 1 (k) . . . aT x(k + 1) = x(k) + dT · v(k), v(k + 1) = v(k) + dT · a(k), n (k)]T ∈ Rm·n. Let v(k) = [vT Ni(x) =(cid:8)j ∈ B j , i ∧ ∥xi − xj ∥ < r(cid:9) , where ∥ · ∥ denotes the Euclidean norm. 1 (k) . . . vT Figure 1: Examples of α-lattice a) and quasi α-lattice b). Solid lines connect agents in the same neighborhood that have dis- tance d. Dashed lines connect those with have distance d ± ϵ for ϵ ≤ δ (the tolerance). E(x) =(cid:8)(i, j) ∈ B × B ∥xi − xj ∥ < r , i , j(cid:9) , For configuration x ∈ Rm·n, we define the associated proximity net G(x) = (B, E(x)) as the graph that connects agents within their interaction radius: (6) To capture the regular geometry of flocks, Olfati-Saber intro- duced the notions of α-lattices, i.e. configurations where each agent is equally distant from its neighbors, and quasi α-lattices, i.e. con- figurations that are α-lattices modulo a small error in the distances [7]. The scale parameter d defines the ideal inter-agent distance. Definition 2.1 (α-lattice [7]). A configuration x ∈ Rm·n is called α-lattice if for all i ∈ B and all j ∈ Ni(x), ∥xi − xj ∥ = d, where d ∈ R+ is the scale of the α-lattice. For tolerance δ ∈ R+, a configuration x ∈ Rm·n is called a quasi α-lattice if for all i ∈ B and all j ∈ Ni(x), ∥xi − xj ∥ − d ≤ δ. 2.1 Sensing noise We extend the classical equations of motion, Eqs. (1)–(2), with sens- ing noise affecting how each agent perceives positions and velocities of its neighbors. Existing work has put little focus on flocking dy- namics subject to noise, which is unfortunately unavoidable in realistic natural and engineered flocks. For actual positions x(k) and velocities v(k) at step k, let x(k) and v(k) denote their noisy counterparts sensed by a generic agent, defined by: x(k) = x(k) + nx(k) and v(k) = v(k) + nv(k), (7) where nx(k) and nv(k) in Rm·n are vectors of independent and identically distributed (i.i.d.) random variables. The position noise nx(k) and velocity noise nv(k) are distributed according to Gauss- ian distributions with mean 0 and standard deviation σx and σv, respectively. We stress the dependency on k because noise variables are independent across time steps. In centralized flocking algorithms, where agent decisions are computed by a single controller with information about the whole population, we use Eq. 7 to define noisy measurements. In dis- tributed algorithms, sensing noise is independent for each agent. We denote the noisy measurement of agent i by x▷i(k) and v▷i(k), where positions and velocities are noisy for all agents except agent i x▷i(k) =[ xT v▷i(k) =[ vT 1 (k) . . . xT 1 (k) . . . vT i (k) . . . xT i (k) . . . vT n (k)]T and n (k)]T , (8) (9) a) b) Declarative vs Rule-based Control for Flocking Dynamics SAC 2018, April 9-13, 2018, Pau, France with x1(k), . . . , xn(k) and v1(k), . . . , vn(k) defined as per (7); implic- itly, for each agent i and each other agent j, the noise distribution is j (k) component of x▷i(k). sampled independently to compute the xT 2.2 Reynolds' rule-based model In Reynolds' rule-based distributed model [12, 13], agents follow simple rules to compute their accelerations from the positions and velocities of their neighbors. The rules are illustrated in Figure 2. They do not explicitly specify the desired flocking formation as an objective; rather, flocking emerges from the interaction rules. Specifically, each agent i ∈ B updates its acceleration ai(k) at step k by considering the following three components (adapted to include sensing noise): (1) Alignment: agents match their velocities with the average velocity of nearby agents. aal i (k) = wal ·'›«'›« i (k) = wc ·'›«'›« ac as i (k) = ws · (2) Cohesion: agents move towards the centroid of the agents in the local neighborhood. (3) Separation: agents move away from nearby neighbors. 1 Ni(x▷i(k)) · j∈Ni(x▷i(k)) 1 Ni(x▷i(k)) · j∈Ni(x▷i(k)) j∈Ni(x▷i(k)) Ni(x▷i(k)) ·'›« 1 (10) (11) (12) vj(k)"fi‹ − vi(k)"fi‹ xj(k)"fi‹ − xi(k)"fi‹ ∥xi(k) − xj(k)∥2"fi‹ xi(k) − xj(k) The cohesion and alignment rules help form and maintain a closely packed, flock-like formation. The separation rule prevents agents from coming too close to each other, thus reducing crowding and collisions. Non-negative constants wal , wc and ws are the weights for each acceleration component. Typically, a smaller interaction radius (hence a smaller neighborhood) is used for the separation rule, because it is significant only when agents are very close to each other. The overall acceleration in Reynolds' model is given by: ai(k) = aal i (k) + ac i (k) + as i (k). (13) 2.3 Olfati-Saber's potential-based model In potential-based flocking models, the interaction between a pair of agents is modeled by a potential field. It is assumed that an agent is a point source, and it has a potential field around it, which ex- erts a force, equal to its gradient, on other agents in its range of influence. The potential field has circular symmetry and hence is a function of distance from the source. In the work of Olfati-Saber [7], the potential function ψα for a pair of agents has its minimum at the desired inter-agent distance d of the desired α-lattice. Outside the interaction radius r, the potential function is constant, so the potential field exerts no force. The exact definition of ψα is com- plicated: it is the definite integral of an "action function" ϕα that is the product of a "bump function" ρh and an uneven sigmoidal function ϕ. The control law computes an agent's acceleration based on the sum of the forces from all other agents in its neighborhood and a velocity alignment term. 2.4 MPC-based models Model predictive control (MPC) [2] is a well-established control technique that works as follows: at each time step k, it computes the optimal control sequence (agents' accelerations in our case) that minimizes a given cost function with respect to a predictive model of the controlled system and a finite prediction horizon of length T , i.e., from step k + 1 to k + T . Then, the first control input of the optimal sequence is applied (the remainder of the sequence is unused), and the algorithm proceeds with a new iteration. Two main kinds of MPC-based flocking models exist, centralized and distributed. Centralized models assume that information about positions and velocities of all agents is available to compute their optimal accelerations. Formally, at each time step k, it solves the following optimization problem: min a(k k), ...,a(k +T−1k)∈A J(k) + λ · T−1t =0 ∥a(k + t k)∥2 (14) where a(k + t k) is the control input (accelerations) for all agents at predicted time step k + t starting from step k. The first term J(k) is the primary model-specific cost function that the controller seeks to optimize within the prediction horizon; it is implicitly a function of the predicted configurations during the prediction horizon for time step k. The second term is standard for MPC problems and penalizes large control inputs, with weight λ > 0. In distributed flocking models, each agent computes its optimal acceleration based only on information about its neighbors. Each agent i solves an optimization problem of the form: min ai(k k), ...,ai(k +T−1k)∈A Ji(k) + λ · T−1t =0 ∥ai(k + t k)∥2 (15) where ai(k + t k) is the acceleration for agent i at predicted time step k + t starting from step k, and Ji(k) is the model-specific cost function for agent i. In distributed MPC, an agent has no way to know current or future control decisions of its neighbors, which are needed to make accurate predictions about their behavior. To address this problem, some approaches allow agents to communi- cate their local control decisions or future positions (e.g. [16, 18]), or assume that neighbors follow some default motion law, e.g., they move with constant velocities. We adopt the second strategy, because it does not require any communication. The majority of existing MPC-based approaches to flocking are designed to optimize the regularity of the flock, by penalizing con- figurations where neighboring agents are not exactly distance d apart, i.e., configurations that differ from an α-lattice [15–18]. We call these approaches lattice-based MPC. Next we describe repre- sentative centralized and distributed lattice-based MPC flocking models, which we extend to account for sensing noise. The cen- tralized model is a variant of a model by Zhan and Li [15, 16]. The distributed model is by Zhang et al. [17]. 2.4.1 Centralized lattice-based MPC flocking. The centralized lattice-based MPC problem is defined as: min a(k k), ...,a(k +T−1k)∈A T  t =1 ∥д (x(k + t k)) ∥2+λ· T−1t =0 ∥a(k+t k)∥2 (16) SAC 2018, April 9-13, 2018, Pau, France U. Mehmood et al. (a) Alignment (b) Cohesion (c) Separation Figure 2: Interaction rules for flocking behavior in Reynolds Model. where x(k + t k) is the configuration of the system at predicted time step k + t starting from step k, following the dynamics: xi(k k) = xi(k) vi(k k) = vi(k) xi(k + t + 1 k) = xi(k + t k) + dT · vi(k + t k) vi(k + t + 1 k) = vi(k + t k) + dT · ai(k + t k), where the initial state of the prediction window is given by noisy measurements. For configuration x, д(x) captures the α-lattice ir- regularity as the total deviation between agent distances and d: ∥д(x)∥2 = (i, j)∈E(x)(cid:13)(cid:13)(cid:13)(cid:13)xji − d · xji ∥xji ∥(cid:13)(cid:13)(cid:13)(cid:13) 2 , with xji = xj − xi . (17) This model is inspired by [15] and [16] but differs from both: in [15] the cost function also contains a velocity alignment term, which the same authors removed in their subsequent work, while in [16], "impulsive MPC" is used, which means that agents directly control their velocities (instead of accelerations), an abstraction that allows physically unrealizable accelerations. 2.4.2 Distributed lattice-based MPC flocking. In the distributed MPC flocking model of Zhang et al. [17], each agent i controls its acceleration based on position and velocity measurements of the neighbors and assumes they have constant velocity (zero accelera- tion) during the prediction horizon. Similarly, the set of neighbors of i is assumed invariant during the prediction horizon, and we denote it by Ni(k) = Ni(x(k)). The control law for agent i is: 3 DECLARATIVE FLOCKING This section introduces centralized and distributed versions of our Declarative Flocking (DF) model, and presents a flocking algorithm based on MPC. Our formulation is declarative in that it consists of just two simple terms: (1) a cohesion term based on the average squared distance between pairs of agents, to keep the flock together, and (2) a separation term based on the inverse squared distances between pairs of agents, to avoid crowding. These two terms repre- sent opposing forces on agents, causing agents to move towards positions in which these forces are balanced. Unlike the majority of existing MPC-based approaches that are designed to optimize conformance to an α-lattice, our design does not impose a specific geometric structure. 3.1 Centralized DF model The cost function J for our centralized DF model contains the two terms described above, with the cohesion term considering all pairs of agents, and the separation term considering only pairs of agents that are neighbors. The weight ω of the separation term provides control over the density of the flock. JC (x) = The control law is Eq. (14) with J(k) equal toT B · (B − 1) ·i∈B j∈B,i <j 1 ∥xij ∥2 t =1 JC (x(k + t k)). ∥xij ∥2 + ω · (i, j)∈E(x) 3.2 Distributed DF model The cost function J for our distributed DF model is similar to the centralized one, except that both terms are limited to consider pairs of agents that are neighbors. 2 1 Ni(k) · j∈Ni(k) ∥xij ∥2 + ω · j∈Ni(k) 1 ∥xij ∥2 (20) T i (x(k + t k)). The control law for agent i is Eq. (15) with Ji(k) equal to t =1 JD 4 MEASURES OF FLOCKING PERFORMANCE We introduce four key measures of flocking performance. A single measure is insufficient, because flocking is indeed characterized by multiple desirable properties, such as aligned velocities and cohe- sion. Olfati-Saber introduces four main properties for flocking [7], informally described as: (1) the group of agents stays connected in a unique flock, i.e., no sub-flocks and fragmentation should emerge; (2) the group remains cohesive, in a close-knit formation; min ai(k k), ...,ai(k +T−1k)∈A T  t =1 ∥дi (x(k + t k)) ∥2+ T−1t =0 ∥ai(k + t k)∥2. λ · (18) JD i (x) = where the predicted future dynamics of i is determined by: xi(k k) = xi(k) vi(k k) = vi(k) xi(k + t + 1 k) = xi(k + t k) + dT · vi(k + t k) xi(k + t + 1 k) = xi(k + t k) + dT · ai(k + t k), while i's neighbors j ∈ Ni(k) have constant velocity: xj(k k) = xj(k) xj(k + t + 1 k) = xj(k + t k) + dT · vj(k). For configuration x, дi(x) is defined in a similar way to Eq. (17) and quantifies how much i's neighborhood Ni(k) deviates from an α-lattice: (19) d · xji 2 . ∥дi(x)∥2 = j∈Ni(k)(cid:13)(cid:13)(cid:13)(cid:13)xji − ∥xji ∥(cid:13)(cid:13)(cid:13)(cid:13) Declarative vs Rule-based Control for Flocking Dynamics SAC 2018, April 9-13, 2018, Pau, France (3) the group moves in a coherent way as if it was a unique body, i.e., agents' velocities are aligned; and (4) the group maintains a regular geometry (in the α-lattice sense). We introduce the following four measures to capture these four requirements. An important concept in these definitions is a sub- flock, which is a set of interacting agents that is too far apart from other agents to interact with them. Formally, a sub-flock in a config- uration x corresponds to a connected component of the proximity net G(x). Let CC(x) ⊆ 2B be the set of connected components of the proximity net G(x). (1) The number of connected components of the proximity net quantifies connectedness-or, equivalently, fragmentation-of the flock. There is no fragmentation when CC(x) = 1. Fragmentation exists when CC(x) > 1. Fragmentation may be temporary or, if sub-flocks move in different directions, permanent. (2) The maximum component diameter, denoted D(x), quantifies cohesion. It is defined by (21) (22) where D(x, B′) is the diameter of connected component B′: D(x) = max B′∈CC(x) D(x, B′) D(x, B′) = max (i, j)∈B′×B′ i,j ∥xij ∥. Note that when all agents are isolated, i.e., CC(x) =i∈B {{i}}, D(x) = −∞ because the domain of the max function in Equation 22 is empty when B′ is a singleton. Note that we consider the maxi- mum diameter of a sub-flock in order to make this measure more independent of connectedness. If we instead considered the overall diameter of the entire (possibly fragmented) flock, any flocking model that did poorly on connectedness would also do very poorly on this measure. (3) The velocity convergence measure, adopted from [17], quanti- fies the average discrepancy between each agent's velocity and the average velocity of the flock. In particular, we extend the measure of [17] to average velocity convergence values across sub-flocks: VC(x, v) =B′∈CC(x)(cid:13)(cid:13)(cid:13)i∈B′ vi −(cid:16)j∈B′ vj CC(x) B′ (cid:17)(cid:13)(cid:13)(cid:13)2(cid:30)B′ (23) (4) To measure the regularity of the geometric structure of a flock, as reflected in the inter-agent spacing, we introduce a parameter- free and model-independent irregularity measure I(x). For a con- nected component (sub-flock) B′, it is defined as the sample stan- dard deviation of the distances between each agent in B′ and its closest neighbor. Thus, the measure penalizes configurations where there is dispersion in inter-agent distances, while not imposing any fixed distance between them (unlike α-lattices). Let CC′(x) = CC(x) \i∈B {{i}} be the set of connected com- ponents where isolated agents are excluded. For CC′(x) = 0 (or equivalently, CC(x) = B), i.e., all agents are isolated, we set the irregularity I(x) = 0, which is the optimal value. This reflects the fact that a single point is a regular structure on its own. Moreover, such a configuration is already highly penalized by CC(x) and VC(v). For CC′(x) > 0, the measure is defined by: I(x) =B′∈CC′ σ(cid:0)i∈B′ minj,i ∥xij ∥(cid:1) CC′ . (24) and is the sum operator (or disjoint union) for multisets. where σ(S) is the standard deviation of the multiset of samples S An α-lattice (see Def. 2.1) has the optimal value of I(x), i.e., I(x) = 0, since all neighboring agents are located at the same distance d from each other, leading to zero standard deviation for the term σ ({d, d, . . . , d}). This shows that I(x) captures the regularity underlying the concept of α-lattice. We introduce this measure because previous measures of regu- larity or irregularity, such as those in [7, 16, 17], measure deviations from an α-lattice with a specified inter-agent distance d and are therefore inapplicable to flocking models, such as Reynolds' model and our DF models, that are not based on α-lattices and do not have a specified target inter-agent distance. Also, our irregularity measure is more flexible than those based on α-lattices, because it gives an optimal score to some configurations that are geometrically regular but not α-lattices. For example, consider a configuration x in which the agents are on the vertices of a grid with edge length e, and the interaction radius is equal to the length of the diagonal of a box in the grid. This configuration has an optimal value for our irregularity measure, i.e., I(x) = 0, because the distance from every agent to its nearest neighbor is e. This configuration is not an α- lattice and hence does not nave an optimal value for the irregularity measures used in prior work. 5 PERFORMANCE EVALUATION We compare the performance of the models of Section 2 with the newly introduced DF flocking models in the 2-dimensional setting. In the first set of experiments (Section 5.1), we evaluate the per- formance measures illustrated in Section 4. In the second set of experiments (Section 5.2), we analyze the resilience of the algo- rithms to sensor noise. For consistency with the experimental settings of [17], the lattice- based MPC problems are solved using the interior point method im- plemented in MATLAB's fmincon function. Our DF-MPC problems are solved using gradient descent optimization. Unless otherwise specified, the population size is n = 30, the simulation length is 100, dT = 0.3, ¯v = 8, ¯a = 1, r = 8.4, d = 7, T = 3, and λ = 1. These parameter values are the same ones reported in [17]. Follow- ing the settings in the OpenSteer project [11], the parameters for Reynolds' model are rc = 9, rs = 5, ral = 7.5, wc = 8, ws = 12, and wal = 8. The weight of the separation term in our centralized and distributed DF-MPC is ω = 50. As in [17], initial positions and initial velocities of agents are uniformly sampled from [−15, 15]2 and [0, 2]2, respectively. 5.1 Performance Comparison of Flocking Algorithms Fig. 3 shows examples of final formations for all flocking models. In particular, we chose configurations where fragmentation did not occur. We observe that the formations for lattice-based MPC algorithms have spread-out, rigid structures, consistent with the SAC 2018, April 9-13, 2018, Pau, France U. Mehmood et al. design objective of maximizing the α-lattice regularity. On the other hand, Reynolds and our DF MPC models result in more natural flock shapes. In Fig. 4, we compare the performance measures averaged over 100 runs for each flocking model. Regarding the number of con- nected components (sub-flocks), our centralized DF-MPC registers the best behavior, rapidly stabilizing to an average of 1 component (see plot a). Our distributed DF-MPC and Reynolds' model have comparable performance, reaching an average number of sub-flocks below 1.4. The lattice-based MPCs and Olfati-Saber instead lead to constant fragmentation, with more than 2 sub-flocks for the distributed lattice-based MPC, 6 for the centralized lattice-based MPC, and more than 8 for Olfati-Saber's model. This ranking is confirmed by the diameter measure (plot b), where our centralized and distributed DF-MPC and Reynolds' model show the best cohesion, outperforming the lattice-based approaches. Recall that this measure indicates the maximum diameter over all sub-flocks, not the diameter of the entire population. As a conse- quence, fragmentation tends to improve diameter values since it produces sub-flocks with fewer individuals. This explains why our distributed DF-MPC performs better on this measure than the cen- tralized version, and similarly why Olfati-Saber's model has smaller diameter measure than centralized lattice-based MPC, which in turn has smaller diameter measure than the distributed variant. As expected, Olfati-Saber's model and the lattice-based MPCs have very good performance for irregularity (plot c), since they are designed to achieve the regular geometric formation of α-lattice. Surprisingly, our distributed DF-MPC performs almost as well as them on this measure. Centralized DF-MPC and Reynolds' model have the least regular formations. For velocity convergence (plot d), we find that all models perform comparably well and are able to achieve flocks with consistent velocities fairly quickly after an initial spike. 5.2 Robustness to Sensing Noise To evaluate the resiliency of the models to sensor noise, we per- formed 20 runs for each model at 10 noise levels. The noise levels are numbered from 1 to 10, and noise level i has σx = 0.2i and σv = 0.1i. For each performance metric, we averaged its final val- ues over 20 runs for each noise level. The results are plotted in Fig. 5. Of the six models, Olfati-Saber's model is the most vulnerable to sensing noise: the number of sub-flocks CC in Olfati-Saber's model quickly increases to nearly 30, rendering other metrics irrelevant. The lattice-based MPC models also exhibit high fragmentation, lead- ing to nominally good but largely irrelevant values for the other performance metrics. Our distributed DF-MPC and Reynolds' model have the best resiliency to sensing noise, with both models exhibit- ing similar profiles in all metrics. While the irregularity and velocity convergence measures increase with noise level, as expected, both models remarkably maintain almost a single connected component with a nearly constant component diameter for all 10 noise levels, with DF-MPC achieving a smaller diameter than Reynolds' model. 6 RELATED WORK Reynolds [12] introduced the first rule-based approach for simula- tion of flocking behavior. With only three simple rules, his model is able to capture complex flocking behaviors of animals. Additional rules can be added to the model to simulate specific behaviors, such as leader following and predator avoidance. Pearce et al. [8] present a rule-based strategy for flocking, where agents move to maximize their view out of the flock. Cucker and Dong [3] present a rule- based flocking approach with proofs of convergence and collision avoidance. Cucker and Smale [4] introduced another popular rule-based flocking model. The Cucker-Smale model is parameterized by a constant β such that if β < 1/2, velocity convergence is guaranteed. If β ≥ 1/2, velocity convergence can also be achieved under some conditions on the initial positions and initial velocities of the agents. Ahn and Ha [1] investigated the effects of multiplicative noise on the long term dynamics of the Cucker-Smale model. Erban et al. [5] extend the Cucker-Smale model to take into account stochasticity (imperfections) of agent behavior and delay in agents' responses to changes in their environment. Flocking models based on potential fields have been proposed in several papers. Tanner et al. [14] propose a potential function Uij, given in Equation 25, where rij2 is the distance between agents i and j. For distances greater than R, the potential is set to a constant value, C, indicating a zero force. In their control law, the acceleration of agent i is based on the sum over all neighbors j of the gradient of the potential function Uij. ri j 2 + loдrij2, (25) Uij =( A similar potential function is also proposed by [10]. Furthermore, potential-based solutions have been extended with additional behav- iors such as obstacle avoidance and leader following. For example, Ogren et.al. [9] use the motion of the leader to guide the motion of the flock; the leader's motion is independent, i.e., is not influenced by other agents. La and Sheng [6] propose an extension of Olfati-Saber's model designed for noisy environments. In addition to the terms found in Olfati-Saber's model, their control law contains feedback terms for position and velocity, to make agents tend to stay close to the cen- troid of their neighborhood and minimizing the velocity mismatch with their neighbors. They show that adding these feedback terms to the control law helps bound the error dynamics of the system. 1 C, rij2 < R rij2 ≥ R 7 CONCLUSIONS This paper presents an abstract declarative form of control for flocking behavior and the results of a thorough comparison of centralized and distributed versions of our MPC-based declarative flocking with four other flocking models. Our simulation results demonstrate that DF-MPC yields the best cohesion and least frag- mentation, and produces natural flock shapes like those produced by Reynolds' rule-based model. Our resiliency analysis shows that the distributed version of our DF-MPC is highly robust to sensor noise. As future work, we plan to study resilience of the flocking models with respect to additional noisy scenarios such as actuation noise (i.e., noise affecting acceleration) and faulty agents with deviant behavior. We also plan to investigate smoothing techniques to increase resilience to sensor noise. Declarative vs Rule-based Control for Flocking Dynamics SAC 2018, April 9-13, 2018, Pau, France (a) Reynolds (b) Lattice-based central- ized MPC Lattice-based (c) tributed MPC dis- (d) DF centralized MPC (e) DF distributed MPC (f) Olfati-Saber Figure 3: Examples of final formations for different flocking models. The red dots are the agent positions. The blue lines denote the agent velocities; the line lengths are proportional to the speeds. (a) Number of connected components CC (b) Max component diameter D (c) Irregularity I (d) Velocity convergence V C Figure 4: Comparison of performance measures obtained with 100 runs for each flocking algorithm. (a) Number of connected components CC Figure 5: Comparison of the final values of the performance measures obtained with 20 runs for each flocking algorithm and for each noise level. (b) Max component diameter D (d) Velocity convergence V C (c) Irregularity I REFERENCES [1] Shin Mi Ahn and Seung-Yeal Ha. 2010. ics of the CuckerâĂŞSmale model with multiplicative white noises. Math. Phys. 51, 10 (2010), 103301. arXiv:http://dx.doi.org/10.1063/1.3496895 Stochastic flocking dynam- J. https://doi.org/10.1063/1.3496895 [2] E.F Camacho and C. Bordons. 2007. Model predictive control. Springer. [3] Felipe Cucker and Jiu-Gang Dong. 2011. A general collision-avoiding flocking framework. IEEE Trans. Automat. Control 56, 5 (2011), 1124–1129. [4] F. Cucker and S. Smale. 2007. Emergent Behavior in Flocks. IEEE Trans. Automat. Control 52, 5 (May 2007), 852–862. https://doi.org/10.1109/TAC.2007.895842 [5] Radek Erban, Jan Hasźkovec, and Yongzheng Sun. 2016. A Cucker–Smale Model with Noise and Delay. SIAM J. Appl. Math. 76, 4 (July 2016), 1535–1557. https: //doi.org/10.1137/15M1030467 [6] H. M. La and W. Sheng. 2010. Flocking control of multiple agents in noisy environments. In 2010 IEEE International Conference on Robotics and Automation. 4964–4969. https://doi.org/10.1109/ROBOT.2010.5509668 [7] Reza Olfati-Saber. 2006. Flocking for multi-agent dynamic systems: Algorithms and theory. IEEE Transactions on automatic control 51, 3 (2006), 401–420. [8] Daniel J. G. Pearce, Adam M. Miller, George Rowlands, and Matthew S. Turner. 2014. Role of projection in the control of bird flocks. Proceedings of the National Academy of Sciences 111, 29 (2014), 10422–10426. https://doi.org/10.1073/pnas. 1402202111 arXiv:http://www.pnas.org/content/111/29/10422.full.pdf [9] Naomi Ehrich Leonard Peter Ogren. 2004. Cooperative control of mobile sen- sor networks:Adaptive gradient climbing in a distributed environment. IEEE transactions on Automatic Control 49, 8 (2004). [10] John H. Reif and Hongyan Wang. 1999. Social potential fields: A distributed behavioral control for autonomous robots. Robotics and Autonomous Systems 27, 3 (1999), 171 – 194. https://doi.org/10.1016/S0921-8890(99)00004-4 [11] Craig Reynolds. 2004. OpenSteer, steering behaviors for autonomous characters. (2004). http://opensteer.sourceforge.net/ [12] Craig W. Reynolds. 1987. Flocks, Herds and Schools: A Distributed Behavioral Model. SIGGRAPH Comput. Graph. 21, 4 (Aug. 1987), 25–34. https://doi.org/10. 1145/37402.37406 [13] Craig W. Reynolds. 1999. Steering Behaviors For Autonomous Characters. In Proceedings of Game Developers Conference 1999. 763–782. 75 70 65 60 55 50 190 200 210 80 60 40 20 0 -20 0 20 40 60 140 130 120 110 100 90 100 120 140 135 130 125 120 115 110 90 100 110 125 120 115 110 105 100 80 90 100 60 40 20 0 -20 0 20 40 60 80 Lattice Distributed Reynolds DF Centralized DF Distributed Lattice Centralized O-S 0 10 20 30 40 50 Time 60 70 80 90 10 02468 CC 20 40 60 80 Time 10 5 CC 0 0 D 60 50 40 30 20 10 0 20 40 60 80 Time 2 1.5 I 1 0.5 0 0 20 40 60 80 Time 0 20 40 60 80 Time 4 3 2 1 0 VC Lattice Distributed Reynolds DF Centralized DF Distributed Lattice Centralized O-S 0 10 20 30 40 50 Time 60 70 80 90 10 02468 CC 2 6 4 Noise Level 8 10 30 20 CC 10 0 D 50 40 30 20 10 0 2 4 6 8 10 Noise Level I 1.5 1 0.5 0 2 4 6 8 10 Noise Level 2 4 6 8 10 Noise Level 1.5 1 0.5 0 VC SAC 2018, April 9-13, 2018, Pau, France U. Mehmood et al. [14] H. G. Tanner, A. Jadbabaie, and G. J. Pappas. 2003. Stable flocking of mobile agents part I: dynamic topology. In 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475), Vol. 2. 2016–2021 Vol.2. [15] Jingyuan Zhan and Xiang Li. 2011. Flocking of discrete-time multi-agent systems with predictive mechanisms. IFAC Proceedings Volumes 44, 1 (2011), 5669–5674. [16] Jingyuan Zhan and Xiang Li. 2013. Flocking of multi-agent systems via model predictive control based on position-only measurements. IEEE Transactions on Industrial Informatics 9, 1 (2013), 377–385. [17] Hai-Tao Zhang, Zhaomeng Cheng, Guanrong Chen, and Chunguang Li. 2015. Model predictive flocking control for second-order multi-agent systems with input constraints. IEEE Transactions on Circuits and Systems I: Regular Papers 62, 6 (2015), 1599–1606. [18] Lifeng Zhou and Shaoyuan Li. 2017. Distributed model predictive control for multi-agent flocking via neighbor screening optimization. International Journal of Robust and Nonlinear Control 27, 9 (2017), 1690–1705.
1702.00785
3
1702
2017-03-28T03:28:28
Evaluation of Automated Vehicles Encountering Pedestrians at Unsignalized Crossings
[ "cs.MA", "cs.RO", "eess.SY" ]
Interactions between vehicles and pedestrians have always been a major problem in traffic safety. Experienced human drivers are able to analyze the environment and choose driving strategies that will help them avoid crashes. What is not yet clear, however, is how automated vehicles will interact with pedestrians. This paper proposes a new method for evaluating the safety and feasibility of the driving strategy of automated vehicles when encountering unsignalized crossings. MobilEye sensors installed on buses in Ann Arbor, Michigan, collected data on 2,973 valid crossing events. A stochastic interaction model was then created using a multivariate Gaussian mixture model. This model allowed us to simulate the movements of pedestrians reacting to an oncoming vehicle when approaching unsignalized crossings, and to evaluate the passing strategies of automated vehicles. A simulation was then conducted to demonstrate the evaluation procedure.
cs.MA
cs
Evaluation of Automated Vehicles Encountering Pedestrians at Unsignalized Crossings Baiming Chen1, Ding Zhao2, Huei Peng3 7 1 0 2 r a M 8 2 ] A M . s c [ 3 v 5 8 7 0 0 . 2 0 7 1 : v i X r a Abstract- Interactions between vehicles and pedestrians have always been a major problem in traffic safety. Experienced human drivers are able to analyze the environment and choose driving strategies that will help them avoid crashes. What is not yet clear, however, is how automated vehicles will interact with pedestrians. This paper proposes a new method for evaluating the safety and feasibility of the driving strategy of automated vehicles when encountering unsignalized crossings. MobilEye® sensors installed on buses in Ann Arbor, Michigan, collected data on 2,973 valid crossing events. A stochastic interaction model was then created using a multivariate Gaussian mixture model. This model allowed us to simulate the movements of pedestrians reacting to an oncoming vehicle when approaching unsignalized crossings, and to evaluate the passing strategies of automated vehicles. A simulation was then conducted to demonstrate the evaluation procedure. I. INTRODUCTION Traffic safety has become an issue of growing concern in the U.S. According to the NHTSA, the country lost 35,092 people in crashes on U.S. roadways during 2015, up 7.2% from 32,744 in 2014, the largest increase in nearly 50 years [1]. One approach to decreasing traffic deaths is to use automated vehicles, which do not suffer from challenges such as fatigue, distraction and drunk driving that humans might face. Researches have been conducted on the interaction between vehicles and vehicles [2], [3], [4]. What is not yet known, however, is exactly how automated vehicles will interact with pedestrians. Ways to test automated vehicles must be found before the vehicles can be put into use. The most critical places with a high concentration of interac- tions are intersections, particularly unsignalized crossings, where the right of way is not clear. As it is difficult for automated vehicles to decide the appropriate strategy for passing through an unsignalized intersection with pedestrians crossing the street, this scenario is a good one to consider. The first stage of the evaluation requires an analysis of pedestrian behaviors. Early studies on pedestrian movement focused on pedestrians that did not interact with vehicles. Three typical kinds of pedestrian models were developed: discrete cellular automata models [5], continuous force-based models [6], and macroscopic pedestrian stream models [7]. * This work is funded by the Mobility Transformation Center Denso Tailor Project at the University of Michigan with grant No. N020210. 1B. Chen is with the Department of Automotive Engineering, Tsinghua University, Beijing, China, 100084, and is currently a visiting scholar at the University of Michigan, Ann Arbor, MI 48109, USA. 2D. Zhao is with the University of Michigan Transportation Re- search Institute, Ann Arbor, MI 48109, USA (correspondig author: [email protected]). 3H. Peng is with the Department of Mechanical Engineering, University of Michigan, Ann Arbor, MI 48109, USA. Additional attributes of pedestrian behavior were studied when vehicles were introduced into the picture. For example, the walking speed of pedestrians might vary depending on several factors, one of which being where pedestrians crossed the street. Thus, Bennett et al. [8] found that the average speed of those crossing at mid-block was slower than those crossing at a signalized intersection. Additional factors significantly contributing to pedestrian walking speed (i.e., age, gender, group size and street width) were found by Tarawneh [9] in Jordan. Pedestrians 21-30 years of age were found to be the fastest; those over 65, the slowest. The author also found that pedestrians tended to walk faster after longer wait times. Whether pedestrians were in a group or alone also had an impact. Yagil [10] found, for instance, that pedestrians were more likely to wait at an intersection if a group of pedestrians were already waiting there. One approach to analyzing pedestrian behaviors is to apply the concept of gap acceptance. When arriving at an unsignalized intersection, pedestrians must decide whether the gap in the traffic stream large enough for them to cross the street safely. To describe the gap acceptance behavior of pedestrians, probit and binary models were developed by Sun et al. [11]. Regression analysis found the important factors for pedestrian gap acceptance to be gap size, number of pedestrians waiting, and pedestrian age. Schroeder [12] improved gap acceptance models for unsignalized crossings by incorporating vehicle dynamics, pedestrian characteris- tics and concurrent events at the crosswalk. This model is difficult to use for the evaluation of automated vehicles, however, because information about the pedestrians (e.g., age and gender) cannot as yet be detected by the vehicles approaching the intersection. The driving strategy of human drivers when encounter- ing unsignalized crossings was studied. To describe driver yielding and pedestrian gap acceptance behaviors, empirical logit models were developed by Schroeder et al. [13]. The author also proposed a driver dynamic model when faced with one crossing pedestrian. This model is introduced and used as the driving strategy of automated vehicles in the simulation section of this paper. A key component of the driving strategy is the braking behavior of drivers when a pedestrian comes out from the sidewalk to the road. For example, Suzuki et al. [14] concluded that the timing of the braking operation is approximately the same in terms of TTC (Time to Collision), though the velocity of the subject vehicles and passing pedestrians are different. Before automated vehicles are put into use, they must be evaluated for their potential interaction with pedestrians. The participating in the SPMD (Safety Pilot Model Deployment) program [16] were equipped with MobilEye® which can distinguish pedestrians and provide their relative positions to the instrumented vehicle. In addition, u-Box GPS/IMU unit installed on the university buses can provide the geograph- ical location. Vehicle velocity and yaw rate were recorded from CAN bus. The routes of the instrumented buses and pedestrians detected by MobilEye® are shown in Fig. 2. Fig. 2. Routes of the instrumented buses and detected pedestrians in Ann Arbor, Michigan. The Central Campus Transit Center (CCTC) has a high pedestrian density. The figure is created based on Google Maps. The unsignalized crossing chosen for collecting data is in Ann Arbor, Michigan, near the University of Michigan's Central Campus Transit Center (CCTC), where the pedes- trian density is high (Fig. 2). The geographic location is 42.278415◦, −83.735580◦. A picture of this crossing path is shown in Fig. 3, where 2,973 valid passing events were collected. driving strategy of automated vehicles should be neither too aggressive (endangering traffic safety) nor too conservative (leading to a waste of time and traffic congestion). Current experimental approaches are limited, however. The European New Car Assessment Programme (Euro NCAP) established a test procedure for AEB VRU systems, the automatic emergency braking systems that specifically look for and react to pedestrians [15]. The purpose of that test differs from the one in this paper, however. Our goal is to simulate the movement of multiple pedestrians and test the automated vehicles' passing strategy, while the procedure proposed by Euro NCAP was designed to test the effectiveness of the braking system with the sudden appearance of only one pedestrian. More importantly, if an automated vehicle's driving strategy is too conservative, it may still pass the NCAP test, but leads to traffic congestion and road rage in reality. The procedures used in this paper are shown in Fig. 1. A stochastic interaction model was first developed based on naturalistic traffic data. Then a method for evaluating the automated vehicles was proposed. Finally, the test procedure was demonstrated in simulation. Fig. 1. Procedures for designing the evaluation method The main contributions of this paper are: • Naturalistic data of 2,973 passing events encountering pedestrians at unsignalized crossings were recorded by in-car sensors. To the best of our knowledge, this is the largest data set describing vehicle-pedestrian inter- actions that has ever been collected. • A stochastic interaction model was created by fitting a bounded multivariate Gaussian mixture model to traffic data. • A new method for evaluating automated vehicles at unsignalized crossings was proposed. II. DATA COLLECTION Fig. 3. Crossing path environment (based on Google Maps) The first step in being able to simulate the movements of pedestrians and vehicles was to collect naturalistic data. In this study, data on 2,973 passing events encountering pedestrians at unsignalized crossings were collected by in- car sensors. The devices used to collect pedestrian behavior were MobilEye® installed on university buses in Ann Arbor, Michigan. The university's 12 bus routes carry approximately 7.2 million passengers per year. Three of the university buses The GPS system recorded the latitude and longitude of the instrument vehicles, while the MobilEye® recorded the relative positions of pedestrians. Using the data collected, each passing event was drawn in a Cartesian Coordinate system, so that the trajectories of the vehicles and pedestrians could be observed. One example is shown in Fig. 4. The color bar indicates the time of the samples. instrumented vehicle directly, T −1 and vp can be calculated by the lateral distance (L) data. B. Algorithms Adv can be calculated by (1), The probability density function (p.d.f.) of a Gaussian mixture model is K(cid:88) f (y; Θ) = πkfk(y; θk), (2) Fig. 4. Sample of passing events (based on Google Maps) III. INTERACTION MODEL A multivariate Gaussian mixture model is created based on naturalistic data to simulate the movement of vehicles and pedestrians when encountering unsignalized crossings. This stochastic model demonstrates how vehicles and pedestrians will interact with each other. This section shows the proce- dures used to develop this model and how to use it for the simulation. A. Variables Appropriate variables must first be selected to develop a multivariate Gaussian mixture model. We simplified the passing scenario by assuming that the trajectories of the vehicle and the pedestrian are two perpendicular straight lines. Then, longitudinal distance (R) and lateral distance (L) are used to describe the relative position of a pedestrian (Fig. 5). Fig. 5. Definition of R (longitudinal distance) and L (lateral distance) Four variables are required to define the state of the passing scenario: the reciprocal of the longitudinal distance (R−1), vehicle speed (v), pedestrian walking speed (vp) and the reciprocal of the Time Advantage (T −1 Adv). Time Advantage is an indicator used to describe situations where two road users pass a common spatial zone, but at different times, thus avoiding a collision [17]. The definition of Time Advantage is the time between the first road user leaving the common spatial zone and the second arriving. The mathematical definition is: TAdv = T T C − L/vp. (1) The reciprocals are used for statistical convenience. Among the four variables, R−1 and v can be obtained by the k=1 where πk are weights of components, fk are density func- tions of each component, θk are parameters to decide each component. The distribution of each component is a multi- variate Gaussian distribution with mean µk and covariance Σk. Algorithms are required to fit Gaussian mixture models to the traffic data. Here, since all the variables (i.e., R−1, v, vp, T −1 Adv) are positive and have boundaries, a truncated Gaussian mixture model will better fit the data. Lee et al. [18] developed for fitting multivariate Gaussian mixture models to data that is truncated. By applying these algorithms to the data, parameters πk, µk and Σk of the multivariate Gaussian mixture model can be calculated. The number of components (K) of the multivariate Gaus- sian mixture model will influence how well the data fit, with a higher K helping to improve the precision of the modeling. However, it might also lead to greater computing time, as well as statistical errors such as singular covariance matrices which endanger the stability of the model. Thus, an appropriate K must be selected for the Gaussian mixture model. The Bayesian information criterion (BIC) provides a means for model selection. It can help estimate the quality of the statistical models, with a model with a lower BIC preferred. In the interaction model, this criterion was used to determine the appropriate value of K, the BIC of the Gaussian mixture models with different K can be seen in Fig. 6. The BIC continues to decrease with an increase in number of components, with little change in rate (less than 10%) when the number of components is larger than 10. Considering the computing time and the complexity of the models, K = 10 was selected when generating the multivariate Gaussian mixture model. (a) Change of BIC (b) Change Rate of BIC Fig. 6. Bayesian Information Criterion test of the interaction models with different number of components (K). The BIC continues to decrease with an increase in number of components, with little change in rate (less than 10%) when the number of components is larger than 10. An interaction model was then created by fitting a 10- component truncated multivariate Gaussian mixture model to the collected naturalistic data using the algorithms above. C. Model Display and Utilization Since there were four variables (i.e., {R−1, v, vp, T −1 Adv}) the distribution of the in the Gaussian mixture model, interaction model was a 4-D function, which cannot be shown effectively on a flat piece of paper. We projected the function to three 2-D functions to illustrate the probability distribution, and then compared them with the raw data collected. The results are shown in Fig. 7. calculated. Examples of distribution functions under different conditions are shown in Fig. 8. We can generate a random vp from this distribution and take it as the walking speed of a pedestrian under the given conditions for the simulation and evaluation. (a) Raw data (b) Model distribution (c) Raw data (d) Model distribution (e) Raw data (f) Model distribution Fig. 7. Comparison of raw data and Gaussian mixture model Fig. 8. different conditions Probability density functions of pedestrian walking speed under The movement of vehicles can also be simulated using the same method by calculating the conditional distribution. To do that, we set ym = v and yo = {R−1, vp, T −1 Adv}, and then the distribution function of v can be calculated. Examples of distribution functions under different conditions are shown in Fig. 9. It is clear that, in this model, the vehicle is likely to have a lower speed when the distance is shorter, which makes sense considering traffic safety. The speed with the highest probability might be a good choice for setting the desired speed of the vehicle under given conditions when designing driving strategy. The stochastic interaction model developed here can help to simulate the walking speed of pedestrians. When encoun- tering an unsignalized crossing, the pedestrian will decide the appropriate walking speed to cross the street, depending on the speed and position of the oncoming vehicle; that is, the distribution of pedestrian walking speed (vp) is a conditional distribution of the multivariate Gaussian mixture model. By calculating this conditional distribution, the walking speed of pedestrians (vp) can be simulated. For a Gaussian distribution, if y = (yT o )T is with mean µ and covariance Σ, then the conditional distribution of ymyo is also normally distributed with mean and covariance: (3) m, yT µmo = µm + Σm,oΣ−1 Σmo = Σm,m − Σm,oΣ−1 o,o(yo − µo), o,oΣo,m. (4) To calculate the conditional distribution of a mixture Gaus- sian model, first calculate the conditional distribution of each component, then normalize all components and set new weights. Adv}, then the distribution function of vp under given conditions can be If we set ym = vp and yo = {R−1, v, T −1 Fig. 9. conditions Probability density functions of vehicle speed under different IV. SIMULATION A simulation is used to show how to evaluate the driving strategy of automated vehicles. The automated vehicle is evaluated against the human drivers for better performance when encountering unsignalized crossings in the simulation. We expect that the driving strategy of automated vehicles be neither too aggressive (endangering traffic safety) nor too conservative (leading to traffic congestion). With an increase in aggressiveness of the automated vehicle, less time is then needed to pass through the intersection, resulting in a possible rise in the crash rate. As shown in Fig. 10, the aggressiveness needs to be within the allowed interval when the automated vehicle has a passing time less of than µ0 and a denied crash rate less than κ0. Based on this distribution, an arriving time example was generated and is shown in Fig. 12. Five pedestrians are scheduled to arrive at this crossing within 60 seconds. Fig. 10. Influence of the vehicle's aggressiveness A. Procedures for the Evaluation Experiment PreScan® is used for the simulation. The experiment takes place at an unsignalized crossing (Fig. 11). At first, the vehi- cle comes from a long distance at a constant speed v0. When it is close, at a certain distance R0, pedestrians will start to be generated to go across the street, and the vehicle will interact with pedestrians and try to pass through the intersection without any crashes. Each experiment is done twice. The first time, the automated vehicle is tested to interact with the pedestrians; the second time, the human driver passing strategy is applied to interact with the same pedestrian which is recorded as a reference for the evaluation. In this study, the simulation is run 50 times. The passing strategies of pedestrians, automated vehicles and human drivers simulated in this section are described below separately. The results are analyzed at the end of this section. Fig. 11. Environment of the simulation. When the vehicle is at a certain distance (R = R0), pedestrians will start to arrive at the unsignalized crossing. B. Pedestrian Crossing Strategy Pedestrians are made to cross the street from both sides. When the vehicle is at a certain distance (R = R0), pedestrians will start to arrive at the unsignalized crossing. Each pedestrian has an arriving time when they will be put on the side of the street and start to cross. The arriving time of the pedestrians obeys the Poisson process: e(−λt). P{N (t) = n} = (5) (λt)n n! Parameter λ can be set to different values depending on the density of pedestrian flow, which varies greatly depending on time and location. For reference, pedestrian flow in the campus area during peak hours is around 250 peds/hr [13]. Fig. 12. Arriving times of pedestrians within 60 seconds Though the pedestrians' arriving times are random, their walking speeds are usually not. Each pedestrian has a constant walking speed that is calculated by the interaction model depending on the distance and speed of the oncoming vehicle when the pedestrian arrives, which is similar to real world process, in which most pedestrians will look at the oncoming vehicle and decide what to do before moving. C. Automated Vehicle's Passing Strategy The driving strategy evaluated in the simulation is the Soft-Yield model proposed by Schroeder et al. [13] which provides vehicle trajectories when facing one pedestrian. The model was developed based on GPS data from the instrumented vehicle study. The generalized vehicle distance- speed and time-speed models are shown in Fig. 13. When approaching the unsignalized crossing, the vehicle has a constant deceleration for time length T1 and then starts to coast to the crosswalk. Fig. 13. Driving strategy of the automated vehicle when encountering an unsignalized crossing (developed by Schroeder et al. [13]) Based on a regression analysis, vehicle acceleration a is set to a = p1 + p2v + p3R, (6) where p1 = 0.0169, p2 = −0.13986, p3 = 0.010115. v and R are the vehicle's information when the vehicle perceives the pedestrian and makes its decision. Deceleration time T1 is calculated as follows: L0 vp , tL = (cid:114) L − 2(R − v ∗ tL) t2 a (7) (8) , T1 = tL − where L0 is the length of the crossing path, and tL is the time needed for the pedestrian to complete the crossing. D. Human Driver's Passing Strategy A human driver's passing strategy was developed by studying the interaction model based on the naturalistic traffic data. When encountering an unsignalized crossing, the strategy of the simulated human driver is set to adjust the vehicle's speed if a pedestrian is detected. The desired speed vd for adjusting is calculated based on the position and velocity of the pedestrian in the current state. Thus, the desired acceleration of the vehicle is vd − v ∆t ad = (9) , where ∆t is the time interval between two updates of the desired speed. In this study, we set ∆t = 1 s. Each vehicle, of course, has a maximum limit of acceler- ation am. Thus, if ad > am, the acceleration of the vehicle a will be set to a = am. Otherwise, the acceleration will be set to just a = ad. When no pedestrian is present within the radar's detection range, or the pedestrians have left the crossing, the vehicle will accelerate to v0 at a constant speed of a0 = 1 m/s. E. Simulation Results All the above procedures are simulated using PreScan®. The parameters set for the simulation is shown in Table I. One pedestrian is generated in each experiment. TABLE I PARAMETERS IN THE SIMULATION symbol R0 L0 v0 unit m m m/s value 30 9 5 Each experiment is done twice. The first time, the au- tomated vehicle's strategy is tested to interact with the pedestrians generated based on the Poisson process; the second time, the human driver's strategy is tested to interact with the same pedestrian. The time used and the safety of the pedestrian is recorded. We evaluate the aggressiveness of the automated vehicle by analyzing its results compared to those of the human driver strategy. a and ti Assume ti h are the time used by the automated vehi- cle and the human driver for passing through the unsignalized crossing in experiment i, respectively. Then, τi = ti a/ti h indicates the efficiency of the automated vehicle compared to the human driver. After N = 50 experiments, the mean value and distribution of {τi} is shown in Fig. 14. As n increases, the mean value of {τi} approaches a limit value, which means that the time used by the automated vehicle to pass through the intersection is stable. Fig. 14. Mean value and distribution of {τi} (the ratio of time used in experiments i). As the number of simulated experiment increases, the mean value of {τi} approaches a limit value. µ (The mean value of {τi}), cv (the coefficient of variation of {τi}) and κ (the crash rate) are parameters to indicate the passing strategy's efficiency, stability and safety, respectively. They are calculated to evaluate the automated vehicle based on the experimental results: (cid:80) τi (cid:80)N N i=1(τi − µ)2 µ = 0.7044, κ = ncrash N = 0. µ = (cid:113) 1 N cv = σ µ = = 4.54% (10) (11) (12) It turns out that the passing strategy of the automated vehicle is more efficient than that of a human driver, taking only about 70% of the time a human driver uses to pass the unsignalized crossing. It is also quite stable since cv is under 5%. More importantly, no crash occurred during the simulation, meaning the strategy is also safe under ideal conditions. V. CONCLUSION AND DISCUSSION In this paper, we proposes a method to evaluate the passing strategy of automated vehicles at unsignalized crossings. A stochastic interaction model is developed to predict pedes- trian movement. A simulation is conducted to demonstrate the evaluation procedure. The automated vehicle is evaluated against the human drivers for better performance in terms of the time used and the crash rate. One Soft-Yield driver model is evaluated as an example. The simulation results indicate that this driving strategy is more efficient than that of a human driver that is modeled by naturalistic data collected in Ann Arbor. The pedestrians in our evaluation experiments comes from both sides of the crossing. Their arriving times obey the Pois- son process; the density of pedestrian flow can be adjusted by setting different values of parameters. The pedestrians in the simulation will have a look at the oncoming vehicle and then decide on their walking speed before moving, [17] A. Laureshyn, s. Svensson, and C. Hyd'en, "Evaluation of traffic safety, based on micro-level behavioural data Theoretical framework and first implementation," Accident Analysis and Prevention, vol. 42, no. 6, pp. 1637–1646, 2010. [18] G. Lee and C. Scott, "EM algorithms for multivariate Gaussian mixture models with truncated and censored data," Computational Statistics and Data Analysis, vol. 56, no. 9, pp. 2816–2829, 2012. similar to the process in the real world. However, a more detailed pedestrian model remains to be developed, and more behaviors and features can be taken into account in future work. DISCLAIMERS This work was funded in part by the University of Michi- gan Mobility Transformation Center Denso Tailor project. The findings and conclusions in the report are those of the authors and do not necessarily represent the views of the MTC or Denso. REFERENCES [1] N. Highway Traffic Safety Administration and U. Department of "Research Note 2015 Motor Vehicle Crashes Transportation, Overview," no. August, 2016. [2] D. Zhao, H. Lam, H. Peng, S. Bao, D. J. Leblanc, and C. S. Pan, "Accelerated Evaluation of Automated Vehicles Safety in Lane Change Scenarios based on Importance Sampling Techniques," IEEE Transactions on Intelligent Transportation Systems, 2016. [3] D. Zhao, X. Huang, H. Peng, H. Lam, and D. J. LeBlanc, "Accelerated Evaluation of Automated Vehicles in Car-Following Maneuvers," submitted to IEEE Transactions on Intelligent Transportation Systems, 7 2017. [Online]. Available: http://arxiv.org/abs/1607.02687 [4] Z. Huang, D. Zhao, H. Lam, and D. J. LeBlanc, "Accelerated Evaluation of Automated Vehicles Using Piecewise Mixture Models," submitted to IEEE Transactions on Intelligent Transportation Systems, 7 2017. [Online]. Available: http://arxiv.org/abs/1701.08915 [5] C. Burstedde, K. Klauck, A. Schadschneider, and J. Zittartz, "Simula- tion of pedestrian dynamics using a two-dimensional cellular automa- ton," Physica A Statistical Mechanics and its Applications, vol. 295, no. 3-4, pp. 507–525, 2001. [6] M. Chraibi, A. Seyfried, A. Schadschneider, and W. MacKens, "Quantitative description of pedestrian dynamics with a force-based model," Proceedings-2009 IEEEWICACM International Conference on Web Intelligence and Intelligent Agent Technology-Workshops, WI- IAT Workshops 2009, vol. 3, pp. 583–586, 2009. [7] T. Xiong, P. Zhang, S. C. Wong, C.-W. Shu, and M.-P. Zhang, "A Macroscopic Approach to the Lane Formation Phenomenon in Pedestrian Counterflow," Chinese Physics Letters, vol. 28, p. 108901, 2011. [8] S. Bennett, A. Felton, and R. Akccelik, "Pedestrian movement char- acteristics at signalised intersections," 23rd Conference of Australian Institutes of Transport Research, no. December, pp. 10–12, 2001. [9] M. S. Tarawneh, "Evaluation of pedestrian speed in Jordan with investigation of some contributing factors," Journal of Safety Research, vol. 32, no. 2, pp. 229–236, 2001. [10] D. Yagil, "Beliefs, motives and situational factors related to pedes- trians? self-reported behavior at signal-controlled crossings," Trans- portation Research Part F Traffic Psychology and Behaviour, vol. 3, pp. 1–13, 2000. [11] B. Dazhi Sun, S. VSK Ukkusuri, R. F. Benekohal, S. Travis Waller, D. Sun, R. F. Benekohal, and S. T. Waller, "Modeling of Motorist- Pedestrian Interaction at Uncontrolled Mid-block Crosswalks," no. November, 2002. [12] B. B. J. Schroeder, "A Behavior-Based Methodology for Evaluating Pedestrian-Vehicle Interaction at Crosswalks," Analysis, p. 332, 2008. [13] B. Schroeder, N. Rouphail, K. Salamati, E. Hunter, B. Phillips, L. Elefteriadou, T. Chase, Y. Zheng, V. Sisiopiku P, and S. Mamidi- palli, "Empirically-Based Performance Assessment and Simulation of Pedestrian Behavior at Unsignalized Crossings," no. September, 2014. [14] Keisuke Suzuki, Takuya Kakihara, and Yasutoshi Horii, "Investigation of Braking Timing of Drivers for Design of Pedestrian Collision Avoidance System," Journal of Mechanics Engineering and Automa- tion, vol. 6, no. 3, pp. 118–127, 2016. Test - AEB VRU systems," no. 1.0.1, 2015. [Online]. Available: httpwww.euroncap. comenfor-engineersprotocolssafety-assist [15] Euro-NCAP, "Euro NCAP Protocol [16] D. Bezzina and J. Sayer, "Safety pilot model deployment: Test conductor team report," Report No. DOT HS, vol. 812, p. 171, 2014.
1112.1335
1
1112
2011-12-06T16:30:35
Connectivity and Set Tracking of Multi-agent Systems Guided by Multiple Moving Leaders
[ "cs.MA" ]
In this paper, we investigate distributed multi-agent tracking of a convex set specified by multiple moving leaders with unmeasurable velocities. Various jointly-connected interaction topologies of the follower agents with uncertainties are considered in the study of set tracking. Based on the connectivity of the time-varying multi-agent system, necessary and sufficient conditions are obtained for set input-to-state stability and set integral input-to-state stability for a nonlinear neighbor-based coordination rule with switching directed topologies. Conditions for asymptotic set tracking are also proposed with respect to the polytope spanned by the leaders.
cs.MA
cs
Connectivity and Set Tracking of Multi-agent Systems Guided by Multiple Moving Leaders∗ Guodong Shi, Yiguang Hong†and Karl Henrik Johansson ‡ Abstract In this paper, we investigate distributed multi-agent tracking of a convex set specified by multiple moving leaders with unmeasurable velocities. Various jointly-connected interaction topologies of the follower agents with uncertainties are considered in the study of set tracking. Based on the connectivity of the time-varying multi-agent system, necessary and sufficient conditions are obtained for set input-to-state stability and set integral input-to-state stability for a nonlinear neighbor-based coordination rule with switching directed topologies. Condi- tions for asymptotic set tracking are also proposed with respect to the polytope spanned by the leaders. Keywords. Multi-agent systems, multiple leaders, set input-to-state stability (SISS), set integral input-to-state stability (SiISS), set tracking. 1 Introduction The last decade has witnessed tremendous interest devoted to the investigation of collective phenomena in multiple autonomous agents, due to broad applications in various fields of science ranging from biology to physics, engineering, and ecology, just to name a few [8, 9, 10, 11, 12]. Concerning the issues of multi-agent systems and distributed design, the revolutionary idea is underpinning a strong interaction of individual dynamics, communication topologies, and ∗This work has been supported in part by the NNSF of China under Grants 60874018, 60736022, and 60821091, the Knut and Alice Wallenberg Foundation and the Swedish Research Council. †G. Shi and Y. Hong are with Key Laboratory of Systems and Control, Institute of Systems Science, Chinese Academy of Sciences, Beijing 100190, China. Email: [email protected], [email protected] ‡K. Johansson is with ACCESS Linnaeus Centre, School of Electrical Engineering, Royal Institute of Technol- ogy, Stockholm 10044, Sweden. Email: [email protected] 1 distributed controls. The problem is generally very challenging due to the complex dynamics and hierarchical structures of the systems. However, efforts have been started with relatively simple problems such as consensus, formation, and rendezvous, and many significant results have been obtained. The leader-follower coordination is an important multi-agent control problem, where the leader may be a real leader (such as a target, an evader, or a predefined position), or a virtual leader (such as a reference trajectory or a specified path). In most theoretical work, a single leader with exact measurement is considered on multi-agent systems for each agent to follow. However, in practical situations, multiple leaders and target sets with unmeasurable variables are considered to achieve desired collective behaviors. In [8], a simple model was given to simulate fish foraging and demonstrate the leader effectiveness when the leaders (or informed agents) guide a school of fish to a particular food region. In [23], a straight-line formation of a group of agents was discussed, where all the agents converge to the line segment specified by two edge leaders. A containment control scheme was proposed with fixed undirected interaction in [24], which aimed at driving a group of agents to a given target location and making their positions contained in the polytope spanned by multiple stationary or moving leaders during their motion. Region following formation control was constructed [25], where all the robots are driven and then stay within a moving target region as a group. Moreover, different dynamic connectivity conditions were obtained to guarantee that the multiple leaders (or informed agents) aggregate the whole multi-agent group within a convex target set in [26]. Additionally, control strategies were demonstrated and analyzed to drive a collection of mobile agents to stationary/moving leaders with connectivity-maintenance and collision-avoidance with fixed and switching directed network topologies in [27]. As a matter of fact, multiple leaders are usually assigned to increase control effectiveness, enhance communication/sensing range, improve reliability, and optimize energy cost in multi-agent coordination. Connectivity plays a key role in the coordination of multi-agent networks, which is related to the influence of agents and controllability of the network. Due to mobility of the agents, inter- agent topologies usually keep changing in practice. Therefore, the various connectivity conditions to describe frequently switching topologies in order to deal with multi-agent consensus or flocking [15, 16, 18, 21]. In fact, the "joint connection" or similar concepts are important in the analysis of stability and convergence to guarantee multi-agent coordination with time-dependent topology. Uniformly jointly-connected conditions have been employed for different problems. [28] studied 2 the distributed asynchronous iterations, while [22] proved the consensus of a simplified Vicsek model. Furthermore, [14] and [6] investigated the jointly-connected coordination for second-order agent dynamics via different approaches, while [30] worked on nonlinear continuous-time agent dynamics with jointly-connected interaction graphs. Also, flocking of multi-agent system with state-dependent topology was studied with non-smooth analysis in [18, 20]. What is more, the [t,∞) joint connection condition, which is more generalized than the uniformly joint connection assumption, was discussed by Moreau, in order to achieve the consensus for discrete-time agents in [31]. This [t,∞) connectivity concept was then extended in the distributed control analysis for the target set convergence in [26]. It is well known that input-to-state stability (ISS) is an important and very useful tool in the study of the stability and stabilization of control systems [29, 35]. Its variants such as integral input-to-state stability (iISS) were discussed in [34]. Then few works on set input-to-state stability (SISS) were done with respect to fixed sets in [33]. On the other hand, ISS or related ideas can facilitate the control analysis and synthesis with interconnection conditions like small gains (referring to [29], for example). ISS has recently been applied to the stability study of a group of interconnected nonlinear systems [32]. Moreover, an extended concept called leader- to-formation stability was introduced to investigate the stability of the formation of a group of agents in light of ISS properties [19]. In fact, ISS application in multi-agent systems is promising. The contributions of the paper include: • We propose the generalized set input-to-state stability (SISS) and set integral-input-to- state stability (SiISS) to handle moving sets with time-varying shapes for switching multi- agent networks. • We study the multi-leader coordination from the ISS viewpoint. With the help of SISS and SiISS, we give explicit expressions to estimate the convergence rate and tracking error of a group of mobile agents that try to enter the convex hull determined by multiple leaders. • We show relationships between the connectivity and set tracking of the multi-agent sys- tem, and find that various jointly-connected conditions usually provide necessary and/or sufficient conditions for distributed coordination. • We develop a method to study SISS and SiISS for a moving set and switching topology with graph theory and non-smooth analysis. In fact, we cannot take the standard approaches to conventional ISS or iISS using equivalent ISS-Lyapunov functions [34, 35]. In addition, 3 the classic algebraic methods based on Laplacian may fail due to disturbances in nonlinear agent dynamics, uncertain leader velocities, or moving multi-leader set. This paper is organized as follows. Section 2 presents the preliminaries and problem formu- lation, while Section 3 proposes results for the convergence estimation. Section 4 mainly reports a necessary and sufficient condition for the SISS with respect to the moving multi-leader set with switching inter-agent topologies, and then presents a set-tracking case based on the SISS. Correspondingly, Section 5 obtains necessary and sufficient conditions for SiISS and then shows set-tracking results related to SiISS. Finally, Section 6 gives concluding remarks. 2 Problem Formulation In this section, we introduce some preliminary knowledge for the following discussion. First we introduce some basic concepts in graph theory (referring to [13] for details). A directed graph (digraph) G = (V,E) consists of a finite set V = {1, 2, ..., n} of nodes and an arc set E, in which an arc is an ordered pair of distinct nodes of V. (i, j) ∈ E describes an arc which leaves i and enters j. A walk in digraph G is an alternating sequence W : i1e1i2e2 . . . em−1im of nodes iκ and arcs eκ = (iκ, iκ+1) ∈ E for κ = 1, 2, . . . , m− 1. A walk is called a path if the nodes of this walk are distinct, and a path from i to j is denoted as [(i, j). Node j is called reachable from i if there is a path [(i, j). If the nodes i1, . . . , im−1 are distinct and i1 = im, W is called a (directed) cycle. A digraph without cycles is said to be acyclic. The union of the two digraphs G1 = (V,E1) and G2 = (V,E2) is defined as G1 ∪ G2 = (V,E1 ∪ E2) if they have the same node set. Furthermore, a time-varying digraph is defined as Gσ(t) = (V,Eσ(t)) with σ : t → Q as a piecewise constant function, where Q is the finite set which consists of all the possible digraphs with node set V. Moreover, the joint digraph of Gσ(t) in time interval [t1, t2) with t1 < t2 ≤ +∞ is denoted as G([t1, t2)) = ∪t∈[t1,t2)G(t) = (V,∪t∈[t1,t2)Eσ(t)). (1) Next, we recall some notations in convex analysis (see [2]). A set K ⊂ Rd is said to be convex if (1 − λ)x + λy ∈ K whenever x ∈ K, y ∈ K and 0 ≤ λ ≤ 1. For any set S ⊂ Rd, the intersection of all convex sets containing S is called the convex hull of S, denoted by co(S). Particularly, the convex hull of a finite set of points x1, . . . , xn ∈ Rd is a polytope, denoted by co{x1, . . . , xn}. In fact, we have co{x1, . . . , xn} = {λ1x1 + ··· + λnxnλ1 + ··· + λn = 1, λi ≥ 0}. 4 Let K be a closed convex subset in Rd and denote xK , inf{x − y y ∈ K}, where · denotes the Euclidean norm for a vector or the absolute value of a scalar ([35, 34]). Then we can associate to any x ∈ Rd a unique element PK(x) ∈ K satisfying x − PK (x) = xK , where the map PK is called the projector onto K and hPK (x) − x,PK (x) − yi ≤ 0, ∀y ∈ K. Clearly, x2 K is continuously differentiable at point x, and (see [1]) ∇x2 K = 2(x − PK (x)). The following lemma was obtained in [26], which is useful in what follows. Lemma 2.1 Suppose K ⊂ Rd is a convex set and xa, xb ∈ Rd. Then hxa − PK (xa), xb − xai ≤ xaK · xaK − xbK . Particularly, if xaK > xbK , then hxa − PK (xa), xb − xai ≤ −xaK · (xaK − xbK ). (2) (3) (4) (5) Then we consider the Dini derivative for the following non-smooth analysis. Let a and b (> a) be two real numbers and consider a function h : (a, b) → R and a point t ∈ (a, b). The upper Dini derivative of h at t is defined as D+h(t) = lim sup s→0+ h(t + s) − h(t) s . It is well known that when h is continuous on (a, b), h is non-increasing on (a, b) if and only if D+h(t) ≤ 0 for any t ∈ (a, b) (more details can be found in [3]). The next result is given for the calculation of Dini derivative [4, 30]. Lemma 2.2 Let Vi(t, x) : R × Rd → R (i = 1, . . . , n) be C 1 and V (t, x) = maxi=1,...,n Vi(t, x). If I(t) = {i ∈ {1, 2, . . . , n} : V (t, x(t)) = Vi(t, x(t))} is the set of indices where the maximum is reached at t, then D+V (t, x(t)) = maxi∈I(t) Vi(t, x(t)). In this paper, we consider the set coordination problems for a multi-agent system consisting of n follower-agents and k leader-agents (see Fig. 1). The follower set is denoted as VF , {v1, . . . , vn}, and the leader set is denoted as VL , {v1, . . . , vk}. In what follows, we will identify follower vi or leader vi with its index i (namely, agent i or leader i) if there is no confusion. 5 Figure 1: Multiple agents (vi, i = 1, 2, 3, 4) with multiple leaders (vi, i = 1, 2, 3) Then we describe the communication in the multi-agent network. At time t, if i ∈ VF can "see" j ∈ VF , there is an arc (j, i) (marking the information flow) from j to i, and then agent j is said to be a neighbor of agent i. Moreover, if i ∈ VF "sees" j ∈ VL at time t, there is an arc (j, i) leaving from j and entering i, and then j is said to be a leader of agent i. Let Ni and Li represent the set of agent i's neighbors and the set of agent i's leaders (that is, the leaders which are connected to agent i), respectively. Note that, since the leaders are not influenced by the followers, there is no arc leaving from VF entering VL. Define V = VF ∪ VL as the whole agent set (including leaders and followers). Denote P as the set of all possible interconnection topologies, and σ : [0, +∞) → P as a piecewise constant switching signal function to describe the switchings between the topologies. Thus, the interaction topology of the considered multi-agent network is described by a time-varying directed graph Gσ(t) = (V,Eσ(t)). Correspondingly, GF σ(t) is denoted as the communication graph among the follower agents. Additionally, let Ni(σ(t)) and Li(σ(t)) represent the set of agent i's neighbors and the set of its connected leaders in Gσ(t), respectively. As usual in the literature [22, 30, 26], an assumption is given for the switching signal σ(t). Assumption 1 (Dwell Time) There is a lower bound τD > 0 between two switching instants. We give definitions for the connectivity of a multi-agent system with multiple leaders. Definition 2.1 (i) Gσ(t) is said to be L-connected if, for any i ∈ VF , there exists a leader j ∈ VL such that there is a path from leader j to agent i in Gσ(t) at time t. Moreover, Gσ(t) is said to be jointly L-connected in time interval [t1, t2) if the union graph G([t1, t2)) is L-connected; (ii) Gσ(t) is said to be jointly L-connected (JLC) if the union graph G([t,∞)) is L-connected 6 for any t; (iii) Gσ(t) is said to be uniformly jointly L-connected (UJLC) if there exists T > 0 such that the union graph G([t, t + T )) is L-connected for any t ≥ 0. Remark 2.1 Note that the L-connectedness describes the capacity for the follower agents to get the information from the moving multi-leader set in the information flow, and an L-connected graph may not be connected since the graph with leaders as its nodes may not be connected. In fact, if we consider the group of the leaders as one virtual node in V, then the L-connectedness becomes the quasi-strong connectedness for a digraph [5, 30]. The state of agent vi ∈ VF , is denoted as xi ∈ Rd (i = 1, . . . , n), and the state of leader vi ∈ VL, is denoted as yi ∈ Rd (i = 1, . . . , k). Denote x = (x1, . . . , xn)T ∈ Rnd and y = (y1, . . . , yk)T ∈ Rkd and let the continuous function aij(x, y, t) > 0 be the weight of arc (j, i), if any, for i, j ∈ VF , and continuous function bij(x, y, t) > 0 be the weight of arc (j, i), if any, for i ∈ VF ; j ∈ VL. Then we present the multi-agent model for the active leaders and the (follower) agents i = 1, . . . , k yi = ui(y, t), xi = Pj∈Ni(σ(t))   (6) where ui(y, t) describes the control inputs of the leader i, i ∈ VL, which is continuous in y for fixed t and piecewise continuous in t for fixed y, and wi(t) is a continuous function to describe aij(x, y, t)(xj − xi) + Pj∈Li(σ(t)) bij(x, y, t)(yj − xi) + wi(t), i = 1, . . . , n the disturbances in communication links and individual dynamics to follower agent i. Then another assumption is given on the weight functions aij(x, y, t) and bij(x, y, t). Assumption 2 (Bounded Weights) There are 0 < a∗ ≤ a∗ and b∗ > 0 such that a∗ ≤ aij(x, y, t) ≤ a∗, b∗ ≤ bij(x, y, t) for any x, y, t. Remark 2.2 In (6), the weights, aij and bij, may not be constant. Instead, because of the complex communication and environment uncertainties, they are dependent on time or space or relative measurement (see nonlinear models given in [30, 26, 31, 18]). Some models such as those studied in [30, 26] can be written in the form of (6), while other nonlinear multi-agent models may be transformed to this class of multi-agent systems in some situations. Here aij(x, y, t) and bij(x, y, t) are written in a general form simply for convenience, and global information is not required in our study. For example, aij and bij can depend only on the state of xi, time t and 7 xj (j ∈ Ni), which is certainly a special form of aij(x, y, t) or bij(x, y, t). In other words, the control laws in specific decentralized forms are still decentralized. Without loss of generality, we assume the initial time t = 0, and the initial condition x0 = (x1(0), . . . , xn(0))T ∈ Rnd and y0 = (y1(0), . . . , yk(0))T ∈ Rkd. Denote the time-varying polytope formed by the k active leaders L(y(t)) , co{y1(t), . . . , yk(t)}, (7) and let x(t)L(y(t)) , max i∈VF xi(t)L(y(t)) be the maximal distance for the followers away from the moving multi-leader set L(y(t)). The following definition is to describe the convergence to the moving convex set L(y(t)). Definition 2.2 The (global) set tracking (ST) with respect to L(y(t)) for system (6) is achieved if lim t→+∞x(t)L(y(t)) = 0 (8) for any initial condition x0 ∈ Rnd and y0 ∈ Rkd. For a stationary convex set K, set tracking can be reduced to set stability and attractivity, and methods to analyze xi(t)K were proposed in some existing works [26]. In fact, [24, 27] discussed the convergence to the static convex set determined by stationary leaders with well designed control protocols. Moreover, if we assume that the target set is exactly the polytope with the positions of the stationary leaders (or informed agents) as its vertices, then the conver- gence to the polytope, treated as a target set, can be obtained straightforwardly based on the results and limit-set-based methods given in [26]. Input-to-state stability has been widely used in the stability analysis and set input-to-state stability (SISS) for a fixed set has been studied in [33]. To study the multi-leader set tracking in a broad sense, we introduce a generalized SISS with respect to L(y(t)), a moving set with a time-varying shape, for multi-agent systems with switching interaction topologies. Denote u , , {z : R≥0 → R(n+k)m kzk∞ < ∞} (u1, . . . , uk)T , w , (w1, . . . , wn)T , z , (uT wT )T , and L∞ with kzk∞ , sup{z(t), t ≥ 0} ([35]). A function γ : R≥0 → R≥0 is said to be a K-class function if it is continuous, strictly increasing, and γ(0) = 0. Moreover, a function β : R≥0 × R≥0 → R is a KL-class function if β(·, t) is of class K for each fixed t ≥ 0 and β(s, t) decreases to 0 as t → ∞ for each fixed s ≥ 0. 8 Definition 2.3 System (6) is said to be globally generalized set input-to-state stable (SISS) with respect to L(y(t)) with input z if there exist a KL-function β and a K-function γ such that x(t)L(y(t)) ≤ β(x0L(y0), t) + γ(kzk∞) (9) for z ∈ L∞ and any initial conditions x0 ∈ Rnd and y0 ∈ Rkd. Integral-input-to-state stability (iISS) was introduced as an integral variant of ISS, which has been proved to be strictly weaker than ISS [34]. We also introduce a definition of (generalized) set integral-input-to-state stability (SiISS) with respect to a time-varying and moving set. Definition 2.4 System (6) is (globally) generalized set integral-input-to-state stable (SiISS) with respect to L(y(t)) if there exist a KL-function β and a K-function γ such that x(t)L(y(t)) ≤ β(x0L(y0), t) +Z t 0 γ(z(s))ds, (10) for any initial conditions x0 ∈ Rnd and y0 ∈ Rkd. The conventional SISS was given for a fixed set K ([33]), while the generalized SISS or SiISS is proposed with respect to a time-varying set L(y(t)). In the following, we still use SISS or SiISS instead of generalized SISS or SiISS for simplicity. Remark 2.3 Similar to the study of conventional ISS, local SISS and SiISS can be defined. In this paper, we focus on the global SISS and SiISS. In fact, it is rather easy to extend research ideas of global set tracking to study local cases. 3 Convergence Estimation For the set tracking with respect to a moving multi-leader set of system (6), we have to deal with the estimation of xi(t)L(y(t)) when L(y(t)) is a time-varying convex set, where y(t) is a trajectory of the moving leaders in system (6) with initial condition y0 = y(0). Define r(t) , max i∈VL ui(y(t), t); q(t) , max i∈VL ui(y(t), t) + max i∈VF wi(t). Obviously, q(t) ≤ u(y(t), t) + w(t) ≤ √2z(t) ≤ √2 max{√n,√k}q(t). (11) (12) The following result is given to estimate the changes of the distance between an agent and the convex hull spanned by the leaders. 9 Lemma 3.1 For any t, t0 ≥ 0 and i = 1, . . . , n, xi(t)L(y(t)) − xi(t)L(y(t0)) ≤Z t t0 r(s)ds. (13) Proof: Suppose PL(y(t0))(xi(t)) = kXi=1 λiyi(t0) ∈ L(y(t0)), where λi ≥ 0 for i = 1, . . . , k with λi = 1. Define y(t) , kPi=1 y(t) − y(t0) ≤ kXi=1 λiyi(t) − yi(t0) = λiZ t t0 kXi=1 Moreover, xi(t)L(y(t)) ≤ xi(t) − y(t) λiyi(t), and then kPi=1 ui(y(s), s)ds ≤Z t t0 ≤ xi(t) − y(t0) + y(t) − y(t0) ≤ xi(t)L(y(t0)) +Z t r(s)ds t0 Also, similar analysis leads to xi(t)L(y(t0)) ≤ xi(t)L(y(t)) +Z t t0 r(s)ds Therefore, (14) and (15) lead to the conclusion. For simplicity, define ψi(t) , xi(t)2 L(y(t)), i = 1, . . . , n and Ψ(t) , max i∈VF ψi(t), r(s)ds (14) (15) (cid:3) which is locally Lipschitz but may not be continuously differentiable. Clearly, xi(t)L(y(t)) = pψi(t), i = 1, . . . , n and kx(t)kL(y(t)) =pΨ(t). Then, we get the following lemma to estimate the set convergence. Lemma 3.2 D+pΨ(t) ≤ q(t). Proof: It is not hard to see that dψi(t) dt = lim ∆t→0 = lim ∆t→0 ψi(t + ∆t) − ψi(t) ∆t xi(t + ∆t)2 L(y(t+∆t)) − xi(t + ∆t)2 L(y(t)) − xi(t)2 L(y(t)) ∆t . ∆t L(y(t)) xi(t + ∆t)2 + lim ∆t→0 10 (16) Then, according to (3), we obtain L(y(t)) xi(t + ∆t)2 L(y(t)) − xi(t)2 = ∆t lim ∆t→0 d dsxi(s)2 = h∇xi(s)2 = 2hxi(t) − PL(y(t))(xi(t)), Xj∈Ni(σ(t)) L(y(t))(cid:12)(cid:12)(cid:12)(cid:12)s=t L(y(t)), xi(s)i(cid:12)(cid:12)(cid:12)s=t aij(xj(t) − xi(t)) + Xj∈Li(σ(t)) bij(yj(t) − xi(t)) + wi(t)i. (17) Furthermore, according to Lemma 3.1, xi(t + ∆t)L(y(t+∆t)) − xi(t + ∆t)L(y(t)) ∆t lim ∆t→0 and then it is easy to find that ∆t→0R t+∆t ≤ lim t ∆t r(s)ds = r(t), xi(t + ∆t)2 L(y(t+∆t)) − xi(t + ∆t)2 L(y(t)) ∆t lim ∆t→0 xi(t + ∆t)L(y(t+∆t)) − xi(t + ∆t)L(y(t)) = lim ∆t→0 ·(xi(t + ∆t)L(y(t+∆t)) + xi(t + ∆t)L(y(t))) (18) ∆t ≤ 2r(t)xi(t)L(y(t)). Therefore, d dt ψi(t) ≤ 2hxi − PL(y(t))(xi), Xj∈Ni(σ(t)) +2r(t)xi(t)L(y(t)). aij(x)(xj − xi) + Xj∈Li(σ(t)) bij(x)(yj − xi) + wi(t)i (19) Moreover, let I(t) denote the set containing all the agents that reach the maximal distance away from L(y(t)) at time t. Then, for any i ∈ I(t), according to (2), one has hxi − PL(y(t))(xi), yj − xii ≤ hxi − PL(y(t))(xi), yj − PL(y(t))(xi)i +hxi − PL(y(t))(xi),PL(y(t))(xi) − xii ≤ hxi − PL(y(t))(xi),PL(y(t))(xi) − xii = −ψi(t) (20) for any j ∈ Li(σ(t)). Furthermore, in light of Lemma 2.1, since i ∈ I(t), hxi − PL(y(t))(xi), xj − xii ≤ −xiL(y(t))(xiL(y(t)) − xjL(y(t))) ≤ 0 11 for any j ∈ Ni(σ(t)). Therefore, the conclusion follows since ψi(t) d D+Ψ(t) = max dt i∈I(t) [hxi − PL(y(t))(xi), wi(t)i + 2r(t)xi(t)L(y(t))] ≤ 2 max i∈I(t) ≤ 2(r(t) + max i∈VF wi(t)) max = 2q(t)pΨ(t) i∈I(t) xi(t)L(y(t)) according to Lemma 2.2. (cid:3) 4 Connectivity and SISS In this section, we study the SISS with respect to the convex set spanned by the moving leaders in an important connectivity case, uniformly jointly L-connected (UJLC) topology. Without loss of generality, we will assume n ≥ 2 in the sequel. 4.1 Main results Suppose z = (uT , wT )T ∈ L∞ in this section. Then we have the main result on SISS. Theorem 4.1 System (6) is SISS with respect to L(y(t)) and with z as the input if and only if Gσ(t) is UJLC. The main difficulties to obtain the SISS inequalities in the UJLC case are how to estimate the convergence rate in a time interval by "pasting" time subintervals together and how to estimate the impact of the input z to the agent motion. To prove Theorem 4.1, we first present two lemmas to estimate the distance error in the two standard cases during t ∈ [t0, t0 + T∗] for t0 ≥ 0 and a constant T∗ > τD with τD as the dwell time of switching. Lemma 4.1 If there is an arc (j, i) leaving from follower j ∈ VL entering i ∈ VF in Gσ(t) for all t ∈ [t0, t0 + τD), then there exist a continuous function µ(s) : [0, T∗] 7→ (0, 1] and a constant γ1 > 0 such that xi(t)L(y(t)) ≤ µ(t − t0)x(t0)L(y(t0)) + γ1kzk∞, ∀t ∈ [t0, t0 + T∗]. Proof: See Appendix A.1. 12 (21) (cid:3) Lemma 4.2 If there is an arc (i, m) leaving from i ∈ VF entering m ∈ VF in Gσ(t) for all t ∈ [t0, t0 + τD), and xi(t)L(y(t)) ≤ µ0x(t0)L(y(t0)) + d0, ∀t ∈ [t0, t0 + τD) (22) for constants µ0 ∈ (0, 1) and d0 > 0, then there exist a continuous function ξµ0(s) : [0, T∗] 7→ (0, 1] and a positive constant γ2 such that kxm(t)kL(y(t)) ≤ ξµ0(t − t0)x(t0)L(y(t0)) + γ2kzk∞ + d0, ∀t ∈ [t0, t0 + T∗] Proof: See Appendix A.2. (23) (cid:3) Remark 4.1 The following properties of µ(s) and ξµ0(s) are quite critical in the study of the set tracking with jointly L-connected topology (see Fig. 2): (i) µ(0) = ξµ0(0) = 1. (ii) µ(s) and ξµ0(s) are strictly decreasing during s ∈ [0, τD]. (iii) µ(s) and ξµ0(s) are strictly increasing during s ∈ [τD, T ∗], and µ(T ∗) < 1, ξµ0 (T ∗) < 1. Figure 2: µ(s) and ξµ0(s) Next, we introduce the following lemma to state an important property for UJLC graphs. Lemma 4.3 If Gσ(t) is UJLC, then, for any t > 0 and i ∈ VF , there is a path d(j, i) from some leader j ∈ VL to follower i in G([t, t + T0)) with T0 , T + 2τD, and each arc of d(j, i) exists in a time interval with length τD at least during [t, t + T0). 13 Proof: Denote t1 as the first moment when the interaction topology switches within [t, t + T0) (suppose there are switchings without loss of generality). If t1 ≥ t + τD, then, for any i ∈ VF , there is a path d(j, i) from some leader with index j ∈ VL to agent i in G([t, t + T )), where each arc stays there for at least the dwell time τD during [t, t + T + τD) due to the definition of τD. On the other hand, if t1 < t + τD, t1 + T + τD < t + T0. Then, for any i ∈ VF , there is also a path d(j, i) from some leader j ∈ VL to agent i in G([t1, t1 + T )) in [t1, t1 + T + τD) with each arc exists for at least τD. This completes the proof. (cid:3) Remark 4.2 If there is a convex set Ω such that L(y(t)) ∈ Ω,∀t ≥ 0, that is, Ω is a positively invariant set for the leaders, then x(t)Ω ≤ x(t)L(y(t)). By Theorem 4.1, system (6) is SISS with respect to Ω with w as the input if Gσ(t) is UJLC. Sometimes, the velocities of the moving leaders and uncertainties in agent dynamics (maybe because of the online estimation) may vanish. To be strict, consider the following condition   limt→+∞ ui(y, t) = 0 uniformly for y; i = 1, . . . , k; limt→+∞ wj(t) = 0, j = 1, . . . , n. (24) Clearly, (24) yields that for any ε > 0, there is Tε > 0 such that kzTεk∞ < ε, where zTε is the truncated part of z defined on [Tε, +∞). Suppose (24) holds and Gσ(t) is UJLC. Based on Theorem 4.1, for any ε > 0, there is Tε > 0 such that x(t)L(y(t)) ≤ β(x(Tε)L(y(Tε)), t) + γ(ε). Hence, the set tracking for system (6) with respect to set L(y(t)) is achieved easily. On the other hand, similar to the proof of Theorem 4.1, the necessity of the global set tracking for system (6) with condition (24) can also be simply proved by counterexamples since z(t) may be large and the distance error may accumulate to a very large value over a sufficiently long period of time. Therefore, we have the following result. Corollary 4.1 The global set tracking with respect to L(y(t)) is achieved for all z(t) satisfying (24) if and only if Gσ(t) is UJLC. 4.2 Proof of Theorem 4.1 We are now in a position to prove Theorem 4.1: "If" part: Denote T∗ = nT0 with T0 = T + 2τD. Then we estimate Ψ(t) at subintervals [t∗ + (j − 1)T0, t∗ + jT0] for j = 1, . . . , n. 14 Based on Lemma 4.3, in [t∗, t∗ + T0), there must be an arc (j1, i1) ∈ E([t∗, t∗ + T0)) leaving from a leader j1 ∈ VL to a follower i1 ∈ VL and this arc remains for at least τD. Suppose (j1, i1) ∈ Eσ(t) for t ∈ [t1, t1 + τD) ⊂ [t∗, t∗ + T0). According to Lemma 4.1, xi1(t)L(y(t)) ≤ µ(t − t1)x(t1)L(y(t1)) + γ1kzk∞, t ∈ [t1, t1 + T∗], (25) where µ(s) and γ1 were defined in Lemma 4.1. Take η1 = sup{µ(s) s ∈ [T0, T∗]} = µ(T∗). Since 0 < µ1 < 1, xi1(t)L(y(t)) ≤ η1x(t1)L(y(t1)) + γ1kzk∞, t ∈ [t∗ + T0, t∗ + T∗]. (26) Furthermore, in [t∗ + T0, t∗ + 2T0), there must be a follower i2 ∈ VF , i2 6= i1, such that there exists an arc (j2, i2) for some j2 ∈ VL, or an arc (i1, i2) in E([t∗ + T0, t∗ + 2T0)). There are two cases: 1) If (j2, i2) ∈ Eσ(t) for t ∈ [t2, t2 + τD) ⊂ [t∗ + T0, t∗ + 2T0), one also has xi2(t)L(y(t)) ≤ η1x(t2)L(y(t2)) + γ1kzk∞, t ∈ [t∗ + 2T0, t∗ + T∗]. (27) 2) If (i1, i2) ∈ Eσ(t) for t ∈ [t2, t2 + τD) ⊂ [t∗ + T0, t∗ + 2T0). According to (12) and Lemma 3.2, one has x(t1)L(y(t1)) ≤ x(t2)L(y(t2)) + √2kzk∞ · t2 − t1 ≤ x(t2)L(y(t2)) + 2√2kzk∞T0, Thus, (26) will lead to xi1(t)L(y(t)) ≤ η1x(t2)L(y(t2)) + (2√2η1T0 + γ1)kzk∞, t ∈ [t∗ + T0, t∗ + T∗]. (28) Then, by Lemma 4.2, if we take η2 = ξη1((n − 1)T0), then xi2(t)L(y(t)) ≤ η2x(t2)L(y(t2)) + (γ2 + 2√2η1T0 + γ1)kzk∞, t ∈ [t∗ + 2T0, t∗ + T∗]. (29) Because η2 > η1, x(t)L(y(t)) ≤ η2x(t2)L(y(t2)) + (γ2 + 2√2η1T0 + γ1)kzk∞,  = i1, i2, t ∈ [t∗ + 2T0, t∗ + T∗]. (30) Repeating the above procedure yields ηj = ξηj−1((n − j + 1)T0), j = 3, . . . , n 15 and tj ∈ [t∗ + jT0, t∗ + T∗) such that, there exists ij ∈ VF , j = 3, . . . , n satisfying x(t)L(y(t)) ≤ ηjx(tj)L(y(tj )) + [(j − 1)γ2 + 2√2 j−1Xl=1 ηlT0 + γ1]kzk∞,  = i1, . . . , ij (31) for t ∈ [t∗ + jT0, t∗ + T∗]. Moreover, the nodes ij , j = 1, 2, . . . , n are distinct. Denote η∗ = ηn, and then 0 < η∗ < 1. Thus, (31) leads to x(t∗ + T∗)L(y(t∗+T∗)) ≤ η∗x(t∗)L(y(t∗)) + [(1 + 2√2)η∗T∗ + (n − 1)γ2 + γ1]kzk∞, for any  ∈ VF , which leads to x(t∗ + T∗)L(y(t∗+T∗)) ≤ η∗x(t∗)L(y(t∗)) + [(1 + 2√2)η∗T∗ + (n − 1)γ2 + γ1]kzk∞. Therefore, ∀N = 1, 2, . . . , x(N T∗)L(y(N T∗)) ≤ ηN ∗ x0L(y0) + N−1Xj=0 ηj ∗[(1 + 2√2)η∗T∗ + (n − 1)γ2 + γ1]kzk∞. Again by Lemma 3.2, one has x(t)L(y(t)) ≤ β(x0L(y0), t) + γ(kzk∞) with (32) (33) (34) (35) β(x0L(y0), t) , η⌊ t T ∗ ⌋ ∗ T ∗⌋ denotes the largest integer no greater than t x0L(y0), γ(s) , [ where ⌊ t 1 − η∗ (1 + 2√2)η∗T∗ + (n − 1)γ2 + γ1 + T∗]s T ∗ , which implies the conclusion. "Only if" part: If Gσ(t) is not UJLC, there is a time sequence 0 < T1 < T2 < . . . such that G([T2κ−1, T2κ)) is not L-connected for κ = 1, 2, . . . with limκ→∞(T2κ − T2κ−1) = ∞. Taking xi(0) = (0, . . . , 0)T ∈ Rd,∀i ∈ VF and yi(0) = (1, . . . , 1)T ∈ Rd,∀i ∈ VL with wi(t) ≡ 0,∀i ∈ VF and ui(y, t) ≡ (1, . . . , 1)T ,∀i ∈ VL, we obtain L(y(t)) = {(1+t, . . . , 1+t)T }. Since G([T2κ−1, T2κ)) is not L-connected, there is i ∈ VF such that agent i is reachable from no leader. Define V 1 i contains no leader and there is no arc entering V 1 i } when t ∈ [T2κ−1, T2κ). Moreover, none of the followers can enter L(y(t)) in finite time. Therefore, , {j ∈ Vi is reachable from j in graph G([T2κ−1, T2κ))}. Since V 1 leaves co{x(T2κ−1),  ∈ V 1 i , no agent in V 1 i i lim κ→∞x(T2κ)L(y(T2κ )) ≥ lim κ→∞ (T2κ − T2κ−1) = +∞, ∀ ∈ V 1 i . Thus, the SISS with respect to L(y(t)) cannot be achieved. (cid:3) 16 5 Connectivity and SiISS In this section, we aim at the connectivity requirement to ensure the set integral-input-to-state stability (SiISS) when Gσ(t) is jointly L-connected (JLC). 5.1 Main results Theorem 4.1 showed an equivalent relationship between SISS and UJLC. However, this is not true for SiISS. Here, we propose a couple of theorems about SiISS. The proofs of these conclusions can be found in the following subsection. First of all, we propose a sufficient condition. Theorem 5.1 System (6) is SiISS with respect to L(y(t)) if Gσ(t) is UJLC. Remark 5.1 JLC of Gσ(t) (i.e., G([t,∞)) is L-connected for any t) is necessary for the SiISS, though it is not sufficient. If G([ T ,∞)) is not L-connected for some T > 0, there is a subset VF ⊆ VF such that no arcs enter VF in G([ T ,∞)). Hence, the agents in VF may not be SiISS for some initial conditions since they will not be influenced by the convex leader-set after T . UJLC, which is a special case of JLC, provides a sufficient condition for SiISS, but UJLC is not necessary to ensure SiISS. In fact, there are other cases of JLC to make SiISS hold. Here we consider two important special JLC cases i.e., bidirectional graphs and acyclic graphs. A digraph G is called a bidirectional graph when i is a neighbor of j if and only if j is a neighbor of i, but the weight of arc (i, j) may not be equal to that of arc (j, i). The next result shows a necessary and sufficient condition for the bidirectional case. Theorem 5.2 Suppose that GF only if Gσ(t) is JLC. σ(t) is bidirectional for all t ≥ 0. Then system (6) is SiISS if and The next lemma shows an important property for an acyclic digraph, that is, a digraph without cycles. Lemma 5.1 Assume that GF ([0, +∞)) is acyclic and G([0, +∞)) is L-connected. Then there is a partition of VF by VF = Sk0 i , k0 ≥ 1 such that in graph G([0, +∞)), all the arcs entering node set V F j , j = 2, . . . , k0 are from VL ∪ (Sj−1 i=1 V F i ). 1 are from VL ; and all the arcs entering node set V F i=1 V F 17 1 , {j ∈ VFthere is an arc leaving from VL entering j}. 1 6= ∅. Take i0 ∈ V F 1 exists by contradiction. If V F 1 does not exist, every agent i, i ∈ VF has Proof: First we prove V F neighbors within VF in G([0, +∞)). Denote V F Clearly V F 1 . Then, there is j1 ∈ VF such that (j1, i0) ∈ G([0, +∞)). Moreover, 1 (i1 cannot be i0, of course) such that there is a path \(i1, j1) we can associate j1 with i1 ∈ V F 1 ). Hence, a path \(i1, i0) in G([0, +∞)) is found. Regarding i1 as in G([0,∞)) (i1 = j1 if j1 ∈ V F i0 and repeating the above procedure yields the existence of \(i2, i1) in G([0, +∞)) with i2 ∈ V F 1 . In this way, we obtain a path \(il+1, il) in G([0, +∞)) with il ∈ V F 1 , l = 2, 3, . . . . Since the nodes in V F 1 are finite, there has to be il1 = il2 for some l1 > l2 ≥ 0, which lead to a directed cycle in G([0, +∞)). Therefore, there is V F Next, by replacing VL with V F 1 to make the conclusion hold. 1 ∪ VL in G([0,∞)), with the same analysis we can find V F 2 to make the conclusion hold. Repeating this procedure, since the number of all the agents is finite, there will be a constant k0 ≥ 1 such that VF =Sk0 i=1 V F Then we have a SiISS result for the acyclic graph case. i . This completes the proof. (cid:3) Theorem 5.3 Assume that GF ([0, +∞)) is acyclic. Then system (6) is SiISS if and only if Gσ(t) is JLC. Furthermore, consider the following inequality Z +∞ 0 z(t)dt < ∞. (36) It is not hard to obtain the following results based on Theorems 5.1, 5.2, and 5.3. The proofs are omitted for space limitations. Corollary 5.1 System (6) achieves the set tracking if (36) holds and Gσ(t) is UJLC. Corollary 5.2 Suppose (36) holds with either GF being acyclic. Then system (6) achieves the global set tracking if and only if Gσ(t) is JLC. σ(t) being bidirectional for all t ≥ 0 or GF ([0, +∞)) Remark 5.2 In general, the condition (24) does not imply and is not implied by the condition (36). In fact, the considered leaders converge to some points with (36), but the leaders can go to infinity with (24). However, if z(t) is uniformly continuous in [0, +∞) (which can be guaranteed once z(t) is bounded for t ∈ [0, +∞)), (24) will then be implied by (36) according to Barbalat's Lemma. Remark 5.3 Corollaries 5.1 and 5.2 are consistent with Proposition 6 in [34], where (36) and integral-ISS together resulted in the state stability. Moreover, the two corollaries are also 18 consistent with Theorems 15 and 17 in [26], respectively, when z ≡ 0. However, different from the limit-set-based approach given in [26], the proposed method by virtue of (43) and (50) also provides the estimation of the convergence rate. Remark 5.4 Theorems 4.1 and 5.1 with Remark 5.1 proved that for system (6), SISS is equiv- alent to UJLC, which implies SiISS, while JLC is a necessary condition, namely, SISS ⇐⇒ U J LC =⇒ SiISS =⇒ J LC. Thus, SISS =⇒ SiISS, which is consistent with Corollary 4 of [34], where ISS implies iISS. Moreover, Theorems 5.2 and 5.3 show that, in either bidirectional or acyclic case, SiISS ⇐⇒ J LC. Remark 5.5 As for set tracking (ST), Corollary 4.1 shows that U J LC ⇐⇒ ST,∀z(t) satifying (24). Moreover, Corollaries 5.1 and 5.2 show that as long as (36) holds, in general directed cases, and U J LC =⇒ ST J LC ⇐⇒ ST in either bidirectional or acyclic case. Usually, SISS goes with (24) and SiISS with (36), con- sistent with discussions on ISS and iISS [34, 35]. Additionally, it is worth pointing out that the differences between the statements in Corollaries 4.1 and those in 5.1 result from the fact that UJLC is necessary for SISS, but not necessary to SiISS. Although our results are consistent with the results on conventional ISS or iISS, the analysis methods given in [34, 35] are mainly based on an equivalent ISS-Lyapunov function, which cannot be applied to our cases with a moving set and switching topologies. 5.2 Proofs To establish the SiISS in the JLC case, we will analyze the impact of the integral of input z(t) in a time interval and estimate the convergence rates during this time interval by "pasting" different time subintervals together within the interval. The following lemmas are given to estimate the convergence rates in different cases. 19 Lemma 5.2 If there is an arc (j, i) leaving from j ∈ VL entering i ∈ VF in Gσ(t) for t ∈ [t0, t0 + τD), then there exists a strictly decreasing function δ(s) : [0, τD] 7→ (0, 1] with δ(0) = 1 such that xi(t)L(y(t)) ≤ δ(t − t0)x(t0)L(y(t0)) + 2√2Z t0+τD t0 z(s)ds, t ∈ [t0, t0 + τD]. (37) Proof: According to Lemma 3.2, ψj(t) ≤pΨ(t) ≤pΨ(t0) +R t t > t0 > 0. Since there is an arc (j, i) with j ∈ VL, i ∈ VF in Gσ(t) for t ∈ [t0, t0 + τD), √2z(s)ds, j = 1, ..., n for any t0 d dt ψi(t) ≤ −2b∗ψi(t) + 2√2z(t)pψi(t) + 2hxi − PL(y(t))(xi), Xj∈Ni(σ(t)) hxi(t) − PL(y(t))(xi(t)), xj(t) − xi(t)i ≤ pψi(t)(pΨ(t) −pψi(t)) Based on Lemma 2.1, when t ∈ [t0, t0 + τD), aij(x)(xj − xi)i. ≤ pψi(t)(pΨ(t0) +Z t t0 √2z(s)ds −pψi(t)) Therefore, d dt ψi(t) ≤ −2[b∗ + (n − 1)a∗]ψi(t) + 2[√2z(t) + (n − 1)a∗(pΨ(t0) +Z t dtpψi(t) ≤ −λpψi(t) + [√2z(t) + (n − 1)a∗(pΨ(t0) +Z t0+τD d t0 t0 or equivalently, √2z(s)ds)]pψi(t), √2z(s)ds)] where λ , b∗ + (n − 1)a∗ for t ∈ [t0, t0 + τD). Thus, b∗ + 2(n − 1)a∗ pψi(t) ≤ δ(t − t0)pΨ(t0) + λ Z t0+τD t0 √2z(s)ds, t ∈ [t0, t0 + τD) with δ(s) , b∗e−λs+(n−1)a∗ λ , s ∈ [0, τD], which implies the conclusion. (cid:3) Lemma 5.3 Suppose there is an edge (i, m) leaving from i ∈ VF entering m ∈ VF in Gσ(t) and xi(t)L(y(t)) ≤ δ0x(t0)L(y(t0)) + c0 with constants δ0 ∈ (0, 1) and c0 > 0 when t ∈ [t0, t0 + τD). Then there is a strictly decreasing function ϕδ0(s) : [0, τD] 7→ (0, 1] with ϕδ0(0) = 1 such that xm(t)L(y(t)) ≤ ϕδ0(t − t0)x(t0)L(y(t0)) + c0 + 2√2Z t0+τD t0 z(s)ds, t ∈ [t0, t0 + τD]. (38) Lemma 5.4 Given a constant T > 0, if there is t1 ≥ t0 with kxi(t1)kL(y(t1)) ≤ ε0x(t0)L(y(t0)) + c0 for constants ε0 ∈ (0, 1) and c0 > 0, then there is a strictly increasing function φε0(s) : [0, T ] 7→ [ε0, 1) with φε0(0) = ε0 such that xi(t)L(y(t)) ≤ φε0(t − t1)x(t0)L(y(t0)) + c0 + 2√2Z t1+ T t0 z(s)ds, t ∈ [t1, t1 + T ], (39) where φε0(s) = 1 − e−(n−1)a∗ s(1 − ε0). 20 The proofs of Lemmas 5.3 and 5.4 are similar to that of Lemma 5.2, and therefore, omitted. Lemma 5.5 Suppose V 1 entering V 1 c0, ∀i ∈ V 1 F ⊂ VF is an nonempty subset. If there are no arcs leaving from VF \V 1 F in G([t1, t1 + T )) for a given constant T > 0 and kxi(t1)kL(y(t1)) ≤ ε0x(t0)L(y(t0)) + F for constants ε0 ∈ (0, 1) and c0 > 0, then F xi(t)L(y(t)) ≤ ε0x(t0)L(y(t0)) + c0 + √2Z t1+t t1 z(s)ds, (40) Taking Ψ1(t) = max i∈V 1 F{ψi(t)} gives D+pΨ1(t) ≤ √2z(t) for t ∈ [t1, t1 + T ] by virtue of the analysis given for Lemma 3.2. Then Lemma 5.5 can be obtained straightforwardly. Now we are ready to prove Theorems 5.1, 5.2, and 5.3. Proof of Theorem 5.1: Denote T∗ = nT0 with T0 = T + 2τD defined in Lemma 4.3. If G([t∗, t∗ + T0)) is L-connected, there has to be an arc (j1, i1) ∈ Eσ(t) for t ∈ [t1, t1 + τD) ⊂ [t∗, t∗ + T0) leaving from a leader j1 ∈ VL entering i1 ∈ VL and this arc is kept there for a period of at least τD. Invoking Lemmas 5.2 and 5.4, xi1(t)L(y(t)) ≤ c1x(t1)L(y(t1)) + 4√2Z t∗+T∗ t∗ z(s)ds, t ∈ [t1, t∗ + T∗], where c1 = φδ(τD )(T∗). Furthermore, when t ∈ [t∗ + T0, t∗ + 2T0), there must be a follower i2 ∈ VF , i2 6= i1 such that there exists an arc (j2, i2) for some j2 ∈ VL, or an arc (i1, i2) when t ∈ [t2, t2 + τD) ⊂ [t∗ + T0, t∗ + 2T0)). According to Lemmas 5.3 and 5.4, xi2(t)L(y(t)) ≤ c2x(t1)L(y(t1)) + 8√2Z t∗+T∗ t∗ z(s)ds, t ∈ [t2, t∗ + T∗], where c2 = φϕ2(T∗) with ϕ2 = ϕc1(τD). Repeating the above procedure yields xiℓ(t)L(y(t)) ≤ cℓx(t1)L(y(t1)) + 4√2ℓZ t∗+T∗ t∗ z(s)ds, t ∈ [t∗ + ℓT0, t∗ + T∗]. for iℓ ∈ VF , ℓ = 3, . . . , n, where cℓ = φϕℓ−1(T∗), ϕℓ = ϕcℓ−1(τD), [tℓ, tℓ + τD) ⊂ [t∗ + (ℓ − 1)T0, t∗ + ℓT0) (41) Moreover, the nodes of iℓ, ℓ = 1, 2, . . . , n are distinct. Denote c , cn from (41). Then we obtain x(t∗ + T∗)L(y(t∗+T∗)) ≤ cx(t∗)L(y(t∗)) + (4n + 1)√2Z t∗+T∗ t∗ z(s)ds. (42) 21 It follows immediately that x(KT∗)L(y(KT∗)) ≤ cKx0L(y0) + (4n + 1)√2 KXj=1 Z jT∗ (j−1)T∗ cK−jz(s)ds, K = 1, 2, . . . (43) Based on Lemma 3.2 and (12), we have Z jT∗ T ∗ ⌋−jz(s)ds + √2Z t c⌊ t (j−1)T∗ c⌊ t T ∗ ⌋−p(s)z(s)ds ⌊ t T ∗ ⌋ z(s)ds (44) (45) x(t)L(y(t) ≤ c⌊ t ≤ c⌊ t where ⌊ t T ∗ ⌋Xj=1 T ∗ ⌋x0L(y0) + (4n + 1)√2 T ∗ ⌋x0L(y0) + (4n + 1)√2Z t p(s) =  ⌊ t T ∗⌋, i, 0 s ∈ [(i − 1)T ∗, iT ∗) f or i = 1, . . . ,⌊ t T ∗⌋ s ∈ [T ∗ · ⌊ t T ∗⌋, t) Hence, (10) holds with γ(s) = (4n + 1)√2s since c⌊ t T ∗ ⌋−p(s) ≤ 1, which completes the proof. (cid:3) Proof of Theorem 5.2: The "only if" part is quite obvious, so we focus on the "if" part. Since Gσ(t) is JLC, there exists a sequence of time instants 0 = T1 < T2 < ··· < Ti < Ti+1 < . . . such that Ti , Ti1 < Ti2 < ··· < Tin+1 = Ti+1, i = 1, 2, . . . (46) (47) and G([Tiκ , Tiκ+1)) is L-connected for κ = 1, . . . , n. Moreover, each arc in G([Tik , Tik+1)) will be kept for at least the dwell time τD during the time interval [Tiκ , Tiκ+1), i = 1, 2, . . . ; κ = 1, 2, . . . , n. Then we estimate Ψ(t) during t ∈ [Ti, Ti+1]. Since G([Ti1 , Ti2 )) is L-connected, there is a time interval [t1, t1 + τD) ⊆ [Ti1 , Ti2) such that there is an edge (l, m0) ∈ Eσ(t) between a leader l ∈ VL and a follower m0 ∈ VF for t ∈ [t1, t1 + τD). Based on Lemma 5.2, xm0(t1 + τD)L(y(t1+τD)) ≤ δ1x(t1)L(y(t1)) + 2√2Z t1+τD z(s)ds, t1 where δ1 , δ(τD). Furthermore, we define V 1 L , {vm0} ∪ VL, t2 , inf t {t ∈ [t1 + τD, Ti3)there is an edge leaving from V 1 L entering V \ V 1 L in Gσ(t)}, and V 1 F , { ∈ VF \ m0there is an edge leaving from V 1 L entering  when t = t2}. 22 Noting that G([Ti2 , Ti3)) is L-connected, thus, according to Lemma 5.5, one has xm0 (t2)L(y(t2)) ≤ δ1x(t1)L(y(t1)) + √2Z t2 t1+τD z(s)ds + 2√2Z t1+τD t1 z(s)ds Further, by Lemma 5.4, xm0 (t)L(y(t)) ≤ φ1x(t1)L(y(t1)) + √2[2Z t2+τD ≤ φ1x(t1)L(y(t1)) + 4√2Z t2+τD t1 t1 +2Z t1+τD t1 ]z(s)ds +Z t2 z(s)ds t1+τD (48) for t ∈ [t2, t2 + τD], where φ1 , φδ1(τD). Moreover, according to Lemma 5.3, x(t2 + τD)L(y(t2+τD)) ≤ ϕφ1(τD)x(t1)L(y(t1)) + √2[4Z t2+τD +2Z t2+τD ≤ ϕφ1(τD)x(t1)L(y(t1)) + 8√2Z t2+τD z(s)ds t1 t2 t1 +2Z t2 t1 ]z(s)ds (49) for  ∈ V 1 F . Because φ1 < ϕφ1(τD), (48) and (49) lead to xi(t2 + τD)L(y(t2+τD)) ≤ δ2x(t1)L(y(t1)) + 8√2Z t2+τD t1 z(s)ds, ∀i ∈ {vm0} ∪ V 1 F , where δ2 , ϕφ1(τD). Next, define V 2 L , V 1 L ∪ V 1 F , t3 , inf t {t ∈ [t2 + τD, Ti4)there is an edge leaving from V 2 L and entering V \ V 2 L in Gσ(t)} and V 2 F , { ∈ V \ V 2 Lthere is an edge leaving from V 2 L entering  when t = t3}. Similarly, from Lemma 5.5, by φ2 , φδ2(τD), δ3 , ϕφ2(τD), one has xi(t3 + τD)L(y(t3+τD)) ≤ δ3x(t1)L(y(t1)) + 12√2Z t3+τD t1 z(s)ds, Repeating the process gives φκ , φδκ(τD), δκ+1 , ϕφκ(τD), ∀i ∈ {vm0} ∪ V 1 F ∪ V 2 F for κ = 3, 4, . . . , k0 until VF = {vm0} ∪ V 1 F ∪ V 2 F ∪ ··· ∪ V k0 F for some k0 ≤ n such that xi(tk0 + τD)L(y(tk0 +τD)) ≤ δk0x(t1)L(y(t1)) + 4√2k0Z tk0 +τD t1 z(s)ds, ∀i ∈ VF Hence x(tk0 + τD)L(y(tk0 +τD)) ≤ δk0x(t1)L(y(t1)) + 4√2k0Z tk0 +τD t1 z(s)ds 23 According to Lemma 5.5, we obtain x(Ti+1)L(y(Ti+1)) ≤ δk0x(Ti)L(y(Ti)) + (4k0 + 1)√2Z Ti+1 Ti z(s)ds. It is obvious to see that k0 ≤ n and 0 < δ1 ≤ δ2 ≤ . . . δn < 1. Therefore, denote δ , δn, then for K = 1, 2, . . . , x(TK+1)L(y(TK+1)) ≤ δKx0L(y0) + (4n + 1)√2 δK−iZ Ti+1 Ti KXi=1 z(s)ds Thus, similar to the proof of Theorem 5.1, we also have x(t)L(y(t) ≤ δΓ(t)x0L(y0) + (4n + 1)√2Z t 0 δΓ(t)−p(s)z(s)ds where Γ(t) = K0 − 1 when t ∈ [TK0 , TK0+1), K0 = 1, 2, . . . , and p(s) =  i, s ∈ [Ti, Ti+1) f or i = 1, . . . , K0 − 1 K0 − 1, s ∈ [TK0 , t) Then it is obvious to see that (51) leads to Theorem 5.2 immediately. (50) (51) (52) (cid:3) Proof of Theorem 5.3: We also focus on the "if" part since the "only if" part is quite obvious. Because Gσ(t) is JLC, there is an infinite sequence in the form of (46) with (47) such that G([Tiκ , Tiκ+1)) is L-connected for κ = 1, . . . , n. Then, for any ℓ ∈ V1, there is tℓ ∈ [Ti1 , Ti2) such that there is an arc leaving from VF entering ℓ in Gσ(t). Hence, recalling Lemma 5.2, xℓ(tℓ + τD)L(y(tℓ+τD)) ≤ d1x(tℓ)L(y(tℓ)) + 2√2Z tℓ+τD with a constant d1 , δ(τD). According to Lemma 5.1, for any ℓ ∈ V F tℓ xℓ(t)L(y(t)) ≤ d1x(Ti)L(y(Ti)) + 2√2Z Ti+1 Ti Again by Lemmas 5.3 and 5.1, for any ℓ ∈ V F 2 , xℓ(t)L(y(t)) ≤ d2x(Ti)L(y(Ti)) + 4√2Z Ti+1 Ti z(s)ds, ℓ ∈ V F 1 1 , we have z(s)ds, t ∈ [Ti2 , Ti+1] z(s)ds, t ∈ [Ti3 , Ti+1], where d2 = ϕd1(τD). Similarly, with dj = ϕdj−1 (τD), j = 3, . . . , k0, xℓ(t)L(y(t)) ≤ djx(Ti)L(y(Ti)) + 2√2jZ Ti+1 Ti z(s)ds, t ∈ [Tij+1 , Ti+1], for any ℓ ∈ V F j , j = 3, . . . , k0, which leads to x(Ti+1)L(y(Ti+1)) ≤ dk0x(Ti)L(y(Ti)) + 2√2k0Z Ti+1 Ti z(s)ds. Similar to the proof of Theorem 5.2, SiISS can be obtained. (cid:3) 24 6 Conclusions This paper addressed multi-agent set tracking problems with multiple leaders and switching communication topologies. At first, the equivalence between UJLC and the SISS of a group of uncertain agents with respect to a moving multi-leader set was shown. Then it was shown that UJLC is a sufficient condition for SiISS of the multi-agent system with disturbances in agent dynamics and unmeasurable velocities in the dynamics of the leaders. Moreover, when communication topologies are either bidirectional or acyclic, JLC is a necessary and sufficient condition for SiISS. Also, set tracking was achieved in special cases with the help of SISS and SiISS. Multiple leaders, in some practical cases, can provide an effective way to overcome the difficulties and constraints in the distributed design. On the other hand, ISS-based tools were proved to be very powerful in the control synthesis. Therefore, the study of multiple active leaders and related ISS tools deserves more attention. Appendix A.1 Proof of Lemma 4.1 Due to D+pΨ(t) ≤ √2kzk∞ by Lemma 3.2 and (12), we obtain qψj(t) ≤pΨ(t) ≤pΨ(t0) + √2kzk∞(t − t0), j = 1, ..., n. (53) Since there is an arc (j, i) with j ∈ VL and i ∈ VF in Gσ(t) for t ∈ [t0, t0 + τD), based on (20), one has hxi − PL(y(t))(xi), Xj∈Li(σ(t)) bij(x)(yj − xi)i ≤ −b∗ψi(t). (54) d dt Thus, with (19) and the fact that r(t) + wi(t) ≤ q(t) ≤ √2kzk∞, we obtain ψi(t) ≤ −2b∗ψi(t) + 2hxi − PL(y(t))(xi), Xj∈Ni(σ(t)) ≤ −2b∗ψi(t) + 2hxi − PL(y(t))(xi), Xj∈Ni(σ(t)) aij(xj − xi)i + 2(r(t) + wi(t))pψi(t) aij(xj − xi)i + 2√2kzk∞pψi(t) (55) for t ∈ [t0, t0 + τD). Then, by Lemma 2.1, if pψj(t) <pψi(t), j ∈ Ni(σ(t)) for t ∈ [t0, t0 + τD), then hxi(t) − PL(y(t))(xi(t)), xj (t) − xi(t)i ≤ 0. (56) 25 On the other hand, if pψj(t) ≥pψi(t), j ∈ Ni(σ(t)), from Lemma 2.1 and (53), hxi(t) − PL(y(t))(xi(t)), xj (t) − xi(t)i ≤ pψi(t)(qψj(t) −pψi(t)) ≤ pψi(t)(pΨ(t0) + √2kzk∞(t − t0) −pψi(t)) ≤ pψi(t)(pΨ(t0) −pψi(t) + √2kzk∞τD) (57) t ∈ [t0, t0 + τD). Therefore, with (55), (56) and (57), it follows that d dt ψi(t) ≤ −2λψi(t) + 2[√2kzk∞(1 + (n − 1)a∗τD) + (n − 1)a∗pΨ(t0)]pψi(t), where λ , b∗ + (n − 1)a∗, or equivalently, d dtpψi(t) ≤ −λpψi(t) + [√2kzk∞(1 + (n − 1)a∗τD) + (n − 1)a∗pΨ(t0))] for t ∈ [t0, t0 + τD). As a result, pψi(t) ≤ e−λ(t−t0)pΨ(t0) + (1 − e−λ(t−t0)) ≤ µ(t − t0)pΨ(t0) + c0√2kzk∞, (n − 1)a∗pΨ(t0) + (kuk∞ + kwk∞)(1 + (n − 1)a∗τD) λ t ∈ [t0, t0 + τD) (58) b∗+(n−1)a∗ where µ(s) , b∗e−λs+(n−1)a∗ , s ∈ [0, τD] and c0 , 1+(n−1)a∗τD b∗+(n−1)a∗ , because 1 − e−λ(t−t0) < 1. between the followers and the leaders. Similar analysis gives Then we evaluate pψi(t) for t ∈ [t0 + τD, t0 + T∗) no matter whether there is any connection ψi(t) ≤ 2√2kzk∞pψi(t) + 2hxi − PL(y(t))(xi), Xj∈Ni(σ(t)) aij(x)(xj − xi)i d dt ≤ 2√2kzk∞pψi(t) + 2(n − 1)a∗pψi(t)(pΨ(t0) −pψi(t) + √2kzk∞T∗) = −2(n − 1)a∗ψi(t) + 2[√2kzk∞(1 + (n − 1)a∗T∗) + (n − 1)a∗pΨ(t0)]pψi(t), which is equivalent to d dtpψi(t) ≤ −(n − 1)a∗pψi(t) + [√2kzk∞(1 + (n − 1)a∗T∗) + (n − 1)a∗pΨ(t0)]. (59) Denote µ∗ , µ(τD). From (58), when t ∈ [t0 + τD, t0 + T∗), pψi(t) ≤ e−(n−1)a∗(t−(t0+τD))pψi(t0 + τD) +(1 − e−(n−1)a∗(t−(t0+τD)))[pΨ(t0) + √2kzk∞ ≤ e−(n−1)a∗(t−(t0+τD))[µ∗pΨ(t0) + c0√2kzk∞] +(1 − e−(n−1)a∗(t−(t0+τD)))[pΨ(t0) + √2kzk∞ · ≤ µ(t − t0)pΨ(t0) + γ1kzk∞, 1 + (n − 1)a∗T∗ ] (n − 1)a∗ 1 + (n − 1)a∗T∗ (n − 1)a∗ ] (60) 26 where γ1 , √2· 1+(n−1)a∗ T∗ (n−1)a∗ > c0 and µ(s) , 1− e−(n−1)a∗(s−τD))(1− µ∗), s ∈ [τD, T∗]. Therefore, based on (58) and (60), pψi(t) ≤ µ(t − t0)pΨ(t0) + γ1kzk∞, µ(s) =  where µ(s) is continuous. Thus, the conclusion follows. µ(s), s ∈ [0, τD) µ(s), s ∈ [τD, T∗] (cid:3) A.2 Proof of Lemma 4.2 If there is an arc (vi, vm) in Gσ(t) for t ∈ [t0, t0 + τD), then based on (53), Lemmas 2.1 and 3.1, it is easy to see d dt ψm(t) ≤ 2hxm − PL(y(t))(xm), Xj∈Nm(σ(t)) amj(x)(xj − xm) + Xj∈Lm(σ(t)) bmj(x)(yj − xm)i +2√2kzk∞pψm(t) ≤ 2√2kzk∞pψm(t) + 2hxm − PL(y(t))(xm), Xj∈Nm(σ(t)) = 2√2kzk∞pψm(t) + 2 Xj∈Nm(σ(t))\vi ≤ 2√2kzk∞pψm(t) + 2(n − 2)a∗pψm(t)(pΨ(t0) −pψm(t) + √2kzk∞τD) +2ami(x)hxm − PL(y(t))(xm), xi − xmi amj(x)hxm − PL(y(t))(xm), xj − xmi amj(x)(xj − xm)i −2a∗pψm(t)(pψm(t) −pψi(t)) for t ∈ [t0, t0 + τD). Then, if (22) holds, as done in the proof of Lemma 4.1, we can obtain d dtpψm(t) ≤ −λ1pψm(t) + d1 where λ1 , (n− 2)a∗ + a∗ and d1 , (1 + (n− 2)a∗τD)√2kzk∞ + ((n− 2)a∗ + a∗µ0)pΨ(t0) + a∗d0. Here are two cases. • when t ∈ [t0, t0 + τD): d1 pψm(t) ≤ e−λ1(t−t0)pψm(t0) + (1 − e−λ1(t−t0)) λ1 (n − 2)a∗ + (µ0 + (1 − µ0)e−λ1(t−t0))a∗ √2kzk∞(1 + (n − 2)a∗τD) + a∗d0 (n − 2)a∗ + a∗ ≤ · (n − 2)a∗ + a∗ ≤ ξ(t − t0)pΨ(t0) + γ0, pΨ(t0) + (1 − e−λ1(t−t0)) where ξ(s) , (n−2)a∗+(µ0+(1−µ0)e−λ1s)a∗ (n−2)a∗+a∗ , s ∈ [0, τD] and γ0 , (1+(n−2)a∗τD)√2kzk∞+a∗d0 (n−2)a∗+a∗ 27 (61) . • when t ∈ [t0 + τD, t0 + T∗): Denote ξ∗ , ξ(τD). By (61), similarly, we have pψm(t) ≤ e−(n−1)a∗(t−(t0+τD))pψm(t0 + τD) ≤ e−(n−1)a∗(t−(t0+τD))[ξ∗pΨ(t0) + γ0] ≤ ξ(t − t0)pΨ(t0) + γ2kzk∞ + d0, +(1 − e−(n−1)a∗(t−(t0+τD)))[pΨ(t0) + √2kzk∞ +(1 − e−(n−1)a∗(t−(t0+τD)))[pΨ(t0) + √2kzk∞ 1 + (n − 1)a∗T∗ (n − 1)a∗ 1 + (n − 1)a∗T∗ (n − 1)a∗ ] ] (62) where γ2 , √2 · 1+(n−1)a∗T∗ (n−2)a∗+a∗ max{γ0,√2kzk∞ and ξ(s) , 1 − e−(n−1)a∗(s−τD)(1 − ξ∗), s ∈ [τD, T∗], because 1 + (n − 1)a∗T∗ + d0, 1 + (n − 1)a∗T∗ (n − 2)a∗ + a∗ √2kzk∞ } ≤ (n − 1)a∗ With (61) and (62), we have pψm(t) ≤ ξµ0(t − t0)pΨ(t0) + γ2kzk∞ + d0, where ξµ0(s) which is continuous. Thus, the conclusion follows. ξµ0(s) =  ξ(s), s ∈ [0, τD) ξ(s), s ∈ [τD, T∗] (cid:3) References [1] J. Aubin and A. Cellina. Differential Inclusions. Berlin: Speringer-Verlag, 1984 [2] R. T. Rockafellar. Convex Analysis. New Jersey: Princeton University Press, 1972. [3] N. Rouche, P. Habets, and M. Laloy. Stability Theory by Liapunov's Direct Method, New York: Springer-Verlag, 1977. [4] J. Danskin. The theory of max-min, with applications, SIAM J. Appl. Math., vol. 14, 641-664, 1966. [5] C. Berge and A. Ghouila-Houri. Programming, Games, and Transportation Networks, John Wiley and Sons, New York, 1965. [6] D. Cheng, J. Wang, and X. Hu, An extension of LaSalle's invariance principle and its applciation to multi-agents consensus, IEEE Trans. Automatic Control, 53, 1765-1770, 2008. [7] F. Clarke, Yu.S. Ledyaev, R. Stern, and P. Wolenski, Nonsmooth Analysis and Control Theory. Speringer-Verlag, 1998 28 [8] I. D. Couzin, J. Krause, N. Franks, and S. Levin. Effective leadership and decision making in animal groups on the move. Nature, vol. 433, 513-516, 2005. [9] J. Fang, A. S. Morse, and M. Cao, Multi-agent rendezvousing with a finite set candidate rendezvous points, Proc. American Control Conference, 765-770, 2008. [10] S. Martinez, J. Cortes, and F. Bullo. Motion coordination with distributed information, IEEE Control Systems Magazine, vol. 27, no. 4, 75-88, 2007. [11] W. Ren and R. Beard, Distributed Consensus in Multi-vehicle Cooperative Control, Springer-Verlag, London, 2008. [12] R. Olfati-Saber, Flocking for multi-agent dynamic systems: algorithms and theory, IEEE Trans. Automatic Control, 51(3): 401-420, 2006. [13] C. Godsil and G. Royle. Algebraic Graph Theory. New York: Springer-Verlag, 2001. [14] Y. Hong, L. Gao, D. Cheng, and J. Hu. Lyapuov-based approach to multi-agent systems with switching jointly connected interconnection. IEEE Trans. Automatic Control, vol. 52, 943-948, 2007. [15] R. Olfati-Saber and R. Murray. Consensus problems in the networks of agents with switching topology and time dealys, IEEE Trans. Automatic Control, vol. 49, no. 9, 1520-1533, 2004. [16] Y. Hong, J. Hu, and L. Gao. Tracking control for multi-agent consensus with an active leader and variable topology. Automatica, vol. 42, 1177-1182, 2006. [17] H. G. Tanner, A. Jadbabaie, and G. Pappas, Stable flocking of mobile agents, Part I: fixed topology, Proc. IEEE Conf. on Decision and Control, Hawaii, 2010-2015, Dec. 2003 [18] H. G. Tanner, A. Jadbabaie, and G. Pappas, Stable flocking of mobile agents, Part II: dynamic topology, Proc. IEEE Conf. on Decision and Control, Hawaii, 2016-2021, Dec. 2003 [19] H. G. Tanner, G. Pappas and V. Kumar, Leader-to-formation stability, IEEE Transactions on Robotics and Automation, 20(3), 443-455, 2004 [20] H. G. Tanner, A. Jadbabaie, G. J. Pappas, Flocking in fixed and switching networks, IEEE Trans. Automatic Control, 52(5): 863-868, 2007. 29 [21] F. Xiao and L. Wang, State consensus for multi-agent systems with swtiching topologies and time-varying delays, Int. J. Control, 79, 10, 1277-1284, 2006. [22] A. Jadbabaie, J. Lin, and A. S. Morse. Coordination of groups of mobile agents using nearest neighbor rules. IEEE Trans. Automatic Control, vol. 48, no. 6, 988-1001, 2003. [23] Z. Lin, and B. Francis, M. Maggiore. Necessary and sufficient graphical conditions for formation control of unicycles, IEEE Trans. Automatic Control, 50(1): 121-127, 2005. [24] M. Ji, G. Ferrari-Trecate, M. Egerstedt, and A. Buffa, Containment control in mobile networks, IEEE Trans. Automatic Control, 53, no. 8, 1972-1975, 2008. [25] C. C. Cheah, S. P. Hou, and J. J. E. Slotine, Region following formation control for multi- robot systems, Proc. of IEEE Int. Conf. Robotics and Automation, pp. 3796-3801, 2008. [26] G. Shi and Y. Hong, Global target aggregation and state agreement of nonlinear multi-agent systems with switching topologies, Automatica, vol. 45, 1165-1175, 2009. [27] Y. Cao and W. Ren, Containment control with multiple stationary or dynamic leaders under a directed interaction graph, Proc. of Joint 48th IEEE Conf. Decision & Control/28th Chinese Control Conference, Shanghai, China, Dec. 2009, pp. 3014-3019. [28] J. Tsitsiklis, D. Bertsekas, and M. Athans. Distributed asynchronous deterministic and stochastic gradient optimization algorithms, IEEE Trans. Automatic Control, 31, 803-812, 1986. [29] Z. Jiang, A. Teel, and L. Praly, Small-gain theorem for ISS systems and applications, Mathematics of Control, Signals, and Systems, 7, 95-120, 1994 [30] Z. Lin, B. Francis, and M. Maggiore. State agreement for continuous-time coupled nonlinear systems. SIAM J. Control Optim., vol. 46, no. 1, 288-307, 2007. [31] L. Moreau, Stability of multiagent systems with time-dependent communication links, IEEE Trans. Automatic Control, 50, 169-182, 2005. [32] L. Scardovi, M. Arcak, and E. Sontag, Synchronization of interconnected systems with an input-output approach-I: main results, Proc. of Joint 48th IEEE Conf. Decision & Control/28th Chinese Control Conference, Shanghai, China, Dec. 2009, pp. 609-614. 30 [33] E. Sontag and Y. Lin, Stabilization with respect to noncompact sets: Lyapunov charac- terizations and effect of bounded inputs, Proc. Nonlinear Control Systems Design Symp., Bordeaus, IFAC Publications, 9-14, June 1992 (M.Fliess, Ed.) [34] E. Sontag, Comments on integral variants of ISS, Systems & Control Letters, 34, 93-100, 1998 [35] E. Sontag and Y. Wang, On characterizations of the input-to-state stability property, Sys- tems & Control Letters, 24, 351-359, 1995. 31
cs/0306119
1
0306
2003-06-20T15:12:22
A Method for Solving Distributed Service Allocation Problems
[ "cs.MA" ]
We present a method for solving service allocation problems in which a set of services must be allocated to a set of agents so as to maximize a global utility. The method is completely distributed so it can scale to any number of services without degradation. We first formalize the service allocation problem and then present a simple hill-climbing, a global hill-climbing, and a bidding-protocol algorithm for solving it. We analyze the expected performance of these algorithms as a function of various problem parameters such as the branching factor and the number of agents. Finally, we use the sensor allocation problem, an instance of a service allocation problem, to show the bidding protocol at work. The simulations also show that phase transition on the expected quality of the solution exists as the amount of communication between agents increases.
cs.MA
cs
Web Intelligence and Agent Systems: An International Journal, 2003. A Method for Solving Distributed Service Allocation Problems ∗ Jos´e M. Vidal Computer Science and Engineering University of South Carolina Columbia, SC 29208 [email protected] April 17, 2003 Abstract We present a method for solving service allocation problems in which a set of services must be allocated to a set of agents so as to maximize a global utility. The method is completely distributed so it can scale to any number of services without degradation. We first formalize the service allocation problem and then present a simple hill-climbing, a global hill- climbing, and a bidding-protocol algorithm for solving it. We analyze the expected performance of these algorithms as a function of various prob- lem parameters such as the branching factor and the number of agents. Finally, we use the sensor allocation problem, an instance of a service al- location problem, to show the bidding protocol at work. The simulations also show that phase transition on the expected quality of the solution exists as the amount of communication between agents increases. 1 Introduction The problem of dynamically allocating services to a changing set of consumers arises in many applications. For example, in an e-commerce system, the service providers are always trying to determine which service to provide to whom, and at what price [5]; in an automated manufacturing for mass customization scenario, agents must decide which services will be more popular/profitable [1]; and in a dynamic sensor allocation problem, a set of sensors in a field must decide which area to cover, if any, while preserving their resources. While these problems might not seem related, they are instances of a more general service allocation problem in which a finite set of resources must be allocated by a set of autonomous agents so as to maximize some global measure ∗This work has been funded by Darpa under contract F30602-99-2-0513. 1 of utility. A general approach to solving these types of problems has been used in many successful systems , such as [2] [3] [11] [9]. The approach involves three general steps: 1. Assign each resource that needs to be preserved to an agent responsible for managing the resource. 2. Assign each goal of the problem domain to an agent responsible for achiev- ing it. Achieving these goals requires the consumption of resources. 3. Have each agent take actions so as to maximize its own utility, but im- plement a coordination algorithm that encourages agents to take actions that also maximize the global utility. In this paper we formalize this general approach by casting the problem as a search in a global fitness landscape which is defined as the sum of the agents' utilities. We show how the choice of a coordination/communication protocol disseminates information, which in turn "smoothes" the global utility landscape. This smooth global utility landscape allows the agents to easily find the global optimum by simply making selfish decisions to maximize their individual utility. We also present experiments that pinpoint the location of a phase transition in the time it takes for the agents to find the optimal allocation. The transi- tion can be seen when the amount of communication allowed among agents is manipulated. It exists because communication allows the agents to align their individual landscapes with the global landscape. At some amount of commu- nication, the alignment between these landscapes is good enough to allow the agents to find the global optimum, but less communication drives the agents into a random behavior from which the system cannot recuperate. 1.1 Task Allocation The service allocation problem we discuss in this paper is a superset of the well known task allocation problem [10, chapter 5.7]. A task allocation problem is defined by a set of tasks that must be allocated among a set of agents. Each agent has a cost associated with each subset of tasks, which represents the cost the agent would incur if it had to perform those tasks. Coordination proto- cols are designed to allow agents to trade tasks so that the globally optimal allocation -- the one that minimizes the sum of all the individual agent costs -- is reached as soon as possible. It has been shown that this globally optimal allo- cation can reached if the agents use the contract-net protocol [9] with OCSM contracts [8]. These OCSM contracts make it possible for the system to transi- tion from any allocation to any other allocation in one step. As such, a simple hill-climbing search is guaranteed to eventually reach the global optimum. In this paper we consider the service allocation problem, which is a superset of the task allocation because it allows for more than one agent to service a "task". The service allocation problem we study also has the characteristic that every allocation cannot be reached from every other allocation in one step. 2 1.2 Service Allocation In a service allocation problem there are a set of services, offered by service agents, and a set of consumers who use those services. A server can provide any one of a number of services and some consumers will benefit from that service without depleting it. A server agent incurs a cost when providing a service and can choose not to provide any service. For example, a server could be an agent that sets up a website with infor- mation about cats. All the consumer agents with interests in cats will benefit from this service, but those with other interests will not benefit. Since each server can provide, at most, one service, the problem is to find the allocation of services that maximizes the sum of all the agents' utilities, that is, an allocation that maximizes the global utility. 1.2.1 Sensor Allocation Another instance of the service allocation problem is the sensor allocation prob- lem, which we will use as an example throughout this paper. In the sensor allocation problem we have a number of sensors placed in fixed positions in a two-dimensional space. Each sensor has a limited viewing angle and distance but can point in any one of a number of directions. For example, a sensor might have a viewing angle of 120 degrees, viewing distance of 3 feet, and be able to look in three directions, each one 120 degrees apart from the others. That is, it can "look" in any one of three directions. On each direction it can see everything that is in the 120 degree and 3 feet long view cone. Each time a sensor looks in a particular direction is uses energy. There are also targets that move around in the field. The goal is for the sensors to detect and track all the targets in the field. However, in order to determine the location of a target, two or more sensors have to look at it at the same time. We also wish to minimize the amount of energy spent by the sensors. We consider the sensor agents as being able to provide three services, one for each sector, but only one at a time. We consider the target agents as consuming the services of the sensors. 2 A Formal Model for Service Allocation We define a service allocation problem SA as a tuple SA = {C, S} where C is the set of consumer agents C = {c1, c2, . . . , cC}, and ci has only one possible state, ci = 0. The set of service agents is S = {s1, s2, . . . , sS} and the value of si is the value of that service. For the sensor domain in which a sensor can observe any one of three 120-degree sectors or be turned off, we have si ∈ {0, 1, 2, off}. An allocation is an assignment of states to the services (since the consumers have only one possible state we can ignore them). A particular allocation is denoted by a = {s1, s2, . . . , sS}, where the si have some value taken from the domain of service states, and a ∈ A, where A is the set of all 3 possible allocations. That is, an allocation tells us the state of all agents (since consumers have only one state they can be omitted). Each agent also has a utility function. The utility that an agent receives depends on the current allocation a, where we let a(s) be the state of service agent s under a. The agent's utilities will depend on their state and the state of other agents. For example, in the sensor problem we define the utility of sensor s as Us(a), where Us(a) = (cid:26) 0 −K1 if a(s) = off otherwise. (1) That is, a sensor receives no utility when it is off and must pay a penalty of −K1 when it is running. The targets are the consumers, and each target's utility is defined as Uc(a) =   if fc(a) = 0 0 K2 if fc(a) = 1 K2 + n − 2 if fc(a) = n (2) where fc(a) = number of sensors s that see c given their state a(c). (3) Finally, given the individual agent utilities, we define the global utility GU (a) as the sum of the individual agents' utilities: GU (a) = Xc∈C Uc(a) +Xs∈S Us(a). (4) The service allocation problem is to find the allocation a that maximizes GU (a). In the sensor problem, there are 4S possible allocations, which would make a simple generate-and-test approach take exponential amounts of time. We wish to find the global optimum much faster than that. 2.1 Search Algorithms Our goal is to design an interaction protocol whereby an allocation a that max- imizes the global utility GU (a) is reached in a small number of steps. In each step of our protocol one of the agents will change its state or send a message to another agent. The messages might contain the state or utilities of other agents. We assume that the agents do not have direct access to the other agents' states or utility values. The simplest algorithm we can envision involves having each consumer, at each time, changing the state of a randomly chosen service agent so as to increase the consumer's own utility. That is, a consumer c will change the current allocation a into a′ by changing the state of some sensor s such that Uc(a′) > Uc(a). If the sensor's state cannot be changed so as to increase the utility, then the consumer does nothing. In the sensor domain this amounts to a target 4 picking a sensor and changing its state so that the sensor can see the target. We refer to this algorithm as individual hill-climbing. The individual hill-climbing algorithm is simple to implement and the only communication needed is between the consumer and the chose server. This simple algorithm makes every consumer agent increase its individual utility at each turn. However, the new allocation a′ might result in a lower global utility, since a′ might reduce the utility of several other agents. Therefore, it does not guarantee that an optimal allocation will be eventually reached. Another approach is for each agent to change state so as to increase the global utility. We call this a global hill-climbing algorithm. In order to implement this algorithm, an agent would need to know how the proposed state change affects the global utility as well as the states of all the other agents. That is, it would need to be able to determine GU (a′) which requires it to know the state of all the agents in a′ as well as the utility functions of every other agent, as per the definition of global utility (4). In order for an agent to know the state of others, it would need to somehow communicate with all other agents. If the system implements a global broadcasting method then we would need for each agent to broadcast its state at each time. If the system uses more specialized communications such as point-to-point, limited broadcasting, etc., then more messages will be needed. Any protocol that implements the global hill-climbing algorithm will reach a locally optimal allocation in the global utility. This is because it is always true that, for a new allocation a′ and old allocation a, GU (a′) ≥ GU (a). Whether or not this local optimum is also a global optimum will depend on the ruggedness of the global utility landscape. That is, if it consists of one smooth peak then it is likely that any local optimum is the global optimum. On the other hand, if the landscape is very rugged then there are likely many local peaks. Studies in NK landscapes [4] tell us that smoother landscapes result when an agent's utility depends on the state of smaller number of other agents. Global hill-climbing is better than individual hill-climbing since it guarantees that we will find a local optima. However, it requires agents to know each others' utility function and to constantly communicate their state. Such large amount of communication is often undesirable in multiagent systems. We need a better way to find the global optimum. One way of correlating the individual landscapes to the global utility land- scape is with the use of a bidding protocol in which each consumer agent tells each service the marginal utility the consumer would receive if the service switched its state to so as to maximize the consumer's utility. The service agent can then choose to provide the service with the highest aggregate demand. Since the service is picking the value that maximizes the utility of everyone involved (all the consumers and the service) without decreasing the utility of anyone else (the other services) this protocol is guaranteed to never decrease the global util- ity. This bidding protocol is a simplified version of the contract-net [9] protocol in that it does not require contractors to send requests for bids. However, in order for a consumer to determine the marginal utility it will receive from one sensor changing state, it still needs to know the state of all 5 the other sensors. This means that a complete implementation of this protocol will still require a lot of communication (namely, the same amount as in global hill-climbing). We can reduce this number of messages by allowing agents to communicate with only a subset of the other agents and making their decisions based on only this subset of information. That is, instead of all services telling each consumer their state, a consumer could receive state information from only a subset of the services and make its decision based on this (assuming that the services chosen are representative of the whole). This strategy shows a lot of promise but its performance can only be evaluated on an instance-by-instance basis. We explore this strategy experimentally in Section 3 using the sensor domain. 2.1.1 Theoretical Time Bounds of Global Hill-Climbing Since we now know that global hill-climbing will always reach a local optimum, the next questions we must answer are: 1. How many local optima are there? 2. What is the probability that a local optimum is the global optimum? 3. How long does it take, on average, to reach a local optimum? Let a be the current allocation and a′ be a neighboring allocation. We know that a is a local optimum if ∀a′∈N (a)GU (a) > GU (a′) where N (a) = {x x is a Neighbor of a}. (5) (6) We define a Neighbor allocation as an allocation where one, and only one, agent has a different state. The probability that some allocation a is a local optimum is simply the prob- ability that (5) is true. If the utility of all pairs of neighbors is not correlated, then this probability is Pr[∀a′∈N (a)GU (a) > GU (a′)] = Pr[GU (a) > GU (a′)]b, (7) where b is the branching factor. In the sensor problem b = 3 · S where S is the set of all sensors. That is, since each sensor can be in any of four states it will have three neighbors from each state. In some systems it is safe to assume that the global utilities of a's neighbors are independent. However, most systems show some degree of correlation. Now we need to calculate the Pr[GU (a) > GU (a′)], that is, the probability that some allocation a has a greater global utility that its neighbor a′, for all a and a′. This could be calculated via an exhaustive enumeration of all possible allocations. However, often we can find the expected value of this probability. 6 For example, in the sensor problem each sensor has four possible states. If a sensor changes its state from sector x to sector y the utility of the target agents covered by x will decrease while the utility of those in y will increase. If we assume that, on average, the targets are evenly spaced on the field, then the global utilities for both of these are expected to be the same. That is, the expected probability that the global utility of one allocation is bigger than the other is 1/2. If, on the other hand, a sensor changes state from "off" to a sector, or from a sector to "off," the global utility is expected to decrease and increase, respectively. However, there are an equal number of opportunities to go from "off" to "on" and vice-versa. Therefore, we can also expect that for these cases the probability that the global utility of one allocation is bigger than the other is 1/2. Based on these approximations, we can declare that for the sensor problem Pr[∀a′∈N (a)GU (a) > GU (a′)] = 1 2b = λ. (8) If we assume an even distribution of local optima, the total number of lo- cal optima is simply the product of the total number of allocations times the probability that each one is a local optimum. That is, Total number of local optima = λA (9) For the sensor problem, λ = 1/2b, b = 3 · S and A = bS, so the expected number of local optima is bS/23S. Pr[a local optimum is also global] = 1 λA = 1 2b . (10) We can find the expected time the algorithm will take to reach a local opti- mum by determining the maximum number of steps from every allocation to the nearest local optimum. This gives us an upper bound on the number of steps needed to reach the nearest local optimum using global hill-climbing. Notice that, under either individual hill-climbing or the bidding protocol it is possible that the local optimum is not reached, or is reached after more steps, since these algorithms can take steps that lower the global utility. In order to find the expected number of steps to reach a local optimum, we start at any one of the local optima and then traverse all possible links at each depth d until all possible allocations have been visited. This occurs when Solving for d, and remembering that λ = 1/2b, we get λ · A · bd > A. d > b logb 2. (11) (12) The expected worst-case distance from any point to the nearest local opti- mum is, therefore, b logb 2 (this number only makes sense for b ≥ 2 since smaller 7 number of neighbors do not form a searchable space). That is, the number of steps to reach the nearest local optima in the sensor domain is proportional to the branching factor b, which is equal to 3 · S. We can expect search time to increase linearly with the number of sensors in the field. 3 Simulations While the theoretical results above give us some bounds on the number of itera- tions before the system is expected to converge to a local optimum, the bounds are rather loose and do not tell us much about the dynamics of the executing system. Also, we cannot show mathematically how changes in the amount of communication change the search. Therefore, we have implemented a service allocation simulator to answer these questions. It simulates the sensor allocation domain described in the introduction. The simulator is written in Java and the source code is available upon re- quest. It gathers and analyzes data from any desired number of runs. The program can analyze the behavior of any number of target and sensor agents on a two-dimensional space, and the agents can be given any desired utility function. The program is limited to static targets. That is, it only consid- ers the one-shot service allocation problem. Each new allocation is completely independent of any previous one. In the tests we performed, each run has seven sensors and seven targets, all of which are randomly placed on a two-dimensional grid. Each sensor can only point in one of three directions or sectors. These three sectors are the same for all sensors (specifically, the first sector is from 0 to 120 degrees, the second one from 120 to 240, and the third one from 240 to 360). All the sensors use the same utility function which is given by (1), while the targets use (2). After a sensor agent receives all the bids it chooses the sector that has the heighest aggregate demand, as described by the bidding protocol in Section 2.1. During a run, each of the targets periodically sends a bid to a number of sensors asking them to turn to the sector that faces the target. We set the bid amount to a fixed number for these tests. Periodically, the sensors count the number of bids they have received for each sector and turn their detector (such as a radar) to face the sector with the highest aggregate demand. We assume that neither the targets nor the sensors can form coalitions. We vary the number of sensors to which the targets send their bids in order to explore the quality of the solution that the system converges upon as the amount of communication changes. For example, at one extreme if the all the targets send their bids to all the sensors, then the sensors would always set their sector to be the one with the most targets. This particular service allocation should, usually, be the best. However, it might not always be the optimal solution. For example, if seven targets are clustered together and the eighth is on another part of the field, it would be better if six sensor agents pointed towards the cluster of targets while the remaining two sensor agents pointed towards the stray target rather than having all sensor agents point towards the 8 Results with 1 Neighbor Results with 3 Neighbors 20 40 60 80 100 time 0 1 0.8 α 0.6 0.4 0.2 30 20 10 0 0 20 40 60 80 100 time 0 1 0.8 α 0.6 0.4 0.2 Results with 5 Neighbors Results with 7 Neighbors 20 40 60 80 100 time 0 1 0.8 α 0.6 0.4 0.2 30 20 10 0 0 20 40 60 80 100 time 0 1 0.8 α 0.6 0.4 0.2 30 20 10 0 0 30 20 10 0 0 Figure 1: The z-axis on each figure represents the number of runs, out of 100, which had the particular α ratio at each particular time. α = 1 means the run is at the global optimum. The optimum is reached more often in the cases with more communication. cluster of targets. At the other extreme, if all the targets send their bids to only one sensor then they will minimize communications but then the sensors will point to the sector from which they received a message -- an allocation which is likely to be suboptimal. These simulations explore the ruggedness of the system's global utility land- scape and the dynamics of the agents' exploration of this landscape. If the agents were to always converge on a local (non-global) optimum then we would deduce that this problem domain has a very rugged utility landscape. On the other hand, if they usually manage to reach the global optimum then we could deduce a smooth utility landscape. 9 Results with 4 Neighbors 30 20 10 0 0 20 40 60 80 100 time 0 1 0.8 α 0.6 0.4 0.2 Figure 2: The transitional case occurs when the target communicates with four sensors. 10 4 Test Results In each of our tests we set the number of agents that each target will send its bid to, that is, the number of neighbors, to a fixed number. Given this fixed number of neighbors, we then generated 100 random placements of agents on the field and ran our bidding algorithm 10 times on each of those placements. Finally, we plotted the average solution quality, over the 10 runs, as a function of time for each of the 100 different placements. The solution quality is given by the ratio Current Utility Globally Optimal Utility α = , (13) so if α = 1, then it means that the run has reached the global optimum. Since the number of agents is small, we were able to calculate the global optimum using a brute-force method. Specifically, there are 37 = 2187 possible configurations times 100 random placements leads to 218700 combinations that we had to check for each run in order to find the global optimum using brute-force. Using more than 7 sensors made the test take too long. Notice, however, that our algorithm is much faster than this brute-force search which we perform only to confirm that our search does find the global optimum. In our tests there were always seven target agents and seven sensor agents. We varied the number of neighbors from 1 to 7. If the target can only commu- nicate with one other sensor, the sensors will likely have very little information for making their decision, while if all targets communicate with all seven sen- sors, then each sensor will generally be able to point to the sector with the most targets. However, because these decisions are made in an asynchronous manner, it is possible that some sensor will sometimes not receive all the bids before it has to make a decision. The targets always send their bids to the sensors that are closest to them. The results from our experiments are shown in Figure 1 where we can see that there is a transition in the system's performance as the number of neighbors goes from three to five. That is, if the targets only send their bids to three sensors then it is almost certain that the system will stay in a configuration that has a very low global utility. However, if the targets send their bids to five sensors, then it is almost guaranteed (98% of the time) that the system will reach the globally optimal allocation. This is a huge difference in terms of the performance. We also notice in Figure 2 that for four neighbors there is a fairly even distribution in the utility of the final allocation. 5 Related Work There is ongoing work in the field of complexity that attempts to study they dynamics of complex adaptive systems [4]. Our approach is based on ideas bor- rowed from the use of NK landscapes for the analysis of co-evolving systems. As such, we are using some of the results from that field. However, complexity 11 theory is more concerned with explaining the dynamic behavior of existing sys- tems, while we are more concerned with the engineering of multiagent systems for distributed service allocation. The Collective Intelligence (COIN) framework [12] shares many of the same goals of our research. They start with a global utility function from which they derive the rewards functions for each agent. The agents are assumed to use some form of reinforcement learning. They show that the global utility is maximized when using their prescribed reward functions. They do not, however, consider how agent communication might affect the individual agent's utility landscape. The task allocation problem has been studied in [7], but the service allocation problem we present in this paper has received very little attention. There is also work being done on the analysis of the dynamics of multiagent systems for other domains such as e-commerce [5] and automated manufacturing [6]. It is possible that extensions to our approach will shed some light into the dynamics of these domains. 6 Conclusions We have formalized the service allocation problem and examined a general ap- proach to solving problems of this type. The approach involves the use of utility-maximizing agents that represent the resources and the services. A sim- ple form of bidding is used for communication. An analysis of this approach reveals that it implements a form of distributed hill-climbing, where each agent climbs its own utility landscape and not the global utility landscape. However, we showed that increasing the amount of communication among the agents forces each individual agent's landscape to become increasingly correlated to the global landscape. These theoretical results were then verified in our implementation of a sensor allocation problem -- an instance of a service allocation problem. Furthermore, the simulations allowed us to determine the location of a phase transition in the amount of communication needed for the system to consistently arrive at the globally optimal service allocation. More generally, we have shown how a service allocation problem can be viewed as a distributed search by multiple agents over multiple landscapes. We also showed how the correlation between the global utility landscape and the individual agent's utility landscape depends on the amount and type of inter-agent communication. Specifically, we have shown that increased commu- nications leads to a higher correlation between the global and individual utility landscapes, which increases the probability that the global optimum will be reached. Of course, the success of the search still depends on the connectivity of the search space, which will vary from domain to domain. We expect that our general approach can be applied to the design of any multiagent systems whose desired behavior is given by a global utility function but whose agents must act selfishly. Our future work includes the study of how the system will behave under 12 perturbations. For example, as the target moves it perturbs the current alloca- tion and the global optimum might change. We also hope to characterize the local to global utility function correlation for different service allocation prob- lems and the expected time to find the global optimum under various amounts of communication. References [1] A. D. Baker, K. Agents and the internet: Infrastructure for mass customization. Internet Computing, 3(5):62 -- 69, September-October 1999. Parunak, and H. V. Erol. IEEE [2] E. H. Durfee, T. Mullen, S. Park, J. M. Vidal, and P. Weinstein. The dynamics of the UMDL service market society. In M. Klusch and G. Weiss, editors, Cooperative Information Agents II, LNAI, pages 55 -- 78. Springer, 1998. [3] J. M. Epstein and R. L. Axtell. Growing Artificial Societies : Social Science from the Bottom Up. Brookings Institute, 1996. [4] S. Kauffman. The Origins of Order: Self-Organization and Selection in Evolution. Oxford University Pres, 1993. [5] J. O. Kephart, J. E. Hanson, Dynamic pricing by software agents. 752, 2000. and A. R. Greenwald. Computer Networks, 32(6):731 -- [6] H. V. D. Parunak. "go to the ant": Engineering principles from natural agent systems. Annals of Operation Research, 75:69 -- 101, 1997. [7] J. S. Rosenschein and G. Zlotkin. Rules of Encounter. The MIT Press, Cambridge, MA, 1994. [8] T. W. Sandholm. Necessary and sufficient contract types for optimal task allocation. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1997. [9] R. G. Smith. The contract net protocol: High-level communication and control in a distributed problem solver. IEEE Transactions on Computers, C-29(12):1104 -- 1113, 1981. [10] G. Weiss, editor. Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press, 1999. [11] M. P. Wellman. Market-oriented programming: Some early lessons. In S. Clearwater, editor, Market-Based Control: A Paradigm for Distributed Resource Allocation. World Scientific, 1996. 13 [12] D. H. Wolpert and K. Tumer. An introduction to collective intelligence. 1999. report, ACM Computing Research Repository, Technical cs.LG/9908014. 14
cs/9809108
1
9809
1998-09-26T17:43:36
Learning Nested Agent Models in an Information Economy
[ "cs.MA", "cs.AI" ]
We present our approach to the problem of how an agent, within an economic Multi-Agent System, can determine when it should behave strategically (i.e. learn and use models of other agents), and when it should act as a simple price-taker. We provide a framework for the incremental implementation of modeling capabilities in agents, and a description of the forms of knowledge required. The agents were implemented and different populations simulated in order to learn more about their behavior and the merits of using and learning agent models. Our results show, among other lessons, how savvy buyers can avoid being ``cheated'' by sellers, how price volatility can be used to quantitatively predict the benefits of deeper models, and how specific types of agent populations influence system behavior.
cs.MA
cs
Learning Nested Agent Models in an Information Economy Jos´e M. Vidal and Edmund H. Durfee Artificial Intelligence Laboratory University of Michigan 1101 Beal Avenue Ann Arbor, MI 48109-2110 [email protected], [email protected] Abstract We present our approach to the problem of how an agent, within an economic Multi-Agent System, can determine when it should behave strategically (i.e. learn and use models of other agents), and when it should act as a simple price-taker. We provide a framework for the incremental implementation of modeling capabilities in agents, and a description of the forms of knowledge required. The agents were implemented and different populations simulated in order to learn more about their behavior and the merits of using and learning agent models. Our results show, among other lessons, how savvy buyers can avoid being “cheated” by sellers, how price volatility can be used to quantitatively predict the benefits of deeper models, and how specific types of agent populations influence system behavior. 1 Introduction In open, multi-agent systems, agents can come and go without any central control or guidance, and thus how and which agents interact with each other will change dynamically. Agents might try to manipulate the interactions to their individual benefits, at the cost of the global efficiency. To avoid this, the protocols and mechanisms that the agents engage in might be constructed 1 to make manipulation irrational (Rosenschein and Zlotkin, 1994), but unfor- tunately this strategy is only applicable in restricted domains. By situating agents in an economic society, as we do in the University of Michigan Digital Library (UMDL), we can make each agent responsible for making its own decisions about when to buy/sell and who to do business with (Atkins et al., 1996). A market-based infrastructure, built around computational auction agents, serves to discourage agents from engaging in strategic reasoning to manipulate the system by keeping the competitive pressures high. However, since many instances can arise where imperfections in competition could be exploited, agents might benefit from strategic reasoning, either by manipu- lating the system or not allowing others to manipulate them. But strategic reasoning requires effort. An agent in an information economy like the UMDL must therefore be capable of strategic reasoning and of determining when it is worthwhile to invest in strategic reasoning rather than letting its welfare rest in the hands of the market mechanism. In this paper, we present our approach to the problem of how an agent, within an economic MAS, can determine when it should behave strategically, and when it should act as a simple price-taker. More specifically, we let the agent’s strategy consist of learning nested models of the other agents, so the decision it must make refers to which of the models will give it greater gains. We show how, in some circumstances, agents benefit by learning and using models of others, while at other times the extra effort is wasted. Our results point to metrics that can be used to make quantitative predictions as to the benefits obtained from learning and using deeper models. 1.1 Related work Different research communities have run across the problems that arise from having agents learning in societies of learning agents. The studies of (Shoham and Tennenholtz, 1992), and (Glance, 1993) focus on very simple but numer- ous agents and emphasize their emergent behavior. (Hu and Wellman, 1996) show that learning agents in an economic domain sometimes converge to globally sub-optimal equilibria. The work on agent-based modeling (Hubler and Pines, 1994; Axelrod, 1984; Epstein and Axtell, 1996) of complex sys- tems studies slightly more complicated agents that are meant as stand-ins for real world agents (e.g. insects, communities, corporations, people). All these researchers used agents whose learning abilities consist of choos- ing from among a set of fixed strategies. They do not explicitly consider the 2 fact that the agents inhabit communities of learning agents. That is, their agents do not try to model other agents. We address this issue and try to determine when and which models an agent should keep. Within the MAS community, some work (Sen, 1996) has focused on how artificial AI-based learning agents would fare in communities of simi- lar agents. For example, (Nadella and Sen, 1997) and (Terabe et al., 1997) show how agents can learn the capabilities of others via repeated interactions, but these agents do not learn to predict what actions other might take. Most of the work in MAS also fails to recognize the possible gains from using ex- plicit agent models to predict agent actions. (Tambe and Rosenbloom, 1996) is an exception and gives another approach for using nested agent models. However, they do not go so far as to try to quantify the advantages of their nested models or show how these could be learned via observations. We believe that our research will bring to the foreground some of the common observations seen in these research areas and help to clarify the implications and utility of learning and using nested agent models. 2 Description of the UMDL The UMDL pro ject is a large-scale, multidisciplinary effort to design and build a flexible, scalable infrastructure for rendering library services in a digital networked environment. In order to meet these goals, we chose to implement the library as a collection of interacting agents, each specialized to perform a particular task. These agents buy and sell goods/services from each other, within an artificial economy, in an effort to make a profit. Since the UMDL is an open system, which will allow third parties to build and integrate their own agents into the architecture, we treat all agents as purely selfish. 2.1 Implications of the information economy. Information goods/services, like those provided in the UMDL, are very hard to compartmentalize into equivalence classes that all agents can agree on. For example, if a web search engine service is defined as a good, then all agents providing web search services can be considered as selling the same good. It is likely, however, that a buyer of this good might decide that seller s1 provides better answers than seller s2. We cannot possibly hope to 3 enumerate the set of reasons an agent might have for preferring one set of answers (and thus one search agent) over another, and we should not try to do so. It should be up to the individual buyers to decide what items belong to the same good category, each buyer clustering items in possibly different ways. This situation is even more evident when we consider an information economy rooted in some information delivery infrastructure (e.g. the Inter- net). There are two main characteristics that set this economy apart from a traditional economy. • There is virtually no cost of reproduction. Once the information is created it can be duplicated virtually for free. • All agents have virtually direct and free access to all other agents. If these two characteristics are present in an economy, it is useless to talk about supply and demand, since supply is practically infinite for any particular good and available everywhere. The only way agents can survive in such an economy is by providing value-added services that are tailored to meet their customers’ needs. Each provider will try to differentiate his goods from everyone else’s while each buyer will try to find those suppliers that best meet her value function. We propose to build agents that can achieve these goals by learning models of other agents and making strategic decisions based on these models. These techniques can also be applied, with variable levels of efficacy, to traditional economies. 3 A Simplified Model of the UMDL In order to capture the main characteristics of the UMDL, and to facilitate the development and testing of agents, we have defined an “abstract” eco- nomic model. We define an economic society of agents as one where each agent is either a buyer or a sel ler of some particular good. The set of buyers is B and the set of sellers is S . These agents exchange goods by paying some price p ∈ P , where P is a finite set. The buyers are capable of assessing the quality of a good received and giving it some value q ∈ Q, where Q is also a finite set. The exchange protocol, seen in Figure 1, works as follows: When a buyer b ∈ B wants to buy a good g , she will advertise this fact. Each seller s ∈ S 4 that sells that good will give his bid in the form of a price pg s . The buyer will pick one of these and will pay the seller. All agents will be made aware of this choice along with the prices offered by all the sellers.. The winning seller will then return1 the specified good. Note that there is no law that forces the seller to return a good of any particular quality. For example, an agent that sells web search services returns a set of hits as its good. Each buyer of this good might determine its quality based on the time it took for the response to arrive, the number of hits, the relevance of the hits, or any combination of these and/or other features. Therefore, it would usually be impossible to enforce a quality measure that all buyers can agree with. It is thus up to the buyer to assess the quality q of the good received. Each buyer b also has a value function V g b (p, q ) for each good g ∈ G that she might wish to buy. The function returns a number that represents the value that b assigns to that particular good at that particular price and quality. Each seller s ∈ S , on the other hand, has a cost cg s associated with each good he can produce. Since we assume that costs and payments are expressed in the same units (i.e. money) then, if seller s gets paid p for good g , his profit will be Profit(p, cg s ) = p − cg s . The buyers, therefore, have the goal of maximizing the value they get for their transactions, while the sellers have the goal of maximizing their profits. 4 Learning recursive models Agents placed in the economic society we just described will have to learn, typically via trial and error, what actions give them the highest expected reward and under which circumstances. In this section we will present tech- niques that these agents might use to maximize their rewards. An important question we wish to answer is: when do agents benefit from having deeper nested models of other agents? It seems intuitive that, ignoring computational costs, the agents with more complete models of others will always do better. We find this to be usually true; however, while there are instances when it is significantly better to have deeper models, there are also instances when the difference is barely noticeable and, instances when its better to ignore deeper models if they are imperfect or provide no useful 1 In the case of agent/link failure, each agent is free to set its own timeouts and assess the quality of the never-received good accordingly. Bids that are not received in time will, of course, not be considered. 5 information. These instances are defined in part by the set of other agents present, their capabilities and preferences, and the dynamics of the system. In order to precisely determine what these instances are, and in the hopes of providing a more general framework for studying the effects of increased agent-modeling capabilities within our economic model, we have defined a set of techniques that our agents can use for learning and using models. We divide the agents into classes that correspond to their modeling ca- pabilities. The hierarchy we present is inspired by the Recursive Modeling Method (Gmytrasiewicz, 1996), but is function-based rather than matrix- based, and includes learning. We will first describe our agents at the knowl- edge level, stating only the type of knowledge the agents are either trying to acquire through learning, or already have (i.e. knowledge that was directly implemented by the designers of the agents), and will then explain the details of how this knowledge was implemented. At the most abstract level, we can say that every agent i is trying to learn the oracle decision function ∆i : w → ai , which maps the state w of the world into the action ai that the agent should take in that state. This function will not be fixed throughout the lifetime of the agent because the other agents are also engaged in some kind of learning themselves. The agents that try to directly learn ∆i (w) we refer to as 0-level agents, because they have no explicit models of other agents. In fact, they are not aware that there are other agents in the world. Any such agent i will learn a decision function δi : w → ai where w is what agent i knows about its external world and ai is its rational action in that state. For example, a web search agent might look at the going price for web searches, in order to determine how much to charge for its service. Agents with 1-level models of other agents, on the other hand, are aware that there are other agents out there but have no idea what the “interior” of these agents looks like. They have two kinds of knowledge— a set of functions δij : w → aj which capture agent i’s model of each of the other agents (j ), and δi : (w , ~a−i ) → ai which captures i’s knowledge of what action to take given w and the collective actions ~a−i the others will take. We define ~a−i = {a1 · · · ai−1 , ai+1 · · · an }, where n is the number of agents. An agent’s model of others might not be correct; therefore, it is not always true that δj (w) = δij (w). The δij (w) knowledge for all j 6= i turns out to be easier to learn than the joint action δi (w , ~a−i) because the set of possible hypotheses is smaller. Agents with 2-level models are assumed to have deeper knowledge about 6 the other agents; that is, they have knowledge of the form δij : (w , ~a−j ) → aj . This knowledge tells them how others determine which action to take. They also know what actions others think others are going to take, i.e. δij k : w → ak , and (like 1-level modelers) what action they should take given others’ actions, δi : (w , ~a−i ) → ai . Again, the δij k (w) is easier to learn that the other two, as long as all agents use the same features to discriminate among the different worlds (i.e. share the same w). 4.1 Populating the knowledge If the different level agents had to learn all the knowledge then, since the 0- level agents have a lot less knowledge to learn, they would learn it much faster. However, in the economic domain, it is likely that the designer has additional knowledge which could be incorporated into the agents. The agents we built incorporated extra knowledge along these lines. We decided that 0-level agents would learn all their knowledge by tracking their actions and the rewards they got. These agents, therefore, receive no extra domain knowledge from the designers and learn everything from experience. 1-level agents, on the other hand, have a priori knowledge of what action they should take given the actions that others will take. That is, while they try to learn knowledge of the form δij (w) by observing the actions others take (i.e. in a form of supervised learning where the other agents act as tutors), they already have knowledge of the form δi (w , ~a−i ). In our economic domain, it is reasonable to assume that agents have this knowledge since, in fact, this type of knowledge can be easily generated. That is, if I know what all the other sellers are going to bid, and the prices that the buyer is willing to pay, then it is easy for me to determine which price to bid. We must also point out that in this domain, the δi (w , ~a−i ) knowledge cannot be used by a 0-level agent. If this knowledge had said, for instance, that from some state w agent i will only ever take one of a few possible actions, then this knowledge could have been used to eliminate impossibilities from the δi (w) knowledge of a 0-level agent. However, this situation never arises in our domain because, as we shall see in the following Sections, the states used by the agents permit the set of reasonable actions to always be equal to the set of all possible actions. The 2-level agents learn their δij k (w) knowledge from observations of others’ actions, under the already stated assumption that there is common knowledge of the fact that all agents see the actions taken by all. The rest of 7 the knowledge, i.e. δij (w , ~a−j ) and δi (w , ~a−i), is built into the 2-level agents a priori. As with 1-level agents, we cannot use the δij (w , ~a−j ) knowledge to add δij (w) knowledge to a 1-level modeler, because other agents are also free to take any one of the possible actions in any state of the world. There are many reasonable ways to explain how the 2-level agents came to possess the δij (w , ~a−j ) knowledge. It could be, for instance, that the designer assumed that the other designers would build 1-level agents with the same knowledge we just described. This type of recursive thinking (i.e. “they will do just as I did, so I must do one better”), along with the obvious expansion of the knowledge structure, could be used to generate n-level agents, but so far we have concentrated only on the first three levels. The different forms of knowledge, and their form of acquisition, are summarized in Table 1. In the following sections, we talk about each one of these agents in more detail and give some specifics on their implementation. Our current model emphasizes transactions over a single good, so each agent is only a buyer or a seller, but cannot be both. 4.2 Agents with 0-level models Agents with 0-level models must learn everything they know from observa- tions they make about the environment, and from any rewards they get. In our economic society this means that buyers see the bids they receive and the good received after striking a contract, while sellers see the request for bids and the profit they made (if any). In general, these agents get some input, take an action, then receive some reward. This framework is the same framework used in reinforcement learning, which is why we decided to use a form of reinforcement learning (Sutton, 1988) (Watkins and Dayan, 1992), for implementing learning in our agents. Both buyers and sellers will use the equations in the next few sections for determining what actions to take. But, with a small probability ǫ they will choose to explore, instead of exploit, and will pick their actions at random (except for the fact that sellers never bid below cost). The value of ǫ is initially 1 but decreases with time to some empirically chosen, fixed minimum value ǫmin . That is, ǫt+1 = ( γ ǫt if γ ǫt > ǫmin ǫmin otherwise where 0 < γ < 1 is some annealing factor. 8 Time 1 request-bid Time 2 p1 S1 S2 S1 B B Pick-bid p2 S2 Time 3 payment S3 B S3 Time 4 p3 S3 B Assess-quality good S3 Figure 1: View of the protocol. We show only one buyer B and three sellers S 1, S 2, and S 3. At time 1 the buyer requests bids for some good. At time 2 the sellers send their prices for that good. At time 3 the buyer picks one of the bids, pays the seller the amount and then, at time 4, she receives the good. Level 0-level 1-level 2-level Form of Knowledge Method of Acquisition δi (w) Reinforcement Learning δi (w , ~a−i) Previously known δij (w) Learn from observation δi (w , ~a−i) Previously known δij (w , ~a−j ) Previously known δij k (w) Learn from observation. Table 1: Summary of the forms of knowledge that the different agents have or are trying to learn. 9 4.2.1 Buyers with 0-level models. A buyer b will start by requesting bids for a good g . She will then receive all bids for good g and will pick the seller: s∗ = args∈S max f g (pg s ) (1) This function implements the buyer’s δb(w) which, in this case, can be rephrased as δb(p1 . . . pS ). The function f g (p) returns the value the buyer expects to get if she buys good g at a price of p. It is learned using a simple form of reinforcement learning, namely: f g t+1 (p) = (1 − α)f g t (p) + α · V g b (p, q ) Here α is the learning rate, p is the price b pays for the good, and q is the quality she ascribes to it. The learning rate is initially set to 1 and, like ǫ, is decreased until it reaches some fixed minimum value αmin . (2) 4.2.2 Sellers with 0-level models. When asked for a bid, the seller s will provide one whose price is greater than or equal2 to the cost for producing it (i.e. pg s ≥ cg s ). From these prices, he will chose the one with the highest expected profit: p∗ s = argp∈P max hg s (p) (3) Again, this function encompasses the seller’s δs (g ) knowledge, where we now have that the states are the goods being sold w = g , and the actions are prices offered a = p. The function hg s (p) returns the profit s expects to get if he offers good g at a price p. It is also learned using reinforcement learning, as follows: hg t+1 (p) = (1 − α)hg t (p) + α · Profitg s (p) (4) where s (p) = ( p − cg Profitg s 0 2We could just as easily have said that the price must be strictly greater than the cost. if his bid is chosen otherwise (5) 10 4.3 Agents with One-level Models The next step is for an agent to keep one-level models of the other agents. This means that it has no idea of what the interior (i.e. “mental”) processes of the other agents are, but it recognizes the fact that there are other agents out there whose behaviors influence its rewards. The agent, therefore, can only model others by looking at their past behavior and trying to predict, from it, their future actions. The agent also has knowledge, implemented as functions, that tells it what action to take, given a probability distribution over the set of actions that other agents can take. In the actual implementation, as shown below, the δi (w , ~a−i) knowledge takes into account the fact that the δij (w) knowledge is constantly being learned and, therefore, is not correct with perfect certainty. 4.3.1 Buyers with one-level models. A buyer with one-level models can now keep a history of the qualities she ascribes to the goods returned by each seller. She can, in fact, remember the last N qualities returned by some seller s for some good g , and define a probability density function q g s (x) over the qualities x returned by s (i.e. q g s (x) returns the probability that s returns an instance of good g that has quality x). This function provides the δbs (g ) knowledge. She can use the expected value of this function to calculate which seller she expects will give her the highest expected value. = args∈S max s∗ = args∈S max E (V g s , q g b (pg s (x))) 1 s (x) · V g b (pg q g Q Xx∈Q s , x) The δb (g , q1 · · · qS ) is given by the previous function which simply tries to maximize the value the buyer expects to get. The buyer does not need to model other buyers since they do not affect the value she gets. (6) 4.3.2 Sellers with one-level models. Each seller will try to predict what bid the other sellers will submit (based solely on what they have bid in the past), and what bid the buyer will likely pick. A complete implementation would require the seller to remember past combinations of buyers, bids and results (i.e. who was buying, who bid what, 11 and who won). However, it is unrealistic to expect a seller to remember all this since there are at least P S · B possible combinations. However, the seller’s one-level behavior can be approximated by having him remember the last N prices accepted by each buyer b for each good g , and form a probability density function mg b (x), which returns the probability that b will accept (pick) price p for good g . The expected value of this function provides the δsb (g ) knowledge. Similarly, the seller remembers other sellers’ last N bids for good g and forms ng s (y ), which gives the probability that s will bid y for good g . The expected value of this function provides the δs (g ) knowledge. The seller s can now determine which bid maximizes his expected profits. (7) if mg b (p′ ) ≤ mg b (p) otherwise s ) · Ys′∈{S−s} Xp′∈P ( ng s′ (p′ ) p∗ = argp∈P max(p − cg 0 Note that this function also does a small amount of approximation by assuming that s wins whenever there is a tie3 . The function calculates the best bid by determining, for each possible bid, the product of the profit and the probability that the agent will get that profit. Since the profit for lost bids is 0, we only need to consider the cases where s wins. The probability that s will win can then be found by calculating the product of the probabilities that his bid will beat the bids of each of the other sellers. The function approximates the δs (g , pb , p1 · · · pS ) knowledge. 4.4 Agents with Two-level Models The intentional models we use correspond to the functions used by agents that use one-level models. The agents’ δi (w , ~a−i) knowledge has again been expanded to take into account the fact that the deeper knowledge is learned and might not be correct. The δij k (w) knowledge is learned from observation, under the assumption that there is common knowledge of the fact that all agents see the bids given by all agents. 3The complete solution would have to consider the probabilities that s ties with 1, 2, 3,. . . other agents. In order to do this we would need to consider all P S subsets. 12 4.4.1 Buyers with two-level models. Since the buyer receives bids from the sellers, there is no need for her to try to out-guess or predict what the sellers will bid. She is also not concerned with what the other buyers are doing since, in our model, there is an effectively infinite supply of goods. The buyers are, therefore, not competing with each other and do not need to keep deeper models of others. 4.4.2 Sellers with two-level models. A seller will model other sellers as if they were using the one-level models. That is, he thinks they will model others using policy models and make their decisions using the equations presented in Section 4.3.2. He will try to predict their bids and then try to find a bid for himself that the buyer will prefer more than all the bids of the other sellers. His model of the buyer will also be an intentional model. He will model the buyers as though they were implemented as explained in Section 4.3.1. A seller, therefore, assumes that it has the correct intentional models of other agents. The algorithm he follows is to first use his models of the sellers to predict what bids pi they will submit. He has a model of the buyer C (s1 · · · sn , p1 · · · pn ) → si , that tells him which seller she might choose given the set of bids pi sub- mitted by each seller si . The seller sj uses this model to determine which of his bids will bring him higher profit, by first finding the set of bids he can make that will win: P ′ = {pj pj ∈ P , sj = C (s1 · · · sj · · · sn , p1 · · · pj · · · pn )} And from these finding the one with the highest profit: p∗ = argp∈P ′ max(p − cg s ) These functions provide the δs (g , pb , p1 · · · pS ) knowledge. (8) (9) 5 Tests Since there is no obvious way to analytically determine how different pop- ulations of agents would interact and, of greater interest to us, how much better (or worse) the agents with deeper models would fare, we decided to implement a society of the agents described above and ran it to test our 13 hypotheses. In all tests, we had 5 buyers and 8 sellers. The buyers had the same value function Vb(p, q ) = 3q − p, which means that if p = q then the buyers will prefer the seller that offers the higher quality. The quality that they perceived was the same only on average, i.e. any particular good might be thought to have quality that is slightly higher or lower than expected. All sellers had costs equal to the quality they returned in order to support the common sense assumption that quality goods cost more to produce. A set of these buyers and sellers is what we call a population. We tried various populations; within each population we kept constant the agents’ modeling levels, the value assessment functions and the qualities returned. The tests involved a series of such populations, each one with agents of different mod- eling levels, and/or sellers with different quality/costs. We also set αmin = .1, ǫmin = .05, and γ = .99. There were 100 runs done for each population of agents, each run consisting of 10000 auctions (i.e. iterations of the protocol). The lessons presented in the next section are based on the averages of these 100 runs. 6 Lessons From our tests we were able to discern several lessons about the dynamics of different populations of agents. Some of these lead to methods that can be used to make quantitative predictions about agents’ performance, while others make qualitative assessments about the type of behaviors we might expect. We detail these in the next subsections, and summarize them in Table 2. 6.1 Micro versus macro behaviors. In all tests, we found the behavior for any particular run does not necessarily reflect the average behavior of the system. The prices have a tendency to sometimes reach temporary stable points. These conjectural equilibria, as described in (Hu and Wellman, 1996), are instances when all of the agents’ models are correctly predicting the others’ behavior and, therefore, the agents do not need to change their models or their actions. These conjectural equi- libria points are seldom global optima for the agents. If one of our agents finds itself at one of these equilibrium points, since the agent is always explor- ing with probability ǫ, it will in time discover that this point is only a local 14 optima (i.e. it can get more profit selling/buying at a different price) and will change its actions accordingly. Only when the price is an equilibrium price4 do we find that the agents continue to forever take the same actions, leaving the price at its equilibrium point. In order to understand the more significant macro-level behaviors of the system, we present results that are based on the averages from many runs. While these averages seem very stable, and a good first step in learning to understand these systems, in the future we will need to address some of the micro-level issues. We do notice from our data that the micro-level behaviors (e.g. temporary conjectural equilibria, price fluctuations) are much more closely tied, usually in intuitive ways, to the agents’ learning rate α and exploration rate ǫ. That is, higher rates for both of these lead to more price fluctuations and shorter temporary equilibria. 6.2 0-level buyers and sellers. This type of population is equivalent to a “blind” auction, where the agents only see the price and the good, but are prevented from seeing who the seller (or buyer) was. As expected, we found that an equilibrium is reached as long as all the sellers are providing the same quality. This is the case for population 1 in Figure 2. Otherwise, if the sellers offer different quality goods, the price fluctuates as the buyers try to find the price that on the whole returns the best quality, and the sellers try to find the price5 the buyers favor. In these populations, the sellers offering the higher quality, at a higher cost, lose money. Meanwhile, sellers offering lower quality, at a lower cost, earn some extra income by selling their low quality goods to buyers that expect, and are paying for, higher quality. As more sellers start to offer lower quality, we find that the mean price actually increases, evidently because price acts as a signal for quality and the added uncertainty makes the higher prices more likely to give the buyer a higher value. We see this in Figure 2, where population 1 has all sellers returning the same quality while in each successive population more agents offer lower quality. The price distribution for population 1 is concentrated on 9, but for populations 2 through 6 it flattens and shifts to the right, increasing the mean price. It is 4That is, p is an equilibrium price if every seller that can sell at that price (i.e. those whose cost is less than p) does. 5Remember, the sellers are constrained to return a fixed quality. They can only change the price they charge. 15 y t i l i b a b o r P 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Price Distributions Pop. 1 Pop. 2 Pop. 3 Pop. 4 Pop. 5 Pop. 6 Pop. 7 Pop. 8 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Prices Figure 2: Price distributions for populations of 0-level buyers and sellers. The prices are 0 · · · 19. The columns represent the percentage of time the good was sold at each price, in each population. In p1 sellers return qualities {8, 8, 8, 8, 8, 8, 8, 8}, in p2 its {8, 8, 8, 8, 8, 8, 7, 8}, and so on such that by p8 its {1, 2, 3, 4, 5, 6, 7, 8}. The highest peak in all populations corresponds to price 9. 16 only by population 7 when it starts to shift back to the left, thus reducing the mean price, as seen in Figure 3. That is, it is only after a significant number of sellers start to offer lower quality that we see the mean price decrease. 6.3 0-level buyers and sellers, plus one 1-level seller. In these population sets we explored the advantages that a 1-level seller has over identical 0-level sellers. The advantage was non-existent when all sellers returned the same quality (i.e. when the prices reached an equilibrium as shown in population 1 in Figure 4), but increased as the sellers started to diverge in the quality they returned. In order to make these findings useful when building agents, we needed a way to make quantitative predictions as to the benefits of keeping 1-level models. It turns out that these benefits can be predicted, not by the population type as we had first guessed, but by the price volatility. We define volatility as the number of times the price changes from one auction to the next, divided by the total number of auctions. Figure 5 shows the linear relation between volatility and the percentage of times the 1-level seller wins. The two lines correspond to two “types” of volatility. The first line includes populations 1 through 5 (p1-p5). It reflects the case where the buyers’ second-favorite (and possibly, the third, fourth, etc.) equilibrium price is greater than her most preferred price. In these cases the buyers and sellers fight among the two most preferred prices, the sellers pulling towards the higher equilibrium price and the buyers towards the lower one, as shown by the two peaks in populations 4 and 5 in Figure 4. The other line, which includes populations 6 and 7, corresponds to cases where the buyers’ preferred equilibrium price is greater than the runner-ups. In these cases there is no contest between two equilibria. We observe only one peak in the price distribution for these populations. The slope of these lines can be easily calculated and the resulting function can be used by a seller agent for making a quantitative prediction as to how much he would benefit by switching to 1-level models. That is, he could measure price volatility, multiply it by the appropriate slope, and the resulting number would be the percentage of times he would win. However, for this to work the agent needs to know that all eight buyers and five sellers are 0-level modelers because different types of populations lead to different slopes. Also, slight changes in our learning parameters (.02 ≤ ǫmin ≤ .08 and .05 ≤ αmin ≤ .2) lead to slight changes in the slopes so these would have to be taken into account if the agent is actively changing its parameters. 17 e c i r P n a e M 10.4 10.2 10 9.8 9.6 9.4 9.2 1 Mean Price for each Population Price 2 3 5 4 Population 6 7 8 Figure 3: Mean price for the populations from Figure 2 y t i l i b a b o r P 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Price Distributions Pop. 1 Pop. 2 Pop. 3 Pop. 4 Pop. 5 Pop. 6 Pop. 7 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Prices Figure 4: Price distributions for populations of 0-level buyers and 0-level sellers plus one 1-level seller. In population 1 sellers return qualities {2, 2, 2, 2, 2, 2, 2, 2}, in pop. 2 its {2, 3, 2, 2, 2, 2, 2, 2}, and so on such that by pop. 7 it’s {2, 3, 4, 5, 6, 7, 8, 2}. The 1-level seller is the last on the list. It always returns quality 2. 18 We also want to make clear a small caveat, which is that the volatility that is correlated to the usefulness of keeping 1-level models is the volatility of the system with the agent already doing 1-level modeling. Fortunately, our experiments show that having one agent change from 0-level to 1-level does not have a great effect on the volatility as long as there are enough (i.e. more than five or so) other sellers. The reason volatility is such a good predictor is that it serves as an accu- rate assessment of how dynamic the system is and, in turn, of the complexity of the learning problem faced by the agents. It turns out that the learning problem faced by 1-level agents is “simpler” than the one faced by 0-level modelers. Our 0-level agents use reinforcement learning to learn a good match between world states and the actions they should take. The 1-level agents, on the other hand, can see the actions other agents take and do not need to learn their models through indirect reinforcements. They instead use a form of supervised learning to learn the models of others. Since 1-level agents need fewer interactions to learn a correct model, their models will, in general, be better than those of 0-level agents in direct proportion to the speed with which the target function changes. That is, in a slow-changing world both of them will have time enough to arrive at approximately cor- rect models, while in a fast-changing world only the 1-level agents will have time to arrive at an approximately correct model. This explains why high price volatility is correlated to an increase in the 1-level agent’s performance. However, as we saw, the relative advantages for different volatilities (i.e. the slope in Figure 5) will also depend on the shape of the price distribution and the particular population of agents. Finally, in all populations where the buyers are 0-level, we saw that it really pays for the sellers to have low costs because this allows them to lower their prices to fit almost any demand. Since the buyers have 0-level models, the sellers with low quality and cost can raise their prices when appropriate, in effect “pretending” to be the high-quality sellers, and make an even more substantial profit. This extra profit comes at the cost of a reduction in the average value that the buyers receive. In other words, the buyers get less value because they are only 0-level agents and are less able to detect the sellers’ deception. In the next Section we will see how this is not true for 1-level buyers. Of course, the 1-level sellers were more successful at this deception strat- egy than the 0-level sellers. Figure 6 shows the profit of several agents in a population as a function of their cost. We can see how the 0-level agents’ 19 l e v e l - 1 r o f s n i W f o e g a t n e c r e P 2200 2100 2000 1900 1800 1700 1600 1500 1400 1300 1200 Correlation of Volatility and Wins p5 p6 p3 p4 p7 Wins p2 p1 0.1 0 0.2 0.3 Volatility 0.4 0.5 Figure 5: Scatter plot of volatility versus the percentage of time that the 1-level seller wins (w). The populations are the same as in Figure 4. t n e g A e h t r o f t i f o r P l a t o T f o e g a t n e c r e P 0.3 0.25 0.2 0.15 0.1 0.05 1 Average Profit for Agents 1-level 1-level Profit 0-level 0-level 2 3 4 5 Agent’s Cost 6 7 8 9 Figure 6: Agents’ profit in population 7 from Figure 4. The sellers return qualities of {2, 3, 4, 5, 6, 7, 8, 2}, respectively, where the 1-level seller is the first on the list. 20 profit decreases with increasing costs, and how the 1-level agent’s profit is much higher than the 0-level with the same costs. We also notice that, since the 0-level agents are not as successful as the 1-level at taking advantage of their low costs, the first 0-level seller (that returns quality 2) has lower profit than the rest as some of his profit was taken away by the 1-level seller (that returns the same quality). 6.4 1-level buyers and 0 and 1-level sellers. In these populations the buyers have the upper hand. They quickly identify those sellers that provide the highest quality goods and buy exclusively from them. The sellers do not benefit from having deeper models; in fact, Figure 7 shows how the 1-level seller’s profit is less than that of a similar 0-level seller because the 1-level seller tries to charge higher prices than the 0-level seller. The 1-level buyers do not fall for this trick— they know what quality to expect, and buy more from the lower-priced 0-level seller(s). We have here a case of erroneous models— 1-level sellers assume that buyers are 0-level, and since this is not true, their erroneous deductions lead them to make bad decisions. To stay a step ahead, sellers would need to be 2-level in this case. In Figure 7, the first population has all sellers returning a quality of 8 while by population 7 they are returning qualities of {8, 2, 3, 4, 5, 6, 7, 8}, re- spectively, with the 1-level always returning quality of 8. We notice that the difference in profits between the 0-level and the 1-level increases with succes- sive populations. This is explained by the fact that in the first population all seven 0-level sellers are returning the same quality, while by population 7 only the 0-level pictured (i.e. the first one) is still returning quality 8. This means that his competition, in the form of other 0-level sellers returning the same quality, decreases for successive populations. Meanwhile, in all pop- ulations there is only one 1-level seller who has no competition from other 1-level sellers. To summarize, the 0-level seller’s profit is always higher than the similar 1-level seller’s, and the difference increases as there are fewer other competing 0-level sellers who offer the same quality. 6.5 1-level buyers and several 1-level sellers. We have shown how 1-level sellers do better, on average, than 0-level sellers when faced with 0-level buyers, but this is not true anymore if too many 0-level sellers decide to become 1-level. Figure 8 shows how the profits of a 21 t n e g A e h t r o f t i f o r P l a t o T f o e g a t n e c r e P 0.5 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 1 Average Profit for Agents 0-level agent 1-level agent 2 3 4 Population 5 6 7 Figure 7: Profit of a 1-level seller and a 0-level seller, both with the same costs and quality, in a population with 1-level buyers. t n e g A e h t r o f t i f o r P l a t o T f o e g a t n e c r e P 0.22 0.21 0.2 0.19 0.18 0.17 0.16 0.15 0.14 0.13 0.12 0.11 Average Profit for Agents 0-level agent 1-level agent 0 1 2 4 3 Number of 1-level Agents 5 6 Figure 8: Profit of 1-level seller and similar 0-level seller as a function of the number of 1-level sellers in the population. There are a total of 8 agents in all populations. 22 1-level seller decrease as he is joined by other 1-level sellers. In this Figure the sellers are returning qualities of {2, 2, 2, 2, 2, 3, 4}. Initially they are all 0-level, then one of the sellers with quality 2 becomes 1-level (he is the seller shown in the Figure), then another one and so on. . . until there is only one 0-level seller with quality two. Then the seller with quality three becomes 1-level and, finally the seller with quality four becomes 1-level. At this point we have six 1-level sellers and one 0-level seller. We can see that with more than four 1-level sellers the 0-level seller is actually making more profit than the similar 1-level seller. The 1-level seller’s profit decreases because, as more sellers change from 0 to 1-level, they are competing directly with him since they are offering the same quality and are the same level. Notice that the 1-level seller’s curve flattens after four 1-level sellers are present in the population. The reason is that the next sellers to change over to 1-level return qualities of 3 and 4, respectively, so that they do not compete directly with the seller pictured. His profits, therefore, do not keep decreasing. For this test, and other similar tests, we had to use a population of sellers that produce different qualities because, as explained in Section 6.3, if they had returned the same quality then an equilibrium would have been reached which would prevent the 1-level sellers from making a significantly greater profit than the 0-level sellers. 6.6 1-level buyers and 1 and 2-level sellers. Assuming that the 2-level seller has perfect models of the other agents, we find that he wins an overwhelming percentage of the time. This is true, surprisingly enough, even when some of the 1-level sellers offer slightly higher quality goods. However, when the quality difference becomes too great (i.e. greater than 1), the buyers finally start to buy from the high quality 1- level sellers. This case is very similar to the ones with 0-level buyers and 0 and 1-level sellers and we can start to discern a recurring pattern. In this case, however, it is much more computationally expensive to maintain 2-level models. On the other hand, since these 2-level models are perfect, they are better predictors than the 1-level, which explains why the 2-level seller wins much more than the 1-level seller from Section 6.3. 23 Buyers Sellers 0-level 0-level 0-level Any 0-level 0-level and one 1-level 0-level 1-level 0-level and many 1-level 0-level and one 1-level 1-level 1-level and one 2-level Lessons Equilibrium reached only when all sellers offer the same quality. Otherwise, we get oscillations. Mean price increases when quality offered decreases. Sellers have big incentives to lower quality/cost. 1-level seller beats others. Quantitative advantage of being 1-level predicted by volatility and price distribution. 1-level sellers do better, as long as there are not too many of them. Buyers have upper hand. They buy from the most preferred seller. 1-level sellers are usually at a disadvantage. Since 2-level has perfect models, it wins an overwhelming percentage of time, except when it offers a rather lower quality. Table 2: Summary of lessons. In all cases the buyers had identical value and quality assessment functions. Sellers were constrained to always return the same quality. 24 7 Conclusions We have presented a framework for the development of agents with incremen- tal modeling/learning capabilities, in an economic society of agents. These agents were built, and the execution of different agent populations leads us to the discovery of the lessons summarized in Table 2. The discovery of volatil- ity and price distributions as predictors of the benefits of deeper models will be very useful as guides for deciding how much modeling capability to build into an agent. This decision could either be done prior to development or, given enough information, it could be done at runtime. We are also encour- aged by the fact that increasing the agents’ capabilities changes the system in ways that we can recognize from our everyday economic experience. Some of the agent structures shown in this paper are already being im- plemented into the UMDL (Atkins et al., 1996). We have a basic economic infrastructure that allows agents to engage in commerce, and the agents use customizable heuristics for determining their strategic behavior. We are working on incorporating the more advanced modeling capabilities into our agents in order to enable more interesting strategic behaviors. Our results showed how sellers with deeper models fare better, in gen- eral, even when they produce less valuable goods. This means that we should expect those types of agents to, eventually, be added into the UMDL6 . For- tunately, this advantage is diminished by having buyers keep deeper models. We expect that there will be a level at which the gains and costs associ- ated with keeping deeper models balance out for each agent. Our hope is to provide a mechanism for agents to dynamically determine this cutoff and constantly adjust their behavior to maximize their expected profits given the current system behavior. The lessons in this paper are a significant step in this direction. We have seen that one needs to look at price volatility and at the modeling levels of the other agents to determine what modeling level will give the highest profits. We have also learned how buyers and sellers of dif- ferent levels and offering different qualities lead to different system dynamics which, in turn, dictate whether the learning of nested models is useful or not. We are considering the expansion of the model with the possible additions of agents that can both buy and sell, and sellers that can return different quality goods. Allowing sellers to change the quality returned to fit the buyer will make them more competitive against 1-level buyers. We are also 6 If not by us, then by a profit-conscious third party. 25 continuing tests on many different types of agent populations in the hopes of getting a better understanding of how well different agents fare in the different populations. In the long run, another offshoot of this research could be a better charac- terization of the types of environments and how they allow/inhibit “cheating” behavior in different agent populations. That is, we saw how, in our economic model, agents are sometimes rewarded for behavior that does not seem to be good for the community as a whole (e.g. when some of the sellers raised their price while lowering the quality they offered). The rewards, we are finding, start to diminish as the other agents become “smarter”. We can intuit that the agents in these systems will eventually settle on some level of nesting that balances their costs of keeping nested models with their gains from taking better actions (Kauffman, 1994). It would be very useful to characterize the environments, agent populations, and types of “equilibria” that these might lead to, especially as interest in multi-agent systems grows. References Akerlof, G. A. (1970). The market for ‘lemons’: Quality uncertainty and the market mechanism. The Quaterly Journal of Economics, pages 488–500. Atkins, D. E., Birmingham, W. P., Durfee, E. H., Glover, E. J., Mullen, T., Rundensteiner, E. A., Soloway, E., Vidal, J. M., Wallace, R., and Well- man, M. P. (1996). Toward inquiry-based education through interacting software agents. IEEE Computer. Axelrod, R. M. (1984). The Evolution of Cooperation. Basic Books. Durfee, E. H., Gmytrasiewicz, P. J., and Rosenschein, J. S. (1994). The utility of embedded communications and the emergence of protocols. In Proceedings of the 13th International Distributed Artificial Intel ligence Workshop. Epstein, J. M. and Axtell, R. L. (1996). Growing Artifical Societies: Social Science from the Bottom Up. Brookings Institution. Glance, N. S. (1993). Dynamics with Expectations. PhD thesis, Stanford University. 26 Gmytrasiewicz, P. J. (1996). On reasoning about other agents. In Wooldridge, M., Muller, J. P., and Tambe, M., editors, Intel ligent Agents Volume II, Lecture Notes in Artificial Intelligence, pages 143–155. Springer-Verlag. Hu, J. and Wellman, M. P. (1996). Self-fulfilling bias in multiagent learning. In Proceedings of the Second International Conference on Multi-Agent Systems, pages 118–125. Hubler, A. and Pines, D. (1994). Complexity: Methaphors, Models and Re- ality, chapter Prediction and Adaptation in an Evolving Chaotic Envi- ronment, pages 343–379. Addison Wesley. Kauffman, S. A. (1994). Complexity: Models, Metaphors and Reality, chapter Whispers from Carnot: The Origins of Order and Principles of Adapta- tion in Complex Nonequilibrium Systems, pages 83–136. Addison Wes- ley. Mullen, T. and Wellman, M. P. (1996). Some issues in the design of market- oriented agents. In Wooldridge, M., Muller, J. P., and Tambe, M., editors, Intel ligent Agents Volume II, Lecture Notes in Artificial Intelli- gence, pages 283–298. Springer-Verlag. Nadella, R. and Sen, S. (1997). Correlating internal parameters and exter- nal performance. In Weiss, G., editor, Distributed Artificial Intel ligence Meets Machine Learning, pages 137–150. Springer. Rosenschein, J. S. and Zlotkin, G. (1994). Rules of Encounter. The MIT Press, Cambridge, Massachusetts. Russell, S. (1995). Rationality and intelligence. In Proceedings of the 14th International Joint Conference on Artificial Intel ligence, pages 950–957. Sen, S., editor (1996). Working Notes for the AAAI Symposium on Adapta- tion, Co-evolution and Learning in Multiagent Systems. Shoham, Y. and Tennenholtz, M. (1992). Emergent conventions in multi- agent systems. In Proceedings of Know ledge Representation. Sutton, R. S. (1988). Learning to predict by the methods of temporal differ- ences. Machine Learning, 3:9–44. 27 Tambe, M. and Rosenbloom, P. S. (1996). Architectures for agents that track other agents in multi-agent worlds. In Wooldridge, M., Muller, J. P., and Tambe, M., editors, Intel ligent Agents Volume II, Lecture Notes in Artificial Intelligence, pages 156–170. Springer-Verlag. Terabe, M., Wasio, T., Katai, O., and Sawaragi, T. (1997). A study of organizational learning in multi-agent systems. In Weiss, G., editor, Distributed Artificial Intel ligence Meets Machine Learning, pages 168– 179. Springer. Vidal, J. M. and Durfee, E. H. (1996a). The impact of nested agent models in an information economy. In Proceedings of the Second International Conference on Multi-Agent Systems, pages 377–384. http://jmvidal. ece.sc.edu/papers/amumdl/. Vidal, J. M. and Durfee, E. H. (1996b). Using recursive agent models effectively. In Wooldridge, M., Muller, J. P., and Tambe, M., edi- tors, Intel ligent Agents Volume II, Lecture Notes in Artificial Intelli- gence, pages 171–196. Springer-Verlag. http://jmvidal.ece.sc.edu/ papers/lr-rmm2/. Watkins, C. J. and Dayan, P. (1992). Q-learning. Machine Learning, 8:279– 292. 28
1910.13880
1
1910
2019-10-30T14:26:30
Path Planning Games
[ "cs.MA", "cs.AI", "cs.GT", "cs.RO" ]
Path planning is a fundamental and extensively explored problem in robotic control. We present a novel economic perspective on path planning. Specifically, we investigate strategic interactions among path planning agents using a game theoretic path planning framework. Our focus is on economic tension between two important objectives: efficiency in the agents' achieving their goals, and safety in navigating towards these. We begin by developing a novel mathematical formulation for path planning that trades off these objectives, when behavior of other agents is fixed. We then use this formulation for approximating Nash equilibria in path planning games, as well as to develop a multi-agent cooperative path planning formulation. Through several case studies, we show that in a path planning game, safety is often significantly compromised compared to a cooperative solution.
cs.MA
cs
Path Planning Games Yi Li and Yevgeniy Vorobeychik Electrical Engineering and Computer Science, Vanderbilt University, Nashville, TN Abstract. Path planning is a fundamental and extensively explored problem in robotic control. We present a novel economic perspective on path planning. Specif- ically, we investigate strategic interactions among path planning agents using a game theoretic path planning framework. Our focus is on economic tension be- tween two important objectives: efficiency in the agents' achieving their goals, and safety in navigating towards these. We begin by developing a novel mathe- matical formulation for path planning that trades off these objectives, when be- havior of other agents is fixed. We then use this formulation for approximating Nash equilibria in path planning games, as well as to develop a multi-agent co- operative path planning formulation. Through several case studies, we show that in a path planning game, safety is often significantly compromised compared to a cooperative solution. Keywords: Multi-agent system · Path planning 1 Introduction Path planning is a fundamental technical problem in autonomous robotic control. Decades of development have led to significant theoretical and algorithmic progress, with au- tonomous vehicles (including autonomous cars and UAVs) increasingly finding their way to urban roads and skies. In much of the research on path planning, including mobile robot navigation [10, 1, 11], a fundamental task is to find a collision-free motion from a starting position to the goal position given a collection of known obstacles. Variations on this theme, such as dealing with stochastic and moving obstacles, have received recent attention with the emergence of numerous novel unmanned robotic systems and aerial vehicles [16, 2, 9]. As interactions among autonomous vehicles, be it on our roads or in the skies, be- comes more routine, we can expect a certain amount of conflict to emerge, as the au- tonomous agents, designed in service of their individual goals, must occasionally find these goals dependent on other autonomous agents nearby. However, remarkably lit- tle research has been devoted to the question of what autonomous vehicle ecosystem would thereby emerge, when many autonomous agents attempt to achieve their individ- ual goals, but must necessarily interact with one another in doing so. To investigate the consequences of such strategic interactions among multiple path planners, we propose a study of path planning games. An important feature of such games is that a collection of self-interested path planners each trade off two objectives: efficiency, or speed with which their goals are achieved, and safety, or probability that they crash before reaching their goals. Moreover, they trade these off in individual, 2 Yi Li and Yevgeniy Vorobeychik potentially diverse, ways. Consequently, in order to study path planning games we must take an economic, rather than a purely algorithmic, perspective on path planning. To this end, we first develop a novel mathematical programming method for com- puting a single-agent path plan, accounting for these two objectives, given fixed dy- namic behavior (i.e., path plans) of all other agents, as well stochastic disturbances in the environment. Next, we propose a simple iterative algorithm, best response dy- namics, for approximately computing Nash equilibria of path planning games, given the best response mathematical programs. Finally, we develop a novel mathematical program for computing a cooperative multi-agent path plan which optimally trades off efficiency and safety among all agents -- that is, again, taking the economic perspective on the multi-agent path planning problem. We numerically investigate path planning games through several case studies in- volving two and three agents. Our central observation is that as safety becomes more important to agents, a large gap opens up between safety achieved by a socially optimal and Nash equilibrium outcomes; in other words, Nash equilibria exhibit significantly more collisions than desirable by all agents. The main reason for this is that while each agent is concerned with safety, they only account in their objective for the impact of collisions on themselves, and not on other agents who crash along with them. Our observation about safety consequences of path planning games raises a con- cern as we look towards the future of autonomous vehicles interacting in populated environments, particularly as they tend to be designed primarily in service of their in- dividual ends, rather than those of the entire autonomous and non-autonomous vehicle ecosystem. 2 Related Work One common paradigm for studying multi-agent path planning problems is by consid- ering cooperative path planning involving multiple agents. For example, Shen et al. [22] studied cooperative path planning in UAV control system, while LaValle [15] presented an algorithm for applying path planning with stochastic optimal control. Game theoretic problems related to path planning have been considered from sev- eral perspectives. Closest to traditional path planning are zero-sum models of games against nature in which agents are designed to be robust against adversarial uncertainty in the environment [8, 7]. Classic approaches consider rules of interaction and nego- tiation among self-interested agents, including planning agents [19, 13, 14]. Loosely related also is the extensive literature on multi-agent learning, in which multiple agents repeatedly interact in strategic scenarios in which rewards and dynamics depend on all agents (often modeled as stochastic games) [23]. Another important class of game theoretic models related to path planning are rout- ing games. The routing games, as a framework for modeling routing traffic in a large communication network, were first informally discussed by Pigou [18]. This model was first formally defined by Wardrop [24] based on a flow network under the non-atomicity assumption. Therefore, equilibrium flows in non-atomic selfish routing games are often called Wardrop equilibria. Since then, a number of fundamental results for the non- atomic routing games have been proved by various researchers, such as the existence Path Planning Games 3 and uniqueness of equilibrium flows [3], first-order conditions for convex program- ming problem [4], and the theory of general non-cooperative non-atomic games [21]. The seminal work by Roughgarden and Tardos [20] first characterized the gap between centralized and decentralized control in multi-agent routing problems, formalized as the price of anarchy, or ratio of socially optimal to worst-case equilibrium outcomes. Their work explained the principles behind a broad class of counter-intuitive phenom- ena, such as Braess's Paradox [6]. Both routing games and path planning games investigate the competition among agents during their navigation tasks (e.g. passing through bottlenecks). However, in routing games, the state space is a graph-based structure, and the cost of competition is modeled by a set of latency functions without considering the agents' dynamics, while path planning games consider the problem at higher fidelity, with a continuous state space where the latency is caused by the interaction among agents. Moreover, our model of path planning games allows us to explicitly study the tradeoff agents make between performance and safety, an issue not considered in routing games. 3 Model We describe the problem by first introducing the model of agents' motions, and then formulating the path planning game. Consider a state space X = Rn. We represent an agent i by a polyhedron described ijx ≤ bij, j ∈ {0, ..., Mi}}. Each agent by a collection of Mi hyperplanes: Pi = {aT polyhedron Pi contains a point ri ∈ X called the reference which rigidly attaches to the polyhedron such that the state of an agent can be determined by the position of its reference. We assume that agents move in discrete time, and a control input uit ∈ Uit ⊂ Rm applied to the ith agent at time t moves the agent from state ri,t ∈ X at time t to state ri,t+1 ∈ X at time t + 1 according to a linear stochastic dynamic model ri,t+1 = Airit + Biuit + ωi, (1) where Ai ∈ Rn×n, Bi ∈ Rn×m, and ωi ∼ N (0, Σi) is the process noise for ith agent at time t following an n-dimension zero-mean Gaussian distribution with a covariance matrix Σi. For each agent we are given its initial placement r0 ∈ X (i.e., where the agent starts) and a goal rgoal ∈ X which the agent needs to reach. Let ri,0:T =< ri0, ..., riT > be a state sequence of the (reference point of the) ith agent from time 0 to T and ui,0:T =< ui0, ..., uiT > be a corresponding control sequence. However, once the agent reaches its goal, it remains there deterministically, and has no effect on other agents. We aim to find the optimal control sequence for the ith agent in this stochastic motion model, with the following criteria in mind: 1. After applying the resulting control sequence, the expected terminal position of the 3. the agent reaches the goal in as few time steps as possible. 2. the upper bound of the probability that the ith agent collides with other agents ith agent is ri,goal, should be minimized, and 4 Yi Li and Yevgeniy Vorobeychik For the moment, we allow no feedback from observed state to control; we relax this restriction below. Path Planning Game: Given these models of individual agents, we define a path plan- ning game by a collection of N agents, with each agent i's action space comprised Uit. In this game, each agent aims to compute of all possible control sequences, an optimal control sequence, given the behavior of others, trading off two objectives: efficiency, or the number of times steps it takes to reach the goal, and safety, or the probability of collision. To formalize, let Ti be the expected number of times steps to reach the goal (if no collision occurs), and Gi the safety margin, related to the upper bound on the probability of collision as discussed below. An agent i's objective is then T(cid:81) t=0 Ji(ui,0:Tmax, u−i,0:Tmax ) = λTi + (1 − λ)Gi, (2) What makes this a game is that the safety Gi of an agent i depends on the paths taken by all agents, rather than i alone. For example, if two agents are moving towards one another, and directly towards their respective goals, the only way for one of them to avoid collision is to circumnavigate the other, taking a longer path towards the goal. Next, we describe how to define and compute Ti and Gi, and compute a best response for a given agent i, fixing behavior of all others. 4 Computing an Agent's Best Response An important subproblem of computing a Nash equilibrium of a path planning game is to compute a best response of an arbitrary agent i when we fix the control policies of all others. We show that calculating agents' best responses in path planning games amounts to a single-agent path planning problem with motion uncertainty. Blackmore et al. [5] previously developed a probabilistic approach for computing a robust optimal path for a robot in the environment with a static obstacle and motion uncertainty via mathemat- ical programming. However, in our context, where an agent trades off efficiency and safety, with stochastic moving obstacles (representing other agents), this prior approach is inadequate. In this section we develop a novel method for solving such problems. 4.1 Best Response for a Point-Like Agent First, consider a simple path planning problem illustrated in Figure 1. In this problem, there is a set of static obstacles and an agent, represented by a point, aiming to find a collision-free minimum-time path from its initial placement to its goal position under motion uncertainty. Assume each obstacle has a given collision volume which can be represented by a polyhedron. To create a mathematical program for solving this prob- lem, two factors need to be taken into account: goal position constraints and collision avoidance constraints. Formally, let rt denote the position of an agent at time t with its initial placement r0 and the goal position rgoal. Suppose that the motion dynamics of the agent follows (1) (from which, we remove the index i, since there is only one agent). Assume there are K Path Planning Games 5 (a) (b) Fig. 1: Single agent path planning with a point-like agent. obstacles represented by polyhedra Pn, n = 1, ..., K, with Pn = {xaT npx ≤ bnp, p = 1, . . . , En}, where En is the number of hyperplanes representing the polyhedron Pn. As before, let T denote the planning horizon (so that the goal must be reached by time T ; we assume the horizon is long enough that the goal can be successfully reached even with the obstacles). Efficiency and Reachability: Let {d0, ..., dT} denote a collection of binary indicators which indicate whether the agent has reached its goal, i.e., dt = 1 iff rt = rgoal. Then, with a large positive number M, the constraints ∀t,rt − rgoal ≤ M (1 − dt) T(cid:88) t=0 dt = 1 (3) (4) make sure that the agent will reach to its goal position sooner or later (and we assume that there exists a feasible solution). Moreover, the number of time steps to reach its goal position can be represented by T(cid:88) t=0 T = t · dt (5) which is one of our objectives (corresponding to Ti, for an agent i above). Since rt is a random variable, this constrain is stochastic. We approximate it by a determinis- tic constraint, replacing the position of the agent rt with its expected position rt in Constraint (3). Collision Avoidance: Let A denote the event that the agent has a collision, and let A(n, t), n ∈ {1, ..., K} denote the event that the agent collides with the nth obstacle at time step t. We wish to minimize the probability of a collision, P r(A), or minimize G such that (6) The agent has a collision if the agent collides with any of obstacles at any time steps, which is the event A = A(n, t) (7) P r(A) ≤ G. T(cid:95) K(cid:95) t=0 n=1 6 Yi Li and Yevgeniy Vorobeychik Then, by the union bound P r(A) = Pr (cid:32) T(cid:95) K(cid:95) t=0 n=1 (cid:33) A(n, t) Pr(A(n, t)) ≤ G K(cid:88) ≤ T(cid:88) T(cid:88) K(cid:88) n=1 t=0 t=0 n=1 ⇐ [∀n, t, P r(A(n, t)) ≤ g(n, t)] ∧ [ g(n, t) = G], where g(·) is risk allocation which indicates how the risks are distributed among obsta- cles and time steps. Next, we consider the event that the agent collides with an obstacle at time step t, which means that the position of the agent is inside the corresponding polyhedron. Thus, collision with the nth obstacle can be described by A(n, t) : np · rt ≤ bnp aT (10) Since the condition (10) including rt is also stochastic, to convert it into a deterministic one, we consider its probabilistic measure, Pr{A(n, t)}. Following (6), our constraints then become (cid:41) np · rt ≤ bnp aT ≤ g(n, t). Since a polyhedron is convex, a sufficient condition is, Pr(aT np · rt ≤ bnp) ≤ g(n, t). (8) (9) (11) (12) En(cid:94) p=1 Pr (cid:40) En(cid:94) En(cid:95) p=1 p=1 Based on the approach by Blackmore et al. [5], expression (11) can be further simplified using the linear approximation of the upper bound on the probability of collision. First, consider rt, the position of agent at time step t given its initial placement r0 and the control sequence u0:t, which is a random variable following a Gaussian distribution, rt ∼ N (rt, Σt), where and rt = Σt = At−k−1Buk + Atr0 At−k−1Σ(AT )t−k−1. (13) (14) For a single Gaussian random variable X ∼ N (µ, σ2), we can take the inverse Gaussian distribution function at both sides of Pr(X < 0) ≤ δ and get u ≥ √ 2σerf−1(1 − 2δ). nprt−bnp) ∼ N (aT Similarly, from rt ∼ N (rt, Σt), we can get (aT npΣtanp). Then, we take the inverse Gaussian distribution function at both sides of (12), and nprt−bnp, aT nprt − bnp ≥ e(n, t) aT (15) t−1(cid:88) t−1(cid:88) k=0 k=0 En(cid:95) p=1 (cid:113) 2aT npΣtanp · erf −1(1 − 2g(n, t)) and erf (z) = 2√ dt. We where e(n, t) = call this the safety margin, because it expands the margin of obstacles and shrinks the feasible planning domain in order to consider motion uncertainty. Because the motion dk to of the agent after it reaches its goal has no further effect, we add the term M these constraints where M is a large positive number. −1(1 − 2g(n, t)). Since erf −1 is strictly monotonically in- Define s(n, t) = erf k=0 π creasing, we can minimize g(n, t) by minimizing Path Planning Games 7 (cid:82) z 0 e−t2 t(cid:80) T(cid:80) K(cid:80) G = − T(cid:88) K(cid:88) t=0 n=1 s(n, t). (16) t=0 n=1 This is the safety portion of an agent's objective (Gi for an agent i above). A Path Planning Mathematical Program: Our goal is to minimize J = λT + (1 − α)G, balancing efficiency and safety using an exogenously specified parameter λ. Com- bining this objective with the goal and collision avoidance constraints described above, we obtain the following mathematical program for single-agent path planning: MP1: λT (d) + (1 − λ)G(s) min u,s,d s.t. ∀t, ut ∈ Ut ∀t, rt = At−k−1Buk + Atr0 ∀t,rt − rgoal1 ≤ M · (1 − dt) ∀t, dt ∈ {0, 1} t−1(cid:88) k=0 T(cid:88) t=0 ∀t∀n, dt = 1 En(cid:95) p=1 (cid:113) n,prt > bnp + e(n, t) − M aT t−1(cid:88) At−k−1Σ(AT )t−k−1 aT npΣtanp ∀t, e(n, t) = s(n, t) ∀t, Σt = ∀t∀n, 0 ≤ s(n, t) ≤ M(cid:48) k=0 (17) (18) (19) (20) (21) (22) (23) (24) (25) (26) t(cid:88) k=0 dk One residual concern is that if an agent cannot possibly collide with an nth obstacle at time step t (i.e., if g(n, t) = 0), s(n, t) can become unbounded. To address this, we add Constraint (26) which imposes an upper bound M(cid:48) on s(·), where M(cid:48) is an appropriate positive number so that erf (M(cid:48)) (cid:39) 1. 8 Yi Li and Yevgeniy Vorobeychik Since MP1 is a disjunctive linear program which can be solved by an off-the-shelf linear programming solver. A solution < u, s(·), d > found by MP1 with dT0 = 1 means that the agent can reach to its goal position in T0 time steps with the probability of collision at most by applying the control sequence u0:T0. 1−erf (s(n,t)) T0(cid:80) K(cid:80) 2 t=0 n=1 4.2 Generalization: Feedback Control Above we considered open loop path planning where the control sequence is determin- istic and fixed a priori. We now extend our approach to closed loop (feedback) control, following the ideas in Geibel and Wysotzki [12] and Oldewurtel et al. [17]. Assume we have a nominal control sequence u0:T . Then, the feedback control se- quence can be obtained by integrating the nominal control sequence and the feedback gain: (27) where xt is the observed and xt the predicted position, and K is an exogenous pa- rameter which determines the importance of the error feedback term (xt − xt). In this approach, ut is computed using the MP1 offline, and the actual control sequence is then generated at runtime by applying (27). As a consequence, the Constraints (25) above become ut = ut + K(xt − xt), t−1(cid:88) Σt = (A + BK)t−k−1Σ[(A + BK)T ]t−k−1. (28) k=0 Notice that when there is no error feedback (K = 0) this becomes equivalent to open loop control. 4.3 Collision Avoidance for Polyhedral Agents Having considered the problem for point-like agents, and then generalizing the ap- proach to consider error feedback, we now generalize the collision avoidance con- straints to polyhedral agents. Consider states of the agent and the nth obstacle, both represented by polyhedra Pt and Pn, respectively. The position of the agents' reference is rt. Since the reference point rigidly attaches to the agent, let C = {x−rtx ∈ Pt} denote the relative region of the agent to its time-dependent reference. When the agent collides with the nth obstacle at time t, we know that ∃x ∈ Pt ∩ Pn (i.e., the intersection of these time-dependent polyhedra is non-empty). Thus, from the point view of the agent, the set of positions of its reference causing collision with the nth obstacle can be represented by Kn = {x − cx ∈ Pn, c ∈ C} = −C ⊕ Pn, where ⊕ is the Minkowski addition. Since both C and Pn are polyhedra, Kn is a polyhedron and can be represented by a set of hyperplanes: Kn = {xaT npx ≤ bnp, p = 0, ..., En}, where En the number of hyperplanes of Kn. The agent collides with the nth obstacle at time step t if the position of its reference is in Kn, that is, when nprt ≤ bnp. aT (29) rt ∈ Kn ⇔ En(cid:94) p=1 Comparing (29) with (10), we can see that the problem with polyhedral agents can also be solved via the mathematical program above, if we treat the agent as its reference point, and assign the collision volume Kn to each obstacle. Path Planning Games 9 4.4 Best Response Solver Our final challenge is to consider the actual best response problem of an arbitrary agent in the path planning game, where all other agents are moving (rather than static) ob- stacles with known stochastic motion policies. We now address this problem, obtaining the final mathematical program for computing a single-agent best response. Let i denote the agent for whom we are computing a best response, with −i = {1, ..., i − 1, i + 1, ..., N} the set of all others. Let i be represented by a polyhedron Pit with reference rit and let j ∈ −i be represented by Pjt with reference rjt. Let Ci denotes the relative region of i to its reference, while Cj denotes the relative region of j ∈ −i to its reference. Suppose that j reaches its goal position by time step Tj with the corresponding known control sequences uj,0:Tj . Then, for each j and t, Kijt = −Ci ⊕ Pjt is a polyhedron with Kijt = {xaT ijpx ≤ bijtp, p ∈ {0, ..., Eij}} where Eij is the number of hyperplanes related to the shapes of Ci and Cj. Now we formalize how the control sequence uj,0:Tj of each agent j affects Pjt so that we can determine Kijt. From motion dynamics of i and j, rit = ∀j, rjt = At−k−1 i Biuik + At iri0 + ωit At−k−1 j Bjujk + At jrj0 + ωjt (30) (31) t−1(cid:88) t−1(cid:88) k=0 k=0 t−1(cid:88) t−1(cid:88) k=0 k=0 t−1(cid:88) From the perspective of agent i, the motion of agent j can be treated as deterministic if we "migrate" motion uncertainty from j to i so that ∀j, r(cid:48) ijt = ∀j, r(cid:48) jt = At−k−1 i Biuik + At iri0 + ωit − ωjt At−k−1 j Bjujk + At jrj0. (32) For each j, let ω(cid:48) uncertainty of i to j at time t. Let ijt = (ωit − ωjt) ∼ N (0, Σit + Σjt) denote the relative motion ∀j, ∆r(cid:48) jt = At−k−1 j Bjujk + At jrj0 − rj0 (33) k=0 denote the position shift of agent j at time step t determined by its control sequence uj,0:Tj . Then, we obtain the position of Kijt by shifting Kij0 by ∆rjt. Since Kijt = {xaT ijpx ≤ bijtp}, we obtain bijtp = bij0p + aT ijp · ∆r(cid:48) jt. (34) 10 Yi Li and Yevgeniy Vorobeychik Consequently, we obtain the following mathematical program for i's best response: MP2: Ji = λTi + (1 − λ)Gi min u,si(·),d s.t. ∀t, uit ∈ Uit ∀t, rit = iri0 ∀t,rit − ri,goal1 ≤ M · (1 − dit) ∀t, dit ∈ {0, 1} Biuik + At t−1(cid:88) At−k−1 k=0 i dit = 1 ∀j∀t = 0, ..., Tj, T(cid:88) Eij(cid:95) t=0 p=1 − M dik k=0 ∀i∀t, Σit = i,j,prit > bij0p + aijp · ∆r(cid:48) aT t(cid:88) jt + eijt k=0 t−1(cid:88) t−1(cid:88) ijp(Σit + Σjt)aijp · si(j, t) aT Bjujk + At At−k−1 k=0 j jrj0 − rj0 ∀t∀j, ∆r(cid:48) jt = (cid:113) ∀j, eijt = ∀t∀n, 0 ≤ si(n, t) ≤ M(cid:48) (Ai + KiBi)t−k−1Σi[(Ai + KiBi)T ]t−k−1 (35) (36) (37) (38) (39) (40) (41) (42) (43) (44) (45) Notice that the constraints (41) are effective only for t = 0, ..., Ti, and i is not affected by any j who reached its goal. 5 Finding Equilibria in Path Planning Games Armed with the best response solvers for each agent i in a path planning game, our goal is to approximate a Nash equilibrium in the resulting game. We do so by applying best response dynamics which, if it converges (which it does in our experiments), yields a Nash equilibrium. Best response dynamics is an asynchronous iterative algorithm in which a single agent i is chosen in each iteration, and we maximize i's utility (i.e., compute its best response) fixing control strategies for all other agents. Best response of an agent i can be calculated as discussed above. 6 Optimal Multi-Agent Path Planning Path Planning Games 11 jectives, i.e., the new objective is J = (cid:80) We now extend the single-agent best response problem to compute an optimal multi- agent path plan. In this case, the control sequences ui,0:Ti of all agents are unknown a priori (as they are being computed jointly). Compared to calculating an agents' best response, we replace the objective of the current agent with the sum of all agents' ob- i Ji, where Ji is the objective of agent i. Moreover, we add constraints analogous to MP2 to make sure that the collision avoid- ance conditions hold from the perspective of every agent simultaneously. We thus obtain the following mathematical program: MP3: N(cid:88) i=1 Ji min u,s,d J = At−k−1 i t−1(cid:88) s.t. ∀i, t, uit ∈ Uit ∀i, t, rit = iri0 ∀i, t,rit − ri,goal1 ≤ M · (1 − dit) ∀i, t, dit ∈ {0, 1} ∀i Tmax(cid:88) Biuik + At dit = 1 k=0 t=0 ∀i, t,−i, Ei,−i(cid:95) p=1 (46) (47) (48) (49) (50) (51) (52) (53) (54) (55) i,−i,prit > bi,−i,0,p + ai,−i,p · ∆r(cid:48) aT −i,t + ei,−i,t − M (dik + d−i,k) t(cid:88) k=0 t−1(cid:88) t−1(cid:88) k=0 k=0 (cid:113) ∀i∀t, Σit = (Ai + KiBi)t−k−1Σi[(Ai + KiBi)T ]t−k−1 ∀i, t, ∆r(cid:48) it = At−k−1 i Biui,k + At iri0 − ri0 i,−i,p(Σit + Σ−i,t)ai,−i,p · si(t, j) ∀i, t∀ − i, ei,−i,t = aT ∀i∀t∀n, 0 ≤ si(n, t) ≤ M(cid:48) t(cid:80) The term −M (dik + d−i,k) in Constraints (52) means that an agent will not be affected by other agents who have reached their goal position by time step t, and, con- versely, it will not affect the final solution once it reaches its goal position. k=0 12 Yi Li and Yevgeniy Vorobeychik 7 Experiments (a) (b) (c) (d) Fig. 2: Experiment scenarios. Armed with the techniques for computing both Nash equilibria in path planning games, as well as a socially optimal solution of the corresponding "cooperative" multi- agent planning scenario, we now consider several case studies to understand the impact of self-interested behavior. Specifically, we consider the following 2D scenarios: -- 2 agents with opposing goal positions (Figure 2(a)): the goal position of each agent is behind the initial placement of the other. In this scenario, the first agent moves from starting coordinate position (10, 50) to goal at position (95, 50), and the second agent moves from (90, 50) to (5, 10). -- 2 agents moving in parallel (Figure 2(b)): the initial and goal positions of both agents are near one another. In this scenario, the first agent moves from (10, 70) to (95, 70) and the second agent moves from (10, 35) to (95, 35). -- Intersection with 2 agents (Figure 2(c)): one agent moves from the bottom to the top of the 2D grid, and the other moves from left to right. In this scenario the first agent moves from (10, 50) to (90, 50) and the second agent moves from (50, 10) to (50, 90). -- Intersection with 3 agents (Figure 2(d)): one agent starts at the top of a 2D grid and moves down, while the other two start at southeast and southwest, and move northwest and southeast, respectively. In this scenario the first agent moves from (50, 90) to (50, 5), the second agent moves from (85, 30) to (11, 73), and the third agent moves from (14, 29) to (90, 73). In each experiment, each agent is represented by a square with each side of length 15 and parallel to either the x or the y axis. The control inputs are 2D velocity vectors and the maximum velocity of agents in both x and y direction is 10 (thus, A = B = I in agents' motion dynamic). Agents' motion is distorted by a Gaussian distribution with the covariance matrix 1.9I. For each scenario we consider solutions with and without feedback control, where the feedback gain for the latter was chosen to be K = 0.5. Throughout, we assume that all players are equally concerned about safety vs. effi- ciency; formally, all players share the same parameter λ. The results are shown in Figures 3-10. In each figure, the horizontal axis is the λ value which represents the importance of safety for both agents, where lower values of λ imply that safety is more important. The left plots show the objective value, where lower is better. The middle plots give the time to goal, where lower is, again, better. The right plots show safety margin, where again lower is better. We present average Path Planning Games 13 quantities over all agents; the qualitative observations are similar if we consider these at individual agent level. The first observation is that the difference between socially optimal and equilibrium objective values appears small ((a) plots in Figures 3-10). It is therefore tempting to conclude that equilibrium behavior is similar to socially optimal, but it turns out that this is not the case: in particular, it turns out that the trade-off between efficiency and safety made by the agents in equilibrium is very different from optimal. Considering next the (b) and (c) columns of the figures, we can observe that sys- tematically performance improves, while safety is often significantly compromised, in equilibrium as compared to a social optimum. The difference is particularly dramatic in the first two scenarios, when the agents are in direct conflict in their quest to reach their respective goals. The gap between optimal and equilibrium safety in the other scenarios tends to be larger for relatively high values of λ. Another general observation we can make is that often the solutions with a feedback controller are closer to optimal, particularly from the perspective of safety. The excep- tions involve the intersection scenarios, where the gap is larger for higher values of λ in the feedback controller solution than with the open-loop controller. However, even in these scenarios, the feedback controller yields solutions closer to socially optimal for most values of λ. This is not surprising: since all agents are concerned about safety, they are more able to dynamically adjust to avoid collisions when some feedback about state is available. To understand why safety is systematically compromised, consider a single agent's incentive. Even though an agent is interested in reaching the goal safely, it does not account for the fact that being involved in a crash also crashes the other agent. Thus, in equilibrium safety is compromised relative to social optimum, as agents fail to capture the externalities associated with crashes. (a) (b) (c) Fig. 3: Opposing goal positions without the feedback gain(K = 0). (a) (b) (c) Fig. 4: Opposing goal positions with the feedback gain(K = 0.5). 14 Yi Li and Yevgeniy Vorobeychik (a) (b) (c) Fig. 5: Moving in parallel without the feedback gain(K = 0). (d) (e) (f) Fig. 6: Moving in parallel with the feedback gain(K = 0.5). (a) (b) (c) Fig. 7: Intersection without the feedback gain(K = 0, 2 agents). (a) (b) (c) Fig. 8: Intersection with the feedback gain(K = 0.5, 2 agents). (a) (b) (c) Fig. 9: Intersection without the feedback gain(K = 0, 3 players). (a) (b) (c) Fig. 10: Intersection with the feedback gain(K = 0.5, 3 players). Bibliography [1] Arkin, R.C.: Motor Schema-Based Mobile Robot Navigation (1989) [2] Auat Cheein, F.A., Carelli, R.: Agricultural robotics: Unmanned robotic service units in agricultural tasks. IEEE Industrial Electronics Magazine 7(3), 48 -- 58 (2013) [3] Beckmann, M., McGuire, C., Winsten, C.: Studies in the Economics of Transportation (1956) [4] Bertsekas, D.: Nonlinear programming (1999) [5] Blackmore, L., Li, H., Williams, B.: A probabilistic approach to optimal robust path plan- ning with obstacles. In: American Control Conference (2006) [6] Braess, D.: Uber ein Paradoxon aus der Verkehrsplanung. Unternehmensforschung Opera- tions Research - Recherche Op´erationnelle 12(1), 258 -- 268 (dec 1968) [7] Chen, M., Zhou, Z., Tomlin, C.J.: Multiplayer reach-avoid games via low dimensional so- lutions and maximum matching. In: American Control Conferenc. pp. 1444 -- 1449 (2014) [8] Chen, M., Zhou, Z., Tomlin, C.J.: A path defense approach to the multiplayer reach-avoid game. In: Annual Conference on Decision and Control. pp. 2420 -- 2426 (2014) [9] Craighead, J., Murphy, R., Burke, J., Goldiez, B.: A survey of commercial & open source unmanned vehicle simulators. In: Proceedings - IEEE International Conference on Robotics and Automation. pp. 852 -- 857 (2007) [10] DeSouza, G.N., Kak, A.C.: Vision for mobile robot navigation: A survey. IEEE Transac- tions on Pattern Analysis and Machine Intelligence 24(2), 237 -- 267 (2002) [11] Elfes, A.: Using occupancy grids for mobile robot perception and navigation. Computer 22(6), 46 -- 57 (1989) [12] Geibel, P., Wysotzki, F.: Risk-sensitive reinforcement learning applied to control under con- straints. J. Artif. Intell. Res. 24, 81 -- 108 (2005) [13] Jonsson, A., Rovatsos, M.: Scaling up multiagent planning: A best-response approach. In: ICAPS (2011) [14] Jord´an, J., Torreno, A., de Weerdt, M., Onaindia, E.: A better-response strategy for self- interested planning agents. Applied Intelligence pp. 1 -- 21 (2017) [15] LaValle, S.M.: Robot motion planning: A game-theoretic foundation. Algorithmica 26(3-4), 430 -- 465 (2000) [16] Mahony, R., Kumar, V.: Aerial robotics and the quadrotor. IEEE Robotics and Automation Magazine 19(3), 19 (2012) [17] Oldewurtel, F., Jones, C.N., Morari, M.: A tractable approximation of chance constrained stochastic mpc based on affine disturbance feedback. In: IEEE Conference on Decision and Control. pp. 4731 -- 4736 (2008) [18] Pigou, A.: The economics of welfare, 1920. McMillan&Co., London (1932) [19] Rosenschein, J.S., Zlotkin, G.: Rules of encounter: designing conventions for automated negotiation among computers. MIT press (1994) [20] Roughgarden, T., Tardos, E.: How bad is selfish routing? Proceedings 41st Annual Sympo- sium on Foundations of Computer Science 49(2), 1 -- 26 (2000) [21] Schmeidler, D.: Equilibrium points of nonatomic games. Journal of Statistical Physics 7(4), 295 -- 300 (1973) [22] Shen, D., Chen, G., Cruz, J.B., Blasch, E.: A game theoretic data fusion aided path planning approach for cooperative UAV ISR. In: Aerospace Conference. pp. 1 -- 9 (2008) [23] Stone, P., Veloso, M.: Multiagent systems: A survey from a machine learning perspective. Autonomous Robots 8(3), 345 -- 383 (2000) [24] Wardrop, J.G.: Road paper. some theoretical aspects of road traffic research. Proceedings of the institution of civil engineers 1(3), 325 -- 362 (1952)
1903.00714
1
1903
2019-03-02T14:55:40
A Cooperative Multi-Agent Reinforcement Learning Framework for Resource Balancing in Complex Logistics Network
[ "cs.MA", "cs.AI" ]
Resource balancing within complex transportation networks is one of the most important problems in real logistics domain. Traditional solutions on these problems leverage combinatorial optimization with demand and supply forecasting. However, the high complexity of transportation routes, severe uncertainty of future demand and supply, together with non-convex business constraints make it extremely challenging in the traditional resource management field. In this paper, we propose a novel sophisticated multi-agent reinforcement learning approach to address these challenges. In particular, inspired by the externalities especially the interactions among resource agents, we introduce an innovative cooperative mechanism for state and reward design resulting in more effective and efficient transportation. Extensive experiments on a simulated ocean transportation service demonstrate that our new approach can stimulate cooperation among agents and lead to much better performance. Compared with traditional solutions based on combinatorial optimization, our approach can give rise to a significant improvement in terms of both performance and stability.
cs.MA
cs
A Cooperative Multi-Agent Reinforcement Learning Framework for Resource Balancing in Complex Logistics Network Xihan Li Key Laboratory of Machine Perception, Peking University Beijing, China [email protected] Jia Zhang Microsoft Research Asia Beijing, China [email protected] Jiang Bian Microsoft Research Asia Beijing, China [email protected] 9 1 0 2 r a M 2 ] A M . s c [ 1 v 4 1 7 0 0 . 3 0 9 1 : v i X r a Yunhai Tong Key Laboratory of Machine Perception, Peking University Beijing, China [email protected] Tie-Yan Liu Microsoft Research Asia Beijing, China [email protected] ABSTRACT Resource balancing within complex transportation networks is one of the most important problems in real logistics domain. Traditional solutions on these problems leverage combinatorial optimization with demand and supply forecasting. However, the high complex- ity of transportation routes, severe uncertainty of future demand and supply, together with non-convex business constraints make it extremely challenging in the traditional resource management field. In this paper, we propose a novel sophisticated multi-agent reinforcement learning approach to address these challenges. In particular, inspired by the externalities especially the interactions among resource agents, we introduce an innovative cooperative mechanism for state and reward design resulting in more effective and efficient transportation. Extensive experiments on a simulated ocean transportation service demonstrate that our new approach can stimulate cooperation among agents and lead to much better performance. Compared with traditional solutions based on combi- natorial optimization, our approach can give rise to a significant improvement in terms of both performance and stability. KEYWORDS multi-agent; reinforcement learning, resource balancing, logistics network ACM Reference Format: Xihan Li, Jia Zhang, Jiang Bian, Yunhai Tong, and Tie-Yan Liu. 2019. A Cooperative Multi-Agent Reinforcement Learning Framework for Resource Balancing in Complex Logistics Network. In Proc. of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019), Montreal, Canada, May 13 -- 17, 2019, IFAAMAS, 14 pages. 1 INTRODUCTION With the rapid growth of logistics industry, the imbalance between the resource's supply and demand (SnD) has become one of the most important problems in many real logistics scenarios. For ex- ample, in the domain of ocean transportation, the SnD of empty Proc. of the 18th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2019), N. Agmon, M. E. Taylor, E. Elkind, M. Veloso (eds.), May 13 -- 17, 2019, Montreal, Canada. © 2019 International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org). All rights reserved. containers are very unequal due to the world trade imbalance [20]; in the domain of express delivery, there exists severe emerging unevenness of the SnD of carriers within local areas; in the fast- growing car-sharing and bike-sharing areas, the unbalanced SnD of shared taxis and bikes are also explicit due to various temporal and spatial factors [10, 17]. Henceforth, efficient resource balancing has risen to be the critical approach to solve the resource imbalance in the logistics industry. The failure of that will cause large amounts of unfulfilled resource demand, further resulting in reduction of customer satisfaction, increasing resource shortage cost and de- clining revenue. Persistent unsolved SnD imbalance can give rise to accumulated resource shortage and, even worse, a stalemate of SnD [17] with unexpected amplified price. Traditional solutions for resource balancing leverage operational research (OR) based methods [20], which are typically multistage: they first use forecasting techniques to estimate the future SnD of each resource agent; then, the combinatorial optimization approach is employed to find each resource agent's optimal action to mini- mize a pre-defined objective, which is usually formed as the total cost caused by resource shortage; finally, the feasible execution plan is generated by tailoring the raw solution obtained by OR- based models. Nevertheless, the drastic uncertainty of future SnD, complex business constraints in the non-convex form, as well as the high complexity of transportation networks make it extremely challenging to generate satisfying action plans by using traditional OR solutions. More concretely, the first crucial challenge, i.e., the uncertainty of future SnD, is mainly caused by multiple external highly dynamic factors, either temporal or spatial, such as special days/events, emerging market changes, unstable policies [20], etc. Moreover, such uncertainty can be even aggravated due to the inherent mu- tual dependency between the OR-based model and future SnD. Particularly, the future SnD can be dramatically deviated by action plans generated by the OR model, which in turn heavily relies on the future SnD. Henceforth, the uncertainty of future SnD, as drasti- cally increasing the difficulty of accurate SnD forecasting, tends to fail the effectiveness of the traditional multistage OR-based method. The second major challenge is reflected by many important but complex business rules in real logistics services. On the one hand, they are hard to be formulated in constraints of linear or convex forms, which, therefore, makes it quite hard to model and solve the problem precisely using traditional OR-based method such as linear programming and convex optimization. On the other hand, ignoring these necessary constraints is unacceptable since it will cause a big gap between the model and the real world, leading to significant performance drop and even unfeasible solutions. Furthermore, since the transportation networks in real logistics services are usually very complex, consisting of various types of terminals and complex connecting routes, the consequential com- plicated dependencies among terminals rise another vital challenge when building effective OR-based model. Specifically, those com- plicated dependencies make it quite difficult to create acceptable number of constraints and variables to balance between the indi- vidual and the collective objectives in the OR-based model. To address these challenges, in this paper, we formally formulate the resource balancing problem in complex logistics networks as a stochastic game and then propose a novel cooperative multi-agent reinforcement learning (MARL) framework. With the dedicated de- sign of the agent set, joint action space, state set, reward functions, transition probability functions, and discount factor, respectively, our multi-agent reinforcement learning framework provides an end-to-end and high-capability solution, which can not only com- pensate the imperfect forecasting results to avoid further error propagation in multistage OR methods, but also enable to optimize the obtained action plans towards complicated constraints based on real business rules. Moreover, in contrast to applying MARL under some easier logistics scenarios, a blind employment of reinforce- ment learning approach may not produce satisfactory results in complex logistics networks, because of its incapability of enhancing cooperation among highly dependent resource agents. To tackle this challenge, we further introduce three levels of cooperative metrics and, accordingly, improve the state and reward design to better promote the cooperation in the complex logistics networks. To demonstrate the superiority of the MARL framework, we implement our approach under an empty container repositioning (ECR) task in a complex ocean transportation network. In fact, such maritime transportation is essential to the world's economy as 80% of global trade is carried by sea [21]. By far, maritime transporta- tion is the most cost-effective way to move bulk commodity and raw materials around the world. Extensive experiments show that our method can achieve nearly optimal resource balancing results, which yields a significant improvement over the traditional OR baseline. transportation network as a stochastic game. Our major contributions can be summarized as follows: • Formulating the resource balancing problem in a complex • Introducing a cooperative multi-agent reinforcement learn- ing framework as an end-to-end and high-capability solution to the resource balancing problem, as it is not only more robust to the imperfect SnD forecasting but yields higher capability and flexibility compared with the traditional mul- tistage OR-based methods. • Proposing three levels of cooperative metrics to provide guid- ance to improve state and reward design, in order to better promote the cooperation in the complex logistics network. • Conducting extensive experiments on the empty container repositioning task in the scenario of real-world ocean logis- tics industry. 2 RELATED WORKS Resource balancing in transportation network, which can be re- garded as a branch of scheduling problem, is comprehensively stud- ied in the field of OR [2, 5, 9, 18]. Among them, Epstein et al. [5] studied the ECR problem, and developed a logistics optimization system to manage the imbalance with a multicommodity network flow model based on demand forecasting and safety stock con- trol. For more works about ECR, Song and Dong [20] provides an in-depth review of the OR-based literature. With the prosperity of deep learning, deep reinforcement learn- ing (RL) methods like DQN [15] has achieved great success in modeling and solving many intellectual challenging problems, such as video games [15] and go [19]. However, they are not widely applied to complicated real-world applications, especially for those who have high-dimensional action spaces and need cooperation between lots of agents. In recent years, motivated by the great success of deep RL, some methods have been proposed based on RL to address resource bal- ancing problem, especially rebalancing homogeneous, flexible ve- hicles. Pan et al. [17] proposed a deep reinforcement learning al- gorithm to tackle the rebalance problem for shared bikes, which learns a pricing strategy to incentivize users to rebalance the sys- tem. Lin et al. [10] proposed a contextual multi-agent reinforcement learning framework to tackle the rebalance problem for online ride- sharing platforms, in which every taxi is treated as an agent that learns its action to move to its neighboring grids. Xu et al. [23] pro- posed a learning and planning approach in on-demand ride-hailing platforms, which combines RL for learning and combinatorial op- timizing algorithm for planning. These works have successfully modeled and handled large-scale and real-world traffic scenarios. However, compared with resource balancing in complicate logis- tics network, the environments in their scenarios are much looser, and the dependency of agents is simple and straightforward. Thus their methods can hardly be applied to solve the resource balancing problem. To apply MARL in resource balancing, one of the main obstacles is to deal with collaboration of agents with complicated depen- dency. This dependency is mainly caused by complicated logistics network structures. In the area of traditional multi-agent system, fruitful works are done by dealing with collaboration of multi- agents. Among them, FF-Q [11], Nash-Q [7] and Correlated-Q [6] are famous methods achieving convergence and optimum. How- ever, all of them adopt the joint action approach, which is hardly applied in real-world multi-agent system with lots of agents, due to the extremely large joint action space. Similar limitation occurs in other joint action or best response based methods [8, 22]. Some other works [3, 4, 13] managed to apply potential based reward shaping in MARL to stimulate cooperation. Methods in these works achieve performance improvement in their own scenarios. How- ever, in resource balancing scenarios, where agents' actions have a long-term and immeasurable effect on the ultimate results, more efforts should be put to understand the problem and design rewards. 0 i , Dt i , and we use Ct i 3 PROBLEM STATEMENT In this section, we will formally define the resource balancing prob- lem in a complex logistic network. A typical logistic network can be defined as G = (P, R, V), in which P, R and V stand for the set of terminals, routes, and vehicles, respectively. More specifically, • Each terminal Pi ∈ P represents a place that can store re- sources and generate corresponding SnD. We denote the initial resources in stock at Pi as C , and (t = 1 · · ·T ) to represent the numbers of stocks, resource St i demands, and resource supplies at different time, respec- tively. • Each route Ri ∈ R is a cycle in the logistic network, consist- ing of a sequence of consecutive terminals {Pi1 , Pi2 , · · · , PiRi }, where Ri is the number of stops on Ri and the next desti- nation of PiRi is Pi1. Each route can intersect with others in the network. • On each route Ri, there is a fixed set of vehicles VRi ⊆ V , each of which, Vj ∈ VRi , yields an initial position, a duration function dj(Pu , Pv) : P × P → N + (mapping from an origin terminal Pu and a destination one Pv into the transit time), a capacity Capt (the maximum number of resources it can j convey). When a vehicle arrives at a terminal, it can either load resources from or discharge its resources to the terminal. The objective of resource balancing is to minimize the resource shortage among all terminals. At a specific time t, the terminal can only use the stock in the last day, i.e, Ct−1 , to fulfill the current . 1 Once the stock is not enough, the shortage happens. demand Dt i Thus, we denote the number of shortage as Lt i Accordingly, the objective of resource balancing is to minimize the i − Ct−1 Dt total resource shortage: L = i −V After the current demand is processed, new resource supplies and those discharged from the vehicle will be added to the stock, thus we can compute the new stock amount as Ct + i j ∈ N denotes the number of resources St loaded onto vehicle Vj at time t. xt can be negative to denote the j discharged amount of resources from the vehicle, and I(i, j, t) is a indicator variable defined as (cid:26)1, Vj arrives at Pi at time slot t j=1 I(i, j, t)xt = max(cid:16) = max(cid:16) , 0(cid:17) i , 0(cid:17) Pi ∈P,t ∈T Lt i , where xt Ct−1 i − Dt i . i . j I(i, j, t) = We further define Ct time slot t, and clearly, Ct V , j 0, otherwise. as the amount of resources on vehicle Vj at V , j = Ct−1 V , j + xt j . 4 COOPERATIVE MULTI-AGENT REINFORCEMENT LEARNING FRAMEWORK As aforementioned, traditional solutions for resource balancing employ combinatorial optimization with SnD forecasting. However, 1This is because new supplies and discharged resources at time t are usually un- available temporarily for realistic reasons, such as inner terminal transportation and maintenance. This logic can change with specific application scenarios, and will not affect our framework. it suffers from failures in front of uncertainty of SnD, complex busi- ness constraints, and high complexity of transportation networks. To address these challenges, in this section, we first model the re- source balancing in complex logistic network as a stochastic game and then propose a novel cooperative multi-agent reinforcement learning (MARL) framework to solve it. 4.1 Resource Balancing as a Stochastic Game The resource balancing problem can be formally modeled as a stochastic game G = (N , A,S, R, P, γ), where N is the agent set, A is the joint action space, S is the state set, R is the reward function, P is the transition probability function, and γ is the discount factor. More formally definitions are shown below: Agent set N . We define each vehicle as an agent, which yields two major advantages: (1) As each vehicle agent continuously sails circularly along the certain route, it can be aware of the larger scope of information within the whole route such that optimizing towards maximizing its own reward, i.e., minimizing the shortage, can benefit the total reward of the entire route. (2) Since multiple vehicle agents navigating along the same route usually share the similar environment, it is natural for them to share the same policy so as to significantly reduce the model complexity in MARL and boost the learning process. Joint action space A. We define the action of a vehicle agent Vj as loading or discharging resources when it arrives at a terminal Pi. Similar to Menda et al. [14], we apply the idea of event-driven reinforcement learning. To be more concrete, we treat agents' each arrival at a terminal as a trigger event, and an agent only needs to take action once a trigger event happens. Under this event-driven to denote the action taken by agent Nj ∈ N at t-th setting, we use at j arrival event. For agent Nj, we define its action space as Aj = [−1, 1], resources where at from the vehicle, at resources = 0 means no loading or discharging. Then, onto the vehicle, and at j the joint action space is A = A1 × A2 × · · · × AN , where N is the number of agents. The total amount of resources that can be discharged or loaded at t is usually restrictively determined by the dynamic values of Ct as well as some other external i factors, which are controlled by domain-specific business logics. State set S. The state S is a finite set that stands for all possible situations of the whole logistics network. Note that, from a practical point of view, it is not necessary for the agents to take action based on the whole state information, due to the extremely large state space and the potential noise introduced by unrelated information. We will elaborate more on the practical state design later in this section. Rewards function R. The objective of the resource balancing problem is to minimize the accumulated shortage for all terminals. With respect to each individual action, i.e., loading or discharg- ing some resources at a terminal, the impact can be spread to its follow-up periods. To model such delayed reward, it usually lever- ages rewards shaping to guide the learning process [16], a typical specification of which is to measure the difference of the ultimate accumulated shortage between with and without this action. How- ever, this reward is very hard to compute in practice. Thus, we find j ∈ [−1, 0) means discharging a portion of at j ∈ (0, 1] means loading a portion of at , Capt i , Ct V , j j j (cid:16) C i , · · · 1 • Current available resources C • Historical information of available resources ϕ tk i . (cid:17) and shortages ψ i , · · · , L 1 L tk−1 i tk−1 i , C (cid:17). (cid:16) tk berth length, etc. • Other domain-specific information, such as terminal ID, where ϕ(·) and ψ(·) denote some statistical function (Mean, Me- dian, etc.) or more advanced sequential data processing models (CNN, RNN, etc.). Specific implementation should depend on the application scenario. (cid:104) tk V , j j − C cle type, etc. for vehicle Vj can be comprised of: . tk j (cid:105) for self awareness agents. The self awareness agents State s • Current available resources onboard C • Available space Cap • Other domain-specific information, such as vehicle ID, vehi- Concatenating the above information, we get the state sI = tk P,i , s only concerns if shortage happens between tk and t′ k ≥ tk stands for the time of next vehicle's arrival at Pi. Besides, inspired by the idea of safety stock in traditional methods, we add a small positive reward if no shortage happens. This reward is calculated according to a function f : N → R that has diminishing marginal gain2. The purpose is to encourage the agents to put some safety stock with upper limit on terminals. In summary, the reward can be written as follows: where t′ tk V , j . tk j k s where д : N → R is the loss defined on the total shortage. 4.2.2 Territorial Awareness. According to the problem defini- tion, a vehicle needs to navigate along with the certain route and is obliged to balance the SnD within its own territory, i.e., the ter- minals in its route. Apparently, each agent with self awareness, with no consideration on other terminals and vehicles in its route, cannot balance the resources SnD within its route. Thus, we intro- duce territorial awareness agent to minimize the total shortage of all terminals in the route. Specifically, for an agent Vj on route Rq, we hope the agent to get the accurate information of neighboring environment on the route, which is more likely to influence the current decision. We add extra successive information as follows: • Information about n successive terminals {s where Sci, j(n) is the set of n terminals to which vehicle Vj will travel after terminal Pi. • Information about m future vehicles {s where Fui, j(m) stands for the set of m vehicles that will arrive at Pi just after Vj's arrival. As we can see, the larger n and m are, the more information can be used for decision. However, in practice, we usually set small values for n and m to control the model complexity and noise introduced by unimportant information. To compensate the potential information loss, we introduce the overall statistical territory information s tk R,q for route Rq: T ,i′Pi′ ∈ Sci, j(n)(cid:9) V , j′Vj′ ∈ Fui, j(m)(cid:9) tk tk 2For example, f (x) =x i =0 β i for 0 < β < 1. (cid:18) t′ k i C (cid:19) k − д(cid:169)(cid:173)(cid:173)(cid:171) t′ t =tk (cid:170)(cid:174)(cid:174)(cid:172) , Lt i rI = f (1) Figure 1: Illustration of three levels of cooperative metrics. (a) Self awareness agent V only consider information of (P, V) to make decision. (b) Territorial agent V1 will make decision based on information within its territory. It could load more resources at arrival port P2 with the awareness that port P4 on its route R has low stock. (c) Agent V1 with diplomatic awareness can look far beyond its route. It could load more resources at current port P2 and discharge them at transshipment port P3 or P4 later with the awareness that port P6 on its neighboring route R2 needs support. other more realistic rewards shaping methods, which will also be discussed later in this section. Transition probability function P. It is defined as a mapping S × A × S → [0, 1], which can be specified by the definition of S, R, V and the distribution behind SnD within particular logistics networks. 4.2 Cooperative Metrics for State and Reward Design After formulating the resource balancing problem as a stochastic game, applying MARL approach to the real world, however, requires a dedicated design on the game state and the action's reward to pro- mote cooperation and improve performance. Based on the scope of agents' awareness of cooperation, we identify three levels of coop- erative metrics: self awareness, territorial awareness, and diplomatic awareness. In general, agents with self awareness are fully selfish and shortsighted and only consider immediate information and interests; agents with territorial awareness have a broader vision and make decision based on information belonging to their terri- tories, i.e., routes in this problem. At last, agents with diplomatic awareness even overlook beyond their own routes and conduct resource balancing, in a diplomatic way, by cooperating with in- tersecting routes so that resources can flow from fertile routes to barren routes. 4.2.1 Self Awareness. When agent Vj arrives at terminal Pi, it is natural that Vj makes decisions just based on the information of itself and Pi. Regarding the reward of this action, a straightforward metric is to consider whether shortages will happen before next vehicle's arrival at Pi. Obviously, this is a very shortsighted agent. Suppose the time of k-th arrival event of a vehicle agent Vj is tk for terminal Pi can be and the arrival terminal is Pi. The state s formed up by: tk P,i PVP2V1P3P4RP2V1P3P4R1V3P5R2P1V2(a) Self Awareness(b) Territorial Awareness(c) Diplomatic AwarenessP1V2PVRTerminalVehicleResourceStockRouteCurrent EventP6 • Information of available resources in all the terminals in the • Information of shortage in all the terminals in the route (cid:16)(cid:110) route Φ C tk i (cid:16)(cid:110) (cid:16) Ψ ψ Pi ∈ Rq tk−1 i i , · · · , L 1 L (cid:111)(cid:17) (cid:17) Pi ∈ Rq (cid:111)(cid:17) Similar as ϕ(·) and ψ(·), Φ(·) and Ψ(·) are statistical functions or models based on series data. We concatenate all information above with sI to get the territorial state sT . Territorial awareness agents will make decision based on the state sT . 4.2.3 Diplomatic Awareness. In real logistics networks, imbal- ance can also happen among different routes: there may be a large amount of supplies but very few demands on some routes, while some other routes may be opposite, with a large amount of de- mands that cannot be satisfied with limited supplies. In this case, it is infructuous to attempt balancing SnD within the territory of sin- gle route. To solve this problem substantially, agents should learn the diplomacy: solving imbalance collaboratively with agents in intersecting routes. s tk (cid:16)(cid:110) (cid:16)(cid:110) (cid:111)(cid:17) (cid:111)(cid:17) where Rti is the To this end, more information about neighboring routes should be considered. Assume an event (Pi, Vj, Rq), and denote Crq as the crossing routes having common terminal(s) with route Rq. First, R,pRp ∈ Crq statistic information for all neighboring routes Φr should be involved to represent the general status of crossing routes. Moreover, we add additional information when agents arrive at transfer terminals, that is Φn set of routes that pass through terminal Pi. We concatenate all information above with sT as the diplomatic state sD. To encourage cooperation, we extend the reward by considering cross routes shortage. For an agent Vj on a route Rq, its action not only influences the reward on its own route, but also influences the reward of agents in the neighboring routes in Crq, especially on the transfer terminals where routes are intersecting. To take neighboring routes into consideration, we use rD = αrI +(1− α)rC, where α is a soft hyper-parameter and R,pRp ∈ Rti tk s (cid:18) (cid:18)(cid:26) − д(cid:0)ξ2(cid:0)(cid:8)Lt t′ k i ξ1 C rC =f (cid:27)(cid:19)(cid:19) Pi ∈ Rp, Rp ∈ Crq i tk ≤ t ≤ t′ k, Pi ∈ Rp, Rp ∈ Crq (cid:9)(cid:1)(cid:1) , for statistical functions or advanced models ξ1(·) and ξ2(·). The three levels of cooperative metrics are illustrated in Fig- ure 1. The whole cooperative MARL framework for resource bal- ancing is shown in Algorithm 1. From Line 4 to 13, the agents interact with environment by function calls, and collect transition experiences. It should be emphasized that GetState(cid:16) triggered. GetDelayedReward(cid:16) Sj,k , Pi , Vj refers to the process of constructing state based on current event (Pi , Vj) and global environment snapshot Sj,k. This snapshot con- tains complete information of the environment when the event is (cid:17) (cid:17) refers to the process to calculate the delayed reward based on shortage happens between these two snapshots. The detail implementation of GetState(·) and GetDelayedReward(·) will be determined based on the adopted level of cooperative metric. Sj,k−1, Sj,k each agent Vj Algorithm 1 Cooperative MARL Framework 1: Initialize replay memory Dj to capacity M for each agent Vj 2: Initialize action-value function Qj with random weights θj for 3: for episode ← 1 to MAX do 4: 5: while environment is not terminated do 6: 7: 8: ResetEnvironment() // k means the k-th event of agent Vj (Pi , Vj , k) ← WaitingEvent() Sj,k ← GetEnvironmentSnapshot() (cid:17) sk ← GetState(cid:16) rk−1 ← GetDelayedReward(cid:16) (cid:17) StoreExperience(cid:0)Dj ,(sk−1, ak−1, rk−1, sk)(cid:1) ak ← ϵ-Greedy(cid:0)arg maxa Qj(sk , a)(cid:1) Sj,k−1, Sj,k Sj,k , Pi , Vj Execute(Pi , Vj , ak) end while for l ← 1 to MAX-TRAIN do for each Vj in V do Sample a batch of data (s, a, r , s′) from Dj Compute target y ← r + γ maxa′ Qj(s′, a′; θj) Update Q-network for agent Vj as θj ← θj − ∇θj(y − Qj(s, a; θj))2 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: end for 20: 21: 22: end for end for 5 EXPERIMENTS To evaluate the effectiveness of our proposed approach, we conduct experiments on resource balancing in the scenario of ocean con- tainer transportation. In this task, the resource balancing mainly corresponds to Empty Container Repositioning (ECR). In the fol- lowing of this section, we will first introduce the background of ECR, then we will show the experimental results on a part of real ocean logistics network. 5.1 The ECR Problem As containers are the most important asset in ocean logistics in- dustry, the resource balancing in this scenario corresponds to ECR, which is quite necessary since the SnD of empty containers are very unequal due to the world trade imbalance [20]. In particular, the goal of ECR is to reposition empty containers by container vessels sailing on pre-determined routes within ocean logistics networks to fulfill the dynamic transportation demand of ports. According to Asariotis et al. [1], the estimated cost of seaborne empty container repositioning was about 20 billion dollars in 2009, with 50 million empty containers movement, which has demonstrated the necessity to optimize ECR in ocean logistics industry. More formally, ports, container vessels, and predetermined routes for vessels correspond to terminals P, vehicles V , and routes R, respectively. External de- mands and supplies of empty containers for port Pi at time slot t correspond to Dt i , respectively. and St i 5.1.1 Domain-specific Features of the ECR Problem. Nonethe- less, there are several domain-specific feature for the ECR problem. Figure 2: The container transportation chain in ECR problem. Blue lines indicate laden container flows and green lines indicate empty container flows. All flows are under the control of specific business logics in real logistics scenarios. and St i In ECR problem, the external demands and supplies Dt are i determined by transportation orders O, which are also external and dynamic. An order o ∈ O is a tuple (Pu , Pv , n, to), which denotes departure port, destination port, amount of needed containers and order time. The container transportation chain for orders can be described as follows, also illustrated in Figure 2: when an order (Pu , Pv , n, to) is placed at time slot to, the external demand of depar- ture port D u will be added by n, which means Pu need to provide to n empty containers to fulfill the order at time slot to. If the order is fulfilled, cargoes will be loaded into these empty containers, and they are transformed to laden containers waiting for vessels to transport them to destination port Pv. Laden containers will be lifted on the arriving vessel Vj on route Rk if Pv ∈ Rk.3 When the laden containers are discharged to the destination port Pv at time slot t′ o, the cargoes in laden containers will be unloaded and these containers will be returned to Pv as empty containers at time slot t′ o + tret, in which tret is a constant. Therefore, the external supply of destination port S will be added by n. To summarize, the specification of ECR problem is concluded as follows: • Empty containers are reusable, which will circulate between • Laden containers and empty containers share the same ves- sel. i.e., the space for empty containers Capt for vessel Vj j will change dynamically depending on the amount of laden containers on the vessel; • The whole order will fail if not enough empty containers can be served from departure port when the order is placed. The resource shortage Lo for a single order o is defined as Lo = n, when n > C u , and Lo = 0 for otherwise. to ports as receptacles for cargoes; t′ o +tret v corresponds to the state change of containers, i.e. from empty to laden and vice versa. To build constraints fully representing the SnD balance, the OR-based method must consider the state changes of containers. However, this is quite difficult in real world, because these state changes are completely controlled by business operators and yield quite different rules according to different customers and regions. As a blackbox in the ECR problem, such business logic thus cannot be exactly modeled by traditional OR-based methods. In the real world of container transportation, there are more business logics, e.g., regional policy regulation, which are in fact hard to be modeled by OR-based methods. To leverage OR-based methods, we have to relax corresponding constraints and take an approximation approach in the baseline algorithms, including: • The transportation of empty and laden are decoupled. The state changes of containers are pre-determined rather than dynamically decided by business logic (nonlinear and even black-boxed in real scene), leading to simplified SnD predic- tion in OR model by decomposing future order information. • The atomicity of one order is not preserved. In our running example, the whole order will fail if the amount of remaining empty containers is not sufficient, even if the gap is very small. In OR models, this property cannot be guaranteed since orders are decomposed into SnD. vessels. 5.2 Experimental Setting In the following experiments, we extract a main ocean transporta- tion network among Asia, North America and Europe based on the real world service loops of a commercial company. This network consists of 4 route, 17 ports and 31 vessels. The routes are listed as follows and illustrated in Figure 3: • R1: Pacific Atlantic route, 94 days with 14 vessels. • R2: Central Asia to Southeast Asia route, 60 days with 9 • R3: Japan to America route, 33 days with 5 vessels. • R4: Japan-China-Singapore route, 19 days with 3 vessels. The vessels are uniformly distributed with a interval around one week in their routes. Initially, there are 3000 empty contain- ers distributed in the 17 ports based on historical statistic from a commercial ocean logistics company, and all vessels are empty without any laden or empty containers. The distribution of SnD of all 17 ports in the simulated environment is shown in Figure 4 based on information provided by the same company. Every vessel has a capacity of 200 containers. i.e., the total amount of laden and empty containers cannot exceed 200 for every vessel. To assist the training of our cooperative MARL approach, we build a simulated 5.1.2 Difficulties of the ECR Problem with OR-based Methods. The first difficulty of OR-based methods for ECR is brought by the uncertainty of future SnD forecasts. As aforementioned, such uncertainty is mainly caused by multiple external dynamic factors, such as market changes, and will be even aggravated by the inherent mutual dependency between the OR-based model and future SnD forecast. Since typical OR-based methods generate action plans based on future SnD forecasts for a long time span, the severe uncertainty of long-term forecasts and ignorance of the inherent mutual dependency between OR and SnD forecast will lead to poor performance of OR-based methods. The second major difficulty is caused by the certain business logic in the container transportation chain. A typical and impor- tant business logic that is hard to model by OR-based methods 3Without loss of generality, we only deal with non-transshipment order, that is we suppose Pu and Pv are always within one route. A transshipment order can be viewed as multiple separated non-transshipment orders. Port BPort BPort APort ACargoes load into containersLaden containers load to vesselLaden containers discharge from vesselCargoes unload from containersEmpty containersEmpty containersConsumeTransportReturnEmpty Container RepositioningOrder placementCargoes receivedConsignerDepotDepotConsignee (cid:3) by loading or discharging containers. For- i , F e i mally, suppose xt is the number containers loading from Pi i, j (negative value means discharging to this port), it satisfies i − F e i − C t i , Capt i , C t j − C t V , j), min(C t − min(F s 0, V , j, C t i ), C t i > F e i , C t i < F s i , otherwise. the range(cid:2)F s  x t i, j = Figure 3: The extracted ocean transportation network among Asia, North America and Europe. Figure 4: The distribution of demand and supply of all 17 ports in the environment. ECR environment based on real historical data from the commercial ocean logistics company. To measure the performance of our approach, we use the metric of fulfillment ratio, which is defined as the ratio of total successfully fulfilled containers compared to all containers requested in one episode (400 time steps, where one time step corresponds to one day). In real-world, there are many other types of cost for container repositioning, including loading/discharging cost, storage cost, etc. Among all of them, however, the cost of shortage, measured by the fulfillment ratio, is the dominant one since it will directly af- fect the booking acceptance and consequently the transportation company's reputation. Therefore, we focus on minimizing the cost of shortage in this work. Indeed, other types of cost can also be naturally captured by MARL through rewards shaping and specific action space design, which will be one of our future targets. 5.3 Compared Methods In the following experiments, we compare the following methods on the ECR problem: • No Reposition: Empty containers are never repositioned. The flow of containers will only depends on the laden con- tainer transportation. • Rule-Based Inventory Control (IC). With the idea in in- ventory management theory, this method sets two inven- and excess threshold F e tory thresholds, safety threshold F s i i i ≤ F e (F s ), for each port Pi based on the historical informa- tion of SnD respectively. When a vessel Vj arrives at Pi at time slot t, it will try to maintain the stock Ct located in i i • Online Linear Programming (LP). With some approxi- mation approaches mentioned above, ECR problem can be modeled in linear programming (LP) by adopting the mathe- matical definitions in problem statement section. However, it is hard to apply the solution directly due to the gap caused by simplified model. Here, we apply rolling horizon policy described in Long et al. [12] to solve the problem: empty repo- sition plan are generated for a long period on the planning horizon based on LP model with forecasting information for this period, but only partial planning at the beginning are executed. Repeat this procedure until termination. This is the so called online LP method. Note that, our proposed end-to- end MARL method directly interacts with the simulator with no explicit forecasting stage, therefore, for the purpose of appropriate comparison, we use exact future order informa- tion to replace the forecasted future demand in the LP model so as to eliminate the effects of external factors leading to uncertain forecasts, which can be seen as a relatively ideal condition. More details about the online LP can be found in the appendix. • Online LP with Inventory Control. In this baseline, we adopt the idea from Epstein et al. [5] which combines LP model with inventory control. This method sets a safety for each port Pi based on the historical informa- threshold F s i − F s tion of SnD, and then constrains Lt i • Self Awareness MARL (SA-MARL). This is the MARL model described in the previous section with self aware- , ϕ(·) is an average ness agents. For terminal (port) state s function while ψ(·) is a sum function. For vehicle (vessel) state s , we add amount of laden containers onboard as ad- ditional domain-specific information. As for reward, we set f (x) = 1 − 0.5x and д(y) = 5y, where x and y are calculated as in Equation (1). • Territorial Awareness MARL (TA-MARL). This is the MARL model with territorial awareness agents. For succes- sive terminal information, both m and n are set to 1. Φ(·) and Ψ(·) in s • Diplomatic Awareness MARL (DA-MARL). This is the MARL model described in previous session with diplomatic awareness agents. Φr(·) and Φn(·) are set to be average func- tions with α = 0.5. Both ξ1(·) and ξ2(·) are 2-layer average are set to be average functions. = max(cid:16) i − (Ct−1 Dt functions Avg{Avg{t′ • Offline Optimal LP (Upper Bound). In this case, the short- age will be directly calculated as objective by LP model men- tioned above, which has the knowledge of all orders in ad- vance, without implementation in simulated environment. This can be seen as an upper bound for the problem. i.e., it i Pi ∈ Rp}Rp ∈ Crq}. Lt k t =tk tk R,q tk V ,i tk P,i i ), 0(cid:17). i ShanghaiNingboYantianShekouThailandSingaporeArabHong KongTaiwanTokyoKobeYokohamaOaklandLos AngelesSavannahNew YorkEUR1 (Pacific Atlantic route)R2 (Central Asia to Southeast Asia route)R3 (Japan to America route)R4 (Japan-China-Singapore route)Mainland ChinaMainland ChinaJapanJapanAmericaAmericaOthersOthers0200040006000800010000Total Containers in Order (Demand)Imported Laden Containers (Supply) Table 1: Performance comparison with different baselines. Method Fulfillment Ratio (%) 80% Container 100% Container 150% Container 29.87 ± 0.85 26.58 ± 0.90 38.25 ± 1.07 No Reposition 61.07 ± 0.98 68.63 ± 0.98 58.30 ± 0.93 IC 85.75 ± 1.34 94.48 ± 1.00 76.28 ± 1.54 Online LP 88.99 ± 0.89 Online LP with IC 81.09 ± 1.21 96.30 ± 0.80 72.04 ± 1.57 65.39 ± 1.20 84.21 ± 1.45 SA-MARL 93.75 ± 0.69 75.25 ± 1.38 83.48 ± 0.94 TA-MARL 97.70 ± 0.98 82.04 ± 1.69 95.97 ± 0.63 DA-MARL Offline LP 98.32 ± 0.60 98.95 ± 0.31 99.42 ± 0.25 (Upper Bound) Table 2: Performance comparison with different delay pa- rameter k in DA-MARL k 1 5 10 15 Fulfillment Ratio 95.87 ± 0.65 95.76 ± 0.67 95.49 ± 0.65 94.71 ± 0.93 k 20 30 40 50 Fulfillment Ratio 94.52 ± 0.89 93.23 ± 1.76 90.39 ± 2.50 85.87 ± 3.23 is not likely for any methods to achieve better performance than this. All MARL methods are trained 10000 episodes with ϵ-greedy exploration. The ϵ is annealed linearly from 0.5 to 0.01 across the first 8000 episodes, and fixed at 0.01 in the rest episodes. We use Adam Optimizer with a learning rate of 10−4. Batch size is fixed to 32. All agents in the same route share the same Q-network, and each Q-network is parameterized by a 2-layer MLP with node size of 16 and 16, activated by ReLU. Since DQN works on discrete action space, we discretize the continuous action space Ai = [−1, 1] uniformly by 21 actions, that is A′ i = {−1,−0.9, · · · , 0.9, 1}. 5.4 Results Analysis To compare all the methods aforementioned, we run our trained models and baseline methods in 100 randomly initialized environ- ments. For baseline methods, we run grid search to find suitable parameters. To test the robustness of the learned policy in our framework, we also evaluate the model trained under 100% (3000) empty containers setting by changing the total amount of con- tainers to 80% (2400 containers) and 150% (4500 containers). The results are summarized in Table 1, in which we report the mean and standard deviations of the fulfillment ratios. As we can see, DA- MARL method achieves the best performance in all initial container settings. Even TA-MARL method is comparable with traditional online LP method. The SA-MARL achieves the poorest performance among our MARL methods, while it is still better than rule-based inventory control. The testing of robustness shows that agents have learned efficient policies to deal with dramatic environment changes. The trained DA-MARL model still performs better than the online LP and its IC version, which in fact are built on changed environments. The convergence comparison of MARL methods are shown in Figure 5a. Each MARL method is trained for 10 times, and we report the mean and standard deviation of performance during training. As we can see, all MARL methods converge very quickly at first 1000 episodes. After that, DA-MARL will get a much larger improvement than the others. In Diplomatic Awareness MARL, α is an important parameter to control the proportion between territorial reward and diplomatic reward. We train the model with different α and the results are shown in Figure 5b. Every model is trained for 5 times due to time limitation, and every trained model is tested for 100 times. The result shows that neither rI alone (α = 1) nor rC alone (α = 0) performs well alone, and a combination (α = 0.4 in our case) of them is essential to achieve better performance. Communication is a crucial part to build up cooperation in MAS, and in our Diplomatic Awareness MARL design, shared information Φr(·) and Φn(·) about neighboring routes and transshipment routes is required to achieve high performance. However, it is possible that these information cannot be transferred in real-time in realistic scenario, i.e., agents can only have access to an outdated version of these information. Table 2 shows the fulfillment ratio when all agents can only access these information of k days ago. The result shows that our proposed method performs robustly without significant loss when the delay is in a reasonable range, i.e., k ≤ 20. (a) (b) Figure 5: (a) Convergence comparison of MARL methods. The X-axis is number of episodes. (b) Performance compar- ison with different α in Diplomatic Awareness MARL. The X-axis is α. The Y-axis is fulfillment ratio in both figures. 5.5 Cooperation Ability Analysis The major objective of ECR is to balance the SnD so that the short- age costs of deficit ports are minimized. Figure 6a shows the amount of imported empty containers of Shekou and Thailand, two major ports that are deficient of empty containers, by different methods. From Figure 3, Thailand is the next ports of a surplus port Singapore on route R2, which means it is not hard to obtain empty containers without complicated cooperative mechanism. For Shekou, the sitia- tion is much more severe as it need more containers than Thailand (shown in Figure 4) while the only supply port, Singapore, in route R4 doesn't have enough containers to supply Shekou. The only way that demand of Shekou can be sufficiently fulfilled is to use Tokyo and Kobe as transshipment ports to transport empty containers      %7,33584/08        :12039#,94$ #% # # 0.20.30.40.50.60.70.80.91.0 0.50.60.70.80.91.0:12039#,94 from America regions, which requires strong ability of cooperation between regions. Figure 6a shows that all the three MARL methods performs well on Thailand, while Diplomatic Awareness MARL out- performs all other methods on Shekou, indicating that our design is capable to fulfill the demand that requires inter-route cooperation. For inter-route cooperation, the amount of exported empty con- tainers at transshipment port is essential, since it is the source from which deficient ports such as Shekou obtain empty containers. Figure 6b shows the amount of exported empty containers of Singa- pore, Tokyo and Kobe, which are three major transshipment ports between different routes in our setting. It shows that the amount of exported empty containers at transshipment ports significantly increases with more cooperative awareness of MARL agent, which indicates that our cooperative design is effective. Online LP method with its IC version can also perform well on transshipment ports since they are globally optimized. However, the gap between LP models and environment confines their overall performance. (a) (b) Figure 6: (a) Imported empty containers of Shekou and Thai- land, two major ports that are deficient of empty containers, by different methods. (b) Exported empty containers of Sin- gapore, Tokyo and Kobe, three major transshipment ports between different routes, by different methods. "No Reposi- tion" method is omitted since it won't import or export any empty containers. 6 CONCLUSION In this paper, we first formulate the resource balancing problem in logistics networks as a stochastic game. Given this setting, we propose a cooperative multi-agent reinforcement learning frame- work, in which three levels of cooperative metrics are identified based on the scope of agents' awareness of cooperation, which promote efficient and cost-effective transportation. Extensive ex- periments on a simulated ocean transportation service demonstrate that our new approach can stimulate the cooperation among agents and give rise to a significant improvement in terms of both perfor- mance and stability. In future, we will integrate more types of cost, such as transport cost and inventory cost in real logistic scenarios, into a unified objective to optimize. Moreover, we will investigate more advanced RL techniques to achieve a more precise control of actions. ACKNOWLEDGEMENT We sincerely appreciate Ryan Ho, Johnson Lui, Karab Sze, Jeffrey Ko, Simon Choi, Tony Y Li, Apple Ng, Terry Tam and Wyatt Lei from Orient Overseas Container Line for their great support on this work. A APPENDIX A.1 Linear Programming Model for the ECR Problem The linear programming is given by:  min Pi ∈P,t ∈Event(Pi) Subject to Ct P,i = C i − i + St prev(P,i,t) P,i − Dt prev(P,i,k) P,i , i − C i ≥ Dt Lt i ≥ 0, Lt for Pi ∈ P, t ∈ Event(Pi); Ct + xt j , V , j 0 ≤ Ct for Vj ∈ V , t ∈ Event(Vj); prev(V , j,t) = C V , j V , j ≤ Capt j , Lt i V  j=1 I(i, j, t)xt j , (2) (3) (4) (5) (6) (7) and supply St i Event(·) denotes the set of time slot that an event is predicted to be triggered for the argument, which can be inferred by V , R and duration function dj(·, ·). Indicator function I(i, j, t) can be inferred by similar manner. prev(P, i, t) (prev(V , j, t)) denotes the previous time slot that an event is triggered on a port Pi (vessel Vj). External for each port Pi ∈ P are provided by demand Dt i external forecast model. In ECR problem, Capt will dynamically j change according to the amount of laden containers in Vj at time slot t. For order-based forecast model, i.e., the model forecasts future order set O first and calculates predicted Dt based on O, i can be also computed based on O with the assumption that Capt j all the external demand Dt can be fulfilled (so that the amount of i laden containers for each vessel at each time slot can be estimated). The LR model is solved by GNU Linear Programming Kit (GLPK) as integer programming. and St i A.2 Details of Simulated ECR Environment A.2.1 Route Schedule. The schedule of each route is shown in Table 3, Table 4, Table 5 and Table 6 respectively based on infor- mation provided by the same commercial company mentioned in experiment section. All the routes are cycled. To achieve uniform distribution of vessels in each route, vessels are not required to berth in certain port when the environment is initialized. A.2.2 Business Logic of Port-Vessel Interaction. When an event (Pi , Vj) is triggered, i.e., a vessel Vj (on route Rk) arrives at a port Pi, our simulated environment follows a 4-stage business logic to execute action a ∈ [−1, 1]: (1) Laden container discharge: all laden containers on Vj with destination port Pi are discharged from the vessel. Notices due to the decrease of laden that Capt j containers in the vessel; V , j] empty (2) (if a < 0) Empty container discharge: [−a ∗ Ct containers on Vj are discharged from the vessel; will increase to Cap′t j 02000400060008000ShekouThailandImported Empty ContainersICOnline LPOnline LP with ICSA-MARLTA-MARLDA-MARL0200040006000SingaporeTokyoKobeExported Empty ContainersICOnline LPOnline LP with ICSA-MARLTA-MARLDA-MARL Table 3: Route schedule of R1 Table 6: Route schedule of R4 Region/City Port STN Europe Union NYC New York SAV Sawannah LAS Los Angeles OAK Oakland YOK Yokohama SHA Shanghai KOY TKY OAK Oakland Los Angeles LAS SAV Sawannah NYC New York STN Europe Union Kobe Tokyo Transit day - 15 18 31 32 44 47 51 52 67 68 82 85 94 Table 4: Route schedule of R2 Region/City Transit day Arab Singapore Thailand Yantian Los Angeles Port JEB SIN LCB YAT LAS OAK Oakland SHA Shanghai NIN YAT SIN JEB Ningbo Yantian Singapore Arab - 3 6 9 26 28 43 44 46 51 60 - 3 17 18 31 33 Table 5: Route schedule of R3 Region/City Transit day Kobe Tokyo Los Angeles Port KOY TKY LAS OAK Oakland TKY KOY Tokyo Kobe (3) Laden container loading: laden containers in Pi with des- tination port in Rk are loaded into the vessel as much as possible with the order of received date. Laden containers in the same order can be separately transported. Similarly, Cap′t due to the increase of laden j containers in the vessel; j − (4) (if a > 0) Empty container loading: [a ∗ min(Cap′′t P,i)] empty containers are loaded into the vessel. will decrease to Cap′′t j Ct V , j , Ct Region/City Transit day Tokyo Kobe Port TKY KOY KHH Taiwan HKG Hong Kong SKZ SIN SKZ HKG Hong Kong KHH Taiwan TKY Tokyo Shekou Singapore Shekou - 2 5 6 7 11 14 15 16 19 Here [·] denotes the nearest integer function. In this business logic, laden container transportation has priority over empty con- tainer repositioning, which conforms real-world scenario in ocean container transport logistics. A.3 Regional Statistics The regional statistics of seven methods in experiment part are listed in Table 7, 8, 9, 10, 11, 12, 13 respectively. All methods are tested 100 times and we report the average in the tables. REFERENCES [1] Regina Asariotis, Hassiba Benamara, Hannes Finkenbrink, Jan Hoffmann, Jennifer Lavelle, Maria Misovicova, Vincent Valentine, and Frida Youssef. 2011. Review of Maritime Transport, 2011. Technical Report. [2] Teodor Gabriel Crainic and Gilbert Laporte. 1997. Planning models for freight transportation. European journal of operational research 97, 3 (1997), 409 -- 438. [3] Sam Devlin and Daniel Kudenko. 2011. Theoretical Considerations of Potential- based Reward Shaping for Multi-agent Systems. In The 10th International Con- ference on Autonomous Agents and Multiagent Systems - Volume 1 (AAMAS '11). International Foundation for Autonomous Agents and Multiagent Systems, Rich- land, SC, 225 -- 232. http://dl.acm.org/citation.cfm?id=2030470.2030503 [4] Sam Devlin, Logan Yliniemi, Daniel Kudenko, and Kagan Tumer. 2014. Potential- based Difference Rewards for Multiagent Reinforcement Learning. In Proceed- ings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems (AAMAS '14). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 165 -- 172. http://dl.acm.org/citation.cfm?id= 2615731.2615761 [5] Rafael Epstein, Andres Neely, Andres Weintraub, Fernando Valenzuela, Sergio Hurtado, Guillermo Gonzalez, Alex Beiza, Mauricio Naveas, Florencio Infante, Fernando Alarcon, Gustavo Angulo, Cristian Berner, Jaime Catalan, Cristian Gonzalez, and Daniel Yung. 2012. A Strategic Empty Container Logistics Op- timization in a Major Shipping Company. Interfaces 42, 1 (Feb. 2012), 5 -- 16. https://doi.org/10.1287/inte.1110.0611 [6] Amy Greenwald and Keith Hall. 2003. Correlated-Q Learning. In Proceedings of the Twentieth International Conference on Machine Learning (ICML'03). AAAI Press, 242 -- 249. http://dl.acm.org/citation.cfm?id=3041838.3041869 [7] Junling Hu and Michael P. Wellman. 2003. Nash Q-learning for General-sum Stochastic Games. J. Mach. Learn. Res. 4 (Dec. 2003), 1039 -- 1069. http://dl.acm. org/citation.cfm?id=945365.964288 [8] Marc Lanctot, Vinicius Zambaldi, Audr¯unas Gruslys, Angeliki Lazaridou, Karl Tuyls, Julien Pérolat, David Silver, and Thore Graepel. 2017. A Unified Game- theoretic Approach to Multiagent Reinforcement Learning. In Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS'17). Curran Associates Inc., USA, 4193 -- 4206. http://dl.acm.org/citation.cfm?id= 3294996.3295174 [9] Jing-An Li, Stephen CH Leung, Yue Wu, and Ke Liu. 2007. Allocation of empty containers between multi-ports. European Journal of Operational Research 182, 1 (2007), 400 -- 412. [10] Kaixiang Lin, Renyu Zhao, Zhe Xu, and Jiayu Zhou. 2018. Efficient Large-Scale Fleet Management via Multi-Agent Deep Reinforcement Learning. ACM Press, 1774 -- 1783. https://doi.org/10.1145/3219819.3219993 [11] Michael L. Littman. 2001. Friend-or-Foe Q-learning in General-Sum Games. In Proceedings of the Eighteenth International Conference on Machine Learning Table 7: Regional Statistic of No Reposition Method Total Containers 400.26 0 0 601.08 8010.75 5008.44 797.06 3991.25 1403.97 2200.88 3010.1 0 199.28 1403.94 1002.21 200.86 1003.48 29 233.56 Failed Containers 0 0 405.24 7124.58 4719.1 0 0 2501.22 944.97 1038.99 1881.84 0 6.12 630.41 534.1 0 505.85 20 292.42 Imported Laden Containers 343.61 136.56 134.25 785.03 109.05 860.58 0 1129.67 296.11 866.4 980.57 289.72 805.74 762.26 457 445.1 279.56 8681.21 Imported Empty Containers 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Exported Laden Containers 400.26 0 195.84 886.17 289.34 797.06 0 1490.03 459 1161.89 1128.26 0 193.16 773.53 468.11 200.86 497.63 8941.14 Exported Empty Containers 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Fulfillment Ratio 1 / / / 0.325 814 0.110 623 0.057 77 1 0.373 324 0.326 93 0.527 921 0.374 825 0.969 289 0.550 971 0.467 078 1 0.495 904 0.299 626 Table 8: Regional Statistic of Inventory Control Method Total Containers 397.12 597.89 8007.37 4994.01 801.94 3998.32 1402.76 2177.95 2969.29 0 0 0 199.29 1397.14 998.67 200.87 994.69 29 137.31 Failed Containers 6.81 0 9.01 6068.76 2303.97 1.28 0 1817.13 671.1 4.2 6.64 0 5.74 41.29 7.9 4.01 48.39 10 996.23 Imported Laden Containers 600.44 208.77 946.32 1321.94 108.97 1602.52 0 2051.84 650.05 1369.37 1526.76 463.89 2225.95 2071.77 883.59 862.88 459.47 17 354.53 Imported Empty Containers 52.13 0 109.82 536.18 2470.64 108.31 0 6.09 47.26 1006.98 1526.89 0 42.91 127.65 275.88 43.47 481.44 6835.65 Exported Laden Containers 390.31 588.88 1938.61 2690.04 800.66 2181.19 731.66 2173.75 2962.65 0 0 0 193.55 1355.85 990.77 196.86 946.3 18 141.08 Exported Empty Containers 589.51 352.35 507.6 0 28.3 1314.41 269 231.21 111.99 431.89 152.97 535.82 2067.45 804.18 131.33 745.36 177.7 8451.07 Fulfillment Ratio 0.982 852 / / / 0.984 93 0.242 103 0.538 653 0.998 404 0.545 527 0.521 586 0.998 072 0.997 764 0.971 198 0.970 447 0.992 089 0.980 037 0.951 352 0.612 14 Region/City Shanghai Ningbo Yantian Shekou Thailand Singapore Arab Hong Kong Taiwan Tokyo Kobe Yokohama Oakland Los Angeles Sawannah New York EU Total Region/City Shanghai Ningbo Yantian Shekou Thailand Singapore Arab Hong Kong Taiwan Tokyo Kobe Yokohama Oakland Los Angeles Sawannah New York EU Total (ICML '01). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 322 -- 328. http://dl.acm.org/citation.cfm?id=645530.655661 [12] Yin Long, Loo Hay Lee, and Ek Peng Chew. 2012. The sample average approxi- mation method for empty container repositioning with uncertainties. European Journal of Operational Research 222, 1 (Oct. 2012), 65 -- 75. https://doi.org/10.1016/ j.ejor.2012.04.018 [13] Patrick Mannion, Jim Duggan, and Enda Howley. 2016. Generating multi-agent potential functions using counterfactual estimates. Proceedings of Learning, Inference and Control of Multi-Agent Systems (at NIPS 2016) (2016). [14] Kunal Menda, Yi-Chun Chen, Justin Grana, James W. Bono, Brendan D. Tracey, Mykel J. Kochenderfer, and David Wolpert. 2017. Deep Reinforcement Learning for Event-Driven Multi-Agent Decision Processes. arXiv:1709.06656 [cs] (Sept. 2017). http://arxiv.org/abs/1709.06656 [15] Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A. Rusu, Joel Veness, Marc G. Bellemare, Alex Graves, Martin Riedmiller, Andreas K. Fidjeland, Georg Ostrovski, Stig Petersen, Charles Beattie, Amir Sadik, Ioannis Antonoglou, Helen King, Dharshan Kumaran, Daan Wierstra, Shane Legg, and Demis Hassabis. 2015. Human-level control through deep reinforcement learning. Nature 518, 7540 (Feb. 2015), 529 -- 533. https://doi.org/10.1038/nature14236 [16] Andrew Y. Ng, Daishi Harada, and Stuart J. Russell. 1999. Policy Invariance Under Reward Transformations: Theory and Application to Reward Shaping. In Proceedings of the Sixteenth International Conference on Machine Learning (ICML '99). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 278 -- 287. http://dl.acm.org/citation.cfm?id=645528.657613 [17] Ling Pan, Qingpeng Cai, Zhixuan Fang, Pingzhong Tang, and Longbo Huang. 2018. Rebalancing Dockless Bike Sharing Systems. arXiv:1802.04592 [cs] (Feb. 2018). http://arxiv.org/abs/1802.04592 arXiv: 1802.04592. [18] Warren B Powell. 1996. Toward a Unified Modeling Framework for Real-Time Logistics Control. Military Operations Research (1996), 69 -- 79. Table 9: Regional Statistic of Online LP Method Failed Containers 14.88 0 158.21 1194.66 1760.6 82.85 0 156.27 101.41 112.21 158.49 0 5.09 49.25 11.4 1.94 143.08 3950.34 Imported Laden Containers 597.56 204.94 1110.7 1663.6 100.3 3172.18 0 3664.9 614.38 2892.28 3196.83 470.02 2231.34 2129.32 840.71 816.29 455.15 24 160.5 Imported Empty Containers 511.27 132.56 362.69 5213.06 3051.04 1992.17 60.54 1011.68 1108.52 1727.29 2769.94 122.06 979.83 1035.11 534.48 152.33 341.7 21 106.27 Exported Laden Containers 382.43 0 440.5 6768.18 3210.48 720.9 0 3826.72 1301.99 2062.85 2816.82 0 194.08 1342.87 989.3 198.9 854.59 25 110.61 Exported Empty Containers 1023.93 470.35 1071.43 142.81 66.81 4842.45 329.54 1164.39 536.47 2765.18 3194.36 624.55 2844.75 1760.18 319.59 759.67 146.09 22 062.55 Fulfillment Ratio 0.962 548 / / / 0.735 749 0.849 971 0.645 831 0.896 921 0.960 766 0.927 74 0.948 411 0.946 732 0.974 444 0.964 622 0.988 608 0.990 341 0.856 586 0.859 485 Total Containers 397.31 598.71 7962.84 4971.08 803.75 3982.99 1403.4 2175.06 2975.31 0 0 0 199.17 1392.12 1000.7 200.84 997.67 29 060.95 Table 10: Regional Statistic of Online LP with IC Method Total Containers 399.33 598.65 7972.27 4936.96 796.67 3981.14 1407.85 2194.04 2969.91 0 0 0 199.22 1396.98 997.87 200.77 989.84 29 041.5 Failed Containers 21.13 0 87.58 677.09 1927.75 87.21 0 1.53 25 21.85 111.72 0 5.01 42.27 8.76 5.5 64.39 3086.79 Imported Laden Containers 606.51 207.5 1029.14 1732.56 99.03 3331.11 0 3896.77 628.13 3093.01 3325.12 465.3 2221.68 2138.31 871.68 852.01 455.31 24 953.17 Imported Empty Containers 569.89 134.47 326.27 5657.99 2832.29 1853.54 26.51 1140.93 1284.43 1740.66 3043.36 109.34 936.29 1026.7 598.89 163.15 408.18 21 852.89 Exported Laden Containers 378.2 0 511.07 7295.18 3009.21 709.46 3979.61 1382.85 2172.19 2858.19 0 0 194.21 1354.71 989.11 195.27 925.45 25 954.71 Exported Empty Containers 1105.43 481.19 877.82 74.89 17.63 4859.85 295.51 1248.01 647.28 2786.07 3536.31 638.74 2814.07 1702.91 421.21 834.53 128.4 22 469.85 Fulfillment Ratio 0.947 086 / / / 0.853 704 0.915 069 0.609 527 0.890 532 0.999 616 0.982 242 0.990 041 0.962 383 0.974 852 0.969 742 0.991 221 0.972 605 0.934 949 0.889 923 Region/City Shanghai Ningbo Yantian Shekou Thailand Singapore Arab Hong Kong Taiwan Tokyo Kobe Yokohama Oakland Los Angeles Sawannah New York EU Total Region/City Shanghai Ningbo Yantian Shekou Thailand Singapore Arab Hongkong Taiwan Tokyo Kobe Yokohama Oakland Los Angeles Sawannah New York EU Total [19] David Silver, Aja Huang, Chris J. Maddison, Arthur Guez, Laurent Sifre, George van den Driessche, Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershel- vam, Marc Lanctot, Sander Dieleman, Dominik Grewe, John Nham, Nal Kalch- brenner, Ilya Sutskever, Timothy Lillicrap, Madeleine Leach, Koray Kavukcuoglu, Thore Graepel, and Demis Hassabis. 2016. Mastering the game of Go with deep neural networks and tree search. Nature 529, 7587 (Jan. 2016), 484 -- 489. https://doi.org/10.1038/nature16961 [20] Dong-Ping Song and Jing-Xin Dong. 2015. Empty Container Repositioning. In Handbook of Ocean Container Transport Logistics. Springer, Cham, 163 -- 208. https://doi.org/10.1007/978-3-319-11891-8_6 [21] UNCTAD. 2017. Review of maritime transport 2017. OCLC: 1022725798. [22] Xiaofeng Wang and Tuomas Sandholm. 2002. Reinforcement Learning to Play an Optimal Nash Equilibrium in Team Markov Games. In Proceedings of the 15th International Conference on Neural Information Processing Systems (NIPS'02). MIT Press, Cambridge, MA, USA, 1603 -- 1610. http://dl.acm.org/citation.cfm?id= 2968618.2968817 [23] Zhe Xu, Zhixin Li, Qingwen Guan, Dingshui Zhang, Qiang Li, Junxiao Nan, Chunyang Liu, Wei Bian, and Jieping Ye. 2018. Large-Scale Order Dispatch in On-Demand Ride-Hailing Platforms: A Learning and Planning Approach. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '18). ACM, New York, NY, USA, 905 -- 913. https: //doi.org/10.1145/3219819.3219824 Table 11: Regional Statistic of Self Awareness MARL Method Total Containers 396.75 595.06 8010.53 4940.34 799.44 3992.99 1405.77 2192.7 2970.62 0 0 0 199.28 1396.48 1006.08 200.75 994.14 29 100.93 Failed Containers 15.46 0 35.19 5979.48 254.41 89.14 0 1133.04 430.5 100.74 180.91 0 7.37 67.75 36.43 1.81 61.25 8393.48 Imported Laden Containers 588.56 204.44 1588.92 1467.91 96.13 1743.24 0 2252.99 604.48 1515.5 1710.44 456.66 2718.49 2731.53 839.19 831.19 449.12 19 798.79 Imported Empty Containers 327.65 25.86 145.66 1101.63 4639.55 1250.79 224.56 710.83 453.21 1663.18 1887.26 10.66 188.76 906.05 450.62 69.71 573.6 14 629.58 Exported Laden Containers 381.29 0 559.87 2031.05 4685.93 710.3 0 2859.95 975.27 2091.96 2789.71 0 191.91 1328.73 969.65 198.94 932.89 20 707.45 Exported Empty Containers 871.11 366.75 1201.87 646.8 87.87 2679.4 491.8 412.74 200.81 1317.72 883.26 531.22 2693.95 2263.86 289.04 731.6 272.27 15 942.07 Fulfillment Ratio 0.961 033 / / / 0.940 863 0.253 548 0.948 504 0.888 497 0.716 243 0.693 762 0.954 057 0.9391 0.963 017 0.951 485 0.963 79 0.990 984 0.938 389 0.702 295 Table 12: Regional Statistic of Territorial Awareness MARL Method Total Containers 400.81 0 597.05 7967.28 4939.66 805.05 0 3997.4 1402.58 2181.59 2969.32 0 199.3 1393.16 998.18 200.76 993.28 29 045.42 Failed Containers 20.7 0 47.7 2248.07 135.07 178.25 0 1045.12 425.2 169.94 234.94 0 5.12 54.74 32.36 0.04 51.05 4648.3 Imported Laden Containers 587.02 206.01 1633.54 1447.38 85.8 2630.17 0 3129.24 605.39 2362.92 2671.21 465.79 2729.45 2726.46 827.99 813.79 452.57 23 374.73 Imported Empty Containers 337.98 30.21 195.44 4352.67 4730.73 659.64 152.09 350.29 506.39 1617.55 1985.45 16.68 226.27 870.76 558.79 124.39 505.77 17 221.1 Exported Laden Containers 380.11 0 549.35 5719.21 4804.59 626.8 0 2952.28 977.38 2011.65 2734.38 0 194.18 1338.42 965.82 200.72 942.23 24 397.12 Exported Empty Containers 885.46 377.1 1306.06 98.23 25.76 3079.51 420.43 868.87 270.44 2208.95 1986.71 542.53 2744.53 2228.29 404.74 772.29 202.39 18 422.29 Fulfillment Ratio 0.948 355 / / / 0.920 107 0.717 837 0.972 656 0.778 585 0.738 55 0.696 844 0.922 103 0.920 878 0.974 31 0.960 708 0.967 581 0.999 801 0.948 605 0.834 133 Region/City Shanghai Ningbo Yantian Shekou Thailand Singapore Arab Hong Kong Taiwan Tokyo Kobe Yokohama Oakland Los Angeles Sawannah New York EU Total Region/City Shanghai Ningbo Yantian Shekou Thailand Singapore Arab Hong Kong Taiwan Tokyo Kobe Yokohama Oakland Los Angeles Sawannah New York EU Total Table 13: Regional Statistic of Diplomatic Awareness MARL Method Region/City Shanghai Ningbo Yantian Shekou Thailand Singapore Arab Hong Kong Taiwan Tokyo Kobe Yokohama Oakland Los Angeles Sawannah New York EU Total Total Containers 398.2 0 596.74 7963.94 4937.34 800.5 0 3994.47 1401.06 2184.47 2975.98 0 199.32 1399.43 1003.12 200.8 995.32 29 050.69 Failed Containers 2.46 0 20.2 383.02 205.8 68.58 0 117.05 47.4 64.91 61.25 0 7.29 44.17 35.03 9.73 67.04 1133.93 Imported Laden Containers 591.15 205.53 1614.78 1704.92 100.41 3395.41 0 3919.51 619.78 3109.54 3380.17 462.15 2766.72 2763.45 887.31 853.98 447.44 26 822.25 Imported Empty Containers 487.31 122.52 240.68 5951.09 4670.81 601.86 216.75 543.61 1025.34 2088.9 2273.1 21.55 449.23 661.21 419.99 67.35 561.59 20 402.89 Exported Laden Containers 395.74 576.54 7580.92 4731.54 731.92 3877.42 1353.66 2119.56 2914.73 0 0 0 192.03 1355.26 968.09 191.07 928.28 27 916.76 Exported Empty Containers 1001.32 469.3 1298.11 11.96 57.05 3674.31 484.96 881.82 405.71 3245.84 2754.09 541.47 2955.57 2028.79 196.33 711.75 202.88 20 921.26 Fulfillment Ratio 0.993 822 / / / 0.966 149 0.951 906 0.958 318 0.914 329 0.970 697 0.966 168 0.970 286 0.979 419 0.963 426 0.968 437 0.965 079 0.951 544 0.932 645 0.959 447
1909.00991
1
1909
2019-09-03T08:07:27
Modelling Bushfire Evacuation Behaviours
[ "cs.MA", "cs.AI" ]
Bushfires pose a significant threat to Australia's regional areas. To minimise risk and increase resilience, communities need robust evacuation strategies that account for people's likely behaviour both before and during a bushfire. Agent-based modelling (ABM) offers a practical way to simulate a range of bushfire evacuation scenarios. However, the ABM should reflect the diversity of possible human responses in a given community. The Belief-Desire-Intention (BDI) cognitive model captures behaviour in a compact representation that is understandable by domain experts. Within a BDI-ABM simulation, individual BDI agents can be assigned profiles that determine their likely behaviour. Over a population of agents their collective behaviour will characterise the community response. These profiles are drawn from existing human behaviour research and consultation with emergency services personnel and capture the expected behaviours of identified groups in the population, both prior to and during an evacuation. A realistic representation of each community can then be formed, and evacuation scenarios within the simulation can be used to explore the possible impact of population structure on outcomes. It is hoped that this will give an improved understanding of the risks associated with evacuation, and lead to tailored evacuation plans for each community to help them prepare for and respond to bushfire.
cs.MA
cs
Modelling bushfire evacuation behaviours J. Robertson Supervisor: D.Singh November 2018 Abstract Bushfires pose a significant threat to Australia's regional areas. To minimise risk and increase resilience, communities need robust evacu- ation strategies that account for people's likely behaviour both before and during a bushfire. Agent-based modelling (ABM) offers a practi- cal way to simulate a range of bushfire evacuation scenarios. However, the ABM should reflect the diversity of possible human responses in a given community. The Belief-Desire-Intention (BDI) cognitive model captures behaviour in a compact representation that is understand- able by domain experts. Within a BDI-ABM simulation, individual BDI agents can be assigned profiles that determine their likely be- haviour. Over a population of agents their collective behaviour will characterise the community response. These profiles are drawn from existing human behaviour research and consultation with emergency services personnel and capture the expected behaviours of identified groups in the population, both prior to and during an evacuation. A realistic representation of each community can then be formed, and evacuation scenarios within the simulation can be used to explore the possible impact of population structure on outcomes. It is hoped that this will give an improved understanding of the risks associated with evacuation, and lead to tailored evacuation plans for each community to help them prepare for and respond to bushfire. 1 Acknowledgements I would like to thank my supervisor, Dr. Dhirendra Singh, for his help and advice. His guidance has been invaluable and I have enjoyed our collabora- tion immensely. Thanks also to Dr. Vincent Lemiale, Dr. Leorey Marquez and Rajesh Subramanian from Data61, who I have worked closely with at times during this year. Without Data61 I would not have been introduced to bushfire evacuation modelling, and without their support this thesis would not have been possible. 2 Contents 1 Introduction 2 Background 2.1.1 Bushfire Behaviours 2.2.1 Belief-Desire-Intention Model 2.2 Representing Behaviour in Computational Models 2.1 Behavioural Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Social Simulation . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.1 Agent-based Modelling . . . . . . . . . . . . . . . . . . 2.3.2 Synthetic Populations . . . . . . . . . . . . . . . . . . 2.4 Existing Evacuation Models . . . . . . . . . . . . . . . . . . . 2.5 The Emergency Evacuation Simulator . . . . . . . . . . . . . 3 Population Generation Algorithm 3.1 3.2.1 3.2.2 Inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.1 Subgroups . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.2 Activity Distributions . . . . . . . . . . . . . . . . . . 3.1.3 Location Mapping . . . . . . . . . . . . . . . . . . . . 3.2 Activity Assignment . . . . . . . . . . . . . . . . . . . . . . . Selecting a Feasible Activity Set . . . . . . . . . . . . Sequencing the Daily Plan . . . . . . . . . . . . . . . . 3.3 Assigning Locations to Activities . . . . . . . . . . . . . . . . 3.3.1 Localities . . . . . . . . . . . . . . . . . . . . . . . . . 3.3.2 Allocation Considerations . . . . . . . . . . . . . . . . 3.3.3 Home Selection . . . . . . . . . . . . . . . . . . . . . . 3.4 Adding Bushfire Behaviours . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4.1 Threshold Model 3.4.2 Possible Bushfire Behaviours . . . . . . . . . . . . . . 3.4.3 Assigning Attributes . . . . . . . . . . . . . . . . . . . 4 Applications Subgroups in Surf Coast Shire 4.1 Algorithm Inputs in Surf Coast Shire . . . . . . . . . . . . . . 4.1.1 . . . . . . . . . . . . . 4.1.2 Activities in Surf Coast Shire . . . . . . . . . . . . . . 4.1.3 Distributions in Surf Coast Shire . . . . . . . . . . . . 4.1.4 Locations in Surf Coast Shire . . . . . . . . . . . . . . 4.2 Results of the Algorithm . . . . . . . . . . . . . . . . . . . . . 4.2.1 Plan Times . . . . . . . . . . . . . . . . . . . . . . . . 3 4 6 6 7 10 11 13 13 15 16 17 21 22 23 23 24 25 26 28 29 30 34 35 36 37 39 41 44 44 44 45 47 48 49 50 4.3 Adding BDI Attributes 4.2.2 Plan Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.3.1 Alerts in the Surf Coast Shire . . . . . . . . . . . . . . 4.3.2 Attribute Parameters . . . . . . . . . . . . . . . . . . 4.4 SCS Application . . . . . . . . . . . . . . . . . . . . . . . . . 4.5 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Conclusion 5.1 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 63 63 64 66 70 71 72 1 Introduction A key question posed in the aftermath of the 2009 Black Saturday bushfires was whether the official Prepare to Stay and Defend or Leave Early (PSDLE) policy was an effective way to protect under-threat communities (CFA & Sweeney, 2009). Whilst it was intended to minimise the number of residents attempting a dangerous late evacuation, there are concerns that the 'Stay or Go' approach only leads to confusion over the level of preparation and planning required to stay and defend, and does not properly define how late is 'too late' to leave. Subsequent policies emphasising early evacuation as the only safe option have shown that blanket advisory policy has little effect on people's behaviour (Reid & Beilin, 2014). This highlights a need for localised bushfire evacuation responses that are co-developed with communities and minimise the risks specific to their townships and localities. Realising this goal requires an understanding of the dynamics of an evac- uation as well as an insight into how the actions of evacuees and responders influence the process. One way to achieve this is to simulate the traffic condi- tions of a community evacuation using an agent-based model (ABM). ABMs are particularly suited to modelling discrete real-world phenomena, where agents represent individuals in the population that can interact with each other and the environment (Bonabeau, 2002). This method allows emer- gent or collective behaviours of the community to be captured whilst still preserving the details of the underlying system (Chen & Zhan, 2008). The Belief-Desire-Intention (BDI) architecture (Rao & Georgeff, 1991) provides a cognitive framework that captures human behaviour within an intuitive structure that is both programmatically efficient and understandable by do- main experts (Norling et al., 2000). BDI can be used alongside an ABM to add a layer of human reasoning to the actions of agents, allowing them to pro-actively reason about and respond to changing circumstances within 4 the simulation. In this work we will use the BDI-ABM integration outlined by Singh et al. (2016). Any evacuation model should take into consideration the expected re- sponse of people in the affected community, both to the fire itself and to any evacuation instructions (Pel et al., 2011). One issue is that this behaviour data may be scarce. Behavioural science research post Black Saturday has focussed on PSDLE decisions (Whittaker et al., 2013), but less is known about evacuation travel decisions which also heavily influence an individ- ual's safety. To extract these behaviours, we will use existing data from interviews, surveys and consultation with domain experts to form repre- sentative behaviour profiles. These profiles will be motivated by bushfire response research that focuses on archetypes in the community (Strahan et al., 2018), as well as parameter based non-bushfire evacuation response models (Lee et al., 2010). In addition to this, our work will focus on what these behaviour pro- files mean for the population prior to the evacuation scenario. The types of activities that people are likely to be engaged in and the dynamics of the background traffic in the region will have an influence on an evacuation should a bushfire threat arise. We account for these by linking sets of activi- ties to each behaviour profile. The profile of an agent then determines when it is likely to begin a given activity, and where in the region that activity will occur. A plan for each agent is generated with details of its activities during the day. In a given scenario, these plans are interrupted by a specific bushfire threat. An agent's response depends on its current location and activity as well as its parameterised behaviour profile. Evaluation focuses on communities in regional Victoria. Behavioural profiles are informally validated by local emergency service personnel and bushfire behaviour experts before being applied to specific communities. The simulation is built using the BDI-ABM framework1, combining the JILL BDI engine2 with the MATSim traffic ABM3. A range of evacuation scenar- ios are constructed to experimentally evaluate how sensitive the evacuation outcomes are to the demographic make-up of different communities. In this thesis we: • Present a review of the literature related to bushfire behaviour, the representation of behaviour in computational models, and the design of social simulations that consider these behaviours. 1https://github.com/agentsoz/bdi-abm-integration. 2https://github.com/agentsoz/jill. 3https://github.com/matsim-org/matsim. 5 • Outline the design of an algorithm that takes a set of generalised be- haviour profiles with associated parameters, and generates a list of agent plans suitable to be run in MATSim. • Describe how these behaviour profiles can be enriched by adding at- tributes to the plans that dictate how they will respond to a bushfire threat in the BDI-ABM simulation. • Apply the algorithm by generating plans for regions in the Surf Coast Shire of Victoria, describing tangible behaviour profiles drawn from interaction with the local community and its emergency services. • Quantify the bushfire behavioural model through consultation with domain experts and append the BDI attributes to the generated plans. • Run instances of these plans in the BDI-ABM model to illustrate the benefit of conducting bushfire evacuation simulation with the dynam- ics of the community in mind. The remainder of this document is structured as follows: we present a review of the related literature in Section 2; the design of the algorithm and the BDI behavioural model is given in Section 3; in Section 4 the evacuation simulation application for the Surf Coast Shire is described, and we analyse the algorithm output and the resulting simulation outcomes; lastly, in Sec- tion 5 we conclude with a discussion on the current model and directions for future work. 2 Background In this section we review related research into evacuation behaviour, with a particular focus on bushfire and community specific responses. Following that, we examine social simulation, and specifically, agent-based modelling applied in that context. Finally, existing models that implement some as- pects of our research scope are described. 2.1 Behavioural Research We proceed by first exploring how behavioural science has understood evac- uations in general, and more specifically bushfire behaviours. Any evacua- tion simulation needs to take into account the expected human response to environmental cues and received warnings (Pel et al., 2011). Predicting be- haviour in an emergency is difficult, and one of the main motivating factors 6 for modelling bushfire evacuations is to gain better insight into expected response to direction and coordination (Dash & Gladwin, 2007). The model can only provide this if the underlying human behaviours that the agents are given are realistic. The first aspect to consider is that one should expect systematic de- viations from rational/optimal behaviour in emergency situations (Dash & Gladwin, 2007). Because the situation is likely to be unfamiliar and unusual, people generally do not rely on prior experience and knowledge and instead focus on the information directly available to them, resulting in 'myopic' behaviour (Pel et al., 2011). This is exacerbated by the potential for unex- pected behaviour in stressful or mentally challenging emergency conditions (Knoop, 2009). People may also fail to comply with directions that they are given, especially if their prepared plan contradicts the instructed action (Pel et al., 2011). Conversely, spontaneous evacuation is known to happen even in places that have not been told to evacuate, so instructed behaviour should not be taken as actual behaviour (Lindell & Prater, 2007). 2.1.1 Bushfire Behaviours Whilst there is a body of research into traffic behaviours in evacuations and accidents (Lindell & Prater, 2007; Tu et al., 2010; Pel et al., 2011), it is less available in the context of bushfire disasters. Behavioural research into bushfires, particularly in an Australian context, has instead tended to focus on the decisions people make between either evacuating or staying and defending property (Johnson et al., 2011; Haynes et al., 2010). This is largely a result of the Prepare to Stay and Defend or Leave Early (PSDLE) policy -- colloquially known as 'Stay or Go' -- which has been official policy in Australia since the 1990s and explicitly puts the evacuation decision in the hands of individuals rather than the state (Reynolds, 2017). In other places where bushfires (wildfires) are common, such as Canada and parts of USA, the norm is that mandatory mass evacuation can and will be enforced by authorities (Moritz et al., 2014). However, related research in North America still tends to focus on the issue of evacuation timing and compliance, and often questions local evacuation policies (Paveglio et al., 2008; McCaffrey et al., 2015). This predominant focus on behaviour prior to an evacuation reflects the often rapid and unpredictable nature of a bushfire as compared to other natural disasters, which may allow more calculated and decisive evacuation plans (Adam et al., 2016). In a bushfire, the decision between staying or going is most likely to be significant in terms of survival, and so it has become the main focus of behavioural research. 7 Accordingly, we should expect that 'Stay or Go' decisions play an im- portant part in an evacuation on a macroscopic level, and that a model of evacuation traffic behaviour will need to account for the circumstances of a person's departure. In their analysis of community preparedness for the 2009 Victorian 'Black Saturday' bushfires, Whittaker et al. (2013) highlight the dangers of late evacuation. People who leave late are usually triggered by the sight of heavy smoke or flames, which means that 'By this time it is likely that driving a vehicle will have become very difficult, with flames, smoke, strong winds, fallen trees, traf- fic and the urgency of the situation increasing the likelihood of accidents (Tibbits & Whittaker, 2007).' Late evacuations are associated with a lack of planning and preparedness among those who initially choose to stay and defend, but are not fully com- mitted to that decision. Interviews with Black Saturday survivors estab- lish that there can be a disconnect between intended action and actual be- haviour; for instance, 63% of people who adopted a 'wait and see' approach ended up leaving once the fire was visible. A difficulty here is whether to define waiting and seeing as an intended action; as McLennan et al. (2012) note, to 'wait and see' is more of an observation that describes a person's mindset rather than a fully formed plan that represents their intentions. One new approach is to move away from viewing the decision as a binary question of leaving or staying. Strahan et al. (2018) form seven self-evacuation archetypes which accommodate a diverse range of responses to a bushfire threat. With foundations in Jung's work on the collective unconscious (Jung, 1969), archetypes represent 'fundamental characteristics of humanity'. There is also a basis for their use in Australian public policy, where they are generated in a similar way using cluster and discriminant function analysis. The results in Strahan et al. (2018) were derived from interviews with 452 participants who had recently experienced bushfire. The questions focussed on factors like experience, intended and actual responses, self-responsibility, access to information and demographics. The seven archetypes they found are shown in Table 1. Reid & Beilin (2014) conducted similar interviews following 11 January 2010, a day where a 'Catastrophic' fire warning was issued to residents of Halls Gap. This warning category was introduced in the aftermath of Black Saturday to indicate that evacuation is highly recommended; despite this, the majority of residents did not leave. One factor attributed to this re- sponse was the nature of risk perception in the community and that 'aware- 8 Table 1: Self-evacuation archetypes according to Strahan et al. (2018). Archetype Responsibility Denier Dependent Evacuator Considered Evacuator Community Guided Worried Waverer Threat Denier Experienced Independent Key characteristics Believe they are not responsi- ble for their personal safety or for their property. Expect the emergency ser- vices to protect them and their property because they are incapable of taking re- sponsibility for themselves. Having carefully considered evacuation, are committed to it as soon as they are aware of a bushfire threat. Seek guidance from neigh- bours, media and members of the community who they see as knowledgeable, well in- formed and providing reliable advice. Prepare and equip their prop- erty and train to defend it but worry they lack practi- cal experience to fight bushfire putting their personal safety at risk. Do not believe that their per- sonal safety or property is threatened by bushfire. Are highly knowledge, compe- tent and experienced and are responsible and self-reliant fighting bushfire. Evacuate or Remain Highly committed evac- uators but expect oth- ers to direct and assist. Highly committed evac- uators but expect oth- ers to direct and assist. Committed directed evacuation. to self- Committed to evacua- tion on community ad- vice. Wavering between evac- uating and remaining. Committed to remain as perceived lack of threat makes evacua- tion unnecessary. Highly committed to re- maining because they are highly experienced and well prepared. ness does not always result in a realistic understanding of how to respond to risk'. Residents may believe that they have a better understanding of local weather and geographic conditions than a state-wide warning system, 9 and prior experience of similar bushfire events will also strongly influence people's decisions (McCaffrey et al., 2011). Further to this, trust in warning systems can be eroded if they are perceived as a political initiative, or even as an overly 'scientific assessment' of risk. Community response resources that incorporate local knowledge are likely to have more impact on people's behaviour. Horse ownership is a good example of a community specific behaviour which might be better understood from a local perspective. Thompson et al. (2018) highlights that although pet ownership is generally a factor in people's evacuation plans, horse owners (who are relatively common in rural areas) are presented with unique challenges during a bushfire. Due to the difficulty of transporting horses pre-emptive or early evacuation is advised by the CFS as a priority action. However, Thompson et al. find that this blanket strategy may be detrimental if it comes at the expense of other preparatory planning, and could prevent horse owners from forming contingency plans that improve the likelihood of horse survival in the event they are left in place. 2.2 Representing Behaviour in Computational Models The complex nature of human behaviour presents challenges for modellers in many different domains. Kulash (1990) highlights a particular issue in urban planning, where traffic engineering that fails to take human behaviour into account can result in contradictory or unsafe policies. Designing hierarchi- cal traffic systems that rigidly place different roads in different classes (often inspired by natural phenomena like river systems) is not effective because it considers humans merely as particles in a flow, rather than autonomous agents who can decide to use a road for reasons separate from its assigned purpose. Moreover, urban planners cannot assume random distribution or optimal dispersal across a network. Song et al. (2010) explore patterns of human mobility, and note that traditional continuous-time random-walk models of movement do not reflect the tendency of humans to restrict their exploration to locations near them, nor their propensity to return to fre- quently visited locations. This also has relevance in epidemiological modelling, where the dis- tinction between density and frequency-based transmission is important (Antonovics et al., 1995; Lloyd-Smith et al., 2004). The ubiquitous model in epidemiology is the Susceptible-Infected-Recovered (SIR) set of differential equations, and indeed most macroscopic representations of disease are exten- sions of Kermack & McKendrick (1927)'s model. Funk et al. (2010) review 10 the presence of behavioural considerations in disease models, and note that whilst human behaviour is intrinsically linked to disease spread, it is diffi- cult to completely synthesise the pathogen dynamics that the SIR model captures and the complex interplay of 'attitudes, belief systems, opinions and awareness of a disease... both in an individual and in the population on the whole'. One alternative is to approach disease modelling from a contact network perspective, viewing the population as a complex system (Galea et al., 2010; Christakis, 2007). Considering individuals within a larger social network and using a bottom-up method allows various different behaviours to be examined; for instance, clustered interaction networks permit the use of percolation thresholds to characterise epidemics (Moore & Newman, 2000; Davis et al., 2008). This is also of interest in economics, where the classi- cal notion of the rational agent is often poorly represented by cumbersome mathematical machinery (Farmer & Foley, 2009). It may not be appropriate to assume that a market will reach a long term equilibrium when complex in- dividual behaviours within the population give rise to sub-optimal emergent behaviours in the collective. Whilst most behavioural research uses surveys and interviews to analyse bushfire responses, there is usually the caveat that both the sample size and the qualitative nature of the data limit the predictive power of results. The acknowledgement that intended and actual actions may differ (Whittaker & Handmer, 2010) means that the interview approach has limited appli- cation in capturing behaviour, and actual modelling of bushfire evacuation behaviour has tended to use 'the judgement of evacuation planners or ex- perts familiar with the area under study' (Beloglazov et al., 2016). This is further enforced by the lack of behavioural research into on-road evacua- tion behaviours in bushfires. Kennedy (2012) is critical of the tendency to model behaviour using uniform random variables as it does not leave room for biases and illogical decisions, ignores any notion of memory/learning, and makes it difficult to identify behavioural preferences between different groups of people. Instead, threshold-based rules are recommended as a sim- ple way of approximating consistent behaviours within an individual agent. 2.2.1 Belief-Desire-Intention Model Any computational model that seeks to use human behaviour to observe emergent outcomes will require a cognitive architecture to represent the hu- man decision making process (Gilbert, 2006). There are several approaches to forming a cognitive model. A connectionist approach seeks to mirror the design (but not necessarily the complexity) of the brain's neural networks, 11 giving a natural representation of the biological process (McClelland, 1988). One shortcoming of a neural network model is that the reasoning process that leads to a particular behaviour is not readily explainable (Medsker, 1994). Other models form a more abstract picture of brain function, with a focus on the storage and deployment of knowledge -- ACT-R and Soar are two well-known examples (J. R. Anderson, 1996; Laird, 2007). Whilst these models are firmly based on experimental evidence and psychological theory (Gilbert, 2006), they focus heavily on the individual level of cognition. The Belief-Desire-Intention (BDI) framework provides a way to represent ratio- nal decision making that lies more between the individual and social context (Bratman et al., 1988; Jarvis et al., 2008). Less tied to cognitive science, BDI relies on a 'folk psychology' approach that captures how people think about how people think (Norling et al., 2000). The BDI framework is formally described by Rao & Georgeff (1991). Based on a branching-time possible-worlds model, BDI seeks to model ratio- nal agents that can vary their actions based on changing beliefs, desires/goals and intentions. Beliefs represent an agent's knowledge of the environment, and are not necessarily perfect pictures of the current state of the system (Norling et al., 2000). Combinations of beliefs will leave an agent with cer- tain desires that they wish to fulfil. Desires may be inconsistent with one another, but goals are a subset of desires that are consistent and achievable according to the agent's beliefs. To achieve these goals, an agent will form intentions, or plans of action to execute. Rao & Georgeff (1995) acknowledge that the abstract formalism of their BDI theory does not lend itself to practical computing, and instead pro- pose a simplified architecture which is more efficient (Ingrand et al., 1992). Many modern BDI programming languages are implementations of Rao and Georgeff's abstract interpreter, and some have maintained a link to the for- mal underpinnings of BDI; the AgentSpeak(L) language (Rao, 1996) and its descendent interpreter Jason (Bordini et al., 2005) are useful in this sense because they allow properties of an empirical BDI implementation to be proven methodically. GOAL (de Boer et al., 2002) extends this capacity to allow programmable declarative goals as part of the propositional logic. This means that goals, like beliefs, are separate from any required action and can form part of an agent's abstract reasoning. Other languages in- clude the C++ based dMARS (D'Inverno et al., 2004) and the Java based JADE (Bellifemine et al., 2001), JACK (Busetta et al., 1999) and Jill. Jill is a relatively new Java-based BDI platform that is lightweight, scalable and geared towards integration with large-scale simulations. It has been 12 developed specifically to handle a large number of agents.4 2.3 Social Simulation The concept of applying computational techniques to social problems has emerged in the last 30 years as a new way to model the complex and often non-linear systems that occur in human societies. Axelrod (1997) proposes in a somewhat extrapolatory manner that social simulation is a 'third way of doing science', and that it allows both adaptive (non-optimal) and rational behaviour to be analysed by modellers. Miller & Page (2007) consider the relatively new computational approach as complementary to the more tradi- tional methodologies in social science. Another major benefit of employing simulation is that very simple and explicit assumptions can be used to gen- erate complex and unpredictable behaviour which would be very difficult to understand analytically (Gilbert & Troitzsch, 2011). Drawing ideas from computer science, mathematics, biology, and social science, social simulation provides a forum for cross-discipline interaction, and development has come from a number of domains (Axelrod, 1997). The UrbanSim model (Waddell, 2002) is a polished web-based program that ap- plies simulation to urban planning problems and allows metropolitan plan- ning organisations to forecast the effects of growth in a city's population. In economics, simulation allows researchers to observe aggregate rational- ity emerging from irrational individual actions (Gode & Sunder, 1993) and compare the effectiveness of different trading strategies (Rust et al., 1994). Queuing models are one of the more established applications of social simu- lation, where discrete events dictate the evolution of a system, and the times between each event are given by some probability distribution (Gilbert & Troitzsch, 2011). Schedules generated in this manner generally apply in customer service settings, so such simulations can be used to measure the expected average waiting times and idle times associated with different sys- tem states. 2.3.1 Agent-based Modelling One commonly used method in social simulation is agent-based modelling (ABM). Through the actions and interactions of autonomous agents within the simulated environment, ABM allows modellers to capture the emergent behaviours of complex systems and has been applied in a range of fields, in- cluding public health, urban planning, disaster management and economics 4See https://github.com/agentsoz/jill/ for details. 13 (Dawson et al., 2011; Auchincloss & Garcia, 2015). Macal & North (2005), maintain that 'modelling human social behaviour and individual decision- making' is the main purpose of ABM. They see the possibilities of ABM creating new challenges in social science research, including two central ques- tions: • How much do we know about credibly modelling people's behaviour? • How much do we know about modelling human social interaction? ABMs are particularly suited to modelling discrete real-world phenomena, where agents represent individuals in the population that can interact with each other and the environment (Bonabeau, 2002). The scope of ABM ranges from small-scale academic demonstrations which focus on the key fea- tures of the system, to large-scale, validated models with millions of agents that can be used to support policy decisions (Macal & North, 2005). Agents are required to be discrete, autonomous components of a system that are able interact with the system's environment (including other agents) and independently adapt behaviour based on these interactions (Chen & Zhan, 2008). The ABM approach allows modellers to: • Expose emergent behaviours: These are defined as characteristics of the system that are best observed via the interactions between the individual agents (Chan et al., 2010). • Naturally describe systems: ABM also allows a natural synthesis of a complex system into a descriptive model (Bonabeau, 2002). • Apply stochasticity: Complex behaviours are represented in terms of discrete agent activities, which allows randomness to be applied in a targeted and realistic manner (Crooks & Heppenstall, 2012). • Seek expert validation: Because agent behaviour is explicitly de- fined by these activities, domain experts are able to more easily un- derstand, calibrate and validate the model (Bonabeau, 2002). ABM is considered by Bonabeau (2002) to be a way of thinking about and analysing systems rather than a specific technological tool. It pro- vides a microscopic, bottom-up approach to modelling wherein a system is represented by its constituent parts. The contrast between ABM and 'macroscopic' modelling provides a new perspective on the scientific pro- cess. For instance, Epstein (2009) argues that simulating a pandemic with 14 individual agents interacting via social network structures is more effective than classical disease modelling, as it easily allows for heterogeneous fac- tors and non-random mixing (Grimm & Railsback, 2005). Bazzan et al. (1999) consider the application of microscopic simulation to transportation science. They argue that the concept of rationality is very relevant in a traffic simulation, and that maximisation or optimisation should not be the goal. Instead it should feature the emotional, non-logical components of decision making, like impulsive lane changing, trying a different route due to impatience, or how a person's internal mental state might be expressed in their driving performance. BDI is cited as an appropriate tool for introduc- ing these individual actions within the social framework of the road network. Gilbert (2006) makes a similar conclusion, holding that the micro cognitive level should both influence and be influenced by the macro social level in models of human behaviour. This is a crucial element of social simulation and illustrates that an agent-based evacuation model should not focus too heavily on one level of detail. The interaction between the agents and their surrounding environment will reveal as much as analysis of standalone social or individual outcomes. 2.3.2 Synthetic Populations Social simulation often requires that the modelled agents to reflect attributes observed in real world data. A synthetic population is one that is derived from aggregate statistical data to represent the actual population. This is of- ten necessary because the micro-data required to accurately model the pop- ulation at an individual level is either unavailable or inaccessible (Moeckel et al., 2003). There are several established techniques for creating synthetic population datasets, and often these use actual but anonymous individual sample sets attained from census data to generalise incrementally to create a full population (Harland et al., 2012). These methods, including deter- ministic re-weighting (Ballas et al., 2005) and the conditional probabilities model (Birkin & Clarke, 1988), aim to match the distribution of persons and households to demographic data (Jain et al., 2015). However, these processes require a stable and realistic set of actual sample data (Wickra- masinghe et al., 2017). In regions that feature a large transient or fluctuat- ing non-resident population then this information may not exist in a reliable form, as any existing individual or household data may not generalise to the period that the simulation is aiming to model. 15 2.4 Existing Evacuation Models In this section, several models related to the aims of this thesis are de- scribed. They help guide strategies in the development of our own model, as well as reveal approaches that might be counter-productive. Shahparvari et al. (2015) approach the problem of late evacuation in a bushfire from an optimisation perspective with a focus on limited resources and constraining time windows, road disruptions and shelter capacities. This process is useful in determining which factors have the most impact on an evacuation but has little potential to accurately predict the outcome of an evacuation as human behaviour in an unpredictable situation is likely to be sub-optimal, although there have been attempts to validate optimised plans via agent-based simu- lation (Pillac et al., 2016). One way that other models have sought to capture suboptimal behaviour has been to emulate anxiety and human interaction using sensory param- eters. This has been a focus in crowd-based evacuation simulation, where agents will speed up due to an awareness of danger or follow another agent if they are related to them (i.e. parent-child pairs) (Okaya & Takahashi, 2011). Lee et al. (2010) expand on this idea with their leader-follower dy- namic, which they define via a 'confidence index'. Agents who perceive sounds and smoke from a bomb blast will update their confidence index and then, based on some threshold, transition through different states that affect their decision options (using the BDI framework). If their confidence index is low, they are likely to follow other agents rather than assess other cues for exit points. Agents also have a predefined type -- 'Novice' or 'Commuter' -- which changes their knowledge of escape routes and their initial likelihood to be a follower or leader. This concept of following or leading can be translated to traffic evacua- tions and on road behaviour. Yuan et al. (2017) propose a modular driving decision framework that allows for herding, congestion avoidance, panic- affected driving and variable shelter selection. They incorporate a number of different routing behaviour options -- e.g. following shortest path, follow- ing a leading car or using a GPS -- and then use a BDI cognitive layer to determine the course of action to achieve their goal. One important aspect of their model is that it allows for heterogeneity of route choices rather than focussing on the optimal solution, highlighting Sadri Arif Mohaimin et al. (2014) findings that 'evacuees may not follow a recommended route but may take a usual or familiar one instead'. Further, they claim that the route and destination choices of drivers have the most affect on clearance time in a large scale evacuation. 16 Scerri et al. (2010) use this same modular approach to explore bushfire response strategies. The decision on when and where to leave uses a cell- based ABM and focuses on a number of attributes like age, gender, panic level and known information. A separate traffic model uses the lightweight coordinate-based Repast program, and has agents choose a route that takes the shortest path they believe to be safe. This belief is updated dynamically as the traffic simulation progresses. The separation of the cognitive and traffic models, with a parameterised trigger leading to the dynamic traffic simulation, allows the outcomes of each decision model to be more easily analysed. A somewhat unique bushfire evacuation model is provided by Adam & Gaudou (2017), who directly use survivor testimonies to formulate agent behaviour. They argue that this allows them to simulate actual behaviours, rather than behaviours prescribed by experts. A tension between perceived and actual danger was highlighted in their review of post Black-Saturday interviews, where people would quickly shift their perception from passive to hyper-alert once the risk became undeniable. Using a finite-state machine, survivor responses were translated into several stage states that an agent may pass through -- 'Unaware', 'Aware indecisive','Preparing to escape', 'Es- caping' and 'Preparing to defend'. These stages are linked by various triggers that allow them to move into a new state. Triggers are changes in person attributes in response to changes in the environment, which is limited to a simplistic grid model lacking geospatial attributes. However, their focus on reproducing realistic behaviours allows them to closely match their results with observed death causes in a fire, validating their intensive, qualitative approach. 2.5 The Emergency Evacuation Simulator As we have already seen, capturing irrational behaviours is especially im- portant in an evacuation simulation (Barrett et al., 2000). Time pressures and limited route choice, along with competing and overwhelming new lay- ers of information (much of which may be unknown to an individual agent) should result in a wide array of responses which diverge from a hypothetical optimal solution. Padgham et al. (2014) provide one such model which em- ploys BDI to augment an ABM in the context of bushfire evacuation. They describe a method where an BDI agent acts as the cognitive 'brain' to the active 'body' of a corresponding ABM agent. The ABM will act based upon instructions from the BDI agent in addition to responding directly to inter- actions within the ABM system, and the BDI agent will reason and make 17 decisions based on information the ABM agent encounters. These coupled agents can communicate via • percepts: where an ABM agent notifies the BDI agent of an event in the system. • queries: where a BDI agent requests information from the ABM agent. • actions: where the BDI agent, having reached a decision, informs the ABM agent of what action to take. • action states: where an agent conveys to its counterpart that the status of an action has been updated. This model has been refined into the Emergency Evacuation Simulator (EES) tool designed to assist emergency services in Australia respond to natural disasters (Singh & Padgham, 2017). The tool features a web inter- face which allows domain experts to build and test community evacuation scenarios first-hand, with a view towards it being both a useful planning tool and a decision support system during an emergency. As a currently active project with a number of different stakeholders, the EES provides a flexible and open platform in which to further test BDI bushfire behaviours as they are developed in this thesis. Development of the Jill BDI engine has recently focussed on expanding the underlying capabilities of the BDI-ABM integration, and much of Jill's architecture is constructed to interact directly with an ABM (Singh et al., 2016). Taken as its own modular component in the integration, Jill allows BDI agents to make decisions based on a goal-plan hierarchy. An agent holds a number of belief states, which may be altered by information received from the ABM environment. High-level goals are formed based on changes to these belief states, and these are reasoned through via a set of conditional plan options. A selected plan may involve a further set of more specific goals, and this process continues until eventually a plan lands upon some decision on how the counterpart agent should act and respond within the ABM. This process is easily described via a goal-plan tree, which maps the decision-making process into a flowchart that visualises and explicitly orders the various goal and plan options that a BDI agent may have. Apart from being useful in the process of designing a behavioural model, these goal-plan trees are beneficial as explanatory tools that domain experts and stakeholders can understand. An example goal-tree is provided in Figure 1. 18 Figure 1: An example of a goal-plan tree in a bushfire context (Singh et al., 2016). Goal Plan Action M:msg RespondBushfire EvacuateHouse Remain PrepareMode AssembleFamily MoveSafeLoc GetCar ArrangeLift DriveToLoc WaitPickUp Walk(Car)Drive(Door) M:ReqLift DetermineLoc Drive(L) For its ABM component the EES utilises MATSim, a multi-agent traf- fic simulation framework that is implemented in Java (Horni et al., 2016). The traffic flow model is designed for large-scale simulations and uses a queue-based approach to move agents through a network graph made up of weighted nodes and links. Storage and flow capacities in the network con- strain and shape the movement of an agent, but the main impetus in the model is an agent's desire to complete an individual plan containing a list of activities with corresponding locations with end times, along with a travel mode between each activity. This plan is initially provided as a per-agent input to the simulation, and is iteratively updated by a co-evolutionary algo- rithm (Popovici et al., 2012) that optimises the plan's 'score' an individual level rather than aiming for system equilibrium. These plans are collectively stored in the population.xml input file. MATSim is a long-running and extendable open source project that now features a large number of contributions augmenting its core function as a traffic simulator. To facilitate these augmentations, MATSim plans can have any number of contribution-specific attributes appended to them, which allow additional parameters and inputs to be associated with each agent as needed. See Figure 2 for an example of a MATSim population.xml file with attributes added to each agent's plan. BDI-MATSim contributions using BDI engines such as JACK and JADE have included applications to taxi administration and bushfire evacuation (Padgham & Singh, 2016). In an emergency context, one of the distin- guishing features of a BDI-MATSim simulation is that plans should not be 19 Figure 2: A MATSim population.xml file with attributes added to agent plans. < p o p u l a t i o n > < person id = " 1 " > < a t t r i b u t e s > < a t t r i b u t e name = " B D I A g e n t T y p e " class = " java . lang . String " > io . github . a g e n t s o z . ees . agents . b u s h f i r e . R e s i d e n t </ a t t r i b u t e > </ a t t r i b u t e s > < plan s e l e c t e d = " yes " score = " 1 4 3 . 5 0 3 4 5 9 7 1 " > < a c t i v i t y type = " home " x = " 7 6 6 7 2 8 . 6 1 7 3 8 0 2 3 9 " y = " 5 7 5 4 4 4 9 . 1 1 6 8 1 8 6 7 " e n d _ t i m e = " 0 9 : 4 0 : 0 0 " / > < leg mode = " car " / > < a c t i v i t y type = " work " x = " 7 8 9 8 7 2 . 4 7 2 6 1 4 3 8 " y = " 5 7 5 2 8 1 1 . 2 6 0 2 3 4 1 7 " e n d _ t i m e = " 1 6 : 3 4 : 0 0 " / > < leg mode = " car " / > < a c t i v i t y type = " home " x = " 7 6 6 7 2 8 . 6 1 7 3 8 0 2 3 9 " y = " 5 7 5 4 4 4 9 . 1 1 6 8 1 8 6 7 " / > </ plan > </ person > < person id = " 2 " > < a t t r i b u t e s > < a t t r i b u t e name = " B D I A g e n t T y p e " class = " java . lang . String " > io . github . a g e n t s o z . ees . agents . b u s h f i r e . R e s i d e n t </ a t t r i b u t e > </ a t t r i b u t e s > < plan s e l e c t e d = " yes " score = " 9 3 . 2 9 8 7 7 2 1 " > < a c t i v i t y type = " home " x = " 7 8 6 8 3 1 . 5 1 1 6 9 1 1 7 5 " y = " 5 7 7 0 0 8 3 . 8 1 3 1 6 7 1 7 " e n d _ t i m e = " 0 8 : 1 6 : 0 0 " / > < a c t i v i t y type = " shops " x = " 7 5 9 2 9 9 . 7 8 1 6 9 5 2 0 1 " y = " 5 7 2 9 9 0 1 . 2 7 9 8 0 3 7 3 " e n d _ t i m e = " 1 0 : 3 4 : 0 0 " / > < leg mode = " car " / > < a c t i v i t y type = " beach " x = " 7 9 1 1 2 0 . 8 0 3 6 4 1 5 5 9 " y = " 5 7 5 2 8 2 0 . 3 5 2 9 6 1 9 8 " e n d _ t i m e = " 1 3 : 0 7 : 0 0 " / > < leg mode = " car " / > < a c t i v i t y type = " home " x = " 7 8 6 8 3 1 . 5 1 1 6 9 1 1 7 5 " y = " 5 7 7 0 0 8 3 . 8 1 3 1 6 7 1 7 " / > </ plan > </ person > < p o p u l a t i o n > 20 iteratively improved; all decision-making must be performed 'on the fly' by the BDI agent. This represents the idea that people in an emergency cannot rely on their experience or prior learned behaviours, and must react to new situations as they are presented. With this arrangement in place, the initial plan inputs become more significant, because they will directly dictate where agents are prior to the emergency situation. A large part of the contribution in this thesis is providing a method to generate these plans, including the BDI-specific parameters that are required for each agent. Together, these input procedures will shape the resultant simulation, so establishing this process is an essential design step for the EES project. 3 Population Generation Algorithm A person's response to a bushfire will inevitably be influenced by their plan for the day, including what they are doing when they become aware of the threat and what they plan to do next. In this section, we describe a plan generation algorithm that allows us to easily generate the planned activities for every individual in a population on a given day and apply attributes that reflect how they will respond to a bushfire. If we want to represent these individuals as agents in an EES simulation then their plans need to follow the same semantics that MATSim requires. The algorithm output for an agent plan should consist of a set of sequenced activities, each with a location and start-time, along with travel legs linking them. Any additional parameters should be included as attributes per agent plan, with the collection of these plans forming a population.xml file as in Figure 2. Although there are a number of established methods for synthesising populations from census data (Harland et al., 2012), we are interested in generating populations in a range of diverse settings that may differ fun- damentally in their underlying demography. The make-up of a population and its vulnerability to a bushfire threat will vary depending on the weather conditions, the time of year, which day of the week and even the time of day that the fire strikes (Reid & Beilin, 2014). These variations are exacerbated when the considered population has a significant transient element, or in a scenario where a special event is occurring in the region that skews both the location and movement patterns for a large portion of the population. We therefore require a flexible set of inputs that can be manipulated to re- flect the population in a specific scenario. Additionally, inputs should be simple enough for emergency personnel to understand and validate against observed data. 21 This section will proceed by first outlining in a generalised form the inputs that the algorithm requires to generate agent plans. We then de- scribe the algorithmic process for creating an agent plan, which includes assigning activities to an agent, sequencing these activities into a day plan, and giving each activity in the sequence an appropriate location. Once plan generation is established, a bushfire behaviour Belief-Desire-Intention model is formulated. The necessary BDI attribute parameters alongside the plan generation inputs constitute a set of behaviour profiles that broadly define how a given agent will react in a bushfire emergency scenario. 3.1 Inputs We first consider the inputs that the algorithm requires for a given bushfire scenario with region R and population of agents P over a time period T : • A set of subgroups S and a size Ps for each s ∈ S that partitions P up into categories based on an agent's relationship to R. • A set of activities A (of size K) that an agent can be assigned to at any time t ∈ T . • A choice of time-step size T N , where N denotes the number of time- steps. • An activity distribution ∆s for each subgroup s that defines the ex- pected proportion of s-agents engaged in activity αk ∈ A at each time-step tn for n = 1, 2, ..., N . • A duration weighting ds,αk for each (s, αk) pair that dictates how long an s-agent will take to complete activity αk. • A set of locations L in R defined by a suitable coordinate reference system W . • A location mapping Ms,αk for each (s, αk) pair that defines the set of possible locations in L where an s-agent can complete the activity αk. • An allocation number a(cid:96) for each location (cid:96) ∈ L that defines the expected number of agents attending (cid:96) during the given scenario. • a family {Li} (indexed by I) of localities that partitions L into neigh- bourhoods. • A travel factor gs for each s that governs how likely an s-agent is to choose a new location outside of its current locality. 22 3.1.1 Subgroups We partition the population of agents P into subgroups that broadly reflect the diversity of people in the area and where they have come from. These will differ depending on R and the given bushfire scenario, but broadly there should be a focus on knowledge of the area, intended duration of stay in the area, and connection to the community through friendships, relationships and assets. The most basic input is thus a description of how the population should be broken up into distinct groups. Let S be the set of all subgroups s. We also denote {Pss ∈ S} as the partition of the population of agents P into subgroups. One simple example of a subgroup partition would be breaking the population up into residents and visitors. 3.1.2 Activity Distributions Subgroups are mainly formed around expected behaviours during a bushfire, but they are also useful in defining differing intentions for people in their daily activities. For a given bushfire scenario, a set of activities that a signif- icant number of the population is expected to participate in is determined. These could include going to the beach, shopping, eating at a restaurant or attending a large event. Any desired granularity is allowable at this step, but it is better to tend towards more general activity labels here, with more specific sub-activities distinguished by location (see Section 3.1.3). Addi- tionally, activities that are only undertaken by a minority can be grouped together into an all encompassing other activity. The only enforced activ- ity condition is that α1 should specify a home location for each agent. This plays a fundamental role in how an agent's plan develops, as we shall see. We denote A = {α1, α2, ..., αk, ..., αK} as the set of K possible activities αk that an agent can be assigned to at time t ∈ T . The time period T is then discretised into N steps, and for each time-step tn, for n = 1, 2, ..., N , and each subgroup s, a map δs,tn : A −→ [0, 1] 23 K(cid:88) k=0 s.t. δs,tn(αk) = 1 defines the expected proportion of subgroup s to be engaged in activity αk during time-step tn. The set ∆s = {δs,tnn = 1, 2, ..., N} of N mappings for each subgroup then defines the distribution of that sub- group over the day. The activity distribution input is most easily understood in terms of the chart in Figure 3, with each activity being assigned to a pro- portion of Ps at every tn. 1 ) k α ( n , s δ k 0.5 (cid:80) 0 t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 t12 time-step α1 α2 α3 α4 α5 Figure 3: Activity distribution table for subgroup s with K = 5 and N = 12. In Section 3.2.1 we will derive start times from these input distributions using each activity's duration. We do not impose the start times as an input because the concept of describing what a population is doing across various time-steps is simpler to input than specifying exactly when a proportion of people begin and end activities. Certainly the former is more intuitive for the user, and seems a lot more feasible from a validation and measurement perspective. 3.1.3 Location Mapping We have now defined the types of activities available to an agent, and the ac- tivity distributions which dictate when they can occur. It remains to specify 24 for all activities their possible locations in the region. Again, this mapping is dependent on the subgroup an agent belongs to, which allows variations within activities to be expressed according to who is performing them. For instance, we may have visitor agents who have their other activity mapped to popular tourist destinations in the region, whilst resident agents would have schools, golf clubs etc. as other locations. Location mapping is par- ticularly important in distinguishing the choice of home location for each s-agent. With a set of coordinates W (in a suitable coordinate reference system5) that cover R, we define a location as (cid:96) = (x, y) ∈ W , and let L = {(cid:96) (cid:96) ∈ R ∪ W} denote the set of all locations in the region. Then for each subgroup s and each activity αk, Ms,αk ⊂ L defines the allowable locations for s and αk. Note that it we may have the case Ms,αk = ∅ ⇐⇒ δs,n(αk) = 0 ∀n implying that that an agent of type s will never perform activity αk at any point during the time period T . In summary for each subgroup s there are three main inputs that must be specified by the user: the distribution of activities, the locations those activities can occur and the number of s-agents. There are other more specific input parameters that will be introduced at the the relevant step of the algorithm explained below. 3.2 Activity Assignment We now explain the algorithm's process per agent plan. The first step in constructing an s-agent plan is to decide which activities will be performed at each time-step. These activities are drawn from the corresponding distri- bution table and then sequenced according to their assigned duration. 5We assume a Cartesian coordinate system e.g. Universal Transverse Mercator (UTM). 25 3.2.1 Selecting a Feasible Activity Set For each subgroup s, the input distributions must be converted into a cu- mulative probability matrix. The distributions only tell us where the agents should be at a given time, and not when they begin that activity. Therefore the start times must be derived, and to do this we must know the expected duration of each activity. These durations will be some multiple of the length of each time-step T N . We denote a duration weight ds,αk ∈ {1, 2, ..., N} such that T N ds,αk gives the corresponding duration for subgroup s performing activity αk. Then at each time-step, we can determine the number of s- agents who are expected to start activity αk by subtracting the proportion who started αk during any of the ds,αk − 1 previous time-steps. We form the recursive function ξs,tn(αk) = δs,tn(αk) −(cid:88) j ξs,tn−j (αk) j ∈ (0, ds,αk − 1] ∩ N (1) Since for n ≤ 0, ξs,tn = 0 (we assume no agent has started an activity outside of the time period), ξs,t1 = δs,t1 for all αk and thus we can recursively define the starting proportion for each activity at each time period using (1). Now, for each s we can view the collection of ξs,tn(αk) as a K×N matrix Ξs that describes all start time proportions for that subgroup: ξs,t2(α1) ξs,t2(α2) ... ξs,t2(αK) ··· ··· . . . ··· ξs,tN (α1) ξs,tN (α2) ... ξs,tN (αK)  Ξs = ... ξs,t1(α2)  ξs,t1(α1) k(cid:88) ξs,t1(αK) Note that the sum of the nth column in Ξs, ξs,tn(αk) ≤ 1 j=1 (the remaining proportion represents s-agents who are currently engaged in an activity at tn), and so we normalise Ξs 26   Ξ∗ s = = ... ... ξs,t1 (α1) j=1 ξs,t1 (αj ) ξs,t1 (α2) j=1 ξs,t1 (αj ) (cid:80)k (cid:80)k (cid:80)k ξs,t1 (αk) j=1 ξs,t1 (αj ) ξ∗ ξ∗ ξ∗ ξ∗ ξs,t2 (α1) j=1 ξs,t2 (αj ) ξs,t2 (α2) j=1 ξs,t2 (αj ) (cid:80)k (cid:80)k (cid:80)k ξs,t2 (αk) j=1 ξs,t2 (αj ) ··· ··· ... . . . s,t2,K ··· ξ∗ ξ∗ ... ξ∗ s,t1,K ξ∗ ξ∗ s,t2,2 s,t2,1 ... s,t1,1 s,t1,2 s,tN ,1 s,tN ,2 s,tN ,K ··· ··· . . . ···   (cid:80)k (cid:80)k (cid:80)k ξs,tN (α1) j=1 ξs,tN (αj ) ξs,tN (α2) j=1 ξs,tN (αj ) ... ξs,tN (αk) j=1 ξs,tN (αj ) where each (k, n) entry now represents the probability of an s-agent who has ended any activity at time-step tN beginning new activity αk. Finally, we take the cumulative sum of each column to attain a cumulative probability matrix:  s,t1,1 (cid:80)2 ξ∗ k=1 ξ∗ (cid:80)K−1 ... k=1 ξ∗ 1 Cs = s,t2,1 (cid:80)2 ξ∗ k=1 ξ∗ (cid:80)K−1 ... k=1 ξ∗ 1 s,tN ,1 ··· ··· (cid:80)2 ··· (cid:80)K−1 ξ∗ k=1 ξ∗ ... k=1 ξ∗ 1 ··· . . . s,tN ,k s,tN ,k s,t1,k s,t2,k s,t1,k s,t2,k  Now that we have a well-defined probabilistic description of when an agent will perform an activity, we can begin to construct the plan by selecting activities from Cs. For a given s-agent, we generate a 1 × N vector U of values drawn from the uniform distribution on (0, 1). Then, conditionally checking the nth value of U , un against the nth column of Cs, we select one activity for each tn. Form B, a K × N matrix with each bk,n entry defined by b1,n = bk,n = 1 un < c1,n 0 un ≥ c1,n 1 0 un ≥ ck,n ck−1,n ≤ un < ck,n k = 1, 1 ≤ n ≤ N 2 ≤ k ≤ K, 1 ≤ n ≤ N For each column, we only have one non-zero value, so B is a Boolean matrix representing an activity at each time-step tn. These pre-selections 27 (cid:40) (cid:40) can be thought of as potential activities at that time, dependent on the duration of previous activities. defining B(cid:48): To actualise these activities, we inject the duration weights into B by (cid:40) b(cid:48) k,n = ds,αk when bk,n = 1 0 when bk,n = 0 1 ≤ k ≤ K, 1 ≤ n ≤ N We now cycle through each time-step to determine its affect on the next. Algorithm 1 illustrates this process whereby the duration weight ds,αk blocks out subsequent time-steps until the full duration of αk has been performed. Note that we define to be the nth column of B. b·,n Algorithm 1: Activity selection for an s-agent 1 Form B, B(cid:48) for s-agent 2 Set block_flag=0 3 for n ∈ {1, 2, ..., N} do 4 5 6 7 8 if block flag > 0 then b·,n = b·,n−1 block flag=block flag −1 else block flag=(cid:80)K k=1 b(cid:48) k,n − 1 9 return B At the end of this process, the resultant Boolean matrix B will contain a feasible plan which describes what the s-agent will be doing at each time- step, in line with the format of the initial distributions (see Figure 4). 3.2.2 Sequencing the Daily Plan It remains to translate the tn at which the agent changes activity into mean- ingful time and provide an ordered list of start times for each activity in the plan. We define a recursive function on the columns of B f (b·,n) = b·,n − b·,n−1 2 ≤ n ≤ N 28 Figure 4: An example output from Algorithm 1 with K = 5 and N = 12.  B = 1 1 1 0 0 0 0 0 0 0 1 1 0 0 0 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0  (cid:40) f(cid:48) k,n = with f (b·,1) = b·,1. We then set F = f (B) = f ([b·,1, b·,2, . . . , b·,N ]) = [f (b·,1), f (b·,2), . . . , f (b·,N )] which will have entries from {−1, 0, 1}. The only elements of F that will be greater than 0 i.e. unaffected are those where the agent has changed plan from tn−1 to tn. Therefore we can form F (cid:48) such that each entry is defined 1 0 fk,n > 0 fk,n ≤ 0 1 ≤ k ≤ K, 1 ≤ n ≤ N Then, the sum of the nth column in F (cid:48) defines a Boolean true or false as to whether an activity begins at time-step tn, and the row k containing the non-zero entry in column n determines the activity αk that begins then. This process is illustrated in Algorithm 2. Line 11 gives the activity a start time at a random point within the length of the time-step tn. This is important because it ensures an even distribution of start times for activities over the population; if the times were fixed to each tn, then we would have unnatural 'waves' of trips occurring periodically. Note that runif(-1,1) on this line denotes a uniformly distributed random variable in the interval (−1, 1). Another purpose served in Algorithm 2 is the allocation of an additional activity α1 at the start and end of the plan. This is a requirement of MATSim's re-planning features, and it ensures that agents always return to their home the end of the time period. 3.3 Assigning Locations to Activities Once an s-agent's time-ordered list of activities is determined, locations must be assigned to each activity. Activity locations are chosen based on a number of factors, including the distance required to travel, and the relative 29 Algorithm 2: Algorithm for selecting times that activities begin 1 Form F (cid:48) for s-agent 2 create empty list plan 3 activity = α1 4 time = 0 5 add (time, activity) to plan 6 for n ∈ {1, 2, ..., N} do if (cid:80)K 7 8 9 10 11 12 k=1 f(cid:48) for k ∈ {1, 2, ..., K} do k,n = 1 then if k = 1 then activity = αk time = tn + runif(-1,1) T 2n add (time, activity) to plan 13 activity = α1 14 time = T 15 add (time, activity) to plan 16 return plan popularity of the location. In this section we will often introduce probabili- ties that are (inversely) proportionate to distances. In the algorithm, these probabilities are properly formed by normalising the inverse distances over the sum of all inverse distances (in much the same way that we normalised Ξs in Section 3.2.1). To notate this at each step would be cumbersome and distracting (see the end of Section 3.3.1 for evidence of this), so we maintain the proportionate notation throughout. 3.3.1 Localities If we first assume that an s-agent is at a certain location (cid:96)0, then the question is how to choose the location (cid:96)∗ of the next activity αk in the list. This could be done based on inverse distance: Pr(αk occurs at (cid:96)) ∝ 1 dist((cid:96)0, (cid:96)) where dist((cid:96)0, (cid:96)) denotes the Euclidean distance from (cid:96)0 to (cid:96) for some (cid:96) ∈ Ms,αk . 30 However, when there are a large number of location options for an activity, it becomes costly to calculate the distance for every agent to every potential destination, and scalability to larger areas or increasing the detail of location data becomes problematic. Further, a purely distance-based metric tends to result in trips that cluster around the agent's home location; for each new trip, the agent will generally take the closest option to their current location. This is amplified in built-up areas, where an agent is likely to have more options close to them. Whilst intuitively this makes sense and agrees with many of the assessments made by Song et al. (2010), over a population it does result in movement patterns that are almost too optimal, with agents either commuting between communities or not at all. It is desirable to encourage some intra-community trips which disperse traffic away from major arterial routes, and reflect the possibility (also discussed by Song et al.) that people within a neighbourhood may have preferences that do not depend entirely on distance. Both of the above issues can be addressed if we group locations by some locality area that they lie within. These localities can be based on the existing suburban/postal districts in the area, by ABS statistical measures, or by any other grouping appropriate to the community in question. The localities {Li} of a region are defined as a family of I sets such that Li ⊂ L ∀i ∈ I, and (cid:91) i∈I Li = L, (cid:92) i∈I Li = ∅ i.e. {Li} is a partition of L. In practical terms, we draw a polygon cover of R and denote all locations under polygon Li as belonging to locality Li (illustrated in Figure 5). For each Li, we define a centroid location (cid:96)i as (cid:88) (cid:96)∈Li (cid:96)i = ( 1 Li x(cid:96), 1 Li (cid:88) (cid:96)∈Li y(cid:96)) where Li is the number of locations in Li and x(cid:96) and y(cid:96) denote the x and y co-ordinates of (cid:96) ∈ W ∪ Li. Now if we take the current locality to be Li0 (cid:51) (cid:96)0, we can choose a new locality Li with probability proportional to the inverse distance from centroid (cid:96)i0 to centroid (cid:96)i: 31 Figure 5: Example of location points (pink) being grouped by locality poly- gons (green). Pr(αk occurs in Li) ∝ 1 dist((cid:96)i0, (cid:96)i) It is then a simple matter to randomly choose from the selected locality Li∗ a location (cid:96)∗ ∈ L∗ i ∩ Ms,αk for αk, the next activity in the plan list. A major benefit of this process is that the distances between each centroid are fixed and only need to be calculated once during the entire algorithm runtime. Thus we can drastically cut down on distance calculation requirements whilst also gaining the ability probabilistically encourage mildly suboptimal choices. One problem this presents is that the most likely choices for (cid:96)∗ should be located within Li0, but the distance to them in terms of locality centroids is dist((cid:96)i0, (cid:96)i0) = 0 so the probability of selecting from the current locality is undefined. How- ever, this provides an opportunity to introduce a new parameter to the al- gorithm. For each subgroup s we define a travel factor gs, which determines 32 how likely an s-agent is to leave its current locality. This allows for agents in some subgroups to be more likely to remain within their neighbourhood, and alternatively can encourage other subgroups to move around the region throughout the day. Under pure locality-based selection, gs directly repre- sents the probability of an s-agent moving to another locality for αk. This definition for gs implies that and logically, gs = Pr(αk occurs in Li0) = 1 − gs (cid:88) Pr(αk occurs in Li) ∝(cid:88) i∈I\{i0} 1 dist((cid:96)i0, (cid:96)i) i∈X (2) where X = {i ∈ I \ {i0}Li ∩ Ms,αk (cid:54)= ∅} i.e. X only consists of i such that locality Li contains valid locations at which activity αk can be performed by an s-agent. So we can write (2) as 1 − gs gs Pr(αk occurs in Li0) = Pr(αk occurs in Li) (cid:88) i∈I\{i0} and this allows us to define a pseudo 'distance' dist0((cid:96)i0, (cid:96)i0) = (1 − gs)(cid:80) gs i∈X 1 dist((cid:96)i0 ,(cid:96)i) (3) relative to all other locality distances that contain locations in Ms,αk . Ob- serve that this definition recovers (2) after normalisation: Pr(αk occurs in Li0) = dist0((cid:96)i0 ,(cid:96)i0 ) = 1−gs gs dist((cid:96)i0 ,(cid:96)i) 1 1 1 1−gs gs dist0((cid:96)i0 ,(cid:96)i0 ) i∈X i∈X +(cid:80) (cid:80) dist((cid:96)i0 ,(cid:96)i) +(cid:80) (cid:80) dist((cid:96)i0 ,(cid:96)i) +(cid:80) i∈X 1−gs gs 1 1 dist((cid:96)i0 ,(cid:96)i) i∈X 1 dist((cid:96)i0 ,(cid:96)i) i∈X i∈X i∈X 1 (cid:80) (cid:80) 1 dist((cid:96)i0 ,(cid:96)i) 1 dist((cid:96)i0 ,(cid:96)i) = = = 1−gs gs 1−gs gs 1−gs gs + 1 1 − gs 1 − gs + gs 33 = 1 − gs Unlike the other locality distances, the pseudo-distance is dependent on αk and s, so it must be recalculated at every new location assignment step. This definition for dist0((cid:96)i0, (cid:96)i0) will be important in Section 3.3.2. 3.3.2 Allocation Considerations Another complication that is still present with locality-based selection is that each probability is still roughly proportional to the inverse distance from the agent's current location. There is no consideration for the size of each locality Li, so locations in smaller localities are actually favoured because they are generally competing in a smaller pool (once their locality has been chosen). This seems counter-intuitive, and we should expect a heavier traffic flow towards more bigger localities rather than away from them. Whilst this is mitigated by a larger proportion of agents having their home in built up areas, it can still cause a significant and unusual build up of traffic in areas that should not be so busy. This can be exacerbated if there are a lot of s-agents with a gs that encourages them to travel; imagine a one pub town that suddenly and inexplicably has an influx of hundreds of tourists! Whilst this is a plausible scenario, it should not exist by default, and we would prefer to be able to control this. We can add this control by introducing an additional weighting to each locality that reflects its overall size. Not only should we account for the number of locations in the locality, but also have some measure of their popularity and expected usage. Each location (cid:96) is assigned an allocation number a(cid:96). Conceptually, a(cid:96) represents the expected number of agents that will visit (cid:96) during the given scenario, but its main purpose here is to weight the probabilities for each locality. We now give the probability that the next activity αk occurs in locality Li as: Pr(αk occurs in Li) ∝ (cid:88) (4) 1 dist((cid:96)i0, (cid:96)i) (cid:96)∈Li∩Ms,αk a(cid:96) Localities with higher overall allocations for the relevant activity are given a higher weighting. Importantly, the current locality is equally affected by this metric, with a 'distance' being prescribed as in (3) (note that gs is now not a proper probability, but a factor that determines the pseudo- distance) so an agent's decision to stay within their current locality will also consider the options on offer there. This method of selecting destinations is a version of the gravity model of transportation (J. E. Anderson, 2011). It allows the dispersion of agents throughout the day to be more tightly 34 controlled, and for hotspots to be set according to the prevailing conditions. For instance, if on a given day there is an event at one particular beach, then the allocation for that beach should be raised to encourage those agents with beach activities to go there. 3.3.3 Home Selection We have discussed how agents will select a new location based on their current location, but have not yet established where they are initialised. For most agents, the location they begin at will heavily influence all further trip locations. Each plan has been explicitly constructed to ensure that an agent begins and ends their day with the same α1 activity, so unlike with other activities, we guarantee that an s-agent's home location remains the same every time it is assigned (note that as defined in Section 3.1.2, home and α1 are synonymous). As it will always be the first activity in an s-agent's ordered daily plan, α1 is also the only activity that needs to be assigned without the context of a prior (cid:96)0 location. Instead, we randomly choose Li from the set of eligible localities {LiLi ∩ Ms,α1 (cid:54)= ∅}. and then consequently we can choose (cid:96) ∈ Li ∩ Ms,α1 as the location for α1. The allocation numbers a(cid:96) for (cid:96) ∈ Ms,α1 play a special role in the home selection process. In this case, the conceptual understanding of a(cid:96) as the expected number of people attending the location during the scenario does impose a hard cap on the number of agents that can reside at (cid:96). Whenever an agent (from any subgroup) is assigned (cid:96) as their home location we deduct 1 from a(cid:96), globally affecting the likelihood of that location being assigned to another agent. If a(cid:96) = 0, then (cid:96) is removed from L. This ensures that the population is initially distributed in a manner that matches the region. It is therefore especially important that all specified home locations (cid:91) s∈S Ms,α1 and the associated allocation numbers reflect the true distribution and den- sity of people in each area of interest, because this will dictate where traffic is heaviest for all other activities. Algorithm 3 describes the location section of the algorithm. The function choose randomly samples from the specified set. 35 Algorithm 3: Choosing activity locations for all agents 1 Form plan for each agent∈ {1, 2, ..., P} via Algorithm 2 2 for s ∈ S do for agent ∈ {1, 2, ..., Ps} do 3 4 5 6 7 8 9 10 11 12 home locality =choose {LiLi ∩ Ms,α1 (cid:54)= ∅} home location =choose {(cid:96) ∈ home locality ∩ Ms,α1a(cid:96) > 0} a(cid:96) = a(cid:96) − 1 if a(cid:96) == 0 then L = L \ {(cid:96)} (cid:96)0 = home location for activity ∈ planagent \ {α1} do locality =choose Li ∈ R with weighted prob. from (4) activity location =choose (cid:96) ∈ Li ∩ Ms,activity 3.4 Adding Bushfire Behaviours The above algorithm creates a population.xml that is ready for MATSim to use on a regular day, but it will not contain any of the information re- quired to describe how the agents will act in a bushfire. We now describe a behaviour model that allows an agent to disrupt these usual daily plans by taking the exceptional circumstances into account. This model is designed to be implemented in the BDI-ABM integration framework described in (Singh et al., 2016), where agents running in the BDI engine Jill serve as cognitive counterparts to the active ABM agents in MATSim (see Figure 6). The behaviour model thus follows Jill's architecture, where goal-plan hi- erarchies filter abstract belief states down to actions for the ABM agent execute. The design of the hierarchies is based around the same broad input subgroups that govern the population generation algorithm, and ac- cordingly we initialise behaviours as appended attributes in the generated MATSim population.xml. These BDI attributes -- together with the asso- ciated characteristics that emerge from the population generation inputs -- form a behaviour profile that describes how an agent is going to act in a given bushfire scenario.6 6As we move into discussing the bushfire behaviour model, our language will shift towards a more descriptive tone. From here on, the focus is less on formally defining concepts, and more on explaining the methods and rationale behind our attempt to capture human behaviour in the model. 36 actions percepts status A1 BDI System A2 A3 A1 ABM System A2 A3 Figure 6: A diagram representing the BDI-ABM integration (Singh et al., 2016). 3.4.1 Threshold Model Since the 2009 Black Saturday bushfires in Victoria, most Australian re- search regarding bushfire behaviour has concerned if and when people will evacuate in the face of the threat. This decision process is central to the be- havioural model. We need to accommodate the temporal aspect of incoming information in an unfolding situation, where multiple warning sources can have a cumulative effect on a person's actions. The scheme should also en- sure that there is variation in behaviour even within subgroups; some people will intrinsically be more inclined to leave early, whereas others might never evacuate even in the face of severe danger. For this reason, we employ a threshold-based model, where each agent has an intrinsic tolerance value which determines how risk averse they are, and therefore how likely they are to respond to the new information about the bushfire threat. Incoming information, or percepts, are broken up into two categories. Environmental alerts pertain to information gleaned di- rectly from the surroundings. They will include embers, smoke, flames, the movement of neighbouring agents, and the actions of emergency services in the vicinity. Transmitted alerts include those that are issued by the emergency authorities before and during a bushfire emergency and other messages received via the media or other communications networks. Let E and T denote the sets of all alerts e and τ for each category. Both sets are 37 totally ordered e1 ≤ e2 ≤ ... ≤ eq ≤ ... ≤ eQ, τ1 ≤ τ2 ≤ ... ≤ τm ≤ ... ≤ τM i.e. we denote the severity or value of each percept relative to the oth- ers in its category. Whenever an agent receives a percept, it will update its 'barometer' for the corresponding alert type. The two categories dif- fer here in that the Environmental barometer only updates monotonically when the new alert is of greater severity than the previous alert, whereas the Transmitted barometer can also be decreased based on a reduced level of threat. This reflects the nature of the different alert types; if you see smoke, it doesn't reduce the threat of the flames you had seen earlier, but if you receive a less severe warning from an authority it is likely to decrease the concern caused by an earlier message. We now have a way of capturing the different types of threat percepts that might trigger an evacuation, defined a method of updating the severity level of the threat, and separated the percepts into groups that broadly maintain a distinction between primary and secondary information. We now must combine these two barometers into one value that reflects a person's overall threat level. If we consider E × T = {{0, 0},{e1, 0},{0, τ1},{e1, τ1}, ...,{eQ, τM}} representing the set of all combinations of alerts that an agent may have registered as their barometer at some time (with 0 representing no threat of that type being received). There is naturally a partial ordering on the ordered pairs for each fixed value of eq or tm (stemming from the ordering in the other category set). However, there is no defined order of, say, {e1, t3} and {e2, t2}. We therefore need to define a mapping r : E × T −→ (0, 1) which maintains all partial orders and also defines an order between each undefined element pair. Note that the value set that r maps to is arbitrary, and serves only to quantify the ordering into a ranking score. We may then have the case that, say, r({e1, t3}) = r({e2, t2}) i.e. an agent can arrive at a ranking score through various different combinations of alerts. The ranking r of the current barometer levels is then compared against an agent's intrinsic tolerance score tol, and if r > tol then the agent will change their daily plan. 38 3.4.2 Possible Bushfire Behaviours We now show how changes of plan are decided upon by an agentusing the Belief-Desire-Intention model of cognition. We design and implement be- haviours based on what is understood to occur in a bushfire situation. Fun- damentally, we have constrained variation of behaviour to three end goals: • Go home now: The agent will take a route towards their home location. It is important that every agent has a home location, as specified in 3.1.2. • Go to dependant now: The agent will take a route towards the loca- tion of a dependant. Here a dependant may represent a child, elderly relative, farm animal or some other responsibility that an agent may have that will require them to detour before going home or before leaving. • Leave now: The agent will decide on an evacuation destination and begin to move there. These goals are triggered as the result of the reasoning process that accounts for current location, whether the agent is also planning on going home, and if there are dependants to attend to. We do this using two threshold levels for each agent. The first, tol=INIT represents the level at which an agent decides to stop their daily plan, but has not yet committed to seeking shelter, and triggers the high-level Initial Response goal. The second, tol=ACT, defines the level at which an agent will decide to leave, and will trigger the Act Now goal. Both high-level goal structures are described as goal-plan tree diagrams in Figure 7 and Figure 8. Both INIT, ACT ∈ [0, 1], with 0 and 1 indicating that the threshold is always or never broken respectively. It is clear too that the two decisions happen in order, so INIT ≤ ACT. The distinction between the two thresholds is important as it allows a diverse range of responses. An agent may have its INIT threshold broken, returning to home and then never exceeding its ACT threshold; this would represent someone who has chosen to stay and defend their property. Likewise, we can define agents who will never be allowed to do this by setting INIT = ACT i.e. both thresholds will be triggered at the same time. Note that if the agent has a dependant, then they are guaranteed to execute the Go to dependant goal even in the case that INIT = ACT; this is illustrated in the goal-plan tree. 39 Initial Response dep=T dep=F 1. If dependant is nearby then visit them else Go home with some probability then visit dependant 2. Go home with some probability If ACT threshold met continue daily plan else Go home Go Home Go To Dependant Figure 7: Initial Response goal-plan tree (goals are in green, plans are in yellow). 40 Act Now dep=F dep=T 1. Go home with some probability 2. Leave now Leave now Go Home Leave Now Figure 8: Final Response goal-plan tree (goals are in green, plans are in yellow). 3.4.3 Assigning Attributes Despite the simplicity of the BDI structure above, it can result in a range of outcomes for an agent depending on their threshold levels, whether they have a dependant, and on the probability that dictates whether the agent should go home. This is further diversified when you consider the number of destination options implicit in the Leave now goal. To tie this model to the population generation algorithm, we choose an allocation of these pos- 41 sibilities that matches the expected behaviour of the predefined subgroups in a bushfire. For a subgroup s, we define the following parameters: • prob of dependants: a probability determining how likely an s-agent is to have a dependant. • stays: a Boolean variable determining whether an s-agent will be per- mitted to stay and defend i.e. whether the strict inequality INIT<ACT is possible. • prob of go homes: a probability determining how likely an s-agent is to return home before leaving. • [threshold mins,threshold maxs]: an interval within the chosen rank- ing range which determines where INIT and ACT should lie within. We can then attribute to each agent their INIT and ACT thresholds, determine if they have a dependant and indicate whether they will decide to Go home now. Lastly, we must assign dependant, invacuation and evacuation locations. The dependant location can either be chosen within some radius of home, or if there are particular areas likely to have dependants (e.g. schools, retire- ment homes), these can be specified as dependant locations and selected in the same manner as in Section 3.3. The invacuation and evacuation points will determine preferred destinations to evacuate to once ACT has been trig- gered. An agent will first attempt to reach its preferred evacuation location, but if that is not possible, it will seek refuge within its current locality (with the invacuation point as preference if possible). Clearly there are many po- tential situations that might prevent the agent accessing either location, but having these defined preferences allows behaviours to be further shaped on the subgroup level. To determine the known invacuation and evacuation points, we also use a similar method as in Section 3.3. We want invacuation points to be close to the agent's home, so we enforce a strict preference for invacuation locations within the locality of the agent's home. Conversely, evacuation points should be far from the home, so we use probabilities pro- portional to distance rather than inverse distance. In this case, a person is more interested in getting out of the area than evacuating to a specific location, so entire localities are weighted by their total capacity, and the destination point is the central node of the locality. 42 Figure 9 provides an example of these attributes within a MATSim population.xml file. We conclude this section by highlighting how the cho- sen subgroups S have fundamentally shaped both the population generation and the assignment of BDI attributes. Indeed, a particular agent belonging to a subgroup s will have a listable set of potential behaviours that com- pletely capture how it might act during a given bushfire scenario. Within these behaviours there is enough variation to ensure that over a population of interacting agents the simulation will not be deterministic, and instead will approximate the complex and unpredictable nature of a real bushfire. < person id = " 0 " > < a t t r i b u t e s > < a t t r i b u t e name = " B D I A g e n t T y p e " class = " java . lang . String " > io . github . a g e n t s o z . ees . agents . b u s h f i r e . R e s i d e n t </ a t t r i b u t e > < a t t r i b u t e name = " H a s x s A t L o c a t i o n " class = " java . lang . String " > 7 6 6 7 2 2 . 4 8 0 9 7 7 6 0 7 , 5 7 5 4 4 5 5 . 4 8 8 8 5 1 7 5 </ a t t r i b u t e > < a t t r i b u t e name = " I n i t i a l R e s p o n s e T h r e s h o l d " class = " java . lang . Double " > 0.1 </ a t t r i b u t e > < a t t r i b u t e name = " F i n a l R e s p o n s e T h r e s h o l d " class = " java . lang . Double " > 0.1 </ a t t r i b u t e > < a t t r i b u t e name = " W i l l G o H o m e A f t e r V i s i t i n g D e p e n d a n t s " class = " java . lang . Boolean " > true </ a t t r i b u t e > < a t t r i b u t e name = " W i l l G o H o m e B e f o r e L e a v i n g " class = " java . lang . Boolean " > false </ a t t r i b u t e > < a t t r i b u t e name = " E v a c L o c a t i o n P r e f e r e n c e " class = " java . lang . String " > , 7 9 1 1 1 8 . 1 0 2 5 6 9 2 9 3 , 5 7 5 3 4 6 1 . 0 9 8 7 6 6 3 5 </ a t t r i b u t e > < a t t r i b u t e name = " I n v a c L o c a t i o n P r e f e r e n c e " class = " java . lang . String " > , 7 6 6 7 2 8 . 6 1 8 1 9 5 6 1 7 , 5 7 5 4 4 4 9 . 1 1 6 6 6 8 2 3 </ a t t r i b u t e > </ a t t r i b u t e s > ... </ person > Figure 9: An agent plan with attributes appended. 43 4 Applications We will now apply the population generation model to the Surf Coast Shire region, an area that has been affected by a number of severe fire incidents (Black Saturday, Ash Wednesday) and contains a community that is regu- larly exposed to the bushfire threat. We construct a population for a typ- ical summer weekday in the region, analysing the algorithm's performance and examining the resultant simulation runs to verify that the outputted agent plans adequately reflect the input data. The specific inputs for the scenario have been co-developed with domain experts from the Surf Coast Shire Council (SCSC) and the Department of Environment, Land, Water and Planning (DELWP). 4.1 Algorithm Inputs in Surf Coast Shire In this section we describe the inputs that the population generation al- gorithm takes and justify them within the context of the Surf Coast shire region. The chosen inputs are designed to easily translate across a large number of potential scenarios, and for this reason the number of parameters is kept to a minimum while at the same time giving sufficient flexibility in the kinds of populations that can be generated. Another motivation for this is to provide a user-friendly input process using data and expert opinion most likely to be available to emergency personnel. 4.1.1 Subgroups in Surf Coast Shire The fire season in Victoria falls between November-April and coincides with the busiest tourism period on the Surf Coast, and this also brings a large transient and seasonal population of workers, semi-permanent residents and holiday home owners. Small townships along the Great Ocean Road can have up to 6-7 times the resident population, with permanent residents far outnumbered by tourists and other short-term visitors. This gives a basis upon which to split the population into subgroups, with visitors not only having very different reasons and priorities in forming their daily plans, but also a reduced knowledge of the area and routes between locations. The five identified subgroups for the region are: • Resident (R): those who live in the region, have local knowledge of roads and places of congregation. They are connected to the commu- nity, are likely to have a concern for others, pets, and property, and are most likely to defend property. 44 • ResidentPartTime (RP ): those who own property in the region, but may only live there for several months of the year. Are somewhat familiar with the area, but do not have a large community network. They are less likely to be prepared for a bushfire threat and less likely to defend property. • VisitorRegular (V R): those who have visited the region on several occasions and may have a holiday home there. Will know the area somewhat, but are unlikely to have pets or relatives. Very unlikely to stay and defend property. • VisitorOvernight(V O): those who are unfamiliar with the area and living in short term accommodation. They will not defend property but are likely to gather belongings and then follow instructions or leave the region. • VisitorDaytime (V D): those who are mostly unfamiliar with local roads and places of congregation. They will either ignore a fire alert or leave region. Thus we set S = {R, RP, V R, V O, V D} and require as a first input the number of required agents for each s ∈ S: PR = 10000 PRP = 5000 PV R = 5000 PV O = 15000 PV D = 15000 giving a total population of P = 50000 in the region. 4.1.2 Activities in Surf Coast Shire We now consider the most likely or significant types of activities that occur during summer in the region, taking into account both where people might congregate and which trips are important in shaping a person's daily plan. 45 Whilst the actual nature and location of trips made by individuals of dif- ferent subgroups may differ significantly, it is useful to maintain a broad description of activities here and add granularity via the location maps for each subgroup as this makes the activity distributions easier to construct and understand. The five activities that broadly capture the types of trips that an agent (of any subgroup) will make are: • α1 = home: as required by the algorithm; home locations will range from: residential addresses for Resident, ResidentPartTime and a percentage of VisitorRegular; to hotels, caravan parks and other short-term accommodation options for VisitorOvernight and the re- maining VisitorRegular; to specific 'source' locations outside of the region for VisitorDaytime. Duration is set to 2 hours for all sub- groups. Note that duration here • α2 = work: the work activity will only apply to Resident and ResidentPartTime, and will occur at specified place-of-business loca- tions. Duration is set to 4 hours for all subgroups, which allows for people having breaks and/or working multiple jobs. This activity re- quires the most consideration when it is being distributed throughout the day, with peak work hours occurring during a typical 9am-5pm window. • α3 = shop: similarly, these will be designated in places specified as shopping districts. The focus will be on larger shop areas, where people may tend to gather at times in the day. These locations are also more relevant from an emergency perspective as many of these shopping centres will be places of congregation for invacuation. Duration is set to 2 hours for all subgroups. • α4 = beach: this is a major activity during summer and will be par- ticularly popular with all of the visitor subgroups. Here the peak times in the distribution should be quite clear based on the forecast and could potentially consider tidal information on a per-day basis. Resident agents may have patterns for the beach activity that avoid peak tourist times. Duration is set to 2 hours for all subgroups. • α5 = other: will serve as a catch-all for other less significant activities that occur during the day. It will allow for more diversity in plans between subgroups, and also ensure that there are not too many agents 46 evacuating from the same spots in an emergency. Should usually be maintained as a minor but constant presence at all time steps to allow for this diversity. Duration is set to 2 hours for all subgroups. We therefore define the set of activities A = {α1, α2, α3, α4, α5}. A is mapped per subgroup to the set of locations L, which are provided as a ESRI shapefile (.shp) by SCSC. Also included in this file are the locality and allocation number for each location. Apart from the distinction in home locations described above, some other interesting differences between subgroup activity mappings include only mapping more popular beaches to the visitor groups, assigning schools to other for the Resident subgroup and assigning landmarks and national parks to other for VisitorDaytime and VisitorOvernight. 4.1.3 Distributions in Surf Coast Shire We now take the set of activities A and formulate distributions for each subgroup. In keeping with our choices for durations, the time-step size is set to 2 hour blocks, meaning that there are 12 'bins' that need to be es- tablished for each subgroup. Note that the durations listed for each activity do not necessarily reflect their typical duration, but indicate the approxi- mate time interval at which an agent will re-evaluate its activity. It is quite possible that a Resident agent could spend the entire day performing the home activity if during activity selection home is chosen for every time-step. Figures 10 and 11 show some examples of activity distributions on a typical summer day for Resident and VisitorDaytime: Figure 10 shows that for a Resident, the major working time is be- tween 8 a.m. and 6 p.m. in keeping with a regular weekday. In both cases, shopping activity increases in the afternoon and continues until dinnertime, when people (particularly visitors) are likely to be at restaurants and bars. Note that these distributions have not been formally validated by SCSC, and rather represent a first attempt to capture the dynamics of typical weekday activities in the region. These serve for demonstration purposes, but activ- ity distributions will ultimately be derived from actual daily trip data. 47 Resident e g a t n e c r e P 100 50 0 1 3 5 7 9 11 13 15 17 19 21 23 Time of day home work beach shops other Figure 10: Activity distribution for Resident subgroup on a typical summer day. 4.1.4 Locations in Surf Coast Shire Locations are supplied by SCSC and exist in a number of different forms. At the most basic level, a small number of source nodes throughout the region serve to distribute the population, with a limited set of polygons describing areas of work, beaches etc. This approach is crude but useful for quickly describing patterns of movement. However, to create accurate day plans that vary across the population (and thus give realistic traffic movement) a greater level of detail is required. Per-address data allows a population to be precisely mapped at an appropriate density to residential areas and tourist spots. It also allows the possibility of specific, niche trips (e.g. to a golf club, national park or fishing pier) that further diversify the population's movements or capture known patterns that may be of concern in an emergency. Figure 12 illustrates why realistic address data can have a significant impact on resultant traffic flow. The trade-off is that the increased detail increases algorithm runtime. The locality-based approach (see Section 3.3.1 mitigates this somewhat, and also allows us to frame our subgroups in terms of how likely they are to move through the region. The final input we need to form agent plans is a travel factor measure for each subgroup. We would expect that visitors are 48 VisitorDaytime e g a t n e c r e P 100 50 0 1 3 5 7 9 11 13 15 17 19 21 23 Time of day home work beach shops other Figure 11: Distribution table for VisitorDaytime subgroup on a typical summer day. more likely to move between localities than residents, and so we assign the following provisional probabilities: gR = 0.2 gRP = 0.3 gV R = 0.4 gV O = 0.6 gV D = 0.8 4.2 Results of the Algorithm We now run the algorithm with the above inputs using the programming language R to generate a viable MATSim population.xml file. For testing we used a 2013 Macbook Air with 2 cores and 8GB of RAM. With 50, 000 agents, the process takes 25.14 minutes, but this duration is largely due to the fine granularity of the full locations .shp file (∼ 75, 000 address points). If we reduce that down to ∼ 40, 000 addresses, which is still very fine-grain, we get a runtime of 9.30 minutes. It is therefore important to balance a re- 49 Figure 12: Per-address location data on the Surf Coast Shire. The location points (pink) cluster around larger coastal communities, with hardly any addresses in the national park area (green). alistic representation of locations in the region with restricting the location options down to match the number required by the given population (note that many visitor agents will be mapped to the same home nodes; in fact we may have 10,000-15,000 all originating from the same out-of-region source node, so we generally require less nodes than agents). We proceed with the full locations data as the most general case. 4.2.1 Plan Times To verify that the generated plans reflect the required population dynam- ics, we compare the input distributions, which detail the expected number of agents performing each activity during each time bin, to the generated number of agents completing those activities in the population.xml file. In Table 2 and Table 3, we see for the two resident subgroups that the cumulative effect of work having a longer duration than other activities results in a ∼ 5% discrepancy towards the end of the peak working period. In the other subgroups (Table 4-6) where work is not a valid activity, we see 50 Table 2: Percentage variation from input distribution at each time step for Resident subgroups. Resident Activity home work beach shops other Activity home work beach shops other 8am 12am 2am 4am 6am 10am -2am -4am -6am -8am -10am -12pm 0.03 0.09 0.04 -0.41 -0.18 -0.15 0.2 0.19 -0.12 -0.08 -0.13 0.14 0.36 -0.25 0.16 -0.41 0.13 0.05 -0.3 0.19 -0.18 0.25 0.38 0 0 0 0 0 0 0 8pm 12pm 2pm 4pm 6pm 10pm -2pm -4pm -6pm -8pm -10pm -12am -0.2 -0.09 -0.39 0.19 0.08 0.52 -0.01 -0.03 -0.49 0.79 -0.26 -0.01 0.35 -0.2 -0.2 0.12 -0.07 -3.83 5.04 -1.07 -0.14 -0.57 0.19 -0.01 0.39 -0.1 0 0 0 0 Table 3: Percentage variation from input distribution at each time step for the ResidentPartTime subgroup. ResidentPartTime Activity home work beach shops other Activity home work beach shops other 12am 2am 4am 6am 10am -2am -4am -6am -8am -10am -12pm -0.12 8am 0.1 -0.08 0.18 0.04 -0.24 0.48 -0.02 0.24 -0.3 -0.4 -0.5 -0.2 -0.24 -0.02 0.96 0 0 0 0.12 0 0 0 0 0 0.04 -0.16 0 0 0.12 8pm 12pm 2pm 4pm 6pm 10pm -2pm -4pm -6pm -8pm -10pm -12am -0.2 -0.92 0.24 -1.2 1.18 -0.02 -2.06 4.96 0.28 -1.42 -1.76 -0.34 0.3 0.06 0.58 -0.6 0 0 0.9 0.02 -0.64 0.02 -0.24 -0.2 0.42 0.02 0.56 0.06 0 0 51 that at all time-steps the generated plans match the input distributions to a maximum error of ∼ 1%. The difference in outcome for the two activity distributions for Resident and VisitorDaytime, first introduced in Figures 10 and 11, is emphasised visually in Figure 13. Table 4: Percentage variation from input distribution at each time step for VisitorRegular subgroup. VisitorRegular Activity home beach shops other Activity home beach shops other 12am 2am 4am 6am 10am -2am -4am -6am -8am -10am -12pm 0.22 8am 0.16 0.26 0 0 0 0 0 0 -0.22 -0.16 -0.26 0.12 -0.5 0.38 0 -1.2 0.46 0.1 0.64 -0.76 0.26 -0.16 0.66 -0.5 -0.32 0.6 0.22 8pm 12pm 2pm 4pm 6pm 10pm -2pm -4pm -6pm -8pm -10pm -12am -0.34 0.74 0.94 -0.6 0 0.2 0.08 0.12 -0.4 0.3 0.02 -0.2 -0.12 -0.38 -0.36 0.24 0.48 -0.52 -0.2 0 52 Table 5: Percentage variation from input distribution at each time step for the VisitorOvernight subgroup. VisitorOvernight Activity home beach shops other Activity home beach shops other 12am 2am 4am 6am 10am -2am -4am -6am -8am -10am -12pm 0.11 -0.04 8am 0 0 0 -0.11 0.04 0 0 -0.41 0.37 0 0.03 0.09 0.11 -0.34 0.14 0.23 0.13 -0.48 0.12 -0.21 -0.01 0.21 12pm 2pm 4pm 6pm 10pm -2pm -4pm -6pm -8pm -10pm -12am 8pm 0 -0.21 0.15 0.07 0.03 0.23 0 -0.26 -0.03 -0.25 0.09 0.19 0.03 0.31 -0.09 -0.25 -0.13 0.05 0.19 -0.11 0 0 0 0 Table 6: Percentage variation from input distribution at each time step for the VisitorDaytime subgroup. VisitorDaytime Activity home beach shops other Activity home beach shops other 8am 12am 2am 4am 6am 10am -2am -4am -6am -8am -10am -12pm -0.04 0.53 -0.27 -0.21 -0.19 0.22 0.32 -0.35 0.38 -0.11 -0.36 0.09 -0.05 -0.03 0 0 0 0 0 0 0 0 0.08 0 8pm 12pm 2pm 4pm 6pm 10pm -2pm -4pm -6pm -8pm -10pm -12am 0.07 -0.32 0.19 0.07 0.25 -0.26 0.43 -0.41 -0.23 -0.08 0.23 0.07 -0.63 -0.35 0.54 0.45 0.03 0.09 0.12 -0.25 0 0 0 0 53 Resident activity error (output-input) 11 33 55 77 99 1111 1313 1515 1717 1919 2121 2323 Time of day home work beach shops other VisitorDaytime activity error (output-input) e g a t n e c r e P e g a t n e c r e P 5 0 −5 1 0 −1 11 33 55 77 99 1111 1313 1515 1717 1919 2121 2323 Time of day home work beach shops other Figure 13: Percentage error in both the Resident and VisitorDaytime subgroup. The former has a very obvious error outlier. The latter has a maximum error < 1%, with the error spread evenly throughout the 'busy' part of the day. 54 4.2.2 Plan Locations We must also analyse a) how successfully the algorithm distributes activ- ities, and b) if the trips between activities are realistic enough to provide an appropriate traffic background. To do this, we run the plan in MAT- Sim and observe the output events data. Figures 14-18 provide a snapshot run-through of how the morning plays out in this scenario for a particu- lar community in the region (Torquay). In these maps, location nodes are coloured if they are being used by an agent for an activity. The colour mapping is home −→ blue work −→ green beach −→ yellow shops −→ orange other −→ white To verify that the background traffic is working as planned, we view snapshots of traffic flow in Figures 19 and 20. The colour mapping here is the same as previously, but now the triangles represent moving vehicles on the road that are travelling to a location to complete the activity corre- sponding to their colour. 55 Figure 14: Agent activity locations at midnight. The vast majority of the population are at home (blue), which is not surprising just after initialisation (recall that every agent begins at home). We can see one or two agents have already started performing other activities (white) and one worker has already begun their shift (green). We can note that the algorithm has successfully allocated a concentration of people to individual address points in residential areas, with CBD areas less populated during off-peak times. 56 Figure 15: Activity locations at 3am. More other activities have begun, and a few more agents are now at work. We also see the introduction of a few early morning shops activities (orange). In this visualisation, glow- ing or bright points indicate that activity is starting at that location, with continuing activities maintaining their colour until they are terminated. 57 Figure 16: Activity locations at 6am. There are a few more people at work, but the most significant change is that dawn has brought out a few beachgoers (yellow). Notice how both work and beach activities are con- centrated within one or two areas. The input location data used here tends to focus on a few busy or popular areas as centres for particular locations. 58 Figure 17: At 9am the activity locations have reached a point where all 5 activities are well represented in the snapshot. We note that there is now a significant number of agents performing work, coinciding with the beginning of the peak work times for a typical summer weekday. Beach activitiy is also peaking here, with many activities occurring along the coastal strip. 59 Figure 18: By midday we have less people beginning work, but there is still a steady set of working agents. Trips to shops have increased signifi- cantly, and are almost the most popular activity around lunch time. Many of those people who began work during the first peak work starting time would now be finished, and may have decided to go to the shops after work. The percentage of people at home has now very noticeably dropped from earlier in the morning, indicating that many agents are out and travelling to/undertaking other activities. 60 Figure 19: Here we have an overview of the entire region at 9am. We can see that a significant flow of traffic has already begun to come in from the East (from Melbourne), with smaller contributions also coming from the west. As we would expect, the most congested road in the region is along the coast (the Great Ocean Rd). Most of the work traffic seems to be focussed in the area we observed already in Torquay. 61 Figure 20: Zooming in on commuters between Anglesea and Torquay, we can see in greater detail how congested the coastal routes can get. Congestion within Anglesea seems comparatively light, and it seems the majority of travel is through Anglesea rather than to or from it. 62 4.3 Adding BDI Attributes We now append the attributes that will determine how each agent will act once their plans change due to a bushfire threat in the SCS region. This involves first establishing sets E and T of Environmental and Transmitted alerts, defining a ranking r on E × T , and determining the parameters for each subgroup that will assign attributes. 4.3.1 Alerts in the Surf Coast Shire There are any number of events that might trigger a person to evacuate during a bushfire, but here we focus only on two environmental cues, smoke and fire, and three core message types that may be issued by emergency services: 'Advice', 'Watch and Act', and 'Evacuate Now'. These warnings can be ordered in terms of severity, and we assign both types of alert values in [0, 1] as follows: Table 7: Barometer scores for each alert. Environmental Transmitted Value 0.1 0.2 0.3 0.4 Watch and Act Evacuate Now Advice - - - Smoke Fire We then define the total barometer score to be r(e, τ ) = e + τ e.g. an agent who has both seen smoke and received a 'Watch and Act' message will have a total barometer score of 0.5. There are a number of assumptions that we make with these messages. Firstly, it is assumed that all messages are able to be sent to specific areas of the region. We then also assume that any agent who is in that area when the message is sent will see the message. The same holds for environmental alerts. We assume that people only see and respond to the visual cues when they are within a 5km of the fire front (for smoke) or 1km (for fire). Smoke is particularly hard to quantify in this sense, because in a bushfire it is very likely that people will be able to see smoke from further than 5km away. But seeing smoke from afar is also not as likely to invoke a response. We may conceptualise the smoke alert here as the point when smoke begins 63 to interfere with people's line of sight. Indeed, it may be useful in future work to have an additional, lesser, smoke alert which represents this smoke awareness. 4.3.2 Attribute Parameters The only other inputs that the BDI model requires are the per-subgroup parameters which determine their attributes. These are: • prob of dependants: the probability that an s − agent has a depen- dant. • stays: true if the strict inequality INIT<ACT is possible i.e. deter- mines whether an s-agent can stay and defend. • prob of go homes: the probability that an s-agent will return home before leaving. • [threshold mins,threshold maxs]: the interval from which the two threshold score INIT and ACT are drawn from. The values that we use for these variables here are given in Table 8. Table 8: Attribute parameters for each subgroup. Subgroup prob of - dependant 0.3 Resident ResidentPartTime 0.05 0 VisitorRegular VisitorOvernight 0 0 VisitorDaytime Subgroup threshold - min 0.1 Resident ResidentPartTime 0.1 0.1 VisitorRegular VisitorOvernight 0.2 0.3 VisitorDaytime stay 1 1 1 0 0 prob of - go home 0.5 0.4 0.4 0.8 0 threshold - max 0.8 0.6 0.4 0.4 0.7 With these inputs, we can now add the BDI attributes. Using a separate R script, we assign Boolean values to each agents' plan that reflect whether 64 Figure 21: An agent plan with attributes appended. < person id = " 11154 " > < a t t r i b u t e s > < a t t r i b u t e name = " B D I A g e n t T y p e " class = " java . lang . String " > io . github . a g e n t s o z . ees . agents . b u s h f i r e . R e s i d e n t P a r t T i m e </ a t t r i b u t e > < a t t r i b u t e name = " H a s D e p e n d a n t s A t L o c a t i o n " class = " java . lang . String " > </ a t t r i b u t e > < a t t r i b u t e name = " I n i t i a l R e s p o n s e T h r e s h o l d " class = " java . lang . Double " > 0.5 </ a t t r i b u t e > < a t t r i b u t e name = " F i n a l R e s p o n s e T h r e s h o l d " class = " java . lang . Double " > 0.6 </ a t t r i b u t e > < a t t r i b u t e name = " W i l l G o H o m e A f t e r V i s i t i n g D e p e n d a n t s " class = " java . lang . Boolean " > false </ a t t r i b u t e > < a t t r i b u t e name = " W i l l G o H o m e B e f o r e L e a v i n g " class = " java . lang . Boolean " > false </ a t t r i b u t e > < a t t r i b u t e name = " E v a c L o c a t i o n P r e f e r e n c e " class = " java . lang . String " > Lorne 3 4 , 7 5 9 2 7 1 . 0 9 3 7 1 8 8 3 , 5 7 2 9 8 5 1 . 2 9 6 7 0 2 9 </ a t t r i b u t e > < a t t r i b u t e name = " I n v a c L o c a t i o n P r e f e r e n c e " class = " java . lang . String " > , 7 9 4 0 2 0 . 8 9 3 9 8 4 8 0 2 , 5 7 7 1 8 4 5 . 0 8 2 2 4 7 8 4 </ a t t r i b u t e > </ a t t r i b u t e s > < plan s e l e c t e d = " yes " > < a c t i v i t y type = " home " x = " 7 9 4 3 6 3 . 9 7 6 3 4 9 2 1 5 " y = " 5 7 7 1 3 6 7 . 1 8 2 7 4 8 8 8 " e n d _ t i m e = " 0 8 : 0 4 : 0 0 " / > < leg mode = " car " / > < a c t i v i t y type = " shops " x = " 7 9 0 5 2 4 . 0 4 7 7 8 6 2 9 8 " y = " 5 7 5 2 2 1 9 . 8 3 8 2 8 9 7 2 " e n d _ t i m e = " 1 0 : 4 4 : 0 0 " / > < leg mode = " car " / > < a c t i v i t y type = " other " x = " 7 8 9 8 1 6 . 4 2 1 6 7 4 4 4 7 " y = " 5 7 5 3 2 1 3 . 3 3 5 9 2 4 0 3 " e n d _ t i m e = " 1 2 : 4 9 : 0 0 " / > < leg mode = " car " / > < a c t i v i t y type = " work " x = " 7 8 9 7 7 8 . 1 4 4 7 5 4 0 2 2 " y = " 5 7 5 2 6 0 8 . 5 9 3 2 4 6 9 " e n d _ t i m e = " 1 6 : 0 1 : 0 0 " / > < leg mode = " car " / > < a c t i v i t y type = " shops " x = " 7 7 1 1 1 7 . 5 1 1 4 2 9 0 5 6 " y = " 5 7 3 8 6 8 0 . 5 7 7 3 0 3 4 6 " e n d _ t i m e = " 1 9 : 0 6 : 0 0 " / > < leg mode = " car " / > < a c t i v i t y type = " home " x = " 7 9 4 3 6 3 . 9 7 6 3 4 9 2 1 5 " y = " 5 7 7 1 3 6 7 . 1 8 2 7 4 8 8 8 " / > </ plan > </ person > 65 it has a dependant and whether it will go home (note that this decision depends on whether the agent has a dependant). We also determine a INIT and ACT tolerance and choose a location for the dependant (if applicable), as well as evacuation and invacuation preference locations. These last two are determined by a separate Refuges.shp file provided by SCSC. The resulting attributes appear at the start of the agent's MATSim plan, as shown in Figure 21. Note that the blank HasdependantsAtLocation field occurs whenever the agent does not have a dependant. The InitialResponseThreshold and FinalResponseThreshold fields represent INIT and ACT respectively. WillGoHomeAfterVisitingDependants and WillGoHomeBeforeLeaving en- compass two variations of the same behaviour, and at most one of them will be true -- this is determined via the prob of go home parameter. 4.4 SCS Application To fully demonstrate the usefulness of the algorithm, we apply the plans with attributes in a bushfire evacuation simulation. Using the EES simu- lation model, this will show both the importance of having the population realistically situated and engaged in daily plans, and the ability for BDI attributes to directly impact an agent's response to a bushfire threat. In the following scenario, the response of a community in Anglesea is tested under two different scenarios. Each scenario has the same generated plan and the same bushfire threat that ignites at midday and eventually encroaches into parts of the town. In one test, the agents are left to respond to the fire on their own (with an eventual 'Evacuate Now' warning at 3pm). In the other, a sequence of messages of increasing severity are delivered to the population, directing them to act earlier. We will proceed again with a series of snap- shots. This time, vehicles are coloured on a spectrum based on their speed in the network, where green represents free-speed and red represents heavy congestion. The previous activity location node colours are also present in the background. We proceed via Figures 22-25. 66 Figure 22: At 12pm when the fire ignites, the state is exactly the same in each scenario. We observe the familiar flow of traffic through Anglesea, and that there are still many people at home. As was the case in Torquay, midday sees a high level of shops and beach activity around the coastal strip. Figure 23: By 2pm, we see the two scenarios have diverged significantly. On the left, traffic has increased in the middle of Anglesea proper, but the traffic flow in and out has not changed. The purple activity location nodes indicate that some have decided to take action, but a lot of people are still at home oblivious to or unconcerned by the threat. On the right side, we see that congestion increases as people attempt to evacuate from the danger zone. Three messages have already been issued, with the severity raised at 1.30pm. There are hardly any people left in their homes, except those that have returned there to prepare and/or defend. 67 Figure 24: By 4pm, we begin to see the fire encroach upon the outskirts of Anglesea. The smoke front will now have alerted most people that they need to act even if the messages did not. The community on the left has by now received an 'Evacuate Now' message, and we see that they are roughly at the level of congestion stage that the other community was two hours ago. In the scenario on the right, the congestion has eased somewhat by now towards the south of Anglesea, and pretty much everyone, bar a few defenders, has left or is trying to leave. Figure 25: The fire is now engulfing the edge of the town. By 6pm, everyone in the community on the right who wanted to escape has done so, and there is no congestion on the roads leaving Anglesea. On the left, however, the situation is far more urgent, with lots of people still stuck on the road as the fire approaches. 68 Whether or not the stark contrast between outcomes in the previous EES example totally reflects the effectiveness that emergency warnings can have, we did see the capability of agents to take in information from various sources and react to a threat accordingly. Further, we saw variation in behaviour, even within each scenario, where a fair number of local agents decided to stay and defend, at least until it became clear that the danger was too great. The movement of people prior to the evacuation situation was also important, as it meant that the main arterial roads out of Anglesea were already busy. This affected the ability of people to evacuate, particularly on the left scenario. Thus this application provides some useful insights into what benefits our population generation model with appended BDI attributes can provide. 69 4.5 Discussion The error tables (Tables 2 and 6) reveal that variation in activity durations can affect the ability of the algorithm to reproduce the input distributions. Whilst the algorithm takes into account the durations of each activity and adjusts the probability matrix accordingly, it still relies on the input distri- butions giving a 'feasible path' for agents to complete activities according to their durations. If the distribution of people working drops off too dramati- cally from one time step to the next, the algorithm may not be able to shift enough agents away from the work activity. This is because the distributions are essentially decoupled from activity durations. One solution is to smooth the changes between time-steps in the distribution. However, if the distri- bution data does accurately reflect the whereabouts of the population, then modifying them essentially results in a discrepancy anyway, so this process should be minimised. The other alternative is to make small adjustments to the durations of each activity, in conjunction with smaller time-steps (i.e. more detailed activity distributions). This requires a more complicated set of distribution inputs, and these may be difficult or impossible to accurately obtain. We therefore must also weigh the need for the output to match the distributions exactly against the accuracy of the distributions themselves and the appropriate duration of each activity. If there was no level of du- ration control, then total correspondence with the distributions would be attained (agents are always where they should be) but with the drawback that there will be more movement between activities (because each agent can change activity at every time-step). This may result in background traf- fic that does not realistically represent the region. To strike an appropriate balance between these needs, a maximum error of ∼ 5% was decided upon, which we observe in the tables. One potential improvement to the population generation process would be to apply MATsim's iterative re-planning capabilities to the generated population.xml file. The agent plans will then converge to a traffic equi- librium, ensuring that the daily plans we apply prior to the bushfire threat are collectively feasible and optimised at the individual level. However, this process could serve to compound the error that we observe above, as the iterative process would likely diverge away from the idealised expected ver- sion of events presented by the input distributions. Similarly, attempting to calibrate the model outputs to actual traffic counts would add to the tension that exists between matching the static inputs to a dynamic output process that is designed to replicate an even more complex reality. This calibra- tion approach is planned for future work, and will likely see the algorithm 70 modified to factor in these traffic counts as part of the generation process. The alert ranking system provides a way of ordering alerts that is easy to understand, but is somewhat arbitrary in the way it orders the possible combinations of environmental and transmitted alerts. It results in some equivalences that may not exist, e.g. (Smoke, Advice) ≡ (Fire, 0) A more thorough ranking system would explicitly order every possible combination of environmental and transmitted alert. With the number of alerts we consider during this demonstration this would be a simple task, but in practice there will be other alerts of both types that may or may not be used in a given scenario. This current system may be viewed as a useful temporary measure to allow quick interchanging or introduction of new alerts without necessarily needing to place every new combination into some order. Once the full set of alerts is established, a more concrete ranking system can be applied. Some other potential environmental alerts are observing embers, observing neighbours leaving and aural cues. There are also a number possible of transmitted messages that are possible, often as variations of the three included here. 5 Conclusion Bushfires threaten communities every year, and due to their sometimes rapid onset and unpredictable nature it is imperative that at-risk regions prepare themselves to respond. Planning that accounts for nuances in a specific population and region can help improve resilience and preparedness of both the authorities and the community in the face of a threat. In this research we have presented a method for capturing these dynamics and measuring their significance through bushfire evacuation simulation. Our contribution is an algorithm that takes a set of activity profiles and generates agent daily plans in the form of a MATSim population.xml file. The algorithm was designed to generate synthetic populations for regions that are not easily approximated by incremental sampling techniques due to an actual population that has a significant transient element. Further, we have implemented this algorithm as a tool to generate populations for emergency evacuation simulations. This requires a set of flexible inputs that can be modified to suit a particular scenario and that are be easily understandable to domain experts. 71 We have also utilised the BDI cognitive framework to construct a bush- fire behaviour model that allows our generated populations to reason and respond to a bushfire threat. Using threshold parameters, we have intro- duced a method to vary these responses across our populations in a manner that mimics the way that humans process new information. Input attributes of this bushfire behaviour model have been integrated into the population generation algorithm to provide a single tool that can create synthetic pop- ulations for a wide range of different bushfire scenarios. Lastly, we have applied this tool to Surf Coast Shire in Victoria and tested it in a number of scenarios. The algorithm has contributed to the wider project by bringing a dynamic element to the notion of evacuation messaging, and the behaviour model will allow emergency personnel to test different approaches to bushfire response when the population has a varying level of engagement. Ultimately it is hoped that the algorithm and associ- ated model presented here will improve understanding of the risks associated with bushfire evacuation. 5.1 Future Work This research is part of a larger project looking at improving the evacuation planning process for at-risk communities. This thesis presents work to date in the wider context of this project, with the ultimate aim being to develop a model that gives a realistic representation of any population, both in the form of their daily plans and their eventual bushfire responses. Most of the input data used in Section 4 has only been informally validated and does not necessarily reflect the actual make-up of the population in the Surf Coast Shire. In this sense, much future work will be devoted to ensuring that the model is validated and calibrated. For the algorithm, this will mean using traffic counts and travel times to match observed data with the movements of the synthetic population. For the behavioural model, we plan to continue to work with behavioural experts, especially in the area of behaviour profiles and archetypes (Strahan et al., 2018). On particular area of interest is the introduction of social networks as another means for agents to become aware of the threat level. This could be implemented as a third alert type in the threshold model, and allow a bigger set of alert combinations to diversify the kinds of possible responses further. In terms of application, the project aims to encompass the whole of Vic- toria. The required inputs therefore must be easily obtainable and general enough to apply to each region, whilst still maintaining the ability to distin- guish communities by their demographic make-up. This broader approach 72 will also necessitate that the model allows for interaction between regions, and how evacuation movements in one place can have a flow-on effect in another. References Adam, C., Danet, G., Thangarajah, J., & Dugdale, J. (2016). BDI mod- elling and simulation of human behaviours in bushfires. In Information Systems for Crisis Response and Management in Mediterranean Coun- tries. Madrid: Springer Germany. 7 Adam, C., & Gaudou, B. (2017). Modelling Human Behaviours in Disasters from Interviews: Application to Melbourne Bushfires. Journal of Artificial Societies and Social Simulation, 20 (3). doi: 10.18564/jasss.3395 17 Anderson, J. E. (2011). The Gravity Model. Annual Review of Economics, 3 (1), 133-160. doi: 10.1146/annurev-economics-111809-125114 34 Anderson, J. R. (1996). ACT: A simple theory of complex cognition. Amer- ican Psychologist, 51 (4), 355-365. doi: 10.1037/0003-066X.51.4.355 12 Antonovics, J., Iwasa, Y., & Hassell, M. P. (1995, May). A Generalized Model of Parasitoid, Venereal, and Vector-Based Transmission Processes. The American Naturalist, 145 (5), 661-675. doi: 10.1086/285761 10 Auchincloss, A. H., & Garcia, L. M. T. (2015, November). Brief intro- ductory guide to agent-based modeling and an illustration from urban health research. Cadernos de saude publica, 31 (Suppl 1), 65-78. doi: 10.1590/0102-311X00051615 14 Axelrod, R. (1997). Advancing the Art of Simulation in the Social Sci- ences. In R. Conte, R. Hegselmann, & P. Terna (Eds.), Simulating Social Phenomena (p. 21-40). Springer Berlin Heidelberg. 13 73 Ballas, D., Clarke, G., Dorling, D., Eyre, H., Thomas, B., & Rossiter, D. (2005, January). SimBritain: A spatial microsimulation approach to population dynamics. Population, Space and Place, 11 (1), 13-34. doi: 10.1002/psp.351 15 Barrett, B., Ran, B., & Pillai, R. (2000, January). Developing a Dy- namic Traffic Management Modeling Framework for Hurricane Evacu- ation. Transportation Research Record: Journal of the Transportation Research Board , 1733 , 115-121. doi: 10.3141/1733-15 17 Bazzan, A. L. C., Wahle, J., & Klugl, F. (1999). Agents in Traffic Modelling - from Reactive to Social Behaviour. 15 Bellifemine, F., Poggi, A., & Rimassa, G. (2001). Developing multi-agent systems with a FIPA-compliant agent framework. Software: Practice and Experience, 31 (2), 103-128. doi: 10.1002/1097-024X(200102)31:2(cid:104)103:: AID-SPE358(cid:105)3.0.CO;2-O 12 Beloglazov, A., Almashor, M., Abebe, E., Richter, J., & Steer, K. C. B. (2016, January). Simulation of wildfire evacuation with dynamic factors and model composition. Simulation Modelling Practice and Theory, 60 , 144-159. doi: 10.1016/j.simpat.2015.10.002 11 Birkin, M., & Clarke, M. (1988, December). Synthesis -- A Synthetic Spatial Information System for Urban and Regional Analysis: Methods and Examples. Environment and Planning A, 20 (12), 1645-1671. doi: 10.1068/a201645 15 Bonabeau, E. (2002, May). Agent-based modeling: Methods and techniques for simulating human systems. Proceedings of the National Academy of Sciences of the United States of America, 99 (Suppl 3), 7280-7287. doi: 10.1073/pnas.082080899 4, 14 Bordini, R. H., Hubner, J. F., & Vieira, R. (2005). Jason and the Golden Fleece of Agent-Oriented Programming. In R. H. Bordini, M. Dastani, 74 J. Dix, & A. El Fallah Seghrouchni (Eds.), Multi-Agent Programming: Languages, Platforms and Applications (p. 3-37). Boston, MA: Springer US. doi: 10.1007/0-387-26350-0-1 12 Bratman, M. E., Israel, D. J., & Pollack, M. E. (1988, September). Plans and resource-bounded practical reasoning. Computational Intelligence, 4 (3), 349-355. doi: 10.1111/j.1467-8640.1988.tb00284.x 12 Busetta, P., Ronnquist, R., Hodgson, A., & Lucas, A. (1999). JACK Intel- ligent Agents - Components for Intelligent Agents in Java. 12 Chan, W. K. V., Son, Y. J., & Macal, C. M. (2010, December). Agent- based simulation tutorial - simulation of emergent behavior and differ- ences between agent-based simulation and discrete-event simulation. In Proceedings of the 2010 Winter Simulation Conference (p. 135-150). doi: 10.1109/WSC.2010.5679168 14 Chen, X., & Zhan, F. B. (2008, January). Agent-based modelling and simulation of urban evacuation: Relative effectiveness of simultaneous and staged evacuation strategies. Journal of the Operational Research Society, 59 (1), 25-33. doi: 10.1057/palgrave.jors.2602321 4, 14 Christakis, N. A. (2007). The Spread of Obesity in a Large Social Network over 32 Years. The New England Journal of Medicine, 370-379. doi: 10.1056/NEJMsa066082 11 {Country Fire Authority}, & {Sweeney Research}. (2009, September). A Qualitative Report on CFA Community Engagement (Tech. Rep.). Coun- try Fire Authority. 4 Crooks, A. T., & Heppenstall, A. J. (2012). Introduction to Agent-Based Modelling. In Agent-Based Models of Geographical Systems (p. 85-105). Springer, Dordrecht. 14 75 Dash, N., & Gladwin, H. (2007, August). Evacuation Decision Making and Behavioral Responses: Individual and Household. Natural Hazards Review , 8 (3), 69-77. doi: 10.1061/(ASCE)1527-6988(2007)8:3(69) 7 Davis, S., Trapman, P., Leirs, H., Begon, M., & Heesterbeek, J. a. P. (2008, July). The abundance threshold for plague as a critical percolation phe- nomenon. Nature, 454 (7204), 634-637. doi: 10.1038/nature07053 11 Dawson, R. J., Peppe, R., & Wang, M. (2011, October). An agent-based model for risk-based flood incident management. Natural Hazards, 59 (1), 167-189. doi: 10.1007/s11069-011-9745-4 14 de Boer, F. S., Hindriks, K. V., van der Hoek, W., & Meyer, J.-J. C. (2002, July). Agent Programming with Declarative Goals. arXiv:cs/0207008 . 12 D'Inverno, M., Luck, M., Georgeff, M., Kinny, D., & Wooldridge, M. (2004, July). The dMARS Architecture: A Specification of the Distributed Multi-Agent Reasoning System. Autonomous Agents and Multi-Agent Systems, 9 (1-2), 5-53. doi: 10.1023/B:AGNT.0000019688.11109.19 12 Epstein, J. M. (2009, August). Modelling to contain pandemics. Nature, 460 (7256), 687-687. doi: 10.1038/460687a 14 Farmer, J. D., & Foley, D. (2009, August). The economy needs agent-based modelling. Nature, 460 (7256), 685-686. doi: 10.1038/460685a 11 Funk, S., Salath´e, M., & Jansen, V. A. A. (2010, May). Modelling the influence of human behaviour on the spread of infectious diseases: A review. Journal of The Royal Society Interface, rsif20100142. doi: 10.1098/rsif.2010.0142 10 Galea, S., Riddle, M., & Kaplan, G. A. (2010, February). Causal thinking and complex system approaches in epidemiology. International Journal of Epidemiology, 39 (1), 97-106. doi: 10.1093/ije/dyp296 11 76 Gilbert, N. (2006). When does social simulation need cognitive models? In R. Sun (Ed.), Cognition and Multi-Agent Interaction: From Cogni- tive Modeling to Social Simulation (p. 428-432). Cambridge: Cambridge University Press. 11, 12, 15 Gilbert, N., & Troitzsch, K. (2011). Simulation for the Social Scientist (2nd ed.). UK: Open University Press. 13 Gode, D. K., & Sunder, S. (1993, February). Allocative Efficiency of Mar- kets with Zero-Intelligence Traders: Market as a Partial Substitute for Individual Rationality. Journal of Political Economy, 101 (1), 119-137. doi: 10.1086/261868 13 Grimm, V., & Railsback, S. (2005). Individual-based Modelling and Ecology. USA: Princeton University Press. 15 Harland, K., Heppenstall, A., Smith, D., & Birkin, M. H. (2012). Creating realistic synthetic populations at varying spatial scales: A comparative critique of population synthesis techniques. Journal of Artificial Societies and Social Simulation, 15 . 15, 21 Haynes, K., Handmer, J., McAneney, J., Tibbits, A., & Coates, L. (2010, May). Australian bushfire fatalities 1900 -- 2008: Exploring trends in rela- tion to the 'Prepare, stay and defend or leave early' policy. Environmental Science & Policy, 13 (3), 185-194. doi: 10.1016/j.envsci.2010.03.002 7 Horni, A., Nagel, K., & Axhausen, K. (2016, August). Introducing MATSim. In A. Horni, K. Nagel, & K. Axhausen (Eds.), The Multi-Agent Transport Simulation MATSim (p. 3-8). London: Ubiquity Press. 19 Ingrand, F. F., Georgeff, M. P., & Rao, A. S. (1992, December). An archi- tecture for real-time reasoning and system control. IEEE Expert, 7 (6), 34-44. doi: 10.1109/64.180407 12 77 Jain, S., Ronald, N., & Winter, S. (2015, December). Creating a Synthetic In Conference of Transportation Population: A Comparison of Tools. Research Group of India (p. 13). India. 15 Jarvis, J., Jarvis, D., & Ronnquist, R. (2008). Holonic Execution: A BDI Approach. Springer Science & Business Media. 12 Johnson, P. F., Johnson, C. E., & Sutherland, C. Human Behavior in Major Evacuations. Dynamics (p. 675-684). Springer, Boston, MA. 7 (2011). Stay or Go? In Pedestrian and Evacuation Jung, C. G. (1969). Collected Works of C.G. Jung, Volume 9 (Part 1): Archetypes and the Collective Unconscious (G. Adler & R. F. C. Hull, Eds.). Princeton University Press. 8 Kennedy, W. G. (2012). Modelling Human Behaviour in Agent-Based In Agent-Based Models of Geographical Systems (p. 167-179). Models. Springer, Dordrecht. 11 Kermack, W. O., & McKendrick, A. G. (1927, August). A Contribution to the Mathematical Theory of Epidemics. Proc. R. Soc. Lond. A, 115 (772), 700-721. doi: 10.1098/rspa.1927.0118 10 Knoop, V. L. (2009). Road Incidents and Network Dynamics: Effects on driving behaviour and traffic congestion. 7 Kulash, W. (1990, October). Traditional Neighbourhood Development: Will the Traffic Work? Bellevue WA. 10 Laird, J. E. (2007, July). Extending the Soar Cognitive Architecture: (Tech. Rep.). Fort Belvoir, VA: Defense Technical Information Center. doi: 10.21236/ADA473738 12 78 Lee, S., Son, Y.-J., & Jin, J. (2010, November). An Integrated Human Decision Making Model for Evacuation Scenarios Under a BDI Frame- work. ACM Trans. Model. Comput. Simul., 20 (4), 23:1 -- 23:24. doi: 10.1145/1842722.1842728 5, 16 Lindell, M. K., & Prater, C. S. (2007, March). Critical Behavioral Assump- tions in Evacuation Time Estimate Analysis for Private Vehicles: Exam- ples from Hurricane Research and Planning. Journal of Urban Planning and Development, 133 (1), 18-29. doi: 10.1061/(ASCE)0733-9488(2007) 133:1(18) 7 Lloyd-Smith, J. O., Getz, W. M., & Westerhoff, H. V. (2004, March). Fre- quency -- dependent incidence in models of sexually transmitted diseases: Portrayal of pair -- based transmission and effects of illness on contact be- haviour. Proceedings of the Royal Society of London B: Biological Sci- ences, 271 (1539), 625-634. doi: 10.1098/rspb.2003.2632 10 Macal, C. M., & North, M. J. (2005, December). Tutorial on agent-based modeling and simulation. In Proceedings of the Winter Simulation Con- ference, 2005. (p. 14 pp.-). doi: 10.1109/WSC.2005.1574234 14 McCaffrey, S. M., Rhodes, A., & Stidham, M. (2015, April). Wildfire evacuation and its alternatives: Perspectives from four United States' communities. International Journal of Wildland Fire, 24 (2), 170-178. doi: 10.1071/WF13050 7 McCaffrey, S. M., Stidham, M., Toman, E., & Shindler, B. (2011, Septem- ber). Outreach Programs, Peer Pressure, and Common Sense: What Motivates Homeowners to Mitigate Wildfire Risk? Environmental Man- agement, 48 (3), 475-488. doi: 10.1007/s00267-011-9704-6 10 McClelland, J. L. (1988). Connectionist models and psychological evidence. Journal of Memory and Language, 27 (2), 107-123. doi: 10.1016/0749 -596X(88)90069-1 12 79 McLennan, J., Elliott, G., & Omodei, M. (2012). Householder decision- making under imminent wildfire threat: Stay and defend or leave? Inter- national Journal of Wildland Fire, 21 (7), 915. doi: 10.1071/WF11061 8 Medsker, L. (1994). Design and development of hybrid neural network and expert systems. In Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94) (Vol. 3, p. 1470-1474). Orlando, FL, USA: IEEE. doi: 10.1109/ICNN.1994.374503 12 Miller, J., & Page, S. (2007). Complex Adaptive Systems: An Introduction to Computational Models of Social Life. USA: Princeton University Press. 13 Moeckel, R., Spiekermann, K., & Wegener, M. (2003, May). Creating In Computers in Urban Planning and Urban a Synthetic Population. Management (p. 18). Sendai, Japan. 15 Moore, C., & Newman, M. E. J. (2000, May). Epidemics and percolation in small-world networks. Physical Review E , 61 (5), 5678-5682. doi: 10.1103/ PhysRevE.61.5678 11 Moritz, M. A., Batllori, E., Bradstock, R. A., Gill, A. M., Handmer, J., Hessburg, P. F., . . . Syphard, A. D. (2014, November). Learning to coexist with wildfire. Nature, 515 (7525), 58-66. doi: 10.1038/nature13946 7 Norling, E., Sonenberg, L., & Ronnquist, R. (2000, July). Enhancing Multi- Agent Based Simulation with Human-Like Decision Making Strategies. In Multi-Agent-Based Simulation (p. 214-228). Springer, Berlin, Heidelberg. doi: 10.1007/3-540-44561-7-16 4, 12 Okaya, M., & Takahashi, T. (2011). BDI Agent Model Based Evacuation Simulation. In The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3 (pp. 1297 -- 1298). Richland, SC: In- ternational Foundation for Autonomous Agents and Multiagent Systems. 16 80 Padgham, L., Nagel, K., Singh, D., & Chen, Q. (2014). Integrating BDI Agents into a MATSim Simulation. In Proceedings of the Twenty-first European Conference on Artificial Intelligence (pp. 681 -- 686). Amster- dam, The Netherlands, The Netherlands: IOS Press. doi: 10.3233/ 978-1-61499-419-0-681 17 Padgham, L., & Singh, D. (2016, August). Making MATSim Agents Smarter with the Belief-Desire-Intention Framework. In K. Nagel, K. Axhausen, & A. Horni (Eds.), The Multi-Agent Transport Simulation MATSim (p. 3-8). London: Ubiquity Press. 19 Paveglio, T., Carroll, M. S., & Jakes, P. J. (2008, March). Alternatives to Evacuation -- Protecting Public Safety during Wildland Fire. Journal of Forestry, 106 (2), 65-70. doi: 10.1093/jof/106.2.65 7 Pel, A., Bliemer, M., & Hoogendoorn, S. (2011). Modelling Traveller Be- haviour under Emergency Evacuation Conditions. European Journal of Transport and Infrastructure Research, 11 (2), 166-193. 5, 6, 7 Pillac, V., Van Hentenryck, P., & Even, C. (2016, January). A conflict- based path-generation heuristic for evacuation planning. Transportation Research Part B: Methodological , 83 , 136-150. doi: 10.1016/j.trb.2015.09 .008 16 Popovici, E., Bucci, A., Wiegand, R. P., & De Jong, E. D. (2012). Coevolu- tionary Principles. In G. Rozenberg, T. Back, & J. N. Kok (Eds.), Hand- book of Natural Computing (p. 987-1033). Berlin, Heidelberg: Springer Berlin Heidelberg. doi: 10.1007/978-3-540-92910-9-31 19 Rao, A. S. (1996). AgentSpeak(L): BDI agents speak out in a logical com- putable language. In J. G. Carbonell et al. (Eds.), Agents Breaking Away (Vol. 1038, p. 42-55). Berlin, Heidelberg: Springer Berlin Heidelberg. doi: 10.1007/BFb0031845 12 Rao, A. S., & Georgeff, M. P. (1991). Modeling Rational Agents within a BDI-Architecture. In J. Allen, E. Sandewall, & R. Fikes (Eds.), 2nd 81 International Conference on Principles of Knowledge Representation and Reasoning (p. 473-484). San Mateo: Morgan Kaufmann Publishers, Inc. 4, 12 Rao, A. S., & Georgeff, M. P. (1995). BDI Agents: From Theory to Practice. In In Proceedings of the First International Conference on Multi-Agent Systems (icmas-95 (pp. 312 -- 319). 12 Reid, K., & Beilin, R. (2014, February). Where's the Fire? Co-Constructing Bushfire in the Everyday Landscape. Society & Natural Resources, 27 (2), 140-154. doi: 10.1080/08941920.2013.840815 4, 8, 21 Reynolds, B. T. (2017). A History of the Prepare, Stay and Defend or Leave Early Policy in Victoria. , 312. 7 Rust, J., Miller, J. H., & Palmer, R. (1994, January). Characterizing effective trading strategies: Insights from a computerized double auction tournament. Journal of Economic Dynamics and Control , 18 (1), 61-96. doi: 10.1016/0165-1889(94)90069-8 13 Sadri Arif Mohaimin, Ukkusuri Satish V., Murray-Tuite Pamela, & Glad- win Hugh. (2014, January). How to Evacuate: Model for Understanding the Routing Strategies during Hurricane Evacuation. Journal of Trans- portation Engineering, 140 (1), 61-69. doi: 10.1061/(ASCE)TE.1943-5436 .0000613 16 Scerri, D., Gouw, F., Hickmott, S., Yehuda, I., Zambetta, F., & Padgham, L. (2010). Bushfire BLOCKS: A Modular Agent-based Simulation. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: Volume 1 - Volume 1 (pp. 1643 -- 1644). Rich- land, SC: International Foundation for Autonomous Agents and Multia- gent Systems. 16 Shahparvari, S., Chhetri, P., Abareshi, A., & Abbasi, B. (2015, September). Multi-Objective Decision Analytics for Short-Notice Bushfire Evacuation: An Australian Case Study. Australasian Journal of Information Systems, 19 (0). doi: 10.3127/ajis.v19i0.1181 82 16 Singh, D., & Padgham, L. (2017, August). Emergency Evacuation Sim- ulator (EES) - a Tool for Planning Community Evacuations in Aus- tralia. In Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (p. 5249-5251). Melbourne, Australia: Inter- national Joint Conferences on Artificial Intelligence Organization. doi: 10.24963/ijcai.2017/780 18 Singh, D., Padgham, L., & Logan, B. (2016, November). Integrating BDI Agents with Agent-Based Simulation Platforms. Autonomous Agents and Multi-Agent Systems, 30 (6), 1050-1071. doi: 10.1007/s10458-016-9332-x 5, 18, 19, 36, 37 Song, C., Koren, T., Wang, P., & Barab´asi, A.-L. (2010, October). Modelling the scaling properties of human mobility. Nature Physics, 6 (10), 818-823. doi: 10.1038/nphys1760 10, 31 Strahan, K., Whittaker, J., & Handmer, J. (2018, March). Self-evacuation archetypes in Australian bushfire. International Journal of Disaster Risk Reduction, 27 , 307-316. doi: 10.1016/j.ijdrr.2017.10.016 5, 8, 9, 72 Thompson, K. R., Haigh, L., & Smith, B. P. (2018, March). Planned and ultimate actions of horse owners facing a bushfire threat: Implications for natural disaster preparedness and survivability. International Journal of Disaster Risk Reduction, 27 , 490-498. doi: 10.1016/j.ijdrr.2017.11.013 10 Tibbits, A., & Whittaker, J. (2007, January). Stay and defend or leave early: Policy problems and experiences during the 2003 Victorian bushfires. En- vironmental Hazards, 7 (4), 283-290. doi: 10.1016/j.envhaz.2007.08.001 8 Tu, H., Tamminga, G., Drolenga, H., de Wit, J., & van der Berg, W. (2010). Evacuation plan of the city of almere: Simulating the impact of driving behavior on evacuation clearance time. Procedia Engineering, 3 , 67-75. doi: 10.1016/j.proeng.2010.07.008 7 83 Waddell, P. (2002). UrbanSim: Modeling urban development for land use, transportation, and environmental planning. American Planning Asso- ciation. Journal of the American Planning Association; Chicago, 68 (3), 297-314. 13 Whittaker, J., & Handmer, J. (2010, October). Community Bushfire Safety: A Review of Post-black Saturday Research. Australian Journal of Emer- gency Management, The, 25 (4), 7. 11 Whittaker, J., Haynes, K., Handmer, J., & McLennan, J. (2013, September). Community safety during the 2009 Australian 'Black Saturday' bushfires: An analysis of household preparedness and response. International Jour- nal of Wildland Fire, 22 (6), 841-849. doi: 10.1071/WF12010 5, 8 Wickramasinghe, B. N., Singh, D., & Padgham, L. (2017). Heuristic Data Merging for Constructing Initial Agent Populations. In G. Sukthankar & J. A. Rodriguez-Aguilar (Eds.), Autonomous Agents and Multiagent Systems (p. 174-193). Springer International Publishing. 15 Yuan, S., Chun, S. A., Spinelli, B., Liu, Y., Zhang, H., & Adam, N. R. (2017, May). Traffic evacuation simulation based on multi-level driving decision model. Transportation Research Part C: Emerging Technologies, 78 . 16 84
1709.08235
1
1709
2017-09-24T18:40:21
Dynamic Path Planning and Movement Control in Pedestrian Simulation
[ "cs.MA" ]
Modeling and simulation of pedestrian behavior is used in applications such as planning large buildings, disaster management, or urban planning. Realistically simulating pedestrian behavior is challenging, due to the complexity of individual behavior as well as the complexity of interactions of pedestrians with each other and with the environment. This work-in-progress paper addresses the tactical (path planning) and the operational level (movement control) of pedestrian simulation from the perspective of multiagent-based modeling. We propose (1) an novel extension of the JPS routing algorithm for tactical planning, and (2) an architecture how path planning can be integrated with a social-force based movement control. The architecture is inspired by layered architectures for robot planning and control. We validate correctness and efficiency of our approach through simulation runs.
cs.MA
cs
Dynamic Path Planning and Movement Control in Pedestrian Simulation Fatema T. Johora∗, Philipp Kraus, and Jorg P. Muller Department of Informatics, Clausthal University of Technology, Julius-Albert-Str. 4 D-38678 Clausthal-Zellerfeld, Germany September 26, 2017 Abstract Modeling and simulation of pedestrian behavior is used in applica- tions such as planning large buildings, disaster management, or urban planning. Realistically simulating pedestrian behavior is challenging, due to the complexity of individual behavior as well as the complexity of in- teractions of pedestrians with each other and with the environment. This work-in-progress paper addresses the tactical (path planning) and the op- erational level (movement control) of pedestrian simulation from the per- spective of multiagent-based modeling. We propose (1) an novel extension of the JPS routing algorithm for tactical planning, and (2) an architecture how path planning can be integrated with a social-force based movement control. The architecture is inspired by layered architectures for robot planning and control. We validate correctness and efficiency of our ap- proach through simulation runs. 1 Introduction Over the past two decades, pedestrian simulation has received considerable at- tention. Modeling and analysing the behavior of individual pedestrians provides insights for solving challenging problems such as optimizing building layouts to assure crowd safety. Also, fueled by the paradigm of multiagent-based mod- eling and by ever increasing computing power, recently we see a trend from macroscopic to microscopic approaches of modeling pedestrians. Crociani et al. classify the overall behavior of pedestrians in three levels [3]: • At the strategic level, pedestrians maintain abstract plans that motivate their overall behaviour. • At the tactical level, pedestrians organize their activities, choose activity areas and plan routes to reach their destinations. • Pedestrians' physical movements are handled at the operational level. ∗Email: [email protected] 1 A comprehensive model of complex pedestrian behavior needs to address each level as well as the interactions among the levels. The literature on pedestrian simulation contains numerous approaches to handle these levels individually, but there is not much research in integrating these levels. Well-known hierar- chical approaches from robot planning (e.g. [7]) and hybrid agent architectures [13] have hardly been applied to pedestrian modeling and simulation, possibly due to their computational complexity and limited scalability to large numbers of pedestrians. Our research aims to address this gap to a certain extent. This work-in-progress paper provides a first small step towards applying cognitive In this paper1 we fo- layered control architectures to pedestrian simulation. cus on tactical (i.e. path planning) and operational (i.e., movement control) pedestrian behavior and their interplay. We propose and develop a model to dynamically plan routes for pedestrians and also control their movements dur- ing plan execution. We propose a conceptual integration architecture. For path planning, we propose an efficient extension of the JPS algorithm; for movement control, a social force model is used. For a proof of concept, we provide a sim- ple initial implementation of the architecture to integrate path planning and movement control. The structure of this paper is as follows: Several works related to this paper are described in Section 2. Section 3 gives an overview of the basic assumptions and requirements underlying our approach. The proposed model is described in Section 4. In Section 5, we report some experimental findings. We conclude and discuss future work in Section 6. 2 State of the Art Tactical path planning for pedestrian and controlling their individual motions are two important problems in pedestrian modelling. There is a large body of research in this area; some related approaches are reviewed in this section. The concept of steering behaviors, to model realistic movements of an individual character within an environment was introduced by Reynolds [14]. This model proposes different behavioral characteristics such as goal seeking or collision avoidance. The social force model by Helbing [10] is a physical model describes the movement of pedestrians by combining different types of attractive and repulsive forces. In [12], Li and Chou propose an approach to plan the motion of robots in crowded environment. Rymill and Dodgson proposed an approach to model the motion behavior of crowds in real-time [15]. However, this work mainly focuses on the visual perception and collision avoidance techniques of humans. A model that can plan path for crowds using A* and also supports collision avoidance for controlling their movements is proposed in [5]. Cherif and Chighoub [2] present a behavioral model of pedestrian movement based on the pedestrian's socio-psychological state. It can be noted that most of the state-of-the-art research discussed focusses on motion control. Although, notably, the approach in [5] implements both path planning and a part of motion control, however, the authors do not ex- 1The level of detail in this paper is restricted by space limitations. The master's thesis of the first author [11] provides a detailed account of the model described in this paper. Accessible at https://goo.gl/rmIBik. 2 plain how these two levels of behaviour are integrated. However, in research on mobile robot control and agent architectures, there are many concepts for inte- grating planning with execution, such as the ATLANTIS architecture proposed by Gat [7], or the layered InteRRaP architecture described in [13]. These approaches motivate us to consider the topic of integrating path planning and movement control behaviors of pedestrians. 3 Problems and Requirements Normally, pedestrians plan their path based on the current state of their work- ing environment or sometimes even before entering their working environment. They do not consider the dynamically changing environment including other pedestrians, during path planning. However, due to the changes in their local environment such as extreme crowd, they may need to re-plan their path or somehow try to adapt the changes [6]. Our assumption is that pedestrian do not always plan path using straight minimal-length path metric. But we use this metric to design our overall architecture and the algorithms with a motivation that we can start with simple objective functions and, in future work, replace them by more realistic objective functions, without the need of replacing the path planning algorithm. To simulate the walking behavior of pedestrians, two levels of behaviors namely planning (tactical level) and execution are required to be integrated (operational level). To plan the shortest path for pedestrians, a path planning algorithm is needed. A mobility model is also needed to control the movement of pedestrians by satisfying the dynamic aspects of their environment. Finally, a handler is needed to handle the interaction between path planning and movement control. 4 Integrated Control Architecture We propose a conceptual architecture that implements pedestrian path planning and movement control and handles the collaboration between the two levels. This architecture consists of three modules which are described in the follow- ing subsections. The path planner (Section 4.1) provides (deliberative) route planning on a graph or grid model (in this paper, we assume a grid-based rep- resentation). The motion controller (cf. Section 4.2) handles the operational (reactive) moving decisions of pedestrians. The control flow between these two modules is orchestrated the third component: The transition handler (Sec- tion 4.3). In the approach described in this paper, we assume that the path planner operates at a high level of abstraction, not taking dynamic aspects of the environment into consideration, while the motion controller accommodates these dynamic aspects. 4.1 Path Planner For pedestrian path planning, we propose and develop an optimization of the Jump Point Search (JPS) algorithm [8]. We start by explaining the basic model underlying JPS. JPS combines an A* algorithm with two sets of rules, i. e. prun- ing rules and jumping rules: 3 Pruning Rules: JPS chooses a single path among many equivalent paths using the following pruning strategy: • If current node x can be reached through a straight move from its par- ent p(x), then JPS prunes any neighbor of x that satisfies the constraint length(p(x), ..., n) − x) ≤ length(p(x), x, n) • If x is a diagonal move away from p(x), JPS prunes any neighbor of x that satisfies the constraint length(p(x), ..., n) − x) < length(p(x), x, n) If x does not have any neighbor which is an obstacle, then the remain- ing nodes after applying pruning rules are called its natural neighbors. If any neighbor of x isan obstacle then any remaining node n after pruning is a forced neighbor of x, if (1) n is not a natural neighbor of the current node x, and (2) length(p(x), x, n) < length(p(x), ..., n) − x). Jumping Rules: JPS does not expand all non-pruned neighbors of x as its successors. It continues moving in the direction of each non-pruned neighbor until it finds jump points (JPs). Any non-pruned neighbor y of x, located in a direction (cid:126)d, can be a JP if y minimizes the number of steps k such that y = x+k (cid:126)d and also satisfies one of the following constraints: 1. y is the goal node 2. y has at least one forced neighbor 3. If (cid:126)d is a diagonal move and z = y + ki satisfying constraint 1 or 2. Here, ki is a real number and (cid:126)di ∈ ( (cid:126)d1, (cid:126)d2) (cid:126)di is a jump point from node y by Figure 1: JPS-S path planning returns a sequence of jump points. Orange nodes indicate expanded nodes. Nodes with SJ denote pre-calculated JPs, gray nodes denote JP successors of expanded nodes. JPS first expands the start node (S) to get all its JP successors, then recur- sively expands the successors, until it finds the target (G). At each iteration, it 4 chooses one node to expand among all successors, based on the estimated cost to go to G from S via each successor. In a more recent paper, the authors of JPS introduced Jump Point Search Plus (JPS+) [9], which performs a dynamic (and rather resource-intensive) calculation of jump points. To increase the efficiency of JPS / JPS+ for larger simulations, we propose an optimization named JPS with Static Jump Points (JPS-S).In JPS-S, we add an offline pre-processing step to JPS. Here, offline preprocessing stands for all the calculations which are performed before starting the actual path finding. Unlike JPS+, JPS-S pre-calculates the JPs surrounding static obstacles on the grid map; these JPs are called static jump points (SJPs) as they remain un- changed unless the map changes. JPS+ pre-calculates the first JPs in eight possible directions for every traversable node on the grid map, which enhances the performance of JPS but also increases the memory usages significantly. Our approach JPS-S speeds up JPS, but with minimized memory usage (see Sec- tion 5). Before starting path planning, JPS-S filters the SJP list using the given start and goal positions to get all SJPs within the search range. The path searching procedures of JPS and JPS-S algorithms are similar, except that while searching the next JP in diagonal direction, JPS-S is searching recursively in the same direction that JPS does, but, in contrast to JPS, it checks the SJP list before. If it finds any SJP in that direction, it considers it as the successor of the currently expanding node. 4.2 Motion Controller We select the social force model [10] for controlling the movement of pedes- trian. In the social force model, the motion of a pedestrian is conducted by the following set of simple forces that a pedestrian faces at a specific time: Acceleration: The model assumes that pedestrians move towards their des- tination taking the shortest possible way. The pedestrian α reaches his/her des- tination with a desired velocity (cid:126)wα(t) unless the movement of α is distracted. If his/her velocity deviates to (cid:126)vα(t) then he/she accelerates to achieve (cid:126)wα(t) again in a certain relaxation time τ . This acceleration can be computed by the formula: (cid:126)f o α( (cid:126)wα(t), (cid:126)vα(t)) = (cid:126)wα(t) − (cid:126)vα(t) τ Repulsive Forces from Other Pedestrians and Boundaries: Pedestrians maintain some distance from unknown pedestrians (β), boundaries or static obstacles (B). These behaviors can be represented by the two force vectors (1) (2) (3) (cid:21) (cid:20)−(cid:126)dαβ(t) (cid:20)−(cid:126)dαB(t) σ (cid:21) (cid:126)nαβFαβ αβ ( (cid:126)dαβ(t)) = V o f soc αβ exp and (cid:126)f soc αB ((cid:126)dαB(t)) = U o αB exp (cid:126)nαB. R αβ and U o Here, V o αB denote the interaction strengths and σ and R indicates the range of these repulsive interactions. (cid:126)dαβ(t) and (cid:126)dαB(t) are the distances from 5 α to β, and α to B at a specific time. (cid:126)nαβ and (cid:126)nαB denote the normalized vectors. Fαβ represents the anisotropic behavior of pedestrian i.e. pedestrians are mostly influenced by the objects which capture within their angle of view. Attractive Forces towards Point of Interests: Pedestrians can be at- tracted to their point of interests such as street artists. This attractive force (cid:126)f soc is time-dependent and linearly decreased to zero. It is calculated by the αi same equation as (cid:126)f soc αβ . As compared to repulsive interactions, the interaction range of (cid:126)f soc is larger and the strength of this interaction is smaller, negative αi and time-dependent. Joining Behavior: Pedestrians aim to stay together as a group with their family or friends. The joining behavior represents this behavior [4]. It is calcu- lated by the formula of the interaction strength Cαβ and the normalized vector (cid:126)nβα. Combination of these forces describes the temporal change of pedestrian's velocity. 4.3 Transition Handler The control flow between path planner and motion controller can be realized in largely differing ways: In a naive model, planner and controller may work sequentially. In a more dynamic model, they may be represented as states of a finite state machine, and take control alternatively. In a very sophisticated model, they may run concurrently with a vertical or horizontal flow regulating access to perception and action (see e.g. [13]). In this paper, we propose a con- ceptual control architecture where transition handler (TH) component decides when control is shifted between path planner and motion controller. This can be modeled by a simple finite state machine with two states, where only one state has control of the pedestrian at a specific time (see Figure 2). State tran- sition is determined based on the currently active state, perceiving input and transition conditions. If the perceptual input trigger any transition condition of the current state then that transition will be conducted. The TH receives a set of jump points specifying the desired path from the path planner. Then, it switches to the controller state; the movement of a pedestrian from its current position to the next jump point is then handled by the motion controller. The transition handler will also be responsible for plan monitoring: If during plan execution, pedestrians deviate from their pre-calculated path, the TH will recognize this and shift the locus of control to the path planner state, where the path will be recalculated. For identifying a deviation, we use an algorithm very similar to the path following behavior in Reynolds' steering model [14]. It represents a path as a spine and a radius; a spine thus represents a sequence of line segments. If the distance between the next position of the pedestrian and the nearest point on the path is greater than the path radius, then a deviation is detected. 5 Evaluation To evaluate our proposed model, we tried to answer the following questions: 6 Figure 2: Control architecture • Does JPS-S plan optimal-length paths? Does it optimize the JPS algo- rithm? • Does the social force model accommodate the movement behaviors of pedestrians? • How to integrate the path planning and movement control behaviors of pedestrian in a desirable way? To answer these questions, we present an argumentation on the optimality of JPS-S in terms of minimal length and also perform computer simulations. Sim- ulations are implemented using the Java (version 8) programming language on an Intel(cid:114) CoreTMi5 processor with 3 GB RAM. Qualitative Evaluation of Minimality of Paths Found by JPS-S: Both JPS and JPS-S algorithms give a sequence of jump points (JPs) as the optimal- length path. The proof that the optimal path between two points (if exists) in a grid map can be found by only expanding JPs during search, is given in [8]. In this paragraph, we argue that the extension of the pre-processing technique (SJP) with JPS maintains optimality and completeness of JPS, as follows: Let π = { S, JP1, JP2, JP3....JPn(G) } be the optimal-length path be- tween S and G, which is calculated by JPS. Let further π(cid:48) = { S, JP1 (cid:48), JP2 (cid:48), (cid:48)(G) } be the path between S and G, which is calculated by JPS-S. (cid:48)....JPn JP3 Let length(JPx, JPy) denote the euclidean distance between JPx and JPy. (cid:48) is straight. If the Any JPx = JPx (cid:48) is diagonal then for d = length(JPx−1,JPx) and direction from JPx−1 (cid:48)), d ≤ d(cid:48) holds. For each JPx and JPx (cid:48), if d(cid:48) = d d(cid:48) = length(JPx−1 then the number of JPs in π and π(cid:48) are equal. Otherwise, the number of JPs in π(cid:48) is smaller than the number of JPs in π because length(JPx−1 (cid:48),JPx (cid:48)) = length(JPx−1,JPx) + length(JPx,JPx+1). The length of π and π(cid:48) is always the same. (cid:48), if the direction from JPx−1 (cid:48) to JPx (cid:48), JPx (cid:48) to JPx JPS-S always maintains the basic properties of JPS: the pruning rules, the jumping rules, all moves to go from one JP to another adjacent JP always 7 involve traveling in the same direction, and the line between two adjacent JPs does not collide with any obstacle. Performance Test: A grid-based map with 250 × 250 cells is used as the environment for performing path planning using JPS-S. We measure perfor- mance in terms of the relative improvement to the needed time to solve a given problem. We perform tests on both the JPS and JPS-S algorithms, to find the optimal path for 10000 pedestrians in parallel at a time. This test is performed 30 times. Figure 3 shows the results of this test. On average, the test takes approximately 9% less computation time for JPS-S. In the best case, the test takes over 16% extra time for JPS than for JPS-S. We use the following simulation benchmarks to test the efficiency of the social force model and all of these simulations terminates successfully as each pedestrian reaches their goal point. Narrow Walkway: Two oppositely directed groups of 50 pedestrians walking through a narrow walkway to reach their goal by avoiding collisions. Narrow Passage: A group of 100 pedestrians are trying to pass a narrow door to reach their goal by avoiding collisions with others. Path Following: Two groups of 100 pedestrians are trying to reach similar goal by moving along their planned path and avoiding collisions with oth- ers. Figure 3: JPS-S outperforms JPS with respect to time efficiency (CPU time). 8 Interpretation of Results: The results of the above small experiments show that the performance of JPS-S is better than that of JPS in terms of needed time; also in the benchmark scenarios, the social force model suitably accommo- dates the movement behavior of pedestrians. The qualitative evaluation of the optimality of JPS-S is also given in page 7. Therefore, the first two questions which are described in the beginning of this section are answered. JPS-S is time efficient and the social force model efficiently enables pedes- trians to move along their planned path which is validated from the result of path following benchmark. Hence, we conclude that our architecture integrates the path planning and movement control behaviors of pedestrian in a correct and efficient way. 6 Conclusion and Outlook This paper reports work-in-progress towards a multiagent-based model for pedes- trian simulation that integrates tactical and operational behaviour. The con- tribution of this paper is threefold: First, we propose a conceptual control architecture to integrate pedestrian path planning and movement control. Sec- ond, we propose an optimization JPS-S of the well-known JPS algorithm for shortest path planning. We show that JPS-S maintains the optimality proper- ties of JPS, and we compare it experimentally against JPS and JPS+, showing its advantages in performance and scalability. Third, we describe a movement control algorithm based on the social force model [10], and implemented a proof- of-concept of the overall system combining JPS-S with the social force model. Simulation results from this proof-of-concept indicate the feasibility and validity of the overall model, but also some limitations of the approach. So far we only implemented the naive integration architecture without re- planning. Also, the fact that the JPS-S algorithm places the static jump points close to static obstacles may not work well with the social force model which tends to steers pedestrians away from obstacles. Dedicated experiments are needed to explore this relationship. Also so far, the simulation is implemented in plain Java. We are working to port it to the LightJason BDI agent platform [1] for better scalability. Finally, so far we have not yet compared the output of our model with benchmarks of real pedestrian behaviours. This is another necessary task for future work. References [1] Malte Aschermann, Philipp Kraus, and Jorg P. Muller. LightJason: A BDI Framework inspired by Jason. In Multi-Agent Systems and Agreement Technologies: 14th Europ. Conf., EUMAS 2016, and 4rd Int. Conf., AT 2016, Valencia, Spain, 2016, volume 10207 of Lecture Notes in COmputer Science, pages 58–66. Springer International Publishing, 2017. [2] F Cherif and R Chighoub. Crowd simulation influenced by agent's socio- psychological state. arXiv preprint arXiv:1004.4454, 2010. 9 [3] Luca Crociani, Andrea Piazzoni, Giuseppe Vizzari, and Stefania Bandini. When reactive agents are not enough: Tactical level decisions in pedestrian simulation. Intelligenza Artificiale, 9(2):163–177, 2015. [4] AK Dewdney. Diverse personalities search for social equilibrium at a com- puter party. Scientific American, 257(3):112–115, 1987. [5] Cherif Foudil, Djedi Noureddine, Cedric Sanza, and Yves Duthen. Path finding and collision avoidance in crowd simulation. CIT. Journal of Com- puting and Information Technology, 17(3):217–228, 2009. [6] Michel Fr´emond. Collisions Engineering: Theory and Applications. Springer, 2016. [7] Erann Gat. Integrating planning and reacting in a heterogeneous asyn- chronous architecture for controlling real-world mobile robots. In Proceed- ings of the 10th National Conference on Artificial Intelligence (AAAI), pages 809–815, San Jose, CA, USA, 1992. AAAI Press. [8] Daniel Damir Harabor, Alban Grastien, et al. Online graph pruning for pathfinding on grid maps. In Proceedings of the 25th National Conference on Artificial Intelligence (AAAI), pages 1114–1119, San Francisco, CA, USA, 2011. AAAI Press. [9] Daniel Damir Harabor, Alban Grastien, et al. Improving jump point search. In Proceedings of the 24th International Conference on Automated Planning and Scheduling (ICAPS), pages 128–135, Portsmouth, NH, USA, 2014. AAAI Press. [10] Dirk Helbing and Peter Molnar. Social force model for pedestrian dynamics. Physical review E, 51(5):4282, 1995. [11] Fatema T. Johora. Dynamic path planning and movement control in pedes- trian simulation. Master's thesis, Technische Universitat Clausthal, Depart- ment of Informatics, 2017. [12] Tsai-Yen Li and Hsu-Chi Chou. Motion planning for a crowd of robots. In Robotics and Automation, 2003. Proceedings. ICRA'03. IEEE International Conference on, volume 3, pages 4215–4221. IEEE, 2003. [13] Jorg P. Muller. The Design of Intelligent Agents, volume 1177 of Lecture Notes in Artificial Intelligence. Springer-Verlag, 1996. [14] Craig W Reynolds. Steering behaviors for autonomous characters. In Game developers conference, volume 1999, pages 763–782, 1999. [15] Stephen J Rymill and Neil A Dodgson. Psychologically-based vision and attention for the simulation of human behaviour. In Proceedings of the 3rd international conference on Computer graphics and interactive techniques in Australasia and South East Asia, pages 229–236. ACM, 2005. 10
0710.2659
1
0710
2007-10-14T13:51:09
Rigidity and persistence for ensuring shape maintenance of multiagent meta formations (ext'd version)
[ "cs.MA", "cs.DM" ]
This paper treats the problem of the merging of formations, where the underlying model of a formation is graphical. We first analyze the rigidity and persistence of meta-formations, which are formations obtained by connecting several rigid or persistent formations. Persistence is a generalization to directed graphs of the undirected notion of rigidity. In the context of moving autonomous agent formations, persistence characterizes the efficacy of a directed structure of unilateral distance constraints seeking to preserve a formation shape. We derive then, for agents evolving in a two- or three-dimensional space, the conditions under which a set of persistent formations can be merged into a persistent meta-formation, and give the minimal number of interconnections needed for such a merging. We also give conditions for a meta-formation obtained by merging several persistent formations to be persistent.
cs.MA
cs
RIGIDITY AND PERSISTENCE FOR ENSURING SHAPE MAINTENANCE OF MULTIAGENT META FORMATIONS (EXT’D VERSION) JULIEN M. HENDRICKX, CHANGBIN YU, BARIS¸ FIDAN AND BRIAN D.O. ANDERSON Abstract. This paper treats the problem of the merging of formations, where the underly- ing model of a formation is graphical. We first analyze the rigidity and persistence of meta- formations, which are formations obtained by connecting several rigid or persistent formations. Persistence is a generalization to directed graphs of the undirected notion of rigidity. In the context of moving autonomous agent formations, persistence characterizes the efficacy of a di- rected structure of unilateral distance constraints seeking to preserve a formation shape. We derive then, for agents evolving in a two- or three-dimensional space, the conditions under which a set of persistent formations can be merged into a persistent meta-formation, and give the minimal number of interconnections needed for such a merging. We also give conditions for a meta-formation obtained by merging several persistent formations to be persistent. Keywords: Formations, Meta-formations, Rigidity, Persistence, Autonomous Agents 1. Introduction Recently, significant interest has been shown on the behavior of autonomous agent formations (groups of autonomous agents interacting which each other) [2, 4, 7, 9, 19], and more recently on meta-formations, which is the name ascribed to an interconnection of formations, generally with the individual formations being separate [1, 25]. By autonomous agent, we mean here any human-controlled or unmanned vehicle moving by itself and having a local intelligence or computing capacity, such as ground robots, air vehicles or underwater vehicles. Many reasons such as obstacle avoidance and dealing with a predator can indeed lead a (meta-)formation to be split into smaller formations which are later re-merged. Those smaller formations need to be organized in such a way that they can behave autonomously when the formation is split. Conversely, some formations may need to be temporarily merged into a meta-formation to ac- complish a certain task, this meta-formation being split afterwards. The particular property of formations and meta-formations which we analyze here is persis- tence . This graph-theoretical notion which generalizes the notion of rigidity to directed graphs was introduced in [9] to analyze the behavior of autonomous agent formations governed by uni- lateral distance constraints: Many applications require the shape of a multi-agent formation J. M. Hendrickx is with Department of Mathematical Engineering, Universit´e catholique de Louvain, Avenue Georges Lemaitre 4, B-1348 Louvain-la-Neuve, Belgium; [email protected]. His work is sup- ported by the Belgian Programme on Interuniversity Attraction Poles initiated by the Belgian Federal Science Policy Office, and the Concerted Research Action (ARC) “Large Graphs and Networks” of the French Commu- nity of Belgium. The scientific responsibility rests with its authors. Julien Hendrickx holds a FNRS fellowship (Belgian Fund for Scientific Research). C. Yu, B. Fidan and B. Anderson are with Australian National University and National ICT Australia, 216 Northbourne Ave, Canberra ACT 2601 Australia ; brad.yu,baris.fidan,[email protected]. Their work is supported by an Australian Research Council Discovery Pro ject Grant and by National ICT Aus- tralia, which is funded by the Australian Government’s Department of Communications, Information Technology and the Arts and the Australian Research Council through the Backing Australia’s Ability Initiative. to be preserved during a continuous move. For example, target localization by a group of un- manned airborne vehicles (UAVs) using either angle of arrival data or time difference of arrival information appears to be best achieved (in the sense of minimizing localization error) when the UAVs are located at the vertices of a regular polygon [5]. Other examples of optimal placements for groups of moving sensors can be found in [17]. This ob jective can be achieved by explic- itly keeping some inter-agent distances constant. In other words, some inter-agent distances are explicitly maintained constant so that all the inter-agent distances remain constant. The information structure arising from such a system can be efficiently modelled by a graph, where agents are abstracted by vertices and actively constrained inter-agent distances by edges. We assume here that those constraints are unilateral, i.e., that the responsibility for maintain- ing a distance is not shared by the two concerned agents but relies on only one of them. This unilateral character can be a consequence of the technological limitations of the autonomous agents. Some UAV’s can for example not efficiently sense ob jects that are behind them or have an angular sensing range smaller than 360◦ [3, 8, 20]. Also, some of the authors of this paper are working with agents in which optical sensors have blind three dimensional cones. It can also be desired to ease the tra jectory control of the formation, as it allows so-called leader-follower formations [2, 6, 21]. In such a formation, one agent (leader) is free of inter-agent distance con- straints and is only constrained by the desired tra jectory of the formation, and a second agent (first follower) is responsible for only one distance constraint and can set the relative orientation of the formation. The other agents have no decision power and are forced by their distance constraints to follow the two first agents. This asymmetry is modelled using directed edges in the graph. Intuitively, an information structure is persistent if, provided that each agent is trying to satisfy all the distance constraints for which it is responsible, it can do so, with all the inter-agent distances then remaining con- stant, and as a result the formation shape is preserved. A necessary but not sufficient condition for persistence is rigidity [9], which intuitively means that, provided that all the prescribed distance constraints are satisfied during a continuous displacement, all the inter-agent distances remain constant (These concepts of persistence and rigidity are more formally reviewed in the next section). The above notion of rigidity can also be applied to structural frameworks where the vertices correspond to joints and the edges to bars. The main difference between rigidity and persistence is that rigidity assumes all the constraints to be satisfied, as if they were enforced by an external agency or through some mechanical properties, while persistence considers each constraint to be the responsibility of a single agent. As explained in [9], persistence implies rigidity, but it also implies that the responsibilities imposed on each agent are not inconsistent, for there can indeed be situations where this is so, and they must be avoided. Rigidity is thus an undirected notion (not depending on the edge directions), while persistence is a directed one. Both rigidity and persistence can be analyzed from a graph-theoretical point of view, and it can be proved [9, 22, 28] that if a formation is rigid (resp. persistent), then almost all formations represented by the same graph are rigid (resp. persistent). As stated in [1], the problem of merging rigid formations into a rigid meta-formation has been considered in a number of places. In [18, 23], the rigidity of a multi-graph (a graph in which some vertices are abstractions of smaller graphs) is analyzed. In two dimensions, the vertices of a multi-graph can be thought as two dimensional solid bodies at the boundary of which some bars can be attached; two vertices are then connected by an edge if the corresponding bodies are attached to the same bar. Of course, the idea extends obviously to three dimensions. Opera- tional ways to merge two rigid formations into a larger rigid formation can also be found in [7, 26]. 1 7 8 3 4 6 5 2 (c) (a) (b) Figure 1. In ℜ2 , the graph represented in (a) is not rigid because it can be deformed (dashed line), while the one in (b) is rigid. The graph (c) satisfies the first two conditions of Theorem 2 but not the third one, and is therefore not rigid in ℜ3 : the two parts of the graph can rotate around the axis defined by 1 and 2. In this paper, we treat the problem of determining whether a given meta-formation obtained by merging several persistent formations is persistent. For this purpose, we first consider the above mentioned problem of determining whether a meta-formation obtained by merging rigid formations is rigid. We also analyze the conditions under which a collection of persistent forma- tions can be merged into a persistent meta-formation. Conditions are then given on the minimal number of additional links that are needed to achieve such a merging. Note that throughout all the paper, we always assume that the internal structure of the formations cannot be modified. Moreover, we use a convenient graph theoretical formalism, abstracting agents by vertices and (unilateral) distance constraints by (directed) edges. After reviewing some properties of rigidity and persistence of graphs in Section 2, we examine in Section 3 the issues mentioned above for agents evolving in a two-dimensional space. We show in Section 4 how our results can be generalized in a three-dimensional space, and explain why this generalization can only partially be achieved. Note that some proofs are omitted for three-dimensional space when they are direct generalization of results on two-dimensional space. The paper ends with the concluding remarks in Section 5. This paper is an extended version of [12] in which some proofs are omitted for space reasons. Some preliminary results have also been published in [11] without proofs, and are included here at a greater level of details. Moreover, Propositions 7 and 8 correct the unproven Proposition 5 in [11], which did not take the case described in Proposition 7 into account. 2. Review of Rigidity and Persistence 2.1. Rigidity. As explained in Section 1, the rigidity of a graph has the following intuitive meaning: Suppose that each vertex represents an agent in a formation, and each edge represents an inter-agent distance constraint enforced by an external observer. The graph is rigid if for almost every such structure, the only possible continuous moves are those which preserve every inter-agent distance, as shown in Fig. 1(a) and (b). For a more formal definition, the reader is referred to [9, 22]. In ℜ2 , that is, if the agents represented by the vertices of the graph evolve in two dimensions, there exists a combinatorial criterion to check if a given graph is rigid: Theorem 1 (Laman [15, 24]). A graph G = (V , E ), with V > 1, is rigid in ℜ2 if and only if there is a sub-set E ′ ⊆ E such that (i) E ′ = 2 V − 3. (ii) For al l non-empty E ′′ ⊆ E ′ there holds E ′′ ≤ 2 V (E ′′ ) − 3, where V (E ′′ ) is the set of vertices incident to edges of E ′′ . Unfortunately, the analogous criterion in ℜ3 is only necessary. Theorem 2. If a graph G = (V , E ), with V > 2, is rigid in ℜ3 , there exists E ′ ⊆ E such that (i) E ′ = 3 V − 6. (ii) For al l non-empty E ′′ ⊆ E ′ , there holds E ′′ ≤ 3 V (E ′′ ) − 6, where V (E ′′ ) is the set of vertices incident to edges of E ′′ . (iii) The graph G′ (V , E ′ ) is 3-connected (i.e. remains connected after removal of any pair of vertices). Condition (iii), which also implies the 3-connectivity of G, is not usually stated but is inde- pendently necessary even if the two first conditions are satisfied. Fig. 1(c) shows for example a non-rigid graph for which (i) and (ii) are satisfied, but not (iii). Intuitively, the graph G′ in the theorem needs to be sufficient to ensure “alone” the rigidity of G. 3-connectivity is then needed as otherwise two or more parts of the graph could rotate around the axis defined by any pair of vertices whose removal would disconnect the graph. Note that such connectivity condition is not necessary in 2-dimensional spaces, as the counting conditions (i) and (ii) of Theorem 1 imply the 2-connectivity. For more information on necessary conditions for rigidity in three-dimensional spaces, we refer the reader to [16]. We say that a graph is minimal ly rigid if it is rigid and if no single edge can be removed without losing rigidity. It follows from the results above that a graph is minimally rigid in ℜ2 (resp. in ℜ3 ) if and only if it is rigid and contains 2 V − 3 (resp. 3 V − 6) edges [22]. Therefore we have the following characterization of minimal rigidity in ℜ2 . Theorem 3 (Laman [15, 24]). A graph G = (V , E ), with V > 1, is minimal ly rigid in ℜ2 if and only if it is rigid and contains 2 V − 3 edges, or equivalently if and only if (i) E = 2 V − 3. (ii) For al l non-empty E ′′ ⊆ E there holds E ′′ ≤ 2 V (E ′′ ) − 3, where V (E ′′ ) is the set of vertices incident to edges of E ′′ . The notion of rigidity can also be described from a linear algebraic point of view, using the so-called rigidity matrix. Suppose that a position pi ∈ ℜd (with d = 2, 3) is given to each vertex i of a graph G = (V , E ), and let p ∈ ℜdV be the juxtapositions of all positions. For each vertex, consider now an infinitesimal displacement δpi , and let δp be a vector obtained by juxtaposing these displacements. Since with infinitesimal displacements one can neglect higher order terms, the distance between the positions of two vertices i and j is preserved by the set of infinitesimal displacements if (1) (pi − pj )T (δpi − δpj ) = 0. Hence, if each edge represents a distance constraint, a set of infinitesimal displacements is al- lowed if and only if (1) is satisfied for any edge (i, j ) ∈ E . This set of linear constraints can be conveniently re-expressed in a condensed form as RG δp = 0 where RG ∈ ℜE ×dV is the rigidity matrix, which contains one row for each edge and d columns for each vertex. In the row corresponding to the edge (i, j ), the d(i − 1) + 1st to dith columns are (pi − pj )T , the d(j − 1) + 1st to dj th columns are (pj − pi )T , and all other columns are 0. A graph G is rigid if for almost all position assignment its rigidity matrix has a rank d V − f (d, V ), where f (d, V ) is the number 2 2 4 1 4 1 3 (a) 3 (b) Figure 2. In ℜ2 , the graph represented in (a) is rigid but not persistent. For almost all uncoordinated displacements of 2, 3 and 4 (even if they satisfy their constraints), 4 is indeed unable to satisfy its three constraints. This problem cannot happen for the graph represented in (b), which is persistent. of degrees of freedom in a d−dimensional space of a min(V − 1, d)-dimensional rigid body (Ob- serve that min(V − 1, d) is the largest possible dimension of a graph on V vertices embedded in a d-dimension space). In a 2-dimensional space, a single point has two DOFs f (2, 1) = 2, and any one or two-dimensional body has three DOFs. In a three-dimensional space, a single point has three DOFs, a one-dimensional ob ject has five DOFs, and any other ob ject has six DOFs. A subgraph G′ (V ′ , E ′ ) ⊆ G(V , E ) is rigid if the restriction RG′ of RG to the rows and columns corresponding to E ′ and V ′ has a rank d V ′ − f (d, V ′ ). Note that the rank d V ′ − f (d, V ′ ) is the maximal that can be attained by a rigidity (sub-)matrix. In a minimally rigid (sub-)graph, this rank is attained with a minimal number of edges and all rows of the rigidity matrix are thus linearly independent. For more information on the rigidity matrix, we refer the reader to [22]. 2.2. Persistence. Consider now that the constraints are not enforced by an external entity, but that each constraint is the responsibility of one agent to enforce. To each agent, one assigns a (possibly empty) set of unilateral distance constraints represented by directed edges: the −−→ notation (i, j ) for a directed edge connotes that the agent i has to maintain its distance to j constant during any continuous move. As explained in the Introduction, the persistence of the directed graph means that provided that each agent is trying to satisfy its constraints, the distance between any pair of connected or non-connected agents is maintained constant during any continuous move, and as a consequence the shape of the formation is preserved. Note though that the assignments given to an agent may be impossible to fulfill, in which case persistence is not achieved. An example of a persistent and a non-persistent graph having the same underlying undirected graph is shown in Fig. 2. For a more formal definition of persistence, the reader is referred to [9, 28], where are also proved the rigidity of all persistent graphs and the following criterion to check persistence: Theorem 4. A graph G is persistent in ℜ2 (resp. ℜ3 ) if and only if every subgraph obtained from G by removing edges leaving vertices whose out-degree is greater than 2 (resp. 3) until no such vertex is present anymore in the graph is rigid. A key result in the proof of Theorem 4 [9, 28] is the following: Proposition 1. A persistent graph ℜ2 (resp. ℜ3 ) remains persistent after removal of an edge leaving a vertex whose out-degree is larger than 2 (resp. 3). We use the term number of degrees of freedom of a vertex i to denote the (generic) dimension of the set in which the corresponding agent can choose its position (all the other agents being fixed). Thus it represents in some sense the decision power of this agent. In a three-dimensional space, an agent being responsible for one distance constraint can for example freely move on the surface of a sphere centered on the agent from which the distance needs to be maintained, and has thus two degrees of freedom. The number of degrees of freedom of a vertex i in ℜ2 (resp. ℜ3 ) is given by max (0, 2 − d+ (i)) (resp. max (0, 3 − d+ (i))), where d+ (i) represent the out-degree of the vertex i. A vertex having a maximal number of degrees of freedom (i.e. an out-degree 0) is called a leader since the corresponding agent does not have any distance constraint to satisfy. We call the number of degrees of freedom of a graph the sum of the numbers of degrees of freedom over all its vertices. It is proved in [9, 28] that this quantity cannot exceed 3 in ℜ2 and 6 in ℜ3 . Note that those numbers correspond to the number of independent translations and rotations in ℜ2 and ℜ3 . In the sequel we abbreviate degree of freedom by DOF. As explained in [28], although the concept of persistence is applicable in three and larger dimensions, it is not sufficient to imply the desired stability of the formation shape. For the shape stability, the graph corresponding to a three-dimensional formation needs in addition to be structural ly persistent. In ℜ3 , a graph is structurally persistent if and only if it is persistent and contains at most one leader, i.e. at most one vertex with no outgoing edge. In ℜ2 , persis- tence and structural persistence are equivalent. Similarly to minimal rigidity, we say that a graph is minimal ly persistent if it is persistent and if no single edge can be removed without losing persistence. It is proved in [9, 28] that a graph is minimally persistent if and only if it is persistent and minimally rigid. The number of edges of such a graph is thus uniquely determined by the number of its vertices as it is the case for minimally rigid graphs. 3. Rigidity and Persistence of 2D Meta-Formations 3.1. Rigidity. Consider a set N of disjoint rigid (in ℜ2 ) graphs G1 , . . . , GN having at least two vertices each, and a set S of single-vertex graphs GN +1 , . . . , GN +S . In the sequel, those graphs are called meta-vertices, and it is assumed that no modification can be made on their internal structure: no internal edge or vertex can be added to or removed from a meta-vertex. We define the merged graph G by taking the union of all the meta-vertices, and of some addi- tional edges EM each of which has end-points belonging to different meta-vertices. The conditions under which the merging of two meta-vertices leads to a rigid graph are detailed in [26]: If both meta-vertices contain more than one vertex, the merged graph is rigid if and only if EM contains at least three edges, the aggregate of which are incident to at least two vertices of each meta-vertex. This is actually a particular case of the following result for an arbitrary number of graphs (analogous to a result in [18] which is obtained under the assumption that no vertex of any meta-vertex is incident to more than one edge of EM ): Theorem 5. If it contains at least two vertices, G = (cid:16)SN ,S Gi(cid:17) ∪ EM (with N and S as defined at the beginning of this section) is rigid if and only if there exists E ′ M ⊆ EM such that (i) E ′ M = 3 N + 2 S − 3. (ii) For al l non-empty E ′′ M ⊆ E ′ M , there holds E ′′ M ≤ 3 I (E ′′ M ) + 2 J (E ′′ M ) − 3, where I (E ′′ M ) is the set of meta-vertices such that there are at least two vertices within the meta- vertex al l incident to edges of E ′′ M , and J (E ′′ M ) is the set of meta-vertices such that there is precisely one vertex within the meta-vertex that is incident to one or several edges of E ′′ M . Note that in each case, there can be an arbitrary number of vertices in the meta-vertex which are not incident on any edge of E ′′ M . To prove this theorem, we first need the following lemma, which we shall prove the both for ℜ2 and ℜ3 , intending to use the ℜ3 result in the next section. 1 , . . . G′ Lemma 1. Let G(V , E ) be a rigid graph (in ℜ2 or ℜ3 ), and G′ N be minimal ly rigid subgraphs of G having distinct vertices. Then there exists a minimal ly rigid subgraph G′ (V , E ′ ) of G containing al l vertices of G and al l subgraphs Gi . Proof. For simplicity, let us first consider the 2-dimensional case. Consider the rigidity matrix RG of G. Since G is rigid, it has (for almost all positions) a rank 2 V − 3. Since each G′ i is of RG to the rows and columns corresponding to the edges minimally rigid, the restriction RG′ i and vertices of G′ i has 2 Vi − 3 linearly independent rows (or is an empty matrix if Vi = 1). Also, since the vertices of the different G′ i are distinct, there can be no dependence between rows corresponding to edges of different subgraphs G′ , corresponding to i . Therefore, all rows of RS G′ i all edges of S G′ i , are linearly independent. Since the rank of RG is 2 V −3, it is a standard result in linear algebra that RS G′ can be completed by the addition of further rows of RG to obtain a i subset of 2 V − 3 linearly independent rows of RG . Letting E ′ be the set of edges corresponding to this set of rows, the graph G′ (V , E ′ ) is a minimally rigid subgraph of G containing all G′ i . This completes the proof for the 2-dimensional case. The proof for the 3-dimensional case is established following the same steps above, but replacing 2 V − 3 by 3 V − 6 and adding a special case for Vi = 2 in addition to the case where Vi = 1. (cid:3) We can now prove Theorem 5. Proof. For every Gi , let G′ i be a minimally rigid subgraph of Gi on the same vertices (The ex- istence of such subgraphs follows directly from the definition of minimal rigidity, and they can be obtained by successively removing edges from the initial graph). Since they are minimally rigid, they contain 2 Vi − 3 edges if Gi ⊆ N and no edge if Gi ⊆ S . We first suppose that there exists a set E ′ M as described in the theorem and prove the rigidity of G, by proving the minimal rigidity of one of its subgraph viz., G′ = (V , E ′ ) = (cid:16)SN ,S G′ i(cid:17) ∪ E ′ M which contains all its vertices. The number of edges in G′ is M + PGi ∈N E ′ E ′ = E ′ i = 3 N + 2 S − 3 + PGi∈N (2 Vi − 3) = 2 V − 3, since V = S + PGi∈N Vi . To show that G′ satisfies the second condition of Theorem 1, suppose that there exists a subset of edges E ′′ ⊂ E ′ such that E ′′ > 2 V (E ′′ ) − 3, let I be the set of meta-vertices containing at least two vertices of V (E ′′ ) and J the set of meta-vertices containing only one vertex of V (E ′′ ). Let now E ′′ M = EM ∩ E ′′ and for each i, V ′′ i = V (E ′′ ) ∩ Vi M + PGi∈I E ′′ i . There holds V (E ′′ ) = PGi ∈I V ′′ and E ′′ i + J , and E ′′ = E ′′ i = E ′′ ∩ E ′′ i . Moreover, since each G′ i is minimally rigid, it follows from Theorem 3 that E ′′ i ≤ 2 V ′′ i − 3. We have then M = E ′′ − PGi ∈I E ′′ E ′′ i > 2 V ′′ − 3 − PGi ∈I (2 V ′′ i − 3) = 3 I + 2 J − 3, M ⊆ E ′ so that this E ′′ M does not satisfy condition (ii) in the theorem. We now suppose that G is rigid. It follows from Lemma 1 that there is a minimally rigid subgraph G′ (V , E ′ ) ⊆ G containing all G′ i . Let E ′ M = E ′ ∩ EM ; we prove that E ′ M satisfies the condition of this theorem. Since G′ is minimally rigid, there holds E ′ = 2 V − 3. Moreover, i , and V = PGi∈N V ′ M + Pi∈N E ′ we have E ′ = E ′ i + S , so that M (cid:12)(cid:12) = 2 V − 3 − X (cid:12)(cid:12)E ′ (2 Vi − 3) = 3 N + 2 S − 3. Gi ∈N E ′ M contains thus the predicted number of edges. We suppose now that there is a set E ′′ M such that E ′′ M > 3 I (E ′′ M ) + 2 J (EM ) − 3 and show that this contradicts the minimal rigidity of G′ . Let us build E ′′ by taking the union of E ′′ M and all E ′ i for which Gi ∈ I (E ′′ M ). There holds V (E ′′ ) = J (E ′′ M ) + PGi ∈I (E ′′ M ) Vi . Therefore, we have M ) E ′ E ′′ = E ′′ M + Pi∈I (E ′′ i M ) + 2 J (E ′′ > 3 I (E ′′ M ) − 3 + PGi∈I (E ′′ M ) (2 Vi − 3) = 2V (E ′′ ) − 3. By Theorem 3, this contradicts the minimal rigidity of G′ (V , E ′ ) as E ′′ ⊆ E ′ . (cid:3) This criterion can be checked by a quadratic time algorithm (with respect to the number of meta-vertices) which would be a simple adaptation of the pebble game algorithm that is used for rigid graphs (see [14]), or even faster [18]. For a given collection of meta-vertices, we say that G is an edge-optimal rigid merging if no single edge of EM can be removed without losing rigidity. Notice that a single graph can be an edge-optimal rigid merging with respect to a certain collection of meta-vertices, and not with respect to another one, as shown in Fig. 3. If all meta-vertices are minimally rigid, then an edge-optimal rigid merging is also a minimally rigid graph. From Theorem 5, one can deduce the following characterization of edge-optimal rigid merging. Theorem 6. G = (cid:16)SN ,S Gi(cid:17) ∪ EM (with N and S as defined at the beginning of this section) containing at least two vertices is an edge-optimal rigid merging if and only if it is rigid and satisfies EM = 3 N + 2 S − 3. Moreover, each rigid merging contains an edge-optimal rigid merging on the same set of meta-vertices. Proof. Observe first that Theorem 5 requires a rigid merged graph G to satisfy EM ≥ 3 N + 2 S − 3. Therefore a rigid merged graph for which EM = 3 N + 2 S − 3 is an edge-optimal merging. Let now G be a rigid merged graph. By Theorem 5 there exists E ′ M ⊂ EM with E ′ M = 3 N + 2 S − 3 satisfying condition (ii) of this same theorem. One can see, again using Theorem 5, that G′ = (cid:16)SN ,S Gi(cid:17) ∪ E ′ M is rigid, as the set E ′ M trivially contains itself It follows then from the size of E ′ and satisfies both conditions (i) and (ii). M and from the discussion above that G′ is an edge-optimal rigid merging. We have thus proved that any rigid merged graph G contains an edge-optimal rigid merged graph G′ on the same meta-vertices satisfying E ′ M = 3 N + 2 S − 3. Therefore it cannot contain less than 3 N + 2 S − 3 edges, and if it contains more of them, it is not edge-optimal. It is thus edge-optimal if and only if EM = 3 N + 2 S − 3. (cid:3) 3.2. Persistence. Next we analyze the case where the meta-vertices Gi are directed persistent graphs, and adapt the definitions of N and S in consequence. If it is possible to merge them into a persistent graph, then it is possible to do so in such a way that all the edges of EM leave vertices which have an out-degree not greater than 2 in G: a set of edges EM that would make G 1 G 1 G 2 G’ 2 G’ 3 (a) (b) Figure 3. The graph represented in (a) and (b) is an edge-optimal rigid merge if it is obtained by merging G1 and G2 (a) but not if it is obtained by merging 2 and G′ G1 , G′ 3 (b). The dashed edges represent the edges of EM G persistent but that would not satisfy this property could indeed be reduced by Proposition 1 until it satisfies it. Moreover, we have the following proposition. Proposition 2. Let G = (cid:16)SN ,S Gi(cid:17) ∪ EM with N and S as defined at the beginning of this section, and with al l Gi persistent. If no vertex left by an edge of EM has an out-degree larger than 2, then G is persistent if and only if it is rigid. Proof. Rigidity is a necessary condition for persistence, so we just have to prove that it is here sufficient. Let G′ be a (directed) graph obtained from G by removing edges leaving vertices with out-degree larger than 2 until no such vertex exists in the graph. It follows from Theorem 4 that we just need to prove the rigidity of any such G′ . For every i, let G′ i be the restriction of G′ to the meta-vertex Gi . Since in G, every edge of EM leaves a vertex with an out-degree at most 2, there holds G′ = (cid:16)SN ,S G′ i(cid:17) ∪ EM as no edge of EM is removed when building G′ . Moreover, for every i, G′ i can be obtained from Gi by removing edges leaving vertices with an out-degree larger than 2 until no such vertex exists in the graph anymore. The only vertices that are not left by exactly the same edges in G as in Gi are indeed those left by edges of EM , which by hypothesis have an out-degree at most 2 and are therefore unaffected by the edge-removal procedure. It follows then from the persistence of all Gi and from Theorem 4 that all G′ i are rigid. And since G is rigid, EM satisfies the necessary and sufficient conditions of Theorem 5. Therefore, the graph G′ = (cid:16)SN ,S G′ i(cid:17) ∪ EM is also rigid, as the conditions of Theorem 5 do not depend on the edges inside the different meta-vertices. As explained above, this implies the persistence of G′ . (cid:3) The condition on the out-degrees of the vertices with an outgoing edge of EM can be conve- niently re-expressed in terms of degrees of freedom: To each DOF (within a single meta-vertex) of any vertex there corresponds at most one outgoing edge of EM . By an abuse of language, we say that such edges leave a vertex with one or more local DOFs, i.e. a vertex which inside its meta-vertex has one or more DOFs and which is then left by no more edges of EM than the number of DOFs is has. This allows reformulating Proposition 2, the proof of which can directly be extended to any dimension, in a dimension-free way: Theorem 7. A col lection of persistent meta-vertices can be merged into a persistent graph if and only if it can be merged into a persistent graph by adding edges leaving vertices with one or more local DOFs, the number of added edges not exceeding the number of local DOFs. In that G 1 G 2 ** * G 3 G 4 (a) (b) Figure 4. Merging of the persistent meta-vertices G1 and G2 into a persistent graph in ℜ2 (a). The symbol “*” represents one DOF (with respect to the meta- vertex). (b) represents two persistent meta-vertex that cannot be merged into a persistent graph in ℜ2 by addition of interconnecting edges because none of their vertices has a DOF. case, the merged graph is persistent if and only if it is rigid. If one or more edges of EM do leave a vertex with an out-degree larger than 2, no criterion has been found yet to determine whether the merged graph is persistent or not, while also taking advantage of the fact that the graph is obtained by merging several persistent meta-vertices. Tying Theorem 7 together with what is known and reviewed above regarding the merging of two rigid meta-vertices, we conclude: two persistent meta-vertices Ga and Gb each having two or more vertices can be merged into a persistent graph if and only if three edges leaving vertices with local DOFs can be added in such a way that they are incident to at least two vertices in each meta-vertex. There must thus be at least three local DOFs available among the vertices in Ga and Gb . Conversely, if there are available three local DOFs among the vertices of Ga and Gb , since no vertex can have more than two DOFs, it is possible to add a total of at least three edges leaving at least two vertices of Ga ∪ Gb . The vertices to which those edges arrive can then be chosen in such a way that at least two vertices of both Ga and Gb are incident to edges of EM , as in the example shown in Fig. 4. It follows then from Theorem 5 that this graph is rigid, which by Theorem 7 implies that the merged graph is persistent: Proposition 3. Two persistent meta-vertices each having two or more vertices can be merged into a persistent graph if and only if the sum of their DOF numbers is at least 3. At least three edges are needed to perform this merging, and merging can always be done with exactly three edges. If one or two of the meta-vertices are single vertex graphs, the result still holds, but the min- imal number of added edges (and therefore the number of needed DOFs) are then respectively 2 and 1. We define the number of missing DOFs (mDOF ) to be the maximal number of DOFs that any graph with the same number of vertices can have, less the number of DOFs the graph In ℜ2 , this maximal number is 2 for the single vertex graphs, and 3 for other actually has. persistent graphs. There is an interesting consequence: when the minimal number of edges is used to merge two meta-vertices Ga and Gb , the number of missing DOFs is preserved through the process, i.e. mDOF (Ga ∪ Gb ∪ EM ) = mDOF (Ga ) + mDOF (Gb ). Consider now an arbitrary number of persistent meta-vertices, possibly containing single- vertex graphs, but such that the total number of vertices is at least 2. If the sum of their number of missing DOFs is no greater than 3, it follows from Proposition 3 that any two of them can be merged in such a way that the obtained graph is persistent and that the total number of missing DOFs remains unchanged. Any pair of those meta-vertices would indeed contain at least the required number of DOFs. Doing this recursively, it is possible to merge all these meta-vertices into a single persistent graph. In case there are more than 3 missing DOFs, the total DOF number is by definition smaller than 3 N + 2 S − 3, which is the minimal number of edges required to make the merged graph rigid. It follows then from Theorem 7 that such meta-vertices cannot be merged in a persistent graph by addition of interconnecting edges. We have thus proved the following result: Proposition 4. A col lection of persistent meta-vertices N ∪ S (with N and S as defined in the beginning of this section) can be merged into a persistent graph if and only if the total number of missing DOFs is no greater than 3, or equivalently if the total number of local DOF in N ∪ S is at least 3 N + 2 S − 3. At least 3 N + 2 S − 3 edges are needed to perform this merging, and merging can always be done with exactly this number of edges. As when merging rigid meta-vertices, we say that G is an edge-optimal persistent merging if no single edge of EM can be removed without losing persistence. Again, if all meta-vertices are minimally persistent, then G is an edge-optimal persistent merging if and only if it is minimally persistent. Theorem 8. G = (cid:16)SN ,S Gi(cid:17) ∪ EM (with N and S as defined at the beginning of this section and with al l Gi persistent) is an edge-optimal persistent merging if and only if it is an edge-optimal rigid merging and al l edges of EM leave vertices with local DOFs. Proof. Let G be a persistent merging. If there is an edge that lies in EM leaving a vertex with no local DOF, then it follows from Proposition 1 that the graph obtained by removing this edge would also be persistent, and thus that G is not an edge-optimal persistent merging. Now if G is a persistent merging for which all edges of EM leave local DOFs but which is not an edge-optimal rigid merging, then by removing one edge of EM it is possible to obtain a rigid graph which by Proposition 2 is also persistent, so that G is not an edge-optimal persistent merging. There remains to prove that an edge-optimal rigid merging G where all edges of EM leave local DOFs is an edge-optimal persistent merging. Since such G is rigid, it follows from Proposition 2 that it is also persistent. Moreover, since it is an edge-optimal rigid merging, removing any edge of EM destroys rigidity and therefore persistence. (cid:3) Tying Theorem 8 with Theorem 6 leads to the following more explicit characterization of edge-optimal persistent merging. Theorem 9. G = (cid:16)SN ,S Gi(cid:17) ∪ EM (with N and S as defined at the beginning of this section and with al l Gi persistent) containing at least two vertices is an edge-optimal persistent merging in ℜ2 if and only if the fol lowing conditions al l hold: (i) EM = 3 N + 2 S − 3. (ii) For al l non-empty E ′′ M ⊆ E ′ M , there holds E ′′ M ≤ 3 I (E ′′ M ) + 2 J (E ′′ M ) − 3 with I (E ′′ M ) and J (E ′ M ) as defined in Theorem 5 (iii) Al l edges of EM leave vertices with local DOFs. Notice that an efficient way to obtain such a merging is provided in the discussion immediately preceding Proposition 4. 2 2 ≥ 3 1 1 1 Va 2 ≥ 3 ≥ 3 2 ≥ 3 1 Vb 4 5 6 2 3 1 min EM Table 1. Minimal number of edges required to merge two rigid graphs Ga and Gb into a single rigid graph in ℜ3 . 4. Rigidity and Persistence of 3D Meta-Formations 4.1. Rigidity. We now consider a set N of disjoint rigid (in ℜ3 ) graphs G1 , . . . , GN having at least three vertices each, a set D of graphs containing two (connected) vertices GN +1 , . . . , GN +D , and a set S of single-vertex graphs GN +D +1 , . . . , GN +D +S . As in Section 3, these graphs are called meta-vertices, and we define the merged graph G by taking the union of all the meta- vertices, and of some additional edges EM each of which has end-points belonging to different meta-vertices. The merging of two rigid meta-vertices, each containing more than two vertices, is treated in [26]: At least six edges are needed, and they must be incident to at least three vertices of each meta-vertex (which is necessary for 3-connectivity). But these conditions are only necessary, as they do not imply 3-connectivity. For example, the so-called “double-banana” graph in Fig. 1(c) can be obtained by merging two distinct rigid tetrahedral meta-vertices (1,3,4,5) and (2,5,7,8) using a total of six edges incident to four vertices of each meta-vertex. However, it is always possible to achieve a rigid merging using exactly six edges incident to exactly three vertices of each meta-vertex, with no single vertex having more than three incident edges out of the six. With a minor modification, the merging result above holds in the cases where at least one meta-vertex has less than 3 vertices: The required number of edges is different, as summarized in Table 1 where min EM represents the minimal number of edges required to merge the meta- vertices Ga (Va , Ea ) and Gb (Vb , Eb ) into a rigid graph. Also, if a meta-vertex has less than 3 vertices, all of them should be incident to edges of EM , otherwise at least 3 of them should be. When merging several meta-vertices, there is no available necessary and sufficient condition for the rigidity of G. Determining whether a merged graph is rigid in ℜ3 is indeed a more general problem than determining whether a given graph is rigid (for which it suffices to take N = D = ∅) and there is no known set of combinatorial necessary and sufficient conditions for this. We can however prove that the rigidity of the merged graph G only depends on EM , on the vertices to which nodes of EM are incident and on the belonging of the Gi to N , D or S . Proposition 5. Let G = (cid:16)SN ,D ,S Gi(cid:17) ∪ EM with N , D , S as defined at the beginning of this section. Suppose that a meta-vertex Gi is replaced by a meta vertex G′ i with the same set of vertices incident to EM , with the same set membership, N , S or D, as Gi , but otherwise with different internal structure. Let G’ be the graph so obtained. Then G′ is rigid if and only if G is rigid. Proof. This could be proved using algebraic arguments based on the rigidity matrix, but we prefer the following more intuitive argument. The result is trivial for meta-vertices of D and S as they are entirely determined by their be- longing to these classes; we assume therefore that Gi ∈ N . We also assume that the set Vi (EM ) of vertices of Gi (and G′ i ) that are incident on edges of EM contains at least three vertices. In case this assumption is not verified, both G and G′ fail to be 3-connected and therefore rigid (by Theorem 2), so that the result is also trivial. We then prove that the non-rigidity of G implies the non-rigidity of G′ . Since the roles of G and G′ can be exchanged, this is sufficient to prove the theorem. Suppose that G is not rigid, and give positions in ℜ3 to its vertices. Then there is a smooth motion M (satisfying the distance constraints corresponding to edges in G) of the vertices of G apart from pure translation or rotation. Because Gi is rigid, the restriction of M to the vertices of Gi is a rigid motion, that is a translation and/or rotation, which we call T . Therefore, the restriction of M to (G \ Gi ) ∪ Vi (EM ) is not a rigid motion. Otherwise all distances would be preserved by M apart from some distances between vertices of Gi \ Vi (EM ) and vertices of G \ Gi . We would then have two vertices whose relative distance is not preserved while their relative distance with respect to all the three or more vertices of Vi (EM ) are preserved, which is impossible. We call M ∗ this restriction to (G \ Gi ) ∪ Vi (EM ). Let now M ′ be a smooth motion of the vertices of G′ , which for the vertices of G′ i is the translation and/or rotation T , and for the vertices of (G′ \ G′ i ) ∪ Vi (EM ) is the motion M ∗ (observe that that the two motions are identical on V (EM ) which is the intersection of the two sets on which M ′ is defined). Since M ∗ is a non-rigid motion (not preserving all distances), so is M ′ . Therefore, we just need to prove that M ′ satisfies all distance constraints on vertices connected by edges in G′ to prove the non-rigidity of G′ . Consider a pair of vertices. If they both belong to (G′ \ G′ i ) ∪ Vi (EM ), their constraint in G′ is the same as in G, and their motion is defined by M ∗ which satisfies all distance constraints. If they do not both belong to (G′ \ G′ i ) ∪ Vi (EM ), then due to the structure of the graph they necessarily both belong to G′ i , and their motion is the rotation and/or translation which by essence preserve all distances. (cid:3) Moreover, we have the following necessary condition: Theorem 10. Let Gi for i = 1, 2, ...., N + D + S be rigid meta-vertices, and suppose G = (cid:16)SN ,D ,S Gi(cid:17) ∪ EM (with N , D , S as defined at the beginning of this section) is rigid in ℜ3 and contains at least three vertices. Then there exists E ′ M ⊆ EM such that (i) E ′ M = 6 N + 5 D + 3 S − 6 (ii) For al l non-empty E ′′ M ⊆ E ′ M , there holds E ′′ M ≤ 6 I (E ′′ M ) + 5 J (E ′′ M ) + 3 K (E ′′ M ) − 6, where I (E ′′ M ) is the set of meta-vertices such that either there are at least three vertices within the meta-vertex al l incident to edges of E ′′ M , or precisely two vertices within the meta-vertex which are unconnected and both incident to edges of E ′′ M . J (E ′′ M ) is the set of meta-vertices such that there are precisely two vertices within the meta-vertex which are connected and both incident to edges of E ′′ M ; K (E ′′ M ) is the set of meta vertices such that there is precisely one vertex within the meta-vertex that is incident to one or several edges of E ′′ M . Note that in each case, there can be an arbitrary number of vertices in the meta-vertex which are not incident on any edge of E ′′ M . Moreover, the graph (cid:16)SN ,D ,S Gi(cid:17) ∪ E ′ M is rigid. Proof. The proof is similar to the one of Theorem 5 (necessary part). For every Gi , let G′ i be a minimally rigid subgraph of Gi on the same vertices, which therefore contains 3 Vi − 6 edges if Gi ∈ N , one edge if Gi ∈ D and no edge if Gi ⊆ S . As mentioned in its proof, Lemma 1 can also be applied in a three-dimensional space. So if G is rigid, there is a minimally rigid subgraph G′ (V , E ′ ) ⊆ G containing all G′ i . Let E ′ M = E ′ ∩ EM ; we shall prove that E ′ M satisfies the condition of this theorem. Since G′ is minimally rigid, there holds E ′ = 3 V − 6. Moreover, we have E ′ = E ′ M + PGi∈N E ′ i + D , and V = PGi ∈N V ′ i + 2 D + S , so that E ′ M = 3 V − 6 − PGi∈N (3 Vi − 6) − D = 6 N + 5 D + 3 S − 6. M contains thus the predicted number of edges. We suppose now that there is a set E ′′ E ′ M such that E ′′ M > 6 I (E ′′ M ) + 5 J (E ′′ M ) + 3 K (E ′′ M ) − 6 and show that this contradicts the minimal rigidity of G′ . Let us then build E ′′ by taking the union of E ′′ M and all E ′ i for which i ∈ I (E ′′ M ), M in all meta-vertices in J (E ′′ and the edge connecting the two vertices incident to E ′′ M ). There holds V (E ′′ ) = K (E ′′ M ) + 2 J (E ′′ M ) + PGi ∈I (E ′′ M ) Vi . Therefore, we have M ) E ′ i + J (E ′′ E ′′ = E ′′ M + PGi∈I (E ′′ M ) > 6 I (E ′′ M ) + 5 J (E ′′ M ) + 3 K (E ′′ M ) − 6 M ) (3 Vi − 6) + J (E ′′ + PGi∈I (E ′′ M ) = 3 V (E ′′ ) − 6. This however contradicts the minimal rigidity of G′ as E ′′ ⊆ E ′ . Finally, since G′ = (cid:16)SN ,D ,S G′ i(cid:17)∪ M is rigid, it follows from several applications of Proposition 5 that (cid:16)SN ,D ,S Gi(cid:17) ∪ E ′ E ′ M is also rigid. (cid:3) Note that the rigidity of (S Gi ) ∪ E ′ M is explicitly mentioned here and not in Theorem 5, because in a two-dimensional space it follows directly from sufficiency of the counting conditions. But, the counting conditions of Theorem 10 are not sufficient for rigidity, as the non-rigid graph of Fig. 1(c) which can be obtained by merging two rigid tetrahedral meta-vertices (1,3,4,5) and (2,6,7,8) would indeed satisfy them. Nevertheless, one can deduce from Theorem 10 that G is an edge-optimal rigid merging in ℜ3 if and only if it is rigid and EM = 6 N + 5 D + 3 S − 6, using E ′ M exactly in the same way as in Theorem 6. 4.2. Persistence. We consider now that all meta-vertices Gi are persistent graphs, and adapt the definitions of N , D and S in consequence. Theorem 7 can be generalized to three dimensions, as it follows from Proposition 2, the proof of which can be immediately extended to three dimensions. Theorem 11. A col lection of (structural ly) persistent meta-vertices can be merged into a (struc- tural ly) persistent graph if and only if it can be merged into a (structural ly) persistent graph by adding edges leaving vertices with one or more local DOFs. In that case, the merged graph is persistent if and only if it is rigid. Proof. Suppose first that a collection of persistent meta-vertices can be merged into a persistent graph in such a way that some edges do not leave local DOFs. Then, it follows from Proposition 1 that these edges can be removed without destroying the persistence of the merged graph, so that the same collections of meta-vertices can be merged without having connecting edges that do not leave local DOFs. In case the meta-vertices are structurally persistent and are merged into a structurally persistent graph, the result still holds as removing edges that do not leave local DOFs never destroys structural persistence. The reverse implication is trivial. The proof of the rest of the result is done exactly as in Theorem 2, using Proposition 5 instead of Theorem 5. (cid:3) Merging two meta-vertices into a persistent graph is however a more complicated problem in ℜ3 than in ℜ2 . Consider indeed a meta-vertex Ga without any DOF, and a meta-vertex Gb which is not structurally persistent, i.e. which is persistent and contains two vertices (leaders) having three DOFs. The number of available DOFs is equal to the minimal number of edges that should be added to obtain a rigid merged graph. However, the only way to add six edges leaving local DOFs is to add three edges leaving each leader of Gb and arriving in Ga , as represented by the example in Fig. 5(a). Only two vertices of Gb would thus be incident to the added G a *** G b *** G c *** G d *** *** *** (a) (b) Figure 5. Example of a persistent but not structurally persistent meta-vertex Gb which cannot be merged into a persistent or rigid graph with the meta-vertex Ga , the latter being persistent but having no DOF. (b) shows how two non- structurally persistent meta-vertices can be merged into a structurally persistent graph. The symbol “*” represents one DOF, and the dashed edges are the edges of EM . G a *** G b *** Figure 6. Ga and Gb both have all their DOFs concentrated on one leader. As a result they cannot be merged into a persistent graph. The only way to add 6 edges leaving local DOFs is depicted and does not lead to a rigid graph, because the overall graph is not 3-connected. The symbol “*” represents one DOF, and the dashed edges are the edges of EM . edges, which prevents the merged graph from being rigid and therefore persistent as it is thus not 3-connected. We have thus proved the following condition: Proposition 6. If two persistent meta-vertices are such that one is not structural ly persistent and the other does not have any DOF, they cannot be merged into a persistent graph by addition of interconnecting edges. Another problem appears when Ga and Gb each have one leader (having three DOFs) and no other vertex has DOFs. Again, the number of available DOFs is equal to the minimal number of edges that should be added to obtain a rigid merged graph, but the only way to add six edges leaving local DOFs does not lead to a rigid graph. One can indeed only add three edges leaving each leader as shown in Fig. 6. This results in a graph that is not 3-connected and therefore not rigid by Theorem 2, as the removal of the two ex-leaders would render the graph unconnected. We have thus proved the following condition: Proposition 7. If two persistent meta-vertices have each one leader (with 3 DOFs) and no other DOF, they cannot be merged into a persistent graph by addition of interconnecting edges. However, these are the only cases for which the argument used in establishing Proposition 3 cannot be generalized to establish an analogous property in ℜ3 : Proposition 8. Two persistent meta-vertices (each with three or more vertices) can be merged into a persistent graph by addition of directed connecting edges if and only if the sum of their DOFs is at least 6 and the DOFs are located on more than two vertices. At least six edges are needed to perform this merging, and merging can always be done with exactly six edges and in such a way that the graph obtained is structural ly persistent and does not have al l its DOFs located on leaders. Proof. Consider two meta-vertices each having more than 2 vertices. It follows from Theorem 11 that they can be merged into a persistent graph if and only if it is possible to add directed edges leaving local DOFs in such a way that the obtained graph is rigid. Suppose first that the total number of available DOFs is 6. If all these DOFs are located on two leaders, the two graphs satisfy the conditions of either Proposition 6 or Proposition 7, so that they cannot be merged into a persistent graph. If the 6 DOFs are located on more than 2 vertices, an exhaustive verification (see Appendix) show that the two graphs can always be merged into a rigid graph by adding 6 edges, each leaving a vertex with a local DOF, with at least one DOF for each edge. Note that this exhaustive verification is needed as no sufficient condition for rigidity of a graph obtained by connecting two rigid graphs is known which is sufficiently weak to be helpful for this proof. If the total number of DOFs is larger than 6, they are located on at least 3 vertices, as a vertex has at most 3 DOFs. It is therefore possible to select a subset of 6 DOFs located on at least 3 vertices, and to apply the result obtained above for 6 DOFs. There remains to prove that the merging can always be done in such a way that the obtained graph does not have all its DOFs located on leaders, or in other words the obtained graph has only vertices with 0 or 3 DOFs (This also implies that the graph obtained is structurally persistent, as the only persistent graphs that are not structurally persistent are those with two leaders and therefore no other DOF). Such a situation, i.e. the obtained graph has only vertices with 0 or 3 DOFs, could only happen if this graph has exactly 3 or 6 DOFs, and thus if 9 or 12 DOFs are initially available, as the merge is done by addition of 6 edges. A simple way of avoiding having all remaining DOFs on leaders is then to select the 6 DOFs that are going to be removed in the merging process in such a way that a number of DOFs different from 3 and 6 is left in each of the initial graphs. At least one vertex has then indeed one or two DOFs. (cid:3) In case at least one of the two meta-vertices has less than 3 vertices, an exhaustive consider- ation of all possible cases (see Appendix) shows that the result still holds, but with a different required number of edges in EM and therefore of available DOFs: these minimal numbers are both equal to min EM in Table 1 (for the merging of a graph Ga (Va , Ea ) with a graph Gb (Vb , Eb )). Observe that as in the 2-dimensional case, the merge can be done in such a way that the number of missing DOFs is preserved, the number of missing DOFs being defined in the same way as in Section 3.2, with maximal number of DOFs being 6, 5 and 3 for meta-vertices of respectively N , D and S . It is worth noting that even if one or both of the meta-vertices are not structurally persistent, it is possible to obtain a structurally persistent merged graph, as represented in Fig. 5(b). This has already been observed in [28] for the case where one meta-vertex is a single vertex graph. Consider now a collection of meta-vertices such that the total number of vertices is at least 3. Unless the collection consists in two meta-vertices satisfying the hypotheses of Proposition 6 or 7, all the graphs that compose it can be merged into one large persistent graph by addition of edges. Proposition 9. A col lection of persistent meta-vertices N ∪ D ∪ S (with N , D , S as defined in the beginning of this section) containing in total at least three vertices and that does not consist of only two meta-vertices satisfying the condition of Proposition 6 or 7 can be merged into a persistent graph if and only if the total number of missing DOFs is no greater than 6, or equiv- alently if the total number of local DOFs in N ∪ D ∪ S is at least 6 N + 5 D + 3 S − 6. At least 6 N + 5 D + 3 S − 6 edges are needed to perform this merging. Merging can always be done with exactly this number of edges, and in such a way that the merged graph is structural ly persistent. Proof. The proof is similar to the one of Proposition 4. If a pair of meta-vertices can be merged into a persistent graph, this merging can be done in such a way that the number of missing DOFs is preserved, and by adding only edges leaving vertices with local DOFs (with at most one edge for each DOF). Doing this recursively, we eventually obtain a single persistent graph that has the same number of missing DOFs as the initial collection of graphs. The number of added edges is then equal to the number of DOFs that have disappeared during the merging process, that is 6 N + 5 D + 3 S − 6. There remains to prove that these mergings can actually be done, and that the obtained graph is structurally persistent. By Proposition 8 (and its extension to graphs with 1 or 2 vertices), when their number of missing DOFs is smaller than 6, two persistent graphs can always be merged into a structurally persistent graph, unless either one of them is not structurally persis- tent while the other has no DOF (case of Proposition 6), or both of them have one leader and no other DOF (case of Proposition 7). In these two cases, the two “problematic” meta-vertices have at least three vertices each. Suppose first that one meta-vertex has no DOF (and that the rest of the meta-vertices collec- tion does not consist in one single non structurally persistent meta-vertex). Then since the total number of missing DOF is 6, no other meta-vertex has a missing DOF, and by hypothesis there are at least two other meta-vertices (or possibly exactly one structurally persistent meta-vertex). It follows then from successive applications of Proposition 8 that they all can be merged into a structurally persistent graph that still does not have any missing DOF. This latter graph can then be merged with the graph that has no DOF, and the graph obtained is also structurally persistent. Suppose now that two meta-vertices have exactly one leader and no other DOF. It follows then from the hypotheses that there is at least one other meta-vertex in the collection. And again, no other meta-vertex has any missing DOF. Temporarily isolating one of the meta-vertices with one leader and no other DOF, it follows again from successive applications of Proposition 8 that all other graphs can be merged into a persistent graph that does not have all its DOFs located on one single leader, and this graph can then be merged with the temporarily isolated graph into a structurally persistent graph. (cid:3) As in the two-dimensional case, a merged graph is an edge-optimal persistent merging if and only if it is an edge-optimal rigid merging and all edges in EM (such as defined in the beginning of this subsection) leave local DOFs. The proof of this is an immediate generalization of Theorem 8. However, due to the absence of necessary and sufficient conditions allowing a combinatorial checking of the rigidity of a graph or of a merged graph in ℜ3 , the result cannot be expressed in a purely combinatorial way. Since the number of edges in EM in an edge-optimal rigid merging is fixed, the above criterion can be re-expressed as Theorem 12. G = (cid:16)SN ,D ,S Gi(cid:17) ∪ EM (with N , D , S as defined at the beginning of this section and with al l Gi persistent) containing in total at least three vertices is an edge-optimal persistent merging in ℜ3 if and only if the fol lowing conditions al l hold: (i) G is rigid. (ii) Al l edges of EM leave local DOFs. (iii) EM = 6 N + 5 D + 3 S − 6. Again, an efficient way to obtain an edge-optimal persistent merging from a collection of meta-vertices satisfying the hypotheses of Proposition 9 is to first merge two of them and then to iterate, as in the discussion of Propositions 4 and 9. 5. Conclusions We have analyzed the conditions under which a formation resulting from the merging of several persistent formations is itself persistent. Necessary and sufficient conditions were found to determine which collections of persistent formations could be merged into a larger persistent formation. We first treated these issues in ℜ2 . Our analysis was then generalized to ℜ3 and to structural persistence, leading to somewhat less powerful results. This is especially the case for those which rely on the sufficient character of Laman’s conditions for rigidity in ℜ2 (Theorem 1), no equivalent condition being known in ℜ3 . Following this work, we plan to develop systematic ways to build all possible optimally merged persistent formations, similarly to what has been done for minimally persistent formations [10] and for minimally rigid merged formations [27]. These references canvas generalizations of the Henneberg sequence concept [13, 22] for building all minimally rigid graphs in two dimensions. References [1] B.D.O. Anderson, C. Yu, B. Fidan, and J.M. Hendrickx. Use of meta-formations for cooperative control. In Proceedings of the 17th International Symposium on Mathematical Theory of Networks and Systems (MTNS2006), pages 2381–2387, Kyoto (Japan), July 2006. [2] J. Baillieul and A. Suri. Information patterns and hedging brockett’s theorem in controlling vehicle forma- tions. In Proc. of the 42nd IEEE Conf. on Decision and Control, volume 1, pages 556–563, Hawaii, December 2003. [3] J.M. Borky. Payload technologies and applications for uninhabited air vehicles (uavs). In Proc. of the IEEE Aerospace Conf., volume 3, pages 267–283, Aspen (CO), USA, February 1997. [4] A. Das, R. Fierro, V. Kumar, and Ostrowski J.P. A vison based formation control framework. IEEE trans. on Robotics and Automation, 18(5):813–825. [5] K. Dogancay. Optimal receiver tra jectories for scan-based radar localization. In Proc. Information, Decision and Control Conference 2007, Adelaide (SA), Australia, February 2007. [6] T. Eren, B.D.O. Anderson, A.S. Morse, Whiteley W., and P.N. Belhumeur. Information structures to secure control of rigid formations with leader-follower structure. In Proc. of the American Control Conference, pages 2966–2971, Portland, Oregon, June 2005. [7] T. Eren, B.D.O. Anderson, W. Whiteley, A.S. Morse, and P.N. Belhumeur. Operations on rigid formations of autonomous agents. Communications in Onformations and Systems, 3(4):223–258, 2004. [8] H.R Everett. Sensors for Mobile Robots: Theory and Application. A.K. Peters, 1995. [9] J.M. Hendrickx, B.D.O. Anderson, J.-C. Delvenne, and V.D. Blondel. Directed graphs for the analysis of rigidity and persistence in autonomous agents systems. International Journal of Robust and Nonlinear Con- trol, 17:960–981, 2007. [10] J.M. Hendrickx, B. Fidan, C. Yu, B.D.O. Anderson, and V.D. Blondel. Primitive operations for the construc- tion and reorganization of minimally persistent formations. To appear in IEEE Transactions on Automatic Control. [11] J.M. Hendrickx, C. Yu, B. Fidan, and B.D.O. Anderson. Rigidity and persistence of meta-formations. In Proceedings of the 45th IEEE Conference on Decision and Control, pages 4567–4663, San Diego (CA), USA, December 2006. [12] J.M. Hendrickx, C. Yu, B. Fidan, and B.D.O. Anderson. Rigidity and persistence for ensuring shape main- tenance in multiagent meta-formations. To appear in Asian Journal of control’s special issue on Col lective Behavior and Control of Multi-Agent Systems, 2008. [13] L. Henneberg. Die graphische Statik der starren Systeme. Leipzig, 1911. [14] Donald J. Jacobs and Bruce Hendrickson. An algorithm for two-dimensional rigidity percolation: the pebble game. J. Comput. Phys., 137(2):346–365, 1997. [15] G. Laman. On graphs and rigidity of plane skeletal structures. J. Engrg. Math., 4:331–340, 1970. [16] A. Mantler and J. Snoeyinkn. Banana spiders: A study of connectivity in 3d combinatorial rigidity. In Pro- ceedings of the 16th Canadian Conference on Computational Geometry (CCCG 2004), pages 44–47, Montr´eal, Canada, August 2004. [17] S. Martinez and F. Bullo. Optimal sensor placement and motion coordination for target tracking. Automatica, 42(3):661–668, 2006. [18] C. Moukarzel. An efficient algorithm for testing the generic rigidity of graphs in the plane. J. Phys. A, 29(24):8079–8098, 1996. [19] R. Olfati-Saber and R.M Murray. Graph rigidity and distributed formation stabilization of multi-vehicle systems. In Proceedings of the 41st Conference on Decision and Control, volume 3, pages 2965–2971, Las Vegas, NV, December 2002. [20] M. Pachter and J. Hebert. Cooperative aircraft control for minimum radar exposure, pages 199–211. Kluwer Academic, 2002. [21] H.G. Tanner, G.J. Pappas, and V. Kumar. Leader-to-formation stability. IEEE Transactions on Robotics and Automation, 4(3):433–455, 2004. [22] T. Tay and W. Whiteley. Generating isostatic frameworks. Structural Topology, (11):21–69, 1985. [23] T.S. Tay. Rigidity of multigraphs. I. Linking rigid bodies in n-space. J. Combin. Theory Ser. B, 36(1):95–112, 1984. [24] W. Whiteley. Some matroids from discrete applied geometry. In Matroid theory (Seattle, WA, 1995), volume 197 of Contemp. Math., pages 171–311. Amer. Math. Soc., Providence, RI, 1996. [25] A. Williams, S. Glavaski, and T. Samad. Formations of formations: Hierarchy and stability. In Proc. of the 2004 American Control Conference, pages 2992–2997, Boston (MA), USA, July 2004. [26] C. Yu, B. Fidan, and B.D.O. Anderson. Principles to control autonoumous formation merging. Proc. of the 2006 American Control Conference, pages 762–768, June 2006. [27] C. Yu, B. Fidan, J.M. Hendrickx, and B.D.O. Anderson. Multiple formations merging: a meta-formation prospective. In Proceedings of the 45th IEEE Conference on Decision and Control, pages 4657–4663, San Diego (CA, USA), December 2006. [28] C. Yu, J.M. Hendrickx, B. Fidan, B.D.O. Anderson, and V.D. Blondel. Three and higher dimensional au- tonomous formations: Rigidity, persistence and structural persistence. Automatica, 43:387–402, 2007. In this appendix, we complete the proof of Proposition 8 on the merging of persistent meta- vertices in a 3-dimensional space, and extend this proposition to cases where one of the meta- vertices has less than 3 vertices. We have to prove that two persistent graphs (in a three- dimensional space) Ga and Gb having in total 6 DOFs located on at least three vertices can always be merged into a rigid graph by addition of six edges leaving vertices with local DOFs, with at least one local DOF for each added edge. For this purpose, we use the following lemma, which summarizes results obtained in [26]. Lemma 2. Let Ga and Gb be two (initial ly distinct) rigid graphs each with three or more ver- tices. Performing a sequence of three or more operations selected among the two fol lowing types of operations results in merging Ga and Gb into a rigid graph by addition of 6 edges. Operation (v): Taking a vertex i of Ga not connected yet to any vertex of Gb , and connecting it to 3 − t vertices of Gb , where t is the number of operations already performed. Operation (e): Taking a vertex i of Ga not connected yet to any vertex of Gb , and an edge (k , j ) with k ∈ VA and j ∈ VB . Replacing the edge (k , j ) by (i, j ) and connecting i to 2 − t other Ga Gb d+ EM 3 2 1 Ga Gb Operations: (v)(v)(v) (a) (b) Figure 7. (a) represents a rigid merged graph obtained by performing three operations (v). It is shown in (b) how directions can be given to the edges in such a way that three vertices of Ga are left by respectively 3, 2 and 1 edges. vertices in Gb , where t is the number of operations already performed. Without loss of generality, we suppose that Ga has at least as many DOFs as Gb . The par- tition of DOFs can thus be 6-0, 5-1, 4-2 or 3-3. In the sequel, we prove the result for each of these particular cases, starting with Ga having 6 DOFs. It follows from Lemma 2 that the merged graph represented in Fig. 7(a) is rigid. It can indeed be obtained by three applications of the operation (v). Moreover, one can see in Fig. 7(b) that directions can be given to the connecting edges in such a way that the out-degree distribution (with respect to the connecting edges) is (3, 2, 1), that is one vertex of Ga is left by three connecting edges, one by two, and one by one. Suppose now that Ga is a persistent graph with 6 DOFs with a DOF allocation (3, 2, 1), that is a persistent graph having one vertex having 3 DOFs, one 2 DOFs, and one 1 DOF. Then it can be merged with Gb into a rigid graph by adding 6 edges leaving vertices with local DOF (with one DOF for each edge). It suffices indeed to take the edges represented in Fig. 7(b), identifying each vertex with δ DOFs with a vertex left by δ connecting edges. We now treat a DOF allocation (2, 2, 2). It follows again from Lemma 2 that the merged graph represented in Fig. 8(a) is rigid, as it can be obtained by two applications of the opera- tion (v) followed by one application of operation (e). Moreover, Fig. 8(b) shows that directions can be assigned to the edges in such a way that the out-degree distribution (with respect to the connecting edges) is (2, 2, 2). For the same reason as above, Ga can thus be merged with Gb into a rigid graph by adding 6 edges leaving vertices with local DOF (with one DOF for each edge) if its DOF distribution is (2, 2, 2). Next we show that such construction can be obtained in all other cases, except those where the 6 DOFs are all located on two vertices. When Ga has 6 DOFs, the remaining possible DOF distributions are (3, 1, 1, 1), (2, 2, 1, 1), (2, 1, 1, 1, 1) and (1, 1, 1, 1, 1, 1), the case (3, 3) does not satisfy the hypotheses. The construction in these four cases are obtained by performing the operation (e) of Lemma 2 (up to three times) on the constructions detailed above for (3, 2, 1) and (2, 2, 2). They are represented in Fig. 9 If Ga has 5 DOFs and Gb one DOF, the required construction can always be obtained from one of the construction for the case where Ga has 6 DOFs. It suffices indeed to use one of the Ga Gb d+ EM 2 2 2 Ga Gb Operations: (v)(v)(e) (a) (b) Figure 8. (a) represents a rigid merged graph obtained by performing three operations (v). It is shown in (b) how directions can be given to the edges in such a way that the three vertices of Ga are each left by 2 edges. d+ EM 3 1 1 1 d+ EM 2 1 1 1 1 Ga Gb Ga Gb Operations: (e) from (3,2,1) Operations: (e) from (3,1,1,1) d+ EM 2 2 1 1 d+ EM 1 1 1 1 1 1 Ga Gb Ga Gb Operations: (e) from (2,2,2) Operations: (e) from (2,1,1,1,1) Figure 9. Representations of how a rigid graph can be obtained by merging two persistent graphs Ga and Gb where Gb has no DOF and where the DOF allocation of Ga is (3, 1, 1, 1), (2, 2, 1, 1), (2, 1, 1, 1, 1) or (1, 1, 1, 1, 1, 1). The operations (v) and (e) used to obtain the structure are also mentioned. constructions already provided by temporarily adding one vertex with one DOF to the distribu- tion of 5 DOFs in Ga , executing the appropriate construction from the group above, and then reversing the direction of the edge leaving a vertex with one DOF, as shown in Fig. 10 for a DOF distribution (3, 2). Suppose now that Ga has 4 DOFs, and Gb 2 DOFs. Then the possible DOF distribution for Ga are (3, 1), (2, 2), (2, 1, 1) and (1, 1, 1, 1). For Gb , they are (2) and (1, 1). The construction proving the result for these eight cases are shown in Fig. 11. Finally, if both graphs have 3 DOFs, the possible distribution for each are (3), (2, 1) and (1, 1, 1). The case where they both have a distribution (3) does not satisfy the hypotheses of this Proposition, and three other cases do not need to be treated for symmetry reasons. The d+ EM 3 2 1 d+ EM 3 2 Ga Gb Ga Gb d+ EM 1 Figure 10. Representation of how the construction for a DOF partition 5-1 between Ga and Gb can be obtained from a construction for a partition 6-0. d+ EM 3 1 Ga d+ EM 3 1 Ga d+ EM 2 2 Ga Gb d+ EM Ga Gb d+ EM Gb d+ EM 2 2 2 d+ EM 2 Ga 1 1 Gb d+ EM 1 1 1 1 2 Gb d+ EM d+ EM 2 1 Ga 2 1 Gb d+ EM 1 1 d+ EM 1 1 1 1 d+ EM 1 1 1 1 Ga Gb d+ EM 2 Ga Gb d+ EM 1 1 Figure 11. Constructions for the eight possible DOF allocations when Ga has 4 DOFs and Gb 2 DOFs. The graphs are all rigid are they have the same undirected underlying graphs as construction in Fig. 7, 8 or 9. construction for the remaining 5 cases is shown in Fig. 12. We now suppose that at least one of the graphs has less than 3 vertices, and show that a rigid graph can be obtained by adding directed edges leaving vertices with local DOFs, the number of these edges being provided in Table 1. Observe that a graph consisting of one single vertex always has 3 DOFs, and thus that it is never needed to use any DOF of the other graph. Similarly, each vertex of a graph containing two vertices has at least 2 DOFs, so that at most one DOF of the other graph needs to be used, and only when the other graph has three or more vertices. Fig. 13 shows how these mergings can be performed. Note that the rigidity of d+ EM 1 2 Ga 2 1 d+ EM 3 Ga Ga Gb Gb d+ EM 1 2 d+ EM 1 1 1 Gb d+ EM 1 2 d+ EM 1 1 1 d+ EM 1 1 1 Ga Gb Gb d+ EM 1 1 1 Ga d+ EM 3 Figure 12. Constructions for the five different DOF allocations satisfying the hypothesis of Proposition 8 when each of Ga and Gb has 3 DOFs. The graphs are all rigid are they have the same undirected underlying graphs as construction in Fig. 7, 8 or 9 or rotated versions of them. d+ EM = 1 d+ EM = 2 Ga Ga d+ EM 2 Ga 2 Gb Gb Gb d+ EM = 3 Ga 2 d+ EM Ga 2 Gb Gb d+ EM = 1 Figure 13. Illustration of the merging between two graphs, one of which at least has less than 3 vertices. The dashed line represent the internal edge(s) of graphs with two vertices, the orientation of which is not relevant for our purpose. The vertex count in Gb is precisely 1,2 and 2 for the first three and a minimum of 3 for the last two. the three first graphs is immediate as they are complete graphs. The rigidity of the other two follows from the fact that they can be obtained from Gb by performing one of two operations (v), which guarantees the rigidity of the graph obtained [22].
1210.7422
1
1210
2012-10-28T08:08:15
Sensor networks security based on sensitive robots agents. A conceptual model
[ "cs.MA" ]
Multi-agent systems are currently applied to solve complex problems. The security of networks is an eloquent example of a complex and difficult problem. A new model-concept Hybrid Sensitive Robot Metaheuristic for Intrusion Detection is introduced in the current paper. The proposed technique could be used with machine learning based intrusion detection techniques. The new model uses the reaction of virtual sensitive robots to different stigmergic variables in order to keep the tracks of the intruders when securing a sensor network.
cs.MA
cs
Sensor networks security based on sensitive robots agents. A conceptual model Camelia-M. Pinteaa, Petrica C. Popa aTechnical University Cluj Napoca, North University Center Baia Mare, Romania 2 1 0 2 t c O 8 2 ] A M . s c [ 1 v 2 2 4 7 . 0 1 2 1 : v i X r a Abstract Multi-agent systems are currently applied to solve complex problems. The security of networks is an eloquent example of a complex and difficult problem. A new model-concept Hybrid Sensitive Robot Metaheuristic for Intrusion Detection is introduced in the current paper. The proposed technique could be used with machine learning based intrusion detection techniques. The new model uses the reaction of virtual sensitive robots to different stigmergic variables in order to keep the tracks of the intruders when securing a sensor network. Keywords: intrusion detection, sensor network, intelligent agents 1. Introduction Prevention and detection of intruders in a secure net- work is nowadays a challenging issue. The intrusion detec- tion system based on computational intelligence (CI) has proved in time to have huge advantages over traditional detection systems due to characteristics of CI methods: adaptation, fault tolerance, high computational speed etc. It is essential to design efficient Intrusion Detection Sys- tems (IDS) especially for open medium networks as wire- less sensor devices. The intrusions could be missue intrusions and anomaly intrusions. Missue intrusions are the attacks knowing the weak points of a system. Anomaly intrusions are based on observations of normal system usage patterns and de- tecting deviations from the given norm. The mentioned intrusions are hard to quantify because there are no fixed patterns that can be monitored and as a result a more fuzzy approach is often required. The Intrusion Preventing Systems (IPS) are network security appliances that monitor network and/or system activities for malicious activities. IPS is a device used to block all the unwanted access to the targeted host, to remove malicious part of packets and as well it may re- configure the network device where an attack is detected [3]. Social autonomic cooperative colonies as ants, bees and others have the capability to coordinate and construct complex systems [4]. Using their behavior, engineers have built real collective robotic systems. The metaheuristics based on classes of specialized robots provide feasible solu- tions for nowadays complex problems. One of these tech- niques is Sensitive Robot Metaheuristic developed by Pin- tea et al. [19, 21]. The sensitive model was introduced and Email addresses: [email protected] (Camelia-M. Pintea), [email protected] (Petrica C. Pop) explained in [5, 6, 21] and used to solve complex problems in [7, 20, 21]. The SRM model was implemented first to solve a large drilling problem but it has the potential to solve other NP-hard problems including intrusion detec- tion. The model ensure a balance between diversification and intensification in searching. The aim of the current paper is to provide an effective stigmergic-based technique for IDS in a sensor network graph, that consist of multiple detection stations called sensor nodes. The new Hybrid Sensitive Robot Metaheuris- tic for Intrusion Detection (HSRM-ID) model uses a col- lection of robots endowed with a stigmergic sensitivity level. The sensitivity of robots allow them to detect and react to different stigmergic variables involving the attacks into a secure network. The hybrid model combines ele- ments from Sensitive Robot Metaheuristic (SRM) [19] as Ant Colony System (ACS) [10], autonomous mobile robots and the intrusion detection based on emotional ants for sensors (IDEAS) [2]. 2. Sensitive Stigmergic Robots The metaheuristic Sensitive Robot Metaheuristic (SRM) [19] combining the concepts of stigmergic communication and autonomous robot search is used to solve NP-hard optimization problems. The basic concepts are defined and described further in this section, see for more details [4, 5, 6, 7, 19, 20, 21]. Definition 1. Stigmergy occurs when an action of an in- sect is determined or influenced by the consequences of the previous action of another insect. Definition 2. Sensitive robots refers to artificial entities with a Stigmergic Sensitivity Level (SSL) expressed by a real number in the unit interval [0, 1]. Definition 3. Environment explorers'robots are sensitive robots with small Stigmergic Sensitivity Level (sSSL) with the potential to autonomously discover new promising re- gions of the search space. Definition 8. Intrusion Prevention System (IPS) is ac- tive, in-line device in the network that can drop packets or stop malicious connection before reaching the targeted system. Definition 4. Environment exploiters robots are sensitive robots with high Stigmergic Sensitivity Level (hSSL) em- phasizing search intensification. An important characteristic of stigmery is that indi- vidual behavior modifies the environment, which in turn modifies the behavior of other individuals [11]. The SRM technique attempts to address the coupling between per- ception and action as direct as possible in an intelligent stigmergic manner. As it is known, robot communication relies on local en- vironmental modifications that can trigger specific actions. The set of the rules defining actions (stimuli pairs) used by a homogeneous group of stigmergic robots defines their be- havior and determines the type of structure the robots will create [4, 26]. Robot stigmergic communication does not rely on chemical deposition as it is for artificial ant-based colonies [10]. A stigmergic robot action is determined by the environmental modifications caused by prior actions of other robots. The value of quantitative stigmergy modify the future actions of robots. Discrete stimulus are involved in qualitative stigmergy and the action is switched to a dif- ferent action [4, 26]. Some real-life applications of the behavior-based ap- proach, including autonomous robots, are in data min- ing, military applications, industry and agriculture, waste management, health care. 3. Intrusion detection techniques using Artificial Intelligence At first are introduced the main concepts of IDS fol- lowed by a survey of Artificial Intelligence-based existing models for computer security. 3.1. Intrusion Detection System Due to increasing incidents of computer attacks, it is essential to build efficient intrusion detection mechanisms. The definitions of the main concepts related to this domain are given in what it follows, see for example [8, 13]. Definition 5. Intrusion detection technology is a technol- ogy designed to monitor computer activities for the purpose of finding security violations. Definition 6. Intrusion detection system (IDS) is a sys- tem that implements intrusion detection technology. Definition 7. A security violation of a system is any de- liberate activity that is not wanted including denial of ser- vice attacks, port scans, gaining of system administrator access and exploiting system security holes. IPS is able to detect and prevent attacks but it has not deeper detection capabilities of IDS. Neither of Intru- sion Detecting System and Intrusion Prevention System is capable to provide in depth security. Intrusion Detect- ing and Prevention System (IDPS), a combinations of IDS and IPS, is a more effective system capable of detection and prevention [22]. Based on the placement, the IDPS is divided into four classes as follows: 1. a network-based system, which is able to monitor traffic of network or its particular segment and iden- tify different network attacks. An example of network-based system is Snort [14]. Snort is an open source network intrusion prevention and detection system - nowadays a standard for IPS - that combines the benefits of signature, protocol and anomaly-based inspection. A number of problems associated with Network-based system according to [17] are: -- they cannot fully detect novel attacks; -- variations of known attacks are not fully de- tected; -- they generate a large amount of alerts, as well as a large number of false alerts; -- the existing IDS is focus on low-level attacks or anomalies and do not identify logical steps or strategies behind these attacks. 2. host-based systems describe the class of software able to monitor a single system, analyse characteristics and log to at one host. These systems are deployed on critical hosts. 3. wireless-based systems analyse wireless traffic to mon- itor intrusion or any suspicious activity. They scan traffic but are not able to identify attack in the ap- plication layer or higher layer network protocols as UDP and TCP. It may be deployed at the point where unauthorized wireless network could be ac- cessed. 4. behavior-based systems are used for examining net- work traffic in order to identify attacks (e.g. Denial of Service attacks). These systems are deployed to monitor flow of network or flow between internal and external network. 3.2. Artificial Intelligence in Intrusion Detection System The current paper deals with an artificial intelligent approach for intrusion detections. A short review of the main AI techniques already used and their benefits for detecting intrusion in network systems follows. 2 According to Beg et al. [3], the intrusion detection classical algorithms have the following disadvantages: false alarm rate and constant updates of database with new sig- natures. The network administrator responds to alarms and updates the signatures that increases in time. For example, in the already mentioned Snort signatures in- creased from 1500 to 2800 over two years [14]. In order to improve the administrator work, reducing the number of false alarms and better intrusion detection are intro- duced artificial intelligence mechanisms [23]. Some of AI techniques used in intrusion detection are data mining, genetic algorithm, neural network, multi-agents, ant-net miner, etc. Lee et al. [15] introduced a data mining classification mechanism with association rules from the audit data - knowledge present in a knowledge base - providing gaudi- ness for data gathering and feature selection. In order to detect abnormal behavior one can use genetic algorithms, see for example [1]. In [18], neural networks use back prop- agation MLP for a small network in order to detect anoma- lies and identify user profiles after end of each log session. It shall also be remarked that several of the leading methods for detecting intrusions and detecting intrusions are hybrid artificial approaches, which combine different AI solution techniques [9, 16, 25]. Some hybrid meth- ods used in the literature are data mining and fuzzy logic techniques [16], data mining and genetic algorithm select- ing the best rules for the system [9]. In the future could be implemented hybrid models involving intelligent evolu- tionary agents [12] and dynamic decision boundary using Support Vector Machine [24] for handle a large number of features. Banerjee et al. [2] introduced an intrusion detection based on emotional ants for sensors (IDEAS), which could keep track of the intruder trials. This technique is able to work in conjunction with the conventional machine learn- ing based intrusion detection techniques to secure the sen- sor networks. 4. Hybrid Sensitive Robot Metaheuristic for In- trusion Detection In this section we introduce a new hybrid metaheuristic in order to detect the intruders in a sensor network. The new model is called Hybrid Sensitive Robot Metaheuristic for Intrusion Detection (HSRM-ID), is based on Sensitive Robot Metaheuristic (SRM) introduced in [19] and uses a specific rule in order to generate a state of thinking or the choice of an intruder [2]. The proposed (HSRM) can be modelled using two dis- tinct groups of sensitive stigmergic robots. The first group of robots-agents is endowed with small sensitive values SSL and they are sensitive-explorers (sSSL: small SSL-robots). They can sustain diversification in intruders searching. In the second group are the robots-agents with high sensi- tive stigmergic values (hSSL: high SSL-robots). They are sensitive-exploiters and could exploit intensively the re- gions already identified with attacks from intruders. In time, based on the experience of robots-agents, the sensi- tive stigmergic level SSL can increase or decrease. The pseudo-code description of the Hybrid Sensitive Robot Metaheuristic for Intrusion Detection is described in what it follows. Algorithm 1 Hybrid Sensitive Robot Algorithm for In- trusion Detection Set parameters; initialize stigmergic values of the trails; for k=1 to m do Place robot k on a randomly chosen node of a sensor network; for i=1 to Niter do Each robot incrementally builds a solution based on the autonomous search sensitivity; The sSSL robots choose the next node based on the attack probability (1); A hSSL-robot uses the information supplied by the sSSL robots to chose the new node (2); Apply a local stigmergic updating rule (3); Apply the rule generating a state of thinking or the choice of an intruder (4): A global updating rule is applied (5); Validate the path and detect intruder; end for end for The stigmergic value of an edge is τ and the visibility value is η. A tabu list with the already visited nodes is maintained, see [10] for more details. In order to divide the colony of m robots in two groups it is used a random variable uniformly distributed over [0, 1]. Let q be a realization of this random variable and q0 a constant 0 ≤ q0 ≤ 1. If the inequality q > q0 stands the robots are endowed with small sensitive stigmergic value sSSL robots and otherwise they are highly sensitive stig- mergic robots (hSSL). A hSSL-robot uses the information supplied by the sSSL robots. In order to define the rule to generate a state of think- ing or the choice of an intruder we use the same notations as in Banerjee et al. [2]: • A(I, s, t) denotes the tendency of an intruder I to be assigned to the sensor node s at moment t. • I1(intruder1) C(I, s, t) is the potential to generate the state of choice to a particular path in the network sensor graph. • I C(I, s, t) is the intensity of the attack, • f C(.) is a function specific of the thinking of in- truder • T c(I, t) is the threshold value. The new hybrid model (HSRM-ID) for identifying the affected path of a sensor network graph is described fur- ther. 3 • Initially the SSL robots are placed randomly in the network space. The parameters of the algorithm are initialized. • A SSL robot chooses the next move with a proba- bility based on the distance to the candidate node and the stigmergic intensity on the connecting edge. In order to stop the stigmergic intensity increasing unbounded each time unit evaporation takes place. • Let i be the current node. The next node is chosen probabilistically. Let J k i be the unvisited successors of node i by robot k and u ∈ J k i. As in Ant Colony System technique [10] the probability of choosing the next node u, possible to be attacked, is shown in (1). pk iu(t) = [τiu(t)][ηiu(t)]β Σo∈J k i[τio(t)][ηio(t)]β , (1) where β is a positive parameter, τiu(t) is the stigmer- gic intensity and ηiu(t) is the inverse of the distance on edge (i, u) at moment t. • The new node j is choose by hSSL robots using (2): j = argmaxu∈J k i {τiu(t)[ηiu(t)]β}, (2) where β determines the relative importance of stig- mergy versus heuristic information. • Update trail stigmergic intensity by local stigmergic rule (3): τij (t + 1) = q2 0τij (t) + (1 − q0)2 · τ0. (3) where (i, j) are the edges belonging to the most suc- cessful traversing across sensor nodes. • Equation (4) illustrates the rule to generate a state of thinking or the choice of an intruder [2]. If I C(I, s, t) = I C(I, s, t) − T C(I, t) then l C(l, s, t) > I C(l, t) else I C(I, s, t) = 0. (4) • A global updating rule is applied [2] as in (5) and is used a tabu list where to store the track and edge details. τij(t + 1) = q2 0τij (t) + (1 − q0)2 · k Xj=1 ∆sj τij(t), (5) where ∆sjtij = (cid:26) f (sj) 0 if sj contributes to τij otherwise (6) and where q0 is the evaporation rate, ∆sjτij is the combination of a solution sj with the update for pheromone value τ ij; f (sj) is the function specific to the thinking of the intruder and k is the number of solution used for updating the pheromones. 4 Table 1: Analyze the action of agents-robots based on the pheromone level on the edges of the sensor network graph. Agents Intruders Pheromone Detecting intrusion searching Level Action Type type sSSL robots explorers hSSL robots exploiters low high low high no continue to explore possibly intruders the attack is not certified notify hSSL robots update pheromone trails attack is highly present identify affected path • Update the intensity of attack value I C(I, s, t) through validating the path and detect intruder. The output of the algorithm is the most affected path of a sensor network with n nodes. Termination criteria is given by the number of iterations, denoted by Niter. The complexity of the proposed algorithm is O(n2 · m · Niter). 5. The analyze of the new concept In the following is performed an analyze of the Hybrid Sensitive Robot Algorithm for Intrusion Detection. The artificial pheromone from the edges of the sensor network graph reveals as the attacked zone within the network. Each bio-inspired robot uses his one specific properties as his level of sensitivity in order to detect the intruders and the artificial stigmergy in order to find the attacked edges. Table 1 illustrates the behavior of different groups of sensi- tive bio-inspired virtual robots when investigate the sensor network in search of intrusion. As a concept, the intro- duced model Hybrid Sensitive Robot Algorithm for Intru- sion Detection has more chances to improve the intrusion detection systems comparing with the existing approaches from the literature, due to the sensitivity property of the bio-inspired robots. As well the diversity of robots groups implies also different values of virtual pheromone trail val- ues. The robots with small stigmergic value are constantly sustaining diversification in intruders searching and as a complementary action, the robots with high sensitive stig- mergic values are testing the already identified networks attacked regions. In the future we will perform numeri- cal experiments to assess the performance of the proposed algorithm. [15] W. Lee, S. Stolfo and K. Mok. Mining audit data to build intru- sion detection models. Knowledge Discovery and Data Mining, New York, AAAI Press, 66 -- 72 (1998) [16] J. Luo. Integrating Fuzzy Logic and Data Mining Methods for Intrusion detection. Master thesis, Mississippi State University, 1999. [17] S. Northcutt. Network Intrusion Detection. New Riders Pub- lishers, 2002. [18] J. Ryan, M-J. Lin and R. Miikkulainen. Intrusion Detection with Neural Networks. Advances in Neural Information Pro- cessing Systems 10, MIT Press, 1998. [19] C-M. Pintea, C. Chira, D. Dumitrescu and P.C. Pop. A sen- sitive metaheuristic for solving a large optimization problem. SOFSEM 2008, LNCS 4910, 551 -- 559, 2008. [20] C-M. Pintea, C. Chira and D. Dumitrescu. Sensitive ants: In- ducing diversity in colony. NICSO 2008, Studies in Computa- tional Intelligence, 236:15 -- 24, 2009. [21] C-M. Pintea. Combinatorial optimization with bio-inspired computing. PhD Thesis, Babes-Bolyai University, EduSoft Pub- lisher, 2010. [22] K. Scarfone and P. Mell. tection http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf Prevention and Guide Systems to Intrusion De- 2007). (IDPS), [23] S. Selvakani and R. S. Rajes. Genetic algorithm for forming rules for intrusion detection. Int. J. of Computer Science and Network Security 7(11):285 -- 290, 2007. [24] R. Stoean, M. Preuss, C. Stoean, E. El-Darzi and D. Du- mitrescu. Support Vector Machine Learning with an Evolution- ary Engine. J. Operational Research Society 60(8):1116 -- 1122, 2009. [25] J. T. Yao, S. L. Zhao and L. V. Saxton. A study on fuzzy intrusion detection, SPIE, Data Mining, Intrusion Detection. Information Assurance and Data Networks Security, 5812:23 -- 30, 2005. [26] T. White. Expert Assessment Report http://www.scs.carleton.ca/~arpwhite/stigmergy-report.pdf the Department for of Stigmergy. A of National Defence. 6. Conclusions Nowadays the networks are threatened by security at- tacks and resource limitations. In order to deal with this security network problem efficient intruders detection and prevention systems are used. Within this paper we in- troduce a new concept Hybrid Sensitive Robot Algorithm for Intrusion Detection based on bio-inspired robots. It is used a qualitative stigmergic mechanism, each robot is endowed with a stigmergic sensitivity level facilitating the exploration and exploitation of the search space. In the future some computational tests will be proposed and fur- ther hybrid AI techniques will be involved for securing the networks. Acknowledgement. This research is supported by Grant PN II TE 113/2011, New hybrid metaheuristics for solving complex network design problems, funded by CNCS Romania. References [1] L. Alhazzaa. Intrusion Detection Systems using Genetic Algo- rithms. 2007. [2] S. Banerjee, C. Grosan and A. Abraham. IDEAS: Intrusion De- tection based on Emotional Ants for Sensors. Intelligent Sys- tems Design and Applications. IEEE C.S. 344 -- 349, 2005. [3] S. Beg, U. Naru, M. Ashraf and S. Mohsin. Feasibility of Intru- sion Detection System with High Performance Computing: A Survey. Int. J. for Advances in Computer Science. 1(1):26 -- 35, 2010. [4] E. Bonabeau, M. Dorigo and G. Tehraulaz. Swarm intelligence from natural to artificial systems. Oxford, UK: Oxford Univ. Press, 1999. [5] C. Chira, C-M. Pintea and D. Dumitrescu. Sensitive stigmergic agent systems: a hybrid approach to combinatorial optimiza- tion. Innovations in Hybrid Intelligent Systems, Advances in Soft Computing, 44:33 -- 39, 2008. [6] C. Chira, C-M. Pintea and D. Dumitrescu. Cooperative learning sensitive agent system for combinatorial optimization. NICSO 2007, Studies in Computational Intelligence, 129:347 -- 355, 2008. [7] C. Chira, D. Dumitrescu and C-M. Pintea. Learning sensitive stigmergic agents for solving complex problems. Computing and Informatics, 29(3):337 -- 356, 2010. [8] T. Crothers. Implementing Intrusion Detection Systems, Wiley, 2003. [9] Y. Dhanalakshmi and I. R. Babu. Intrusion detection using data mining along fuzzy logic and genetic algorithms. Int. J. of Com- puter Science and Network Security, 8(2):27 -- 32, 2008. [10] M. Dorigo and L. M. Gambardella. Ant Colony System:A coop- erative learning approach to the Traveling Salesman Problem. IEEE Trans.Evol.Comp. 1:53 -- 66, 1997. [11] Grass´e, P.-P. La Reconstruction du Nid et Les Coordinations In- terindividuelles Chez Bellicositermes Natalensis et Cubitermes. Insect Soc. 6:41 -- 80, 1959. [12] B. Iantovics and C. Enachescu. Intelligent Complex Evolution- ary Agent-based Systems. Development of Intelligent and Com- plex Systems. AIP, 116-124, 2009. [13] N. Ierace, C. Urrutia and R. Bassett. Intrusion Prevention Sys- tems. Ubiquity, ACM, 2 -- 2, 2005. [14] Kim, B., Yoon, S., Oh, J. Multi-hash based Pattern Matching Mechanism for High-Performance Intrusion Detection. Int. J. of Computers 1(3):115 -- 124, 2009. 5
1511.07349
1
1511
2015-11-23T18:17:05
MOS-2: A Two-Dimension Space for Positioning MAS Organizational Models
[ "cs.MA" ]
The increased complexity and dynamism of present and future Multi-Agent Systems (MAS) enforce the need for considering both of their static (design-time) and the dynamic (run-time) aspects. A type of balance between the two aspects can definitely give better results related to system stability and adaptivity. MAS organization is the research area that is concerned with these issues and it is currently a very active and interesting research area. Designing a MAS with an initial organization and giving it the ability to dynamically reorganize to adapt the dynamic changes of its unpredictable and uncertain environment, is the feasible way to survive and to run effectively. Normally, MAS organization is tackled by what is called, MAS organizational models, which are concerned with the description (formally or informally) of the structural and dynamical aspects of agent organizations. This paper proposes a two-dimension space, called MOS-2, for positioning and assessing MAS organizational models based on two dimensions: their adopted engineering viewpoint (agent-centered or organization-centered) as the vertical dimension and the agents awareness/unawareness of the existence of the organizational level as the horizontal dimension. The MOS-2 space is applied for positioning a number of familiar organizational models. Its future trends and possible improvements are highlighted. They include the following, (1) adding Time as a dimension, (2) increasing the considered dimensions, (3) providing a quantitative approach for positioning MAS organizational models.
cs.MA
cs
MOS-2: A Two-Dimension Space for Positioning MAS Organizational Models 1 Department of Electrical Engineering, Assiut University, Assiut, Egypt, 2 Department of Computer Engineering, Cairo University, Giza, Egypt, 1* Hosny Abbas 2 , Samir Shaheen Email: [email protected] Email: [email protected] Abstract- The increased complexity and dynamism of present and future Multi-Agent Systems (MAS) enforce the need for considering both of their static (design-time) and the dynamic (run-time) aspects. A type of balance between the two aspects can definitely give better results related to system stability and adaptivity. MAS organization is the research area that is concerned with these issues and it is currently a very active and interesting research area. Designing a MAS with an initial organization and giving it the ability to dynamically reorganize to adapt the dynamic changes of its unpredictable and uncertain environment, is the feasible way to survive and to run effectively. Normally, MAS organization is tackled by what is called, MAS organizational models, which are concerned with the description (formally or informally) of the structural and dynamical aspects of agent organizations. This paper proposes a two-dimension space, called MOS-2, for positioning and assessing MAS organizational models based on two dimensions: their adopted engineering viewpoint (agent-centered or organization-centered) as the vertical dimension and the agents awareness/unawareness of the existence of the organizational level as the horizontal dimension. The MOS-2 space is applied for positioning a number of familiar organizational models. Its future trends and possible improvements are highlighted. They include the following, (1) adding Time as a dimension, (2) increasing the considered dimensions, (3) providing a quantitative approach for positioning MAS organizational models. Keywords - multi-agent systems (MAS), MAS organization, dynamic reorganization, organizational models, stability, adaptivity 1. INTRODUCTION In contrast to initial MAS research, which concerned individual agents’ aspects such as agents’ architectures, agents’ mental capabilities, behaviors, etc, the current research trend of MAS is actively interested in the adaptivity, environment, openness and the dynamics of these systems. In open environments, agents must be able to adapt towards the most appropriate organizations according to the state of the environment, which changes in an unpredictable manner. MAS organization [1] is currently considered as an emergent area of MAS research that relies on the notion of openness and heterogeneity of MAS and imposes new demands on traditional MAS models [2]. Considering MAS with no real structure isn’t suitable for handling current software systems complexity, and higher order abstractions should be used and some way of structuring the society is typically needed to reduce system complexity, to increase system efficiency, and to more accurately model the problem being tackled [3]. Horling et al. [4] stated that our real world getting more complex and highly distributed and that should be reflected in new software engineering paradigms such as MAS. Therefore, the adoption of higher order abstract concepts like organizations, societies, communities, and groups of agents can reduce complexity, increase efficiency, and improve system scalability. Shehory [5] defined MAS organization as the way in which multiple agents are organized to form a multi-agent system. The relationships and interactions among the agents and specific roles of agents within the organizations are the focus of MAS organization. Dignum [26] pointed out that MAS organization can be understood from two perspectives, (1) organization as a process, and (2) organization as an entity. The first perspective considers agents organization as the process of organizing a set of individual agents, thus in this sense it is used to refer to constraints (structures, norms and patterns) found in a social context that shape the actions and interactions of agents. On the other hand, the second perspective considers agents organization as an entity in itself, with its own requirements and objectives and is represented by (but not identical to) a group of agents. In fact, MAS organization demands the integration of both perspectives and relies for a great extent on the notion of openness and heterogeneity of MAS. There are two familiar viewpoints of MAS engineering, the first one is the agent-centered MAS (ACMAS) in which the focus is given to individual agents. With this viewpoint, the designer concerns the local behaviors of agents and also their interactions without concerning the global structure of the system. The global required function of the system is supposed to emerge as a result of the lower level individual agents interactions. The agent-centered approach takes the agents as the “engine” for the system organization, and agent organizations implicitly exist as observable emergent phenomena, which states a unified bottom-up and objective global view of the pattern of cooperation between agents [6]. Ant colony [7] is a natural example of the ACMAS viewpoint, where there is no organizational behavior and constraints are explicitly and directly defined inside the ants. The main idea is that the organization is the result of the collective emergent behavior due to how agents act their individual behaviors and interact in a common shared and dynamic environment. In ACMAS, the MAS organization is actually a process not an entity; there is a consensus to call this process as self-organization [28][29][30]. The second viewpoint of MAS engineering is what is called organization-centered MAS (OCMAS) in which the structure of the system is given a bigger attention through the explicit abstraction of agent organizations. With that approach, the designer designs the entire organization and coordination patterns on the one hand, and the agents’ local behaviors on the other hand. It is considered as a top-down approach because the organization abstraction imposes some rules or norms used by agents to coordinate their local behaviors and interactions with other agents. In OCMAS, the MAS organization is actually an explicit entity not a process and to distinguish it from the ACMAS approach, the change in system organization is often called dynamic reorganization [6][24], which is a more general name than self-organization. When a researcher proposes an approach to dynamically reorganize a multi-agent system to adapt environments’ changes, he actually proposes what the MAS community agreed to call it as an organizational model [19]. MAS organizational models will play a critical role in the development of future larger and more complex MAS. The main concern of organizational models is to describe the structural and dynamical aspects of organizations [8]. They have proven to be a useful tool for the analysis and design of multi-agent systems. Furthermore, they provide a framework to manage and engineer agent organizations, dynamic reorganization, self- organization, emergence, and autonomy within MAS. Picard et al. [6] added the agents’ awareness /unawareness of the existence of the organization structure as a dimension of the organization modification process and he identified four cases, (1) the agents don’t represent the organization, although the observer can see an emergent organization. In some sense, they are unaware that they are part of an organization, (2) each agent has an internal and local representation of cooperation patterns which it follows when deciding what to do, this local representation is obtained either by perception, communication or explicit reasoning, (3) the organization exists as a specified and formalized schema, made by a designer but agents don’t know anything about it and even do not reason about it. They simply comply with it as if the organizational constraints were hard-coded inside them, (4) agents have an explicit representation of the organization which has been defined, the agents are able to reason about it and to use it in order to initiate cooperation with other agents in the system. In this paper, we propose a two-dimension space inspired from a previous work of Picard et al. [6], for positioning and comparing MAS organizational models. The proposed space is similar to a two-dimension Cartesian coordinate system, where the ACMAS/OCMAS are represented by the vertical axis and the agents’ awareness/unawareness of the existence of the organizational level are represented by the horizontal axis as shown in Figure 1. A MAS organizational model is represented as a point (small circle) or an area (oval) as demonstrated in the figure and as will be explained later. A number of familiar organizational models are positioned and compared using the proposed MAS organization space; called MOS-2, where MOS stands for MAS Organization Space and the number 2 indicates that the space is a two dimension space. Figure 1: The MOS-2 MAS Organization Space The central circle shown in the MOS-2 space can be seen as the unity circle (its radius is one). By this way it will be possible to precisely position an organizational model by determining the extent (i.e., percentage) to which it is an ACMAS or OCMAS approach and also the extent to which the individual agents are aware or unaware about the organizational aspects. In other words, the MOS-2 space can be used quantitatively not just qualitatively; this point is left as a future work but will be highlighted later in this paper. Furthermore, in the proposed space, the number of dimensions is two (Aware/Unaware, ACMAS/OCMAS), but it is also possible to increase the considered dimensions by adding new comparison aspects to address a fine-grained classes of MAS organizational models. In case the number of the considered comparison aspects (dimensions) is increased to be N, then the resultant space will be an N dimension space and can be called, MOS-N. Actually, this paper proposes only the two dimension case (MOS-2); other versions of higher dimensions are left as a future work. The remaining of this paper is organized as follows: Section 2 explores the related work. Section 3 provides a background related to the two adopted comparison aspects. Section 4 presents the proposed MOS-2 space for positioning MAS organizational models. Section 5 demonstrates the applicability of MOS-2 on a number of familiar MAS organizational models and approaches. Section 6 MAS organization was and still a very active and interesting research point in MAS. Concepts like organization, dynamic reorganization, self-organization, and emergence have attracted great attention in the last few years. The reason is related to the increasing complexity and highly distribution of modern real-life applications. This paper is not aimed to explain in details these concepts but interested readers can inspect their related references, for example [22][23][24][25][26][7][27]. The goal of this paper is to propose a visual semi-formal method for positioning and comparing a broad band of MAS organizational models. Organizational models are the tools to design methods, techniques, and approaches for managing the static and dynamic organization of MAS. Many researchers provided valuable narrative surveys and reviews contain informal analysis and evaluation of MAS organizational models. For instance, Picard et al. [6] aimed to study and propose a comprehensive view of how one could make multi-agent organizations adapted to dynamics, openness and large-scale environment. The authors proposed an analysis grid of different MAS organization approaches. The proposed grid has two dimensions: the vertical dimension identifies if the considered organization approach adopts the ACMAS, OCMAS, viewpoints. The second dimension is concerned with the awareness/unawareness of the individual agents of the organizational aspects. The authors claimed that the two dimensions of their grid are continuous, and it is completely possible to identify approaches that are at the boundary of two categories. Our propose work is inspired from Picard et al. work but in a more formal, visual and interesting way. Alberola [18] provided, as a part of her PhD thesis, an analysis of how current reorganization approaches in MAS provide support to agent designers in order to develop adaptive agent societies. She described in detail some of the most relevant existing approaches, in order to show the advantages and limitations of each one. Alberola suggested that reorganization in agent societies can be represented as a loop process composed by different phases: Monitor, Design, Selection, and Evaluation phases. She also studied a number of familiar MAS organizational models by identifying the techniques adopted in each phase for each organizational model. Alberola study is valuable and it benefits us a lot but it is informal and contains intensive information and that makes it difficult to be captured by students and beginners. V. Dignum [19] edited a handbook of research in MAS aimed to provide an overview of current work in agent organizations, from several perspectives, and focus on different aspects of the organizational spectrum. The handbook explored a number of familiar MAS organizational models and what makes it interesting is that the authors of the selected models wrote themselves the chapter that tackled their model. From the other hand, the handbook did not provide a general comparison or any type of positioning of the considered models. Jensen et al. [20] investigated the agent-centered and organization-centered approaches to designing and implementing multi- agent systems. The authors have developed and evaluated two teams of agents for a variant of the well-known Bomberman computer game. One team is based on the basic Jason system, which is an implementation in Java of an extension of the logic-based agent- oriented programming language AgentSpeak. The other team is based on the organizational model Moise+, which is combined with Jason in the middleware called J-Moise+. They concluded that the agent-criented approach has a number of advantages when it comes to game-like scenarios with just a few different character types. Horling and Lesser [21] also stated that organizational design employed by an agent system can have a significant, quantitative effect on its performance characteristics, and they surveyed the major organizational paradigms used in multi-agent systems. These include hierarchies, holarchies, coalitions, teams, congregations, societies, federations, markets, and matrix organizations. Also, they provided a description of each paradigm, and discuss its advantages and disadvantages, further, they provided examples of how each organization paradigm may be instantiated and maintained. But their work was not targeted to organizational models, which concerns both of static and dynamic aspects; they just concerned how to structure MAS with different paradigms. In nutshell, the related work was valuable for us in designing the MOS-2 space for positioning MAS organizational models and approaches in a visual, semi-formal, easy to understand way. Providing a 2-dimension space for identifying an organizational model features and limitations in the scope of two or more dimensions is a good idea. It provides an effective tool to compare visually an organizational model with other models. This way enables designers and beginners to quickly capture a certain model in their minds and allows them to remember easily the considered model and its features or limitations relative to other models. 3. BACKGROUND discuss the results and provides a complete view based on these results. Section 7 highlights the possible future trends. Finally, Section 8 concludes this paper. 2. RELATED WORK This paper is not concerned with the promotion of one MAS engineering viewpoint (ACMAS or OCMAS) relative to the other one, but the main concern is to position MAS organizational models and show the extent to which a certain model benefits from the adoption of each of these viewpoints. We have to emphasize here that both of the MAS engineering viewpoints (ACMAS/OCMAS) are generally not mutually exclusive and have led to different approaches in the domain [6]. In other words, it is possible to mix both viewpoints in one organizational model to take benefit of their pros and avoid their cons. Table 2 provides a comparison between the two viewpoints by presenting the characteristics and the shortcomings of each one. Also, Figure 2 provides the advantages and disadvantages of the adoption of each viewpoint relative to the individual agents’ awareness or unawareness of the higher level organizational aspects. Figure 2 represents the basis of the proposed two-dimension space as it orthogonally aligns the two comparison aspects into a vertical (ACMAS/OCMAS) and a horizontal (Awareness/Unawareness) axes. As demonstrated in the figure, four quadrants are resulted: ACMAS-Awareness, ACMAS-Unawareness, OCMAS-Unawareness, and OCMAS-Awareness. Therefore, a MAS organizational model that is positioned in one of these quadrants will simultaneously benefit and suffer from the advantages and disadvantages of this quadrant respectively. Note also that, an organizational model can be positioned into more than one quadrant. Table 1: Comparison between the ACMAS and OCMAS viewpoints Shortcomings • Unpredictability and Uncertainty: lead to unreliability • Lack of Modularity: all agents are accessible from everywhere • Undesirable Emergent Behavior: can impact system performance • Dual Responsibility: agents have to manage simultaneously both the functional an the organizational aspects • Computational / Communication • Reduce overall flexibility or overhead reactivity • Add additional layer of complexity ACMAS OCMAS Characteristics • Organization is a process (self- organization) • Informal/Bottom- up/Emergent/Endogenous • The focus is given to individual agents • Agents are the “engine” for the system • An agent may communicate with any other organization agent • An agent is responsible to define its relations with other agents • An agent is responsible to constrain its accessibility from other agents • Agents are autonomous and no constraint is placed on the way they interact • An agent provides a set of services available to other agents • Organization is often an explicit entity • Support dynamic reorganization • Formal/ To-down/ Pre-exist organization • Reduce system complexity • Increase system efficiency • Improve system scalability • Provide Effective coordination • Limit the scope of interactions • Tuning of the agents autonomy • Structuring of agents interactions • Separation of concerns • Modularity/Reliability 4. THE PROPOSED MOS-2 SPACE Figure 3 presents the proposed MOS-2 space. As shown in the figure, the axes of a two-dimensional Cartesian system divide the space into four infinite regions, called quadrants, each bounded by two half-axes. In mathematics, these are often numbered from 1st to 4th and denoted by Roman numerals, lets take the same naming conversion, and thus the four quadrants can be identified as follows: 1. The I symbol identifies the ACMAS-Aware space quadrant 2. The II symbol identifies the ACMAS-Unaware space quadrant 3. The III symbol identifies the OCMAS-Unaware space quadrant 4. The IV symbol identifies the OCMAS-Aware space quadrant Figure 2: Advantages and Disadvantages of MOS-2 Quadrants Therefore, to position a MAS organizational model it should be studied and explored to see to which quadrant in the MOS-2 space it is best fit according to its characteristics and properties. If the considered model fits one of MOS-2 quadrants, then its position will be represented by a small circle as shown in Figure 4-a. But, if the model fits two quadrants, then its position is represented by a small oval shape expanded along the two space quadrants as demonstrated in Figure 4-b. Note that the oval part appeared in each quadrant should be relative to the extent to which the model realizes the characterizes of the MAS organization class represented by that quadrant. If the considered model realizes (partially or fully) the characteristics of three space quadrants then the position of this model can be represented as a half-circle expanded along the three space quadrants as shown in Figure 4-c. Finally, in case the considered model fits the whole space (it is rare but possible) then a circle expanded along the four space quadrants can be used to represent that perfect organizational model!, this case is demonstrated in Figure 4-d. Note also that the MOS-2 space can be enlarged to position simultaneously many organizational models. The next section applies the proposed space for positioning a number of familiar MAS organizational models. Figure 3: The MOS-2 space with the characteristics of each organization class Figure 4: positioning of different types of organizational models 5. THE APPLICABILITY OF MOS-2 SPACE: CASE STUDIES This section applies the MOS-2 space to position and compare a number of familiar MAS organizational models. The selected models are: AGR, MACODO, MOISE, Swarm-based approaches, Contract Net coordination model, and Gaia development methodology. Actually, there are a large number of MAS organizational models and approaches but we found that the selected ones are enough to demonstrate the usage of the proposed space and we leave to the reader the mission of trying to position any other model found in the literature or proposed by him. AGR The AGR [8][9] is a MAS organizational model that adopts the OCMAS viewpoint. This model is influenced by both AOSE and social reasoning, in the sense that organization is used by designer to specify the system-to-be and by the agents that can dynamically perform organizational acts and possibly modify the organization. The designer uses abstract concepts such as Group Structure and Organizational Structure to specify application in design-time. The group structure is an abstract representation of the roles required in this group and their interaction relationships and protocols. The organization structure is the set of group structures expressing the design of a multi-agent organizational scheme. In run-time, the agents can reason on the organizational aspects and can modify the application structure by the dynamic creation of agents groups (agents partitioning) and dynamic forming of hierarchies of groups. Therefore, the AGR model fits well with the III and IV quadrants of MOS-2 space and can be positioned as shown in Figure 5-a. Figure 5: Positioning of AGR and MACODO organizational models MACODO The MACODO [10][11] is a MAS organizational model that is really an interesting model because it tries to realize (although partially) both of the MAS engineering viewpoints: ACMAS and OCMAS. It, to a large extent, belongs to the OCMAS philosophy, which provides an explicit representation of agent organizations. Although it provides a formal predefined specification for system dynamic reorganization, it allows the agents to (according to the environment context) form a type of short-lived coalitions by presenting a cooperative behavior with each other. The agents’ cooperative behavior is supervised and controlled by the organization controllers. The organizational model is part of an integrated approach, called MACODO (Middleware Architecture for COntext- driven Dynamic agent Organizations); in this model, the life-cycle management of dynamic organizations is separated from the agents, organizations are first-class citizens, and their dynamics are governed by laws. We see that, the MACODO organizational model is best fit with two space quadrants, IV and I of the MOS-2 space, as presented in Figure 5-b. MOISE Hannoun et al. [12] proposed MOISE (Model of Organization for multI-agent SystEms); for modeling organizational aspects of MAS. The MOISE model is aimed at providing support in order to adapt an agent organization to its environment and to help it to efficiently achieve its goals. This model defines an organization which is composed by agents, roles, missions, and the deontic dimension. Each role represents a set of constraints that an agent follows when it plays this role. These constraints represent the structure dimension (relations between roles) and the functional dimension (missions, deontic dimension). A mission is a set of coherent goals that an agent can commit to. The deontic dimension specifies the permissions and obligations of a role in a mission. MOISE adopts a proactive reorganization carried out in a distributed way by monitor agents. The logic for reorganization is implemented at design time and cannot be changed during runtime. But the agents can modify the MAS organization according to the predefined logic. For example, the agents can change their roles or give a new obligation; a new role can be added to the system, etc. We see the MOISE model similar to the AGR model and can be positioned in the same way through quadrants III and IV of the MOS-2 space, as shown in Figure 6-a. Figure 6: Positioning of MOISE and Swarm-based organizational models Swarm-Based Approaches The swarm-based approaches adopt the ACMAS viewpoint where the agents are unaware of any higher level structure. The system organization is dynamic and informal, it is an emergent phenomena appears to the observer in the higher level as a result of the individual agents lower level interactions directly (in a peer to peer fashion) or indirectly (through environment). In this type of agent systems, the designer concerns only the individuals and the environments, and he doesn’t give any attention to the global organizational level. When the designer develops an individual agent he put in his mind the application domain and its environment only. In these systems, the individuals are purely reactive that simply react to environment changes. The ant colony [13] represents a realistic natural example of these systems. In the ant colony there is no organizational behavior and constraints are explicitly and directly defined inside the ants. The main idea is that the organization is the result of the collective emergent behavior due to how agents act their individual behaviors and interact in a common shared and dynamic environment. This class of systems represents the pure ACMAS viewpoint, which is located in the II quadrant in the MOS-2 space, as shown in Figure 6-b. Contract Net Contract Net Protocol (CNP) [14] is a task-sharing protocol in multi-agent systems, consisting of a collection of nodes or software agents that form a purposeful coalition. The agents are pre-augmented by the designer with some social rules, interaction models, and dependency models to be able to participate in purposeful coalitions. The organization is implicit and depends on the situation faced by the agents. The agents may be not able to reason about the global system organization, but they just follow the predefined social rules. The CNP model is best fit with the I-quadrant in the MOS-2 space, and can be represented by a small circle as shown in Figure 7-a. Figure 7: Positioning of Contract Net and Gaia organizational models GAIA The Gaia [15] is an agent-oriented software engineering methodology (AOSE) [16]; it considers the system organization at the design- time. Organizations are specified before encoding the agents. Agents can reason on the organization at run-time but cannot be able of modifying it. In other words, In MAS that are modeled by the Gaia methodology, the system structure is defined in design-time and doesn’t change in run-time (fixed structure). The Gaia-based MAS can be positioned in the III quadrant in the MOS-2 space, which represents the AOSE engineering approaches, as shown in Figure 7-b. NOSHAPE The NOSHAPE MAS organizational model [17] is a recent model, although it is not matured yet, but it provides a novel approach for engineering complex and highly distributed MAS. Like the MACODO model, the NOSHAPE model tries to adopt the two MAS engineering viewpoints: the ACMAS and the OCMAS. The NOSHAPE model allows individual agents to loosely reshape the higher level system organization by emitting triggers (triggers can be seen as the pheromones released in the environment by ants in the ant colony as a type of indirect interaction). According to these triggers, the organizational level changes the system organization by establishing overlap relationships among higher order entities (agents’ organizations, organizations’ worlds, and worlds’ universes). There are no any constraints imposed on the individual agents (except for mobility). The relationship between the individual agents’ level and the organizational level is loose and depends only on the agents triggers. The organizational level can be seen as a helper or a guide to the agents. So, in the NOSHAPE model, the system structure emerges as a result of the agents triggers which are managed in a service-oriented manner, it is not possible to predict the next shape (structure) of the system, there are a pre-defined specification, and agents can modify indirectly the whole system structure by just emitting triggers. The NOSHAPE model aims to provide generality (relative to systems scale) and also aim to make the relation between the level of individual agents and the organizational level loosely coupled, so the agents can behave according to the ACMAS viewpoint (where agents are unaware of the organizational aspects) and the organizational level behaves according to the OCMAS viewpoint independently. Therefore, the NOSHAPE model can be positioned along the quadrants II, III, IV of MOS-2 space, as shown in Figure 8. Figure 8: Positioning of the NOSHAPE MAS organizational model COMPLETE VIEW All of the selected MAS organization models can be positioned and represented on one space diagram as shown in Figure 9. Based on the complete view shown in Figure 9, we can claim that the more space quadrants an organizational model visits, the more it has of features. In other words, it will possess the advantages of each space quadrants. Not only this, but also it will have the chance to match the disadvantages of one space quadrants to the advantages of another one. According to these results, we claim that the NOSHAPE model is a promising one because it visits three space quadrants. 6. FUTURE TRENDS Figure 9: Complete view of positioning MAS organizational models Increasing the considered dimensions The proposed MOS-2 space can be evolved to precisely position and compare MAS organizational models and approaches by considering the following issues: 1. Adding Time as a Dimension 2. 3. The quantitative Approach In the following subsections, these issues will be highlighted and some suggestions and ideas will be proposed to be addressed in future. Adding Time as a Dimension Based on the proposed MOS-2 space for MAS organization classification, is it possible to ask this question “can an organizational model evolves dynamically and changes to a novel emergent model”? May be it seems like a pure fantastical idea but as we all know “science is not about why? It’s about why not?” What this question means is to add a third dimension to the proposed space, it is Time, so it may seem logical to call it MOS-2T, let’s illustrate this amazing idea! Consider the organization space shown in Figure 10- a, as shown there is a model M0 positioned in the III quadrant (the AOSE quadrant), with the addition of time as a third dimension, lets denote the absolute position of a model as a tuple <P, T> where P is the observed position of the considered model on the space and T is the time where we observed the position, then: Figure 10: Dynamic evolution of organizational models At T0 the position of model M0 is <P0, T0>, we may write it like: P(M0)= <P0, T0> where P: M (cid:214) P x T where P = {P0, P1, P2, ….Pk} or the set of possible positions. And M={M0, M1,M2,….Mn} is the set of possible models (assume it is a finite set). If at time T1 the model M0 changed to a new emergent model M1 (we can say that it is evolved, ignore questions like why? When? How? At least for now) then: P(M1)= <P1, T1> And at time T2 also M1 evolved to M2 as follows P(M2)=<P2,T2> As demonstrated in Figure 10-a. Also let’s denote the organization of a MAS when the organization model M0 is active at T0 by O(M0, T0)= M0.O0 where O: M x T (cid:214) M.O where M.O={M.O0, M.O1, …, M.Om} or the set of possible organizations under the umbrella of a certain organizational model M. So with M0 is active, a dynamic organization change can happen as follows: M0.O0 (cid:198) M0.O1 That is normal and expected according to the specification of the organization model M0. But what is not normal is when the model M0 is no longer active because it evolved to a novel emergent model: M0 (cid:198) M1 As demonstrated in Figure 10-b, then it is expected to see a new organization of the system that is not planned by the designer and may violate the designer specifications, that can only happen if the agents are intelligent and have learning capabilities, so they may cause this amazing change in the organizational model as an emergent phenomena. As we see in Figure 10-b, after the dynamic emergent change of the organizational model takes place, the system organization M0.O1 relative to M0 becomes M1.O0 relative the emergent model M1, in other words M0.O1 becomes the initial organization of M1, and the new model (M1) will cause the system organization to change to a novel organization that is not planned by the designer. Dynamic evolution of pre-defined organizational models because of agents’ intelligence and their ability to learn is expected to be the next mainstream research area in MAS discipline. Increasing the Considered Dimensions The dimension of the proposed MOS-2 MAS organization space can be increased by adding other characteristics or properties of MAS organizational models. For example, a new dimension to represent the extent to which the model tackles the inter-reorganization and intra-reorganization can be added. The inter-reorganization is concerned with the organizational level interactions (i.e., interactions between groups of agents), and the intra-reorganization is concerned with individual agents interactions inside one group of agents. In this case the organization space will be a 3-dimension space as shown in Figure 11. Also in this case the name of space will be MOS-3 and if the time dimension is added, its name will be MOS-3T. The space shown in Figure 11 demonstrates how a model can be positioned in MOS-3 by considering three defined dimensions (x, y, z) correspond to classification criteria of MAS organizational models. More dimensions can be added and the more dimensions added, the more fine-grained classification of MAS organizational models can be achieved. Therefore, the general name of the proposed space can be written as MOS-NT, where N is the number of used dimensions and T is the time dimension (the T should be removed if the time dimension is not considered). Figure 11: A 3-dimension space for MAS organization The Quantitative Approach In the previous sections, we tackled MAS organizational models in a qualitative way. In fact, the qualitative positioning of MAS organizational models is largely limited by the imagination of the researcher. In the qualitative approach, the researcher depends on descriptions and observations, but sometimes it is better to provide a quantitative data based on rigorous measurements and calculations. So, it is possible to quantify the position of a MAS organizational model by finding numerically the extent to which the model realizes a certain dimension (i.e., ACMAS). Consider the MOS-2 space shown in Figure 12, what if we considered the central circle shown in the space as the unity circle, so the maximum value of a dimension is 1 and the minimum value is -1 (i.e., - ACMAS= OCMAS). Thus, when positioning a model, we should find a way to accurately calculate the extent to which the model can be considered to realize a certain dimension. Assume that there is a function V that is designed to calculate numerically the extent to which a model M is ACMAS/OCMAS. The function V can have the following signature: Figure 12: MOS-2 with a quantitative approach V: M (cid:214) [-1,1] Similarly assume that there is a function W that is designed to calculate numerically the extent to which the agents in a model M are Aware/Unaware. The function W can have the following signature: W:M (cid:214) [-1,1] Therefore the quantitative position of the model M in MOS-2 space can be determined as follows: P(M)=(V(M), W(M)) The example in Figure 12 shows that: V(M)= -0.7 and W(M)= 0.6 So the position of the model M can be written as follows: P(M) = (V(M), W(M)) = (-0.7, 0.6) The problem now is how to implement the functions V and W. The complexity of these functions will increase as the number of considered dimensions increases. Not only this but also the number of this functions will increase because each considered dimension will need a function to quantify the extent to which this dimension is realized by the MAS organizational model. Moreover, their implementation will be more complex if the time dimension is considered. This research trend is highlighted as future work. 7. CONCLUSIONS This paper proposes a new method for positioning and comparing of MAS organizational models based on a two dimension space, called MOS-2. MOS-2 uses two comparison aspects: the MAS engineering viewpoint (ACMAS/OCMAS) and the agents’ awareness/unawareness of the existence of a higher organizational level. The proposed space provides a feasible, effective, visual, and semi-formal positioning method for comparing MAS organizational methods using an orthogonal coordinate system similar to the familiar Cartesian coordinate system. The applicability of the proposed MAS organization space have been demonstrated by using it to position and compare a number of familiar and recent MAS organizational models, other models can be positioned similarly. Future trends are highlighted and discussed in Section 7. REFERENCES [1] Hosny Ahmed Abbas, Samir Ibrahim Shaheen, Mohammed Hussein Amin. Organization of Multi-Agent Systems: An Overview. International Journal of Intelligent Information Systems. Vol. 4, No. 3, 2015, pp. 46-57. doi: 10.11648/j.ijiis.20150403.11 [2] Sichman, J. S., Dignum, V., & Castelfranchi, C. (2005). Agents' organizations: a concise overview. Journal of the Brazilian [3] Jennings, N. R., & Wooldridge, M. Agent-Oriented Software Engineering. in Bradshaw, J. ed. Handbook of Agent Technology, Computer Society, 11(1), 3-8. AAAI/MIT Press, 2000. [4] Horling, B., & Lesser, V. (2004). A survey of multi-agent organizational paradigms. The Knowledge Engineering Review, 19(4), 281–316.doi:10.1017/ S0269888905000317. [5] Shehory, O. Architectural properties of multi-agent systems. Technical Report CMU-RI-TR-98-28, The Robotics Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania 15213, 1998. [6] Picard, G., Hübner, J. F., Boissier, O., & Gleizes, M. P. (2009, June). Reorganisation and self-organisation in multi-agent systems. In 1st International Workshop on Organizational Modeling, ORGMOD (pp. 66-80). [7] A. Drogoul, B. Corbara, and S. Lalande. MANTA: New experimental results on the emergence of (artificial) ant societies. In Nigel Gilbert and Rosaria Conte, editors, Artificial Societies: the Computer Simulation of Social Life, pages 119–221. UCL Press, London, 1995. [8] Ferber, J., Michel, F., & Báez, J. (2005). AGRE: Integrating environments with organizations. In Environments for multi-agent systems (pp. 48-56). Springer Berlin Heidelberg. [9] Ferber, J., & Gutknecht, O. (1998, July). A meta-model for the analysis and design of organizations in multi-agent systems. In Multi Agent Systems, 1998. Proceedings. International Conference on (pp. 128-135). IEEE. [10] Weyns, D., Haesevoets, R., & Helleboogh, A. (2010). The MACODO organization model for context-driven dynamic agent organizations. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(4), 16. [11] Weyns, D., Haesevoets, R., Helleboogh, A., Holvoet, T., & Joosen, W. (2010). The MACODO middleware for context-driven dynamic agent organizations.ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(1), 3. [12] Hannoun, M., Boissier, O., Sichman, J. S., & Sayettat, C. (2000). MOISE: An organizational model for multi-agent systems. In Advances in Artificial Intelligence (pp. 156-165). Springer Berlin Heidelberg. [13] A. Drogoul, B. Corbara, and S. Lalande. MANTA: New experimental results on the emergence of (artificial) ant societies. In Nigel Gilbert and Rosaria Conte, editors, Artificial Societies: the Computer Simulation of Social Life, pages 119–221. UCL Press, London, 1995. [14] Smith, R. G. (1980). The contract net protocol: High-level communication and control in a distributed problem solver. IEEE Transactions on computers, (12), 1104-1113. [15] Wooldridge, M., Jennings, N. R., & Kinny, D. (2000). The Gaia methodology for agent-oriented analysis and design. Autonomous Agents and Multi-Agent Systems, 3(3), 285-312. [16] Giorgini, P., & Henderson-Sellers, B. (2005). Agent-oriented methodologies: an introduction. Agent-oriented Methodologies, 1- [17] Abbas, H. A. (2014). Exploiting the Overlapping of Higher Order Entities within Multi-Agent Systems. International Journal of Agent Technologies and Systems (IJATS), 6(3), 32-57. doi:10.4018/ijats.2014070102. [18] Alberola Oltra, J. M. (2013). Reorganization in Dynamic Agent Societies (Doctoral dissertation), CH 2. [19] Dignum, V. (Ed.). (2009). Handbook of Research on Multi-Agent Systems: Semantics and Dynamics of Organizational Models: Semantics and Dynamics of Organizational Models. IGI Global. [20] Jensen, A. S., & Villadsen, J. (2013). A comparison of organization-centered and agent-centered multi-agent systems. Artificial [21] Horling, B., & Lesser, V. (2004). A survey of multi-agent organizational paradigms. The Knowledge Engineering Review, 19(4), Intelligence Research, 2(3), p59. 281–316.doi:10.1017/ S0269888905000317. 19. 30(1). [22] Giovanna Di Marzo Serugendo et al (2011), “Self-organizing Software, From Natural to Artificial Adaptation”, Springer. [23] Giovanna di Marzoserugendo et al, “Self-organization in multi-agent systems”, The Knowledge Engineering Review, Vol. 20:2, 165–189., 2005, Cambridge University Press. [24] Dignum, V., Dignum, F., & Sonenberg, L. (2004, September). Towards dynamic reorganization of agent societies. In Proceedings of Workshop on Coordination in Emergent Agent Societies at ECAI (pp. 22-27). [25] Sichman, J. S., Dignum, V., & Castelfranchi, C. (2005). Agents' organizations: a concise overview. Journal of the Brazilian [26] Dignum, V. (2009). The role of organization in agent systems. Handbook of Research on Multi-Agent Systems: Semantics and Computer Society, 11(1), 3-8. Dynamics of Organizational Models, 1-16. [27] Hosny Ahmed Abbas, Samir Ibrahim Shaheen, Mohammed Hussein Amin. Organization of Multi-Agent Systems: An Overview. International Journal of Intelligent Information Systems. Vol. 4, No. 3, 2015, pp. 46-57. doi: 10.11648/j.ijiis.20150403.11 [28] De Wolf, T., & Holvoet, T. (2005). Emergence versus self-organisation: Different concepts but promising when combined. In Engineering self-organising systems (pp. 1-15). Springer Berlin Heidelberg. [29] Serugendo, G. D. M., Irit, M. P., & Karageorgos, A. (2006). Self-organisation and emergence in MAS: An overview. Informatica, [30] Schillo, M., Fley, B., Florian, M., Hillebrandt, F., & Hinck, D. (2002, August). Self-organization in multiagent systems: from agent interaction to agent organization. In Third International Workshop on Modelling Artificial Societies and Hybrid Organisations (MASHO) (pp. 37-46).
1303.3828
1
1303
2013-03-15T16:58:00
Using Serious Games to Train Evacuation Behaviour
[ "cs.MA" ]
Emergency evacuation plans and evacuation drills are mandatory in public buildings in many countries. Their importance is considerable when it comes to guarantee safety and protection during a crisis. However, sometimes discrepancies arise between the goals of the plan and its outcomes, because people find it hard to take them very seriously, or due to the financial and time resources required. Serious games are a possible solution to tackle this problem. They have been successfully applied in different areas such as health care and education, since they can simulate an environment/task quite accurately, making them a practical alternative to real-life simulations. This paper presents a serious game developed using Unity3D to recreate a virtual fire evacuation training tool. The prototype application was deployed which allowed the validation by user testing. A sample of 30 individuals tested the evacuating scenario, having to leave the building during a fire in the shortest time possible. Results have shown that users effectively end up learning some evacuation procedures from the activity, even if only to look for emergency signs indicating the best evacuation paths. It was also evidenced that users with higher video game experience had a significantly better performance.
cs.MA
cs
Using Serious Games to Train Evacuation Behaviour João Ribeiro1, João Emílio Almeida1†, Rosaldo J. F. Rossetti1†, António Coelho1‡, António Leça Coelho2 1Department of Informatics Engineering †LIACC – Laboratory of Artificial Intelligence and Computer Science ‡INESC TEC – INESC Technology and Science Faculty of Engineering, University of Porto Rua Roberto Frias, S/N, 4200-465, Porto, Portugal {joao.pedro.ribeiro, joao.emilio.almeida, rossetti, acoelho}@fe.up.pt 2LNEC – National Laboratory of Civil Engineering Av. Brasil, 101, 1700-066, Lisboa, Portugal [email protected] immersion feeling, to make users acquire important, real-world knowledge. This software approach can be useful in order to study possible outcomes to unusual situations and the behaviour of whole populations, but do not supply much interaction; therefore, they can rapidly become uninteresting for users, instead of helping them as intended. Through the use of video games, these difficulties can be addressed and minimised. Video games by definition involve and require user interaction. They are often quite immersive due to their multimedia nature and by creating feedback through video, audio and sometimes even haptic feedback. Video games usually present some characteristics that make them an interesting resource: users stay interested in its execution, they are challenged to master some skills and their performance is evaluated. These applications have recently been used with positive results in several and distinct fields of study, what makes them an option to consider. The attitude towards them has also changed dramatically: although previously seen as a "waste of time" and "highly addictive", their use in education and training has increased in the past years. It should be noted that video games have been a major driving the development of computer in force technology. They now provide realistic scenarios, forces and interactions, and also user friendly interfaces. Besides, they run on regular home computers, greatly reducing the necessary investment in order to make use of them. In this paper we explore the concept of serious games to build a virtual fire drill simulator as an attempt to address some of the issues we have identified within real-world fire drills. It is our intention to improve the way people participate in such experiments enhancing their experience in many different ways. We have adapted and custom the environment of a game engine, in this case Unity3D, to support simulation features that enable users to be tracked and assessed while playing. The remaining of this paper is organised as follows. In Section II we briefly present some related concepts of subjects that concern this project, such as serious games, pedestrian simulation, and crowd behavioural modelling. We then discuss on applying serious games to evacuation training, in Section III, where we present and formalise our problem and propose the approach implemented in this paper. A preliminary Abstract: Emergency evacuation plans and evacuation drills are mandatory in public buildings in many countries. Their importance is considerable when it comes to guarantee safety and protection during a crisis. However, sometimes discrepancies arise between the goals of the plan and its outcomes, because people find it hard to take them very seriously, or due to the financial and time resources required. Serious games are a possible solution to tackle this problem. They have been successfully applied in different areas such as health care and education, since they can simulate an environment/task quite accurately, making them a practical alternative to real-life simulations. This paper presents a serious game developed using Unity3D to recreate a virtual fire evacuation training tool. The prototype application was deployed which allowed the validation by user testing. A sample of 30 individuals tested the evacuating scenario, having to leave the building during a fire in the shortest time possible. Results have shown that users effectively end up learning some evacuation procedures from the activity, even if only to look for emergency signs indicating the best evacuation paths. It was also evidenced that users with higher video game experience had a significantly better performance. Keywords: Evacuation simulator, fire drill, modelling and simulation, serious games I. INTRODUCTION Everyone who has gone through an emergency drill exercise has surely noticed some of its downsides. It is hard to take them seriously, to fully participate, to keep focused on the exercise and to learn all the necessary information in order to evacuate correctly. The disruption of the regular functioning of an enterprise or institution easily upsets their occupants, and so they tend to distrust these exercises. For the same reasons, and additionally due to the employees need to move away from their workstations, it is not usual for managers to accept and face fire drills very easily, who generally take this kind of exercises as a loss of time. A virtual simulation system is a possible alternative to emergency drills, and can indeed produce some useful information. To accomplish a good virtual simulation environment, it is required to provide a realistic scenario and experiment using our prototype is presented in Section IV, where some results are also discussed in Section V. We finally draw some conclusions in Section VI and suggest some further steps in this research. II. BACKGROUND Before we can go further in the explanation of our approach to create a virtual environment to aid and enhance traditional fire drills, it is important to introduce some valuable concepts and some basics of subjects that underlie the implementation of this project. A. Serious Games is an “artificially According to Hays [1], a game constructed, competitive activity with a specific goal, a set of rules and constraints that is located in a specific context.” Despite their origins being based purely with entertainment in mind, video games have been recently used to achieve other goals and objectives. Serious Games refer to video games whose application is focused on supporting activities such as education, training, health, advertising, or social change. Video games present some characteristics that make them helpful as a resource. As sentiments like enjoyment and fulfilment are felt, users are more likely to stay motivated while doing their tasks. Freitas states in [2] a few benefits from combining them with other training activities: • the learners’ motivation is higher; • completion rates are higher; • possibility of accepting new learners; • possibility of creating collaborative activities; • learn through doing and acquiring experience. Other aspects that draw video game players’ attention are fantasy elements, challenging situations and the ability to keep them curious about the outcomes of their possible actions [3]. According to experts from the European Centre for Children’s Products [4], Serious Games can be classified in five categories: Edutainment, Advergaming, Edumarket Games, Political Games and Training and Simulation Games. Each of these categories can find their practical application in a diverse range or areas, proving to be an invaluable asset and instrument for training and influencing behavioural patterns. B. Pedestrian Simulation Pedestrian Simulation is a field of computing that has gained a considerable dimension more recently. Its applications lean mostly towards planning urban areas, studying and testing the safety of buildings or open spaces and evaluating emergency systems and evacuation routes. Other uses include crowd animation for films or video games, as well. This field of study involves different technology areas, as Artificial Intelligence and Crowd Simulation, but also Decision Making and Behaviour Analysis. One major issue the scientific community faces though is how to accurately model and implement human behaviour and feature simulated entities with rather real attitudes and reactions. This has been addressed through many different approaches, mainly based on psychological experiments. Even so, it is also hard to keep subjects motivated and committed to this kind of experiments. In this area too, serious games seem to have a great potential as a research tool, fostering the understanding of human behaviour and the decision-making process carried out by individuals in a variety of circumstances. C. Crowd Representation Models Although many approaches exist to virtually simulate the behaviour of crowds with varying levels of realism and computational efficiency, from the analysis of different sources [5, 6, 7] three models seem to be the most used: • Cellular Automata Models - treats individuals as separate objects within a space that is discretely represented through a matrix of cells. Besides allowing only discrete movement and positioning of the elements in the space, with high-density crowds the base individual areas are exposed. Even so, it can still be a valid option as it demands lower computational resources and still provides reasonably realistic crowd behaviours macroscopically. • Forces-based Models - use mathematical formulas to calculate the position variations of the individual elements through the application of forces. Its most explored subtypes consider Magnetic Forces and Social Forces. The former model assigns polarities to individuals and objects and calculates attractions, directions and movement based on these values. As for the Social Forces approach, it is based on the first one and draws on its concept of polarity to manage individuals' objectives and wishes. • Artificial Intelligence-based Models - the decisions are taken by the individual elements that compose the crowd. One of the most common subtypes of this model is the Agent-based Model, whose unit is the Agent. Agents are elements capable of individually deciding their actions according to their own perceptions and interactions. If used in a high enough number, these models can be a good approximation to a crowd representation. Most importantly, agent- based models are a good metaphor for representing interactions and behaviour, which social is of paramount importance in crowd modelling and simulation. D. Crowd Behaviour Groups of individuals present different behaviour patterns under normal and emergency events [8, 9]. One important factor that has great influence over people's movement and actions is the layout of a building or surrounding areas. Helbing [8] considers that the following attributes should be accounted for and definitely included in the representation of each virtual individual to simulate their behaviour: • State - including its position, health and mobility; • • Speed - possible moving speeds; • Vision - field of vision, influenced by smoke; • Reaction Time - elapsed time before changing from normal to evacuation behaviour; • Collaboration - influences the probability of helping other people; Insistence - probability of maintaining the same objective over time; • Knowledge - familiarity with the building and the necessary actions to take to evacuate. Concerning the simulation of large groups under stress because of an emergency situation, Cordeiro [10] provides some insight into additional possible effects such situations might have on the group. It has been observed, for instance, that "herding" (or "flocking") happens due to people following other individuals instinctively (a reaction thoroughly explored by Reynolds in [11]), believing that they will be able to evacuate faster and more effectively. However, in conditions of low visibility or little knowledge of the surroundings this can provoke flocks of wandering people, contributing to the panic and confusion of the whole group, which is also a social reaction rather to be avoided if possible. III. USING SERIOUS GAMES IN EVACUATION TRAINING Whereas pedestrian and crowd simulations are an important instrument to help us better understanding social and group behaviour in a vast number of different circumstances, they are not good enough to persuade people to behave correctly. On the other hand, traditional fire drills as they are implemented in reality albeit constituting a very useful training resource have also some drawbacks to be sorted out. In our approach, we combine pedestrian and crowd simulation with the concept of serious games to build upon an aid tool that can be used to influence subjects’ behaviour towards a more effective instinctive reaction when responding to stressing situations such as the need to evacuate their current environment. A. Problem definition Performing real simulation exercises is an important activity nowadays, as it helps buildings’ users train evacuation routes, learn useful behaviours and prepare themselves in case there is an emergency situation. Having the occupants of a building well trained in the necessary procedures can help prevent casualties in case of an uncommon event (which is even more relevant for large, crowded buildings and ones that receive many visitors). In the end of a fire drill, it is expected to have identified some problems with the building’s safety routes and attempt to correct them. These simulations create the conditions for assessing implement recent methods to buildings’ safety levels (such as Performance Based Design - PBD), replacing more traditional methods that present the adequate solution for a given situation. In some countries they are mandatory and even required at certain intervals. Despite this, due to being uncommon these exercises can be extremely disruptive to the usual activities and operation of an institution, more so when they are unannounced. A briefing must be provided so everyone knows what is going to happen, how they should proceed and what is expected from them all. They are required to abandon their workstations for some moments, halt their work and leave the building before returning to their places and resuming their activities. Alarm mechanisms are frequently activated for the duration of the exercise, emergency authorities are often required to be present and evacuation times are measured. For management executives, who also have to perform these activities, all the trouble and derangement might be seen as a complete loss of time and a factor disrupting production. In these simulations, it is almost impossible for someone to grasp all the necessary information in order to evacuate from a building. One might remember later which path was taken previously, but there are also other numerous details, ranging from building plans to all possible evacuation routes and gather points. Thus, it is difficult to retain all this knowledge and have it present in times of real necessity. It should also be considered that in order to maintain high levels of realism in these activities a high investment must be made to recreate threats, hazards and uncommon events. Objects that represent fire and smoke machines can be used, for instance. Nonetheless, unpredictable hazards cannot be fully recreated, due to their dangerous nature. This is a typical example to which dealing directly with the real environment can ultimately compromise its normal functioning. Some simulation software, known as egress or evacuation simulators, has been used in recent years to solve part of the difficulties aforementioned. Indeed they can be useful to substitute some of the real activities, by providing a less expensive alternative, which also benefits from being more easily started, planned and executed. They might be shown to several occupants at once, minimising the time needed for the exercise, and can be of help in identifying best routes for leaving the building, finding bottlenecks and obstacles, and passing general information. Nevertheless, their aim is usually more to provide theoretical feedback on the current situation of a building regarding evacuation. They can be of use for a building in project, in order to correctly plan exits, paths, and illumination, or for existing buildings so as to evaluate how its population could behave in case of an emergency and unexpected hazardous events. Even the highly realistic ones do not provide an immersive experience to the users, as they cannot be put them in charge of controlling a virtual person of that simulation. B. The proposed approach Video games can be a choice to consider in order to address the aforementioned issues. Their potential to make tedious tasks become enjoyable is considerable and they have been recently applied to different ends other than solely providing entertainment to their users. As McGonigal presents it [12], it takes a clear goal that we can achieve and direct feedback for work to feel positive and even pleasant, and games excel at providing both. In fact, the author even states that by only bestowing our best efforts into overcoming a game challenge, we feel more rewarded. According to Davidson [13], a key quality of video games is that they focus not only on learning and knowing some information but actually on using it appropriately. One other aspect that is relevant is that video games are useful by providing an experience not far from real life with lower cost and without compromising safety [14]. Hazards can also be controlled more easily to provide randomness to the simulations. This project’s main objective is to study the viability of using a game engine to create an application that is simultaneously a pedestrian simulator, a game and a fire evacuation training tool. C. Implementation A Game Engine is a set of tools that provide necessary features to the development of video games. The required features in our specific situation as listed below: • 3D renderer; • Audio playback; • Physics engine; • Graphical User Interfaces (GUI); • Collision detection; • Support for artificial intelligence. After comparing various game engines, Unity3D was selected. In fact, it presents among other features a powerful interface that allows visual object placement and property changing during runtime (especially useful to rapidly create new scenarios from existing models and assets and quick tweaking of script variables). The framework is also customisable, giving the developer the ability to create code in JavaScript, C# or Boo. Finally, it also provides a simple project deployment environment for multiple platforms, with no need for additional configuration, including the web (which makes it possible to run any game on a web browser). Figure 1. DEI plan and 3D model Currently, our framework contains a single simulation scenario. It takes place in FEUP’s Informatics Engineering Department (DEI). The model was created using Blender based on the actual blueprints of the building so as to recreate it as realistically as possible in terms of topology, dimensions, scale and proportions Figure 1. The 3D environment can be seen in Figure 2, which gives a good idea of how realistic such an environment can represent the actual place under study. D. Execution of a evacuation scenario The player starts in a predefined room and, upon starting the evacuation event, a fire appears in a random room, forcing the alarm to ring. At this moment, the timer starts and the player must then traverse the building in order to go outside as quickly as possible, choosing from one of the two possible exits. Several emergency signs are in place so as to help the player to identify the nearest exit to his/her current spot. Figure 2. 3D rendered view of the building This attempts to recreate the experience of the user being physically there and exploring their surroundings. To steer his/her digital avatar in a 3D virtual world the user has the controls that are commonly standard for the FPS game genre (First Person Shooter games characterised by placing players in a 3D virtual world which is seen through the eyes of an avatar). IV. EVALUATION OF PRELIMINARY RESULTS In order to test our approach and evaluate its potentials, a simple experiment was executed and some results analysed. Our findings have been quite encouraging and promising, demonstrating the viability of our methodology. A. Population Sample A total of 30 individuals participated in this experiment and were invited to test the developed prototype. Testers can be individually classified according to different dimensions, namely whether they are regular video game players and whether they had previous knowledge of the building. According to these characteristics, four groups were considered. The different groups were labelled A, B, C and D as follows: • A - previous building knowledge and frequent game players; • B - previous building knowledge and little experience with games; • C - no previous building knowledge and frequent game players; • D - no previous building knowledge and little experience with games; The distribution of our sample into each of the groups previously described is presented in Table 1. TABLE I. Frequent game player Yes USER GROUPS Previous building knowledge Yes No Yes No Yes No No Population 8 6 5 11 Group A B C D B. Test Setup Before the evacuation test started, all players had a few moments to try the controls and get used to them (this was done without the possibility of exploring the building or even leaving the starting room). Players with little to no familiarity with the building additionally had a small demonstration of the way from the main entrance to the room where the test would start, to have in mind at least one way out. All users had to perform the same task in order to generate comparable results. Starting in a room inside DEI, the player’s objective was then to reach the outside of the building in the shortest time possible. The alarm would sound and computer- controlled agents would also start to move towards the nearest exit, crowding the corridors and causing the natural disruptions we can usually find when facing this kind of situations. With time, fire would spread all over the place and become an even more serious obstacle. While navigating inside the building, players could refer to the emergency signs pointing to the nearest emergency exits. The only measured value was the time taken to evacuate the building, as mistakes made while finding the way out would be automatically reflected in a longer elapsed time. V. RESULTS AND DISCUSSION While carrying out our experiments, some performance measures were logged for each subject. Figure 3 depicts the times for each player. Very curiously, the average time to leave the building was higher than expected. After all, in real life it only takes around 22 seconds to do the same way. This might have been originated by the difficulties verified by some users to control the avatar, mostly ones who demonstrated little to no acquaintance with video games on a regular basis. Some of them required several seconds to get used to controlling mouse and keyboard at the same time; in some cases they even gave up trying to do it simultaneously and opted instead by alternating between pointing at the desired direction and then moving on that way. 500 450 400 350 300 250 200 150 100 50 0 ) s d n o c e s ( e m i T Figure 3. User times for each player Average evacuation times computed by category are shown in Table II, below. TABLE II. Group A B C D AVERAGE TIMES BY CATEGORY Average time (seconds) 23.9 43.9 58.0 145.1 It is not surprising that the group with better performance was that of regular video game players who were also familiar with the building (group A). It was also expected to see the opposite group – group D, people that are neither familiar with DEI’s building nor regular gamers – have the lowest score. It is the two middle scores that deserve more attention. Not knowing the building or not being used to the game controls: both groups present similar results. Whilst the frequent game players where faster in controlling the avatar, they missed the shortest path to outside and choose the usual way due to their poor building knowledge (group C); the group with little game experience but good building familiarity (group B) although using the emergency exit took more time due to little experience with games. Frey et al. [15] have even shown that by making users get used to a game, the difficulties with controls are quickly overcome and the subjects differences on this point mitigated. To the benefit of the experience, players were allowed to play only once. When repeating the game, all would select the emergency exit and evacuation times decreased substantially, so results would be biased. It was precisely the novelty of facing such a new situation that was the aim of this experience. [3] [9] [4] REFERENCES [1] RT Hays. The Effectiveness of Instructional Games: a Literature Review and Discussion. Technical report , Naval Air Wwarfare Center Training Systems Division Orlando, FL , 2005. [2] Sara Freita s. Using Games and Simulations for Supporting Learning. Learning, Media and Technology, 31(4):343–358, 2006. John Kirriemuir and A. McFarlane. Literature Review in Games and Learning. Technical report , futurelab, 2004. Julian Alvarez, Olivier Rampnoux, Jean-Pierre Jessel, and G illes Methel . Seriou s Game: Ju st a Qu estion of Posture? In Artificial & Ambient Inteligence,AISB’07, pages 420–423, 2007. [5] Laure Heïgeas, Annie Luciani , Joelle Thollot, and Nicola s Ca stagné. A Physically-Ba sed Particle Model of Emergent Crowd Behaviors. In Graphicon, 2003. [6] N. Pelechano and A. Malkawi. Comparison of Crowd Simulation for Building Evacuation and an Alternative Approach. In Building Simulation, pages1514–1521, 2007. [7] Gabriel Santos and Benigno E Aguirre. A critical review of emergency evacuation simulation models. Critical Review, (1032):25–50, 2004. [8] Dirk Helbing. Simulation of Pedestrian Crowds in Normal and Evacuation Situations. In Pedestrian and Evacuation Dynamics, pages 21–58, 2002. J. E . Almeida, Rosaldo Rosseti, and A. L . Coelho. Crowd Simulation Modeling Applied to Emergency and Evacuation Simulations using Multi-Agent Systems. In 6th Doctoral Symposium on Informatics Engineer ing, 6th Doctoral Symposium on Informatics Engineering, DSIE’11, Por to, Por to, 2011. [10] Elisabete Cordeiro, António Leça Coelho, Rosaldo J F Rossetti, and João Emílio Almeida. 2011. Human Behavior under Fire Situations – A ca se– study in the Portugu ese Society. In ADVANCED RESEARCH WORKSHOP: Evacuation and Human Behavior in Emergency Situations, 63-80. Santander, Spain: GIDAI . Universidad de Cantabr ia. [11] Reynolds, C . W . (1987). Flock s, herds and schools: A distributed behavioral model . ACM SIGGRAPH Computer Graphics, 25-34. [12] Jane McGonigal. Reality Is Broken: Why Games Make Us Better and How They Can Change the Wor ld, volume 22. Penguin Press HC, The, 2011. [13] Drew Davidson. Beyond Fun, volume 11. ETC Press, 2008. [14] K. Corti. Games-Based Learning; a Serious Bu siness Application. Technical report , 2006. [15] A Frey, J Har tig, A Ketzel , A Zink ernagel, and H Moosbrugger. The Use of Virtual Environments Based on a Modification of the Computer Game Quake III Arena R in Psychological Experimenting. Computers in Human Behavior, 23(4):2026–2039, July 2007. VI. CONCLUSIONS AND FUTURE WORK In this work we explore the concept of serious games as an important asset to aid and improve traditional fire drills. It does neither completely replace nor avoid the need for in-site drills to train people in emergency situations, such as with the prospect of fire in an office building, for instance. Nonetheless, game environments can be very attractive in many different ways, and have proven to be an invaluable tool for training. Additionally, we build our approach on the potential of such a concept to ease and improve the understanding of human behaviour in such situations, as subjects are monitored during their playing the game and some performance measures are logged to be further analysed later on. We have implemented our prototype with Unity3D, a popular game engine, which provided us with a customisable framework and allowed us to insert features of a serious game platform into the virtual environment. We invited some subjects to use the game and collected some preliminary results that demonstrate the viability of the approach. We have then conceived a methodology which is both instrumental as an aid invaluable to train people and an instrument to help practitioners and scientists to better understand group behaviour and the social phenomenon in a vast range of circumstances. the include this research in The very next steps improvement of the prototype featuring it with tools for rapidly setting up simulation environments from CAD blueprints of buildings. We also intend to include other performance measures in individual and social behaviour to study circumstances other the hazardous scenarios. Ultimately, this tool is also expected to be used as an imperative decision support tool, providing necessary and additional insights into evacuation plans, building layouts, and other design criteria to enhance places where people usually gather and interact rather socially, such as shopping malls, stadiums, airports, and so on. ACKNOWLEDGMENT This project has been partially supported by FCT (Fundação para a Ciência e a Tecnologia), the Portuguese Agency for R&D, under grant SFRH/BD/72946/2010.
1910.09442
1
1910
2019-10-08T16:15:57
Data assimilation in Agent-based models using creation and annihilation operators
[ "cs.MA", "cs.LG" ]
Agent-based models are a powerful tool for studying the behaviour of complex systems that can be described in terms of multiple, interacting ``agents''. However, because of their inherently discrete and often highly non-linear nature, it is very difficult to reason about the relationship between the state of the model, on the one hand, and our observations of the real world on the other. In this paper we consider agents that have a discrete set of states that, at any instant, act with a probability that may depend on the environment or the state of other agents. Given this, we show how the mathematical apparatus of quantum field theory can be used to reason probabilistically about the state and dynamics the model, and describe an algorithm to update our belief in the state of the model in the light of new, real-world observations. Using a simple predator-prey model on a 2-dimensional spatial grid as an example, we demonstrate the assimilation of incomplete, noisy observations and show that this leads to an increase in the mutual information between the actual state of the observed system and the posterior distribution given the observations, when compared to a null model.
cs.MA
cs
DATA ASSIMILATION IN AGENT-BASED MODELS USING CREATION AND ANNIHILATION OPERATORS Daniel Tang Leeds Institute for Data Analytics University of Leeds Leeds, UK [email protected] 9 1 0 2 t c O 8 ] A M . s c [ 1 v 2 4 4 9 0 . 0 1 9 1 : v i X r a October 22, 2019 ABSTRACT Agent-based models are a powerful tool for studying the behaviour of complex systems that can be described in terms of multiple, interacting "agents". However, because of their inherently discrete and often highly non-linear nature, it is very difficult to reason about the relationship between the state of the model, on the one hand, and our observations of the real world on the other. In this paper we consider agents that have a discrete set of states that, at any instant, act with a probability that may depend on the environment or the state of other agents. Given this, we show how the mathematical apparatus of quantum field theory can be used to reason probabilistically about the state and dynamics the model, and describe an algorithm to update our belief in the state of the model in the light of new, real-world observations. Using a simple predator-prey model on a 2-dimensional spatial grid as an example, we demonstrate the assimilation of incomplete, noisy observations and show that this leads to an increase in the mutual information between the actual state of the observed system and the posterior distribution given the observations, when compared to a null model. Keywords Data assimilation, Agent based model, Quantum field theory, Probabilistic programming, Fock space 1 Introduction P (sΩ) ∝ P (Ωs)P (s) When modelling real-world phenomena we often use the model to make forecasts, only to be later faced with new observations that weren't available at the time of the forecast. This leads to the problem of how to "assimilate" the new observations into an updated forecast and, perhaps, another forecast for a later time. There exists an extensive literature on this problem as applied to weather forecasting models[1][2] which describes how the problem can be reduced using Bayes' rule: (1) Here, P (s) is our original forecast (this is a probability distribution since there is uncertainty in the forecast) P (Ωs) is the likelihood of the observation, Ω, given a forecast, s, and P (sΩ) is our updated forecast. However, the algorithms developed to do this in weather forecasting models depend on the model's governing equations having some degree of smoothness, a condition not generally satisfied by agent-based models. If there are only a very small number of observations, particle filtering or Markov Chain Monte Carlo methods may have some success[3], but as the number of observations increases, these methods tend to quickly fail. This is because as the number of observations increases, the proportion of the model's phase-space that has non-zero likelihood often shrinks exponentially, so if the dimensionality of the phase-space is not trivially small, finding a non-zero start point for a Markov chain becomes exponentially harder. Similarly for particle filters; the number of particles needed to prevent all particles ending up with zero probability, increases exponentially with the number of observations. For these reasons, the problem of data assimilation in agent-based models remains an unsolved problem, and this imposes a severe restriction on the utility of these models when applied to real world problems. 2 Quantum field theory applied to agent-based models In order to apply Bayes' rule to agent-based models (ABMs) we must first devise a way to represent a probability distribution over the possible states of an agent-based model. The task is complicated somewhat by the fact that, in Data assimilation in Agent-based models using creation and annihilation operators general, the exact number of agents in the model is unknown and variable, so the set of model states must span models with any number of agents. Luckily, we can use the mathematical formalism of quantum field theory to do this. In a quantum field there are an unknown number of interacting particles and the quantum field is represented as a quantum amplitude over the possible configurations of particles; to apply this to ABMs, we just need to interpret the particles as agents and replace the quantum amplitudes with probabilities. 2.1 The creation operator † Let ∅ represent the empty model state (i.e. the state with no agents present), and let a i be an operator on model states that has the effect of adding an agent in state i to the model state, this is called the creation operator. So, for example, † i∅ is the state with a singe agent in state i. Since the result of a creation operator is itself a state, we can apply another a †2 † † i ∅ i∅ to represent a state with two agents, one in state i and one in state j, or even a creation operator, for example, a ja to represent a state with two agents in state i. We can go on applying operators in this way to construct any desired state. If we now allow states to be multiplied by real numbers and added together, a vector space is induced which can † † i∅ + 0.5a j∅ would represent a probability represent probability distributions over model states. For example 0.5a distribution with 0.5 probability that there's a single agent in state i and 0.5 probability that there's a single agent in state j (with no probability that both agents are present at the same time). Since each term in a probability distribution always ends in the empty state, ∅, we can just as easily consider the additions and multiplications to be part of the operator, so the example distribution above could be equivalently written † † j)∅. Given this, composure of operators works in the expected way, for example, a† i + a 0.5(a † † j)∅. 0.5(a† i + a† za za With this representation, we need a way to express the fact that it doesn't matter in what order the creation operators are † † † † i∅ = a j∅. Since this is true for all states, not just ∅, we can drop the ∅ and say1 applied, so a i a ja (cid:17)∅ = (cid:16) † † i + a 0.5(a j) z This form of equation is known as a commutation relation or commutator and has a shorthand notation: † † i , a [a j] = 0 † † † † j − a a i a ja i = 0 2.2 The annihilation operator Now let ai be the annihilation operator which has the following properties: ai∅ = 0 and where δij is the Kronecker delta function. Given just these properties, we can show that [ai, aj] = 0 † [ai, a j] = δij This is a recurrence relationship which, using equations 3 and 5, can be solved to give †n−1 † †n i ∅ = aia i a i †n−1 † † ∅ = (a i ai + [ai, a i ])a i ∅ aia †n i ∅ = na aia †n−1 i ∅ (2) (3) (4) (5) So, the annihilation operator has the effect of multiplying by the number of agents in a state, then removing one of those agents. Notice that, using the commutation relations in this way we can transform any sequence of operations on ∅ into an equivalent form that contains no annihilation operators. We'll call this the reduced form of the operator. 3 Equations of motion of a probabilistic ABM Armed with just the creation and annihilation operators we now show that if the behaviour of agents in an ABM can be described as a set of propensities to act and interact at any instant then we can transform the ABM into a "Hamiltonian" operator, containing only addition, multiplication, creation and annihilation operators. The Hamiltonian operator turns a 1to be correct, the 0 is interpreted as the "multiply by zero" operator or alternatively 0I where I is the identity operator 2 Data assimilation in Agent-based models using creation and annihilation operators probability distribution over ABM states into a rate of change of that distribution. This is significant in that it allows us to express the equations of motion of a probability distribution as an operator, and so describe probabilistically how the ABM evolves through time. That is, we've defined a "probabilistic ABM" that captures all the behaviour of the original ABM in a smooth, differentiable way which, as we'll show, makes it much easier to perform inference on the ABM. To do this, start with the definition of an agent's behaviour: this must be representable as a set of actions and interactions. An action consists of a pair of functions, (ρ(i), A(i)) where ρ is a rate per unit time and A is a set of agents. An agent in state i is said to have behaviour (ρ(i), A(i)) if in any infinitesimal time-slice, δt, it replaces itself by the agents in A(i) with probability ρ(i)δt. An interaction consists of a pair of functions, (ρ(i, j), A(i, j)) such that an agent in state i, in the presence of another agent in state j replaces both itself and the other agent with A(i, j) with probability ρ(i, j)δt. Although this is not a common way to think about agent-based models, a very large class of models can easily be described in this way. Without loss of generality, we assume all agents in a model have the same set of behaviours (different behaviours among agents can be achieved by putting an "agent type" marker in the agent's state and making the behaviour rates zero for certain agent types). Consider now an action, (ρ(i), A(i)) and let [ki1 . . . kini] = A(i) be the results of the action. The Hamiltonian for this action would be  (cid:89) k∈A(i)  ai † † k − a a i H(ρ,A) = ρ(i) † The product term expresses the rate of increase in probability in the state resulting from the action, while the a i term expresses the (equal in magnitude) rate of decrease in probability in the initial state due to the agent being removed when it acts. Because the annihilation operator, ai, multiplies by the number of agents in a given state, the rate of change is also multiplied if there are multiple agents to which the behaviour applies (or multiplied by zero if there are no applicable agents). Now consider an interaction (ρ(i, j), I(i, j)). The Hamiltonian for this interaction would be  (cid:89) k∈I(i,j)  − a † k a † i a † j  ajai H(ρ,I) = ρ(i, j) The double annihilation operator, ajai, has the effect of multiplying by the number of i, j agent pairs so that each agent in †n ∅, i ∅ = n(n− 1)a state i gets a chance to interact with each agent in state j. This also works when j = i, since a2 i a and the number of i, i pairs is n(n − 1). This pattern can easily be extended to interactions between three or more agents, but in this paper we'll consider only binary interactions. If an agent has more than one behaviour, the Hamiltonian is simply the sum of the individual behaviours, so in this way we can build a Hamiltonian for a whole ABM. So, an ABM whose agents have a set of action behaviours {(ρ1(i), A1(i)) . . . (ρα(i), Aα(i))} and a set of interaction behaviours {(ρ1(i, j), I1(i, j)) . . . (ρβ(i, j), Iβ(i, j))} has the Hamiltonian †n−2 i  (cid:89)  − a † i  ai + † a k k∈An(i) β(cid:88) (cid:88) (cid:88) m=1 i j ρm(i, j)  (cid:89) k∈Im(i,j)  − a † a k † † i a j  ajai α(cid:88) (cid:88) n=1 i H = ρn(i) Although the number of terms in the Hamiltonian can become very large, we'll see later that we only ever need to deal computationally with the much smaller commutation relations [X, H]. Given the Hamiltonian, the time evolution of a probability distribution over ABM states, ψ, is by definition This has the analytical solution dψ dt = Hψ where ψ0 is the initial state, ψt is the state at time t and the exponential of an operator, tH, can be defined as ψt = etH ψ0 ∞(cid:88) n=0 tnH n n! etH = (6) Equation 6 gives us a prior forecast which can be inserted into Bayes' rule (equation 1) in order to do data assimilation: P (stΩt) = (cid:80) P (Ωtst)P (etH ψ0 = st) s P (Ωts)P (etH ψ0 = s) 3 (7) Data assimilation in Agent-based models using creation and annihilation operators where st is a state at time t, Ωt are the observations at time t and ψ0 is the probability distribution of the ABM at time t = 0 given all observations up to that time. So, we have a succinct, mathematical solution to the problem of data assimilation in an ABM. We now need to translate equation 7 into a numerical algorithm that will execute in a reasonable time. 4 The Deselby distribution As a first step towards a practical numerical algorithm, we introduce the Deselby distribution which we define as ∞(cid:88) (k)∆λk−∆e−λ †k i ∅ a Diλ∆ = k=0 k! where ∆ is an integer, λ is a real number and (k)∆ denotes the ∆th-order falling factorial of k. The Deselby distributions have the useful property that and so It can also be seen that † a i Diλ∆ = Diλ(∆+1) †∆ i Diλ0 = Diλ∆ a aiDiλ0 = λDiλ0 Now imagine a product of Deselby distributions over all agent states (cid:89) DΛ = Diλi0 (8) (9) so that, for any i i aiDΛ = λiDΛ So, in the same way as with ∅, any sequence of operations on DΛ can be reduced to a sequence of creation operations on DΛ, i.e. a reduced form, and we can consider DΛ as a "ground" state in just the way we have been using ∅ so far. So, if we express a probability distribution in terms of operators on DΛ we can apply the Hamiltonian to this to get a rate of change in in terms of DΛ. This will be much more computationally efficient than dealing directly with operators on ∅. Note also that when ∆ = 0, the Deselby distribution is just the Poisson distribution, so it is particularly convenient if we can express our prior beliefs about the number of agents in each state of an ABM in terms of Poisson distributions. 4.1 Data assimilation with Deselby distributions As a concrete example, suppose there are a number of identical agents moving around a 2-dimensional grid, and we observe the number of agents in the ith grid-square. To make this slightly more general, suppose our method of observation may be imperfect and there is a probability, r, that an agent is detected given that it is there, such that the likelihood function is just the Binomial distribution P (mk) = rm(1 − r)k−m (cid:18) k (cid:19) m where m is the observed number of agents and k is the actual number present. Appendix A shows that, if our prior is a Deselby distribution Diλ∆, then the posterior is given by †m i am i LgirDiλ∆ P ∝ a (10) Where we introduce the operator Lgir which has the properties † † i ] = −ra i Lgir [Lgir, a [Lgir, ai] = rai 1 − r Lgir and LgirDΛ = DΛ(cid:48) where Λ(cid:48) is Λ with the ith component, λi, replaced by (1 − r)λi. 4 (11) (12) (13) Data assimilation in Agent-based models using creation and annihilation operators Since euqation 10 is true for any Deselby distribution, it is also true for any state described as an operator on DΛ. So, given ψ0 (a distribution at time t = 0 expressed as an operator on DΛ) and an observation of m agents in state i at time t, the postrior distribution at time t is given by Multiple observations Ω = {(i1, m1)...(in, mn)} can be treated by applying operators for each observation ψt ∝ a †m i am i LgiretH ψ0  (cid:89) (i,m)∈Ω  etH ψ0 †m i am a i Lgir (14) (15) ψt ∝ 4.2 Deselby state approximation Even when working with Deselby distributions, as time progresses the size of the reduced form of the distribution will become large and sooner or later. In order to maintain computational tractability, we'll need to somehow approximate the distribution. There are many ways of doing this, but a common way is to minimise the Kulback-Leibler divergence between the original distribution and the approximation[4] over a family of possible approximations. This has the effect of minimising the loss of information due to the approximation. If P∅ is the original distribution and A∅ the approximation, and we choose to minimise DKL(P∅A∅) the resulting approximation has a particularly simple form. By definition the KL-divergence is given by where we define and DKL(P∅A∅) = ∅ · P ∗ (log(P∅) − log(A∅)) log(cid:0)(c1a†l1 + ··· + cna†ln )∅(cid:1) = (log(c1)a †l1 1 + ··· + log(cn)a†ln n )∅ ∅ · a†n∅ = δn0 where δn0 is the Kronecker delta function. P ∗ is defined to be the conjugate of P , where the conjugation operator is defined as having the properties †n i )∗ = (a an i n! (A + B)∗ = A∗ + B∗ and (AB)∗ = A∗B∗ and c∗ = c if c is a constant. If we choose A to be a Deselby distribution, and minimise the KL divergence with respect to Λ we have, for all i Solving this for λi gives Where the operator ∀i : 0 = ∅ · P ∗ ∂ log(Diλi∆i∅) ∂λi ∀i : λi = ∅ · e (cid:80) j aj aiP∅ − ∆i j aj = ∅ ·(cid:89) ∞(cid:88) an j n! j n=0 (cid:80) ∅ · e (16) has the effect of summing over a distribution (i.e. summing the coefficients of an operator expressed in reduced form on ∅). This can be interpreted as saying that the Deselby distribution, D, that minimises DKL(P∅D) is the one whose mean number of agents in state i matches the mean of P∅ for all i. This gives us values for λi given ∆i. To calculate ∆i, notice that for the KL-divergence to be finite, the support of P∅ must be a subset of the support of D. So if ∆i has value n, the probability that there are any less than n agents in state i in P∅ must be zero. So, we can choose ∆i to be the highest value for which there are definitely at least that many agents in state i in P∅. 5 − ∆i (17) (18) (19) (20) n, H] is considerably smaller To calculate this, we need an algorithm to calculate expressions of the form To increase numerical stability, we transform this to where I is the identity operator. Expanding the exponential in H gives (cid:80) y = ∅ · e (cid:80) j aj XetH ψ0 y = e−t∅ · e j aj Xet(I+H)ψ0 ∞(cid:88) (cid:80) ∅ · e tn n! y = e−t j aj Znψ0 where Zn = X(I + H)n. However, n=0 Zn+1 = Zn(I + H) = Zn + HZn + [Zn, H] but since H is the Hamiltonian, and the Hamiltonian preserves probability mass, j aj HZnψ0 = 0 for all Zn and ψ0 so we can replace Z by Z(cid:48) in equation 19 where Z(cid:48) n, H] Z(cid:48) n+1 = Z(cid:48) n + [Z(cid:48) 0 = X and (cid:80) ∅ · e without affecting the value of y. This is very convenient computationally, because although H is in general very large, [Z(cid:48) so we have a much more efficient way to calculate the terms of the expansion. (cid:80) The computation can be made even more efficient by noting that † i X = ∅ · e j aj a ∅ · e j aj X (cid:80) Data assimilation in Agent-based models using creation and annihilation operators 5 A practical algorithm for data assimilation Using equations 15 and 16 we can perform a data assimilation cycle that consists of the following steps: take an initial state ψ0, integrate forward in time, apply the set of observations Ω = {(i1, m1) . . . (in, mn)}, then finally approximate to the Deselby distribution that minimises the KL-divergence. Since we've just observed m agents in state i for each (i, m) ∈ Ω we can define the ∆ of the approximation to be given this, λi is given by ∀i : λi = 0 otherwise (cid:26)m if (i, m) ∈ Ω (cid:16)(cid:81) (cid:16)(cid:81) †m j am †m j am (j,m)∈Ω a (j,m)∈Ω a ∆i = (cid:80) ∅ · e (cid:80) ∅ · e j aj ai j aj (cid:17) (cid:17) j Lgjr etH ψ0 j Lgjr etH ψ0 for all i. So when calculating each Z(cid:48) them to the left, leaving only annihilation operators. In practice, we only need to calculate the first few terms in the expansion in 19 so we end up with n we can use the commutation relations to remove all creation operators by moving (21) The Z(cid:48) n terms, can be calculated consecutively using equation 20 with for the numerator in equation 18 and Z(cid:48) 0 = for the denominator. †m j am a j Lgjr y = e−t (cid:80) j aj Z(cid:48) ∅ · e nψ0 Z(cid:48) 0 = ai †m j am a j Lgjr n=0 tn n! N(cid:88) (cid:89) (cid:89) (j,m)∈Ω 6 (j,m)∈Ω Data assimilation in Agent-based models using creation and annihilation operators Aget type Description Prey death reproduction movement Rate per unit time 0.1 0.15 1.0 Predator death predation/reproduction (per prey) movement 0.1 0.5 1.0 Table 1: The rates of each behaviour in the predator-prey model We then just need to multiply Z(cid:48) reduced form and sum the coefficients (in order to perform the ∅ · e Numerical experiments showed that, when calculating the terms in equation 21, a good estimate of the error obtained by truncating the series at the N th term can be calculated as n by ψ0 (i.e. the Deselby distribution from the previous assimilation cycle), convert to j aj operation)2. where ¯x = t N (22) (cid:12)(cid:12)(cid:12) 1 n nψ0 (cid:80) (cid:33)  ≈ e−t (cid:32) e¯x − N(cid:88) (cid:12)(cid:12)(cid:12)∅ · e N(cid:88) (cid:80) j aj Z(cid:48) n=0 ¯xn n! n=1 This can be calculated along with the terms of the expansion until the error estimate falls below some desired threshold. A final computational simplification can be made by noticing that when calculating the numerator of equation 18, observations far away from the ith grid-square will have very little influence on its posterior (depending on t and the speed of information flow through the ABM). This intuition is formalised in Appendix B where we show that if we let Φ(X) be the set of all states operated on by operator X, and let [nX, H] = [...[[X, H], H]..., H] denote the n-fold application of a commutation, then if the observations in Ω can be partitioned into two sets ΩA and ΩB in such a way that  N(cid:88) n=0 Φ [nai (cid:89) (m,j)∈ΩA  ∩ Φ  N(cid:88) [n (cid:89) n=0 (m,j)∈ΩB †m j am a j , H]  = ∅ †m j am a j , H] (where ∅ above is the empty set, not the ground state) we can factorise out the effect of all observations in ΩB (to N th-order accuracy) in both the numerator and denominator so that they cancel and we can effectively remove the observations in ΩB (note that in the above equation we've removed the Lgjr operator as it has no effect under the Φ operation). 6 Spatial predator-prey example model In order to provide a numerical demonstration of the above techniques, we simulated a 32x32 grid of agents. Each agent could be either a "predator" or a "prey". At any time a prey had a propensity to move to an adjacent grid-square (i.e. up, down, left or right), to die or to give birth to another prey on the an adjacent grid-square. Predators also had propensities to move to adjacent grid-squares or die, but in the presence of a prey on an adjacent grid-square, they also had a propensity to eat the prey and reproduce into an adjacent grid-square. Perhaps surprisingly, even a model with such a simple set of behaviours exhibits quite complex emergent properties that are difficult to predict. The rate per unit time of each behaviour is shown in table 1. A non-probabilistic, forward simulation of the ABM was performed in order to create simulated observation data. The initial state of the simulation was constructed by looping over all grid-squares and choosing the number of predators in that square from a Poisson distribution with rate parameter λ = 0.03 and the number of prey from a Poisson distribution with λ = 0.06. The model was then simulated forward in time and at time intervals of 0.5 units an observation of the state of the simulation was recorded. An observation was performed as follows: for each grid-square, with 0.02 probability, the number of prey was observed. If an observation was made, each prey in that grid-square was counted with a 0.9 probability. The same procedure was then repeated for predators. 2We can also sum coefficients when working with a Deselby ground state since the sum of the coefficients of a Deselby distribution, expressed as an operator on ∅, is 1 7 Data assimilation in Agent-based models using creation and annihilation operators Figure 1: Plot showing the increase of mutual information between the computed posterior distribution and the actual state for the first 64 assimilation windows of 10 simulations. The zero-information point is taken to be that of the posterior given the current window's observations and the prior at the start of the simulation. Once the observations were generated, a sequence of data assimilation cycles were performed as described in equations 17 and 18, with a starting state of the Deselby ground state DΛ with λi = 0.03 for all i representing a predator and λi = 0.06 for all i representing a prey. The terms in the expansion were calculated until the expected truncation error, calculated using equation 22 fell below 0.2% of the sum of terms up that point. 6.1 Results The mutual information between the assimilated state and the real state (where the real state is represented by a Dirac delta distribution) was calculated at the end of each assimilation cycle. In order to distinguish between the information accumulated by the data assimilation cycles and the information contained in the current time's observation and the prior at the start of the simulation, we also calculated a reference value equal to the mutual information between (cid:16)(cid:81) (cid:80) i ai ∅ · e (cid:17) DΛ (cid:17) (j,m)∈Ωt (cid:16)(cid:81) †m j am a j Lgir †m j am a (j,m)∈Ωt j Lgir DΛ and the real state (i.e. the posterior given only the initial prior and the current window's observations). Figure 1 shows the difference between the mutual information of the assimilated state and the reference value for each assimilation cycle of 10 separate simulations. The upward trend in this plot shows that the assimilation cycle is successfully accumulating information about the real state. Figure 2 shows snapshots of the real state of the non-probabilistic simulation superimposed on the assimilated state, for three of the simulations after 64 assimilation cycles. Inspection of these snapshots seems to suggest that the mutual information tends to be higher when agents are arranged in clusters rather than being more scattered, which is not surprising. Also, when a grid-square containing an agent is observed but (because of the 0.9 probability of observation) the number of observed agents happens to be zero, this will reduce the mutual information. 7 Previous work Applying the methods of quantum field theory to other domains is not new; for example Dodd and Ferguson[5] suggest applying it to epidemiology, O'Dwyer and Green[6] apply it to simulations of biodiversity while Santos et.al.[7] applies it to enzymatic reations. Abarbanel[8] comes closest to our work in that he talks about quantum field theory in the context of data assimilation. However, to our knowledge, nobody has before developed quantum field theory to apply to such a general class of ABMs, nor have they developed it into an algorithm for data assimilation. Also, the various 8 -20 0 20 40 60 80 100 120 0 10 20 30 40 50 60 70Posterior / real state mutual information (bits)Assimilation window Data assimilation in Agent-based models using creation and annihilation operators Figure 2: Posterior, assimilated probability (background colour) plotted against actual agent positions (dots) for the highest (top), average (middle) and lowest (bottom) mutual information (out of 10 simulations) after 64 assimilation cycles. Red dots are real prey positions, blue dots are real predator positions. The background colour shows the posterior probability: higher intensity red corresponds to higher probability of prey, higher intensity of blue corresponds to higher probability of predator. 9 Data assimilation in Agent-based models using creation and annihilation operators numerical strategies presented here that make the technique computationally tractable, including our presentation of the Deselby distribution is, we believe, new. 8 Discussion and Conclusion This paper presents some early results of a promising new technique in data assimilation for agent based models. However, there's plenty of work left to be done and many opportunities for further development. For example, more research into flexible ways of approximating the state or computationally efficient ways of representing a state as a data structure, would be worthwhile. The example model presented here is very small and simple, the next step would be to apply this technique to larger and more complex models. In addition, in this paper we only consider agents with a discrete set of states, the extension to states including continuous variables is fairly straightforward and work on this is currently under way. At present there are very few techniques that can be used to successfully perform data assimilation in agent based models. We believe the results presented here provide a significant first step towards filling that gap and hope that it will form the foundation of a fruitful approach to the problem. The code used to create the results in this paper can be found at https://github.com/deselby-research/ProbabilisticABM, where you'll also find a library of code we're developing in order to experiment with new techniques in this area. References [1] Eugenia Kalnay. Atmospheric modeling, data assimilation and predictability. Cambridge university press, 2003. [2] Alberto Carrassi, Marc Bocquet, Laurent Bertino, and Geir Evensen. Data assimilation in the geosciences: An overview of methods, issues, and perspectives. Wiley Interdisciplinary Reviews: Climate Change, 9(5):e535, 2018. [3] Stuart Russell and Peter Norvig. Artificial Intelligence: A Modern Approach. Prentice Hall Press, 2009. [4] Kevin P Murphy. Machine learning: a probabilistic perspective. MIT press, 2012. [5] Peter J Dodd and Neil M Ferguson. A many-body field theory approach to stochastic models in population biology. PloS one, 4(9):e6855, 2009. [6] James P O'Dwyer and Jessica L Green. Field theory for biogeography: a spatially explicit model for predicting patterns of biodiversity. Ecology letters, 13(1):87 -- 95, 2010. [7] Fernando AN Santos, Hermes Gadêlha, and Eamonn A Gaffney. Fock space, symbolic algebra, and analytical solutions for small stochastic systems. Physical Review E, 92(6):062714, 2015. [8] Henry Abarbanel. Predicting the future: completing models of observed complex systems. Springer, 2013. 10 Data assimilation in Agent-based models using creation and annihilation operators A Appendix: Binomial observation The product of a Deselby distribution and a binomial distribution is given by (cid:18) k (cid:19) rm(1 − r)k−m (k)∆λk−∆e−λ k! P (km) ∝ rearranging and dropping constants m P (km) ∝ (1 − r)∆ (k)m (k)∆((1 − r)λ)k−∆e−(1−r)λ k! (23) expanding the product of falling factorials min(m,∆)(cid:88) q=0 P (km) = (1 − r)∆ m!∆! ((1 − r)λ)(m−q) q!(m − q)!(∆ − q)! (k)m+∆−q((1 − r)λ)k−(m+∆−q)e−(1−r)λ k! Expressing this as an operator on ∅ ∞(cid:88) (1 − r)∆ min(m,∆)(cid:88) k=0 q=0 P ∝ so m!∆! ((1 − r)λ)(m−q) q!(m − q)!(∆ − q)! (k)m+∆−q((1 − r)λ)k−(m+∆−q)e−(1−r)λ k! a†k∅ P ∝ (1 − r)∆ m!∆! ((1 − r)λ)(m−q) q!(m − q)!(∆ − q)! a†(m+∆−q)Di((1−r)λ) 0 But, from the commutation relations, we have the identity ama†∆ = m!∆! q!(m − q)!(∆ − q)! a†∆−qam−q min(m,∆)(cid:88) q=0 min(m,∆)(cid:88) q=0 so P ∝ (1 − r)∆a†mama†∆D((1−r)λ) 0 Let Lgr be an operator that has the properties and then So [Lgr, a†] = −ra†Lgr [Lgr, a] = ra 1 − r Lgr LgrDλ0 = D(1−r)λ0 Lgra†∆ = (1 − r)∆a†∆Lgr (24) (25) P ∝ a †m i am i LgirDiλ∆ 11 Data assimilation in Agent-based models using creation and annihilation operators B Appendix: Factorisation of compound observations Consider an expression of the form ∞(cid:88) n=0 (cid:80) ∅ · e tn n! j aj ABH n j aj ABetH = where A, B and H are operators, and H is a Hamiltonian. Due to the form of a Hamiltonian, ∅ · e j aj HX = 0 for all X, so (cid:80) j aj ABH n = ∅ · e (cid:80) j aj [nAB, H] Where we introduce the notation [nX, H] = [...[[X, H], H]..., H] to denote the n-fold application of a commutation. So (cid:80) ∅ · e (cid:80) ∅ · e (cid:80) ∅ · e (cid:80) ∅ · e tn n! ∞(cid:88) (cid:19) (cid:18) n n=0 j aj ABetH = j aj [nAB, H] n(cid:88) (cid:19)(cid:0)[mA, H][n−m+1B, H] + [m+1A, H][n−mB, H](cid:1) [mA, H][n−mB, H] m=0 m Cn(A, B) = (cid:18) n m n(cid:88) m=0 n+1(cid:88) (cid:18) n n+1(cid:88) (cid:19) (cid:18)n + 1 m(cid:48) − 1 (cid:19) m(cid:48) m(cid:48) n + 1 m(cid:48)=0 [mA, H][n+1−mB, H] m(cid:48)=1 [mA, H][n+1−mB, H] + n+1(cid:88) (cid:18)n + 1 (cid:19) m m=0 = [mA, H][n+1−mB, H] + [m(cid:48) A, H][n+1−m(cid:48) B, H] [Cn(A, B), H] = Cn+1(A, B) [m(cid:48) A, H][n+1−m(cid:48) B, H] [Cn(A, B), H] = (cid:18) n (cid:19) n(cid:88) (cid:18)n + 1 (cid:19) n + 1 − m m=0 m = m n + 1 (cid:19) m (cid:18) 1 (cid:19) (cid:18) n m=0 1(cid:88) (cid:18) n n(cid:88) m n(cid:88) ∞(cid:88) m=0 [AB, H] = A[B, H] + [A, H]B = [mA, H][1−mB, H] = C1(A, B) [nAB, H] = n=0 ∞(cid:88) n(cid:88) ∞(cid:88) (cid:80) m=0 n=0 = [nAB, H]tn = n! m [mA, H]tm[n−mB, H]tn−m m=0 n=0 m!(n − m!) (cid:80) ∅ · e j aj ABetH ψDΛ ≈ ∅ · e j aj [mA, H][n−mB, H] (cid:19) [mA, H][n−mB, H]tn ∞(cid:88) ∞(cid:88) [jA, H]tj n! = [kB, H]tk N(cid:88) j=0 j=0 [jA, H]tj j! j! N(cid:88) k=0 k! k=0 [kB, H]tk k! ψDΛ Now let so n+1(cid:88) m=0 = So But so So So where ψ is a sequence of creation operators and DΛ is the Deselby ground state. If we let Φ(X) be the set of all states operated on by operator X, then if (cid:33) (cid:32) N(cid:88) (cid:33) (cid:32) N(cid:88) n=0 n=0 12 Φ [nA, H] ∩ Φ [nB, H] = ∅ (26) Data assimilation in Agent-based models using creation and annihilation operators where ∅ above is the empty set (not the ground state) then ψ can easily be factorised into ψAψB such that N(cid:88) (cid:80) ∅ · e j aj N(cid:88) [jA, H]tj [kB, H]tk j! j=0 k=0 k! ψDΛ = ∅ · e j aj [jA, H]tj [kB, H]tk j! j=0 ψA k! k=0 ψBDΛ (cid:80) N(cid:88) N(cid:88) But if X consists only of annihilation operators (which we can arrange by using commutation relations to move all creation operators to the left and then removing them), then (cid:80) ∅ · e j aj XY D0 = j aj XD0 j aj Y D0 + ∅ · e j aj [X, Y ]D0 but if equation 26 is satisfied then (cid:80) (cid:16)∅ · e (cid:34) N(cid:88) ∅ · e n=0 (cid:80) (cid:17) (cid:80) (cid:80) (cid:17)(cid:16)∅ · e N(cid:88) n=0 (cid:35) (cid:32) irrespective of whether we strip the first term of creation operators, so, if 26 is satisfied (cid:80) j aj ABetH ψDΛ ≈ ∅ · e [nA, H]ψA, [nB, H]ψB = 0 N(cid:88) j aj [jA, H]tj ψDΛ j! j=0 N(cid:88) (cid:80) ∅ · e j aj [kB, H]tk k! k=0 (cid:33) ψDΛ where we've removed the factorisation of ψ as it doesn't affect the sum. 13
1609.07015
2
1609
2016-10-25T21:01:50
Distributed Consistent Data Association
[ "cs.MA", "cs.RO", "eess.SY" ]
Data association is one of the fundamental problems in multi-sensor systems. Most current techniques rely on pairwise data associations which can be spurious even after the employment of outlier rejection schemes. Considering multiple pairwise associations at once significantly increases accuracy and leads to consistency. In this work, we propose two fully decentralized methods for consistent global data association from pairwise data associations. The first method is a consensus algorithm on the set of doubly stochastic matrices. The second method is a decentralization of the spectral method proposed by Pachauri et al.. We demonstrate the effectiveness of both methods using theoretical analysis and experimental evaluation.
cs.MA
cs
Distributed Consistent Data Association Spyridon Leonardos1, Xiaowei Zhou2 and Kostas Daniilidis3 6 1 0 2 t c O 5 2 ] A M . s c [ 2 v 5 1 0 7 0 . 9 0 6 1 : v i X r a Abstract -- Data association is one of the fundamental prob- lems in multi-sensor systems. Most current techniques rely on pairwise data associations which can be spurious even after the employment of outlier rejection schemes. Considering multiple pairwise associations at once significantly increases accuracy and leads to consistency. In this work, we propose two fully decentralized methods for consistent global data association from pairwise data associations. The first method is a consensus algorithm on the set of doubly stochastic matrices. The second method is a decentralization of the spectral method proposed by Pachauri et al. [28]. We demonstrate the effectiveness of both methods using theoretical analysis and experimental evaluation. I. INTRODUCTION Multi-sensor data association has been a long standing problem in robotics and computer vision. It refers to the problem of establishing correspondences between feature points, regions, or objects observed by different sensors and serves as the basis for many high-level tasks such as localization, mapping and planning. Most of the efforts in previous works have been dedicated to improving the data as- sociation by designing new feature detectors, descriptors, and outlier removal algorithms in a pairwise setting. However, the problem setting in practice is often multi-way if the data are collected by a sensor network or a multi-robot system, and how to establish consistent data association for multiple sensors and leverage the global reasoning to improve the association has drawn increasing attention in recent years. A necessary condition for good data association among multiple sensors is the cycle consistency meaning that the composition of associations along a cycle of sensors should be identity. The cycle consistency is often violated in practice due to outliers and how to use such a constraint to remove the false associations has been studied in robotics, computer vision and graphics. The related work will be discussed in Section II. While promising empirical and theoretical results have been reported in previous works, most of them addressed the problem in a centralized manner and assumed that the observations and states of all sensors could be accessed at the same time. This assumption is impractical in a distributed system where the data is processed on local sensors with limited computational and communication resources. In this paper, we aim to develop distributed algorithms that can efficiently operate on each sensor, re- quiring only local information and communication with its 1,2,3The authors are with the Department of Computer and Informa- tion Science, University of Pennsylvania Philadelphia, PA 19104, USA {spyridon,xiaowz,kostas}@seas.upenn.edu Support by the grants ARL MAST-CTA W911NF-08-2-0004 and ARL RCTA W911NF-10-2-0016 is gratefully acknowledged. Fig. 1. Illustration of consistent data association. neighbors, and finally producing globally consistent data association. Our contributions are the following. 1) We propose a novel consensus-like algorithm for distributed data association. 2) We propose a decentralized version of the centralized state-of-art spectral method [28]. 3) We show that both methods provably converge, do not depend on initialization, are parameter-free and guarantee global consistency. 4) We demonstrate the validity of proposed methods through both theoretical analysis and experimentation with synthetic and real data. The rest of this paper is organized as follows. Section II includes a brief review of prior works. Section III introduces the reader to notation and preliminaries essential to under- standing the main results of this paper. A rigorous problem formulation is the topic of Section IV. The two proposed methods are presented in Sections V and VI respectively. Finally, experimental evaluation is presented in Section VII. II. RELATED WORK The cycle consistency has been explored in a variety of computer vision applications. For example, Zach et al. [37] studied the problem of multi-view reconstruction and pro- posed to identify unreliable geometric relations (e.g. relative poses) between views by measuring the consistencies along a number of cycles. Nguyen et al. [26] addressed the problem of finding point-wise maps among a collection of shapes and proposed to use the cycle consistency to identify the correctness of maps and replace the incorrect maps with the compositions of correct ones. Yan et al. [35], [36] consid- ered the multiple graph matching problem and imposed the cycle consistency by penalizing the inconsistency during the optimization. Zhou et al. [38] developed a discrete searching algorithm that maximizes the cycle consistency to improve the dense optical flow in an image collection. Instead of iteratively optimizing the pairwise matches, [15], [21], [28] showed that finding globally consistent associations from noisy pairwise associations can be formulated as a quadratic integer program and relaxed into a generalized Rayleigh problem and solved by the eigenvalue decomposition. More recently, Huang and Guibas [14] and Chen et al. [6] the- oretically proved that the consistent associations could be exactly recovered from noisy measurements under certain conditions by convex relaxation and solved the problem by semidefinite programming. Zhou et al. [39] proposed to solve the problem by rank minimization and developed a more efficient algorithm. All of these works addressed problem in a centralized setting, i.e., all pairwise measurements are available and optimized jointly. In the robotics community, numerous approaches for as- sociating elements of two sets have been proposed and extensively used in single robot Simultaneous Localization And Mapping (SLAM) settings. These include but are not limited to Nearest Neighbor (NN) and Maximum Likelihood (ML) approaches [18], [40], Iterative Closest Point (ICP) [5], RANSAC [8], Joint Compatibility Branch and Bound (JCBB) [25], Maximum Common Subgraph (MCS) [3], Random Finite Sets (RFS) [33]. More recently, multi-robot localization and mapping algorithms have been developed. In almost all of them, the data association is addressed either in a pairwise fashion by directly generalizing data association techniques from the single robot case [7], [9], [34] or by considering all associations jointly in a centralized manner [16]. Closer to our approach is the work by Aragues et al. [1] which is a decentralized method for finding inconsistencies based on cycle detection. However, the proposed inconsis- tency resolution algorithm comes without any optimality or guarantees. III. PRELIMINARIES, NOTATION AND DEFINITIONS A. Graph Theory In this subsection, we review some elementary facts from graph theory. For an in depth analysis, we refer the reader to standard texts [10], [24]. An undirected graph or simply a graph is denoted by the pair G = (V,E), where V = {1, 2, . . . , n} is the set of vertices and E ⊆ [V]2 is the set of edges, where [V]2 denotes the set of unordered pairs of elements of V. The neighborhood Ni of the vertex i is the subset of V defined by Ni = {j ∈ V {i, j} ∈ E}. A path is a sequence i0, i1, . . . , im of distinct vertices such that {ik−1, ik} ∈ E for all k = 1, . . . , m. A graph is connected if there is a path between any two vertices. Given a graph G = (V,E), its adjacency matrix is defined by if {i, j} ∈ E (cid:26) 1, [A(G)]ij = (1) 0, otherwise The degree matrix ∆(G) is the diagonal matrix such that [∆(G)]ii = Ni, where · denotes the cardinality of a set. A directed graph or digraph is denoted by the pair G = (V,E), where E ⊆ V×V. A weighted digraph G = (V,E, w) is a graph along with a function w : E → R+. The adjacency matrix of a weighted digraph is defined by if (j, i) ∈ E otherwise [A(G)]ij = 0, (2) Intuitively, if [A(G)]ij > 0 there is information flow from vertex j to vertex i. The neighborhood Ni of the vertex i is the subset of V defined by Ni = {j ∈ V (j, i) ∈ E}. The degree matrix ∆(G) (cid:26) w(j, i), (cid:88) j∈Ni [∆(G)]ii = din(i) . = [A(G)]ij (3) A directed path is a sequence i0, i1, . . . , im of distinct ver- tices such that (ik−1, ik) ∈ E for all k = 1, . . . , m. A digraph is strongly connected if there is a directed path between any two vertices. A digraph is a rooted out-branching tree if it has a vertex to which all other vertices are path connected and does not contain any cycles. A digraph is balanced if the in- (i,j)∈E [A(G)]ji degree din(i) and the out-degree dout(i) are equal for all i ∈ V. From this point and on, all graphs under consideration are assumed to be directed unless stated otherwise. The graph Laplacian L(G) is defined as =(cid:80) . L(G) = ∆(G) − A(G) (4) By construction, L(G)1 = 0. A digraph on n vertices contains a rooted-out branching if and only the rank of its Laplacian is n − 1. A matrix closely related to the graph Laplacian is defined by F (G) = (I + ∆(G))−1(I + A(G)) . (5) B. Stochastic Matrices and Permutations Stochastic matrices and their properties have been well studied in the area of distributed dynamical systems [4], [17], [27] and in probability theory in the context of computing invariant distributions of Markov chains [2], [4]. A nonneg- ative square matrix is stochastic if all its row sums are equal to 1. The spectral radius ρ(A) of a stochastic matrix A is equal to 1 and it is an eigenvalue of A since A1 = 1. The existence and the form of the limit limk→∞ Ak depends on the multiplicity of 1 as an eigenvalue. A nonegative square matrix A is irreducible if its associated graph [13] is strongly connected. An irreducible stochastic matrix is primitive if it has only one eigenvalue of maximum modulus. A nonnegative square matrix is doubly stochastic matrix if both its row sums and column sums are equal to 1. A doubly stochastic matrix is a permutation matrix if its elements are either 0 or 1. The sets of stochastic matrices and doubly stochastic matrices are compact convex sets. This is a rather useful property since it implies closure under convex combinations. For more details, regarding the theory of stochastic matrices, we refer the reader to [13]. = {1, 2, . . . , n} for some positive integer n. A . if it is a permutation of [n] [n] → [n] mapping π : Let [n] (cid:26) 1, is bijective. The set of all permutations of [n] forms a group under composition, termed the symmetric group Sn. A permutation π ∈ Sn is represented 1 by a n× n permutation matrix Π defined by [Π]ij = if π(j) = i 0, otherwise (6) or equivalently Πej = eπ(j), where ej is the jth canonical basis vector. The simplest choice for a distance on Sn is given by d(π1, π2) = d(e, π−1 1 π2) = n − (cid:104)Π1, Π2(cid:105) . (7) where (cid:104)A, B(cid:105) . = tr(AT B), e is the identity map and Π1, Π2 are the matrix representations of the permutations π1 and π2 respectively. The distance function defined above is simply the number of labels assigned differently by permutations π1 and π2. With a slight abuse of notation, we write Π ∈ Sn meaning that Π is an n × n permutation matrix. C. Consensus Algorithms Consensus algorithms have been extensively studied in the control community [4], [17], [27]. In its simplest form, a consensus algorithm is a decentralized protocol in which the agents, modeled as vertices of a graph, try to reach agreement by communicating only with their neighbors. More formally, let xi(t) ∈ R denote the state of agent i at time time t. The, the simplest consensus protocol is given by (cid:88) j∈Ni∪i aijxj(t) (8) xi(t + 1) = where aij ≥ 0 and (cid:80) j aij = 1. A popular consensus protocol [27], which converges to the average of the initial values provided that G is balanced, is described by x(t + 1) = (I − L(G))x(t) (9) where x = [x1, . . . , xn]T and 0 <  < 1/ maxi[∆(G)]ii. IV. PROBLEM FORMALIZATION In this section, we formalize the problem of consistent data association. We assume there are n sensors observing m targets. For instance, assume we have a set of n cameras observing a scene in the world described by a set of m feature points. Sensors communicate only with a subset of all sensors. Communication constraints between sensors are encoded by the sensor graph. The sensor graph is the digraph G = (V,E) where V = {1, 2, . . . , n} and (i, j) ∈ E if there is information flow from sensor i to j. The pairwise associa- tion πij ∈ Sm is defined as follows: we have that πij(l) = k if the lth target in jth sensor corresponds to the kth target in ith sensor. Observe that the pairwise associations πij can be written as πij = πi ◦ π−1 , where πi ∈ Sm is the mapping from the labels of sensor i to some global labels, termed the "universe of features" in some works [6], [39]. This is analogous to the absolute position in Euclidean spaces in 1A representation of a group G on Rn is a map ρ : G → GL(n) j satisfying ρ(g1g2) = ρ(g1)ρ(g2). S1 S2 S3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 . = ρ(πi). Fig. 2. Example with n = 3 sensors S1, S2, S3 observing m = 3 targets. Top: consistent data association. Bottom: inconsistent data association since π12 ◦ π23(2) = 3 but π31(2) = 2. localization problems. We denote by(cid:101)πij ∈ Sm the, possibly and j and by (cid:101)Πij the corresponding matrix representation. erroneous, estimated pairwise association between sensor i First, we need a precise definition of consistency. Definition 4.1 (Consistency): A set of pairwise associa- Moreover, let Πi Related to the sensor graph is the data association graph D = (VD,ED, wD), where VD = V × {1, 2, . . . , m}. There is an edge from (i, k) to (j, l) if and only if (i, j) ∈ E and [(cid:101)Πij]kl > 0. The corresponding edge weight is simply equal to [(cid:101)Πij]kl. tions {(cid:101)πij}(i,j)∈E is consistent if {(cid:101)πij}(i,j)∈E, if(cid:101)πij = πi ◦ π−1 (10) for all valid indices i, j, k. A set of labels {πi}n i=1 is con- sistent with respect to some consistent pairwise associations (11) Based on the definition of consistency, the problem of consistent data association is naturally defined as follows. (cid:101)πij ◦(cid:101)πjk =(cid:101)πik ∀(i, j) ∈ E , j Definition 4.2 (Consistent data association): associations {(cid:101)πij}(i,j)∈E, find labels Given pairwise π1, . . . , πn ∈ Sm, such that (cid:101)πij = πi ◦ π−1 j ∀ (i, j) ∈ E , (12) Remark 1: Under the presence of noise, it might not be i=1 satisfying (12) exactly. There- i=1 satisfying possible to find labels {πi}n fore, in practice we are looking for labels {πi}n (12) as much as possible according to some criterion. V. DISTRIBUTED AVERAGING In the classic consensus algorithms, each agent updates his estimate of a collective quantity by taking convex combina- tions of the estimates of his neighbors. The problem at hand is different: we do not want all πi's to converge to the same value, rather to converge to a value satisfying consistency. The first obstacle one encounters is the combinatorial nature of the problem at hand. Therefore, we relax the domain of problem and work with doubly stochastic matrices instead of permutation matrices. This is a natural choice since the convex hull of the set of m × m permutation matrices is exactly the set of m × m doubly stochastic matrices. A. Algorithm Based on the previous discussion, we propose the follow- ing update rule: Πi(t + 1) = 1 Ni + 1 (cid:0)Πi(t) + (cid:88) j∈Ni (cid:101)ΠijΠj(t)(cid:1) (13) Let Π = [ΠT 1 , . . . , ΠT n ]T . The update rule (13) can be collectively written as Π(t + 1) = F (D)Π(t) (14) where D is the data association graph and F (D) is defined in (5). The convergence properties of the update rule (13) de- pend solely on limk→∞ F (D)k and Π(0). These properties will be presented in Section V-B. After the convergence of Protocol (13), we discretize the solution by solving the assignment problem, formally defined by (cid:104)(cid:101)Πi, Πi(cid:105) maximize subject to Πi ∈ Sm Πi (15) (16) (17) where (cid:101)Πi is the result of Protocol (13). The assignment problem can be solved using the Hungarian algorithm [22] in O(m3) time. Remark 2: The update rule (13) can be seen as a discrete- time system with state Πi and control input Ui, i.e. Πi(t + 1) = Πi(t) + Ui(t) Ui(t) = 1 Ni + 1 (cid:0)(cid:101)ΠijΠj(t) − Πi(t)(cid:1) (cid:88) j∈Ni Remark 3: (Intrinsic ambiguity) Let {Πi}n i=1 ∈ (Sm)n be a set of consistent labels. Then, for any Π0 ∈ Sm, {ΠiΠ0}n i=1 are consistent as well. This intrinsic ambiguity is analogous to the ambiguity of the global reference frame in rotation localization [30]. To remove this ambiguity, one can fix the label of one sensor, say the first sensor, by modifying the sensor graph G so that the first sensor has only outgoing edges resulting in Π1(t) = Π1(0) ∈ Sm for all t ≥ 0. This approach is necessary in the presence of noise and we will refer to it as Protocol (13) with a distinguished vertex. Remark 4: (Equivalence to consensus) In the noiseless j0 for some consistent set i=1 ∈ (Sm)n . By defining new variables case, we can write (cid:101)Πij = Πi0Π−1 (cid:0)Π(cid:48) = Π−1 . i0 Πi, we obtain Π(cid:48) i(t + 1) = of labels {Πi0}n Π(cid:48) j(t)(cid:1) (cid:88) i(t) + (18) Π(cid:48) 1 i Ni + 1 j∈Ni which is a component-wise Vicsek model [17], [32]. B. Properties First of all, as the sets of stochastic and doubly stochastic matrices are convex and thus, closed under convex combi- nations, we naturally have the following lemma. Lemma 5.1: If all(cid:101)Πij and Πi(0) are stochastic then, Πi(t) is stochastic for all t ≥ 0. Similarly, if all (cid:101)Πij and Πi(0) are doubly stochastic then, Πi(t) is doubly stochastic for all t ≥ 0. Next, we show that in the noiseless case Protocol (13) with a distinguished vertex converges to a consistent solution under mild coniditions on the sensor graph. To prove this, we need the following lemma: Lemma 5.2: Given a digraph G that contains a rooted-out branching tree, we have that the matrix F (G) as defined in (5) satisfies: (a) ρ(F (G)) = 1, (b) 1 is an algebraically simple eigenvalue of F (G) with corresponding eigenvector √ 1/ n and (c) the limit F (G) exists and is given by k→∞ F (G)k = 1cT , lim (19) where c ≥ 0 and cT 1 = 1. A proof of lemma 5.2 can be found in Appendix IX-A. Next, we present the theorem of convergence of Protocol 13 to a consistent labeling from arbitrary initialization. A proof of theorem 5.3 is presented in Appendix IX-B and heavily relies on lemma 5.2. Theorem 5.3: If the sensor graph G contains a rooted- out branching and the pairwise associations are noiseless, then the consensus protocol with the distinguished vertex converges to a set of consistent labels up to a global permutation, that is (20) lim t→∞ Πi(t) = Πi0Π0 where {Πi0}n to (cid:101)Πij) and Π0 is an arbitrary permutation. Furthermore, if i=1 is a consistent set of labels (with respect vertex 1 is the distinguished vertex, then Π0 = ΠT 10Π1(0). However, in the general case, pairwise associations will contain noise. Therefore, we should prove convergence with- out assuming perfect associations. We generalize lemma 5.2 for the case of interest. Consider a digraph D with n vertices and m < n distinguished vertices that have only outgoing edges. Assume that for every non-distinguished vertex there is a (directed) path from at least one distinguished vertex. Then, the succeeding lemma provides us with the limit of F (D). Lemma 5.4: The matrix F (D) as defined in (5) satisfies: (a) ρ(F (D)) = 1, (b) F (D) has 1 as an eigenvalue with algebraic and geometric multiplicities equal to the number of distinguished vertices, (c) it asymptotically converges to a limit of the form k→∞ F (D)k = lim (21) A proof of lemma 5.4 is presented in Appendix IX-C. An immediate consequence of lemma 5.4 is the following theorem. Theorem 5.5: If the sensor graph G contains a rooted-out branching, then the consensus protocol with a distinguished (cid:20) Im 0 (cid:21) (cid:101)F21 0 vertex asymptotically converges to a solution that depends only on {(cid:101)Πij}(i,j)∈E and on the initial value of the labels of the distinguished vertex. Remark 5: Although Protocol (13) is not guaranteed to converge to the true solution in the presence of noise, it is verified experimentally (see Section VII) that for moderate levels of noise the true solution is still recovered. VI. DISTRIBUTED ORTHOGONAL ITERATION In this section, we present a decentralized implementation of the spectral method proposed by Pachauri et al. [28]. First, we briefly review the main concept of [28]. Based on the discussion in Section IV, the multi-sensor data association can be cast as the following optimization problem: (22) (23) minimize π1,π2,...,πn∈Sm which is equivalent to maximize Π1,Π2,...,Πn∈Sm (cid:88) (cid:88) (i,j)∈E (i,j)∈E ) j d((cid:101)πij, πi ◦ π−1 i (cid:101)ΠijΠj) tr(ΠT In the above formulation, each Πi is a permutation matrix which makes the problem computationally intractable. How- ever, if the individual constraints are relaxed into a single col- lective constraint of the form ΠT Π = mIm as proposed in [28], the relaxed problem becomes computationally tractable since it becomes a Rayleigh quotient problem: maximize tr(ΠT PΠ) Π (24) where [P]ij = (cid:101)Πij. It is a well-known fact that the solution subject to ΠT Π = mIm of problem (24) is given by the matrix having as columns m. the m leading eigenvectors of P scaled by a factor of Numerically, the optimal solution in a centralized setting can be computed using Orthogonal Iteration [11] (see Algorithm 1). Intuitively, each iteration consists of two main steps: a power step and an orthogonalization step based on QR- decomposition. For details on the convergence of Orthogonal Iteration we refer the reader to [11] and references therein. √ Algorithm 1 Orthogonal Iteration Require: Input matrix P, initial Π(0) 1: for t = 0, . . . , N do 2: 3: 4: 5: end for Y(t) = PΠ(t) Q(t)R(t) = Y(t) Π(t + 1) = Q(t) The Orthogonal Iteration method is not readily decentral- izable since the QR-decomposition step requires information from the entire sensor graph. Nevertheless, as observed by Kempe and McSherry [20], n ]T where each sub-matrix Yi is available at sensor i, we obtain i Yi can be computed in a decentralized manner, then we can recover R(t) using Cholesky factorization. Let Zi i Yi and RT R = YT Y =(cid:80)n i Yi. If the sum (cid:80)n i=1 Y T . = nY T if Y = [Y T 1 , . . . , Y T i=1 Y T (cid:80)n . = 1 n i=1 Zi = RT R. Based on this observation, if all Z sensors know n and solve a consensus problem for com- puting the average Z = RT R, then the orthogonalization step can be performed locally using Cholesky decomposition. This is summarized in Algorithm 2 where Z i denotes the i Yi can be computed using the Push-Sum algorithm [19] as in [20]. estimate of Z by sensor i. Alternatively, the sum(cid:80)n i=1 Y T Remark 6: Kempe and McSherry [20] have shown that if the error in the computation of Ri can be made arbitrarily small in finite iterations, then Distributed Orthogonal Iter- ation converges asymptotically an invariant subspace of the input matrix. A rigorous analysis on the number of iterations of the inner consensus is the subject of future work. Algorithm 2 Distributed Orthogonal Iteration Require: Input associations {(cid:101)Πij}(i,j)∈E, initial {Πi(0)}i∈V Yi(t) =(cid:80) j∈Ni∪{i}(cid:101)ΠijΠj(t) 1: for t = 0, . . . , N do 2: 3: 4: 5: 6: end for Estimate Z i(t) by consensus. Ri(t) = chol(Z i(t)) Πi(t + 1) = Yi(t)Ri(t)−1 Remark 7: Due to the nonlinear dependence of Zi on Yi, dynamic consensus algorithms [29] cannot be readily incorporated into the current approach. The solution obtained by the Orthogonal Iteration is opti- mal up to an arbitrary m×m orthogonal transformation. That is, if Π(cid:63) is an optimal solution of (24), then any matrix of the form Π(cid:63)Q with Q ∈ O(m) is optimal as well. Finally, the corrective orthogonal transformation is computed by solving the following Orthogonal Procrustes [11] problem: minimize Q∈O(m) (cid:107)I − Π1Q(cid:107)2 F (25) It is well known [11] that if Π1 = U SV T is an SVD of Π1, then Q(cid:63) = V U T . As a final step, we apply the corrective transformation Q to all remaining Πi, i = 2, . . . , n and then find a discrete solution by the Hungarian algorithm. VII. EXPERIMENTS A. Synthetic data First, we experiment with synthetic data to validate the accuracy of proposed methods across different problem settings. We generate instances with m = 50 targets and n ∈ {20, 50, 100} sensors. As a performance criterion we use the accuracy of the obtained labels, which is simply defined as the percentage of correct labels. We vary the percentage of erroneous associations in each pairwise association from 10% to 90% to test the robustness of each method against the presence of outliers. We first experiment with a fully connected graph, see Fig. 3 (a)-(c), and then we remove half of the edges, see Fig. 3 (d)-(f). In the case of a fully con- nected graph, the consensus protocol achieves exact recovery of the labels for up to approximately 40% of outliers. The spectral method clearly outperforms the consensus protocol and is able to achieve exact recovery for up to 80%-90% of outliers. By reducing either the number of edges in the sensor graph or the number of sensors, the accuracy of both methods slightly drops. As expected, the benefit of using joint matching in accuracy increases with the size of the network and the number of edges. B. Real data First, we experiment with the CMU hotel sequence 2 which consists of 111 frames and the CMU house 3 sequence which consists of 101 frames. We detect corner features [12] in the first image that remain visible across the entire sequence. The ground-truth associations are obtained by tracking the features across the entire sequence. Specifically, we used 89 points in the hotel sequence and 55 in the house sequence. Pairwise matches are computed between an image and at most 10 previous images and 10 subsequent images in the sequence, thus the sensor graph is relatively sparse. Pairwise matches are obtained by extracting SIFT descriptors [23] and then solving the assignment problem using the Hungarian algorithm. We used the SIFT implementation of [31]. The baseline method consists of obtaining labels by directly matching with the first image in the sequence. The ground-truth associations are extracted by tracking the features over the sequence. The results are presented in Table I. Both methods significantly outperform the baseline which shows that joint matching can significantly improve the overall matching performance. TABLE I CMU DATASETS RESULTS Dataset House Hotel Baseline 0.716 0.666 Spectral 0.861 0.872 Consensus 0.887 0.878 Next, we experiment with the Affine Covariant Regions Datasets 4 which consist of sequences of 6 images with significant overlap but with viewpoint variability. We detect approximately 300 SIFT features [23] in each sequence that are visible across the entire sequence. The ground- truth associations are extracted using the available ground- truth homographies. The results are presented in Table II. Both methods significantly outperform the baseline in the two challenging sequences Graffiti and Wall. However, in the remaining sequences the input pairwise associations are already very accurate resulting in only minor improvements if any. It the spectral method and the consensus method have similar performance in all real sequences despite the fact that the spectral method is com- putationally more expensive. Therefore, in situations where the computational resources are limited, for instance swarms of UAVs with on-board cameras, the consensus algorithm would be preferable. is worth noting that 2 http://vasc.ri.cmu.edu//idb/html/motion/hotel/ 3http://vasc.ri.cmu.edu//idb/html/motion/house 4http://www.robots.ox.ac.uk/vgg/data/data-aff. html TABLE II GRAFFITI DATASETS RESULTS Dataset Graffiti Wall Trees Leuven Bikes UBC Baseline 0.544 0.570 0.912 0.962 0.986 0.996 Spectral 0.639 0.646 0.902 0.972 0.987 0.996 Consensus 0.647 0.658 0.909 0.979 0.987 0.996 VIII. CONCLUSIONS AND FUTURE WORK In this paper, we proposed two fully decentralized methods for the problem of data association in sensor networks. The first was a computationally inexpensive consensus-like algorithm and the second a decentralized spectral method. We presented experimental results in the context of camera sensor networks. We believe that the results of this work will find applications in other settings as well. In the future, we plan on generalizing these algorithms in order to handle different number of targets in each sensor and time-varying pairwise associations. IX. APPENDIX A. Proof of lemma 5.2 First, we need the following lemma: Lemma 9.1: Let Li(G) be the matrix obtained from the Laplacian L(G) by removing the ith row and ith column. Define Fi(G) analogously. Then, det(I − Fi(G)) (cid:54)= 0 det(Li(G)) (cid:54)= 0 iff (26) Proof: By construction L(G) = (I + ∆(G))(I − F (G)) and thus, Li(G) = (I + ∆i(G))(I − Fi(G)) since ∆(G) is diagonal. Therefore, since det(I + ∆i(G)) > 0, we have that det(Li(G)) (cid:54)= 0 if and only if det(I − Fi(G)) (cid:54)= 0. Now, we are ready to proceed to the proof of lemma 5.2 By Gersgorin's discs theorem, we know that the eigenvalues of F (G) lie in the unit circle and since it is stochastic, that is F 1 = 1, it can be immediately concluded that ρ(F (G)) = 1. From Proposition 3.8 page 51 of [24], we have that if the (directed) graph G contains a rooted-out branching as a subgraph, then rank L(G) = n − 1. Combining this result with 9.1, we conclude that the existence of a rooted-out branching implies that rank(I−F (G)) = n−1. We conclude that 1 is a simple eigenvalue of F (G). Let λ1, λ2, . . . , λn be an enumeration of the eigenvalues of F (G) such that λ1 = 1. Moreover, let F (G) = P J(Λ)P −1 be the Jordan decomposition of F (G). From, F (G)P = P J(Λ), it is easy to see that the the first column of P is in the span of 1 and thus, limk→∞ F (G)k = 1cT . Moreover, since F (G)k is stochastic for all positive integers k, it follows that c ≥ 0 and cT 1 = 1. B. Proof of theorem 5.3 In the noiseless case, observe that F (D) = Π0 (F (G) ⊗ Im) ΠT 0 , (27) 1 0.8 0.6 0.4 0.2 1 0.8 0.6 0.4 0.2 y c a r u c c a y c a r u c c a CS SP CS SP y c a r u c c a y c a r u c c a 1 0.8 0.6 0.4 0.2 0 0 0.2 0.6 0.4 0.8 Fraction of outliers 1 (b) n = 50 1 0.8 0.6 0.4 0.2 0 0 0.2 0.6 0.4 0.8 Fraction of outliers 1 (e) n = 50 CS SP CS SP y c a r u c c a y c a r u c c a CS SP CS SP 1 0.8 0.6 0.4 0.2 0 0 0.2 0.6 0.4 0.8 Fraction of outliers 1 (c) n = 100 1 0.8 0.6 0.4 0.2 0 0 0.2 0.6 0.4 0.8 Fraction of outliers 1 (f) n = 100 0 0.2 0.6 0.4 0.8 Fraction of outliers 1 (a) n = 20 0 0.2 0.6 0.4 0.8 Fraction of outliers 1 (d) n = 20 Fig. 3. Accuracy of consensus protocol (CS) and spectral method (SP) versus percentage of outliers in pairwise data associations. Fig. 4. consensus algorithm. Top: initial matches. Blue color corresponds to inlier matches whereas red color corresponds to outlier matches. Bottom: matches after the where Π0 = diag(Π10, . . . , Πn0), each Πi0 ∈ Sm satisfies Πi0ΠT j0 = (cid:101)Πij. k→∞ F (D)k = Π0 (F (G)∞ ⊗ Im) ΠT lim 0 (28) since limk→∞ F (G)k exists as we proved earlier. It follows that F (D)k converges to a limit as well. Any asymp- totic solution of the consensus protocol satisfies Π(∞) = F (D)Π(∞). Then, for all i ∈ {1, . . . , n} we have Πi(∞) = j0, we get (1/Ni)(cid:80) j∈Ni(cid:101)ΠijΠj(∞). Using (cid:101)Πij = Πi0ΠT  = 0 ΠT (L(G) ⊗ Im) 10Π1(∞) ... n0Πn(∞) ΠT Under the assumption that G is contains a rooted-out branch- ing and thus, null(L(G)) = span(1), we obtain Πi(∞) = Πi0Q where Q is an arbitrary matrix Q. Moreover, if one enforces Π1(t) = Π1(0), Π1(0) ∈ Sm, for all t ≥ 0, it 10Π1(0), follows that Q = ΠT that is equal to any valid labels up to a global permutation. (cid:4) 10Π1(0 and Πi(∞) = Πi0ΠT C. Proof of lemma 5.4 Part (a) follows from the fact that F (G) is stochastic. Without loss of generality, assume that vertices {1, 2, . . . , m} are the distinguished ones. Then, F (G) takes the form (cid:20) Im (cid:21) F (G) = 0 F21 F22 (29) For all k = 1, 2, . . . we have by a simple induction: (cid:20) Im (cid:21) F (G)k = 0 F21,k F k 22 (30) where F21,1 = F21, F21,k+1 = F21,k + F k 22F21 By the assumption that every non-distinguished vertex is path-connected to some distinguished vertex, it follows that for k > 0 large enough, each row of F21,k contains at least one positive entry. Thus, all eigenvalues of F k 22 lie strictly (cid:4) inside the unit circle and thus, limk→∞ F k 22 = 0. REFERENCES [1] Rosario Aragues, Eduardo Montijano, and Carlos Sagues. Consistent data association in multi-robot systems with limited communications. In Robotics: Science and Systems, pages 97 -- 104, 2011. [2] Søren Asmussen. Applied probability and queues, volume 51. Springer Science & Business Media, 2008. [3] Tim Bailey and Eduardo Nebot. Localisation in large-scale environ- ments. Robotics and autonomous systems, 37(4):261 -- 281, 2001. [4] Dimitri P Bertsekas and John N Tsitsiklis. Parallel and distributed computation: numerical methods, volume 23. Prentice hall Englewood Cliffs, NJ, 1989. [5] Paul J Besl and Neil D McKay. Method for registration of 3-d shapes. In Robotics-DL tentative, pages 586 -- 606. International Society for Optics and Photonics, 1992. [6] Yuxin Chen, Leonidas Guibas, and Qixing Huang. Near-optimal joint In International Conference object matching via convex relaxation. on Machine Learning, 2014. [7] Alexander Cunningham, Kai M Wurm, Wolfram Burgard, and Frank Dellaert. Fully distributed scalable smoothing and mapping with robust multi-robot data association. In Robotics and Automation (ICRA), 2012 IEEE International Conference on, pages 1093 -- 1100. IEEE, 2012. [8] Martin A Fischler and Robert C Bolles. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Communications of the ACM, 24(6):381 -- 395, 1981. [9] Dieter Fox, Jonathan Ko, Kurt Konolige, Benson Limketkai, Dirk Schulz, and Benjamin Stewart. Distributed multirobot exploration and mapping. Proceedings of the IEEE, 94(7):1325 -- 1339, 2006. [10] Chris Godsil and Gordon F Royle. Algebraic graph theory, volume 207. Springer Science & Business Media, 2013. [11] Gene H Golub and Charles F Van Loan. Matrix computations, volume 3. JHU Press, 2012. [12] Chris Harris and Mike Stephens. A combined corner and edge detector. In Alvey vision conference, volume 15, page 50. Citeseer, 1988. [13] Roger A Horn and Charles R Johnson. Matrix analysis. Cambridge university press, 2012. [14] Qi-Xing Huang and Leonidas Guibas. Consistent shape maps via semidefinite programming. Computer Graphics Forum, 32(5):177 -- 186, 2013. [15] Qi-Xing Huang, Guo-Xin Zhang, Lin Gao, Shi-Min Hu, Adrian Butscher, and Leonidas Guibas. An optimization approach for ex- tracting and encoding consistent maps in a shape collection. ACM Transactions on Graphics, 31(6):167, 2012. [16] Vadim Indelman, Erik Nelson, Nathan Michael, and Frank Dellaert. Multi-robot pose graph localization and data association from un- In 2014 known initial relative poses via expectation maximization. IEEE International Conference on Robotics and Automation (ICRA), pages 593 -- 600. IEEE, 2014. [17] Ali Jadbabaie, Jie Lin, and A Stephen Morse. Coordination of groups IEEE of mobile autonomous agents using nearest neighbor rules. Transactions on automatic control, 48(6):988 -- 1001, 2003. [18] Michael Kaess and Frank Dellaert. Covariance recovery from a square root information matrix for data association. Robotics and autonomous systems, 57(12):1198 -- 1210, 2009. [19] David Kempe, Alin Dobra, and Johannes Gehrke. Gossip-based In Foundations of Computer computation of aggregate information. Science, 2003. Proceedings. 44th Annual IEEE Symposium on, pages 482 -- 491. IEEE, 2003. [20] David Kempe and Frank McSherry. A decentralized algorithm for In Proceedings of the thirty-sixth annual ACM spectral analysis. symposium on Theory of computing, pages 561 -- 568. ACM, 2004. [21] Vladimir G Kim, Wilmot Li, Niloy J Mitra, Stephen DiVerdi, and Thomas A Funkhouser. Exploring collections of 3d models using fuzzy correspondences. ACM Transactions on Graphics, 31(4):54, 2012. [22] Harold W Kuhn. The hungarian method for the assignment problem. Naval research logistics quarterly, 2(1-2):83 -- 97, 1955. [23] David G Lowe. Distinctive image features from scale-invariant International journal of computer vision, 60(2):91 -- 110, keypoints. 2004. [24] Mehran Mesbahi and Magnus Egerstedt. Graph theoretic methods in multiagent networks. Princeton University Press, 2010. [25] Jos´e Neira and Juan D Tard´os. Data association in stochastic mapping using the joint compatibility test. IEEE Transactions on robotics and automation, 17(6):890 -- 897, 2001. [26] Andy Nguyen, Mirela Ben-Chen, Katarzyna Welnicka, Yinyu Ye, and Leonidas Guibas. An optimization approach to improving collections of shape maps. Computer Graphics Forum, 30(5):1481 -- 1491, 2011. [27] Reza Olfati-Saber, J Alex Fax, and Richard M Murray. Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE, 95(1):215 -- 233, 2007. [28] Deepti Pachauri, Risi Kondor, and Vikas Singh. Solving the multi- way matching problem by permutation synchronization. In Advances in neural information processing systems, pages 1860 -- 1868, 2013. [29] Demetri P Spanos, Reza Olfati-Saber, and Richard M Murray. Dy- namic consensus on mobile networks. In IFAC world congress, pages 1 -- 6. Prague Czech Republic, 2005. [30] Roberto Tron and Rene Vidal. Distributed 3-d localization of camera sensor networks from 2-d image measurements. Automatic Control, IEEE Transactions on, 59(12):3325 -- 3340, 2014. [31] Andrea Vedaldi and Brian Fulkerson. Vlfeat: An open and portable library of computer vision algorithms. In Proceedings of the 18th ACM international conference on Multimedia, pages 1469 -- 1472. ACM, 2010. [32] Tam´as Vicsek, Andr´as Czir´ok, Eshel Ben-Jacob, Inon Cohen, and Ofer Shochet. Novel type of phase transition in a system of self-driven particles. Physical review letters, 75(6):1226, 1995. [33] B-N Vo, Sumeetpal Singh, and Arnaud Doucet. Sequential monte carlo methods for multitarget filtering with random finite sets. IEEE Transactions on Aerospace and electronic systems, 41(4):1224 -- 1245, 2005. [34] Stefan B Williams, Gamini Dissanayake, and Hugh Durrant-Whyte. Towards multi-vehicle simultaneous localisation and mapping. In Robotics and Automation, 2002. Proceedings. ICRA'02. IEEE Inter- national Conference on, volume 3, pages 2743 -- 2748. IEEE, 2002. [35] Junchi Yan, Minsu Cho, Hongyuan Zha, Xiaokang Yang, and Stephen M Chu. Multi-graph matching via affinity optimization with IEEE transactions on pattern graduated consistency regularization. analysis and machine intelligence, 38(6):1228 -- 1242, 2016. [36] Junchi Yan, Jun Wang, Hongyuan Zha, Xiaokang Yang, and Stephen Chu. Consistency-driven alternating optimization for multigraph matching: A unified approach. IEEE Transactions on Image Process- ing, 24(3):994 -- 1009, 2015. [37] Christopher Zach, Manfred Klopschitz, and Manfred Pollefeys. Dis- ambiguating visual relations using loop constraints. In IEEE Confer- ence on Computer Vision and Pattern Recognition, 2010. [38] Tinghui Zhou, Yong Jae Lee, X Yu Stella, and Alexei A Efros. Flowweb: Joint image set alignment by weaving consistent, pixel-wise correspondences. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015. [39] Xiaowei Zhou, Menglong Zhu, and Kostas Daniilidis. Multi-image In Proceedings of the matching via fast alternating minimization. IEEE International Conference on Computer Vision, pages 4032 -- 4040, 2015. [40] Xun S Zhou and Stergios I Roumeliotis. Multi-robot slam with unknown initial correspondence: The robot rendezvous case. In 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, pages 1785 -- 1792. IEEE, 2006.
1909.13204
1
1909
2019-09-29T05:41:50
Clustering Strategies of Cooperative Adaptive Cruise Control: Impacts on Human-driven Vehicles
[ "cs.MA" ]
As a promising application of connected and automated vehicles (CAVs), Cooperative Adaptive Cruise Control (CACC) is expected to be deployed on the public road in the near term. Thus far the majority of the CACC studies have been focusing on the overall network performance with limited insight on the potential impact of CAVs on human-driven vehicles (HVs). This paper aims to quantify the influence of CAVs on HVs by studying the high-resolution vehicle trajectory data that is obtained from microscopic simulation. Two clustering strategies for CACC are implemented: an ad hoc coordination one and a local coordination one. Results show that the local coordination outperforms the ad hoc coordination across all tested market penetration rates (MPRs) in terms of network throughput and productivity. The greatest performance difference between the two strategies is observed at 30% and 40% MPR for throughput and productivity, respectively. However, the distributions of the hard braking observations (as a potential safety impact) for HVs change significantly under local coordination strategy. Regardless of the clustering strategy, CAVs increase the average lane change frequency for HVs. 30% MPR is the break-even point for local coordination, after which the average lane change frequency decreases from the peak 5.42 to 5.38. Such inverse relationship to MPR is not found in the ah hoc case and the average lane change frequency reaches the highest 5.48 at 40% MPR.
cs.MA
cs
Clustering Strategies of Cooperative Adaptive Cruise Control: Impacts on Human-driven Vehicles Zijia Zhong Mark Nejad Earl E. Lee II Department of Civil and Environmental Engineering University of Delaware Newark, DE, USA Email: {zzhong, elee, nejad}@udel.edu Joyoung Lee John A. Reif, Jr. Department of Civil and Environmental Engineering New Jersey Institute of Technology Newark, NJ, USA Email: [email protected] Abstract -- As a promising application of connected and au- tomated vehicles (CAVs), Cooperative Adaptive Cruise Control (CACC) is expected to be deployed on the public road in the near term. Thus far the majority of the CACC studies have been focusing on the overall network performance with limited insight on the potential impact of CAVs on human-driven vehicles (HVs). This paper aims to quantify the influence of CAVs on HVs by studying the high-resolution vehicle trajectory data that is obtained from microscopic simulation. Two clustering strategies for CACC are implemented: an ad hoc coordination one and a local coordination one. Results show that the local coordination outperforms the ad hoc coordination across all tested market penetration rates (MPRs) in terms of network throughput and productivity. The greatest performance difference between the two strategies is observed at 30% and 40% MPR for throughput and productivity, respectively. However, the distributions of the hard braking observations (as a potential safety impact) for HVs change significantly under local coordination strategy. Regardless of the clustering strategy, CAVs increase the average lane change frequency for HVs. 30% MPR is the break-even point for local coordination, after which the average lane change frequency decreases from the peak 5.42 to 5.38. Such inverse relationship to MPR is not found in the ah hoc case and the average lane change frequency reaches the highest 5.48 at 40% MPR. Index Terms -- CAV Clustering, Cooperative Adaptive Cruise Control, Vehicle Trajectory Analysis, Mixed Traffic Condition, Traffic Flow Characteristics I. INTRODUCTION Cooperative adaptive cruise control (CACC) enables closely-coupled vehicular platoons by the extra layers of communication and automation. Being one of the most-studied application of CAVs, CACC is expected to drastically increase mobility, decrease emission, while providing a safer and more convenient way for occupants. The CACC evaluation thus far has been focusing on the benefits that CAV could potentially bring to our transportation network. The potential impact on non-equipped vehicles (i.e. Human-driven vehicles(HVs)) has been overlooked. The motivation of the study is twofold. First, studying CACC under mixed traffic conditions in anticipation of its near-term deployment has gained an increasing amount of attention. It is the consensus that CACC can improve the performance of our transportation system. However, the pos- sible change of the flow characteristic of HVs has often been overlooked. CACC may alter the behavior of the HVs especially when active clustering strategy is employed. The expected impact on HVs from CACC could include: i) the ad- ditional weaving during CACC clustering, ii) the lane change by HVs induced by CACC clustering, iii) increase collision risk, and iv) lane blockage by CACC platoon. Furthermore, the majority of CACC studies focused on the longitudinal move- ment and put less emphasis on the lateral movement of CAVs which is vital in cooperative driving. The lateral control when it comes to local coordination of forming CACC platoons has to be taken into account, as the development of CACC vehicle progresses. By implementing local coordination, the CACC platoon ratio and consequently the network performance can be increased. In this paper, the comparison among ad hoc coordination and local coordination for CACC are made according to network-wide performance measures. The traffic flow charac- teristic of HVs was investigated with the emphasis on the in- teraction between HVs and CAVs based on the high-resolution vehicle trajectory data extracted from microscopic simulation. The proposed methodology developed is also suitable for extracting the driving behavioral data for field deployment and modeling heterogeneous traffic flow that is consisted of HVs and CAVs. Three scenarios are evaluated: i) base without CAVs, ii) CAVs with ad hoc coordination, and iii) CAVs with local coordination algorithm (e.g., active platoon formation). The organization of the remainder of the paper is as follows. Relevant research regarding research of CACC in mixed traffic will be reviewed in Section II, followed by the microscopic simulation framework in Section III. The simulation results are presented and discussed in Section IV. Lastly, findings and recommendations are discussed in Section V. II. CACC RESEARCH IN MIXED TRAFFIC A. Impact of CACC CACC can positively increase the traffic performance with sufficient presence in the traffic flow. The reduced time headway and following distance have been recognized as the primary benefits of CACC. Arnaout and Arnaout [1] proposed the Flexible Agent-based Simulator of Traffic framework for evaluating CACC with ad hoc coordination. Moderate, satu- rated, and over-saturated demand scenarios were tested on a hypothetical four-lane high highway under various of CACC market penetration rates (MPRs). The advantage of CACC showed when MPR was above 40% and the network was able to serve 9,400 out of 10,000 vehicles per hour (vph). Lee et al. [2] evaluated the potential benefits for both mobility and safety under a wide range of traffic scenarios. It was found that the mobility benefits of CACC were shown at as less as 30% MPR. Songchitruksa et al. [3] evaluated the improvement of CACC on a 26-mile segment of the Dallas I-30 freeway. For simplification, zero demand from the on-ramps was assumed. The highest throughput was observed as 4,400 vph with local coordination, where only rear-join to a platoon was allowed. Van Arem et al. [4] assessed the impact of CACC on freeway traffic flow on a 6-km, one-lane freeway with ramps distributed with 1.6-km interval. They found the capacity reached 4,250 vph per lane (vphpl) with full CACC penetration. With the same CACC model, Shladover et al. [5] studied the impact of CACC on freeway traffic flow on a one-lane freeway with no demand from ramps. The lane capacity was found to reach 3,600 vphpl at 90% MPR of CACC. All of the above studies assessed the potential benefits brought by CACC on the overall network. However, none of them has investigated the impact that CACC could bring to HVs, especially under local coordination in which a free- agent CAV is actively seeking and subsequently performing lane change to join a platoon. Nowakowski et al. [6] studied the acceptance of the short following distance (ranging from 0.6 s to 1.1 s) enabled by CACC. As discovered, while all the drivers showed the will- ingness to accept the shorter following gaps, male participants were more likely to choose a shorter following distance. The carry-over effect of the short headway in manual driving was exhibited even after the disengagement from the platoons in the KONVOI project [7]. Gouy et al. [8] investigated the behavioral adaptation effect that potentially caused by the short headway of CACC platoon using driving simulator. Participants were instructed to driver alongside with two CACC platoon configurations: i) 10-truck platoon with 0.3 s intra-platoon headway, and ii) 3-truck platoon with 1.4 s intra-platoon headway. They found that smaller average time headway was observed when in the short headway scenario. In the first platoon scenarios, participants spent more time under a 1-second headway, which is deemed unsafe [9]. Lin et al. [10] studied the time-gap of bus ACC system in three aspects: i) preferred time-gaps for expressway driv- ing, ii) time-gaps that maximized safety, and iii) the influence of the secondary tasks to time-gaps. Calvert and Lint [11] studied the negative effect of ACC on the system capacity using the propose ACC control. The simulation scenarios contained various traffic flow conditions in terms of demand and flow composition (e.g., ACC vehicles, trucks, etc.). They concluded that the small negative effect on road capacity did exist and it was caused by the higher gap times of ACC. B. CACC Coordination There are three types of clustering strategies: ad hoc coordi- nation, local coordination, and global coordination [5]. In this study, only the former two clustering strategies are evaluated due to the scope. Since global coordination requires advance planning for the travel demand at an origin-designation level. CAVs are coordinated to enter the highway in platoons. Global coordination is likely to be sub-optimal without a robust planning system to couple with the logistical challenge under dynamic traffic conditions. 1) Ad hoc coordination: Ad hoc coordination assumes random arrival of CAVs and no coordination among them. Therefore, the probability of driving behind another CAV is highly correlated to the market penetration rate (MPR). Ad hoc coordination has been observed in the majority of the research due to its simplicity in implementation and the lack of the conceptual framework for CAV platoon formation. However, the ad hoc coordination is not likely to harness the full potential of CACC, as it does not fully utilize the short intra-platoon headway enabled by the CAV technology. Exclusive lane, or other forms of managed lane, has been employed to aid the ad hoc clustering [12]. In a sense, a CAV lane is a special form of coordination where the target lane is the CAV lane. 2) Local coordination: Local coordination facilities the platoon formation, where free-agent CAVs are actively seeking clustering opportunity in their surroundings. The subject CAV, as well as the surrounding CAVs can be coordinated to change trajectory to facilitate clustering. There are four basic types of lane change: i) free-agent-to-free-agent lane change, ii) free-a- gent-to-platoon lane change, iii) platoon-to-free-agent lane change, and iv) platoon-to-platoon lane change [13]. Lee et al. [2] developed a local coordination scheme which allows three ways to form a platoon: i) front-join, ii) mid-join, and iii) rear-join. The longitudinal control was a rule-based acceleration selection. Developed from Lee et al.'s coordi- nation model, Zhong et al. [14] implemented the MIXIC [4] as car following model to study the CAV benefits for arterials. Lee et al.'s [2] CACC algorithm was updated to using the EIDM for simulating CACC string behavior. The string formation and dispersion mechanism were enhanced, including preferential lane logic, platoon size restriction [15]. Zhong [16] developed a CACC control model by combining E-IDM and the MOBIL model [17]. The MOBIL model is adopted as the mechanism to prevent lane changing of a free-agent CAV that may be potentially disruptive to the surrounding traffic. When a potential platooning opportunity is identified via V2V communication, the CACC system estimates the impacts on the immediate vehicles based on MOBIL should the lane change be initiated. The Lane-change Model with Relaxation and Synchronization (LMRS) model, proposed in [18], gives a normalized strategic lane-change score by taking into consideration of route, gain speed, and lane preference. For a higher desire score, the driver is willing to accept smaller headway and to decelerate more in LMRS. Calvert and Lint [11] adopted the LMRS model in conjunction with the IDM+ [19] for evaluating the ACC. III. EVALUATION FRAMEWORK A. Simulation of Human Driving Behavior Human drivers can take into account more input stimulus (e.g., brake lights, next-nearest neighbors, etc.) with anticipa- tion of the situation for the next few seconds [20]. All of these aspects can be formulated in terms of psycho-physiological models, such as Gipps' model [21] and Weidemann model [22]. Weidemann model was re-calibrated in [23] using an instrumented vehicle to measure the thresholds among differ- ence driving states. The Weidemann model is used by Vissim as the as the default car-following model. The Vissim car-following model also includes the tactical driving behavior, which carries certain planning in advance with a temporal horizon (multiple time steps) or spatial horizon that is beyond neighboring vehicles [24]. There are four different driving states in the Widemann model. i) free driving, ii) approaching, iii) following,and iv) braking. The acceleration is primarily determined by the current speed, speed difference, and gap to the preceding vehicle for each of the four driving state. The Wiedemann-99 model, suitable for freeway application, has ten calibratable parameters to repre- sent a wide range of driver behavior. Therefore, the Wiedmann model has to be calibrated to specific traffic stream data [25], [26], as it was initially developed on limited available data. The objective of the calibration process is to minimize the difference between the measured driving behavior in the field and the driving behavior simulated. There are two types of lane change in the Wiedemann model: necessary lane change and free lane change. The former focus on the hard constraint of the lane change, such as lane drop. The latter type is the focus of this study. Such lane change is performed when more space and higher speed is desired for a vehicle. As such, the safety distance plays an important role in the lane change behavior. A suitable gap is found based on i) the speed of the vehicle changing lane, and ii) the approaching speed of the vehicle from behind on the lane [27] B. Quantify Impact to Human Driver The trajectory data for HVs are also collected. A before- and-after study is the most straightforward way to assess the changes that are brought by CAVs. The ultimate goal is to determine whether the changes are of statistical significance. Figure 1 illustrates the study methodology. First, the human driving behavior is calibrated by multiple sources of data that were collected from the roadway segment of interest. The calibration effort was conducted in [28]. With a calibrated behavior model, we then treat the car-following model as a black box. The input and the output to the human behavior model is stimuli (local traffic condition) and reactions of HVs, respectively. Then on a collective level, the traffic flow characteristics and vehicle trajectories are analyzed. C. Simulation of CAV Driving Behavior Longitudinal control (or car-following) and lateral control are the two main components for simulating the behavior of CACC. Numerous car-following models have been proposed. Among them, the Gipps [21], Wiedemann [22], the IDM [29] and its variants have been widely used. 1) Longitudinal Control: The Enhanced Intelligent Driver Model (E-IDM) [30] is adapt and the longitudinal control model, which is expressed in (1). x xdes )δ − ( s∗( x, xlead) a[1 − ( if x = xIDM ≥ xCAH (1 − c)xIDM + c[xCAH + b · tanh( xIDM −xCAH )] s0 b )] otherwise x =   s∗( x, xlead) = s0 + xT + x( x − xlead) 2√ab xCAH = x2 ·min(xlead,x) −2x·min(xlead,x) x2 lead if xlead( x − xlead) ≤ −2x min(xlead, x) min(xlead, x) − ( x− xlead)2Θ( x− xlead) 2x otherwise   (1) where a is the maximum acceleration; b is the desired deceleration; c is the coolness factor; δ is the free acceleration exponent; x is the current speed of the subject vehicle; xdes is the desired speed, xlead is the speed of the lead vehicle; s0 is the minimal distance; x is the acceleration of the subject vehicle; xlead is the acceleration of the lead vehicle; xIDM is the acceleration calculated by the original IDM model [29]; T is the desired time gap; and xCAH is the acceleration calculated by the CAH component as shown in Eq.1 where Θ is the Heaviside step function. 2) Lateral Control and Coordination: We assume all the CAVs are equipped with automated longitudinal control. Each CACC vehicle is able to detect the surrounding traffic and discern CAVs from HVs. Three cases are tested: i) Base case: case without CAV traffic. This is the baseline for the case study network. The I-66 network has been calibrated. ii) Ad hoc coordination: the CACC system controls only the longitudinal control based on the Enhanced-IDM model. Lateral movement was controlled by the calibrated Wiedenmann model. iii) Local coordination: the CACC control cover both logi- tudinal and lateral aspects. It was developed in [2]. The longitudinal control of the is replaced with E-IDM and the lateral control is assumed to be done by the automated driving system as well. A break-down of the cases is shown in Table I. Since the focus of the paper is the near-term deployment of CACC in mixed traffic condition, the MPR is set at a medium-to-low range from 0% to 40%. Fig. 1: Potential Impact to Non-equipped Vehicles TABLE I: Simulation Case Cases Base Ad hoc coordination Local coordination Longitudinal Control calibrated Weidemann E-IDM E-IDM Lateral Control calibrated Weidemann calibrated Weidemann gap acceptance-based [2] • a calibrated driving behavior model in Vissim with real- world data constitutes a good representation of the human driver. • vehicle-to-vehicle (V2V) communication is perfect (no interference or packet loss). • human drivers do not differentiate CAVs and other HVs D. Case Study Network as followers In this study, an 8-km (5-mile) segment (Fig. 2) of Interstate Highway I-66 outside of the beltway (I-495) of Washington D.C. is used. This freeway segment has recurring congestion during weekdays, specifically in the eastbound direction in the morning and westbound direction in the afternoon. The road- way is with four lanes in each direction. The leftmost lane is an HOV 2+ lane with 1500 vphpl peak volume [31]. Currently, no physical barrier is between the HOV lane and its adjacent GP lane. The Vissim simulation network is available via the U.S. DOT Open Source Application Development Portal [32]. The calibration was conducted with two independent data sources (i.e., INRIX TMC travel time and RTMS flow data). Fig. 2: I-66 Simulation Testbed In anticipation of the increase of the traffic demand over time, we assume a 30% growth in traffic demand from the baseline of the calibrated network. Each deployment scenarios was run five times with different random seeds to factor in the variability of the traffic condition. The duration of the simulation is 3900 s, the first 300 s of which is used to load the network with traffic. No data is collected during this period. The evaluation of the impact is based on the following assumptions: • a low-level vehicle controller for longitudinal (e.g., throt- tle, brake) and lateral (e.g., steering) control is available. This study only focuses on the tactical driving aspect of vehicle operation. IV. RESULTS & DISCUSSION The vehicle trajectory data are collected every 0.5 s, which offers a snapshot of the prevailing traffic condition. Not only vehicle dynamic data, but also the interaction state including driving state, interacting vehicle, etc. is available. A. Network Performance Fig. 3 shows the benefits that CACC bring to the trans- portation network. Fig. 3(a) shows the ratio of vehicle miles traveled (VMT) and vehicle-hours traveled (VHT). VMT is the output of a transportation system, whereas VHT is considered the input to a transportation system. The ratio of VMT and VHT ratio is referred as Q [33], which represents the output of a transportation system with the unit value of the input. In short, the higher the value of the Q, the more productive a transportation system is. Both of the ad hoc and local coordination strategies exhibit an increasing trend as the MPR increases. It is notable that the benefits gained by ad hoc coordination show a diminishing increase after 30% MPR. In comparison, local coordination displays a linear increasing pattern for the performance gain. When it comes to network throughput, Fig. 3(b) shows that the ad hoc coordination does not increase the network throughput at 10% MPR: the throughput remains as 9398 vph. After 10% MPR, the throughput for ad hoc coordination increases with a liner pattern, which matches the underlying operational implication of ad hoc coordination. The throughput reaches the highest 10167 vph at 40%. With local coordination, additional throughput is observed even at 10% MPR. Then the slope of the throughput curve is greater at the MPR range between 10% and 30% than other tested MPR values. It also shows that the rate of increase of the throughput decrease after 30% MPR. Moreover, the vertical distance indicates the magnitude that the local coordination outperforms the ad hoc coordination at each level of MPR. The greatest difference is observed at 30% MPR. (a) productivity (a) hard braking observation CDF (b) throughput Fig. 3: Network Performance B. Hard Braking Observations Hard braking observation has been used as a safety measure. Abrupt braking is likely an indication of a hazardous traffic sit- uation that drivers respond to [34]. Hard braking observations are recorded when the acceleration of a vehicle is less than -3 m/s2. Recall our primary focus is the HVs. There are two types of hard braking: the first one occurs when an HV inter- acts with another HV; whereas the second type occurs when an HV interacts with a CAV. The hard braking observation for HVs when they interact with other HVs is shown in Fig. 4(a). Similar patterns of the cumulative distribution function (CDF) curves for hard braking are observed across the testing scenarios. Fig. 4(b) shows the sample size for each scenario. The primary factor for the decreasing trend is the reduction of HVs the traffic stream. The linear trend also infers that the likelihood of hard braking remains at the same level. Fig. 5(a) shows the CDF curves of the hard breaking observations recorded for HVs when they interact with CAVs under each scenario. The CDFs show two distinctive patterns between two coordination strategies. In the ad hoc coordina- tion cases, the CDFs are with similar distributions. On the other hand, the CDF curves of the local coordination are more sensitive to MPR. The probability of hard braking in (b) hard braking observation Fig. 4: Hard braking observation when interacting with HVs the range from -6.5 to -3.5 m/s2 drastically increases even at 10% MPR. The occurrence of hard braking event keeps at the same level in ad hoc coordination; whereas the occurrence of coordination strategy shows an increasing trend until 30% MPR where the value peaks. The sample size is shown in Fig. 5(b). Both strategies exhibit an increasing trend until 30 % MPR, then a declining occurrence after 30% MPR. With the same amount of CAVs, the hard breaking is more sensitive to MPR in Local coordination then that in ad hoc strategy. Two-sample Kolmogorov-Smirnov (K-S) test is adapted to further analyze the CDF curves. The K-S test is a powerful tool for testing the hypothesis that whether two random samples have been drawn from the same population [35]. It is a non- parametric test where no assumption is made regarding the distribution of the variables [36]. The null hypothesis (H0) of the K-S test is that the comparing two sample sets are from the same continuous distribution. The the two-sample K-S test is conducted for hard braking for each pair of the scenarios at 5% significance level. The hypothesis tests show that any pair of the scenarios rejects the null hypothesis and accept the and 5.48 at 30% and 40%, respectively. 30% is the break- even point when it comes to average lane change frequency. (a) hard braking event CDF Fig. 6: Lane Change Activity of HVs In summary, the local coordination strategy outperforms levels of MPR in ah hoc coordination strategy across all terms of network throughput and productivity. However, the induced hard braking for HV should not be overlooked. The distribution of hard braking for HVs changes substantially when they interacting with CAVs under local coordination. Compared to ad hoc coordination at the probability of the hard braking event in the range of -7.3 to - 6.5 m/s2 is higher. Local coordination causes a higher average lane change frequency for HV at low MPRs (i.e., 10% and 20%). It starts to decrease after reaching 30% MPR, whereas in the ad hoc strategy the average lane change frequency maintains the increasing trend. the same MPR, V. CONCLUSION In this paper, we investigate the two types of coordination strategies for CAV platoon formation. Platoon clustering strat- egy is a crucial aspect when it comes to deploying CAV in mixed traffic condition in the near term. Agreeing with previ- ous studies, CAV is able to bring benefits to the transportation network even with ad hoc coordination. Adapting local coor- dination can further increase the benefits. The impact on HVs is quantified. The distribution of the hard braking observation for HVs, when interacting with CAVs, change substantially with local coordination strategy for platoon formation. In comparison, the distributions for HVs when interacting with other HV show no substantial changes. The average lane change for HVs increases with the presence of CAVs until 30% MPR is reached. Future research would be focused on the following areas. First, the lateral control is an underexplored area compared to longitudinal control of CAVs. Further investigation of platoon formation in mixed traffic is desired. Currently, there are only a few platoon coordination algorithms, most of which are rule- based. Second, the aggressiveness of the lane change for CAVs when forming a platoon is also an important aspect. As shown, the characteristic of the HVs traffic could be altered. Some of the changes could pose safety concerns for HVs. Third, the (b) hard braking event sample size Fig. 5: Hard Braking Event when Interacting with CAVs alternative hypothesis that the two samples are not from the same distribution. The H0 is not rejected only in the ad hoc coordination case at 20% and 30% MPR. C. Lane Change Activity Fig. 6 shows the accumulative lane change instance recorded at ever 0.5 s for all HVs. The lane change activity of CACC is not recorded as the scope of the paper is confined to HVs. The lane change activity decrease as the MPR of CACC increase in either of the coordination strategies. Local coordination is marginally higher than the ad hoc one when the MPR is low. At 40% MPR, they reach the same level of lane change activity. However, recall that the number of HV within the network decreases as the MPR of CACC increase. As such, the average lane change frequency for each HV is calculated and plotted in Fig. 6 as well. The local coordination strategy shows a higher average lane change frequency at 10% and 20% MPR. The average lane change frequency peaks at 30%, then reduced to 5.38 from 5.42. On the contrary, the increasing trend for ah hoc clustering keeps increasing and reach 5.46 Board, http://trrjournalonline.trb.org/doi/10.3141/1999-10 86 -- 94, 2007. 1999, vol. pp. [Online]. Available: [18] W. J. Schakel, V. L. Knoop, and B. van Arem, "Integrated Lane Change Model with Relaxation and Synchronization," Transportation Research Record, vol. 2316, no. 1, pp. 47 -- 57, jan 2012. [Online]. Available: https://doi.org/10.3141/2316-06 [19] W. J. Schakel, B. van Arem, and B. D. Netten, "Effects of cooperative adaptive cruise control on traffic flow stability," in 13th International IEEE Conference on Intelligent Transportation Systems, Sep. 2010, pp. 759 -- 764. [20] M. Treiber and A. Kesting, "Traffic flow dynamics," Traffic Flow Dynamics: Data, Models and Simulation, Springer-Verlag Berlin Hei- delberg, 2013. "A behavioural [21] P. Gipps, simulation," vol. 15, no. 2, pp. 105 -- 111, 1981. http://www.sciencedirect.com/science/article/pii/0191261581900370 computer Transportation Research Part B: Methodological, [Online]. Available: car-following model for [22] R. Wiedemann, "Simulation des Straenverkehrsflusses," Ph.D. disserta- tion, Karlsruhe, 1974. [23] U. Reiter, "Empirical studies as basis for traffic flow models," in PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON HIGHWAY CAPACITY, VOLUME 2, 1994. [24] J. Barcel´o et al., Fundamentals of traffic simulation. Springer, 2010, vol. 145. [25] B. Higgs, M. M. Abbas, and A. Medina, "Analysis of the wiedemann car following model over different speeds using naturalistic data," in Procedia of RSS Conference, 2011, pp. 1 -- 22. [26] U. Durrani, C. Lee, and H. Maoh, "Calibrating the wiedemanns vehicle- following model using mixed vehicle-pair interactions," Transportation research part C: emerging technologies, vol. 67, pp. 227 -- 242, 2016. [27] PTV Group, "Ptv vissim 11 user manual," Germany: PTV GROUP, 2018. [28] Leidos, "Simulation of evolutionary introduction of cooperative adaptive cruise control equipped vehicles into traffic," Saxton Transportation Operations Laboratory, Tech. Rep., 2016. [29] M. Treiber, A. Hennecke, and D. Helbing, "Congested Traffic States in Empirical Observations and Microscopic Simulations," pp. 1805 -- 1824, 2000. [30] A. Kesting, M. Treiber, and D. Helbing, "Enhanced intelligent driver model to access the impact of driving strategies on traffic capacity," Philosophical Transactions of the Royal Society A: Mathematical, Phys- ical and Engineering Sciences, vol. 368, no. 1928, pp. 4585 -- 4605, 2010. [31] X.-Y. Lu, J. Lee, D. Chen, J. Bared, D. Dailey, and S. E. Shladover, "Freeway micro-simulation calibration: Case study using aimsun and vissim with detailed field data," in 93rd Annual Meeting of the Trans- portation Research Board, Washington, DC, 2014. OSDAP, for [32] FHWA add-on now available https://www.itsforge.net/index.php/vedm-cac-announced "Vissim external download," automated connected vehicle 2015. for driver model (vedm) applications [Online]. Available: (cav) [33] Caltrans Division of Traffic Operations, "A guide to using the caltrans performance measurement system (pems) in transportation concept reports (tcr's)," Tech. Rep., 2013. [34] O. Bagdadi and A. V´arhelyi, "Jerky drivingan indicator of accident proneness?" Accident Analysis & Prevention, vol. 43, no. 4, pp. 1359 -- 1363, 2011. [35] L. A. Goodman, "Kolmogorov-smirnov tests for psychological research." Psychological bulletin, vol. 51, no. 2, p. 160, 1954. [36] I. T. Young, "Proof without prejudice: use of the kolmogorov-smirnov test for the analysis of histograms from flow systems and other sources." Journal of Histochemistry & Cytochemistry, vol. 25, no. 7, pp. 935 -- 941, 1977. comparison between clustering strategies should be expanded to include additional local coordination strategies. REFERENCES [1] G. M. Arnaout and J.-P. Arnaout, "Exploring the effects of cooperative adaptive cruise control on highway traffic flow using microscopic traffic simulation," Transportation Planning and Technology, vol. 37, no. 2, pp. 186 -- 199, 2014. [2] J. Lee, J. Bared, and B. Park, "Mobility impacts of cooperative adaptive cruise control (cacc) under mixed traffic conditions," in 93rd Annual Meeting of the Transportation Research Board, Washington, DC, 2014. [3] P. Songchitruksa, A. Bibeka, L. I. Lin, Y. Zhang et al., "Incorporating driver behaviors into connected and automated vehicle simulation," Center for Advancing Transportation Leadership and Safety (ATLAS Center), Tech. Rep., 2016. [4] B. Van Arem, C. J. Van Driel, and R. Visser, "The impact of cooperative adaptive cruise control on traffic-flow characteristics," IEEE Transac- tions on intelligent transportation systems, vol. 7, no. 4, pp. 429 -- 436, 2006. [5] S. E. Shladover, D. Su, and X.-Y. Lu, "Impacts of cooperative adaptive cruise control on freeway traffic flow," Transportation Research Record, vol. 2324, no. 1, pp. 63 -- 70, 2012. [6] C. Nowakowski, J. O'Connell, S. E. Shladover, and D. Cody, "Co- operative adaptive cruise control: Driver acceptance of following gap settings less than one second," in Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 54, no. 24. SAGE Publications Sage CA: Los Angeles, CA, 2010, pp. 2033 -- 2037. [7] S. M. Casey and A. K. Lund, "Changes in speed and speed adaptation following increase in national maximum speed limit," Journal of safety research, vol. 23, no. 3, pp. 135 -- 146, 1992. [8] M. Gouy, K. Wiedemann, A. "Driving time Stevens, G. Brunett, and platoons: drivers control?" Transportation Research Part F: Traffic and Behaviour, vol. 27, pp. 264 -- 273, 2014, [Online]. Available: N. Reed, How do longitudinal Psychology vehicle Automation and Driver Behaviour. http://www.sciencedirect.com/science/article/pii/S1369847814000345 automated influence next to headways non-platoon vehicle short [9] S. H. Fairclough, A. J. May, and C. Carter, "The effect of time headway feedback on following behaviour," Accident Analysis and Prevention, vol. 29, no. 3, pp. 387 -- 397, 1997. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0001457597000055 [10] T.-W. Lin, S.-L. Hwang, and P. A. Green, "Effects of time-gap (acc) on driving performance settings of adaptive cruise control and subjective in a bus driving simulator," Safety Science, vol. 47, no. 5, pp. 620 -- 625, 2009. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0925753508001422 acceptance [11] W. J. S. S. C. Calvert and J. W. C. van Lint, "Will automated vehicles negatively impact traffic flow," Journal of Advanced Transportation, vol. 2017, 2017. [12] M. Segata, F. Dressler, R. Lo Cigno, and M. Gerla, "A simulation tool for automated platooning in mixed highway scenarios," in Proceedings of the 18th annual international conference on Mobile computing and networking. ACM, 2012, pp. 389 -- 392. [13] Z. Wang, G. Wu, P. Hao, K. Boriboonsomsin, and M. Barth, "Developing a platoon-wide eco-cooperative adaptive cruise control (cacc) system," in 2017 IEEE Intelligent Vehicles Symposium (IV). IEEE, 2017, pp. 1256 -- 1261. [14] Z. Zhong, L. Joyoung, and L. Zhao, "Evaluations of Managed Lane Strategies for Arterial Deployment of Cooperative Adaptive Cruise Control," in 96th Transportation Research Board Annual Meeting, Washington DC, USA, 2017. [15] Transportation Research Board, Dedicating Lanes for Priority or Exclusive Use by Connected and Automated Vehicles, B. A. I. of Technology, Eds. Washington, Hamilton, WSP, and N. J. DC: The National Academies Press, 2018. [Online]. Available: https://www.nap.edu/catalog/25366 [16] Z. Zhong, "Assessing the effectiveness of managed lane strategies for the rapid deployment of cooperative adaptive cruise control technology," Ph.D. dissertation, New Jersey Institute of Technology, 2018. [17] A. Kesting, M. Treiber, "General Lane- Changing Model MOBIL for Car-Following Models," Transportation Research Research and D. Helbing, Transportation Record: Journal the of
1801.07583
1
1801
2018-01-20T15:06:03
An Agent-Based Simulation Model for Optimization of the Signalized Intersection Connected to Freeway On-Ramp
[ "cs.MA" ]
Unlike most existing studies on off-ramp traffic signal control, this paper focuses on the optimization problem of the signalized intersection connected to freeway on-ramps. Conflicts are often observed between the traffic heading to an on-ramp and the traffic continuing straight which leads to issues such as intersection overflow, increased delay, and concerns about safety. For studying this problem, a real-world signalized intersection in Buffalo, New York was chosen, which has two through lanes and one short shared (through and right-turn) lane. At the downstream of the intersection are two following on-ramps, one to the highway I-290 West and the other to I-290 East. During peak hours, the shared lane often observes a long queue, which furthermore blocks the through traffic on the parallel lane. To solve this problem, a VISSIM agent-based simulation model was built and calibrated based on field observations. Three potential optimization solutions were proposed and tested with the help of VISSIM: (1) increasing the length of the short shared through and right-turn lane; (2) making the short shared through and right-turn lane right-turn only, and (3) adding a new diverge lane for the right-turn vehicles. According to the simulation results, solution (3) performs the best, resulting in the least vehicle delay time.
cs.MA
cs
An Agent-Based Simulation Model for Optimization of the Signalized Intersection Connected to Freeway On-Ramp Xuejin Wen1 1 Ohio State University; E-Mail: [email protected] ABSTRACT Unlike most existing studies on off-ramp traffic signal control, this paper focuses on the optimization problem of the signalized intersection connected to freeway on-ramps. Conflicts are often observed between the traffic heading to an on- ramp and the traffic continuing straight which leads to issues such as intersection overflow, increased delay, and concerns about safety. For studying this problem, a real- world signalized intersection in Buffalo, New York was chosen, which has two through lanes and one short shared (through and right-turn) lane. At the downstream of the intersection are two following on-ramps, one to the highway I-290 West and the other to I-290 East. During peak hours, the shared lane often observes a long queue, which furthermore blocks the through traffic on the parallel lane. To solve this problem, a VISSIM agent-based simulation model was built and calibrated based on field observations. Three potential optimization solutions were proposed and tested with the help of VISSIM: (1) increasing the length of the short shared through and right-turn lane; (2) making the short shared through and right-turn lane right-turn only, and (3) adding a new diverge lane for the right-turn vehicles. According to the simulation results, solution (3) performs the best, resulting in the least vehicle delay time. 1 INTRODUCTION Intersections controlled by traffic signal lights play a major role in road transportation system. Since the first manually operated traffic signal in the 19th century (Mueller, 1970), the topic has been extensively studied. One important principle of signal light optimization is to maximize the throughput and decrease the traffic accident risks simultaneously. Intersections are one of the core elements of a transportation network. How to optimize the signal timing of one isolated intersection has been extensively studied. For example, Trabia et al. (1999) presented a two-stage fuzzy logic controller for an isolated intersection. In the first stage, it estimates the relative traffic intensities and the second stage determines the extension or termination of the current signal phase (Trabia et al., 1999). Niu et al. (2009) also applied fuzzy control model for the traffic lights at a single intersection. However, only optimizing one isolated intersection may not solve the optimization problem of the whole transport network. Therefore, the coordinated control system with relevant intersections has attracted more public attention. Split, cycle, and offset optimization technique (SCOOT) is a coordination system in England which can analyze the data from vehicle detectors, predict, and adjust the signal timings to minimize congestion (Hunt et al., 1981). The integrated control of highway off-ramp and its downstream intersection is also necessary to mitigate the congestion. For example, Günther et al. (2012) proposed a methodology which can determine the flow of competing vehicles in the freeway to be detoured to underutilized local roads to improve the systems' capacity. This is extremely useful for the traffic management during the inclement weather (Lin et al., 2015) and traffic accidents (Lin et al., 2016). Li et al. (2016) built mathematical models to study the effect of left-turn vehicles at a signalized intersection with the presence of pedestrian crossings. Accordingly, the macroscopic parameters of traffic flow, such as average flow rate, speed, and density can be determined. Besides the signal control optimization problem, the specific intersection optimization is also vital to increase the capacity. Although some reference handbooks like the America Highway Capacity Manual (HCM) have provided default capacity calculation methods for intersections, researchers have shown that the realistic cases are different. Tian and Wu (2006) built a probabilistic model for a signalized intersection with a short right-turn lane and validated the model by traffic simulation because HCM would overestimate the capacity and thus underestimate delay. Wu (2007) built a general capacity model for intersections with short shared lanes based on database generated from simulation package VISSIM. Ring and Sadek (2012) studied signalized intersections with auxiliary through lanes and predicted the lane utilization based on the data collected in Buffalo, New York. 2 As can be seen, traffic simulation is one of the important ways in intersection studies, through which the alternative traffic signal plans and intersection optimizations can be tested. VISSIM is one popular microscopic simulation tool which has been applied for intersection simulation (Ring and Sadek, 2012; Wu, 2007) and border crossing studies (Lin et al., 2013a; Lin et al., 2013b; Lin et al., 2014a; Lin et al., 2014b) and so on. It can customize intersections according to the user's needs by using a link- connector-based network procedure. It also has a strong ability to simulate the traffic signal controllers (Ring and Sadek 2012; Wu, 2007). This paper will study an isolated intersection with a short shared through and right-turn lane. More interesting is that the intersection locates at the upstream of two consecutive on-ramps, one to the interstate highway I-290 West and the other to the I- 290 East. During peak hours, a long queue observed at the short shared lane blocks the through traffic. After the field data collection, a VISSIM model is built and calibrated. Then a few optimization solutions are tested. The rest arrangement of the paper is as following. The data collection part will introduce the data collection and give a preliminary analysis. The next model development section talks about how to build the intersection model and sets the traffic signal controller in VISSIM. In the results section, different optimization solutions are tested, and the results are shown. The conclusion and future study are discussed in the last section. DATA COLLECTION As shown in Figure 1, the intersection of Twin Cities Memorial Highway and W Colvin Blvd locates at the upstream of two on-ramps to I-290 West and I-290 East. There are two through lanes and one short shared through and right-turn lane from the northwest to the southeast direction (referred to hereafter as the left lane, the middle lane, and the short lane separately). The left lane and middle lane connects different streets downstream. One is to Eggert Road, and the other is to the Colvin Road. This short lane is where the long queue forms and spills back to block the through traffic. 3 Figure 1. The intersection in Google map. Before building the simulation model, some field observations must be conducted. Firstly, this intersection takes actuated signal control and the minimum green time, maximum green time, yellow time and so on have to be obtained. Secondly, the traffic flow rate for each direction and each lane during peak hour should also be collected. After field recording from 08:16 AM to 09:15 AM of three days 10/16/2013- 10/18/2013, Table 1 and Table 2 show the results. According to the filed observations in Table 1, the traffic signal at this intersection consists of five phases. For Phase 1 the left-turn and through traffic enter the intersection in the same phase from northeast entrance. Phase 2 is similar that the left-turn and through traffic are from southwest entrance. For southeast entrance, the left-turn and through traffic are controlled by two separate signal phases Phase 3 and Phase 4. Finally, the through traffic from northwest entrance is guided by Phase 5. No left-turn traffic is allowed from the northwest entrance. Table 1. Traffic Signal Parameters (unit: second) Phase Index 1 2 3 4 5 Phase sequence Minimum green Maximum green Yellow time Red clearance 5 10 3 1 10 15 3 1 20 30 3 1 20 30 3 1 5 10 3 1 4 Table 2 shows the lane distribution of traffic flow rate for northwest entrance. As can be seen, more than half of the total traffic flow was going through the short lane. Because of the limitation of experiment equipment, here we only recorded the traffic flow rates for the northwest entrance. For the other entrances, different flow rates will be set as the vehicle inputs of the simulation model, through which it will also be interesting to test the optimization solutions for various scenarios. The details are introduced in next section. Table 2. Traffic Flow Rate for Each Lane at Northwest Entrance during Peak Hours 08:16 AM -09:15 AM (unit: pcu/h) Lanes Left Lane Mid Lane Short Lane Total Northwest Entrance 401 343 836 1,580 MODEL DEVELOPMENT Signal Parameter Setting With the help of Google Map, the layout of this intersection was built in VISSIM as Figure 2. Twin City Highway West Colvin Boulevard Figure 2. The intersection in VISSIM. For the signal setting, VISSIM takes the Ring Barrier Controller. This controller can simulate fully actuated signal control by defining different signal groups or phases. 5 Through the field observations, we already know there are five signal phases, in the simulation model they are shown as the red bars in Figure 2. The green rectangles are the detectors for the corresponding signal groups. The signal parameters including the maximum/minimum green time, yellow time, red clearance time are set according to Table 1. Besides that, the "vehicle extension" in Ring Barrier Controller assigns 2 seconds for West Colvin Boulevard direction and 3 seconds for Twin City Highway direction. The "vehicle extension" extends the green interval time based on the detector status once the phase is green. All five signal groups are flagged with "minimum recall" which means they will receive an automatic vehicle call when they are not green (Mcelroy 2008). At last, the blue bars are stop signs which are used to simulate the right-turn behavior during the red lights. Vehicle Input Setting For the northwest entrance, the vehicle inputs are the same as the field observations shown in Table 2. Based on the real observations, the right-turn proportion for the vehicles at the short lane is assumed as 10%. For each of the other three entrances, although accurate observations are missing, three traffic flow rates are assumed: low, medium, and high. Meanwhile, the left turn, through, and right turn traffic probabilities are assumed to be equal. The inputs for the simulation model are shown in Table 3. Table 3. Assumed Traffic Flow Rates for the Other Three Entrances (unit: pcu/h) Traffic flow rates High Medium low Southeast Northeast Southwest 1,500 1,000 500 1,000 600 200 1,000 600 200 There are 27 possible situations based on the combination of the entrance vehicle inputs. For each situation, the models with different optimizing settings are simulated three times of 3,600 seconds with various random seeds. The results section will show the performances of the optimizing settings. RESULTS In this paper, three possible optimization solutions are proposed as following: (1) increasing the length of the short lane; (2) making the short shared through and right-turn lane right-turn only; (3) adding a new diverging lane for the right-turn vehicles. For the 27 possible situations, to make it simple, a three-digit number is applied to represent each situation; the three digits represent the traffic flow rates of southeast, northeast, and southwest entrances in order. Each digit has three values, ("1"-high, "2"-"medium", and "3"-"low"). So for example, "112" means the traffic 6 flow rates of southeast and northeast entrances are high, and the flow rate of the southwest entrance is medium. The performances of the three solutions were discussed in details below. (1) Increasing the length of the short lane The current length of the short shared lane is 212.24 feet, which can accommodate nine vehicles. Now suppose the short shared lane increases into 313.71 feet, which accommodating 14 vehicles. The new design of the intersection is demonstrated in Figure 3. Point A Figure 3. The intersection with increased length of the short lane. It is reasonable to suppose that the vehicles in the left lane will not be affected. For the vehicles in the middle lane and the short lane, the delay times were compared with that of the original intersection. The delay time in VISSIM was calculated as compared to the ideal travel time (free flow condition, no signal control), the mean time delay calculated from all vehicles observed on a single or several link sections (PTV 2011). In this study, the link section of delay time is from the vehicle input point of that link (point A in Figure 3) to the traffic lights location (red bar 8 in Figure 3) at its corresponding lane. The comparison result is shown in Figure 4. 7 Figure 4. Delay time comparison of middle and short lanes after increasing the length of the short lane. As can be seen, the delay time at middle lane decreases regardless of the 27 situations. However, for the short lane, it shows that the delay time will become longer than the original intersection. The blocking of vehicles at the middle lane may lead to the increased delay time at the short lane. To find out the reason, the maximum queue length at the middle lane is also recorded through VISSIM, and the results are shown as in Figure 5. Figure 5. Maximum queue length changes of middle lane after increasing the short lane length Figure 5 shows that as the length of the short shared lane increases, most of the 8 time the maximum queue length is around 250 feet, which is longer than that of the original intersection. However, in VISSIM model, the diverging point of the length increased short lane is 313 feet, which is far away from the queue length detector. It means that the queue at middle lane with a maximum length of around 250 feet will not block the vehicles going to the short shared lane. Another reason for the increased delay time at short lane is that when the length of the short lane increases, more vehicles will wait in that lane. While in the original intersection model, more vehicles are waiting for the start point of the delay time detector, and in VISSIM this period is not counted as the delay time if the vehicles have not passed the start point (point A in Figure 3). For testing this, the input of vehicles is controlled through VISSIM COM interface (PTV 2011) to make sure the same number of vehicles arrive at the intersection at the same time. Finally, the adjusted delay time at the short lane is shown in Figure 6. Figure 6. Delay time comparison of short lane after increasing the short lane length with vehicles input control of VISSIM COM (2) Making the short shared through and right-turn lane as the right-turn- only lane Previously it was assumed that 10% of the vehicles at the short lane would turn to the right. Now this solution sets the short shared lane to a right-turn-only lane, so the rest 90% of the vehicles at the short lane need to go through the middle lane. The second column in Table 5 shows the new traffic flow rate for each lane in this scenario I (the traffic flow rate at the middle lane will be the sum of the original traffic flow rate at the middle lane and the transferred flow rate from the short lane). The delay times at the short lane and the middle lane are compared with those of the original intersection in Figure 7. 9 Table 5. The New Traffic Flow Rate for Each Lane at Northwest Entrance after Making the Short lane right-turn only (unit: pcu/h) Lanes scenario I scenario II Left Lane Mid Lane Short Lane Total 401 1095 84 1,580 744 752 84 1,580 Figure 7. Delay time comparison of middle and short lanes after making the short lane right-turn only. Using this solution, the delay time at the short right lane decreased a lot. However, the delay time at the middle lane increases. It is reasonable because all the vehicles planning to head to the highway are going through the middle lane, and the original vehicles at the middle lane will not change to the left lane, the vehicles heading to the highway are occupying the middle lane. Now assume an extreme scenario II that all the original vehicles at the middle lane will go to the left lane (they may change back to the middle lane after passing the intersection because of the different connected streets downstream), and the vehicles going to the highway go through the middle lane. The new traffic flow rates are shown in the third column in Table 4; the VISSIM model was simulated again. The result is shown in Figure 8. 10 Figure 8. Delay time comparison of left, middle and short lanes after letting the original vehicles at middle lane go to the left lane. If the entire original through traffic changed to the left lane, the delay time at the middle lane is still longer than the original intersection, and the vehicles in the left lane will also experience a much higher delay. Therefore, this solution only improves the quality of service for the right-turn traffic. (3) Adding a new diverging lane for the right-turn vehicles Solution (3) is to add a diverging link for the right turn vehicles. The new design layout of the intersection in VISSIM is shown in Figure 9. 11 Point A Diverging lane Stop sign B Figure 9. The new intersection with a diverging lane. Then the delay time for the diverging lane (from the vehicle input point A to the stop sign B), short lane, and middle lane are recorded. The comparison with the original intersection is presented in Figure 10. Figure 10. Delay time comparison of the diverging, short, and middle lanes after adding a new diverging lane for the right-turn vehicles The delay time at diverging lane compared with that at the short lane of the original intersection is introduced. It is observed that this solution can prevent the right- turn vehicles being blocked by the vehicles going to the highway. Instead, they can go to West Colvin Boulevard much faster. At the same time, this can save some space at 12 the short lane, which also relieves the pressure to the middle lane for the further step. Therefore, the delay time at the short lane and middle lane are both deceased. With the help of VISSIM, three solutions improving the current congestion status are observed. More accurate, increasing the length of the short shared through and right-turn lane decreases the delay time at the middle lane, but it has no impacts for the vehicles at the short shared lane. Also, turning the short shared lane as a right- turn-only lane makes the delay time at the short lane shorter, but may cause the delay time at middle and left lanes longer. The third one adding a new diverging lane for the right-turn vehicles performs best which can be beneficial for the right-turn vehicles, as well as the through traffic. CONCLUSION AND FUTURE WORK This paper proposed three optimal solutions for the long queue problem at one specific intersection caused by the vehicles going to the I-290 highway through the downstream on-ramps. Each solution is tested by building corresponding VISSIM models and compared with the original intersection. A few observations include: 1. An intersection with actuated signal control VISSIM model can be established easily. Besides, VISSIM also provides a few evaluation criteria, like the queue length, delay time; 2. For assessment and comparison of the VISSIM intersection models, the vehicle input should be controlled by COM interface to make sure the number of vehicles arriving at the intersection is equal at the same time; 3. Adding a new diverging link for the right-turn only vehicles can effectively improve the quality of service of this intersection. Meanwhile, the other two solutions, increasing the length of the short shared lane and making the short shared lane right- turn, can only reduce the delay time for the vehicles in one lane. For the future study, the nearby intersections close to this one will be included in the VISSIM model, and the coordinated signal control will be tested as well. Besides that, this paper focuses on how to improve the layout of the intersection, the configuration of traffic signal could also be considered. REFERENCES Günther, G., Coeymans, J. E., Muñoz, J. C., and Herrera, J. C. (2012). "Mitigating freeway off-ramp congestion: A surface streets coordinated approach." Transportation Research Part C: Emerging Technologies, 20(1), 112–125. Hunt, P. B., Robertson, D. I., Bretherton, R. D., and Winton, R. I. (1981). "SCOOT - A Traffic Responsive Method of Coordinating Signals." Publication of: Transport and Road Research Laboratory. Li, H., Li, S., Li, H., Qin, L., Li, S., and Zhang, Z. (2016). "Modeling Left-Turn Driving 13 Behavior at Signalized Intersections with Mixed Traffic Conditions." Mathematical Problems in Engineering, Hindawi Publishing Corporation, 2016, 1–11. Lin, L., Li, Y., & Sadek, A. (2013a). "A k nearest neighbor based local linear wavelet volume neural prediction." Procedia-Social and Behavioral Sciences, 96, 2066-2077. network model traffic for on-line short-term Lin, L., Wang, Q., & Sadek, A. (2013b). "Short-term forecasting of traffic volume: evaluating models based on multiple data sets and data diagnosis measures." Transportation Research Record: Journal of the Transportation Research Board, (2392), 40-47. Lin, L., Wang, Q., Huang, S., & Sadek, A. W. (2014a). "On-line prediction of border crossing traffic using an enhanced Spinning Network method." Transportation Research Part C: Emerging Technologies, 43, 158-173. Lin, L., Wang, Q., & Sadek, A. W. (2014b). "Border crossing delay prediction using transient multi-server queueing models." Transportation Research Part A: Policy and Practice, 64, 65-91. Lin, L., Ni, M., He, Q., Gao, J., & Sadek, A. W. (2015). "Modeling the impacts of inclement weather on freeway traffic speed: exploratory study with social media data." Transportation Research Record: Journal of the Transportation Research Board, (2482), 82-89. Lin, L., Wang, Q., & Sadek, A. W. (2016). "A combined M5P tree and hazard-based duration model for predicting urban freeway traffic accident durations." Accident Analysis & Prevention, 91, 114-126. Mcelroy, R. (2008). "Traffic Signal Timing Manual." Mueller, E. A. (1970). "Aspects of the History of Traffic Signals." IEEE Transactions on Vehicular Technology. Niu, H., Li, G., and Lin, L. (2009). "Fuzzy control modeling and simulation for urban traffic lights at single intersection." Transport Standardization, 17. PTV. (2011). VISSIM 5.40 User Manual. epubli GmbH, Karlsruhe. Ring, J. B., and Sadek, A. W. (2012). "Predicting Lane Utilization and Merge Behavior at Signalized Intersections with Auxiliary Lanes in Buffalo, New York." Journal of Transportation Engineering, American Society of Civil Engineers, 138(9), 1143–1150. Tian, Z. Z., and Wu, N. (2006). "Probabilistic Model for Signalized Intersection Capacity with a Short Right-Turn Lane." Journal of Transportation Engineering, 132(3), 205–212. Trabia, M. B., Kaseko, M. S., and Ande, M. (1999). "A two-stage fuzzy logic controller for traffic signals." Transportation Research Part C: Emerging Technologies, Elsevier Science Ltd, 7(6), 353–367. 14 Wu, N. (2007). "Total Approach Capacity at Signalized Intersections with Shared and Short Lanes: Generalized Model Based on a Simulation Study." Transportation Research Record: Journal of the Transportation Research Board, 2027(2027), 19–26. 15
1805.00787
1
1805
2018-04-09T04:12:08
Cognition in Dynamical Systems, Second Edition
[ "cs.MA", "cs.AI", "cs.GT", "cs.LG" ]
Cognition is the process of knowing. As carried out by a dynamical system, it is the process by which the system absorbs information into its state. A complex network of agents cognizes knowledge about its environment, internal dynamics and initial state by forming emergent, macro-level patterns. Such patterns require each agent to find its place while partially aware of the whole pattern. Such partial awareness can be achieved by separating the system dynamics into two parts by timescale: the propagation dynamics and the pattern dynamics. The fast propagation dynamics describe the spread of signals across the network. If they converge to a fixed point for any quasi-static state of the slow pattern dynamics, that fixed point represents an aggregate of macro-level information. On longer timescales, agents coordinate via positive feedback to form patterns, which are defined using closed walks in the graph of agents. Patterns can be coherent, in that every part of the pattern depends on every other part for context. Coherent patterns are acausal, in that (a) they cannot be predicted and (b) no part of the stored knowledge can be mapped to any part of the pattern, or vice versa. A cognitive network's knowledge is encoded or embodied by the selection of patterns which emerge. The theory of cognition summarized here can model autocatalytic reaction-diffusion systems, artificial neural networks, market economies and ant colony optimization, among many other real and virtual systems. This theory suggests a new understanding of complexity as a lattice of contexts rather than a single measure.
cs.MA
cs
Cognition in Dynamical Systems Second Edition Jack Hall May 3, 2018 Abstract Cognition is the process of knowing. As carried out by a dynamical system, it is the process by which the system absorbs information into its state. A complex network of agents cognizes knowledge about its environ- ment, internal dynamics and initial state by forming emergent, macro-level patterns. Such patterns require each agent to find its place while partially aware of the whole pattern. Such partial awareness can be achieved by sep- arating the system dynamics into two parts by timescale: the propagation dynamics and the pattern dynamics. The fast propagation dynamics describe the spread of signals across the network. If they converge to a fixed point for any quasi-static state of the slow pattern dynamics, that fixed point repre- sents an aggregate of macro-level information. On longer timescales, agents coordinate via positive feedback to form patterns, which are defined using closed walks in the graph of agents. Patterns can be coherent, in that every part of the pattern depends on every other part for context. Coherent pat- terns are acausal, in that a) they cannot be predicted and b) no part of the stored knowledge can be mapped to any part of the pattern, or vice versa. A cognitive network's knowledge is encoded or embodied by the selection of patterns which emerge. The theory of cognition summarized here can model autocatalytic reaction-diffusion systems, artificial neural networks, market economies and ant colony optimization, among many other real and virtual systems. This theory suggests a new understanding of complexity as a lattice of contexts rather than a single measure. Acknowledgments Many professors have been very patient with me. Dawn Tilbury and Benito Fernandez set me on my path. Raul Longoria kept me in graduate school. Matthew Campbell and Maxwell Stinchcombe made me explain myself. Luis Sentis balanced my realism with optimism. My friends were a boon. Courtney Shell and Nick Paine kept me sane. Felipe Lopez, Prashant Rao and Taylor Niehues kept me laughing and made sure my glass was full. Gray Thomas always listened to my latest strange idea. My mother and sisters held me up and reminded me that they love me anyway. Thank you all. Contents Chapter 1 Introduction 1 Chapter 2 Signal Propagation 5 5 2.1 A Naive Approach . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Propagation Dynamics . . . . . . . . . . . . . . . . . . . . . . 7 2.3 Existence of an Aggregation . . . . . . . . . . . . . . . . . . . 10 2.4 Separating Propagation from Pattern . . . . . . . . . . . . . . 13 2.5 Retrospective on Propagation . . . . . . . . . . . . . . . . . . 16 Chapter 3 Pattern and Feedback 19 3.1 Existing Approaches to Pattern . . . . . . . . . . . . . . . . . 19 3.2 Feedback Loops . . . . . . . . . . . . . . . . . . . . . . . . . . 21 3.3 Coherence and Causality . . . . . . . . . . . . . . . . . . . . . 26 Chapter 4 Applications 29 4.1 Dissipative Structure . . . . . . . . . . . . . . . . . . . . . . . 29 4.2 Artificial Neural Networks . . . . . . . . . . . . . . . . . . . . 32 4.3 Market Economies . . . . . . . . . . . . . . . . . . . . . . . . 37 4.4 Ant Colony Optimization . . . . . . . . . . . . . . . . . . . . . 39 Chapter 5 Conclusions 43 5.1 Context in Cognition . . . . . . . . . . . . . . . . . . . . . . . 43 5.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 References 49 Chapter 1 Introduction Ants are both familiar and mysterious. You can find a colony almost anywhere, but how do they dig such intricate tunnels, forage as a group and wage war? How do they decide which of these they should all be doing, when each ant - including the queen - is quite stupid? Ants signal each other by touch, sound and pheremone, and these signals coordinate them in ways no individual ant could fathom. The signals propagate from ant to ant, inhibiting, modifying, amplifying and directing each other so that the ants, in obeying them, act for the colony's good. This complexity would not be necessary in a simple or isolated en- vironment. A colony must simultaneously find enough food, secure its nest against predators, dispose of waste and care for its young. Despite their caste system most ants perform many tasks. A worker may retrieve some food, store it, repair a collapsed tunnel, then go back to harvesting food. Each ac- tion is a response to stimulus from the environment and from other ants. An ant that signaled for more food may become sidetracked to help the queen brood, but the hunger signal remains and propagates to other ants, some of whom respond. The colony as a whole constantly responds to myriad stimuli, allocating resources and collectively making decisions. Asked to explain this collective cognition, you could point to evolu- tion by natural selection. Every generation, each ant's response to stimulus changed slightly, which tweaked the collective behavior. Successful tweaks survived, and ant societies grew more complex. But this story tells us little about how each ant colony reacts to its environment. How do those entan- 1 gled patterns of signaling bridge environmental stimulus to colony survival? How might they be engineered? Cognition is the process of knowing. While cognition commonly refers only to human thought, this definition comes from cybernetics. For a dynamical system to know, information must be encoded in its state. That information may come from the environment or quirks of the system's own nature. A system cognizes when it absorbes information, internal or external, into its state. To store any significant amount of information, the system must have a very "large" state space. Real numbers can technically hold an arbitrary amount of information, and the theory of dynamical systems whose state are vectors of reals is well-developed. Could we use that theory to describe cognition? Unfortunately, no. To store a message, the system must find a corresponding region of its state space and remain there. The system's dynamics function as an encoder of the message. To increase the size of the message, a state space would need to be split into increasingly small stable regions, and the dynamics would become increasingly difficult to analyze. Furthermore, each such region would border on a limited number of others, making it hard for the system to encode an arbitrary message starting from arbitrary initial conditions.1 Alternatively, we can increase the dimensionality of the state space. To keep the dynamics tractable, we need to restrict the ways in which the state variables affect each other. Complex networks fit the bill. The state space of a complex network has an arbitrary number of dimensions, and each agent affects only itself and its neighbors. Certain complex networks are already known to absorb information from their environment.2 All living systems are complex networks, as are some nonliving systems. A complex network is a system of agents that selectively inter- act with each other in ways that are hard to understand solely from knowledge of the individual agents. 1If the system starts with no prior information about the message, the initial conditions will certainly be arbitrary. 2This is usually described as acquiring order from the environment. 2 An agent is an indivisible entity which acts of its own accord. If it was not already clear, I will not investigate ant colonies in par- ticular. Instead, I will look at an entire class of complex networks - to which ant colonies belong - that produce unpredictable but stable and coherent patterns. Each of these words - unpredictable, stable, coherent - is both vi- tal and frustratingly vague. If the patterns were predictable, we would have no use for the complex system. If the system did not find a stable region of its state space, then it cannot store information. And to store a single large message rather than many unrelated and trivial messages, agents must spe- cialize and coordinate - even though each agent cannot directly affect most others. A pattern is coherent if each part of it depends on the rest. Unfortunately, no mathematics exist that describe pattern or stability in a complex system.[13] Without such mathematics, any reasoning about complex systems will be as fuzzy as the words I defined in the last paragraph. I will articulate, in this thesis, mathematics that underpin cognition. These mathematics could be used to: • control large distributed systems like smart grids and reconfigurable factories • solve hard optimization problems and automate engineering design • coordinate and plan complicated robotic motions The mathematics of cognition will be necessary - though likely not suffi- cient - for growing strong artificial intelligence. We may also come to better understand natural systems like market economies and ecosystems. That un- derstanding could help us to develop better public policy and safely manage the environment. And there are many other ways to apply cognition; I am sure that I will never see them all. The next two chapters will construct this new theory. I will begin with the interactions between agents, studying the way information propagates across a network. Then, in Chapter 3, I will set forth how agents coordinate and form patterns through the use of positive feedback. In Chapter 4, I will apply the mathematics of the first two chapters to a set of more concrete 3 models. My goal is a set of abstractions that explain a wide range of concrete cognitive systems. In my last chapter, I will examine why I chose those abstractions and not others. The concept of context will prove to be a strong guiding principle. It may seem, by the end, that I present some of this material out of order. I do apologize for any difficulties in understanding my text, but we are all at the mercy of cognition itself. It emerges whole, of its own accord. 4 Chapter 2 Signal Propagation This chapter will describe how information propagates across a com- plex network. By the end, I will have explained how agents gain access to macro-level information through the aggregations each agent performs for its neighbors. 2.1 A Naive Approach The standard model of a complex network is a directed graph G = (V, E) where the vertices V are the agents. For convenience, I will define two functions, T (v) = {(v′, v) : (v′, v) ∈ E} and F (v) = {(v′, v) : (v′, v) ∈ E}, to give the arcs incident to and incident from agent v, respectively. If there is no chance of ambiguity, these can be written T v and F v. The state of each agent v is governed by some function ψt v. The graph specifies which agents directly affect the state of which others; the state of agent v depends on the state of agent v′ if and only if (v′, v) ∈ E. This means that if time is discrete (t ∈ Z), then ψ1 v maps the states of agents {v} ∩ T v to the state of agent v, and if time is continuous (t ∈ R), then dψv/dt is a function of those same agent states. By changing their states over time and influencing their neighbors, agents are said to act per their definition. For agents to coordinate with each other, they must exchange informa- tion. Unfortunately, we cannot study solely how information spreads across the network, because the standard model ties up that spread with changes in agent state. To separate the two, I will complicate the model slightly. 5 b f a e c h d g i Figure 2.1: A directed graph. As an example of my notation, T b = {(a, b), (d, b)} and F b = {(b, c), (b, d)}. A signal is the action of one agent on another. Let every signal be a point in X. The signal xe ∈ X moves across arc e ∈ E. The vector of signals in a set of arcs A ⊆ E is a point xA ∈ X A, the · notation being the cardinality of A. I will use different subscripts on the same variable to select subvectors, so xA is a subvector of xE ∈ X E, and zA is a subvector of zE ∈ X E. Agent v's state now depends the signals xT v rather than the states of agents in v′ : (v′, v) ∈ T v. I will take the unusual step of identifying each agent's state with a function that maps input signals to output signals. fv : X T v 7→ X F v fv ∈ Fv (2.1) Fv is the state space through which each agent v moves. Having now adjusted the standard model, how do agents exchange information? I will briefly take the role of a single agent. If I am to join a coherent pattern, I must coordinate with other agents to which I am not necessarily adjacent. But I am only a simple agent, so my state cannot specifically reflect these distant agents.1 Any information I exchange with distant agents must therefore flow through my neighbors. I can tell my neighbors apart, but there is no way to know the ultimate source of their information - or for them to 1I use "simple" here in a very narrow sense. An agent can itself be complex, but by this assumption it cannot cognize the whole network of which it is a part. 6 know the ultimate destination of mine. Nonetheless the information channel between me and any distant agent consists of chains of adjacent agents. All agents constantly move, which changes the way they direct my signals. By the time my signal reaches a distant agent, and that agent responds, the information channel between us has changed in response to other signals as well as its own collective state. My state has changed too, for that matter. You might argue that agent movements in and of themselves do not doom my communication with the distant agent. If agents move cyclically, then I may be able to sychronize to some extent with that distant agent. But if agents only move in cycles, the whole network will simply vibrate indefinitely, making no progress towards a coherent pattern. Insofar as a cycle is steady, it amounts to a fixed state. And if the cycle changes over time (again at a rate similar to that of signal travel), then our information channel again loses integrity. So coordinating with distant agents seems unlikely. But how then can they form the coherent patterns necessary to store large messages? 2.2 Propagation Dynamics To foster coherent patterns, let us try slowing down agent movement to the point where they are quasi-static on signaling timescales. Each agent, if its function is fixed, simply maps input signals to output signals. Our single complex system is now two interrelated systems: one for the propagation of signals across the network and one for changes in agent state. For brevity, let FV = Qv∈V Fv. A point fV ∈ FV is a vector of functions fv for every agent v ∈ V . Similar to the convention of signal notation, fv is a component of fV , and gv is a component of gV . Definition 2.1. The propagation dynamics on G = (V, E) are a flow (or an iterated function) Γt : FV × X E 7→ X E parameterized by the agent functions fV . A point zE is a fixed point of the propagation dynamics only if zF v = fv(zT v) for all agents v ∈ V . The propagation dynamics define the way information spreads across the network. Usually they are stochastic and discrete, although as you will see in Chapter 4, the propagation dynamics can be stochastic or deterministic, discrete or continuous. 7 Our second system - the slow counterpart to the propagation dynamics - describes the emergence of patterns. To limit the speed of agent motion, there must be a metric on Fv. I will call it dv. Definition 2.2. The pattern dynamics on G = (V, E) are a continuous flow ψt V : FV 7→ FV that describes the motion of every agent function over time, starting from any point in FV . The motion of a single agent v is denoted ψt v and is Lipschitz continuous (with a Lipschitz constant L ≥ 0): t ∈ R, ∀fv ∈ Fv, ∀v ∈ V (2.2) dv(cid:0)fv, ψt v(fv)(cid:1) ≤ Lt An agent's motion at any instant is determined only by its current state and the signals it receives. I would like to make the last statement in that definition more formal, but I cannot do so quite yet. If ψv were differentiable, then its time derivative would be a function of the current fv and current xT v. Unfortunately, re- quiring differentiability would cripple a theory of cognition; there are many cognitive networks with non-differentiable states. I will discuss several of them in Chapter 4. For now, think of each continuous agent flow ψv as ap- proximated by an iterated function of the current state fv and the current input signals xT v, where each iteration moves the agent infintesimally. The propagation and pattern dynamics must be kept separate. But what does this mean? Say that the propagation dynamics always converge to a fixed point. According to Definition 2.1, the fixed point depends on the agent functions. Let p : FV 7→ X E map the agent functions to a fixed point of the corresponding propagation dynamics. As the pattern dynamics progress, the fixed point of the propagation dynamics would move. To be separate from the pattern dynamics, the propagation dynamics should stay arbitrarily close to their fixed point. That way, each agent v will change its state as a function of p(fV )T v. "Closeness" implies metric on X E. Let (X, ρ) be a complete metric space and A ⊆ E. Define a metric ρA(xA, yA) = Pe∈A ρ(xe, ye) on X A. (X E, ρE) is also a complete metric space.2 Resist the temptation to think of signals as real numbers. This interpretation is quite limiting, as you will see in Chapter 4. A better interpretation of signals is as measureable sets of stimuli. If µ : X 7→ [0, ∞) is the measure and △ is the symmetric difference, then ρ(x, y) = µ(x△y). 2I have chosen the L1 norm to combine vectors of signals, but there are other options. 8 Definition 2.3. At time t = 0, let xE be the state of the propagation dynamics and fV be the state of the pattern dynamics. The pattern dynamics are separated from the propagation dynamics at time t if there exists an arbitrarily small ǫ > 0 such that: (2.3) ρE(cid:16)Γt(cid:0)ψt V (fV ), xE(cid:1), p(cid:0)ψt V (fV )(cid:1)(cid:17) ≤ ǫ Agent states map to signals via p, which in turn determine how those agent states change over time. I will provide an example proof of separation in Section 2.4. The propagation dynamics, separated from the pattern dynamics, solve a major standing problem in complex systems. Emergence is gener- ally agreed to come from feedback loops between the micro and macro levels of a complex system[3], but most models have trouble conveying macro- level information to individual agents. They mostly choose between two approaches.3 The first - taken by cellular automata - is to let information percolate on its own. As we saw in Section 2.1, this is no different from ignoring the problem and hoping for a miracle. The second approach is to compute a single, crude aggregate of all the agent states and make that single aggregate available to every agent. These crude aggregations force a tradeoff between agent complexity and pattern coherence. On one end of the scale, the crude aggregate perfectly summarizes the state of the whole system. Each supposedly simple agent must then be complex enough to parse this information and understand its part in the pattern - a clear contradiction. Multi-agent systems usually operate at or near this extreme. On the other end of the scale, the aggregate contains no useful information about macro-level pattern. Without it, agents cannot specialize. Without specialization, a pattern cannot be coherent. Agent- based models often use these uninformative aggregations. Propagation dynamics sidestep the complexity/coherence tradeoff by distributing the work of aggregation. Each agent aggregates information for its neighbors. This concept is not new; Freidrich Hayek had noticed by 1945 that actors in a market aggregate information about the scarcity of each product by setting prices.[7] To know how much of a good to make, the producers of that good need not trace all the ways in which it is used or 3The few exceptions - artifical neural networks come to mind - invariably mimic specific natural systems. No one has explained precisely why they work. 9 transformed by the rest of the economy; they need only observe changes in price. Likewise to know how much of each good to use, consumers need not keep track of improvements or disruptions in every supply chain. No human could ever be fully aware of all the decisions made in the economy, yet those decisions cohere. Definition 2.4. The aggregate of the graph G and agent states fV is given by a function p : FV 7→ X E such that p(fV ) is always a fixed point of the propagation dynamics on G. The function p is the aggregation. In the course of modeling any particular cognitive network, it's natural to ask which information propagates and which doesn't. To keep my theory as general as possible, I have avoided this question and tried not to assume anything about the answer. 2.3 Existence of an Aggregation The aggregation p only exists if the propagation dynamics always have a stable fixed point, preferably a unique one. Any proof of convergence to a fixed point will depend on the particular application of this theory. This section contains two simple examples. Consider first the following propagation dynamics: every agent v, si- multaneously and at intervals in time, applies fv to its inputs xT v and updates its outputs xF v with the result. Γ1(fV , xE) =(cid:0)fv(xT v)(cid:1)v∈V Definition 2.5. Let α ∈ (0, 1) and xT v, yT v ∈ X T v. An agent function fv contracts if: αρT v(xT v, yT v) ≥ ρF v(cid:0)fv(xT v), fv(yT v)(cid:1) Theorem 2.1. If every agent function contracts, then the propagation dy- namics defined by Equation 2.4 converge exponentially to unique fixed point. (2.4) (2.5) 10 Proof. ρE(Γ1(fV , xE), Γ1(fV , yE)) =Xe∈E =Xv∈V Xj∈F v =Xv∈V ≤Xv∈V ρ(cid:0)Γ1(fV , xE)e, Γ1(fV , yE)e(cid:1) ρ(cid:0)fv(xT v)j, fv(yT v)j(cid:1) ρF v(cid:0)fv(xT v), fv(yT v)(cid:1) αρT v(xT v, yT v) (2.6) Γ1 is a contraction mapping. All contraction mappings converge exponen- tially to a unique fixed point. ρE(cid:0)Γ1(fV , xE), Γ1(fV , yE)(cid:1) ≤ αρE(xE, yE) Updating all agents simultaneously requires the agents to synchronize, which - according to my assumption that agents only coordinate via signals - they are unable to do unless the propagation dynamics converge. The synchronous propagation dynamics in Equation 2.4 are physically unlikely. Consider now the propagation dynamics in which each agent updates randomly according to a Poisson process in time. The Poisson processes are independent and identically distributed with a rate λ. These asynchronous propagation dynamics Λ are a jump process on X E whose jumps are them- selves Poisson-distributed in time, albeit with a much faster rate than λ. Letting xAkxB = xA∪B concatenate two vectors indexed by disjoint sets A and B, each jump moves xE to xE−F vkfv(xT v) for a randomly drawn agent v. Theorem 2.2. If every agent function contracts, Λ contracts to a unique fixed point. Proof. Since Γ has only one fixed point zE, then by Definition 2.1 so does Λ have the same fixed point. Let the interval [a, b) be an interval in time over which every agent has updated at least once. The expected length of this interval can be derived from the Poisson distribution. 1/2 = (1 − P (N(b − a) = 0))V 1/2 = (1 − e−λ(b−a))V 11 E(b − a) = − 1 λ ln(1 − 2−1/V ) (2.7) Because this interval grows only logarithmically with the number of agents, the number of agents matters little. The actual size of each interval has a probability distribution, but the law of large numbers asserts that the time- average of interval lengths gets arbitrarily close to the expectation of that length as time goes on. The propagation dynamics contract at least as much over the interval [a, b) as they would in one synchronous update. The distance between the trajectories from xE and yE over time is therefore bounded from above by an exponential decay. αt/(b−a)ρE(xE, yE) ≥ ρE(cid:0)Λt(fV , xE), Λt(fV , yE)(cid:1) (2.8) Having shown that aggregations exist for propagation dynamics Γ and Λ, I now ask: How complete is the aggregate? For two distant agents to co- ordinate, the aggregate available to each must be sensitive to the state of the other. In other words, the signals available to each agent should include at least some information about every other agent. Given the restriction on fixed points in Definition 2.1, this property depends only on the agent func- tions (and the graph) rather than propagation dynamics they parameterize. I can see two scenarios in which information fails to spread properly. If the graph grows too large and sparse, the shortest path between a pair of agents can grow arbitrarily long. Agent contraction does not just bound the time in which signals converge, it also limits how far they can spread through the graph. Agents can (and usually will) prioritize certain signals over others, which will cause the former to propagate further than the latter. Nevertheless, contractive agents cannot pass on more than a fraction of the signals they receive. Over a long enough path, even the strongest and most important of signals must fade. One solution is to give large networks the small-world property4, thereby putting an upper bound on the shortest path between any two agents. Another solution is to relax the rate of convergence from exponential to asymptotic. 4in which the number of arcs to and from any particular agent has a geometric prob- ability distribution. In simple terms: while most agents have relatively few arcs, a few agents have many, and a very few have a huge number. 12 Signals can also fail to propagate if agents direct them based not on their content but on their origin. Obviously a closed community of agents - one with no arcs to the rest of the graph - will never send any signals to the rest of the graph. The same thing can happen without an explicitly closed community if agents make some of their output signals insensitive to changes in their input signals. While this behavior can sometimes be desireable, a "virtual" community of agents whose signals to the rest of the network are all insensitive to changes within the community is no different from an explictly closed community. 2.4 Separating Propagation from Pattern I defined separation in Definition 2.3 as the propagation dynamics staying close to an aggregate as that aggregate moves in response to the pattern dynamics. In this section, I will discuss how stability of the propa- gation dynamics together with Lipschitz continuity of the pattern dynamics can maintain separation. The aggregate should not move too fast, compared to the rate at which the propagation dynamics converge. I will use a differentiable and decreasing function of time φ : [0, ∞) 7→ [0, 1] to characterize the rate at which the propagation dynamics converge. φ(t)ρE(xE, p(fV )) ≥ ρE(Γt(fV , xE), p(fV )) t ≥ 0 (2.9) Because Γ0(fV , xE) = xE, φ(0) = 1. If the propagation dynamics are asymp- totically stable, then limt→∞ φ(t) = 0. Since Definition 2.2 limits the speed at which the agent functions fV move, the aggregation should also be Lipschitz continuous. Having supposed a metric dv on Fv in Section 2.2, I will use the average of those distances as a metric on FV . dV (fV , gV ) = dv(fv, gv) (2.10) 1 V Xv∈V This particular dV will make Theorem 2.3 slightly easier to prove, but there are other viable choices. As far as dv is concerned, a natural choice is: dv(fv, gv) = sup xT v ρF v(cid:0)fv(xT v), gv(xT v)(cid:1) 13 (2.11) Theorem 2.3. Let the aggregate p(fV ) = zE. The aggregation p is Lipschitz continuous if there exists an M > 0 such that: M(1 − φ(t)) dV (fV , f ′ V ) ≥ ρE(cid:0)zE, Γt (f ′ Proof. Let z′ E = p(f ′ V ). Starting from the triangle inequality: t ≥ 0 V , zE)(cid:1) E(cid:1) ≥ ρE(cid:0)zE, z′ E(cid:1) E) t ≥ 0 (2.12) (2.13) ρE(cid:0)zE, Γt(f ′ V , zE)(cid:1) + ρE(cid:0)Γt(f ′ V ) + φ(t)ρE(zE, z′ V , zE), z′ E) ≥ ρE(zE, z′ M(1 − φ(t)) dV (fV , f ′ This inequality is satisfied trivially at φ(0) = 1. At all other points in time, M dV (fV , f ′ V ) ≥ ρE(zE, z′ E) M dV (fV , f ′ V ) ≥ ρE(cid:0)p(fV ), p(f ′ V )(cid:1) (2.14) Equation 2.12 limits the rate at which the propagation dynamics, after a change in the agent functions, can diverge from the previous fixed point. Equation 2.13 pits this rate against the rate of convergence. It should not actually be necessary for these two rates to cancel out, so long as the rate of convergence exceeds the rate of divergence. Theorem 2.4. If the aggregate p is Lipschitz continuous and Equation 2.9 holds, there exists some t′ > 0 such that Γ and ψV are separate for all t > t′. Proof. Let xE, fV be the state of the cognitive network at t = 0, so zE = p(fV ) is the initial aggregate. Given some small δ > 0, let x′ E = Γδ(fV , xE) and z′ V (fV )). Starting again from a triangle inequality: E = p(ψδ ρE(x′ E, zE) + ρE(zE, z′ E) ≥ ρE(x′ φ(δ)ρE(xE, zE) + MLδ ≥ ρE(x′ E, z′ E, z′ E, z′ ρE(x′ E) ρE(xE, zE) ρE(xE, zE) φ(δ) + MLδ ≥ E) E) (2.15) (2.16) If the right-hand side of Equation 2.16 is greater than one, the signals get further away from the aggregate over the interval δ. Less than one, and they get closer. If ρE(xE, zE) = ǫ/2 and the right-hand side is one, then: 1 2 ǫ = lim δ→0 MLδ 1 − φ(δ) 14 (2.17) We can ensure this limit exists by requiring that: d dt MLt ≤ d dt (1 − φ(t)) t ∈ [0, δ] ML ≤ − dφ dt t ∈ [0, δ] (2.18) By decreasing L further, we can make ǫ arbitrarily small. Equation 2.15 describes a single step through time. If ρ(xE, zE) > ǫ/2, then the signals Γδ(fV , xE) step closer to p(ψδ V (fV )). Adding more steps and taking the limit as δ → 0, the signals will approach the (ǫ/2)-ball around the aggregate. At some finite time t′ they will be within ǫ of the aggregate, and they will never leave that ǫ-ball. ρE(cid:16)Γt(cid:0)ψt V (fV ), xE(cid:1), p(cid:0)ψt V (fV )(cid:1)(cid:17) ≤ ǫ t > t′ As long as the propagation and pattern dynamics are separated, agent v reacts only to p(ψt V (fV ))T v, or at least to arbitrarily similar signals. If we let ǫ grow, ψV will become stochastic; the propagation dynamics are often stochastic themselves, and there is no way for an agent to know where in the ǫ-ball the aggregate actually is. It will react to whatever signals it sees. In fact, the fixed point of propagation dynamics need not be unique. As long as the propagation dynamics stay near one of the fixed points and the fixed points don't pass within 2ǫ of each other, then the system's choice of a fixed point is unambiguous, and the aggregation is well-defined. The price we would pay for the extra flexibility is hysteresis in the pattern dynamics. If multiple fixed points exist, then there is no way to know which one the system will choose without knowing which fixed point it has chosen in the past. The separation proof can also help us to simulate cognitive networks with a computer. The constants M and L along with the convergence func- tion φ imply an upper limit on the time step δ, beyond which Equation 2.18 no longer holds. 15 2.5 Retrospective on Propagation We started with a goal: to design dynamical systems that cognize - that perform the process of knowing. A cognitive system, simply by obeying its own dynamics, absorbs information and stores that information in its state. We focused on complex networks because their state space has many dimensions, and high-dimensional spaces can store more information. But to make full use of that state space, the agents in the network must coordinate with distant counterparts and specialize. This is quite difficult, because an agent cannot be explicitly aware of any other agents with which it does not share an arc. Agents may only communicate through other agents. Any change in the agents thus alters their communication channels. To keep those communication channels stable, we slowed down changes in agent state, giving the propagation dynamics time to converge to a fixed point. Each component of that fixed point is a signal traveling over an arc in the directed graph. That single signal can reflect, to varying degrees, the state of every agent. Because the propagation dynamics are parameterized by the agent states, the fixed point moves as the agents do, and the propagation dynamics never quite reach it. But the closer they are to their fixed point, the more certain each agent is about the information it receives. Therefore the slower the agents move relative to the propagation dynamics, the more deterministic the agents' motion. Although each signal goes from one agent to another, the communi- cation between agents is many-to-many rather than one-to-one. Every agent sees a few components of the aggregate, as produced by its neighbors. These were in turn produced from other components of the aggregate, as produced by their neighbors. The propagation dynamics are the process of aggregation - the process by which the micro level becomes aware of the macro level. I identify cognition with the emergence of patterns, and the emergence of patterns is widely identified with feedback between the micro and macro levels of a complex network[3]. I have managed to explicitly link the micro level to the macro level - one half of the required feedback process. To my knowledge, this has never been done before with simple agents and without any omniscient view of the network. As the agents move in response to that aggregate (at least the com- 16 ponents they can see), the aggregate responds to their motion in turn. The conditions for distributed aggregation are few and broad. They come in two classes, which I call primary and secondary. Primary conditions must apply to any network, regardless of the fixed point proof used for the propagation dynamics. • Agents must be quasi-static on the signaling timescale. (L is small.) • Signals must have a metric (ρ). • The propagation dynamics must converge. (At least as fast as φ.) • The propagation dynamics Γt(gV , p(fV )) must not diverge too quickly from p(fV ). (Equation 2.12) The first two conditions apply to the micro-level, which makes them easy to enforce. While the particular reasons vary from field to field, the heart of the matter is that macro-level behavior is difficult to understand or control. To try is usually to fail or to diminish the network's cognitive ability. For instance, what if I were to stipulate that the propagation dynamics contract without requiring that each agent contract? Some agents would be allowed an α ≥ 1, but which ones? It would only take two (mutually adjacent) ex- pansive agents to prevent convergence. Such a scheme is not impossible - the agents could coordinate their contraction or expansion as part of the pattern dynamics. But it would be much more difficult to analyze and control. The second two primary conditions avoid this difficulty through the use of abstraction. They are metaconditions - conditions about conditions. Any concrete model of cognition will add its own set of conditions - the secondary conditions. To give an example, the proofs in Section 2.3 both require that each agent contract individually. That secondary condition need not hold for every cognitive network; the proof of a metacondition can differ for every application. There is another metacondition hidden in Definition 2.1: the require- ment that, at a fixed point zE of Γt(fV , ·), zF v = fv(zT v) for every agent v. It means that the set of potential fixed points is determined on the micro level; the propagation dynamics - a macro phenomenon - only select a fixed point from that set. The two versions of the propagation dynamics in Section 2.3 (Γ1 and Λt) actually have the same fixed points. The three metaconditions I've created so far are relatively easy to tackle because they only restrict the propagation dynamics. Because the 17 propagation dynamics are often specific to a problem domain anyway, the secondary conditions necessary in the special case sacrifice no descriptive power or ease of application in the general case. I have striven to keep the my primary conditions as few and as broad as possible. The agents, for example, are still black boxes. Their state is not parameterized, which frees us to use nearly any parameterization we like. They need not even be uniform. Another example are the signals, which only need a notion of distance. Most study of complex networks centers on the agents, trying to an- swer questions like: What do they do? How do they interact? My theory shifts focus away from the agents and toward their signals: How do signals propagate? What information do they carry? Aggregation (as in Definition 2.4) creates a many-to-many communications channel, and Section 2.4 veri- fies that channel's integrity. That still leaves us asking what information it conveys. There are as many answers to this question as there are problem domains, but many domains have commonalities. For example, an agent that can be connected to an arbitrary number of others must combine an arbitrary number of signals. A natural way to do this would be to recur- sively fold pairs of signals together - to give them algebraic structure. Signal algebras could help determine which information spreads across the network and which does not. In addition to shifting focus from agents to signals, I have also changed my view of - for lack of a word - that which cognizes. Artificial intelligence researchers usually try to create cognitive algorithms. Creating an algorithm means breaking down a task or process into discrete steps which mostly occur in linear order. Aside from the fact that writing a cognitive algorithm has proven to be quite a nasty problem, this approach fosters bad habits of mind. Because the default point of view is omniscient, we rarely ask key questions about information - how it spreads, how it's stored, where it gets used. We get used to thinking about information in discrete, hierarchically-organized packets rather than in diffuse gestalts. Instead of writing cognitive algorithms, I am designing cognitive dy- namical systems. That means accounting for any transmission of information via signaling and limiting each agent's use of information. It also creates more questions: How do states affect each others' motion? Can the system's dy- namics lead to gestalt configurations of state? When are those configurations stable? I will start to answer these questions in Chapter 3. 18 Chapter 3 Pattern and Feedback So now I have separated signaling (the propagation dynamics) from the motion of agents (the pattern dynamics), and the agents have time to collectively aggregate macro-level information. As they move, the aggrega- tion allows them to coordinate their state, together processing information beyond any individual agent's capability. That information is stored in pat- terns of agents. In this chapter I will formally define pattern in a cognitive network, and I will explain how patterns arise from feedback between agent state on the micro level and the aggregate on the macro level. After that, I will discuss in broad terms how patterns relate to the information they store. 3.1 Existing Approaches to Pattern Patterns encode a complex network's knowledge, and their emergence is precisely the process of cognition. Despite their importance, most funda- mental questions about patterns remain unanswered. When do they arise, and when do they not? If patterns do arise, which ones? We may yet answer these questions, but not until we know what a pattern is. I danced around their definition in Chapter 1, when I said that patterns are large configura- tions of agents and their relationships. These configurations, if the system is to cognize large chunks of information, must be commensurately large, and they must also be unpredictable, stable and coherent. We have tried to identify the building blocks of patterns. Network 19 motifs[15] are small subgraphs with fixed numbers of vertices that repeat across the network. For a fixed n ∈ N, there are a limited number of possible n-vertex motifs. The network motif approach starts by identifying, through the use of statistical tests, which three-vertex motifs occur unusually often. It then moves on to larger motifs, controlling for any smaller motifs already found. The approach usually stops at five-vertex motifs. Networks in the same problem domain exhibit similar motifs, which can teach us about the style of patterns in that problem domain. But if all networks in a domain have the same motifs, then those motifs do not encode an individual network's knowledge. Rather, networks store information by combining motifs into patterns. It remains unclear how motifs come to be combined. It's also not clear that I should be asking how motifs combine instead of asking how agents combine. To ask how patterns form is to ask how an agent coordinates with distant neighbors of whom it cannot be aware. I could allow agents to know the motifs of which they are a part - relaxing my simplicity axiom - but I could not explain how motifs coordinate without being aware of each other any more than I could explain how agents do the same. Furthermore, because I am not working within any particular problem domain, I know less about individual motifs than I know about individual agents. I conclude that while motifs are a useful tool on the micro-level, shifting focus from agents to motifs would add complication without answering my fundamental questions about cognition and pattern emergence. Another approach is to form patterns by explicit consensus1 of the constituent agents. There is a large body of work on consensus networks, ably reviewed in [17]. The consensus definition of consensus is "to reach an agreement regarding a certain quantity of interest that depends on the state of all agents." This usually means that "the state of all agents asymptotically be[comes] the same." To the degree that agent states do not become the same, they do not consense. A pattern does not follow automatically from consensus, but the agents can agree on a pattern to form together. In this case, the state they agree on must be sufficient to select and describe that pattern. Because each agent must store this state, we arrive back at a tradeoff similar to the one I described in Section 2.2. 1Any kind of pattern will constitute at least an implicit consensus. 20 That tradeoff pitted the simplicity2 of the agents against their need for macro-level information. I resolved it by using the propagation dynamics to compute an aggregate, thereby distributing the work of aggregation among all the agents. Consensus networks fail to distribute the storage of information among all the agents, which pits the simplicity of the agents against the network's ability to store information. In other words, consensus networks must trade off agent simplicity against the network's cognitive ability. An agent that can - by itself - describe large, coherent patterns is no longer simple relative to the network. Thus consensus and coherence are at odds, and we find ourselves trading off agent simplicity against the scope and coherence of pattern. I seek to sidestep this tradeoff as I did the last... or to sidestep the same tradeoff again. Are these tradeoffs distinct, or are they aspects of the same fundamental paradox? 3.2 Feedback Loops It is generally agreed that patterns in a complex network emerge as feedback loops between micro and macro behavior[3]. But what is a "feed- back loop between micro and macro behavior"? In a cognitive network, the agents (micro level components) collectively compute an aggregate (at the macro level), which in turn determines agent motion (on the micro level). That interplay creates the possibility for micro-macro feedback, but it doesn't guarantee that feedback occurs. What would make that guarantee? I will start with a pair of agents u, v ∈ V . Each agent has an arc to the other - (u, v), (v, u) ∈ E. If they coordinate, then z(u,v) should reinforce z(v,u) and vice versa.3 Reinforcement suggests at least a partial ordering of signals, which I will denote with "≺".4 This ordering may vary according to the micro-level context. Mutual reinforcement also suggests causality. An increase in z(u,v) should cause agent v to change its function fv in a way that increases z(v,u). 2Narrowly: relative to the network as a whole. 3I'm using z rather than x to remind you that agents react the aggregate. 4If you're still thinking about signals as measureable sets like I suggested in Section 2.2, then perhaps for x, y ∈ X, x ≺ y if and only if x ⊂ y. A stronger ordering might be x ≺ y ⇐⇒ µ(x) < µ(y). 21 The converse should also be true. optimizer of some real function qv : X T v+F v 7→ R. For a positive δ → 0, I will treat each agent v as a greedy ψδ v(fv) = arg max f ′ v∈Fv (cid:8)qv(cid:0)zT v, f ′ v(zT v)(cid:1) : dv(fv, f ′ v) ≤ Lδ(cid:9) (3.1) You might protest that making every agent a greedy optimizer is too severe a restriction, that it would at the very least exclude networks made up of people. But notice that I have not defined qv. I am not choosing which kinds of agents to analyze; I am abstracting the way any agent reacts to its surroundings. Studying the motion of agents would normally require calculus, which would in turn require that the state spaces Fv and X be differentiable. As you will see in Chapter 4, differentiability really is too restrictive. Equation 3.1 only requires that a utility function qv exist that agent v greedily optimizes. Game theory will replace calculus. Greedy optimization can describe a very wide variety of agents and behaviors. Agents in a market optimize profit, for instance, and molecules seek their lowest-energy state. Even in more complicated situations, the for- malism can still be useful. Take the market example. A person might choose less-profitable work because it lets him or her spend more time with fam- ily. In that case, utility should reflect both profit and family time. Another might sacrifice short-term earnings in exchange for long-term gains. We can express such priorities by reformulating the signals as functions of time.5 For two agents to coordinate, their utility functions must be comple- mentary in the game-theoretic sense. More simply: each agent must increase the marginal gain its partner reaps by coordinating. Let xE\x′ e = xE−{e}kx′ e and more generally xA\x′ A∩B. With that, and given a current aggregate zE, let xE, x′ E, zE) < ǫ, where ǫ is the separation tolerance from Definition 2.3. If x(u,v) ≺ x′ (u,v) and x(v,u) ≺ x′ E ∈ X E such that ρE(xE, zE) < ǫ and ρE(x′ B = xA−Bkx′ (v,u), (u,v), xF v\x′ qv(cid:0)xT v\x′ (v,u)(cid:1) − qv(cid:0)xT v\x′ ≥ qv(cid:0)xT v, xF v\x′ (u,v), xF v(cid:1) (v,u)(cid:1) − qv(cid:0)xT v, xF v(cid:1) (3.2) 5Computer simulation of existing cognitive networks may prove to be impractical. There may not exist a good finite approximation of the signals, or the agents' utility func- tions may be impossible to observe in full. The optimization carried out by each agent may defy our power to solve it on a large scale. This potential limitation is troubling, but I must ignore it in order to continue. 22 b f a e c h d g i Figure 3.1: Feedback between agents 'h' and 'f'. (v,u), xF u\x′ qu(cid:0)xT u\x′ (3.3) (u,v)(cid:1) − qu(cid:0)xT u\x′ ≥ qu(cid:0)xT u, xF u\x′ (v,u), xF u(cid:1) (u,v)(cid:1) − qu(xT u, xF u) This condition - called supermodularity - will not always lead the signals z(u,v) and z(v,u) to both increase or both decrease. It may be that no fv ∈ Fv exists that increases z(v,u), in which case agent v would like to continue the feedback process but cannot. The same could also be true for agent u. Nevertheless, supermodularity is necessary for positive feedback between our two agents. Many pairs of agents are not mutually connected. Even if they are, they may be involved in a larger feedback process that excludes the arcs that connect them directly. Distant agents communicate through chains of adjacent agents. A walk should therefore exist from each member of a pair to its counterpart. Concatenating these walks makes a single closed walk. Because a closed walk can start from any of its vertices and end up back where it started, it can be expressed as a subgraph - rather than as a sequence of alternating vertices and arcs - without losing any mathematical structure. Thus we can say that for two agents u and v to coordinate, there must exist some closed walk C = (VC, EC) such that u, v ∈ VC. In the case of Equations 3.2 and 3.3, VC = {u, v} and EC = {(u, v), (v, u)}. To say that the signals between u and v reinforce each other is to say that the signals along an entire closed walk reinforce each other. It follows that if this pair of distant agents coordinates, so too must every agent in some closed walk that includes the pair. That closed walk could include 23 b f a e c h d g i Figure 3.2: Feedback between (say) agents 'h' and 'd'. Agents 'b', 'c', 'f' and 'h' are equal participants in the feedback loop. any number of walks between u and v, so long as the entire walk keeps reinforcing itself. In fact, C could be any strongly connected subgraph of G. Remember that each agent v is only explicitly aware of itself and the signals zT v. All distant agents are anonymous and also of indeterminate number and connectivity. Therefore any feedback process between distant agents is a micro-macro feedback loop. Patterns arise from positive feedback over closed walks in the graph. Definition 3.1. Let C = (VC, EC) be a closed walk in G and zE = p(fV ). Let the pattern and propagation dynamics be separated by ǫ. Take any xE, x′ e for all e ∈ EC. C is a feedback loop if, for all v ∈ VC, E ∈ X E such that ρE(xE, zE) < ǫ and ρE(x′ E, zE) < ǫ. xe ≺ x′ (3.4) EC , xF v\x′ qv(cid:0)xT v\x′ EC(cid:1) − qv(cid:0)xT v\x′ EC , xF v(cid:1) ≥ qv(cid:0)xT v, xF v\x′ EC(cid:1) − qv(xT v, xF v) Definition 3.2. A feedback loop is robust if Equation 3.4 holds for any fV −VC ∈ FV −VC . I define robustness here mostly to point out that the agents V − VC can affect the feedback condition in Equation 3.4. There are likely many degrees and kinds of robustness, but that analysis is out of my scope. 24 b f a e c h d g i Figure 3.3: Depending on the feedback condition for agent 'f', agent 'h' may not be necessary to maintain feedback in the rest of the loop. The coherent feedback loop (with 'h' removed) is pictured. The union of contiguous closed walks is also a closed walk, and the If a feedback loop same is true for unions of contiguous feedback loops. breaks, parts of it may either remain or not. Definition 3.3. A feedback loop is coherent if it has no subgraphs that are feedback loops in their own right. A feedback loop that is not coherent may include virtual communities of the kind I mentioned briefly in Section 2.3. Definition 3.4. A pattern is a feedback loop in which the aggregate sub- vector zEC is Lyapunov stable. Definition 3.4 is similar to a Nash equilibrium[6], but it does not require the entire system to be stable. Even the agents VC in the pattern can continue to move, so long as the aggregate zEC remains at rest. But how does the aggregate become stable if it undergoes positive feedback? A runaway feedback loop will not reach a steady state. The answer is to bound the image of the aggregation p(FV ) ⊂ X E. Any positive feedback loop in a compact state space will either reach those bounds or break its own supermodularity condition first. Since a pattern is a stable feedback loop, it must always lie on a bound of the aggregate space. In fact, the pattern could not be stable 25 p FV p(FV ) X E Figure 3.4: Bounding the image of the aggregation p. Return to Section 2.2 for details about the aggregation. without the feedback loop holding it against the boundary. The image of the aggregation can be manipulated via the agent function spaces Fv. 3.3 Coherence and Causality Let us return to the specifications we set for pattern in the intro- duction: stability, coherence and unpredictability. Patterns are stable by definition. Some are coherent. I will argue that the definition of coherence in Section 3.2 is a good one, and that coherence implies unpredictability. If cognition is the process by which a system knows or is aware of something, then patterns embody and encode that knowledge. I said in Chapter 1 that a pattern is coherent if every part of it depends on the rest. By Definitions 3.1, 3.3 and 3.4, every ze, e ∈ EC can depend in some way on every state fv, v ∈ VC. Each agent's role in the pattern is defined by its neighbors, whose roles are in turn defined by their neighbors. A pattern, being a stable configuration of agent relationships, constitutes an implicit consensus of the agents VC. Rather than rule out explicit consensus, Definition 3.4 renders it a trivial special case.6 6See Section 4.4 for an example. 26 In general, a pattern encodes knowledge that no individual agent or motif can. Furthermore, because no agent could produce the stable zF v∩EC without the proper zT v∩EC , no one agent or relationship encodes any inde- pendently useful knowledge. Instead, the smallest useful unit of knowledge is the coherent pattern. Not all patterns are coherent; a pattern can be com- posed of smaller, contiguous patterns. But if a pattern is coherent, then any closed loops within it depend on the rest of the pattern in the same way that individual agents do. Where does the knowledge in a coherent pattern come from? I will examine the various sources of information which a network may cognize: initial state, the system's own dynamics and the environment. Each of them will influence most patterns in most networks to some degree. The environment is the most obvious of the three influences. By the second law of thermodynamics, no living network can subsist without draw- ing order from its environment. Despite the close ties between a cognitive network and its environment, I have not yet specified how the two are re- lated. Let the graph G have at least one special vertex w, which represents the environment rather than an agent. Any signals coming from this vertex are said to enter the network, and any signals sent to it are said to leave the network. In order for feedback loops including w to stabilize into patterns, the function fw must be quasi-static on pattern timescales. Since w has no utility function, the definition of a feedback loop must exclude it. Making the environment quasi-static is not as restrictive as it sounds, for two reasons. First: signals can represent probability distributions or cycles of interactions over time. Second: feedback relations with the environment can be modeled by simply giving w a utility function and allowing it to move, thereby folding it into the model. Some of a network's knowledge comes from its own dynamics. It will tend to form certain patterns and not others, based on the objective functions qV and the search spaces FV . Some aspects of this style can be captured by network motifs. Insofar as motifs are common across many instances of a network model, they isolate style from environmental influence or prior information. Of course the details of a network need not repeat to be cognized - feedback loops can amplify the information available to even one agent. These non-repeating details will not affect the network's motifs. Lastly, patterns can reflect the network's initial state. They usually 27 will, unless there is only one viable pattern in the whole state space. Initial states may exist which do not lead to a pattern, even if viable patterns exist somewhere in the state space. An engineer can prevent this case by ensuring that the pattern dynamics are topologically mixing in the case that no pattern arises. In the search for a pattern, the system should eventually visit any particular region of its state space. If a coherent pattern reflects knowledge of all three influences above - initial state, the environment and the system's own dynamics - then these influences are interwoven and cannot be isolated from one another. Our inability to correspond subsets of knowledge with subgraphs of a coherent pattern prevents us from predicting coherent patterns. Specifically, it dis- rupts the causal relationships between patterns (effects) and the conditions from which they arise (causes). We cannot know which pattern will arise from any given set of conditions, and any given feedback loop could have begun in any number of ways. A system in which cause and effect cannot be linked is acausal. This is curious because - assuming the pattern and prop- agation dynamics are perfectly separated - the pattern dynamics are both acausal and deterministic. In Chapter 3, I have continued to shift focus away from agents and towards signals. I defined feedback loops and patterns not in terms of the agent states but in terms of the signals between the agents. The signals in a pattern must be stable, yet the stability of the agents in the pattern is unimportant in and of itself. And despite the focus on signals, my theory derives much of its power from keeping those signals unrestricted. Formally, they must have a metric and a partial ordering - nothing more. The partial ordering can even be unique to each pair of agents (with only minor changes to Section 3.2). Every concrete example in Chapter 4 will take advantage of the flexibile definition of a signal. 28 Chapter 4 Applications This chapter will explain how various domains of study fit into our new theory of cognition. Its purpose is to better explain cognition by providing exemplars, rather than to learn about those exemplars per se. Most formal proofs are also out of scope - a matter for future work. That said, I expect that developing these applications further will bear fruit in their respective domains. Each section will begin with a short overview of the exemplar's model before drawing an analogy between that model and my theory of cognition. I will start off with Prigogine's dissipative structures.[18] They will help me introduce a concept common to many applications: the two-way networks. Unfortunately, a formal theory of two-way networks must wait for another time. Where dissipative structures are physical systems, cognition can also apply to information processing. Artificial neural networks will serve as an exemplar. They will be followed by market economies and then by ant colony optimization. Cognition should apply naturally to ecology as well, but I know too little of that field to make the attempt. 4.1 Dissipative Structure As I said in Section 3.3, many cognitive networks absorb their knowl- edge from their environment. Often, that knowledge reflects two aspects of 29 the environment that are in disequilibrium, by which I mean that the en- vironment has a high degree of order derived from the separation of those two aspects. Knowing the disequilibrium allows the cognitive network to alleviate it by bridging the two aspects, transporting or transforming some- thing from one aspect to the other. That something, which I will call the "throughput", may be matter or or information or anything else that can be expressed as a measurable set. Autocatalytic reaction-diffusion systems are a simple example of a two-way network. A reaction-diffusion system is a set of reactions occurring in a set of places. For our purposes, each reaction in a particular place is an agent, and sets of reactants make up the signals. The products of each reaction either react again in the same place, diffuse to another place, or leave the system. Alan Turing and Ilya Prigogine analyzed reaction-diffusion systems that produce their own catalysts[19][18]. They found that when concentra- tions of certain reactants are kept high and the concentrations of certain products are kept low, the reaction-diffusion system produces its own cata- lysts so as to increase the rate at which the abundant reactants are trans- formed into the scarce products. This is autocatalysis. The newly-catalyzed reaction produces entropy in the throughput faster than before. At the same time, the entropy in the system's state decreases. The second law of ther- modynamics remains unbroken because the system produces more entropy in the throughput than it loses by cognizing the disequilibrium. Eventually the system stablilizes with high concentrations of the catalysts, far from the thermodynamic equilibrium. An autocatalytic loop is a feedback loop - a closed walk in the graph of reactions over which an increase in each reaction's rate causes the rate of subsequent reactions to increase. Through these feedback loops, the reaction- diffision system cognizes the chemical potential between certain of its original reactants and ultimate products. When the feedback stabilizes, the system has stored information about that chemical potential as a pattern of reactions and the reactants they exchange. I have just described the pattern dynamics of a reaction-diffusion sys- tem. They looked straighforward; what then makes the reaction-diffusion system a two-way network? The answer has to do with the flow of infor- mation. By the law of mass action, rates of reaction depend on the concen- trations of both reactants and products. As the reactants travel "forward", information about the products must travel "backward". On fast timescales 30 - while the various chemical concentrations are quasi-static - the flow of in- formation forward and backward works itself out into deterministic rates of reaction. The propagation dynamics are the process by which this two-way flow stabilizes. Let us call the space of forward signals X and the space of backward signals Y . Each type of signal in a two-way network travels over its own graph. The two graphs are mirror images - wherever one has an arc (u, v), the other has an arc (v, u). The vertex set is the same for both graphs. Because each graph implies the other, we can still talk about a single graph G by choosing a convention. Agent functions map both kinds of inputs to both kinds of outputs. fv : X T v × Y F v 7→ X F v × Y T v (4.1) Proving that the propagation dynamics contract becomes more complicated than in Section 2.3, and not just because both kinds of signal must converge. Specifically, there can be no positive feedback between the two types of signal on those timescales. Positive feedback would create acausality1 where the fixed point of the propagation dynamics should be causal. If the relationship between agent states fV and the signals X E were acausal, the aggregation p : FV 7→ X E × Y E could not exist. As I have labeled the flow of reactants as forward and the flow of products as backward, I will label the source of reactants as the "entry" and the sink of products as the "exit". There is nothing special mathematically about forward signals or backward signals; these labels are a matter of con- vention. The entry and exit are special vertices in the graph representing the environment. They may even be the same vertex - w - that I introduced in Section 3.3. Like I discussed in that section, fw should not change over time. Turing and Prigogine, in their work on what Prigogine termed dissi- pative structures, identified some physical mechanics of cognition. But these physical mechanics do not describe all cognitive systems. Most living things, for instance, are cognitive networks in which each agent is itself a cognitive network. Obviously these cannot be modeled using reaction-diffusion equa- tions. Cognition is more an abstract pattern than a concrete phenomenon. Turing and Prigogine's work was also limited by the need to write down all the equations of motion. Doing this for large networks or interlock- 1I argued in Section 3.3 that pattern emergence is acausal. 31 ing feedback loops is impractical. Adrian Bejan sidestepped this limitation in his related constructal law[2], but he substituted another: constructal theory is limited to trees (as opposed to graphs). Bejan's theory was also limited by its lack of formality. 4.2 Artificial Neural Networks Artificial neural networks are a computational and mathematical ab- straction of biological neurons[1]. The "neurons" are arranged in a directed graph. At any particular time, every neuron is either firing or inactive. It ac- tivates if the weighted sum of other neurons' activity passes a threshold[14]. Let x ∈ X = {0, 1}M be a neuron's firing activity for M data points. For an agent v with a bias bv and a weight w for every input link, xj = H bv + Xi∈T v wixi! j ∈ F v (4.2) where H is the Heaviside step function. To use an artificial neural network, one sets the firing activity of a subset of neurons (called the input neurons), waits for changes in firing activity to propagate through the network and, finally, reads the firing activity of another subset of neurons (the output neurons). The mapping between input and output for the network is thus determined by: • the graph • the weights of connections between neurons • the neuron biases • the sequence in which neurons update their firing activity Researchers have studied many, many ways to connect the neurons, sequence their updates and train the weights and biases. The most popular schemes find ways to serialize the process (making the computation easier) and keep it predictable. One such scheme is the multilayer perceptron with "vanilla" backprop- agation. This scheme is a two-way cognitive network in which the neurons are agents. In a multilayer perceptron, the neurons are arranged in K layers, where Lk ⊂ V for each k ∈ {1, . . . , K}. The input neurons L1 are the entry 32 vertices. To fit my model, an exit vertex v′ must be added to the perceptron; that exit vertex has one arc from each neuron in the output layer LK. V = [k≤K E = [k<K Lk! ∪ {v′} {(u, v) : u ∈ Lk, v ∈ Lk+1}! ∪ {(u, v′) : u ∈ LK} (4.3) (4.4) Each neuron has an arc from every neuron in the previous layer and an arc to every neuron in the next layer. Since the neurons have no other connections, the firing activity for each data pattern can be computed layer-by-layer with increasing k, and each neuron need only update once for the forward aspect of the propagation dynamics to converge. This layered graph also allows an error gradient to be computed for each weight and bias and data point, using the chain rule to propagate partial derivatives backward from the outputs[21]. Of course, the activation function must be softened to a sigmoid rather than a hard threshold, and each signal x ∈ X becomes a vector of M reals. This softening does not affect the network's computational ability[10]. In the equations for fv (v 6= v′ and v /∈ L1) below, S(x) is the logistic function. Equation 4.5 computes firing activity and Equation 4.6 computes gradients. xj = S bv +Xi∈T v yi = wi · wixi! dx bv +Xi∈T v dS wixi! · Xj∈F v j ∈ F v (4.5) yj i ∈ T v (4.6) Just like with forward propagation, each neuron need only compute partial derivatives once. The state space of each hidden neuron Fv (again, v 6= v′ and v /∈ L1) corresponds one-to-one with RT v+1 - the space of its input weights and its bias. The firing activity of each input neuron v ∈ L1 is set by the environment and does not change. The gradients from v′ are computed by comparing each xi, i ∈ T v′ to a desired firing activity xd i , i ∈ T v′ from the training set. They are then backpropagated using Equation 4.6. yi = xd i − xi i ∈ T v′ (4.7) 33 This is the gradient of a squared error function: Err = y2 i 1 2 Xi∈T v′ (4.8) The total propagation dynamics Γ1 : FV × X E 7→ X E consist of evaluating Equation 4.5 for each neuron in L1 and then L2 and so on until LK, at which point v′ computes error gradients using Equation 4.8, each neuron in LK computes error gradients from Equation 4.6, LK−1 does the same, and so on until L2. The input layer L1 has no need of error gradients. V : FV 7→ FV consist of each neuron greedily minimizing error by descending the error gradient in (ostensibly) small steps. The gradient for a bias bv is: The pattern dynamics ψ1 ∂Err ∂bv = dS dx bv + Xi∈T v wixi! · Xj∈F v yj The gradient for a weight we, e ∈ T v is: ∂Err ∂we = ∂Err ∂bv · ye (4.9) (4.10) Here is the objective function for each neuron. Again, there are M data points, and m is an index that selects a data point. v 6= v′ and v /∈ L1 (4.11) qv = − Xm≤M (cid:12)(cid:12)(cid:12)(cid:12) ∂Err ∂bv (cid:12)(cid:12)(cid:12)(cid:12)m + Xi∈T v(cid:12)(cid:12)(cid:12)(cid:12) ∂Err ∂we (cid:12)(cid:12)(cid:12)(cid:12)m! The change in each weight or bias is the product of some step size η > 0 and the negation of the gradient for that parameter. Unfortunately the gradients generally become unbounded as they propagate backwards - due to repeated multiplication by numbers potentially greater than one - so there exists no Lipschitz constant L that limits the rate of change of each fv. Because the propagation dynamics are discrete, this violation of Equation 3.1 threatens the separation between propagation and pattern dynamics. This violation is usually refered to as the "exploding gradients" problem. If a weight increases as the pattern dynamics progress, the receiving neuron becomes more sensitive to the firing of the sending neuron. Since 34 the weight increased in order to decrease the receiver's error, weights of the receiver's outgoing arcs may increase in turn, as the receiver's firing activity has become more valuable. At the same time, the sender becomes more sensitive to gradients sent back from the receiver. The sender may henceforth adjust its activity to be of more use the receiver. These relationships are often crudely summarized as "Neurons that fire together, wire together." If these relationships hold along a walk from the input layer to the output layer, the corresponding round trip - forward over one graph and backward over the other - constitutes a feedback loop. A feedback loop becomes a pattern when the gradients along the loop become zero, which happens at a local minimum in qv. Feedback relations in a neural network are difficult to formulate. For e iff x′ backward signals, y ≺ y′ ⇐⇒ Pm≤M y < Pm≤M y′. For the forward signals in a link e ∈ E, xe ≺ x′ e decreases the gradient ye relative to xe. Unfortunately, there is no way express the forward ordering using only micro-level information. The effect of a change in firing activity must be propagated all the way to v′ and back, so the forward ordering would be recursive and span entire layers of the network. In simple terms: no neuron actually knows what it wants; it only sees a gradient that points it in a (hopefully) good direction through Fv. Thus there is no closed-form way to verify Equation 3.4 for a multilayer perceptron. If there was, I conjecture that the proof would start from Equation 4.12 - a version of Equation 3.4 modified for two-way cognitive networks like this: EC , yF v\y′ EC , xF v\x′ EC , yT v\y′ ≥ qv(cid:0)xT v, yF v, xF v\x′ EC(cid:1) − qv(cid:0)xT v\x′ EC , yT v\y′ EC , yF v\y′ EC , xF v, yT v(cid:1) EC(cid:1) − qv (xT v, yF v, xF v, yT v) qv(cid:0)xT v\x′ (4.12) In English, this equation states that the neuron v's utility becomes more sensitive to the output signals xF v∩EC and yT v∩EC as the input signals xT v∩EC and yF v∩EC strengthen. I am not yet sure that Equation 4.12 is properly formulated. Such a formulation would be core to a formal theory of two-way cognitive networks. Not all walks from input to output are feedback loops. A marginal improvement may not be enough to make the receiver (the one described above) more valuable than the other neurons in its layer. And the sender's increased sensitivity to the receiver's gradients may not surpass the sender's sensitivity to the gradients of other neurons in the receiver's layer. To identify the selection of closed walks that undergo positive feedback, Equations 4.5, 35 4.6 and 4.7 should be plugged into a feedback condition like Equation 4.12. Of course, it will be necessary to modify Equations 4.6 and 4.7 so that sensitivity of the backward signals to the forward signals in a link (on pattern timescales) could be expressed in closed form. This method of analyzing neural learning rules could prove quite useful in future work. Neurons train without any knowledge of the error itself. They only see the error gradient. By descending that gradient only in small steps, the weights and biases try to be quasi-static on signaling timescales. Unfortu- nately, the network runs into trouble here. The gradients in a given layer are roughly proportional to the weights in layers closer to the exit. Positive feed- back loops can cause the gradients to increase exponentially - to "explode" - as the backpropagate. Because the steps taken by the weights and biases are proportional to the gradient, the pattern dynamics can violate their own Definition 2.2 and thus the separation between propagation and pattern. Just like positive feedback leads to exploding gradients, negative feed- back can lead to "fading" gradients. As I warned at the end of Section 2.3, overly-aggressive contraction can prevent signals from spreading prop- erly across the network. Also, small gradients lead to only small changes in weights and biases, eventually halting the pattern dynamics. Multilayer perceptrons largely try to avoid problems with exploding and fading gradients by keeping the graph feedforward with few layers. If each component of the gradient only makes two or three jumps backward, it can't grow or shrink much. Gradient descent causes more problems in networks with many layers, like deep belief networks. The problem is worst in recurrent networks, which have directed cycles. A signal in a recurrent network may make an infinite number of jumps. If the gradients explode, then the propagation dynamics of such a network will never converge, and without convergence, the aggregation p does not exist. A gentle fading will make the propagation dynamics contract, but excessive fading still prevents signal propagation. In contrast, the forward signals do contract. Although I will not prove this statement, Hopfield provided good inductive evidence[9] that the propagation of firing activity mostly converges. Intuitively, a neuron rejects any changes in its input that do not push it over its threshold - from inactive to firing or vice versa. 36 4.3 Market Economies Most naturally-occuring cognitive networks are composed of, inter- twined with and assemble into other cognitive networks. Modeling such systems is tricky and intellectually risky. The modeler must pick and choose what to represent, and any omissions are bound to be criticized by those with different priorities. In this section, I run a greater risk than most: I am not an economist. Remember that my purpose is to explain cognition, not the finer points of economics. The broad pattern of an economy will suffice. Among the many contexts in which it can be understood, I will model the specialization of market niches and the relationships between them. I will try to describe how niches develop and coordinate to best acquire, process and allocate resources. Every model defines a context within the heterarchy of cognitive net- works - the heterarchy that extends from individual cells to the biosphere. A theory of cognition can guide the creation of models and render them in a common language, enabling us to draw clearer lines between contexts and to avoid using a model outside its context. The content of signals in the model circumscribes what it can cognize, and the choice of agents determines the model's granularity. A consequence of acausality is that even a good model may not predict which patterns emerge in its referent. That does not, how- ever, mean the model is useless. The model might still predict what kinds of pattern can emerge, as well as the stability or coherence of patterns which have already emerged. In other words, the model might still predict what can be known or is likely to be known. Each niche is an agent characterized by: • a product • the producers of that product • the method of production The market economy is a two-way cognitive network. Goods and services are the forward signals while money and preferences are the backward signals. By transforming goods and services into other goods and services, niches (as agents) collectively bridge the available resources to consumer demand. 37 Those available resources are the entry vertices. Consumers are the exit vertices. The propagation dynamics are the process by which the market works out the price of each good and the volume bought by each receiving niche. The niches are quasi-static, which is to say the products, sets of producers and the methods of production are all fixed on short timescales. This limits each niche's flexibility. Say, for instance, that the demand for a good increases. At some point the increase will test the capacity of the producing niche. The price will rise, decreasing demand. Conversely, a drop in demand will cause a drop in price, which raises demand. This negative feedback - driven by profit and limits on flexibility - ensures that the propagation dynamics converge. The pattern dynamics are the adaptation of goods to fit buyer pref- erences and the adaptation of the means of production to fit the available resources. Producers can leave or join niches, or they may invest in or liq- uidate means of production. There are two kinds of positive feedback. The first - analagous to autocatalytic loops - occurs when a supply chain produces some of its own means of production. The second comes from economies of scale and is analagous to the feedback loops in a multi-layer perceptron. For many goods, the more that gets produced, the easier it is to produce. The easier a good is to produce, the more profit that can be made, which draws more people and companies to produce that good. This kind of feedback loop is a supply chain from raw material to consumer. Like the feedback loops in an ANN, the backward walk mirrors the forward walk. In general, goods in a supply chain have uses both inside and outside the supply chain. As positive feedback progresses, those goods will become more suited to their use inside the supply chain as opposed to outside it. If the graph can change over time, niches will split and differentiate to take advantage of their own economies of scale.2 In this way, the supply chain may become an industry. Like any model, this one leaves a lot of interesting behavior out of context. Here is a short, non-exhaustive list. • Modeling niches as agents ignores the differences between large com- panies, small businesses and individuals. 2I have not yet addressed changes to the graph, but such a study would make for fascinating future work. 38 • Modeling the physical environment as the entry ignores environmental damage. • Treating the consumer as the exit node omits anything that alters con- sumer demand, like culture or advertising. I have also left out the precise definition of a good. The simplest definition is the set of uses for the good. To model uncertainty - e.g. risk or asymmetries in information - I could make every signal a probability distribution over the power set of possible uses for a good.3 That still leaves out temporal behavior, like borrowing money or training the workforce. To model those, each good would become a function of its uses over a cycle in time. That should suffice for an example of cognition. The rest, I will leave to economists. 4.4 Ant Colony Optimization Ant colony optimization (ACO) is a class of algorithms for finding a "short" path from one vertex in a graph to another[4]. It may seem very specialized, but many combinatoric optimization problems can be expressed as such a path search. ACO works by imitating the method by which ants settle on a path between their colony and a food source. Some number of ants start at the colony and wander through a graph of waypoints, guided toward the food by smell (a search heuristic). After they reach the food, they retrace their steps back to the colony, laying pheremone uniformly along their path. Each ant has a fixed amount of pheremone to lay, so it will lay pheremone more densely on shorter paths. Ants that walk the graph thereafter will favor arcs4 with more pheremone. When these ants lay their pheremones in turn, they will tend to lay it on these arcs, which will draw more ants. As time goes on, the ants settle on a single short path through the graph, and this path maps to a solution of the combinatoric optimization problem. An ACO is a two-way cognitive network in which the waypoints are the agents. An agent also includes the pheremone concentrations of its outgoing arcs. The location of the colony is the entry vertex, and the location of the food source is the exit vertex. The forward signal in an arc is a probability 3Similar to Eigen and Schuster's treatment of genetic risk[5]. 4or edges, in the undirected case 39 distribution over all the forward walks an ant could take from the entry vertex through that arc (before reaching the exit). The backward signal is the same but from the exit vertex and over the backward graph. These walks are not uniformly random; ants are guided first by the search heuristic and then by pheremone concentrations.5 The heuristic - the smell of food - has a fixed value for each arc. When a single ant walks randomly across the graph, it samples a probability distribution for each arc in its path. The propagation dynamics consist of ants walking across the network while the pheremone concentrations are quasi-static. That condition can be achieved by keeping each ant's pheremone payload small compared to the ants' ability to smell. Most implementations pass a population of ants through the network before laying all their pheremones at once, but this is more a matter of convenience than functionality. More important is the impracticality of covering the entire support of every path distribution. We cannot say the propagation dynamics have converged until individual ants cease to shift the colony's estimate of these distributions. But every path would need to be traversed by at least one ant, and the point of ACO is to be faster than simply trying all the paths. That contradiction sounds catastrophic, yet ACO works. Why? It works because ACO need not maintain perfect separation between propagation and pattern dynamics. Relaxing separation makes the pattern dynamics stochastic with an increasing variance. That stochasticity doesn't cripple the algorithm because there are usually many good paths. ACO does try to improve separation by keeping the number of likely paths small. First, it prohibits ants from revisiting a vertex before reaching the exit. Second, the search heuristic attracts the ants to a smaller set of paths, concentrating their probability mass on a subset of its support. Finally, positive feedback helps minimize the number of likely paths. As time proceeds, a subset of paths comes to dominate the rest, and then a subset of that subset, and so on. This serves to shrink the effective support of the path distributions. The result of these steps is an algorithm that reaches a good solution quickly. For very hard problems, this is often better than taking a long time to find the best solution. The pattern dynamics are the process by which pheremone is laid. 5Some instances of ACO don't use a heuristic. Before pheremones are laid, the ants in those colonies do make uniformly random pathing choices. 40 Having already described the process from the ants' perspective, here is the waypoints' perspective as agents. An agent maximizes the number of ants on the outgoing arc with the most ants.6 If an agent increases the number of ants it sends along the (expected) shortest path, the expected path length of its ants will decrease. That gives the waypoints from which it receives ants reason to favor it, because they have the same incentive. By this rea- soning, the shortest walk through the graph should coincide with the sole feedback loop. The catch is that pheremone concentration is similar but not identical to the inverse of expected path length. At a certain point in the feedback, when pheremones have become concentrated enough, the ants will choose well-worn paths simply because they are well-worn. Like with many stochastic optimization algorithms, one must balance speed of convergence with the quality of the solution. Pheremones evaporate at a rate proportional to their concentration. Even if all the ants choose the same path, eventually the rate at which those ants lay pheremone equals the evaporation rate. The evaporation rate is not necessary for a feedback loop to become a pattern - that loop stabilized as soon as its pheremone levels got high enough that nearly all the ants chose it. Evaporation is necessary if one wishes ants to explore after a pattern emerges. Such exploration is only useful if the algorithm is elitist7; otherwise the other ants will ignore any new paths an explorer finds. Elitism involves computation external to the network, so it has no analog in a cognitive network. Unlike the other exemplars I've introduced, ant colonies primarily cognize themselves. Ants enter the network without external information. Instead, the information encoded in a pattern reflects only the graph, the lengths of the arcs, the search heuristic and the random choices of the earliest ants. Waypoints are not usually seen as agents; the ants are. These ant- agents come to an explicit consensus on the best path. ACO occupies a curious middle ground between cognitive networks and consensus algorithms. This dual interpretation possible only because feedback in ACO is winner- take-all. Seeing it as a consensus algorithm, each agent must know the whole pattern. Seeing it as a cognitive network, the set of possible patterns is very 6This does not mean sending all ants over the same arc as soon as that arc becomes popular; such a shift would be a discontinuous jump through the agent's state space. 7An elitist algorithm always selects and remembers the best solution found so far. 41 restricted. These two apparent problems seem to offset each other. 42 Chapter 5 Conclusions I have now outlined a new formal theory of cognition. It is does not focus on humans, on artificial intelligence or on any other specific domain. Instead, it lays out the abstract process by which a complex network acquires knowledge. My theory is still limited to fixed graphs1 with two levels - micro and macro. A complete theory should describe the dynamics of the graph and explain how an arbitrary number of levels interact when arranged in a heterarchy. 5.1 Context in Cognition A cognitive system is a network of agents. These agents signal each other on relatively short timescales and change their state over longer timescales. For every configuration of agent states, the signal propagation dynamics find a stable fixed point, called the aggregate. Since signals prop- agate faster than the agents move, the propagation dynamics closely track this fixed point, which means the agents react only to the aggregate. In the pattern dynamics, each agent maximizes a utility function of its input and output signals. This behavior may lead subsets of agents coordinate across closed walks through the graph by reinforcing their signals to each other. A stronger signal over any arc in the walk causes the receiving agent to strengthen the signal it sends over the next arc. Eventually this wave 1where the signals or agents states move but not the vertex or arc sets 43 of influence returns to strengthen the first signal further, and the closed walk becomes a feedback loop. If the signals in a feedback loop stablize, the feedback loop becomes a pattern. The selection of closed walks that undergo feedback and then stabilize into patterns, together with the nature of the signals in the pattern, encode the network's knowledge. Despite being ad hoc and of arbitrary scale, these encodings are coherent. So far, I have mostly avoided the use of "complex" and "simple" as adjectives, because they are only useful in a relative sense. Recall the (biological) ant colony I sketched on page one. If I modeled the colony, I would probably say that each ant is "simple". Yet an ant is incredibly complex in its own right. Its brain is a cognitive network of cells, and those cells are cognitive networks of molecules. Retreating to the perspective of an ecosystem, the colony itself looks like a simple agent. Every cognitive system operates in some context or set of contexts. A context is defined by a σ-algebra on a set of things that can be known in that context. A context can be very broad but never universal. Billy Vaughn Koen would say that all knowledge is heuristic, in that it "provides a plausible aid or direction in the solution of a problem but is in the final analysis unjustified, incapable of justification, and potentially fallible."[12] Since any unit of knowledge is part of some contexts but not others, it follows that objective knowledge is a contradiction. It also follows that knowledge can only be measured relative to a given context, with that context being the domain of the measure. Since no context exists which includes all possible knowledge, no objective measure of knowledge exists. Similar reasoning applies to measures of "complexity". As a field, we have been asking how complex behavior arises from simple parts. But without an objective notion of complexity, this question loses its meaning. I will reframe it. By saying that an agent is simple, I am saying that its context includes the signals it receives (and sends) but not the whole network. Likewise, the network sees an agent's output signals but not the potentially- complex arg max problem an agent solves internally. Thus an agent is both simple and complex relative to the whole network, and the whole network is both simple and complex with respect to each agent. Every cognitive process implies one or more contexts. Each context is a σ-algebra of things the cognitive system can know. 44 Figure 5.1: On the left: A single monolithic context divided into micro con- texts. In the center: Overlapping micro (thin) and macro (bold) contexts in a cognitive network. Parts of each context are shared, and others are hidden. On the right: The micro contexts have subsumed the macro con- text. This could involve a centralized aggregation procedure (as opposed to a propagation dynamics) or an algorithm for the explicit consensus of agents. The paradox of "complex behavior from simple parts" comes from thinking about a cognitive network in only one context at a time. By consid- ering agents in their own micro-level contexts, I have reframed our question: How do the micro and macro contexts of a cognitive network relate to each other? The macro context consists of feedback loops and patterns, and each micro context consists of an individual agent's utility maximization problem. My theory links these contexts by means of the aggregation (recall Definition 2.4) and of complementarity between agent utility functions. This framework begins to explain - formally - how a consciousness relates to the substrate from which it emerges. The field of cybernetics tried to explain cognition qualitatively. Mat- urana and Varela, for example, introduced the concept of autopoiesis, or self-creation, in living systems[20]. Douglas Hofstadter introduced strange loops, which are configurations of symbols that take on circular meaning, thereby becoming self-aware[8]. Unfortunately, cybernetics researchers were only able to express their ideas with words rather than with mathematics. While their work fascinated many, none could agree on what it meant or how it should be applied. We need formality if we are to reliably convey our understanding of cognition from mind to mind. Most other work on cognition falls into one of two categories. The first is a top-down approach that focuses more on what a cognitive system does than how it cognizes. Psychology falls into this category, and so does 45 the study of symbolic artificial intelligence. This approach struggles with context. Psychological studies are difficult to control because human thought takes place in many contexts, and those contexts are very hard to ascertain or control. A well-controlled study may yield clear quantitative results, but those results only apply in the narrow context created for the study. In artificial intelligence, Alan Newell[16] framed cognition as a rational, goal- oriented search through a problem space. But a well-posed search calls for a well-defined goal, which cannot be defined a priori for a whole cognitive network. And rationality - being an application of knowledge - is just as context-dependent as the knowledge itself. Unfortunately, the context for all known artificial intelligences must either be specified by a human designer or generated by an algorithm written by a human designer. The context(s) of such a system will always be circumscribed, and the system will always face an intractable and ill-defined meta-problem - figuring out when its knowledge is or is not useful. A top-down approach requires a clear context that doesn't often exist. The second category is characterized by a bottom-up approach which seeks the micro-level mechanics of cognition. This kind of cognitive architec- ture adapts to the context it finds itself in. Artifical neural networks are a good example, as are Pentti Kanerva's sparse distributed memories[11]. Neu- roscience searches for the mechanics of human (or animal) cognition. Like cybernetics, work in this category asks how something learns. But where cybernetics tends to be informal and abstract, bottom-up approaches are formal and concrete. Every cognitive architecture modeled with a bottom- up approach either arose by itself or explicitly mimicks a system that did. Until now, no one has been able extract or abstract the essence of cognition for novel use in other systems. My goal has been a formal, abstract theory of cognition that deals properly with context. Like the bottom-up approach, I have sought formal mechanics of cognition. Like cybernetics, I have tried to keep those mechan- ics abstract. At the end of Section 3.1, I pointed out that the usual tradeoffs between agents and the macro-level - a) agent simplicity versus the process- ing of macro-level information and b) agent simplicity versus the storage of macro-level information - could be two aspects of the same fundamental paradox. That paradox is how complex behavior arises from simple parts. I resolved it by finding a better question: Where do the micro and macro contexts overlap, and where do they not? By treating signal propagation as 46 a dynamical system unto itself, the micro-level contexts aggregate the macro context without subsuming it. By defining pattern in terms of closed walks of complementarity between agents, the micro-level contexts coordinate to store information in the macro context while remaining distinct from the macro context. 5.2 Future Work Almost every aspect of my theory could be developed further. Regarding aggregation, I have not yet explained what information propagates and what doesn't. Abstract algebra may provide the proper tools to model and control the spread of signals, given how they join and split at each agent. If signals can be measured, ergodic theory may also be useful. Two-way networks deserve a formal definition and analysis. How do forwards and backward signals interact? What, precisely, constitutes a feed- back loop through a pair of mirrored graphs? Such work will allow us to apply the mathematics of cognition to a much wider range of systems. The topology of the pattern dynamics is still fairly mysterious. How robust are patterns, and what kinds of robustness are there? Can patterns merge or split, and how do these events affect their coherence? Can parts of a coherent pattern survive if the pattern loses stability? These questions are fundamental to the design of cognitive networks. Even though most natural cognitive networks are related heterarchi- cally, my theory analyzes only two levels of behavior at a time - a micro-level and a macro-level. Can a formal definition of context allows us to model the relationships between many contexts? An answer to this question is vital for modeling natural systems. How does the graph of a cognitive network change over time without interfering with separation or breaking feedback loops? In particular, how can an agent create new arcs when its context is limited to the arcs it already has? This question is very pertinent to artificial neural networks as well as to design automation. Finally, there's a lot of application work to do. Cognition can help design new metaheuristics for optimization, and it might provide a better understanding of the ones we already have - genetic algorithms, ACO and 47 particle swarms in particular. New ways to train and structure artificial neural networks should present themselves. And finally, it should be possible to improve the distributed control of large industrial systems like smart grids and reconfigurable manufacturing systems. Many of these applications will inevitably inform the more abstract inquiries, just like the systems in Chapter 4 guided me to the theory in Chapters 2 and 3. The social and biological sciences could be a fertile ground for new quantitative models, although we will probably need a formal theory of context in order to comprehensively model market economies or ecologies. A better understanding of context could likewise provide a formal language for comparing and contrasting cognitive architectures. Curiosity aside, we should be cautious about modeling social systems. As we study them, we must remember that social theories can affect their referents if or when they become public knowledge. These observer effects can be unpredictable or even dangerous. Given the training necessary to fully understand theories of cognition, these theories are unlikely to find their way (intact) into the public consciousness. Rogue, poorly applied social theories have in the past created much upheaval. 48 References [1] I. A. Basheer and M. Hajmeer. "Artificial neural networks: fundamen- tals, computing, design and application". In: Journal of Microbiological Methods 43 (2000), pp. 3–31. [2] Adrian Bejan and Sylvie Lorente. "Constructal theory of generation of configuration in nature and engineering". In: Journal of Applied Physics 100.041301 (Aug. 2006). [3] Tom De Wolf and Tom Holvoet. "Emergence Versus Self-organisation: Different Concepts but Promising When Combined". In: Engineering Self-Organising Systems. Springer Berlin Heidelberg, 2005, pp. 1–15. [4] Marco Dorigo and Christian Blum. "Ant colony optimization theory: A survey". In: Theoretical Computer Science 344 (Nov. 2005), pp. 243– 278. [5] Manfred Eigen and Peter Schuster. "The Hypercycle: A Principle of Natural Self-Organization, Part A: Emergence of the Hypercycle". In: Die Naturwissenschaften 64 (1977), pp. 541–565. [6] Drew Fudenberg and Jean Tirole. Game Theory. The MIT Press, 1991. [7] Friedrich A. Hayek. "The Use of Knowledge in Society". In: American Economic Review 35.4 (Sept. 1945), pp. 519–30. [8] Douglas Hofstadter. Godel, Escher, Bach: An Eternal Golden Braid. Basic Books, 1979. [9] John J. Hopfield. "Neural network and physical systems with emer- gent collective computational abilities". In: Proceedings of the National Academy of Sciences of the United States of America 79.8 (Apr. 1982), pp. 2554–2558. 49 [10] John J. Hopfield. "Neurons with graded response have collective com- putational properties like those of two-state neurons". In: Proceedings of the National Academy of Sciences of the United States of America 81.10 (May 1984), pp. 3088–3092. [11] Pentti Kanerva. Sparse Distributed Memory. The MIT Press, Cam- bridge, MA, 1988. isbn: 0-262-11132-2. [12] Billy Vaughn Koen. Discussion of the Method: Conducting the Engi- neer's Approach to Problem Solving. Oxford University Press, 2003. [13] Steven M. Manson. "Simplifying complexity: a review of complexity theory". In: Geoforum 32 (2001), pp. 405–414. [14] Warren S. McCulloch and Walter H. Pitts. "A Logical Calculus of the Ideas Immanent in Nervous Activity". In: Bulletin of Mathematical Biophysics 5.4 (Dec. 1943), pp. 115–133. [15] R. Milo et al. "Network Motifs: Simple Building Blocks of Complex Networks". In: Science 298 (Oct. 2002), pp. 824–827. [16] Alan Newell. Unified Theories of Cognition. Harvard University Press, 1990. [17] Reza Olfati-Saber, Alex J. Fax, and Richard M. Murray. "Consensus and Cooperation in Networked Multi-Agent Systems". In: Proceedings of the IEEE 95.1 (Jan. 2007), pp. 215–233. [18] Ilya Prigogine and Gregoire Nicolis. "On Symmetry-Breaking Instabil- ities in Dissipative Systems". In: The Journal of Chemical Physics 46.9 (May 1967), pp. 3542–3550. [19] Alan Turing. "The Chemical Basis of Morphogenesis". In: Philosoph- ical Transactions of the Royal Society of London, Series B, Biological Sciences 237.641 (Aug. 1952), pp. 37–72. [20] F.G. Varela, H.R. Maturana, and R. Uribe. "Autopoiesis: The Organi- zation of Living Systems, Its Characterization and a Model". In: Cur- rents in Modern Biology 5.4 (1974), pp. 187–196. [21] Paul J. Werbos. "Beyond regression: New tools for prediction and anal- ysis in the behavioral sciences". PhD thesis. Harvard University, 1974. 50
1212.6298
1
1212
2012-12-27T04:07:01
Design of Intelligent Agents Based System for Commodity Market Simulation with JADE
[ "cs.MA", "cs.AI" ]
A market of potato commodity for industry scale usage is engaging several types of actors. They are farmers, middlemen, and industries. A multi-agent system has been built to simulate these actors into agent entities, based on manually given parameters within a simulation scenario file. Each type of agents has its own fuzzy logic representing actual actors' knowledge, to be used to interpreting values and take appropriated decision of it while on simulation. The system will simulate market activities with programmed behaviors then produce the results as spreadsheet and chart graph files. These results consist of each agent's yearly finance and commodity data. The system will also predict each of next value from these outputs.
cs.MA
cs
Design of Intelligent Agents Based System for Commodity Market Simulation with JADE R.Refianti 1, A.B. Mutiara2, H. Gunawan3 Faculty of Computer Science and Information Technology, Gunadarma University, Indonesia E-mail: 1,2{rina,amutiara}@staff.gunadarma.ac.id, 3 [email protected] Abstract A market of potato commodity for industry scale usage is engaging several types of actors. They are farmers, middlemen, and industries. A multi-agent system has been built to simulate these actors into agent entities, based on manually given parameters within a simulation scenario file. Each type of agents has its own fuzzy logic representing actual actors' knowledge, to be used to interpreting values and take appropriated decision of it while on simulation. The system will simulate market activities with programmed behaviors then produce the results as spreadsheet and chart graph files. These results consist of each agent's yearly finance and commodity data. The system will also predict each of next value from these outputs. Keywords: Agent, JADE, Java, Fuzzy logic, Back propagation, Potato 1. Introduction In potato commodity market, industries and farmers, as end buyer and raw producer respectively, hold big role in market activities that can give impact to each other. Industries need the farmers to fulfill their raw commodity requirement for continuous production. For industries, their production is vital activities to gain profit. At other side, farmers need to keep producing and sell their harvest revenue to have income. However, both farmers and industries are not the only one “seller” and “buyer” in market. Middlemen hold those both two roles, positioning themselves a competitor to farmers and industries and gain profit from it. In market competition, each actor's assets, knowledge, and behaviors can be different to others thus giving different measures on the same situation. A simulation system will help by simulating the market activities and the produce the data to see if their current conditions can give positive impact in achieving their goal. Agent Oriented Programming (AOP) is one of the best approaches to declare actual actors as system entities, called agent, and simulate their actions. AOP offers several advantages like message based communication, multi-behaviors support, life cycle management, and more [2]. The capability of agents can be improved by posing artificial intelligent backup to help them sense conditions of environment where they live and take appropriated actions regarding to it. Thus this type of agents are called intelligent agent [1]. Users have to supply actors' knowledge and scenario to the system. The system will be limited to give output data as it is, without any conclusion. 2. Methodology The methodology that is used consists four phases in order [2]. Each phase has multiple steps inside them to be done in order too. The flow, phases, and steps of the methodology are illustrated in Fig. 1. Figure 1. Methodology diagram [2] This methodology is used corresponding to JADE (Java Agent Development) library which is used to built system's architecture. JADE is Java based library with ACL (Agent Communication Language) that is defined by FIPA (Foundation for Intelligent Physical Agent). In general, this ACL declares the messages performative and service type “yellow paging” as basic way for agents to communicate. The methodology serves as a guide for the system designer when developing a system. In general, a software development methodology may comprise of [2]:  A process, i.e. a sequence of phases and steps that guide the developer in building the system.  A set of heuristic rules that support the developer in making relevant choices.  A number of artifacts, i.e. diagrams, schemas or documents representing in graphical or textual form one or more models of the system.  A suitable notation to be used in the artifacts.  A set of patterns that can be applied to solve common situations.  One or more tools that: automate, as much as possible, the phases and step specified in the process; force consistency between the models produced; highlight problems arising from incorrect design choices, when possible; generate code and documentation, etc. The focus of the methodology is on the process and the artifacts that are produced. The described process covers the analysis phase and the design phase and is shown in Fig.1. The analysis phase is general in nature and independent of the adopted platform. Conversely, the design phase specifically assumes JADE as the implementation platform and focuses directly on the classes and concepts provided by JADE. Observing Fig.1, it can be seen that there is no strict boundary between the analysis and design phases. Moreover, the methodology is of an iterative nature, thus allowing the designer to move back and forth between the analysis and design phases and the steps therein. At the end of the design phase, the developer should be able to progress straight to the implementation, which is where the actual coding occurs. In addition, most of this phase can probably be carried out by means of a proper tool which automates the implementation process. The planning stage, like implementation and testing, is not formally addressed in the methodology. However, for the sake of the methodology, a question is included (see Fig.1), which initially asks if the designer has made a rational decision on whether to use an agent-based solution. If the answer is yes, the designer moves on the analysis, while if the answer is no, the designer should seek an alternative solution. 3. Results and Discussion 3.1. Planning Phase The system uses intelligent agent and Fuzzy logic is chosen as knowledge implementation since the actual actors may interpret some values into natural language. The fuzzy rules are written as FCL (Fuzzy Control Language) script and applied with help of jFuzzyLogic library and its built-in fuzzy inference system. The required input is simulation scenario describing some parameters including FCL scripts' location in form of spreadsheet file. At start, system will ask user to select this file in order to run. Finally, each agent will produce their finance and commodity data at the end of simulation, both in form of spreadsheet files (tabular) and picture files (charts) by using jExcel and jFreeChart libraries. 3.2. Analysis Phase The following Use case diagrams are showing relation between farmer-middlemen, farmer-industries, and middlemen-industries respectively. Figure 2. Use Case Diagram between Farmers and Middlemen Figure 3. Use Case Diagram between Farmers and Industries Figure 4. Use Case Diagram between Middlemen and Industries Actual actors are represented by three kind of agents based on service they provide. Farmers, middlemen, and industries are “ProdusenAgent”, “DistributorAgent”, and “KonsumenAgent” agents respectively. Since the system needs to access the external resource scenario and FCL files, a transducer agent that not representing actual actors “MainAgent” is created. Fig. 2 shows relation between these agents kind. Table 1 below shows those agents' tasks. Figure 5. Agents relation Table 1: Tasks of agents Agent Type ProdusenAgent DistributorAgent KonsumenAgent MainAgent Tasks Plant seed to field Harvest Respond to commodity request Respond to pledge deal Offer own commodity Search highest price for commodity Give harvest revenue to pledge dealer Sort commodity according to its standard Respond to commodity offers Respond to price request Respond to commodity giving Respond to commodity request Offer own commodity Perform monthly production Sort commodity according to its standard Respond to commodity offers Respond to price request Respond to commodity giving Make pledge deal with ProdusenAgent Request for commodity Load scenario file Parse scenario's parameters Do the dating count Synchronize date to all active agents 3.3. Design Phase This phase offers chance to improve agents relation and interaction protocol in case FIPA doesn't cover the need. After specify agents relation, a interaction specification table including messages template is made as shown in Table 2. All capitalized word refers to messages performative. Table 2: Agent ProdusenAgent Role With When R D, K Get REQUEST message IP Offer Interaction specification table Interaction Respond to commodity request Respond to pledge deal Seed R K Get PROPOSE message Offer own commodity Offer I D, K Every month change and has stock Search highest price for Pledge I D, K Harvest time Template QUERY_IF ACCEPT_PRO POSAL, REJECT_PROP OSAL INFORM, INFORM_IF, AGREE, REFUSE CFP DistributorAgent commodity Give harvest revenue to pledge dealer Respond to commodity offers Offer R Pledge R Respond to price request Pledge I Respond to commodity giving Respond to commodity request Offer own commodity Pledge R Offer Offer R I P P P K K D, K Deal on given price CONFIRM Get INFORM message Get CFP message Get CONFIRM message INFORM_IF REQUEST_W HEN DISCONFIRM Get REQUEST message QUERY_IF Every month change and has stock INFORM, INFORM_IF, AGREE, REFUSE INFORM_IF REQUEST_W HEN DISCONFIRM PROPOSE, AGREE, REFUSE REQUEST, AGREE, REFUSE SUBSCRIBE KonsumenAgent Respond to commodity offer Offer R Pledge R Respond to price request P, D Get INFORM message P Get CFP message Respond to commodity giving Make pledge deal with ProdusenAgent Pledge R Seed Request for commodity Offer MainAgent Synchronize date to all active agents Detailed Year P P Get CONFIRM message Every month P, D Every month when stock isn't enough to perform production Every month P, D, K I I I To interact with user, the system has its own graphical user interface (GUI) showing finance and commodity charts. The GUI also shows some agent's actions log for debugging case and agent's current status as described in stock, money, and field values. User gives the scenario input through “MainAgent”. The scenario file has two sections of parameters. The first section as described on Table 3 is used to determine how the simulation will work globally. A scenario file only has one of these sections. Table 3: Global parameters Description Title Specification block counts Number of how many specification blocks that need to load Start year Year of start Simulation duration (year) How long the simulation Harvest ratio (Revenue/seed) Number of harvest revenue (Kg) produced by 1 Kg seed Number of seed (Kg) planted in 1 Ha field Kg seed per Ha Autonom (boolean) Specify whether simulation will run automatically (1) or manually (0) The second section is used to give parameters to agent. This section can appear multiple times in one scenario file. The number of this section must be specified at the start of scenario, in other words first global parameter. The section is described in Table 4. Table 4: Agents parameters Name Type of agent Description Specify whether agent(s) has GUI (1) or not (0) GUI Name for agent(s) Name Service type of agent(s): “produsen” (0), “distributor” (2), “konsumen” (3) Role Number of stock at start Stock at start (kg) Number of money at start Money at start (Rp) Number of seed at start Seed at start (Kg) Lower value of diameter to pass selection Minimum diameter (cm) Upper value of diameter to pass selection Maximum diameter (cm) Number of commodity needed to perform one time production Production usage (kg) Price for 1 Kg of processed commodity Production income (Rp/kg) Price for 1 Kg of commodity when sold in traditional market Market income (Rp/kg) Starting price when buying Normal buy price (Rp/Kg) Normal pledge price (Rp/Kg) Starting price when pledging Probability for harvest revenue number to randomly goes down Harvest failure chance (%) Field (Ha) Owned field Cost to plant in 1 Ha field Plant cost (Rp/Ha) File path relatively to system's location for FCL script FCL path Number of agents Number of agent(s) using this specification Each agent has some instance of JADE's Behavior class to describe an action of actual actor into algorithm. These behaviors can be executed in parallel or sequence depends on the need. The lists of behaviors representing actual actors’ actions are mentioned by Table 5. Table 5: Agent’s actor representing behaviors Behavior's Represented Action Name InformingBev Offer own commodity InformedBev Respond to commodity offer Request for commodity QueryingBev Respond to commodity request QueriedBev SellBev Offer own commodity to respond request Make pledge deal PledgingBev Respond to pledge deal PledgedBev GivingBev Give commodity Respond to commodity giving GivedBev Search highest price DivergingBev DivergedBev Respond to price request Beside those behaviors, there are some which aren't representing actual actors' actions. These behaviors are related to agents' activities like calculate date and pool received message. They are listed in Table 6. ProdusenAgent, DistributorAgent DistributorAgent, KonsumenAgent KonsumenAgent ProdusenAgent, DistributorAgent ProdusenAgent, DistributorAgent KonsumenAgent ProdusenAgent ProdusenAgent DistributorAgent, KonsumenAgent ProdusenAgent DistributorAgent, KonsumenAgent Table 6: Agent’s system related behaviors Behavior's Name CyclicBehavior DelayBehavior Purpose Used its received message and check to pool performative then call appropriate behavior to handle it. Used to update date by increasing month count after some time. It'll be done as long as simulation running. Type of agent ProdusenAgent, DistributorAgent, KonsumenAgent MainAgent For ontology, the system will use object serialization as its protocol. To do this, some classes which will be content language like Price, Offer, and Seed have to implement Serializable interface. Instance of these classes will be set to ACLMessage before sent. ACLMessage itself is JADE's class that support performative and object use as content rather plain string. 3.4. Implementation and Testing Phase A test is performed by using a dummy scenario and three kinds of knowledge bases, one for each type of agents. The scenario specifies six block specification for six agents (one block per agent) and put them in group of two. Therefore each type of agents has two agents instance and shares same knowledge base. The complete list of scenario can be seen in Table 6. This table uses scenario's dummy values for test. Note that this table doesn't represent how to write them on the actual scenario file because there's difference in format. In order to optimize, several operation parameters for Java Virtual Machine (JVM) and JADE class loader are given as listed in Table 7. Table 6: Complete list of scenario’s dummy Parameters Specification block counts Start year Simulation duration (year) Harvest ratio (Revenue/seed) Kg seed per Ha Autonom (boolean) 6 2002 8 2 1000 1 Values Group GUI Name Role Stock at start (kg) Money at start (Rp) Seed at start (Kg) Minimum diameter (cm) Maximum diameter (cm) Production usage (kg) Production income (Rp/kg) Market income (Rp/kg) Normal buy price (Rp/Kg) Normal pledge price (Rp/Kg) Harvest failure chance (%) Produsen 1 1 P1 P2 0 10 35000 20 0 0 0 0 1000 5300 0 0.45 0 5 100000 34 0 0 0 0 1600 5100 0 0.57 Field (Ha) Plant cost (Rp/Ha) FCL path Number of agents Group GUI Name Role Stock at start (kg) Money at start (Rp) Seed at start (Kg) Minimum diameter (cm) Maximum diameter (cm) Production usage (kg) Production income (Rp/kg) Market income (Rp/kg) Normal buy price (Rp/Kg) Normal pledge price (Rp/Kg) Harvest failure chance (%) Field (Ha) Plant cost (Rp/Ha) FCL path Number of agents Group GUI Name Role Stock at start (kg) Money at start (Rp) Seed at start (Kg) Minimum diameter (cm) Maximum diameter (cm) Production usage (kg) Production income (Rp/kg) Market income (Rp/kg) Normal buy price (Rp/Kg) Normal pledge price (Rp/Kg) Harvest failure chance (%) Field (Ha) Plant cost (Rp/Ha) FCL path 2.3 50000 script/produsen.fcl 1 Distributor 1 D3 D4 1 12 250000 0 4.9 6.3 0 0 1200 5700 0 0 0 0 script/distributor.fcl 1 Konsumen 1 5.3 56400 1 1 1 3 37600 0 3.9 5.7 0 0 1200 5500 0 0 0 0 1 1 K5 K6 2 500 400000 80 5.1 6 150 3000 1500 6000 6200 0 0 0 script/konsumen.fcl 2 830 100000 220 6.5 8.79 125 4100 900 6400 7500 0 0 0 Number of agents Table 7: Operation parameters Parameter -Xms512m -Xmx1024m jade_core_messaging_MessageManager _maxqueuesize 50000000 1 1 Description Allocate 512MB of RAM to JVM Allocate maximal 1024MB of RAM to JVM for additional usage Tell JADE to allocate 50MB of RAM as message queue The results of simulation for two agents of “ProdusenAgent” are shown in below figures. Fig.6 shows complete GUI of the agents and commodity charts at same time. The finance charts hidden inside the scroll area can be seen in Fig.7. Figure 6. Commodity charts of “ProdusenAgent” agents Figure 7. Finance charts of “ProdusenAgent” agents The results of simulation for two agents of “DistributorAgent” are shown both in commodity (Fig. 8) and in finance (Fig. 9) charts too. Figure 8. Commodity charts of “DistributorAgent” agents Figure 9. Finance charts of “DistributorAgent” agents Finally, the output of “KonsumenAgent” agents are shown by Fig.10 and Fig.11. Figure 10. Commodity charts of “KonsumenAgent” agents Figure 11. Finance charts of “KonsumenAgent” agents For additional test, the system is also strained by simulating some numbers of agents instances (Table 8), including previous dummy test as test no. I. This is conducted to see how well the system's performance is. Table 9 shows specification of the testing machine where all test performed. Memory and processor (CPU) usages that are used during the test are listed by Table 10. Table 8: Number of agent’s instances for strain test Number of Test No. Number of “ProdusenAgent” “DistributorAgent” instance instance 2 2 7 7 12 12 17 17 22 22 Number of “KonsumenAgent” instance 2 7 12 17 22 I II III IV V Total 6 21 36 51 66 Table 9: Testing machine Parameter Operating System CPU RAM Storage JDK/JRE version Description Windows 7 Ultimate 32 bit AMD E-450 2 CPU @1.6GHz 2048MB, 384MB Shared ST950032 SATA Java 6 update 29 Table 10: Strain test results Memory usage Test No. CPU usage Duration 24,90% 98,30% 100,00% 100,00% 100,00% 5 m 46 s 5 m 59 s 5 m59 s 6 m 44 s 19 m 54 s Min (Byte) Max (Byte) 21.635.680 156.129.920 159.294.232 19.316.896 164.188.432 17.112.774 24.967.448 591.403.360 49.914.848 1.360.807.024 I II III IV V 4. Conclusions The built system can run simulation based on given scenario then produce output each agent's yearly finance and commodity data in form of spreadsheet and chart graph files. The system is also able to add additional value for spreadsheet files as prediction. The output is limited to raw data without any further analysis or conclusions, which are expected to come from appropriate market experts. Inheriting advantage of agent based application, system extension efforts like adding new agents or new behaviors is possible. For further research, some steps can be taken like implementing self adapting logic, performance optimization, and improvement for better quality of results. References [1] Fabio Bellifemine., Giovanni Caire., Dominic Greenwood., 2007, Developing multi-agent systems with JADE, John Wiley and Sons, Ltd, West Sussex, England. [2] Magid Nikraz., Giovanni Caire., Parisa A. Bahri., 2xxx, A methodology for the Analysis and Design of Multi-Agent Systems using JADE, Telecom Italia Lab, Via Reiss Romoli, Turin, Italy 10148.
1004.3527
1
1004
2010-04-20T18:43:48
On Asymptotic Consensus Value in Directed Random Networks
[ "cs.MA", "math.OC" ]
We study the asymptotic properties of distributed consensus algorithms over switching directed random networks. More specifically, we focus on consensus algorithms over independent and identically distributed, directed random graphs, where each agent can communicate with any other agent with some exogenously specified probability. While different aspects of consensus algorithms over random switching networks have been widely studied, a complete characterization of the distribution of the asymptotic value for general \textit{asymmetric} random consensus algorithms remains an open problem. In this paper, we derive closed-form expressions for the mean and an upper bound for the variance of the asymptotic consensus value, when the underlying network evolves according to an i.i.d. \textit{directed} random graph process. We also provide numerical simulations that illustrate our results.
cs.MA
cs
On Asymptotic Consensus Value in Directed Random Networks Victor M. Preciado, Alireza Tahbaz-Salehi, and Ali Jadbabaie 0 1 0 2 r p A 0 2 ] A M . s c [ 1 v 7 2 5 3 . 4 0 0 1 : v i X r a Abstract -- We study the asymptotic properties of distributed consensus algorithms over switching directed random networks. More specifically, we focus on consensus algorithms over inde- pendent and identically distributed, directed random graphs, where each agent can communicate with any other agent with some exogenously specified probability. While different aspects of consensus algorithms over random switching networks have been widely studied, a complete characterization of the distri- bution of the asymptotic value for general asymmetric random consensus algorithms remains an open problem. In this paper, we derive closed-form expressions for the mean and an upper bound for the variance of the asymptotic consensus value, when the underlying network evolves according to an i.i.d. directed random graph process. We also provide numerical simulations that illustrate our results. I. INTRODUCTION Distributed consensus algorithms have attracted a signif- icant amount of attention in the past few years. Besides their wide range of applications in distributed and parallel computation [1], distributed control [2], [3] and robotics [4], they have also been used as models of opinion dynamics and belief formation in social networks [5], [6]. The central focus in this vast body of literature is to study whether a group of agents in a network, with local communication capabilities can reach a global agreement, using simple, deterministic information exchange protocols.1 In recent years, there has also been some interest in un- derstanding the behavior of consensus algorithms in random settings [7] -- [12]. The randomness can be either due to the choice of a randomized network communication protocol or simply caused by the potential unpredictability of the environment in which the distributed consensus algorithm is implemented [13]. It is recently shown that consensus algorithms over i.i.d. random networks lead to a global agree- ment on a possibly random value, as long as the network is connected in expectation [10]. While different aspects of consensus algorithms over random switching networks, such as conditions for convergence [7] -- [10] and the speed of con- vergence [13], have been widely studied, a characterization This research is supported in parts by the following grants: DARPA/DSO SToMP, NSF ECS-0347285, ONR MURI N000140810747, and AFOSR: Complex Networks Program. Victor Preciado is with Department of Electrical and Systems En- gineering, University of Pennsylvania, Philadelphia, PA 19104 (e-mail: [email protected]) Alireza Tahbaz-Salehi is with Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, MA 02139 (e-mail: [email protected]). Ali Jadbabaie is with the General Robotics, Automation, Sensing and Perception (GRASP) Laboratory, Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA 19104 (e-mail: [email protected]). 1For a survey on the most recent works in this area see [3]. of the distribution of the asymptotic consensus value has attracted little attention. Two notable exceptions are Boyd et al. [14], who study the asymptotic behavior of the random consensus value in the special case of symmetric networks, and Tahbaz-Salehi and Jadbabaie [15], who compute the mean and variance of the consensus value for general i.i.d. graph processes. Nevertheless, a complete characterization of the distribution of the asymptotic value for general asymmet- ric random consensus algorithms remains an open problem. In this paper, we study asymptotic properties of consensus algorithms over a general class of switching, directed random graphs. More specifically, building on the results of [15], we derive closed-form expressions for the mean and an upper-bound for the variance of the asymptotic consensus value, when the underlying network evolves according to an i.i.d. directed random graph process. In our model, at each time period, a directed communication link is estab- lished between two agents with some exogenously specified probability. Due to the potential asymmetry in pairwise communications between different agents, the asymptotic value of consensus is not guaranteed to be the average of the initial conditions. Instead, agents will asymptotically agree on some random value in the convex hull of the initial conditions. Furthermore, our closed-form characterization of the variance provides a quantitative measure of how dispersed the random agreement point is around the average of the initial conditions in terms of the fundamentals of the model, namely, the structure of the network, the exogenous probabilities of communication, and the initial conditions. The rest of the paper is organized as follows. In the next section, we describe our model of random consensus algorithms. In Sections III and IV, we derive an explicit expression for the mean and an upper bound for the variance of the limiting consensus value over switching directed random graphs, respectively. Section V contains simulations of our results and Section VI concludes the paper. II. CONSENSUS OVER SWITCHING DIRECTED RANDOM GRAPHS Consider the discrete-time linear dynamical system x (k) = Wkx (k − 1), (1) where k ∈ {1,2, . . . } is the discrete time index, x(k) ∈ Rn is the state vector at time k, and {Wk} k=1 is a sequence of stochastic matrices. We interpret (1) as a distributed scheme where a collection of agents, labeled 1 through n, update their state values as a convex combination of the state values of their neighbors at the previous time step. Given this interpretation, xi(k) corresponds to the state value of agent i ¥ at time k, and Wk captures the neighborhood relation between different agents at time k: the i j element of Wk is positive only if agent i has access to the state of agent j. For the remainder of the paper, we assume that the weight matrices Wk are randomly generated by an independent and identically distributed matrix process. We say that the dynamical system (1) reaches consensus k=1, if along that path, asymptotically on some path {Wk} there exists x∗ ∈ R such that xi(k) → x∗ for all i as k → ¥ . We refer to x∗ as the asymptotic consensus value. It is well- known that for i.i.d. random networks, the dynamical system (1) reaches consensus on almost all paths if and only if the graph corresponding to the communications between agents is connected in expectation. More precisely, it was shown in [10] that Wk . . .W2W1 −→ 1dT almost surely − where d is some random vector − if and only if the second largest eigenvalue modulus of EWk is subunit. Clearly, under such conditions, the dynamical system in (1) reaches consensus with probability one where the consensus value is a random variable equal to x∗ = dT x(0), where x(0) is the vector of initial conditions. A complete characterization of the random consensus value x∗ is an open problem. However, it is possible to compute its mean and variance in terms of the first two moments of the i.i.d. weight matrix process. In [15], the authors prove that the conditional mean of the random consensus value is given by the random consensus value are given by Ex∗ = x(0)T v1(EWk), and its conditional variance is equal to var(x∗) = [x(0) ⊗ x(0)]T vec(cov(d)) = [x(0) ⊗ x(0)]T v1(E [Wk ⊗Wk]) − [x(0)T v1(EWk)]2 where v1 (·) denotes the normalized left eigenvector corre- sponding to the unit eigenvalue, and ⊗ denotes the Kronecker product. In [16], the authors derive an explicit expression for the mean and variance of x∗ in the particular case of a switching Erdos-R´enyi random graph process. In the following, we shall use (3) to extend these results and derive an explicit expression for the mean and an upper-bound for the variance of the asymptotic consensus value over a wider class of switching, directed random graph processes. III. MEAN ANALYSIS FOR DIRECTED RANDOM GRAPHS PROCESSES A. Directed Random Graph Process Consider a connected undirected graph Gc = (V,Ec) with a fixed set of vertices V = [n] , and unweighted edges (no self-loops allowed). Each undirected edge in Ec represents a potential communication channel between nodes i and j, where this channel can be used to send information in both directions. In this paper, we focus on directed communica- tions, i.e., the event of node i sending information towards node j is independent from the even of node j sending information towards i. In this context, it is convenient to interpret an undirected edge {i, j} ∈ Ec as the union of two (2) (3) independent directed edges, {(i, j) , ( j,i)}, where the ordered pair (i, j) represents a directed link from node i to node j. In this paper, we study randomized time-switching con- sensus processes. In particular, in each discrete time slot k ≥ 1, we construct a random directed graph Gk = (V, Ek), with Ek ⊆ Ec, such that the existence of a directed edge (u,v) ∈ Ek is determined randomly and independently of all other directed edges (including the reciprocal edge (v,u)) with a probability puv ∈ (0,1) for (u,v) ∈ Ec, and puv = 0 for (u,v) 6∈ Ep. In other words, in each time slot, we randomly select a subset Ek of directed links chosen from a set of candidate (directed) links in Ec. We are specially interested in the case in which the probability puv of existence of a directed link (u,v) depends exclusively on the node that receives information via that link, i.e., Pr ((u,v) ∈ Ek) = pv, where pv ∈ (0,1). In this setting, we can model the ability of a node to 'listen' to their neighboring nodes. For example, in the context of opinion dynamics in social networks [5], [6], [12], the probability pv can represent the tendency of the individual at node v to take into account the opinion of her neighbors (which could depend, for example, on how many acquaintances the individual has). Let us denote by Ac the symmetric adjacency matrix of the graph Gc, where entries ai j = 1 if {i, j} ∈ Ec, and ai j = 0 otherwise. We define the degree of node i as di = (cid:229) n j=1 a ji, and the associated degree matrix as Dc = diag(di). We also denote the random (nonsymmetric) adjacency matrix associated with Gk as Ak =h a(k) uvi, which can be described as a(k) uv =(cid:26) auv, w.p. pv, 0, w.p. 1 − pv. We denote the in-degrees of Gk as d(k) uv , and the in- degree matrix as Dk = diag( d(k) v ). From the definition of Gk, the in-degrees are independent Bernoulli random variables d(k) v ∼ Ber (dv, pv), i.e., v = (cid:229) u a(k) Pr(cid:16) d(k) d(cid:19)pd v = d(cid:17) =(cid:18)dv v (1 − pv)dv−d . We describe the consensus dynamics in (1) via a sequence k=1 associated to the sequence of of stochastic matrices {Wk} random directed graphs {Gk = (V, Ek)} k=1 as follows: (5) Wk =(cid:0) Dk + I(cid:1)−1(cid:0) Ak + I(cid:1)T , for k ≥ 1. Notice that adding the identity matrix to the adjacency in (5) is equivalent to adding a self-loop to every vertex in V . We include these self-loops to avoid singularities associated with the existence of isolated nodes in Gk (for which di = 0, and Dk would not invertible). Since Gc is connected and pv > 0 for all v ∈ V , the expected communications graph is connected and the stochastic dynamical system in (1) reaches consensus on almost all paths, although the asymptotic consensus value x∗ is a random variable (not the initial average). In the following subsections, we first derive closed-form expressions for the mean of x∗, and an upper-bound for the variance var (x∗) in terms of the following elements: (4) ¥ ¥ ¥ 1) The set of initial conditions, {xu (0)}u∈V , 2) the set of nodes properties, {(pu,du)}u∈V , and 3) the network topology, via the eigenvalues of the ex- pected matrix EWk. As we shall show in Section IV, our expression for the variance has a nice interpretation, since it separates the influence of each one of the above elements into three multiplicative terms. In the next subsection we provide the details regarding our analysis of the expectation of x∗. B. Mean of Consensus Value We use (2) to study the mean of the consensus value. We first derive an expression for EWk, and then study its dominant left eigenvector v1 (EWk). For notational conve- di ∼ Ber (di, pi), and denote its first and second moments as M(1) nience, we define the random variable zi , 1/(cid:0) di + 1(cid:1) where i(cid:1). The diagonal entries of EWk are then given by Ewii = E(cid:2)1/(cid:0) di + 1(cid:1)(cid:3), which present the following explicit expression (see Appendix I for details): , E (zi) and M(2) , E(cid:0)z2 i i Ewii = M(1) i = 1 − qdi+1 pi (di + 1) i . (6) where qi = 1 − pi. Furthermore, the off-diagonal entries of EWk are equal to (see Appendix I for details): qdi+1 i + pi (di + 1) − 1 Ewi j = a ji pi (di + 1)di = a ji 1 − M(1) i di . (7) Taking (6) and (7) into account, we can write EWk as follows: EWk = S + (I − S )D−1 c AT c , (8) where S , diaghM(1) i i. As expected, it is easy to check i.e., (EWk) 1n = S 1n + is a stochastic matrix, that EWk (I − S )D−1 c AT c 1n = 1n. Based on (8) we can write E (x∗) explicitly in terms of di and pi, as follows: Theorem 1: Consider the random adjacency matrix Ak in (4) and the associated (random) stochastic matrix Wk in (5). The expectation of the asymptotic consensus value of (1) is given by where wi (pi,di) , E (x∗) = n(cid:229) r wi xi (0) , i=1 pi (di + 1)di pi (di + 1) − 1 − qdi+1 i , and r (pi,di) , (cid:229) i wi (pi,di)!−1 . Proof: Our proof is based on computing v1 (EWk) and applying (2). Let us define v , v1 (EWk) and w , (I − S )v. From (8), we have that the eigenvalue equation corresponding to the dominant left eigenvector of EWk is vT(cid:0)S + (I − S )D−1 c AT c(cid:1) = vT , which can be rewritten as c = vT (I − S ). This last equation can be vT (I − S )D−1 c AT written as wT D−1 c AT c = wT . The solution to this equation is the stationary distribution of the Markov chain with transition matrix D−1 i di, where d = (d1, ...,dn)T . Hence, the solution to the eigenvalue equation is c , which is equal to p = d/(cid:229) c AT v1 (EWk) = s (I − S )−1 d, where we include the normalizing parameter s = (cid:229) i di i !−1 1 − M(1) such that kv1 (EWk)k1 = 1. Hence, from (2) we have E (x∗) = n(cid:229) s di i=1 1 − M(1) xi (0) . i Substituting the expression for M(1) simple algebraic simplifications. i in (6), we reach (9) via In general, the asymptotic mean E (x∗) does not coincide with the initial average ¯x0 = 1 i xi (0). There is a simple n technique, based on Theorem 1, that allows us to make the expected consensus value to be equal to the initial average. This technique consists of using yi (0) = (r wi)−1 xi (0) as initial conditions in (1). Hence, one can easily check that the asymptotic consensus value E (y∗) equals the initial average ¯x0. IV. VARIANCE OF THE ASYMPTOTIC CONSENSUS VALUE In this section, we derive an expression that explicitly relates the variance var (x∗) with the three elements that influences it, namely, the set of initial conditions {xu (0)}u∈V , the nodes properties {(pu,du)}u∈V , and the network structure (via the eigenvalues of the expected matrix EWk). For sim- plicity in notation, we denote E (Wk ⊗Wk) and (EWk ⊗ EWk) by R and Q, respectively. Our analysis starts in expression (3), which can be rewritten as var (x∗) = [x(0) ⊗ x(0)]T [v1 (R) − v1 (Q)] . Hence, we can upper-bound the variance of the asymptotic consensus value as follows: (9) var (x∗) ≤ kx(0) ⊗ x(0)k1 kv1 (R) − v1 (Q)k¥ . (10) From the rules of Kronecker multiplication, we can write the first factor in terms of the initial conditions as kx(0) ⊗ x(0)k1 = (cid:229) 1≤i, j≤n(cid:12)(cid:12)xi (0)x j (0)(cid:12)(cid:12) . (11) In the following, we derive an upper bound for the sec- ond factor kv1 (R) − v1 (Q)k¥ in terms of the nodes prop- erties and the network structure. Our approach to bound is based on the observation that both R kv1 (R) − v1 (Q)k¥ and Q are n2 × n2 stochastic matrices, and the dominant left eigenvectors v1 (R) and v1 (Q) are stationary distributions of the Markov chains with transition matrices R and Q. We (cid:229) matrix D = R − Q also follows the same pattern as R and Q. Hence, comparing the entries of Q and R we can easily deduce the following seven cases for the entries of D : D 2 = D 5 = D 7 = 0, D 1 = M2 (zi) − M2 D 3 = a ji 1 (zi) , di (cid:0)−M2 (zi) + M2 1 (zi)(cid:1) , D 4 = a ji M1 (zi) − M2 (zi) D 6 =( (cid:16) (1−Mi)2 di − 1+2Vi−3Mi −a jiasi (1 − M1 (zi))2 , di(di−1) (cid:17) , d2 i − (1 − M1 (zi))2 d2 i ! , for di > 1, for di = 1. i , E(cid:2)1/( di + 1)2(cid:3) can be written as a hyperge- where M(2) ometric function that depends on pi and di (see Appendix III). From the above entries, we can compute via simple, but tedious, algebraic manipulations the following expression for the infinity norm of the perturbation: kR − Qk¥ = kD k¥ = max 1≤i≤n {Si} , (13) where Si = 2(1 − M(1) i )(cid:20)M(1) i + 1 di(cid:16)M(1) i − 1(cid:17)(cid:21) , Note that Si is a function that depends exclusively on the sequence of nodes properties {(pu,du)}u∈V ; hence, kR − Qk¥ depends exclusively on the set of nodes degrees and probabil- ities, but it is independent on how these nodes interconnect. In the following subsection, we show how the pattern of interconnection among nodes influences the upper-bound of the variance in (10) via the condition number k s in (12). B. Perturbation-Based Bound for the Variance In this subsection we derive an explicit relationship be- tween the condition number k s and the network structure via the spectral properties of EWk = S + (I − S )D−1 c . This result will then be used to bound the variance of x∗ in (10). We base our analysis on a the following bound, derived by Meyer in [18], relating k s with the eigenvalues of Q, denoted as {m i}n2 c AT i=1: 2(cid:0)n2 − 1(cid:1) k=2 (1 − m k) n2 . (14) g† max i j(cid:12)(cid:12)(cid:12) < i, j (cid:12)(cid:12)(cid:12) j(cid:9)n2 i=1 and(cid:8)m (cid:12)(cid:12)1 − l Before we present our main result, we need some notation. Denote by {l i}n j=1 the set of eigenvalues of EWk and EWk ⊗ EWk, respectively. The ordering of the eigenvalue sequences is determined by their distance to 1, i.e., 1 − l i ≤ value of (1) can be upper-bounded by Theorem 3: The variance of the asymptotic consensus j(cid:12)(cid:12) for i ≤ j. Hence, our result can be stated as follows: j)! 2(cid:0)n2 − 1(cid:1) {Si}(cid:19) (cid:18) max } {z } {z var (x∗) ≤ kx(0) ⊗ x(0)k1 (1 − l il {z (15) 1≤i≤n } (C) (A) (B) , Fig. 1. The pattern of E[Wk ⊗Wk] for n = 3. The numbers in parentheses represent the value of each entry defined in the Appendices. denote these distributions by v1 (R) , p and v1 (Q) , p , re- spectively. In this setting, we can apply the following lemma from [17] which studies the sensitivity of the stationary distribution of Markov chains: Lemma 2: Consider two Markov chains with transition matrices Q and R, and stationary distributions p and p , re- spectively. We define G = I −Q, and denote its pseudoinverse by G† = [g† i j]. Hence, , (12) k p − p k¥ ≤ k s kR − Qk¥ g† is called the condition number of the where k s = maxi, j(cid:12)(cid:12)(cid:12) i j(cid:12)(cid:12)(cid:12) chain described by the transition matrix Q. In the next subsections, apply the above lemma to bound the factor kv1 (R) − v1 (Q)k¥ . In the first subsection we com- pute an explicit expression for the norm of the perturbation kR − Qk¥ as a function of the properties of the nodes. In the second subsection, we study the coefficient k s in terms of the eigenvalues of EWk. A. Infinity Norm of the Perturbation kR − Qk¥ Our approach is based on studying the entries of the n2 × n2 matrix R = E [Wk ⊗Wk], and compare them with the entries of Q = EWk ⊗ EWk. The entries of Q and R are of the form E(wi j)E(wrs) and E(wi jwrs), respectively, with i, j,r, and s ranging from 1 to n. These entries can be classified into seven different cases depending on the relations between the indices. In the Appendices II and III, we present explicit expressions for each one of these cases. A key observation in our approach is to notice the pattern that the above entries induces in the matrices R and Q. For sake of clarity, we illustrate this pattern for n = 3 in Fig. 1, where the numbers in parenthesis correspond to each one of the seven cases identified in the Appendices. Since the entries of R follow the same pattern as the entries of Q (although these entries are different), the perturbation (cid:213) (cid:213) where {l i}n (1 − l il i=1 are the eigenvalues of EWk, and the product j) = (cid:213) (i, j) s.t. (i, j)6=(1,1) (1 − l il j) . Proof: We start our proof from (10) var (x∗) ≤ kv1 (R) − v1 (Q)k¥ kx(0) ⊗ x(0)k1 (a) (b) ≤ k s kR − Qk¥ kx(0) ⊗ x(0)k1 = k s(cid:18) max {Si}(cid:19) kx(0) ⊗ x(0)k1 2(cid:0)n2 − 1(cid:1) (1 − m k) max 1≤i≤n 1≤i≤n (c) < {Si} kx(0) ⊗ x(0)k1 , where we have used Lemma 2 in inequality (a), the expres- sion for kR − Qk¥ in (13) in equality (b), and the upper bound in (14) in step (c). We obtain the statement of the theorem by applying the following standard property of the Kronecker product: {m k}n2 k=1 =(cid:8)l il j(cid:9)1≤i, j<n. Remark 4: The bound in (15) separates the variance into three multiplicative terms representing each one of the fol- lowing elements (for convenience, we have underlined each one of these terms in (15)): (A) (B) (C) This first term exclusively depends on the initial condition as indicated by (11). The second term depends solely on the nodes properties di and pi. The last term represents the influence from the overall graph structure via the spectral properties of EWk. c AT Remark 5: It is specially interesting to study the implica- tions of Term (C) in the asymptotic variance. For example, given the sequences of degrees and probabilities, {di}n i=1 and {pi}n i=1, the influence of the network structure on the variance is given via Term (C). Since the eigenvalues of EWk are key in this term, it is interesting to briefly describe the homogeneous Markov chain with transition matrix P , EWk = S + (I − S )D−1 c . This Markov chain presents a self- loop in each one of its n states with transition probability Pii = M(1) , as well as a link from i to j with transition for (i, j) ∈ Ec. From an analysis proposed by Meyer in [18], we conclude that Term (C) is primarily governed by how close the subdominant eigenvalues of EWk are from 1. In particular, the further the subdominant eigenvalues of EWk are from 1, the lower the upper bound in (15). In the next section, we illustrate the relationship between spectral properties of EWk and the variance of the asymptotic consensus value with several numerical simulations. probability Pi j = (cid:16)1 − M(1) i (cid:17) d−1 i i V. NUMERICAL SIMULATIONS In this section we present several numerical simulations illustrating our results. In the first subsection, we numerically verify the result in Theorem 1. In the second subsection we present some examples to illustrate the implications of Theorem 3 in the variance of the asymptotic consensus value. Fig. 2. The above figure represents a chain of leader nodes, denoted as 1,2, and 3, with a set of followers. Connections between leaders are represented as pairs of directed links with existence probabilities puv and pvu, with u,v ∈ {1,2,3}. We have also included in this figure the connection of each leader and one of its followers (drawn as a smaller circle on top of each leader). In this case, the directed link incoming the follower (leader) exists with probability pl f (p f l). The rest of followers are represented under each leader, where we represent each pair of directed links as a single undirected edge for clarity. A. Expectation of the Asymptotic Consensus In our first simulation we take a graph Gc composed by 3 stars connected in a chain (see Fig. 2). This graph is intended to represent, in a social context, three leaders with a set of followers. In Fig. 2, we represent the leaders using large circles marked as 1,2, and 3, and the followers using smaller circles. We assume that each follower only listen to one leader (the center of a star) and nobody else. In this particular example, the first, second and third leaders have 4, 8, and 16 followers, respectively. In each time step, a directed random graph Gk is built by choosing a set of directed communication links from Gc. We have fixed the probability of existence of a directed link coming into followers to be equal to pl f = 1/2, for all such links (see Fig. 2). Also, the probability of existence of a directed link coming into a leader is inversely proportional to the degree of the leader. More specifically, we have chosen puv = 1/dv, for v = 1,2, and 3, where puv represents the existence of a directed communication link from the u-th node to the v-th leader. In this example, we compute the asymptotic consensus value for 100 realizations of a random consensus algorithm with initial conditions xi (0) = i/N. We represent the his- togram of these realizations in Fig. 3, where the empirical average of the 100 realizations equals 0.5077. The theoretical expectation for the asymptotic consensus value applying i r wi (i/N) =0.4595, which is Theorem 1 equals E (x∗) = (cid:229) in great accordance with the empirical value. For future reference, we have also computed the empirical standard deviation of the 100 realizations to be 0.0298, and the three eigenvalues of EWk closest to 1 are {0.9823,0.9449,0.75}. B. Expectation of the Asymptotic Variance In this subsection, we numerically illustrate some of the implications of Theorem 3 in the variance of the asymptotic consensus value. Although the upper bound stated in this Theorem is not tight, there are some qualitative implications (cid:213) (cid:213) Fig. 3. Empirical histogram for 100 realizations of the random directed consensus over the graph in Fig. 2. The empirical average and the empirical standard deviation of the realizations are 0.4595 and 0.0298, respectively. that are consistent throughout our numerical experiments. For example, as we mentioned in Remark 5, given a set of initial conditions and nodes properties, the upper bound in (15) is primarily governed by how close the subdominant eigenvalues of EWk are from 1. In particular, the further the subdominant eigenvalues of EWk are from 1, the lower the upper bound. We illustrate in the following numerical experiments that the lower the upper bound, the lower one should expect the variance to be. In the first experiment, we slightly modify the network described in the previous subsection and study the influence of this modification on the eigenvalues of EWk and the variance of x∗. Our first modification is a change in the probabilities of existence of a directed link from the u- th node to the v-th leader without changing the network topology. In particular, we choose the new probabilities to be puv = 3/dv, for v = 1,2, and 3. In the modified network, the eigenvalues of EWk closest to 1 are {0.9789,0.9372,0.75}. Hence, since the effect of our modification on the eigenvalues is to move them away from 1, we should expect the variance of x∗ to be reduced according to Remark 5. In fact, running 100 random consensus algorithms with the same initial conditions, xi (0) = i/N, using our new probabilities, we obtain a standard deviation 0.0286 (which is less than the 0.0298 obtained before). In the second experiment, we illustrate how the larger the gap between the eigenvalues of EWk and 1, the smaller the variance of x∗. In this case, apart from keeping the new set of probabilities puv = 3/dv, we convert the 3-chain of leaders into a 3-ring of leaders, as depicted in Fig. 4. In this case, the three eigenvalues of EWk closest to 1 are {0.9577,0.9212,0.75}, which are even further away from 1 than in the second example. Hence, as expected, the standard deviation of 100 random consensus algorithms is even smaller than in the second example, in particular 0.0274. In conclusion, our simulations are consistent with Theorem 3 and with the qualitative behavior described in Remark 5. Fig. 4. Ring of 3 leaders and corresponding followers. VI. CONCLUSIONS AND FUTURE WORK We have studied the asymptotic properties of the consen- sus value in distributed consensus algorithms over switching, directed random graphs. While different aspects of consensus algorithms over random switching networks, such as condi- tions for convergence and the speed of convergence, have been widely studied, a characterization of the distribution of the asymptotic consensus for general asymmetric random consensus algorithms remains an open problem. In this paper, we have derived closed-form expressions for the expectation of the asymptotic consensus value as a function of the set of initial conditions, {xu (0)}u∈V , and the set of nodes properties, {(pu,du)}u∈V , as stated in Theorem 1. We have also studied the variance of the asymptotic consensus value in terms of several elements that influence it, namely, (i) the initial conditions, (ii) nodes properties, and (iii) the network topology. In Theorem 3, we have derived an upper bound for the variance of the asymptotic consensus value that explicitly describes the influence of each one of these elements. We also provide an interpretation of the influce of the network topology on the variance in terms of the eigenvalues of the expected matrix EWk. From our analysis we conclude that, in most cases, the variance of x∗ is primarily governed by how close the subdominant eigenvalues of EWk are from 1. We have checked the validity of our predictions with several numerical simulations. APPENDIX COMPUTING THE ENTRIES OF EWk We start by computing the entries of EWk. The diagonal entries of EWk are given by: Ewii = E(cid:20) 1 di 1 + di(cid:21) = k(cid:19)pk k + 1(cid:18)di 1 k=0 k=0 1 − qdi+1 pi (di + 1) i , M(1) i di 1 k + 1 P( di = k) i (1 − pi)di−k = = (cid:229) (cid:229) Similarly, the non-diagonal entries of EWk result in: Similarly, we also have: Ewi j = E(cid:20) a ji 1 + di(cid:21) qdi+1 i + pi (di + 1) − 1 = a ji = a ji pi (di + 1)di 1 − M(1) i di . APPENDIX ENTRIES OF EWk ⊗ EWk We now compute the possible entries in Q = EWk ⊗ EWk. The entries of the Kronecker matrix EWk ⊗ EWk, with EWk = S + (I − S )D−1AT , present entries that can be classified into seven different cases depending on the relations between the indices. These are the cases, where we assume that all four indices i, j,r, and s are distinct: , Q4 , E (wi j) E (wi j) = Q2 , E (wii) E (w j j) = M(1) Q3 , E (wii) E (wi j) = i (cid:17)2 Q1 , E (wii) E (wii) =(cid:16)M(1) i (cid:16)1 − M(1) i (cid:17) , i (cid:17)2 i (cid:16)1 − M(1) r (cid:17) , i (cid:16) 1 − M(1) i (cid:17)2 i (cid:16)1 − M(1) r (cid:17) . i (cid:17)(cid:16) 1 − M(1) didr (cid:16)1 − M(1) , i M(1) j a ji M(1) di a ji d2 asr dr a jiasi d2 a jiasr Q7 , E (wi j) E (wrs) = Q6 , E (wi j) E (wis) = Q5 , E (wii) E (wrs) = M(1) , , APPENDIX ENTRIES OF EWk ⊗Wk We now turn to the computation of the elements of E[Wk ⊗ Wk], which are of the form E(wi jwrs). Again, we classify the entries into seven different cases depending on the relations between the subindices: R1 , Ew2 1 ii = E(cid:20) (k + 1)2(cid:18)di ( di + 1)2(cid:21) k(cid:19)pk 1 i qdi−k i = di k=0 = qdiH(pi,di) , M(2) i R2 , E (wiiw j j) = M(1) R3 , E (wiiwi j) = R4 , E (wi jwi j) = R5 , E (wiiwrs) = R6 , E (wi jwis) , j i M(1) a ji di (cid:16)M(1) di (cid:16)M(1) a ji M(1) asr dr i (cid:17) , i − M(2) i (cid:17) , i − M(2) r (cid:17) , i (cid:16) 1 − M(1) i (cid:17) , i − 3M(1) = ( a jiasi di(di−1)(cid:16)1 + 2M(2) 0, for di > 1, for di = 1, R7 , E(wi jw ji) = E(wi jw js) = E(wi jwri) = E(wi jwr j) = E(wi jwrs) = a jiasr didr (cid:16)1 − M(1) i (cid:17)(cid:16) 1 − M(1) r (cid:17) . REFERENCES [1] J. N. Tsitsiklis, Problems in decentralized decision making and com- putation, Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, 1984. [2] A. Jadbabaie, J. Lin, and A. S. Morse, "Coordination of groups of mobile autonomous agents using nearest neighbor rules," IEEE Transactions on Automatic Control, vol. 48, no. 6, pp. 988-1001, 2003. [3] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and cooperation in networked multi-agent systems," Proceedings of the IEEE, vol. 95, no. 1, 2007. [4] J. Cortes, S. Martinez, and F. Bullo, "Analysis and design tools for distributed motion coordination," in Proceedings of the American Control Conference, Portland, OR, pp. 1680-1685, 2005. [5] M. H. DeGroot, "Reaching a Consensus," Journal of American Sta- tistical Association, vol. 69, no. 345, pp. 118-121, 1974. [6] B. Golub and M. O. Jackson, "Naive learning in social networks: Con- vergence, influence, and the wisdom of crowds," 2007, unpublished Manuscript. [7] Y. Hatano and M. Mesbahi, "Agreement over random networks," IEEE Transactions on Automatic Control, vol. 50, no. 11, pp. 1867-1872, 2005. [8] C. W. Wu, "Synchronization and convergence of linear dynamics in random directed networks," IEEE Transactions on Automatic Control, vol. 51, no. 7, pp. 1207-1210, 2006. [9] M. Porfiri and D. J. Stilwell, "Consensus seeking over random weighted directed graphs," IEEE Transactions on Automatic Control, vol. 52, no. 9, pp. 1767-1773, 2007. [10] A. Tahbaz-Salehi and A. Jadbabaie, "A necessary and sufficient condition for consensus over random networks," IEEE Transactions on Automatic Control, vol. 53, no. 3, pp. 791-795, 2008. [11] G. Picci and T. Taylor, "Almost sure convergence of random gossip algorithms," in Proceedings of the 46th IEEE Conference on Decision and Control, New Orleans, LA, pp. 282-287, 2007. [12] D. Acemoglu, A. Ozdaglar, and A. ParandehGheibi, "Spread of (mis)information in social networks," Massachusetts Institute of Tech- nology, LIDS Report 2812, May 2009, submitted for Publication. [13] F. Fagnani and S. Zampieri, "Randomized consensus algorithms over large scale networks," IEEE Journal on Selected Areas in Communi- cations, vol. 26, no. 4, pp. 634-649, 2008. [14] S. Boyd, A. Gosh, B. Prabhakar, and D. Shah, "Randomized gossip algorithms," Special issue of IEEE Transactions on Information Theory and IEEE/ACM Transactions on Networking, vol. 52, no. 6, pp. 2508- 2530, 2006. [15] A. Tahbaz-Salehi and A. Jadbabaie, "Consensus over ergodic station- ary graph processes," IEEE Transactions on Automatic Control, vol. 55, no. 1, pp. 225-230, 2010. [16] V.M. Preciado, A. Tahbaz-Salehi, and A. Jadbabaie, "Variance analysis of randomized consensus in switching directed networks,"in Proceed- ings of the IEEE American Control Conference, 2010, accepted for Publication. (cid:229) [17] R.E. Funderlic and C.D. Meyer, "Sensitivity of the stationary dis- tribution vector for an ergodic Markov chain," Linear Algebra and Applications, vol. 76, pp. 1-17, 1986. [18] C.D. Meyer, "Sensitivity of the stationary distribution of a Markov chain," SIAM J. Matrix Appl., vol. 15, pp. 715-728, 1994.
1901.09837
1
1901
2019-01-28T17:33:45
Designing a Multi-Objective Reward Function for Creating Teams of Robotic Bodyguards Using Deep Reinforcement Learning
[ "cs.MA", "cs.LG" ]
We are considering a scenario where a team of bodyguard robots provides physical protection to a VIP in a crowded public space. We use deep reinforcement learning to learn the policy to be followed by the robots. As the robot bodyguards need to follow several difficult-to-reconcile goals, we study several primitive and composite reward functions and their impact on the overall behavior of the robotic bodyguards.
cs.MA
cs
Designing a Multi-Objective Reward Function for Creating Teams of Robotic Bodyguards Using Deep Reinforcement Learning 9 1 0 2 n a J 8 2 ] A M . s c [ 1 v 7 3 8 9 0 . 1 0 9 1 : v i X r a Hassam Ullah Sheikh 1 Ladislau Boloni 1 Abstract We are considering a scenario where a team of bodyguard robots provides physical protection to a VIP in a crowded public space. We use deep reinforcement learning to learn the policy to be followed by the robots. As the robot bodyguards need to follow several difficult-to-reconcile goals, we study several primitive and composite reward functions and their impact on the overall behavior of the robotic bodyguards. 1. Introduction Recent progress in the field of autonomous robots makes it feasible for robots to interact with multiple humans in public spaces. In this paper, we are considering a human VIP moving in a crowded market environment who is protected from physical assault by a team of bodyguard robots. The robots must take into account the position and movement of the VIP, the bystanders and other robots. Previous work in similar problems relied on explicitly programmed behaviors. Recent research in deep reinforcement learning (Levine et al., 2016; Silver et al., 2016) and imitation learn- ing (Rahmatizadeh et al., 2018) applied to the robotics has raised the possibility that learning algorithms might lead to better algorithms than explicit programming. In this paper we explore deep reinforcement learning approaches for our scenario. We aim to simultaneously learn communication and coordination techniques between the agent and the task oriented behavior. We aim to develop a general task framework, which can generalize to other types of desired behaviors, beyond body- guard protection. In order to achieve these goals, we need to specify: the envi- ronment in which the agents will perform, the environment 1Department of Computer Science, University of Central Florida, Orlando, Florida, United States. Correspondence to: Has- sam Ullah Sheikh <[email protected]>. Accepted at the 1st Workshop on Goal Specifications for Reinforce- ment Learning, FAIM 2018, Stockholm, Sweden, 2018. Copyright 2018 by the author(s). representation in the robot that forms the basis of learning, the reward function that describes the desired behavior, and the reinforcement algorithms deployed. For the bodyguard task, the design of the reward function is especially chal- lenging, because it is task specific, and it needs to reconcile multiple conflicting objectives the maximum protection, while minimizing interference with the crowd and being un- obtrusive. In Section 4.2 we discuss several different reward functions that reflect the different aspects of the desired behavior. We describe several experiments using the Multi-agent Deep Deterministic Policy Gradient (MADDPG) algorithms over several choices of reward functions. We found that commu- nication penalization reward functions captures better the collaborative nature of the scenario, and thus it performs better in experiments. 2. Related Work The use of robots as a bodyguards is related to several dif- ferent area of research and has received significant attention lately. Several different studies such as (Richard Klima, 2016; Yasuyuki et al., 2015) considered using robots and multi-agent reinforcement learning for security related tasks such as patrolling and team coordination by placing check- points to provide protection against imminent adversaries. A multi-robot patrolling framework was proposed by (Khan et al., 2012) that analyzes the behavior pattern of the sol- diers and the robot and generates a patrolling schedule. The control of robots for providing maximal protection to a VIP was well studied in (Bhatia et al., 2016) where they intro- duced the concept of threat vector resolution and quadrant load balancing. 3. Background We consider the problem of providing maximal physical pro- tection as a standard reinforcement learning setup with N agent interacting with the environment in E discrete steps us- ing real valued continuous actions at such that at ∈ Rd. At each timestep t, the agents receive an observation xt, takes the action at, and receive a scalar reward rt. Generally, the environment can be partially observable i.e we may need the Multi-Objective Reward for Teams of Robotic Bodyguards entire past history of observations, action pairs to represent the current state such that st= (x1, a1, x2, a2, . . . , xt). For our problem, we have assumed that the environment is fully observable so we will represent st = xt The behavior of each agent is represented by its own policy π that takes the state st as an input and outputs a probability distribution over all the actions i.e π (s) → P (A). Since the environment is stochastic, we will model it as Markov Decision Process with a state space S, action space A, re- ward function R (st, at, st+1) and the transition dynamics p(st+1st, at). The return Gt from state s at timestep t is defined as the discounted cummulative reward that the agent accumulates starting from state s at timestep t and represented as Gt = γi−tR (si, ai, si+1) where γ is the discounting factor γ ∈ [0, 1]. The goal of the reinforcement learning is find an optimum policy π∗ that maximizes the expected return starting from state s. We denote the trajectory for state visitation for the policy π as ρπ. T(cid:88) i=t 3.1. Policy Gradients Policy gradient methods have been shown to learn the opti- mal policy in variety of reinforcement learning tasks. The main idea behind policy gradient methods is instead of pa- rameterizing the Q-function to extract the policy, we param- eterize the policy using the parameters θ to maximize the objective which is represented as J (θ) = E [Gt] by taking a step in the direction of ∇J (θ) where ∇J (θ) is defined as: ∇J (θ) = E [∇θ log πθ (as) Qπ (s, a)] The policy gradient methods are prone to high variance problem. Several different methods such as (Wu et al., 2018; Schulman et al., 2017) have been shown to reduce the variability in policy gradient methods by introducing a critic which is a Q-function that tells about the goodness of a reward by working as a baseline. 3.2. Deep Deterministic Policy Gradients In (Silver et al., 2014) has shown that it is possible to extend policy gradient framework to deterministic policies i.e. πθ : S → A. In particular we can write ∇J (θ) as ∇J (θ) = E(cid:2)∇θπ (as)∇aQπ (s, a)a=π(s) (cid:3) Deep Deterministic Policy Gradients (Lillicrap et al., 2015) is an off-policy algorithm and is a modification of the DPG method introduced in (Silver et al., 2014) in which the pol- icy π and the critic Qπ is approximated using deep neural networks. DDPG also uses an experience replay buffer alongside with a target network to stabilize the training. 3.3. Multi-Agent Deep Deterministic Policy Gradients Multi-agent deep deterministic policy gradients (Lowe et al., 2017) is the extension of the DDPG for the multi-agent setting where each agent has it's own policy. The gradient ∇J (θi) of each policy is written as ∇J (θi) = E [∇θi log πi (aisi) Qπ i (si, a1, . . . , aN )] where Qπ i (si, a1, . . . , aN ) is a centralized action-value function that takes the actions of all the agents in addition to the state of the agent to estimate the Q-value for agent i. Since every agent has it's own Q-function, its allows the agents to have different action space and reward functions. The primary motivation behind MADDPG is that know- ing all the actions of other agents makes the environment stationary, even though their policy changes. 3.4. Policy Gradients Policy gradient methods have been shown to learn the opti- mal policy in variety of reinforcement learning tasks. The main idea behind policy gradient methods is instead of pa- rameterizing the Q-function to extract the policy, we param- eterize the policy using the parameters θ to maximize the objective which is represented as J (θ) = E [Gt] by taking a step in the direction of ∇J (θ) where ∇J (θ) is defined as: ∇J (θ) = E [∇θ log πθ (as) Qπ (s, a)] The policy gradient methods are prone to high variance problem. Several different methods such as (Wu et al., 2018; Schulman et al., 2017) have been shown to reduce the variability in policy gradient methods by introducing a critic which is a Q-function that tells about the goodness of a reward by working as a baseline. 3.5. Deep Deterministic Policy Gradients In (Silver et al., 2014) has shown that it is possible to extend policy gradient framework to deterministic policies i.e. πθ : S → A. In particular we can write ∇J (θ) as ∇J (θ) = E(cid:2)∇θπ (as)∇aQπ (s, a)a=π(s) (cid:3) Deep Deterministic Policy Gradients (Lillicrap et al., 2015) is an off-policy algorithm and is a modification of the DPG method introduced in (Silver et al., 2014) in which the pol- icy π and the critic Qπ is approximated using deep neural networks. DDPG also uses an experience replay buffer alongside with a target network to stabilize the training. 3.6. Multi-Agent Deep Deterministic Policy Gradients Multi-agent deep deterministic policy gradients (Lowe et al., 2017) is the extension of the DDPG for the multi-agent setting where each agent has it's own policy. The gradient Multi-Objective Reward for Teams of Robotic Bodyguards ∇J (θi) of each policy is written as ∇J (θi) = E [∇θi log πi (aisi) Qπ i (si, a1, . . . , aN )] where Qπ i (si, a1, . . . , aN ) is a centralized action-value function that takes the actions of all the agents in addition to the state of the agent to estimate the Q-value for agent i. Since every agent has it's own Q-function, its allows the agents to have different action space and reward functions. The primary motivation behind MADDPG is that know- ing all the actions of other agents makes the environment stationary, even though their policy changes. 4. Problem Formulation The setting we are considering for providing maximal phys- ical protection to the VIP in crowded environment is a co- operative Markov game which becomes a natural extension of the single agent MDP for multi-agent systems. A multi- agent MDP is defined as state space S that decribes all the configurations of all the agents, an action space A that de- scribes the action space of every agent A1, . . . ,AN . The transitions are defined as T = S1 × A1 × . . . × SN × AN . For each agent i, the reward function is defined as ri = R (Si,Ai). In this problem, we are assuming that all bodyguards have same state space and they are following an identical policy. For this problem we are considering a finite horizon problem where each episode is terminated after T steps. Since this problem is a cooperative setting, the goal of all the agents is to find individual policies that increase the collected payoff. 4.1. The Environment Model For the emergence of interesting behaviors in a multi-agent setting, grounded communication in a physical environ- ment is considered to be a crucial component. For per- forming the experiments, we used Multi-Agent Particle Environment (Mordatch & Abbeel, 2017) which is a two- dimensional physically simulated environment in a discrete time and continuous space. The environment consists of N agent and M landmarks, both possessing physical attributes such as location, velocity and size etc. Agents can act and move independently with their own policies. In addition to the ability of performing physical actions in the environment, the agents also have the ability to utter verbal symbols over the communication channel at every timestamp. The utterances are symbolic in nature and does not carry any meaning. At each timestamp, every agent utters a categorical variable that is observed by every other agent and it is up to the agents to infer a meaning of these symbols during the training time. Every utterance carry a small penalty and the agent can decide not to utter at every timestamp. We denote the utterance which is a one-hot vector by c. The complete observation of the environment is given by o = [x1,...N +M , c1,...N ] ∈ O. The state of each agent is the physical state of all the entities in the environment and verbal utterances of all the agents. Formally, the state of each agent is defined as si = [xj,...N +M , ck,...N ] where xj is the observation of the entity j from the perspective of agent i and ck is the verbal utterance of the agent k. 4.2. Reward Functions In (Bhatia et al., 2016) has defined a metric that quantifies the threat to the VIP from each crowd member bi at each timestep t. This metric can be extended to a reward function. Since the threat level metric gives a probability. We can conclude that when the distance between the VIP and the crowd member is 0, the threat to the VIP is maximum, i.e 1, conversely when the distance between the VIP and the crowd member bi is more than the safe distance, the threat to the VIP is 0. We can model this phenomenon as an exponential decay. Thus the fundamental reward function can be defined as Rt (B, VIP ) = −1 + (1 − TL (VIP , bi)) (1) where i=1 TL (VIP , bi) = exp−A(Dist(VIP,bi))/B (2) In the following we will derive reward functions and ex- plain the motivation behind them that were derived from equation 1. The baseline Threat-Only Reward Function penalizes each agent with the threat to the VIP at each time step as men- tioned in (Bhatia et al., 2016). Rt (B, VIP ) = −1 + (1 − TL (VIP , bi)) (3) k(cid:89) k(cid:89) i=1 The Binary Threat Reward Function penalizes each agent for the threat with a negative binary reward, in addition, each agent is also penalized for not maintaining a suitable distance from the VIP: L (VIP ,B) = if − 1 + (1 − TL (VIP , bi)) (cid:54)= 0 otherwise m ≤ (cid:107)xi − VIP(cid:107)2 ≤ d otherwise (4) (5) D (VIP , xi) = −1 k(cid:89) i=1 −1 0 0 Multi-Objective Reward for Teams of Robotic Bodyguards where m is the minimum distance the bodyguard has to maintain from VIP and d is the safe distance. The final reward function is represented as Rt (B, VIP , xi) = L (VIP ,B) + D (VIP , xi) (6) The Composite Reward Function is the composition of the threat only reward function and the penalty for not maintain- ing a suitable distance from the VIP k(cid:89) i=1 + D (VIP , xi) Rt (B, VIP , xi) = − 1 + (1 − TL (VIP , bi)) (7) The Communication Penalization Reward Function aug- ments the composite reward by adding a small penalty p every time the bodyguard performs an utterance, as recom- mended in (Mordatch & Abbeel, 2017). 5. Experiments We performed our experiments using the Multi-Agent Parti- cle Environment (MPE) (Mordatch & Abbeel, 2017). The performance was measured using the threat metric defined in (Bhatia et al., 2016) over one episode. The experiments were performed with 2-4 bodyguards ranging from 2-4, and a constant number of 10 bystanders. For all of the experi- ments, we have trained the agents for 10,000 episodes and limiting the length of the episode to 25 steps. Figure 1 shows examples of the resulting bodyguard behav- ior for the composite reward function (left) and the threat only reward function (right). Notice that for the threat only behavior, the bodyguards are not in the close proximity of the VIP - they have found ways to keep the threat low by "attacking" the crowd. Figure 1. The emerging collaborative bodyguard behavior, using the composite reward function from Equation 7 (left) and the threat-only function from Equation 3 (right). The VIP is brown, bodyguards blue, bystanders red and landmarks grey. Figure 2 shows the threat levels obtained by different reward functions. The communication penalty function appears the Figure 2. The overall threat level achieved by agents trained using 4 different reward functions (threat only, composite, binary threat and communication penalty). The scenario involved 4 agents and 10 bystanders. clear winner, with the lowest threat level obtained over the course of the scenario. Acknowledgement: This research was sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-10-2-0016. The views and conclusions contained in this document are those of the authors and should not be interpreted as represent- ing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copy- right notation herein. References Bhatia, T.S., Solmaz, G., Turgut, D., and Boloni, L. Con- trolling the movement of robotic bodyguards for maximal physical protection. In Proc of the 29th International FLAIRS Conference, pp. 380 -- 385, May 2016. Khan, S. A., Bhatia, T.S., Parker, S., and Boloni, L. Mod- eling human-robot interaction for a market patrol task. In Proc. of 25th International FLAIRS Conference, pp. 50 -- 55, May 2012. Levine, Sergey, Finn, Chelsea, Darrell, Trevor, and Abbeel, Pieter. End-to-end training of deep visuomotor policies. Journal of Machine Learning Research, 17(1):1334 -- 1373, January 2016. Lillicrap, Timothy P., Hunt, Jonathan J., Pritzel, Alexander, Heess, Nicolas, Erez, Tom, Tassa, Yuval, Silver, David, and Wierstra, Daan. Continuous control with deep rein- forcement learning. In Proceedings of the International Conference on Learning Representations (ICLR), 2015. Multi-Objective Reward for Teams of Robotic Bodyguards Lowe, Ryan, Wu, Yi, Tamar, Aviv, Harb, Jean, Abbeel, Pieter, and Mordatch, Igor. Multi-agent actor-critic for mixed cooperative-competitive environments. Neural Information Processing Systems (NIPS), 2017. Mordatch, Igor and Abbeel, Pieter. Emergence of grounded compositional language in multi-agent populations. arXiv preprint arXiv:1703.04908, 2017. Rahmatizadeh, Rouhollah, Abolghasemi, Pooya, Boloni, Ladislau, and Levine, Sergey. Vision-based multi-task manipulation for inexpensive robots using end-to-end learning from demonstration. In International Conference on Robotics and Automation (ICRA), 2018. Richard Klima, Karl Tuyls, Frans Oliehoek. Markov se- curity games: Learning in spatial security problems. In The NIPS 2016 The Learning, Inference and Control of Multi-Agent System, 2016. Schulman, John, Wolski, Filip, Dhariwal, Prafulla, Radford, Alec, and Klimov, Oleg. Proximal policy optimization algorithms. CoRR, abs/1707.06347, 2017. Silver, David, Lever, Guy, Heess, Nicolas, Degris, Thomas, Wierstra, Daan, and Riedmiller, Martin. Deterministic policy gradient algorithms. In Proceedings of the 31st International Conference on Machine Learning, 2014. Silver, David, Huang, Aja, Maddison, Christopher J., Guez, Arthur, Sifre, Laurent, van den Driessche, George, Schrit- twieser, Julian, Antonoglou, Ioannis, Panneershelvam, Veda, Lanctot, Marc, Dieleman, Sander, Grewe, Dominik, Nham, John, Kalchbrenner, Nal, Sutskever, Ilya, Lillicrap, Timothy, Leach, Madeleine, Kavukcuoglu, Koray, Grae- pel, Thore, and Hassabis, Demis. Mastering the game of Go with deep neural networks and tree search. Nature, 529:484 -- 503, 2016. Wu, Cathy, Rajeswaran, Aravind, Duan, Yan, Kumar, Vikash, Bayen, Alexandre M, Kakade, Sham, Mordatch, Igor, and Abbeel, Pieter. Variance reduction for policy gradient with action-dependent factorized baselines. In International Conference on Learning Representations, 2018. Yasuyuki, S., Hirofumi, O., Tadashi, M., and Maya, H. Cooperative capture by multi-agent using reinforcement learning application for security patrol systems. In 2015 10th Asian Control Conference (ASCC), pp. 1 -- 6, May 2015.
1303.4692
1
1303
2013-03-15T15:58:26
Crowd Simulation Modeling Applied to Emergency and Evacuation Simulations using Multi-Agent Systems
[ "cs.MA" ]
In recent years crowd modeling has become increasingly important both in the computer games industry and in emergency simulation. This paper discusses some aspects of what has been accomplished in this field, from social sciences to the computer implementation of modeling and simulation. Problem overview is described including some of the most common techniques used. Multi-Agent Systems is stated as the preferred approach for emergency evacuation simulations. A framework is proposed based on the work of Fangqin and Aizhu with extensions to include some BDI aspects. Future work includes expansion of the model's features and implementation of a prototype for validation of the propose methodology.
cs.MA
cs
1310.2290
1
1310
2013-10-08T21:56:33
Modelling Complexity for Policy: Opportunities and Challenges
[ "cs.MA", "cs.CY", "nlin.AO", "physics.soc-ph" ]
This chapter reviews the purpose and use of models from the field of complex systems and, in particular, the implications of trying to use models to understand or make decisions within complex situations, such as policy makers usually face. A discussion of the different dimensions one can formalise situations, the different purposes for models and the different kinds of relationship they can have with the policy making process, is followed by an examination of the compromises forced by the complexity of the target issues. Several modelling approaches from complexity science are briefly described, with notes as to their abilities and limitations. These approaches include system dynamics, network theory, information theory, cellular automata, and agent-based modelling. Some examples of policy models are presented and discussed in the context of the previous analysis. Finally we conclude by outlining some of the major pitfalls facing those wishing to use such models for policy evaluation.
cs.MA
cs
Modelling   for   Complexity   Opportunities  and  Challenges   Policy:   Bruce Edmonds, Manchester Metropolitan University [email protected] Carlos Gershenson, Universidad Nacional Autónoma de México [email protected] This chapter reviews the purpose and use of models from the field of complex systems and, in particular, the implications of trying to use models to understand or make decisions within complex situations, such as policy makers usually face. A discussion of the different dimensions one can formalise situations, the different purposes for models and the different kinds of relationship they can have with the policy making process, is followed by an examination of the compromises forced by the complexity of the target issues. Several modelling approaches from complexity science are briefly described, with notes as to their abilities and limitations. These approaches include system dynamics, network theory, information theory, cellular automata, and agent-based modelling. Some examples of policy models are presented and discussed in the context of the previous analysis. Finally we conclude by outlining some of the major pitfalls facing those wishing to use such models for policy evaluation. Introduction   For policy and decision-making, models can be an essential component, as models allow the description of a situation, the exploration of future scenarios, the valuation of different outcomes and the establishment of possible explanations for what is observed. The principle problem with this is the sheer complexity of what is being modelled. A response to this is to use more expressive modelling approaches, drawn from the “sciences of complexity”—use more complex models to try and get a hold on the complexity we face. However, this approach has potential pitfalls as well as opportunities, and it is these that this chapter will attempt to make clear. Thus, we hope to show that more complex modelling approaches can be useful, but also to help people “fooling themselves” in the process. The chapter starts with an examination of the different kinds of model that exist, so that these kinds might be clearly distinguished and not confused. A section follows on the kinds of uses to which such models can be put. Then we look at some of the consequences of the fact that what we are modelling is complex and the kinds of compromises this forces us into, followed by some examples of models applied to policy issues. We conclude by summarising some of the key danger and opportunities for using complex modelling for policy analysis. Kinds  of  Model   A model is an abstraction of a phenomenon. A useful model has to be simpler than the phenomenon but to capture the relevant aspects of it. However, what needs to be represented in a model and what can be safely left out is often a matter of great subtlety. Since relevance changes with context, some models will be useful in some circumstances and useless in others. Also, a model that is useful for one purpose may well be useless for another. Many of the problems associated with the use of models to aid the formulation and steering of policy derive from an assumption that a model will have value for a purpose or in a context different form the one the model was established and validated for. In other words, the value of a model is seen to be in its representation (e.g. simulation code) and not in its social embedding. Generally speaking, all of epistemology deals with models. That is to say that all our descriptions can be thought of as models: they are abstractions of the phenomena with which we deal. These abstractions are required in order to understand and communicate about the complex phenomena that we have to deal with. However, models, in this most general sense, are not necessarily either precise or formal. Indeed, most of the models we use in everyday life are informal and couched in a language that is open to a considerable degree of interpretation. Two dimensions of formality can be distinguished: a) the extent to which the referents of the representation are constrained, e.g. by definition (“specificity of reference” or S R ), b) the extent to which the ways in which instantiations of the representation can be manipulated are constrained, e.g. by rules of logical deduction (“specificity of manipulation” or S M ). These two dimensions are illustrated in figure 1, below. Figure 1. Two dimensions of formality For example, an analogy expressed in natural language has a low S R since, what its parts refer to are reconstructed by each hearer in each situation. For example, the phrase “a tidal wave of crime” implies that concerted and highly coordinated action is needed in order to prevent people being engulfed, but the level of danger and what (if anything) is necessary to do must be determined by each listener. In contrast to this is a detailed description where what it refers to is severely limited by its content, e.g. “Recorded burglaries in London rose by 15% compared to the previous year”. A system of abstract logic, mathematics or computer code has high SM since the ways these can be manipulated is determined by precise rules—what one person infers from them can be exactly replicated by another. This in contrast to a piece of natural language which can be used to draw inferences in many different ways, only limited by the manipulators’ imagination and linguistic ability. However, just because a representation has high SM does not mean that the meaning of its parts in terms of what it represents is well determined. Many simulations, for example, do not represent anything we observe directly, but are rather explorations of ideas. We, as intelligent interpreters, may mentally fill in what it might refer to in any particular context, but these “mappings” to reality are not well defined. Such models are more in the nature of an analogy, albeit one in formal form – they are not testable in a scientific manner since it is not clear as to precisely what they represent. Thus simulations, especially agent- based simulations, can give a false impression of their applicability because they are readily interpretable (but informally). This does not mean they are useless for all purposes. For example, Schelling’s abstract simulation of racial segregation did not have any direct referents in terms of anything measurable1, but it was an effective 1 Subsequent elaborations of this model have tried to make the relationship to what is observed counter-example that that an assumption that can show segregation must be caused by strong racial prejudice was unsound. Thus such ‘analogical models’ (those with low S R ) can give useful insights, they can inform thought, but they can not give reliable forecasts or explanations as to what is observed. Formal models are a key aspect of science, since scientific models aim at describing and understanding phenomena. Their formality is important because that means that both their inference and meaning is (a) checkable by others and (b) stable. This makes it possible for a community of researchers and others to work collectively with the same models, confident that they are not each interpreting them in different ways. As the above discussion should have made clear, they can be formal in (at least) two different ways. For example data is a formal model of some aspect of what we observe, in the sense that it abstracts but in a well defined way – its meaning is precise. Data is not formal in terms of S M however, and one could make very different inferences from the same set of data. Usually “formal modelling” means that the inference from a model is well specified, in other words it is a representation with high S M . Thus scientific modelling is often associated with mathematics or computer simulation. However, in order to connect the formal inference to data it has to be formal in the S R sense as well, there needs to be a precise mapping between its parts and processes to what is observed, which is usually2 done in terms of a map to some data. The  Use  of  Models   There are many purposes for models, including: as a game, an more direct, but the original model, however visually suggestive, was not related to any data. 2 It is possible to directly ‘wire’ something like a computational process to reality via sensors and actuators, as happens in programmed trading, in this case it is not always clear the extent to which the model is a representation of anything observed, but more an embedded participant in it. aesthetic construction, or an illustration of some idea 3 . Most scientific models claim to be predictive, i.e. they should allow us to obtain information about the future of the phenomenon before it occurs. For example, one can calculate and predict a ballistic trajectory aiming at a target using a mechanical model. However, on closer examination, many are more concerned with two other goals: explanation or exploration, with that of prediction being left as a theoretical possibility only4. There are many scientific models that are not predictive, or which only predict abstract properties. For example, the Gutenberg–Richter law describes the distribution of earthquake intensities, but this does not tell us when might be the next earthquake nor how intense it might be. Darwin’s theory of evolution does not tell us what will evolve next, or even the reasons why what has evolved did so, but it does predict the relationship between genetic distance and the length of time since species diverged. Unfortunately many reports about models are not clear as to their purpose in this regard, indeed many seem to deliberately conflate different purposes. Whilst models may have more than one goal, one should be wary of a model that was developed and tested for one purpose but is now being used for another. A clear case of this is where a model is designed to establish a theoretical counter-example (such as in the Schelling case discussed below) but then is later claimed to be for prediction (albeit in a modified form). There is another, very basic, distinction in the way models are used in practice. That is between models that (a) represent something observed and ones which (b) are a component of an adaptive strategy. 3 (Epstein, 2008) lists 16 different reasons, (Edmonds, et al. 2013) considers reasons that are more connected with understanding human society. 4 It is common for papers describing them to list prediction as “future work” when the model is more fully developed. In the former case, there is a well-defined mapping between the model and observational data/measurements, and the model is judged as to the extent of its error in its predictions of its target phenomena. Here the model is, to different degrees and ways, either correct or not. In this case an examination of the model can tell us something about the structure of what is modelled, for example by exploring “what-if” questions using the model. For sake of clarity we call this a “representational” model. In the later case, the model is part of a decision making process to select strategies for action. It takes (processed) inputs from the world, for example indicators of success and the model is changed depending on how well it is doing (for example by depreciating the parts of the model that resulted in a poor indicator). Outputs from the model are used in the determination of interventions. Here the model is continually being adapted according to events, it somehow encodes past successes or failures for different courses of action given different observations of the world. Here a useful model may not represent any aspect of the world at all, but just be a useful intermediary in the process of decision making. However, if the process of adaption is effective it may come to encode knowledge as to what works and what does not. We call this an “adaptive” model. It may well be that an adaptive use of a model is more effective in a particular setting, particular if a considerable period of adaption has occurred, in effect training the model (given the decision making structure it is embedded in) using a considerable amount of feedback from its policy environment. If the model is sufficiently flexible (i.e. has many adjustable internal parameters) that it could indicate the correct action from the available inputs (derived from observations of the environment) then, with enough training, the model will eventually do so. However, this kind of model adaption means that it is probably finely tuned to the particular situation and will not be useful by others in similar situations. Nor is it likely to be much use in exploring what would happen in cases not yet observed; so if the situation changes in some fundamental way, the model may well give totally the wrong answers. Furthermore, it might not be apparent from an inspection of the adapted model, why it works. Representational models are usually hard to develop, taking considerable time and effort, often by a team of experts somewhat separate from those making policy decisions. Such models usually rely on some theory of the system being modelled, whose assumptions may be explicit. This kind of model, if it validates well, might have some validity outside its original test situation, and moreover, its assumptions and structure might give clues as to when and how it might reliably be used. If the situation changes in a way that is explicitly encoded into the model, one might be able to change its settings to suit the new situation. In practice, models are often used with a mixture of adaptive and representational models, with adaptive models encapsulating some representational, and somewhat theory and being representational models undergoing some process of model adaption over time. In this case it is wise to know which aspects of ones model are representational and which have been ‘tuned’ to the particular situation or set of data. Models are limited and using them carelessly can have counterproductive consequences. One of the main limitations is due to the complexity of their subject matter, which is what we discuss next. Complexity  and  its  Implications  for  Modelling   That society is complex may seem an obvious statement. Still, the ways in which it is complex has implications for the use of models for the planning and execution of policy. One problem is the lack of agreement as to what “being complex” means. There are dozens different definitions of complexity (Edmonds, 2000). Frequently the word is used as a kind of negative. When available techniques (or accepted techniques) fail we call what were trying to analyse, “complex”—in this case it is a “dustbin concept”, a category to use when others fail. Here, in order to obtain a common understanding of the term, we can use its etymology. Complexity comes from the Latin plexus, which means interwoven. Thus something complex is difficult to separate out into separate components or processes. This is because of relevant interactions (Gershenson and Heylighen, 2005; Gershenson, 2013a). Interactions are relevant when the future of an element of a system is partially determined by the interactions, in other words, if one eliminates these interactions then the future would be significantly different. Traditionally, models have been reductionist, in the sense that they study phenomena in isolation. By definition, interactions are excluded. Either an element is modelled in isolation, or a whole system is modelled, averaging the properties of its elements. In other words, traditionally phenomena are modelled at a single scale. This approach is suitable for simple systems, but it is not sufficient for complex ones, where the properties of the system are a consequence of the interactions of the elements. This requires models to be multi-scale (Bar-Yam, 2004), and interactions must be modelled to relate different scales. In terms of policy models, interactions need to be included in the model if the future projections are not to be distorted. Simple models that do not include interactions will be unreliable. Such interactions carry important implications for modelling complex systems. These all make the ideal of the assessment of the impact of policy interventions using a model difficult. Firstly, it implies that elements cannot be studied in isolation. Different social processes can interact to produce effects different from those caused by each process singly. The outcome from a population that is both disaffected and has access to an effective medium for dissemination of views (e.g. twitter) might well be very different to that of a disaffected population with only local gossip or a satisfied population with something like twitter. The impact of this is that separately analysing the impacts of different factors upon the outcome might well be misleading; one has to consider the outcomes from the whole system. This leads to the problem that one might well not know how much one needs to include in an model adequate for ones purposes, and that an approach that starts with the simplest possible model and then experimentally adds processes one at a time, might never get you to an adequate model (Edmonds & Moss, 2005). Secondly, it implies that interactions generate novel information, which is not present in initial or boundary conditions. This new information inherently limits the predictability of a complex system. In other words, the results are at least partially ‘caused’ by processes within the system, and not by external factors that can be controlled for. At best, this may mean that one has to make do with a broad distribution of outcomes as a forecast, or the prediction of ‘weaker’, second-order properties of the outcome (e.g. the volatility of the focus outcomes, or what will not happen). At worst, it may mean that there is no well-defined distribution of outcomes at all, with any measures upon the outcomes from a model being due to artefacts (e.g. model size). The result of such difficulties means that any policy model is inevitably a compromise between different desirable modelling goals. Figure 2 below illustrates some of these tensions in a simple way. Figure 2. Some of the tensions implicit in modelling complex systems. These illustrated desiderata all refer to the model that is being used. Simplicity is how simple the model is, the extent to which the model itself can be completely understood. Analytically solvable mathematical models, most statistical models and abstract simulation models are at the relatively simple end of the spectrum. Clearly a simple model has many advantages in terms of using the model, checking it for bugs and mistakes (Galan, et al. 2009) and communicating it. However, when modelling complex systems, such as those policy makers face, such simplicity may not be worth it if gaining it means a loss of other desirable properties. Generality is the extent of the model scope: how many different kinds of situation could the model be usefully applied. Clearly some level of generality is desirable; otherwise one could only apply the model in a single situation. Authors are often rather lax about making the scope of their models clear—often implying a greater level of generality that can be substantiated. Formality is what was called specificity of reference (SR) above. Models where the meaning of the model parts are well-defined have such formality, those which do not, and are more in the way of a model of ideas about some target system, rather than the system directly have less of this. Finally validity means the extent to which the model outcomes match what is observed to occur—it is what is established in the process of model validation. This might be as close a match as a point forecast, or as loose as projecting qualitative aspects of possible outcomes. What policy makers want, above all, is validity, with generality (so they do not have to keep going back to the modellers) and simplicity (so there is an accessible narrative to build support for any associated policy) coming after this. Formality is for them is not a virtue but more of a problem, they may be convinced it is necessary (so as to provide the backing of ‘science’), but it means that the model is inevitably somewhat opaque to them and not entirely under their control. Modellers, usually, have very different priorities. Formality is very important to them so that they can replicate their results and so that the model can be unambiguously passed to other researchers for examination, critique and further development (Edmonds 2000). Simplicity and generality are nice if you can get them, but one cannot assume that these are achievable (Edmonds 2012). Validity should be an overwhelming priority for modellers; otherwise they are not doing any sort of empirical science. However, they often put this off into the future, preferring the attractions of the apparent generality offered by analogical models (Edmonds 2001, Edmonds 2012). Relatively simple models that explore ideas rather than relate to any observed data that give the illusion of generality are, unfortunately, common. Another ramification of the complexity of what is being modelled is in the goal of modelling—what sort of purpose the model suitable for. One of the consequences of this is that prediction of policy matters is hard, rare, and only obtained as a result of the most specific and pragmatic kind of modelling developed over relatively long periods of time5. It is more likely that a model is appropriate for establishing and understanding candidate explanations of what is happening, which will inform policy making in a less exact manner than prediction, being part of the mix of factors that a policy maker will take into account when deciding action. It is common for policy people to want a prediction of the impact of possible interventions “however rough”, rather than settle for some level of understanding of what is happening, however this can be illusory. If one really wanted a prediction “however rough” one would settle for a random prediction6 dressed up as a complicated “black box” model. If we are wiser, we should accept the complexity of what we are dealing and reject models that give us ill-founded predictions. One feature of complex systems is that they can result in completely unexpected outcomes, where due to the relevant interactions in the system, a new kind of process has developed resulting in qualitatively different results. It is for this reason that complex models of these systems do not give probabilities (since these may be meaningless, or worse be downright misleading) but rather trace some (but not all) of the possible outcomes. This is useful as one can then be as prepared as possible for such outcomes, which otherwise would not have been thought of. The effective use of models for policy formulation will thus involve a clear focus as to its purpose and its manner of use combined with some compromise between the factors discussed above. However, the extent and impact of such compromises should be openly and honestly made, as a proper balance is necessary for reliable uses of the model. It is probable that a each making different related models, combination of 5 For an account of actual forecasting and its reality, see Silver (2012). 6 Or other null model, such as “what happened last time” or “no change”. compromises might be a productive way forward. However, this requires extra work and care. We now look at a number of different approaches, commenting upon the compromises and properties of each. Tools  and  Approaches   System  Dynamics   System dynamics is an approach to modelling that represents a system in terms of a set of interconnected feedback loops (Forrester, 1971). It models these in terms of a series of flows between stocks plus additional connections between variables and flows. Crucially, it allows the representation of delays in such feedback and that the outcomes of some variables can control/effect the rate of other flows. These flows and relationships can then be simulated on a computer and (more recently) visualized. Its advantages are that a complex set of feedback relationships can be explored and hence better understood. However, in practice, the variables it deals with are themselves abstract entities, often representing abstract and aggregate quantities. This approach is not well suited to the modelling of systems where internal heterogeneity is significant in terms of determining the outcomes. Network  Theory   Networks naturally describe complex systems, representing elements as nodes and their interactions explicitly as links. Only in the last decade, there has been an explosion in the scientific exploration of networks and their application to a broad range of domains. Network theory has its roots in graph theory as proposed by Euler in the eighteenth century. However, it is only recently that its use has become widespread, in part because of the large computing power and big data sets available. Networks are useful for representing the structure of systems, indicating how elements interact. However, they can also represent the function of systems, with nodes representing states and directed links representing transitions. Relating the structure and function of systems is one of the most common questions for understanding systems, i.e. how changes in the structure affect the function of a system? Network theory can be used to study both structure and function using the same formalism. Also, adaptive and temporal networks (Gross & Sayama, 2009; Holme & Saramäki, 2012) have been used to study the change in time of network structure. From the study of different natural and artificial networks, it has been found that most of them do not have a trivial topology, i.e. there is a relevant organization in their structure. Still, several modelling approaches assume homogeneous topologies, as in cellular automata (see below), or even a so called “well mixed” population, i.e. there is no structure considered (only the macro state). It has been shown that structure (micro scale) plays a crucial role in the dynamics of such systems. For example, the same system may change drastically its dynamics depending on whether the local structure is considered or not (Shnerb et al., 2000). Network models can be useful to study several aspects related to policy and decision making. For example, random agent networks (RANs) were proposed to model organizations such as bureaucracies (Gershenson, 2008), showing how few modifications to the structure of an organization can improve considerably its performance. In general, “computing networks” (Gershenson, 2010) can be used to study and relate adaptability at different scales. Since policy and decisions are usually made over changing and uncertain scenarios, adaptability is a desired property of models. However, the more networks change and the complexity of the interactions represented over the links get, the less classic network theory is applicable, and the closer to an individual-based model one has. Information  theory   Claude Shannon (1948) proposed information theory in the context of telecommunications. He was interested on how a message could be transmitted reliably over unreliable media. He proposed a measure of information (equivalent to the Boltzmann- Gibbs entropy in thermodynamics) where information is minimal for regular strings, as new symbols do not carry new information. Shannon information is maximal for random strings, as new symbols carry all the new information, i.e. they are not predictable. Several other measures have been derived from Shannon's information, such as mutual information, predictive information, excess entropy, and information transfer, among others (Prokopenko et al., 2009). Information theory has been used repeatedly to measure complexity. However, there are two different views. One view implies a similarity of information to complexity, where maximum randomness (Shannon information) would have maximum complexity. A more popular view poses that complexity is maximal when a balance between regularity (order) and randomness (chaos) is reached (Langton, 1990; Kauffman, 1993). self- emergence, complexity, Recently, measures of organization, homeostasis, and autopoiesis were proposed based on information theory (Fernández et al., 2014). These measures are fast to compute and simple enough to be used by people without a strong mathematical background, but can give insights into the dynamics of systems. It has been argued (Edmonds 1999) that there is not one such measure that can always be used, but rather one has to choose a measure that gives meaningful results for the kind of system that one is considering. Thus this approach assumes that one has understood the target system sufficiently to select the appropriate measure. For decision making, it is vital to identify which type of dynamics are followed by systems and their components, as different decisions should be made depending on regular, complex, or chaotic dynamics. Used correctly, these measures can provide precisely this information and thus aid in knowing how to respond to change in the systems. Cellular  automata   Cellular automata (CA) can be seen as a particular type of network. Each cell (node) has a state that depends on the states of its neighbours (links) and its own previous state. Different CA models can have different number of states and consider different number of neighbours. Cells can also be arranged in one dimension (array), two dimensions (lattice), three, or more dimensions. Perhaps the most popular CA is Conway’s “Game of Life” (Berkelamp, et al., 1982). Each cell can have one of two states: ‘0’ (dead) or ‘1’ (alive). Rules consider how many of the eight closest neighbours are alive. For a live cell to continue living, it must have two or three living neighbours (in any configuration). More than three or less than two neighbours implies that the cell will die in the next time step. New cells are born on empty cells when they have exactly three neighbours. With these simple rules, several complex structures emerge: stable structures of different shapes, oscillators of different periods, moving structures (gliders, spaceships), eaters, glider guns, etc. The structures emerging with the simple rules of the Game of Life can be used even to build a Universal Turing Machine7. An example of the dynamics of the Game of Life is shown in Figure 3. 7 To explore the Game of Life and other interesting CA, the reader is advised to download Golly at http://golly.sourceforge.net a b d c Figure 3. Evolution of the Game of Life from a random initial condition (a), where white cells are “alive” and black cells are “dead”. After 410 steps (b), certain stable structures have been formed, but there are still some active zones. After 861 steps (c), some structures have been destroyed and some new ones have been created. Activity continues in the lower part of the lattice. After 1416 steps (d), the dynamics is periodic, with stable and oscillatory structures. Images created with NetLogo (Wilensky, 1999). Figure initially published in Gershenson (2013b). Cellular automata have been used in several urban and land- use models (e.g. Portugali, 2000; Batty, 2005). However, “pure” CA models tend to be too formal and abstract, so they have been found to be more useful in hybrid models, in many cases combining CA with agent-based modelling. Individidual-­‐  and  Agent-­‐based  modelling   Individual-based modelling is given when social actors or entities are represented by separate ‘objects’ within a computational simulation. Each object can have different properties, so this technique can represent heterogeneous collections of individuals. The interactions between the actors are represented by messages between the objects of the simulation. Thus, the mapping between what is observed and the model can be very much more straightforward with such simulations: each object modelling its corresponding actor. When the objects in the simulation have internal processes representing their learning or decision making processes so that these processes could be usefully interpreted as cognition, we call the computational objects “agents” since they can act somewhat independently—they have a simple form of agency. When the agents are of this form, one has the technique of Agent-Based Modelling (ABM). This technique is very flexible and puts few constraints upon the modeller, so the simulations that result are difficult to characterize in general but are of various kinds. An accessible introduction to the approach is (Gilbert & Troitzsch, 2005) and a more comprehensive guide (Edmonds & Meyer, 2013). In particular, simulations differ greatly as to their level of detail, ranging from highly abstract and relatively simple simulations to very specific and complicated ones. The key difference here is whether the driver for model development is simplicity or relevance (Edmonds & Moss, 2005). Agent-based modelling has now been applied to a large number of policy- relevant subjects, including (to take an arbitrary sample of recent applications): energy infrastructure siting (Abdollahian, et al., 2013), password behaviours within an organization (Renaud, et al., 2013), mobile banking adoption (Wei, et al., 2013), China’s housing market (Zhang, et al., 2013) and return migration (Biondo, et al. 2013). The problem with ABM lies not in its expressiveness but in the complexity of its models (which means that it may be hard to understand the models themselves) and establishing the relationship between the models and what they represent (Moss & Edmonds 2005). Examples   Club  of  Rome’s  “Limits  to  Growth”   In the early 1970's, on behalf of an international group under the name “The Club of Rome” a simulation study was published (Meadows et al. 1972) with the attempt to convince humankind that there were some serious issues facing it, in terms of a coming population, resource, and pollution catastrophe. To do this they developed a system dynamics model of the world. Thus, this is a fairly simple kind of model that does not explicitly represent the parts of a system or its interactions, but rather the feedback cycles between key global factors. It was important to the authors to go beyond simple statistical projections of the available data, since that missed out the crucial delays in the usually self-correcting feedback processes. The results of the simulations were a set of computed curves showing such as pollution, population, etc. The results indicated that there was a coming critical point in time and that a lot of suffering would result, even if humankind managed to survive it. The book had a considerable impact, firmly establishing the idea that it was possible that humankind could not continue to grow indefinitely. The book presented the results of the simulations as predictions—a series of what-if scenarios. Whilst they did add caveats and explore various possible versions of their model, the overall intent of the book was unmistakable: that if we did not change our lifestyles, disaster would result. The authors clearly hoped that by using a simulation they would be able to make the potential feedback loops real to people. Thus this was a use of simulation to illustrate an understanding that the authors had. It was thus a model of ideas rather than directly of any such data. It did not, and could not, make predictions about what will happen in the future, but rather illustrate some possibilities. However, the model was not presented as such, but as something more scientific in some sense. It was the presentation as ‘scientific’ that made this book such a challenge but also what laid it open to criticism (e.g. Cole, et al., 1973). An examination of the model showed that some of its parameters were very sensitive and thus had to be ‘tuned’ to get the published results (Vermeulen & de Jongh, 1976). In other words, whilst the models had an illustrative and exploratory purpose, they were presented and criticised as if it was a predictive model. The book made a considerable impact upon the general consciousness of the problem, and did act to get people questioning previously held assumptions (that we could keep on growing economically and physically). However, it was also largely discredited in the eyes of other modellers due to its perceived lack of ‘rigor’. This was somewhat unfair as the alternatives were no better in terms of validity or generality. However, a lack of humility in terms of its results and the relative simplicity of their model did lay it open to such attacks. The predictions of the book have not yet come to pass, but it is not clear that a similar future critical point and attendant suffering has been avoided. Schelling’s  Model  of  Racial  Segregation   In addition to a host of simpler, analytically expressed models (similar in kind to the Club of Rome’s systems dynamics models), Schelling developed what we might recognize as a simple agent- based model (Schelling, 1971; 1978). It did represent individuals and their neighbourhoods explicitly, albeit abstractly in a 2D grid with black and white ‘counters’ representing the people. The simulation was very simple—counters were distributed randomly to start with then each counter that had less than a given percentage (c) of like neighbours moved to a new empty spot. The simulation showed that segregation emerged even with relatively low levels of racial bias (values of c down to 30%). This did not relate to any particular data but was rather a counter-example to the idea that the observed segregation must be due to strong racial prejudice. In other words this was intended to be an exploration of ideas to inform policy rather than a direct representation of what was happening. It produced an understanding of possible segregation processes, and so influenced local policies in Chicago, away from focusing on prejudice as a cause of the extreme segregation they had. Employment  in  an  Arctic  Community   Berman et al. (2004) consider eight employment scenarios defined by different policies for tourism and government spending, as well as different climate futures, for an ABM case study of sustainability in the Arctic community of Old Crow, in Canada. Scenarios were developed with the input of local residents: tourism being a policy option largely influenced by the autonomous community of Old Crow (stemming from their land rights), and attracting great local interest. Here the policy options were addressed as a certain type of scenario, embedding the behaviour of actors within a few possible future contexts. The simulation here ensured the consistency of the scenarios, and helped to integrate the various inputs into a coherent whole. The merit of this model is that it can improve the reckoning of human and social factors and information into the issues at stake; allowing the exploration of some real possible outcomes. The drawback is the multiplication of uncertainties, not least of which is that we do not convincingly know how social actors might adapt to new circumstances (even if the policy options are relatively concrete). A  detailed  model  of  HIV  spread  and  social  structure   Alam et al. (2007) investigate the outcomes indicated by a complex, and detailed model of a particular village in the Limpopo valley of South Africa. This model in particular looks at many aspects of the situation, including: social network, family structure, sexual network, HIV spread, death, birth, savings clubs, government grants and local employment prospects. It concludes with hypotheses about this particular case, showing that complex destructive synergies between the spread of HIV and the breakdown of social structure were possible, and could be exacerbated by the influx of workers from outside due to the granting of mining concessions. This does not mean that these outcomes will actually occur, but this does provide a focus for future field research and may provide thought for policy makers. Unfortunately in this case, the conclusions of this study were not what the local authority wanted to hear, and so the findings were ignored. This was a model with a high degree of validation, but a very specific and complex model taking 3 years to develop. Evaluating  Pandemic  Preventive  Measures   Bajardi et al. (2011) combined in a model networks and agents to model the epidemic spread of the H1N1 influenza in 2009. Nodes represent regions, which are linked by the commercial flights between their major airports. At each node, agents can be susceptible, exposed, infected, or recovered (Anderson & May, 1992). Adjusting different parameters, the global spread of the disease could be reproduced. Travel restrictions were imposed as a preventive measure; reducing air travels by 40%. Simulations showed that travel restrictions are ineffective to prevent the spread of the disease. Comparing with scenarios with no travel restrictions or with even more stringent travel restrictions, the authors found that the disease reached a peak almost on the same day. This is a theory-based model intended for predictive purposes. Its validity depends upon the approximations and assumptions in the model, including the characteristics of the social network used in the model. Prospects  and  Dangers  for  Complex  Policy  Modelling   All models have limits—not only limits in the accuracy of their predictions but in the expression of the situations under which such projections are based. The nature of complex situations means that attempts to use models to aid policy formulation are susceptible to some particular dangers and pitfalls, including: • Confusing a model that has exploratory or explanatory purposes for one that is predictive. • Preferring a ‘black box’ model that seems to give definite predictions despite neither understanding it nor knowing that it is reliable for this purpose. • Trying to use a model that has been adapted within a highly specific situation out of its original context. • Attempting very general or simple models of policy issues probably means sacrificing direct validity for an indirect, analogical relationship only. Complex models of the kind described here (and elsewhere in this book) have the potential to express a broader range of kinds of situations than previous approaches. They are thus not so limited by the kind of ‘brave’ assumptions that bedevil models where analytic results are deemed necessary. They are also ideal for the exploration and “laying bare” complex dynamics. For this reason, they are prospective as an important tool in the exploration and consideration of policy options. In particular, more descriptive models can be directly related to what they are modelling, allowing a greater range of data and input to be utilized in their specification and validation (both high SM and SR in terms of the above discussion). Given the fact that models of complex systems will offer a limited predictability, it is advisable to complement this lack of predictability with adaptability (Gershenson, 2007). This will enable decision makers to take the best choice for the specific circumstances that are faced, as adaptability implies a distinction of current circumstances that purely predictive models do not consider. Acknowledgements   Bruce Edmonds acknowledges the support of the EPSRC under grant number EP/H02171X/1. Carlos Gershenson was partially supported by SNI membership 47907 of CONACyT, Mexico. References   Abdollahian, M., Yang, Z. & Nelson, H. (2013) 'Techno-Social Energy Infrastructure Siting: Sustainable Energy Modeling Programming (SEMPro)' Journal of Artificial Societies and Social Simulation 16(3):6 <http://jasss.soc.surrey.ac.uk/16/3/6.html>. Alam, S.J., Meyer, R., Ziervogel, G. & Moss, S. (2007) The Impact of HIV/AIDS in the Context of Socioeconomic Stressors: an Evidence- Driven Approach. Journal of Artificial Societies and Social Simulation, 10(4):7 <http://jasss.soc.surrey.ac.uk/10/4/7.html>. Anderson RM, May RM (1992) Infectious Diseases of Humans: Dynamics and Control. Oxford: Oxford University Press. Bajardi P, Poletto C, Ramasco JJ, Tizzoni M, Colizza V & Vespignani A (2011). Human Mobility Networks, Travel Restrictions, and the Global Spread of 2009 H1N1 Pandemic. PLoS ONE 6(1): e16591. Bar-Yam, Y. (2004). Multiscale variety in complex systems. Complexity, 9(4):37–45. Batty, M. (2005). Cities and complexity. MIT Press, Cambridge, MA, USA. Berlekamp, E. R., Conway, J. H., and Guy, R. K. (1982). Winning Ways for Your Mathematical Plays, volume 2: Games in Particular. Academic Press, London. Berman, M., Nicolson, C., Kofinas, G., Tetlichi, J. & Martin, S. (2004) Adaptation and sustainability in a small arctic community: Results of an agent-based simulation model. Arctic, 57(4), 401-414. Cole, H.S.D., Freeman, C., Jahoda, M. & Pavitt, K.L. (Eds.) (1973) Models of Doom: A Critique of the Limits to Growth. New York: Universe Books. Edmonds, B. (1999). Syntactic Measures of Complexity. PhD Thesis, Centre for Policy Modelling, MMU. http://bruce.edmonds.name/thesis/ Edmonds, B. (2000). Complexity and scientific modelling. Foundations of Science, 5:379– 390. Edmonds, B. (2001) The Use of Models - making MABS actually work. In S. Moss & P. Davidsson (Eds.), Multi Agent Based Simulation (Lecture Notes in Artificial Intelligence, 1979). Berlin, Springer: 15-32. Edmonds, B. (2012) Complexity and Context-dependency. Foundations of Science. DOI 10.1007/s10699-012-9303-x Edmonds, B. & Meyer, R. (eds.) (2013) Simulating Social Complexity - A Handbook. Springer. Edmonds, B. & Moss, S. (2005) From KISS to KIDS – an ‘anti-simplistic’ modelling approach. In P. Davidsson et al. (Eds.), Multi Agent Based Simulation 2004 (Lecture Notes in Artificial Intelligence, 3415). Berlin: Springer: 130–144. Edmonds, B., Lucas, P., Rouchier, J. & Taylor, R. (2013) Human Societies: Understanding Observed Social Phenomena. In Edmonds, B. & Meyer, R. (eds.) Simulating Social Complexity - A Handbook. Springer, 709-749. Epstein, J. M. (2008) Why Model? Journal of Artificial Societies and Social Simulation 11(4):12. <http://jasss.soc.surrey.ac.uk/11/4/12.html> Fernández, N., Maldonado, C., & Gershenson, C. (2014). Information measures of complexity, emergence, self-organization, homeostasis, and autopoiesis. In Prokopenko, M., (ed.) Guided Self-Organization: Inception. Springer. In Press. Forrester, J. (1971). Counterintuitive behavior of social systems. Technology Review 73(3):52–68. Galán, J.M et al. (2009). Errors and Artefacts in Agent-Based Modelling. Journal of Artificial Societies and Social Simulation, 12(1), <http://jasss.soc.surrey.ac.uk/12/1/1.html>. Gershenson, C. (2007). Design and Control of Self-organizing Systems. CopIt Arxives, Mexico. http://tinyurl.com/DCSOS2007. Gershenson, C. (2008). Towards self-organizing bureaucracies. International Journal of Public Information Systems, 2008(1):1–24. Gershenson, C. (2010). Computing networks: A general framework to contrast neural and swarm cognitions. Paladyn, Journal of Behavioral Robotics, 1(2):147–153. Gershenson, C. (2013a). The implications of interactions for science and philosophy. Foundations of Science, Early View. Gershenson, C. (2013b). Facing complexity: Prediction vs. adaptation. In Massip, A. and Bastardas, A., editors, Complexity Perspectives on Language, Communication and Society, pages 3–14. Springer, Berlin Heidelberg. Gershenson, C. & Heylighen, F. (2005). How can we think the complex? In Richardson, K., (ed.) Managing Organizational Complexity: Philosophy, Theory and Application, chapter 3, pages 47–61. Information Age Publishing. Gilbert, N. & Troitzsch, K. (2005) Simulation for the Social Scientist (2nd ed.). Open University Press. Gross, T. and Sayama, H., (eds.) (2009). Adaptive networks: Theory, Models and Applications. Understanding Complex Systems. Springer, Berlin Heidelberg. Holme, P. & Saramäki, J. (2012). Temporal networks. Physics Reports, 519(3):97 – 125. Kauffman, S. A. (1993). The Origins of Order. Oxford University Press. Langton, C. (1990). Computation at the edge of chaos: Phase transitions and emergent computation. Physica D, 42:12–37. Meadows, D.H, Meadows, D., Randers, J. & Behrens, W.W.III (1972) The Limits to Growth: A Report for the Club of Rome’s Project on the Predicament of Mankind. New York: Universe Books. Moss, S. and Edmonds, B. (2005) Sociology and Simulation: - Statistical and Qualitative Cross-Validation, American Journal of Sociology, 110(4) 1095- 1131. Prokopenko, M., Boschetti, F., & Ryan, A. J. (2009). An information- theoretic primer on complexity, self-organisation and emergence. Complexity, 15(1):11–28. Portugali, J. (2000). Self-organization and the City. Springer Verlag. Renaud, K. & Mackenzie, L. (2013) 'SimPass: Quantifying the Impact of Password Behaviours and Policy Directives on an Organisation's Systems' Journal of Artificial Societies and Social Simulation 16 (3) 3 <http://jasss.soc.surrey.ac.uk/16/3/3.html>. Schelling, T. C. (1971) Dynamic Models of Segregation, Journal of Mathematical Sociology, 1(2):143-186. Schelling, T. C. (1978). Micromotives and Macrobehavior, Norton. Shannon, C. E. (1948). A mathematical theory of communication. Bell System Technical Journal, 27:379–423 and 623–656. Shnerb, N. M., Louzoun, Y., Bettelheim, E., & Solomon, S. (2000). The importance of being discrete: Life always wins on the surface. Proceedings of the National Academy of Sciences, 97(19):10322–10324. Vermeulen, P.J. & de Jongh, D.C.J (1976) Parameter sensitivity of the ‘Limits to Growth’ world model. Applied Mathematical Modelling, 1(1):29-32. Wei, X., Hu, B. & Carley, K. M. (2013) 'Combination of Empirical Study with Qualitative Simulation for Optimization Problem in Mobile Banking Adoption' Journal of Artificial Societies and Social Simulation 16(3):10 <http://jasss.soc.surrey.ac.uk/16/3/10.html>. Zhang, H., Wang, Y., Lin, Y., Zhang, Y. & Seiler, M. J. (2013) 'Simulation Analysis of the Blocking Effect of Transaction Costs in China's Housing Market' Journal of Artificial Societies and Social Simulation 16(3):8 <http://jasss.soc.surrey.ac.uk/16/3/8.html>. Biondo, A. Emanuele, P., Alessandro & Rapisarda, A. (2013) 'Return Migration After Brain Drain: A Simulation Approach' Journal of Artificial Societies and Social Simulation 16(2):11 <http://jasss.soc.surrey.ac.uk/16/2/11.html>. Silver, N. (2013) The Signal and the Noise – Why Most Predictions Fail – but Some Don't. Penguin.
1711.03948
1
1711
2017-11-10T18:21:05
Manipulative Elicitation -- A New Attack on Elections with Incomplete Preferences
[ "cs.MA", "cs.DS", "cs.GT" ]
Lu and Boutilier proposed a novel approach based on "minimax regret" to use classical score based voting rules in the setting where preferences can be any partial (instead of complete) orders over the set of alternatives. We show here that such an approach is vulnerable to a new kind of manipulation which was not present in the classical (where preferences are complete orders) world of voting. We call this attack "manipulative elicitation." More specifically, it may be possible to (partially) elicit the preferences of the agents in a way that makes some distinguished alternative win the election who may not be a winner if we elicit every preference completely. More alarmingly, we show that the related computational task is polynomial time solvable for a large class of voting rules which includes all scoring rules, maximin, Copeland$^\alpha$ for every $\alpha\in[0,1]$, simplified Bucklin voting rules, etc. We then show that introducing a parameter per pair of alternatives which specifies the minimum number of partial preferences where this pair of alternatives must be comparable makes the related computational task of manipulative elicitation \NPC for all common voting rules including a class of scoring rules which includes the plurality, $k$-approval, $k$-veto, veto, and Borda voting rules, maximin, Copeland$^\alpha$ for every $\alpha\in[0,1]$, and simplified Bucklin voting rules. Hence, in this work, we discover a fundamental vulnerability in using minimax regret based approach in partial preferential setting and propose a novel way to tackle it.
cs.MA
cs
Manipulative Elicitation – A New Attack on Elections with Incomplete Preferences Palash Dey [email protected] Tata Institute of Fundamental Research, Mumbai Monday 13th November, 2017 Abstract Lu and Boutilier [LB11] proposed a novel approach based on "minimax regret" to use classical score based voting rules in the setting where preferences can be any partial (in- stead of complete) orders over the set of alternatives. We show here that such an approach is vulnerable to a new kind of manipulation which was not present in the classical (where preferences are complete orders) world of voting. We call this attack "manipulative elicita- tion." More specifically, it may be possible to (partially) elicit the preferences of the agents in a way that makes some distinguished alternative win the election who may not be a winner if we elicit every preference completely. More alarmingly, we show that the related com- putational task is polynomial time solvable for a large class of voting rules which includes all scoring rules, maximin, Copelandα for every α ∈ [0, 1], simplified Bucklin voting rules, etc. We then show that introducing a parameter per pair of alternatives which specifies the minimum number of partial preferences where this pair of alternatives must be comparable makes the related computational task of manipulative elicitation NP-complete for all com- mon voting rules including a class of scoring rules which includes the plurality, k-approval, k-veto, veto, and Borda voting rules, maximin, Copelandα for every α ∈ [0, 1], and simplified Bucklin voting rules. Hence, in this work, we discover a fundamental vulnerability in using minimax regret based approach in partial preferential setting and propose a novel way to tackle it. 1 Introduction Aggregating preferences of a set of agents over a set of alternatives is a fundamental problem in voting theory which has been used in many applications in AI for making various decisions. Prominent examples of such applications include collaborative filtering [PHG00], similarity search [FKS03], winner determination in sports competitions [BBN14], etc. [MBC+16]. In a typical scenario of voting, we have a set of alternatives, a tuple of "preferences", called a pro- file, over the set of alternatives, and a voting rule which chooses a set of alternatives as winners based on the profile. Classically, preferences are often modeled as complete orders over the set of alternatives. However, in typical applications of voting in AI, collaborative filtering for example, the number of alternatives is huge and we have only partial orders over the set of alternatives as preferences. There have been many attempts to extend the use of voting theory in settings with incom- plete preferences. The approach of Konczak and Lang [KL05] was to study the possible and necessary winner problems. In these problems, the input is a profile of partial preferences and we want to compute the set of alternatives who wins (under some fixed voting rule) in at 1 least one completion of the profile for the possible winner problem; for the necessary winner problem, we want to compute the set of alternatives who wins in every completion of the pro- file. There have been substantial research effort in the last decade to better understand these two problems [LPR+07, PRVW07, Wal07, XC11, BHN09, CLMM10, BBN10, BRR11, LPR+12, FRRS14, DMN16b, DMN16a, DMN17, DMN15, DM17]. One of the main criticisms of this ap- proach is that the definition of a necessary winner is so strong that none of the alternatives may satisfy it whereas the definition of a possible winner is so relaxed that a large number of alternatives may satisfy it. Moreover, the computational problem of finding the set of possible winners is NP-hard for most of the common voting rules (finding the set of necessary winners is also co-NP-hard for some voting rules, ranked pairs for example) [XC11]. Lu and Boutilier [LB11] took a completely different approach to handle incomplete pref- erences and proposed a worst case regret based approach for score based voting rules. These voting rules assign some score to every alternative based on the profile and select the alter- natives with the maximum (or minimum) score as winners. Many popular voting rules, for example, scoring rules, maximin, Copeland, etc. are score based voting rules. For score based voting rules, intuitively speaking, the worst case regret, called maximum regret in [LB11], of declaring an alternative w as a winner is the maximum possible difference between the score of w and the score of a winning alternative in any completion of the input partial profile; the win- ners of a partial profile are the set of alternatives with the minimum maximum (called minimax) regret. A completion of a partial profile is another profile where every preference is complete and it respects the orderings of the corresponding preference in the partial profile. The minimax regret based approach is not only theoretically robust as argued in [LB11] but also practically appealing since computing winners is polynomial time solvable for all commonly used voting rules. 1.1 Motivation Although the minimax regret based approach enjoys many exciting features, it introduces a new (which was not present in the classical setting with complete preferences) kind of attack on the election which we call "manipulative elicitation." That is, it may be possible to partially elicit the preferences in such a way that makes some favorable alternative win the election. For example, let us consider a plurality election E where an alternative, say w, is the top alternative of one preference and another alternative, say x, is the top alternative of every other preference. In a plurality election, the winners are the set of alternatives who appear as the top alternative in the largest number of preferences. Hence, x is the unique winner in E. Let us now consider a partial profile where, in every partial preference, only w and every other alternative who is preferred less than w in the corresponding preference in E are comparable. Let us call the resulting partial profile E′. If n is the number of preferences, then the minimax regret plurality score of w in E′ is (n − 1) whereas the minimax regret plurality score of every other alternative is n which makes w the unique winner of E′. We call this phenomenon manipulative elicitation. The problem of manipulative elicitation is even more alarming in AI since, in many applications (collaborative filtering for example), the parts of the preferences that will be elicited can often be influenced and controlled in such settings. 1.2 Our Contribution Our main contribution in this paper is the discovery of the manipulative elicitation attack in regret based partial preferential setting. We also show that the corresponding computational problem for manipulative elicitation is polynomial time solvable for every monotone voting rule 2 which includes all commonly used score based voting rules [Theorem 3.1 and Corollary 3.1]. Intuitively speaking, we call a score based voting rule monotone if improving the position of some alternative in any (complete) preference can only improve its score; we defer its formal definition till Section 2. To counter the negative result of Theorem 3.1, we introduce a param- eter per pair of alternatives which specifies the minimum number of partial preferences where these two alternatives should be comparable. We establish success of our approach by showing that the new constraints make the corresponding computational task of manipulative elicitation NP-complete for a large class of scoring rules [Theorem 4.1] which includes the plurality [The- orem 4.2], veto [Theorem 4.3], k-approval for any k, and Borda voting rules [Corollary 4.1], maximin [Theorem 4.4], Copelandα for every α ∈ [0, 1] [Theorem 4.5], and simplified Buck- lin [Theorem 4.6] voting rules. We remark that there could be various ways to enforce lower bounds on the number of partial preferences where a particular pair of alternatives is com- parable. For example, this can be a feature in the applications which would allow users to generate these bounds from some distribution which would in turn overrule the possibility of such manipulation (due to our hardness results). 2 Preliminaries and Problem Formulation For a positive integer k, we denote the set {1, 2, . . . , k} by [k]. Let A = {ai : i ∈ [m]} be a set of m alternatives. We denote the set of all subsets of A of cardinality 2 by (cid:0)A 2 (cid:1). A complete order over the set A of alternatives is called a (complete) preference. We say that an alternative a ∈ A is placed at the ℓth position (from left or from top) in a preference ≻ if {b ∈ A : b ≻ a} = ℓ−1. We denote the set of all possible preferences over A by L(A). A tuple ≻= (≻i)i∈[n] ∈ L(A)n of n preferences is called a profile. An election E is a tuple (≻, A) where ≻ is a profile over a set A of alternatives. If not mentioned otherwise, we denote the number of alternatives and the number of preferences by m and n respectively. A map rc : ⊎n,A∈N+L(A)n −→ 2A \{∅} is called a voting rule. Given an election E, we can construct from E a directed weighted graph GE which is called the weighted majority graph of E. The set of vertices in GE is the set of alternatives in E. For any two alternatives x and y, the weight of the edge (x, y) is DE(x, y) = NE(x, y) − NE(y, x), where NE(a, b) is the number of preferences where the alternative a is preferred over the alternative b for a, b ∈ A, a 6= b. Examples of some common voting rules are as follows. ⊲Positional scoring rules: An m-dimensional vector α = (α1, α2, . . . , αm) ∈ Nm with α1 > α2 > . . . > αm and α1 > αm for every m ∈ N naturally defines a voting rule - an alternative gets score αi from a preference if it is placed at the ith position, and the score of an alternative is the sum of the scores it receives from all the preferences. The winners are the alternatives with the maximum score. Scoring rules remain unchanged if we multiply every αi by any constant λ > 0 and/or add any constant µ. Hence, we can assume without loss of generality that for any score vector α, we have gcd((αi)i∈[m]) = 1 and there exists a j < m such that αℓ = 0 for all ℓ > j. We call such an α a normalized score vector. If αi is 1 for i ∈ [k] and 0 otherwise, then, we get the k-approval voting rule. The k-approval voting rule is also called the (m − k)-veto voting rule. The 1-approval voting rule is called the plurality voting rule and the 1-veto voting rule is called the veto voting rule. If αi = m − i for every i ∈ [m], then we get the Borda voting rule. ⊲Maximin: The maximin score of an alternative x is miny6=x NE(x, y). The winners are the alternatives with the maximum maximin score. ⊲Copelandα: Given α ∈ [0, 1], the Copelandα score of an alternative x is {y 6= x : DE(x, y) > 0} + α{y 6= x : DE(x, y) = 0}. The winners are the alternatives with the maximum Copelandα score. ⊲Simplified Bucklin: An alternative x's simplified Bucklin score is the minimum number ℓ such 3 that x is placed within the top ℓ positions in more than half of the preferences. The winners are the alternatives with the lowest simplified Bucklin score. We call a voting rule "score based" if the voting rule assigns some score to every alternative based on the profile and chooses either the set of alternatives with the maximum score or the set of alternatives with the minimum score as winners. All the above mentioned voting rules are score based - positional scoring rules, maximin, and Copelandα for every α ∈ [0, 1] select the set of alternatives with the maximum score as winners and the simplified Bucklin voting rule selects the set of alternatives with the minimum score as winners. We now define few properties of a score based voting rule which will be relevant to us. We say that a score based voting rule s is monotone if, for every positive integer n, every two profiles (≻i)i∈[n] and (≻′ i)i∈[n] over any finite set A of alternatives, and every alternative x ∈ A such that {y ∈ A : x ≻i y} ⊆ {y ∈ A : x ≻′ i)i∈[n]). We call a voting rule r neutral if, for every positive integer n, every profile (≻i)i∈[n] over any finite set A = {xi : i ∈ [m]} of m alternatives, and every permutation σ of [m], we have σ(r((≻i)i∈[n])) = r((σ(≻i))i∈[n]) where σ(r((≻i)i∈[n])) is the image of r((≻i)i∈[n]) under σ and σ(≻i) = xσ(1) ≻ xσ(2) ≻ · · · ≻ xσ(m) if ≻i= x1 ≻ x2 ≻ · · · ≻ xm. We call a voting rule worst efficient if the worst possible score with n preferences over m alternatives can be computed in a polynomial (in m and n) amount of time. We observe that all the voting rules mentioned above are neutral, worst efficient, and monotone if, for the case of simplified Bucklin voting rule, we replace the simplified Bucklin score with negative of that and choose the alternative with the maximum score. i y} for every i ∈ [n], we have s(x, (≻i)i∈[n]) 6 s(x, (≻′ 2.1 Incomplete Election and Minimax Regret Extension of Score Based Voting Rules Although preferences are classically modeled as complete orders, in many scenarios, preferences can be any partial order over A. We often denote a partial order R by the set {(a, b) : a, b ∈ A, aRb}. Given a profile P of partial preferences (which we call a partial profile), we denote the set of all completions of P to complete orders by C(P). Lu and Boutilier [LB11] proposed a novel approach to extend the use of score based voting rules for settings with partial profiles based on a notion of regret. Let s be a score based voting rule so that the winner is an alternative with the maximum score. Positional scoring rules, maximin, Copelandα for every α ∈ [0, 1], etc. are prominent examples of such score based voting rules. Let us denote the score that a score based voting rule s assigns to an alternative a ∈ A in a profile ≻∈ L(A)n by s(a, ≻). We denote the minimax regret voting rule based on a voting rule s by s. For a profile ≻, let s(≻) = argmaxa∈A{s(a, ≻)}. Given a partial profile P and a score based rule s, s(P) is defined as follows. s − Regret(a, ≻) = s(s(≻), ≻) − s(a, ≻) s − MR(a, P) = max ≻∈C(P) s − Regret(a, ≻) s(P) = argmin s − MR(a, P) a∈A We remark that Lu and Boutilier [LB11] defined s − Regret(a, ≻) without the absolute operator on the right; we choose to do so to take care of the simplified Bucklin voting rule. For a partial profile P and a minimax regret (MR for short) voting rule s, we say that an alternative a ∈ A co-wins if a ∈ s(P) and wins uniquely if s(P) = {a}. For an alternative a ∈ A, if s − MR(a, P) = s − Regret(a, ≻) for some ≻∈ C(P), then we call an alternative in s(≻) a competing alternative of a in P. 4 We now formally define manipulative elicitation and the basic computational problem of manipulative elicitation for a score based voting rule s. Definition 2.1 (s-manipulative elicitation). For a profile ≻ over a set A of alternatives, we say that a partial profile P is called a manipulative elicitation if ≻∈ C(P) and s(P) = {c}. Definition 2.2 (s-MANIPULATIVE ELICITATION). Given a set A of alternatives, a profile ≻∈ L(A)n of n preferences, and an alternative c ∈ A, compute if there exists a partial profile P such that ≻∈ C(P) and s(P) = {c}? We will see in Theorem 3.1 that the s-MANIPULATIVE ELICITATION problem is polynomial time solvable for every neutral, monotone, and worst efficient score based voting rule. This shows that all the commonly used voting rule considered here are vulnerable under manipula- tive elicitation. In the hope to counter this drawback, we extend the basic problem in Defini- tion 2.2 to MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT in Definition 2.3. We will indeed see in Section 4 that the MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT prob- lem is NP-complete for all the voting rules that we consider in this paper. For a partial profile ≻= (≻i)i∈[n] and {a, b} ∈ (cid:0)A 2 (cid:1), we denote the number of partial preferences in ≻ where a and b are comparable by p{a,b}(≻). Definition 2.3 (s-MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT). Given a set A of alternatives, a profile ≻∈ L(A)n of n voters, a function f : (cid:0)A 2 (cid:1) −→ N such that 0 6 f({a, b}) 6 n for every {a, b} ∈ (cid:0)A 2 (cid:1), and an alternative x ∈ A, compute if there exists a partial profile P such that ≻∈ C(P), f({a, b}) 6 p{a,b}(≻) for every {a, b} ∈ (cid:0)A 2 (cid:1) and s(P) = {x}? We remark that both the computational problems in Definition 2.2 and 2.3 have been de- fined for the unique winner case; we could as well define these problems for the co-winner case also. It turns out that all our proofs (except Theorem 3.1) can be easily modified for the co-winner counterpart and our choice for defining these problems in the unique winner setting is only a matter of exposition. 3 Polynomial Time Algorithm for MANIPULATIVE ELICITATION Our first result is Theorem 3.1 which shows that the MANIPULATIVE ELICITATION problem is polynomial time solvable for a large class of voting rules. Theorem 3.1. The MANIPULATIVE ELICITATION problem is polynomial time solvable for every monotone, neutral, and worst efficient score based voting rule s. Proof. Let (A, ≻= (≻i)i∈[n], c) be an arbitrary instance of s-MANIPULATIVE ELICITATION. We first observe that every instance of s-MANIPULATIVE ELICITATION for the co-winner case is a YES instance since, due to neutrality of s, c ∈ A = s((∅)n) and ≻∈ L(A)n = C((∅)n). So, let us consider the unique winner case. Our algorithm is as follows. If c receives the worst possible score in ≻, then we output NO; otherwise we output YES. Our algorithm runs in polynomial time since s is worst efficient. To prove the correctness of our algorithm, we begin with Claim 3.1 below. Claim 3.1. If the score of c in ≻ is the worst possible score (say βn) that any alternative in A can possibly receive in any profile with n preferences under the voting rule s, then the s-MANIPULATIVE ELICITATION instance is a NO instance. 5 Proof. Suppose not, then let us assume that R = (Ri)i∈[n] be a partial profile such that ≻∈ C(R) and s(R) = {c}. Let s − MR(c, R) = s(s(≻′), ≻′) − s(c, ≻′) for some ≻′= (≻′ i)i∈[n] ∈ C(R). We now claim the following. Claim 3.2. s(c, ≻′) = βn. Proof. The idea of the proof is that if s(c, ≻′) > βn, then we can construct another profile which can be used to calculate worse regret for c than ≻′ and this will contradict the choice of ≻′. Formally, let us define another profile ¯≻ = ( ¯≻i)i∈[n] where ¯≻i is obtained from ≻′ i by "moving" c immediately to the right of the alternatives that are on the left of c in either ≻′ i or ≻i for i ∈ [n]; that is, for every i ∈ [n], ¯≻i is defined as follows. ¯≻i = {(a, b) : a, b ∈ A \ {c}, a ≻′ ∪ {(c, a) : a ∈ A, c ≻′ ∪ {(a, c) : a ∈ A, a ≻′ i b} i a, c ≻i a} i c or a ≻i c} The profile ¯≻ ∈ C(R) since ≻∈ C(R) and ≻′∈ C(R). Due to monotonicity of s, the score of c in ¯≻ is at most the score of c in ≻′ and the score of every other alternative in ¯≻ is at least their score in ≻′. However, ≻′ has been used to calculate the MR score of c under s. Hence, we have the following: s(s(≻′), ≻′) = s(s( ¯≻), ≻′), s(c, ≻′) = s(c, ¯≻) We now have the following: βn 6 s(c, ≻′) = s(c, ¯≻) 6 s(c, ≻) = βn The first inequality follows from the definition of βn and the second inequality follows from monotonicity of s. Let y ∈ s(≻′) and s − MR(y, R) = s(s(≻′′), ≻′′) − s(y, ≻′′) for some ≻′′= (≻′′ i )i∈[n] ∈ C(R). We now have the following claim. Claim 3.3. s(s(≻′′), ≻′′) 6 s(s(≻′), ≻′) Proof. The idea of the proof is along the same line as Claim 3.2. Let us define another profile ¯≻ = ( ¯≻i)i∈[n] where ¯≻i is obtained from ≻′′ i by "moving" c immediately to the right of the alternatives that are on the left of c in either ≻′′ i for i ∈ [n]; that is, for every i ∈ [n], ¯≻i is defined as follows. i or ≻′ ¯≻i = {(a, b) : a, b ∈ A \ {c}, a ≻′′ i b} i a, c ≻′ i a} i c or a ≻′ ∪ {(c, a) : a ∈ A, c ≻′′ ∪ {(a, c) : a ∈ A, a ≻′′ i c} The profile ¯≻ ∈ C(R) since ≻′∈ C(R) and ≻′′∈ C(R). Due to monotonicity of s, the score of c in ¯≻ is at most the score of c in ≻′′ and the score of every other alternative in ¯≻ is at least their score in ≻′′. Again due to monotonicity of s, the score of c in ¯≻ is at most the score of c in ≻′. However, ≻′ has been used to calculate the MR score of c under s. Hence, we have s(s(≻′′), ≻′′) 6 s(s(≻′), ≻′); otherwise we will have s − Regret(c, ≻′) < s − Regret(c, ¯≻) which is a contradiction. 6 We now combine Claim 3.2 and 3.3 as follows to prove the main claim. s − MR(y, R) = s(s(≻′′), ≻′′) − s(y, ≻′′) 6 s(s(≻′), ≻′) − s(y, ≻′′) 6 s(s(≻′), ≻′) − βn = s(s(≻′), ≻′) − s(c, ≻′) = s − MR(c, R) The second line follows from Claim 3.3, the third line follows from the definition of βn, and the fourth line follows from Claim 3.2. Hence we have s − MR(y, R) 6 s − MR(c, R) which contradicts our assumption that s(R) = {c}. We now show that if c does not receive the worst possible score with n preferences over A under s from the profile ≻, then the instance is a YES instance. To see this, let us consider the partial profile P = (Pi)i∈[n] as Pi = {c ≻ y : c ≻i y} for every i ∈ [n]. Let R be any profile in C(P). Since, the alternative c does not receive the worst possible score with n preferences over A under s from the profile ≻, s(c, R) < βn. Hence, if α is the best possible score with n preferences over A under s, we have s − MR(c, P) < α − βn. On the other hand, for any alternative y ∈ A \ {c}, let us consider the profile Qy = (Qi)i∈[n] where Qi = c ≻ · · · ≻ y for every i ∈ [n]. Now due to monotonicity of s, we have s(c, Qy) = α and s(y, Qy) = βn. Hence, we have s − MR(y, P) = α − βn for every y ∈ A \ {c} and thus s(P) = {c}. We remark that the proof of Theorem 3.1 for the co-winner case is trivial: every instance is a YES instance since a partial profile where every preference is empty makes every alternative win due to neutrality. Since scoring rules, maximin, Copelandα for every α ∈ [0, 1], and simpli- fied Bucklin voting rules are monotone, neutral, and worst efficient, Theorem 3.1 immediately implies the following corollary. Corollary 3.1. The MANIPULATIVE ELICITATION problem is polynomial time solvable for scoring rules, maximin, Copelandα for every α ∈ [0, 1], and simplified Bucklin voting rules. Proof. The worst possible score with n preferences over m alternatives is 0 for scoring rules, maximin, and Copeland α for every α ∈ [0, 1], and −m for the simplified Bucklin voting rule (under modified but equivalent definition of simplified Bucklin voting rule). 4 Hardness Results for MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT In this section we show that the MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT prob- lem is NP-complete for maximin, Copelandα for every α ∈ [0, 1], simplified Bucklin, and a large class of scoring rules which includes the k-approval voting rule for every k and the Borda voting rule. 4.1 Scoring Rules Let us define a restricted version of the classical set cover problem which we call SET COVER FREQUENCY TWO. We will see in Lemma 4.1 that this problem is NP-complete by reducing from the vertex cover problem which is well known to be NP-complete [GJ79]. Most of our NP-hardness reductions are from this problem. 7 Definition 4.1 (SET COVER FREQUENCY TWO). Given a universe U of cardinality q, a family S = {Si : i ∈ [t]} of t subsets of U such that for every a ∈ U, we have {i ∈ [t] : a ∈ Si} = 2, and a positive integer ℓ, compute if there exists a subset G ⊆ S containing at most ℓ sets such that ∪A∈GA = U. We denote an arbitrary instance of SET COVER FREQUENCY TWO by (U, S, ℓ). Lemma 4.1. SET COVER FREQUENCY TWO is NP-complete. Proof. SET COVER FREQUENCY TWO clearly belongs to NP. To prove NP-hardness, we reduce from VERTEX COVER to SET COVER FREQUENCY TWO. Let (G = (V, E), k) be an arbitrary instance of VERTEX COVER. We construct and instance (U, S, ℓ) as follows: U = {ae : e ∈ E}, S = {Sv : v ∈ V} where Sv = {ae : e is incident on v}, ℓ = k Clearly every element ae ∈ U belongs to exactly two sets, namely Su and Sv if e = {u, v}. Also the equivalence of two instances are straight forward. We begin with showing that the MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem is NP-complete for a large class of scoring rules which included the k-approval voting rule for every 3 6 k 6 γm for any constant 0 < γ < 1 and the Borda voting rule. While describing a (complete) preference, if we do not mention the order of any two alternatives, they can be ordered arbitrarily. On the other hand, if we are describing a partial preference and we do not mention the order of any two alternatives, then they should be assumed to be incomparable. Theorem 4.1. Let r be a normalized scoring rule such that there exists a function g : N −→ N such that for every m ∈ N, we have 3m 6 g(m) 6 poly(m) and if α = (αi)i∈[g(m)], then there exists a positive integer p such that 3 6 p 6 g(m) − m + 3, αp > αp+1 and αp−1 = poly(m). Then the MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem is NP-complete for the scoring rule r. Proof. The MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem clearly belongs to NP. To prove NP-hardness, we reduce from SET COVER FREQUENCY TWO to MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT for the scoring rule r. Let (U = {u1, . . . , uq}, S = {Si : i ∈ [t]}, ℓ) be an arbitrary instance of SET COVER FREQUENCY TWO. Let us consider the following instance (A, P, c, f) of MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT where A is defined as follows. A = {ai : i ∈ [q]} ∪ {c, d} ∪ W, where W = {w1, . . . , wg(q)−q−2} The profile P consists of the following preferences. For an integer 0 6 k 6 g(q) − q − 2, we denote the set {wi : i ∈ [k]} by Wk. Let κ = max{i ∈ [g(q)] : αi 6= 0}; we observe that ακ = 1 since r is normalized. For X ⊆ U, let us denote the set {aj : uj ∈ X} of alternatives by X to simplify notation. ⊲ ∀i ∈ [t] : Wp−3 ≻ Si ≻ d ≻ c ≻ (U \ Si) ≻ (W \ Wp−3) ⊲ t − 2 copies of Wp−1 ≻ ai ≻ d ≻ (U \ {ai}) ≻ (W \ Wp−1) ≻ c ⊲ t(αp − αp+2) copies of W2 ≻ · · · ≻ c ≻ · · · d where the alternative c is placed at κ position from left. ⊲ If αg(q)−1 = 1, then we add (q + 1)tαp−1 copies of · · · ≻ c ≻ d ⊲ Otherwise: 8 – If κ 6 g(q) − q − 1, then we add (q + 1)tαp−1 copies of W2 ≻ · · · ≻ c ≻ d ≻ U ≻ · · · where the alternative d is placed at κ + 1 position from left and we add, for every i ∈ [q], (q + 1)tαp−1 copies of W2 ≻ · · · ≻ ai ≻ d ≻ c ≻ (U \ {ai}) ≻ · · · where the alternative d is placed at κ + 1 position from the left. – Otherwise we add (q + 1)tαp−1 copies of W2 ≻ · · · ≻ U ≻ c ≻ d ≻ · · · where the alternative d is placed at κ + 1 position from the left. For ease of reference, we call the above four groups as G1, G2, G3, and G4 respectively. Let n be the number of preferences in P. We observe that n = poly(m) since αp−1 = poly(m). The function f is defined as follows: f({d, x}) = n for every x ∈ A \ ({c, d}), f({d, c}) = n − ℓ; the value of f be 0 for all other pairs of alternatives. This finishes the description of our reduced instance. We now claim that the two instances are equivalent. In one direction, let us assume that the SET COVER FREQUENCY TWO instance is a YES instance; without loss of generality, let us assume (by renaming) that S1, . . . , Sℓ forms a set cover of U. Let us consider the following partial profile Q with P ∈ L(Q). ⊲ Preferences in G1: ∀i ∈ [ℓ] : ((Wp−3 ∪ Si) ≻ d ≻ ((U \ Si) ∪ (W \ Wp−3)) S c ≻ ((U \ Si)) ∪ ((W \ Wp−3))) ⊲ Preferences in G1: ∀i with ℓ + 1 6 i 6 t : (Wp−3 ∪ Si) ≻ d ≻ c ≻ ((U \ Si) ∪ (W \ Wp−3) ⊲ Preferences in G2: t − 2 copies of (Wp−1 ∪ ai) ≻ d ≻ ((U \ {ai}) ∪ (W \ Wp−1) ∪ {c}) ⊲ Preferences in G3: t(αp − αp+2) copies of c ≻ X where the alternative X = {b ∈ A : c ≻ b in G3}. ⊲ Preferences in G4: for every preference in G4, we add c ≻ Y where the alternative Y = {b ∈ A : c ≻ b in the corresponding preference in G4}. Let ∆ be the score that the alternative w1 receives in P. We observe that the minimum scores that the alternatives c and ai, i ∈ [q] receive in profile R with R ∈ L(Q) are all the same; let it be λ. We summarize the MR score (based on r) of every alternative from Q in Table 1. Hence the alternative c wins uniquely in Q. Alternative MR-r score from Q Competing alternative c ∆ − tαℓ − λ ai, ∀i ∈ [q] ∆ − tαℓ + αℓ+1 − λ w1(w2) w ∈ W \ W2 ∆ ∆ d > D − tαℓ w1 (or w2) w1 (or w2) w2(w1) w1 w1 (or w2) Table 1: Summary of MR scores (based on r) of all the alternatives from the partial profile Q in the proof of Theorem 4.1. In the other direction, let us assume that the MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT instance (A, P, c, f) is a YES instance. Let Q be a partial profile such that P ∈ C(Q) and the alternative c wins uniquely in Q under the MR scoring rule based on r. We observe that if a preference profile Rc with Rc ∈ L(Q) is used to calculate the MR score of the alternative based on r, then the MR score of c based on r is at least ∆ − tαℓ − λ using the alternative w1 as a competing alternative where λ and ∆ are as defined above. Let J ⊆ [t] be the set of i ∈ [t] such that the corresponding partial preferences in the group G1 in Q leave the alternatives c and 9 d incomparable. Since f({d, c}) = n − ℓ, we have J 6 ℓ. We claim that {Sj : j ∈ J} forms a set cover of U. Suppose not, then let uk ∈ U \ (∪j∈JSj). Then we observe that the MR score of ak based on r is at least ∆ − tαℓ − λ using the alternative w1 as a competing alternative.However, this contradicts our assumption that c is the unique MR-r winner of Q. Hence {Sj : j ∈ J} forms a set cover of U and thus the SET COVER FREQUENCY TWO is a YES instance. This concludes the proof of the theorem. Theorem 4.1 immediately gives us the following corollary. Corollary 4.1. The MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem is NP- complete for the Borda and k-approval voting rules for every 3 6 k 6 γm for any constant 0 < γ < 1. A drawback of Theorem 4.1 is that it does not cover the plurality, 2-approval, and the k-veto voting rules for k = o(m). We will show that the MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem is NP-complete for the k-veto voting rule for any 1 6 k 6 γm for any constant 0 < γ < 1 in Theorem 4.3. We now show in Theorem 4.2 that the MANIPULATIVE ELIC- ITATION WITH CANDIDATE PAIR LIMIT problem is NP-complete for the plurality and 2-approval voting rules by reducing it from the X3C problem which is defined as follows and known to be NP-complete [GJ79]. Definition 4.2 (X3C). Given a universe U of cardinality q such that q is divisible by 3, a family S = {Si : i ∈ [t]} of t subsets of U each of cardinality 3, compute if there exists a subset G ⊆ F of q/3 sets such that ∪A∈GA = U. We denote an arbitrary instance of X3C by (U, S). Theorem 4.2. The MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem is NP- complete for the plurality and the 2-approval voting rules. Proof. Let us first consider the plurality voting rule. The MANIPULATIVE ELICITATION WITH CAN- DIDATE PAIR LIMIT problem for the plurality voting rule clearly belongs to NP. To prove NP- hardness, we reduce from X3C to MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT for the plurality voting rule. Let (U = {u1, . . . , uq}, S = {Si : i ∈ [t]}) be an arbitrary instance of X3C. For every i ∈ [q] let us define fi = {j ∈ [t] : ui ∈ Sj}. Let us assume, without loss of generality, that fi < t − q/2 (if not, then we add 3t new elements in U and t sets in S each of size 3 and collectively covering these new 3t elements). Let us assume, without loss of generality, that q is divisible by 6; if not then we add 3 new elements in U and a set consisting of these three new elements in S. Let us consider the following instance (A, P, c, f) of MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT where A is defined as follows. A = {ai : i ∈ [q]} ∪ {c, d, w} The profile P consists of the following preferences. For X ⊆ U, let us also denote, for the sake of simplicity of notation, the set {aj : uj ∈ X} of alternatives by X. ⊲ ∀i ∈ [t] : d ≻ Si ≻ c ≻ (U \ Si) ≻ w ⊲ q/6 + 1 copies of c ≻ (A \ {c, w}) ⊲ 1 copy of d ≻ w ≻ c ≻ (A \ {d, w}) For ease of reference, we call the above three groups as G1, G2, and G3 respectively. Let n be the number of preferences in P. That is, n = t + q/6 + 2. The function f is defined as follows: f({c, ai}) = n − fi + 1 for every i ∈ [q], f({w, d}) = n − 1, f({w, x}) = n for every x ∈ A \ {w, d}; 10 the value of f be 0 for all other pairs of alternatives. This finishes the description of our reduced instance. We now claim that the two instances are equivalent. In one direction, let us assume that the X3C instance is a YES instance; without loss of generality, let us assume (by renaming) that S1, . . . , Sq/3 forms a set cover of U. Let us consider the following partial profile Q with P ∈ L(Q). ⊲ Preferences in G1: ∀i ∈ [q/3] : (Si ≻ c ≻ (U \ Si) ≻ w) S(d ≻ w) ⊲ Preferences in G1: ∀i with q/3 + 1 6 i 6 t : (c ≻ (U \ Si) ≻ w) S(d ≻ w) ⊲ Preferences in G2: q/6 + 1 copies of c ≻ (A \ {c, w}) ⊲ Preferences in G3: 1 copy of w ≻ c ≻ (A \ {d, w}) We summarize the MR-plurality score of every alternative from Q in Table 2. Hence the alternative c wins uniquely in Q. Alternative MR-plurality score from Q Competing alternative c ai, ∀i ∈ [q] d t − q/6 t t − q/6 + 1 d d c Table 2: Summary of MR-plurality scores of all the alternatives from the partial profile Q in the proof of Theorem 4.2. In the other direction, let us assume that the MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT instance (A, P, c, f) is a YES instance. Let Q be a partial profile such that P ∈ C(Q) and the alternative c wins uniquely in Q under the MR-plurality voting rule. Let J ⊆ [t] be the set of i ∈ [t] such that the corresponding partial preferences in the group G1 in Q leave the alternatives c and at least one alternative in Si incomparable. A key observation is that since f({c, ai}) = n−fi+1 for i ∈ [q], we have ∪j∈JSj = U. Hence we have J > q/3. We now claim that J 6 q/3. Suppose not, then the MR-plurality score of d is at most (t − q/3 − 1) + q/6 + 1 = t − q/6 using c as competing alternative (we observe that, since f({c, ai}) = n − fi + 1 for i ∈ [q], using the alternative ai as a competing alternative for any i will lead to MR-plurality score of d at most 2fi < t − q/6). Hence the MR-plurality score of d is at most t − q/6. However the MR-plurality score of c is at least t + 1 − (q/6 + 1) = t − q/6. This contradicts our assumption that c is the unique MR-plurality winner of Q. Hence {Sj : j ∈ J} forms a set cover of U and thus the X3C is a YES instance. This concludes the proof of the theorem. For the 2-approval voting rule, we can introduce n dummy alternatives each of which ap- pears at the first position in exactly one preference and in the rest (n− 1) preferences, it appears in the bottom (n − 1) positions. All other parameters of the reduction remain same. It is easy to see that a similar argument will prove the result for the 2-approval voting rule. We now show our hardness result for the k-veto voting rule by reducing from X3C. Theorem 4.3. The MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem is NP- complete for the k-veto voting rule for every 1 6 k 6 γm for any constant 0 < γ < 1. Proof. Let us first consider the veto voting rule. The MANIPULATIVE ELICITATION WITH CANDI- DATE PAIR LIMIT problem for the veto voting rule clearly belongs to NP. To prove NP-hardness, we reduce from X3C to MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT for the veto 11 voting rule. Let (U = {u1, . . . , uq}, S = {Si : i ∈ [t]}) be an arbitrary instance of X3C. For every i ∈ [q] let us define fi = {j ∈ [t] : ui ∈ Sj}. Let us assume, without loss of generality, that fi < t − q/2 (if not, then we add 3t new elements in U and t sets in S each of size 3 and col- lectively covering these new 3t elements). Let us assume, without loss of generality, that q is divisible by 6; if not then we add 3 new elements in U and a set consisting of these three new elements in S. We also assume that t is an odd integer; if not then we duplicate one set in S. Let us consider the following instance (A, P, c, f) of MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT where A is defined as follows. A = {ai : i ∈ [q]} ∪ {c, x, d, w1, w2} The profile P consists of the following preferences. For X ⊆ U, let us also denote, for the sake of simplicity of notation, the set {aj : uj ∈ X} of alternatives by X. 1. ∀i ∈ [t] : (U \ Si) ≻ w1 ≻ w2 ≻ d ≻ c ≻ Si ≻ x 2. (t−1)/2 + q/6 copies of (A \ {c, d}) ≻ d ≻ c 3. ∀j ∈ [q] : (t+1)/2 + q/6 + 1 − fj copies of (A \ {aj, d}) ≻ d ≻ aj 4. 10t copies of (A \ {d}) ≻ d 5. 10t copies of (A \ {d, w1, w2}) ≻ d ≻ w1 ≻ w2 6. ∀i ∈ [2] : q/3 copies of (A \ {wi, d}) ≻ d ≻ wi For ease of reference, we call the above six groups as G1, G2, G3, G4, G5 and G6 respectively. Let n be the number of preferences in P. The function f is defined as follows: f({d, z}) = n for every z ∈ A \ {d}; the value of f be 0 for all other pairs of alternatives. This finishes the description of our reduced instance. We now claim that the two instances are equivalent. In one direction, let us assume that the SET COVER FREQUENCY TWO instance is a YES instance; without loss of generality, let us assume (by renaming) that S1, . . . , Sq/3 forms a set cover of U. Let us consider the following partial profile Q with P ∈ L(Q). ⊲ Preferences in G1: ∀i ∈ [q/3] : (U \ Si) ≻ w1 ≻ w2 ≻ d ≻ c ≻ Si ≻ x ⊲ Preferences in G1: ∀i with q/3 + 1 6 i 6 t : (U \ Si) ≻ w1 ≻ w2 ≻ d ≻ c ≻ (Si ∪ {x}) ⊲ Preferences in G2: (t−1)/2 + q/6 copies of (A \ {c, d}) ≻ d ≻ c ⊲ Preferences in G3: ∀j ∈ [q] : (t+1)/2 + q/6 + 1 − fj copies of (A \ {aj, d}) ≻ d ≻ aj ⊲ Preferences in G4: 10t copies of (A \ {d, w1, w2}) ≻ d ≻ {w1, w2} ⊲ Preferences in G5: 10t copies of (A \ {d}) ≻ d ⊲ Preferences in G6: ∀i ∈ [2] : q/3 copies of (A \ {wi, d}) ≻ d ≻ wi We summarize the MR-veto score of every alternative from Q in Table 3. Hence the alterna- tive c wins uniquely in Q. In the other direction, let us assume that the MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT instance (A, P, c, f) is a YES instance. Let Q be a partial profile such that P ∈ C(Q) and the alternative c wins uniquely in Q under the MR-veto voting rule. We first observe that, since f({d, z}) = n for every z ∈ A \ {d}, the alternative c is forced to receive a score of 0 from every preference in Q corresponding to group G2 (and thus every other alternative is forced to 12 Alternative MR-veto score from Q Competing alternative c x ai, ∀i ∈ [q] d w1(w2) (t−1)/2 − q/6 (t+1)/2 − q/6 (t+1)/2 − q/6 > 5t > 5t x (or w1 or w2) c x (or w1 or w2) x (or w1 or w2) w2(w1) Table 3: Summary of MR-veto scores of all the alternatives from the partial profile Q in the proof of Theorem 4.3. receive a score of 1), both the alternatives x and c are forced to receive a score of 1 from every preference in Q corresponding to group G3, and the alternative d is forced to receive a score of 0 from every preference in Q corresponding to group G4 (and thus every other alternative is forced to receive a score of 1). We now claim that there must be at least q/3 preferences in Q corresponding to the group G1 where the alternative x must be forced to receive a score of 0 for c to win uniquely. Suppose not, then we observe that the MR-veto score of c is at least (t+1)/2−q/6 using x as a competing alternative whereas the MR-veto score of x is at most (t−1)/2− q/6 using c as a competing alternative which contradicts our assumption that c wins the MR-veto election. Let J ⊆ [t] be the set of i ∈ [t] such that the corresponding partial preferences in the group G1 in Q force the alternative x to receive a score of 0. Then we have J > q/3. We now claim that J = q/3 and the sets {Sj : j ∈ J} forms an exact set cover of U. Suppose not, then there exists an uk ∈ U which appears in at least two sets in {Sj : j ∈ J}. Then the alternative is forced to receive a score of 1 from at least t − fk + 2 preferences in Q corresponding to the group G1 – t − fk preferences where it appears on the left of d and at least 2 preferences where the alternative x is forced to receive a score of 0. However, then the MR-veto score of the alternative ak is at most (t−1)/2 − q/6 using w1 (or w2) as a competing alternative. This contradicts our assumption that c wins the MR-veto election uniquely. Hence the sets {Sj : j ∈ J} forms an exact set cover of U and thus the X3C is a YES instance. This concludes the proof of the theorem for the veto voting rule. For the k-veto voting rule, we add k − 1 "dummy" alternatives di, i ∈ [k − 1] at the bottom of every preferences in P and this is easily verifiable that the proof for the k-veto voting rule goes along the same line. 4.2 Maximin Voting Rule We now show our hardness result for the maximin voting rule by reducing from SET COVER FREQUENCY TWO. Theorem 4.4. The MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem is NP- complete for the maximin voting rule. Proof. The MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem clearly belongs to NP. To prove NP-hardness, we reduce from SET COVER FREQUENCY TWO to MANIPU- LATIVE ELICITATION WITH CANDIDATE PAIR LIMIT for the maximin voting rule. Let (U = {u1, . . . , uq}, S = {Si : i ∈ [t]}, ℓ) be an arbitrary instance of SET COVER FREQUENCY TWO. Let us consider the following instance (A, P, c, f) of MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT where A is defined as follows. A = {ai : i ∈ [q]} ∪ {c, w1, w2, d} 13 The profile P consists of the following preferences. For X ⊆ U, let us also denote, for the sake of simplicity of notation, the set {aj : uj ∈ X} of alternatives by X. ⊲ ∀i ∈ [t] : w1 ≻ w2 ≻ Si ≻ d ≻ c ≻ (U \ Si) ⊲ 2 copies of c ≻ U ≻ d ≻ w1 ≻ w2 For ease of reference, we call the above two groups as G1 and G2 respectively. Let n be the number of preferences in P. The function f is defined as follows: f({d, x}) = n for every x ∈ A \ ({c, d}), f({d, c}) = n − ℓ; the value of f be 0 for all other pairs of alternatives. This finishes the description of our reduced instance. We now claim that the two instances are equivalent. In one direction, let us assume that the SET COVER FREQUENCY TWO instance is a YES instance; without loss of generality, let us assume (by renaming) that S1, . . . , Sℓ forms a set cover of U. Let us consider the following partial profile Q with P ∈ L(Q). ⊲ Preferences in G1: ∀i ∈ [ℓ] : (({w1, w2} ∪ Si) ≻ d ≻ {U \ Si}) S(c ≻ {U \ Si}) ⊲ Preferences in G1: ∀i with ℓ + 1 6 i 6 t : ({w1, w2} ∪ Si) ≻ d ≻ c ≻ {U \ Si} ⊲ Preferences in G2: 2 copies of c ≻ U ≻ d ≻ {w1, w2} We summarize the MR-maximin score of every alternative from Q in Table 4. Hence the alternative c wins uniquely in Q. Alternative MR-maximin from Q Competing alternative Comments c ai, ∀i ∈ [q] w1(w2) d t − 2 t − 1 t t w1 (or w2) w1 (or w2) w2(w1) w1 (or w2) N(w1, c) − N(c, d) N(w1, c) − N(ai, c) N(w1, c) − N(w2, w1) N(w1, c) − N(d, w1) Table 4: Summary of MR-maximin scores of all the alternatives from the partial profile Q in the proof of Theorem 4.4. In the other direction, let us assume that the MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT instance (A, P, c, f) is a YES instance. Let Q be a partial profile such that P ∈ C(Q) and the alternative c wins uniquely in Q under the MR-maximin voting rule. We observe that for every R ∈ L(Q) which can be used for calculating the MR-maximin score of the alternative c, we have NR(c, d) 6 2. Also, there are only two preferences (the preferences in G2) where there exist some alternatives which are preferred over the alternative w1. Hence the MR-maximin score of the alternative c in Q is at least t − 2. Let J ⊆ [t] be the set of i ∈ [t] such that the corresponding partial preferences in the group G1 in Q leave the alternatives c and d incompa- rable. Since f({d, c}) = n − ℓ, we have J 6 ℓ. We claim that {Sj : j ∈ J} forms a set cover of U. Suppose not, then let uk ∈ U \ (∪j∈JSj). We observe that for every R′ ∈ L(Q), we have NR′(ak, c) = 2. We also observe that NR′(ak, d) = NR′ (ak, wi) = 2 for every i ∈ [2] since f({d, ui}) = n for every i ∈ [q] and f({d, w1}) = f({d, w2}) = n. Hence, the MR-maximin score of the alternative ak is t − 2 where the alternative w1 plays the role of a competing alternative. However, this contradicts our assumption that c is the unique MR-maximin winner of Q. Hence {Sj : j ∈ J} forms a set cover of U and thus the SET COVER FREQUENCY TWO is a YES instance. This concludes the proof of the theorem. 14 4.3 Copelandα Voting Rule We show next our hardness result for the Copelandα voting rule for every α ∈ [0, 1]. Theorem 4.5. The MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem is NP- complete for the Copelandα voting rule for every α ∈ [0, 1]. Proof. The MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem clearly belongs to NP. To prove NP-hardness, we reduce from SET COVER FREQUENCY TWO to MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT for the Copelandα voting rule for every α ∈ [0, 1]. Let (U = {u1, . . . , uq}, S = {Si : i ∈ [t]}, ℓ) be an arbitrary instance of SET COVER FREQUENCY TWO. Let us consider the following instance (A, P, c, f) of MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT where A is defined as follows. A = {ai : i ∈ [q]} ∪ {c, x, y, d, w1, w2}} The profile P consists of the following preferences. For X ⊆ U, let us also denote, for the sake of simplicity of notation, the set {aj : uj ∈ X} of alternatives by X. ⊲ ∀i ∈ [t] : w1 ≻ w2 ≻ Si ≻ d ≻ c ≻ x ≻ y ≻ (U \ Si) ⊲ t − 3 copies of U ≻ c ≻ x ≻ y ≻ d ≻ w1 ≻ w2 For ease of reference, we call the above two groups as G1 and G2 respectively. Let n be the number of preferences in P. We observe that n is an odd integer and thus the value of α is irrelevant. Hence, from here on, we omit the parameter α. The function f is defined as follows: f({d, x}) = n for every x ∈ A \ {c, d, x, w1, w2}, f({d, c}) = f({d, x}) = n − ℓ; the value of f be 0 for all other pairs of alternatives. This finishes the description of our reduced instance. We now claim that the two instances are equivalent. In one direction, let us assume that the SET COVER FREQUENCY TWO instance is a YES instance; without loss of generality, let us assume (by renaming) that S1, . . . , Sℓ forms a set cover of U. Let us consider the following partial profile Q. ⊲ Preferences in G1: ∀i ∈ [ℓ] : Si ≻ d ≻ y ≻ (U \ Si)) S(c ≻ {{x, y} ∪ (U \ Si)}) ⊲ Preferences in G1: ∀i with ℓ + 1 6 i 6 t : Si ≻ d ≻ x ≻ y ≻ (U \ Si) ⊲ Preferences in G2: t − 3 copies of c ≻ {x, d, w1, w2} We summarize the MR-Copeland score of every alternative from Q in Table 5. Hence the alternative c wins uniquely in Q. In the other direction, let us assume that the MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT instance (A, P, c, f) is a YES instance. Let Q be a partial profile such that P ∈ C(Q) and the alternative c wins uniquely in Q under the MR-Copeland voting rule. We observe that in P, the alternative c defeats only 2 alternatives namely x and y. Since, P ∈ L(Q), the MR- Copeland score of the alternative c in Q is at least (A − 1) − 2 = A − 3. Let J ⊆ [t] be the set of i ∈ [t] such that the corresponding partial preferences in Q leave the alternatives c and d incomparable. Since f({d, c}) = n − ℓ for every i ∈ [t], we have J 6 ℓ. We claim that {Sj : j ∈ J} forms a set cover of U. Suppose not, then let uk ∈ U \ (∪j∈JSj). We observe that in every profile R ∈ L(Q), the alternative ak defeats the alternatives c and d and thus the MR-Copeland score of the alternative ak in Q is at most (A− 3) where the alternative w1 plays the role of a competing alternative. However, this contradicts our assumption that c is the unique MR-Copeland winner of Q. Hence {Sj : j ∈ J} forms a set cover of U and thus the SET COVER FREQUENCY TWO is a YES instance. This concludes the proof of the theorem. 15 Alternative MR-Copeland from Q Competing alternative Comments c ai, ∀i ∈ [q] w1(w2) d A − 3 A − 2 A − 1 A − 2 w1 (or w2) w1 (or w2) w2(w1) w2(w1) w1 defeats A \ {w1} c defeats {x, y} w1 defeats A \ {w1} ai defeats d w1 defeats A \ {w1} w2 defeats none w1 defeats A \ {w1} d defeats y Table 5: Summary of MR-Copeland scores of all the alternatives from the partial profile Q in the proof of Theorem 4.5. 4.4 Simplified Bucklin Voting Rule We now show our hardness result for the simplified Bucklin voting rule. Theorem 4.6. The MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem is NP- complete for the simplified Bucklin voting rule. Proof. The MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT problem clearly belongs to NP. To prove NP-hardness, we reduce from SET COVER FREQUENCY TWO to MANIPU- LATIVE ELICITATION WITH CANDIDATE PAIR LIMIT for the simplified Bucklin voting rule. Let (U = {u1, . . . , uq}, S = {Si : i ∈ [t]}, ℓ) be an arbitrary instance of SET COVER FREQUENCY TWO. Let us consider the following instance (A, P, c, f) of MANIPULATIVE ELICITATION WITH CANDI- DATE PAIR LIMIT where A is defined as follows. A = {ai : i ∈ [q]} ∪ {c, d} ∪ W, where W = {wi : i ∈ [q]} The profile P consists of the following preferences. For X ⊆ U, let us also denote, for the sake of simplicity of notation, the set {aj : uj ∈ X} of alternatives by X. ⊲ ∀i ∈ [t] : w1 ≻ w2 ≻ · · · ≻ wq−2 ≻ Si ≻ d ≻ c ≻ (U \ Si) ≻ wq−1 ≻ wq ⊲ t − 1 copies of U ≻ c ≻ d ≻ W ⊲ 2 copies of w1 ≻ w2 ≻ · · · ≻ wq ≻ c ≻ d ≻ U For ease of reference, we call the above three groups as G1, G2, and G3 respectively. Let n be the number of preferences in P. The function f is defined as follows: f({d, x}) = n for every x ∈ A \ ({c, d, w1, . . . , wq−2}), f({d, c}) = n − ℓ; the value of f be 0 for all other pairs of alternatives. This finishes the description of our reduced instance. We now claim that the two instances are equivalent. In one direction, let us assume that the SET COVER FREQUENCY TWO instance is a YES instance; without loss of generality, let us assume (by renaming) that S1, . . . , Sℓ forms a set cover of U. Let us consider the following partial profile Q with P ∈ L(Q). ⊲ Preferences ∀i ∈ [ℓ] wq) S (c ≻ (U \ Si) ≻ wq−1 ≻ wq) in G1: : (Si ≻ d ≻ (U \ Si) ≻ wq−1 ≻ ⊲ Preferences in G1: ∀i with ℓ + 1 6 i 6 t : Si ≻ d ≻ c ≻ (U \ Si) ≻ wq−1 ≻ wq 16 ⊲ Preferences in G2: t − 1 copies of U ≻ c ≻ d ≻ W ⊲ Preferences in G3: 2 copies of wq−1 ≻ wq ≻ c ≻ d ≻ U We summarize the MR-simplified Bucklin score of every alternative from Q in Table 6. Hence the alternative c wins uniquely in Q. Alternative MR-simplified Bucklin score from Q Competing alternative c ai, ∀i ∈ [q] w1 wi, 2 6 i 6 q d −q −q − 1 −2q − 1 −2q − 1 −q − 1 w1 w1 w2 w1 w1 Table 6: Summary of MR-simplified Bucklin scores of all the alternatives from the partial profile Q in the proof of Theorem 4.6. In the other direction, let us assume that the MANIPULATIVE ELICITATION WITH CANDIDATE PAIR LIMIT instance (A, P, c, f) is a YES instance. Let Q be a partial profile such that P ∈ C(Q) and the alternative c wins uniquely in Q under the MR-simplified Bucklin voting rule. We can assume without loss of generality that the alternative w1 is used as a competing alternative to calculate MR-simplified Bucklin score of every alternative (other than w1 itself) since the simplified Bucklin score of w1 is 1 (the minimum possible) in P and P ∈ C(Q). Let J ⊆ [t] be the set of i ∈ [t] such that the corresponding partial preferences in the group G1 in Q leave the alternatives c and d incomparable. Since f({d, c}) = n − ℓ, we have J 6 ℓ. We claim that {Sj : j ∈ J} forms a set cover of U. Suppose not, then let uk ∈ U \ (∪j∈JSj). We observe that for every R ∈ L(Q), the simplified Bucklin score of the alternative ak is at most q + 1. Hence the MR-simplified Bucklin score of ak in Q is at least −q. On the other hand, since the simplified Bucklin score of c in P is q + 1 and P ∈ C(Q), the MR-simplified Bucklin score of c in Q is at most −q. However, this contradicts our assumption that c is the unique MR-simplified Bucklin winner of Q. Hence {Sj : j ∈ J} forms a set cover of U and thus the SET COVER FREQUENCY TWO is a YES instance. This concludes the proof of the theorem. 5 Conclusion and Future Work In this work, we have discovered an important vulnerability, namely manipulative elicitation, in the use of minimax regret based extension of classical voting rules in the incomplete preferential setting. Moreover, we have shown that the related computational task is polynomial time solv- able for many commonly used voting rules including all scoring rules, maximin, Copelandα for every α ∈ [0, 1], simplified Bucklin voting rules, etc. Then we have shown that by introducing a parameter per pair of alternatives which specifies the minimum number of partial preferences where this pair of alternatives must be comparable makes the computational task of manipula- tive elicitation NP-complete for all the above mentioned voting rules. We want to draw special attention to the fact that our approach makes manipulative elicitation NP-complete even for the plurality and veto voting rules which are vulnerable to most of the other manipulative attacks. In summary, we have found an important vulnerability in the incomplete preferential setting and proposed a novel approach to tackle it. A drawback of our approach is that the parameters can be non-uniform – their values do not need to be the same for every pair of alternatives. It would be interesting to study the computa- 17 tional complexity of the problem when the values of the parameters are all the same. In another direction, it would be interesting to conduct extensive experimentation to study usefulness of our approach in practice. This is specially important since computational intractability is known to provide only a weak barrier in other forms of election manipulation [PR07]. References [BBN10] Nadja Betzler, Robert Bredereck, and Rolf Niedermeier. Partial kernelization for In Proc. International Symposium on rank aggregation: theory and experiments. Parameterized and Exact Computation (IPEC), pages 26–37. Springer, 2010. [BBN14] Nadja Betzler, Robert Bredereck, and Rolf Niedermeier. Theoretical and empirical evaluation of data reduction for exact kemeny rank aggregation. Auton. Agent Multi Agent Syst., 28(5):721–748, 2014. [BHN09] Nadja Betzler, Susanne Hemmann, and Rolf Niedermeier. A Multivariate Complex- ity Analysis of Determining Possible Winners given Incomplete Votes. In Proc. Inter- national Joint Conference on Artificial Intelligence (IJCAI), volume 9, pages 53–58, 2009. [BRR11] Dorothea Baumeister, Magnus Roos, and Jorg Rothe. Computational complexity of two variants of the possible winner problem. In Proc. 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 853–860, 2011. [CLMM10] Yann Chevaleyre, J´erome Lang, Nicolas Maudet, and J´erome Monnot. Possible winners when new candidates are added: The case of scoring rules. In Proc. Inter- national Conference on Artificial Intelligence (AAAI), pages 762–767, 2010. [DM17] Palash Dey and Neeldhara Misra. On the exact amount of missing information that makes finding possible winners hard. In Proc. 42nd International Symposium on Mathematical Foundations of Computer Science, 2017. [DMN15] Palash Dey, Neeldhara Misra, and Y. Narahari. Detecting possible manipulators in elections. In Proc. 2015 International Conference on Autonomous Agents and Mul- tiagent Systems, AAMAS 2015, Istanbul, Turkey, May 4-8, 2015, pages 1441–1450, 2015. [DMN16a] Palash Dey, Neeldhara Misra, and Y. Narahari. Complexity of manipulation with partial information in voting. In Proc. Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July 2016, pages 229– 235, 2016. [DMN16b] Palash Dey, Neeldhara Misra, and Y. Narahari. Kernelization complexity of possi- ble winner and coalitional manipulation problems in voting. Theor. Comput. Sci., 616:111–125, 2016. [DMN17] Palash Dey, Neeldhara Misra, and Y. Narahari. Frugal bribery in voting. Theor. Comput. Sci., 676:15–32, 2017. [FKS03] Ronald Fagin, Ravi Kumar, and D. Sivakumar. Efficient similarity search and classi- fication via rank aggregation. In Proc. 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD '03, pages 301–312, New York, NY, USA, 2003. ACM. 18 [FRRS14] Piotr Faliszewski, Yannick Reisch, Jorg Rothe, and Lena Schend. Complexity of manipulation, bribery, and campaign management in bucklin and fallback voting. In Proc. 13th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pages 1357–1358. International Foundation for Autonomous Agents and Multiagent Systems, 2014. [GJ79] [KL05] [LB11] Michael R Garey and David S Johnson. Computers and Intractability, volume 174. freeman New York, 1979. Kathrin Konczak and J´erome Lang. Voting procedures with incomplete preferences. In Proc. International Joint Conference on Artificial Intelligence-05 Multidisciplinary Workshop on Advances in Preference Handling, volume 20, 2005. Tyler Lu and Craig Boutilier. Robust approximation and incremental elicitation in voting protocols. In Proc. 22nd International Joint Conference on Artificial Intelligence (IJCAI), pages 287–293, 2011. [LPR+07] J´erome Lang, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable, and Toby Walsh. Winner determination in sequential majority voting. In Proc. 20th Interna- tional Joint Conference on Artificial Intelligence (IJCAI), volume 7, pages 1372–1377, 2007. [LPR+12] J´erome Lang, Maria Silvia Pini, Francesca Rossi, Domenico Salvagnin, Kristen Brent Venable, and Toby Walsh. Winner determination in voting trees with incomplete preferences and weighted votes. Auton. Agent Multi Agent Syst., 25(1):130–157, 2012. [MBC+16] Herv´e Moulin, Felix Brandt, Vincent Conitzer, Ulle Endriss, J´erome Lang, and Ariel D Procaccia. Handbook of Computational Social Choice. Cambridge Univer- sity Press, 2016. [PHG00] David M. Pennock, Eric Horvitz, and C. Lee Giles. Social choice theory and rec- ommender systems: Analysis of the axiomatic foundations of collaborative filtering. In Proc. Seventeenth National Conference on Artificial Intelligence and Twelfth Confer- ence on on Innovative Applications of Artificial Intelligence, July 30 - August 3, 2000, Austin, Texas, USA., pages 729–734, 2000. [PR07] Ariel D. Procaccia and Jeffrey S. Rosenschein. Junta distributions and the average- case complexity of manipulating elections. J. Artif. Intell. Res., 28:157–181, 2007. [PRVW07] Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable, and Toby Walsh. Incom- pleteness and incomparability in preference aggregation. In Proc. 20nd International Joint Conference on Artificial Intelligence (IJCAI), volume 7, pages 1464–1469, 2007. [Wal07] Toby Walsh. Uncertainty in preference elicitation and aggregation. In Proc. Interna- tional Conference on Artificial Intelligence (AAAI), volume 22, pages 3–8, 2007. [XC11] Lirong Xia and Vincent Conitzer. Determining possible and necessary winners under common voting rules given partial orders. J. Artif. Intell. Res., 41(2):25–67, 2011. 19
1909.11650
1
1909
2019-09-25T17:54:03
Explaining Agent-Based Financial Market Simulation
[ "cs.MA", "q-fin.TR" ]
This paper is intended to explain, in simple terms, some of the mechanisms and agents common to multiagent financial market simulations. We first discuss the necessity to include an exogenous price time series ("the fundamental value") for each asset and three methods for generating that series. We then illustrate one process by which a Bayesian agent may receive limited observations of the fundamental series and estimate its current and future values. Finally, we present two such agents widely examined in the literature, the Zero Intelligence agent and the Heuristic Belief Learning agent, which implement different approaches to order placement.
cs.MA
cs
EXPLAINING AGENT-BASED FINANCIAL MARKET SIMULATION A PREPRINT David Byrd School of Interactive Computing Georgia Institute of Technology Atlanta, GA 30308 [email protected] September 26, 2019 ABSTRACT This paper is intended to explain, in simple terms, some of the mechanisms and agents common to multiagent financial market simulations. We first discuss the necessity to include an exogenous price time series ("the fundamental value") for each asset and three methods for generating that series. We then illustrate one process by which a Bayesian agent may receive limited observations of the fundamental series and estimate its current and future values. Finally, we present two such agents widely examined in the literature, the Zero Intelligence agent and the Heuristic Belief Learning agent, which implement different approaches to order placement. The True Fundamental Value Times Series A common feature of agent-based financial simulation is the presence of an exogenous (defined: "derived from ex- ternal factors") price time series, representing some global consensus value for an asset at any time, arising from the accumulation of all available news and information which could influence the valuation of the asset. A simple intuition for the need of such an extrinsic value can be obtained by its omission. Imagine a simulated stock entering its opening auction period, such that there is not yet a limit order book to examine. In the absence of an extrinsic value of some kind, what would cause market agents to place bids or offers with any particular limit price? We could imagine using the prior day's closing price as an anchor, but then what about the first day? There must be some concept of "what this company is really worth" for at least some of the market participants, or there is no reason for the stock to trade in the $5 range versus the $5,000 range. In real-world terms, we can imagine consultation of this extrinsic series to be the distinguishing factor between value investors versus purely technical traders. This "fundamental value series" requires an omniscient perspective that is not available to any market participant. Thus at best, market participants may obtain a noisy observation of this value at some particular point in time. This paper focuses on the set of mean-reverting fundamental value series with characteristics as described in Section 3 of Chakraborty and Kearns [1]. Properties of the Fundamental Intuitively, think of the fundamental as a consensus valuation of all people everywhere that somehow reflects the "real" value of a company. This value changes over time in response to events, and of course no one can ever know precisely what the global consensus value is. • There is exactly one fundamental value time series for each equity in the simulation. • It is a property of the equity and does not vary per agent. • It is predetermined; agent actions do not affect it. A PREPRINT - SEPTEMBER 26, 2019 Most any type of numeric time series data can serve as a fundamental value series for an equity. For example, one could simply use historical market data. We consider three possibilities: a discrete mean reverting series, a continuous mean reverting series based on the Ornstein-Uhlenbeck process, and a modification of that OU process with "megashock events". Discrete Mean Reverting Fundamental We first consider a discrete mean reverting fundamental time series as presented in Section 4 of Wah et al. [2] In this case, the fundamental value series for an equity is defined at all times t ∈ [0, T ] by: rt = max{0, κ¯r + (1 − κ)rt−1 + ut}; r0 = ¯r The mean fundamental value for an equity (¯r) is chosen as part of experimental configuration. The fundamental value series r begins at this mean (r0 = ¯r) and is never allowed to become negative. At each time step t ∈ [0, T ], the series makes a single-step reversion to the mean using parameter κ ∈ [0, 1], the mean reversion rate. This functions similarly to the learning rate in many machine learning algorithms: α × new_value + (1 − α) × old_value. Here, new_value is just ¯r (to produce mean reversion). Thus the series is always drifting back toward the mean at a predictable rate, faster for high κ and slower for low κ. If κ = 0, of course, the time series does not revert to the mean. So far this looks very unlike a stock price. When the price deviates from the mean, it slowly and predictably returns to the mean, then stays there forever. In fact, nothing thus far would make it leave the mean in the first place. Enter ut ∼ N (0, σ2 s ), the "shock variance". This is a random number drawn at each time step t to perturb the otherwise completely predictable fundamental value series. It erratically pushes the series around (including away from the mean) to introduce noise into the price series and create a random walk. Important: This ut "noise" is part of producing the single, true fundamental value series for an equity. This is not the observation noise experienced by agents. Agents are sometimes required to infer the fixed parameters of the mean reverting fundamental, but for simplicity it is often assumed that agents have become "tuned" to their environment. In either case, agents do know the above equations, but do not know the true fundamental value after time t = 0, because of the random draws for ut. In the "tuned" case, agents additionally know that ut ∼ N (0, σ2 s ), and know the correct values for ¯r, κ, and σ2 s . Ornstein-Uhlenbeck Process Fundamental We next consider a continuous mean reverting time series as the fundamental, based on the Ornstein-Uhlenbeck (OU) Process as described in Section 3.1 of Chakraborty and Kearns. [1] A potential weakness in the discrete mean reverting series is that it must be computed at every discrete time step, in order, for t ∈ [0, T ]. Time steps at which no agent activity occurs must still be evaluated to obtain future values. If there are many time steps, and agents tend to arrive at the market infrequently, this can become a significant computational burden for the simulation. The OU Process, with values represented by Q, has the advantage that Qt can be computed for any future time t, given value Q0. Because OU has the Markov property (i.e. Qt+1 is conditionally independent of Qt−1 given Qt) and Qt is normally distributed, we can determine the expectation and variance of Qt and obtain the value by sampling, without computing any of the values "in between". In the case of sparse agent arrivals, this can save considerable computation effort for the simulation. The OU process requires similar parameters and values to the discrete mean reverting process. The equivalent discrete series parameter is given in parenthesis after each OU compoment. Specifically, the OU process requires a mean fundamental µ (equiv: ¯r), a prior value Q0 (equiv: rt−1), a mean reversion rate γ (equiv: κ), and a volatility value σ (equiv: σ2 s ). 2 A PREPRINT - SEPTEMBER 26, 2019 The value Qt of the OU process at time t can then be sampled from a normal distribution with mean: µ+(Q0 −µ)e−γt, and variance: σ2 2γ (1 − e−2γt). Like the discrete mean reverting process, the OU process can only move away from the mean through its volatility value. If this value is kept small to represent high-frequency "noise" in the process, both processes will appear as essentially single-scale accumulating white noise around the fundamental mean, and will not look very much like a plot of, for example, a day of real transactions (or quotes) for some equity traded on a US exchange. Megashock OU Fundamental To obtain the simulation computation time improvements of the OU Process Fundamental, while producing a se- ries that looks more like a real market equity price time series, we introduce the concept of "megashock events". Megashock events are intended to represent extrinsic news of a substantial nature that occur relatively infrequently, but have the potential to significantly alter the consensus valuation of a stock. In technical terms, megashock events are layered on top of the preliminary OU fundamental, arriving via a Poisson process, and are drawn from a bimodal distribution with mean zero. Each sub-distribution is a Gaussian with mean significantly different from zero, and a high variance relative to the OU process base variance. The sub-distributions are centered in positive and negative territory with mean equally far from zero, producing the desired overall mean zero for the bimodal distribution. Estimating the Final Fundamental Value In the simulation described in Wang and Wellman [3], agents attempt to maximize the value of their portfolio at the end of the simulation relative to the final fundamental value. This is what the closing price "should" be. It is not the same as marking to market. Regardless, predicting this final fundamental value is an important part of making trading decisions. The agents arrive according to a Poisson distribution and a discrete mean reverting process is used for the fundamental. Assume some agent wakes at time t and receives new (noisy) fundamental observation ot. This observation is unique to each agent with ot = rt + nt, where rt is the true fundamental value and nt is random observation noise drawn from N (0, σ2 n). The agent does know σ2 n. The agent maintains an estimate rt of the current fundamental value rt, and an estimated variance σ2 Important: Again, σ2 (or loosely an "inverse confidence"), not an estimate of any market or simulation parameter. t is the agent estimating the variance of its rt estimate. Thus, σ2 t of this estimate. t is like an internal error metric Let t′ be the last time the agent woke. At that time, it had some estimates (rt′ and σt′ ) of rt′ and its own estimation error. First it must mentally advance time from t′ to t. With no observations while asleep, it can only apply mean reversion at each time step: rt′ ← (1 − (1 − κ)δ)¯r + (1 − κ)δ rt′ In the above update, δ = t − t′, the number of time steps since the agent last woke. Note that with δ = 1, it is exactly the mean reversion equation used to compute the true fundamental value series rt, except: the agent does not know rt−1 and so uses its previous estimate rt′ instead, and the agent does not know the random perturbations ut and so uses the known mean value of zero instead. With δ > 1, this is equivalent to applying mean reversion δ times. The first time the agent wakes, its previous wake time is effectively t′ = 0. Thus it should assume rt′ = ¯r, as it knows the value of ¯r and that r0 = ¯r. To complete the advancement of time from t′ to t, the agent must also update its internal error estimate σt′ , which is initially zero. It does so as follows: 1 − (1 − κ)2δ 1 − (1 − κ)2 σ2 This update is a weighted mixture of the previous internal error estimate σ2 term for shock variance σ2 t′ ← (1 − κ)2δ σ2 σ2 s . The weight s starts at 1 when δ = 1 and increases with δ. The weight term for previous internal error t′ and the shock variance σ2 t′ + s 3 A PREPRINT - SEPTEMBER 26, 2019 estimate σ2 the more time that has passed since the agent's last observation, the more weight is placed on shock variance σ2 the less weight is placed on the prior error estimate σ2 t′ . t′ starts at (1 − κ)2 when δ = 1 and decreases as δ increases. Thus when computing the new error estimate, s and Having now advanced time from t′ to t, the agent must apply its new observation ot. This process is not unlike a Dynamic Bayes Network, in which the agent alternates stepping forward in time (transition model) and applying new evidence (sensor model). The current estimate of the fundamental value is a weighted combination of the prior estimate with the new observation: rt = σ2 n n + σ2 σ2 t′ rt′ + σ2 t′ n + σ2 σ2 t′ ot The weights are simply the observation noise σ2 t′ , normalized to sum to one. The observation noise weights the agent's prior estimate of fundamental value rt′ and the internal error estimate weights the new observation ot. n and the agent's internal estimate of its error σ2 Important: The above weights are reversed from what might be initially expected. This is appropriate because a higher variance term is resulting in a higher weight, which is the opposite of what we would want, so we switch the weights. The higher our estimation of our internal error, the more weight we put on the new observation. The higher the observation noise, the more weight we put on our previous estimates. The agent must also finish updating its internal error estimate for use the next time it wakes: σ2 t = n σ2 σ2 t′ n + σ2 σ2 t′ Similarly to applying the new observation to rt, here we apply one "step" of the observation noise σ2 nal error estimate σ2 "certainty") but with higher observation noise, this effect is diminished. n to our inter- t . Making an observation of course tends to reduce our internal error estimate (or increase our The agent now has updated estimates rt and σ2 t for the current fundamental value and its internal error estimation. At last, it can compute rt, the final fundamental value rT as estimated at current time t. Having no future observations (past time t) it can only advance time as before: rt ← (1 − (1 − κ)T −t)¯r + (1 − κ)T −trt This matches the previous "time advancement" process with δ = T − t, the number of time steps remaining in the simulation. Again the agent must assume the random perturbations ut take on their mean value of zero. Now the agent can use its estimate of the final fundamental value (or what the closing price should be) to make its trading decisions. Note that the above estimation method is not substantially different when the fundamental follows the OU process, because the two processes map very closely. Agent Preferences It is important that each agent have individual preferences for holding certain quantities of stock, as we would want each agent to behave differently even without forcing arbitrary randomness into the decision process. In the real world, independent of any "consensus value" for INTC, some people will just really want to own Intel. Here we describe the method as put forth in Wah and Wellman. [2] These preferences are codified as a vector of incremental private values placed on the acquisition or release of one additional unit of stock, given the agent's current holdings. If qmax is the holding limit, then the preferences for trading agent i are the elements θq i in: Θi = (θ−qmax +1 i , . . . , θ0 i , θ1 i , . . . , θqmax i ) where q is the quantity of stock currently held. Θi is drawn randomly from N (0, σ2 P V is a selected experimental parameter. The values are sorted in descending order, ensuring that each additional unit of stock acquired is valued less than the one before it. P V ), where σ2 4 A PREPRINT - SEPTEMBER 26, 2019 For example, consider a private value vector for some particular agent: Θq = (0.5, 0.3, 0.2, 0.1, −0.2, −0.4) for q ∈ [−2, 3], and assume this agent's rt estimate of the final fundamental value is 100. Since each agent's total valuation for its qth unit of stock is rt + θq, we can compute the following total valuations: V q = (100.5, 100.3, 100.2, 100.1, 99.8, 99.6) If the agent currently holds zero units of stock, it would pay (see caveat in next paragraph) $100.10 to go long one unit, or demand $100.20 to go short one unit. If the agent is currently short two units, it would pay $100.30 to buy back a unit, or demand $100.50 to sell another unit. If the agent is long two units, it would pay $99.60 to buy a third unit, or require $99.80 to sell a unit. It is this total valuation of a unit (incremental private preference plus estimated final fundamental value) that governs each trader's limit prices on its orders. However an agent should not bid/offer exactly the limit prices listed above, as that would result in zero surplus (gain) versus its valuation. Instead it will shade its bids lower or offers higher to ensure a positive surplus if the order is filled. Zero Intelligence Agent The Zero Intelligence (ZI) agent has been a part of the financial literature from at least 1993, when Gode and Sunder studied the allocative efficiency of constrained or unconstrained ZI agents with that of a population of human traders, finding that efficiency arose as a consequence of market structure rather than human intelligence or motivation. [4] Today, the term Zero Intelligence (or Zero Intelligence Plus) is extended to more complex agents, so long as they place orders priced substantially at random, at times selected substantially at random, and do not possess significant memory, intelligence, or visibility into the order stream. Here we again describe the particular flavor of ZI agent used in Wah and Wellman. [2] We note that these agents are not strictly zero intelligence, because they (1) do observe the current best bid or ask as part of a final rejection process when placing an order and (2) the same agent arrives at the market multiple times, versus only once in "classic" ZI. Upon waking, a ZI trader cancels any outstanding order and places a new, single-unit limit order with equal probability to buy or sell. The total valuation used by a ZI trader for stock unit q is always as explained in the previous section: rt + θq. If the ZI agent currently holds q units, then it could contemplate selling unit q with valuation rt + θq or buying unit q + 1 with valuation rt + θq+1 . i To ensure a surplus (gain) from the trade, the agent must shade its limit prices away from this valuation, as pricing at the valuation would produce zero net gain even if the order is executed. Bids are shaded downward (bid less than your valuation) and asks are shaded upward (ask more than your valuation). Call the trader's total valuation for the share in question v. The range [Rmin, Rmax] represents the minimum and maximum surplus (gain) the agent will demand on a filled order. The agent draws a random number R, called the requested surplus, from that range. R is the difference between the agent's total valuation of the stock unit and the "shaded" limit price it actually offers. The agent will gain R surplus if the order trades, or nothing if it does not. Thus the limit price is v − R if buying, and v + R if selling. This particular (Wah and Wellman [2]) agent also has a specified experimental parameter η ∈ [0, 1] called the "strategic threshold". If an agent can immediately secure an executed surplus (gain) of ηR by taking the current best bid or offer, it will do that instead of placing the order previously described. Shortcoming: Note that the ZI agent selected a "requested surplus" R at random with some fixed parameter range. This may well result in its order not being executed at all (too far from the spread). This is the problem solved by the Heuristic Belief Learner (HBL) agent, which improves overall performance by estimating the likelihood that any particular limit price will successfully trade, therefore allowing it to bid less or ask more without too badly damaging the odds that the order will be filled. 5 A PREPRINT - SEPTEMBER 26, 2019 Example of ZI Limit Price Determination Here we extend the private and total valuations example from the Agent Preferences section, using private value vector: and total value vector: Θq = (0.5, 0.3, 0.2, 0.1, −0.2, −0.4) V q = (100.5, 100.3, 100.2, 100.1, 99.8, 99.6) for q ∈ [−2, 3], and assuming rt = 100 as before. An agent holds (long) q = 1 unit of stock. It has been randomly selected to buy on this market arrival. The agent estimates the final fundamental at 100. Its private valuation for stock unit q + 1 = 2 is −0.20, thus its total valuation for stock unit 2, buying one unit while already holding one unit, is 99.8. Assume Rmin = 0.1 and Rmax = 0.5. This means the agent will place orders with limit prices chosen to achieve at least 10 cents gain (for one unit) but no more than 50 cents gain relative to its total valuation of the stock unit. Assume the agent randomly selects R to be 0.25 this time. Since the agent is buying, its BID limit price will be 99.8 − 0.25 = 99.55, which will net a gain of 0.25 if the order is filled. The strategic threshold η could cause the agent not to place the above order. Assume η = 0.5, meaning the agent will accept one-half of its desired gain if the order can be executed immediately. If the agent can get at least ηR = 0.5(0.25) = 0.125 by accepting the current best offer, it will do that. In this example, if the best offer is at most 99.67, the agent will place a bid to trade with that offer. Otherwise, it will place the bid with limit price 99.55 as planned. Heuristic Belief Learning Agent GD [5], named for its authors Gjerstad and Dickhaut, is at the root of a family tree of strategies that maintain a belief function representing the probability that a particular auction bid will be accepted based on its price. Heuristic Belief Learning (HBL) is the name used for a generalized form of GD presented later by Gjerstad. [6] Here we present HBL as described in Wang and Wellman. [3] These HBL agents work exactly like the previously described ZI agents (having private preferences, arriving according to a Poisson distribution, estimating the final fundamental value, etc) except as noted herein. Using its belief function (likelihood of bid success conditioned on price), an HBL agent places the bid that maximizes expected surplus, which accounts for both the surplus if the bid is accepted and the likelihood the bid will be accepted. This belief function is constructed from an accurately observed history of all bids (accepted or rejected) leading to the last L (memory length) transactions. In the context of a more complex market with an order book that allows delayed execution and order cancellation, we can instead estimate the probability that a limit order will be successfully transacted within some maximum time period based on its limit price. Important: This belief function has nothing to do with price prediction, nothing to do with the "true value" of an item, and nothing to do with the profitability of a transaction. It simply asks: "If I were to place a bid at this price, what are the odds I would receive the item I bid on?" GD and HBL are considered heuristic agents because, as we will see, their estimation of bid success probability uses an arbitrary (but intuitive) formulation. Intuitive Formulation of HBL Success Likelihood Estimation At any given time, the HBL agent can use its memory of observed limit orders and their results to estimate the probability of a successful transaction given any observed price. If the HBL wished to buy, we could construct a simple ratio of successful to unsuccessful bids at exactly the proposed limit price p, but this ratio is unbounded and we want a probability. Normalizing the denominator restricts the range to [0, 1] and permits our desired interpretation: P r(p) = Sp Sp + Up 6 A PREPRINT - SEPTEMBER 26, 2019 where Sp is the number of successful bid orders at price p, and Up is the number of unsuccessful bid orders at price p. The agent thus asks: "Of all bids at price p, what proportion were successful?" This approach has an obvious limitation: data sparsity. If there have been ten unsuccessful bids at p = 5, ten successful bids at p = 7, and ten successful bids at p = 9, the value P r(8) = 0 0+0 is undefined. If we extend S and U to include bids equal or less than p: P r(p) = S≤p S≤p + U≤p the agent now asks: "Of all bids at or below price p, what proportion were successful?". Now P r(8) = 10 which is at least something. 10+10 = 0.5, Including unsuccessful bids at prices lower than our proposed price is unhelpful, though. If we are offering 8, why should failed bids at 5 affect our estimation of success? P r(8) = 0.5 seems unrealistic; all bids at p = 7 were accepted! Instead, we should evaluate successful bids at or below p, but unsuccessful bids at or above p. The agent now considers two different factors: "How many bids succeeded offering no more than this?" and "How many bids failed despite offering at least this much?" P r(p) = S≤p S≤p + U≥p We now appropriately disregard the failed bids at 5, because we are offering more than that, and estimate P r(8) = 10+0 = 1, because we have never observed the failure of a bid with a price of at least 8. 10 There is still one problem. Orders in our type of auction can be cancelled. Consider the ten unsuccessful bids at p = 5. Were they unsuccessful because there has never been an ask at p <= 5? Or were they merely unlucky, and there have been offers that low, but not at the same time as those bids? In the second case, our estimation of P r(5) should be greater than zero, because although no bid succeeded, one clearly could have. Our agent also has limited memory. What if it should happen that within this memory, there were no bids at or below p (successful or not), but there were ask orders below p? Our heuristic might end up zero or undefined, when again, the chance of fulfillment is near certain due to the volume of unmatched ask orders. Generally speaking then, the volume of asks in our considered price range (<= p) should be a factor. In addition to considering bids and their success rate, the more shares that have been available at or below p, the more likely we are to succeed with a bid at p. The fewer shares that have been available, the less likely we are to succeed. Thus we arrive at the final formulation for the HBL agent's heuristic estimation of success, with this rough interpreta- tion: "Seeing ask order volume, or successful bid orders, at prices no more than p increases the likelihood of success. Seeing unsuccessful bid orders at prices of at least p decreases the likelihood of success." The ratio is formalized and normalized as: P r(p) = A≤p + S≤p A≤p + S≤p + U≥p where A≤p is the total number of ask orders at price p or lower, S≤p is the number of successful bid orders at price p or lower, and U≥p is the number of unsuccessful bid orders at price p or higher. The heuristic calculation is exactly mirrored when the agent considers selling a unit. The agent can now estimate the probability of success for any candidate limit order price p. If it is desired to estimate probability for all possible prices without bound, cubic spline interpolation can be employed as suggested by Wang and Wellman. [3] 7 A PREPRINT - SEPTEMBER 26, 2019 HBL Considerations and Strategy In a market with an order book, orders are almost never rejected. They simply enter the order book to await a later match. The HBL, though, depends on the idea of rejected or unsuccessful orders. A simple approach to this problem would be to place a time limit on each order. If the order is not matched within this time limit, it is considered unsuccessful. The approach taken by Wang and Wellman is a little more complex. [3] They define a grace period relative to the frequency of trader arrivals (the Poisson distribution mentioned earlier). An order is considered rejected if it existed in the order book for a length of time greater than the grace period. All orders not accepted immediately are considered "partially rejected" and assigned a fractional weight depending on the length of time they spent in the order book. The HBL agent selects the limit price that maximizes expected surplus, where surplus is simply the difference between the limit price p and the agent's total valuation of a share (see "Agent Preferences"), and expected surplus is the same, weighted by the probability of successful transaction computed in the previous section. For example, an HBL agent contemplating buying unit q + 1 would consider total valuation rt + θq+1 and estimation of successful transaction P r(p), and select its optimal bid p∗ as: i , limit price p, p∗ = argmaxp(rt + θq+1 i − p)P r(p) Anytime the HBL agent does not have enough information to enact the above strategy, it temporarily behaves as a ZI agent instead. Limitation: HBL assumes the agent can observe a complete order stream from all agents, including order execution (even if delayed), cancellation, and the length of time each order was "alive" in the order book. This may not be practical in many environments. HBL Limit Price Example Here we reuse the private and total valuations example from the Example of ZI Limit Price Determination section, using private value vector: and total value vector: Θq = (0.5, 0.3, 0.2, 0.1, −0.2, −0.4) V q = (100.5, 100.3, 100.2, 100.1, 99.8, 99.6) for q ∈ [−2, 3], and assuming rt = 100 as before. An agent is short one unit of stock (q = −1). It has been randomly selected to buy on this market arrival. The agent estimates the final fundamental at 100. Its private valuation for stock unit q + 1 = 0 is 0.20, thus its total valuation for stock unit 0, buying one unit while being short one unit, is 100.2. Assume the HBL agent has access to the following order memory of length L = 4, with superscripts denoting pairs of matched orders, and that no orders were cancelled: Transaction 1 ASK 100.01 99.8 BID ASK 100.34 99.6 BID BID 100.01 Transaction 2 ASK 100.22 BID 100.0 ASK 100.3 BID 100.13 BID 100.22 Transaction 3 BID 100.1 99.93 ASK Transaction 4 BID 100.2 ASK 100.4 BID 100.44 8 The agent can compute the estimated probability of transaction for a proposed limit price p as described in the previous section: A PREPRINT - SEPTEMBER 26, 2019 P r(100.5) = P r(100.4) = P r(100.3) = P r(100.2) = P r(100.1) = 6 + 4 6 + 4 + 0 6 + 4 6 + 4 + 0 5 + 3 5 + 3 + 0 3 + 3 3 + 3 + 1 2 + 2 2 + 2 + 2 = 1 = 1 = 1 P r(100.0) = P r(99.9) = P r(99.8) = = 0.86 P r(99.7) = = 0.67 P r(99.6) = 2 + 1 2 + 1 + 3 1 + 0 1 + 0 + 3 0 + 0 0 + 0 + 4 0 + 0 0 + 0 + 4 0 + 0 0 + 0 + 5 = 0.50 = 0.25 = 0 = 0 = 0 Now the agent can use its total valuation, the proposed limit price, and the estimated probability of transaction to compute expected surplus E(s): E(sp = 100.5) = (100.2 − 100.5)(1) = −0.3 E(sp = 100.4) = (100.2 − 100.4)(1) = −0.2 E(sp = 100.3) = (100.2 − 100.3)(1) = −0.1 E(sp = 100.2) = (100.2 − 100.2)(0.86) = 0 E(sp = 100.1) = (100.2 − 100.1)(0.67) = 0.067 E(sp = 100.0) = (100.2 − 100.0)(0.5) = 0.1 E(sp = 99.9) = (100.2 − 99.9)(0.25) = 0.075 E(sp = 99.8) = (100.2 − 99.8)(0) = 0 E(sp = 99.7) = (100.2 − 99.7)(0) = 0 E(sp = 99.6) = (100.2 − 99.6)(0) = 0 Intuitively, the agent can see that any price above $100.2 would almost certainly be accepted, but the agent would lose money relative to its valuation of the stock unit. The agent would love to achieve the surpluses associated with prices less than $99.9, but it can guess that those bids would never transact. Only the prices p ∈ [99.9, 100.1] have a nonzero chance of transaction and a positive surplus if transacted. In this example, the agent will place a limit buy order at limit price p = 100.0, the price that produces the maximum expected surplus of $0.10. The ABIDES Simulator Our simulation platform, ABIDES (Agent-Based Interactive Discrete Event Simulation) provides the funda- including the novel "Megashock OU Fun- mental value series and agents discussed herein "out of the box", damental". [8] The ABIDES platform is available under a BSD-style license at https://github.com/abides-sim/abides. The distribution includes relevant example configurations which are further explained in the project's wiki at https://github.com/abides-sim/abides/wiki. [7] It also provides the ability to use real market data as the fundamental value series. The ABIDES simulator uses the OU process (plus megashock events) to provide a "sparse discrete" fundamental pro- cess that provides extremely fine time resolution (nanoseconds) while still permitting quick simulation of reasonable time scales (days) due to its ability to completely skip computation of time periods during which nothing happens. The Megashock OU fundamental additionally produces intraday time series that more closely resemble typical real-world intraday stock charts. The ABIDES implementation of Zero Intelligence agents reproduces the strategy described herein, including the strategic threshold parameter. The implementation of Heuristic Belief Learning agents treats an order as successful if any part of it is transacted within the observed order stream, and unsuccessful otherwise. 9 A PREPRINT - SEPTEMBER 26, 2019 Acknowledgements This material is based on research supported in part by the National Science Foundation under Grant no. 1741026, and by a JPMorgan AI Research Fellowship. References [1] Tanmoy Chakraborty and Michael Kearns. Market making and mean reversion. In Proceedings of the 12th ACM conference on Electronic commerce, pages 307 -- 314. ACM, 2011. [2] Elaine Wah, Mason Wright, and Michael P Wellman. Welfare effects of market making in continuous double auctions. Journal of Artificial Intelligence Research, 59:613 -- 650, 2017. [3] Xintong Wang and Michael P Wellman. Spoofing the limit order book: An agent-based model. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, pages 651 -- 659. International Foundation for Autonomous Agents and Multiagent Systems, 2017. [4] Dhananjay K Gode and Shyam Sunder. Allocative efficiency of markets with zero-intelligence traders: Market as a partial substitute for individual rationality. Journal of political economy, 101(1):119 -- 137, 1993. [5] Steven Gjerstad and John Dickhaut. Price formation in double auctions. Games and economic behavior, 22(1):1 -- 29, 1998. [6] Steven Gjerstad. The competitive market paradox. Journal of Economic Dynamics and Control, 31(5):1753 -- 1780, 2007. [7] David Byrd, Maria Hybinette, and Tucker Hybinette Balch. ABIDES: towards high-fidelity market simulation for AI research. CoRR, abs/1904.12066, 2019. [8] Tucker Hybinette Balch, Mahmoud Mahfouz, Joshua Lockhart, Maria Hybinette, and David Byrd. How to eval- arXiv preprint uate trading strategies: Single agent market replay or multiple agent interactive simulation? arXiv:1906.12010, 2019. 10
1905.13225
1
1905
2019-05-29T18:26:26
Modeling Theory of Mind in Multi-Agent Games Using Adaptive Feedback Control
[ "cs.MA", "cs.AI", "q-bio.NC", "stat.ML" ]
A major challenge in cognitive science and AI has been to understand how autonomous agents might acquire and predict behavioral and mental states of other agents in the course of complex social interactions. How does such an agent model the goals, beliefs, and actions of other agents it interacts with? What are the computational principles to model a Theory of Mind (ToM)? Deep learning approaches to address these questions fall short of a better understanding of the problem. In part, this is due to the black-box nature of deep networks, wherein computational mechanisms of ToM are not readily revealed. Here, we consider alternative hypotheses seeking to model how the brain might realize a ToM. In particular, we propose embodied and situated agent models based on distributed adaptive control theory to predict actions of other agents in five different game theoretic tasks (Harmony Game, Hawk-Dove, Stag-Hunt, Prisoner's Dilemma and Battle of the Exes). Our multi-layer control models implement top-down predictions from adaptive to reactive layers of control and bottom-up error feedback from reactive to adaptive layers. We test cooperative and competitive strategies among seven different agent models (cooperative, greedy, tit-for-tat, reinforcement-based, rational, predictive and other's-model agents). We show that, compared to pure reinforcement-based strategies, probabilistic learning agents modeled on rational, predictive and other's-model phenotypes perform better in game-theoretic metrics across tasks. Our autonomous multi-agent models capture systems-level processes underlying a ToM and highlight architectural principles of ToM from a control-theoretic perspective.
cs.MA
cs
Modeling Theory of Mind in Multi-Agent Games Using Adaptive Feedback Control Ismael T. Freirea,c,∗, Xerxes D. Arsiwallaa,b,c, Jordi-Ysard Puigb`oa,c, Paul Verschure a,b,c,d,∗ aInstitute for Bioengineering of Catalonia (IBEC), Barcelona, Spain bUniversitat Pompeu Fabra (UPF), Barcelona, Spain cBarcelona Institute of Science and Technology (BIST), Barcelona, Spain dCatalan Institution for Research and Advanced Studies (ICREA), Barcelona, Spain Abstract A major challenge in cognitive science and AI has been to understand how autonomous agents might acquire and predict behavioral and mental states of other agents in the course of complex social interactions. How does such an agent model the goals, beliefs, and actions of other agents it interacts with? What are the computational principles to model a Theory of Mind (ToM)? Deep learning approaches to address these questions fall short of a better understanding of the problem. In part, this is due to the black-box nature of deep networks, wherein computational mechanisms of ToM are not readily revealed. Here, we consider alternative hypotheses seeking to model how the brain might realize a ToM. In particular, we propose embodied and situated agent models based on distributed adaptive control theory to predict actions of other agents in five dif- ferent game theoretic tasks (Harmony Game, Hawk-Dove, Stag-Hunt, Prisoners Dilemma and Battle of the Exes). Our multi-layer control models implement top-down predictions from adaptive to reactive layers of control and bottom- up error feedback from reactive to adaptive layers. We test cooperative and competitive strategies among seven different agent models (cooperative, greedy, tit-for-tat, reinforcement-based, rational, predictive and other's-model agents). ∗ITF and XDA equally contributed to this work. Corresponding authors: ITF, PV Email addresses: [email protected] (Ismael T. Freire), [email protected] (Paul Verschure ) Preprint submitted to Artificial Intelligence June 3, 2019 We show that, compared to pure reinforcement-based strategies, probabilistic learning agents modeled on rational, predictive and other's-model phenotypes perform better in game-theoretic metrics across tasks. Our autonomous multi- agent models capture systems-level processes underlying a ToM and highlight architectural principles of ToM from a control-theoretic perspective. Keywords: Multi-Agent Systems, Cognitive Architectures, Theory of Mind, Game Theory, Reinforcement Learning 1. Introduction How do autonomous social agents model goals, beliefs and actions of other agents they interact with in complex social environments? This has long been a central question in cognitive science and philosophy of mind. It forms the basis of what is known as Theory of Mind (ToM), a long-standing problem in cognitive science concerned with how cognitive agents form predictions of mental and behavioral states of other agents in the course of social interactions [1, 2]. The precise mechanisms by which the brain achieves this capability is not entirely understood. Furthermore, how a ToM can be embodied in artificial agents is very relevant for the future course of artificial intelligence (AI), especially with respect to human-machine interactions. What can be said concerning architectural and computational principles necessary for a Theory of Mind? As a small step in that direction, we propose and validate control-based cognitive architectures to predict actions and models of other agents in five different game theoretic tasks. It is known that humans also use their ToM to attribute mental states, beliefs, and intentions to inanimate objects [3], suggesting that the same mech- anisms governing ToM may be integral to other aspects of human cognition. We argue that in order to understand both, how ToM is implemented in biological brains and how it may be modeled in artificial agents, one must first identify its architectural principles and constraints from biology. Several notable approaches addressing various aspects of this problem al- 2 ready exist, particularly, those based on artificial neural networks [4, 5]. Recent work in [6] on Machine Theory of Mind is one such example. This work pro- poses that some degree of theory of mind can be autonomously obtained from pure Reinforcement Learning (RL). However, the use of Black-Box Optimiza- tion algorithms, hinders the understanding one can obtain at the mechanistic level. Because BBO algorithms are able to approximate any complex function (as suggested for Long-Short Term Memory (LSTM)-based neural networks [7]), one cannot use that to decipher specific mechanisms that may underlie a ToM in these systems. Another interesting approach to ToM follows the work of [8, 9, 10, 11] which uses hierarchical Bayesian inference. These methods are cognitively-inspired and suggest the existence of a "psychology engine" in cognitive agents to pro- cess ToM computations. Nevertheless, the challenge for this approach remains explaining how the computational cost of running these models might be im- plemented in biological substrates of embodied and situated agents. A third approach to this problem follows from work on autonomous multi- agent models (see [12] for a recent survey). This approach has had its roots in statistical machine learning theory and robotics. It includes agent models ca- pable of policy reconstruction, type-classification, planning, recursive reasoning and group modeling. In a sense, this is closest to the approach we take in this work, even though, our models are grounded in cognitive control systems. Open challenges in the field of autonomous multi-agent systems include modeling fully embodied agents that operate with only partial observability of their environ- ment and are flexibly able to learn across tasks (including meta-learning), when interacting with multiple types of other agents. The cognitive agent models we propose here, advance earlier work on Control- based Reinforcement Learning (CRL) [13], where we studied the formation of social conventions in the Battle of the Exes game. The CRL model implements a feedback control loop handling the agent's reactive behaviors (pre-wired re- flexes), along with an adaptive layer that uses reinforcement learning to maxi- mize long-term reward. We showed that this model was able to simulate human 3 data in the above-mentioned coordination game. The new contribution of the current paper is to advance real-time learning and control strategies to model agents with specific phenotypes, that can learn to either model or predict the opposing agents actions. Using top-down predictions from the adaptive to reactive control layers and bottom-up error feedback from reactive to adaptive layers, we test cooperative and competitive strategies for seven different multi-agent behavioral models. The purpose of this study is to understand how the architectural assumptions behind each of these models impact agent performance across standard game-theoretic tasks, and what this implies for the development of an artificial embodied ToM. 2. Methods 2.1. Game Theoretic Tasks Benchmarks inspired by game theory are becoming standard in the multi- agent reinforcement learning literature [4, 5, 6, 14]. However, most of the work developed in this direction presents models that are tested in one single task or environment [15, 16, 17, 13, 18, 19], at best two [20, 21]. This raises a funda- mental question about how these models generalize to deal with a more general or diverse set of problems. Therefore, this approach does not readily enable one to extract principles and mechanisms or unravel the dynamics underlying human cooperation and social decision-making. In this work, we want to go a step further and propose a five-task benchmark for predictive models based on classic normal-form games extracted from Game Theory: the Prisoner's dilemma, the Harmony game, the Hawk-dove, the Stag- hunt and the Battle of the Exes. In its normal-form, games are depicted in a matrix that contains all the pos- sible combinations of actions that players can choose, along with its respective rewards. The most common among them are the dyadic games known as social dilemmas, in which players have to choose between two actions: cooperate or defect. One action (cooperate) is more generous and renders a good amount of 4 reward to each player if both choose it, but gives very poor results if the other player decides to defect. On the other hand, the second action (defect) provides a significant individual reward if its taken alone, but a very small one if both choose it. Although simple in nature, these dyadic games are able to model key ele- ments of social interaction, such as the tension between the benefit of a coop- erative action and the risk (or temptation) of free-riding. This feature can be described in a general form, such as: Cooperate Defect Cooperate Defect R, R T, S S, T P, P Table 1: A Social Dilemma in matrix-form This matrix represents the outcomes of all possible combination of actions between the row player and the column player. R stands for "reward for mutual cooperation"; T for "temptation of defecting"; S for the "sucker's payoff for non- reciprocated cooperation"; and P for "punishment for mutual defection". By manipulating the relationship between the values of this matrix, many different situations can be obtained that vary in terms of what would be an optimal solution (or Nash equilibria [22]). The Prisoner's Dilemma (table 2) represents the grim situation in which the temptation of defecting (T) is more rewarding that mutual cooperation (R), and the punishment for mutual defection (P) is still more beneficial than a failed attempt of cooperation (S). This relationship among the possible outcomes can be stated as T > R > P > S. Mutual defection is the only pure Nash equilibrium in this game since there is no possibility for any player to be better off by individually changing its own strategy. On the Stag-Hunt (table 3) we face a context in which mutual cooperation (R) gives better results and individual defection (T), but at the same time a failed cooperation (S) is worse than the punishment for mutual defection (P). In 5 this case, R > T > P > S, there are two Nash equilibria: mutual cooperation and mutual defection. Hawk-dove (table 4) presents a scenario in which temptation (T) is more rewarding than cooperation (R), but a mutual defection (P) is less desirable than non-reciprocated cooperation (S). So, for a relationship of T > R > S > P like this one, there are three Nash equilibria: two pure anti-coordination equilibrium, in which each player chooses always the opposite action of its opponent, and one mixed equilibrium, in which each player probabilistically chooses between the two pure strategies. The fourth type of social dilemma is the Harmony game (table 5). In this case (R > T > S > P ), the game has only one pure equilibrium, pure cooperation, since mutual cooperation (R) renders a better outcomes that the temptation to defect (T), and also the penalty for failing to cooperate (S) is less than the punishment for mutual defection (P). Finally, as the last game, we will introduce a coordination game, the Battle of the Exes [23, 24]. In this type of game, the main goal is to achieve coordi- nation between two players (either congruent coordination on the same action or incongruent coordination upon choosing different actions), since the failure to do so is heavily penalized (see table 6). Following the previous nomenclature applied in the social dilemmas, we could define this game as T > S; R, P = 0. This game has two pure-dominance equilibria, in which one player chooses the more rewarding action and the other the low rewarding action; and a turn- taking equilibrium, in which players alternate over time in choosing the more rewarding action. This selection of games provides enough variability to test how learning agents can perform across different contexts, so we avoid problems derived from over-fitting on a specific payoff distribution, or related to the possibility of a model to exploit/capitalize on certain features of a game that could not have been predicted beforehand. Moreover, a similar selection of games have been tested in human experiments, proving to be sufficient to classify a reduced set of behavioral phenotypes across games in human players [25, 26]. Using the above 6 Cooperate Defect Cooperate Defect Cooperate Defect 2, 2 3, 0 0, 3 1, 1 Cooperate Defect 2, 2 3, 1 1, 3 0, 0 Table 2: prisoner's dilemma Table 4: hawk-dove Cooperate Defect Cooperate Defect Cooperate Defect 3, 3 2, 0 0, 2 1, 1 Cooperate Defect 3, 3 2, 1 1, 2 0, 0 Table 3: stag-hunt Table 5: harmony game A B A 0, 0 1, 4 B 4, 1 0, 0 Table 6: battle of the exes games as benchmarks, below we describe the control-theoretic framework and seven agent models that capture phenotypes relevant for testing ToM capabili- ties across games. 2.2. Control-Based Reinforcement Learning Our starting point is the Control-based Reinforcement Learning (CRL) model presented in previous work [13]. The CRL is a biologically grounded cognitive model composed of two control layers (Reactive and Adaptive, see Figure 1), and based on the principles of the Distributed Adaptive Control (DAC) theory [27]. The Reactive Layer represents the agent's pre-wired reflexes and serves for real-time control of sensorimotor contingencies. The Adaptive Layer endows the agent with learning abilities that maximize long-term reward by choosing which action to perform in each round of the game. This layered structure allows for top-down and bottom-up interactions between the two layers [28], resulting in an optimal control at different time-scales: within each round of play and across 7 rounds [13]. Figure 1: A) Representation of the Control-based Reinforcement Learning (CRL) model. The top red box depicts the Adaptive Layer or the original CRL model, composed of an Actor- Critic Temporal-Difference (TD) learning algorithm. The bottom green box represents the Reactive layer, with its three sets of sensors, one for the 'cooperate' location (sC), one for the 'defect' location (sD), and one for the other agent (sA); the two reactive behaviors, "approach cooperate location" (fC), "approach defect location" (fD); and the two motors, one for the left wheel (ml) and one for the right wheel (mr). Between the two layers, the inhibitory function (i) regulates which reactive behaviors will be active depending on the action received from the Adaptive layer, while the error monitoring function (pe) manages the mismatch between the opponent's predicted behavior and the actual observation in real-time. The Reactive Layer is inspired by Valentino Braitenberg's Vehicles [29] and presents the intrinsic mechanic behaviors that are caused by a direct mapping between the sensors and the motors of the agent. The main one, "orienting to- wards rewards", is based on a cross excitatory connection and a direct inhibitory connection between the reward sensors and the two motors. This results in an approaching behavior in which the agents will turn towards a reward location increasingly faster the closer they detect it. Since the agents are equipped with two sets of sensors specifically tuned for detecting each reward location, they also have two instances of this reactive behavior, one for the 'cooperative' and 8 one for the 'individual' reward (see Figure 1 green box). The Adaptive Layer is in charge of prediction, learning, and decision-making. Each of the Agent Models described in the next section instantiates a different Adaptive layer. Its main role is to learn from previous experience and to decide at the beginning of each round which action the agent will take. When playing normal-form games, the Adaptive Layer receives as inputs the state of the en- vironment, which corresponds with the outcome of the last round of the game, and the reward obtained because of that final state. This information is used to produce an action as the output. The states S can be either 'R', 'S', 'T' or 'P' (see Table 1), and determines what is the reward that the agent will obtain based on the specific payoff matrix of the game being played. The actions A are two: "cooperate" or "defect". Depending on the action that the Adaptive Layer selects, there is a top-down selective inhibition that affects the reactive behaviors of the Reactive Layer. If the action selected is "cooperate", the "approach individual reward" reactive behavior is inhibited, thus focusing the agent's attention only on the cooperative reward and on the other agent. Conversely, if the action selected is "defect", the reactive behavior inhibited will be "approach cooperative reward". This mechanism aims to mimic how biological systems execute top-down control over a hierarchy of different control structures [30, 31, 32]. The error monitoring function works in real-time as a bottom-up mechanism that signals an error function from the Reactive layer sensors to the Adaptive layer decision-making module. The error signal is only triggered when the agent detects an inconsistency between its initial prediction of the opponent's action and the real-time data obtained by its sensors. If a prediction error occurs, the error monitoring function will update the current state of the agent and this will make the decision-making module output a new action. Along with the top-down inhibitory control, this module is inspired by evidence from cognitive science about the role of bottom-up sensory stimuli in generating prediction errors [30, 33, 34]. 9 2.3. Agent Models 2.3.1. Original Model Figure 2: Representations of the Original model. Panel A shows a detailed representation of the algorithm components, as implemented in the Adaptive layer of the original implemen- tation of the CRL model [13]. Panel B shows a compressed representation showing only the inputs and outputs of that same model. The Original CRL model uses an Actor-Critic version of the Temporal- Difference (TD) learning algorithm [35] for maximizing long-term reward (see [13] for a detailed description of the implementation). In brief, the TD-learning algorithm selects an action according to a given policy P (a = ats = st−1) . Once a round of play is finished, the reward r(st) obtained by the agent will update the TD-error e signal, following: e(st) = r(st) + γVΠ(st) − VΠ(st−1) where γ is a discount factor and Vπ(st) = γr(st) is the Critic. Finally, the policy (or Actor) will be updated following Π(at, st−1) = Π(at, st−1) + δe(st−1), where δ is a learning rate that is set to 0.15. 2.3.2. Rational Model The Rational Model is a predictive model that represents an ideal perfectly- rational and self-interested player provided that its predictions are correct. Its function is to serve as a benchmark for the other predictive models since once it learns to predict its opponent's actions accurately, it will always respond auto- matically with the best response to that predicted action. It is composed of two main functions: a prediction module and a deterministic utility maximization function (see Figure 3). The first module tries to predict the next action of the opponent by using a TD-learning algorithm that uses the opponent's previous 10 Figure 3: Representation of the Rational Model. This model is composed of a predictive module (RL) that learns to predict the opponent's future action and a utility maximization function (U) that computes the action that yields the highest reward based on the opponent's predicted action. At the end of each round, the RL module is updated based on its prediction error. state as an input. Once the prediction is made, the second module calculates the action that will render the highest reward assuming that the opponent has chosen the predicted action. This predictive model uses the same TD-learning algorithm as the origi- nal, but substitutes the explicit reward for an implicit reward that comes from the error in predicting the other agent's action. We call this reward 'implicit' because is calculated internally and it is based on whether the action of the opponent was accurately predicted or not. That way, an accurate prediction will render a positive reward, while an incorrect one will receive a negative one. The implicit reward signal is calculated by the function: 1, if Aot = Aot − 1 −1, otherwise Ri = 2.3.3. Predictive Model (1) The Predictive model has two distinct RL modules: one that learns to predict and one that chooses an action based on that prediction (see Figure 4). The predictive RL algorithm is same as the one used by the Rational agent described above, so it also learns from the implicit reward obtained by Equation 1. The prediction generated at the beginning of each round by the predictive-RL is sent as an input to the second RL algorithm. This one, in turn, uses the combined 11 Figure 4: Representation of the Predictive Model. This model is composed of a predictive module (RL) that learns to predict the opponent's future action and a TD learning module (RL) that uses that prediction along with the previous state to learn the optimal policy. At the end of the round, the predictive-RL (green) is updated according to its error in the prediction. information of the opponent's predicted action and the state of the previous round to learn the optimal action. For its update function, the second RL algorithm uses the explicit reward obtained in that round of the game. 2.3.4. Other's Model Figure 5: Representation of the Other's-Model. This model is composed by two TD learning algorithms. The first one (left, blue) learns to predict the opponent's future action while the second (right, red) uses a that prediction to learn the optimal policy. The first algorithm is updated with the opponent's reward and the second with the agent's own reward. The Other's Model is also composed by RL algorithms, one predictive and one for learning the optimal policy (see Figure 5. Technically, the second RL module is identical to the one used by the Predictive model: it integrates both the previous state of the game and the opponent's predicted action in order to learn the optimal policy. However, it differs from the Predictive model in the way its first module is designed. In this case, the predictive-RL algorithm is 12 updated by the explicit reward that the opponent has obtained, in an attempt to create an internal model of the other agent's policy. At the functional level is very similar to the Predictive model, but with an important difference: while the Predictive model tries predict the opponent's action by focusing on its overt behavior, the Other's Model does it trying to learn the internal policy of its opponent. 2.3.5. Deterministic Agent Models In order to test the correct functioning of the predictive capacities of the ToM agents described above, we have developed a number of agents have a fixed behavior or policy. The first two represent two behavioral phenotypes observed in humans [25] while the third one is a classic benchmark of Game Theory [36]. 2.3.5.1. Greedy Agent Model. This model implements a simple behavioral strat- egy of pure self-utility maximization: it always chooses the action the renders the highest reward to itself, without taking into account the opponent's action. So for the games described in this work, it will always choose to 'defect' with the exception of the Stag-Hunt and the Harmony Game, where the cooperative reward can give a higher reward than the temptation to defect (R > T ). cooperate, def ect, πg = if R > T otherwise (2) 2.3.5.2. Cooperative / Nice Agent Model. As a deterministic counterpart of the Greedy model, the Nice model executes an even simpler deterministic strategy: it will always choose cooperation. πn = P (a = cooperatest) = 1 (3) 2.3.5.3. Tit-for-Tat Agent Model. This simple yet powerful strategy became popular in the famous Axelrod's tournament [37] where it won to all competing algorithms and strategies in a contest based on the Iterated Prisoner's Dilemma. 13 We have introduced this opponent because we expect that this agent will give problems to the predictive models. Tit-for-tat starts always by cooperating, and from then on it always chooses the last action made by its opponent. Since its capacity to switch actions does not depend on a specific policy, it cannot be learned by just taking into account variables such as its previous state or its reward. It can be described by the following equation, where aopponent is the action made by the opponent at t − 1: cooperate, if t = 0 aopponent(t − 1), otherwise πg = 2.4. Experimental Setup (4) First, we perform four different experiments in which we test the four learn- ing models described above (Original, Rational, Predictive, Other's-Model) in each of the five games described in section 2.1 (Prisoner's Dilemma, Hawk-Dove, Stag-Hunt, Harmony game and Battle of the Exes) and against opponents of different level of complexity (Greedy, Nice, Tit-for-tat and Original), resulting in a 4x5x4 experimental setup. This way, in experiment one, all models are tested against the Greedy agent; in experiment two, against the Nice agent; in experiment three, against the Tit- for-tat agent; and in experiment four, against the Original agent. In all experiments, each model plays 50 times each of the five games, during a total amount of 1000 rounds per iteration (i.e., 5 games, 50 dyads per game, 1000 rounds per dyad). On each iteration, every model starts learning from scratch, with no previous training period. After that, we perform a fifth experiment to study in a real-time spatial version of the games, special cases in which the models encountered problems in the previous setting. So, in this first four experiments, we use the discrete- time version of the games, and for the fifth experiment, a real/continuous time version of the tasks. In the discrete-time version, both agents simultaneously choose an action at the beginning of each round. Immediately after that, the outcome of the round 14 is calculated and each agent receives a reward equal to the value stated in the payoff matrix of the game. In the continuous-time version, the two agents can choose to go to one of the two equally distant locations that represent the two actions of a 2-action matrix- form game (see Figure 6-B). In this version, agents also choose an action at the beginning of the round, but then they have to navigate towards the selected location until one of them reaches its destination. The real-time dimension of this implementation allows the possibility of changing the action during the course of the round as well as to receive feedback in real-time. Each round of the game begins with both agents in their initial positions, as shown in Figure 6-B. When the agents reach a reward location, the round ends, the rewards are distributed accordingly to the payoff matrix and the game restarts with the agents back in their starting positions. Figure 6: A) A top-down visualization of the agents used in the continuous version of the games. The green circles represent the location-specific sensors, and the red circles the agent- specific ones. The green lines that connect the location sensors with the wheels represent the Braitenberg-like excitatory and inhibitory connections. B) Image of initial conditions in the continuous/real-time spatial version of the tasks. The blue circles are the two agents facing each other (representing two ePuck robots viewed from the top). The big green circle represents the 'cooperate' reward location; the small green circle, the 'defect' reward. The white circles around each reward spot mark the threshold of the detection area. The agents of the continuous version are embodied in virtual ePuck robots (see 6-A. They are equipped with two motors (for the left and right wheels) 15 and three pairs of proximity sensors; one pair is specialized in detecting the other agent, and the other two in detecting the two distinct reward locations ('cooperate' or 'defect'). 3. Results In order to study the performance of the four agents (Original, Rational, Predictive and Other's-Model), we focus on three aspects of the interaction: Efficacy, Prediction Accuracy, and Stability. Efficacy tells us how competent the models were in obtaining rewards on average and in relation to each other. It's computed by calculating the mean score per game for each model. Stability measures how predictable the behavior was or, equivalently, whether the models converged to a common strategy or alternated between non-deterministic states. In other words, stability quanti- fies how predictable are the outcomes of the following rounds based on previous results by using the information-theoretic measure of surprisal (also known as self-information), which can be defined as the negative logarithm of the proba- bility of an event [38]. By computing the average surprisal value of a model over time, we can visually observe how much did it take for a model to converge to a stable strategy and for how long it was able to maintain it. Finally, Prediction Accuracy give us a better understanding of how well the predictive models were able to actually predict their opponent's behavior. It's measured by the average accumulated prediction error of each predictive model in each game. 3.1. Experiment 1: Against a deterministic-greedy agent The results of this experiment show that on average all models were equally effective since they obtained a similar amount of rewards (see Figure 7). The Rational model only achieves a slightly better performance than the rest in the Stag-hunt and the Harmony game, so this is a sign that the rest of the models were performing almost optimally. Of course, if we pay attention to the overall score obtained among the five games, we can observe a significant difference 16 Figure 7: Main results of the four behavioral models (Original, Rational, Predictive and Other's) against a Greedy agent. between the performance obtained by all models in the Harmony game and the Hawk-dove when compared to the other three games. This salient difference is not due to a malfunctioning of the predictive models, as we can see by the results in Stability and Prediction Accuracy. It is caused by the constraints imposed by the Greedy opponent strategy in those games were T > R, since are the ones in which it always select to 'defect'. We see that all models learn to predict or to adapt their strategy to this opponent. In terms of surprisal, we can observe how Rational Agents outperforms all the other models. This result 17 is not surprising given the simplicity of the opponent's strategy. Against these simple predictable agents, we consider the Rational agent a reference point of optimal performance, against which the other models can be compared. In this line, a more significant result is that overall, both Predictive and Other's-Model converge to a stable state faster than the original model, who lacks the ability to predict the opponent's action. In terms of Prediction Accuracy, no significant difference is observed. 3.2. Experiment 2: Against a deterministic-nice agent Figure 8: Main results of the four behavioral models (Original, Rational, Predictive and Other's) against a Nice agent. The legend in the center applies to the left and middle columns. 18 In this experiment, the overall efficacy of all models has increased signifi- cantly compared to that of the previous experiment (see Figure 8). The ex- planation was again that all models were able to successfully learn the optimal policy against a simple deterministic strategy such as the one exhibited by the Nice agent. But in this case, the best response strategy against a Nice agent is the one that renders the highest possible benefit in all games, as opposed to the best response strategy against the Greedy model, that in many occasions was sub-optimal. In terms of surprisal, we see again how the Predictive and the Other's-Model perform slightly better than the Original. This time the dif- ference is smaller, but since predicting the opponent's behavior, in this case, is almost trivial, we don't find this result unexpected. Again we can also observe how the Original, the Predictive and the Other's-Model differ from optimal by comparing their convergence rate with that of the Rational agent. 3.3. Experiment 3: Against a Tit-for-tat agent The results of the models against the Tit-for-tat agent show a significant amount of variability in terms of efficacy (see Figure 9). The most remarkable result in this aspect is the superior efficacy of the non-predictive Original model in the Battle of the Exes. This model is able to beat the more complex predictive models in this case precisely because the predictive models are having problems to accurately predict the TFT agent. This accumulated error in prediction, in turn, drives their behavior toward a more unstable regime than the one achieved by the Original model. Moreover, given that this model has a more reduced state-space than the Predictive models and it only 'cares' about the previous state of the game, it capitalizes better than the rest on the anti-coordination structure of the Battle of the Exes. In terms of suprisal, predictive models perform better than the Original in the Prisoners Dilemma and in the Harmony game, but this result is reversed in the Stag-Hunt and the Hawk-Dove and the Battle of the Exes, where the Original reaches lower levels of surprisal. We can see how in the cases that the game has one pure Nash equilibrium (the Prisoner's dilemma and the Harmony 19 Figure 9: Main results of the four behavioral models (Original, Rational, Predictive and Other's) against a TFT agent. game), the predictive models perform as well in terms of surprisal as against the simpler deterministic agents studied before. However, in games with a wider variety of equilibria such as the Stag-hunt or the Hawk-dove, predictive models have overall more difficulties to fall into a stable state with the TFT opponent Finally, the most salient feature regarding the resutls of Prediction accuracy are the elevated accumulation of errors of the Rational model in the Stag-Hunt and the Battle of the Exes, that almost reach 50%. These results may seem counter-intuitive, but actually, they highlight one of the weak points of the 20 predictive models and the strength of such a simple strategy. As stated in the model's description, the TFT agent selects its action based on the last action performed by its opponent, so attempting to predict a policy of such agent can become impossible for a predictive agent unless the dyad falls into an equilibrium state very soon or if the predictive agent was able to integrate it's own action into its prediction algorithm. 3.4. Experiment 4: Against the Original agent Figure 10: Mean results of the four behavioral models (Original, Rational, Predictive and Other's) against the Original agent. In this experiment, we also observe a similar performance of the models in 21 terms of their efficacy to obtain rewards, with the exception of the Battle of the Exes, where the Predictive an Other's-Model achieve the best results (see Figure 10. Remarkably, the Rational model is achieving a lower score than the rest. This is due to the fact that this model has fallen in a pure-dominance equilibrium with the Original model, where the best response for him is to perform the low- rewarding action. Again, in this case, the Original model capitalizes in the fact that is solely driven by its own self-utility maximization function, so it got the initiative to go to the higher-rewarding action faster than the Rational model. This, on the other hand, is predicting accurately and responding in the best optimal way to that accurate prediction. But in this case, this behavioral strategy makes it fall victim to the pure-dominance equilibrium enforced by its opponent. Regarding stability, the results show that overall the Predictive and the Other's-Model converge faster than the Original towards an equilibrium. In all cases, we can observe that these two predictive models fall in between the 'optimal' level of convergence of the Rational model and the more unstable level of the Original non-predictive model. The results of the Prediction accuracy show the worse overall performance of the four experiments studied so far. This, however, was an expected outcome since the predictive agents were facing a learning non-deterministic agent which is objectively more difficult to predict. 3.5. Experiment 5: Continuous-Time Dyads Figure 11: Results of a game played in the continuous/real-time version of the game compared to the same game played in discrete-time. As an additional control experiment, here we test whether specific instances 22 in experiment 3 above, where the Rational agent shows huge prediction errors against the TFT agent, are purely a result of the discrete-time nature of ballistic games, or similar errors against the TFT agent also repeat under continuous- time interactions involving real-time feedback. As shown in Figure 11, this issue of prediction errors is in fact solved under real-time conditions. This is because the Rational agent is now able to change its chosen course of action in real-time before the round ends. This significantly reduces the prediction error of the rational agent against the TFT agent and enables the former to choose a better strategy, which consequently, drives the dyad to a stable equilibrium. 4. Discussion This work demonstrates a novel control-based cognitive approach to au- tonomous multi-agent learning models, which combines adaptive feedback con- trol with reinforcement learning. Based on a layered-control architecture, we have designed and implemented agent models characterized by seven different behavioral phenotypes. This includes both, deterministic agents as well as prob- abilistic learning agents. The former includes cooperative, greedy and tit-for-tat agents, whereas, the latter includes a reinforcement learning, rational, predic- tive and other's-model agents. We tested these agent models in dyadic games against each other across five different game theory settings (Harmony game, Stag-Hunt, Hawk-Dove, Prisoner's Dilemma and Battle of the Exes). From human behavioral experiments, it is known that the scope of these games suf- ficiently encompasses behavioral phenotypes in human social decision-making [23, 25]. Our proposed agent models were designed and implemented with a view to simulating and understanding how cognitive agents learn and make de- cisions when interacting with other agents in social scenarios (in the context of the game-theoretic tasks stated above). Additionally, we also implemented our agent models as embodied ePuck robots. We tested these simulated robots within a spatial continuous version of the game involving real-time feedback. We showed that under fully embodied 23 and situated conditions, limitations encountered by agents in ballistic scenarios (such as lack of convergence to an optimal solution) can overcome. Our simu- lated robots are Braitenberg Vehicles equipped with sensors and fully embodied controllers (which are the proposed control-based learning modules). These agents are situated in the sense that they only have partial observability of the environment and other agents depending on their location and sensors during rounds. We found that pure reinforcement learning was inadequate in many tasks (as shown in performance metrics). On the other hand, agent models that predict actions or policies of opposing agents showed faster convergence to equilibria and increased performance. Interestingly, the rational agent (which knows what is the best action to take in each game and situation if the other's action is foreseen) outperforms others in many games. Our results show that agents using pure reinforcement-learning strategies are not optimal in most of the tested games. Additionally, upon examining human data obtained in the Battle of the Exes game by [23], we found (not shown in the results) that surprisal profiles of human players matched closest to our predictive and other's-model agents, rather than the rational or pure RL agents. Of particular significance is the result that our predictive and other's-model agents correctly learn to predict actions and policies respectively of the opposing agent across all games. This shows how autonomous, embodied and situated multi-agent systems can be equipped with simple theory of mind capabilities (in the context of the specified tasks). For future work, it might be interesting to equip our agents with meta-learning models, so that they may be able to choose which behavioral phenotype to enact in a given social scenario and flexibly switch in changing environments. Even though the different behavioral strategies modeled in this study consist some of the simplest building blocks of human behavior, it is by no means a complete list. Also, typical human behavior is not rigidly tied to a given model, but rather can flexibly shift between behavioral strategies. Model flexibility is definitely an important consideration for a ToM. Another issue that is relevant 24 for many real-world tasks is the cost or penalty of being engaged too often in less desirable outcomes such as ties or low rewards. In a sense, this could serve as an incentive to improve performance in complex tasks and should be taken into account in a ToM. Yet another typical human feature is trust. Humans tend to form social conventions by agreeing on simple rules or deals and forming a trust relation. At the moment, our models currently lack this ability to form teams that agree on collective goals and work cooperatively to achieve success. Finally, our control-based reinforcement learning architecture provides an interesting possibility to implement complex social behaviors on multi-agent robotic platforms, such as humanoid robots [39] or other socially intelligent ar- tificial systems. Another scientific domain that may benefit from the type of agent models described in this paper, is evolutionary dynamics; in particular, the evolution of cognitive and intelligent agents. Social interactions involving cooperation and competition are known to play a key role in many evolution- ary accounts of biological life and consciousness [40], [41]. Lastly, autonomous multi-agent models, of the type described above, with ToM capabilities, provide useful tools for modeling the dynamics of global socio-political and cultural phenomena. Acknowledgments The research leading to these results has received funding from the European Commissions Horizon 2020 socSMC project (socSMC-641321H2020) and by the European Research Councils CDAC project (ERC-2013-ADG341196). Additional information The authors declare that they have no competing interests. 25 References References [1] D. Premack, G. Woodruff, Does the chimpanzee have a theory of mind?, Behavioral and brain sciences 1 (4) (1978) 515 -- 526. [2] S. Baron-Cohen, A. M. Leslie, U. Frith, Does the autistic child have a theory of mind?, Cognition 21 (1) (1985) 37 -- 46. [3] D. Premack, The infant's theory of self-propelled objects, Cognition 36 (1) (1990) 1 -- 16. [4] M. Lanctot, V. Zambaldi, A. Gruslys, A. Lazaridou, K. Tuyls, J. P´erolat, D. Silver, T. Graepel, A unified game-theoretic approach to multiagent re- inforcement learning, in: Advances in Neural Information Processing Sys- tems, 2017, pp. 4190 -- 4203. [5] A. Lerer, A. Peysakhovich, Learning social conventions in markov games, arXiv preprint arXiv:1806.10071. [6] N. C. Rabinowitz, F. Perbet, H. F. Song, C. Zhang, S. Eslami, M. Botvinick, Machine theory of mind, arXiv preprint arXiv:1802.07740. [7] J. Schmidhuber, Deep learning in neural networks: An overview, Neural networks 61 (2015) 85 -- 117. [8] W. Yoshida, R. J. Dolan, K. J. Friston, Game theory of mind, PLoS com- putational biology 4 (12) (2008) e1000254. [9] C. Baker, R. Saxe, J. Tenenbaum, Bayesian theory of mind: Modeling joint belief-desire attribution, in: Proceedings of the annual meeting of the cognitive science society, Vol. 33, 2011. [10] C. L. Baker, J. Jara-Ettinger, R. Saxe, J. B. Tenenbaum, Rational quan- titative attribution of beliefs, desires and percepts in human mentalizing, Nature Human Behaviour 1 (4) (2017) 0064. 26 [11] J. Tenenbaum, Building machines that learn and think like people, in: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, International Foundation for Autonomous Agents and Multiagent Systems, 2018, pp. 5 -- 5. [12] S. V. Albrecht, P. Stone, Autonomous agents modelling other agents: A comprehensive survey and open problems, Artificial Intelligence 258 (2018) 66 -- 95. [13] I. T. Freire, C. Moulin-Frier, M. Sanchez-Fibla, X. D. Arsiwalla, P. Ver- schure, Modeling the formation of social conventions in multi-agent popu- lations, arXiv preprint arXiv:1802.06108. [14] I. T. Freire, J.-Y. Puigb`o, X. D. Arsiwalla, P. F. Verschure, Limits of multi- agent predictive models in the formation of social conventions, Artificial Intelligence Research and Development: Current Challenges, New Trends and Applications 308 (2018) 297. [15] M. Kleiman-Weiner, M. K. Ho, J. L. Austerweil, M. L. Littman, J. B. Tenenbaum, Coordinate to cooperate or compete: abstract goals and joint intentions in social interaction, in: CogSci, 2016. [16] J. Perolat, J. Z. Leibo, V. Zambaldi, C. Beattie, K. Tuyls, T. Graepel, A multi-agent reinforcement learning model of common-pool resource appro- priation, in: Advances in Neural Information Processing Systems, 2017, pp. 3643 -- 3652. [17] A. Peysakhovich, A. Lerer, Prosocial learning agents solve generalized stag hunts better than selfish ones, in: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, International Foundation for Autonomous Agents and Multiagent Systems, 2018, pp. 2043 -- 2044. [18] I. T. Freire, J.-Y. Puigb`o, X. D. Arsiwalla, P. F. Verschure, Modeling the 27 opponents action using control-based reinforcement learning, in: Confer- ence on Biomimetic and Biohybrid Systems, Springer, 2018, pp. 179 -- 186. [19] M. J. Gaparrini, M. S´anchez-Fibla, Loss aversion fosters coordination in in- dependent reinforcement learners, Artificial Intelligence Research and De- velopment: Current Challenges, New Trends and Applications 308 (2018) 307. [20] J. Z. Leibo, V. Zambaldi, M. Lanctot, J. Marecki, T. Graepel, Multi-agent reinforcement learning in sequential social dilemmas, in: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, In- ternational Foundation for Autonomous Agents and Multiagent Systems, 2017, pp. 464 -- 473. [21] A. Peysakhovich, A. Lerer, Consequentialist conditional cooperation in so- cial dilemmas with imperfect information, arXiv preprint arXiv:1710.06975. [22] J. F. Nash, et al., Equilibrium points in n-person games, Proceedings of the national academy of sciences 36 (1) (1950) 48 -- 49. [23] R. X. Hawkins, R. L. Goldstone, The formation of social conventions in real-time environments, PloS one 11 (3) (2016) e0151670. [24] R. X. Hawkins, N. D. Goodman, R. L. Goldstone, The emergence of social norms and conventions, Trends in cognitive sciences. [25] J. Poncela-Casasnovas, M. Guti´errez-Roig, C. Gracia-L´azaro, J. Vicens, J. G´omez-Gardenes, J. Perell´o, Y. Moreno, J. Duch, A. S´anchez, Humans display a reduced set of consistent behavioral phenotypes in dyadic games, Science advances 2 (8) (2016) e1600451. [26] A. G. Sanfey, Social decision-making: insights from game theory and neu- roscience, Science 318 (5850) (2007) 598 -- 602. [27] P. F. Verschure, T. Voegtlin, R. J. Douglas, Environmentally mediated syn- ergy between perception and behaviour in mobile robots, Nature 425 (6958) (2003) 620. 28 [28] C. Moulin-Frier, X. D. Arsiwalla, J.-Y. Puigb`o, M. Sanchez-Fibla, A. Duff, P. F. Verschure, Top-down and bottom-up interactions between low- level reactive control and symbolic rule learning in embodied agents., in: CoCo@NIPS, 2016. [29] V. Braitenberg, Vehicles: Experiments in synthetic psychology, MIT press, 1986. [30] M. Corbetta, G. L. Shulman, Control of goal-directed and stimulus-driven attention in the brain, Nature reviews neuroscience 3 (3) (2002) 201. [31] E. Koechlin, C. Ody, F. Kouneiher, The architecture of cognitive control in the human prefrontal cortex, Science 302 (5648) (2003) 1181 -- 1185. [32] Y. Munakata, S. A. Herd, C. H. Chatham, B. E. Depue, M. T. Banich, R. C. OReilly, A unified framework for inhibitory control, Trends in cognitive sciences 15 (10) (2011) 453 -- 459. [33] H. E. Den Ouden, P. Kok, F. P. De Lange, How prediction errors shape perception, attention, and motivation, Frontiers in psychology 3 (2012) 548. [34] C. Wacongne, E. Labyt, V. van Wassenhove, T. Bekinschtein, L. Naccache, S. Dehaene, Evidence for a hierarchy of predictions and prediction errors in human cortex, Proceedings of the National Academy of Sciences 108 (51) (2011) 20754 -- 20759. [35] R. S. Sutton, Learning to predict by the methods of temporal differences, Machine learning 3 (1) (1988) 9 -- 44. [36] R. Axelrod, W. D. Hamilton, The evolution of cooperation, science 211 (4489) (1981) 1390 -- 1396. [37] R. Axelrod, Effective choice in the prisoner's dilemma, Journal of conflict resolution 24 (1) (1980) 3 -- 25. [38] C. E. Shannon, A mathematical theory of communication, Bell system technical journal 27 (3) (1948) 379 -- 423. 29 [39] C. Moulin-Frier, J.-Y. Puigbo, X. D. Arsiwalla, M. Sanchez-Fibla, P. Ver- schure, Embodied artificial intelligence through distributed adaptive con- trol: An integrated framework, ArXiv e-prints. [40] X. D. Arsiwalla, I. Herreros, C. Moulin-Frier, M. S´anchez-Fibla, P. F. Ver- schure, Is consciousness a control process?, in: CCIA, 2016, pp. 233 -- 238. [41] X. D. Arsiwalla, R. Sole, C. Moulin-Frier, I. Herreros, M. Sanchez- Fibla, P. Verschure, The morphospace of consciousness, arXiv preprint arXiv:1705.11190. 30
0906.2756
6
0906
2010-11-06T21:47:00
Norms and Commitment for iOrgs(TM) Information Systems: Direct Logic(TM) and Participatory Grounding Checking
[ "cs.MA", "cs.LO", "cs.SE" ]
The fundamental assumption of the Event Calculus is overly simplistic when it comes to organizations in which time-varying properties have to be actively maintained and managed in order to continue to hold and termination by another action is not required for a property to no longer hold. I.e., if active measures are not taken then things will go haywire by default. Similarly extension and revision is required for Grounding Checking properties of systems based on a set of ground inferences. Previously Model Checking as been performed using the model of nondeterministic automata based on states determined by time-points. These nondeterministic automata are not suitable for iOrgs, which are highly structured and operate asynchronously with only loosely bounded nondeterminism. iOrgs Information Systems have been developed as a technology in which organizations have people that are tightly integrated with information technology that enables them to function organizationally. iOrgs formalize existing practices to provide a framework for addressing issues of authority, accountability, scalability, and robustness using methods that are analogous to human organizations. In general -iOrgs are a natural extension Web Services, which are the standard for distributed computing and software application interoperability in large-scale Organizational Computing. -iOrgs are structured by Organizational Commitment that is a special case of Physical Commitment that is defined to be information pledged. iOrgs norms are used to illustrate the following: -Even a very simple microtheory for normative reasoning can engender inconsistency In practice, it is impossible to verify the consistency of a theory for a practical domain. -Improved Safety in Reasoning. It is not safe to use classical logic and probability theory in practical reasoning.
cs.MA
cs
Published in ArXiv 0906.2756 Norms and Commitment for iOrgsTM Information Systems: Direct LogicTM and Participatory Grounding Checking Carl Hewitt http://carlhewitt.info iOrgsTM Information Systems raise important issues for formalizing norms that require extensions and revisions of previous foundational work. For example, extension and revision is required of the fundamental assumption of the Event Calculus: Time-varying properties hold at particular time-points if they have been initiated by an action at some earlier time-point, and not terminated by another action in the meantime. The fundamental assumption of the Event Calculus is overly simplistic when it comes to organizations in which time-varying properties have to be actively maintained and managed in order to continue to hold and termination by another action is not required for a property to no longer hold. I.e., if active measures are not taken then things will go haywire by default. Similarly extension and revision is required for Grounding Checking properties of systems based on a set of ground inferences. Previously Model Checking has been performed using the model of nondeterministic automata based on states determined by time -points. These nondeterministic automata are not suitable for iOrgs, which are highly structured and operate asynchronously with only loosely bounded nondeterminism. iOrgs Information Systems have been developed as a technology in which organizations have people that are tightly integrated with information technology that enables them to function organizationally . iOrgs formalize existing practices to provide a framework fo r addressing issues of authority, accountability, scalability, and robustness using methods that are analogous to human organizations. In general  iOrgs are a natural extension Web Services, which are the standard for distributed computing and software application interoperability in large-scale Organizational Computing. iOrgs are structured by Organizational Commitment that is a special case of Physica l Commitment that is defined to be information pledged. iOrgs norms are used to illustrate the following:  Even a very simple microtheory for normative reasoning can engender inconsistency In practice, it is impossible to verify the consistency of a theory for a practical domain. Improved Safety in Reasoning. It is not safe to use classical logic and probability theory in practical reasoning.   November 6, 2010 Page 1 of 18 Contents iOrgsTM Information Systems ....................................................................... 3 Participatory Semantics ................................................................................ 3 Contrast between Participatory Semantics and the Event Calculus ............. 4 Commitment ................................................................................................. 6 Participatory Grounding Checking ............................................................... 7 Direct Inference ............................................................................................ 9 Collusion at Santa Cruz FishMarket ........................................................... 10 Inconsistent policy in War .......................................................................... 10 Paradigm shift from Inconsistency Denial to Rapid Recovery .................. 11 Norms at Santa Cruz FishMarket ............................................................... 11 Conclusion .................................................................................................. 12 Acknowledgments ...................................................................................... 12 Bibliography ............................................................................................... 12 Appendix 1. A simple auction procedure in ActorScript ........................... 15 End Notes ................................................................................................... 16 November 6, 2010 Page 2 of 18 iOrgsTM Information Systems In the organization lies the power. iOrgs Information Systems have been developed as a technology in which organizations have people that are tightly integrated with information technology that enables them to function organizationally [Hewitt and Inman 1991; Hewitt 2008b, 2008d, 2008g].i iOrgs formalize existing practices to provide a framework for addressing issues of authority, accountability, scalability, and robustness using methods that are analogous to human organizations.ii. In general  iOrgs are a natural extension Web Services, which are the standard for distributed computing and software application interoperability in large-scale Organizational Computing.  iOrgs are structured by Organizational Commitment that is a special case of Physical Commitment [Hewitt 2007 2008b] that is defined to be information pledged.iii This paper discusses how iOrgs require Direct Logic in reasoning and participatory grounding checking in systems analysis: 1. The development of iOrgs and the extreme dependence of our society on these systems have introduced new phenomena. These systems have pervasive inconsistencies among and within the following: o Norms that express how systems can be used and tested in practice o Policies that express over-arching justification for systems and their technologies o Practices that express implementations of systems Different parties are responsible for constructing, evolving, justifying and maintaining practices, norms, and operations for large-scale Organizational Computing. In specific cases any one consideration can trump the others. Sometimes debates over inconsistencies can become quite heated, e.g., between sales, engineering and finance. 2. Grounding checkingiv is a fundamental tool in the analysis of iOrgs. However, previous work on model checking has been performed using the model of nondeterministic automata based on states determined by time-points. These nondeterministic automata are not suitable for iOrgs, which are highly structured and operate asynchronously with only loosely bounded nondeterminism. Instead analysis based on regions of space-time (as in Participatory Semantics [Hewitt and Manning 1996]) is required. Participatory Semantics Participatory Semantics [Hewitt and Manning 1996] is based on regions of space-time called Participationsv according to the following legend:vi November 6, 2010 Page 3 of 18 XMLvii (a message or data structure) A participation A reference A message transmission arrived at the specified time An object transport XML Participation Source Target Origin Message@Time Destination Origin Object Destination Figure 1. Legend Contrast between Participatory Semantics and the Event Calculus Participatory Semantics is based on 4-dimensional regions of space-time whereas the Event Calculus is based on events (which take 0 time) on a global universal time-line. This paper does not use the usual Event Calculus formalism [Kowalski and Sergot 1986 , Miller and Shanahan 1999]. A principle reason for not adopting the Event Calculus is avoidance of its fundamental assumption: “Time-varying properties hold at particular time-points if they have been initiated by an action at some earlier time-point, and not terminated by another action in the meantime.” The fundamental assumption of the Event Calculus is overly simplistic when it comes to organizations in which time-varying properties have to be actively managed in order to continue to hold and termination by another action is not required for a property to no longer hold. I.e., if active measures are not taken then things will go haywire by default. For example consider the following property: “Drive safely” It might be said that the property was “terminated” when a driver collides with another vehicle. However, it is often the case that some “unsafe driving” occurred before the collision! November 6, 2010 Page 4 of 18 Another problem with the Event Calculus is that it is formulated at the very low level of abstraction of time-points. As Carlo Rovelli has explained:viii “We never really see time. We see only clocks. If you say this object moves, what you really mean is that this object is here when the hand of your clock is here, and so on. We say we measure time with clocks, but we see only the hands of the clocks, not time itself. And the hands of a clock are a physical variable like any other. So in a sense we cheat because what we really observe are physical variables as a function of other physical variables, but we represent that as if everything is evolving in time.” Preoccupation with global time-points is a serious problem with the Event Calculus. This problem is closely related to another problem with the Event Calculus: A time is not bound to a locale but is instead imagined to be free floating! Consider an example in which safe driving is followed by unsafe driving leading to a collision. An important issue is that there may be no event which clearly delineates the transition from safe driving to unsafe driving.ix The lack of such an event is not material to Participatory Semantics. However, there is no clear terminating event for the Event Calculus. Driving Safe Driving Unsafe Driving Collision Figure 2. Transition from Safe to Unsafe Driving (with no clipping event) Next consider an example in which AM transitions to PM on July 31, 2008 in California. Here the issue is that there is no physical event that occurs throughout California that marks the transition from AM to PM. California on July 31, 2008 AM PM Figure 3. Transition from AM to PM (with no clipping event) November 6, 2010 Page 5 of 18 By convention, the AM and PM regions for California are adjacent to each other. However, this adjacency does not require the existence of any event that occurs throughout California and the lack of such an event is not material to Participatory Semantics. However, there is no terminating event as required by the Event Calculus. Commitment According to [Hewitt 2007], a Physical Commitment PC is defined to be a pledge that certain information I holds for a physical system PS for a space-time region R. Note that physical commitment is defined for whole physical systems; not just a participant or process. This paper uses a mythical Santa Cruz FishMarketx to illustrate how organizational commitments can be formulated at a higher level of abstraction. The Santa Cruz FishMarket uses an electronic English Auction starting with a reserved price in which a certain time is allowed for more bids to come in before the bidding is closed. As each higher bid is received, the new minimum bid is announced to the participants. Tie bids are broken by choosing the one which arrived first as the winner. Consequently the Santa Cruz FishMarket is an organizational commitment with an auction of buyers and sellers. An implementationxi for a SimpleAuction for the Santa Cruz FishMarket is given in the appendix.xii The commitments below are made by the implementation pledging the following information: Bidder1 Request Bid.[amountBid bidder : Bidder1 ]@arrivalTime Exception TooLate.[deadline] SimpleAuction arrivalTime > deadline Figure 4. Commitment: Bidding too late causes an exception November 6, 2010 Page 6 of 18 Request Alarm.[alarmTime] SimpleAuction alarmTime > deadline ProcessOutcome CurrentBidding Figure 5. Commitment: An alarm triggers the processing of the auction outcome Participatory Grounding Checking The denotational semantics of concurrency were first developed in [Clinger 1981]. Subsequently [Hewitt 2006b] developed the TimedDiagrams model with the Computational Representation Theorem which states: The denotation DenoteS of a closedxiii system S represents all the possible behaviors of S as DenoteS = ⊔iω ProgressionS i(⊥S) where ProgressionS is an approximation function that takes a set of approximate behaviors to their next stage and ⊥S is the initial behavior of S. The denotational semantics exhibits relatively unbounded nondeterminism because in the delivery of a message can occur a relatively unbounded amount of time after it is sent. This relatively unbounded nondeterminism can cause trouble with traditional global state-based approaches [Bianculli, Morzenti, Pradella, San Pietro, Spoletini 2007; Bordini, Fisher, Visser, and Wooldridge 2004; Cliffe, De Vos, and Padget 2006; Desai, Cheng, Chopra, and Singh 2007; Venkatraman and Singh 1999, etc.] because of the following issues:  State explosion because of the increase in possible interleavings of global states  Modeling failure because the system being modeled is not finite state Participatory grounding checking makes use of the Representation Theorem to characterize possible alternative computations. In participatory grounding checking:  Explosion is less of a problem because local groundings are modeled instead of global state. Also Participatory Semantics can be used to abstract high level properties of denotations in a way that is similar to how abstraction has been used in global state model checking. November 6, 2010 Page 7 of 18  Systems are not modeled as nondeterministic state machines, Petri nets, or process calculi [Aceto and Gordon 2005].xiv  Communication is modeled as being fundamentally one-way and asynchronous. In this way modeling problems such as occur using Petri Nets and synchronous process calculi are avoided [Padget and Bradford 1998]. For example consider the system with SimpleAuction (defined in the appendix of this article) augmented with bidders like the following:xv SimpleBidder  behavior { xvi serialize the messages received by this bidder ::theAuction  auction that bidder is bidding for Auction Currency ::maximumBid  maximum that bidder will bid for this auction ----------------------------------------------------------------------------------------------------- implements Bidder  the Bidder interface is implemented below self.newMinimum (amount) →  a newMinimum message with amount has been received amount ?? { (< maximumBid) : if amount is less than maximumBid theAuction.bid(amount for: self)  then bid the minimum catcher {  and if it throws the exception TooLittle.[minimumBid] :  that the bid was too small relay self.newMinimum(minimumBid)}  send yourself the new minimum bid not (< maximumBid) : void }} else do nothing and return void Using bidders like the above, execution scenarios of the system can be computed using the Representation Theorem. These execution scenarios can be checked against norms such as the following: Commitment: At Santa Cruz FishMarket, deliveries from seller to buyer are paid at the agreed price; i.e. Santa Cruz FishMarket pledges the following information: For every seller, buyer, and delivery, Delivers[seller, buyer, delivery] ├ FishMarket PaysAgreedPrice[buyer, seller, delivery]xvii Note that seller, buyer, and delivery are all space-time participations in the above norm. Consequently, there is enough information to specify that the buyer pays the agreed price to the seller on delivery of the purchase.xviii November 6, 2010 Page 8 of 18 Seller1 Goods Delivery1 Payment Buyer1 Figure 6. A commitment involving the exchange of Goods for Payment Direct Inference Direct inference is used in to directly infer conclusions from premises. For example, suppose that we have 1) WeekdayAt5PM ├Boston TrafficJam which says that in Boston , a weekday at 5PM infers a traffic jam. 2) ├BostonTrafficJam which says that in Boston , no traffic jam. In classical logic, WeekdayAt5PM is inferred in Boston from 1) and 2) above. But fortunately in Direct Logic: ⊬BostonWeekdayAt5PM which says in Boston, there is a particular proposition (WeekdayAt5PM) that cannot be inferred in Direct Logic from 1) and 2) above. Consequently, direct inference comes into play even in the absence of overt inconsistency.xix November 6, 2010 Page 9 of 18 Collusion at Santa Cruz FishMarket Ethical conduct at the FishMarket is worthy of further study. A classic guide to norms for ethical conduct appears in The Prince [Machiavelli 1532]. So roughly in this spirit, consider the follow axiomatizationxx of collusion at FishMarket:xxi 1) p, action: CanResult[Do[p, action], Rich[p]]├ThePrince Do[p, action]  axiomxxii 2) ├ThePrince CanResult[Do[Machiavelli, Collude], Rich[Machiavelli]]  axiom 2’) Do[Machiavelli, Collude] ├ThePrince CanResult[Rich[Machiavelli]]]  axiom 3) ├ ThePrince Do[Machiavelli, Collude]  from 1) and 2) 4) p, action: CanResult[Do[p, action], Ruined[p]]├ ThePrinceDo[p, action]  axiomxxiii 5) ├ ThePrince CanResult[Do[Machiavelli, Collude], Ruined[Machiavelli]]  axiom 5’) Do[Machiavelli, Collude] ├ThePrince CanResult[Ruined[Machiavelli]]]  axiom 6) ├ ThePrince Do[Machiavelli, Collude]  from 4), and 5) Note that, in the ThePrince, there is an inconsistency between 3) and 6). However, even though the ThePrince is inconsistent, it is not meaningless because in some respects it captures some underlying paradoxical aspects of Machiavelli‟s theory: “The wish to acquire more is admittedly a very natural and common thing; and when men succeed in this they are always praised rather than condemned. But when they lack the ability to do so and yet want to acquire more at all costs, they deserve condemnation for their mistakes.” Inconsistent policy in War A classic case of inconsistency occurs in the novel Catch-22 [Heller 1961] which states that a person “would be crazy to fly more missions and sane if he didn't, but if he was sane he had to fly them. If he flew them he was crazy and didn't have to; but if he didn't want to he was sane and had to. Yossarian was moved very deeply by the absolute simplicity of this clause of Catch-22 and let out a respectful whistle. „That's some catch, that Catch-22,‟ he observed.” In the spirit of Catch-22, consider the follow axiomatization of the above: 1. ├Catch-22 ℙ(Able[x, Fly]  Fly[x]) ≤ ℙ(Sane[x])  axiom 2. ├Catch-22 ℙ(Sane[x]) ≤ ℙ(Obligated[x, Fly])  axiom 3. ├Catch-22 ℙ(Sane[x]  Obligated[x, Fly]) ≤ ℙ(Fly[x])  axiom 4. ├Catch-22 ℙ(Fly[x]) ≤ ℙ(Crazy[x])  axiom 5. ├Catch-22 ℙ(Crazy[x]) ≤ ℙ(Obligated[x, Fly])  axiom 6. ├Catch-22 ℙ(Sane[p]  Obligated[p, Fly]) ≤ ℙ(Fly[p])  axiom November 6, 2010 Page 10 of 18 For Yossarian, we have the following axioms: 7. ├Catch-22 ℙ(Able[Yossarian, Fly]) ≅ 1  axiom 8. ├Catch-22 ℙ(Sane[Yossarian]) ≅ 1  axiom Consequently, 2’. ├Catch-221 ≅ ℙ(Obligated[Yossarian, Fly])  Yossarian using 2 and 8 3’. ├Catch-22 1 ≅ ℙ(Fly[Yossarian])  Yossarian using 3, 2’ and 8 4’. ├Catch-22 1 ≅ ℙ(Crazy[Yossarian])  Yossarian using 4 and 3’ 5’. ├Catch-22 1 ≲ 1 - ℙ(Obligated[Yossarian, Fly])  Yossarian using 5 and 4’ 5’’. ├Catch-22 ℙ(Obligated[Yossarian, Fly]) ≅ 0  reformulation of 5’ 6’. ├Catch-22 1 ≲ 1 - ℙ(Fly[Yossarian])  Yossarian using 6’, 8 and 5’’ 6’’. ├Catch-22 ℙ(Fly[Yossarian]) ≅ 0  reformulation of 6’ Thus there is an inconsistency in Catch-22 in that both of the following hold: 3’. ├Catch-22 1 ≅ ℙ(Fly[Yossarian]) 6’’. ├Catch-22 ℙ(Fly[Yossarian]) ≅ 0 Paradigm shift from Inconsistency Denial to Rapid Recovery ThePrince and Catch-22 illustrate the following important points:  Even a very simple microtheory for normative reasoning can engender inconsistency In practice, it is impossible to verify the consistency of a theory for a practical domain.  Improved Safety in Reasoning. It is not safe to use classical logic and probability theory in practical reasoning. Norms at Santa Cruz FishMarket Norms are commitment supported by communities of practice. Norm: At Santa Cruz FishMarket, there is no collusion among buyers and sellers. Formalizing the norm above is the subject of future research. November 6, 2010 Page 11 of 18 Conclusion iOrgs raise important issues for inconsistency robustness and participatory grounding checking. This paper presents some ideas for formalizing these issues. Relationships among these issues are analyzed using illustrations from FishMarket and The Prince. The following conclusions are proposed.  Extension and revision is required of the fundamental assumption of the Event Calculus: Time-varying properties hold at particular time-points if they have been initiated by an action at some earlier time-point, and not terminated by another action in the meantime. The fundamental assumption of the Event Calculus is overly simplistic when it comes to iOrgs in which time-varying properties have to be actively maintained and managed in order to continue to hold and termination by another action is not required for a property to no longer hold. I.e., if active measures are not taken then things will go haywire by default. Consequently the Event Calculus approach must evolve into a strongly paraconsistent system structured around participations in space-time.  Similarly extension and revision is required for Model Checking properties of systems. Previously Model Checking has been performed using the model of nondeterministic automata based on states determined by time-points. These nondeterministic automata are not suitable for iOrgs, which are highly structured and operate asynchronously with only loosely bounded nondeterminism. Consequently Model Checking needs to evolve in the direction of verifying participatory behavior in iOrgs. Acknowledgments The development of Participatory Semantics was joint work with Carl Manning. Les Gasser, Mike Huhns, Victor Lessor, Pablo Noriega, Sascha Ossowski, Jaime Sichman, Munindar Singh, etc. provided valuable suggestions at AAMAS‟07. The reviewers and participants of MALLOW‟07 (including John Lloyd, John-Jules Meyer, Pablo Noriega, Jaime Sichman, Munindar Singh, Rineke Verbrugge, etc.) provided valuable comments. Afterwards Munindar Singh provided helpful pointers to the literature. The reviewers for COIN@AAMAS‟08 made helpful suggestions. Conversations with Jeremy Forth were helpful in developing the comparison of Participatory Semantics and the Event Calculus. Munindar Singh made extensive comments and suggestions that significantly improved the presentation. A helpful review was provided by an anonymous referee for the special issue of the Journal of IGPL on Normative Multi-agent Systems. Bibliography  Chris Anderson. The End of Theory: The Data Deluge Makes the Scientific Method Obsolete Wired. June 23, 2009.  Luca Aceto and Andrew D. Gordon (Ed.) Algebraic Process Calculi: The First Twenty Five Years and Beyond 2005  Marco Alberti, Marco Gavanelli, Evelina Lamma, Paola Mello, and Paolo Torroni “Modeling interactions using social integrity constraints: A resource sharing case study” DALT. LNAI 2990. Springer-Verlag, 2004.  Aldo Antonelli. “Non-monotonic Logic” Stanford Encyclopedia of Philosophy. March 2006. November 6, 2010 Page 12 of 18   Domenico Bianculli, Angelo Morzenti, Matteo Pradella, Pierluigi San Pietro, Paola Spoletini “Trio2Promela: A Model Checker for Temporal Metric Specifications” ICSE'07.  Brian Blum. Contracts: Examples and Explanations Aspen Publishers. 3rd edition 2004.  Rafael Bordini, Michael Fisher, Willem Visser, and Michael Wooldridge “Verifiable Multi-Agent Programs” Springer LNAI 3067. 2004.  Geof Bowker, Susan L. Star, W. Turner, and Les Gasser. (Eds.) Social Science Research, Technical Systems and Cooperative Work. Lawrence Earlbaum. 1997.  Cristiano Castelfranchi “Commitments: From individual intentions to groups and organizations” AAAI-93 Workshop on AI and Theories of Groups and Organizations: Conceptual and Empirical Research.  Amit Chopra and Munindar Singh. Multiagent Commitment Alignment. Draft of March 7, 2009.  Owen Cliffe, Marina De Vos, and Julian Padget (2006). “Specifying and Reasoning about Multiple Institutions” COIN@AAMAS‟06. Jiangbo Dang, Jingshan Huang and Mike Huhns “Workflow Coordination for Service-Oriented Multi-agent Systems” AAMAS‟07.  Nirmit Desai, Zhengang Cheng, Amit Chopra, and Munindar Singh “Toward Verification of Commitment Protocols and their Compositions” AAMAS‟07.  Virginia Dignum A Model for Organizational Interaction. PhD thesis. Utrecht. 2004..  Rogier Van Eijk, Frank De Boer, Wiebe Van Der Hoek and John-Jules Meyer. “A verification framework for agent communication” AAMAS‟03.  Andrew Farrell, Marek Sergot, Mathias Salle and Claudio Bartolini “Using the event calculus for tracking the normative state of contracts” International Journal of Cooperative Information System June-September 2005.  Tim Folger. “Newsflash: Time May Not Exist” Discover. June 12, 2007.  Dorian Gaertner, Pablo Noriega, J.-A. Rodriguez-Aguilar, Wamberto Vasconcelos (2007). “Distributed Norm Management in Regulated Multi-Agent Systems” AAMAS‟07.  Joseph Heller. Catch-22 Simon and Schuster. 1961.  Carl Hewitt and Jeff Inman (1991). “DAI Betwixt and Between: From „Intelligent Agents‟ to Open Systems Science” IEEE Transactions on Systems, Man, and Cybernetics. Nov. /Dec. 1991.  Carl Hewitt and Carl Manning (1996). Synthetic Infrastructures for Multi-Agency Systems ICMAS'96.  Carl Hewitt What is Commitment? Physical, Organizational, and Social (Revised) Pablo Noriega .et. al. editors. LNAI 4386. Springer-Verlag. 2007.  Carl Hewitt (2008a) Large-scale Organizational Computing requires Unstratified Reflection and Strong Paraconsistency Coordination, Organizations, Institutions, and Norms in Agent Systems III. Jaime Sichman, Pablo Noriega, Julian Padget and Sascha Ossowski (Ed.). Springer-Verlag. 2008. http://organizational.carlhewitt.info/  Carl Hewitt (2008b). ORGs for Scalable, Robust, Privacy-Friendly Client Cloud Computing IEEE Internet Computing September/October 2008.  Carl Hewitt (2008c) Middle History of Logic Programming: Resolution, Planner, Edinburgh Logic for Computable Functions, Prolog and the Japanese Fifth Generation Project ArXiv 0904.3036  Carl Hewitt (2008d) A historical perspective on developing foundations for client cloud computing: iConsultTM & iEntertainTM Apps using iInfoTM Information Integration for iOrgsTM Information Systems (Revised version of “Development of Logic Programming: What went wrong, What was done about it, and What it might mean for the future” AAAI Workshop on What Went Wrong. AAAI-08.) ArXiv 0901.4934.  Carl Hewitt (2008e) Common sense for concurrency and inconsistency tolerance using Direct LogicTM and the Actor Model ArXiv 0812.4852. November 6, 2010 Page 13 of 18  Carl Hewitt (2008f) Scalable Privacy-Friendly Client Cloud Computing: a gathering Perfect Disruption Stanford Computer Systems Laboratory Colloquium Oct. 22, 2008. Video recording. http://stanford-online.stanford.edu/courses/ee380/081022-ee380-300.asx  Carl Hewitt (2008g) Perfect Disruption: Causing the Paradigm Shift from Mental Agents to ORGs IEEE Internet Computing. Jan/Feb 2009.  Carl Hewitt ActorScript™: Industrial strength integration of local and nonlocal concurrency for Client-cloud Computing ArXiv. 0907.3330  Bryan Horling and Victor Lesser (2005). “Using ODML to Model Multi-Agent Organizations” IAT‟05  Nicholas Jennings “Commitments and conventions: The foundation of coordination in multi- agent systems” Knowledge Engineering Review. 3. 1993.  Frederick Knabe “A Distributed Protocol for Channel-Based Communication with Choice” PARLE’92  Bill Kornfeld and Carl Hewitt “The Scientific Community Metaphor” IEEE Transactions on Systems, Man, and Cybernetics. January 1981.  Robert Kowalski and Marek Sergot. “A Logic-based Calculus of Events” New Generation Computing Volume 4 , Issue 1. 1986.  Robert Kowalski. “Database updates in the Event Calculus” Journal of Logic Programming. 1992.  Niccolò Machiavelli (1532) The Prince (Bantam Classics 1984).  Robin Milner “Elements of interaction: Turing award lecture.” CACM. January 1993.  Pablo Noriega Agent Mediated Auctions: The Fishmarket Metaphor. Ph.D. Barcelona. 1997.  Julian Padget and Russell Bradford (1998). “A π-calculus Model of a Spanish Fish Market” AMET-98 also in LNAI 1571 Springer Verlag. 1999.  Carl Petri Kommunikation mit. Automate. Ph. D. Thesis. University of Bonn. 1962.  Murray Shanahan and Rob Miller (1999) “The event-calculus in classical logic — alternative axiomatization,” Electronic Transactions on Artificial Intelligence 3(1). Jaime Sichman, Virginia Dignum, and Cristiano Castelfranchi (2005). “Agent organizations.” JBCS, 11(3).  Munindar Singh. “Social and Psychological Commitments in Multi-agent Systems” AAAI Fall Symposium on Knowledge and Action at Social and Organizational Levels. 1991  Munindar Singh “An ontology for commitments in multi-agent systems: Toward a unification of normative concepts” Artificial Intelligence and Law 7. 1999.  Feng Wan and Munindar Singh (2005). “Formalizing and achieving multiparty agreements via commitments” AAMAS‟05.  Michael Winikoff, Wei Liu, and James Harland (2005). “Enhancing commitment machines” DALT. LNAI 3476. Springer-Verlag. 2005.  Pinar Yolum and Munindar Singh “Enacting Protocols by Commitment Concession” AAMAS‟07.  Mahadevan Venkatraman and Munindar Singh. “Verifying Compliance with Commitment Protocols: Enabling Open Web-Based Multi-agent Systems” JAAMAS. 1999.  November 6, 2010 Page 14 of 18 Appendix 1. A simple auction procedure in ActorScript SimpleAuction  behavior { Bidders::theBidders  a collection of those allowed to bid on this auction Currency::minimumBid  current minimum bid for this auction Time::deadline  current deadline by which this auction will end unless  another higher bid is received for this auction Bidding::currentBidding  a recording of the current state of bidding for this auction ------------------------------------------------------------------------------------------------ implements Auction  the Auction interface is implemented below self.bid (amountBid)@Time::arrivalTime →  a message with amount bid and bidder has been received at arrivalTime arrivalTime ?? {  if arrivalTime (> deadline) : throw TooLate.[deadline];  is after deadline, complain bid is too late not (> deadline) : amountBid ?? { else if the amount bid is smaller than the minimum (< minimumBid) : throw TooLittle .[minimumBid];  then complain the bid is too little not (< minimumBid) : {currentBidding.bid (amountBid time : arrivalTime);  record the bid in currentBidding  this may throw an exception if the bidder is unqualified let (Time ::newDeadline = CurrentTime( )+δ, Amount ::newMinimumBid = amountBid * 110%)  compute the new deadline and new minimum bid {theBidders.newMinimum(newMinimumBid deadline : newDeadline),  inform the allowed bidders of the new minimum and deadline self.alarm(newDeadline),  set an alarm for this auction with a new deadline Acknowledgment .[ ] also become (minimumBid = newMinimumBid, deadline = newDeadline)}}}  return acknowledgment that the bid has been accepted and  also update this auction with the new minimum bid and deadline alarm.(alarmTime) →  an alarm message with alarmTime has been received alarmTime ?? { if alarmTime (<deadline) : void;  is before the deadline return void not (<deadline) : currentBidding.processOutcome}}  else return the result of processing the outcome of this auction according to the currentBidding November 6, 2010 Page 15 of 18  End Notes i The architecture of an iOrg differs fundamentally from a Mental Agent that cognitively operates in a human-like fashion. The Mental Agent paradigm [Alberti, Gavanelli, Lamma, Mello, and Torroni 2004] has had some success in modeling and simulating human-like behavior. However, computing has changed dramatically from the time of its invention and we are in the midst of a “perfect disruption” [Hewitt 2008g] brought on by the following:  Hardware. Many-core architecture that will soon support thousands of threads in a process for widely-used software applications using semantic integration (see below). Software. Client cloud computing in which information is permanently stored in servers on the Internet and cached temporarily on clients that range from si ngle chip sensors, handhelds, notebooks, desktops, and entertainment centers to huge data centers. (Even data centers are clients that often cache their information to guard against geographical disaster.) Client cloud computing will provide much needed new capabilities including the following: o maintaining the privacy of client information by storing it on servers encrypted so that it can be decrypted only by using the client‟s private key. (The information is unencrypted only when cached on clients.) o providing greater integration of user information obtained from servers of competing vendors without requiring them to interact with each other. o providing better advertising relevance and targeting without exposing client privacy.  Applications. Scalable semantic integration, e.g., integrating the following: o calendars and to do lists o email archives o presence information including physical, psychological and social o documents (including presentations, spread sheets, proposals, job applications, photos, videos, gift lists, memos, purchasing, contracts, articles, etc.) o contacts (including social graphs) o search results o marketing and advertising relevance influenced by the above This perfect disruption is causing a paradigm shift from Mental Agents to iOrgs as the foundation for implementing large-scale Internet applications [Hewitt 2008g]. ii For background information on iOrgs see [Bowker, Star, Turner, and Gasser 1977; Dignum 2004, Singh and Huhns 2005; Horling and Lesser 2005]. iii In some previous work, the subject of contracts [Blum 2004, etc.] has been treated using the (somewhat unfortunate name) “commitment” for contractual obligations [Singh 1991, Jennings 1993; Noriega 1997; Singh and Huhns 2005; Chopra and Singh 2009]. In this paper, these obligations are treated as special cases of Physical Commitment. See Hewitt [2007]. iv i.e., checking the behavior of a system against a model v Note that Participations (being regions of space -time) represent both objects and activities. November 6, 2010 Page 16 of 18 vi Note that Participatory Semantics is based on space-time as opposed to the more usual approach of basing semantics just on time, e.g. the Event Calculus [Farrell, Sergot, Salle, and Bartolini 2005], etc. vii XML is used be because it is increasingly dominant as the de facto standard for structured message communication and stands to become the de facto standard for data structures. viii quoted in [Folger 2007] ix For example, such an event would have to exist in the Event Calculus formulation in Kowalski [1992]. x Inspired by the Blanes FishMarket Metaphor [Noriega 1997]. xi appendix in the concurrent programming language ActorScript [Hewitt 2008c] xii A functional notation is used for XML. For example PersonName<First<“Kurt”> Last< “Gödel”>> can print as: <PersonName> <First> Kurt </First> <Last> Gödel </Last> </PersonName> xiii Closed means that the system does not receive any communications from outside itself. xiv The Actor Model subsumes other models of concurrency, e.g. Process Calculi [Milner 1993; Aceto and Gordon 2005] and Petri Nets [Petri 1962] using a two -phase commit protocol [Knabe 1992]. xv Implemented in ActorScriptTM [Hewitt 2010] xvi The symbol  is used to begin a comment that extends to the end of the line. xvii Expressed in Direct Logic [Hewitt 2008c] (see discussion later in this paper). xviii Note that (unlike Venkatraman and Singh [1999]), no assumption is made that the buyers and sellers are not malicious, e.g., no use is made of time-stamps that can be forged. xix Statistical probabilistic (fuzzy logic) systems are affected follows: Suppose (as above) ├Boston ℙ(TrafficJam WeekdayAt5PM) = 1xix ├Boston ℙ(TrafficJam) = 0 Then ├Boston ℙ(WeekdayAt5PM) = ℙ(  ) = 0xix ℙ( ) Thus contraposition is built into probabilistic (fuzzy logic) systems and consequently incorrect information can be generated. The above example illustrates that the choice of how to incorporate measurements into statistics can effectively determine the model being used. In this particular case, the way that measurements were taken did not happen to take into account things like holidays and severe winter storms This point was largely missed in [Anderson 2008] which stated November 6, 2010 Page 17 of 18 “Correlation is enough.” We can stop looking for models. We can analyze the data without hypotheses about what it might show. We can throw the numbers into the biggest computing clusters the world has ever seen and let statistical algorithms find patterns where science cannot.” (emphasis added) xx The axiomatization makes use of higher order capabilities. For example a predicate like CanResult can take arguments Do[Machiavelli, Collude] and Rich[Machiavelli] to form the proposition CanResult[Do[Machiavelli, Collude], Rich[Machiavelli]]. xxi The axiomatization uses a colon (:) to separate universally quantified variable from the following proposition to which they apply. Direct Logic supports fine grained reasoning because inference does not necessarily carry argument in the contrapositive direction. For example, the general principle “A person does anything that can make them rich” (i.e., CanResult[Do[p, action], Rich[p]]├ ThePrince Do[p, action] does not support the inference of CanResult[Do[Machiavelli, Collude], Rich[Machiavelli]] from Do[Machiavelli, Collude]). E.g., it might be the case that CanResult[Do[Machiavelli, Collude], Rich[Machiavelli]] even though it infers Do[Machiavelli, Collude] contradicting Do[Machiavelli, Collude]. xxii “A prince never lacks legitimate reasons to break his promise” [Machiavelli 1532] xxiii “The one who adapts his policy to the times prospers, and likewise that the one whose policy clashes with the demands of the times does not.” [Machiavelli 1532] November 6, 2010 Page 18 of 18
1909.08974
1
1909
2019-09-19T13:22:54
Robust time-varying formation design for multi-agent systems with disturbances: Extended-state-observer method
[ "cs.MA", "eess.SY", "eess.SY" ]
Robust time-varying formation design problems for second-order multi-agent systems subjected to external disturbances are investigated. Firstly, by constructing an extended state observer, the disturbance compensation is estimated, which is a critical term in the proposed robust time-varying formation control protocol. Then, an explicit expression of the formation center function is determined and impacts of disturbance compensations on the formation center function are presented. With the formation feasibility conditions, robust time-varying formation design criteria are derived to determine the gain matrix of the formation control protocol by utilizing the algebraic Riccati equation technique. Furthermore, the tracking performance and the robustness property of multi-agent systems are analyzed. Finally, the numerical simulation is provided to illustrate the effectiveness of theoretical results.
cs.MA
cs
Robust time-varying formation design for multi-agent systems with disturbances: Extended-state-observer method Le Wang, Jianxiang Xi∗, Ming He, Guangbin Liu Rocket Force University of Engineering, Xi'an, 710025, P.R. China SUMMARY Robust time-varying formation design problems for second-order multi-agent systems subjected to external disturbances are investigated. Firstly, by constructing an extended state observer, the disturbance compensation is estimated, which is a critical term in the proposed robust time-varying formation control protocol. Then, an explicit expression of the formation center function is determined and impacts of disturbance compensations on the formation center function are presented. With the formation feasibility conditions, robust time-varying formation design criteria are derived to determine the gain matrix of the formation control protocol by utilizing the algebraic Riccati equation technique. Furthermore, the tracking performance and the robustness property of multi-agent systems are analyzed. Finally, the numerical simulation is provided to illustrate the effectiveness of theoretical results. Received . . . KEY WORDS: Multi-agent system, robust time-varying formation, external disturbance, extended state observer, algebraic Riccati equation. 1. INTRODUCTION Recently, the distributed cooperative control of multi-agent systems has aroused extensive attentions in multiple fields, including wireless communication, robotics and distributed computation as shown in [1]-[8]. As an important research topic on the distributed control, formation control refers to design a control strategy with the neighboring information such that a group of autonomous agents reach an expected geometrical shape. In the past two decades, several classical formation control methodologies were investigated, such as the leader-follower method [9], the virtual-structure-based strategy [10] and the behavioral approach [11], among many others. Beard et al. [12] showed that each of the above-mentioned classical methodologies has its corresponding weakness. Ren [13] addressed formation control problems by implementing the consensus-based approach and showed that the above-mentioned classical methodologies could be unified in the framework of the consensus-based formation control. Inspired by the development of the consensus Contract/grant sponsor: This work was supported by the National Natural Science Foundation of China under Grants 61867005, 61763040, 61703411 and 61374054, Innovation Foundation of High-Tech Institute of Xi'an (2015ZZDJJ03) and Scientific Research Project under Grant JJ20172B03058, also supported by Innovation Zone Project under Grant 18-163-11-ZT-004-005-01. ; contract/grant number: 2 theory in the control community (e.g., [14]-[19]), the newly developed consensus-based formation control strategies were reported in many application fields including mobile robots, intelligent ground vehicles and unmanned aerial vehicles (see [20]-[25] and the references therein). In many practical circumstances, multi-agent systems may suffer external disturbances due to environmental uncertainties, which can drive these systems to oscillations or divergences. For example, in the formation flying of multiple quadrotors, atmospheric disturbances can be regarded as additional forces and may cause instabilities in both the attitude and position dynamics. It is significant to address disturbance rejection problems such that multi-agent systems can reach the asymptotical disturbance rejection while conserving the closed-loop stability. Jafarian et al. [26] studied the formation keeping control for a group of nonholonomic wheeled robots with matched input disturbances, where the disturbances were compensated by internal-model-based controllers. In [27], the time-invariant formation tracking control for a group of quadrotors with unknown bounded disturbances was achieved by designing an H∞ control controller, where the disturbance cannot be rejected by the proposed method in the whole desired frequency range. Liu et al. [28] proposed a robust compensating filter to handle time-invariant formation control problems of multiple quadrotors with disturbance rejections in the whole frequency domain as much as desired. Note that the desired formation was time-invariant in [20]-[28]. However, time-varying formation configurations are required in many applications due to complex external environments and/or variable mission situations. For example, the formation shape should be changed in the obstacle avoidance for multiple mobile robots. Several significant results about the time-varying formation control were obtained in [29]-[33]. Cooperative time-varying formation control methods was studied in [29], where the formation was characterized by time-varying external parameters. A time-varying formation of collaborative unmanned aerial vehicles and unmanned ground vehicles was achieved in [30]. Time-varying formation tracking control was reached when considering the influence of switching topologies in [31]. Dong et al. [32] investigated the time-varying formation analysis and design problems for second-order multi-agent systems with directed topologies, where a formation feasibility condition was proposed to show that not all expected formation could be achieved. Time- varying group formation control for multi-agent systems with directed topologies was showed in [33]. However, further investigates on disturbance rejections of the time-varying formation with the influence of external disturbances were not considered in [29]-[33], and the disturbance rejection methods for time-invariant formations in [26]-[28] cannot be implemented since the expected formation is time-varying. To the best of our knowledge, robust time-varying formation design problems for second-order multi-agent systems with unknown external disturbances have not been investigated extensively. Motivated by the above-mentioned facts, the current paper develops an extended-state-observer method to tackle the robust time-varying formation control problem for multi-agent systems subjected to external disturbances. With the disturbance compensation, a novel robust time-varying formation control protocol is proposed, using only relative neighboring information. By regarding external disturbances as additional states, an extended state observer (ESO) is constructed to determine the disturbance compensation. Then, the closed-loop dynamics of the whole multi-agent system is divided into two parts. The first one is the formation agreement dynamics, which is utilized to derive an explicit expression of the formation center function. The second part, called the disagreement dynamics, can describe the relative motion among agents. Sufficient conditions of () 3 the robust time-varying formation design are determined via algebraic Riccati equation techniques, together with the formation feasibility conditions. Moreover, the tracking performance and the robustness stability of the closed-loop system are analyzed. Compared with the existing results about the time-varying formation control of multi-agent systems, the current paper contains the following three novel features. Firstly, to achieve the disturbance rejection control objective, a robust time-varying formation control protocol is proposed with the robust disturbance compensation. Time-varying formation protocols in [29]-[33] cannot deal with the robust time-varying formation control problems when the influence of external disturbances is considered. Secondly, an ESO is constructed to determine the robust disturbance compensation, which can actively compensate the external disturbance in real time. Tracking performances and robust properties are analyzed with the ESO and the formation feasibility condition. However, disturbance compensations and robust properties were not considered in [29]- [33]. Thirdly, an explicit expression of the formation center function is deduced to show the macroscopic motion of the whole formation under the influence of external disturbances. It is revealed that that the disturbance compensation has effects on formation center functions. However, [29]-[31] did not give the formation center function and the formation center functions in [32] and [33] could not determine the impact of disturbance compensation. An outline of the current paper is presented as follows. Section 2 gives the problem description. In Section 3, an explicit expression of the formation center functions is determined. In Section 4, sufficient conditions of the robust time-varying formation design are shown and the tracking performance and the robustness stability are analyzed. Section 5 illustrates the effectiveness of theoretical results via a numerical simulation. Conclusions are stated in Section 6. Notations: Let Rn and Rn×m be the n-dimension real column vector and the n × m- dimension real matrix, respectively. For simplicity, 0 uniformly represents the zero number, zero vectors and zero matrices. 1N stands for an N -dimensional column vector with each entry being 1. P −1, P H and P T denote the inverse matrix, the Hermitian adjoint matrix and the transpose matrix of P , respectively. The norm used here is respectively defined as kh(t)k1 = maxi(cid:16)PjR ∞ 0 and kp(t)k∞ = maxisupt>0 pi(t), where · is the absolute value, h(t) = [hij(t)] ∈ Rm×n and p(t) = [pi(t)] ∈ Rn. The Kronecker product is represented by the notation ⊗. hij(t) dt(cid:17), kp(t)k = kp(t)k2 =(cid:16)Pn i=1 pi(t)2(cid:17)1/2 2. PROBLEM DESCRIPTION Consider a group of N identical agents with the dynamics of the ith agent described by: ( pi(t) = vi(t), vi(t) = αppi(t) + αvvi(t) + ui(t) + ωi(t), (1) where i = 1, 2, · · · , N , pi(t), vi(t) and ui(t) ∈ Rn represent the position, the velocity and the control input, respectively, ωi(t) ∈ Rn is the unknown bounded external disturbance and αp and αv are the damping constants. The interaction topology among agents is described by a digraph G, where agent i is represented by the ith node, the interaction channel among nodes is denoted by an edge and the interaction strength is depicted by the edge weight wij . Note that wij > 0 if agent j () 4 belongs to the neighbor set Ni of agent i and wij = 0 otherwise. For the digraph G, the weighted adjacency matrix is W = [wij ]N ×N and D = diag{d1, d2, · · · , dN } stands for the in-degree matrix. Define the Laplacian matrix of G as L = D − W . A directed path from node i to node j is a finite ordered sequence of edges described as {(vi, vm), (vm, vn), · · · , (vl, vj)}. A digraph is said to have a spanning tree if a root node i exists such that it at least has a directed path to every other node. Lemma 1 ([34]) If G has a spanning tree, then 0 is its single eigenvalue with 1N being the related eigenvector and other N − 1 eigenvalues have positive real parts; that is, 0 = λ1 < Re(λ2) 6 · · · 6 Re(λN ). Let fi(t) = [f T iv(t)]T ∈ R2n (i ∈ {1, 2, · · · , N }) be a piecewise continuously differ- ip(t), f T then the expected time-varying formation is specified by a vector f (t) = N (t)]T . By considering the disturbance compensation, a robust time-varying entiable vector, [f T formation control protocol is proposed as follows: 2 (t), · · · , f T 1 (t), f T ui(t) = Ku Xj∈Ni wij (xj(t) − xi(t) − fj(t) + fi(t)) − αfi(t) + fiv(t) − zi(t), (2) i (t)]T , α = [αp, αv] ⊗ In, Ku ∈ Rn×2n is the gain where i ∈ {1, 2, · · · , N }, xi(t) = [pT matrix and zi(t) is the robust disturbance compensation, which is determined by the following ESO: i (t), vT ( gi(t) = zi(t) + ui(t) + αppi(t) + αvvi(t) − βig (gi(t) − vi(t)) , zi(t) = −βiz (gi(t) − vi(t)) , (3) where βig and βiz are bandwidth constants, and gi(t) is the intermediate variable of the ESO. Let x(t) = [xT N (t)]T , θ1 = [1, 0]T ⊗ In and θ2 = [0, 1]T ⊗ In, then multi-agent system (1) with protocol (2) can be rewritten as a global closed-loop system with the following 2 (t), · · · , xT 1 (t), xT dynamics: x(t) =(cid:0)IN ⊗(cid:0)θ1θT 2 + θ2α(cid:1) − L ⊗ θ2Ku(cid:1) x(t) − (IN ⊗ θ2α − L ⊗ θ2Ku) f (t) +(cid:0)IN ⊗ θ2θT 2(cid:1) f (t) + (IN ⊗ θ2) (ω(t) − z(t)) . Definition 1 (4) For any given positive constant ε and bounded initial states x(0), multi-agent systems (1) is said to be robust time-varying formation-reachable by protocol (2) if all states involved in the global closed- loop system (4) are bounded and there exist a gain matrix Ku, a vector-valued function c(t) and a finite constant tε such that kxi(t) − fi(t) − c(t)k 6 ε (∀i ∈ {1, 2, · · · , N }), ∀t > tε, where c(t) is the formation center function and ε is called the time-varying formation error bound, respectively. The control objective of the current paper is to design the robust time-varying formation control protocol such that second-order multi-agent systems with external disturbances can reach the expected robust time-varying formation. The following three problems are focused: (i) Determining an explicit expression of formation center functions; (ii) Designing the gain matrix Ku of protocol (2); (iii) Analyzing the tracking performance and the robustness property of the global closed-loop system. () 3. FORMATION CENTER FUNCTIONS This section gives an explicit expression of formation center functions and shows impacts of the time-varying formation and the disturbance compensation on the formation center function, respectively. 5 Let ξi(t) = xi(t) − fi(t) (i ∈ {1, 2, · · · , N }) and ξ(t) = [ξT 1 (t), ξT 2 (t), · · · , ξT N (t)]T , then global closed-loop system (4) can be transformed into ξ(t) =(cid:0)IN ⊗(cid:0)θ1θT 2 + θ2α(cid:1) − L ⊗ θ2Ku(cid:1) ξ(t) + (IN ⊗ θ2) (ω(t) − z(t)) +(cid:0)IN ⊗ θ1θT 2(cid:1) f (t) −(cid:0)IN ⊗ θ1θT 1(cid:1) f (t). Let U = [1N , u] ∈ RN ×N be a nonsingular matrix with u = [u2, u3, · · · , uN ] ∈ RN ×(N −1) such N ]H ∈ R(N −1)×N and J is that U −1LU = J , where U −1 = [¯uH the Jordan canonical form of L. 1 , ¯uH]H with ¯u = [¯uH 3 , · · · , ¯uH 2 , ¯uH According to Lemma 1 and the structure of U , one can obtain that J = diag{0, J}, where J consists of the corresponding Jordan blocks of λi (i = 2, 3, · · · , N ). Let ξ(t) = (U −1 ⊗ I2n)ξ(t) = [κT (t), ϕT (t)]T , in which κ(t) = ξ1(t) and ϕ(t) = [ ξT N (t)]T , then multi-agent system (5) can be transformed into 3 (t), · · · , ξT 2 (t), ξT (5) (6) (7) κ(t) =(cid:0)θ1θT 2 + θ2α(cid:1) κ(t) + (¯u1 ⊗ θ2) (ω(t) − z(t)) + (¯u1 ⊗ θ1)(cid:0)fv(t) − fp(t)(cid:1) , 2 + θ2α(cid:1) − J ⊗ θ2Ku(cid:1) ϕ(t) + (¯u ⊗ θ2) (ω(t) − z(t)) ϕ(t) =(cid:0)IN −1 ⊗(cid:0)θ1θT + (¯u ⊗ θ1)(cid:0)fv(t) − fp(t)(cid:1) , where fv(t) = [f T 1v(t), f T 2v(t), · · · , f T N v(t)]T and fp(t) = [ f T 1p(t), f T 2p(t), · · · , f T N p(t)]T . Subsystems (6) and (7) depict the formation agreement and disagreement dynamics of multi-agent system (1), which describe the absolute movement of the whole system and the relative movement among agents, respectively. According to subsystem (6), the following theorem determines the impact of the disturbance compensation on the formation center function and shows an explicit expression of the formation center function, which describes the macroscopic motion of the whole formation. Theorem 1 For any given ε > 0, if multi-agent system (1) reaches the expected robust time-varying formation f (t), then the formation center function c(t) satisfies that kc(t) − c0(t) − cz(t) − cf (t)k 6 ε, ∀t > tε, where tε is a finite constant and c0(t) = e(θ1θT 2 +θ2α)t(¯u1 ⊗ I2n)x(0), cz(t) =Z t 0 e(θ1θT 2 +θ2α)(t−ς) (¯u1 ⊗ θ2) (ω(ς) − z(ς))ds, () 6 cf (t) =Z t 0 e(θ1θT 2 +θ2α)(t−τ ) (¯u1 ⊗ θ2)(cid:0) fv(τ ) − αpfp(τ ) − αvfv(τ )(cid:1)dτ − (¯u1 ⊗ I2n) f (t). Proof Let e1 ∈ RN denote a unit vector with its first element being 1. Define the following auxiliary functions: ξa(t) = (U ⊗ I2n)[κT (t), 0]T , ξd(t) = (U ⊗ I2n)[0, ϕT (t)]T , (8) (9) with kU ⊗ I2nk = εN . Due to (U −1 ⊗ I2n)ξ(t) = [κT (t), ϕT (t)]T , it can be obtained from (8) and (9) that ξ(t) = ξa(t) + ξd(t). (10) Since U ⊗ I2n is nonsingular, one can concluded that ξa(t) and ξd(t) are linearly independent. It follows from (8) and the fact [κT (t), 0]T = e1 ⊗ κ(t) that ξa(t) = (U ⊗ I2n) (e1 ⊗ κ(t)) = U e1 ⊗ κ(t) = 1N ⊗ κ(t). From (10) and (11), one can show that ξd(t) = ξ(t) − 1N ⊗ κ(t). (11) (12) From (9), (10) and (12), one can find that for any given positive constant ε, there exists a finite constant tε such that kxi(t) − fi(t) − κ(t)k 6 ε (i ∈ {1, 2, · · · , N }), ∀t > tε, if kϕ(t)k 6 ε/εN = εϕ, ∀t > tε, which means that ϕ(t) represents the time-varying formation error and κ(t) shows one of the candidates of formation center functions, respectively. From (8), one can obtain that κ(0) = (¯u1 ⊗ I2n)(x(0) − f (0)). (13) One can show that 0 Z t =Z t −Z t 0 0 and e(θ1θT 2 +θ2α)(t−τ ) (¯u1 ⊗ θ1)(cid:0)fv(τ ) − fp(τ )(cid:1)dτ 2 +θ2α)(t−τ ) (¯u1 ⊗ θ1) fv(τ )dτ + e(θ1θT e(θ1θT 2 +θ2α)t (¯u1 ⊗ θ1) fp(0) 2 + θ2α)θ1(cid:1) fp(τ )dτ − (¯u1 ⊗ θ1) fp(t), e(θ1θT 2 +θ2α)(t−τ )(cid:0)¯u1 ⊗ (θ1θT Z t 0 = (¯u1 ⊗ θ2) fv(t) − e(θ1θT e(θ1θT 2 +θ2α)(t−τ ) (¯u1 ⊗ θ2) fv(τ )dτ 2 +θ2α)t (¯u1 ⊗ θ2) fv(0) (14) () +Z t 0 e(θ1θT 2 +θ2α)(t−τ )(cid:0)¯u1 ⊗ (θ1θT 2 + θ2α)θ2(cid:1) fv(τ )dτ. By the structure of f (t), it can be found that (¯u1 ⊗ θ1) fp(t) + (¯u1 ⊗ θ2) fv(t) = (¯u1 ⊗ I2n) f (t), e(θ1θT 2 +θ2α)t ((¯u1 ⊗ θ1) fp(0) + (¯u1 ⊗ θ2) fv(0)) = e(θ1θT 2 +θ2α)t (¯u1 ⊗ I2n) f (0). Then, it follows from (14)-(17) that e(θ1θT 0 Z t =Z t 0 2 +θ2α)(t−τ ) (¯u1 ⊗ θ1)(cid:0)fv(τ ) − fp(τ )(cid:1)dτ 2 +θ2α)(t−τ ) (¯u1 ⊗ θ2)(cid:0) fv(τ ) − αpfp(τ ) − αvfv(τ )(cid:1)dτ e(θ1θT +e(θ1θT 2 +θ2α)t (¯u1 ⊗ I2n) f (0) − (¯u1 ⊗ I2n) f (t). 7 (15) (16) (17) (18) In virtue of (6), (13) and (18), the conclusion of Theorem 1 can be obtained. 4. ROBUST TIME-VARYING FORMATION DESIGN In this section, firstly, an algorithm is presented to show the procedure of designing the robust time-varying formation control protocol. Then, sufficient conditions of the robust time-varying formation design are shown and the tracking performance and the robustness stability of multi-agent systems are analyzed, respectively. The core idea of designing robust time-varying formation control protocol (2) is to determine the gain matrix and the robust disturbance compensation. The following algorithm with four steps is presented to design protocol (2). Robust Time-Varying Formation Design Algorithm Step 1: Check the following formation feasibility condition for the expected time-varying formation. 6 εf , ∀t > tε, ∀i ∈ {1, 2, · · · , N }. (19) (cid:13)(cid:13)fiv(t) − fip(t)(cid:13)(cid:13)∞ If condition (19) is satisfied, then go to Step 2; else the expected time-varying formation cannot be reached by multi-agent system (1) with protocol (2) and the algorithm stops. Step 2: Solve the following algebraic Riccati equation for a positive definite matrix P P (θ1θT 2 + θ2α) + (θ1θT 2 + θ2α)T P − P θ2θT 2 P + I = 0. (20) Step 3: Set the gain matrix Ku as Ku = Re−1(λ2)θT Step 4: Choose sufficiently large bandwidth constants βig and βiz (i ∈ {1, 2, · · · , N }) of ESO (3) 2 P . to effectively estimate the robust disturbance compensation. () 8 With the robust time-varying formation design algorithm, tracking performances and robustness stability properties are analyzed in the following theorem. Theorem 2 For any given bounded initial states, if formation feasibility condition (19) is satisfied, then multi- agent system (1) reaches the robust time-varying formation by protocol (2) designed in the robust time-varying formation design algorithm. Proof Firstly, consider the stability of the following subsystem: where ∀k ∈ {2, 3, · · · , N }. Then construct the Lyapunov function candidate as follows: ηk(t) =(cid:0)θ1θT 2 + θ2α − λkθ2Ku(cid:1) ηk(t), Vk(t) = ηH k (t)P ηk(t). Let Ku = Re−1(λ2)θT 2 P , then differentiating V (t) along the trajectories of (21) yields Vk(t) = ηH k (t)(cid:16)(θ1θT 2 + θ2α) T P + P (θ1θT 2 + θ2α) − 2 Re(λk)Re−1(λ2)P θ2θT 2 P(cid:17) ηk(t). Substituting P (θ1θT 2 + θ2α) + (θ1θT 2 + θ2α)T P = P θ2θT 2 P − I into (23) gives Vk(t) = ηH k (t)(cid:0)(cid:0)1 − 2 Re(λk)Re−1(λ2)(cid:1) P θ2θT 2 P − I(cid:1) ηk(t). (21) (22) (23) (24) Due to 0 < Re(λ2) 6 · · · 6 Re(λN ), one can derive from (24) that {2, 3, · · · , N }). Therefore, ηk(t) converges to 0 asymptotically, which means that θ1θT λkθ2Ku is Hurwitz. By the structure of J , one can conclude that IN −1 ⊗ (θ1θT is Hurwitz. k (t)ηk(t) (∀k ∈ 2 + θ2α − 2 + θ2α) − J ⊗ θ2Ku Vk(t) 6 −ηH Then, the tracking performance and the robustness stability is analyzed. Let A = IN −1 ⊗ (θ1θT 2 + θ2α) − J ⊗ θ2Ku, then subsystem (7) can be rewritten as ϕ(t) = Aϕ(t) + (¯u ⊗ θ2) (ω(t) − z(t)) + (¯u ⊗ θ1)(cid:0)fv(t) − fp(t)(cid:1) . By Laplace transform, (3) can be converted to ( zi(s) − ωi(s) + (βig + s) (vi(s) − gi(s)) = 0, szi(s) + βizgi(s) − βizvi(s) = 0, where i ∈ {1, 2, · · · , N }. From (26), it can be shown that zi(s) = Gi(s)ωi(s), (25) (26) (27) where Gi(s) = βiz(cid:14)(s2 + βigs + βiz), i ∈ {1, 2, · · · , N }. Let βig = 2σi and βiz = σ2 obtain that i , then one can Gi(s) = σ2 i (s + σi)2 . (28) () From (27), it follows that ω(s) − z(s) = diag{1 − G1(s), 1 − G2(s), · · · , 1 − GN (s)}ω(s) = ΦN (s)ω(s). (29) Define 9 ρω =(cid:13)(cid:13)(cid:13) ρf =(cid:13)(cid:13)(cid:13) υϕ(0) =(cid:13)(cid:13)eAtϕ(0)(cid:13)(cid:13)∞ . , (sI2n(N −1) − A)−1 (¯uΦN (s) ⊗ θ2)(cid:13)(cid:13)(cid:13)1 (sI2n(N −1) − A)−1 (¯u ⊗ θ1)(cid:13)(cid:13)(cid:13)1   kϕ(t)k∞ 6 υϕ(0) + ρωkω(t)k∞ + ρf(cid:13)(cid:13)fv(t) − fp(t)(cid:13)(cid:13)∞ , (30) . (31) From (25), (27), (29) and (30), it can be derived that For agent i (i ∈ {1, 2, · · · , N }), since ω(t) is bounded, there exist two positive constants γϕi and δωϕi such that kωi(t)k∞ 6 γϕikui(t)k∞ + δωϕi, i ∈ {1, 2, · · · , N }. It follows from (32) that positive constants γϕ and δωϕ exist such that kω(t)k∞ 6 γϕku(t)k∞ + δωϕ. By (2), (3) and (29), one can show that ku(t)k∞ = δuϕ1kϕ(t)k∞ + δuϕ2kω(t)k∞ + δuϕ3, (32) (33) (34) where δuϕ1, δuϕ2 and δuϕ3 are positive constants. Substituting (34) into (33), one can obtain that υϕ and υe exist such that kω(t)k∞ 6 υϕkϕ(t)k∞ + υe. (35) If k¯u ⊗ θ2k∞ is bounded and σi (i = 1, 2, · · · , N ) are sufficiently large, then it can be deduced from (31) and (35) that It follows from (36) that kω(t)k∞ 6 kϕ(t)k∞ 6 υϕυϕ(0) + υe 1 − υϕρω υϕ(0) + υeρω 1 − υϕρω , .   ( kω(t)k∞ 6 υω, kϕ(t)k∞ 6 υϕ, (36) (37) () 10 where υω and υϕ are positive constants. According to the formation feasibility condition (19), one has that 6 εf , ∀t > tf . (38) From (31), (37) and (38), one can obtain that (cid:13)(cid:13)fv(t) − fp(t)(cid:13)(cid:13)∞ eAtϕ(0)(cid:12)(cid:12)(cid:12) (cid:12)(cid:12)(cid:12) 2n(N −1),i cT i max i ϕi(t) 6 max + ρω υω + ρf εf , ∀t > tf , (39) where i ∈ {2, 3, · · · , N }, c2n(N −1),i is a 2n(N − 1)-dimensional unit column vector with the ith element 1 and other elements 0. For the bounded initial states ϕi(0) (i ∈ {2, 3, · · · , N }), one can find that ϕi(t) is bounded. It can also be obtained that the states of the robust disturbance compensation zi(t) and the control protocol ui(t) are bounded. It follows that all states involved in the closed-loop system (4) are bounded. Furthermore, since A is Hurwitz, there exists a finite constant tε > tf such that kϕ(t)k 6 εϕ, ∀t > tε for any given positive constant εϕ, which means that multi-agent system (1) is robust time-varying formation-reachable by protocol (2). This completes the proof. 5. NUMERICAL SIMULATIONS In this section, a simulation example is provided to demonstrate the effectiveness of the theoretical results obtained in previous sections. Consider a second-order multi-agent system containing six agents in the XY Z space (n = 3), where the interaction topology among agents is described as a 0-1 weighted digraph in Figure 1. The dynamics of each agent can be described by (1) with αp = −0.01 and αv = 0. Let xi(t) = [piX (t), piY (t), piZ (t), viX (t), viY (t), viZ (t)]T (i ∈ {1, 2, · · · , 6}), where piX (t), piY (t), piZ(t) and viX (t), viY (t), viZ (t) are positions and velocities along the X axis, Y axis and Z axis, respectively. The initial states of each agent are x2(t) = [−1.5, −0.3, 1.8, −1.6, 2.3, 1.1]T , x5(t) = set x3(t) = [2.1, 0.8, −1.6, 0.3, −1.9, 2.5]T , [4.5, 1.9, −1.2, −2.9, 3.5, −1.4]T and x6(t) = [−4.2, 2.9, 3.8, −5.1, −3.5, 2.7]T . x4(t) = [3.8, 1.7, −2.6, 1.8, −3.3, 1.5]T , x1(t) = [0.6, 1.2, 0.5, −1.2, −0.3, 0.8]T , as 1 6 2 5 3 4 Figure 1. Interaction topology G. () The six agents are required to follow a time-varying formation in the form of 11 fi(t) = 3   sin(t + (i − 1)π/3) cos(t + (i − 1)π/3) − sin(t + (i − 1)π/3) cos(t + (i − 1)π/3) − sin(t + (i − 1)π/3) − cos(t + (i − 1)π/3)   , (i = 1, 2, · · · , 6). It can be found from fi(t) that both positions and velocities of six agents can take shape regular hexagons with time-varying edges. One can see that formation feasibility condition (19) is satisfied. The external disturbances are generated by ωi(t) =  (2.5 + 0.2(i − 1)) sin t + 1.5 + 1.2(i − 1) (1.5 + 0.2(i − 1)) sin t + 2.5 + 1.2(i − 1) (2 + 0.2(i − 1)) sin(t + 0.4π) + 3 + 0.2(i − 1)   , (i = 1, 2, · · · , 6). Choose the bandwidth constants of ESO (3) as βig = 2σi and βiz = σ2 i with σi = 10 (i ∈ {1, 2, · · · , 6}). From Theorem 2, one can determine that Ku = [1.0654, 1.8576] ⊗ I3. Figures 2 and 3 describe the position and velocity trajectory of six agents and the formation center at t = 0s, t = 10s, t = 15s and t = 20s, respectively, where the position and velocity states of agents are represented by asterisks, plus signs, circles, x marks, pentagrams and squares, and the formation centers are denoted by hexagrams. Figure 4 presents the curves of the formation centers for positions and velocities within t = 20s, where the initial and final states are depicted by circles and squares, respectively. Figure 5 shows the trajectory of the formation center within t = 20s. From Figures 2(a)-(b) and 3(a)-(b), one can find that the multi-agent system can achieve the regular pentagon formation in both position and velocity states. Figures 2(b)-(d) and 3(b)-(d) present that the formation keeps rotation in position and velocity states, respectively; that is, the formation is time-varying. From the simulation results shown in Figures 2-5, one can conclude that second- order multi-agent system (1) with external disturbance achieves the robust time-varying formation by protocol (2). ) t ( Z i p 4 2 0 -2 -4 3 2 0 1 piY (t) (a) t = 0s 50 48 46 44 42 -2 ) t ( Z i p 5 0 piX (t) -5 -1 -40 piX (t) -45 -50-8 -4 -6 piY (t) (b) t = 10s () 12 ) t ( Z i p 56 54 52 50 48 0 48 46 44 42 ) t ( Z i p -2 -6 -4 piY (t) (c) t = 15s -45 -50 piX (t) 40 2 -55 -8 -35 -40 piX (t) -45 -6 0 -4 -2 piY (t) (d) t = 20s Figure 2. Position curves of six agents and the formation center at different time. ) t ( Z i v ) t ( Z i v 3 2 1 0 -1 -2 4 4 2 0 -2 -4 4 2 2 -2 0 viY (t) (a) t = 0s -2 0 viY (t) (c) t = 15s 6 4 2 0 ) t ( Z i v 10 0 viX (t) -2 4 -10 -4 2 0 -2 -4 -6 4 ) t ( Z i v 5 0 viX (t) -5 -4 2 2 5 0 viX (t) -5 -4 -2 0 viY (t) (b) t = 10s 10 0 viX (t) -10 -4 -2 0 viY (t) (d) t = 20s Figure 3. Velocity curves of six agents and the formation center at different time. ) t ( Z p c 60 50 40 30 20 10 0 2 8 6 4 2 0 -2 -4 1 ) t ( Z v c 50 0 cpX (t) 0 -2 -4 -50 -6 cpY (t) 0 -1 cvY (t) -2 -3 10 0 -10 cvX (t) (a) Formation center for positions (b) Formation center for velocities Figure 4. Curves of the formation center for positions and velocities. () 13 20 15 10 5 k ) t ( ϕ k 0 0 5 10 t / s 15 20 Figure 5. Trajectory of the time-varying formation error. 6. CONCLUSIONS In the current paper, robust time-varying formation design problems for second-order multi- agent systems with external disturbances and directed topologies were studied. A new robust time-varying formation control protocol was proposed with only relative neighboring information and an ESO was designed to estimate and compensate the external disturbances. An explicit expression of the formation center function was derived, where the impacts of the disturbance compensation and the time-varying formation on the motion mode of the whole formation were determined. Sufficient conditions of the robust time-varying formation design were presented via algebraic Riccati equation technique together with the formation feasibility conditions. The tracking performance and the robustness stability of multi-agent systems were analyzed. It was proven that multi-agent systems can reach the expected robust time-varying formation if the gain matrix can be designed and the bandwidth constants of the ESO could be selected properly. REFERENCES 1. Richert D, Cortes J. Optimal leader allocation in UAV formation pairs ensuring cooperation. Automatica 2013; 49(11): 3189-3198. 2. Tan Z, Cai N, Zhou J, Zhang S. On performance of peer review for academic journals: analysis based on distributed parallel system. IEEE Access 2019, DOI: 10.1109/ACCESS.2019.2896978. 3. Xi J, Fan Z, Liu H, Zheng T. Guaranteed-cost consensus for multiagent networks with Lipschitz nonlinear dynamics and switching topologies. International Journal of Robust and Nonlinear Control 2018; 28(7): 2841-2852. 4. Ji Z, Yu H. A new perspective to graphical characterization of multi-agent controllability. IEEE Transactions on Cybernetics 2017; 47(6): 1471-1483. 5. Ma H, Jia X, Cai N, Xi J. Adaptive guaranteed-performance consensus control for multi-agent systems with an adjustable convergence speed. Discrete Dynamics in Nature and Society 2019; 5190301. 6. Yang X, Yu W, Wang R, Zhang G, Nie F. Fast spectral clustering learning with hierarchical bipartite graph for large-scale data. Pattern Recognition Letters 2018, DOI: 10.1016/j.patrec.2018.06.024. 7. Liu X, Ji Z, Hou T. Stabilization of heterogeneous multi-agent systems via harmonic control. Complexity 2018; 8265637. 8. Xi J, Wang C, Liu H, Wang L. Completely distributed guaranteed-performance consensualization for high-order multiagent systems with switching topologies. IEEE Transactions on Systems, Man, and Cybernetics: Systems 2019; 49(7): 1338-1348. 9. Mahmood A, Kim Y. Leader-following formation control of quadcopters with heading synchronization. Aerospace Science and Technology 2015; 47(1): 68-74. () 14 10. Balch T, Arkin R. Behavior-based formation control for multirobot teams. IEEE Transactions on Robotics and Automation 1998; 14(6): 926-939. 11. Lewis M, Tan K. High precision formation control of mobile robots using virtual structures. Autonomous Robots 1997; 4(4): 387-403. 12. Beard R, Lawton J, Hadaegh F. A coordination architecture for spacecraft formation control. IEEE Transactions on Control System Technology 2001; 9(6): 777-790. 13. Ren W. Consensus strategies for cooperative control of vehicle formations. IET Control Theory and Application 2007; 1(2): 505-512. 14. Zhang Y, Sun J, Liang H, Li H. Event-triggered adaptive tracking control for multi-agent systems with unknown disturbances. IEEE Transactions on Cybernetics 2018, DOI: 10.1109/TCYB.2018.2869084. 15. Xi J, He M, Liu H, Zheng J. Admissible output consensualization control for singular multi-agent systems with time delays. Journal of the Franklin Institute 2016; 353(16): 4074-4090. 16. Li Z, Chen J. Robust consensus of linear feedback protocols over uncertain network graphs. IEEE Transactions on Automatic Control 2017; 62(8): 4251-4258. 17. Zheng T, Xi J, Yuan M, Liu G. Guaranteed-performance consensus design for Lipschitz nonlinear multi-agent systems with jointly connected topologies. International Journal of Robust and Nonlinear Control 2019, DOI: 10.1002/rnc.4572. 18. Zhang Y, Li H, Sun J, He W. Cooperative adaptive event-triggered control for multi-agent systems with actuator failures. IEEE Transactions on Systems, Man and Cybernetics: Systems 2018, DOI: 10.1109/TSMC.2018.2883907. 19. Zuo Z, Wang C, Ding Z. Robust consensus control of uncertain multi-agent systems with input delay: a model reduction method. International Journal of Robust and Nonlinear Control 2017; 27(11): 1874-1894. 20. Fax J, Murray R. Information flow and cooperative control of vehicle formations. IEEE Transactions on Automatic Control 2004; 49(9): 1465-1476. 21. Du H, Wen G, Cheng Y, He Y, Jia R. Distributed finite-time cooperative control of multiple high-order nonholonomic mobile robots. IEEE Transactions on Neural Networks and Learning Systems 2017; 28(12): 2998- 3006. 22. Abdessameud A, Taybi A. Formation control of VTOL unmanned aerial vehicles with communication delays. Automatica 2011; 47(11): 2383-2394. 23. Du H, Zhu W, Wen G, Duan Z, Lu J. Distributed formation control of multiple quadrotor aircraft based on nonsmooth consensus algorithms. IEEE Transactions on Cybernetics 2019; 49(1): 342-353. 24. Ou M, Du H, Li S. Finite-time formation control of multiple nonholonomic mobile robots. International Journal of Robust and Nonlinear Control 2014; 24(1): 140-165. 25. Qin W, Liu Z, Chen Z. A novel observer-based formation for nonlinear multi-agent systems with time delay and intermittent communication. Nonlinear Dynamics 2015; 79(3): 1651-1664. 26. Jafarian M, Vos E, Persis C, Scherpen J, Schaft A. Disturbance rejection in formation keeping control of nonholonomic wheeled robots. International Journal of Robust and Nonlinear Control 2016; 26(15): 3344-3362. 27. Jasim W, Gu D. Robust team formation control for quadrotors. IEEE Transactions on Control System Technology 2018; 26(4): 1516-1523. 28. Liu H, Ma T, Lewis F, Wan Y. Robust formation control for multiple quadrotors with nonlinearities and disturbances. IEEE Transactions on Cybernetics, 2018, DOI: 10.1109/TCYB.2018.2875559. 29. Brin´on-Arranz L, Seuret A, Canudas-de-Wit C. Cooperative control design for time-varying formations of multi- agent systems. IEEE Transactions on Automatic Control 2014; 59(8): 2283-2288. 30. Rahimi R, Abdollahi F, Naqshi K. Time-varying formation control of a collaborative heterogeneous multi agent system. Robotics and Autonomous Systems 2014; 62(12): 1799-1805. 31. Dong X, Zhou Y, Ren Z, Zhong Y. Time-varying formation tracking for second-order multi-agent systems subjected to switching topologies with application to quadrotor formation flying. IEEE Transactions on Industrial Electronics 2017; 64(6): 5014-5024. 32. Dong X, Yu B, Shi Z, Zhong Y. Time-varying formation control for unmanned aerial vehicles: theories and applications. IEEE Transactions on Control Systems Technology 2015; 23(1): 340-348. 33. Dong X, Li Q, Zhao Q, Ren Z. Time-varying group formation analysis and design for general linear multi-agent systems with directed topologies. International Journal of Robust and Nonlinear Control 2017; 27(9): 1640-1652. 34. Godsil C, Royal G. Algebraic Graph Theory New York, NY: Springer-Verlag; 2001. 35. Sun B, Gao Z. A DSP-based active disturbance rejection control design for a 1-kW H-bridge DC-DC power converter. IEEE Transactions on Industrial Electronics 2005; 52(5): 1271-1277. 36. Han J. From PID to active disturbance rejection control. IEEE Transactions on Industrial Electronics 2009; 56(3): 900-906. ()
1703.02367
1
1703
2017-03-07T13:18:14
Vocabulary Alignment in Openly Specified Interactions
[ "cs.MA" ]
The problem of achieving common understanding between agents that use different vocabularies has been mainly addressed by designing techniques that explicitly negotiate mappings between their vocabularies, requiring agents to share a meta-language. In this paper we consider the case of agents that use different vocabularies and have no meta-language in common, but share the knowledge of how to perform a task, given by the specification of an interaction protocol. For this situation, we present a framework that lets agents learn a vocabulary alignment from the experience of interacting. Unlike previous work in this direction, we use open protocols that constrain possible actions instead of defining procedures, making our approach more general. We present two techniques that can be used either to learn an alignment from scratch or to repair an existent one, and we evaluate experimentally their performance.
cs.MA
cs
Vocabulary Alignment in Openly Specified Interactions Paula Chocron1,2 and Marco Schorlemmer1 1Artificial Intelligence Research Institute (IIIA-CSIC), Bellaterra, Catalonia, Spain 2Universitat Aut`onoma de Barcelona, Bellaterra, Catalonia, Spain Abstract The problem of achieving common understanding be- tween agents that use different vocabularies has been mainly addressed by designing techniques that explic- itly negotiate mappings between their vocabularies, requiring agents to share a meta-language. In this pa- per we consider the case of agents that use different vocabularies and have no meta-language in common, but share the knowledge of how to perform a task, given by the specification of an interaction protocol. For this situation, we present a framework that lets agents learn a vocabulary alignment from the expe- rience of interacting. Unlike previous work in this direction, we use open protocols that constrain pos- sible actions instead of defining procedures, making our approach more general. We present two tech- niques that can be used either to learn an alignment from scratch or to repair an existent one, and we evaluate experimentally their performance. 1 Introduction Addressing the problem of vocabulary heterogeneity is necessary for the common understanding of agents that use different languages, and therefore crucial for the success of multi-agent systems that act jointly by communicating. This problem has been tackled sev- eral times in the past two decades, in general from two different perspectives. Some approaches [20, 8] consider the existence of external contextual elements that all agents perceive in common, and explore how those can be used to explain the meaning of words. C: beer W: to drink? C: wine 1 C: birra W: da bere? C: vino 1 0 0 2 3 2 3 W: color? C: white 7 5 5 C: red 6 C: bianco 7 C: rosso 6 W: tipo? Figure 1: Protocols for Waiter (W) and Customer (C) A second group of techniques [15, 18] (and also [8], where both approaches are combined) consider the situation, reasonable in agents that communicate re- motely, in which this kind of context is not available. They do so by providing explicit ways of learning or agreeing on a common vocabulary (or alignment be- tween vocabularies). These techniques require agents to share a common meta-language that they can use to discuss about the meaning of words and their align- ments. The complex question of how to communi- cate with heterogeneous interlocutors when neither a physical context nor a meta-language are available remains practically unexplored. The work by Atencia and Schorlemmer [1] ap- proaches this situation by considering a different kind of context, given by the interactions in which agents engage. Agents are assumed to share the knowl- edge of how to perform a task, or, more concretely, the specification of an interaction, given by a finite state automaton. For example, they consider the in- 1 teraction in Figure 1, in which an English speaking customer and an Italian waiter communicate to or- der drinks. The authors show how agents can pro- gressively learn which mappings lead to successful interactions from the experience of performing the task. After several interactions, agents converge to an alignment that they can use to always succeed at ordering and delivering drinks with that particular interlocutor. The interesting aspect of this idea is that the only shared element, namely the interaction specification, is already necessary to communicate. However, using finite state automata as specifications implies that agents need to agree on the exact order in which messages should be sent, which is unnecessar- ily restrictive. In addition, agents learn an alignment that is only useful for one task, and how it can be extrapolated to further interactions is not explored. In this paper we present a general version of the interaction as context approach to vocabulary align- ment in multi-agent systems. Instead of automata, we consider agents that specify interactions with constrained-based open protocols that define rules about what can be said instead of forcing one par- ticular execution. In particular, we use ConDec pro- tocols [14] that use linear temporal logic constraints. One ConDec protocol may not define completely the meaning of all words in a vocabulary, so we study how agents can learn mappings from performing dif- ferent tasks. For this reason, the learning process is substantially different to the one in [1], where a map- ping that works in one task is considered correct. If enough experiences are available, agents that use the techniques we present converge to an alignment that is useful in the general case, even for future interac- tions that they do not yet know. Since learning is done gradually as different interaction opportunities appear, agents can use what they learned early, even if they still do not know the alignment completely. After presenting open interaction protocols, we de- fine a framework for interacting with partners that use different vocabularies. We later present two dif- ferent techniques to learn an alignment from the experience of interacting. The first relies only on analysing if a message is allowed or not in a particular moment, and it can be used in any constraint-based protocol. The second technique uses the semantics 2 of the protocols we present to improve the perfor- mance of the first one. Both methods can be used to learn alignments from scratch when there is no in- formation, as well as to repair alignments obtained with other methods. We evaluate experimentally the techniques when used for both purposes, and show how different factors affect their performance. 2 Open Interaction Protocols The question of what should be expressed by an in- teraction protocol has been extensively discussed in the multi-agent systems community. Traditional ap- proaches such as finite state automata and Petri Nets are simple to design and read, but also too rigid. More flexible alternatives constrain possible actions instead of defining a fixed procedure. Constraint Declarative Protocols (commonly known as ConDec protocols) are an example of these approaches. Con- Dec protocols were first proposed by Pesic and van der Aalst [14] as a language to describe business pro- tocols, and then used as specifications for agent inter- actions by Montali [13], who presented an extension of ConDec and tools for its verification, and by Bal- doni et al. [2, 3], who integrated ConDec constrains and commitment protocols, a framework to specify interactions with social semantics first proposed by Singh [19]. An important advantage of ConDec pro- tocols is that they use linear temporal logic, a well- known logic for which many tools are available. d Linear temporal logic (LTL from now on) is a nat- ural choice to express constraints about actions that occur in time. The syntax of LTL includes the one of propositional logic, and the additional temporal op- erators {(cid:3), ♦, , U}, that can be applied to any LTL formula. LTL formulae are interpreted over paths in Kripke structures, which are sequences of states asso- ciated to a truth-valuation of propositional variables. Temporal operators are interpreted in these paths as follows: (cid:3)p means that p must be true in the truth- valuation of all states, ♦p means that p must be true eventually, p means that p must be true in the next state, and p U q means that p must be true until q is valid. A set of LTL formulae, called a theory, is satis- fiable if there exists a path for which all the formulae d are true. In that case, the path is a model of the the- ory. The satisfiability problem in LTL is decidable, as well as the model checking problem, which consists in deciding if a given path is a model of a theory. A ConDec protocol is a tuple (cid:104)M, C(cid:105), where M is a set of action names and C is a set of constraints about how actions can be performed. Constraints are LTL sentences renamed conveniently. We use a min- imal version1 of the constraints introduced originally by Pesic and van der Aalst that we show in Table 1, where n ∈ N and a, b ∈ M . These constraints are generally divided into three classes. Existential con- straints (existence and absence) predicate over the amount of times some action can be performed, rela- tional constraints describe binary relations between two actions, and negation constraints (preceded by a '!' sign) are relations that do not hold. Given a set M of actions, Cons(M ) is the set of all possible constraints over M . In a protocol (cid:104)M, C(cid:105), necessarily C ⊆ Cons(M ). absence(0, a) absence(n, a) correlation(a, b) !correlation(a, b) response(a, b) !response(a, b) bef ore(a, b) !bef ore(a, b) premise(a, b) !premise(a, b) imm af ter(a, b) !imm af ter(a, b) Constraint existence(n + 1, a) ♦(a ∧ d existence(1, a) LTL meaning ♦a existence(n, a)) ¬existence(1, a) ¬existence(n + 1, a) ♦a =⇒ ♦b ♦a =⇒ ¬♦b (cid:3)(a =⇒ ♦b) (cid:3)(a =⇒ ¬♦b) ¬bU a (cid:3)(♦b =⇒ ¬a) b =⇒ a) (cid:3)( b =⇒ ¬a) (cid:3)( b) d d (cid:3)(a =⇒ d (cid:3)(a =⇒ d¬b) 2.1 Open Protocols as Interaction Table 1: LTL definitions of constraints Protocols In the rest of this section we present the technical notions that are necessary to use ConDec protocols as specifications of interactions between agents that may use different vocabularies. We first define in- teraction protocols, that constrain the way in which agents can utter messages. We introduce the notion of bound to capture the knowledge of agents about how many steps they have to finish the interaction. If this knowledge is not available it can be omitted and replaced for the fact that the interaction must finish in finite steps. Definition 1 Given a set A of agent IDs and a propositional vocabulary V , an interaction protocol is a tuple P = (cid:104)M, C, b(cid:105), where the set of actions M = A × V is a set of messages formed by the ID of the sender agent and the term it utters, C ⊆ Cons(M ), and b ∈ N is the bound. 1 Since we are not interested in the usability of the protocols here, we do not include some constraints that work as syntactic sugar, such as exactly(n, a), that can be replaced by including existence(n, a) and absence(n, a). The semantics of an interaction protocol is defined over interactions that represent a sequence of uttered messages. Definition 2 Given a set of messages M , an in- teraction i ∈ M∗ is a finite sequence of messages m ∈ M . The length of an interaction (len(i)) and the append operation (i . m) are defined in the same way as for sequences. An interaction i can be encoded into a Kripke structure path by including one propositional vari- able for each message m ∈ M and considering the following sequence of states with truth-valuations. In states with index 0 ≤ j < len(i), let the proposi- tional variable for the j-th message in i be true, and all other propositional variables be false. For states after len(i), let all propositional variables be false. With this construction, we can define the semantics of interaction protocols. Definition 3 An interaction i is a model of an in- teraction protocol P = (cid:104)M, C, b(cid:105) (noted i = P) if 3 len(i) ≤ bound, and the Kripke path that encodes i is a model of C. An interaction i(cid:48) is a partial model (noted i(cid:48) =p P) of P if it is a prefix of a model of P. Definition 3 implies that checking satisfiability of an interaction protocol is equivalent to checking LTL satisfiability. As already mentioned, we are interested in agents that use different vocabularies, but share the knowl- edge of how to perform a task. In the rest of this section we define more precisely what that means. From now on, V1 and V2 are two possibly different vocabularies. Let us start by defining the notion of vocabulary alignment. Definition 4 An alignment is a function between vocabularies α : V2 → V1. Given a set of agents A, α can be extended homomorphically to a function between: - messages M1 = A × V1 and M2 = A × V2 (α : M2 → M1) - constraints (α : Cons(M2) → Cons(M1)) and sets of constraints (α : 2Cons(M2) → 2Cons(M1)) - interactions (α : M∗ 1 ) and sets of inter- 2 → M∗ actions (α : 2M∗ 2 → 2M∗ 1 ) To capture the idea of sharing the knowledge of how to perform a task, we define notion of compatibility between protocols, which consists simply on having the same models modulo an alignment. Given a pro- tocol P = (cid:104)M, C, b(cid:105), we define the set of its models as Int(P) = {i ∈ M∗ such that i = P}. Definition 5 Two interaction protocols P1 = (cid:104)M1, C1, b(cid:105) and P2 = (cid:104)M2, C2, b(cid:105) with sets of mes- sages M1 = A× V1 and M2 = A× V2 are compatible if there exists an alignment α : V2 → V1 such that Int(P1) = α(Int(P2)) If we know the alignment α for which the condition holds, we can say they are compatible under α. An Example Let us extend the example of Figure 1 by considering again a waiter W and a customer C and the ordering drinks situation. The vocabulary of the customer is VC = {to drink, beer, wine, water, size, pint, half pint}, while the Waiter uses VW = {da bere, birra, vino, acqua, tipo, media, piccola}. Con- sider the bijective alignment α : VW → VC obtained by mapping each word in VW with the word in the same position in VC. We consider the following pro- tocols to specify the ordering drinks interactions: PW = (cid:104){W, C} × VW , {existence((cid:104)W, da bere(cid:105), 1, 1), premise((cid:104)C, birra(cid:105),(cid:104)W, da bere(cid:105)), premise((cid:104)C, vino(cid:105),(cid:104)W, da bere(cid:105)), premise((cid:104)C, acqua(cid:105),(cid:104)W, da bere(cid:105)), !correlation((cid:104)C, birra(cid:105),(cid:104)W, vino(cid:105)), response((cid:104)C, birra(cid:105),(cid:104)W, tipo(cid:105)), premise((cid:104)C, piccola(cid:105),(cid:104)W, tipo(cid:105)), premise((cid:104)C, media(cid:105), tipo(cid:105))}, 5(cid:105) PC = (cid:104){W, C} × VC, {existence((cid:104)W, to drink(cid:105), 1, 1), premise((cid:104)C, beer(cid:105),(cid:104)W, to drink(cid:105)), premise((cid:104)C, water(cid:105),(cid:104)W, to drink(cid:105)), premise((cid:104)C, wine(cid:105),(cid:104)W, to drink), response((cid:104)C, beer(cid:105),(cid:104)W, size(cid:105)), premise((cid:104)C, halfpint(cid:105),(cid:104)W, size(cid:105)), premise((cid:104)C, pint(cid:105),(cid:104)W, size(cid:105))}, 5(cid:105) The two protocols above are not compatible under any bijective alignment, since the customer protocol has as model an interaction in which the customer or- ders wine and beer, while the waiter protocol has as models interactions in which the waiter only accepts one beverage. If !correlation(beer, wine) is added to PC, the resulting protocols are compatible, in par- ticular under α. 3 Communicating with Hetero- geneous Partners In this paper, for simplicity, we will restrict to us- ing only bijective alignments over vocabularies of the same size. We focus on interactions between two agents a1 and a2 with vocabularies V1 and V2 respectively. During an interaction, an agent can send messages composed 4 of words in its vocabulary and receive others from its interlocutor, or finish the communication if cer- tain conditions hold. We assume messages are never lost and always arrive in order, and more strongly, that each message is received before the following one is uttered. This requires that agents agree in who speaks at each time, although we do not force them to follow any particular turn-taking pattern. Agents interact to perform some task together, that each of them specifies with an interaction proto- col. We assume a1 and a2 agree on a set of tasks that they can perform and on how they are performed: their respective protocols for each task are compat- ible. Our agents use their vocabulary consistently throughout different tasks, i.e., the protocols for all tasks are compatible under the same alignment. From now on, we will use sets of messages M1 = {a1, a2} × V1 and M2 = {a1, a2} × V2. We assume there exists a bijective alignment α : V2 → V1 such that, for each task that a1 and a2 can perform, they have protocols P1 : (cid:104)M1, C1, b(cid:105) and P2 : (cid:104)M2, C2, b(cid:105) respectively, and P1, P2 are compatible under α. We assume that whenever agents interact, they use pro- tocols that correspond to the same task. We present a general approach to learn the align- ment α from the experience of interacting to perform different tasks sequentially. The methods we present are used by one agent alone, and do not require that its interlocutor uses them as well. To explain the techniques, we adopt the perspective of agent a1. Briefly, we propose to learn α by taking into ac- count the coherence of messages. When a1 receives a message, it learns from analysing which interpreta- tions are allowed by the protocol and which are not. This information, however, is not definitive. An al- lowed word can be an incorrect interpretation for a received message, because protocols do not restrict completely all possible meanings. Moreover, a for- bidden message can still be a correct interpretation. Since some rules express relations between messages, a previously misinterpreted word (by the agent or by its interlocutor) can make a correct mapping be im- possible. foreign words, and update their values with the ex- perience of interacting. Formally, for each v2 ∈ V2 that a1 knows about (because it received it in a mes- sage at some point) and for each v1 ∈ V1, agent a1 has a weight ω(v2, v1) that represents its confidence in that α(v2) = v1. Using the bijectivity, we will keep ω(v2, v) = 1, but we do not require the same in the other direction since the foreign vocabulary is unknown a priori. (cid:80) v∈V1 The techniques we propose can incorporate exist- ing alignments, in the same way as it is done in [5] for the case when protocols are automata. These align- ments represent a priori knowledge about the foreign vocabulary, that can have been obtained from previ- ous experience, from a matching tool, or with other techniques such as a syntactic similarity measure. Since these techniques are never fully correct, pre- vious alignments should not be trusted completely, and the techniques we propose can work as methods for repairing them. A previous alignment for agent a1 is a partial function A : V (cid:48) 2 is a set of terms. Note that A is not necessarily defined over V2, since the vocabulary that a2 uses may be un- known a priori. However, the information it provides can be used even if V (cid:48) 2 is a subset of V2 or they over- lap. We interpret the confidences always positively, meaning that a mapping with low confidence has still more confidence than one that does not exist. If a1 has a previous alignment A, it initializes the inter- pretation distribution using that information. They first assign raw values: 2 × V1 → N, where V (cid:48) if (v2, v1) ∈ dom(A) otherwise A(v2, v1) 0 ω(v2, v1) = Then they normalize the values using an exponen- tial method such as softmax. This is necessary to start the technique with the values for all mappings in the interval (0, 1), since the alignment can be wrong. If there is no previous alignment, they always initial- ize the interpretation values with an uniform distri- bution: ω(v2, v1) = 1 V1 for all v1 ∈ V1. To handle this uncertainty, we propose a simple probabilistic learning technique. Agents maintain an interpretation distribution over possible meanings for We explain in detail the learning techniques that we propose in Section 4. In the rest of this section we focus on the dynamics of the interaction: how agents 5 choose which messages to say, finish the interaction, and decide interpretations for the messages they re- ceive. Choosing messages to send The choice of mes- sages to utter is internal of each agent and depends on its interests while interacting. We do not impose any restriction on this, besides respecting the constraints in the protocol. Formally, a1 can utter a message v1 only if (cid:104)a1, v1(cid:105) is a possible message as defined below. Definition 6 Consider an agent a1 following proto- col P1 = (cid:104)M1, C1, b(cid:105) and suppose interaction i has happened so far (and i =p P1). The possible mes- sages at that point are all messages m ∈ M1 such that when they are performed the interaction remains a partial model, that is i . m =p P1. Finishing the interaction An interaction can fin- ish in three situations. First, if there is a bound, reaching it implies the automatic end of the conver- sation. The interaction also finishes if an agent re- ceives a message that has no possible interpretation. An agent can also finish the conversation whenever it wants if it considers that the interaction is successful, i.e., if it is a model of the protocol when it ends. In this case, it simply stops talking, producing a time- out that let the other agent realize the interaction finished. Choosing interpretations When agent a1 re- ceives a message v2 ∈ V2 from a2, it needs to in- terpret it in V1 to be able to continue the interaction. To this aim, agents use the information in the in- terpretation distribution. Since agents assume there exists a bijective alignment, they always choose the same interpretation for a word during one interaction and they do not choose words that have been already chosen as interpretations. Consider agent a1 receives word v2 after interaction i. Let µ : V2 → V1 be the mappings made function, where µ(v2) = v1 if and only if v1 was chosen as a mapping for v2 before in the same interaction. The domain dom(µ) are the v2 ∈ V2 that a1 received since the current task started, and its image img(µ) are the v1 ∈ V1 that were chosen as mappings. The set W of possible interpretations for v2 is the set of words v1 in V1 such that (cid:104)a2, v1(cid:105) is a possible message after i, and such that v1 (cid:54)∈ img(µ). If rnd(S) is a function that chooses an element randomly in the set S, the agent will choose an in- terpretation as follows: µ(v2) µ(v2) = if v2 ∈ dom(µ) ∧ µ(v2) ∈ W if v2 (cid:54)∈ dom(µ) rnd(argmaxv1∈W ω(v2, v1)) If either v2 ∈ dom(µ) but µ(v2) (cid:54)∈ W , or W = ∅, the interaction is in one of the failure cases, and it finishes because a1 stops talking. 4 Learning Alignments from Interactions To learn an alignment from the experience of inter- acting, agents make the following well behaviour as- sumptions about their interlocutor. Essentially, these assumptions imply that the dynamics of the interac- tion described in the previous section are respected. 1. Compliance: An agent will not utter a message that violates the constraints, or that makes it impossible to finish successfully the interaction in the steps determined by the bound (or in finite steps if there is no bound). 2. Non Abandonment: An agent will not fin- ish intentionally the conversation unless the con- straints are fulfilled. Agents learn when they decide how to interpret a received word. The overall method is simple: if a1 receives v2, it updates the value of ω(v2, v1) for all the words v1 in a set U ⊆ V1. The set U , unlike the set of possible interpretations W used to decide the mapping, can have interpretations that are not possible messages in that particular moment, and the values in the interpretation distribution are updated according to that. A first decision is how to choose the set U . Since checking satisfiability is computationally expensive, 6 this can impact considerably the overall performance of the methods. A first option is to update the value of all possible words (U = V1), which can be slow for large vocabularies. Another option is to use only the options that are considered until an in- terpretation is chosen, or all those words that have more value than the first possible interpretation. In this case, if v1 is chosen as an interpretation for v2, U = {v ∈ V1 such that ω(v2, v) > ω(v2, v1)}. A third possibility is a midpoint between these two, in which U = {v ∈ V1 such that ω(v2, v) ≥ ω(v2, v1)}. This option updates also the words that have the same value as the chosen interpretation. If the distribu- tion is uniform when the learning starts, this updates many possible interpretations in the beginning and fewer when there is more information. This is the approach we choose, and the one used for the evalu- ation. We present two methods to update the values in the interpretation distribution. The first one is a gen- eral technique that only takes into account whether messages are possible. This method is not exclusively designed for protocols that use LTL, and can be used for constraints specified in any logic for which agents have a satisfiability procedure. In a second method we show how the particular semantics of the protocols we introduced can be taken into account to improve the learning process. 4.1 Simple Strategy The first approach consists in updating the value of interpretations for a received message, according to whether it is coherent or not with the protocol and the performed interaction. When a new message v2 is received, the values for all interpretations are ini- tialized as described in the last section. We use a simple learning method in which updates are a pun- ishment or reward that is proportional to the value to update. We chose this method because it incorpo- rates naturally previous alignments, it is very simple to formulate, and the proportional part updated can be manipulated easily to consider different situations, something that will be relevant for the second tech- nique. However, it is not necessarily the most efficient choice, and other methods, such as one that records a history, can converge faster. Consider a reward and a punishment parameter rr, rp ∈ [0, 1]. We use the no- tion of possible messages in Definition 6 and update the values for v1 ∈ U as follows: ω(v2, v1) + rr · ω(v2, v1) ω(v2, v1) − rp · ω(v2, v1) if (cid:104)a2, v1(cid:105) is possible if (cid:104)a2, v1(cid:105) otherwise ω(v2, v1) := (cid:80) After all the updates for a given message are made, the values are normalised in such a way that ω(v2, v) = 1. Either simple sum-based or soft- v∈V1 max normalization can be used for this. 4.2 Reasoning Strategy The simple strategy does not make use of some eas- ily available information regarding which constraints were violated when a message is considered impos- sible. To illustrate the importance of this infor- mation, consider an interaction in which the Cus- tomer said water but the Waiter interpreted it as vino. If the Customer says beer, the Waiter may think that interpreting it as birra is impossible, since ordering two alcoholic beverages is not allowed (!correlation(birra, vino) would be violated). How- ever, this is only due to misunderstanding water in the first place. In the reasoning approach, agents make use of the semantics of violated rules to perform a more fine-grained update of the values. Before pre- senting the method, we need to divide constraints in two kinds, that will determine when agents can learn from them. Definition 7 A constraint c is semantically non- monotonic if there exist interactions i and i(cid:48) such that i is a prefix of i(cid:48), and i = c but i(cid:48) (cid:54)= c. A constraint c is semantically monotonic if this cannot happen, and i = c implies that also all its extensions are models of c. The following proposition divides the constraints in our protocols between monotonic and non- monotonic. Proposition 1 The existence, coexistence and response are semantically mono- tonic. All the rest of the constraints defined are semantically non-monotonic. constraints 7 Violated Constraint - absence((cid:104)a2, v1(cid:105), n) !correlation((cid:104)a2, v1(cid:105),(cid:104)a2, v(cid:48) 1(cid:105)) !response((cid:104)a2, v1(cid:105),(cid:104)a2, v(cid:48) 1(cid:105)) !bef ore((cid:104)a2, v1(cid:105),(cid:104)a2, v(cid:48) 1(cid:105)) !premise((cid:104)a2, v1(cid:105),(cid:104)a2, v(cid:48) 1(cid:105)) !imm af ter((cid:104)a2, v1(cid:105),(cid:104)a2, v(cid:48) 1(cid:105)) premise((cid:104)a2, v1(cid:105),(cid:104)a2, v(cid:48) 1(cid:105)) 1(cid:105),(cid:104)a2, v1(cid:105)) imm af ter((cid:104)a2, v(cid:48) bef ore(v(cid:48), v) relation((cid:104)a1, v1(cid:105),(cid:104)a2, v(cid:48) 1(cid:105)) Action ω(v2, v1) := ω(v2, v1) − rp · ω(v2, v1) ω(v2, v1) := 0 ω(v2, v1) := ω(v2, v1) − rp · ω(µ(v(cid:48) ω(µ(v(cid:48) 1), v(cid:48) 1) 1) − rp · ω(v2, v1) 1) := ω(µ(v(cid:48) 1), v(cid:48) 1), v(cid:48) ω(v2, v1) := ω(v2, v1) − rp · ω(µ(v(cid:48) ω(µ(v(cid:48) 1), v(cid:48) 1) 1) − rp · ω(v2, v1) 1) := ω(µ(v(cid:48) 1), v(cid:48) 1), v(cid:48) ω(v2, v1) := ω(v2, v1) − rp · ω(v2, v1) 1) − rp · ω(v2, v1) ω(v(cid:48) 1) := ω(v(cid:48) 1, v(cid:48) 1, v(cid:48) Table 2: Updates for each violated constraint when a message is received Proof 1 To prove non-monotonicity, it is enough to show an example that violates the constraint. For example, consider bef ore(m, m(cid:48)) and suppose an in- teraction I such that m (cid:54)∈ i and m(cid:48) (cid:54)∈ i. Then i = (cid:54)= bef ore(m, m(cid:48)). Mono- bef ore(m, m(cid:48)) and i . m(cid:48) tonicity can be proven by counterexample, showing that for a constraint c, if i . m(cid:48) (cid:54)= c then necessarily i (cid:54)= c. For example, if i . m violates existence(m(cid:48), n), there are two options, either m = m(cid:48) or m (cid:54)= m(cid:48). Let #(m, i) and #(m, i . m(cid:48)) be the number of occur- rences of c in i and i . m(cid:48) respective. In both cases, #(m, i . m(cid:48)) ≥ #(m, i), so if #(m, i . m(cid:48)) ≤ n, then necessarily #(m, i) ≤ n. Non-monotonic constraints can be used to learn while interacting, using the principle of compliance (if a constraint is violated, something must be wrong in the interpretations). Monotonic constraints could be used when the interaction ends, using the prin- ciple of non-abandonment (if not all constraints are satisfied, there must be an error). However, since our agents cannot communicate in any way, they ignore why the interaction ended, and therefore they do not know if their interlocutor considers the constraints were satisfied or not, making it very difficult to de- cide how to update values. In this work we focus on handling non-monotonic constraints, leaving mono- tonic ones for future work where an ending signal is introduced. To start, let us define formally when a non-monotonic constraint is violated. Definition 8 Given an interaction i and an inter- pretation v1 for a received message, a constraint c is violated if i = c but i .(cid:104)a2, v1(cid:105) (cid:54)= c. If agent a1 decides that v1 is not a possible interpre- tation for v2, let V iol be all c ∈ C1 that are violated by v1. It is possible that V iol = ∅. This can happen when there are no violated constraints because a sub- set of constraints becomes unsatisfiable, for example, if the waiter has not said size and a protocol includes the rules {!response((cid:104)C, wine(cid:105),(cid:104)W, size(cid:105)), existence((cid:104)W, size(cid:105), 1)}, the customer cannot say wine even when V iol would be empty. Another situ- ation in which a message can be impossible without any constraint being violated is when it makes the in- teraction impossible to finish successfully in the num- ber of utterances indicated by the bound, or in finite time if there is no bound. To explain the update in the reasoning strategy, consider again reward and a punishment parameter rr, rp ∈ [0, 1]. If an interpretation v1 is possible for a 8 received message v2, then ω(v2, v1) := ω(v2, v1) + rr · ω(v2, v1). If it is not, it is updated as indicated in to Table 2, according to which rule was violated. These actions are performed iteratively for each broken rule. After the updates, all values are normalized to obtain In this case, we need to use a method that maintains the values that are 0, so softmax is not a possibility. ω(v2, v) = 1. (cid:80) v∈V1 Let us explain the motivation under each update. Violating the existential non-monotonic constraint is different to violating a relation constraint, because it expresses a condition over only one action, so if the chosen interpretation violates it, it must be wrong. For this reason, the value of the mapping is set to 0. Negation constraints express a relation over two actions, and if their are broken, necessarily both of them happened in the interaction, and if a constraint is violated, it could be because either of them was misinterpreted. To take this into account, we pro- pose an update inspired in the Jeffrey's rule of con- ditioning [17], that modifies the Bayes Rule of condi- tional probability for the cases when evidence is un- certain. If Q is a probability distribution for a parti- tion E1 . . . En of possible evidence, then Jeffrey's rule states that the posterior probability of A is computed as: Q(A) = P (AEi) · Q(Ei) n(cid:88) i=0 Back to our problem, let v2 be a received message such that µ(v2) = v1. Suppose a1 receives a new message v(cid:48) 2, and it discovers that mapping it with v(cid:48) 1 violates a constraint relation(v1, v(cid:48) 1). This means that P (α(v2) = v1 ∧ α(v(cid:48) 2) = v(cid:48) 1) = 0, and therefore P (α(v2) = v1α(v(cid:48) 2) = v(cid:48) 1) = 0. Then, if P os is the set of possible mappings, we can write: ω(v2, v1) := ω(v2, v1) · (cid:88) ω(α(v(cid:48) 2, v(cid:48) 1) 1∈P os v(cid:48) or, what is equivalent, if Impos is the set of incom- ω(v2, v1) = 1: patible mappings, since(cid:80) v∈v1 ω(v2, v1) := ω(v2, v1) − (cid:88) 1∈Impos v(cid:48) ω(v(cid:48) 2, v(cid:48) 1) 9 We implement this by subtracting for each map- ping a value that is proportional to the confidence in the other mapping. Since agents do not explore all the possible interpretations, the value is not com- puted exactly, but approximated considering only the interpretations that have more confidence. When the interpretation depends on the interpre- tation of many other mappings, there are too many possibilities that difficult reasoning about which one can be wrong. In this case, the agents use a default punishment rp. This occurs when the positive ver- sions of premise and imm af ter are violated, when V iol = ∅, and when and a violated constraint de- pends on a message that a1 sent, since they have no information about how their messages were inter- preted by v2. Lastly, let us discuss the value of rp. Choosing rp = 1V1 , the technique has the effect of subtracting a larger value when the agent is confident in the cor- rectness of the previous interpretation. This is the value that we use. 5 Experimental Evaluation In this section we present the results of experiments that show how the methods we propose perform ex- perimentally when used by agents with different vo- cabularies. Before presenting the results, let us dis- cuss the generation of data for experimentation. Due to the lack of existing datasets, we performed all the experimentation with randomly generated data. We created protocols with different sizes of vocabulary and of set of constraints. To generate a protocol from a vocabulary, we randomly chose con- straints and added them to the protocol if it remained satisfiable with the new rule. In the implementation, we express constraints over words instead of over mes- sages, so a constraint are valid for any combination of senders. We used bounds in our experimentation to limit the possible constraints and to eventually finish the interactions between agents, that in all cases had the value of the vocabulary size. We created pairs of compatible protocols P1, P2, with vocabularies V1 and V2 respectively by building a bijective alignment α : V2 → V1 and then using it to translate the con- Figure 2: Results for a vocabulary of size 10 straints in a protocol P2, obtaining P1. We used the NuSMV model checker [6] to perform all the neces- sary satisfiability checks. To evaluate how agents learn α from the experi- ence of interacting, we first need to define a mea- sure of how well an agent knows an alignment. Since agents always choose the possible mapping with high- est weight, we can easily extract from the interpre- tation distribution an alignment that represents the first interpretation choice for each foreign word in the following interaction. This alignment, that we call αi for agent ai, is one of the mappings with highest weight for each foreign word. Formally, for a1, the do- main of α1 is v2 ∈ V2 such that ω(v2, v) is defined for all v ∈ V1, and α1(v2) = rnd(argmaxv∈V1 ω(v2, v)). Note that there are multiple possibilities with the same value, α1(v2) takes a random word between them. To compare this alignment with α, we used the standard precision and recall measures, and their har- monic mean combination, commonly known as F- score. To use the standard definitions directly, we only need to consider alignments as relations instead of functions: given an alignment α : V2 → V1, the corresponding relation is the set of pairs (cid:104)v2, v1(cid:105) such that α(v2) = v1. Definition 9 Given two alignments β and γ ex- pressed as relations, the precision of β with respect to γ is the fraction of the mappings in β that are also in γ: precision(β, γ) = β ∩ γ β while its recall is the fraction of the mappings in γ that were found by β: recall (β, γ) = β ∩ γ γ Given an alignment β and a reference alignment γ, the F-score of the alignment is computed as follows: F − score(β, γ) = 2 · precision(β, γ) · recall (β, γ) precision(β, γ) + recall (β, γ) We performed experiments parametrized with a protocol and vocabulary size. In all experiments, agents are sequentially given pairs of compatible pro- tocols, and after each interaction we measure the F- score of their alignments with respect to α. The same protocols can appear repeatedly in the sequence, but 10 we consider that eventually new ones appear always in the interaction, which implies that at some point the meaning of all words is fixed. Our agents also used the NuSMV model checker for both checking satisfiability and finding violated constraints. We fist intended to perform experiments with the same vo- cabulary sizes that are used for testing in [1], which are 5, 10, 15, 40, 80. However, the interactions for size 80 were too slow to be able to perform a reasonable amount of repetitions for each technique. This prob- lem is intrinsic to the protocols we use (since agents have to decide if the messages they want to send are possible), and should be taken into account in fu- ture work. Since varying the vocabulary size did not provide particularly interesting results, we show here the experiments for a vocabulary of 10 words and four different protocol sizes. We used punishment and rewards parameters of rp, rr = 0.3 for the simple strategy, which were best in a preliminary test. Each experiment was repeated 10 times. In a first experiment, we let agents interact 200 times and measured the way they learned the align- ment for different protocol sizes, shown in Figure 2. The F-score if computed by averaging the F-score of each agent that participates in the interaction. The curves show that the smart strategy is always bet- ter than the simple one, but this difference is more dramatic when the protocols are smaller. This is be- cause there is less information, so using it intelligently makes a great difference. The curves are sharp in the beginning, when agents do not have much informa- tion about α, and they make many mistakes from which they learn fast. When agents reach a reason- able level of precision and recall, mistakes are less frequent, and therefore the pace of the learning slows considerably. Although this affects the convergence to an F-score of 1.0, it also means that, after a cer- tain number of interactions, agents have learn enough to communicate successfully most of the times. The sparse mistakes that they will make in future conver- sations make them learn more slowly the remaining mappings. Table 3 shows how fast agents reach a rea- sonable level of F-score, that we chose of 0.8 based on [10]. In a second experiment, we studied the perfor- mance of our methods when used to repair existing 6 - 8 10 187 101 simple smart 139 87 57 12 47 33 Table 3: 0.8 convergence alignments. To this aim, we created alignments with different values of precision and recall with respect to α, that we divided into three categories. Low qual- ity alignments had precision and recall 0.2, medium quality 0.5, and high quality 0.8. We only studied alignments with the same value of precision and re- call to reduce the number of combinations and have a clear division of quality levels. We made agents with this alignments interact, using the simple and the smart technique. The results can be seen in Fig- ure 3. The number next to each agent class in the reference is the precision and recall of the alignment that was given to that agent. Again, the reasoning strategy performs particularly better when only lit- tle information is available; in this case, the repair is much better than when using the simple strategy for alignments of low quality. Figure 3: Results for different alignment qualities 11 6 Related Work 7 Conclusions and Future As we already mentioned, a large portion of the existent work that tackles the problem of vocabu- lary alignment for multi-agent communication con- sists on techniques to let agents discuss and agree on a common vocabulary or alignment. Some of these approaches use argumentation or negotiation techniques [15, 12], performing an offline negotiation that takes place before actual interactions can start. Other approaches, such as the three-level schema de- veloped by van Diggelen [8], discuss the meaning of works on a by-demand basis, that is, only when it is necessary to use them to perform some task. Other approaches use different kinds of grounding to learn alignments or the meaning of words from in- teractions. The well established research by Steels [20] considers a situation in which learners share a physical environment, and have the ability of point- ing to things to communicate if they are talking about the same things. Goldman et al. [11], inves- tigated how agents can learn to communicate in a way that maximises rewards in an environment that can be modelled as a Markov Decision Process. In [4], the authors study a version of the multiagent, multiarmed bandit problem in which agents can com- municate between each other with a common lan- guage, but message interpretations are not know. Closer to our approach is the work by Euzenat on cultural alignment repair [9], and particularly the al- ready mentioned work by Atencia and Schorlemmer [1], where the authors consider agents communicat- ing with interaction protocols represented with finite state automata, and use a shared notion of task suc- cess as grounding. Our work, instead, considers only the coherence of the interaction as grounding. To the best of our knowledge, the work presented in this paper is the first approach in which agents learn lan- guages dynamically from temporal interaction rules, taking into account only the coherence of the utter- ances. A very well studied problem consists on learning different structures from experience, such as gram- mars [7] or norms [16]. Our approach can be seen as the reverse of these approaches, where some structure is considered shared and used to learn from. Work The techniques we propose allow agents to learn alignments between their vocabularies only by inter- acting, assuming that their protocols share the same set of models, without requiring any common meta- language or procedure. The assumption of sharing the models can be removed, but the learning will be slower because an extra component of uncertainty is added. Although our methods converge slowly, they use only very general information, and can be easily combined with other methods that provide more in- formation about possible mappings, as we show with the integration of previous alignments. Our agents learn dynamically while interacting and the tech- niques achieve fast a reasonable level of knowledge of the alignment. Therefore, a possible way of using our techniques would be to go first through a training phase in which agents learn many mappings fast, and then start performing the real interactions, and keep learning to discover the remaining mappings. The technique that uses particular semantics of the proto- cols, as expected, improves the learning. These tech- niques can be particularly developed for each kind of protocols. Agents do not need to use the same tech- niques or even the same logic, as long as they share the models. There exist many possible directions of research derived form this work. First, we could relax the assumption that agents do not share any meta- language, considering agents that can in some way exchange information about the interaction. For ex- ample, considering only that agents can communi- cate whether they finished a task successfully would make possible to reason about monotonic rules when an interaction ends. An approach like this would re- late our work to the one by Santos [15] about di- alogues for meaning negotiation. Another possible extension consists in considering agents that priori- tize the language learning to performing the task. In this case, agents would have to decide what utter- ances it is more convenient to make in order to get more information about the alignment. An aspect that should be improved in future work is the per- 12 formance in terms of runtime per interaction, since it was very slow for larger vocabularies. In International Conference on Computer Aided Verification, pages 359 -- 364. Springer, 2002. References [1] M. Atencia and M. Schorlemmer. An interaction-based approach to semantic align- ment. Journal of Web Semantics, 12-13:131 -- 147, 2012. [2] M. Baldoni, C. Baroglio, and E. Marengo. Behavior-oriented commitment-based protocols. In ECAI 2010 - 19th European Conference on Artificial Intelligence, Lisbon, Portugal, August 16-20, 2010, Proceedings, pages 137 -- 142, 2010. [3] M. Baldoni, C. Baroglio, E. Marengo, and V. Patti. Constitutive and regulative specifi- cations of commitment protocols: A decoupled approach (extended abstract). In Proceedings of the Twenty-Fourth International Joint Con- ference on Artificial Intelligence, IJCAI 2015, Buenos Aires, Argentina, July 25-31, 2015, pages 4143 -- 4147, 2015. [4] S. Barrett, N. Agmon, N. Hazon, S. Kraus, and P. Stone. Communicating with unknown teammates. In T. Schaub, G. Friedrich, and B. O'Sullivan, editors, ECAI 2014 -- 21st Euro- pean Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic -- Includ- ing Prestigious Applications of Intelligent Sys- tems (PAIS 2014), volume 263 of Frontiers in Artificial Intelligence and Applications, pages 45 -- 50. IOS Press, 2014. [5] P. Chocron and M. Schorlemmer. Attuning on- tology alignments to semantically heterogeneous multi-agent interactions. In ECAI 2016 - 22nd European Conference on Artificial Intelligence, The Hague, The Netherlands, pages 871 -- 879, 2016. [6] A. Cimatti, E. Clarke, E. Giunchiglia, F. Giunchiglia, M. Pistore, M. Roveri, R. Se- bastiani, and A. Tacchella. Nusmv 2: An opensource tool for symbolic model checking. [7] C. de la Higuera. Grammatical Inference: Learn- ing Automata and Grammars. Cambridge Uni- versity Press, New York, NY, USA, 2010. [8] J. V. Diggelen, R. Beun, F. Dignum, R. M. V. Eijk, and J. J. Meyer. Ontology negotiation: Goals, requirements and implementation. Int. J. Agent-Oriented Softw. Eng., 1(1):63 -- 90, Apr. 2007. [9] J. Euzenat. First Experiments in Cultural Align- ment Repair. In Semantic Web: ESWC 2014 Satellite Events, volume 8798, pages 115 -- 130, 2014. [10] J. Euzenat, C. Meilicke, H. Stuckenschmidt, P. Shvaiko, and C. Trojahn. Ontology align- ment evaluation initiative: Six years of expe- rience. Journal on Data Semantics XV, pages 158 -- 192, 2011. [11] C. V. Goldman, M. Allen, and S. Zilberstein. Learning to communicate in a decentralized en- vironment. Autonomous Agents and Multi-Agent Systems, 15(1):47 -- 90, Aug. 2007. [12] L. Laera, I. Blacoe, V. A. M. Tamma, T. R. Payne, J. Euzenat, and T. J. M. Bench-Capon. Argumentation over ontology correspondences in MAS. In E. H. Durfee, M. Yokoo, M. N. Huhns, and O. Shehory, editors, 6th Interna- tional Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), Hon- olulu, Hawaii, USA, May 14-18, 2007, page 228, 2007. [13] M. Montali. Specification and verification of declarative open interaction models: A logic- based approach, volume 56 of Lecture Notes in Business Information Processing. Springer- Verlag New York Inc, 2010. [14] M. Pesic and W. M. P. van der Aalst. A declar- ative approach for flexible business processes 13 In Proceedings of the Interna- management. tional Conference on Business Process Manage- ment Workshops, BPM, pages 169 -- 180, Berlin, Heidelberg, 2006. Springer-Verlag. [15] G. Santos, V. Tamma, T. R. Payne, and F. Grasso. A dialogue protocol to support mean- ing negotiation. (extended abstract). In Pro- ceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems, AAMAS '16, pages 1367 -- 1368, Richland, SC, 2016. International Foundation for Autonomous Agents and Multiagent Systems. [16] S. Sen and S. Airiau. Emergence of norms through social learning. In IJCAI, volume 1507, page 1512, 2007. [17] G. Shafer. Jeffrey's rule of conditioning. Philos- ophy of Science, 48(3):337 -- 362, 1981. [18] N. Silva, G. I. Ipp, and P. Maio. An approach to ontology mapping negotiation. In Proceedings of the Workshop on Integrating Ontologies, pages 54 -- 60, 2005. [19] M. P. Singh. A social semantics for agent com- munication languages. In Issues in Agent Com- munication, pages 31 -- 45, London, UK, 2000. Springer-Verlag. [20] L. Steels. The origins of ontologies and com- munication conventions in multi-agent systems. Autonomous Agents and Multi-Agent Systems, 1(2):169 -- 194, Oct. 1998. 14
1106.3134
1
1106
2011-06-16T03:16:20
Communicate only when necessary: Cooperative tasking for multi-agent systems
[ "cs.MA", "eess.SY", "math.OC" ]
New advances in large scale distributed systems have amazingly offered complex functionalities through parallelism of simple and rudimentary components. The key issue in cooperative control of multi-agent systems is the synthesis of local control and interaction rules among the agents such that the entire controlled system achieves a desired global behavior. For this purpose, three fundamental problems have to be addressed: (1) task decomposition for top-down design, such that the fulfillment of local tasks guarantees the satisfaction of the global task, by the team; (2) fault-tolerant top-down design, such that the global task remains decomposable and achievable, in spite of some failures, and (3) design of interactions among agents to make an undecomposable task decomposable and achievable in a top-down framework. The first two problems have been addressed in our previous works, by identifying necessary and sufficient conditions for task automaton decomposition, and fault-tolerant task decomposability. This paper deals with the third problem and proposes a procedure to redistribute the events among agents in order to enforce decomposability of an undecomposable task automaton. The decomposability conditions are used to identify the root causes of undecomposability which are found to be due to over-communications that have to be deleted, while respecting the fault-tolerant decomposability conditions; or because of the lack of communications that require new sharing of events, while considering new violations of decomposability conditions. This result provides a sufficient condition to make any undecomposable deterministic task automaton decomposable in order to facilitate cooperative tasking. Illustrative examples are presented to show the concept of task automaton decomposabilization.
cs.MA
cs
Technical Report: NUS-ACT-11-003-Ver.1: Communicate only when necessary: Cooperative tasking for multi-agent systems Mohammad Karimadini, and Hai Lin Abstract New advances in large scale distributed systems have amazingly offered complex functionalities through parallelism of simple and rudimentary components. The key issue in cooperative control of multi-agent systems is the synthesis of local control and interaction rules among the agents such that the entire controlled system achieves a desired global behavior. For this purpose, three fundamental problems have to be addressed: (1) task decomposition for top-down design, such that the fulfillment of local tasks guarantees the satisfaction of the global task, by the team; (2) fault-tolerant top-down design, such that the global task remain decomposable and achievable, in spite of some failures, and (3) design of interactions among agents to make an undecomposable task decomposable and achievable in a top-down framework. The first two problems have been addressed in our previous works, by identifying necessary and sufficient conditions for task automaton decomposition, and fault-tolerant task decomposability, based on decision making on the orders and selections of transitions, interleaving of synchronized strings and determinism of bisimulation quotient of local task automata. This paper deals with the third problem and proposes a procedure to redistribute the events among agents in order to enforce decomposability of an undecomposable task automaton. The decomposability conditions are used to identify the root causes of undecomposability which are found to be due to over-communications that have to be deleted, while respecting the fault-tolerant decomposability conditions; or because of the lack of communications that require new sharing of events, while considering new violations of decomposability conditions. This result provides a sufficient condition to make any undecomposable deterministic task automaton decomposable in order to facilitate cooperative tasking. Illustrative examples are presented to show the concept of task automaton decomposabilization. M. Karimadini and H. Lin are both from the Department of Electrical and Computer Engineering, National University of Singapore, Singapore. Corresponding author, H. Lin [email protected] I. INTRODUCTION With new advances in technology and emergence of large scale complex systems [1], [2], there is an ever-increasing demand for cooperative control of distributed systems with sophisticated specifications [3], [4], [5], [6] which impose new challenges that fall beyond the traditional methods [7], [8], [9], [5]. Conventional approaches either consider the team of agents as a monolithic plant to be controlled by a centralized unit, or design and iteratively adjust local controllers, in a bottom-up structure, to generate a behavior closed to a desired global behavior. Although the latter approache offers more flexibility, scalability and functionality with lower cost, due to local actuation and communications of agents [10], [11], [12], they fail to guarantee a given global specification [13]. For this purpose, top-down cooperative control aims at formal design of local controllers in order to collectively achieve the global specification, by design [14], [15]. To address the top-down cooperative control, three fundamental questions are evoked: The first question is the task decomposition problem that is interested in understanding of whether all tasks are decomposable, and if not, what are the conditions for task decomposability. It furthermore asks that if the task is decomposable and local controllers are designed to satisfy local tasks, whether the whole closed loop system satisfies the global specification. Subsequently, the second question refers to the cooperative control under event failures, and would like to know if after the task decomposition and local controller designs for global satisfaction, some events fail in some agents, then whether the task still remains decomposable and globally satisfied, in spite of event failures. As another follow-up direction, the third question investigates the way to make an undecomposable task decomposable through modification of local agents in order to accomplish the proposed cooperative control. For cooperative control of logical behaviors [16], represented in automata [17], [18], the first question (task decomposability for cooperative tasking) was addressed in our previous work [19], by decomposing a given global task automaton into two local task automata such that their parallel composition bisimulates the original task automaton. By using the notion of shared events, instead of common events and incorporating the concept of global decision making on the orders and selections between the transitions, the decomposability result was generalized in [20] to an arbitrary finite number of agents. Given a deterministic task automaton, and a set of local event sets, necessary and sufficient conditions were identified for task automaton decomposability based on decision making on the orders and selections of transitions, interleaving of synchronized strings and determinism of bisimulation quotient of local automata. It was also proven that the fulfillment of local task automata guarantees the satisfaction of the global specification, by design. The second question, cooperative tasking under event failure, was investigated in [21], by introducing a notion of passive events to transform the fault-tolerant task decomposability prob- lem to the standard automaton decomposability problem in [20]. The passivity was found to reflect the redundancy of communication links, based on which the necessary and sufficient conditions have been then introduced under which a previously decomposable task automaton remains decomposable and achievable, in spite of events failures. The conditions ensure that after passive failures, the team of agents maintains its capability for global decision making on the orders and selections between transitions; no illegal behavior is allowed by the team (no new string emerges in the interleavings of local strings) and no legal behavior is disabled by the team (any string in the global task automaton appears in the parallel composition of local automata). These conditions interestingly guarantee the team of agents to still satisfy its global specification, even if some local agents fail to maintain their local specifications. This paper deals with the third question to investigate how to make undecomposable task automata decomposable in order for cooperative tasking of multi-agent systems. For a global task automaton that is not decomposable with respect to given local event sets, the problem is particularly interested in finding a way to modify the local task automata such that their parallel composition bisimulates the original global task automaton, to guarantee its satisfaction by fulfilling the local task automata. Decomposition of different formalisms of logical specification have been reported in the literature. Examples of such methods can be seen for decomposition of a specification given in CSP [22], decomposition of a LOTOS [23], [24], [25] and decomposition of petri nets [26], [27]. The problem of automaton decomposabilization has been also studies in computer science literature. For example, [28] characterized the conditions for decomposition of asynchronous automata in the sense of isomorphism based on the maximal cliques of the dependency graph. The isomorphism equivalence used in [28] is however a strong condition, in the sense that two isomorphic automata are bisimilar but not vise versa [17]. Moreover, [28] considers a set of events to be attributed to a number of agents, with no predefinition of local event sets. While event attribution is suitable for parallel computing and synthesis problems in computer science, control applications typically deal with parallel distributed plants [29] whose events are predefined by the set of sensors, actuators and communication links across the agents. Therefore, it would be advantageous to find a way to make an undecomposable automaton decomposable with respect to predefined local event sets, by modifying local task automata. Since the global task automaton is fixed, one way to modify the local task automata is through the modification in local event sets, which is the main theme of this paper. Another related work is [30] that proposes a method for automaton decomposabilization by adding synchronization events such that the parallel composition of local automata is observably bisimilar to the original automaton. The approach in [30], however, allows to add synchronization events to the event set that will enlarge the size of global event set. Our work deals with those applications with fixed global event sets and predefined distribution of events among local agents, where enforcing the decomposability is not allowed by adding the new synchronization events, but instead by redistribution of the existing events among the agents. For this purpose, we propose an algorithm that uses previous results on task decomposition [19], [20] to identify and overcome dissatisfaction of each decomposability condition. The algorithm first removes all redundant communication links using the fault-tolerant result [21]. As a result, any violation of decomposability conditions, remained after this stage, is not due to redundant communication links, and hence cannot be removed by means of link deletions. Instead, the algorithm proceeds by establishing new communication links to provide enough information to facilitate the task automaton decomposition. Since each new communication link may overcome several violations of decomposability conditions, the algorithm may offer different options for link addition, leading to the question of optimal decomposability with minimum number of communication links. It is found that if link additions impose no new violations of decomposability conditions, then it is possible to make the automaton decomposable with minimum number of links. However, it is furthermore shown that, in general, addition of new communication links may introduce new violations of decomposability conditions that in turn require establishing new communication links. In such cases, the optimal path depends on the structure of the automaton and requires a dynamic exhaustive search to find the sequence of link additions with minimum number of links. Therefore, in case of new violations, a simple sufficient condition is proposed to provide a feasible suboptimal solution to enforce the decomposability, without checking of decomposability conditions after each link addition. This approach can decompose any deterministic task automaton, after which, according to the previous results, designing local controllers such that local specification are satisfied, guarantees the fulfillment of the global specification, by design. The rest of the paper is organized as follows. Preliminary lemmas, notations, definitions and problem formulation are represented in Section II. This section also establishes the links to pre- vious works on task automaton decomposition and fault-tolerant decomposition results. Section III proposes an algorithm to make any undecomposable deterministic automaton decomposable by modifying its local event sets. Illustrative examples are also given to elaborate the concept of task automaton decomposabilization. Finally, the paper concludes with remarks and discussions in Section IV. Proofs of the lemmas are readily given in the Appendix. II. PROBLEM FORMULATION A. Definitions and notations We first recall the definitions and notations used in this paper. A deterministic automaton is a tuple A := (Q, q0, E, δ) consisting of a set of states Q; an initial state q0 ∈ Q; a set of events E that causes transitions between the states, and a transition relation δ ⊆ Q × E × Q, with partial map δ : Q × E → Q, such that (q, e, q′) ∈ δ if and only if state q is transited to state q′ by event e, denoted by q e→ q′ (or δ(q, e) = q′). A nondeterministic automaton is a tuple A := (Q, q0, E, δ) with a partial transition map δ : Q × E → 2Q, and if hidden transitions (ε-moves) are also possible, then a nondeterministic automaton with hidden moves is defined as A := (Q, q0, E ∪ {ε}, δ) with a partial map δ : Q × (E ∪ {ε}) → 2Q. For a nondeterministic automaton the initial state can be generally from a set Q0 ⊆ Q. Given a nondeterministic automaton A, with hidden moves, the ε-closure of q ∈ Q, A(q). denoted by ε∗ The transition relation can be extended to a finite string of events, s ∈ E∗, where E∗ stands for A(q) ⊆ Q, is recursively defined as: q ∈ ε∗ A(q); q′ ∈ ε∗ A(q) ⇒ δ(q′, ε) ⊆ ε∗ hidden moves, ε∗ Kleene−Closure of E (the set of all finite strings over elements of E). For an automaton without A(q) = {q}, and the transition on string is inductively defined as δ(q, ε) = q (empty move or silent transition), and δ(q, se) = δ(δ(q, s), e) for s ∈ E∗ and e ∈ E. For an automaton A, with hidden moves, the extension of transition relation on string, denoted by δ : Q × E∗ → 2Q, is inductively defined as: ∀q ∈ Q, s ∈ E∗, e ∈ E: δ(q, ε) := ε∗ A(q) and δ(q, se) = ε∗ A(δ(δ(q, s), e)) = ∪ q′∈δ(q,s)(cid:26) ∪ q′′∈δ(q′,e) ε∗ A(q′′)(cid:27) [18]. The operator Ac(.) [17] is then defined by excluding the states and their attached transitions that are not reachable from the initial state as Ac(A) = (Qac, q0, E, δac) with Qac = {q ∈ Q∃s ∈ E∗, q ∈ δ(q0, s)} and δac = δQac × E → Qac, restricting δ to the smaller domain of Qac. Since Ac(.) has no effect on the behavior of the automaton, from now on we take A = Ac(A). We focus on deterministic global task automata that are simpler to be characterized, and cover a wide class of specifications. The qualitative behavior of a deterministic system is described by the set of all possible sequences of events starting from the initial state. Each such a sequence is called a string, and the collection of strings represents the language generated by the automaton, denoted by L(A). The existence of a transition over a string s ∈ E∗ from a state q ∈ Q is denoted by δ(q, s)!. Considering a language L, by δ(q, L)! we mean that ∀ω ∈ L : δ(q, ω)!. For e ∈ E, s ∈ E∗, e ∈ s means that ∃t1, t2 ∈ E∗ such that s = t1et2. In this sense, the intersection of two strings s1, s2 ∈ E∗ is defined as s1 ∩ s2 = {ee ∈ s1 ∧ e ∈ s2}. Likewise, s1\s2 is defined as s1\s2 = {ee ∈ s1, e /∈ s2}. For s1, s2 ∈ E∗, s1 is called a sub-string of s2, denoted by s1 6 s2, when ∃t ∈ E∗, s2 = s1t. Two events e1 and e2 are called successive events if ∃q ∈ Q : δ(q, e1)! ∧ δ(δ(q, e1), e2)! or δ(q, e2)! ∧ δ(δ(q, e2), e1)!. Two events e1 and e2 are called adjacent events if ∃q ∈ Q : δ(q, e1)! ∧ δ(q, e2)!. 2 ∈ Q2 such that δ2(q2, e) = q′ To compare the task automaton and its decomposed automata, we use the bisimulation rela- i , E, δi), i = 1, 2. A relation R ⊆ Q1 × Q2 is said to tions. Consider two automata Ai = (Qi, q0 1, then be a simulation relation from A1 to A2 if (q0 2) ∈ R. If R is defined for all states and all events in A1, ∃q′ then A1 is said to be similar to A2 (or A2 simulates A1), denoted by A1 ≺ A2 [17]. If A1 ≺ A2, A2 ≺ A1, with a symmetric relation, then A1 and A2 are said to be bisimilar (bisimulate each ∼= A2 [31]. In general, bisimilarity implies languages equivalence but the other), denoted by A1 converse does not necessarily hold [32]. 2) ∈ R, and ∀ (q1, q2) ∈ R, δ1(q1, e) = q′ 1, q0 2, (q′ 1, q′ In these works natural projection is used to obtain local tasks, as local perspective of agents from the global task. Consider a global event set E and its local event sets Ei, i = 1, 2, ..., n, with E = is inductively defined as pi(ε) = ε, Ei. Then, the natural projection pi : E∗ → E∗ i n ∪ i=1 and ∀s ∈ E∗, e ∈ E : pi(se) =   : E∗ p−1 i i → 2E ∗ is defined on an string t ∈ E∗ pi(s)e if e ∈ Ei; otherwise. i as p−1 pi(s) Accordingly, inverse natural projection i (t) := {s ∈ E∗pi(s) = t}. The natural projection is also defined on automata as Pi : A → A, where, A is the set of finite automata and Pi(AS) are obtained from AS by replacing its events that belong to E\Ei by ε-moves, and then, merging the ε-related states. The ε-related states form equivalent classes defined as follows. Consider an automaton AS = (Q, q0, E, δ) and a local event set Ei ⊆ E. Then, the relation ∼Ei is the equivalence relation on the set Q of states such that δ(q, e) = q′ ∧ e /∈ Ei ⇒ q ∼Ei q′, and [q]Ei denotes the equivalence class of q defined on and defined as ∼Ei. The set of equivalent classes of states over ∼Ei, is denoted by Q/∼Ei = {[q]Eiq ∈ Q} [28]. The natural projection of AS into Ei is then formally defined as Q/∼Ei , [q0]Ei, Ei, δi), with δi([q]Ei, e) = [q′]Ei if there exist states q1 and q′ Pi(AS) = (Qi = Q/∼Ei 1 such that q1 ∼Ei q, q′ 1 ∼Ei q′, and δ(q1, e) = q′ 1. To investigate the interactions of transitions between automata, particularly between Pi(AS), i = 1, . . . , n, the synchronized product of languages is defined as follows. Consider a global event set E and local event sets Ei, i = 1, . . . , n, such that E = Ei. For a finite set of i=1, the synchronized product (language product) of {Li}, denoted by languages {Li ⊆ E∗ i }n n n Li = {s ∈ E∗∀i ∈ {1, . . . , n} : pi(s) ∈ Li} = i=1 i=1 Li, is defined as Then, parallel composition (synchronized product) is used to define the composition of local p−1 i (Li) [14]. n ∪ i=1 n ∩ i=1 task automata to retrieve the global task automaton, and to model each local closed loop system by compositions of its local plant and local controller automata. Let Ai = (Qi, q0 i , Ei, δi), i = 1, 2 be automata. The parallel composition (synchronous composition) of A1 and A2 is the automaton 2), E = E1 ∪ E2, δ), with δ defined as ∀(q1, q2) ∈ Q, e ∈ E: A1A2 = (Q = Q1 × Q2, q0 = (q0 1, q0 δ((q1, q2), e) = (δ1(q1, e), δ2(q2, e)) , (δ1(q1, e), q2) ,   ; e ∈ E1 ∩ E2 δ1(q1, e)!, δ2(q2, e)! if   if δ1(q1, e)!, e ∈ E1\E2; if δ2(q2, e)!, e ∈ E2\E1; otherwise. (q1, δ2(q2, e)) , undefined, The parallel composition of Ai, i = 1, 2, ..., n is called parallel distributed system (or concur- rent system), and is defined based on the associativity property of parallel composition [17] as n k i=1 Ai = A1 k ... k An = An k (An−1 k (· · · k (A2 k A1))). The set of labels of local event sets containing an event e is called the set of locations of e, denoted by loc(e) and is defined as loc(e) = {i ∈ {1, . . . , n}e ∈ Ei}. Based on these definitions, a task automaton AS with event set E and local event sets Ei, Ei, is said to be decomposable with respect to parallel composition and i = 1, ..., n, E = n ∪ i=1 natural projections Pi, i = 1, · · · , n, when B. Problem formulation n k i=1 Pi (AS) ∼= AS. In [19], we have shown that not all automata are decomposable with respect to parallel composition and natural projections, and subsequently necessary and sufficient conditions were proposed for decomposability of a task automaton with respect to parallel composition and natural projections into two local event sets. These necessary and sufficient conditions were then generalized to an arbitrary finite number of agents, in [20], as Ei, δ(cid:19) is Lemma 1: (Corollary 1 in [20]) A deterministic automaton AS = (cid:18)Q, q0, E = decomposable with respect to parallel composition and natural projections Pi, i = 1, ..., n such Pi (AS) if and only if AS satisfies the following decomposability conditions (DC): that AS Si=1 n ∼= n i=1 • DC1: ∀e1, e2 ∈ E, q ∈ Q: [δ(q, e1)! ∧ δ(q, e2)!] ⇒ [∃Ei ∈ {E1, . . . , En}, {e1, e2} ⊆ Ei] ∨ [δ(q, e1e2)! ∧ δ(q, e2e1)!]; • DC2: ∀e1, e2 ∈ E, q ∈ Q, s ∈ E∗: [δ(q, e1e2s)! ∨ δ(q, e2e1s)!] ⇒ [∃Ei ∈ {E1, . . . , En}, {e1, e2} ⊆ Ei] ∨ [δ(q, e1e2s)! ∧ δ(q, e2e1s)!]; n i=1 • DC3: δ(q0, pi (si))!, ∀{s1, · · · , sn} ∈ L (AS), ∃si, sj ∈ {s1, · · · , sn}, si 6= sj, where, L (AS) ⊆ L (AS) is the largest subset of L (AS) such that ∀s ∈ L (AS) ∃s′ ∈ L (AS) , ∃Ei, Ej ∈ {E1, ..., En} , i 6= j, pEi∩Ej (s) and pEi∩Ej (s′) start with the same event, and • DC4: ∀i ∈ {1, ..., n}, x, x1, x2 ∈ Qi, x1 6= x2, e ∈ Ei, t ∈ E∗ i , δi(x, e) = x1, δi(x, e) = x2: δi(x1, t)! ⇔ δi(x2, t)!. The first two decomposability conditions require the team to be capable of decision on choice/order of events, by which for any such decision there exists at least one agent that knows both events, or the decision is not important. Moreover, the third and fourth conditions, guarantee that the cooperative perspective of agents from the tasks (parallel composition of local task automata) neither allows a string that is prohibited by the global task automaton, nor disables a string that is allowed in the global task automaton. It was furthermore shown that once the task automaton is decomposed into local task automata and local controllers are designed for local plants to satisfy the local specifications, then the global specification is guaranteed, by design. The next question was the reliability of task decomposability to understand whether a pre- viously decomposable and achievable global task automaton, can still remain decomposable and achievable by the team, after experiencing some event failures. For this purpose, in [21], a class of failures was investigated as follows to defined a notion of passivity. Consider an automaton A = (Q, q0, E, δ). An event e ∈ E is said to be failed in A (or E), if F (A) = PΣ(A) = PE\e(A) = (Q, q0, Σ = E\e, δF ), where, Σ, δF and F (A) denote the post-failure event set, post-failure transition relation and post-failure automaton, respectively. A set ¯E ⊆ E of events is then said to be failed in A, when for ∀e ∈ ¯E, e is failed in A, i.e., F (A) = PΣ(Ai) = PE\ ¯E(A) = (Q, q0, Σ = E\ ¯E, δF ). Considering a parallel distributed plant A := n 0, Ei, δi), i = 1, . . . , n. Failure of e i=1 in Ei is said to be passive in Ei (or Ai) with respect to failure in Ai is a passive failure is called a passive event in Ai. Ei, δ) with local agents Ai = (Qi, qi n i=1 Σi. An event whose Ai = (Z, z0, E = Ai, if E = n ∪ i=1 n ∪ i=1 The passivity was found to reflect the redundancy of communication links and shown to be a necessary condition for preserving the automaton decomposability. It was furthermore shown that when all failed events are passive in the corresponding local event sets, the problem of decomposability under event failure can be transformed into the standard decomposability problem to find the conditions under which AS ∼= PEi\ ¯Ei(AS), as follows. Lemma 2: (Theorem 1 in [21]) Consider a deterministic task automaton AS = (Q, q0, E = n Pi(AS), and furthermore, assume that Ei, δ). Assume that AS is decomposable, i.e., AS ∪ i=1 ¯Ei = {ai,r} fail in Ei, r ∈ {1, ..., ni}, and ¯Ei are passive for i ∈ {1, . . . , n}. Then, AS remains decomposable, in spite of event failures, i.e., AS F (Pi (AS)) if and only if n i=1 ∼= ∼= n i=1 n i=1 • EF 1: ∀e1, e2 ∈ E, q ∈ Q: [δ(q, e1)! ∧ δ(q, e2)!] ⇒ [∃Ei ∈ {E1, · · · , En}, {e1, e2} ⊆ Ei\ ¯Ei] ∨ [δ(q, e1e2)! ∧ δ(q, e2e1)!]; • EF 2: ∀e1, e2 ∈ E, q ∈ Q, s ∈ E∗: [δ(q, e1e2s)! ∨ δ(q, e2e1s)!] ⇒ [∃Ei ∈ {E1, · · · , En}, {e1, e2} ⊆ Ei\ ¯Ei] ∨ [δ(q, e1e2s)! ∧ δ(q, e2e1s)!]; • EF 3: δ(q0, pi (si))!, ∀{s1, · · · , sn} ∈ L (AS), ∃si, sj ∈ {s1, · · · , sn}, si 6= sj, where, L (AS) ⊆ L (AS) is the largest subset of L (AS) such that ∀s ∈ L (AS) , ∃s′ ∈ L (AS) , ∃Σi, n i=1 Σj ∈ {Σ1, ..., Σn} , i 6= j, pΣi∩Σj (s) and pΣi∩Σj (s′) start with the same event, and • EF 4: ∀i ∈ {1, . . . , n}, x, x1, x2 ∈ Qi, x1 6= x2, e ∈ Ei\ ¯Ei, t1, t2 ∈ ¯E∗ 2 such that pEi\ ¯Ei(t′ δi(x, t2e) = x2: δi(x1, t′ 2)!, for some t′ i , δi(x, t1e) = x1, 1) = pEi\ ¯Ei(t′ 2). 1)! ⇔ δi(x2, t′ 1, t′ EF 1-EF 4 are respectively the decomposability conditions DC1-DC4, after event failures with respect to parallel composition and natural projections into refined local event sets Σi = Ei\ ¯Ei, i ∈ {1, . . . , n}, provided passivity of ¯Ei, i ∈ {1, . . . , n}. In this paper we are interested in the case that a task automaton is not decomposable and would like to ask whether it is possible to make it decomposable, and if so, whether the automaton can be made decomposable with minimum number of communication links. This problem is formally stated as Problem 1: Consider a deterministic task automaton AS with event set E = Ei for n agents with local event sets Ei, i = 1, . . . , n. If AS is not decomposable, can we modify the sets of private and shared events between local event sets such that AS becomes decomposable with respect to parallel composition and natural projections Pi, with the minimum number of communication links? n ∪ i=1 One trivial way to make an automaton A decomposable, is to share all events among all agents, i.e., Ei = E, ∀i = 1, . . . , n. This method , however, is equivalent to centralized control. In general, in distributed large scale systems, one of the objectives is to sustain the systems functionalities over as few number of communication links as possible, as will be addressed in the next section. III. TASK AUTOMATON DECOMPOSABILIZATION A. Motivating Examples This section is devoted to Problem 1 and proposes an approach to redefine the set of private and shared events among agents in order to make an undecomposable task automaton decomposable. For more elaboration, let us to start with a motivating examples. Example 1: Consider two sequential belt conveyors feeding a bin, as depicted in Figure 1. To avoid the overaccumulation of materials on Belt B, when the bin needs to be charged, at first Belt B and then (after a few seconds), Belt A should be started. After filling the bin, to stop the charge, first Belt A and then after a few seconds Belt B is stopped to get completely emptied. The global task automaton, showing the order of events in this plant, is shown in Figure 2. Fig. 1. The process of two belt conveyors charging a bin. AS: BStart / • / • @A BinF ull / • / • AStart / • AStop BStop / • BCD Fig. 2. Global task automaton for belt conveyors and bin. BinEmpty The local event sets for Belt A and Belt B are EA = {AStart, BinF ull, AStop} and EB = {BStart, BStop, BinEmpty}, respectively, with AStart:= Belt A start; BinF ull:= Bin full; AStop:= Belt A stop and wait for 10 Seconds; BStart:= Belt B start and wait for 10 Seconds; BStop:= Belt B stop, and BinEmpty: Bin empty. The task automaton is not decomposable with respect to parallel composition and natural pro- jection Pi, i ∈ {A, B}, due to violation of DC by successive private event pairs {BStart, AStart} and {AStop, BStop}. To make AS decomposable, (BStart ∨ AStart) ∧ (AStop ∨ BStop) should become common between EA and EB. Therefore, four options are possible: (BStart ∧ BStop), (BStart ∧ AStop), (AStart ∧ BStop), or (AStart ∧ AStop) become common. In each of these op- tions two private events should become common, and hence, all four options are equivalent in the sense of optimality. Consider for example AStart and AStop to become common. In this case the new local event sets are formed as EA = {AStart, BinF ull, AStop} and EB = {BStart, BStop, BinEmpty, AStart, AStop}. The automaton AS will then become decomposable (i.e., PA(AS)PB(AS) ∼= AS) with the new local event sets with the corresponding local task automata as are shown in Figure 3. In this example, different sets of private events can be chosen to make AS decomposable. All of these sets have the same cardinality, and hence, no optimality is arisen in this example. Next example shows a case with different choices of private event sets to be shared, suggesting / / / / / / O O PA(AS): AStart / • BinF ull / • @A , PB(AS): / • BCD BStart / • / • AStart / • @A AStop / • BStop / • BCD AStop BinEmpty Fig. 3. {BStart, BStop, BinEmpty, AStart, AStop}. task automata Local for belt conveyors, with EA = {AStart, BinF ull, AStop} and EB = optimal decomposition by choosing the set with the minimum cardinality. Example 2: Consider two local event sets E1 = {e1, e3} and E2 = {e2}, with the global task . This automaton is undecomposable due to violation of automaton e2 e3 / • / • (PPPPPP e1 • • DC by e2 ∈ E2\E1 and {e1, e3} ∈ E1\E2. To make it decomposable, one event among the set {e1, e2} and another event among the set {e2, e3} (either {e2} or {e1, e3}) should become common. Therefore, in order for optimal decomposabilization, {e2} is chosen to become common due to its minimum cardinality. It is obvious that in this case only one event should become common while if {e1, e3} was chosen, then two events were required to be shared. Motivated by these examples, the core idea in our decompozabilization approach is to first check the decomposability of a given task automaton AS, by Lemma 1, and if it is not decom- posable, i.e., either of DC1-DC4 is violated then the proposed method is intended to make AS decomposable, by eradicating the reasons of dissatisfying of decomposability conditions. We will show that violation of decomposability conditions, can be rooted from two different sources: it can be because of over-communication among agents, that may lead to violation of DC3 or/and DC4, or due to lack of communication, that may lead to violation of DC1, DC2, DC3 or/and DC4. Accordingly, decomposability can be enforced using two methods of link deletion and link addition, subjected to the type of undecomposability. Considering link deletion as an intentional event failure, according to Lemma 2 a link can be deleted only if it is passive and its deletion respects EF 1-E4. On the other hand, the second method of enforcing of decomposability, i.e., establishing new communication links, may result in new violations of DC3 or DC4, that should be treated, subsequently. In order to proceed the approach, we firstly introduce four basic definitions to detect the components that contribute in violation of each decomposability condition and then propose basic lemmas through which the communication links, and hence the local event sets are modified to / / / O O / / / / / O O / / / ( / resolve the violations of decomposability conditions. B. Enforcing DC1 and DC2 This part deals with enforcing of DC1 and DC2. For this purpose, the set of events that violate DC1 or DC2 is defined as follows. n ∪ i=1 Definition 1: (DC1&2-Violating set) Consider the global task automaton AS with local event sets Ei for n agents such that E = Ei. Then, the DC1&2-Violating set operator V : AS → E × E, indicates the set of event pairs that violate DC1 or DC2 (violating pairs), and is defined as V (AS) := {{e1, e2}e1, e2 ∈ E, ∀Ei ∈ {E1, . . . , En}, {e1, e2} 6⊂ Ei, ∃q ∈ Q such that δ(q, e1)!∧δ(q, e2)!∧¬[δ(q, e1e2)!∧δ(q, e2e1)!] or ¬[δ(q, e1e2s)! ⇔ δ(q, e2e1s)!]}, for some s ∈ E∗. Moreover, W : AS → E is defined as W (AS) := {e ∈ E∃e′ ∈ E such that {e, e′} ∈ V (AS)}, and shows the set of events that contribute in V (AS) (violating events). For a particular event e and a specific local event set Ei ∈ {E1, . . . , En}, We(AS, Ei) is defined as We(AS, Ei) = {e′ ∈ Ei{e, e′} ∈ V (AS)}. This set captures the collection of events from Ei that pair up with e to contribute in violation of DC1 or DC2. The cardinality of this set will serve as an index for optimal addition of communication links to make V (AS) empty. This definition suggests a way to remove a pair of events {e1, e2} from V (AS), by sharing e1 with one of the agents in loc(e2) or by sharing e2 with one of the agents in loc(e1). Once there exist an agent that knows both event, loc(e1) ∩ loc(e2) becomes nonempty and e1 and e2 no longer contribute in violation of DC1 or DC2 since [∃Ei ∈ {E1, . . . , En}, {e1, e2} ⊆ Ei] becomes true for e1 and e2 in Lemma 1. Therefore, Lemma 3: The set V (AS) becomes empty, if for any {e, e′} ∈ V (AS), e is included in Ei for some i ∈ loc(e′), or e′ is included in Ej for some j ∈ loc(e). In this case, {e, Ei} or {e′, Ej} is called a DC1&2-enforcing pair for DC1&2-violating pair {e, e′}. Example 3: In Example 2, V (AS) = {{e1, e2}, {e2, e3}}, W (AS) = {e1, e2, e3}. Including e2 in E1 vanishes V (AS) and makes AS decomposable. However, applying Lemma 3 may offer different options for event sharing, since pairs in V (AS) may share some events. In this case, the minimum number of event conversions would be obtained by forming a set of events that are most frequently shared between the violating pairs. This gives the minimum cardinality for the set of private events to be shared, leading to minimum number of added communication links. Such choice of events offers a set of events that span all violating pairs. These pairs are captured by We(AS, Ei) for any event e. In order to minimize the number of added communication links for vanishing V (AS), one needs to maximize the number of deletions of pairs from V (AS) per any link addition. For this purpose, for any event e, We(AS, Ei) is formed to understand the frequency of appearance of e in V (AS) for any Ei, and then, the event set Ei with maximum We(AS, Ei) is chosen to include e (Here, . denotes the set's cardinality). In this case, inclusion of e in Ei will delete as many pairs as possible from V (AS). Interestingly, these operators can be represented using graph theory as follows. A graph G = (W, Σ) consists of a node set W and an edge set Σ, where an edge is an unordered pair of distinct vertices. Two nodes are said to be adjacent if they are connected through an edge, and an edge is said to be incident to a node if they are connected. The valency of a node is then defined as the number of its incident edges [33]. Now, since we are interested in removing the violating pairs by making one of their events to be shared, it is possible to consider the violating events as nodes of a graph such that two nodes are adjacent in this graph when they form a violating pair. This graph is formally defined as follows. Definition 2: (DC1&2-Violating Graph) Consider a deterministic automaton AS. The DC1&2- Violating graph, corresponding to V (AS), is a graph G(AS) = (W (AS), Σ). Two nodes e1 and e2 are adjacent in this graph when {e1, e2} ∈ V (AS). In this formulation, the valency of each node e with respect to a local event set Ei ∈ {E1, . . . , En} is determined by val(e, Ei) = We(AS, Ei). When e is included into Ei, it means that all violating pairs containing e and events from Ei are removed from V (AS), and equivalently, all corresponding incident edges are removed from G(AS). For this purpose, following algorithm finds the set with the minimum number of private events to be shared, in order to satisfy DC1 and DC2. The algorithm is accomplished on graph G(AS), by finding e and Ei with maximum We(AS, Ei) and including e in Ei, deleting all edges from e to Ei, updating W (AS), and continuing until there is not more edges in G(AS) to be deleted. Algorithm 1: 1) For a deterministic automaton AS, with local event sets Ei, i = 1, . . . , n, violating DC1 or i = Ei, i = 1, . . . , n; V 0(AS) = V (AS); DC2, form the DC1&2-Violating graph ; set E0 W 0(AS) = W (AS); G0(AS) = (W (AS), Σ); k=1; 2) Among all events in the nodes in W k−1(AS), find e with the maximum W k−1 e (AS, Ek−1 i ), i for all Ek−1 i = Ek−1 4) update W k 3) Ek i ∈ {Ek−1 1 , . . . , Ek−1 n }; ∪ {e}; and delete all edges from e to Ek i ; e (AS, Ei) for all nodes of G(AS); 5) set k = k + 1 and go to step (2); 6) continue, until there exist no edges. This algorithm successfully terminates due to finite set of edges and nodes in the graph G(AS) and enforces AS to satisfy DC1 and DC2 as Lemma 4: Algorithm 1 leads AS to satisfy DC1 and DC2 with minimum addition of com- munication links. Moreover if AS satisfies DC3 and DC4 and Ek i ∪ {e} in Step 3 does not violate DC3 and DC4 in all iterations, then Algorithm 1 makes AS decomposable with minimum addition of communication links. i = Ek−1 Proof: See the Appendix for proof. Remark 1: (Special case: Two agents) For the case of two agents, since they are only two local event sets, for all {e, e′} ∈ V (AS), e and e′ are from different local event sets, and hence, for n = 2, We(AS, Ei) is equivalent to val(e), and addition of e into Ei in each step implies the deletion of all incident edges of e. Remark 2: Although Algorithm 1 leads AS to satisfy DC1 and DC2, it may cause new violations of DC3 or/and DC4, due to establishing new communication links. Example 4: Consider a task automaton AS: e2 e1 e5 e1 • • • e3 hPPPPPP e1 • • • b / • vnnnnnn a / • (PPPPPP e2 with local event sets E1 = {a, b, e1, / • / • / • e6 • e4 e3, e5} and E2 = {a, b, e2, e4, e6}. Both DC1 and DC2 are violated by event pair {e1, e2} when they require decision on a choice and a decision on their order from the initial state, while none of the agents knows both of them. To vanish V (AS) = {{e1, e2}}, two enforcing pairs are suggested: {e1, E2} (e1 to be included in E2) or {e2, E1} (e2 to be included in E1). However, inclusion of e1 in E2, cause a new violation of DC4 since with new E2 = {a, b, e1, e2, e4, e6}, P2(AS) is obtained , violating DC4, due to new nondeterminism, as P2(AS): e1 / • / • • e1 hPPPPPP e1 vnnnnnn a • • • b for which e3 also is required to be included to E2 in order to make AS decomposable. On the other hand, if instead of including e1 in E2, one included e2 in E1, then besides violation of o o o o / ( v / / o o o o h / / / v / o o o o h DC4 (as there does not exists a deterministic automaton that bisimulates P2(AS)), new violations of DC3 emerged, as with new event set E1 = {a, b, e1, e2, e3, e5}, the parallel composition of P1(AS): • and P2(AS): / • / • / • • • e5 e1 e2 e1 • b • e3 hPPPPPP e1 • vnnnnnn a (PPPPPP e2 • produces string e1e2e4e6 that does not appear / • vnnnnnn a e2 (PPPPPP e2 / • • • b • e4 e6 / • / • in AS. To make AS decomposable, we also need to include e1 and e3 in E2. C. Enforcing DC3 Lemma 3 proposes adding communication links to make DC1 and DC2 satisfied. Next step is to deal with violations of DC3. In contrast to the cases for DC1 and DC2, violation of DC3 can be overcome either by disconnecting one of its communication links to prevent the illegal synchronization of strings, or by introducing new shared events to fix strings and avoid illegal interleavings. To handle violation of DC3, we firstly define the set of tuples that violate DC3 as follows. Definition 3: (DC3 − violating tuples) Consider a deterministic automaton AS, satisfying DC1 and DC2 and let L (AS) ⊆ L (AS) be the largest subset of L (AS) such that ∀s ∈ L (AS) ∃s′ ∈ L (AS) , ∃Ei, Ej ∈ {E1, ..., En} , i 6= j, pEi∩Ej (s) and pEi∩Ej (s′) start with the same event a ∈ Ei ∩ Ej. For any such Ei, Ej and a, if ∃{s1, · · · , sn} ∈ L (AS), ∃si, sj ∈ {s1, · · · , sn}, si 6= sj, si, sj ∈ L (AS), ¬δ(q0, pi (si))!, then a is called a DC3 − violating event with respect to s1, s2, Ei and Ej, and (s1, s2, a, Ei, Ej) is called a DC3-violating tuple. The set of all DC3 − violating tuples is denoted by DC3 − V and defined as DC3 − V = {(s1, s2, a, Ei, Ej)e is a DC3-violating event with respect to s1, s2, Ei and Ej }. n i=1 Any violation in DC3 can be interpreted in two ways: firstly, it can be seen as over-communication of shared event a that lead to synchronization of s1 and s2 in (s1, s2, a, Ei, Ej) and emerging illegal interleaving strings from composition of Pi(AS) and Pj(AS). In this case, if event a is excluded from Ei or Ej, then a will no longer contribute in synchronization to generate illegal interleavings, and hence, (s1, s2, a, Ei, Ej) will no longer remain a DC3-violating tuple. However, exclusion of a from Ei or Ej is allowed, only if it is passive (exclusion is considered as an intentional event failure) and does not violate EF 1-EF 4. The second interpretation reflects a violation of DC3 as a lack of communication, such that if for any DC3 violating tuple o o o o / ( v / / o o o o h / ( v / o o / / (s1, s2, a, Ei, Ej), one event that appears before a in s1 or s2, is shared between Ej and Ej, then Pi(AS) and Pj(AS) will have enough information to distinguish s1 and s2 to prevent illegal interleaving of strings. Two methods for resolving the violation of DC3 can be therefore stated as the following lemma. Lemma 5: Consider an automaton AS, satisfying DC1 and DC2. Then any DC3-violating tuple (s1, s2, a, Ei, Ej) is overcome, when: 1) a is excluded from Ei or Ej (eligible if it respects passivity and EF 1-EF 4), or 2) if ∃b ∈ (Ei ∪ Ej)\(Ei ∩ Ej) that appears before a in only one of s1 and s2, then b is included in Ei ∩ Ej, otherwise, pick e1 ∈ pEi∪Ej (s1), e2 ∈ pEi∪Ej (s2), such that e1 6= e2, e1, e2 appear before a in s1 and s2, are included in Ei ∩ Ej. To handle a violation of DC3, when, b ∈ Ei\Ej is to be included in Ej, then {b, Ej} is called a DC3-enforcing pair; while, when {e1, e2} ⊆ Ei\Ej has to be included in Ej, then {{e1, e2}, Ej} is denoted as DC3-enforcing tuple. Finally, when e1 ∈ Ei\Ej and e2 ∈ Ej\Ei have to be included in Ej and Ei, respectively, then {{e1, Ej}, {e2, Ei}} is called a DC3- enforcing tuple. Proof: See the proof in the Appendix. Remark 3: Applying the first method in Lemma 5, namely, exclusion of a from Ei or Ej in a DC3-violating tuple (s1, s2, a, Ei, Ej), is only allowed if a is passive in that local event set, and the exclusion does not violate EF 1-EF 4. The reason is that once a shared event a ∈ Ei ∩ Ej becomes a private one in for example Ei, then decision makings on the order/selection between any e ∈ Ei\a and a cannot be accomplished by the i − th agent, and if there is no other agent to do so, then AS becomes undecomposable. Moreover, deletion of a communication link may also result in generation of new interleavings in the composition of local automata, that are not legal in AS (violation of EF 3). In addition, deletion of a from Ei may impose a nondeterminism in bisimulation quotient of Pi(AS), leading to violation of EF 4. On the other hand, the second method, namely, establishing new communication link by sharing b with Ei or Ej may lead to new violations of DC3 or DC4 that have to be avoided or resolved, subsequently. Both methods in Lemmas 5 present ways to resolve the violation of DC3. They differ however in the number of added communication links, as the first method deletes links, whereas the second approach adds communication links to enforce DC3. Therefore, in order to have as few number of links as possible among the agents, one should start with the link deletion method first, and if it is not successful due to violation of passivity or any of EF 1-EF 4, then link addition is used to remove DC3-violating tuples from DC3 − V . Example 5: This example shows an undecomposable automaton that suffers from a conflict on a communication link whose existence violates DC3, whereas its deletion dissatisfies EF 1, EF 2 and EF 4. Let snde(i) and rcve(i) respectively denote the set of labels that Ai sends e to those agents and the set of labels that Ai receives e from their agents, defined as snde(i) = {j ∈ {1, ..., n}Ai sends e to Aj} and rcve(i) = {j ∈ {1, ..., n}i ∈ snde(j)}. Consider the task automaton AS: • • • b b e2 • • • e1 a eLLLLLL yrrrrrr b • • • e5 / • d \::::::::: c • a  • e2 e1 / • with communication pattern e1 9rrrrrr %LLLLLL e2 • • e2 %LLLLLL 9rrrrrr e1 • a / • e3 / • 2 ∈ snda,b,c,d(1), 1 /∈ snda,b,c,d(1) and local event sets E1 = {a, b, c, d, e1, e3, e5}, E2 = {a, b, c, d, e2}, leading to P1(AS): e1 e5 e1 , b • / • / • • b • a hPPPPPP • a / • e3 / • d (PPPPPP c • • e1 6nnnnnn a / • • • • • b a e2 e3 9rrrrrr %LLLLLL e2 b e2 e1 P2(AS): • • • • b b • • a eLLLLLL yrrrrrr b • • • • b e5 d \::::::::: c a hPPPPPP • • d hPPPPPP c • e2 6nnnnnn a / • / • e1 / • e1 9rrrrrr %LLLLLL e2 • a  • • • • a e2 9rrrrrr %LLLLLL 9rrrrrr e1 and P1(AS)P2(AS): which is not bisimilar to AS. Here, • e2 %LLLLLL 9rrrrrr e3 / • / • • • a / • e3 / • e2 e2 • • • • AS is not decomposable since two strings e1ae2e3 and e1ae3e2 are newly generated from the interleaving of strings in P1(AS) and P2(AS), while they do not appear in AS, and hence, DC3 is not fulfilled, due to DC3-violating tuples (e1e2ae3, ae2, a, E1, E2) and (e2e1ae3, ae2, a, E1, E2). Now, as Lemma 5, one way to fix the violation of DC3 is by excluding a from E2. However, although a is passive in E2, its exclusion from E2 dissatisfies EF 1( as δ(q0, e2)! ∧ δ(q0, a)! ∧ ¬[δ(q0, e2a)! ∧ δ(q0, ae2)!]) and EF 2 (since δ(q0, e1e2a)! ∧ ¬δ(q0, e1ae2)!). In this case, DC4 o o o o / / o o   % e y o o \ 9 %  / / o o o o 9 o o o o / / o o ( / / o o h o o O O 6 / o o   / o o o o h o o h 6 / / % o o o o / / 9 % o o   % 9 9 e y \ o o 9 %  / / o o o o 9 also will be violated as P2(AS) becomes P2(AS) ∼= bisimulates no deterministic automaton. • / • vnnnnnn d c (PPPPPP e2 / • • b (PPPPPP b • • e2 / • that Lemma 5 also suggests another method to enforce DC3, by including either e1 in E2 or e2 in E1. Inclusion of e1 in E2, however, leads to another violation of DC4, as it produces a nonde- terminism after event d. This in turn will need to include e5 in E2 to make AS decomposable. Alternatively, instead of inclusion of e1 in E2, one can include e2 in E1, that enforces DC3 and makes AS decomposable. The second method of Lemma 5 is more elaborated in the next example. Example 6: This example shows handling of DC3-violating tuples using the second method in Lemma 5, i.e., by event sharing. Later on, this example will be also used to illustrate the enforcement of DC4. Now, consider a task automaton AS: • with local / • / • / • / • e3 e5 e2 a Z555555 e1 / • e5  • / • e3 a / • e6 / • / • e1 / • a / • e4 event sets E1 = {a, e1, e3, e5} and E2 = {a, e2, e4, e6}, and let three branches in AS from top to bottom to be denoted as s1 := e1e3e5ae2, s3 := ae6 and s2 := e5e3e1ae4. This automaton does not satisfy DC4 (as P2(AS) has no deterministic bisimilar automaton), as well as DC3, as the parallel composition of P1(AS): • have and P2(AS): • / • / • / • / • e3 e5 e2 a Z555555 e1 / • e5  • / • e3 a / • / • e1 / • a • / • a  / • e6 Z555555 a a / • e4 / • illegal interleaving strings {e1e3e5ae6, e5e3e1ae2}, e1e3e5ae4 and e5e3e1ae4, corresponding to DC3-violating tuples (s1, s2, a, E1, E2), (s1, s3, a, E1, E2) and (s2, s3, a, E1, E2), respectively. For pairs of strings {s1, s3} and {s2, s3}, there exits an event e5 ∈ (E1 ∪ E2)\(E1 ∩ E2) that appears before a, only in s1 and s2, but not in s3. Therefore, inclusion of e5 in E2, removes the illegal interleavings between s1 and s2 with s3, but not across s1 and s2, as with new E2 = / ( v / / / ( / / / / / / Z  / / / / / / / / / / Z  / / / / / / Z  / / / {a, e2, e4, e5, e6} and P2(AS): • a / • Z555555 e5 / • e5  • / • a e2 / • , (s1, s3, a, E1, E2) and (s2, s3, a, E1, E2) are a / • e6 / • / • e4 no longer DC3-violating tuples, while (s1, s2, a, E1, E2) still remains a DC3-violating one with illegal interleavings e1e3e5ae4 and e5e3e1ae2. The reason is that e5 appears before a in both s1 and s2, and there is no event that appear before a only in one of the strings s1 and s2. For this case, according to Lemma 5, two different events that appear before "a", one from pE1∪E2(s1) = s1 and the other from pE1∪E2(s2) = s2, i.e., e1 and e5 have to be attached to E2, resulting in E2 = {a, e1, e2, e4, e5, e6}, • and P1(AS)P2(AS) ∼= AS. / • / • / • e5 e2 a Z555555 e1 / • • D. Enforcing DC4 e5  / • e1 a / • e6 / • / • a / • e4 Similar to DC1-DC3, a violation of DC4 can be regarded as a lack of communication link that causes nondeterminism in a local task automaton. Such interpretation calls for establishing a new communication link to prevent the emergence of local nondeterminism. Moreover, when this local nondeterminism occurs on a shared event, the corresponding violation of DC4 can be overcome by excluding the shared event from the respective local event set. It should be noted however that the event exclusion should respect the passivity and EF 1-EF 4 conditions. When DC4 is enforced by link additions, similar to what we discussed for DC3, addition of new communication link may cause new violations of DC3 or/and DC4. To enforce DC4, firstly a DC4-violating tuple is defined as follows. Definition 4: (DC4 − violating tuple) Consider a deterministic automaton AS with local event sets Ei = 1, . . . , n, ∀i ∈ {1, ..., n}, q, q1, q2 ∈ Q, t1, t2 ∈ (E\Ei)∗, e ∈ Ei, δ(q, t1e) = q1 6= δ(q, t2e) = q2, ∃t ∈ E∗, δ(q1, t)!, but ∄t′ ∈ E∗ such that δ(q2, t′)!, pi(t) = pi(t′). Then, (q, t1, t2, e, Ei) is called a DC4-violating tuple. / / / Z  / / / / / / / / Z  / / / / / This definition suggests the way to overcome the violation of DC4, as stated in the following lemma. Lemma 6: Any DC4-violating tuple (q, t1, t2, e, Ei) is overcome, when: 1) e is excluded from Ei, (eligible, if it is passive in Ei and its exclusion respects EF 1−EF 4), or 2) if ∃e′ ∈ (t1 ∪ t2)\(t1 ∩ t2), e′ is included in Ei; otherwise, e1 ∈ t1 and e2 ∈ t2, such that e1 6= e2, are included in Ei. In these cases, {e′, Ei} and {{e1, e2}, Ei} are called DC4-enforcing tuples. Proof: See the proof in the Appendix. Following examples illustrate the methods in Lemma 6 to enforce DC4. Example 7: This example shows an automaton that is undecomposable due to a violation in DC4, while DC4 can be enforced using both methods: event exclusion as well as event in- clusion. Consider the task automaton AS: with E1 = e1 e2 a b / • / • / • / • • (PPPPPP a • e3 / • {a, b, e1, e3}, E2 = {a, b, e2}, 2 ∈ snda,b(1), 1 /∈ snda,b(2), leading to P1(AS): / • e1 (PPPPPP a • • a e3 / • / • b , P2(AS): / • / • a (PPPPPP a • • b / • e2 , and / • • b / • e2 / • which is not bisimilar to AS, due to 2 i=1 Pi(AS) ∼= e1 e3 / • a  • a %LLLLLL a • / • • 2(AS) ∼= violation of DC4 as there does not exist a deterministic automaton P ′ P2(AS). Here, (q0, t1 = e1, t2 = ε, a, E2) is a DC4-violating tuple. Since a is passive in E2 and its exclusion from E2 keeps EF 1-EF 4 valid, according to Lemma 6, one way to enforce DC4 is exclusion of a from E2, resulting in E2 = {b, e2}, P2(AS): / • and P1(AS)P2(AS) ∼= AS. 2(AS) such that P ′ / • / • e2 b Another suggestion of Lemma 6 to overcome the DC4-violating tuple (q0, t1 = e1, t2 = ε, a, E2) is addition of a communication link to prevent the nondeterminism in P2(AS). Since there exists e1 that appears before a in t1 only, inclusion of e1 in E2 also enforces DC4 as with Pi(AS) ∼= AS. For new E2 = {a, b, e1, e2}, P2(AS): and e1 a b / • / • / • 2 i=1 (PPPPPP a • • the cases that there does not exist an event b that appears before a in only one of the strings t1 or t2, according to Lemma 6, one needs to attach one event from each of two strings t1 and t2 in / / / ( / / / / / / / ( / / / / / / ( / / / / /  / / % / / / / / / / / / ( / / Ei. For instance consider the DC4-violating tuple (t1 = e1e3e5, t2 = e5e3e1, a, E2) in Example 6, with no event that appears before a in (t1 ∪ t2)\(t1 ∩ t2). In that case {e1 ∈ t1, e5 ∈ t2} can be included in E2 to make AS decomposable, as it was shown in Example 6. Example 8: Example 7 showed a violation of DC4 that could be overcome using both method in Lemma 6, namely, by link deletion and link addition. In Example 7, event a was a passive shared event whose exclusion from E2 respected EF 1-EF 4, otherwise it was not allowed to with E1 = be excluded. If the task automaton was e2 e1 a b / • / • / • / • • (PPPPPP a • e3 / • {a, b, e1, e3}, E2 = {a, b, e2}, then DC4 could not be enforced by exclusion of a from E2, as EF 2 was violated since after this exclusion, no agent can handle the decision making on the order of a and e2. Another constraint for link deletion is the passivity of the event. For with E1 = {e1, a}, E2 = {e2, e4, a}. example, consider A′ S: e4 / • / • e1 (PPPPPP e2 • • • • / • a 6nnnnnn e2 e1 A′ S is not decomposable due to violation of DC4 in P1(AS): / • e1 (PPPPPP e1 • • a . The / • nondeterminism in P1(AS), and accordingly the DC4-violating tuple (q0, ε, e2, e1, E1), cannot be removed by event exclusion since it occurs on e1 that is not a shared event. To enforce DC4 according to Lemma 6, e2 is required to be included into E1 that makes A′ S decomposable. Another important issue for addition of communication link to enforce DC4 is that establishing new communication link may lead to new violations of DC3 or DC4, as it is shown in the following example. Example 9: Assume the task automaton in Example 7 had a part as shown in he left hand side of the initial state in AS: • d • e1 c e5 vnnnnnn e1 • • • • e1 (PPPPPP a • • a e3 / • / • b / • e2 / • with E1 = {a, b, c, d, e1, e3, e5}, E2 = {a, b, c, d, e2}. Identical to Example 7, (q0, t1 = e1, t2 = ε, a, E2) is a DC4-violating tuple and can be overcome by excluding a from E2, removing the nondeterminism on a in P2(AS). However, unlike Example 7, including e1 into E2 (i.e., E2 = {a, b, c, d, e1, e2}), leads to a , new violation of DC4 in P2(AS): • / • / • / • • • • • e2 e1 e1 a d c b vnnnnnn e1 • (PPPPPP a • / / / ( / / / / / / / / ( / / 6 / / / / ( / o o o o o o v o o / / ( / / / O O / o o o o v o o / / ( / / / O O with a DC4-violating tuple (δ(q0, c), e5, ε, e1, E2), that in turn requires attachment of e5 to E2, in order to enforce DC4. If in this example, the order of e2 and b was reverse, i.e., the task automaton was A′ S: with E1 = {a, b, c, d, e1, e3, e1 e2 e1 e5 a d c b / • / • • • • • • • vnnnnnn e1 (PPPPPP a • / • • / • e3 e5}, E2 = {a, b, c, d, e2}. Then as it was shown in Example 8, the DC4-violating tuple (q0, e1, ε, a, E2) could not be dealt with exclusion of a from E2, due to EF 2, neither by inclusion of e1 into E2 (since as mentioned above, it generates a new violation of DC4 that consequently requires another inclusion of e5 into E2 to satisfy DC4). Remark 4: Both Lemmas 5 and 6 provide sufficient conditions for resolving the violations of DC3 and DC4, respectively. They do not however provide the necessary solutions, neither the optimal solutions, as illustrated in the following example. We will show that for DC3 and DC4, in general one requires to search exhaustively to find the optimal sequence of enforcing tuples, to have minimum number of link additions. In this sense, instead of exhaustive search for optimal solution, it is reasonable to introduce sufficient conditions to provide a trackable procedure for a feasible solution to make an automaton decomposable. Example 10: Consider a task automaton AS: e6 • • b • e5 • e7 • • e5 / • e3 / • a / • e2 / • e1 hPPPPPP vnnnnnn e7 • c • e1 6nnnnnn (PPPPPP e3 e8 b e1 e5 e5 e1 a e4 • • • • • / • / • / • • with local event sets E1 = {a, b, c, e1, e3, e5, e7} and E2 = {a, b, c, e2, e4, e6, e8}. AS is undecom- posable due to DC3-violating tuples (e1e5e3ae2, e3e5e1ae4, a, E1, E2) and (e1e7e5be6, e7e5e1be8, a, E1, E2) and DC4-violating tuples (q0, e1e5e3, e3e5e1, a, E2) and (δ(q0, c), e1e7e5, e7e5e1, b, E2). According to Lemmas 5 and 6, two enforcing tuples {{e1, e3}, E2} and {{e1, e7}, E2} remove all violations of DC3 and DC4. However, this solution is not unique, nor optimal, as the enforcing tuple {{e1, e5}, E2} enforced DC3 and DC4 with minimum number of added communication links. / • E. Exhaustive search for optimal decompozabilization Another difficulty is that enforcing the decomposability conditions using link deletion is limited to passivity and EF 1-EF 4, and after deletions of redundant links (that are passive and their o o o o o o v o o / / ( / / / O O / o o o o o o o o   / / / / h v o o 6 ( o o o o o o o o / / / / deletion respect EF 1-EF 4), the only way to make the automaton decomposable is to establish new communication links. Addition of new links, on the other hand, may lead to new violations of DC3 or DC4 (as illustrated in Examples 5 and 9), and in turn may introduce new violations. It means that, in general, resolution of decomposability conditions can dynamically result in new violations of decomposability conditions, as it is elaborated in the following example. Example 11: Consider the task automaton AS: e10 b • • • • d e2 e12 • • • e6 a • c O • e2 e4 yrrrrrr e2 • • • e2 f %LLLLLL e1 / • • • • • / • e4 9rrrrrr e8 e2 with local event sets / • / • e4 e3 / • / • g e5 E1 = {a, b, c, d, f, g, e1, e3, e5} and E2 = {a, b, c, d, f, g, e2, e4, e6, e8, e10, e12}. This automaton is undecomposable due to DC2-violating event pairs {(e1, e2), (e2, e3)} with the corresponding enforcing tuples {e1, E2}, {e3, E2} and {e2, E1} and with the following possible sequences: 1) {e1, E2}; {e3, E2}: in this case AS becomes decomposable, without emerging new viola- tions of decomposability conditions; 2) {e1, E2}; {e2, E1}; {{e4, e6}, E1}; {e8, E1}: if after including e1 in E2, e2 is included in E1, then two DC4-violating tuples (δ(q0, a), ε, e4, e2, E1) and (δ(q0, c), ε, e6, e2, E1) emerge that in turn require {e4, e6} to be attached to E1. Inclusion of e4 in E1, on the other hand, introduces another DC4-violating tuple (δ(q0, f ), ε, e8, e4, E1) that calls for attachment of e8 to E1; similarly 3) {e3, E2}; {e1, E2}; 4) {e3, E2}; {e2, E1}; {{e4, e6}, E1}; {e8, E1}, and 5) {e2, E1}; {{e4, e6}, E1}; {e8, E1}. In this example, the first and the third sequences, i.e., {{e1, e3}, E2} gives the optimal choice with minimum number of added communication links, although initially {e2, E1} sought to offer the optimal solution. Therefore, in general an optimal solution to Problem 1 will be obtained through an exhaustive search, using Lemmas 4, 5 and 6, as state in the following algorithm. Algorithm 2: 1) For any local event set, exclude any passive event whose exclusion respects EF 1-EF 4; 2) identify all DC1&2-violating tuples, DC3-violating tuples and DC4-violating tuples and o o o o o o o o / o o o o o o o o y o o / / % O / / 9 / / O O / / / their respective enforcing tuples; 3) among all enforcing tuples, find the one that corresponds to the most violating tuples; 4) if applying of the enforcing tuples with maximum number of violating tuples, does not impose new violations of DC3 or DC4, then apply it, go to Step 3 and continue until there is no violating tuples; otherwise, do the exhaustive search to find the sequence of link additions with minimum number of added links. 5) end. n ∪ i=1 Lemma 7: Consider a deterministic task automaton AS with local event sets Ei such that Ei. If AS is not decomposable with respect to parallel composition and natural projections E = Pi, i = 1, ..., n, Algorithm 2 optimally makes AS decomposable, with minimum number of communication links. Proof: See the proof in the Attachment. Remark 5: (Special case: Automata with mutual exclusive branches) When branches of AS share no events (i.e. ∀q ∈ Q, s, s′ ∈ E∗, δ(q, s)!, δ(q, s′)!, s ≮ s′, s′ ≮ s: s ∩ s′ = ∅), due to definition of DC3 and DC4 in Lemma 1 DC3 and DC4 are trivially satisfied, and moreover, since branches from any state share no event, then Algorithm 2 is reduced to Algorithm 1. F. Feasible solution for task decomposabilization As Example 11 showed that, in general, additions of communication links may successively introduce new violations of decomposability conditions, for which new links should be estab- lished. Therefore, in general an optimal solution to Problem 1 requires an exhaustive search, using Lemmas 4, 5 and 6. Moreover, checking of DC3 and DC4 is a nontrivial task, while it has to be accomplished initially as well as upon each link addition. It would be therefore very tractable if we can define a procedure to make DC3 and DC4 satisfied, without their examination. Following result takes an automaton whose DC1 and DC2 are made satisfied using Algorithm 1, and proposes a sufficient condition to fulfill DC3 and DC4. Lemma 8: Consider a deterministic automaton AS, satisfying DC1 and DC2. AS satisfies DC3 and DC4 if following steps are accomplished on AS: 1) ∀s1, s2 ∈ E∗, s1 ≮ s2, s2 ≮ s1, q, q1, q2 ∈ Q, δ(q, s1) = q1 6= δ(q, s2) = q2, [∄e1, e2 ∈ E, e1e2 6 s1, e2e1 6 s2, ∀t ∈ E∗, δ(q, e1e2t)! ⇔ δ(q, e2e1t)!], ∃e ∈ s1 ∩ s2,, then ∀i ∈ loc(e), ∀e′ ∈ {e1 6 t1, e2 6 t2}, e′ appears before e, include e′ in Ei. 2) go to Step 1 and continue until ∀s1, s2 ∈ E∗, s1 ≮ s2, s2 ≮ s1, q, q1, q2 ∈ Q, δ(q, s1) = q1 6= δ(q, s2) = q2, ∃e ∈ s1∩s2, [∄e1, e2 ∈ E, e1e2 6 s1, e2e1 6 s2, ∀t ∈ E∗, δ(q, e1e2t)! ⇔ δ(q, e2e1t)!], then ∀i ∈ loc(e), Ei contains the first events of s1 and s2, that appear before e. Proof: See the proof in the Attachment. Remark 6: The condition in Lemma 8 intuitively means that for any two strings s1, s2 from any state q, sharing an event e, all agents who know this event e will be able to distinguish two strings, if they know the first event of each string. The ability of those agents that know this event e to distinguish strings s1 and s2, prevents illegal interleavings (to enforce DC3) and local nondeterminism (to satisfy DC4). The significance of this condition is that it does not require to check DC3 and DC4, instead provides a tractable (but more conservative) procedure to enforce DC3 and DC4. The expression s1 ≮ s2, s2 ≮ s1 in the lemma, is to exclude the pairs of strings that one of them is a substring of the other, as their language product does not exceed from the strings of AS, provided DC1 and DC2. Moreover, the expression [∄e1, e2 ∈ E, e1e2 6 s1, e2e1 6 s2, ∀t ∈ E∗, δ(q, e1e2t)! ⇔ δ(q, e2e1t)!] in this lemma excludes the pairs of strings e1e2t and e2e1t from any q ∈ Q that have been already checked using DC1 and DC2 and do not form illegal interleaving strings, and hance, do not need to include e1 in the local event sets of e2 and vice versa (see Example 12). Combination of Lemmas 4 and 8 leads to the following algorithm as a sufficient condition to make a deterministic task automaton decomposable. Following algorithm uses Lemma 4 to enforce DC1 and DC2 followed by Lemma 8 to overcome the violations of DC3 and DC4. Algorithm 3: 1) For a deterministic automaton AS, with local event sets Ei, i = 1, . . . , n, ∀Ei ∈ {E1, . . . , En}, E0 i = Ei\{e ∈ Eie is passive in Ei and exclusion of e from Ei does not violate EF 1- EF 4}; 2) form the DC1&2-Violating graph ; set V 0(AS) = V (AS); W 0(AS) = W (AS); G0(AS) = (W (AS), Σ); k=1; 3) Among all events in the nodes in W k−1(AS), find e with the maximum W k−1 e (AS, Ek−1 i ), for all Ek−1 i = Ek−1 5) update W k 4) Ek i i ∈ {Ek−1 1 , . . . , Ek−1 n }; ∪ {e}; and delete all edges from e to Ek i ; e (AS, Ei) for all nodes of G(AS); 6) set k = k + 1 and go to step (3); 7) continue, until there exist no edges. 8) ∀s1, s2 ∈ E∗, s1 ≮ s2, s2 ≮ s1, q, q1, q2 ∈ Q, δ(q, s1) = q1 6= δ(q, s2) = q2, [∄e1, e2 ∈ E, e1e2 6 s1, e2e1 6 s2, ∀t ∈ E∗, δ(q, e1e2t)! ⇔ δ(q, e2e1t)!], ∃e ∈ s1 ∩ s2, then ∀i ∈ loc(e), ∀e′ ∈ {e1 6 t1, e2 6 t2}, e′ appears before e, include e′ in Ei. 9) go to Step 1 and continue until ∀s1, s2 ∈ E∗, s1 ≮ s2, s2 ≮ s1, q, q1, q2 ∈ Q, δ(q, s1) = q1 6= δ(q, s2) = q2, ∃e ∈ s1∩s2, [∄e1, e2 ∈ E, e1e2 6 s1, e2e1 6 s2, ∀t ∈ E∗, δ(q, e1e2t)! ⇔ δ(q, e2e1t)!], then ∀i ∈ loc(e), Ei contains the first events of s1 and s2, that appear before e. Based on this formulation, a solution to Problem 1 is given as the following theorem. Theorem 1: Consider a deterministic task automaton AS with local event sets Ei such that E = n Ei. If AS is not decomposable with respect to parallel composition and natural projections Pi, ∪ i=1 i = 1, ..., n, Algorithm 3 makes AS decomposable. Moreover, if after Step 7, DC3 and DC4 are satisfied, then the algorithm makes AS decomposable, with minimum number of communication links. Proof: After excluding the redundant shared events in the first step, the algorithm enforces DC1 and DC2 in Steps 2 to 7, according to Lemma 4 and deals with DC3 and DC4 in Steps 8 and 9, based on Lemma 8. Remark 7: If after Step 7, no violation of DC3 or DC4 is reported in the automaton, then AS is made decomposable with minimum number of added communication links; otherwise, the optimal solution can be obtained through exhaustive search by examining the number of added links for any possible sequence of enforcing tuples, using Lemmas 5 and 6, as it was presented in Lemma 7. To avoid the exhaustive search the algorithm provides a sufficient condition to enforce DC3 and DC4 in Steps 8 and 9, according to Lemma 8. The algorithm terminates, due to finite number of states and events, and the fact that at the worst case, when all events are shared among all agents, the task automaton is trivially decomposable. Example 12: Consider a task automaton AS: e6 e7 c e2 • • • • • • • • e9 e12 • • e7 \::::::: e6 e2  e8 • • b a \::::::: B f • a e11 C 8888888 e3 • • e2 e4 B • d • e10 ::::::: e10 / • d / • e1 ::::::: e5 • • • • with local event sets E1 = {a, b, c, d, f, e1, e3, e5, e7, e9, e11} and E2 = {a, b, c, d, f, e2, e4, e6, e8, e10, e12}, with the communication pattern 2 ∈ snda,b,c,d(1) and no more communication links. This task automaton is not decomposable, due to the set of DC1&2-violating tuples {e1, e2}, {e1, e4}, {e2, e3}, {e2, e5}, {e3, e4}, {e4, e5}, DC3-violating tuples (e11ade10, ae7e6, a, E1, E2), (e11ade10, ae6e7, a, E1, E2), (e11ae10d, ae7e6, a, E1, E2), (e11ae10d, ae6e7, a, E1, E2) and DC4- violating tuple (q0, e11, ε, a, E2). There is also one event d that is redundantly shared with E2 as d is passive in E2 and its exclusion respects EF 1-EF 4. Therefore, at the first step, the algorithm excludes d from E2. Next step is to construct the DC1&2-Violating graph and remove its edges by sharing one node from each edge. The set of DC1&2-Violating event pair is obtained as V 0(AS) = {{e1, e2}, {e1, e4}, {e2, e3}, {e2, e5}, {e3, e4}, {e4, e5}} with W 0(AS) = {e1, e2, e3, e4, e5}. It can be seen that the private events d, e6, e7, e8, e9, e10, e11, e12, and shared events a, b, c, f are not included in W 0(AS) as they have no contribution in violation of DC1 and DC2. The DC1&2-Violating graph is shown in Figure 4(a). i e (AS, Ek−1 i (AS, Ek−1 The maximum W k−1 ) is formed by {e2, e4} with respect to E1 (here, since the system has only two local event sets W k−1 ) coincides to the valency of e in the e 1 = {a, b, c, d, e1, e3, e5, e7, e9, e11, e2}) and removing graph). Marking e2, including it to E1 (E1 i ) (valencies) are shown in Figure 4(b). its incident edges to E1 and updating the W k 1 = {a, b, c, d, e1, e3, e5, e7, e9, e11, e2, e4}) with the The next step will include e4 in E1 (E2 highest W k i ) will accomplish enforcing of DC1 and DC2 upon Step 7, as it is illustrated in Figure 4 (c). If from the first stage e4 was chosen instead of e2, the procedure was similarly performed as depicted in Figures 4 (d) and (e), resulting the same set of private events {e2, e4} to be shared with E1. Inclusion of e2 in E1, however, introduces a new DC4-violating tuple (δ(q0, b), ε, e8, e2, E1) i ) and removing its incident edges to E1 and updating the W k e (AS, Ek e (AS, Ek e (AS, Ek o o / /  / o o o o \ O O / o o o o o o  o o \ / / C / /  / /  o o o o B B Fig. 4. Illustration of enforcing DC 1 and DC 2 in Example 12, using Algorithm 3. that will be automatically overcome in Step 8 by sharing e8 ∈ s1 = e8e2e12 (as s1 = e8e2e12 together with s2 = e2ce9 evolve from δ(q0, b), sharing e2 ∈ s1 ∩ s2) in all local event sets of e2, i.e., by including e8 into E1. Similarly, inclusion of e11 in E2 overcomes DC4-violating tuple (q0, e11, ε, a, E2). It is worth noting that the expression "∄e1, e2 ∈ E, e1e2 6 s1, e2e1 6 s2, ∀t ∈ E∗, δ(q, e1e2t)! ⇔ δ(q, e2e1t)!" in Step 8 prevents unnecessary inclusion of e10 in E1 as well as e7 in E2 and e6 in E1 (e6 and e7 satisfy DC1-DC2 and e10 and d satisfy EF 1- EF 2). The algorithm terminates in this stages, leading to decomposability of AS, with E3 {a, b, c, d, e1, e3, e5, e7, e9, e11, e2, e4, e8}, E3 2 = {a, b, c, e2, e4, e6, e8, e10, e11, e12}. 2 = E2, E3 1 = IV. CONCLUSIONS The paper proposed a method for task automaton decomposabilization, applicable in top- down cooperative control of distributed discrete event systems. This result is a continuation of our previous works on task automaton decomposition [19], [20], and fault-tolerant cooperative tasking [21], and investigates the follow-up question to understand that how an originally un- decomposable task automaton can be made decomposable, by modifying the event distribution among the agents. First, using the decomposability conditions the sources of undecomposability are identified and then a procedure was proposed to establish new communication links in order to enforce the decomposability conditions. To avoid the exhaustive search and the difficulty of checking of decomposability conditions in each step, a feasible solution was proposed as a sufficient condition that can make any deterministic task automaton decomposable. V. APPENDIX A. Proof of Lemma 4 Following lemma will be used during the proof. Lemma 9: Consider two non-increasing chains ai, bi, i = 1, ..., N, such that a1 ≥ a2 ≥ ... ≥ bi implies that ∃k ∈ {1, ..., N} such that ai < aN > 0, b1 ≥ b2 ≥ ... ≥ bN > 0. Then ak < bk. N Σ i=1 N Σ i=1 N Σ i=1 ai < N Σ i=1 ai ≥ N Σ i=1 Proof: Suppose by contradiction that bi which contradicts to the hypothesis, and the proof is followed. bi, but, ∄k ∈ {1, ..., N} such that ak < bk. Then, ∀k ∈ {1, ..., N} : ak ≥ bk. Therefore, since ak, bk > 0, ∀k ∈ {1, ..., N}, it results in N Σ i=1 Now, we prove Lemma 4 as follows. In each iteration k for the event e and local event set Ei with maximum W k−1 ), all edges from e to Ei are deleted. Denoting the set of deleted edges in k − th iterations by ∆Σk, in each iteration k, some elements of Σk−1 are moved (AS, Ek−1 i e into ∆Σk until after K iterations, there is no more elements in ΣK to be moved into a new set. k=1, as {∆Σk} ∩ {∆Σl} = ∅, This iterative procedure leads to a partitioning of Σ by {∆Σk}K ∀k, l = {1, ..., K}, k 6= l and K ∪ k=1 ∆Σk = Σ. The latter equality leads to Now, we want to prove that K Σ k=1 ∆Σk = Σ ∆Σk = ∆Σkmax, ∀k ∈ {1, ..., K} ⇒ K = Kmin (1) (2) Here, K is the total number of iterations that is also equal to the number of added com- munication links to remove violations of DC1 and DC2. In this sense, K is desired to be minimized. The proof of (2) is by contradiction as follows. Suppose that ∆Σk = ∆Σkmax, ∀k ∈ k=1, with K ′ < K {1, ..., K}, but, K 6= Kmin, i.e., there exists another partitioning {∆′Σk}K ′ partitions, leading to K ′ Σ k=1 ∆′Σk = Σ In this case, from (1) and (3), we have K Σ k=1 ∆Σk = K ′ Σ k=1 ∆Σk + K Σ k=K ′+1 ∆Σk = K ′ Σ k=1 ∆′Σk. Since ∆Σk > 0, ∀k ∈ {1, ..., K}, then K Σ k=K ′+1 ∆Σk > 0, then, (4) results in K ′ Σ k=1 ∆Σk < K ′ Σ k=1 ∆′Σk. (3) (4) (5) Moreover, since ∆Σk > 0, ∆′Σk > 0, ∀k ∈ {1, ..., K}, then (5) together with Lemma 9 imply that ∃k ∈ {1, ..., K ′} ⊆ {1, ..., K}, i.e., ∆Σk < ∆′Σk, i.e., ∃k ∈ {1, ..., K} such that ∆Σk 6= ∆Σkmax, which contradicts to the hypothesis, and hence, (2) is proven. Moreover, if automaton AS has no violations of DC3 and DC4 before and during the iterations, then the algorithm make it decomposable with the minimum number of added communication links, since the problem of making decomposable is reduced to optimal enforcing of DC1 and DC2. B. Proof for Lemma 5 For any DC3-violating tuple (s1, s2, a, Ei, Ej), exclusion of a from Ei or Ej, excludes a from Ei ∩ Ej, leading to pEi∩Ej (s1) and pEi∩Ej (s1) do not start with a, and hence (s1, s2, a, Ei, Ej) will no longer act as a DC3-violating tuple. For the second method in this lemma, firstly ∀q ∈ Q, s1, s2 ∈ E∗, δ(q, s1)!, δ(q, s2)!, pEi∩Ej (s1) and pEi∩Ej (s2) start with a, such that (s1, s2, a, Ei, Ej) is a DC3-violating tuple, ∃b ∈ (Ei ∪ Ej)\(Ei ∩ Ej) such that b appears before a in s1 or s2 (since AS is deterministic and pEi∩Ej (s1) and pEi∩Ej (s2) start with a). Two cases are possible, here: b appears in only one of the strings s1 or s2; or b appears in both strings. If b appears before a in only of the strings, then without loss of generality, assume 1 ∈ Qi × Qj, ω1, ω2 ∈ [(Ei ∪ Ej)\(Ei ∩ Ej)]∗, that b belongs to only s1, and hence, ∃q, q1, q2, q′ 1) = q1, 1 ∈ (Ei ∪ Ej)∗, a ∈ Ei ∩ Ej such that δi,j(q, ω1) = q′ ω′ δi,j(q1, a)!, δi,j(q, ω2) = q2, δi,j(q2, a)!, where, δi,j is the transition relation in Pi(AS)Pj(AS). Now, due to synchronization constraint in parallel composition, inclusion of b in Ei ∩ Ej means 1, b) = q′′ 1, δi,j(q′ 1 , δi,j(q′′ 1 , ω′ 1, q′′ 1 ], y) and (x, [q′′ 1 ]j) are accessible in Pi(AS)Pj(AS) only if y = [q′′ 1 ]i, that ([q′′ respectively. This means that ([q1]i, [q2]j) and ([q2]i, [q1]j) are not accessible in Pi(AS)Pj(AS), and hence, pi(s1)pj(s2) and pi(s2)pj(s1) cannot evolve after a, and therefore, do not generate illegal strings out of the original strings, implying that (s1, s2, a, Ei, Ej) will no longer remain a DC3-violating tuple. 1 ]j and x = [q′′ 1, b) = q′′ On the other hand, if b appears before a, in both strings s1 and s2, then ∃q, q1, q2, q′ 2, q′′ 2 ∈ 2 ∈ (Ei∪Ej)∗, a ∈ Ei∩Ej such that δi,j(q, ω1) = q′ 1, Qi×Qj, ω1, ω2 ∈ [(Ei∪Ej)\(Ei∩Ej)]∗, ω′ 2) = q2, δi,j(q′ δi,j(q2, a)!, that leads to accessibility of ([q′ 1]j) as well as ([q1]i, [q2]j) and ([q2]i, [q1]j) in Pi(AS)Pj(AS), that means that although (s1, s2, a, Ei, Ej) is no longer a DC3- violating tuple, (s1, s2, b, Ei, Ej) emerges as a new DC3-violating tuple. 1) = q1, δi,j(q1, a)!, δi,j(q, ω2) = q′ 2]j) and ([q′ 2, δi,j(q′ 2]i, [q′ 2, b) = q′′ 2, δi,j(q′′ 1, δi,j(q′′ 1 , ω′ 1, q′′ 1 , q′ 2 , ω′ 1, ω′ 1]i, [q′ In this case (when ∄b ∈ (Ei ∪ Ej)\(Ei ∩ Ej) that appears before a in only one of the strings s1 or s2), instead of inclusion of b in Ei ∩ Ej, if two different events that appear before a in strings pEi∪Ej (s1) and pEi∪Ej (s1) are attached to Ei ∩ Ej, it leads to ∃q, q1, q2, q3, q4 ∈ Qi × Qj, ω1, ω2, ω′ 2 ∈ [(Ei ∪ Ej)\(Ei ∩ Ej)]∗, e1, e2, a ∈ Ei ∩ Ej such that δi,j(q, ω1e1) = q1, 2) = q4, δi,j(q4, a)!. Consequently, due δi,j(q1, ω′ to synchronization constraint in parallel composition, ([q1]i, [q]j), ([q]i, [q1]j), ([q2]i, [q]j) and ([q]i, [q2]j), and hence, ([q3]i, [q4]j) and ([q4]i, [q3]j) are not accessible in Pi(AS)Pj(AS), i.e., no more DC3-violating tuples form on strings s1 and s2. 1) = q3, δi,j(q3, a)!, δi,j(q, ω2e2) = q2, δi,j(q2, ω′ 1, ω′ C. Proof for Lemma 6 For any DC4-violating tuple (q, t1, t2, e, Ei), with q, q1, q2 ∈ Q, t1, t2 ∈ (E\Ei)∗, e ∈ Ei, δ(q, t1) = q1 6= δ(q, t2) = q2, exclusion of e from Ei leads to pi(e) = ε, and pi(t1e) = pi(t2e) = ε, [q]i = [δ(q1, e)]i = [δ(q2, e)]i, and hence, (q, t1, t2, e, Ei) will no longer behave as a DC4- violating tuple. However, it should be noted that it may cause another nondeterminism on an event after e, and this event exclusion is allowed only if e is passive in Ei and the exclusion does not violate EF 1 − EF 4. For the second method, i.e., event inclusion, if ∃e′ ∈ (t1 ∪ t2)\(t1 ∩ t2), then without loss 1 ∈ Q, t1, t2 ∈ (E\Ei)∗, e ∈ Ei, 1. In this case, inclusion of e′ in Ei leads to pi(t1e) = 6= [q2]i, i.e., in Pi(AS), t1 and t2 will no of generality, assume that e′ ∈ t1\t2 such that ∃q, q1, q2, q′ δ(q, t1) = q1 6= δ(q, t2) = q2, δ(q′ e′e, while pi(t2e) = e, and therefore, [q1]i = [q′′ 1 ]i 1, e′) = q′′ 1, q′′ longer cause a nondeterminism on e from q, and accordingly, (q, t1, t2, e, Ei) will not remain a DC4-violating tuple. If however ∄e′ ∈ (t1 ∪t2)\(t1 ∩t2), i.e., ∀e′ ∈ (t1 ∪t2), e′ ∈ (t1 ∩t2), then inclusion of any such e′ generates a DC4-violating tuple (q, t1, t2, e′, Ei). In this case, Lemma 6 suggests to take two different events that appear before e, one from t1 and the other from t2, and include them into 2 ∈ Q, e1 ∈ t1, e2 ∈ t2, e1 6= e2, δ(q, t1) = q1 6= δ(q, t2) = q2, Ei such that ∃q, q1, q2, q′ 2, q′′ 1, q′ 2. Thus, including e1 and e2 in Ei results in pi(t1) = e1, pi(t2) = e2, 2, e2) = q′′ δ(q′ 6= δi([q]i, t2) = [q2]i, meaning that (q, t1, t2, e, Ei) is not a DC4-violating 1, e1) = q′′ 1 , q′′ 1, δ(q′ δi([q]i, t1)! = [q1]i tuple anymore. D. Proof for Lemma 7 The algorithm starts with excluding events from local event sets in which the events are passive and their exclusion do not violate EF 1-EF 4. From this stage onwards the decomposability conditions are no longer allowed to be enforced by link deletion, whereas the algorithm removes the violations of decomposability conditions by establishing new communication links. Next, the algorithm applies violating tuples in the order of corresponding number of violating tuples. If no new violations of decomposability conditions emerge during conducting of enforcing tuples, then the algorithm decomposes the task automaton with minimum number of communication links, similar to the proof of Lemma 4, since iterations partition the set of violating tuples, and applying of enforcing tuples (based on Lemmas 4, 5 and 6) with maximum number of violating tuples in each iteration gives maximum number of resolutions per link addition that leads to the minimum number of added communication links. The algorithm will terminate due to finite number of states and events and at the worst case all events are shared among all agents to make the automaton decomposable. E. Proof for Lemma 8 Denoting the expression , "∀Ei, Ej ∈ {E1, . . . , En}, i 6= j, a ∈ Ei ∩ Ej, s = t1at′ 2, 1, s′ = t2at′ pEi∩Ej (t1) = pEi∩Ej (t2) = ε" as A, and the expression "δ(q0, pi (si))! for any ∀{s1, · · · , sn} ⊆ L(AS), s, s′ ∈ {s1, · · · , sn}" as B, the condition DC3 can be written as A ⇒ B. Now, if ∀s1, s2 ∈ E∗, s1 ≮ s2, s2 ≮ s1, q, q1, q2 ∈ Q, δ(q, s1) = q1 6= δ(q, s2) = q2, [∄e1, e2 ∈ E, e1e2 6 s1, e2e1 6 s2, ∀t ∈ E∗, δ(q, e1e2t)! ⇔ δ(q, e2e1t)!], ∃e ∈ s1∩s2, any e′ ∈ {e1 6 t1, e2 6 t2}, such n i=1 that e′ appears before e, is included in Ei, ∀i ∈ loc(e), it follows that ∀Ei, Ej ∈ {E1, . . . , En}, i 6= j, a ∈ Ei ∩ Ej, s = t1at′ 2, δ(q0, s)! 6= δ(q0, s′)!, a ∈ s ∩ s′, then the first event of t1 and t2 belong to Ei ∩ Ej, i.e., A (the antecedent of DC3) becomes false, and hence, A ⇒ B ( DC3 ) holds true. Therefore, the procedure in Lemma 8 gives a sufficient conditions to make 1, s′ = t2at′ DC3 always true. i , δ(x, e) = x1 6= δ(x, e) = x2" and "∀t ∈ E∗ It is similarly a sufficient condition for DC4 as follows. Let the expressions "∀i ∈ {1, . . . , n}, x, x1, x2 ∈ Qi, e ∈ Ei, t ∈ E∗ i : δ(x1, t)! ⇔ δ(x2, t)!" to be denoted as C and D, respectively. In this case, DC4 can be expressed as C ⇒ D. Then, for a deterministic automaton AS, if ∀s1, s2 ∈ E∗, s1 ≮ s2, s2 ≮ s1, q, q1, q2 ∈ Q, δ(q, s1) = q1 6= δ(q, s2) = q2, [∄e1, e2 ∈ E, e1e2 6 s1, e2e1 6 s2, ∀t ∈ E∗, δ(q, e1e2t)! ⇔ δ(q, e2e1t)!], ∃e ∈ s1 ∩ s2, the first event of s1 and s2 are included in all local event sets that contain e, it results in ¬C(i.e., the antecedent of DC4 becomes false, and consequently, DC4 becomes always true), since in such case ∀Ei ∈ {E1, . . . , En}, t1, t2 ∈ E∗, q, q1, q2 ∈ Q, e ∈ Ei, δ(q, t1e) = q1 6= δ(q, t2e) = q2, then ¬[pi(t1) = pi(t2) = ε]. Expression "[∄e1, e2 ∈ E, e1e2 6 s1, e2e1 6 s2, ∀t ∈ E∗, δ(q, e1e2t)! ⇔ δ(q, e2e1t)!]", in Lemma 8 is to exclude those pairs of strings s1 and s2 that start with e1e2 and e2e1, respectively, as they have been already checked with DC1 and DC2 and their interleaving does not impose illegal strings. REFERENCES [1] V. R. Lesser, "Cooperative multiagent systems: A personal view of the state of the art," IEEE Transactions on Knowledge and Data Engineering, vol. 11, pp. 133 -- 142, 1999. [2] P. U. Lima and L. M. Custdio, Multi-Robot Systems, Book Series Studies in Computational Intelligence, Book Innovations in Robot, Mobility and Control. Berlin: Springer Berlin / Heidelberg, 2005, vol. 8. [3] J. Choi, S. Oh, and R. Horowitz, "Distributed learning and cooperative control for multi-agent systems," Automatica, vol. 45, no. 12, pp. 2802 -- 2814, 2009. [4] E. Semsar-Kazerooni and K. Khorasani, "Multi-agent team cooperation: A game theory approach," Automatica, vol. 45, no. 10, pp. 2205 -- 2213, 2009. [5] G. E. Fainekos, A. Girard, H. Kress-Gazit, and G. J. Pappas, "Temporal logic motion planning for dynamic robots," Automatica, vol. 45, no. 2, pp. 343 -- 352, 2009. [6] Z. Ji, Z. Wang, H. Lin, and Z. Wang, "Brief paper: Interconnection topologies for multi-agent coordination under leader- follower framework," Automatica, vol. 45, no. 12, pp. 2857 -- 2863, 2009. [7] P. Tabuada and G. Pappas, "Linear time logic control of discrete-time linear systems," Automatic Control, IEEE Transactions on, vol. 51, no. 12, pp. 1862 -- 1877, Dec. 2006. [8] C. Belta, A. Bicchi, M. Egerstedt, E. Frazzoli, E. Klavins, and G. Pappas, "Symbolic planning and control of robot motion [grand challenges of robotics]," Robotics and Automation Magazine, IEEE, vol. 14, no. 1, pp. 61 -- 70, March 2007. [9] M. Kloetzer and C. Belta, "Automatic deployment of distributed teams of robots from temporal logic motion specifications," Robotics, IEEE Transactions on, vol. 26, no. 1, pp. 48 -- 61, feb. 2010. [10] M. G. Hinchey, J. L. Rash, W. Truszkowski, C. Rouff, and R. Sterritt, "Autonomous and autonomic swarms," in Software Engineering Research and Practice, 2005, pp. 36 -- 44. [11] W. Truszkowski, M. Hinchey, J. Rash, and C. Rouff, "Autonomous and autonomic systems: a paradigm for future space exploration missions," Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 36, no. 3, pp. 279 -- 291, May 2006. [12] M. Kloetzer and C. Belta, "Temporal logic planning and control of robotic swarms by hierarchical abstractions," Robotics, IEEE Transactions on, vol. 23, no. 2, pp. 320 -- 330, April 2007. [13] V. Crespi, A. Galstyan, and K. Lerman, "Top-down vs bottom-up methodologies in multi-agent system design," Auton. Robots, vol. 24, no. 3, pp. 303 -- 313, 2008. [14] Y. Willner and M. Heymann, "Supervisory control of concurrent discrete-event systems," International Journal of Control, vol. 54, pp. 1143 -- 1169, 1991. [15] K. Cai and W. Wonham, "Supervisor localization: a top-down approach to distributed control of discrete-event systems," Automatic Control, IEEE Transactions on, vol. 55, no. 3, pp. 605 -- 618, 2010. [16] X. Koutsoukos, P. Antsaklis, J. Stiver, and M. Lemmon, "Supervisory control of hybrid systems," Proceedings of the IEEE, vol. 88, no. 7, pp. 1026 -- 1049, Jul 2000. [17] C. G. Cassandras and S. Lafortune, Introduction to discrete event systems. USA: Springer, 2008. [18] R. Kumar and V. K. Garg, Modeling and Control of Logical Discrete Event Systems. Norwell, MA, USA: Kluwer Academic Publishers, 1999. [19] M. Karimadini and H. Lin, "Guaranteed global performance through local coordinations," Automatica, vol. 47, no. 5, pp. 890 -- 898, 2011. [20] -- -- , "Necessary and sufficient conditions for task automaton decomposition," submitted for publication, online available at: http://arxiv.org/abs/1101.2002, 2011. [21] -- -- , "Fault-tolerant cooperative tasking for multi-agent systems," submitted for publication, online available at: http://arxiv.org/abs/1101.2003v2, 2011. [22] A. P. Moore, "The specification and verified decomposition of system requirements using csp," IEEE Transactions on Software Engineering, vol. 16, pp. 932 -- 948, 1990. [23] K. Go and N. Shiratori, "A decomposition of a formal specification: An improved constraint-oriented method," IEEE Trans. Softw. Eng., vol. 25, no. 2, pp. 258 -- 273, 1999. [24] A. Arora and S. Kulkarni, "Component based design of multitolerant systems," Software Engineering, IEEE Transactions on, vol. 24, no. 1, pp. 63 -- 78, Jan. 1998. [25] M. Hultstrom, "Structural decomposition," in PSTV, 1994, pp. 201 -- 216. [26] T. Cao and A. Sanderson, "Task decomposition and analysis of robotic assembly task plans using petri nets," Industrial Electronics, IEEE Transactions on, vol. 41, no. 6, pp. 620 -- 630, dec 1994. [27] D. A. Zaitsev, "Decomposition of petri nets," Cybernetics and Sys. Anal., vol. 40, no. 5, pp. 739 -- 746, 2004. [28] R. Morin, "Decompositions of asynchronous systems," in CONCUR '98: Proceedings of the 9th International Conference on Concurrency Theory. London, UK: Springer-Verlag, 1998, pp. 549 -- 564. [29] M. Mukund, From global specifications to distributed implementations, in B. Caillaud, P. Darondeau, L. Lavagno (Eds.), Synthesis and Control of Discrete Event Systems, Kluwer. Berlin: Springer Berlin / Heidelberg, 2002. [30] S. Kiyamura, Y. Takata, and H. Seki, "Process decomposition via synchronization events and its application to counter- process decomposition," in PPAM, 2003, pp. 298 -- 305. [31] C. Zhou, R. Kumar, and S. Jiang, "Control of nondeterministic discrete-event systems for bisimulation equivalence," Automatic Control, IEEE Transactions on, vol. 51, no. 5, pp. 754 -- 765, may 2006. [32] R. Alur, T. Henzinger, G. Lafferriere, and G. Pappas, "Discrete abstractions of hybrid systems," Proceedings of the IEEE, vol. 88, no. 7, pp. 971 -- 984, jul 2000. [33] C. Godsil and G. Royle, Algebraic Graph Theory. New York: Springer, 2001.
1109.2129
1
1109
2011-09-09T20:21:45
Extremal Behaviour in Multiagent Contract Negotiation
[ "cs.MA" ]
We examine properties of a model of resource allocation in which several agents exchange resources in order to optimise their individual holdings. The schemes discussed relate to well-known negotiation protocols proposed in earlier work and we consider a number of alternative notions of rationality covering both quantitative measures, e.g. cooperative and individual rationality and more qualitative forms, e.g. Pigou-Dalton transfers. While it is known that imposing particular rationality and structural restrictions may result in some reallocations of the resource set becoming unrealisable, in this paper we address the issue of the number of restricted rational deals that may be required to implement a particular reallocation when it is possible to do so. We construct examples showing that this number may be exponential (in the number of resources m), even when all of the agent utility functions are monotonic. We further show that k agents may achieve in a single deal a reallocation requiring exponentially many rational deals if at most k-1 agents can participate, this same reallocation being unrealisable by any sequences of rational deals in which at most k-2 agents are involved.
cs.MA
cs
 a f Ai(cid:12) ia eige e Reea h 23 2005 41{78 S bied 07/04;  bihed 01/05 Reea h e Exea Behavi  i  iage Ca  egiai a E. D e ed  .iv.a . k Deae f C e S ie e The Uiveiy f ive ive U Aba  We exaie eie f a de f e  e a ai i whi h evea age ex hage e  e i de  iie hei idivid a hdig. The  hee di ed e ae  we kw egiai   ed i eaie wk ad we ide a  be f aeaive i f \aiaiy" veig bh  aiaive ea e e.g. eaive ad idivid a aiaiy ad e  aiaive f e.g. ig Da afe. Whie i i kw ha iig ai a aiaiy ad   a ei i ay e  i e ea ai f he e  e e be ig eaiabe i hi ae we adde he i e f he  be f ei ed aia dea ha ay be e ied  iee a a i a ea ai whe i i ibe  d . We   exae hwig ha hi  be ay be exeia i he  be f e  e   eve whe a f he age iiy f  i ae i . We f he hw ha k age ay a hieve i a ige dea a ea ai e iig exeiay ay aia dea if a  k 1 age a ai iae hi ae ea ai beig eaiabe by ay e e e f aia dea i whi h a  k 2 age ae ivved. 1. d i e hai f egiaig a ai f e  e wihi a g  f age f a i a bdy f wk wihi he  dy f  iage ye. Tyi a aba  de deive f gae heei ee ive i e i  ad ag he i e ha have bee addeed ae aegie ha age e  bai a ai a  be f he e  e avai abe e.g. a  2001; Re hei  Zki 1994; Sadh 1999 ad   by whi h he  e f eig  e a ai f e  e ag he age ivved i ageed e.g. Dig   Geave 2000; D e 2003; D e   B ey 2003;  B ey e a. 2002. The eig we ae  eed wih i e a aed i he fwig de(cid:12)ii. De(cid:12)ii 1 A e  e a ai eig i de(cid:12)ed by a ie hA; R; U i whee A = fA ; A ; : : : ; A g ; R = f ;  ; : : : ;  g 1 2  1 2  ae ee ivey a e f a ea w age ad a  e i f  haeabe e  e. A iiy f  i  i a aig f  be f R  aia va e. Ea h age A 2 A i ha a iaed wih i a ai a iiy f  i   ha U i h ; ; : : : ; i. A i 1 2  a ai  f R  A i a aii h ;  ; : : : ;  i f R. The va e   i a ed 1 2  i i he iiy f he e  e aiged  A . A iiy f  i  i e if wheeve i S (cid:18) T i hd ha S  (cid:20) T  i.e. he va e aiged by  ay e f e  e T  i eve e ha he va e aa he  ay  be S f T . (cid:13)2005 A A e F dai ad ga a fa  bihe. A igh eeved. D e Tw a j ai ai i whi h he aba  view f De(cid:12)ii 1 ha bee exied ae e e e ad diib ed ak eaiai.  he (cid:12) R eee e e i f diie (cid:11)eed f ae ad idivid a age eek  a  ie a  be f hee he \va e" a age aa he  a e i(cid:12) e beig de ibed by ha age iiy f  i.  ak aig he \e  e" e de ibe a e i f  b ak  be efed i de  eaie e ex ak e.g. he \ ex ak" ay be  a gd f a ea waeh e  e e f iie.  hi exae R de ibe he  ai  whi h gd   be dia hed ad a give a ai de(cid:12)e he a e  whi h a age   aage deiveie. The iiy f  i i  h ae de he  a age a iae wih ayig   i aed  b ak. Wihi he vey geea ex f De(cid:12)ii 1 a  be f i e aie eig f he bevai ha i i ikey ha e iiia a  ai wi be ee a aifa y eihe wih ee   he view f a age i he ye  wih ee   dive gba ideai. Th  by ig hage  he iiia aige idivid a age eek  bai a \bee" a ai. Thi  eai aie w iediae  ei: hw  eva ae a give aii ad h  have a bai f fig ived  ia a ai; ad he i e deyig he ai e  f hi ae wha ei i h d be ied  he f ha ed dea ay ake. We ha  be ey eview e f he e widey  died aa he  de(cid:12)ig dii de whi h e a ai ae ee a \bee" ha he. F he  e f hi id i we iy beve ha  h ieia ay be eihe  aiaive   aiaive i a e. A a exae f he fe we have he aa h wheei he \va e" f a a ai  i iy he   f he va e give by he age iiy f  i  he  be f R hey have bee aied wihi   i.e.  : hi i =1 i i   i he  aed iiaia  ia wefae whi h  avid eeii we wi dee by (cid:27)  . A a a ai f age wihi a diy adig ex i  eek a a ai de whi h (cid:27) i axiied. e exae f a  aiaive iei i \evy feee": ifay a a ai   i evy fee if  age aig geae iiy  he e  e e   hed j by ahe age ha i de wih ee   he e  e e   i ha a  ay bee i a aed i.e. f ea h dii  ai hi ; j i   (cid:21)  . i i i j  vey geea e hee ae w aa he ha have bee ideed i eaig he  ei f hw a (cid:12)ie e i f e  e igh be diib ed ag a e f age i de  iie e iei f iee: \ a  e" baed ehd e.g. D e e a. 2003; Edi e a. 2003; Edi  a de 2004b; Sadh 1998 1999 deivig f he wk f Sih 1980; ad \ biaia a i" e.g. ake  Uga 2000a 2000b; Sadh e a. 2001; Sadh 2002; Sadh  S i 2003; Teehz 2000; Yk e a. 2004 ag he. The igi(cid:12) a di(cid:11)ee e bewee hee i i he exe  whi h a eaized ig age deeie he eve a diib i f e  e ag age. e ay view he aegy deyig biaia a i a iveig he  a ia e(cid:11) i a \e  eig" age fwig whi h a give a ai i deeied. Th  a ig age he \a iee" i  ied wih a e f bid { ai hS ;  i j j wheei S i e  be f he avaiabe e  e ad  he i e age A i eaed j j j  ay i de  a  ie S . The be fa ed by he a iee i  de ide whi h bid j 42 Exea Behavi  i  iage Ca  egiai  a e i de  axiie he vea (cid:12)  b je   he ai ha ea h ie a be baied by a  e age. Wha we ha efe  a \ a  e  hee" yi ay e hew he e  ai age ad  bdiai  a ig abie eyed i a i e hai eekig iead  eaie a  iabe a ai by a ageed e e e f dea. The a  e i i  geea iaiai f  eai f  e  e diib ed ag  age i he ee die ed gah wih  vei e ea h f whi h i a iaed wih a dii   a ai.  hi way a ibe dea h ; i i eeeed a a edge die ed f he veex abeed wih   ha abeed . Viewed h  ideifyig a e e e f dea a be ieeed a a ea h  e whi h i i ie idivid a age ay d  i a a   fahi. Ceaized  hee a be e(cid:11)e ive i ex whee he ai ia eae i he ee f a eig he a iee abiai.  evie wihi whi h age ae highy ef ieeed  he exe ha hei ai (cid:13)i  wih he a i  e  i whi h hee i a high degee f \  eaiy" ab  he   e i wkig wad a (cid:12)a a ai he age ivved ay y be eaed   eed \ a i y": ha i a age wi y a e a ed ea ai if ai(cid:12)ed ha  h w d e  i a iediae ivee f i w ee ive.   h ae he  e f vig f he iiia a ai    he eve a ea ai  i by a e e e f  a aia ii (cid:12) dea e.g. a age igh ef e  a e dea whi h ed ed (cid:27) be a e f he ibiiy ha i  (cid:11)e a  eaed  i iiy. A key i e hee i he fwig: if he dea   aw y ve i whi h a ea h age e age A (cid:11)e a ige e  e  j ahe age A he he aia ea ai h ;  i a away be ieeed; if j ii (cid:12) hweve evey ige ve   be \aia" he h ;  i ay  be eaiabe. ii (cid:12) We ay ifay egad he view f  h age a \yi " i he ee ha hey ae wiig  a e a \h e " a dea h ; i de hey igh i  a  f iiy deie he e  f a \g e gai" a ig (cid:27)   > (cid:27)   hd. (cid:12) ii Thee ae a  be f ea why a age ay ad  h view e.g. ide he fwig ie   f ageeig a ea ai. A ea ai f e  e i ageed ve a e e e f age ea h f whi h ivve  i ai bewee w age A ad A . Thi  i ai i j i f A i ig a a  A f he f b y ;  ;   (cid:11)eig    hae i j  f A f a aye f  ;  e ;  ;   (cid:11)eig  afe   A i e  j j f a aye  . The ee f A i iy a e fwig whi h he j dea i ieeed  eje  . Thi f  e i a vey ie egiai   e hweve ide i eai wihi a w age eig i whi h e age A ay wihe  big ab  a a ai  1 (cid:12) ad h  a devie a a { e e e f dea {  eaie hi f a iiia a ai   whie he he age A  de  kw  .  addii a e ha A i he y ii 2 1 (cid:12) age ha ake a ad ha a (cid:12)a a ai i (cid:12)xed eihe whe A i \ai(cid:12)ed" 1  a  a A eje  ay (cid:11)e. 2 Whie A  d be bee (cid:11) if  i eaied i ay be he ae ha he y a 2 (cid:12) A wi a e ae he de whi h i de  e e.g. e age ay be  ei a 2 ab  he ba (cid:12)de f he ad wi a e y dea f whi h hey a e eive a 43 D e iediae bee(cid:12). Thee ae evea ea why a age ay eba e  h ai de wihi he  hea  ied:  e a dea ha bee ieeed A ay e iiy b   2 f he a ae ade by A  ha he  i \eae". We e ha eve if we 1 ei h he bai    ha A a de ibe   A ay i eje  (cid:11)e de whi h 1 (cid:12) 2 i  (cid:11)e a  i e i i wiig  ey  he  be e dea ha w d aeiae i  a  ay beig ed. Ah gh he ii ake by A i he eig j  2 de ibed ay aea d y a i  we w d ai ha i de e(cid:13)e  \ea" behavi  i eai ex.  ide he aea f a aed a ai ad egiai i  iage ye hee ae ay exae f a i by idivid a whee ied g e gai ae i AE ie  egede he a ea e f h e . Cide \ hai ee"  hee  hei e  be aifeai a \yaid eig" eeie:  h have a a a ifeie b ded by he ize f he  ai i whi h hey i ae b  ay beak dw befe hi i ea hed. Fa ed wih a e e  \ed 10  he (cid:12)ve ae a he head f he i ad fwad he ee  e he afe addig y  ae" deie he ibiiy f igi(cid:12) a gai afe a eay  f 50  ige  h badihe i  ee a vey  ei a ad a i : hee ay be e a e  a e ha e wi eve ay e eive  AE ie e ee i e  ad  i i ha he ae de ha bee ai aed.   ay we a ideify w ia i(cid:13) e e ha ead  ex i whi h age efe  ve wad a ea ai via a e e e f \aia" dea. Fiy he age ae ef ieeed b  eaig i a abe evie e.g. i he \ hai ee" eig a age a eiaby edi  he exa  i a whi h he hai wi fai. The e d fa  i ha  aia ei i ay ii he de ii a idivid a age a ake ab  whehe    a e a ed dea. F exae i eig whee a dea ivve e e  e a a ie A ay eje  a a  a e e 2 e  e   i e  i y \ ef " fwig a f he e e e f dea: if hi  be f f he dea i \a" he A  d de ide  a e he ed dea i e i ha 2  AE ie  aia we  deeie ha hee i a ex i whi h  i f va e; if hi  be i \age" hweve he A ay a k  AE ie we   a he ea h 2 a e f f  e ibiiie ha w d aw i  a e  . i e ha i he exee ae A ake i de ii ey  whehe  i f iediae e i.e. A i yi . A 2 2 e wef A ay be abe  ide whehe  i ef h d   k f he dea 2 ake a e: i hi ae A  d i ef e  a e  i e ah gh f e A a 2 2 deeie hi wih a b ded k ahead.  a f he  eai we have de ibed if A wihe  big ab  a a ai  1 (cid:12) he fa ed wih he view aded by A ad he iiai ied by he dea   2 he y \e(cid:11)e ive a" ha A  d ad i  (cid:12)d a e e e f aia dea  1 e  A . 2   ai i hi ai e i  hw ha biig \  a" ei i e.g. y e e  e a a ie i ivved i a  a ea ai wih aiaiy ei i a e  i eig i whi h ay e e e  eaie a ea ai h ; i   ivve exeiay ay i jRj eaae age. We e(cid:12)e hee idea i he ex  b e i. 44 Exea Behavi  i  iage Ca  egiai 1.1 eiiay De(cid:12)ii T begi we (cid:12) faie he  e f dea ad a  ah. De(cid:12)ii 2 e hA; R; U i be a e  e a  ai eig. A dea i a ai h ; i whee  = h ; : : : ;  i ad = h ; : : : ; i ae dii  aii f R. The e(cid:11)e  f ie 1  1  eig he dea h ; i i ha he a  ai f e  e e i(cid:12)ed by  i ea ed wih ha e i(cid:12)ed by . F wig he ai f Edi  a de 2004b f a dea AE = h ; i we e A  idi ae he  be f A ivved i.e. A 2 A if ad y if  6= . k k k AE AE e AE = h ; i be a dea. A a  ah eaiig AE i a e e e f a  ai  = h ;  ; : : : ;  ;  i 1 2  1   i whi h  =  ad  = . The egh f  deed jj i  1 i.e. he  be f 1   dea i . Thee ae w ehd whi h we a e  ed e he  be f dea ha a ige age ay have  ide i eekig  ve f e a ai  ahe heeby avidig he eed  he f exeiay ay aeaive:   a ad aiaiy ai. S  a ai ii he eied dea  he whi h b d he  be f e  e ad/ he  be f age ivved b  ake  ideai f he view ay age ay have a  whehe i a ai ha ived.  a aiaiy ai ei  dea h ; i  he i whi h \ive"   a dig  ai a ieia.  hi ai e we ide w ae f   a ai:  a  de(cid:12)ed ad ideed i Sadh 1998 ad wha we ha efe  a  k  a . De(cid:12)ii 3 e AE = h ; i be a dea ivvig a ea  ai f R ag A. a. AE i a e a   a  if 1. A = fi ; j g. AE 2. Thee i a i e e  e  2  [  f whi h =  [ f g ad =   f g i j i i j j wih  2    =  [ f g ad =   f g wih  2   j j j i i i b. F a va e k (cid:21) 2 he dea AE = h ; i i a  k  a  if 2 (cid:20) jA j (cid:20) k ad AE [ = [  . AE AE i 2A i 2A i i Th   a  ivve he afe f exa y e e  e f a ai a age  ahe e ig i he  be f dea aibe wih ay give a ai beig exa y  1 : ea h f he  e  e a be eaiged f i e we  ay f he he  1 age. Raiaiy ai aie i a  be f di(cid:11)ee way. F exae f he adi f a idivid a age A a give dea h ; i ay have hee di(cid:11)ee   e: i   <   i.e. A va e he a ai a  ei   ;   =   i.e. i i i i i i i i i i i A i idi(cid:11)ee bewee  ad ; ad   >   i.e. A i we (cid:11) afe he i i i i i i i i dea. Whe gba ia  h a iiaia  ia wefae ae  be axiied hee i he  ei f wha i eive hee i f ay age  a e a dea h ; i de whi h i 45 D e i ef wih a e va abe e  e hdig. The adad aa h  hi ae  ei i  id e he i f a ay (cid:11) f  i i.e. i de f A  a e a dea de i whi h i  (cid:11)e a ed i i iiy A e eive e aye  AE ie  eae i f i . f  e  h eai   be ade by he age i he ye wh i vidig i d  wih  ay i ex e f ay gai.  de(cid:12)ig i f ay (cid:11) he ieeai i ha i ay aa i ea h age A ake a aye (cid:25) : if (cid:25) < 0 i i i he A i give (cid:25) i e  f a eig a dea; if (cid:25) > 0 he A ib e (cid:25)  he i i i i i a   be diib ed ag he age whe ay (cid:11) i egaive. Thi i f \eibe afe" i a ed by he  e f idivid a aiaiy ad i fe de(cid:12)ed i e f a aiae ay (cid:11) ve  exiig.  i  diAE  hweve  hw ha  h de(cid:12)ii ae e ivae  he fwig. De(cid:12)ii 4 A dea h ; i i idivid ay aia R if ad y if (cid:27)   > (cid:27)  . We ha ide aeaive bae f aiaiy ai ae: hee ae iaiy f iee wihi  aed ey fee eig  ha eay aye f a  i iiy i  a i. The ea i e f iee i hi ae  e he eie f he a  e gah whe he awed dea   aify bh a   a ad a aiaiy ai. Th  if we ide abiay edi ae   dea h ; i { whee he ae f iee ae  biig a   a ad aiaiy dii { we have De(cid:12)ii 5 F  a edi ae ve dii  ai f a  ai a a  ah 1 2  1   h ;  ; : : : ;  ;  i eaiig h ; i i a  ah if f ea h 1 (cid:20) i <   h ;  i i a  dea ha i i  i 1 i  i 1  ;   hd. We ay ha  i ee if ay dea AE ay be eaied by a  ah. We f he ay ha  i ee wih ee   dea whee i a edi ae ve dii  ai f a  ai if ay dea AE f whi h AE hd ay be eaied by a  ah. The ai iee i eaie  die f hee idea ha bee i aea  h a ideifyig e eay ad/  AE ie dii  dea  be ee wih ee   ai a ieia e.g. Sadh 1998; ad i eabihig \ vege e" ad eiai e ie e.g. Edi e a. 2003 Edi ad a de 2004b ide dea ye   h ha evey axia  ah ed i a ae ia a ai i.e. e i whi h ay 1 ea ai de whi h e age ive i iiy wi ead  ahe age  (cid:11)eig a . Sadh 1998 exaie hw ei i e.g. wih  ;  = > if ad y if h ; i i a  a  ay a(cid:11)e  he exie e f a  ah  eaie dea. f ai a iee f he viewi f he ii  f exig he a  e gah ae ae whee  ;  = > if ad y if he dea h ; i i idivid ay aia. F he ae f  a  he fwig ae kw: Thee 1 a.  a  ae ee. 1. \axia" i he ee ha if h ; : : : ;  i i  h a ah he f evey a ai   ;  1     de  hd. 46 Exea Behavi  i  iage Ca  egiai b. R  a  ae  ee wih ee   R dea.  he ideai f agihi ad exiy i e eeed i D e e a. 2003 e diAE y wih aeig  f ae ea ai a by aia  a  i aeady aae ha i: Thee 2 Eve i he ae  = 2 ad wih e iiy f  i he be f de idig if a R  a  ah exi  eaie he R dea h ; i i {had. Th  de idig if ay aia a i ibe i aeady  aiay had.  hi ai e we deae ha eve if a aiae aia a exi i exee ae hee ay be igi(cid:12) a be: he  be f dea e ied  d be exeia i he  be f e  e  a(cid:11)e ig bh he ie i wi ake f he  hea  ied   de ad he a e ha a age wi have  dedi ae  ig i. Th  i hi f f Thee 1 b Sadh beve ha whe a R  a  ah exi f a give R dea i ay be he ae ha i egh ex eed   i.e. e age ae a e  e  ahe ad he a e he ae e  e a a ae age. The yi a f f he e  ha we deive a be  aied a: F  a   a ai  a    k  a  ad a aiaiy ai e.g.  ;  hd if h ; i i idivid ay aia hee ae e   e a ai eig hA ; R ; U i i whi h hee i a dea h ; i aifyig   a f he fwig. a. h ; i i a dea. b. h ; i a be eaied by a a  ah  whi h evey dea ai(cid:12)e he   a ai  ad he aiaiy ai . . Evey  h a  ah ha egh a ea g  . F exae we hw ha hee ae ia e f whi h he he R  a  ah ha egh exeia i  .  he ex e i we wi be ieeed i we b d  he 2 va e f he fwig f  i: we id e hee i geea e  avid e eay  be e eeii. De(cid:12)ii 6 e hA; R; U i be a e  e a  ai eig. Addiia y e  ad be w edi ae  dea. F a dea AE = h ; i he aia f  i  AE; hA; R; U i;   i he egh f he he  a  ah eaiig h ; i if  h a ah exi ad i de(cid:12)ed if   h ah i ibe. The aia f  i  hA; R; U i; ;  i ax ax   hA; R; U i; ;  = ax  AE; hA; R; U i;  dea AE Fia y he aia f  i (cid:26)  ;  ; ;  i ax ax ax (cid:26)  ;  ; ;  = ax  hA ; R ; U i; ;    U =h ; ;:::; i 1 2  whee ideai i ei ed  he dea AE = h ; i f whi h a eaiig  ah exi. 2. Sadh 1998 give a e b d  he egh f  h ah whi h i a exeia i   b  de  exi iy ae ay we b d he ha ha aeady efeed . 47 D e The hee ea e    ad (cid:26) diig ih di(cid:11)ee ae  egadig he egh  ax ax f a  ah. The f  i  i  eed wih  ah eaiig a ige dea h ; i  i a give e  e a ai eig hA; R; U i: he ey f iee beig he  be f dea i he he i.e. ia egh  ah. We e ha  i a aia f  i  whe va e i de(cid:12)ed i he eve ha h ; i a be eaied by a  ah i he eig hA; R; U i. The f  i  i de(cid:12)ed i e f   agai i he ex f ax  a e i(cid:12) e  e a ai eig. The behavi  f iee f   hweve i  ax iy he egh f  ah eaiig a e i(cid:12) h ; i b  he \w ae" va e f   f dea whi h ae dea. We e he  ai(cid:12) ai ha  i de(cid:12)ed y f dea ax ha ae aabe f beig eaied by  ah ad h  d  ide ae f whi h  aiae a  ah exi. Th  if i h d be he ae ha  dea i he eig hA; R; U i a be eaied by a  ah he he va e  hA; R; U i; ;  i de(cid:12)ed i.e. ax ax ax  i a a aia f  i. We ay iee ay e b d   i he fwig e: if  hA; R; U i; ;  (cid:20)  he ay dea f whi h a  ah exi a be ax eaied by a  ah f egh a   .   ai iee wi ee  (cid:26) whi h i  eed wih he behavi  f  a ax ax a f  i f  ad  ad age ve a   e f iiy f  i h : 2 ! i .   R  aa h  baiig we b d f hi f  i i  ive i.e. f ea h h; i ha i ideed we hw hw he iiy f  i U ay be de(cid:12)ed i a eig wih  e  e  a  yied a we b d  (cid:26)  ;  ; ; .  a  he ea e  ax  ad   he f  i (cid:26) i  de ibed i e f a ige (cid:12)xed e  e a ai ax ax eig.  i hweve i a aia f  i: deedig  h ;  ; ; i i ay be he ae ha i evey  age  e  e a ai eig egade f whi h hi e f iiy f  i i ade hee i  dea h ; i aabe f beig eaied by  ah ad f  h ae he va e f (cid:26)  ;  ; ;  wi be de(cid:12)ed. ax 3  i ed a hi i ha he de(cid:12)ii f (cid:26) aw abiay iiy f  i ax  be eyed i  ig \w ae" ia e. Whie hi i eaabe i e f geea we b d e  a wi be aae f he give  i he iiy f  i a  ay eyed ae highy ai(cid:12) ia ad ikey  fea e i \ea" ai ai eig. We ha ae  adde hi b je i by f he ideig b d  he fwig vaia f (cid:26) : ax ax ax (cid:26)  ;  ; ;  = ax  hA ; R ; U i; ;     U =h ; ;:::; i : ea h i e 1 2  i Th  (cid:26) dea wih e  e a ai eig wihi whi h a f he iiy f  i  ax   aify a i iy ai. The ai e  f hi ai e ae eeed i he ex e i. We ide w geea ae f a  ah:  a  ah de vai  aiaiy dii i 3.  e giig he ibiiy ha (cid:26)  ;  ; ;   d be de(cid:12)ed we ae  aiig ha  h ax behavi  aie wih ay f he iaiai f h; i ideed  be ey: i fa  i wi be ea f he  i ha deig by (cid:26)  ;   he f  i (cid:26)  ;  ; ;  f a (cid:12)xed ; ax ax iaiai f h; i wih he ei ed dea ye ad aiaiy dii exaied he f  i ax (cid:26)  ;   i a a f  i. Whehe i i ibe  f ae \eibe" hi e f h; i wih ; ax whi h (cid:26)  ;   i de(cid:12)ed f e va e f h ;  i ad if  deaig exae f  h i ; iaiy y a  ei f biaia iee whe devee i  ea  he  e f he e ai e. 48 Exea Behavi  i  iage Ca  egiai Se i 2; ad iiay  k  a  ah f abiay va e f k (cid:21) 2 i Se i 3.   e  ae  eed wih he  i f e  e a ai eig hA; R ; U i  f whi h give e aiaiy e iee e.g. ha dea be idivid ay aia hee i e dea h ; i ha ai(cid:12)e he aiaiy dii a be eaied by a aia  a  ah ee ivey  k  a  ah b  wih he  be f dea e ied by  h ah beig exeia i  . We addiiay bai ighy weake b  i exeia we b d f aia  a  ah wihi eig f e iiy f  i i.e. f he ea e (cid:26)   iig hw iia e  ay be deived f  ax  k  a  ah.  he e  e a ai eig  ed f deaig hee eie wih  k  a  ah he  ed dea h ; i i eaiabe wih a ige  k  1 a  b  eaiabe by ay aia  k 1 a  ah. We di  eaed wk i ai a he e e  dy f Edi  a de 2004a ha addee iia i e  he ideed i he ee ai e i Se i 4. C i ad e die i f f he wk ae eeed i he (cid:12)a e i. 2. we B d  ah egh {  a   hi e i we ide he i e f a  ah egh whe he   a ei i e ie idivid a dea  be  a . We (cid:12) give a veview f he  i ehd wih he fwig  be i aayig he ae f ei ed iiy f  i ad  be ey e iiy f  i. 2.1 veview The aegy eyed i vig   e  ivve w a: f a give a f e i ed a  ah we  eed a fw i baiig we b d  (cid:26)  ;  ; ; . ax a. F he a  e gah aiiig  e  e ag  age   a ah  = h ;  ; : : : ;  i eaiig a dea h ;  i. F he   a 1 2   1    0 ai  i(cid:13) e ig  i i he ved ha: a1. The a  ah  i a  ah i.e. f ea h 1 (cid:20) i <   he dea h ;  i 0 i  i 1 ai(cid:12)e he   a ai  .  0 a2. F ay ai f a ai  ad   ig i   if j (cid:21) 2 he he  i  i j  dea h ;  i i  a  dea. i  i j  0 Th  a1 e e ha  i a  iabe a  ah whie a2 wi g aaee ha  i 1 hee i exa y e a ai   ha a be ea hed wihi  f ay give  a ai  i  by ea f a  dea.  i  0 b. De(cid:12)e iiy f  i U = h ; : : : ; i wih he fwig eie  1  b1. The dea h ;  i i a dea. 1   b2. F he aiaiy ai  i(cid:13) e ig  evey dea h ;  i i a 00 i  i 1 00  dea. 49 D e b3. F evey a ai  i he a  ah  ad evey a ai he i  ha  he dea h ; i i  a  dea i.e. i viae eihe he   a i 1 i  ai   he aiaiy ai  . 0 00 Th  a1 ad b2 e e ha h ;  i ha a de(cid:12)ed va e wih ee   he 1   f  i  f he dea h ;  i i.e. a  ah eaiig he dea i ibe.  1   The eie give by a2 ad b3 idi ae ha wihi he  ed e  e a ai eig he ah  i he i e  ah eaiig h ;  i.  fw  1   ha  1 he egh f hi ah give a we b d  he va e f  ad he e ax a we b d  (cid:26)  ;  ; ; . ax Befe i ig i wi be ef  (cid:12)x e aia deai. We e  dee he  dieia hye be. eeed a a die ed gah    ha 2 vei e ea h f whi h i idei(cid:12)ed wih a dii   bi abe. Uig (cid:11) = a a : : : a 1 2   dee a abiay  h abe he edge f ae fed by  f h(cid:11); (cid:12) i : (cid:11) ad (cid:12) di(cid:11)e i exa y e bi iig We ideify  bi abe (cid:11) = a a : : : a wih  be S f R  via  2 S if ad y if 1 2   i (cid:11) (cid:11) a = 1. Siiay ay  be S f R a be de ibed by a biay wd (cid:12) S  f egh   i i.e. (cid:12) S  = b b : : : b wih b = 1 if ad y if  2 S . F a abe (cid:11) we e j(cid:11)j  dee 1 2  i i he  be f bi wih va e 1  ha j(cid:11)j i he ize f he  be S . f (cid:11) ad (cid:12) ae  bi (cid:11) abe he (cid:11)(cid:12) i a 2 bi abe  ha if R ad T ae diji e he (cid:11)(cid:12) de ibe   he i f he  be S f R wih he  be S f T . Fiay if (cid:11) = a a : : : a   1 2  (cid:11) (cid:12) i a  bi abe he (cid:11) dee he abe fed by hagig a 0 va e i (cid:11)  1 ad vi e vea.  hi way if S i he  be f R de ibed by (cid:11) he (cid:11) de ibe he e  (cid:11) R  S . T avid a ex e f  e i we wi whee  abig iy aie e (cid:11) bh  (cid:11)  dee he  bi abe ad he  be f R de ibed by i e.g. we wie (cid:11) (cid:26) (cid:12) ahe  ha S (cid:26) S . (cid:11) (cid:12) F  = 2 he a  e gah id ed by  a  a be viewed a he  dieia hye be : he  bi abe (cid:11) a iaed wih a veex f de ibig   he a ai h(cid:11); (cid:11)i  hA ; A i.  hi way he e f R  a  de(cid:12)e a  bgah 1 2 G f wih ay die ed ah f (cid:12)    (cid:12)   i G edig  a ibe R     a  ah f he a ai h ; R   i  he a ai h ; R  i. 2.2  a  ah { Uei ed Uiiy F  i   (cid:12) e  ai(cid:12)e e i e i he eeai f Sadh 1998 ii 2: i hi a e b d ha i exeia i  i ved  he egh f R  a  ah i.e. i e f   ai Sadh 1998 ii 2 eabihe a e b d  (cid:26)  ;  ; ; . We w ve a iia de we b d. ax Thee 3 e  ;  be he edi ae whi h hd wheeve h ; i i a R  a  ad  ;  ha whi h hd wheeve h ; i i R. F  (cid:21) 7 ax  (cid:26) 2;  ; ;  (cid:21) 2 2 256 (cid:18) (cid:19) 77 50 Exea Behavi  i  iage Ca  egiai f. Cide a ah C = h(cid:11) ; (cid:11) ; : : : ; (cid:11) i i  wih he fwig ey 1 2   4 8 1 (cid:20) i < j (cid:20)  j (cid:21) i  2  (cid:11) ad (cid:11) di(cid:11)e i a ea 2 ii SC i j e.g. if  = 4 he ;; f g; f ;  g; f ;  ;  g; f ;  g; f ;  ;  g; f ;  g; f ;  ;  g 1 1 3 1 2 3 2 3 2 3 4 2 4 1 2 4 i  h a ah a i ed  he e e e h0000; 1000; 1010; 1110; 0110; 0111; 0101; 1101i. Che C  be a ge  h ah wih hi ey ha  d be fed i     eig  = h ;  ; : : : ;  i be he e e e f a ai wih  = h(cid:11) ; (cid:11) i. We  i i 1 2   i  w de(cid:12)e he iiy f  i ad  ha f (cid:13) (cid:18) R  1 2   k if (cid:13) = (cid:11) k (cid:13)   (cid:13)  = 1 2 0 if (cid:13) 62 f(cid:11) ; (cid:11) ; : : : ; (cid:11) g 1 2  Wih hi hi e he a  ah  de ibe he i e R  a  ah eaiig  he R dea h ;  i: ha  i a R  a  ah i iediae i e  1   i 1 i  (cid:27)   = i  1 > i = (cid:27)   Tha i i i e fw f he fa  ha f a 1 (cid:20) i (cid:20)  ad i  2 (cid:20) j (cid:20)   he dea i  j  h ;  i i  a  a  he e hee ae  \h " ibe ad f ea h i  i 1 5  hee i exa y e R  a  ha a fw i i.e.  . F he e edig ag e i fw ha ay we b d  he egh f C    i.e. a e e e aifyig he dii SC i a we b d  (cid:26) 2;  ; ; . Thee ax ah i wee igiay  died by a z 1958 i he ex f dig hey ad  he we b d  hei egh f 77=2562 2 eabihed i Abb  a haki  1991. 2 Exae 1 Uig he ah 4 C = h0000; 1000; 1010; 1110; 0110; 0111; 0101; 1101i = h(cid:11) ; (cid:11) ; (cid:11) ; (cid:11) ; (cid:11) ; (cid:11) ; (cid:11) ; (cid:11) i 1 2 3 4 5 6 7 8 i he e  e a  ai eig hfa ; a g; f ;  ;  ;  g; h ; ii if he iiy f  i 1 2 1 2 3 4 1 2 ae e i(cid:12)ed a i Tabe 1 bew he (cid:27) h(cid:11) ; (cid:11) i = 1 ad (cid:27) h(cid:11) ; (cid:11) i = 8. F hee 1 1 8 8 4 C de ibe he i e R  a  ah eaiig he ea  ai hh(cid:11) ; (cid:11) i; h(cid:11) ; (cid:11) ii 1 1 8 8 Thee ae a  be f aeaive f ai f \aiaiy" whi h a a be ideed. F exae De(cid:12)ii 7 e AE = h ; i be a dea. 4. Thi de(cid:12)e he  aed \ake i he bx" de id ed i a z 1958. 5.    exae wih  = 4 he e e e h0000; 1000; 1001; 1101i ah gh de(cid:12)ig a  a  ah give ie  a dea whi h i  R aey ha edig  h1000; 1001i. 51 D e S R  S S  R  S  (cid:27) S R  S S  R  S  (cid:27) 1 2 1 2 0000 1111 1 0 1 (cid:11) 1000 0111 1 1 2 (cid:11) 1 2 0001 1110 0 0 0 1001 0110 0 0 0 0010 1101 0 0 0 1010 0101 2 1 3 (cid:11) 3 0011 1100 0 0 0 1011 0100 0 0 0 0100 1011 0 0 0 1100 0011 0 0 0 0101 1010 4 3 7 (cid:11) 1101 0010 4 4 8 (cid:11) 7 8 0110 1001 3 2 5 (cid:11) 1110 0001 2 2 4 (cid:11) 5 4 0111 1000 3 3 6 (cid:11) 1111 0000 0 0 0 6 Tabe 1: Uiiy f  i de(cid:12)ii f  = 4 exae. a. AE i eaivey aia if f evey age A    (cid:21)   ad hee i a ea i i i i i e age A  f wh   >  . j j j j j b. AE i e iabe if i   > i  . AE AE i 2A i 2A i i i i . AE i a ig Da dea if A = fi ; j g      =      ad i i j j i i j j AE j    j < j    j whee j : : : j i ab e va e. i i j j i i j j Thee ae a  be f view we a ake  eig he aiaiy dii give i Def iii 7. e haed fea e i ha ike he  e f idivid a aiaiy f whi h e vii  eae age wh  (cid:11)e a  i iiy i eeded i.e. idivid a aiaiy e e a \ey baed" ye he f de(cid:12)ed i De(cid:12)ii 7 aw  e f \aiaiy"  be give i \ey fee" evie. Th  i a eaivey aia dea  age ivved  (cid:11)e a  i iiy ad a ea e i bee (cid:11).  ay be ed ha give he haa eiai f De(cid:12)ii 4 i i iediae ha ay ea ivey aia dea i ef e a idivid ay aia; he vee hweve eay de  hd i geea.  e eig a e iabe dea ay be eihe eaivey  idivid ay aia. e ay iee  h dea a e ehd f ed ig ie aiy bewee he va e age a e  hei a ai: f he ivved i a e iabe dea i i e ed ha he age wh a e ea va e  hei e a ai wi bai a e  e e whi h i va ed e highy.  ay f  e be he ae ha e age  (cid:11)e a  f iiy: he dii f a dea  be e iabe ii hw gea  h a   d be. Fiay he  e f ig Da dea igiae f ad ha bee  died i deh wihi he hey f ex hage e ie. Thi i e f ay aa he ha have bee ed agai i de  de ibe dea whi h ed e ie aiy bewee ebe f a age  iey e.g. Edi  a de 2004b.  e f he de(cid:12)ii give  h dea e a ae he  aed ig Da i ie i e i hey: ha ay afe f i e f a weahy idivid a  a e e h d ed e he diaiy bewee he. We e ha i i ie we  d de(cid:12)e eaed aiaiy  e baed  evea exei f hi i ie ha have bee  ggeed e.g. Aki 1970; Chaea eaf e a. 2002;  1976. Uig he ae  a  ah  ed i Thee 3 we eed y vay he de(cid:12)ii f he iiy f  i eyed i de  bai Cay 1 F ea h f he ae bew 52 Exea Behavi  i  iage Ca  egiai a. AE hd if ad y if AE i a eaivey aia  a . AE hd if ad y if AE i eaivey aia. b. AE hd if ad y if AE i a e iabe  a . AE hd if ad y if AE i e iabe. . AE hd if ad y if AE i a ig Da  a . AE hd if ad y if AE i a ig Da dea. ax  (cid:26) 2;  ; ;  (cid:21) 2 2 256 (cid:18) (cid:19) 77 f. We ey exa y he ae e e e f a ai  de ibed i he f f  Thee 3 b  dify he iiy f  i h ; i f ea h ae. 1 2 a. Che h ; i wih (cid:13)  = 0 f a (cid:13) (cid:18) R ad 1 2 2  (cid:13)  = 1 k if (cid:13) = (cid:11) k 0 if (cid:13) 62 f(cid:11) ; : : : ; (cid:11) g 1  The e ig  a  ah i eaivey aia: he iiy ejyed by A e 2 ai a whie ha ejyed by A i eae by 1 wih ea h dea. Ay deviai 1 f hi a  ah eyig a aeaive  a  wi e  i a  f iiy f A . 1 b. Che h ; i wih (cid:13)  = (cid:13)  ad 1 2 2 1  (cid:13)  = 1 k if (cid:13) = (cid:11) k 0 if (cid:13) 62 f(cid:11) ; : : : ; (cid:11) g 1  The  a  ah i e iabe: bh A ad A i eae hei ee ive iiy 1 2 va e by 1 wih ea h dea. Agai ay  a  deviaig f hi wi e  i bh age ig e iiy. . Che h ; i a 1 2   k if (cid:13) = (cid:11) 2 k if (cid:13) = (cid:11) k k  (cid:13)  = ; (cid:13)  = 1 2  0 if (cid:13) 62 f(cid:11) ; : : : ; (cid:11) g 2 if (cid:13) 62 f(cid:11) ; : : : ; (cid:11) g 1  1  T ee ha he  a  ah i f ig Da dea i  AE e  e ha (cid:11)   (cid:11)  = 2 f ea h 1 (cid:20) i (cid:20)  .  addii j (cid:11)  (cid:11) j = 2 2i 2 1 i 2 i 2 i 1 1 i 1   whi h i i y e ha j (cid:11)  (cid:11) j = 2 2i . Fiay ay  a  h ; i whi h 2 i 1 i  deviae f hi e e e wi  be a ig Da dea i e j    j = 2 > j    j 2 2 1 1 2 2 1 1  whi h viae e f he dii e ied f ig Da dea. 2 The  i f w age eig eaiy exed  age  be. 53 D e Cay 2 F ea h f he hi e f h; i ideed i Thee 3 ad C ay 1 ad a  (cid:21) 2 ax  (cid:26)  ;  ; ;  (cid:21) 2 2 256 (cid:18) (cid:19) 77 f. Fix a ai i whi h A i give (cid:11)  A a aed (cid:11)  ad A aiged ; f ea h 1 1 2 1 j 3 (cid:20) j (cid:20)  . Uig idei a iiy f  i h ; i a i ea h f he evi  ae we 1 2 ey f : ; = 1 S  = 0 wheeve S 6= ; h; i a i Thee 3; S  = 0 f j j j j a S Cay 1a; ; = 2  S  = 0 wheeve S 6= ; Cay 1b; ad (cid:12)ay j j  S  = 2 f a S  Cay 1 . Cideig a eaiai f he dea h ;  i j  1   he y  a  ah adiibe i he ah  de(cid:12)ed i he eaed f. Thi give  he we b d aed. 2 We e a hi i e he e e e f Cay 1 wih ee   Edi  a de 2004b Thee 1 3 whi h ae Fa  1 We e a ha a  ah h ; : : : ;  i i axia if f ea h a  ai  h ; i 1     i  a  dea. a. f h ; : : : ;  i i ay axia ah f eaivey aia dea he  i 1     ae ia. b. f h ; : : : ;  i i ay axia ah f e iabe dea he  axiie he 1     va e (cid:27)   = i   i.e. he  a ed egaiaia  ia wefae. e 1(cid:20)i (cid:20) i i The e e e f eaivey aia dea i Cay 1a eiae i he ae ia a ai  : he a ai f A away ha iiy 0 ad hee i  a ai 2    A whe iiy a ex eed  . Siiay he e e e f e iabe dea i Cay 1b 1 eiae i he a ai   f whi h (cid:27)   =  he axi  ha a be aaied e     f he ia e de(cid:12)ed.  bh ae hweve he ia ae ea hed by e e e f exeiay ay i   dea: h  ah gh Fa  1 g aaee vege e f ai a dea e e e  ia ae i ay be he ae a i aed i Cay 1a{b ha he  e f vege e ake ideabe ie. 2.3  a  ah { e Uiiy F  i We  de   e   eig  a  by eeig a we b d  (cid:26)  i.e.  ax he egh f ah whe he iiy f  i ae e ied  be e.  i ie e  d ae    aiae e iiy f  i ha w d have he deied eie wih ee   he ah ed i Thee 3.  i hweve fa f ea whehe  h a  i i ibe. We d  ae  eve hi  ei hee. Whehe a exa  aai  d be a ihed i iaey a  ei f  ey biaia iee: i e   ai i  deae ha exeia egh a  ah ae eeded wih e iiy f  i we ae  iaiy  eed wih baiig a ia b d. 54 Exea Behavi  i  iage Ca  egiai Thee 4 Wih  ;  ad  ;  be de(cid:12)ed a i Thee 3 ad  (cid:21) 14 ax (cid:26) 2;  ; ;  (cid:21)  8 (cid:16) (cid:17) 77  =2 > > < 128 2 3 if  i eve (cid:16) (cid:17) > > : 77 1=2 128 2 3 if  i dd f. We de ibe he deai y f he ae f  beig eve: he e  whe  i dd i baied by a ie di(cid:12) ai whi h we ha eey vide i  ie. e  = 2 wih  (cid:21) 7. F ay ah  = h(cid:11) ; (cid:11) ; : : : ; (cid:11) i  1 2  i whee (cid:11) de ibe a  be f R by a  bi abe he ah d be   i i  i   2 de(cid:12)ed by d be   = h (cid:11) (cid:11) ; (cid:11) (cid:11) ; : : : ; (cid:11) (cid:11) ; (cid:11) (cid:11) ; : : : ; (cid:11) (cid:11) i  1 1 2 2 i i i 1 i 1   = h(cid:12) ; (cid:12) ; : : : ; (cid:12) ; (cid:12) ; : : : ; (cid:12) i 1 3 2i 1 2i 1 2 1 The ea f  eive idi e f (cid:12) i eaig by 2 wi be e ea  be ey f  e d be   de  de ibe a  a  ah : i i hweve  diAE   6  ieae aiae a ai (cid:12)  i de  ve i   h a ah. Cide 2i he  be (cid:12) wih 1 (cid:20) i <   de(cid:12)ed a fw: 2i  (cid:12) = 2i (cid:11) (cid:11) if (cid:11) (cid:26) (cid:11) i 1 i i i 1 (cid:11) (cid:11) if (cid:11) (cid:27) (cid:11) i i 1 i i 1 f we w ide he ah ex   wihi give by  2 ex   = h(cid:12) ; (cid:12) ; (cid:12) ; : : : ; (cid:12) ; (cid:12) i  1 2 3 2 1 2 1 he hi ai(cid:12)e a. f  ha ey SC f Thee 3 i he ex   ha ey SC i .    2 b. f j i dd he j(cid:12) j =  . j . f j i eve he j(cid:12) j =   1. j F a ad he b d ved i Abb  a haki 1991 we ded e ha ex    a be he  ha wih  deig he a ai h(cid:12) ; (cid:12) i i i i  d. ex   de ibe a  a  ah f    .  1 2 1 e. F ea h ai hi ; j i wih j (cid:21) i  2 he dea h ;  i i  a  a . i  j  f. f  i he a i he f f Thee 3 he he  be f dea i ex   i   a give i he aee f he ee hee. 6.  e f he ai(cid:12) ai de ibed by Sadh 1998 i ai y wa dea S a : ea h dea wa exa y e ie i (cid:12) wih a ie i (cid:12) i de  give (cid:12) . 2i1 2i1 2i1 55 D e We heefe (cid:12)x  a he ah f Thee 3  ha i de  ee he f  we eed    iiy f  i h ; i ha ae e ad wih whi h ex   1 2  de(cid:12)e he i e R  a  ah eaiig he ea ai h ;  i. 1 2 1 The hi e f i eaivey ie. Give S (cid:18) R  2 2 8 > < 0 if jS j (cid:20)  2 S  = 2  1 if jS j =  1 2 > : 2  2 if jS j (cid:21)   hi  i he  be f a ai i  . The behavi  f i eay e.  2 The  i f i ahe e i aed.  ai idea i  ake e f 1 he fa  ha he ize f ea h e (cid:12)  ig i ex   i vey ighy aied: j(cid:12) j i  i i eihe     1 a dig  whehe i i dd  eve. We (cid:12) deae ha ea h e f ize   1 a have a  w i   be f ize    ig wihi ex  :  h  evey S f ize   1 ha exa y 2  1  0  be f ize   ex  . T ee hi   e he ay. e (cid:13)  (cid:12)  (cid:12)  ad (cid:12) be  h ha j(cid:13) j =   1 wih 2i 1 2j 1 2k 1 (cid:12) (cid:26) (cid:13) ; (cid:12) (cid:26) (cid:13) ; (cid:12) (cid:26) (cid:13) 2i 1 2j 1 2k 1 ig ha (cid:12) = (cid:11) (cid:11) ad ha  ha he ey SC i   be he ae ha a 2i 1 i i  ea w f he  bi abe f f(cid:11) ; (cid:11) ; (cid:11) g di(cid:11)e i a ea w ii. Wih   i j k f geeaiy  e hi i  e f (cid:11) ad (cid:11) . A a e  we ded e ha he e (cid:12) i k 2i 1 ad (cid:12) have a   2 eee i  i.e. j(cid:12) \ (cid:12) j (cid:20)  2: (cid:12) = (cid:11) (cid:11) 2k 1 2i 1 2k 1 2i 1 i i ad (cid:12) = (cid:11) (cid:11)  i ay ii a whi h (cid:11) di(cid:11)e f (cid:11)  (cid:11) di(cid:11)e f (cid:11) a 2k 1 k k i k i k exa y he ae ii.  a j(cid:12)  (cid:12) j (cid:21) 2 i.e. hee ae a ea w eee 2i 1 2k 1 f (cid:12) ha d    i (cid:12) ; ad i he ae way j(cid:12)  (cid:12) j (cid:21) 2 i.e. hee ae 2i 1 2k 1 2k 1 2i 1 a ea w eee f (cid:12) ha d    i (cid:12) . The e (cid:13)  hweve ha y 2k 1 2i 1   1 ebe ad  a have bh (cid:12) ad (cid:12) a  be: hi w d e ie 2i 1 2k 1 (cid:12) \ (cid:12) [ (cid:12)  (cid:12) [ (cid:12)  (cid:12) (cid:18) (cid:13) 2i 1 2i 1 2i 1 2k 1 2k 1 2k 1 b  a we have j  ee j (cid:12) \ (cid:12) [ (cid:12)  (cid:12) [ (cid:12)  (cid:12) j (cid:21)   2 2i 1 2k 1 2i 1 2k 1 2k 1 2i 1 e iediae e e e f he ag e j  give i ha f ay e (cid:13) f ize  1 hee ae exa y w i   be f (cid:13)  ig  ex   if ad y if (cid:13) = (cid:12) [ (cid:12) = (cid:12)  2i 1 2i 1 2i f e va e f i wih 1 (cid:20) i <  . We a w haa eie ea h  be f R f ize   1 2 a faig i e f hee aegie. C1. Gd e give by f(cid:13) : (cid:13) = (cid:12) g. 2i C2. Digei iig f f (cid:13) : (cid:12) (cid:26) (cid:13)  (cid:13) 6= (cid:12) ad i <  g 2i 1 2i C3. a eibe e iig f f (cid:13) : (cid:13) i eihe Gd  a Digei g 56 Exea Behavi  i  iage Ca  egiai Gd e ae he de ibig a ai  A wihi he ah de(cid:12)ed by ex  ; 1  Digei ae he a ai ha  d be ea hed ig a  a  f a e f ize   ex   i.e. (cid:12)  b  di(cid:11)e f he e ha a  ay   i ex   i.e.  2i 1  (cid:12) . Fiay a eibe e ae he ha d     ex   ad a be ea hed 2i  via a  a  f ay e  ex  . We e ha we view ay e f ize   1  ha  d be ea hed by a  a  f (cid:12) a beig ia eibe: i i ie i i 2 1 ibe  exed he  a  ah beyd (cid:12)  hweve we he  i ae 2 1 he  i i hi way. We w de(cid:12)e a 1 8 > > > > > > > < > > > > > > > : (cid:13)  = 1 2i 1 if (cid:13) = (cid:12) 2i 1 2i  1 if (cid:13) = (cid:12) 2i 2i if j(cid:13) j =   1 ad (cid:13) i a Digei f (cid:12) 2i 1 0 if j(cid:13) j (cid:20)  1 0 if j(cid:13) j =  ad (cid:13) 62 ex    2 1 if (cid:13) i a eibe  j(cid:13) j (cid:21)   2  eai y  ve f hee hi e f h ; i ha he  a  ah h ; : : : ;  i 1 2 1 2 1 de(cid:12)ed f ex   i he i e R  a  ah eaiig he R dea h ;  i  1 2 1 ad ha i e. 1 T hw ha h ; : : : ;  i i R we eed  deae 1 2 1 8 1 (cid:20) j < 2 1 (cid:12)   (cid:12)  < (cid:12)   (cid:12)  1 j 2 j 1 j 1 2 j 1 We have via he de(cid:12)ii f h ; i 1 2 (cid:12)   (cid:12)  = 2  i   1 1 2i 1 2 2i 1 < (cid:12)   (cid:12)  1 2i 2 2i = 2  i   2 < (cid:12)   (cid:12)  1 2i 1 2 2i 1 = 2  i   3 Th  via De(cid:12)ii 4 i fw ha ex   give ie  a R  a  ah.  T ee ha hi ah i he i e R  a  ah ieeig h ;  i 1 2 1 ide ay ii  = h(cid:12) ; (cid:12) i ad a ai he ha    .  ay be j j j  j 1 j 1 a ed ha he dea h ; i i a  a . f j = 2i 1 he (cid:27)   = 2  i  1 j  2i 1 ad j(cid:12) j =  . e e j j 2 f 1;   1g.  he fe ae   = 0 ad   = 2  2 j 1 1 1 2 2 f whi h (cid:27)   = 2  2 ad h  h ; i i  R.  he ae ae   = 2i 1 1 j  i e i a Digei f (cid:12) ad   = 2  1 givig (cid:27)   = 2  i   1. Agai 1 2i 1 2 2 j  h ; i fai  be R i e fai  give ay i eae i he va e f (cid:27) . We ae ef wih he ae j = 2i  ha (cid:27)   = 2  i   2 ad j(cid:12) j =   1. Si e h ; i i a ed j 2i  j   be a  a  hi give j j 2 f ;   2g. F he (cid:12) ibiiy  d  be a 1 1 e  ex  : (cid:12) ad (cid:12) ae bh  be f (cid:12) ad hee a be a  w  h  2i 1 2i 1 2i  be  ig  ex  .  fw heefe ha   = 0 givig (cid:27)   = 2  2  1 1  ha h ; i i  R.  he e d ibiiy   = 2 1 b    = 0 a 1 1 2 2 j  j j =  2  he dea w d e  i a vea . We ded e ha f ea h  he 2 j  y R  a  ie wih i i he dea h ;  i. j  j 1 57 D e The (cid:12)a age i  ve ha he iiy f  i i ideed a e f  i. 1 S e S ad T ae  be f R wih S (cid:26) T . We eed  hw ha S  (cid:20) T . We 2 1 1 ay a e ha jS j =   ha S   a e e wihi ex   ad ha jT j =   1.  f jS j <   jS j =  b  de     ex   we have S  = 0 ad he e ied  1 ie aiy hd; if jS j (cid:21)   1 he i de f S (cid:26) T  be ibe we w d eed jT j (cid:21)   2 whi h w d give T  = 2 1 ad hi i he axi  va e ha ay 1  be i aiged by . We ae ef wih y jS j =   jT j =   1 ad S  ex    1  ide.  ha aeady bee hw ha hee ae a  w  be f T ha a    ex  . Cide he di(cid:11)ee ibiiie:  a. T = (cid:12)  ha exa y w  be f T   i ex  : (cid:12) ad (cid:12) . Si e 2i  2i 1 2i 1 (cid:12)  = 2i  1 ad hi i a ea axf (cid:12) ; (cid:12) g h d S be eihe f 1 2i 1 2i 1 1 2i 1 (cid:12)  (cid:12) he S  (cid:20) T  a e ied. 2i 1 2i 1 1 1 b. T i a Digei f S = (cid:12)   ha T  = 2i ad S  = 2i 1 ad agai 2i 1 1 1 S  (cid:20) T . 1 1 We ded e ha i e eig   we b d f f (cid:26) f eve va e 1  ax f  . We  de by bevig ha a iia  i a be ed if  = 2  1 i dd: e he ah ex   de ibed abve b  difyig i  ha e e  e   i away   hed by A . y i di(cid:12) ai  he iiy f  i de(cid:12)ii ae eeded. 2 2 Exae 2 F  = 3 we a he  = h000; 001; 101; 111; 110i  ha  = 5. Thi 3 give d be   a 3 h000111; 001110; 101010; 111000; 110001i wih he  a  ah beig de(cid:12)ed f ex   whi h i 3 h000111; 001111; 001110; 101110; 101010; 111010; 111000; 111001; 110001i = h(cid:12) ; (cid:12) ; (cid:12) ; (cid:12) ; (cid:12) ; (cid:12) ; (cid:12) ; (cid:12) ; (cid:12) i 1 2 3 4 5 6 7 8 9 Cideig he 15  be f ize   1 = 4 give Gd = f001111; 101110; 111010; 111001g Digei = f010111; 100111; 101011; 011110; 111100g a eibe = f011011; 011101; 101101; 110110; 110011; 110101g i e ha bh f he e i f110011; 110101g ae a eibe : i i ie we  d i e f (cid:12) = 110001 ig eihe hweve i de  iify he  i he 9 ah i haed a (cid:12) . 9 F wig he  i eeed i Thee 4 give he f wig iiy f  i de(cid:12)ii wih S (cid:18) R = f ;  ;  ;  ;  ;  g. 1 2 3 4 5 6 8 > < 0 if jS j (cid:20) 1 S  = 11 if jS j = 2 2 > : 12 if jS j (cid:21) 3 58 Exea Behavi  i  iage Ca  egiai F we bai 1 8 > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > < 0 if jS j (cid:20) 2 0 if jS j = 3 ad S 62 f000111; 001110; 101010; 111000; 110001g 1 if S = 000111 (cid:12)  1 2 if S = 010111 digei f (cid:12)  1 2 if S = 100111 digei f (cid:12)  1 3 if S = 001111 (cid:12)  2 3 if S = 001110 (cid:12)  3 4 if S = 011110 digei f (cid:12)  3 S  = 5 if S = 101110 (cid:12)  1 4 > > > > 5 5 if S = 101010 (cid:12)  > > > > > > > > > > > > 6 if S = 101011 digei f (cid:12)  5 7 if S = 111010 (cid:12)  6 > 7 if S = 111000 (cid:12)  7 > > > > > > > > > > > > > > > : 8 if S = 111100 digei f (cid:12)  7 9 if S = 111001 (cid:12)  8 9 if S = 110001 (cid:12)  9 9 if jS j (cid:21) 5  S 2 f011011; 011101; 101101; 110110; 110011; 110101g The e iiy f  i h ; i eyed i vig Thee 4 ae de(cid:12)ed  ha 1 2 he ah aiig f ex   i R: i he eve f eihe age  (cid:11)eig a  f iiy he  gai ade by he he i  AE ie  vide a eay aye. A a a  ei ha w aie i whehe he b d baied i Thee 4 a be hw  ay whe he aiaiy dii e de ay eay aye e.g. f ae whee he  e f aiaiy i e f he give i De(cid:12)ii 7.   ex e  hw ha if we e he aiaiy dii  ef e eaivey aia  e iabe dea he he b d f Thee 4 i hd. Thee 5 F ea h f he ae bew ad  (cid:21) 14 a. AE hd if ad y if AE i a eaivey aia  a . AE hd if ad y if AE i eaivey aia. b. AE hd if ad y if AE i a e iabe  a . AE hd if ad y if AE i e iabe. 8 (cid:16) (cid:17) 77  =2 > > < 128 2 3 if  i eve ax (cid:26) 2;  ; ;  (cid:21)  (cid:16) (cid:17) > > : 77 1=2 128 2 3 if  i dd f. We agai i ae he  i y f he ae f  beig eve ig he di(cid:12) ai  dea wih dd va e f   ied a he ed f he f f Thee 4. The ah ex   i ed f bh ae.  59 D e F a we e ie h ; i  be de(cid:12)ed a e f  i wih whi h ex   wi 1 2  be he i e eaivey aia  a  ah  eaie he eaivey aia dea h ;  i whee  = h(cid:12) ; (cid:12) i.  hi ae we e h ; i  be j j 1 2 1 2 1 j  8 > > > > > > > < > > > > > > > : h (cid:13) ; (cid:13) i = 1 2 Si e hi ; i i if (cid:13) = (cid:12) 2i 1 hi  1; i i if (cid:13) = (cid:12) 2i hi ; i 1i if j(cid:13) j =   1 ad (cid:13) i a Digei f (cid:12) 2i 1 h0; 2 1i if j(cid:13) j (cid:20)  1 h0; 2 1i if j(cid:13) j =  ad (cid:13) 62 ex    h2 1; 0i if (cid:13) i a eibe  j(cid:13) j (cid:21)   2 h (cid:12) ; (cid:12) i = hi ; i i 1 2i 1 2 2i 1 h (cid:12) ; (cid:12) i = hi  1; i i 1 2i 2 2i h (cid:12) ; (cid:12) i = hi  1; i  1i 1 2i 1 2 2i 1 i i eaiy he ae ha h ;  i ad a dea  he  a  ah de(cid:12)ed 1 2 1 by ex   ae eaivey aia. F hee if = h(cid:13) ; (cid:13) i i ay a ai he  ha  he he dea h ; i wi fai  be a eaivey aia  a . j 1 j  F  e he ay eig h ; i wih   f geeaiy be a  a  j  wih 62 f ;  g { we a  e   he fe ae i e we have aeady hw j 1 j 1  h a dea i  eaivey aia. f j = 2i 1  ha h (cid:12) ; (cid:12) i = hi ; i i 1 j 2 j he j(cid:13) j 2 f 1;   1g: he fe ae ead  a  i iiy f A ; he ae 1 i e (cid:13) i a Digei f (cid:12)  a  i iiy f A . Siiay if j = 2i  ha 2i 1 2 h (cid:12) ; (cid:12) i = hi  1; i i he j(cid:13) j 2 f ;   2g: f he (cid:12) (cid:13) 62 ex   eadig  a  f 1 j 2 j  iiy f A ; he e d e  i a  f iiy f A .  fw ha he ah de(cid:12)ed by 1 2 ex   i he i e eaivey aia  a  ah ha eaie h ;  i.  1 2 1  eai y  hw ha hee hi e f h ; i de(cid:12)e e iiy f  i. 1 2 Cide ad  e S ad T ae  be f R wih S (cid:26) T . f jS j (cid:20)  1 1 2  S de     ex   he S  = 0. f jT j (cid:21)   2  i a eibe he  1 T  = 2 1 whi h i he axi  va e aaiabe by . S we ay a e ha 1 1 jS j =      ex   i.e. S = (cid:12) ; f e i  ad ha jT j =   1 ad i eihe  2i 1 a Gd e  a Digei . F he de(cid:12)ii f  S  = i : if T 2 f(cid:12) ; (cid:12) g he 1 1 2i 2i 2 T  (cid:21) i = S ; if T i a Digei f (cid:12) he T  = i = S . We ded e 1 1 2i 1 1 1 ha if S (cid:18) T he S  (cid:20) T  i.e. he iiy f  i i e. 1 1 w ide wih S ad T  be f R havig S (cid:26) T . f jT j (cid:21)   1  2 2 R  T de    i ex   he T  = 2 1 i axia va e. f jS j (cid:20)  2 2  2  R  S i a eibe he S  = 0. Th  we ay a e ha T = (cid:12) givig 2 2 2i 1 T  = i ad jS j =  1  ha R  S i eihe a Digei  e f he Gd e 2 2 f(cid:12) ; (cid:12) g. f R  S i a Digei he S  = i 1; if i i he Gd e (cid:12) he 2i 2i 2 2 2 2i 2 S  = i 1 < T ; if i i he Gd e (cid:12) he S  = i = T .  fw ha 2 2 2i 2 2 i e eig he f f a a. 2 60 Exea Behavi  i  iage Ca  egiai F b we e h (cid:13) ; (cid:13) i = 1 2 8 > > > > > > > < > > > > > > > : h2i 1; 2i i if (cid:13) = (cid:12) 2i 1 h2i  1; 2i i if (cid:13) = (cid:12) 2i h2i ; 2i 1i if j(cid:13) j =   1 ad (cid:13) i a Digei f (cid:12) 2i 1 h0; 2 1i if j(cid:13) j (cid:20)  1 h0; 2 1i if j(cid:13) j =  ad (cid:13) 62 ex    h2 1; 0i if (cid:13) i a eibe  j(cid:13) j (cid:21)   2 Thee hi e give ex   a he i e e iabe  a  ah  eaie he e iabe  dea h ;  i i e 1 2 1 if (cid:12) ; (cid:12) g = 2i 1 1 2i 1 2 2i 1 if (cid:12) ; (cid:12) g = 2i 1 2i 2 2i if (cid:12) ; (cid:12) g = 2i  1 1 2i 1 2 2i 1 ea h dea h ;  i i e iabe. f = h(cid:13) ; (cid:13) i i ay a ai he ha  j  j 1 j 1 he he dea h ; i i  a e iabe  a . A e ha h ; i i a  j  j  a  ad ha 62 f ;  g. f j = 2i 1  ha  = h(cid:12) ; (cid:12) i 2i 1 2i 1 j 1 j 1 j  ad if (cid:12) ; (cid:12) g = 2i 1 he j(cid:13) j 2 f 1;   1g.  he (cid:12) f hee 1 2i 1 2 2i 1 if (cid:13) ; (cid:13) g = 0; i he e d if (cid:13) ; (cid:13) g = 2i 1 i e (cid:13)   be a 1 2 1 2 Digei . Thi eave y j = 2i wih  = h(cid:12) ; (cid:12) i ad if (cid:12) ; (cid:12) g = 2i . 2i 2i 1 2i 2 2i j  F hi j(cid:13) j 2 f ;   2g: if j(cid:13) j =  he if (cid:13) ; (cid:13) g (cid:20) 2i 1 wih e aiy whe 1 2 (cid:13) = (cid:12) ; if j(cid:13) j =   2 he if (cid:13) ; (cid:13) g = 0.  a hee eabih ha ex   2i 1 1 2  i he i e e iabe  a  ah eaiig he e iabe dea h ;  i. 1 2 1 Tha he hi e f h ; i de ibe e iiy f  i a be hw by a 1 2 iia ag e  ha f a a. 2 Exae 3 F  = 3 ig he ae  a  ah ex   a he evi  exae 3 i.e. h000111; 001111; 001110; 101110; 101010; 111010; 111000; 111001; 110001i = h(cid:12) ; (cid:12) ; (cid:12) ; (cid:12) ; (cid:12) ; (cid:12) ; (cid:12) ; (cid:12) ; (cid:12) i 1 2 3 4 5 6 7 8 9 F h ; i i a we bai 1 2 8 > > > > > > > > > > > > h0; 9i if jS j (cid:20) 2 h0; 9i if jS j = 3 ad S 62 f000111; 001110; 101010; 111000; 110001g h1; 1i if S = 000111 (cid:12)  1 h1; 0i if S = 010111 digei f (cid:12) > h1; 0i if S = 100111 digei f (cid:12) > > > > > > > > < h2; 1i if S = 001111 (cid:12)  2 h2; 2i if S = 001110 (cid:12)  3 h2; 1i if S = 011110 digei f (cid:12) 1 1 h S ; R  S i = h3; 2i if S = 101110 (cid:12)  1 2 4 > > > > h3; 3i if S = 101010 (cid:12)  5 > h3; 2i if S = 101011 digei f (cid:12) 3 5 > > > > > > > > > > > > h4; 3i if S = 111010 (cid:12)  6 h4; 4i if S = 111000 (cid:12)  7 h4; 3i if S = 111100 digei f (cid:12) 7 > 8 h5; 4i if S = 111001 (cid:12)  > > > : h5; 5i if S = 110001 (cid:12)  9 h9; 0i if jS j (cid:21) 5  S 2 f011011; 011101; 101101; 110110; 110011; 110101g 61 D e Siiay i b 8 > > > > > > h0; 9i if jS j (cid:20) 2 h0; 9i if jS j = 3 ad S 62 f000111; 001110; 101010; 111000; 110001g > 1 h1; 2i if S = 000111 (cid:12)  > > > > > h2; 1i if S = 010111 digei f (cid:12) > h2; 1i if S = 100111 digei f (cid:12) 1 1 > > > > > > > > < h3; 2i if S = 001111 (cid:12)  2 h3; 4i if S = 001110 (cid:12)  3 h4; 3i if S = 011110 digei f (cid:12) 3 h S ; R  S i = h5; 4i if S = 101110 (cid:12)  1 2 4 > > > > h5; 6i if S = 101010 (cid:12)  5 > h6; 5i if S = 101011 digei f (cid:12) h7; 6i if S = 111010 (cid:12)  6 h7; 8i if S = 111000 (cid:12)  7 h8; 7i if S = 111100 digei f (cid:12) 5 7 > > > > > > > > > > > > > 8 h9; 8i if S = 111001 (cid:12)  > > > : h9; 10i if S = 110001 (cid:12)  9 h9; 0i if jS j (cid:21) 5  S 2 f011011; 011101; 101101; 110110; 110011; 110101g Tha we a deae iia exea behavi  f a  ah egh wih aiaiy ai i bh ey baed idivid a aiaiy ad ey fee   eaive aiaiy e iabe eig iee ive f whehe i iy eie ae a ed ha e ieeig aae wih he ex i whi h i iy i e eva.  ai a we a beve ha i  wih he exiy e  aeady ed f D e e a. 2003 { de idig if a a ai i ae ia if a a a i axiie (cid:27)   if a R  a  ah exi { e iig iiy f  i  be e de  e  i a eig whi h i  aiay e a abe. 3.  k  a  ah We w    iia i e wih ee    k  a  e aig ha i e ee  hee (cid:11)e a f f dea ha de  (cid:12) i he ai(cid:12) ai f Sadh 1998. Thi ai(cid:12) ai de(cid:12)e f  f f a  ye:  a  a ideed i he evi  e i; S a  ha ivve exa y 2 age waig ige e  e; C a  i whi h e age afe a ea w f i e  e  ahe; ad  a  i whi h hee  e age ea ae hei e  e hdig ag heeve.   de(cid:12)ii f  k  a  ei w age  ex hage e  e h  ae   a  i Sadh 1998  hee ad he dea eied ae  ei ed    S  ad C a .  e egad hweve  k  a  ae  a geea a  a  i e a ee b d k  i e i(cid:12)ed f he  be f age ivved.   ai e    k  a  ah i he fwig devee f Thee 3. Thee 6 e   ;  be he edi ae whi h hd wheeve h ; i i a R  k  k (cid:16) (cid:17) k a . F a k (cid:21) 3  (cid:21) k ad  (cid:21)  hee i a e  e a  ai eig 2 hA; R; U i ad a R dea AE = h ; i f whi h   AE; hA; R; U i;   = 1 a  k  b2 =k k 1  AE; hA; R; U i;   (cid:21) 2 1 b  k 1   AE; hA; R; U i;   i de(cid:12)ed   k 2 62 Exea Behavi  i  iage Ca  egiai Befe eeig he f we e ab  he f ai f he hee aee ad give a veview f he f   e. We (cid:12) e ha he we b d whee de(cid:12)ed have bee haed i e f he f  i  a ed  (cid:26) ed i he vai  e    a  ah i  ax Se i 2.2.  i f  e he ae ha he b d aied f  AE; hA; R; U i;   k 1  wi a be a we b d  (cid:26)  ;  ;  ;  whe  (cid:21) k ad  ;  hd wheeve k 1 ax he dea h ; i i R. The aee f Thee 6 hweve ai ahe e ha hi aey ha a e i(cid:12) e  e a ai eig hA; R; U i a be de(cid:12)ed f ea h  (cid:21) k ad ea h   gehe wih a R dea h ; i i  h a way ha: h ; i a be a hieved by a ige  k  a  ad a be eaied by a R  k 2 a  ah. Re aig ha  i a aia f  i he ae ey i e ivae  he ai ade i a    f he dea h ; i f he hee aee. F hee hi ae dea ah gh a hievabe by a R  k 1 a  ah a be  eaied y by e whe egh i a give i a b f he hee aee. Regadig he f ief hee ae a  be f aia exiie whi h we have aeed  aeiae by akig e iifyig a i  eig he eai hi bewee  { he ize f he e  e e R { ad k { he  be f age whi h ae eeded  eaie h ; i i a ige R dea.  ai a we ha a e ha  i a (cid:16) (cid:17) k exa   ie f . We beve ha by eyig a iia devi e  ha ed i 2 he f f Thee 4 we a dea wih ae f whi h  de  have hi ey: if (cid:16) (cid:17) (cid:16) (cid:17) k k  =    f iege va e  (cid:21) 1 ad 1 (cid:20)  <  we iy ey exa y he 2 2 ae  i ig   e  e wih he \iig"  e  e f R beig a  aed  A ad eve beig ea aed wihi he  k 1 a  ah. Thi aa h 1 a   f he  dig eai b: : :  i he exe e f he we b d. We ha a a e ha he  be f age i A i exa y k . Wihi he f we e a  ig exae f whi h k = 4 ad  = 18 = 3  6  i ae e i(cid:12) fea e. We (cid:12) give a  ie f i   e. Give hA; R; U i a e  e a ai eig ivvig k age ad  e  e   ai i  de(cid:12)e a R  k 1 a  ah  = h ;  ; : : : ;  i 1 2   ha eaie he R  k  dea h ;  i. We wi e d  idex ai a a ai 1   wihi   ha 1 (cid:20) d (cid:20)  .  de  iify he eeai we ey a eig i whi h he k age ae (cid:16) (cid:17) k A = fA ; A ; : : : ; A g. Re aig ha  =   he e  e e R i fed by 0 1 k 1  2 (cid:16) (cid:17) k he i f aiwie diji e f ize  . Give dii  va e i ad j wih 2 0 (cid:20) i < j (cid:20) k 1 we e R  dee e f hee  be wih f ;  ; : : : ;  g 1 2  i ;j fi ;j g fi ;j g fi ;j g he  e  e ha f R . fi ;j g Thee ae w ai idea deiig he   e f ea h  k 1 a  i . Fiy i he iiia ad  be e a ai he e  e e R i aiied fi ;j g bewee A ad A ad ay ea ai f e  e bewee A ad A ha ake a e i j i j wihi he dea h ;  i wi ivve y e  e i hi e. Th  f evey a d  d 1  ai  ad ea h ai fi ; j g if h 62 fi ; j g he  \ R = ;. F hee f h d  fi ;j g d  63 D e AE = h ;  i h d bh A ad A be ivved i.e. fA ; A g (cid:18) A  he hi ea i j i j d  d 1 AE  ai f R bewee A ad A wi be a  a . Tha i eihe exa y e i j fi ;j g eee f R wi be ved f   be e a ebe f he a ai   i j fi ;j g d  d 1 exa y e eee f R wi be ved f   be e a ebe f he a ai j fi ;j g d  d 1  .  a evey  k 1 a  AE i  i f a i ae  ieeai i (cid:16) (cid:17) k 1 f  a : a ige  a  f ea h f he dii  ai fA ; A g f age i j 2 f he k 1 age i A . AE The e d key idea i  exi e we kw ey f he  dieia hye be ewk: f evey  (cid:21) 2 ai a aiia y e i.e. a ie die ed y e  fed ig y he edge f ad aiig a 2 vei e. w  e   7 v  0 1 i  2 1 0  S = v ; v ; : : : ; v ; : : : ; v ; v i a aiia y e i he hye be ad  w  0 1 i  2 1 0  S = w ; w ; : : : ; w ; : : : ; w ; w he aiia y e i whi h w i baied by eeig ea h bi i v . A we i  i  have de ibed i he veview f Se i 2.1 we a iee he  bi abe v = v v : : : v 1 2  a de ibig a ai a  be f R  i.e. ha  be i whi h    if ad y if fi ;j g fi ;j g fi ;j g k v = 1. Siiay f ay  be f R we ay de(cid:12)e a i e  bi wd. w  e k d  ha  i he a ai hed by A i he a ai  f . The dea AE = h ;  i i i d  d  d 1 wi a(cid:11)e   \ R i he fwig way: if i 62 A  j 62 A he  \ R = i i d  d 1 fi ;j g AE AE fi ;j g d  d 1 d  fi ;j g fi ;j g fi ;j g AE  \ R ad  \ R =  \ R . hewie we have fi ; j g (cid:18) A ad i j j he  eeay hdig  \ R ad  \ R de(cid:12)e  eeay  bi d  d  fi ;j g fi ;j g i j h  h  abe f vei e i : if hee ed  a e hv ; w i i he aiia y e  he i  ad  he  bi abe de(cid:12)ed f  \ R ad  \ R i j i j d 1 d 1 d 1 d 1 fi ;j g fi ;j g d e he  bi abe v ad w  i.e. he vei e ha  eed v ad w i h1 h1 h  h  he aiia y e.  a f ea h j  A iiiay hd eihe he  be f R ha i fi ;j g a  v  ha a  w ad a he  i f he  k 1 ah hd he 0 0  be ha a  v  w . The (cid:12)a deai i ha he gei h gh he   2 1 2 1 aiia y e i d ed ve a eie f  d ea h  d iig k  k 1 dea. We have ed ha ea h  k 1 a  h ;  i ha   i hi ah  a d  d 1 (cid:16) (cid:17) k 1 be ieeed a a e f dii   a . A ia ey f he iiy 2 f  i eyed i ha e  (cid:21) k 1 hee wi be  idivid a y aia    a  ah ha eaie he dea h ;  i i.e. he  a  dea   d  d 1 k 1 (cid:16) (cid:17)   i ae y i de f he gei f     be R. Ah gh 2 d  d 1 he e ied dea  d be eaied by a e e e f  a   e geeay ay  iabe  k 2 a  ah  h eaiai wi  de ibe a R a  ah. 7. Thi a be hw by a eay id ive ag e. F  = 2 he e e e h00; 01; 11; 10; 00i de(cid:12)e a aiia y e i . d ivey a e ha h(cid:11) ; (cid:11) ; : : : ; (cid:11) ; (cid:11) i wih  = 2  i  h a y e i 2 1 2  1  he h0(cid:11) ; 1(cid:11) ; 1(cid:11) ; 1(cid:11) ; : : : ; 1(cid:11) ; 0(cid:11) : : : ; 0(cid:11) ; 0(cid:11) i de(cid:12)e a aiia y e i .  1 1  1 2 2  1 1 64 Exea Behavi  i  iage Ca  egiai The  i f iiy f  i  g aaee  h behavi  vide he i ia e i hwig ha he R dea h ;  i a be eaied wih a R  k 2 1   a  ah: if i ay a ai f whi h h ; i i a  k 2 a  he 1 1 h ; i i  R. We w  eed wih he f f Thee 6. f. f Thee 6 Fix A = fA ; A ; : : : ; A g. R i f aiwie diji 0 1 k 1 2 (cid:16) (cid:17) k e f  e  e fi ;j g fi ;j g fi ;j g fi ;j g R = f ;  ; : : : ;  g 1 2  F k = 4 ad  = 3 hee yied A = fA ; A ; A ; A g ad 0 1 2 3 f0;1g f0;1g f0;1g f0;1g R = f ;  ;  g 1 2 3 f0;2g f0;2g f0;2g f0;2g R = f ;  ;  g 1 2 3 f0;3g f0;3g f0;3g f0;3g R = f ;  ;  g 1 2 3 f1;2g f1;2g f1;2g f1;2g R = f ;  ;  g 1 2 3 f1;3g f1;3g f1;3g f1;3g R = f ;  ;  g 1 2 3 f2;3g f2;3g f2;3g f2;3g R = f ;  ;  g 1 2 3 We e w deig   e i de(cid:12)ig he  k 1 a  ah. a. b. v  0 1 i  2 1 0  S = v ; v ; : : : ; v ; : : : ; v ; v a aiia y e i  whee wih   f geeaiy v = 111 : : : 11.  0 w  0 1 i  2 1 0  S = w ; w ; : : : ; w ; : : : ; w ; w he eeay aiia y e  hi  ha w = 000 : : : 00. 0 Th  f k = 4 ad  = 3 we bai a. S = h111; 110; 010; 011; 001; 000; 100; 101i v  b. S = h000; 001; 101; 100; 110; 111; 011; 010i w  We a w de ibe he  k 1 a  ah.  = h ;  ; : : : ;  i 1 2   iia A ai:  . 1 De(cid:12)e he k  k Bea aix B = [b ℄ wih 0 (cid:20) i ; j (cid:20) k 1 by i ;j 8 > < ? if i = j b = :b if i > j i ;j j ;i > : :b if i < j i ;j 1 65 D e We he have f ea h 1 (cid:20) i (cid:20) k  i 1 k 1 [ [ 1 fj ;i g fi ;j g  = f R : b = >g [ f R : b = >g i i ;j i ;j j =0 j =i 1 Th  i   exae 2 3 ? > ? > 6 7 6 7 ? ? > ? B = 6 7 4 > ? ? > 5 ? > ? ? Yiedig he aig a ai 1 f0;1g f0;3g f0;1g f0;2g f0;3g  = R [ R = h111; 000; 111i (cid:18) R [ R [ R 0 1  = R = h000; 111; 000i (cid:18) R [ R [ R f1;2g f0;1g f1;2g f1;3g 1 1  = R [ R = h111; 000; 111i (cid:18) R [ R [ R f0;2g f2;3g f0;2g f1;2g f2;3g 2 1  = R = h000; 111; 000i (cid:18) R [ R [ R 3 f1;3g f0;3g f1;3g f2;3g The hid   i  idi aig he 3 bi abe haa eiig ea h f he  be f 1 fi ;j g i R f he hee va e ha j a a e. R d: The iiia a ai i haged ve a eie f  d 1 2 z ; ; : : : ; ea h f whi h ivve exa y k dii   k 1 a . We e  idi ae he x ; a ai e ig afe age  i  d x whee 0 (cid:20)  (cid:20) k 1. We e he fwig: a. The iiia a ai  wi be deed by . 1 0;k 1 b. i baied ig a ige  k 1 a  f whe x (cid:21) 1. x ;0 x 1;k 1 x ; x ;1 . i baied ig a ige  k 1 a  f whe 0 <  (cid:20) k 1.   (cid:12)a ie f ai i ha f he be ii f i wih ee   j i a a  ai   deed (cid:31)i ; j ;  . eig be he  bi ig de ibig  \ R i e a ai i fi ;j g   (cid:31)i ; j ;   i he idex f i he aiia y e S whe R (cid:18)    he i v  fi ;j g 1 aiia y e S whe R (cid:18)  . Whe  = f e a ai i he j w  fi ;j g x ; 1 e e e de  i we ey he ai (cid:31)i ; j ; x ;   ig ha e ivaia f   ah wi be (cid:31)i ; j ; x ;   = (cid:31)j ; i ; x ;   a ey ha eaiy hd  e f  = 1 0;k 1 i e (cid:31)i ; j ; 0; k 1 = (cid:31)j ; i ; 0; k 1 = 0. The e e e f a ai i  i b i a fw. Si e i he iediae  e 1;0 f he iiia a ai  i  AE e  de ibe hw i fed f whe 0;k 1 x ; x ;1  > 0 ad f . e be he a ai  be fed f . The x 1;0 x ;k 1 y ; x ; dea AE = h ; i wi be a  k 1 a  i whi h A = A  fA g. F ea h ai  x ; y ; AE fi ; j g (cid:18) A we have (cid:31)i ; j ; x ;   = (cid:31)j ; i ; x ;   i he a ai .  vig  AE x ; y ; exa y e eee f R i ea aed bewee A ad A i  h a way ha i  i j fi ;j g y ; 66 Exea Behavi  i  iage Ca  egiai (cid:31)i ; j ; y ;   = (cid:31)i ; j ; x ;  1 i e A ad A ae a ig eeay aiia y e i j wih ee   R hi e e ha (cid:31)j ; i ; y ;   = (cid:31)j ; i ; x ;    1 heeby aiaiig fi ;j g he ivaia ey. ig ha f ea h dii  ai hi ; j i we eihe have R a aed  A i  i fi ;j g 1 fi ;j g 1  R a aed  A i   he de ii j   ied idi ae ha he a ai j d  x ;  = i eey e i(cid:12)ed a fw. The be ii (cid:31)i ; j ; x ;   ai(cid:12)e 8 > 0 if x = 0 ad  = k 1 > > > > < 1  (cid:31)i ; j ; x 1; k 1 if x (cid:21) 1  = 0 ad  62 fi ; j g (cid:31)i ; j ; x ;   = (cid:31)i ; j ; x 1; k 1 if x (cid:21) 1  = 0 ad  2 fi ; j g > > > > > : 1  (cid:31)i ; j ; x ;  1 if 1 (cid:20)  (cid:20) k 1 ad  62 fi ; j g (cid:31)i ; j ; x ;  1 if 1 (cid:20)  (cid:20) k 1 ad  2 fi ; j g F ea h i  he  be f R ha i hed by A i he a ai i i fi ;j g x ; (cid:31)i ;j ;x ;  fi ;j g 1 v if R (cid:18)  (cid:31)i ;j ;x ;  fi ;j g w if R (cid:18)  j i 1 whee we e a ha  bi abe i he hye be ae idei(cid:12)ed wih  be  fi ;j g f R . The abe bew i ae hi  e f   exae. A A A A 0 1 2 3 i j i j i j i j i j i j i j i j i j i j i j i j A d1 d  h ; i d x  0 1 0 2 0 3 1 0 1 2 1 3 2 0 2 1 2 3 3 0 3 1 3 2 1 0 3 111 000 111 000 111 000 111 000 111 000 111 000 { 2 1 0 111 000 111 000 110 001 111 001 110 000 110 001 fA ; A ; A g 1 2 3 3 1 1 111 001 110 000 110 001 110 001 010 001 110 101 fA ; A ; A g 0 2 3 4 1 2 110 001 010 001 110 101 110 001 010 101 010 101 fA ; A ; A g 0 1 3 5 1 3 010 101 010 101 010 101 010 101 010 101 010 101 fA ; A ; A g 0 1 2 6 2 0 010 101 011 101 011 100 010 100 011 101 011 100 fA ; A ; A g 1 2 3 7 2 1 010 100 001 101 011 100 011 100 001 100 011 110 fA ; A ; A g 0 2 3 8 2 2 011 100 001 100 011 110 011 100 001 110 001 110 fA ; A ; A g 0 1 3 9 2 3 001 110 001 110 001 110 001 110 001 110 001 110 fA ; A ; A g 0 1 2 . . . . . . . . . . . . . . . . . . . . . . . . S be f R hed by A i k = 4  = 3 i fi ;j g x ; 67 D e A A A A 0 1 2 3 i j i j i j i j i j i j i j i j i j i j i j i j A d 1 d  h ; i d x  0 1 0 2 0 3 1 0 1 2 1 3 2 0 2 1 2 3 3 0 3 1 3 2 1 0 3 0 0 0 0 0 0 0 0 0 0 0 0 { 2 1 0 0 0 0 0 1 1 0 1 1 0 1 1 fA ; A ; A g 1 2 3 3 1 1 0 1 1 0 1 1 1 1 2 1 1 2 fA ; A ; A g 0 2 3 4 1 2 1 1 2 1 1 2 1 1 2 2 2 2 fA ; A ; A g 0 1 3 5 1 3 2 2 2 2 2 2 2 2 2 2 2 2 fA ; A ; A g 0 1 2 6 2 0 2 2 2 2 3 3 2 3 3 2 3 3 fA ; A ; A g 1 2 3 7 2 1 2 3 3 2 3 3 3 3 4 3 3 4 fA ; A ; A g 0 2 3 8 2 2 3 3 4 3 3 4 3 3 4 4 4 4 fA ; A ; A g 0 1 3 9 2 3 4 4 4 4 4 4 4 4 4 4 4 4 fA ; A ; A g 0 1 2 . . . . . . . . . . . . . . . . . . . . . . . . C be ii (cid:31)i ; j ; x ;   k = 4  = 3  i eaiy he ae ha hi  e f ayig  eive  d f k dea  d be i ed hweve we wih  d hi y  g a i i  ibe  g f e a ai  i he e e e  ahe  f e  (cid:21) 2 via a  k 1 a . d  d   w if ad ae dii  a ai geeaed by he  e abve he he x ; y ; dea AE = h ; i i a  k 1 a  if ad y if f e A  = .  i i i x ; y ; x ; y ; fw ha if h ;  i i a  k 1 a  f e  > 1 he f e i ad d  d   a j 6= i   \ R =  \ R . i i d   d  fi ;j g fi ;j g T deeie he ii  va e f  > 1 wih whi h  =   we beve ha i i d   d  wih   f geeaiy we eed ide y he ae d = i = 0 i.e. we deeie he ii   be f dea befe  eaea. Fi e ha i ea h  d  if 0 1 x (cid:31)0; j ; x 1; k 1 =  he (cid:31)0; j ; x ; k 1 =   k 2 i.e. ea h  d adva e he be ii k 2 a e: (cid:31)0; j ; x 1; k 1 = (cid:31)0; j ; x ; 0 ad (cid:31)0; j ; x ; j  = (cid:31)0; j ; x ; j 1. We a a beve ha  = 6= f ay  wih 0 <  < k 1 i e 0 0 0 1 0;k 1 x ; (cid:31)0; 1; x ;   = (cid:31)0; 2; x ;   = : : : = (cid:31)0; k 1; x ;   y i he ae  = 0 ad  = k 1.  fw ha   va e  > 1   be f he f k whee    be  h ha  k 2 i a exa   ie f 2 . F hi bevai we  ee ha if  > 1 :  =  g = if k :  k 2 i a  ie f 2 g 0 0 1 1   w if k i dd he  = 2 i he iia  h va e  ha  = k 2 . f k i eve he   i ay be i ey wie i he f z 2  2 whee z i dd  givig  a 1 if (cid:21)       1 2 if (cid:20)    ha hee give  = k ad  = z 2  2  e.g. f k = 4 ad  = 3 we ge k = 1  2  2  ha  = 2  2 = 16 ad i   exae  =  ay be 0 0 1 3 311 1 17 eaiy vei(cid:12)ed.  a 8 > <  k 2 if k i dd  (cid:21) k if k = z 2  2 z i dd ad (cid:21)  > :  2 if k = z 2  2 z i dd ad (cid:20)  68 Exea Behavi  i  iage Ca  egiai A f whi h iediaey give  (cid:21) 2 i he e d ae k (cid:21) 2   he ie aiy hd   iviay ad h  we a i e he hai f  k 1 a  f a ea 2 ve.  Re aig ha  =   hi give he egh f he  k 1 a  ah 2 (cid:16) (cid:17) k wie i e f  ad k a a ea 8  = h ;  ; : : : ;  i 1 2   (cid:16) (cid:17)  = k 2 2 k k 1 2 1 = 2 1  eai  de(cid:12)e aiae iiy f  i U = h ; : : : ; i i de  e e ha 0 k 1  i he i e R  k 1 a  ah eaiig he R  k  dea h ;  i.  1   de(cid:12)ig U i wi be veie  dee  a he ah  = h ; ; ; : : : ; ; : : : ; ; : : : ; i 0;k 1 1;0 1;1 1;k 1 x ;  ;k 1 ad i e k (cid:21) 2  we ay wih   f geeaiy f   he (cid:12) 2 a ai i   hi a  ah. Re aig ha (cid:31)i ; j ; x ;   i he idex f he  bi abe edig  \ R i x ; fi ;j g i he eeva aiia y e { i.e. S if R (cid:18)  S if R (cid:18) { we i j v  fi ;j g w  fi ;j g 0;k 0;k 1 e he fwig eie f he e e e f a ai de(cid:12)ed by  ha hd f ea h dii  i ad j . 1. 8 x ;  (cid:31)i ; j ; x ;   = (cid:31)j ; i ; x ;   2. f i he iediae  e f i  he (cid:31)i ; j ; y ;   (cid:20) (cid:31)i ; j ; x ;    1 y ; x ; wih e aiy if ad y if  62 fi ; j g. 3. 8 i ; j wih 0 (cid:20) i ; j (cid:20) k 1 (cid:31)i ; j ; x ; k 1 = (cid:31)i ; j ; x ; k 1. 0 0 0 0 0 0 The (cid:12) w eie have aeady bee eabihed i   de ii f . The hid fw f he bevai ha wihi ea h  d  ea h be ii i adva ed by x exa y k 2 i geig f  . x 1;0 x ;k 1 The iiy f  i i w give f S (cid:18) R  by i    x ; j 6=i i (cid:31)i ; j ; x ;   if S = f e 0 (cid:20) x (cid:20)   0 (cid:20)  (cid:20) k 1 S  = i k 2 hewie We ai ha wih hee hi e  = h ; ; ; : : : ; ; : : : ; ; : : : ; i 0;k 1 1;0 1;1 1;k 1 x ;  ;k 1 i he i e R  k 1 a  ah eaiig he R  k  dea h ; i. Ce 0;k 1  ;k 1 aiy  i a R  k 1 a  ah: ea h dea AE = h ; i  hi ah ha x ; y ; AE AE y ; jA j = k 1 ad i e f ea h age A i A = A  fA g he iiy f ha i eaed i  i 8. We i he  dig eai b: : : i he exe whi h i igi(cid:12) a y if  i  a exa  (cid:16) (cid:17) k  ie f  i whi h eve he devi e de ibed i   veview f he f i aied. 2 69 D e by exa y k 2 i.e. ea h be ii f i wih ee   j wheeve  62 fi ; j g ha i eaed i fw ha (cid:27)   > (cid:27)   ad he e h ; i i R. y ; x ; x ; y ; We w hw ha  i he i e R  k 1 a  ah i ai f 0;k 1 S e AE = h ;  i i a dea ha deviae f he a  ah  havig fwed x ; i h gh  he a ai . Ceaiy bh f he fwig   hd f  : f x ; ea h i   (cid:18) [ R ; ad hee i a k  e f ai hx ;  ; : : : ; x ;  i wih i j 6=i 0 0 k 1 k 1 fi ;j g whi h  =  f if eihe fai  be he ae f e i  he   = 2 wih he i i i i x ; i i k e e e(cid:11)e  ha (cid:27)   < 0 ad he e  R. w if i he a ai ha y ; w d  eed i  he  6=  ad h  f a ea e age 6= . i i x ; y ; i i x ; y ;  a be he ae ha ed  a a ai  ig i y ae ha x ; i i y ; i i  i e  h a ai  d  be eaied by a  k 1 a .  addii i x ; i i AE i e  = i   be he ae ha jA j = k 1 i e exa y k 1 be ii i i i he hdig f A   hage.  fw ha hee ae y w ibiiie f y ;  : i i i  eve  he a ai iediaey e edig  adva e  he hdig . i i i x ; y ;  w  AE e  beve ha a dea i whi h e age aify he (cid:12) f hee whie he eaide  eed i a da e wih he e d eihe de  give ie  a vaid a ai  a be eaied by a  k 1 a .  he he had if  ed  he a ai e edig he AE i  R. We ded e heefe ha he y R x ;  k 1 dea ha i ie wih i ha e ibed by . x ; y ; Thi ee he aayi eeded f he f f a b f he hee.  i ea ha i e he ye ai y k age ay dea h ; i a be e(cid:11)e ed wih a ige  k  a  heeby eabihig a a. F a   { ha he R dea 1   h ;  i a be eaied ig a idivid a y aia  k 2 a  ah i  AE e  beve ha i e he a f R  k 2 a  ae a  be f he a f R  k 1 a  wee i he ae ha a R  k 2 a  ah exied  iee h ;  i hi w d iy ha  wa  he i e R  k 1 a  1   ah. We have hweve ved ha  i i e ad a   f he hee fw. 2 We bai a iia devee f Cay 1 i (cid:16) (cid:17) k Cay 3 F a k (cid:21) 3  (cid:21) k   (cid:21) ad ea h f he ae bew 2 a.  AE hd if ad y if AE i a eaivey aia  k  a . k AE hd if ad y if AE i eaivey aia. b.  AE hd if ad y if AE i AE i a e iabe  k  a . k AE hd if ad y if AE i i e iabe. hee i a e  e a  ai eig hA; R; U i ad a dea AE = h ; i f whi h   AE; hA; R; U i;   = 1 a  k  b2 =k k 1  AE; hA; R; U i;   (cid:21) 2 1 b  k 1   AE; hA; R; U i;   i de(cid:12)ed   k 2 f. A wih he f f Cay 1 i eai  Thee 3 i ea h ae we ey he a  ah f he f f Thee 6 vayig he de(cid:12)ii f U = h ; ; : : : ; i 1 2 k i de  eabih ea h e . Th  e  = h ;  ; : : : ;  ; : : : ;  i  1 2     = h ; ; : : : ; ; : : : ; i 0;k 1 1;0 x ; z ; 70 Exea Behavi  i  iage Ca  egiai be he  k 1 a  ah eaiig he  k  dea h ;  i de ibed i he f 1   f Thee 6 hi ah havig egh  (cid:21) 2 1. b2 =k k 1 a. The iiy f  i U = h ; : : : ; i f Thee 6 e e ha h ;  i i 0 k 1 1   eaivey aia ad ha  i a eaivey aia  k 1 a   ah eaiig h ;  i: he iiy hed by A eve de eae i va e ad hee i i 1   a ea e age i fa  exa y k 1 whe iiy i eae i va e. F hee  i he i e eaivey aia  k 1 a  ah eaiig h ;  i  1   i e by he ae ag e ed i Thee 6 ay deviai wi e  i e age  (cid:11)eig a  f iiy. b. Se he iiy f  i U = h ; : : : ; i a 0 k 1 8 > > > > 1 if S 6= f ay 2  i  x ; x ; > 2 xk  k i if S = > > > < x ;k 1 i x ; x 1k  k   if S =   < k 1 ad i = 0 0 2 S  = i x ; 2 > > > > x 1k  k i    1 if S =   < i 1 ad i 6= 0. i x ;i 1 x ;i > 2 > > > : xk  1 if S = = ad i 6= 0. 2 xk  1   i if S =   > i ad i 6= 0 i i i x ; T ee ha hee hi e adi  a a e iabe  k 1 a  ah eaiig he e iabe dea h ; i we (cid:12) e ha 0;k 1 z ;  i f  g > 1 = i f  g i i i i 0(cid:20)i (cid:20)k 1 0(cid:20)i (cid:20)k 1 z ; 0;k 1 h  h ; i i ideed e iabe. Cide ay dea AE = h ; i  ig 0;k 1 z ; x ; y ; wihi  .   AE e  hw ha  i f  g 6=   i  i  0(cid:20)i (cid:20)k 1 x ; x ; i e A 62 A  ad f a he age   >  . We have w ibiiie:  i i i i AE y ; x ;  = 0 i whi h ae  = k 1 ad y = x  1;  > 0 i whi h ae  =  1. Cide he (cid:12) f hee:   = xk  k  hweve 0 0 x ;k 1 2 if  g = xk  1 =   i i k 1 k 1 x ;k 1 x ;k 1 2 ad he e evey dea h ; i fig a f  i e iabe.  x ;k 1 x 1;0  he eaiig ae   = xk  1 ad   x ; 1 2 if  g (cid:20)   i 0 i 0 x ; 1 x ; 1 = x 1k  k   1 2 < xk k 2k  1 2 2 = xk k 1 2 2 < xk  1 2 =     x ; 1 ad h  he eaiig dea h ; i wihi  ae e iabe. By a iia  x ; 1 x ; ag e  ha eyed i Thee 6 i fw ha  i he i e e iabe   k 1 a  ah eaiig h ; i. 0;k 1 z ; 2 71 D e e Uiiy F  i ad  k  a  ah The devi e ed  deve Thee 3  bai he ah f Thee 4 a be aied  he ahe e ii ae  i f Thee 6 heeby awig exeia we b d  (cid:26)  ;  ;  ;   be deived. We wi eey  ie he aa h ahe ha  k ax ee a deaied e hi a exii. We e a ha i be ae eaivey aighfwad  de(cid:12)e  iabe e iiy f  i  e i wa e ed ha he  be ize f iee { i.e. he f a ai aiig i he  a  ah { wee f ed  fa i a  ie ei ed age. The ai diAE y ha aie i ayig iia ehd  he ah  f Thee 6 i he fwig: i he f f Thee 4 we ide w age  ha veig  f a eig wih  e  e i Thee 3  ex   wih 2   e  e i Thee 4 i a hieved by biig \ eeay" a ai i.e. (cid:11) (cid:18) R  wih (cid:11) (cid:18) T . We a exi w fa  hweve  deve a ah  i  f whi h  e iiy f  i  d be de(cid:12)ed: he e  e e R i Thee 6 i f  (cid:16) (cid:17) k 2 diji e f ize  ; ad ay dea AE  he ah  ivve a ea ai f R fi ;j g bewee A ad A whe fi ; j g (cid:18) A . Th  eig T be fed by diji e i j  2 AE (cid:16) (cid:17) k fi ;j g d  T ea h f ize    e ha  i de ibed by i d  d  d  d  d  (cid:11) (cid:11)    (cid:11) (cid:11)    (cid:11) i ;0 i ;1 i ;i 1 i ;i 1 i ;k 1 d  fi ;j g d  wih (cid:11) he  bi abe edig  he  be f R ha i hed by A i  . i ;j i Cide he e e e f a ai  i  = hC ; C ; : : : ; C i 1 2   i a e  e a ai eig have k age ad 2 e  e { R [ T f whi h C   d  i i haa eied by d  d  d  d  d  (cid:12) (cid:12)    (cid:12) (cid:12)    (cid:12) i ;0 i ;1 i ;i 1 i ;i 1 i ;k 1  hi (cid:12)  idi ae he  be f R [ T de ibed by he 2 bi abe i ;j d  fi ;j g fi ;j g d  d  d  (cid:12) = (cid:11) (cid:11) i ;j i ;j i ;j d  d  fi ;j g fi ;j g i.e. (cid:11) ee  a  be f R whie (cid:11) a  be f T . i ;j i ;j  i iediae f hi  i ha f ea h a ai C i  i  ad ea h d  A  i i away he ae ha jC j = k 1 .  fw heefe ha he y  be i i d  ha ae eeva  he de(cid:12)ii f e iiy f  i wih whi h a aag  e   Thee 6 f he ah  i   d be deived ae he f ize k 1 : if S (cid:18) R [ T ha jS j < k 1  we a (cid:12)x S  a a a e gh egaive va e; iiay   i if jS j > k 1 he S  a be e  a age e gh iive va e. i 9   de ii i he e edig aagah a be  aied i he fwig e   whe f i ied: exedig he  ie give abve  a fa we b d 9.  i wh ig ha he \ieai" age ed i Thee 4 i  eeded i fig  i : he dea hC ; C i i a  k 1 a . We e a ha i gig f  f Thee 3  ex     d  d 1 he ieediae age { d be   { wa  a  a  ah.  72 Exea Behavi  i  iage Ca  egiai f i agey a e hi a exe ie eyig  h f he aayi aeady id ed ad i e hig igif ay ew i e ied f  h a aayi we ha  give a deaied eeai f i. Thee 7 e   ;  be he edi ae whi h hd wheeve h ; i i a R  k  k (cid:16) (cid:17) k a . F a k (cid:21) 3  (cid:21) k ad  (cid:21) 2  hee i a e  e a  ai eig 2 hA; R; U i i whi h evey 2 U i e ad a R dea AE = h ; i f whi h   AE; hA; R; U i;   = 1 a  k  b =k k 1  AE; hA; R; U i;   (cid:21) 2 1 b  k 1   AE; hA; R; U i;   i de(cid:12)ed   k 2 4. Reaed Wk The i ia f  f hi ai e ha ideed a ey f a  ah eaiig ai a ea ai h ; i whe he i e dea ae e ied  f  a   a ei i ad aify a aiaiy ai.  Se i 2 he   a ei i iied dea  he ivvig a ige e  e i.e.  a . F he aiaiy ai f ig dea i y  ive iiaia  ia wefae i.e.  be idivid ay aia R we have he fwig eie. a. Thee ae e  e a ai eig hA; R; U i wihi whi h hee ae R ea ai h ; i ha a be eaied by a e e e f R  a . Sadh 1998 ii 2 b. Evey R ea ai h ; i ha a be eaied by a R  a  ah a be eaied by a R  a  ah f egh a    1 . Sadh 1998  ii 2 . Give hA; R; U i gehe wih a R ea ai h ; i he be f de idig if h ; i a be ieeed by a R  a  ah i {had eve if jAj = 2 ad bh iiy f  i ae e. D e e a. 2003 Thee 11. d. Thee ae e  e a ai eig hA; R; U i wihi whi h hee ae R ea ai h ; i ha a be eaied by a R  a  ah b  wih ay  h ah havig egh exeia i  . Thi hd eve i he ae jAj = 2 ad bh iiy f  i ae e. Thee 3 ad Thee 4 f Se i 2  a e e ai e Edi ad a de 2004a aaye a  ah egh a ideig  a  wih vai  aiaiy ai. Ah gh he aa h i f a ahe di(cid:11)ee ee ive he ea  ei addeed { \w ay aia dea ae e ied  ea h a ia a ai?" Edi  a de 2004a Tabe 1 . 629 { i ey eaed  he i e di ed abve. e igi(cid:12) a di(cid:11)ee e i he aayi f aia  a  f Sadh 1998 eae ad he e  i Se i 2 i ha i Edi  a de 2004a he iiy f  i ae ei ed  ha evey aia ea ai h ; i a be eaied by a aia  a  ah. The w ai ei i exaied  ae e iig iiy f  i  be addiive i.e. f evey S (cid:18) R S  =  ;  2S 73 D e ad e iig he va e e ed  be eihe 0  1  aed 0 1 iiy f  i. Addiive iiy f  i ae ideed i he ae f R  a  Edi  a de 2004a Thee 3 9 wheea 0 1 iiy f  i f eaivey aia  a  Edi  a de 2004a Thee 4 11. Uig (cid:26)  ;  ; ;  ad (cid:26)  ;  ; ;  add 01 ax ax  dee he f  i id ed i De(cid:12)ii 6 whee a iiy f  i ae addiive ee ivey 0 1 f. he de(cid:12)ii f (cid:26)  he wih   ;  hdig if h ; i i a R  1 ax  a ;   ;  hdig if h ; i i a eaivey aia  a  ad  ;  2  e whe h ; i i R we ay f ae Thee 9 ad 11 f Edi  a de 2004a i e f he faewk ed i De(cid:12)ii 6 a ax (cid:26)  ;  ;  ;  =  Edi  a de ; 2004a ; Thee 9 add 1 ax (cid:26)  ;  ;  ;  =  Edi  a de ; 2004a ; Thee 11 01 2 We a f  e e ay  h Thee 3 ad 4 f Se i 2 i e f he \he ah" vei aded i Edi  a de 2004a vided ha he dai f iiy ad ea ai ia e ae ei ed  he f whi h a aiae  a  ah exi. Th  we a bai he fwig devee f Edi  a de 2004a Tabe 1 i he ae f  a . Uiiy F  i Addiive 0 1 Uei ed e Uei ed e Raiaiy R CR R R CR CR She ah   (cid:10)2  (cid:10)2  (cid:10)2  (cid:10)2    =2   =2 Cee Ye Ye     Tabe 2: w ay  a  aia dea ae e ied  ea h a a ai? Exei f Tabe 1 f Edi  a de 2004a . 629 5. C i ad F he Wk   ai i hi ai e ha bee  deve he eaie  die f Sadh 1998  eig he  e ad ii f ai a \a i a" a  f. Whie Sadh 1998 ha eabihed ha iiig  idivid a aiaiy i addii  he   a ei i e ibed by  a  ead   eai whi h ae i ee i he ee ha hee ae idivid ay aia dea ha a be eaied by idivid ay aia  a    f  ha bee wih ee   dea whi h a be eaied by ei ed a  ah wih he iei f deeiig  wha exe he biai f   a ad aia iy dii i eae he  be f dea e ied. We have hw ha ig a  be f a a de(cid:12)ii f aiaiy f eig ivvig  e  e aia  a  ah f egh (cid:10)2  ae eeded wheea wih  he aiaiy ei i  idivid a  dea a    a   AE e  eaie ay dea. We have a ideed a a f dea {  k  a  { ha wee  exaied i Sadh 1998 eabihig f hee ae ha whe ai a aiaiy dii ae ied  k 1 a  ah f egh (cid:10)2  ae eeded  eaie a dea ha a be a hieved by a ige 2 =k 2  k  a . We e ha   aaye have iaiy bee f ed  w ae we b d  ah egh whe aiae ah exi ad a  h hee ae evea  ei f 74 Exea Behavi  i  iage Ca  egiai a i a iee ha ei f he di i.  ay be ed ha he ah   e ad a iaed iiy f  i ae ahe ai(cid:12) ia beig die ed  aaiig a ah f a e i(cid:12) egh eeig a give aiaiy iei. We have ee hweve i Thee 4 ad 5 a  ied i   di i  dig Se i 3 ha he i e f exeia egh a  ah i e  aie eve whe we e ie he iiy f  i  aify a i iy dii. We a ideify w ae f e  ei ha aie f hee e . Fiy f ig  R  a  ah i w d be f iee  ideify \a a" ei i  iiy f  i whi h w d e e ha if a dea h ; i a be ieeed by a R  a  ah he i a be eaied by e whe egh i yiay b ded i   e.g.  h a addiiviy eied i he e edig e i. We a iee Thee 4 a idi aig ha i iy de  g aaee \h" R a  ah. We e hweve ha hee ae e ei i ha  AE e. T e a ahe ivia exae if he  be f dii  va e ha (cid:27) a a e i a   f e  a  he  R  a  ah a have egh ex eedig  :  eive dea    i y i eae (cid:27) ad if hi a ake a   di(cid:11)ee va e he  R a  ah a have egh ex eedig  . A we a beig f a i a iee ae f iiy f  i wih he ey beig ideed w d a be f e iee egadig e exiy i e. The e  ved i D e e a. 2003 eabihig ha de idig if a R  a  ah exi i  had give a we b d  he  aia exiy f hi be. A ee   ivia e b d  hi be exiy ha bee deaed.   e  i Thee 3 ad 4 idi ae ha if hi de ii be i i  h  i exiy w d be { ee ahe ha {had he he e ied yia egh exie e ei(cid:12) ae ay have  be ehig he ha he ah ief. We e ha he f f {hade i D e e a. 2003   10 a ia e i whi h (cid:27) a ake a     dii  va e: h  f   exae f a ei i e ig ha if  h ae ee he R  a  ah ae \h" hi e  f D e e a. 2003 idi ae ha he  ei f de idig hei exie e igh eai  aiay had. Cideig ei i  he f f iiy f  i i e aa h ha  d be ake egadig (cid:12)dig \a abe" ae. A aeaive w d be  gai e iigh i wha he \aveage" ah egh i ikey  be.  aeig  adde hi  ei hweve a  be f haegig i e aie. The  iediae f hee  e f  e he i f deig a diib i  iiy f  i give   de(cid:12)ii f aiaiy i e f he va e age aa h  hei e  e hdig.  i ie a aveage ae aayi f  eai ivvig exa y w age  d be aied   i  ey gah heei e i.e. wih  he i ai f ideig iiy f  i die y.  i  ea hweve whehe  h a gah heei aayi bviaig he eed f ideai f iea iiy f  i a be exeded beyd eig ivvig exa y w age. e diAE y aiig wih hee  e age i ha   iiy 10. The e f \ay" ahe ha \ " i eeded be a e f he vei f eeeig iiy f  i eyed i D e e a. 2003. 75 D e f  i have  a aive exeaiie i.e. give a a ai hX ; Y ; Z i  hee age X  i  haged h d Y [ Z be ediib ed ag A ad A . 1 2 3 11 A e (cid:12)a e f i e ha ay ei f he  dy we aie he fwig.     i he idivid a dea  a a  ah   aify bh a   a dii be a  a   ivve a  k age ad a aiaiy ai. F ig   a  we have he fwig exee: f Sadh 1998 a    a   AE e  eaie ay aia dea; f   e  abve (cid:10)2  aia   a  ae eeded  eaie e aia dea. Thee ae a  be f e hai we a ey  eax he dii ha evey ige dea be a  a  ad be aia. F exae aw a ah  ai e  be f dea whi h ae   a  b    i be R  ii ha a dea ae  a  b  aw e  be iaia. Th  i he ae ae if we g  he exe f awig    iaia  a  he ay aia dea a be eaied eAE iey.  w d be f e iee  exaie i e  h a he e(cid:11)e  f awig a a  be   f iaia dea ad  ei  h a whehe hee ae i ai i whi h  iaia a  yied a `h a  ah b   1 f e e f exeia egh. f ai a iee f a ai ai viewi i he fwig: de(cid:12)e a (cid:13)  ;   ah a a  a  ah aiig a  (cid:13)    a  whi h ae  idivid ay aia. We kw ha if (cid:13)   = 0 he idivid ay aia 0;   ah ae  ee wih ee   idivid ay aia dea; iiay if (cid:13)   =  he  ;   ah ae ee wih ee   idivid ay aia dea. A  ei f e iee w d be  eabih if hee i e (cid:13)   =    f whi h (cid:13)  ;   ah ae ee wih ee   idivid ay aia dea ad wih he axi  egh f  h a a  ah b ded by a yia f  i f  . A kwedgee The a h hak he eviewe f a eaie vei f hi ai e f hei va abe  e ad  ggei whi h have ib ed igi(cid:12) ay  i e ad gaiai. The wk eed i hi ai e wa aied   de he   f ESRC Ga GR/R60836/01. Refee e Abb . .  a haki . 1991.  he  i f ake i he bx de. Uiia aheai a 40 97{116. Aki A. 1970.  he ea ee f ie aiy. . E . They 2 244{263. Chaea eaf A. Ga jd T.  Wihie . . 2002. The i ie f g diiihig afe. . E . They 103 311{333. 11. A vey eiiay iveigai f exiy heei  ei aiig i eig wih a aive exeaiie i eeed i D e 2004 whee hee ae efeed  a \ ex{deede":  h iiy f  i aea  have bee ege ed i he  aia ad agihi aayi f e  e a ai be ah gh he idea i we kw  gae heei de i e i  f whi h he e \a aive exeaiy" igiae. 76 Exea Behavi  i  iage Ca  egiai Dig  F.  Geave . 2000.  e i Age C i ai V. 1916 f CS. Sige Veag. D e . 2003. evai ai i di e  .   . ih eaia Cf.  A.. ad aw CA03 . 12{21 Edib gh. AC e. D e . 2004. Cex deede e i  iage e  e a ai.   . ECA04 . 1000{01 Vae ia. D e .   B ey . 2003. ia ea e i diag e  .   . Se d eaia i Cf.  A   Age ad  iage Sye AA AS03 . 608{615. AC e. D e . Wdidge .  a e e . 2003. The exiy f a  egiai. Te h. e. UCS 03 002 De. f C e S ie e Uiv. f ive.  aea Ai(cid:12) ia e ige e. Edi U.  a de . 2004a.  he  i ai exiy f  iaea ad ig.   . Thid eaia i Cf.  A   Age ad  iage Sye AAAS04 . 622{629. Edi U.  a de . 2004b. Wefae egieeig i  iage ye.  i ii A. ea .  i . Ed.  . F h eaia Wkh  Egieeig S ieie i he Age Wd ESAW 2003 V. 3071 f A . 93{106. Sige Veag. Edi U. a de . Sadi F.  Ti F. 2003.  ia   e f egiai ve e  e.   . Se d eaia i Cf.  A   Age ad  iage Sye AAAS03 . 177{184. AC e. a z W. . 1958. Ui dia e e he kig de. RE Ta.  Ee i C  e 7 179{180.  S. C. 1976. Ue a ie aiie. . E . They 13 82{111. a  S. 2001. Saegi egiai i  iage evie. T e.  B ey . a S.  Wdidge . 2002. Deideaa f ag eai  .   . Fi eaia. i Cf.  A   Age ad  iage Sye AAAS02 . 402{409. AC e. ake D. C.  Uga . . 2000a. eaive biaia a i: hey ad a i e.   . 17h aia Cf.  Ai(cid:12) ia e ige e AAA 00 . 74{81. ake D. C.  Uga . . 2000b. eveig aegi ai ai i ieaive a i: xy age ad i e adj e.   . 17h aia Cf.  Ai(cid:12) ia e ige e AAA 00 . 82{89. Re hei . S.  Zki G. 1994. R e f E  e. T e. Sadh T. W. 1998. Ca  ye f ai(cid:12) ig ak a ai:  heei a e .  AAA Sig Syi : Sai(cid:12) ig de. Sadh T. W. 1999. Diib ed aia de ii akig.  Wei(cid:25) G. Ed.  ia ge Sye . 201{258. T e. 77 D e Sadh T. W. 2002. Agih f ia wie deeiai i biaia a i. Ai(cid:12) ia e ige e 135 1{54. Sadh T. W.  S i S. 2003. Bb: ved wie deeiai i biaia a i ad geeaizai. Ai(cid:12) ia e ige e 145 33{58. Sadh T. W. S i S. Gii A.  evie D. 2001. Cabb: A fa ia agih f biaia a i..   . CA 01 . 1102{1108. Sih R. G. 1980. The a  e  : high eve  i ai ad  i a diib ed be ve. EEE Ta.  C e C 29 12 1104{1113. Teehz . 2000. Se a abe biaia a i.   . 17h aia Cf.  Ai(cid:12) ia e ige e AAA 00. Yk . Sak ai Y.  a baa S. 2004. The e(cid:11)e  f fae ae bid i bi aia a i: ew fa d i iee a i. Gae ad E i Behavi 46 1 174{188. 78
1506.07781
1
1506
2015-06-25T15:17:24
Microsimulations of Arching, Clogging, and Bursty Exit Phenomena in Crowd Dynamics
[ "cs.MA", "physics.soc-ph" ]
We present in this paper the behavior of an artificial agent who is a member of a crowd. The behavior is based on the social comparison theory, as well as the trajectory mapping towards an agent's goal considering the agent's field of vision. The crowd of artificial agents were able to exhibit arching, clogging, and bursty exit rates. We were also able to observe a new phenomenon we called double arching, which happens towards the end of the simulation, and whose onset is exhibited by a "calm" density graph within the exit passage. The density graph is usually bursty at this area. Because of these exhibited phenomena, we can use these agents with high confidence to perform microsimulation studies for modeling the behavior of humans and objects in very realistic ways.
cs.MA
cs
Microsimulations of Arching, Clogging, and Bursty Exit Phenomena in Crowd Dynamics Francisco Enrique Vicente G. Castro and Jaderick P. Pabico Institute of Computer Science University of the Philippines Los Baños College 4031, Laguna {fevgcastro, jppabico}@uplb.edu.ph ABSTRACT We present in this paper the behavior of an artificial agent who is a member of a crowd. The behavior is based on the social comparison theory, as well as the trajectory mapping towards an agent's goal considering the agent's field of vision. The crowd of artificial agents were able to exhibit arching, clogging, and bursty exit rates. We were also able to observe a new phenomenon we called double arching, which happens towards the end of the simulation, and whose onset is exhibited by a "calm" density graph within the exit passage. The density graph is usually bursty at this area. Because of these exhibited phenomena, we can use these agents with high confidence to perform microsimulation studies for modeling the behavior of humans and objects in very realistic ways. INTRODUCTION 1. Arching is a rainbow-like structure that naturally forms at the edge of a pedestrian crowd that jam and clog at exits. Clogging results as an effect of competition for space resource among members of a crowd who are unable to pass each other. Bursty exit rates are a result of jostling for position which prevents each pedestrian smooth passage along the exit width [10]. These phe- nomena are interesting to study and simulate because they are the most commonly observed behavior in crowd dynamics. In designing behavior for an agent in a multi-agent system (MAS), it is very important that the agents be able to exhibit these phenomena while in a crowd. When a crowd of artificial agents exhibits these phenomena, we then say that our microsimula- tion approach is more akin to modeling humans and real-world objects in very realistic ways. Thus, our microsimulation can be used with higher confidence to perform what-if scenarios to aid decision makers and researchers. The growing number of students being admitted to various higher education institutions (HEI) in the country in the last 10 years, coupled with the slow- paced development of infrastructure to support the student population growth, particularly among the state colleges and universities (SUC), has resulted into crowding along building corridors that connect classrooms, lecture halls, and laboratories, despite the wishes of these institutions to provide better services and safer environments. Nowadays, students do not only contend for slots in subjects, which happen only once per semester during registration, but more so with walk spaces along the building corridors, which happen every class day. Students contend with corridor spaces whose nominal widths are effectively reduced because of the presence of other students, tables, chairs, and other pedestrian flow-retarding objects. Because the nominal widths of the corridors have become smaller than their potential widths, the effective travel times of students' egress along these corridors are lengthened, specifically during periodic flash crowd situations, such as during in-between class hours. If the walk-time of students along the building corridors is lengthened, specifically during normal egress conditions, how much more will be added to the evacuation time during chaotic panic situations (i.e., the faster-is-slower phenomenon) such as when there is a fire, or during an earthquake, or during riots or fraternity rumbles, or during critical incidents like chemical or biological spills? One need not wait for a disastrous event to answer this ques- tion because similar events can be simulated using a computer without compromising human lives. In this paper, we present our design of an artificial agent whose behavior resembles that of the humans when walking (or traveling) within a crowd. Our argu- ment here is that if the crowd of our artificial agents can exhibit the phenomena that are usually observed in real-life, then we can use our agents in microsimulation studies of the dynamics of humans under normal egress and panic escape conditions. We present in this paper the behavior of our artificial agent, which is based on two recently developed theories: The social comparison theory [4] and a trajectory mapping towards an agent's goal considering the agent's field of vision. With this behavior, our crowd of artificial agents was able to exhibit the arching, clogging, and bursty exit rates phenomena. The arch exhibited at the edge of the crowd resembles that of a half ellipse, with the major Figure 1: An example output frame of the MVS. The upper Left part contains the input image of student pedestrians with trackers (bounding boxes). The upper Right part contains the trajectory of the pedestrians. The lower part contains the distance vs. time graph of the trajectory. This figure is in color in the electronic copy of this paper printed with permission from Ngoho and Pabico [12] and the Philippine Society of Information Technology Educators (PSITE). axis coincident along with the direction of crowd flow, while the minor axis is parallel to the exit width. We further present the effect of varying exit widths on the respective lengths of the major and minor axes in the arching phenomenon. 2. RECENT ADVANCES IN CROWD DYNAMICS In the past years, we developed a machine vision system (MVS) to automatically capture the dynamics of pedestrian students in a university building under four different traffic scenarios [12]. We considered the overhead view of each student as a digital object, where our MVS processes the image sequences to track the students. By considering the interactive effect of the camera lens perspective and the projected area of the corridor, the distance of each tracked student from its original position to its current position is approx- imated every video frame. The quantified motion of each tracked student are output by our MVS using 2-dimensional graphs of the kinematics of motion as a visualization (see for example Figure 1). Because of the importance of crowd dynamics on several real-world applications, several researchers attempted to quantify the collective dynamics of the pedestrians through developed simulations of motion. Helbing and Molnar [7], borrowing some ideas in gas-kinematic models, introduced the social force model (SFM) to simulate pedestrian flows. In their model, a self-driven particle (i.e., a pedestrian) that interacts through social rules and regulations tries to move in its desired speed and direction while at the same time attempts not to collide with obstacles, other particles, and surrounding barriers. In order to reach its destination faster, pedes- trians take detours even if the route is crowded [9]. The choice, however, is dependent on the recent memory of what the traffic was like the last time they took the route, the figure of which was found by other researchers to be polygonal in nature [5]. In agreement with the social force model, Weidmann [14] observed that, as long as it is not necessary to go faster, such as going down a ramp, a pedestrian prefers to walk with his or her desired speed, which corresponds to the most comfortable walking speed. However, Weidmann [14] further observed that pedestrians keep a certain dis- tance from other pedestrians and borders. The distance between the pedestrians decreases as the density of the crowd increases. The pedestrians themselves cause delays and obstructions. Arns [1] observed that the motion of the crowd is similar to the motion of gases and fluid, while Helbing et al. [9] suggested that it is similar to granular flow as well. Helbing et al. [9], in his extension of the SFM, showed that many aspects of traffic flow can be reflected by self-driven many-particle systems. In this system, he identified the various factors that govern the dynamics of the particles such as the specification of the desired velocities and directions of motion, the geometry of the boundary profiles, the heterogeneity among the parti- cles, and the degree of fluctuations. One such observ- able pattern is the formation of lanes of uniform walking direction, formed because of the self-organization of the pedestrians [6]. Aside from the self-organizing behavior of the crowd, obstacles were also observed to both posi- tively and negatively contribute to the flow of the traffic. During escape panic of large crowds, several behavioral phenomena were observed [8]: build up of pressure, clog- Figure 2: Snapshots of an example what-if scenario simulations on the effect of exit door configurations to student egress in a very large lecture hall (students are shown as black circles with pointers to visualize heading): (a) Current exit door configuration which opens outward but hinders student flow towards the corridor exit; (b) Effect of moving the door hinge such that the exit door opens behind the student flow; and (c) Effect of increasing the effective width of the exit door by 50% and replacing the swinging door by a sliding door and notice the effect on the utilization of the nominal corridor width. This figure is in color in the electronic copy of this paper. The artwork is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. ging effects at bottlenecks, jamming at room widening areas, faster-is-slower effect, inefficient use of alterna- tive exits, initiation of panics by counter flows, and impatience. It was observed that the main contributing behaviors in these situations is a mixture of individual and grouping behavior. 3. METHODOLOGY 3.1 General Behavior In our simulation, each agent was provided with the following general behaviors described originally by Wooldridge and Jennings [15], and later on extended and explained further by Epstein [2], Franklin and Graesser [3], Torrens [13] and Macal and North [11]: 1. Autonomy: We program our agents as autonomous units (i.e. governed without the influence of cen- tralized control). Each agent is capable of pro- cessing information and exchanging this informa- tion with other agents in order to make indepen- dent decisions. They are free to interact with other agents, at least over a limited range of situ- ations, and this does not (necessarily) affect their autonomy. In this respect, we say that our agents are active rather than purely passive (see item number 3 below). 2. Heterogeneity: We believe that the notion of mean-individuals is redundant. Instead we believe that our agent's programming permit the devel- opment of autonomous individuals. When these agents are put into a group, such as in a crowd, the formed group is a heterogenous one composed of different yet similarly-programmed agents. Therefore, groups of agents can exist, but pro- grammatically the groups are spawned from the bottom-up, and can be clearly seen as amalga- mations of similarly-programmed autonomous individuals. 3. Active: Our agents are active because they exert independent influence in a simulation. For example, an agent can directly affect the decision made by other agents, or its very presence in the simulated environment can greatly affect changes in that environment and thus indirectly affect other agents. Because of this, we can identify the following active features of our agents: (a) Pro-active or goal-directed (b) Reactive or perceptive (c) Bounded rationality (d) Interactive and communicative Because our agents exhibit these behaviors, our sim- ulation approach is more akin to modeling humans and objects in very realistic ways than other modeling approaches, such as those that aggregate mathemat- ical equations to explain the dynamics of pedestrian, say, during panic situations or emergency evacuations. Thus, our simulation can be used with higher confidence to perform what-if scenarios to aid, for example, uni- versity administrators and decision makers with regards to management policies, as well as infrastructure devel- opment plans, for safer learning environments for the students and constituents (see for example Figure 2). 3.2 Agent Behavior In a two-dimensional flat world, let G be the goal of all agents with set coordinates {(x1, y1), (x2, y2), . . . , (xn, yn)}. This set is usually the location of an exit door. Since all agents aim to reach any one of the exit coordinates, the agents will face towards the direction of the nearest the simulation world. Until this distance has not been achieved, the agent will just repeat the agent's decision making process described above. 3.3 Effect of Exit Width on Arching Profile We conducted experiments using a crowd of 400 agents to see the effect of various widths of the exit door to the length of the arch's minor and major axes. Based on our preliminary simulations, 400 was the minimum number of agents that can exhibit arching, given each agent's gait speed and a corridor width of 19. The width is in terms of agent's width and the various exit widths that we used were: 1, 3, 5, 7, 9, 11, and 13. The various exit widths were computed by adding one person width on each side of the exit along the minor axis. 4. RESULTS AND DISCUSSION 4.1 Arching Effects Figure 3a shows the profile of a crowd that exhibits arching near the exit door. We observed that the arch resembles a half ellipse with the ellipse's major axis run- ning along the direction of the crowd flow and perpen- dicular to the exit width, while the minor axis is par- allel to the exit width. This result confirms that of the other researchers' [2, 3, 9]. One particular result that we feel contributed new knowledge on this field is our observation of the occurrence of what we called "double arches" that formed towards the end of the simulation (Figure 3b). As far as we are concerned, none of the literature that we reviewed described this occurrence. The double arches appeared when the clogging at the exit loosened up, and more agents that are near and along the major axis were able to pass through. We also observed that the burstiness of the exit rate disap- peared at the start of the formation of double arches. We described this disappearance of burstiness as "calm" in the visualization of the phenomenon using the density graph at the exit area. 4.2 Clogging Clogging results when two or more agents compete for the same corridor space and not one of them are able to pass each other. Figure 4a shows a snap-shot of the simulation where clogging occurred. The accompanying density graph at the exit door (Figure 4b) confirms that no agent was able to pass the exit. As opposed to the event of a bursty exit rate where agents temporarily clog the exit door but due to emergent behavior are able to unclog themselves, clogging occurred because the agents were not able to resolve their conflict in grabbing the space resource just in front of them. 4.3 Bursty Exit Rate Figure 5 shows the density graph of the crowd at the exit door. The saw-tooth-like form of the density graph con- firms that all exit scenario exhibit a bursty rate. The burstiness can be attributed to agents competing for position which for a brief moment clogged the exit way. However, through the agents' emergent behavior, they were able to unclog themselves, and then pass the exit door in a burst carrying more agents. This results to Figure 3: Profile of the crowd before the exit door: (a) Onset of arching where the minor and major axes are visible; and (b) Occurrence of double arches toward the end of the simulation. Figure 4: (a) Profile of the crowd at a clogged exit door. (b) Density graph at the exit door shows that no agent was able to pass the exit during the clogging effect. in this paper, exit coordinates from their current coordinates. The agent will scan its field of vision for the closest free space and move towards that space with its gaiting speed, which, is currently set at one pace per simulation time step. In the future, we wish to vary this gaiting speed depending on the agent's height. A free space is a location in the flat world that is not a wall, another agent, or any other object. If other agents are blocking the agent's space within its field of vision, the agent stops at that coordinates. It is possible that the agent might move away from the target exit coordinate if the chosen free space was at the edge of its field of vision. When that happens, the agent will still move to the free space, but after moving, it will redirect its heading towards the possibly new nearest exit coordinates. When the distance of the agent to the nearest exit coordinates is < 1, it considers itself as already exited and will move to the edge of rate graph. We also described the behavior of the den- sity graph during clogging, and described clogging to have occurred when two or more agents compete for space near the exit. We have also shown that the prop- erty of bursty exit rate is exhibited by the density graph with a saw-tooth-like profile. Lastly, we conducted an experiment on the effect of various exit door widths on the arching profile of the crowd before the exit door. At a narrow exit width, the major axis of the arch tends to be longer, while the minor axis tends to be shorter. However, at a wide exit width the major axis of the arch tends to be shorter, while the minor axis tends to be longer. Because our crowd of agents were able to exhibit the arching, clogging, and bursty exit rate phenomena in crowd dynamics, we can conclude that we can use these agents in microsimulation studies for modeling the behavior of humans and objects in very realistic ways. Thus, we can use these microsimulations with higher confidence to perform what-if scenarios to aid in decision making. 6. EXTENSION The following efforts are already underway as extensions to this research endeavor: 1. As we explained earlier, the arching phenomenon is an emergent pattern formed by a c-sized crowd of intelligent, goal-oriented, autonomous, hetero- geneous individuals moving towards a w-wide exit along a W -wide corridor, where W > w. We are currently collecting empirical data from microsim- ulations to identify the combination effects of c and w to the time T of the onset of and the size S of the formation of the arch. We aim to measure the S with respect to the lengths of the major and minor axes of the ellipse, respectively. 2. The total time T of egress of large crowds, such as students exiting a large lecture hall filled to its maximum capacity, is hindered by the number of exit doors, as well as the doors' dimensions, posi- tions, and orientation. In this current endeavour, we aim to find out the combinatorial effects of the number of exit doors, their dimensions, and their orientations using microsimulations of our agents. For our simulations to be realistic, we will scale down a real physical structure of a large lecture hall, including the dimensions of its exit doors, into a two-dimensional simulation. We plan to fill the simulated lecture hall with agents corre- sponding to the full capacity of the real lecture hall. We will then conduct experiments on various crowd sizes C and different exit door scenarios D. We will then measure T under all C × D combi- nations. 3. We would like to compare the capabilities of the SFM and our approach in simulating the following real-world crowd phenomena: "faster-is-slower" in escape panic, "arching" and "bursty exit" as side effects to "clogging" on exit ways, "flocking,""bidi- rectional lane formation," and "roundabout forma- tion." We believe that our approach is also able to exhibit two more individual behaviors that the Figure 5: Density graph at the exit door shows a bursty exit rate. abrupt change of density at the exit area, and is visual- ized as a saw-tooth-like line in the density graph. 4.4 Effect of Exit Width on Arching Profile Figure 6 shows the effect of varying the width of the exit door on arching profile. We can see here that at narrower exit widths, the major axis is longer, while the minor axis is shorter. When the exit door is wider, the major axis is shorter than normal, while the minor axis is longer than normal. Figure 6: Arch profile at various door widths: (a) 1; (b) 3; (c) 5; (d) 7; (e) 9; (f ) 11; and (g) 13. 5. SUMMARY AND CONCLUSION In this paper, we present the behavior for an artificial agent used in microsimulation of pedestrian crowd. The behavior is based on the two recently developed theo- ries, the social comparison theory [4] and a trajectory mapping towards an agent's goal considering the agent's field of vision. With these behaviors, we were able to show that the crowd with these agents was able to exhibit arching, clogging, and bursty exit rate. We also observed a new phenomenon that occurred towards the end of the simulation that we called Double Arching. As far as our literature review is concerned, we are the first to describe the emergent behavior of double arching in the crowd dynamics, which happen during the temporary "calm" that occurred in the bursty exit [12] L.V.A. Ngoho and J.P. Pabico. Capturing the dynamics of pedestrian traffic using a machine vision system. Philippine Information Technology Journal, 2(2):1 -- 11, 2009. [13] P.M. Torrens. Simulating Sprawl: A Dynamic Entity-Based Approach to Modelling North Amer- ican Suburban Sprawl Using Cellular Automata and Multi-Agent Systems. PhD thesis, University Col- lege London, London, 2004. [14] U. Weidmann. Transportation technique for pedes- trians, 1993. Zurich, Switzerland. [15] M. Wooldridge and N.R. Jennings. Intelligent agents: Theory and practice. Knowledge Engi- neering Review, 10(2):115 -- 152, 1995. SFM can not do: (1) Imitation -- where individ- uals tend to move into groups whose members they thought would have the same opinion as theirs; and (2) Contagion -- where people tend to "adopt" the behavior of others in the same group. Acknowledgment This research effort is under the research program Multi-agent Simulation of Student Egress from the ICS Mega Lecture Hall Under Normal, Con- trolled Emergency, and Panic Situations funded by the Institute of Computer Science, University of the Philippines Los Banos. References [1] T. Arns. Video films of pedestrian crowds, 1993. Wannenstr. 22, 70199 Stuttgart, Germany. [2] J.M. Epstein. Agent-based computational models and generative social science. Complexity, 4(5):41 -- 60, 1999. [3] S. Franklin and A. Graesser. Is it an agent, or just a program? A taxonomy for autonomous agents. In Proceedings of the Third International Workshop on Agent Theories, Architectures, and Languages. Springer-Verlag, 1996. [4] N. Fridman and G.A. Kaminka. Modeling pedes- trian crowd behavior based on a cognitive model of Social Comparison Theory. Computational and Mathematical Organization Theory, 16:348 -- 372, 2010. [5] J. Ganem. A behavioral demonstration of Fermat's principle. The Physics Teacher, 36, 1998. [6] D. Helbing. Safety Management at Large Events: The Problem of Crowd Panic. Institute for Trans- port and Economics, Dresden University of Tech- nology, 2006. [7] D. Helbing and P. Molnar. Social force model for pedestrian dynamics. Physical Review E, 51(5): 4282+, 1995. [8] D. Helbing, I. Farkas, and T. Vicsek. Simulating dynamical features of escape panic. Nature, 407 (6803):487 -- 490, 2000. [9] D. Helbing, P. Molnar, I. Farkas, and K. Bolay. Self-organizing pedestrian movement. Environment and Planning B: Planning and Design, 28:361 -- 383, 2001. [10] C.M. Henein and T. White. Agent-based Modeling of Forces in Crowds, volume 3415, pages 173 -- 184. 2005. [11] C.M. Macal and M.J. North. Tutorial on agent- based modelling and simulation. In M.E. Euhl, N.M. Steiger, F.B. Armstrong, and J.A. Joines, editors, Proceedings of the 2005 Winter Simulation Conference, 2005.
1604.04725
1
1604
2016-04-16T11:01:44
Unanimously acceptable agreements for negotiation teams in unpredictable domains
[ "cs.MA", "cs.AI", "cs.GT" ]
A negotiation team is a set of agents with common and possibly also conflicting preferences that forms one of the parties of a negotiation. A negotiation team is involved in two decision making processes simultaneously, a negotiation with the opponents, and an intra-team process to decide on the moves to make in the negotiation. This article focuses on negotiation team decision making for circumstances that require unanimity of team decisions. Existing agent-based approaches only guarantee unanimity in teams negotiating in domains exclusively composed of predictable and compatible issues. This article presents a model for negotiation teams that guarantees unanimous team decisions in domains consisting of predictable and compatible, and also unpredictable issues. Moreover, the article explores the influence of using opponent, and team member models in the proposing strategies that team members use. Experimental results show that the team benefits if team members employ Bayesian learning to model their teammates' preferences.
cs.MA
cs
Unanimously Acceptable Agreements for Negotiation Teams in Unpredictable Domains Victor Sanchez-Anguixa, Reyhan Aydoganb, Vicente Juliana, Catholijn Jonkerb aDepartamento de Sistemas Inform´aticos y Computaci´on Universitat Polit`ecnica de Val`encia Cam´ı de Vera s/n, 46022, Valencia, Spain bInteractive Intelligence Group Delft University of Technology Delft, The Netherlands Abstract A negotiation team is a set of agents with common and possibly also conflicting preferences that forms one of the parties of a negotiation. A negotiation team is involved in two decision making processes simulta- neously, a negotiation with the opponents, and an intra-team process to decide on the moves to make in the negotiation. This article focuses on negotiation team decision making for circumstances that require unanimity of team decisions. Existing agent-based approaches only guarantee unanimity in teams negoti- ating in domains exclusively composed of predictable and compatible issues. This article presents a model for negotiation teams that guarantees unanimous team decisions in domains consisting of predictable and compatible, and alsounpredictable issues. Moreover, the article explores the influence of using opponent, and team member models in the proposing strategies that team members use. Experimental results show that the team benefits if team members employ Bayesian learning to model their teammates' preferences. Keywords: Automated negotiation, Multi-agent systems, Agreement technologies 1. Introduction In the last decade, there has been an increase in the profit earned by electronic commerce sys- tems. This increase has lead to a strong interest of the academic world in researching problems re- lated to e-commerce (Ngai and Wat, 2002; Grieger, 2003; Wareham et al., 2005). As of today, most e- commerce systems rely on users manually browsing their catalogs and selecting which goods they desire to buy. This task may end up being time consuming and suboptimal in terms of users' preferences, es- pecially as the number of items and services offered on the Web increases. Therefore, it is necessary to propose mechanisms that helps costumers take better decisions while saving their time efforts. Agent-based electronic commerce has been pro- posed as a solution to such problems (Guttman Email addresses: [email protected] (Victor Sanchez-Anguix), [email protected] (Reyhan Aydogan), [email protected] (Vicente Julian), [email protected] (Catholijn Jonker) et al., 1998; Sierra and Dignum, 2001; Oliveira and Rocha, 2001; He et al., 2003). In an agent-based e- commerce system, autonomous agents act on behalf of their users with the goal of finding and closing satisfactory deals. Automated negotiation is one of the most common approaches when implement- ing these systems since they allow different elec- tronic parties to reach agreements by exchanging offers and feedback (Lomuscio et al., 2003; Nguyen and Jennings, 2005; Buffett and Spencer, 2007; lau, 2007; Chan et al., 2008). The benefits of automated negotiation and agent-based e-commerce are many. Being brief, some of the most important include: • As stated, browsing online catalogs for an op- timal deal may be time consuming. The state- of-the-art in automated negotiation can com- plete complex negotiations for multiple issues in less than a few minutes (Klein et al., 2003a; Williams et al., 2011; Baarslag et al., 2012). • On the one hand, automated negotiation saves the user from having to browse the entire cata- Preprint submitted to Elsevier September 21, 2018 log. Additionally, its personal agent is directed by the preferences of the user in the negotia- tion, which should result in deals that are ad- justed to the personal liking of the individual. Personalization has been reported to increase user satisfaction in many computational sys- tems (Ball et al., 2006; Liang et al., 2007). On the other hand, a dynamic process like auto- mated negotiation allows sellers to adapt their deals to the users' preferences, their current business needs, and their competitor dynamics (He et al., 2003). • Agreements achieved by human negotiators, suffer from the leaving money on the nego- tiation table effect (Thompson, 2003). This means that human negotiators are content with current agreements, which are usually suboptimal, when they could have performed much better. Agents in automated negotiation have been reported to provide agreements close to the optimal solution (Lai et al., 2008). • Compared to centralized and offline ap- proaches (e.g., preference aggregation, recom- mendation approaches, etc.), automated nego- tiation is a dynamic and parallel process. For instance, some centralized approaches like pref- erence aggregation are computationally hard especially if the preference space is combina- torial (Chevaleyre et al., 2007). On the other hand, recommendation approaches only filter prospective deals, but they do not close specific contracts adapted to business needs. Contrar- ily, automated negotiation can be adapted to current business needs (e.g., concede to gain customers and close fast deals). Additionally, as stated above, team members are also moti- vated by their own personal interests. There- fore, it is possible that some team members show opportunistic behavior inside the team. In such cases, preference aggregation may be manipulated by exaggerating preferences. Ad- ditionally, each parties' preferences are private, therefore making it difficult for the other par- ties to exploit and manipulate. This latter fac- tor is important, since nowadays most users in electronic applications care about the informa- tion they filtrate in systems (Taylor, 2003). Most negotiation mechanisms proposed for e- commerce settings have focused on solving bilat- eral or multiparty negotiations where parties are 2 individual agents (Faratin et al., 1998; Zeng and Sycara, 1998; Klein et al., 2003b; Nguyen and Jen- nings, 2005; Coehoorn and Jennings, 2004; Buf- fett and Spencer, 2007; Lai et al., 2008; Williams et al., 2011; Sanchez-Anguix et al., 2013; Aydogan and Yolum, 2012). However, some real life scenar- ios involve negotiation parties that are not neces- sarily formed by single individuals. Instead, each party may be formed by more than a single individ- ual. For instance, imagine that a group of travelers wants to go on a holiday together. As a group, they have to negotiate with several travel agencies to get the best travel package for the group. Despite shar- ing a common goal, each member in the multiplayer party may also be motivated by its own personal interests Mannix (2005); Halevy (2008). Therefore, the group not only faces a possibly difficult nego- tiation with the travel agency, but it also needs to deal with the conflict present in the group. This type of multi-individual negotiating party has been studied in the social sciences under the name of ne- gotiation team (Thompson et al., 1996; Brodt and Thompson, 2001). As far as the authors are concerned, multi- individual parties have been overlooked in auto- mated negotiation research. The use of computa- tional models for negotiation teams opens doors for new types of interesting and novel applications in electronic commerce. The inclusion of agent-based negotiation teams allows for e-commerce systems to deploy dynamic deal mechanisms for groups, mak- ing of e-commerce a more social system. Classi- cally, when purchasing for groups in e-commerce systems, one representative takes decisions for the whole group. Either he makes decisions accord- ing to his own preferences or the group needs to engage in a human negotiation which is usually a costly process due to different schedules, logistics, lack of communication problems or interpersonal conflict (Behfar et al., 2008). With the inclusion of agent-based negotiation teams these problems are eluded since autonomous agents take decisions jointly while saving time and efforts for their users. We believe that agent-based negotiation teams could provide potentially interesting new services : • Electronic markets for groups of travelers: Online travel agencies offer their services by means of online catalogs where users can browse different products like flights, hotels, restaurants, activities, etc. The possibili- ties for travels are vast, and usually a single travel operator may offer thousands of possi- ble trip packages/services. Exhaustively look- ing through this online catalog for an optimal deal becomes an unfeasible task for humans. Additionally, more often than not, travel is a social activity for groups (e.g., friends, family, young people, etc.). Users can benefit from agent-based negotiation teams since they can exhaustively look for deals while taking the preferences of the group into account and sav- ing efforts. Service providers can also bene- fit from these models since they could adapt their business strategies in a dynamic way and add a level of personalization that may help to retain customers. Moreover, offering the pos- sibility for groups to close travel deals based on their preferences is a value-added service, that as far as we know, is not currently of- fered by the industry. As an example of its application, users may indicate to their per- sonal agents their desire to go on a travel to- gether. Then, the agents prepare to negotiate with different travel agencies in order to pro- vide a complete and satisfactory travel package for the users. The fact that the negotiation is carried out automatically by electronic agents also gives room to looking for several alterna- tives in parallel. Once several trip packages have been negotiated, the personal agents may communicate the agreements to users, who can validate them in the last instance. • Electronic support for agricultural coopera- tives: Agricultural cooperatives are supposed to be democratic institutions where groups of farmers join together to save resources for the distribution of their products. One of the main problems of agricultural cooperatives is the principal-agent problem (Ortmann and King, 2007). Basically, despite being democratic in- stitutions, agricultural cooperatives are man- aged by a board of directors who take deci- sions on behalf of the democratic institution. It has been reported in the literature (Ort- mann and King, 2007) that dissatisfaction in cooperatives comes from the fact that the goals of members are not aligned with those of the managers. As a novel application for electronic commerce, agent-based negotiation teams may provide support for the processes that are car- ried out by cooperatives. For instance, the negotiations between agricultural cooperatives and distributors may be supported by an elec- tronic market where the agricultural coopera- tive is modeled as an agent-based negotiation team. Each member may be represented by an electronic and personal agent that participates in the negotiation team according to the pref- erences of its owner. This way, if the model is capable of ensuring unanimity with regards to team decisions, it may be possible to avoid the principal-agent problem. Of course, agri- cultural cooperatives are large institutions and considerable research has still to be done to provide scalable and fair computational mod- els. However, research as the one presented in this article contributes to the obtention of such models in the long term. • Groups of energy producers in the smart grid: The smart grid is addressed to be the next generation network for electricity distribution (Farhangi, 2010). In this network, energy generation may come from geographically dis- tributed small generators (e.g., green energy generators) that have to compete with large energy producers. Decisions at the smart grid have to be taken dynamically since energy pro- duction and consumption may vary or face un- expected events (Ramchurn et al., 2012). Re- cently, agent-based electronic commerce has been proposed as proper paradigm for this sce- nario due to its dynamic nature and adaptive response (Brazier et al., 2002; Lamparter et al., 2010; Morais et al., 2012; Ramchurn et al., 2012). If small generators want to compete with large generators like power plants, they may need to group together and act together as a single generator. Agent-based negotiation teams can give support for the group decision making of small generators in a dynamic en- vironment like the smart grid. For instance, an agent-based negotiation team for the smart grid may decide on different contract attributes like energy price for different time slots, con- tract duration and cancellation fees with dif- ferent energy consumers. The applications described above present benefits for electronic commerce systems. However, there are still several issues that need to be solved for de- ploying real applications based on agent-based ne- gotiation teams due to the novelty of the topic. One of the main issues that should be addressed when 3 designing agent-based negotiation team models is unanimity. The authors argue that, whenever it is possible, it is desirable for the final agreement with the opponent to be unanimously acceptable for all of the team members. When the members of the negotiation team are going to interact in the long term, the intra-team strategy should avoid one or some of the team members being clearly at disad- vantage (e.g., unacceptable deal) with respect to the other team members. In the first place, the aforementioned situation may end up in users per- ceiving unfairness, which may affect commitment to the decision, group attachment, and trust (Ko- rsgaard et al., 1995). And second, but not the least important, users that are not satisfied with agree- ments found automatically may end up leaving the electronic commerce application. The existing approaches (Sanchez-Anguix et al., 2011, 2012a,b) have focused on achieving unani- mously acceptable agreements for negotiation do- mains exclusively comprised by predictable and compatible issues among the team members. An issue is predictable and compatible if the preference order over issue values is the same for team mem- bers and this fact is known from the domain (e.g., price in a team of buyers). While some e-commerce domains are exclusively composed by these issues, many domains also contain issues whose preferen- tial ordering over issue values is not known from the domain (i.e., unpredictable issues). For instance, it is difficult to predict from a set of cities which rank- ing represents the preferences of a traveler, which can diverge from the preferences of other travelers. This article advances the state of the art in agent- based electronic commerce in two different ways. Firstly, it introduces a new model for agent-based negotiation teams, which could support dynamic negotiations for groups of autonomous agents rep- resenting their users. Secondly, the present model is capable of assuring that the final agreement is unanimously acceptable for all of the team mem- bers in domains that contain both predictable and compatible and unpredictable issues. We propose an intra-team protocol in which a team mediator helps team members to reach unanimously acceptable de- cisions. Furthermore, we propose two negotiation strategies for team members: a basic negotiation strategy based on concession tactics and a nego- tiation strategy using Bayesian learning to model teammates' and opponent's preferences for unpre- dictable issues. The model is capable of outper- forming state-of-the-art approaches for agent-based 4 negotiation teams. We describe our general frame- work in Section 2 and the intra-team protocol that allows team members to reach unanimity in Section 3. After that, we propose two negotiation strategies for team members in Section 4 and we explain why unanimity is guaranteed among team members in Section 5. After analyzing the experiments in Sec- tion 6, we relate our work to existing approaches and discuss future lines of work in Section 7. 2. Overview of the Negotiation Framework Let A represent a negotiation team consisting of A = M different team members and a trusted team mediator medA, and let a ∈ A represent a team member in negotiation team A. Let op rep- resent the opponent party of the negotiation team. The negotiation between team and opponent is car- ried out in a bilateral fashion, using an alternating- offers protocol (Rubinstein, 1982). In this proto- col, one of the two parties is the initiating party and sends the first offer to the other party or re- sponding party. The responding party receives the offer and decides whether or not he/she accepts the offer. Accordingly, she or he may accept the cur- rent offer or send a counter-offer. If the responding agent sends a counter-offer, the initiating party has to decide whether he/she accepts the counter-offer or not. If the counter-offer is rejected, the process is repeated in a turn-taking fashion until a deal is mutually accepted (successful negotiation) or one of the parties decides to quit the negotiation since its deadline has been reached (failed negotiation). Concerning inter-party communications, the team mediator interacts with the opponent by sending team's proposals and transmitting opponent deci- sions to team members. The team mediator plays a key role since it coordinates the team members and helps them reach unanimously acceptable deals. Let X be the object under negotiation, j ∈ {1, ..., n} be the issues under negotiation, Dj be the negotiation domain or valid values for issue j and xj ∈ Dj represent a valid value for issue j. Each agent's preferences are represented by means of a private additive utility function. We assume that there is no preferential interdependency among ne- gotiation issues; that is, the valuation given to a certain issue does not affect preference on the valua- tion of other negotiation issues. The utility function for an agent in our framework can be formalized as follows: 2.2. Types of negotiation issues among team mem- U (X) = w1V1(x1)+w2V2(x2)+...+wnVn(xn). (1) that j=1 n(cid:80) where wj represents the importance given to issue j by the agent, and Vj : xj → [0, 1] is a scoring function for issue j that gives the score that the It is assumed agent assigns to an issue value xj. wa,j = 1 and wa,j ≥ 0, and then U (.) is a function scaled in [0,1], where 0 represents the least desirable negotiation deals, and 1 represents the most desirable negotiation deals. For agents, RU ∈ [0, 1] represents the reservation utility or the minimum level of utility to consider an agreement as acceptable. In the proposed framework, private information and bounded rationality are assumed. The former has been introduced above: information regarding agents' preferences is private, and so are the strate- gies and minimum acceptable values of each agent. This is true even among team members, since prior to the negotiation they do not know any informa- tion regarding other teammates' preferences. The only information available is obtained via interac- tions in the intra-team protocol. The latter refers to the fact that given the limited time, informa- tion privacy, and limited computational resources, agents cannot calculate the optimal strategy to be carried out during the negotiation. Instead, they employ heuristic strategies that aim to be as good as possible in terms of the achievable utility. 2.1. Unanimously acceptable agreements Each team member a ∈ A has a reservation util- ity RUa ∈ [0, 1] that represents the minimum util- ity that satisfies the team member's need. Each outcome whose utility is lower than the reservation utility is unacceptable for the team member. As stated along this article, we consider that unanim- ity in a negotiation team is of extreme importance. An offer is unanimously acceptable for a team A if it is acceptable for all of the team members inside the negotiation team: ∀a ∈ A, Ua(X) ≥ RUa. (2) The proposed intra-team strategy will assure that team members only accept those offers that are unanimously acceptable for all the team mem- bers and that offers proposed to the opponent are over each team members' reservation utilities, thus, making it unanimously acceptable. 5 bers Among the different negotiation issues that com- pose the negotiation domain, we consider that there are issues that are predictable and compatible among team members and issues that are unpre- dictable among team members. Formally, we can define an issue j with domain Dj as compatible among team members if for each possible pair of team members a, b ∈ A and for each pair of issue values v1, v2 ∈ Dj, the following expression is true: Va,j(v2) > Va,j(v1) → Vb,j(v2) ≥ Vb,j(v1). (3) Hence, an issue is compatible among team members if one of the team members can increase its utility by selecting a certain issue value with respect to the current assignment, then the rest of team mem- bers stay at the same utility or they also increase their utility. Thus, there is no preferential conflict among issue values between the team members, and there is full potential for cooperation among team members with respect to compatible issues. Figure 1 shows two examples of compatible issues among two agents (top part) and an example of a non com- patible issue (bottom part). As it can be observed, in the case of price (top left), both agents obtain a better valuation when choosing a lower price value with respect to a high price value. Thus, Equation 3 holds and it is a compatible issue for both agents. In the case of the city of destination (top right), the issue is also compatible among the two agents. For any pair of cities, if one of the agents prefers one of the cities with respect to other city, the other agent also holds the same preferential relationship. For instance, both agents prefer Paris to Berlin, Berlin to London, and London to Madrid. However, in the case of the type of room (bottom part), the blue agent prefers an individual room with respect to an apartment, whereas the red agent prefers exactly the opposite. Thus, there is no full potential for co- operation among team members in that negotiation issue since conflict is present. The concept of predictability and unpredictabil- ity (Hindriks and Tykhonov, 2010; Marsa-Maestre et al., 2013) is related to vertical and horizon- tal issues found in economics literature (Stole, 1995). The definition of predictable issues matches with vertical issues, while the definition of un- predictable issues matches with horizontal issues. From this point on, we will use the concepts of Figure 1: Two compatible issues among two agents (top) and a non compatible issue among two agents (bottom). unpredictable/predictable and we will briefly intro- duce them. An issue is predictable for an agent if the preference ordering of issue values is known in the negotiation domain. Therefore, an issue is com- patible and predictable among team members if the preferences regarding issue values are known in the negotiation domain and increasing the utility of one of the team members by selecting one specific issue value results in other team members staying at the same utility or also increasing their respective util- ities. For instance, from the examples in Figure 1, one can consider that inside a team of buyers the price is a compatible and predictable issue among team members since it is known that all of the buy- ers prefer low prices to high prices, and reducing the price results in all of the buyers increasing their utility or staying at the same utility. On the other hand, an issue is unpredictable among team mem- bers if the preference ordering of the issue values cannot be accurately predicted and Equation 3 may not hold for that issue. In the case of Figure 1, the city of destination is a compatible issue among the two agents. Nevertheless, in a travel negotia- tion domain it is not true that all of the travelers will hold the same preference ranking over the issue 6 values and without additional knowledge, the pref- erence ordering may not be predicted accurately. Hence, it is an unpredictable issue. With respect to the type of room, the preference ordering over issue values may vary for the travelers. Moreover, we cannot predict their preference ordering directly, thus making the issue unpredictable. In this framework, PR denotes the set of pre- dictable and compatible issues among team mem- bers, while UN denotes the set of unpredictable is- sues. 2.3. Forbidden unpredictable partial offers among team members We define an unpredictable partial offer X as a partial offer that has a concrete instantiation of all the unpredictable issues in UN. The utility of an unpredictable partial offer is calculated as Ua(X ) = (cid:80) (cid:48) (cid:48) wa,jVa,j(xj). j∈UN (cid:48) For a team member a ∈ A, an unpredictable par- tial offer X will never be part of an acceptable offer (i.e., it will never be an unanimously acceptable of- (cid:48) fer for the team) when the sum of the utility of X and the maximum utility that can be obtained from 10203040506070809010000.20.40.60.81Price ($)V(v)LondonParisMadridBerlinCity of destinationIndividualDoubleTripleApartmentType of room predictable issues maxP Ra = (cid:80) j∈PR wa,j is less than (cid:48) its reservation value RUa, since any full offer that completes X is below the reservation utility. For a team member a, we refer to the set of unpredictable partial offers that will never be part of an accept- able offer as forbidden unpredictable partial offers, Fa (see Equation 4). Fa = {X (cid:48)Ua(X (cid:48) ) + maxP Ra < RUa} (4) It is worth noting that Fa does not represent the whole negotiation space that is unacceptable for a, but just a portion of it. In fact, some unpredictable partial offers that are not contained in Fa, can be- come unacceptable when the agent does not get the value needed from predictable issues. The size of Fa may grow as the reservation utility increases. Thus, agents with high reservation utilities are expected to have larger sets of Fa than agents with low reser- vation utilities. 2.4. Case of Study In this article we have employed a case of study (i.e., a negotiation domain) that is extracted from a possible tourism electronic market. The case of study is used to illustrate and test the proposed negotiation framework. A group of travelers wants to go on a holiday together and arrange their accommodation. The group negotiates with a hotel on the following is- sues. • Price (p): It represents the price per night that each traveler pays to the hotel for the booking service. The value goes from 200$, which is the minimum rate applicable by the hotel, to 400$, which is the maximum rate found in the hotel. This negotiation issue is considered to be predictable and compatible among team members since all of the travel- ers obviously prefer low prices to high prices. Contrarily, the hotel prefers high prices to low prices. • Cancellation fee (cf ): This issue represents the amount of the final price that each friend pays if the reservation is canceled. Possible values for this negotiation issue go from 0% to 50%. This is a predictable and compatible is- sue among team members since all of the trav- elers prefer low cancellation fees to high can- cellation fees. On the contrary, the opponent 7 prefers high cancellation fees to low cancella- tion fees. • Arranged Foods Included (af ): The hotel may also offer some meals included in deal with the travelers. The type of meal plans included are none, breakfast, breakfast+lunch, break- fast+dinner, lunch+dinner, and all. In our ne- gotiation scenario, we have considered that this negotiation issue is unpredictable among team members since preferences of team members on this issue may vary and it cannot be assumed to be same for each member. • Type of room (tr ): The four travelers can be accommodated in different types of room depending on their preferences. More specif- ically, the hotel offers 4 individual rooms, 2 twin rooms, 1 triple and 1 individual room, or 1 apartment. The type of room is an unpre- dictable negotiation issue among team mem- bers. • Payment method (pm): The amount of money paid by the travelers may be paid by different methods. The hotel allows for the payment to be made in cash, via credit card, by bank transfer, in a 3 months deferred pay- ment through the bank, and in a 6 months de- ferred payment. This negotiation issue is un- predictable since team members may prefer to choose different payment methods and we can- not predict their preference ordering directly. • Room orientation (ro): If possible, the team members can decide upon an orientation for the balcony of their rooms. The different op- tions are inner garden, main street, pool, sea, and outer garden. This issue is also considered an unpredictable issue among team members. • Free amenity (fa): As a token of generos- ity for booking as a group, the hotel offers one free service to all of the team members. More specifically, the team members can choose be- tween gym service, free wi-fi, 1 free drink per day, 1 free spa session, pool service, cable tv service, and one free guided tour. Since the preferences of team members vary for this is- sue and no assumption about their preferences can be made, this issue is also considered as unpredictable. To sum up, for this case study we have that PR= {p,cf } and UN = {af ,tr ,pm,ro,fa} with a to- tal of 4200 different combinations of discrete issue values (af,tr,pm,ro,fa) and two real issues (p,cf ). We assume that the team mediator knows which is- sues are predictable and can apply an operator that determines the best value for team members from a given set. For unpredictable issues, team members can have different types of valuation functions and the mediator does not know which issue values are better for team members. Each team member may assign different weights (i.e., priorities) to negotia- tion issues and the opponent's valuation functions and issue weights may be different from those of team members. The team mediator does not know the weights given by agents to the different issues. 3. Intra-Team Protocol In a negotiation involving a negotiation team, the intra-team protocol defines how and when de- cisions are taken regarding the negotiation. In this framework, we propose an intra-team protocol that is governed by the trusted team mediator medA. Basically, the team mediator regulates the interac- tions that can be carried out among team mem- bers and, accordingly, helps team members reach- ing unanimous acceptable decisions inside the team during the negotiation. The proposed protocol is clearly differentiated into two different phases: Pre- negotiation and Negotiation. On the one hand, dur- ing the pre-negotiation, the mediator helps team members identifying potential offers that are not unanimously acceptable for every teammate. On the other hand, during the negotiation the mediator coordinates the offer proposal mechanism, which is composed of a voting process for unpredictable is- sues and an iterated building process for predictable issues, and the offer acceptance mechanism for of- fers that come from the opponent. We describe those phases in a detailed way in the following sec- tions 3.1 and 3.2. An overview of all of the com- munications carried out in the negotiation model are depicted in Figure 2. It specifies the protocols carried out within the team and the communica- tions carried out with the opponent by means of Agent UML (Bauer et al., 2001) sequence diagrams. More detailed views of the intra-team protocols for the pre-negotiation, evaluation opponent's propos- als and proposing offers can be observed in Figures 3, 4, and 5 respectively. 3.1. Pre-negotiation Phase In the pre-negotiation phase, the mediator co- ordinates the following intra-team protocol to dis- cover the set of forbidden unpredictable partial of- fers FA for the team . The set of forbidden unpre- dictable partial offers for the team, FA, is defined as FA = {X(cid:48)∃a ∈ A, X(cid:48) ∈ Fa}. This means that any unpredictable partial offer in FA is never part of an acceptable offer for at least one team mem- ber. Thus, these unpredictable partial offers should be avoided for the team since the goal of the nego- tiation model is reaching unanimously acceptable agreements. A formal description of the pre-negotiation pro- tocol is presented in Figure 3. The picture describes the protocol by means of Agent UML sequence di- agrams. According to the proposed protocol, the team mediator initiates the pre-negotiation phase by asking each team member a to calculate its own set of forbidden unpredictable partial offers Fa (message 1 in Figure 3). Each team member builds its own (forbidden) set as requested, and it is com- municated to the mediator privately (message 2 in Figure 3). When the mediator receives the sets from the team members, it aggregates them in order to construct the set of forbidden unpredictable partial Fa. Then, the team offers for team A, FA = (cid:83) a∈A mediator makes public the list of forbidden unpre- dictable partial offers of the team FA (message 3 in Figure 3). It should be stated that, since any unpredictable partial offer in this set will prevent one of the team members from reaching its reser- vation utility, the team is not allowed to generate an offer involving any of these partial offers in FA. After the team mediator has shared FA with team members, the negotiation phase starts. The reader may realize that it is possible that during this phase, most of the unpredictable par- tial offers are pruned. In that case, it means that there is little potential for cooperation among team members. This issue can be observed by the team mediator prior to starting any negotiation process. In that case, the team mediator may suggest the team not to negotiate and save the computational resources used in the negotiation. If the team is not static and can be dynamically formed, it may suggest team members to disband the team and look for other potential partners. However, this team/coalition formation(Gaston and desJardins, 2005; Rahwan et al., 2009) is outside of the scope of this work since we focus on studying the perfor- 8 Figure 2: Overview of the communications carried out by the team mediator. 9 Team MediatorTeam Member aOpponent op1. INFORM Start negotiationref Pre-negotiation 2. INFORM Start negotiation3. ACK[deadline] 4.a INFORM withdrawref Offer proposal 5. PROPOSE[deadline]6.a INFORM withdraw[acceptable] 6.b ACCEPT6.c PROPOSE6.b.1 INFORM Accept[deadline]7.a INFORM withdrawref Opponent's Offer Evaluation [acceptable] 8.a ACCEPTtAXtopX Figure 3: Overview of the intra-team protocol carried out during the pre-negotiation mance of the negotiation model. We consider the use of the information provided with forbidden un- predictable partial offers for negotiation team for- mation as a future line of work. In general, combi- nations of team members that prune a small portion of the space should be more similar among them, and it should be more easy to achieve cooperation. 3.2. Negotiation Phase In the negotiation, two mechanisms are carried out at each round: a mechanism for deciding to ac- cept/reject the opponent's offer (Evaluation of Op- ponent's Offer), and a mechanism for proposing an offer to the opponent (Offer Proposal). For the for- mer, a unanimity voting process is employed, while for the latter an offer building process is governed by the team mediator. 3.2.1. Evaluation of Opponent's Offer This mechanism is carried out each time the team mediator receives an offer from the opponent. Since the main goal of the proposed intra-team strategy is achieving unanimously acceptable agreements for the team, a unanimity voting is carried out to de- cide whether or not the opponent's offer is accept- able for the team. With this mechanism, as long as one of the team members is not satisfied with the opponent's offer, the offer is not accepted by the team, precluding the team from reaching agree- ments that are not unanimously acceptable. A for- malization of the protocol followed in this mech- anism can be observed in Figure 4. The picture shows the formalization employing sequence dia- grams from Agent UML. The intra-team protocol used for this mechanism goes as follows. First, the team mediator receives the offer X t from the op- ponent at time t. If X t involves any forbidden un- predictable partial offer in FA, the opponent offer is automatically rejected. However, the opponent's offer is also informed to team members in order to allow each team member to process the new infor- mation leaked by the opponent if they see it nec- essary (message 1 in Figure 4). Otherwise, if the combination of unpredictable issue values is not in FA, in order to see whether the offer is unanimously acceptable for team members, the mediator makes the opponent's offer public among team members and starts an anonymous voting process (message 2 in Figure 4). Each team member a ∈ A states to the mediator whether he is willing to accept X t (positive vote) or to reject it (negative vote) at that specific instant (messages 3.a or 3.b in Figure 4). Since our aim is to guarantee unanimity, the offer is only accepted if all of the team members emit a positive vote (message 4.a in Figure 4). Otherwise, the offer is rejected and a counter-offer is proposed as explained in Section 3.2.2. 3.2.2. Offer Proposal Proposing an offer to the opponent is a complex task, since the space of offers may be huge and the preferences of the team members should be reflected in the offer sent to the opponent, and, in our case, the offer sent should be unanimously acceptable for team members. The process is divided into two sub-phases: constructing an unpredictable partial offer, and setting up predictable issues. In both phases, the team mediator acts according to Algo- rithm 3.1. We include another formal description of the interactions between the mediator and a team member during the offer proposal. This informa- tion can be found in Figure 5, which depicts the intra-team protocol specified in and Agent UML sequence diagram. • Constructing an unpredictable partial offer: The first step is to propose an un- 10 Team Member aTeam Mediator1. REQUEST2. INFORM3. INFORMAFaFSD Pre-negotiationaF Figure 4: Overview of the intra-team protocol employed to evaluate opponent's offers. predictable partial offer, a partial offer which has all of the unpredictable issues instantiated. Since team members know from FA the list of unpredictable partial offers that will not re- sult in unanimously acceptable offers under any circumstance, any offer proposed by the team should avoid being constructed from un- predictable partial offers found in FA. The method used to propose offers to the oppo- nent relies on the fact that unpredictable is- sues are those where intra-team conflict may be present, whereas there is full potential for cooperation in predictable and compatible is- sues. Hence, in order to build an offer to be sent to the opponent, it seems more appro- priate to jointly set unpredictable issue val- ues first and then, depending on the remaining needs of team members, allow team members to set compatible and predictable issues as they require for reaching their demands. The pro- posed mechanism for the first part, proposing an unpredictable partial offer, is based on vot- ing and social choice. The voting process goes as follows. 1. The mediator asks each team member to anonymously propose one unpredictable (cid:48)t partial offer X a (message 1 in Figure 5). 2. Each team member privately sends its proposal to the mediator, who gathers all of the proposals in a list that will be later sent to team members. If any un- 11 predictable partial offer proposed by a is contained in FA, the mediator automati- cally ignores this proposal (message 2 in Figure 5). 3. Once all of the proposals have been gath- ered, the mediator makes public the list (cid:48)t among team mem- of proposal UPO bers and opens a Borda scoring process (Nurmi, 2010) on proposed candidates (message 3 in Figure 5). 4. Each team member anonymously scores candidates and sends the scores to the team mediator (message 4 in Figure 5). 5. The team mediator sums up scores and se- lects the winner candidate with the high- (cid:48)t A, making it public among est score X team members (message 5 in Figure 5). This candidate, an unpredictable partial offer, will be the base for the full offer that will be sent to the opponent. • Setting up predictable and compatible issue values: Once unpredictable issues have been set, it is necessary to set predictable and compatible issues to construct a complete offer. As it has been stated along this article, there is full potential for cooperation among team members in these issues since increasing the utility of one of the team members by select- ing one issue value will result in the other team members staying at the same utility or increas- Team Mediator2. REQUEST accept opponent offer ?topXTeam Member atopXSD Evaluation of Opponent's Offer3.a ACCEPT3.b REJECT4.a INFORM ACCEPT4.b INFORM REJECTtopX])([AtopFXUN1. INFORMtopX ing their utility. Obviously, the selected unpre- dictable partial offer will not satisfy equally the needs of all the team members. Never- theless, team members can make use of pre- dictable and compatible issues to satisfy their remaining needs while not generating conflict inside the team. To complete the partial offer (cid:48)t X A, an iterative mechanism that we proposed in (Sanchez-Anguix et al., 2012a) is used to build the final offer issue per issue. The mecha- nism follows an order for predictable and com- patible issues that is constructed by the me- diator at each round according to the history of the opponent's concessions. The rationale used to build this order is that the opponent would concede less on those predictable issues more important for him in the first negotia- tion rounds, whereas it would concede more on those predictable issues that are less impor- tant. Thus, the order established by the team mediator attempts to order predictable and compatible issues in ascending order of impor- tance for the opponent. The general idea be- hind this ordering is attempting to satisfy team members' demands with those predictable is- sues less important for the opponent first. The order is updated as new information becomes available from the offers sent by the opponent. Based on this order, the iterative mechanism goes as follows. 6. The mediator selects the first predictable issue j and asks team members, given the (cid:48)t A, the necessary current partial offer X value xj for j to get as close as possible to their current demands (message 6 in Figure 5). 7. Accordingly, each team member a informs the mediator privately about the most convenient value xa,j for that issue (mes- sage 7 in Figure 5). To decide the final value xj for the issue j, the trusted media- tor aggregates agents' opinions (since the issue is predictable) by means of a func- tion that, for team members, returns the most preferred issue value from a given set (best(.)). After deciding the value xj, X (cid:48)t A is updated with xj. 8. The mediator asks the team whether or not the new partial offer is already satis- factory at round t (message 8 in Figure 19: 20: 12 5). 9. Each team member emits an affirmative response if the current partial offer cov- ers its current demands and a negative response if it still has not covered its de- mands (message 9.a or 9.b in Figure 5). Those agents that agree with the current (cid:48)t state of X A leave the iterative mechanism for this offer since they already are satis- fied with the current partial offer. The process steps back to the selection of the next issue. 10. The process continues until all of the pre- dictable issues have been set or until all of the team members have left the it- erative mechanism. In the latter case, the remaining issues are set attempting to maximize the opponent's preferences. Once the offer is complete, it is announced among team members and sent to the op- ponent (message 10.b in Figure 5). Algorithm 3.1. Pseudo-algorithm for the offer construction from the point of view of the medi- ator. Send (message −→ condition ) means that message is sent to every agent that fulfills condi- tion (cid:48)t = ((cid:83) 1: 2: /*Proposing an unpredictable offer*/ a −→ ∀a ∈ A) (cid:48)t 3: Send (REQUEST X a ←− ∀a ∈ A) (cid:48)t 4: Receive (INFORM X a ) − FA (cid:48)t 5: UPO X (cid:80) 6: Send (REQUEST Borda on UPO 7: Receive (INFORM scorea ←− ∀a ∈ A) 8: X a∈A A) (cid:48)t A = argmax (cid:48) t X(cid:48)∈UPO score(a, X(cid:48)) a∈A A ←− ∀a ∈ A) (cid:48)t 9: Send (INFORM X 10: order = build predictable order(); A(cid:48) = A (cid:48)t −→ ∀a ∈ 11: 12: /*Setting predictable issues*/ 13: for all j ∈ order do 14: 15: 16: 17: X 18: (cid:83){xj} Send (REQUEST value for j −→ ∀aa ∈ A(cid:48)) Receive (INFORM xa,j ←− ∀aa ∈ A(cid:48)) xj = best({xa,ja ∈ A(cid:48)}) (cid:48)t (cid:48)t A = X A Send (REQUEST Satisfied with X ∀a ∈ A(cid:48)) for all a ∈ A(cid:48) do A? −→ (cid:48)t Receive (INFORM ac(cid:48) A) ←− a) (cid:48)t a(X 21: 22: 23: 24: 25: if ac(cid:48) (cid:48)t A) = true then a(X A(cid:48) = A(cid:48) − {a} end if end for if A(cid:48) = ∅ then break; 26: end if 27: 28: end for 29: for all j ∈ order ∧ issue not set(j) do xj = maximize f or opponent(j) (cid:83){xj} 30: (cid:48)t (cid:48)t A = X 31: X A 32: end for (cid:48)t 33: X t A = X A 4. Team Members' Strategies The team mediator defines the coordination mechanisms inside the team. However, each team member's internal strategy has a great effect on team dynamics. In this article, we propose two types of strategy for team members. According to the first strategy (i.e., our basic team member), the team member only proposes unpredictable par- tial offers based on its own utility. In the second strategy, team members model the preferences of the team and the opponent on unpredictable par- tial offers. Then, in the mechanism employed to set unpredictable partial offers, each team member selects the candidate that guarantees that it can reach its current aspirations at time t, and max- imizes the probability of being acceptable for the opponent and the team. The learning mechanism employed by these team members is Bayesian learn- ing (i.e., Bayesian team member). 4.1. Basic Strategy for Team Members Since negotiations are time-bounded in our framework, we consider that team members have to perform some kind of concession if an agreement is to be found. For this purpose we have designed basic team members as agents whose demands are controlled by an individual and private concession strategy. More specifically, the concession strategy for a team member a ∈ A is based on time-based tactics sa(t) (Faratin et al., 1998; Lai et al., 2008). It estimates the utility demanded by a at time t by using the formula in Equation 5, where RUa is its reservation utility, T is the negotiation deadline, and βa is the concession speed, which determines how fast the agent's demands are lowered towards RUa. sa(t) = 1 − (1 − RUa) × ( 1 βa ) t T (5) Based on this concession tactic, each team mem- ber participates in the intra-team protocol with their demands regulated by his private concession tactic. Next, we define how team members take their decisions: evaluating the opponent's offer, and proposing an offer for the opponent. 4.1.1. Evaluation of Opponent's Offer Given an offer X t proposed by the opponent at instant t, the team member emits a positive vote in the unanimity voting process if it reports a utility greater than or equal to its current demands sa(t). Otherwise, a negative vote is emitted. (cid:26) true f alse aca(X t) = if sa(t) ≤ Ua(X t) otherwise (6) 4.1.2. Offer Proposal As documented in Section 3.2, team members interact at three points during the offer proposal. First, they propose an unpredictable partial offer to the team mediator. Since each team member a has its demands regulated by a time-based tactic, when proposing an unpredictable partial offer to the mediator at instant t, the proposed unpredictable partial offer X (cid:48)t a fulfills: a /∈ FA ∧ (Ua(X (cid:48)t X a ) + maxP Ra ≥ sa(t)) (cid:48)t (7) Hence, agent a selects an unpredictable partial offer which is not forbidden inside the team (since it will be ignored by the team mediator) and whose utility allows him to achieve or surpass its current demands at time t. This way, the team member as- sures that if its proposed unpredictable partial offer is the winner of the Borda voting process, it can reach its current demands. However, one should be aware that many unpredictable partial offers may fulfill Equation 7. Therefore, it is necessary to se- lect one of them as the proposed candidate. Being our basic team member, from the set of partial of- fers that fulfill Equation 7, a team member selects one of the candidates randomly. The second time that a team member interacts with the team mediator is for scoring unpredictable partial offers that have been proposed by team members. For scoring candidate partial offers in 13 Figure 5: Overview of the intra-team protocol carried out to propose offers to the other party. 14 Team Mediator1. REQUEST unpredictable partial offer2. INFORMTeam Member ataX'3. REQUEST Borda on4. INFORM5. INFORM winner unpredictable partial offerascoretAX'6. REQUEST value for issue j7. INFORMtjax,8. REQUEST Satisfied with ?taX'},...,{''1'tMttXXUPOSD Offer Proposal9.a INFORM OK9.b INFORM NO[All issues instantiated] 10. b INFORMtAX10.a REQUEST value for next issue j}{'''tjtAtAxXXSD Unpredictable IssuesSD Predictable and Compatible Issues the Borda voting process, a basic team member or- ders the candidates according to the partial utility reported by each of the candidates. That is, the team member assigns the highest score to the par- tial offer whose utility is the highest for itself, and the second highest score to the partial offer whose utility is the second best one, and so forth. Finally, team members also interact with the me- diator during the mechanism used to set predictable and compatible issues. When team members are asked about a value for issue j, each team mem- ber communicates anonymously the value xa,j. The value is the one that, given the current partial offer (cid:48)t A, gets the utility of the new partial offer as close X as possible to its current aspiration sa(t). Taking normalized additive utility functions, it can be cal- culated as:  xa,j = argmax Va,j(x) x∈Dj if Ua(X A) + wa,j ≤ sa(t) (cid:48)t argmin Va,j(x) x ∈ Dj ∧ wa,j Va,j (x) ≥ (sa(t) − Ua(X (cid:48) t A )) otherwise (8) where sa(t) is the utility demanded by the agent (cid:48)t A) is the utility reported by a at round t, Ua(X the current partial offer, and wa,jVa,j(x) is the weighted utility reported by the value demanded by the agent. The value asked for issue j is the closest one to the current demands of the agent. On the one hand, if the agent cannot reach its cur- rent demands by just setting issue j, it asks for the value that reports the highest utility. On the other hand, if the agent can reach or surpass its current demands by setting j, it asks for the value that makes the new partial offer the closest to the cur- rent demands. In the same iterative process, team members still have to declare whether or not they are satisfied with the different partial offers that are constructed. Team members follow a similar crite- rion to the method proposed to determine if an op- ponent offer is acceptable at t. Basically, a partial offer is acceptable for an agent a at t if it reports a utility greater than or equal to the aspiration level marked by its concession strategy: (cid:26) true f alse ac(cid:48) a(X (cid:48)t A) = A) ≥ sa(t) (cid:48)t if Ua(X otherwise (9) where true indicates that the partial offer is ac- ceptable at its current state for agent a, and f alse indicates the opposite. 15 4.2. Bayesian-based Strategy for Team Members The Bayesian-based negotiation strategy for a team member is based on modeling the team's (as a whole) and its opponent's preferences on unpre- dictable issues, and acting accordingly. For this purpose, two Bayesian models are employed to pre- dict if unpredictable partial offers are acceptable for both teammates and the opponent. One of the Bayesian models is employed to capture the prefer- ences of the team on unpredictable issues, whereas the other is used for capturing the preferences of the opponent on unpredictable issues. The strategy used to evaluate the opponent's offer is the same as the one described in the basic strategy. 4.2.1. Bayesian Learning Bayesian learning is a probabilistic learning method based on Bayes' theorem (Russell and Norvig, 2003). Given a certain set of hypothesis H and some observation e, Bayesian learning at- tempts to compute the probability p(he) that a certain hypothesis h is true after observing e. In our case, we want to determine whether or not the pro- posed offer will be acceptable for the opponent (or the team) (H={acc,¬acc}) given a certain unpre- (cid:48)t) where acc stands for dictable partial offer (e = X "acceptable" and ¬acc stands for "unacceptable". Since we assume that there is no interdependence among negotiation issues, we can consider that each negotiation issue contributes individually to the ac- ceptability of an offer/unpredictable partial offer. Thus, applying Bayes' theorem under independence assumption we have: p(acc) (cid:81) (cid:80) p(H) (cid:81) j∈UN p(xjacc) H∈{acc,¬acc} j∈UN p(xjH) (10) p(accX (cid:48)t) = where p(acc) is the prior probability for an unpre- dictable partial offer to be acceptable, p(¬acc) is the prior probability for an unpredictable partial of- fer to be non-acceptable, and p(xjacc) is the condi- (cid:48)t as acceptable, tional probability that assuming X it has the value of the j issues instantiated to xj. We consider positive examples Sacc as those ex- amples that correspond to the acceptable hypothe- sis (acc) and negative examples S¬acc as those ex- amples that correspond to the not acceptable hy- pothesis (¬acc). For the opponent's model, we em- ploy unpredictable partial offers that have appeared in opponent's offers as positive examples, and un- predictable partial offers that appear in offers re- jected by the opponent as negative samples. For the team's model, we use FA and those opponent's offers rejected by team members as the set of neg- ative examples. Winners in the Borda votings (i.e., unpredictable partial offers contained in offers sent to the opponent) are considered as positive exam- ples. For computing p(xjh), we use the proportion between the number of times that xj appears in hypothesis h (acc or ¬acc) and the total number of examples for h: p(xjh) = #{xj ∈ Sh} Sh (11) The reasons for employing Bayesian learning are varied. The most important one is that it allows online updating of the model as new samples be- come available. This is important in a process like negotiation, where at each interaction new in- formation becomes available regarding the oppo- nent's/teammates' preferences. If a computation- ally expensive learning mechanism was used, it would not be possible to include the new informa- tion in the model as it becomes available. Further- more, the learning mechanism is computationally cheap since it mainly involves counting. This is also important in a real application since it allows for simultaneous negotiation threads to exist, which should be maintained with different opponents to look for the best alternatives in an electronic mar- ketplace. 4.2.2. Offer Proposal Bayesian models are employed to help in the se- lection of the unpredictable partial offer that is pro- posed to the other team members. Bayesian team members propose at t unpredictable partial offers in the set defined in Equation 7. Bayesian models help to select a candidate from that set. However, it is reasonable to think that in the first interactions Bayesian model do not accurately rep- resent other agents' preferences. For that purpose, a team member invests part of the negotiation time texp in exploring the negotiation space and collect- ing information regarding the opponent's and the team's preferences. As long as the negotiation pro- cess has not surpassed texp, the team member just selects randomly one of candidate unpredictable partial offers as basic team members do. Mean- while, the Bayesian models are continuously up- dated with the new information that becomes avail- able during the negotiation. After reaching the time threshold, the team member starts to use Bayesian models in order to select the unpredictable partial offer to be proposed to the mediator during the offer proposal phase. The heuristic used in the selection of the candidate is proposing an unpredictable par- tial offer that is both acceptable for the team and the opponent. The model has an additional pa- rameter named pesc. It represents the probability of avoiding the Bayesian proposal model and using the random proposal model as described in the ba- sic team member model when the negotiation time has gone beyond texp. This parameter is included in the model in order to: (i) further explore the negotiation space; (ii) escape from local optima in- duced by inaccurate Bayesian models (e.g., wrong samples, limited number of samples, etc.). We can formalize the selection as follows: (cid:80) wbpb(accX) b∈{A,op}  rand ≤ pesc ∧ t ≥ texp if  argmax X∈B (cid:48)t a = X random partial offer(B) otherwise (12) where B is the set of candidate unpredictable par- tial offers that fulfill Equation 7, rand is a random number, pA(accX) is the probability for a candi- date unpredictable partial offer to be acceptable for the team, popp(accX) is the probability for the candidate unpredictable partial offer to be accept- 1 represent able for the opponent, and wA and wop the weights given to the acceptability of the un- predictable partial offer for the team and the op- ponent, respectively (i.e., we will refer to them as Bayesian weights). Varying these Bayesian weights allow team members to show different behaviors de- pending on their inclination to satisfy either the team or the opponent with the unpredictable par- tial offer. 5. Provably Unanimously Acceptable Deci- sions As stated in the introduction, one of our re- search goals is proposing a negotiation team model that is able to guarantee unanimously acceptable team decisions. Next, we show that under the as- 1wA + wop = 1. 16 sumption of rationality2, team members are able to achieve unanimously acceptable final agreements, if an agreement is found. For that matter, let us em- ploy reductio ad absurdum (reduction to absurdity). If X is the final agreement, let us suppose that Equation 2 (unanimously acceptable) is violated in a negotiation: unanimity is not reached because a obtained a utility below its reservation utility. ∃a ∈ A, Ua(X wa,jVa,j(xj) < RUa (13) (cid:88) (cid:48)t) + j∈PR The final agreement is found when (1) team mem- bers accept an opponent's offer or (2) the opponent accepts a team's offer. Next, we show that in both cases, Equation 13 is never true. 1. When the team members accept an opponent's offer, a unanimity voting process has been car- ried to decide whether or not to accept the final offer. The offer is only accepted if all of the team members have emitted a positive vote. Since a rational agent a would never have in- centive to emit a positive vote of the offer re- ported a utility below its reservation utility, this scenario is never true due to the intra-team mechanism. 2. When the opponent accepts a team's offer X, this offer has been necessarily proposed by the intra-team mechanism mentioned in Sec- tion 3.2.2. The offer can be decomposed into (cid:48)t and the in- an unpredictable partial offer X stantiation of predictable issues. The team member a is not able to get over its reserva- (cid:48)t ∈ Fa or when tion utility if and only if X (cid:48)t /∈ Fa and a could not get what it de- X manded in predictable issues. A rational agent has no incentive to exclude a forbidden unpre- (cid:48)t when declaring Fa. dictable partial offer X Fa and the mediator ignores Since FA = (cid:83) a∈A unpredictable partial offers in FA, an unpre- (cid:48)t that forms a team dictable partial offer X (cid:48)t /∈ Fa then the offer is never in Fa. If X agent can accomplish to satisfy the following (cid:48)t) + maxP Ra ≥ RUa. Agent expression Ua(X a could not get over its reservation value be- cause he could not demand the most of pre- dictable issues. However, when the team me- diator aggregates predictable issues inside the 2Rational agents seek to improve their current welfare. Thus, they would not take actions that lead to utilities below their reservation utilities. 17 team, the team mediator selects the highest value for team members in the list of values proposed by them. This makes possible for a to obtain the maximum utility from predictable issues. Hence, Equation 13 never holds if the negotiation ends with agreement. Since both possible scenarios are never true un- der our initial assumption, we have shown by re- duction ad absurdum that, if a final agreement is found, it is unanimously acceptable among team members. Another issue is the presence of exagger- ating agents (i.e., agents that exaggerate to get the most from the negotiation). In our setting, even if team members exaggerate and decide to include in Fa unpredictable partial offers that are acceptable but report low utility, or demand more than they need from predictable issues, if a final agreement is found it will be unanimous among team members. However, by doing so, they may be pruning negoti- ation space and lowering the probability of finding agreements. This is an interesting situation that we plan to study in the future. 6. Experiments In this section, we explore the behavior of the proposed negotiation model in different scenar- ios. The proposed framework has been imple- mented in genius (Lin et al., 2012), a simulation framework for automated negotiation that allows researchers to test their frameworks and strate- gies against state-of-the-art agents designed by other researchers. Recently, genius has become a widespread tool that increases its repository of ne- gotiating agents with the annual negotiation com- petition (Baarslag et al., 2012). In order to assess the performance of the pro- posed negotiation approach, we have performed dif- ferent experiments. All of the experiments have been carried out in the negotiation domain (or case study) introduced in Section 2.4. The first exper- iment (Section 6.1) studies the performance of the proposed model when facing single opponent agent. The comparison is carried out in scenarios with dif- ferent degrees of team's preference dissimilarity. In the second experiment, we study the performance of our negotiation team model when facing another negotiation team in bilateral negotiations. In the third experiment (Section 6.3) we study how the Bayesian weights wA and wop, which control the importance given to the preferences of the team and the opponent in the unpredictable partial offer pro- posed to teammates, impact the performance of the proposed model when team members employ the Bayesian strategy. Finally, we conduct an experi- ment to study the effect of team members' reser- vation utility on the performance of the proposed negotiation model (Section 6.4). 6.1. Performance Against a Single Opponent In this first set of experiments we study the per- formance of the proposed negotiation team model when facing a single opponent. The study is carried out with an emphasis on observing if the perfor- mance of the team is higher by employing Bayesian team members rather than basic team members. Due to the fact that we are interested in open en- vironments, we study how the team performance varies with team configurations ranging from sce- narios where no team members plays the Bayesian strategy (i.e., all Basic team members) to situa- tions where all the team members play the Bayesian strategy. The performance of the team is measured using the average team joint utility3. As an addi- tional measure of optimality, we also measure the distance to the closest Pareto optimal point. In this case, the Pareto frontier is computed taking into ac- count the team joint utility and the utility of the opponent. Our initial hypotheses were: • H1 As more Bayesian team members form the team, the team is able to obtain average team joint utilities that are higher than or equal to those configurations with less Bayesian team members. • H2 As more Bayesian team members form the team, the team is able to obtain average oppo- nent utilities that are higher than or equal to those configurations with less Bayesian team members. Since Bayesian team members take the prefer- ences of the team and the opponent into account when deciding which offer is sent to the other part, they should be able guarantee equal or higher av- erage team joint utility and opponent utility than basic team members. But in no case, they should 3We consider the joint utility of the team to be the prod- uct of the utilities of the team members. Since the utility of an agent is between 0 and 1, the team joint utility tends to be lower as more team members are present. 18 not obtain lower team joint utility and opponent utility. As a consequence of both hypothesis, the distance to the closest Pareto optimal point should be also equal or lower than that obtained by config- urations solely composed by basic team members. In order to compare the proposed model with other models in the literature, we also included the Similarity Borda Voting model (i.e., SBV) (Sanchez-Anguix et al., 2011) in our experiment. SBV is a mediated intra-team strategy that is able to guarantee semi-unanimity regarding team deci- sions. The mediator imposes a unanimity voting process to decide on whether or not to accept the opponent's offer, whilst team members propose of- fers to be sent to the opponent by means of a simi- larity heuristic that takes into account the last offer proposed by the opponent, and the last offer pro- posed by the team. A Borda voting process is used in order to decide on which offer is sent to the oppo- nent. The reason to include this intra-team strat- egy in our study is due to the fact that it has been documented to achieve similar results to intra-team strategies that guarantee unanimity under certain circumstances for domains solely composed by pre- dictable issues (Sanchez-Anguix et al., 2011). In order to adapt this approach for domains with un- predictable issues, we use a similarity heuristic that uses Euclidean distance for real/integer issues and string matching for other types of issues. Due to the fact that our proposed model guarantees unan- imously acceptable agreements and SBV does not, we formulated the following hypothesis: • H3 Teams exclusively formed by basic team members and teams exclusively formed by Bayesian team members obtain equal or higher average team joint utility than teams following the Similarity Borda Voting model. The performance of this first experiment is an- alyzed in three scenarios with different degrees of preference dissimilarity among team members: very similar, average similarity, and very dissimilar pref- erences. For this reason, we introduce a measure for measuring team members' preference similar- ity in different scenarios. The authors proposed a method for calculating preference dissimilarity in teams based on the utility difference of offers among teammates (Sanchez-Anguix et al., 2011). The dis- similarity between two teammates a, b ∈ A can be measured as: D(Ua(.), Ub(.)) = (cid:80) ∀X Ua(X) − Ub(X) # possible offers (14) Due to the fact that a team may be composed of more than two members, it is necessary to pro- vide a team dissimilarity measure. The team dis- similarity measure is calculated as the average of the dissimilarity between all of the possible pairs of teammates. For this experiment, we decided to ex- plore teams whose preferences are dissimilar, teams whose preferences are similar, and teams with an average degree of similarity/dissimilarity (i.e., aver- age similarity). For the scenario of dissimilar prefer- ences, 9 negotiation cases were randomly generated (i.e., a combination of 3 different negotiation teams consisting of four team members with 3 different op- ponents), while 9 negotiation cases were randomly generated for the similar preferences scenario (i.e., a combination of 3 different negotiation teams con- sisting of four team members with 3 different op- ponents) and 12 negotiation cases were randomly generated for the average similarity scenario (i.e., a combination of 4 different negotiation teams con- sisting of four team members with 3 different op- ponents). Since we consider that in practice it is less likely to meet extreme cases such as dissimilar or similar teams, we decided to increase the num- ber of negotiation cases in the average similarity scenario. As for the single opponents, we decided to test the negotiation team models against different fami- lies of opponents. More specifically, we followed the categorization of negotiation strategies proposed by Baarslag et al. (Baarslag et al., 2011), which di- vides negotiation strategies into four categories: • Competitors: They hardly concede, indepen- dently of opponent behavior. Agent K is a competitor agent (Kawaguchi et al., 2011; Baarslag et al., 2011) from the 2010 ANAC competition(Baarslag et al., 2012) that adjusts its aspirations (i.e., target utility) in the nego- tiation process considering to an estimation of the maximum utility that will be offered by the other party. More specifically, the agent grad- ually reduces its target utility based on the av- erage utility offered by the opponent and its standard deviation. • Matchers: They concede when they perceive that the opponent concedes, and they do not concede if they perceive that the other party does concede. Nice Tit-for-Tat is a matcher agent (Baarslag et al., 2011, 2013) from the 2011 ANAC competition that reciprocates the other party's moves by means of a Bayesian model of the other party's preferences. Accord- ing to the Bayesian model, the Nice Tit-for-Tat agent attempts to calculate the Nash point and it reciprocates moves by calculating the dis- tance of the last opponent offer to the afore- mentioned point. When the negotiation time is reaching its deadline, the Nice TFT agent will wait for an offer that is not expected to improve in the remaining time and accept it in order to secure an agreement. • Conceders: They yield independently of the opponent behavior. Conceder is an imple- mentation of the time-based concession tactics proposed by Faratin et al. (Faratin et al., 1998) categorized by Baarslag et al. as conceder. For the Conceder agent βop = 2, which leads to large concessions towards the reservation util- ity in the first rounds. • Inverter: They respond by implementing the opposite behavior shown by the other party. Boulware is an implementation of the time- based concession tactics proposed by Faratin (Faratin et al., 1998) categorized by et al. Baarslag et al. In the case of the Boulware agent, the concession speed is set to βop = 0.2. Hence, the agent concedes very insignificantly during most of the negotiation and it concedes very quickly as the deadline approaches. as inverter. The reservation utility of each team member was set to RUa = 0.5 to represent scenarios where team members have average aspirations. Additionally, for each team member (i.e., basic, Bayesian and SBV) the concession speed was randomly selected from a uniform distribution βa = U [0.5, 1]. In the case of Bayesian members, the time of explo- ration was set to texp = 70% and the probability of escape after the exploration phase was set to pesc = 30% 4. Therefore, Bayesian models are not used unless a 70% of the negotiation time (126 sec- onds) has passed. Initially, we set Bayesian mem- 4These values were found to be the best ones after carry- ing out a grid search over values of texp and pesc in a subset of test negotiation scenarios 19 Agent K Op. 0.743 0.683 0.690 Agent K Op. 0.629 0.574 0.583 Agent K Op. 0.522 0.397 0.457 T. 0.181 0.259 0.263 T. J 0.168 0.211 0.248 T. J 0.07 0.174 0.209 SBV Basic Bayesian SBV Basic Bayesian SBV Basic Bayesian Similar Nice Tit-for-Tat Boulware Conceder D. 0.070 0.065 0.058 T. 0.150 0.173 0.164 D. Op. 0.694 0.760 0.746 Average Similarity 0.130 0.067 0.080 T. 0.184 0.223 0.224 Op. 0.755 0.696 0.695 D. 0.064 0.078 0.080 T. 0.552 0.561 0.557 Op. 0.482 0.468 0.472 Nice Tit-for-Tat Boulware Conceder D. 0.065 0.070 0.034 T. J 0.137 0.141 0.158 Op. 0.562 0.691 0.669 D. 0.116 0.050 0.047 Dissimilar T. J 0.170 0.210 0.224 Op. 0.598 0.585 0.574 D. 0.070 0.060 0.045 T. J 0.324 0.386 0.390 Op. 0.428 0.414 0.414 D 0.037 0.045 0.043 D. 0.074 0.052 0.050 Nice Tit-for-Tat Boulware Conceder D. 0.168 0.180 0.118 T. J 0.160 0.184 0.196 Op. 0.457 0.572 0.559 D. 0.157 0.055 0.60 T. J 0.128 0.254 0.271 Op. 0.547 0.505 0.489 D. 0.110 0.053 0.058 T. J 0.257 0.472 0.475 Op. 0.430 0.367 0.367 D. 0.110 0.046 0.044 Table 1: Average team joint utility (T. ), the average opponent utility (Op.), and the average Euclidean distance to the closest Pareto optimal point (D.) for the first set of experiments. bers to care equally about the acceptability of un- predictable partial for the team and the opponent wA = wop = 0.5. Following the type of setting used in the annual agent competition, the negotiation time was set to T = 180 seconds. Each opponent strategy was faced against each negotiation team model in ev- ery possible negotiation case. A total of 20 repe- titions were done per negotiation case in order to capture stochastic variations in negotiation strate- gies. Therefore, 3 × 3 × 3 × 4 × 20 = 2160 (team preference profiles × opponent preference profiles × team negotiation models × opponent strategies × repetitions) negotiations were simulated in the sim- ilar scenario, 2160 negotiations were simulated in the dissimilar scenario, and 2880 negotiations were simulated in the average similarity scenario. Table 1 shows the average team joint utility and opponent utility for the cases where all of the team members either play the Basic strategy, the Bayesian model, or the team employs the SBV team negotiation model. It also shows the Euclidean dis- tance to the closest point in the Pareto frontier. An ANOVA test (α = 0.05) with a Bonferroni post- hoc analysis was carried out to assess statistical differences among the different measures gathered. Those measures that are statistically the best con- figurations for each column are highlighted in bold style. All of the claims in this experimental sec- tion are supported by the ANOVA test with the Bonferroni post-hoc analysis. The average negotia- tion time taken by each method is included in Ta- ble 2. Figure 7 shows the evolution of the average team joint utility and the average opponent utility as more team members play the Bayesian strategy. We have also included some examples of agreements obtained in the different negotiation scenarios and how they relate to the Pareto frontier5. These re- sults can be observed in Figure 6. Next, we analyze the results. 6.1.1. Results for the first hypothesis • H1 As more Bayesian team members form the team, the team is able to obtain average team joint utilities that are higher than or equal to those configurations with less Bayesian team members. First, we focus on the situations when all of the team members either play the basic strategy or the Bayesian strategy (Tables 1 and 2). It can be ob- served that when team members' preferences are similar, both types of teams perform equally in terms of the average team joint utility. This result is consistent with H1, since both prove to be statis- tically equivalent with the ANOVA test with Bon- ferroni post-hoc analysis. The reason why Bayesian 5The quadratic root of the team joint utility is taken to convert the results to the same scale (remember that the team joint utility is the product of for team members' utili- ties) 20 Figure 6: Examples of agreements and their distance to the Pareto frontier 21 0,30,40,50,60,70,80,90,10,20,30,40,50,60,70,80,91Average similarity scenario vs Nice TFT(Team Joint Utility)^(1/4)Opponent utility00,10,20,30,40,50,60,70,80,9100,10,20,30,40,50,60,70,80,91Average similarity scenario vs Agent K(Team Joint Utility)^(1/4)Opponent utility0,30,40,50,60,70,80,911,10,250,350,450,550,650,750,850,95Similar scenario vs Nice TFT(Team Joint Utility)^(1/4)Opponent utilityParetoBasicBayesianSBVParetoBasicBayesianSBVParetoBasicBayesianSBVParetoBasicBayesianSBV0,30,40,50,60,70,80,911,10,250,350,450,550,650,750,850,95Similar scenario vs Agent K(Team Joint Utility)^(1/4)Opponent utilityParetoBasicBayesianSBV00,20,40,60,811,20,10,20,30,40,50,60,70,80,91Dissimilar scenario vs Nice TFT(Team Joint Utility)^(1/4)Opponent utility00,10,20,30,40,50,60,70,80,9100,10,20,30,40,50,60,70,80,91Dissimilar scenario vs Agent KParetoBasicBayesianSBV(Team Joint Utility)^(1/4)Opponent utilityParetoBasicBayesianSBV models do not give an advantage over the basic model in the similar scenario can be explained since team members are similar and there is no neces- sity to carry out team modeling. The distance to the closest Pareto optimal point is also very simi- lar for both team configurations, which can be also explained due to the fact that team modeling is not necessary due to team members' similar prefer- ences. As conflict is introduced inside the team by mak- ing team members' preferences more dissimilar (i.e., dissimilar and average similarity scenarios, middle and bottom part of Table 1), it can be observed that usually the team formed exclusively by Bayesian team members gets the statistically highest average team joint utility, which is also coherent with our hypothesis H1 and refines our hypothesis for these scenarios. In this case, the teammates' preferences are no longer similar and some sort of modeling mechanism is needed in order to guide the intra- team negotiation towards agreements that are good for all of the team members. The only exception is found in the conceder case, where the performance in terms of the team joint utility was found to be statistically equivalent among the team exclusively formed by basic team members and the team ex- clusively formed by Bayesian members. Taking a closer look at the negotiation traces, we observed that, in all of the negotiations, the exploration time texp was never surpassed. Since the Conceder agent concedes rapidly in the negotiation, the team's de- mands are also met early. Therefore, Bayesian mod- els do not get to be used. In fact, the average nego- tiation time against Conceder agents was 61.7, 76.3, and 88 seconds respectively in the similar scenario (see Table 2), the average similarity scenario (see Table 2), and the dissimilar scenario (see Table 2). All of them are below the threshold of 126 seconds delimited by texp. As a result, the team members have not used their Bayesian model while generat- ing their proposals and they are equivalent to the team formed by basic members. This is also con- sistent with H1, since in no case the team formed by Bayesian members gets statistically lower results than the team formed by basic members. If we observe the evolution of the average team joint utility in Figure 7 6, there is a tendency to increase the average team joint utility as more Bayesian members are included (triangle shaped 6Results for the Conceder agent are omitted since the Bayesian models are not employed. Similar 139.4 145.4 144.0 N. TFT B. 164.3 162.5 165.2 K 148.7 141.5 142.3 Average Similarity K 155.1 153.1 150.1 N. TFT B. 177.6 174.8 175.0 153.1 154.9 154.7 Dissimilar K 163.8 162.2 163.7 N. TFT B. 175.7 176.6 177.2 156.6 160.1 160.5 C. 61.0 62.8 61.7 C. 74.1 77.4 76.3 C. 73.4 87.7 88.0 SBV Basic Bayesian SBV Basic Bayesian SBV Basic Bayesian Table 2: Average time (seconds) for negotiations in the first set of experiments. K (Agent K), N. TFT (Nice Tit-for-Tat), B. (Boulware), C. (Conceder) data series on Figure 7) in situations where team members' preferences have an average similarity or they are very dissimilar. This tendency is more pronounced against Agent K (left plot in Figure 7) and Boulware agents (right plot in Figure 7). However, when team members' preferences are very similar the team performance remains at statisti- cally equivalent values (ANOVA test with Bonfer- roni analysis) for the average team joint utility. The results of these graphics are coherent with our find- ings in Table 1 and H1. In conclusion, we have found that as more Bayesian team members form the team, the team is able to obtain average team joint utilities that are higher than or equal to those configurations with less Bayesian team members. Being more specific, we have been able to detect that, as long as there is preferential conflict among team members (i.e., average similarity among team members, and very dissimilar team members), and the opponent does not concede early in the negotiation, more Bayesian team members result in higher team joint utility. 6.1.2. Results for the second hypothesis • H2 As more Bayesian team members form the team, the team is able to obtain average oppo- nent utilities that are higher than or equal to those configurations with less Bayesian team members. For the average opponent utility, the Bayesian team obtained significantly better results than the basic team only in the scenario where the team faces 22 Figure 7: Evolution of the average team joint utility and opponent utility as more Bayesian team members are introduced in the team. Agent K and team members are dissimilar with regards to their preferences (see Table 1, bottom part). The same pattern is found in Figure 7, where we can observe that the average opponent utility in- creases as more Bayesian team members are present in the team (first plot in the second row of Figure 7). In other cases, the Bayesian and the basic team obtain statistically equivalent results to each other, and, in some situations, the basic team obtained significantly better results. More specifically, when the team faces Nice Tit-for-Tat, the basic team ob- tains significantly better results than the Bayesian team. We can also observe this pattern in Figure 7. As more Bayesian members are introduced, the average opponent utility slightly decreases (middle plot in the second row of Figure 7). These findings only support partially our hypoth- esis H2 since we found a set of scenarios where the basic team provides better utility to the opponent (i.e., when facing Nice Tit-for-Tat). We analyzed the trace of different negotiations against Nice Tit- for-Tat and Boulware opponents. In the former case, we could observe that close to the end of the negotiation the Nice Tit-for-Tat opponent had only sent on average 5 different unpredictable par- tial offers in a domain that has 4200 different un- predictable partial offers. This behavior results in scarce information for any learning mechanism. In the case of negotiations against Boulware agents, one should consider that the Boulware strategies concede only towards the end of the negotiation and, most of the time, the aspirations are high. Thus, most of the samples gathered by the Bayesian classifier when facing Boulware agents correspond to offers with high demands where usually only the best issue values appear. Other issue values do not appear in the samples or they have their frequency misinterpreted with respect to the utility that they actually report. Therefore, the learning mechanism misinterprets the preferences of the opponent and 23 None123All0.10.150.20.250.30.35vs. Agent KNumber of Bayesian team membersAverage Team Joint UtilityNone123All0.10.150.20.250.30.35vs. Nice TFTNumber of Bayesian team membersNone123All0.10.150.20.250.30.35vs. BoulwareNumber of Bayesian team membersVery SimilarAverage SimilarityVery DissimilarNone123All0.350.40.450.50.550.60.650.70.75vs. Agent KNumber of Bayesian team membersAverage Opponent UtilityNone123All0.350.40.450.50.550.60.650.70.75vs. Nice TFTNumber of Bayesian team membersNone123All0.350.40.450.50.550.60.650.70.75vs. BoulwareNumber of Bayesian team members the team formed by Bayesian members is not able to obtain statistically better utility for the oppo- nent than the team formed by basic members. The behavior of Nice Tit-for-Tat and Boulware opponents also has a direct consequence on the dis- tance to the closest Pareto optimal point obtained by both team configurations (Bayesian and basic). Despite the fact that the Bayesian configuration is capable of obtaining statistically better results for the team joint utility by learning the preferences of the team, the utility reported to the opponent is usually lower than the one reported by the ba- sic configuration. The only exception to this case are scenarios against Agent K, where the Bayesian configuration obtains a statistically higher utility for the opponent. The inability to model the oppo- nents' preferences in the case of the Boulware and Nice Tit-for-Tat opponents, results in a higher team joint utility (due to team modeling) at the cost of reducing the utility received by the opponent. Hence, there is not an improvement in the distance to the closest Pareto optimal point. These find- ings can also be observed in some of the examples included in Figure 6.The agreements found by the basic team configuration and the Bayesian configu- ration tend to be found at the same distance to the Pareto frontier (the Bayesian configuration tending to populate regions with higher team joint utility). The exception to this rule are negotiations against Agent K, where the basic configuration tends to populate regions of no agreement (close to the axis origin). 6.1.3. Results for the third hypothesis • H3 Teams exclusively formed by basic team members and teams exclusively formed by Bayesian team members obtain equal or higher average team joint utility than teams following the Similarity Borda Voting model. It can be observed that when team members' pref- erences are similar (top part of Table 1), both basic and Bayesian models are statistically equivalent to each other and better than SBV with respect to the average team joint utility. As conflict is introduced inside the team by making team members' prefer- ences more dissimilar (i.e., dissimilar and average similarity scenarios, middle and bottom part of Ta- ble 1), the team get statistically lower average team joint utility by employing the SBV model. Basic and Bayesian models outperform SBV with respect to the average team joint utility since they are able 24 to guarantee unanimously acceptable agreements, while SBV does not guarantee such condition. This result supports and refines our hypothesis H3, since, in general, the team formed exclusively by Bayesian team members and the team formed by basic team members obtains statistically higher team joint util- ities than the SBV model. There is only one ex- ception to this refinement. The basic team, the Bayesian team and SBV perform statistically equal in terms of the average team joint utility only when the opponent is a conceder and team members' pref- erences are similar. Since the opponent concedes rapidly in the first rounds, the three models ob- tain equivalent team joint utility due to the oppo- nent concessions and the fact that conflict is almost nonexistent among team members. However, this finding is still consistent with our initial guess H3. Regarding the optimality of the solutions found by the model proposed in this article with respect to SBV, it is possible to observe that both Bayesian and basic configurations obtains statistically lower distance to the Pareto frontier than SBV as long as preferential conflict between team members is present (i.e., average similarity and dissimilar sce- narios). Only when the team is very similar, SBV gets statistically equal distances to the model pro- posed in this article. However, despite the fact that the distance to the Pareto frontier may be statisti- cally equal, we can observe in Figure 6 that agree- ments found by SBV tend to populate areas that are closer to the lowest team joint utility. This re- sult can be explained due to the fact that unanimity cannot be guaranteed in the team, and some team members end up with low utility agreements. In conclusion, we found that teams exclusively formed by basic team members and teams exclu- sively formed by Bayesian team members obtain equal or higher average team joint utility than teams following the Similarity Borda Voting model. More specifically, we found that, in general, the re- sults for the team formed by Bayesian team mem- bers and the team formed by basic team members obtains statistically higher results than the SBV model. The distance to the Pareto frontier also shows higher quality and more optimal agreements for teams employing the model proposed in this article. This result is important, since it shows that the present model, not only guarantees unan- imously acceptable agreements, but it also ensures that better results are obtained with respect to other state-of-the-art team negotiation models. 6.2. Performance Against Another Team In this experiment we analyze the performance of the proposed model when two teams face each other. More specifically, we simulate negotiations where one negotiation team represents a group of four travelers, and the other negotiation team rep- resents the board of managers for a hotel, which consists also of four managers. The negotiation has a common deadline of T = 180 seconds. Both par- ties negotiate with each other by means of the al- ternating bilateral protocol, but they employ the negotiation team model proposed in this article to coordinate and take team decisions. The goal of the experiment is determining if Bayesian team mem- ber improve the performance of the team when it faces another team. In this setting, we use 4 different team prefer- ence profiles to represent the group of travelers and 2 different team preference profiles to represent the board of managers. Since we are interested in open environments, we consider different team configura- tions from the perspective of strategy profiles: No team member plays the Bayesian strategy (0-0),half of the team members play the Bayesian strategy in one team (2-0), all of the team members play the Bayesian strategy in one team (4-0), half of the team members are Bayesian in both teams (2-2), all of the team members are Bayesian in one team and half of them are Bayesian in the other team (4-2), and all of the team members are Bayesian (4-4). For each strategy profile, each group of travelers' is faced against each board of managers 20 times to capture stochastic variations. Therefore, a total of 4×2×20 = 160 negotiations is carried out per team strategy profile, giving a total of 960 negotiations for this experiment. Our initial guess is that more Bayesian team members will help to obtain higher team joint util- ities due to the learning and proposal mechanism used to take into account the preferences of the team and the preferences of the opponent. More specifically, we formulated the following hypothe- ses: • H4 As long as only one team includes Bayesian team members (configurations 2-0 and 4-0), the average team joint utility for both teams will be higher than the average team joint util- ity obtained by negotiations where no Bayesian team member participates (configuration 0-0). • H5 Those configurations where both teams in- clude Bayesian team members (configurations 25 2-2, 4-2, and 4-4) will obtain higher aver- age team joint utilities for both teams than configurations where only one team includes Bayesian team members (configurations 2-0 and 4-0). We configure the parameters as we did in our previous experiment. The results of the experiment can be observed in Figure 8. The blue points repre- sent the average team joint utility for the group of travelers, whereas the red points represent the av- erage team joint utility for the board of managers. The graphic shows an increasing average team joint utility as the total of Bayesian team members in both sides increases. The worst results for both teams are obtained when all of the team members act as the basic team member (0-0). This result is explainable due to the large number of negoti- ations that finished with no agreement (80 out of 160 negotiations, a 50% of failure). As long as one of the sides implements the Bayesian strategy (2-0, 4-0), both teams benefit by obtaining higher av- erage team joint utilities. An ANOVA test with Bonferroni post-hoc analysis (α = 0.05) confirmed that both configurations 2-0 and 4-0 obtain statis- tically different and higher team joint utilities for both teams than the configuration 0-0. This result confirmed our initial hypothesis H4. It can be observed that the next relevant increase in the average team joint utility of both teams is present as long as both sides apply the Bayesian strategy (2-2, 4-2, 4-4). An ANOVA test with Bon- ferroni post-hoc analysis (α = 0.05) revealed that the averages obtained by configurations 2-2, 4-2, and 4-4 are statistically different and higher than the averages obtained by 2-0 and 4-0. Hence, both teams obtain higher average team joint utilities as long as both teams include Bayesian team members, supporting our hypothesis H5. In conclusion, we have been able to determine that when two teams face each other by means of the proposed model, both teams benefit by obtain- ing higher team joint utilities when Bayesian team members participate in the negotiation. This is especially true when Bayesian team members are distributed between both teams, which obtains the highest team joint utilities for both sides. 6.3. Analyzing the impact of Bayesian weights for the proposal of unpredictable partial offers Recalling from Section 4.2, there are two weight parameters that control how important the op- Ia ∈ [0.33, 0.66] it gives average importance to unpredictable issues, and when Ia ∈ [0.66, 1.0] the agent gives high importance to unpredictable issues. We generated 8 random negotiation cases where team members give a high importance to unpre- dictable issues and the opponent gives low (4 cases) and average (4 cases) importance to unpredictable issues, 8 different randomly generated negotiation cases where team members give a low importance to unpredictable issues and the opponent gives av- erage (4 cases) and high (4 cases) importance to un- predictable issues, and 12 negotiation cases where the opponent and the team give the same impor- tance to unpredictable issues (4 cases where both give low importance, 4 cases where both give aver- age importance, and 4 cases where both give high importance). We tested three configurations for Bayesian teams: standard Bayesian members that give the same importance to the acceptability of the un- predictable partial offer by the opponent and the team wA = wop = 0.5 (Normal), Bayesian mem- bers that give more importance to the acceptabil- ity of the unpredictable partial offer by the oppo- nent wA = 0.25 wop = 0.75 (Opponent Oriented), and Bayesian members that give more importance to the acceptability of the unpredictable partial of- fer by the team wA = 0.75 wop = 0.25 (Team Oriented). As for the opponent's strategies, we se- lected Agent K, Nice TFT and Boulware. In situations where the opponent gives more im- portance to unpredictable issues than the team, the team should be able to obtain higher average team joint utility by playing high values for wop, satisfy- ing opponent needs with unpredictable issues, and demanding more on predictable issues. If the team gives more importance to unpredictable issues, the team should be able to obtain higher average team joint utility by playing high values for wA, satis- fying opponent needs with predictable issues, and demanding more on unpredictable issues. If both teams give the same importance to unpredictable issues, the team should be able to guarantee higher average team joint utility by giving the same weight to wop and wA since no party gives more importance to unpredictable issues. Attending to these initial guesses, we formulated the following hypotheses: • H6 When the opponent gives more impor- tance to unpredictable issues, the team obtains higher team joint utility by using high values for wop and demanding more on predictable is- Figure 8: Evolution of the average team joint utility with the different strategy profiles (Blue= group of travelers, Red= board of managers). ponent's and team's preferences are while gener- ating the unpredictable partial offer (respectively wop, wA). wA represents how important it is for the team members to make an unpredictable par- tial offer that is acceptable for the team, whereas wop represents how important it is for us to make an unpredictable partial offer that is acceptable for the opponent. The use of these weights is not triv- ial, since one should consider that, it only refers to the acceptability of the unpredictable partial of- fer by one of the two parties. A complete offer is composed by the predictable and unpredictable is- sues. Therefore, for instance, using a high value of wop may not have the desired effect on the oppo- nent unless unpredictable issues are important for the opponent. Additionally, one should also con- sider that the more acceptable an unpredictable is for the team/opponent, the more utility it should report. In this experiment we explore the impact of these weights in a wide variety of situations. More specif- ically, we study how different values for wop and wA affect situations where the team gives more impor- tance to unpredictable issues than the opponent, situations where the opponent gives more impor- tance to unpredictable issues than the team, and situations where both team and the opponent give the same importance to unpredictable issues. To assess the importance given by an agent to unpredictable partial issues, we consider the sum of unpredictable issue weights in its utility function. (cid:88) Ia = wi,j (15) j∈UN We consider that when Ia ∈ [0.0, 0.33] the agent a gives low importance to unpredictable issues, when 26 0 -- 02 -- 04 -- 02 -- 24 -- 24 -- 40.050.070.090.110.130.150.170.19Number of Bayesian team members in both teamsAverage team joint utility sues (wA = 0.25 wop = 0.75). • H7 When the team gives more importance to unpredictable issues, the team obtains higher team joint utility by using high values for wA and letting the opponent demand on pre- dictable issues (wA = 0.75 wop = 0.25). • H8 When both parties give the same impor- tance to unpredictable issues, the team obtains higher team joint utility by giving the same importance to the opponent's and team's pref- erences on unpredictable issues (wA = wop = 0.5). For each negotiation case, we repeated the nego- tiation 20 times in order to capture stochastic vari- ations in strategies. Therefore, a total of 1680 ne- gotiations were carried out in this experiment. The results of this experiment can be observed in Table 3. It shows the average of the joint team utility and proportion of negotiations that finished with suc- cess (agreement) in the scenario. An ANOVA test (α = 0.05) with Bonferroni post-hoc analysis was carried out to detect statistically different averages. The best configurations for each of the three sce- narios are highlighted in bold font style. All of the claims of this experimental section are supported with the aforementioned ANOVA test with post- hoc analysis. Focusing on the case of negotiations against Agent K, it can be appreciated that when unpre- dictable issues are more important for the oppo- nent (bottom part of Table 3), the best results are obtained by taking an opponent oriented ap- proach: proposing unpredictable partial offers that are likely to be acceptable for the opponent and sat- isfy remaining members' aspirations by demanding on predictable and compatible issues, which are less important for the opponent. This finding supports H6. As for the scenario where unpredictable is- sues are more important for the team (middle part of Table 3), it is clearly observed that the best choice for team joint utility is to give a high weight to wA, thus employing a team oriented approach. Since unpredictable issues are more important for the team, they should satisfy their needs as much as possible with proposed unpredictable partial of- fers and demand less on predictable issues, which are more important for the opponent, supporting our initial hypothesis H7. Finally, the last sce- nario corresponds to the case where unpredictable issues have the same importance for both parties 27 (top part of Table 3). In this case, there may be more conflict between the team and its opponent since the parties do not have a clear trade-off op- portunity such as increasing the demand on unpre- dictable issue while decreasing the demand on pre- dictable issues as appeared in two previous cases. One can observe that the best team joint utility is obtained when using the standard team members (wA = wop = 0.5). Since both parties give the same importance to unpredictable issues, it seems natural to give the same importance to the acceptability of the unpredictable partial offer by the team and the opponent, supporting our hypothesis H8. The team oriented approach is clearly worse than the rest of approaches since many negotiations (only a 58.7% were successful. See top part of Table 3 ) ended in failure due to the team being too demanding and not satisfying the opponent's preferences. When negotiating against Nice TFT and Boul- ware, the results are different. It can be appreciated that, generally, the team oriented approach always reports statistically better results from the point of view of the average team joint utility. This means that the team should indistinctly select highly ac- ceptable unpredictable partial offers for the team when facing opponents like Nice TFT and Boul- ware agents. These findings do not support our hypotheses H6, H7, and H8, and drove a more in- depth analysis and study. There are two factors that should be taken into account. First, as we de- tected in Section 6.1, the Bayesian models that are learnt from both agents are not adequate due to the lack of learning samples detected in the case of Nice TFT and the misinterpretation of the impor- tance of issue values in the case of the Boulware agent. This factor precludes the agents from find- ing good agreements for both parties when using an opponent oriented approach in scenarios where un- predictable issues are more important for the oppo- nent. Since the Bayesian models misinterpret the preferences of Boulware and Nice TFT agents, it is not possible to create win-win situations. Sec- ond, by selecting a team oriented approach, the Bayesian team members are selecting the more ac- ceptable (i.e., the best) unpredictable partial offers for the team. These unpredictable partial offers re- port high utility for the team. Thus, once com- pleted with predictable issues, these offers are ex- pected to report high utility for the team. Differ- ently to Agent K, Nice TFT and Boulware agents are not competitor agents since they will eventu- ally accept the team's offer when the deadline is approaching. In the case of the Boulware agent, it concedes quickly with respect to its aspirations as the deadline approaches, eventually meeting the re- quirements of the demanding team offer. As stated in (Baarslag et al., 2013), when the negotiation time is reaching its deadline, the Nice TFT agent will wait for an offer that is not expected to improve in the remaining time in order to secure an agree- ment. Hence, the team is able to exploit the other party by selecting the team oriented approach. Due to these circumstances, hypotheses H6, H7, and H8 were not supported for agents Boulware and Nice Tit-for-Tat. In conclusion, hypotheses H6, H7 and H7 are only partially supported. In general, we have discov- ered that depending on the type of opponent agent, the values for weights wop, wA have different effects on the negotiation. When facing exploitable agents like Nice TFT and Boulware, the team benefits if the team members take the team oriented approach, selecting those unpredictable partial offers that are more acceptable for the team. If the team faces competitors like Agent K, the team should match the values for wop and wA depending on the impor- tance given by each party to unpredictable issues. It is acknowledged that, depending on the opponent and the desired behavior, the team should select dif- ferent values for the Bayesian proposal weights. A mechanism for adjusting Bayesian weights based on the type of opponent is considered as future work. 6.4. Analyzing the Impact of the Reservation Util- ity In this experiment, we investigated the impact of the reservation utility of team members on the team joint utility. As explained in Section 3.1, team members jointly prune a part of the negotia- tion space (i.e., a set of unpredictable partial offers) which does not contain, with absolute certainty, any unanimously acceptable offer. This pruning is re- lated with the reservation utility of team members, which represents the minimum acceptable utility by team members. Any offer with a utility lower than the reservation utility is not acceptable for the agent. Lower reservation utilities make it easier to ob- tain the needed utility by just setting compatible and predictable issues. Thus, each team member needs to prune less negotiation space with the un- predictable partial offers sent to the team media- tor. Presumably, a joint list of forbidden unpre- dictable partial offers (i.e., the negotiation space RUa = 0.35 RUa = 0.50 RUa = 0.65 Similar Avg. Similarity Dissimilar 0.4% 23.8% 73.7% 35.3% 72.6% 90.8% 11.6% 34.2% 81.8% Table 4: Average percentage of unpredictable partial offers pruned in the pre-negotiation. that is pruned) with lower reservation utilities is smaller than lists constructed with higher reserva- tion utilities. This leaves more room for finding an agreement with the opponent. However, if team members have low reservation utilities, despite hav- ing more room for finding an agreement, they may end up with low utility agreements in the end. On the contrary, with higher reservation utilities, it is harder to obtain the needed utility with compat- ible and predictable issues. Therefore, each team member may need to prune more negotiation space and the joint list of forbidden unpredictable partial offers will be larger than the list constructed with lower reservation utilities. In fact, if team members set high aspirations with their reservation utility, it may end up with all the negotiation space be- ing pruned. If an agreement is found under these conditions, it may lead to team members achieving high levels of utility. In this experiment, we test the impact of different levels of reservation utility on the team joint utility. More specifically, as we did in Section 6.1, we tested teams employing the Bayesian model against dif- ferent families of strategies: competitor (i.e., Agent K), matcher (i.e., Nice Tit-for-Tat), inverter (i.e., Boulware), and conceder (i.e., conceder). As an ad- ditional dimension to our study, we also introduced preference similarity among team members. There- fore, teams are tested in the scenario where team members' preferences are dissimilar, the scenario where team members' preferences have an average degree of similarity, and the scenario where team members' preferences are similar. We configured three types of Bayesian teams with different levels of reservation utilities: a team with a relatively low reservation utility RUa = 0.35, a team with a moderate reservation utility RUa = 0.5, and a team with a high reservation utility RUa = 0.65. We expect that playing higher reser- vation utilities against competitor like Agent K will result in lower average team joint utility due to many negotiations ending with no agreement. On the other hand, we expected that playing high reser- vation utilities against Conceder agents, inverter 28 Equal importance on unpredictable issues vs. Agent K vs. Nice TFT vs. Boulware Normal Opponent Oriented Team Oriented T. Joint % Ag. T. Joint % Ag. T. Joint % Ag. 0.168 0.155 0.116 0.202 0.188 0.206 Unpredictable issues more important for the team 0.137 0.126 0.188 84.2 91.1 58.7 100 100 100 100 100 100 vs. Agent K vs. Nice TFT vs. Boulware T. Joint % Ag. T. Joint % Ag. T. Joint % Ag. Normal Opponent Oriented Team Oriented 0.213 0.200 0.248 100 100 100 0.135 0.154 0.196 100 100 100 0.185 0.189 0.213 100 100 100 Unpredictable issues more important for the opponent vs. Agent K vs. Nice TFT vs. Boulware T. Joint % Ag. T. Joint % Ag. T. Joint % Ag. Normal Opponent Oriented Team Oriented 0.280 0.296 0.271 100 100 92.0 0.186 0.192 0.259 100 100 100 0.326 0.300 0.340 100 100 100 Table 3: Impact of wA and wop on the average team joint utility in different scenarios and proportion of negotiations that finished with success (% Ag.). agents like Boulware, and the special case of Nice Tit-for-Tat, would result in higher average team joint utility due to the fact that both agents should eventually concede towards the other parties' de- mands. In the case of Nice Tit-for-Tat, we have observed that when the deadline is approaching it attempts to secure a deal, making this agent can- didate to be exploited by setting a high reservation utility. Therefore, we formulated the following hy- potheses: • H9 Playing a high reservation value for team members (RUa = 0.65) will result in the lowest average team joint utility against Agent K. • H10 Playing a high reservation value for team members (RUa = 0.65) will result in the high- est average team joint utility against Conceder, Boulware, and Nice Tit-for-Tat. These types of teams (RUa = 0.35, RUa = 0.5, RUa = 0.65) were faced in every scenario and negotiation case against every type of opponent for 20 repetitions. We gathered information on the team joint utility and the utility obtained by the opponent, and an ANOVA (α = 0.05) with Bonfer- roni post-hoc analysis was carried out to determine results that are statistically better than the rest. All of the claims of this experimental section are supported by the ANOVA test with the Bonferroni post-hoc analysis. Table 5 shows the results of this experiment in terms of the average joint utility. A bold font style is used to highlight those Bayesian team configura- tions that are statistically the best option against each opponent. Additionally, the same table shows the proportion of negotiations that finished with success (agreement) in this experiment. Table 4 shows the average percentage of unpredictable par- tial offers that were pruned in the pre-negotiation depending on the team configuration and team pref- erence similarity. With respect to H10, it can be observed that in- dependently of the degree of dissimilarity among team members' preferences, team members ob- tained statistically better team joint utility by set- ting high reservation utilities (RUa = 0.65) against Boulware, Conceder, and Nice Tit-for-Tat oppo- nents. These results support our initial hypothesis H10. Nevertheless, H9 is only partially supported. When facing Agent K, playing the highest reserva- tion utility configuration lead to the highest team joint utilities when team members' preferences are similar or they have an average similarity (top and middle part of Table 5), which is opposite to our initial hypothesis H9. In this case, the demands of the team are still not high enough to preclude agree- ments with the competitor agent. However, when team members' preferences are dissimilar (bottom 29 Agent K Nice Tit-for-Tat Boulware Conceder Similar T. Joint % Ag. T. Joint % Ag. T. Joint % Ag. T. Joint % Ag. 0.195 0.263 0.350 0.117 0.164 0.286 0.160 0.224 0.354 0.526 0.557 0.635 100 100 99.98 100 100 100 100 100 100 100 100 100 Agent K Nice Tit-for-Tat Boulware Conceder Average Similarity T. Joint % Ag. T. Joint % Ag. T. Joint % Ag. T. Joint % Ag. 0.167 0.248 0.242 0.136 0.224 0.313 0.090 0.158 0.268 0.342 0.390 0.470 100 100 74.2 100 100 100 100 100 100 100 100 100 Agent K Dissimilar Nice Tit-for-Tat Boulware Conceder T. Joint % Ag. T. Joint % Ag. T. Joint % Ag. T. Joint % Ag. 0.193 0.209 0.068 0.173 0.271 0.409 0.115 0.196 0.346 0.373 0.475 0.580 100 86.6 18.3 100 100 100 100 100 100 100 100 100 RUa = 0.35 RUa = 0.50 RUa = 0.65 RUa = 0.35 RUa = 0.50 RUa = 0.65 RUa = 0.35 RUa = 0.50 RUa = 0.65 Table 5: Average joint Utility (T. Joint) for teams composed by Bayesian team members with different reservation utilities and proportion of negotiations that finished with success (% Ag.). part of Table 5), we can observe how setting a high reservation utility (i.e., RUa = 0.65) gradually be- comes the worst possible course of action when fac- ing Agent K, making H9 true for this situation. The reason for this behavior is mainly explained due to the decrease in the number of successful negotia- tions. If we observe the similar scenario, the num- ber of successful negotiations when facing Agent K and RUa = 0.65 is 99.98%. If we change to aver- age similarity scenarios, the number of successful negotiations is 74.2% when facing Agent K with RUa = 0.65. The same measure is decreased to 18.3% in the dissimilar scenario. If we observe Ta- ble 4, as team dissimilarity increases, the number of unpredictable partial offers to be pruned is larger. This leaves less negotiation space to be played with Agent K. Agent K is a competitor agent that at- tempts to concede as less as possible by estimat- ing the maximum utility that can be obtained from the opponent and employing a limit of compromise when the opponent takes a hard stance. First of all, if reservation utilities are high, it can be considered that team members play a hard stance. Second, if too much negotiation space is pruned, it may be feasible that the set of remaining unpredictable par- tial offers precludes Agent K from reaching its limit of compromise. Thus, employing high reservation utilities against a competitor agent like Agent K may result, as we have observed in this case, in an increase in the number of failed negotiations and lower team joint utilities. In conclusion, H10 is supported by our findings, but H9 is only partially supported. We have ob- served that team members may benefit from playing high reservation utilities against Conceder, Boul- ware, and Nice Tit-for-Tat. If faced against com- petitors like Agent K, setting high reservation util- ities may prune too much negotiation space, espe- cially when team members are dissimilar. This re- sults in negotiation spaces that may not contain the minimum limits established by competitor agents, thus, ending negotiations with failure. For other scenarios against agent K, the team can benefit from setting high reservation utilities since the re- sulting negotiation space still has room to accom- modate an agreement with the competitor agent. In general, team members should be cautious when setting the reservation utility since it may end up in more failures. 6.5. Team performance with risk attitudes One scenario that should be considered in multi- agent systems is agent's attitude towards risk. Some team members may be more willing to choose actions that guarantee a safer agreement, while other may prefer to go for more profitable but less probable agreements. Classically, agents can show a risk seeking, a risk averse, and a risk neutral at- 30 titude. The goal of this experiment is determin- ing how risk attitudes affect the performance of the proposed negotiation model. In this experiment, we decided to test three different patterns of behavior: • Risk averse team member: This team member selects from the list of available unpredictable partial offers (see Equation 7, those that guar- antee the current aspirations of the team mem- ber sa(t)) the best unpredictable partial of- fer according to the acceptance probability for the opponent by using the Bayesian mecha- nism proposed in this article. When the team sets predictable issue, the maximum utility ob- tainable with other unpredictable partial of- fers may be higher since they may provide a higher utility of oneself. However, in order to secure a deal, the team member selects the un- predictable partial offer that is supposed to be more acceptable to the opponent even if the maximum achievable utility is lower. There- fore, the team member bases its choices on the acceptability of the offer by the opponent party instead of the maximum achievable utility. • Risk seeking team member: This team member selects for the list of available unpredictable partial offers (see Equation 7) the best unpre- dictable partial offer according to the utility reported by one's own utility function. Hence, this unpredictable partial offer represents the choice that enables the team member to get the maximum achievable utility in the negoti- ation domain. By filling predictable issues by the team, the team member is more likely to get closer to its maximum achievable utility, even if this action reduces acceptability of the proposed offer for the opponent. • Risk neutral team member: This behavior is represented by the Bayesian team member pre- sented in this article. Our initial hypothesis is that the proposed model is robust to risk attitudes. By robustness, we mean that the proposed negotiation model will be able to obtain a team joint utility higher than or com- parable to the team joint utility obtained by other state-of-the-art models like SBV: • H11 Different configurations of team mem- bers' risk attitudes will yield a team joint util- ity that is statistically higher or equal to the results obtained by SBV. K 0.241 0.259 0.250 0.169 0.181 Similar N. TFT B. 0.160 0.164 0.216 0.248 0.150 0.238 0.224 0.267 0.283 0.184 Average Similarity N. TFT B. 0.147 0.158 0.171 0.162 0.137 K 0.188 0.248 0.231 0.149 0.168 0.186 0.224 0.222 0.224 0.170 Dissimilar K 0.203 0.209 0.228 0.060 0.07 N. TFT B. 0.167 0.196 0.183 0.247 0.16 0.245 0.271 0.265 0.294 0.128 C. 0.372 0.557 0.520 0.615 0.552 C. 0.308 0.390 0.383 0.477 0.324 C. 0.373 0.475 0.452 0.566 0.257 Averse Neutral Mix Seeker SBV Averse Neutral Mix Seeker SBV Averse Neutral Mix Seeker SBV Table 6: Team joint utility obtained by the different team risk configurations. K (Agent K), N. TFT (Nice Tit-for-Tat), B. (Boulware), C. (Conceder) The experimental parameters of the previous experiments were repeated (RUa = 0.5, βa = U [0.5, 1]), and we selected four different team con- figurations. The first one is composed by four neu- tral team members (Neutral), the second is com- posed by four risk seeking team members (Seeker), the third is composed by three risk averse team members (Averse), and the last team configura- tion is composed by two neutral team members, one risk seeker, and one risk averse (Mix). As in the previous experiments, the team members faced different opponent profiles in scenarios where team members' preference profiles are similar, scenarios with average similarity of team members' prefer- ences, and scenarios where team members have dis- similar preferences. The team faces the same op- ponent strategies presented in the previous experi- ments. We gathered information on the team joint utility. The results of this experiment can be found on Table 6. Results highlighted in bold represent the statistically higher team joint utility configurations for each negotiation scenario (ANOVA, α = 0.05). As it can be observed, the risk seeking configura- tion usually gets a higher team joint utility as long as the opponent faced is not a competitor. This configuration is able to obtain one of the best team 31 joint in all negotiation scenarios with Nice Tit-for- Tat, Boulware, and Conceder. When negotiating against Agent K , many negotiations end with fail- ure since the opponent also has high aspirations. Other opponents like Nice Tit-for-Tat, Boulware, or Conceder match the high aspirations of the risk seeking team at one point or another of the negoti- ation, resulting in a higher team joint utility. The mixed configuration usually gets the next highest team joint utility, being able to obtain sta- tistically equivalent results in some scenarios like negotiating against Nice Tit-for-Tat in the average similarity scenario, and statistically higher results like negotiations against Agent K in dissimilar sce- narios. This configuration obtains the best team joint utility in all of the scenarios involving against Agent K. The neutral configuration, obtains statistically good results in some scenarios where team members have similar preferences and the Bayesian mecha- nism is able to learn the opponent preferences prop- erly (e.g., negotiating against Agent K, some sce- narios against Boulware and Nice Tit-for-Tat). The risk averse configuration is only able to obtain some of the top results in very specific scenarios like ne- gotiations against in similar settings against Agent K. However, in no case any of the team configura- tions proposed in this article is worse than SBV. All of the results are statistically higher than those ob- tained by SBV, except for those obtained by the risk seeking configuration against Agent K, which are statistically equivalent to those obtained by SBV. Therefore, despite being affected by team hetero- geneity, the proposed model is robust and it is able to obtain results that are at least equal to the state- of-the-art (i.e., SBV), outperforming it in many sit- uations. This result supports our initial hypothesis H11. 7. Related Work The contributions of this article to the auto- mated negotiation community can be divided into two different categories: general contributions to the field of automated negotiation, and contribu- tions to the specific field of agent-based negotiation teams. Next, we analyze the contributions to each of these fields. 32 7.1. Automated negotiation with single individual parties The artificial intelligence community has focused on bilateral or multi-party negotiations where par- ties are composed of single individuals. The main contribution of our work with respect to the general field of automated negotiation is that we support negotiation parties composed by multiple individ- uals. Apart from that, in the next paragraphs we discuss other contributions of our present negotia- tion framework with respect to works in automated negotiation. Faratin et al. (Faratin et al., 1998) introduced some of the most widely used families of concession tactics in negotiation. The authors proposed con- cession strategies for negotiation issues that are a mix of different families of concession tactics. The authors divide these concession tactics into three different families: (i) time-dependent concession tactics; (ii) behavior-dependent concession tactics; and (iii) resource-dependent tactics. Our negotia- tion framework also considers time as crucial ele- ment in negotiation. Therefore, team members em- ploy time tactics inspired in those introduced by Faratin et al. However, the authors do not propose any explicit preference learning mechanism. In Zeng and Sycara (Zeng and Sycara, 1998), the authors argue about the benefits of using Bayesian models in negotiation and they study a bilateral negotiation case where the buyer attempts to learn the reservation price of the seller by updating its beliefs with Bayesian learning. Despite the fact that it introduces the use of Bayesian learning in negotiation, the article only focuses on single issue models. One of our team member models also uses Bayesian learning as a method for learning other agents' preferences. The main different resides in the fact that our Bayesian approach attempts to model which instantiations of unpredictable issues are acceptable for the opponent and the team in multi-issue negotiations. Ehtamo et al. (Ehtamo et al., 2001) propose a mediated multi-party negotiation protocol which looks for joint gains in an iterated way. The algo- rithm starts from a tentative agreement and moves in a direction according to what the agents prefer regarding some offers' comparison. Results showed that the algorithm converges quickly to Pareto optimal points. However, the work proposed by Ehtamo et al. does not support unpredictable is- sues and multiple individual parties. Klein et al. (Klein et al., 2003a) propose a me- diated negotiation model which can be extended to multiple parties. Their main goal is to provide so- lutions for negotiation processes that use complex utility functions to model agents' preferences. The negotiation attributes are binary and no longer in- dependent. Our work supports multiple individual parties and negotiation issues with unrestricted do- main (e.g., real, integer, discrete, binary, etc.). In Coehoorn et al. (Coehoorn and Jennings, 2004), the authors propose the use of kernel den- sity estimation for the estimation of the importance weights of the linear additive utility function. The agent calculates tuples composed of the difference between pairs of consecutive offers, the estimated weight for the issue, and the probability density of the weight. These tuples form a three dimen- sional kernel that is used along the other kernels to calculate an estimation of the real issue weight. Our proposed model is capable of learning in nego- tiations where domains are also composed by dis- crete issues, which is not supported by Coehoorn et al. Moreover, the learning mechanism proposed for our team members deals with the information in one single negotiation, whereas the aforementioned mechanism learns over several negotiations. Later, Narayanan et al.(Narayanan and Jennings, 2006) present a negotiation framework where pairs of agents negotiate over a single issue. The authors assume that agents' strategies may change over time. Non-stationary Markov chains and Bayesian learning are employed to tackle the uncertainty in this domain, and eventually converge towards the optimal negotiation strategy. In our case, we fo- cus on one single negotiation process, and our team members learn over the information provided by the current negotiation. Additionally, we consider ne- gotiations where multiple issues are involved. Another example of the use of Bayesian learning in negotiation is presented by Buffett et al. (Buf- fett and Spencer, 2007). In the aforementioned ar- ticle, a bilateral framework is presented in a do- main where agents negotiate over a set of binary issues. A Bayesian classifier is employed to classify opponent's preferences into classes of preference re- lations. Groups of similar preference relations are grouped according to the k-means algorithm prior to the negotiation process. Our model does not re- quire learning prior to the negotiation, which may require a costly learning process every negotiation to avoid domain dependent classifiers. Moreover, we consider any kind of issue type in the negotia- 33 tion domain. Carbonneau et al. (Carbonneau et al., 2008) pro- pose a neural network that takes as input the nego- tiation history of a bilateral negotiation with con- tinuous issues and an offer to make an estimation of the opponent's counter-offer. This approach re- quires that an artificial neural network is trained per negotiation case. Similarly, the same authors propose an improvement over their previous work in (Carbonneau et al., 2011). It aims to make a predictive model that does not depend on the ne- gotiation case. The model takes pairs of negotiation issues as inputs of the neural network, where one of the issues is considered the primary issue (i.e., inde- pendent variable) and the other issue is considered the secondary issue (i.e., dependent variable). Dif- ferently to these works, our proposed model does not rely on information from past negotiations. It only employs information gathered in the present process. Robu et al.(Robu and La Poutr´e, 2008) introduce a bilateral negotiation model where agents repre- sent their preferences by means of utility graphs. The negotiation domain is formed of bundles of items that can be either included or excluded in a final deal. Utility graphs are graphical models that relate negotiation issues that are dependent. Nodes represent negotiation issues whereas arcs connect is- sues that have some joint effect on the utility func- tion (i.e., positive for complementary issues, and negative for substitutable issues). Hence, utility graphs represent binary dependencies between is- sues. The authors propose a negotiation scenario where the buyer's preferences and the seller's pref- erences are modeled through utility graphs. The seller is the agent that carries out a more thor- ough exploration of the negotiation space in order to search for agreements where both parties are sat- isfied. With this purpose, the seller builds a model of the buyer's preferences based on historic informa- tion of past deals and expert knowledge about the negotiation domain. Our work does not consider dependencies between issues, however it is capable of supporting every type of domain for negotiation issues (i.e., real, binary, discrete, etc.). In (Aydogan and Yolum, 2012), a concept-based learning method is proposed for modeling oppo- nent preferences and generating well-targeted of- fers. In that method, the preferences of the oppo- nent are represented via disjunctive and conjunc- tive constraints. In this article, our aim is also to find the agreement earlier by means of learning the other participants' preferences but the preferences are represented by means of additive utility func- tions. In our case, an offer that is rejected by the opponent may become acceptable over time because the opponent may concede; therefore, we choose a probabilistic learning method. Williams et al. (Williams et al., 2012) present a negotiation framework for coordinating multi- ple bilateral negotiations with different opponents. The agent simultaneously negotiates with differ- ent opponent in order to acquire a desired good at the best possible condition. The framework makes use of optimization techniques and proba- bilistic information in order to carry out this coor- dination. Similarly, Mansour et al. (Mansour and Kowalczyk, 2012) present a meta-strategy for coor- dination multiple negotiations with different sellers. The meta-strategy adjusts the concession speed ac- cording to the current state of the multiple nego- tiation threads. The problem of agent-based nego- tiation teams is different since multiple agents col- laborate in the same party to get a deal from an opponent, instead of competing between each other to get an individual deal. 7.2. Agent-based negotiation teams As far as we are concerned, only our previ- ous works (Sanchez-Anguix et al., 2011, 2012a,b) have considered negotiation teams in computa- tional models. In (Sanchez-Anguix et al., 2011, 2012a) four different computational models for a negotiation team negotiating with a single oppo- nent are presented. These four models attempt to gather four different minimum levels of una- nimity regarding team decisions: representative ap- proach (RE, no unanimity), similarity simple voting (SSV, majority/plurality), similarity Borda voting (SBV, semi-unanimity), and full unanimity medi- ated (FUM, unanimity). The RE model is based on the selection of team members as representative of the team. The rep- resentative acts on behalf of the group by taking decisions according to its own negotiation strategy and utility function. SSV and SBV are models based on the presence of a mediator that coordinates voting processes. In the case of SSV, a majority voting is employed to determine whether or not the opponent's offer is accepted, and a majority voting is used to select which offer is sent from those offers proposed by team members to be sent to the opponent. In the case of SBV, a unanimity voting is designated as 34 the mechanism to decide if opponent's offers are accepted and Borda count is used to decide which offer proposed by team members is sent to the oppo- nent. In both cases, SSV and SBV team members decide which offers are sent to the opponent using similarity heuristics that consider the opponent's and team's last offers. FUM is a mediated model where the opponent's offers are evaluated by means of a unanimity vot- ing process, and team's offers are built issue per issue by aggregation rules. These models were in- troduced at AAMAS 2011 (Sanchez-Anguix et al., 2011) as the first approach to tackle problems in- volving negotiation teams. Later, we studied the special properties of FUM, given that it was the intra-tem negotiation model capable of guaranteeing unanimity regarding team decisions at each negotiation round (Sanchez- Anguix et al., 2012b). We proved how unanimity is guaranteed in FUM, how the intra-team strat- egy us robust against certain types of manipulation attacks, and how team members did not have incen- tive to strongly deviate from the proposed model. We provided a full fledged experimental analysis of the four intra-team strategies in different negoti- ation environments (Sanchez-Anguix et al., 2012a). The results showed that FUM was able to guarantee better results for the negotiation team in most ne- gotiation scenarios. Only SBV is able to guarantee similar results in a limited number of negotiation cases. Even though these four models cover different levels of unanimity with regards to team decisions, they were initially designed to provide solutions for negotiation domains that are exclusively composed by predictable and compatible issues among team members (e.g., price, quality, and dispatch time in a team of buyers). Domains exclusively composed by compatible and predictable issues among team members cover a range of feasible negotiation domains. However, a relatively large number of negotiation domains also include unpredictable issues among team members. RE, SSV, and SBV can be easily adapted to do- mains that include unpredictable issues among team members by using a different similarity heuristic. FUM, the model that guarantees unanimity with regards to team decisions, cannot be used in these domains since, in the offer proposal mechanism, it aggregates issue values based on the fact that all of the negotiation issues are compatible and predictable among team members. As stated, whenever it is possible, it is desirable for the final agreement to be unanimously accept- able for all of the team members since the oppo- site situation may end up in users perceiving un- fairness, which may affect commitment to the deci- sion, group attachment, and trust (Korsgaard et al., 1995), and users that are not satisfied with agree- ments found automatically may end up leaving the electronic application. The model proposed in this article advances the stat of the art in agent-based negotiation teams by solving both problems: it guarantees unanim- ity with regards to team decisions, and it sup- ports unpredictable negotiation issues, which were not specifically supported in previous models. For that matter, the negotiation domains is split be- tween those issues that are compatible and pre- dictable among team members, and those issues that are unpredictable. In the former case, part of the mechanism employed in FUM is employed. By doing so, the model is capable of guarantee- ing that team members are able to get as much as they need from predictable and compatible issues. In the latter case, the team discards those com- binations of unpredictable partial offers that pre- clude the team from reaching unanimously accept- able agreements, even if the most is obtained from predictable and compatible issues. Then, in the offer proposal mechanism team members select one of re- maining unpredictable partial offers, and complete the predictable and compatible issue with the val- ues that they need to make it at least unanimously acceptable. The idea behind this splitting, is coop- erating as much as possible on those issues that are predictable and compatible among team members to create less intra-team conflict in unpredictable issues. 8. Conclusions & Future Work In this article we have presented a new me- diated team negotiation model for a team as a multi-individual party negotiating with an oppo- nent in the alternating offers protocol. The present model is capable of assuring unanimously accept- able agreements for all of the team members. It takes advantage of the categorization of negotia- tion issues as predictable and compatible, and un- predictable. The former are those issues whose preferential order over issue values is known from the negotiation domain and it is common among team members (e.g., price in a team of buyers), 35 whereas the latter are those issues whose prefer- ential order over issues values is not known in the negotiation domain. In the case of predictable and compatible issues, there is full potential for coop- eration among team members since if one of the team members demands more from the issue, the other team members are also benefited. Our negoti- ation model takes advantage of this property. Dur- ing the pre-negotiation, each team member shares with a team mediator those unpredictable partial offers (i.e., partial offers that have all of the unpre- dictable issues instantiated) that, even if the team demands the most from predictable issues, preclude the agent from achieving its reservation value. A joint list forbidden unpredictable partial offers is constructed by the team mediator from the lists re- ceived from the team members. In the negotiation, the team mediator coordinates a unanimity voting process to decide whether or not to accept offers received from the opponent. As for the mechanism employed to decide on which offer should be sent to the opponent, the team mediator coordinates two processes: a proposing and voting process where each team member suggests an unpredictable par- tial offer not included in the forbidden list followed by a Borda voting on candidates received, and an iterated process where predictable issues are set is- sue per issue attending to the demands of the team members. We have proposed two different types of team members for the current model: a basic team mem- ber that proposes unpredictable partial offers dur- ing the negotiation solely guided by its own utility function, and a Bayesian team member that sug- gests unpredictable partial offers based on the pref- erences of the team and the preferences of the op- ponent. Results have shown that, as long as pref- erential conflict is present in the team, team mem- bers have an incentive to employ the Bayesian strat- egy over the basic strategy. In any case, we have shown that both approaches outperform other ex- isting models for negotiation teams. Moreover, we have determined that when two negotiation teams face each other, both teams benefit from includ- ing Bayesian team members in the negotiation. Fi- nally, we have shown that team members may ben- efit from playing higher reservation utilities against conceders, matchers and inverters. Nevertheless, setting high reservation utilities may become the worst option as team members' preferences are more dissimilar and the opponent plays a competi- tor strategy. The topic of agent-based negotiation teams re- mains largely unexplored compared to negotiation involving single individual parties. The present work has focused on agent-based negotiation teams where team members have different preferences but they share the same knowledge regarding the nego- tiation domain. One potential area of research is modeling negotiation teams where team members differ in their knowledge of the negotiation domain and their skills related to the negotiation process. As another line of future work, one could consider the problem of forming negotiation teams based on the individual list of unpredictable partial offers. Lists that are more similar may suggest team mem- bers that are more similar, which, if put together in the same team, may result in more cooperative teams. Related to team formation, dynamic nego- tiation teams where team members may join and leave the team during the negotiation can be con- sidered an alternative line of research. Acknowledgements This research is partially supported by TIN2012- 36586-C03-01 of the Spanish government and PROMETEOII/2013/019 of Generalitat Valen- ciana. Other part of this research is supported by the Dutch Technology Foundation STW, ap- plied science division of NWO and the Technology Program of the Ministry of Economic Affairs; the Pocket Negotiator project with grant number VICI- project 08075. References E. W. Ngai, F. Wat, A literature review and classification of electronic commerce research, Information & Manage- ment 39 (5) (2002) 415 -- 429. M. Grieger, Electronic marketplaces: A literature review and a call for supply chain management research, European journal of operational research 144 (2) (2003) 280 -- 294. J. Wareham, J. G. Zheng, D. Straub, Critical themes in elec- tronic commerce research: a meta-analysis, Journal of In- formation Technology 20 (1) (2005) 1 -- 19. R. H. Guttman, A. G. Moukas, P. Maes, Agent-mediated electronic commerce: a survey, Knowledge Engineering Review 13 (2) (1998) 147 -- 159, ISSN 0269-8889, doi: http://dx.doi.org/10.1017/S0269888998002082. C. Sierra, F. Dignum, Agent-mediated electronic commerce: Scientific and technological roadmap, in: Agent Mediated Electronic Commerce, Springer, 1 -- 18, 2001. E. Oliveira, A. Rocha, Agents advanced features for nego- tiation in electronic commerce and virtual organisations formation process, in: Agent Mediated Electronic Com- merce, Springer, 78 -- 97, 2001. 36 M. He, N. R. Jennings, H.-F. Leung, On agent-mediated electronic commerce, Knowledge and Data Engineering, IEEE Transactions on 15 (4) (2003) 985 -- 1003. A. R. Lomuscio, M. Wooldridge, N. R. Jennings, A Classi- fication Scheme for Negotiation in Electronic Commerce, Group Decision and Negotiation 12 (2003) 31 -- 56, ISSN 0926-2644. T. D. Nguyen, N. R. Jennings, Managing commitments in multiple concurrent negotiations, Electronic Commerce Research and Applications 4 (4) (2005) 362 -- 376, ISSN 1567-4223, developments in intelligent support for e- Commerce negotiation applications The 6th International Conference on Electronic Commerce. S. Buffett, B. Spencer, A bayesian classifier for learning opponents' preferences in multi-object automated nego- tiation, Electronic Commerce Research and Applications 6 (3) (2007) 274 -- 284. Towards a web services and intelligent agents-based negotia- tion system for {B2B} eCommerce, Electronic Commerce Research and Applications 6 (3) (2007) 260 -- 273, ISSN 1567-4223. C.-C. H. Chan, C.-B. Cheng, C.-H. Hsu, Bargaining strategy formulation with CRM for an e-commerce agent, Elec- tronic Commerce Research and Applications 6 (4) (2008) 490 -- 498. M. Klein, P. Faratin, H. Sayama, Y. Bar-Yam, Protocols for Negotiating Complex Contracts, IEEE Intelligent Sys- tems 18 (6) (2003a) 32 -- 38, ISSN 1541-1672. C. Williams, V. Robu, E. Gerding, N. Jennings, Using gaus- sian processes to optimise concession in complex negotia- tions against unknown opponents, in: Proceedings of the 22nd International Joint Conference on Artificial Intelli- gence (IJCAI'11), 432 -- 438, 2011. T. Baarslag, K. Hindriks, C. Jonker, S. Kraus, R. Lin, The First Automated Negotiating Agents Competition (ANAC 2010), in: New Trends in Agent-Based Complex Automated Negotiations, vol. 383 of Studies in Compu- tational Intelligence, Springer Berlin / Heidelberg, ISBN 978-3-642-24695-1, 113 -- 135, 2012. D. Ball, P. S. Coelho, M. J. Vilares, Service personalization and loyalty, Journal of Services Marketing 20 (6) (2006) 391 -- 403. T.-P. Liang, H.-J. Lai, Y.-C. Ku, Personalized content rec- ommendation and user satisfaction: Theoretical synthesis and empirical findings, Journal of Management Informa- tion Systems 23 (3) (2007) 45 -- 70. L. Thompson, The Mind and heart of the negotiator, Pren- tice Hall Press, Upper Saddle River, NJ, USA, 2003. G. Lai, K. Sycara, C. Li, A decentralized model for auto- mated multi-attribute negotiations with incomplete infor- mation and general utility functions, Multiagent and Grid Systems 4 (1) (2008) 45 -- 65, ISSN 1574-1702. Y. Chevaleyre, U. Endriss, J. Lang, N. Maudet, A Short In- troduction to Computational Social Choice, in: SOFSEM 2007: Theory and Practice of Computer Science, vol. 4362 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 51 -- 69, 2007. H. Taylor, Most people are privacy pragmatists who, while concerned about privacy, will sometimes trade it off for other benefits, The Harris Poll 17 (2003) 19. P. Faratin, C. Sierra, N. R. Jennings, Negotiation Decision Functions for Autonomous Agents, International Journal of Robotics and Autonomous Systems 24 (3-4) (1998) 159 -- 182. D. Zeng, K. Sycara, Bayesian learning in negotia- tion, International Journal of Human-Computer Stud- ies 48 (1) ISSN 1071-5819, doi: http://dx.doi.org/10.1006/ijhc.1997.0164. (1998) 125 -- 141, M. Klein, P. Faratin, H. Sayama, Y. Bar-Yam, Negotiating Complex Contracts, Group Decision and Negotiation 12 (2003b) 111 -- 125. R. M. Coehoorn, N. R. Jennings, Learning on oppo- nent's preferences to make effective multi-issue negotia- tion trade-offs, in: The 6th International Conference on Electronic Commerce (ICEC'04), 59 -- 68, 2004. V. Sanchez-Anguix, S. Valero, V. Julian, V. Botti, A. Garc´ıa- Fornes, Evolutionary-aided negotiation model for bilateral bargaining in Ambient Intelligence domains with complex utility functions, Information Sciences 222 (2013) 25 -- 46. R. Aydogan, P. Yolum, Learning opponent's preferences for effective negotiation: an approach based on concept learn- ing, Auton. Agents Multi-Agent Syst. 24 (2012) 104 -- 140. E. Mannix, Strength in Numbers: Negotiating as a Team, Negotiation 8 (5) (2005) 3 -- 5. N. Halevy, Team Negotiation: Social, Epistemic, Economic, and Psychological Consequences of Subgroup Conflict, Personality and Social Psychology Bulletin 34 (2008) 1687 -- 1702. L. Thompson, E. Peterson, S. Brodt, Team negotiation: An examination of integrative and distributive bargaining, Journal of Personality and Social Psychology 70 (1) (1996) 66 -- 78. S. Brodt, L. Thompson, Negotiating Teams: A levels of anal- ysis, Group Dynamics 5 (3) (2001) 208 -- 219. K. Behfar, R. A. Friedman, J. M. Brett, The Team Nego- tiation Challenge: Defining and Managing the Internal Challenges of Negotiating Teams, in: Proceedings of the 21st Annual Conference for the International Association for Conflict Management (IACM-2008), 2008. G. Ortmann, R. King, Agricultural cooperatives I: history, theory and problems, Agrekon 46 (1) (2007) 18 -- 46. V. Sanchez-Anguix, V. Julian, V. Botti, A. Garcia-Fornes, Reaching Unanimous Agreements within Agent-Based Negotiation Teams with Linear and Monotonic Utility Functions, IEEE Transactions on Systems, Man and Cy- bernetics, Part B 42 (3) (2012a) 778 -- 792. V. Sanchez-Anguix, T. Dai, Z. Semnani-Azad, K. Sycara, V. Botti, Modeling power distance and individual- ism/collectivism in negotiation team dynamics, in: 45 Hawaii International Conference on System Sciences (HICSS-45), 628 -- 637, 2012b. A. Rubinstein, Perfect equilibrium in a bargaining model, Econometrica 50 (1982) 155 -- 162. K. V. Hindriks, D. Tykhonov, Towards a quality assessment method for learning preference profiles in negotiation, in: Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis, Springer, 46 -- 59, 2010. I. Marsa-Maestre, M. Klein, C. M. Jonker, R. Aydo- to protocols: Towards a ne- gan, From problems gotiation handbook, Decision Support Systems doi: http://dx.doi.org/10.1016/j.dss.2013.05.019. L. A. Stole, Nonlinear pricing and oligopoly, Journal of Eco- nomics & Management Strategy 4 (4) (1995) 529 -- 562. B. Bauer, J. P. Muller, J. Odell, Agent UML: A formalism for specifying multiagent interaction, in: Agent-oriented software engineering, vol. 1957, Springer, Berlin, 91 -- 103, 2001. M. E. Gaston, M. desJardins, Agent-organized networks for dynamic team formation, in: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems (AAMAS'05), ACM, New York, NY, USA, ISBN 1-59593-093-0, 230 -- 237, 2005. T. Rahwan, S. D. Ramchurn, N. R. Jennings, A. Giovan- nucci, An anytime algorithm for optimal coalition struc- ture generation, Journal of Artificial Intelligence Research 34 (1) (2009) 521 -- 567, ISSN 1076-9757. H. Nurmi, Voting systems for social choice, Handbook of H. Farhangi, The path of the smart grid, Power and Energy Group Decision and Negotiation (2010) 167 -- 182. Magazine, IEEE 8 (1) (2010) 18 -- 28. S. Russell, P. Norvig, Artificial Intelligence: A Modern Ap- S. D. Ramchurn, P. Vytelingum, A. Rogers, N. R. Jennings, Putting the'smarts' into the smart grid: a grand challenge for artificial intelligence, Communications of the ACM 55 (4) (2012) 86 -- 97. F. M. Brazier, F. Cornelissen, R. Gustavsson, C. M. Jonker, O. Lindeberg, B. Polak, J. Treur, A multi-agent system performing one-to-many negotiation for load balancing of electricity use, Electronic Commerce Research and Appli- cations 1 (2) (2002) 208 -- 224. S. Lamparter, S. Becher, J.-G. Fischer, An agent-based mar- ket platform for smart grids, in: Proceedings of the 9th In- ternational Conference on Autonomous Agents and Multi- agent Systems: Industry track, International Foundation for Autonomous Agents and Multiagent Systems, 1689 -- 1696, 2010. H. Morais, T. Pinto, Z. Vale, I. Pra¸ca, Multilevel negotia- tion in smart grids for VPP management of distributed resources, IEEE Intelligent Systems 27 (6) (2012) 8 -- 16. M. Korsgaard, D. Schweiger, H. Sapienza, Building commit- ment, attachment, and trust in strategic decision-making teams: The role of procedural justice, Academy of Man- agement Journal (1995) 60 -- 84. V. Sanchez-Anguix, V. Julian, V. Botti, A. Garcia-Fornes, Analyzing Intra-Team Strategies for Agent-Based Nego- tiation Teams, in: 10th International Conference on Au- tonomous Agents and Multiagent Systems (AAMAS'11), 929 -- 936, 2011. proach, Pearson Education, 2003. R. Lin, S. Kraus, T. Baarslag, D. Tykhonov, K. Hindriks, C. M. Jonker, Genius: An Integrated Environment for Supporting the Design of Generic Automated Negotiators, Computational Intelligence (2012) In Press. T. Baarslag, K. V. Hindriks, C. M. Jonker, Towards a Quan- titative Concession-Based Classification Method of Nego- tiation Strategies, in: Agents in Principle, Agents in Prac- tice. Lecture Notes of The 14th International Conference on Principles and Practice of Multi-Agent Systems, 143 -- 158, 2011. S. Kawaguchi, K. Fujita, T. Ito, Compromising Strategy Based on Estimated Maximum Utility for Automated Ne- gotiation Agents Competition (ANAC-10), in: Modern Approaches in Applied Intelligence, vol. 6704, Springer Berlin / Heidelberg, 501 -- 510, 2011. T. Baarslag, K. V. Hindriks, C. M. Jonker, A Tit for Tat Negotiation Strategy for Real-Time Bilateral Negotia- tions, vol. 435 of Studies in Computational Intelligence, Springer Berlin Heidelberg, 229 -- 233, 2013. H. Ehtamo, E. Kettunen, R. P. Hamalainen, Searching for joint gains in multi-party negotiations, European Journal of Operational Research 130 (1) (2001) 54 -- 69. V. Narayanan, N. R. Jennings, Learning to Negotiate Op- timally in Non-stationary Environments, in: Cooperative Information Agents X, 10th International Workshop, CIA 2006, Edinburgh, UK, September 11-13, 2006, Proceed- 37 ings, vol. 4149 of Lecture Notes in Computer Science, Springer, 288 -- 300, 2006. R. Carbonneau, G. Kersten, R. Vahidov, Predicting oppo- nent's moves in electronic negotiations using neural net- works, Expert Systems with Applications 34 (2) (2008) 1266 -- 1273. R. A. Carbonneau, G. E. Kersten, R. M. Vahidov, Pair- wise issue modeling for negotiation counteroffer prediction using neural networks, Decision Support Systems 50 (2) (2011) 449 -- 459. V. Robu, J. A. La Poutr´e, Retrieving the Structure of Utility Graphs Used in Multi-Item Negotiation through Collab- orative Filtering of Aggregate Buyer Preferences, in: Ra- tional, Robust and Secure Negotiations, vol. 89 of Com- putational Intelligence, Springer, 2008. C. R. Williams, V. Robu, E. H. Gerding, N. R. Jennings, Negotiating Concurrently with Unknown Opponents in Complex, Real-Time Domains, in: 20th European Con- ference on Artificial Intelligence, vol. 242, 834 -- 839, 2012. K. Mansour, R. Kowalczyk, A Meta-Strategy for Coordi- nating of One-to-Many Negotiation over Multiple Issues, in: Foundations of Intelligent Systems, vol. 122, Springer Berlin / Heidelberg, ISBN 978-3-642-25663-9, 343 -- 353, 2012. 38
cs/9809036
1
9809
1998-09-20T12:48:43
Document Archiving, Replication and Migration Container for Mobile Web Users
[ "cs.MA", "cs.MM" ]
With the increasing use of mobile workstations for a wide variety of tasks and associated information needs, and with many variations of available networks, access to data becomes a prime consideration. This paper discusses issues of workstation mobility and proposes a solution wherein the data structures are accessed in an encapsulated form - through the Portable File System (PFS) wrapper. The paper discusses an implementation of the Portable File System, highlighting the architecture and commenting upon performance of an experimental system. Although investigations have been focused upon mobile access of WWW documents, this technique could be applied to any mobile data access situation.
cs.MA
cs
Document Archiving, Replication and Migration Container for Mobile Web Users Abstract With the increasing use of mobile workstations for a wide variety of tasks and associated information needs, and with many variations of available networks, access to data becomes a prime consideration. This paper discusses issues of workstation mobility and proposes a solution wherein the data structures are accessed in an encapsulated form - through the Portable File System (PFS) wrapper. The paper discusses an implementation of the Portable File System, the architecture and commenting upon highlighting performance of an experimental system. Although investigations have been focused upon mobile access of WWW documents, this technique could be applied to any mobile data access situation. file-system, replication, archiving, Keywords: server, mobility 1. Introduction :• • • 2. Distributed File Systems Approach P e t e r S t a n s k i , S t e p h e n G i l e s a n d A r k a d y Z a s l a v s k y D e p a r t m e n t o f C o m p u t e r T e c h n o l o g y , M o n a s h U n i v e r s i t y 9 0 0 D a n d e n o n g R o a d , C a u l f i e l d E a s t , V i c 3 1 4 5 , A u s t r a l i a { p s t a n s k i , s g i l e s , a z a s l a v s } @ b r o n c h o . c t . m o n a s h . e d u . a u T h e m o b i l e w o r k s t a t i o n s u c h a s P e r s o n a l D i g i t a l A s s i s t a n t ( P D A ) o r n o t e b o o k , h a v e b e c o m e i n d i s p e n s a b l e t o o l s f o r t h e t r a v e l i n g b u s i n e s s p e r s o n . P e r s o n a l c o m m u n i c a t i o n d e v i c e s s u c h a s t h e A p p l e N e w t o n , U S R o b o t i c s / 3 C O M P I L O T , N o k i a C o m m u n i c a t o r 9 0 0 0 , a l o n g w i t h a p l e t h o r a o f P D A s r u n n i n g W i n d o w s C E , o f f e r n e t w o r k c o n n e c t i v i t y w i t h a l i m i t e d b a n d w i d t h . T h e s e d e v i c e s a r e o f t e n u s e d t o c o n n e c t t o t h e I n t e r n e t f o r a v a r i e t y o f a p p l i c a t i o n s r a n g i n g f r o m e m a i l t o W o r l d W i d e W e b a c c e s s . M a n y o r g a n i z a t i o n s a r e a p p e a r i n g o n t h e w e b d a i l y . T h e y o f f e r g e n e r a l u s e r a c c e s s f o r a d v e r t i s i n g a n d m a r k e t i n g , w h i l e a l l o w i n g i n t e r n a l s t a f f t o a c c e s s m o r e c o n f i d e n t i a l i n f o r m a t i o n . T h e t r a v e l i n g b u s i n e s s p e r s o n o f t e n m a k e s u s e o f t h e w e b t o p r o v i d e p r o d u c t i n f o r m a t i o n v i a a w i r e l e s s n e t w o r k . W i r e l e s s m o b i l e c o m p u t i n g i s p r o n e t o d r o p o u t s a n d m a y o f f e r l i m i t e d c o v e r a g e . T h i s m a y o c c a s i o n a l l y l e a v e s t h e u s e r w i t h o u t n e t w o r k a c c e s s , a n d f o r c e t h e b r o w s e r t o o f f e r t h o s e d o c u m e n t s w h i c h a r e i n t h e c a c h e . S o m e u s e r s p l a n a h e a d , a n d w e b - c o p y d o c u m e n t s f r o m t h e i r o r g a n i z a t i o n ’ s s e r v e r t o t h e i r m o b i l e m a c h i n e . A c o m m o n s o l u t i o n i n v o l v e s r e p l i c a t i n g t h e n e c e s s a r y f i l e s a l o n g w i t h t h e i r s u b - d i r e c t o r i e s . T h i s p r o c e d u r e o f t e n l e a v e s t h e u s e r w i t h a s i g n i f i c a n t n u m b e r o f f i l e s s c a t t e r e d o n l o c a l s t o r a g e . T o a c h i e v e t h i s , t h e u s e r h a s s e v e r a l w a y s t o r e p l i c a t e a s e r v e r ’ s d i r e c t o r y t r e e I n t e r a c t i v e l y f o l l o w e v e r y l i n k w h i l e s a v i n g t h e m t o l o c a l s t o r a g e ( f i l e n a m e s n e e d t o b e k n o w n i n a d v a n c e ) ; U s e a n a u t o m a t e d w e b - c o p y t o o l t o d u p l i c a t e t h e r e q u i r e d w e b t r e e ; F T P r e q u i r e d d o c u m e n t s t o l o c a l s t o r a g e ( a c c e s s p e n d i n g ) . H T M L ’ s o p e n a r c h i t e c t u r e a n d d o c u m e n t b u i l d i n g f r o m d i s t r i b u t e d f i l e s i s f l e x i b l e b u t d o e s n o t e x p l i c i t l y s t a t e f i l e r e l a t i o n s h i p s u n t i l t h e y a r e c l o s e l y e x a m i n e d o r v i e w e d . A m i s s i n g r o o t d o c u m e n t m a y i n t r o d u c e a s e v e r e u s e r i n c o n v e n i e n c e i f n o t d u p l i c a t e d . I n t h i s p a p e r w e p r o p o s e a n e w a p p r o a c h t o w e b d o c u m e n t m a n a g e m e n t . W e i n t r o d u c e t h e c o n c e p t o f a d o c u m e n t w r a p p e r w h i c h p a c k a g e s e n t i r e w e b s e r v e r s s i t e s o r p a r t s o f t h e i r d i r e c t o r y t r e e . P a c k a g e d d o c u m e n t s a r e p l a c e d i n a s i n g l e f i l e w h i l e p e r m i t t i n g l i v e a c c e s s t o t h e a r c h i v e d f i l e s . T h e f o l l o w i n g s e c t i o n s p r e s e n t s p o s s i b l e s o l u t i o n s t o t h e r e p l i c a t i o n p r o b l e m a n d a n a l t e r n a t i v e t o d i s c o n n e c t e d o p e r a t i o n s . I n l a t e r s e c t i o n s w e d i s c u s s o u r p r o j e c t i m p l e m e n t a t i o n , f u t u r e e x t e n s i o n s a n d r e l a t e d w o r k . T h e d i s c o n n e c t e d o p e r a t i o n s p r o b l e m h a s a l r e a d y b e e n a d d r e s s e d i n s o m e d i s t r i b u t e d f i l e s y s t e m s . D i s c o n n e c t i o n p r o b l e m s a s s o c i a t e d w i t h S u n ’ s N F S , t h e A n d r e w F i l e S y s t e m [ 1 ] a n d F i c u s [ 6 ] l e a d t o t h e d e v e l o p m e n t o f t h e C o d a f i l e s y s t e m a t C a r n e g i e M e l l o n U n i v e r s i t y [ 3 ] . F i c u s i s a d i s t r i b u t e d U N I X f i l e s y s t e m d e v e l o p e d a t t h e U n i v e r s i t y o f C a l i f o r n i a , L o s A n g e l e s . I t e m p l o y s a p e e r - t o - p e e r f i l e s h a r i n g m o d e l a n d o f f e r s m u l t i p l e f i l e r e p l i c a t i o n . I n c a s e s o f a n o d e d i s c o n n e c t i o n , t h e c l o s e s t c o p y o f t h e r e q u e s t e d f i l e i s u s e d . F i l e m o d i f i c a t i o n s t o a l o c a l c o p y a r e a d v e r t i s e d t o a l l o t h e r n o d e s o n c e c o m m u n i c a t i o n i s r e - 4. Document Archiving and Storage 2.1 Using Local Replicas 4.1 Web Document Wrapper 3. Link Related Issues e s t a b l i s h e d . F i c u s d i f f e r s f r o m C o d a i n t h a t i t i s a p e e r - t o - p e e r s y s t e m a s o p p o s e d t o a c l i e n t - s e r v e r e n v i r o n m e n t . C o d a a l l o w s f o r d i s c o n n e c t e d o p e r a t i o n b y m a i n t a i n i n g a s m a l l ( a p p r o x i m a t e l y 5 0 M b ) s t o r a g e c a c h e o n e a c h w o r k s t a t i o n . D u r i n g d i s c o n n e c t e d p e r i o d s , C o d a w o u l d e n t e r e m u l a t i o n m o d e a n d l o g l o c a l f i l e a c c e s s . U p o n r e c o n n e c t i o n , C o d a w o u l d e n t e r r e i n t e g r a t i o n m o d e , a n d r e s o l v e c a c h e d f i l e m o d i f i c a t i o n s w i t h t h e p r i m a r y c o p y b y p l a y i n g t h o u g h t h e l o g . C o d a i s a n a w k w a r d s c h e m e t o i m p l e m e n t a s i t r e q u i r e s s i g n i f i c a n t m o d i f i c a t i o n s t o a n e x i s t i n g f i l e s y s t e m . A d d i t i o n a l l y , i m p l e m e n t a t i o n o f a C o d a l i k e f i l e s y s t e m c a c h i n g i n t o e v e r y c l i e n t d e v i c e m a y n o t a l w a y s b e p o s s i b l e o r w o r t h w h i l e . A s i m i l a r f i l e s y s t e m b a s e d o n C o d a , i s t h e H y b r i d F i l e s y s t e m f o r m o b i l e w o r k s t a t i o n s [ 7 ] . D e v e l o p e d a t t h e U n i v e r s i t y o f N o t r e D a m e . I t c o m b i n e s i d e a s f r o m F i c u s a n d C o d a , b y a l l o w i n g p e e r - t o - p e e r f i l e s h a r i n g a n d C o d a l i k e o p e r a t i o n w h i l e d i s c o n n e c t e d f r o m a f i l e s e r v e r . I t i s a s u p e r s e t t o C o d a , a s i t e m p l o y s C o d a ’ s c o d e b a s e a n d e x t e n d s i t t o p r o v i d e p e e r s h a r i n g . E s s e n t i a l l y , o u r n e e d s f o r d i s c o n n e c t e d o p e r a t i o n s a r e a d d r e s s e d b y C o d a a l o n e . U s i n g C o d a m a y a p p e a r a s a n e x c e s s i v e a p p r o a c h . I t r e q u i r e s a s h a r e d f i l e s y s t e m w h i c h d i f f e r s f r o m t h e o p e r a t i o n s o f t h e W e b . W e p r o p o s e t h i s a p p r o a c h m a i n l y b e c a u s e b r o w s e r s a r e c a p a b l e o f o p e n i n g l o c a l l y s t o r e d f i l e s w h i c h m a y e x i s t o n r e m o t e m o u n t s . T h i s t e c h n i q u e e x t e n d s b e y o n d t h e b r o w s e r ’ s o p e r a t i o n a n d a l l o w s o t h e r a p p l i c a t i o n s t o u s e t h e s e f a c i l i t i e s w h i l e d i s c o n n e c t e d . F i l e s l o c a t e d o n t h e w e b s e r v e r w o u l d a p p e a r a s l o c a l t h e r e f o r e p e r m i t t i n g a p p l i c a t i o n s t o l o a d s e l e c t e d d o c u m e n t s . C u r r e n t l y c o m p a n i e s a n d s o m e u n i v e r s i t i e s d e l i v e r W e b d o c u m e n t s v i a a C D w h i c h i s a m u c h s i m p l e r a p p r o a c h t h e n d i s t r i b u t e d f i l e s y s t e m s . T h e f i r s t g e n e r a t i o n o f C D s p r o v i d e d d o c u m e n t a t i o n w i t h a w e b l i k e i n t e r f a c e w h i l e t h e c u r r e n t r e l e a s e s a r e h y b r i d s . T h e s e a l l o w l o c a l b r o w s i n g w h i l e m a i n t a i n i n g a b s o l u t e U R L l i n k s t o f r e q u e n t l y c h a n g i n g i n f o r m a t i o n . T h e s e s o l u t i o n s a r e o f t e n i d e a l b u t r e f l e c t a s s o c i a t e d c o s t s o f m a n u f a c t u r i n g . A n o t h e r a l t e r n a t i v e i s t o p r o v i d e l o c a l d o c u m e n t c o p i e s i n v o l a t i l e s t o r a g e . T h e s e a r e c h e a p e r t h a n C D - R O M m a s t e r i n g f o r m o d e s t s i z e d d o c u m e n t v o l u m e s . F o r s m a l l s i z e d r e p l i c a s , t h e i r i m p a c t o n l o c a l s t o r a g e m a y n o t b e s i g n i f i c a n t . W h i l e l a r g e d o c u m e n t r e p l i c a s m a y s u b s t a n t i a l l y i m p a c t a f i l e s y s t e m . S i n c e w e b d o c u m e n t s a r e c o m p o s e d o f s e v e r a l s m a l l f i l e s , t h e s e c o u l d p o t e n t i a l l y c o n s u m e m o r e d i s k s p a c e t h e n r e q u i r e d b e c a u s e o f i - n o d e o r c l u s t e r s i z e s . M o s t l i n k s w i t h i n d o c u m e n t s a r e r e l a t i v e , m e a n i n g t h a t i m a g e s e m b e d d e d i n t h e d o c u m e n t a r e l o c a t e d r e l a t i v e t o t h e H T M L ’ s l o c a t i o n . D u p l i c a t i n g t h e s e d o c u m e n t s d o n o t p r e s e n t a p r o b l e m , p r o v i d e d t h e d i r e c t o r y s t r u c t u r e s a r e m a i n t a i n e d . W h i l e a b s o l u t e l i n k a d d r e s s i n g i s u s e d t o p o i n t a b r o w s e r a t a r e m o t e s i t e a s i t s p e c i f i e s a w h o l e U R L . M a n y w e b a u t h o r s u s e a b s o l u t e l i n k s t o t h e i r o w n s i t e a n d u n k n o w i n g l y c r e a t e d o c u m e n t s w h i c h a r e d i f f i c u l t t o c o p y . S u c h a b s o l u t e l i n k s p r e s e n t a p r o b l e m f o r s i m p l e d o c u m e n t r e p l i c a t i o n . T h e y a l s o f o r c e t h e b r o w s e r t o o b t a i n d o c u m e n t s v i a H T T P w h i c h b r e a k s o p e r a t i o n s w h i l e o p e n i n g l o c a l f i l e s . I t s h o u l d b e n o t e d t h a t m o s t w e b - c o p y t o o l s , a r e i n t e l l i g e n t a n d r e p l a c e a b s o l u t e l i n k s w i t h r e l a t i v e l i n k s r e f l e c t i n g t h e d o c u m e n t s n e w l o c a t i o n . S u c h t o o l s s i g n i f i c a n t l y a i d i n w e b a u t h o r i n g a n d r e p l i c a t i o n . A n o t h e r a l t e r n a t i v e i s t o a d o p t a n a u t h o r i n g s t a n d a r d f o r a s i t e w h e r e a l l d o c u m e n t s u s e r e l a t i v e l i n k s . M a n y u s e r s a r e f a m i l i a r w i t h a r c h i v i n g u t i l i t i e s s u c h a s p k z i p a n d t a r . T h e s e c o l l e c t f i l e s a n d p u t t h e m i n t o a s i n g l e p a c k a g e . C u r r e n t l y t h e r e a r e n o t o o l s w h i c h a l l o w w e b d o c u m e n t a r c h i v a l a n d e a s y r e t r i e v a l . I t i s p o s s i b l e t o u s e t h e a b o v e m e n t i o n e d t o o l s b u t u n t i l n o w , s e r v e r s d i d n o t h a v e h o o k s i n t o t h e s e p r o g r a m s t o p r o v i d e s e a m l e s s i n t e g r a t i o n . T h r o u g h t h e u s a g e o f a p a c k a g i n g t o o l i t w o u l d b e p o s s i b l e t o c o m b i n e a l l t h e n e c e s s a r y w e b d o c u m e n t s i n t o a s i n g l e f i l e . T h i s w o u l d m a k e d o c u m e n t d i s t r i b u t i o n a n d r e p l i c a t i o n m u c h e a s i e r f o r a u s e r a n d p e r m i t a d m i n i s t r a t o r s t o a r c h i v e a g i n g d o c u m e n t s . W e p r o p o s e t h e p a c k a g i n g a p p r o a c h a s a s o l u t i o n t o s i m p l i f y w e b d o c u m e n t r e p l i c a t i o n , m i n i m i z e t h e i m p a c t o n a l o c a l f i l e s y s t e m a n d a s s i s t i n s i t e a r c h i v a l w h i l e m a i n t a i n i n g i t s w e b d o c u m e n t p r e s e n c e . T h e w e b d o c u m e n t w r a p p e r n a m e d t h e P o r t a b l e F i l e S y s t e m ( P F S ) , h a s b e e n d e v e l o p e d a s a p a r t o f t h e o n g o i n g P E S O S p r o j e c t a t M o n a s h U n i v e r s i t y [ 8 ] . P F S o r i g i n a t e d a s a c o n t a i n e r f o r c o l l e c t i n g m o b i l e a g e n t c o m p o n e n t f i l e s i n t o a s i n g l e m i g r a t i o n a r c h i v e . C o m b i n i n g c o m p o n e n t i n t o o n e f i l e r e d u c e d m i g r a t i o n c o m p l e x i t y a n d a l l o w e d f o r g r e a t e r m a n a g e a b i l i t y . I n t h e c a s e o f H T M L d o c u m e n t s , t h e P F S c o n t e n t s a r e t h o s e o f w e b d o c u m e n t s d u p l i c a t e d f r o m a n e x i s t i n g w e b s e r v e r . F i g u r e 1 b e l o w , s h o w s t h e P F S c o n t e n t s f o r a s i m p l e d i r e c t o r y t r e e . T h r o u g h t h e u s e o f P F S w r a p p e r s , w h o l e o r p a r t i a l d i r e c t o r y t r e e s m a y b e a r c h i v e d , b e c o m e o r g a n i z e d b y c o l l a p s i n g s u b d i r e c t o r i e s w h i l e m a i n t a i n i n g t h e i r c o n t e n t s i n t a c t . I n t h e c a s e o f F i g u r e 1 , a s i n g l e P F S f i l e c o u l d r e p l a c e a l l e x i s t i n g f i l e s i n a g i v e n A c c o u n t s d i r e c t o r y a l o n g w i t h I m a g e s , D e p t 1 a n d D e p t 2 s u b d i r e c t o r i e s . T h i s e x a m p l e r e f l e c t s t h e e m b e d d a b l e a n d r e m o t e r e f e r e n c i n g f a c i l i t i e s o f f e r e d b y a P F S w r a p p e r . T r a d i t i o n a l f i l e a r c h i v i n g t o o l s h a v e r e l i e d o n e m b e d d i n g a l l f i l e s w i t h i n t h e a r c h i v e f i l e i t s e l f . O u r e x t e n d e d a p p r o a c h t o a r c h i v i n g a l l o w s f o r d o c u m e n t s t o b e r e m o t e l y r e f e r e n c e d u s i n g s t a n d a r d I n t e r n e t p r o t o c o l s . F i g u r e 1 d e p i c t s t w o i m a g e f i l e s a s b e i n g s t o r e d a t t h e A B C . C O M s i t e , w h i c h m a y b e o b t a i n e d u s i n g H T T P o r F T P p r o t o c o l s . F o r m a j o r i t y o f u s e r s r e m o t e f i l e r e f e r e n c i n g w i l l n o t b e n e c e s s a r y a s t h e y s h a l l r e q u i r e r e m o t e f i l e s t o a l w a y s b e a v a i l a b l e . I n c a s e s w h e r e a u s e r w i s h e s t o s a c r i f i c e c o n t e n t / Accounts/ ACCOUNT-SITE.PFS Public/ Other/ index.html /IMAGES logo.gif graph.jpg /Dept1 ………. /Dept2 ………. Figure 1: Directory structure within a PFS wrapper 4.1 Internal PFS Structure 5. Accessing PFS Contents get Figure 2: Format of a GET URL with a PFS reference P F S f i l e n a m e p a t h / f i l e n a m e “index.html” “account-site.pfs” 5.1 Obtaining PFS Packages Figure 3: URL to obtain the PFS wrapper file P F S f i l e n a m e 6. Internal PFS Access and Implementation As an Archive: As a File System: Within a Proxy: f o r a v a i l a b i l i t y a n d s i z e , i t w o u l d b e p o s s i b l e f o r t h e a r c h i v e t o c o n t a i n e m b e d d e d t e x t u a l i n f o r m a t i o n w h i l e a l l o p t i o n a l f i l e s ( i m a g e s ) w o u l d b e r e m o t e l y t a g g e d w i t h i n t h e P F S . I n t h i s s c e n a r i o , u s e r s e x p e r i e n c i n g n e t w o r k d r o p o u t s w o u l d o n l y a c c e s s l o c a l l y a v a i l a b l e H T M L d o c u m e n t s w i t h o u t o b t a i n i n g t h e r e m o t e g r a p h i c a l c o n t e n t . A B C . C O M H T T P F T P T o m a i n t a i n c o m p a t i b i l i t y w i t h f u t u r e P F S r e v i s i o n s , t h e i n t e r n a l s t r u c t u r e h a s b e e n k e p t o p e n . T h i s p e r m i t s f u t u r e w r a p p e r i m p r o v e m e n t s w h i l e m a i n t a i n i n g b a c k w a r d c o m p a t i b i l i t y . T o a c h i e v e o p e n s t r u c t u r e t h e f i l e d e f i n i t i o n s a n d s t o r a g e a r e a h y b r i d A S C I I - B i n a r y f o r m a t . A l l e m b e d d e d f i l e s m a y b e s t o r e d a s u u e n c o d e d / r a w - b i n a r y c o n t e n t s , w h i l e f i l e d e s c r i p t i o n s a r e d e s c r i b e d i n p l a i n t e x t . T e x t u a l d e s c r i p t i o n s a l l o w e n c o d i n g / d e c o d i n g c o d e t o i n t e r p r e t t a g s w h i c h h a v e s e m a n t i c s r e l e v a n t t o a s o f t w a r e r e v i s i o n . A s a m p l e P F S d e s c r i p t i o n f o r a r e m o t e l y t a g g e d f i l e i s g i v e n b e l o w a l o n g w i t h t h e w r a p p e r h e a d e r : P F S ! v e r s i o n = 1 . 0 d a t e = 2 5 - 0 6 - 9 7 . . . . . . [ E N T I T Y ] o r i g i n a l n a m e = C : \ P r o g r a m F i l e s \ W I N Z I P \ V e n d o r . t x t l o n g n a m e = V e n d o r . t x t s h o r t n a m e = V e n d o r . t x t d i r n a m e = ; P F S d i r e c t o r y ( r o o t ) c r e a t e d = 1 4 - 0 8 - 9 5 6 : 0 0 : 0 0 A M l e n g t h = 2 9 5 2 ; p h y s i c a l f i l e l e n g t h o r i g i n = W i n d o w s 9 5 ; c r e a t e d W i n - P F S u t i l v e r 1 . 0 d e s c r i p t i o n = T h i s i s t h e V e n d o r s m e s s a g e f i l e r e m o t e r e a d h o s t = h t t p : / / a s t r a l . c t . m o n a s h . e d u . a u / ~ f i l e s / v e n d o r . t x t m o d e = R O ; r e a d - o n l y a c c e s s s t o r a g e = r e m o t e ; s t o r e d o n r e m o t e h o s t . . . . . . [ E N T I T I Y ] I n o r d e r t o m a k e u s e o f P F S w r a p p e r s a n d d i r e c t o r y c o l l a p s i n g , s m a l l c h a n g e s h a v e t o b e i n t r o d u c e d t o t h e w a y w e b s e r v e r s r e s o l v e a U R L s p e c i f y i n g a P F S p a t h . A H T T P c l i e n t i s s u i n g a r e q u e s t , s p e c i f i e s t h e f i l e t o b e t r a n s f e r r e d . I n t h e c a s e o f F i g u r e 2 , t h e U R L i n c o r p o r a t e s a H T M L f i l e t o b e f o u n d w i t h i n a P F S . U n d e r n o r m a l c i r c u m s t a n c e s , a s e r v e r i s r e q u i r e d t o e s t a b l i s h t h e p h y s i c a l p a t h f r o m t h e U R L . I n t h i s c a s e i t w o u l d r e s u l t i n a “ 4 0 4 E r r o r : n o t f o u n d ” w h e n p r o c e s s e d b y a s t a n d a r d s e r v e r . T h i s i s a s s u m i n g t h a t a d i r e c t o r y d o e s n o t e x i s t w i t h a n i d e n t i c a l n a m e a s t h e P F S . h t t p : / / b r o n c h o . c t . m o n a s h . e d u . a u / ~ p s t a n s k i / a c c o u n t - s i t e . p f s / i n d e x . h t m l O u r p r o t o t y p e s e r v e r p a r s e s t h e U R L a n d e s t a b l i s h e s i f t h e r e q u e s t e d f i l e i s a p a r t o f a P F S p a c k a g e . I n t h e c a s e o f t h e a b o v e U R L , w o u l d b e s e a r c h e d i n s i d e t h e f i l e . I f f o u n d , t h e f i l e w o u l d b e s e n t t o t h e c l i e n t , o r f a i l w i t h a n e r r o r s u c h a s f i l e n o t f o u n d . T h e p a r s i n g m o d i f i c a t i o n s m a k e o u r i m p l e m e n t a t i o n t r a n s p a r e n t t o t h e c l i e n t u s e r . I n o r d e r t o o b t a i n P F S p a c k a g e s w h i c h c o n t a i n a w e b s e r v e r ’ s d i r e c t o r y t r e e , a c l i e n t m a y r e q u e s t t h e w r a p p e r f i l e a s s p e c i f i e d i n F i g u r e 3 . T h e a p p r o p r i a t e M I M E t y p e i s s e t t o a l l o w f o r a b i n a r y f i l e t r a n s f e r t o t h e c l i e n t ’ s b r o w s e r . h t t p : / / b r o n c h o . c t . m o n a s h . e d u . a u / ~ p s t a n s k i / a c c o u n t - s i t e . p f s P r i o r t o o u r P F S s e r v e r e x t e n s i o n s , u s e r s h a d t w o w a y s o f o b t a i n i n g w e b d o c u m e n t s v i a H T T P . T h e y c o u l d d o w n l o a d e a c h p a g e a n d i t s e m b e d d e d i m a g e s b y h a n d , o r u s e a n a u t o m a t e d t o o l w h i c h w o u l d d o i t f o r t h e m . P F S n o w a l l o w s f o r o b t a i n i n g a r c h i v e d d o c u m e n t s a n d t o v i e w t h e m s e a m l e s s l y . A c c e s s w i t h i n a P F S p a c k a g e m a y b e i m p l e m e n t e d i n a v a r i e t y o f w a y s . T h e f o l l o w i n g b r i e f l y d e s c r i b e s s o m e p o s s i b l e a l t e r n a t i v e s : T h e p a c k a g e c o u l d b e v i e w e d a n d h a v e t h e d o c u m e n t s e x t r a c t e d b y a P F S m a n a g e m e n t u t i l i t y ( p f s u t i l ) . T h i s i s i d e n t i c a l t o a c c e s s i n g a t a r o r z i p a r c h i v e . A r e c e i v e d P F S c o u l d b e e x t r a c t e d w i t h d i r e c t o r y e n t r i e s , a n d b r o w s e d l o c a l l y . F i l e s t a g g e d a s r e m o t e a n d m a i n t a i n e d o n a c e n t r a l s e r v e r , c o u l d s e a m l e s s l y b e c o m e a v a i l a b l e f o r u s e r s a s s o o n a s t h e y b e c a m e a v a i l a b l e o n t h e s e r v e r . T h r o u g h t h e d e v e l o p m e n t o f a n i n s t a l l a b l e f i l e s y s t e m , a P F S f i l e c o u l d b e m o u n t e d a s a v o l u m e i n a U N I X e n v i r o n m e n t . I n t h e c a s e o f D O S / W i n d o w s , a R A M d r i v e c o u l d p r o v i d e a c c e s s . T h i s i s p e r h a p s t h e m o s t f l e x i b l e a p p r o a c h , a l l o w i n g a n y a p p l i c a t i o n t o b r o w s e a m o u n t e d d o c u m e n t p a c k a g e . T h e r e m o t e t a g g i n g o f f i l e s w o u l d c r e a t e a r e a d - o n l y d i s t r i b u t e d f i l e s y s t e m . A H T T P p r o x y c o u l d b e e x t e n d e d t o p r o v i d e a d v a n c e d c a c h i n g f a c i l i t i e s f o r a n e n t i r e w e b s i t e . P F S c r e a t o r s w o u l d h a v e t h e p o s s i b i l i t y o f m a i n t a i n i n g s t a t i c i n f o r m a t i o n a s e m b e d d e d f i l e s w h i l e f r e q u e n t l y c h a n g i n g f i l e c o n t e n t s c o u l d b e t a g g e d a s r e m o t e f i l e s . W e b c l i e n t s u s i n g a p r o x y w o u l d o n l y n e e d t o o b t a i n r e m o t e Within a Server: HTTP HTTP Fig.4: Local implementation of PFS handling is done by Boa WWW server 6.1 Server Performance 6.2 Future Extensions Figure 5. Sample “DIET.PFS” wrapper used for performance testing Original Server Access to a normal page 2.5 sec Access to page within PFS --- 7. Related Work 2.5 sec PFS Compliant Server Table 1: Access times for web page- 3 files using 26180 bytes in total 2.5 sec f i l e s a s n e e d e d , w i t h e m b e d d e d f i l e s b e i n g r e t u r n e d b y t h e l o c a l p r o x y . P r o v i d e b r o w s i n g a n d d o c u m e n t r e t r i e v a l a s d e s c r i b e d i n t h e p r e v i o u s s e c t i o n s . I n o u r i m p l e m e n t a t i o n w e o p t e d f o r t h e s e r v e r o p t i o n . W e u s e d a f r e e l y a v a i l a b l e w e b s e r v e r c a l l e d B o a ( v 0 . 9 2 ) . O r i g i n a l l y d e v e l o p e d b y P a u l P h i l i p s a s i t a p p e a r e d s u i t a b l e a n d e a s i l y e x t e n d i b l e . B o a + P F S a s i t i s n o w c a l l e d , r u n s u n d e r t h e L i n u x 2 . 0 o p e r a t i n g s y s t e m . F i g u r e 4 . 0 , p r o v i d e s a n o v e r v i e w o f o u r i m p l e m e n t e d a r c h i t e c t u r e . W W W B r o w s e r W W W S e r v e r P F S W r a p p e r L o c a l H T M L F i l e s L o c a l H T M L W W W S e r v e r P F S H T M L P F S f i l e s h e l d l o c a l l y a r e a c c e s s e d t h r o u g h a b r o w s e r b y s p e c i f y i n g t h e i r l o c a l U R L . T h e s e r e q u i r e a p p r o p r i a t e p e r m i s s i o n s t o b e s e t i n o r d e r t o b e a c c e s s i b l e b y B o a . T h e l o c a l B o a s e r v e r , b r o w s e s t h e s p e c i f i e d f i l e a n d r e t u r n s d o c u m e n t s h e l d w i t h i n t h e m . A d d i t i o n a l l y , a r e m o t e B o a s e r v e r m a y b e u s e d t o p r o v i d e t h e s a m e f u n c t i o n a l i t y . N e w a d d i t i o n s t o s e r v e r s o f t e n i m p a c t o n t h e i r p e r f o r m a n c e . T h e r e f o r e , m o d i f i c a t i o n s t o f i l e h a n d l i n g a n d r e t r i e v a l a l g o r i t h m s a r e l i k e l y t o i n c r e a s e t h e c u r r e n t s e r v e r ’ s p r o c e s s i n g o v e r h e a d s . I n o u r c a s e w e t e s t e d s e r v e r p e r f o r m a n c e o n a n C S M A / C D ( e t h e r n e t ) L A N , w i t h t h e s e r v e r a n d c l i e n t w o r k s t a t i o n . T h e s e r v e r w a s a P e n t i u m 1 2 0 M h z n o t e b o o k a n d t h e c l i e n t a 4 8 6 D X / 1 0 0 M h z d e s k t o p s y s t e m . T h e f o l l o w i n g r e s u l t s w e r e o b t a i n e d f o r t h e o r i g i n a l v e r s i o n o f t h e s e r v e r ( v 0 . 9 2 ) a n d t h e P F S c o m p l i a n t s e r v e r ( v 0 . 9 3 ) : W e r a n t h e t e s t 1 0 t i m e s a n d o b t a i n e d t h e f o l l o w i n g a v e r a g e v a l u e s . I n o u r e x p e r i e n c e , w e f o u n d n o r e d u c t i o n i n t h e s e r v e r ’ s p e r f o r m a n c e . A c c e s s i n g d o c u m e n t s w i t h i n t h e P F S w r a p p e r a s o p p o s e d t o n o n - w r a p p e d d o c u m e n t s y i e l d s t h e s a m e r e s u l t s . T h e r e i s i n f a c t a n o v e r h e a d i n c o d e , b u t i t d o e s n o t i m p a c t o n s e r v e r p e r f o r m a n c e . I n o u r i m p l e m e n t a t i o n , w e u s e a l i n e a r f i l e s e a r c h i n g a l g o r i t h m w h i c h i s n o t n o t i c e a b l e f o r s m a l l P F S c o n t a i n e r s . W e s u s p e c t t h a t t h e s e r v e r m a y s l o w d o w n a n d w r a p p e r a c c e s s m a y b e c o m e n o t i c e a b l e f o r l a r g e p a c k a g e s c o n t a i n i n g h u n d r e d s o f f i l e s . F i g u r e 5 , s h o w s t h e t e s t p a g e u p o n w h i c h w e b a s e d o u r t i m i n g s . I t s h o w s a b r o w s e r l o o k i n g i n s i d e a s a m p l e p a g e w h i c h i s h e l d w i t h i n a r e m o t e “ d i e t . p f s ” p a c k a g e . F u t u r e i m p l e m e n t a t i o n s a n d e x t e n s i o n s , m a y p r o v i d e a f a s t e r d i r e c t o r y l o o k u p s t r u c t u r e i n s t e a d o f t h e c u r r e n t l i n e a r s e a r c h . W e a r e e x t e n d i n g t h e i n t e r n a l P F S f i l e f o r m a t t o a l l o w f o r f u t u r e f o r m a t e x t e n s i o n s w h i l e m a i n t a i n i n g b a c k w a r d s c o m p a t i b i l i t y . T h i s i s l i k e l y t o r e s u l t s i n f u r t h e r B O A + P F S s e r v e r m o d i f i c a t i o n s . A d d i t i o n a l w o r k i n d e v e l o p i n g a n i n s t a l l a b l e f i l e s y s t e m f o r L i n u x / W i n d o w s 9 5 i s a l s o b e i n g e x a m i n e d . D i s t r i b u t e d w i r e l e s s m u l t i m e d i a a c c e s s h a s g a i n e d s i g n i f i c a n t a t t e n t i o n o v e r t h e l a s t s e v e r a l y e a r s . R e l e v a n t p r o j e c t s a r e l i s t e d b e l o w t o p r o v i d e t h e r e a d e r w i t h s o m e f u r t h e r i n s i g h t i n t o t h e f i e l d . T h e D e f e n s e A d v a n c e d R e s e a r c h P r o j e c t A g e n c y ( D A R P A ) h a s i n i t i a t e d t h e G l o b a l M o b i l e I n f o r m a t i o n S y s t e m s ( G l o M o ) p r o g r a m i n 1 9 9 4 [ 5 ] . I t i s a t e s t b e d i n i t i a t i v e l i n k i n g s e v e r a l r e s e a r c h p r o j e c t s w h i c h d e p e n d o n a w i r e l e s s c o m m u n i c a t i o n s i n f r a s t r u c t u r e . O n e s u c h p r o j e c t a t t h e U n i v e r s i t y o f C a l i f o r n i a , B e r k e l e y , i s t h e l i g h t w e i g h t , p o r t a b l e m u l t i m e d i a n o t e b o o k c a l l e d I n f o P a d [ 4 ] . I t a i m s t o p r o v i d e m u l t i m e d i a a c c e s s i n a d i s t r i b u t e d w i r e l e s s e n v i r o n m e n t . I n f o P a d p e r f o r m s a s a m o b i l e t e r m i n a l w h i c h m a i n t a i n s a p p l i c a t i o n s o n d e d i c a t e d s e r v e r s . A l l u s e r Acknowledgments References 8. Conclusion a p p l i c a t i o n s e x e c u t e r e m o t e l y , w h i l e t h e i r r e s u l t s a r e s e n t t o t h e I n f o P a d t e r m i n a l . W e b o r i e n t e d p r o j e c t s s u c h a s M o b i s a i c a n d M o w s e r a r e i n d i r e c t l y r e l a t e d t o o u r w r a p p e r p r o j e c t . T h e M o b i s a i c [ 9 ] p r o j e c t a t t h e U n i v e r i s t y o f W a s h i n g t o n , e m p l o y s c o n t e x t s e n s i t i v e U R L s i n a w i r e l e s s l o c a l a r e a n e t w o r k t o p r o v i d e l o c a t i o n d e p e n d e n t w e b d o c u m e n t s . W e a l s o e m p l o y m o d i f i e d U R L s w h i l e l e a v i n g t h e s e r v e r t o r e s o l v e t h e m . A m o b i l e M o b i s a i c u s e r c o m m u n i c a t e s w i t h p h y s i c a l l y v i s i b l e d e v i c e s v i a i n f r a - r e d t o o b t a i n e n v i r o n m e n t a l v a r i a b l e s . T h e s e a r e t h e n i n c o r p o r a t e d w i t h i n d y n a m i c U R L s w h i c h p r o v i d e t h e u s e r ’ s l o c a t i o n b y r e t r i e v i n g t h e c o r r e s p o n d i n g w e b p a g e s . M o b i s a i c p r o p o s e s t h e c o n c e p t o f b r o w s e r r e g i s t r a t i o n a n d p e r m i t s s e r v e r c a l l b a c k s t o c l i e n t b r o w s e r s . B r o w s e r c a l l b a c k s a s s i s t i n d o c u m e n t u p d a t e s b y n o t i f y i n g r e g i s t e r e d b r o w s e r s t o o b t a i n n e w l y c h a n g e d d o c u m e n t s . A n o t h e r m u l t i m e d i a p r o j e c t c a l l e d M o w s e r , h a s b e e n d e v e l o p e d a t P u r d u e U n i v e r s i t y [ 2 ] . T h e M o w s e r a r c h i t e c t u r e e m p l o y s d e s i g n a t e d p r o x y s e r v e r s w h i c h s e r v i c e m o b i l e u s e r s . T h e s e e x a m i n e i n c o m i n g d o c u m e n t s w h i l e c a c h i n g t h e m . A M o w s e r p r o x y m o d i f i e s r e t r i e v e d d o c u m e n t s a n d f o r w a r d s r e s i z e d i m a g e s t o m o b i l e b r o w s e r s . T h i s r e d u c e s t h e n e c e s s a r y b a n d w i d t h r e q u i r e m e n t s w h i l e d e l i v e r i n g t h e d o c u m e n t c o n t e n t . T h e U n i v e r s i t y o f W a s h i n g t o n , d e v e l o p e d t h e W * w i r e l e s s w e b b r o w s e r [ 1 0 ] . T h e i r s y s t e m e m p l o y e d a l o w p o w e r e d C P U i n a w i r e l e s s P e r s o n a l D i g i t a l A s s i s t a n t ( P D A ) . T h i s a p p e a r s t o b e s i m i l a r t o M o w s e r a s b o t h p r o j e c t s e m p l o y p r o x y s e r v e r s t o a s s i s t d o c u m e n t m o d i f i c a t i o n a n d p r e p r o c e s s i n g . T h e m o b i l e P D A r u n n i n g W * c o m m u n i c a t e s w i t h a s p e c i a l i z e d p r o x y s e r v e r v i a a c o m p r e s s e d p r o t o c o l . T h e p r o x y c a c h e s p r e v i o u s l y a c c e s s e d d o c u m e n t s , p r e p r o c e s s e s b r o w s e r d i s p l a y s , p r e f e t c h e s t h e f i r s t p a g e o f p o t e n t i a l n e x t l i n k s , a n d p a s s e s c o m p r e s s e d d o c u m e n t s v i a t h e w i r e l e s s c o n n e c t i o n . T o t h e b e s t o f o u r k n o w l e d g e , d o c u m e n t m a n a g e m e n t s u c h a s t h e P F S w r a p p e r a p p r o a c h h a s n o t b e e n a t t e m p t e d a n d a p p e a r s t o b e a n e w c o n t r i b u t i o n t o t h i s f i e l d o f w o r k . T h e P F S w r a p p e r a p p r o a c h t o a r c h i v i n g s i t e s w h i l e m a i n t a i n i n g t h e i r w e b p r e s e n c e i s a n e w s e r v e r f e a t u r e . I t p e r m i t s s i t e a d m i n i s t r a t o r s t o c o l l a p s e d i r e c t o r i e s a n d o f f e r s p a c k a g e d f i l e s t o u s e r s w i s h i n g t o a c c e s s p o r t i o n s o f a w e b s e r v e r t r e e . A d d i t i o n a l l y , t h e s u p p o r t f o r r e m o t e f i l e r e f e r e n c i n g w i t h o u t p h y s i c a l l y e m b e d d i n g f i l e s h a v e b e e n u s e d i n d i s t r i b u t e d f i l e c a c h i n g s y s t e m s b u t a p p e a r s t o b e a n o v e l a p p r o a c h f o r a r c h i v e s . T h e P F S c o d e a d d i t i o n w i t h i n o u r s e r v e r , p r o v i d e s m i n i m a l o v e r h e a d f o r d o c u m e n t a c c e s s a n d d o e s n o t d e g r a d e s e r v e r p e r f o r m a n c e . M o b i l e u s e r s w h i c h a r e c a p a b l e o f r u n n i n g a s m a l l l o c a l w e b s e r v e r , m a y a c c e s s P F S f i l e s a n d r e t r i e v e n e c e s s a r y d o c u m e n t s w h i l e d i s c o n n e c t e d f r o m a n e t w o r k . T h e u s e o f a s i n g l e P F S w r a p p e r m i n i m i z e s t h e n e e d t o p o t e n t i a l l y m a i n t a i n h u n d r e d s o f f i l e s o n l o c a l s t o r a g e . T h e p o r t a b l e f i l e s y s t e m a l s o s i m p l i f i e s m u l t i - d o c u m e n t d i s t r i b u t i o n . I t s e a m l e s s l y i n t e g r a t e s i n t o a w e b s e r v e r a n d a p p e a r s t r a n s p a r e n t t o i t s u s e r s . T h e a u t h o r s w o u l d l i k e t o t h a n k J o h n N g f o r o b t a i n i n g t h e o r i g i n a l B o a a r c h i v e a n d t h e i n s p i r a t i o n w h i c h l e d t o t h e e x t e n s i o n o f B o a . [ 1 ] J . H o w a r d e t a l . , " S c a l e a n d P e r f o r m a n c e i n a D i s t r i b u t e d F i l e S y s t e m " , A C M T r a n s a c t i o n s o n C o m p u t e r S y s t e m s , F e b r u a r y 1 9 8 8 , p p . 5 1 - 8 1 [ 2 ] A . J o s h i , R . W e e r a s i n g h e , S . M c D e r m o t t e t a l . , 1 9 9 6 , " M o w s e r : M o b i l e P l a t f o r m s a n d W e b B r o w s e r s " , T e c h n i c a l C o m m i t t e e o n O p e r a t i n g S y s t e m s a n d A p p l i c a t i o n E n v i r o n m e n t s ( T C O S ) , S p r i n g 1 9 9 6 , N o . 1 , V o l . 8 , p p . 1 3 - 1 6 [ 3 ] J . J . K i s t l e r a n d M . S a t y a n a r a y a n a n , 1 9 9 2 , " D i s c o n n e c t e d O p e r a t i o n i n t h e C O D A F i l e S y s t e m " , A C M T r a n s a c t i o n s o n C o m p u t e r S y s t e m s , V o l . 1 0 , N o . 1 , F e b r u a r y 1 9 9 2 [ 4 ] M . T . L e e t a l . , 1 9 9 5 , " I n f o N e t : t h e N e t w o r k i n g I n f r a s t r u c t u r e o f I n f o P a d " , P r o c e e d i n g s o f C o m p c o n , S a n F r a n c i s c o , M a r c h 1 9 9 5 [ 5 ] B . M . L e i n e r , R . J . R u t h a n d A . R . S a s t r y , 1 9 9 6 , " G o a l s a n d C h a l l e n g e s o f t h e D A R P A G l o M o P r o g r a m " , D e c e m b e r 1 9 9 6 , I E E E P e r s o n a l C o m m u n i c a t i o n s , p p . 3 4 - 4 3 [ 6 ] T . P a g e , 1 9 9 1 , " A r c h i t e c t u r e o f t h e F i c u s S c a l a b l e R e p l i c a t e d F i l e S y s t e m " , T e c h n i c a l R e p o r t C S D - 9 1 0 0 0 5 , U n i v e r s i t y o f C a l i f o r n i a , L o s A n g e l e s , M a r c h 1 9 9 1 [ 7 ] J . S a l d a n h a , 1 9 9 6 , " A N e w F i l e S y s t e m F o r M o b i l e C o m p u t i n g " - T h e s i s , D e p a r t m e n t o f C o m p u t e r S c i e n c e a n d E n g i n e e r i n g , U n i v e r s i t y o f N o t r e D a m e , I n d i a n a [ 8 ] P . S t a n s k i a n d A . Z a s l a v s k y , 1 9 9 7 , " D i s t r i b u t e d a n d P e r s i s t e n t M o b i l e A g e n t s f o r H e t e r o g e n e o u s P e r s o n a l C o m m u n i c a t i o n s S y s t e m s " , P r o c e e d i n g s : 6 t h I n t e r n a t i o n a l C o n f e r e n c e o n C o m p u t e r C o m m u n i c a t i o n s a n d N e t w o r k s ( I C 3 N ) , S e p t e m b e r 1 9 9 7 [ 9 ] G . M . V o e l k e r a n d B . N . B e r s h a d , 1 9 9 4 , " M O B I S A I C : A n I n f o r m a t i o n S y s t e m f o r a M o b i l e W i r e l e s s C o m p u t i n g E n v i r o n m e n t " , P r o c e e d i n g s : W o r k s h o p o n M o b i l e C o m p u t i n g S y s t e m s a n d A p p l i c a t i o n s , D e c e m b e r 1 9 9 4 [ 1 0 ] T . W a t s o n , 1 9 9 4 , " A p p l i c a t i o n D e s i g n f o r W i r e l e s s C o m p u t i n g " , P r o c e e d i n g s : M o b i l e C o m p u t i n g S y s t e m s a n d A p p l i c a t i o n s 1 9 9 4
1805.08320
1
1805
2018-05-21T23:18:58
The Swarmathon: An Autonomous Swarm Robotics Competition
[ "cs.MA", "cs.RO" ]
The Swarmathon is a swarm robotics programming challenge that engages college students from minority-serving institutions in NASA's Journey to Mars. Teams compete by programming a group of robots to search for, pick up, and drop off resources in a collection zone. The Swarmathon produces prototypes for robot swarms that would collect resources on the surface of Mars. Robots operate completely autonomously with no global map, and each team's algorithm must be sufficiently flexible to effectively find resources from a variety of unknown distributions. The Swarmathon includes Physical and Virtual Competitions. Physical competitors test their algorithms on robots they build at their schools; they then upload their code to run autonomously on identical robots during the three day competition in an outdoor arena at Kennedy Space Center. Virtual competitors complete an identical challenge in simulation. Participants mentor local teams to compete in a separate High School Division. In the first 2 years, over 1,100 students participated. 63% of students were from underrepresented ethnic and racial groups. Participants had significant gains in both interest and core robotic competencies that were equivalent across gender and racial groups, suggesting that the Swarmathon is effectively educating a diverse population of future roboticists.
cs.MA
cs
The Swarmathon: An Autonomous Swarm Robotics Competition Sarah M. Ackerman∗1, G. Matthew Fricke1, Joshua P. Hecker1, Kastro M. Hamed2, Samantha R. Fowler2, Antonio D. Griego1, Jarett C. Jones1, J. Jake Nichol1, Kurt W. Leucht3, and Melanie E. Moses1,4,5 8 1 0 2 y a M 1 2 ] A M . s c [ 1 v 0 2 3 8 0 . 5 0 8 1 : v i X r a Abstract- The Swarmathon is a swarm robotics program- ming challenge that engages college students from minority- serving institutions in NASA's Journey to Mars. Teams compete by programming a group of robots to search for, pick up, and drop off resources in a collection zone. The Swarmathon produces prototypes for robot swarms that would collect resources on the surface of Mars. Robots operate completely autonomously with no global map, and each team's algorithm must be sufficiently flexible to effectively find resources from a variety of unknown distributions. The Swarmathon includes Physical and Virtual Competitions. Physical competitors test their algorithms on robots they build at their schools; they then upload their code to run autonomously on identical robots during the three day competition in an outdoor arena at Kennedy Space Center. Virtual competitors complete an identical challenge in simulation. Participants mentor local teams to compete in a separate High School Division. In the first 2 years, over 1,100 students participated. 63% of students were from underrepresented ethnic and racial groups. Participants had significant gains in both interest and core robotic competencies that were equivalent across gender and racial groups, suggesting that the Swarmathon is effectively educating a diverse population of future roboticists. I. INTRODUCTION A. The Journey to Mars The National Aeronautics and Space Administration (NASA) Journey to Mars program has set the ambitious goal of sending manned missions to Mars by the 2030s.1 These surface missions may last months or years, and because transporting sufficient materials from Earth is not practical, astronauts will need to utilize the resources already available on Mars. For example, small pockets of ice can be melted for water and converted to oxygen and hydrogen for fuel. This approach is known as in-situ resource utilization (ISRU). B. Meeting the Challenge with Robot Swarms Autonomous robot swarms could locate, collect, and store resources in advance of human arrival. A swarm of small, 1Computer Science Department, The University of New Mexico, Albu- querque, NM, USA, 2Education and Interdisciplinary Studies, Florida Institute of Technology, Melbourne, FL, USA, 3NASA Kennedy Space Center, FL, USA, 4Department of Biology, The University of New Mexico, 5Santa Fe Institute, Santa Fe, NM, USA, This work was supported by NASA Minority University and Research Education Program (MUREP) #NNX15AM14A and a generous donation from Google. We thank Theresa Martinez, MUREP STEM Engagement Manager; Paul Secor and Mary Baker of Secor Strategies, LLC; Kate Cunningham and Beatriz Palacios Abad of UNM ADVANCE; Elizabeth Esterly and the students of the Moses Biological Computation Lab, Vanessa Svihla, Aeron Haynie, NASA volunteers, UNM support staff, KSC Visitor Complex, and the Swarmathon students and faculty mentors. ∗Correspondence: [email protected] 1https://www.nasa.gov/content/nasas-journey-to-mars inexpensive robots acting autonomously provides several advantages over a few large, expensive, manually controlled rovers [1], [2] because they are robust, scalable and able to explore unmapped environments [3]. ISRU is closely related to central-place foraging (CPF), in which resources are transported to a central collection zone. Inspired by the success of social insects gathering resources for their colonies, an early study of robot foraging computationally modeled a swarm collecting rock samples on a distant planet [4]. CPF is a key robot swarm application [5], [6], and research continues to improve algorithms and engineering approaches for foraging swarms [7], [8]. Our team has designed and built a swarm of foraging robots called Swarmies. Swarmies are rugged enough to operate outdoors for hours, and feature sensors and grippers that enable them to complete CPF tasks. We also developed custom software packages and a graphical user interface (GUI), enabling rapid development and testing of CPF al- gorithms in simulation and physical hardware. Swarm foraging provides an ideal educational challenge because successful strategies require foundational robotics skills such as grasping, localization, navigation, exploration, and decentralized communication and coordination [9]. C. The Swarmathon Competition In the Swarmathon annual competition, teams of college students develop algorithms for autonomous swarm foraging. Teams in the Physical Competition program groups of 3 - 6 Swarmies to collect the most of 128−256 resources placed in 225 − 484 m2 outdoor arenas. The Virtual Competition runs in a Gazebo simulation of the same arenas and robots. Robots must search for, collect, and return resources to a central collection zone completely autonomously. The competition runs in a series of rounds, and in each round resources are placed in different distributions (i.e., uniformly at random, or in various sizes and shapes of clusters), and the same code is run in each round. Score is determined by the number of resources in the collection zone at the end of the round (resources pushed out of the collection zone by robots do not count toward the score). Robots have limited view and no global map, making it difficult to find resources. In a third High School Competition, younger students are mentored by Swarmathon college students to complete a similar challenge in a simplified simulation. Winners of the Virtual competition advance to the Physical competition the following year. D. Diversifying the STEM/Robotics Pipeline Tackling NASA's real-world ISRU problem provides an opportunity to engage students in robotics and computer science (CS), helping meet the growing need for science, technology, engineering, and mathematics (STEM) talent in the workforce. While women and minorities account for a growing proportion of US college graduates and US workers, they are underrepresented among STEM college graduates and professionals, especially in CS and engineer- ing [10]–[13]. Their inclusion in STEM helps to address an anticipated shortfall in these fields over the next few decades [12], [13]. Additionally "workers from a variety of backgrounds enhance the quality of science insofar as they are likely to bring a variety of new perspectives. . . in terms of both research and application" [11]. For these reasons, the Swarmathon recruits competitors from 2- and 4-year colleges and universities that are minority-serving institutions (MSIs) including Historically Black Colleges and Universities (HBCUs), Hispanic-Serving Institutions (HSIs), and Tribal Colleges and Universities (TCUs). This provides an educational opportunity that may not otherwise exist for participating students: "The Swarmathon is an opportunity for students to work on a real-life engineering problem that's interdisciplinary and hard. They know that I don't know the answer which makes it fun for all of us. I teach at a small community college and it simply wouldn't be possible for us do this level of work from scratch." -Swarmathon Faculty Mentor The Swarmathon has engaged a diverse student population with 81% of students from minority groups (including Asian students) and 63% of the 818 college participants identifying as belonging to an underrepresented racial or ethnic group (Black/African American, American Indian/Alaskan Native, or Hispanic/Latino), substantially more diverse than US undergraduate CS majors, of which only 15.8% are from these underrepresented groups [14]. College students mentored K-12 students in their commu- nities, including 300 high school students who compteed in a simplified High School Swarmathon in Netlogo. Addition- ally, the Swarmathon supported 60 students to attend work- shops and the 2016 and 2017 Robotics Science and Systems (RSS) conferences and 17 students participated in research internships with mentors as other Swarmathon schools. All of these activities further developed pathways into STEM. As an example, 65% of RSS workshop participants indicated a desire to pursue a Ph.D. in robotics. robots, require permanent infrastructure such as buried guide- wires or visual markers to operate [16]. Many attempts have been made to develop swarm algo- rithms and robot systems that address various aspects of the swarm foraging problem including scalability, energy efficiency, task allocation, and collection speed [17]–[22]. However, autonomous swarm foraging remains a challenging open problem with no generally recognized best solution. Projects using physical robot swarms include the Rob- otarium, a swarm robotics testbed providing remotely ac- cessible robots and an arena [23]. This innovative project allows virtual experimentation with physical robot swarms, but it uses an overhead camera for localization and the robots themselves have no on-board sensors. Kilobots are simple, small robots intended to be integrated into large swarms. They have sensors and operate autonomously and collaboratively to push items through a maze or into specific configurations, but they have relatively limited mobility and operate in controlled laboratory environments [24]. The Swarmanoid project demonstrated successful implementation of a heterogeneous swarm whose robots collaborate in order to solve tasks like object retrieval in a highly specialized en- vironment [25]. The challenges of operating physical swarms result in robots that are usually semi-autonomous in prac- tice; they require frequent human support [26]. The reality gap between performance in simulation and performance in physical hardware [27] makes implementation in real robots particularly difficult. The hardware and software platforms for the Swarmies address these challenges so that CPF can be developed and subsequently tested in a system that is completely autonomous, operates without global knowledge or control, and can function outdoors. B. Educational Robotics Environments and Competitions Educational robotics is a growing field that is particularly effective at improving student performance in and attitudes towards STEM disciplines, and reducing gender and ethnic achievement gaps [12], [28]–[31]. Examples for younger students include the distributed Robot Garden [32] and low- cost AERobots [33]. The NASA Robotic Mining Competition (RMC) is an annual engineering competition to design and build robots capable of mining the Martian surface as part of the ISRU mission. Students focus on hardware design rather than autonomous control. Only 16% of the 900 RMC participants in 2017 identified as members of underrepresented groups2. The Swarmathon was designed to emulate the success and popularity of RMC while emphasizing robot autonomy and engagement of students from MSIs. II. RELATED WORK C. Hardware A. Foraging Robot Swarms Though swarm robot foraging has been studied analyti- cally for decades [4], hardware implementations are rare [9]. For example, studies of CPF often only simulate the collec- tion and transport of objects [15], and recent advances in hardware implementations, such as collaborative warehouse Teams selected for the Physical Competition are sent parts and instructions3 for building 3 Swarmies. Each robot has a front mounted gripper with actuated wrist and finger 2https://www.nasa.gov/offices/education/centers/ kennedy/technology/nasarmc.html 3https://github.com/BCLab-UNM/Swarmathon-Robot robot pose is estimated using two extended Kalman filters (EKFs) [36] that fuse encoder, IMU, and GPS data. This base code includes: Gazebo simulation of the robots, target cubes, and competition arena (Figure 2); a GUI (Figure 2b) showing output of each hardware sensor, a map of the robots' estimated positions (Figure 2c); customizable ROS packages to control behaviors (for search, communication, obstacle avoidance, and target pick up and drop off) and diagnostics (for sensors, actuators, wireless quality and the microcontroller); a ROS package that interfaces with the Arduino to communicate with actuators and and sensors; open source packages including AprilTag and EKF packages. The simple base code algorithm (modeled after the sub- sumption architecture [37]) is designed to be extended by teams to improve foraging. It implements simple collision avoidance, a random walk for search, and when a target appears in the camera view, the robot picks up the target and returns to the central collection zone to drop it off. III. RESULTS In the first 2 years, 29 of the 31 Physical teams and 20 of the 27 Virtual Teams successfully uploaded code to com- pete. The skills these students required for the competition included programming proficiency in ROS, swarm algorithm design, and experimental design and testing. Several teams developed effective new search algorithms that significantly improved the base code. The 2017 Phys- ical Competition winner, Southwestern Indian Polytechnic Institute (SIPI), experimented with different search strategies inspired by snail shells, lawnmower paths, and spirograph- style geometric designs, ultimately deciding on a strategy inspired by the spokes of a bicycle wheel. SIPI's algorithm displayed the greatest flexibility, performing at a high level across a variety of target distributions. Figure 2c shows the Montgomery College search algo- rithm in an environment with one large cluster of target cubes. The zig-zag pattern shows the robots' search path through the arena. Once the large cluster of resources was located, some robots continued searching while others focused on collecting from the cluster. This strategy suc- cessfully balanced the explore versus exploit trade-off and dramatically outperformed the other teams on nearly every distribution of resources to win the 2017 Virtual Competition. Engineering innovations (i.e., improving localization and resource pickup and drop-off) improved scores more than new search algorithms. A. Assessed Student Learning Outcomes 263 students completed a comprehensive self-assessment (29%). 44 Faculty Mentors (76%) completed the survey with the same questions to evaluate their students' performance. Student growth was rated on 9 Accreditation Board for En- gineering and Technology (ABET) Criteria for Accrediting Computing Programs, and 2 ABET Criteria for Accrediting Engineering Programs: "An ability to design and conduct experiments, as well as to analyze and interpret data," and, Fig. 1: Swarmie Architecture. Software packages (shaded) interface with hardware through a USB connection, or with the Gazebo simulation. joints for grasping resources. Robots sense objects in the environment using three ultrasound range finders and a web camera. The ultrasounds have a 3 m range. The camera has a narrow field of view with a 1 rad arc and range of 1 m. Orientation and positional (pose) data are provided by a global positioning system (GPS) unit and inertial measure- ment unit (IMU) with a magnetometer, along with wheel encoder odometry. Computation is provided by a small on- board computer (an Intel NUC). An Arduino Leonardo mi- crocontroller provides the hardware interface between the on- board computer and both the wheel and gripper actuators and the encoders that measure wheel velocity. The robot body is built from laser cut and 3D printed components. The battery pack allows robots to run for 8 hours between charges, which with a default speed of speed of 0.2 m/s results in a range of 5.75 km. This allows a team of 6 Swarmies to search a linear distance of 34.5 km on a single charge, nearly the distance of a marathon that the remote-controlled Mars Rover Opportunity took 11 years to complete. The resources that Swarmies locate and collect are cubes marked on all sides with AprilTags [34]. The perimeter of the central collection zone is also marked with AprilTags. D. Software The basic robot software, based on the robot operating system (ROS) [35], is publicly available4 and provided to all teams. So teams may focus on the ISRU challenge, we implement the low-level code that interfaces with physical and simulated actuators and sensors, performs necessary calibration and pre-configuration, and defines the simulated world for competition, including Swarmies, resources, and the search environment. The software base is designed so that students can imple- ment the same algorithms to control simulated or physical robots (Figure 1). The GUI and ROS master either connect to the physical robots through a wireless network, or run in a Gazebo simulation. The diagnostic package monitors hardware components and alerts the user to problems. The 4https://github.com/BCLab-UNM/Swarmathon-ROS (a) Gazebo Simulation (b) User Interface (c) Example Search Pattern Fig. 2: Gazebo and GUI. (a) Two robots bring target cubes marked with AprilTags to the collection zone. (b) Gazebo interface showing robot status, location tracing, and camera view. (c) Trace of the Montgomery College winning swarm of 6 robots; the dense activity shows robots traveling between a large target cluster and the collection zone. ethical, legal, security and social issues and responsibilities, and (2) An ability to analyze the local and global impact of computing on individuals, organizations, and society. TABLE I: Changes in Student Abilities and Attitudes 2016 2017 ABET Outcomes +0.35 +0.59 Higher Degree Interest +0.21 +0.53 +0.19 +0.38 Career Motivation Across both competition years, students also reported significant gains in their "desire or motivation to pursue a higher degree beyond the one I am currently pursuing," and their "desire or motivation to pursue a career in CS, or Robotics, or other technical discipline in STEM" as seen in Table I. Gains were significant even among students who already possessed a moderate to high degree of interest in pursuing a more advanced degree. The Swarmathon is effectively inspiring the next gener- ation of engineers to tackle major scientific problems like the NASA ISRU mission and to bring their diversity of background and experience into the STEM workforce. ACKNOWLEDGMENT We thank Theresa Martinez, MUREP STEM Engagement Manager; Paul Secor and Mary Baker of Secor Strategies, LLC; Kate Cunningham and Beatriz Palacios Abad of UNM ADVANCE; Elizabeth Esterly and the students of the Moses Biological Computation Lab, Vanessa Svihla, Aeron Haynie, the NASA event volunteers and UNM support staff, KSC Visitor Complex, and the Swarmathon students and Faculty Mentors. REFERENCES [1] M. Brambilla, E. Ferrante, M. Birattari, and M. Dorigo, "Swarm robotics: a review from the swarm engineering perspective," Swarm Intelligence, vol. 7, no. 1, pp. 1–41, 2013. Fig. 3: Physical Competition. Students compare strategies and cheer on Swarmies from the University of the District of Columbia as they drop cubes in the collection zone. "An ability to function on multidisciplinary teams."5 Students and faculty rated student degree of competency before and after the Swarmathon on a 4-point scale: none (1), low degree (2), moderate degree (3), and high degree (4). Data for each year was analyzed with a dependent-samples t-test. Differences between the 2016 and 2017 cohorts were analyzed with an independent samples t-test. Table I shows the significant gains in self-assessed performance each year. 2017 gains were greater than 2016 gains in all categories and all results are statistically significant with p < 0.05. There were no statistically significant differences in our assessment or survey data based on race, ethnicity, or gender, indicating that the Swarmathon provided a level playing field for competition, eliminating the achievement gap noted in other studies [30], [31]. Faculty mentor surveys closely mirrored student self-assessments on all but two ABET standards. Mentors ratings were more than 0.50 points lower than student ratings on (1) An understanding of professional, 5www.abet.org/accreditation/accreditation-criteria/ collective behaviors," Robotics and Autonomous Systems, vol. 62, no. 7, pp. 966–975, 2014. [25] M. Dorigo, D. Floreano, L. M. Gambardella, F. Mondada, S. Nolfi, T. Baaboura, M. Birattari, M. Bonani, M. Brambilla, and A. Brutschy, "Swarmanoid: a novel concept for the study of heterogeneous robotic swarms," IEEE Robotics & Automation Magazine, vol. 20, no. 4, pp. 60–71, 2013. [26] A. Rosenfeld, N. Agmon, O. Maksimov, and S. Kraus, "Intelligent team collaboration," Artificial agent supporting human-multi-robot Intelligence, 2017. [27] N. Jakobi, P. Husbands, and I. Harvey, "Noise and the reality gap: The use of simulation in evolutionary robotics," in European Conference on Artificial Life. Springer, 1995, pp. 704–720. [28] S. Freeman, S. L. Eddy, M. McDonough, M. K. Smith, N. Okoroafor, H. Jordt, and M. P. Wenderoth, "Active learning increases student performance in science, engineering, and mathematics," Proceedings of the National Academy of Sciences, vol. 111, no. 23, pp. 8410–8415, 2014. [29] A. G. Welch, "Using the TOSRA to Assess High School Students' Attitudes toward Science after Competing In the FIRST Robotics Competition: An Exploratory Study." Eurasia Journal of Mathematics, Science & Technology Education, vol. 6, no. 3, 2010. [30] A. S. Richmond, G. A. Boysen, and R. A. R. Gurung, An Evidence- based Guide to College and University Teaching: Developing the Model Teacher. Routledge, 2016. [31] C. M. Steele, Whistling Vivaldi: How Stereotypes Affect Us and What We Can Do. New York, NY, US: WW Norton & Co, 2010. [32] L. Sanneman, D. Ajilo, J. DelPreto, A. Mehta, S. Miyashita, N. A. Poorheravi, C. Ramirez, S. Yim, S. Kim, and D. Rus, "A Distributed Robot Garden System," in Robotics and Automation (ICRA), 2015 IEEE International Conference on. IEEE, 2015, pp. 6120–6127. [33] M. Rubenstein, B. Cimino, R. Nagpal, and J. Werfel, "AERobot: An affordable one-robot-per-student system for early robotics education," in Robotics and Automation (ICRA), 2015 IEEE International Confer- ence on. IEEE, 2015, pp. 6107–6113. [34] E. Olson, "AprilTag: A robust and flexible visual fiducial system," in Robotics and Automation (ICRA), 2011 IEEE International Conference on. IEEE, 2011, pp. 3400–3407. [35] M. Quigley, K. Conley, B. Gerkey, J. Faust, T. Foote, J. Leibs, R. Wheeler, and A. Y. Ng, "ROS: an open-source Robot Operating System," in ICRA workshop on open source software, vol. 3, no. 3.2. Kobe, 2009, p. 5. [36] T. Moore and D. Stouch, "A Generalized Extended Kalman Filter Implementation for the Robot Operating System," in Proceedings of the 13th International Conference on Intelligent Autonomous Systems (IAS-13). Springer, 2014, pp. 335–348. [37] R. Brooks, "A robust layered control system for a mobile robot," IEEE journal on robotics and automation, vol. 2, no. 1, pp. 14–23, 1986. [2] O. Zedadra, N. Jouandeau, H. Seridi, and G. Fortino, "Multi-Agent Foraging: state-of-the-art and research challenges," Complex Adaptive Systems Modeling, vol. 5, no. 1, p. 3, 2017. [3] J. P. Hecker, K. Letendre, K. Stolleis, D. Washington, and M. E. Moses, "Formica ex machina: ant swarm foraging from physical to virtual and back again," in Swarm Intelligence. Springer, 2012, pp. 252–259. [4] L. Steels, "Cooperation between distributed agents through self- organisation," in Intelligent Robots and Systems' 90.'Towards a New Frontier of Applications', Proceedings. IROS'90. IEEE International Workshop on. IEEE, 1990, pp. 8–14. [5] A. Drogoul and J. Ferber, "From Tom Thumb to the Dockers: Some experiments with foraging robots," From Animals to Animats, vol. 2, p. 451, 1993. [6] A. Campo and M. Dorigo, "Efficient multi-foraging in swarm Springer, 2007, pp. 696– robotics," in Advances in Artificial Life. 705. [7] A. F. T. Winfield, "Towards an engineering science of robot foraging," Distributed autonomous robotic systems, vol. 8, pp. 185–192, 2009. [8] M. Dorigo, M. Birattari, and M. Brambilla, "Swarm robotics," Schol- arpedia, vol. 9, no. 1, p. 1463, 2014. [9] A. F. T. Winfield, "Foraging Robots," in Encyclopedia of Complexity Springer, 2009, vol. 6, ch. Foraging R, pp. and Systems Science. 3682–3700. [10] A. L. Griffith, "Persistence of women and minorities in STEM field majors: Is it the school that matters?" Economics of Education Review, vol. 29, no. 6, pp. 911–922, 2010. [11] C. B. Leggon, "Women in science: Racial and ethnic differences and the differences they make," The Journal of Technology Transfer, vol. 31, no. 3, pp. 325–333, 2006. [12] S. D. Museus, R. T. Palmer, R. J. Davis, and D. Maramba, Racial and Ethnic Minority Student Success in STEM Education: ASHE Higher Education Report, Volume 36, Number 6. John Wiley & Sons, 2011. [13] US Department of Education, "FACT SHEET: Spurring African- American STEM Degree Completion [Press release]," 2016. [Online]. Available: https://www.ed.gov/news/press-releases/fact- sheet-spurring-african-american-stem-degree-completion [14] S. Zweben and B. Bizot, "2016 Taulbee Survey: Generation CS Continues to Produce Record Undergrad Enrollment; Graduate Degree Production Rises at both Masters and Doctoral Levels," Computing Research News, vol. 29, no. 5, 2017. [15] A. Brutschy, L. Garattoni, M. Brambilla, G. Francesca, G. Pini, M. Dorigo, and M. Birattari, "The TAM: abstracting complex tasks in swarm robotics research," Swarm Intelligence, vol. 9, no. 1, pp. 1–22, 2015. [16] J. Enright and P. R. Wurman, "Optimization and Coordinated Auton- omy in Mobile Fulfillment Systems." in Automated action planning for autonomous mobile robots, 2011, pp. 33–38. [17] W. Liu, A. Winfield, J. Sa, J. Chen, and L. Dou, "Strategies for energy optimisation in a swarm of foraging robots," in International Workshop on Swarm Robotics. Springer, 2006, pp. 14–26. [18] N. R. Hoff, A. Sagoff, R. J. Wood, and R. Nagpal, "Two foraging algo- rithms for robot swarms using only local communication," in Robotics and Biomimetics (ROBIO), 2010 IEEE International Conference on. IEEE, 2010, pp. 123–130. [19] J. P. Hecker and M. E. Moses, "Beyond pheromones: evolving error- tolerant, flexible, and scalable ant-inspired robot swarms," Swarm Intelligence, vol. 9, no. 1, pp. 43–70, 2015. [20] E. Ferrante, A. E. Turgut, E. Du´enez-Guzm´an, M. Dorigo, and T. Wenseleers, "Evolution of self-organized task specialization in robot swarms," PLoS computational biology, vol. 11, no. 8, p. e1004273, 2015. [21] Q. Lu, J. P. Hecker, and M. E. Moses, "The MPFA: A Multiple- Place Foraging Algorithm for Biologically-Inspired Robot Swarms," IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016. [22] G. Fricke, J. Hecker, A. Griego, L. Tran, and M. Moses, "A dis- tributed deterministic spiral search algorithm for swarms," in IEEE International Conference on Intelligent Robots and Systems, 2016. [23] D. Pickem, P. Glotfelter, L. Wang, M. Mote, A. Ames, E. Feron, and M. Egerstedt, "The Robotarium: A remotely accessible swarm robotics research testbed," in Robotics and Automation (ICRA), 2017 IEEE International Conference on. IEEE, 2017, pp. 1699–1706. [24] M. Rubenstein, C. Ahler, N. Hoff, A. Cabrera, and R. Nagpal, "Kilobot: A low cost robot with scalable operations designed for
1805.08547
2
1805
2019-11-15T12:05:38
Learning over Multitask Graphs -- Part II: Performance Analysis
[ "cs.MA" ]
Part I of this paper formulated a multitask optimization problem where agents in the network have individual objectives to meet, or individual parameter vectors to estimate, subject to a smoothness condition over the graph. A diffusion strategy was devised that responds to streaming data and employs stochastic approximations in place of actual gradient vectors, which are generally unavailable. The approach relied on minimizing a global cost consisting of the aggregate sum of individual costs regularized by a term that promotes smoothness. We examined the first-order, the second-order, and the fourth-order stability of the multitask learning algorithm. The results identified conditions on the step-size parameter, regularization strength, and data characteristics in order to ensure stability. This Part II examines steady-state performance of the strategy. The results reveal explicitly the influence of the network topology and the regularization strength on the network performance and provide insights into the design of effective multitask strategies for distributed inference over networks.
cs.MA
cs
Learning over Multitask Graphs -- Part II: Performance Analysis Roula Nassif, Member, IEEE, Stefan Vlaski, Member, IEEE, C´edric Richard, Senior Member, IEEE, Ali H. Sayed, Fellow Member, IEEE Abstract Part I of this paper formulated a multitask optimization problem where agents in the network have individual objectives to meet, or individual parameter vectors to estimate, subject to a smoothness condition over the graph. A diffusion strategy was devised that responds to streaming data and employs stochastic approximations in place of actual gradient vectors, which are generally unavailable. The approach relied on minimizing a global cost consisting of the aggregate sum of individual costs regularized by a term that promotes smoothness. We examined the first- order, the second-order, and the fourth-order stability of the multitask learning algorithm. The results identified conditions on the step-size parameter, regularization strength, and data characteristics in order to ensure stability. This Part II examines steady-state performance of the strategy. The results reveal explicitly the influence of the network topology and the regularization strength on the network performance and provide insights into the design of effective multitask strategies for distributed inference over networks. Index Terms Multitask distributed inference, diffusion strategy, smoothness prior, graph Laplacian regularization, gradient noise, steady-state performance. 9 1 0 2 v o N 5 1 ] A M . s c [ 2 v 7 4 5 8 0 . 5 0 8 1 : v i X r a The work of A. H. Sayed was supported in part by NSF grants CCF-1524250 and ECCS-1407712. A short version of this work appeared in the conference publication [1]. This work was done while R. Nassif was a post-doc at EPFL. She is now with the American University of Beirut, Lebanon (e- mail: [email protected]). S. Vlaski and A. H. Sayed are with Institute of Electrical Engineering, EPFL, Switzerland (e-mail: stefan.vlaski,[email protected]). C. Richard is with Universit´e de Nice Sophia-Antipolis, France (e-mail: [email protected]). 2 I. INTRODUCTION As pointed out in Part I [2] of this work, most prior literature on distributed inference over networks focuses on single-task problems, where agents with separable objective functions need to agree on a common parameter vector corresponding to the minimizer of an aggregate sum of individual costs [3] -- [13]. In this paper, and its accompanying Part I [2], we focus instead on multitask networks where the agents may need to estimate and track multiple objectives simultaneously [14] -- [26]. Although agents may generally have distinct though related tasks to perform, they may still be able to capitalize on inductive transfer between them to improve their performance. Based on the type of prior information that may be available about how the tasks are related to each other, multitask learning algorithms can be derived by translating the prior information into constraints on the parameter vectors to be inferred. In Part I [2], we considered multitask inference problems where each agent in the network seeks to minimize an individual cost expressed as the expectation of some loss function. The minimizers of the individual costs are assumed to vary smoothly over the topology, as dictated by the graph Laplacian matrix. The smoothness property softens the transitions in the tasks among adjacent nodes and allows incorporating information about the graph structure into the solution of the inference problem. In order to exploit the smoothness prior, we formulated the inference problem as the minimization of the aggregate sum of individual costs regularized by a term promoting smoothness, known as the graph-Laplacian regularizer [27], [28]. A diffusion strategy was proposed that responds to streaming data and employs stochastic approximations in place of actual gradient vectors, which are generally unavailable. The analysis from Part I [2] revealed how the regularization strength η can steer the convergence point of the network toward many modes of operation starting from the non-cooperative mode (η = 0) where each agent converges to the minimizer of its individual cost and ending with the single-task mode (η → ∞) where all agents converge to a common parameter vector corresponding to the minimizer of the aggregate sum of individual costs. For any values of η in the range 0 < η < ∞, the network behaves in a multitask mode where agents seek their individual models while at the same time ensuring that these models satisfy certain smoothness and closeness conditions dictated by the value of η. We carried out in Part I [2] a detailed stability analysis of the proposed strategy. We showed, under conditions on the step-size learning parameter µ, that the adaptive strategy induces a contraction mapping and that despite gradient noise, it is able to converge in the mean-square-error sense within O(µ) from the solution of the regularized problem, for sufficiently small µ. We also established the first and fourth- order moments stability of the network error process and showed that they tend asymptotically to bounded region on the order of O(µ) and O(µ2), respectively. Based on the results established in Part I [2], we shall derive in this paper a closed-form expression for the steady-state network mean-square-error relative to the minimizer of the regularized cost. This closed form expres- sion will reveal explicitly the influence of the regularization strength, network topology (through the eigenvalues 3 and eigenvectors of the Laplacian matrix), gradient noise, and data characteristics, on the network performance. Additionally, a closed-form expression for the steady-state network mean-square-error relative to the minimizers of the individual costs is also derived. This expression will provide insights on the design of effective multitask strategies for distributed inference over networks. Notation. We adopt the same notation from Part I [2]. All vectors are column vectors. Random quantities are denoted in boldface. Matrices are denoted in capital letters while vectors and scalars are denoted in lower-case letters. The operator (cid:22) denotes an element-wise inequality; i.e., a (cid:22) b implies that each entry of the vector a is less than or equal to the corresponding entry of b. The symbol diag{·} forms a matrix from block arguments by placing each block immediately below and to the right of its predecessor. The operator col{·} stacks the column vector entries on top of each other. The symbols ⊗ and ⊗b denote the Kronecker product and the block Kronecker product, respectively. The symbol vec(·) refers to the standard vectorization operator that stacks the columns of a matrix on top of each other and the symbol bvec(·) refers to the block vectorization operation that vectorizes each block and stacks the vectors on top of each other. II. DISTRIBUTED INFERENCE UNDER SMOOTHNESS PRIORS A. Problem formulation and adaptive strategy degree matrix D is a diagonal matrix with k-th entry [D]kk =(cid:80)N Consider a connected network (or graph) G = {N ,E, A}, where N is a set of N agents (nodes), E is a set of edges connecting agents with particular relations, and A is a symmetric, weighted adjacency matrix. If there is an edge connecting agents k and (cid:96), then [A]k(cid:96) = ak(cid:96) > 0 reflects the strength of the relation between k and (cid:96); otherwise, [A]k(cid:96) = 0. We introduce the graph Laplacian L, which is a differential operator defined as L = D − A, where the (cid:96)=1 ak(cid:96). Since L is symmetric positive semi-definite, it possesses a complete set of orthonormal eigenvectors. We denote them by {v1, . . . , vN}. For convenience, we order the set of real, non-negative eigenvalues of L as 0 = λ1 < λ2 ≤ . . . ≤ λN = λmax(L), where, since the network is connected, there is only one zero eigenvalue with corresponding eigenvector v1 = 1√ 1N [29]. Thus, the Laplacian can be decomposed as: N L = V ΛV (cid:62), (1) where Λ = diag{λ1, . . . , λN} and V = [v1, . . . , vN ]. Let wk ∈ RM denote some parameter vector at agent k and let W = col{w1, . . . , wN} denote the collection of parameter vectors from across the network. We associate with each agent k a risk function Jk(wk) : RM → R assumed to be strongly convex. In most learning and adaptation problems, the risk function is expressed as the expectation of a loss function Qk(·) and is written as Jk(wk) = E Qk(wk; xk), where xk denotes the random data. The expectation is computed over the distribution of this data. We denote the unique minimizer of Jk(wk) by wo k. Let us recall the assumption on the risks {Jk(wk)} used in Part I [2]. 4 Assumption 1. (Strong convexity) It is assumed that the individual costs Jk(wk) are each twice differentiable and strongly convex such that the Hessian matrix function Hk(wk) = ∇2 Jk(wk) is uniformly bounded from below and above, say, as: wk 0 < λk,minIM ≤ Hk(wk) ≤ λk,maxIM , (2) where λk,min > 0 for k = 1, . . . , N. In many situations, there is prior information available about Wo = col{wo N}. In the current Part II, and its accompanying Part I [2], the prior belief we want to enforce is that the target signal Wo is smooth with respect to the underlying weighted graph. References [16], [17] provide variations for such problems for the special case of mean-square-error costs. Here we treat general convex costs. Let L = L ⊗ IM . The smoothness of W can be measured in terms of a quadratic form of the graph Laplacian [27], [28], [30] -- [32]: 1, . . . , wo S(W) = W(cid:62)LW = 1 2 ak(cid:96)(cid:107)wk − w(cid:96)(cid:107)2, (3) where Nk is the set of neighbors of k, i.e., the set of nodes connected to agent k by an edge. The smaller S(W) is, the smoother the signal W on the graph is. Intuitively, given that the weights are non-negative, S(W) shows that W is considered to be smooth if nodes with a large ak(cid:96) on the edge connecting them have similar weight values {wk, w(cid:96)}. Our objective is to devise and study a strategy that solves the following regularized problem: N(cid:88) (cid:88) k=1 (cid:96)∈Nk N(cid:88) Jk(wk) + Wo η = arg minW J glob(W) = (4) N,η}. in a distributed manner where each agent is interested in estimating the k-th sub-vector of Wo The tuning parameter η ≥ 0 controls the trade-off between the two components of the objective function. We are particularly interested in solving the problem in the stochastic setting when the distribution of the data xk in Jk(wk) = E Qk(wk; xk) is generally unknown. This means that the risks Jk(wk) and their gradients ∇wkJk(wk) are unknown. As such, approximate gradient vectors need to be employed. A common construction in stochastic η = col{wo 1,η, . . . , wo k=1 W(cid:62)LW, η 2 approximation theory is to employ the following approximation at iteration i: (cid:92)∇wkJk(wk) = ∇wkQk(wk; xk,i), (5) where xk,i represents the data observed at iteration i. The difference between the true gradient and its approximation is called the gradient noise sk,i(·): sk,i(w) (cid:44) ∇wkJk(w) − (cid:92)∇wkJk(w). (6) Let wk,i denote the estimate of wo adaptive manner, we proposed in Part I [2] the following diffusion-type algorithm: k,η at iteration i and node k. In order to solve (4) in a fully distributed and  ψk,i = wk,i−1 − µ (cid:92)∇wkJk(wk,i−1) wk,i = ψk,i − µη (cid:88) ak(cid:96)(ψk,i − ψ(cid:96),i), (cid:96)∈Nk (7) where µ > 0 is a small step-size parameter and ψk,i is an intermediate variable. 5 B. Summary of main results One key insight that followed from the analysis in Part I [2] is that the smoothing parameter η can be regarded as an effective tuning parameter that controls the nature of the learning process. The value of η can vary from η = 0 to η → ∞. We showed that at one end, when η = 0, the learning algorithm reduces to a non-cooperative mode of operation where each agent acts individually and estimates its own local model, wo k. On the other hand, when η → ∞, the learning algorithm moves to a single-mode of operation where all agents cooperate to estimate a single parameter (namely, the Pareto solution of the aggregate cost function). For any values of η in the range 0 < η < ∞, the network behaves in a multitask mode where agents seek their individual models while at the same time ensuring that these models satisfy certain smoothness and closeness conditions dictated by the value of η. In Part I [2], we carried out a detailed stability analysis of the proposed strategy (7). We showed, under some conditions on the step-size parameter µ, that: (cid:107)E(Wo E(cid:107)Wo E(cid:107)Wo η − Wi)(cid:107) = O(µ), η − Wi(cid:107)2 = O(µ), η − Wi(cid:107)4 = O(µ2), lim sup i→∞ lim sup i→∞ lim sup i→∞ (see [2, Theorem 4]) (see [2, Theorem 2]) (see [2, Theorem 3]) (8) (9) (10) η is the solution of the regularized problem (4) and Wi = col{w1,i, . . . , wN,i} denotes the network block where Wo weight vector at iteration i. Expression (9) indicates that the mean-square error E(cid:107)Wo η − Wi(cid:107)2 is on the order of µ. However, in this Part II, we are interested in characterizing how close the Wi gets to the network limit point Wo η. In particular, we will be able to characterize the network mean-square deviation (MSD) (defined below in (51)) value in terms of the step-size µ, the regularization strength η, the network topology (captured by the eigenvalues λm and eigenvectors vm of the Laplacian L), and the data characteristics (captured by the second-order properties of the costs Hk,η and second-order moments of the gradient noise Rs,k,η) as follows: Tr [vm]2 kHk,η + ηλmI [vm]2 kRs,k,η m=1 k=1 k=1 O(µ) (O(1) + O(η)) , (11) where [vm]k denotes the k-th entry of the eigenvector vm. The interpretation of (11) is explained in more detail (O(1)+O(η)) will in Section IV where it is shown, by coupling η and µ in an appropriate manner, that the term be a strictly higher order term of µ. As we will explain later in Sections IV and V, by properly setting the O(µ) parameters, expression (11) allows us to recover the mean-square-deviation of stand-alone adaptive agents (η = 0) and single-task diffusion networks (η → ∞). Recall that the objective of the multitask strategy (7) is to exploit similarities among neighboring agents in an attempt to improve the overall network performance in approaching the collection of individual minimizer Wo by means of local communications. Section V in this paper is devoted to quantify the benefit of cooperation, namely, the objective of improving the mean-square deviation around the limiting point of the algorithm. In particular, we N(cid:88) (cid:32) N(cid:88) MSD = µ 2N (cid:33)−1(cid:32) N(cid:88) (cid:33) + 6 will be able to characterize the mean-square-deviation (MSD) value relative to the multitask objective Wo in terms of the MSD in (11) and the mismatch Wo MSD = MSD(cid:124)(cid:123)(cid:122)(cid:125) O(µ),η η − Wo as follows: (cid:123)(cid:122) (cid:125) η − Wo(cid:107)2 +(cid:107)Wo (cid:124) smoothness,η +2(Wo η − Wo)(cid:62) bias(cid:124)(cid:123)(cid:122)(cid:125) O(µ),η , (12) where "bias" is the bias of algorithm (7) relative to Wo η given in future expression (40). By increasing η, the MSD η−Wo(cid:107)2 is more in (11) is more likely to decrease. However, by increasing η, from expression (31) in Part I [2], (cid:107)Wo likely to increase and the size of this increase is determined by the smoothness of Wo. From future Lemma 2, it turns out that the third term on the RHS in (12) is a function of µ, η, and the smoothness of the multitask objective Wo. By increasing η, this term is more likely to increase. The key conclusion will be that, while the second and third terms on the RHS in (12) will in general increase as the regularization strength η increases, the size of this increase is determined by the smoothness of Wo which is in turn function of the network topology captured by L. The more similar the tasks at neighboring agents are, the smaller these terms will be. This implies that as long as Wo is sufficiently smooth, moderate regularization strengths η in the range ]0,∞[ exist such that MSD at these values of η will be less than MSD at η = 0 which corresponds to the non-cooperative mode of operation. The best choice for η would be the one minimizing MSD in (12). We refer the reader to Fig. 2 in [2, Section II-B] for an illustration of this concept of multitask learning benefit. This example will be considered further in the numerical experiments section. C. Modeling Assumptions from Part I [2] In this section, we recall the assumptions used in Part I [2] to establish the network mean-square error stability (9). Assumption 2. (Gradient noise process) The gradient noise process defined in (6) satisfies for any w ∈ F i−1 and for all k, (cid:96) = 1, 2, . . . , N: E[sk,i(w)F i−1] = 0, E[(cid:107)sk,i(w)(cid:107)2F i−1] ≤ β2 (cid:96),i(w)F i−1] = 0, E[sk,i(w)s(cid:62) k(cid:107)w(cid:107)2 + σ2 s,k, k (cid:54)= (cid:96), k ≥ 0, σ2 (15) s,k ≥ 0, and where F i−1 denotes the filtration generated by the random processes {w(cid:96),j} for for some β2 all (cid:96) = 1, . . . , N and j ≤ i − 1. Let us introduce the network block vector Wi = col{w1,i, . . . , wN,i}. Recall from Part I [2] that at each iteration, we can view (7) as a mapping from Wi−1 to Wi: (13) (14) (16) Wi = (IM N − µηL) Wi−1 − µ col (cid:18) (cid:111)N (cid:110) (cid:92)∇wkJk(wk,i−1) k=1 (cid:19) We introduced the following condition on the combination matrix (IM N − µηL). Assumption 3. (Combination matrix) The symmetric combination matrix (IM N − µηL) has nonnegative entries and its spectral radius is equal to one. Since L has an eigenvalue at zero, these conditions are satisfied when the step-size µ > 0 and the regularization strength η ≥ 0 satisfy: 7 0 ≤ µη ≤ 2 λmax(L) 0 ≤ µη ≤ min 1≤k≤N , (cid:40) 1(cid:80)N (cid:96)=1 ak(cid:96) (cid:41) , (17) (18) where condition (17) ensures stability and condition (18) ensures non-negative entries. The results in Part I [2] established that the iterates wk,i converge in the mean-square-error sense to a small O(µ)− neighborhood around the regularized solution wo k,η. In this part of the work, we will be more precise and determine the size of this neighborhood, i.e., assess the size of the constant multiplying µ in the O(µ)−term. To do so, we shall derive an accurate first-order expression for the mean-square error (9); the expression will be accurate to first-order in µ. To arrive at the desired expression, we first need to introduce a long-term approximation model and assess how close it is to the actual model. We then derive the performance for the long-term model and use this closeness to transform this result into an accurate expression for the performance of the original learning algorithm. To derive the long-term model, we follow the approach developed in [9]. The first step is to establish the asymptotic stability η − Wi(cid:107)4, which has already been done in Part I [2]. This of the fourth-order moment of the error vector, E(cid:107)Wo property is needed to justify the validity of the long-term approximate model. Recall that to establish the fourth- order stability, we replaced condition (14) on the gradient noise process by the following condition on its fourth order moment: E(cid:2)(cid:107)sk,i(wk)(cid:107)4F i−1 (cid:3) ≤ β 4 k(cid:107)wk(cid:107)4 + σ4 s,k, (19) for some β 4 k ≥ 0, and σ4 s,k ≥ 0. As explained in [9], condition (19) implies (14). To establish the mean-stability (8), we introduced a smoothness condition on the Hessian matrices of the individual costs. This smoothness condition will be adopted in the next section when we study the long term behavior of the network. Assumption 4. (Smoothness condition on individual cost functions). It is assumed that each Jk(wk) satisfies a k,η, in that the corresponding Hessian matrix is Lipchitz continuous in the proximity smoothness condition close to wo of wo k,η with some parameter κd ≥ 0, i.e., (cid:107)∇2 wk for small perturbations (cid:107)∆wk(cid:107) ≤ . Jk(wo k,η + ∆wk) − ∇2 wk Jk(wo k,η)(cid:107) ≤ κd(cid:107)∆wk(cid:107), (20) 8 Let (cid:101)Wi = Wo we obtain: III. LONG-TERM NETWORK DYNAMICS η − Wi. Subtracting the vector (IM N − µηL)Wo (cid:101)Wi − µηLWo (cid:16)(cid:101)Wi−1 + µ col{∇wkJk(wk,i−1) − sk,i(wk,i−1)}N η = (IM N − µηL) (cid:17) η from both sides of recursion (16), and using (6), , (21) k=1 From the mean-value theorem [33, pp. 24], [9, Appendix D], we have: where ∇wkJk(wk,i−1) = ∇wkJk(wo k,η) − H k,i−1(wo k,η − wk,i−1), H k,i−1 (cid:44) Jk(wo k,η − t(wo k,η − wk,i−1))dt, ∇2 (cid:90) 1 col(cid:8)∇wkJk(wo wk 0 k,η)(cid:9)N and from the optimality condition of (4), we have: Replacing (22) into (21) and using (24), we arrive at the following recursion for (cid:101)Wi: (cid:101)Wi = (IM N − µηL)(IM N − µHi−1)(cid:101)Wi−1 − µ(IM N − µηL)si(Wi−1) + µ2η2L2Wo k=1 η, = −ηLWo η. (22) (23) (24) (25) (26) (27) where si(Wi−1) (cid:44) col{sk,i(wk,i−1)}N k=1, Hi−1 (cid:44) diag{H k,i−1}N k=1. We move on to motivate a long-term model for the evolution of the network error dynamics, (cid:101)Wi, after sufficient iterations, i.e., for i (cid:29) 1. We examine the stability property of the model, the proximity of its trajectory to that of the original network dynamics (25), and subsequently employ the model to assess network performance. A. Long-term error model We introduce the error matrix (cid:101)Hi−1 (cid:44) Hη − Hi−1, which measures the deviation of Hi−1 from the constant matrix: Hη (cid:44) diag{Hk,η}N k=1, with each Hk,η given by the value of the Hessian matrix at the regularized solution, namely, Hk,η (cid:44) ∇2 Let wk Then, we can write: Bi−1 (cid:44) (IM N − µηL)(IM N − µHi−1), Bη (cid:44) (IM N − µηL)(IM N − µHη). Bi−1 = Bη + µ(IM N − µηL)(cid:101)Hi−1. (28) Jk(wo k,η). (29) (30) (31) Using (31), we can rewrite the error recursion (25) as: (cid:101)Wi = Bη(cid:101)Wi−1 − µ(IM N − µηL)si(Wi−1) + µ2η2L2Wo η + µ(IM N − µηL)ci−1, in terms of the random perturbation sequence: ci−1 (cid:44) (cid:101)Hi−1(cid:101)Wi−1. 9 (32) (33) Under Assumptions 1 and 4, and for small µ, it can be shown that lim supi→∞ E(cid:107)ci−1(cid:107) = O(µ), and that (cid:107)ci−1(cid:107) = O(µ) asymptotically with high probability (see Appendix A). Motivated by this result, we introduce the following approximate model, where the last term involving ci−1 in (32), which is O(µ2), is removed: (cid:101)W(cid:48) i = Bη(cid:101)W(cid:48) i−1 − µ(IM N − µηL)si(Wi−1) + µ2η2L2Wo η, i (cid:29) 1. (34) Obviously, the iterates that are generated by (34) are generally different from the iterates generated by the original recursion (25). To highlight this fact, we are using the prime notation for the state of the long-term model. Note that the driving process si(Wi−1) in (34) is the same gradient noise process from the original recursion (25) and is evaluated at Wi−1. In the following, we show that, after sufficient iterations i (cid:29) 1, the error dynamics of the network relative to the solution Wo η is well-approximated by the model (34). B. Size of Approximation Error We start by showing that the mean-square difference between the trajectories {(cid:101)Wi, (cid:101)W(cid:48) i} is asymptotically bounded 2 ) from the 3 by O(µ2) and that the mean-square error performance of the long term model (34) is within O(µ performance of the original recursion (25). Working with recursion (34) is much more tractable for performance analysis because its dynamics is driven by the constant matrix Bη as opposed to the random matrix Bi−1 in the original error recursion (25). Therefore, we shall work with the long-term model (34) and evaluate its performance, which will provide an accurate representation for the performance of the original distributed strategy (7) to first order in the step-size µ. Lemma 1. (Size of approximation error) Under Assumptions 1, 2, 3, and 4, and condition (19), it holds that: E(cid:107)(cid:101)Wi − (cid:101)W(cid:48) lim sup i→∞ i(cid:107)2 = O(µ2), E(cid:107)(cid:101)Wi(cid:107)2 = lim sup i→∞ E(cid:107)(cid:101)W(cid:48) i(cid:107)2 + O(µ 3 2 ). (35) (36) lim sup i→∞ Proof. See Appendix B. We shall discuss now the mean and mean-square error stability of the long-term approximate model (34). 10 C. Stability of First-Order Error Moment Conditioning both sides of (34), invoking the conditions on the gradient noise from Assumption 2, and computing the conditional expectations, we obtain: Taking expectation again, we arrive at: iF i−1] = Bη(cid:101)W(cid:48) E[(cid:101)W(cid:48) E(cid:101)W(cid:48) i = BηE(cid:101)W(cid:48) i−1 + µ2η2L2Wo η. i−1 + µ2η2L2Wo η. (37) (38) (39) (40) The above recursion is stable if the matrix Bη in (30) is stable. This matrix has a similar form to the matrix (IM N − µηL)(IM N − µH∞) encountered in Part I [2, Section III-A2]. Similarly, it can be verified that Bη is stable when condition (17) and condition (cid:26) 2 (cid:27) . 0 < µ < min 1≤k≤N λk,max are satisfied. In this case, we obtain (cid:101)W(cid:48) ∞ (cid:44) lim i→∞ E(cid:101)W(cid:48) i = µ2η2(IM N − (IM N − µηL)(IM N − µHη))−1L2Wo η, where the RHS in the above expression is similar to the RHS in equation (49) [2] with H∞ replaced by Hη. Lemma 2. (Mean stability of long-term model) Under Assumptions 1, 2, 3, and 4, and for sufficiently small µ, the steady-state bias (cid:101)W(cid:48) ∞ = limi→∞ E(cid:101)W(cid:48) i of the long-term model (34) given by (40) satisfies: (cid:18) 1 µ (cid:19) i→∞(cid:107)E(cid:101)W(cid:48) lim i(cid:107) µ lim µ→0 ≤ µ O(η2) (O(1) + O(η))2 . (41) Proof. The proof is similar to the proof of Theorem 1 in Part I [2] with H∞ replaced by Hη. D. Stability of Second-Order Error Moment that E(cid:107)(cid:101)w In the following, we show that the long term approximate model (34) is also mean-square stable in the sense (cid:48) k,i(cid:107)2 tends asymptotically to a region that is bounded by O(µ). We follow the same line of reasoning as in Part I [2, Section III-A] where we studied the mean-square stability of the original model (25). Based on the inequality: lim sup i→∞ η − W(cid:48)∞ = (cid:101)W(cid:48) where Wo the recursion: E(cid:107)Wo η − W(cid:48) i(cid:107)2 = lim sup i→∞ ≤ 2(cid:107)Wo η − W(cid:48) E(cid:107)Wo η − W(cid:48) ∞ + W(cid:48) ∞(cid:107)2 + 2 lim sup i→∞ ∞ − W(cid:48) E(cid:107)W(cid:48) i(cid:107)2 ∞ − W(cid:48) i(cid:107)2, (42) ∞ is the steady-state bias of the long term model given by (40) and where W(cid:48)∞ − W(cid:48) i follows ∞ − W(cid:48) W(cid:48) i = Bη(W(cid:48) ∞ − W(cid:48) i−1) − µ(IM N − µηL)si(Wi−1), (43) 11 (cid:44) col(cid:8)E(cid:107)w(cid:48) MSP(cid:48) k,i(cid:107)2(cid:9)N k,∞ − w(cid:48) and from Theorems 1 and 2 in Part I [2] and previous Lemma 2, we can establish the mean-square stability of (34). Let us introduce the mean-square perturbation vector (MSP(cid:48)) at time i relative to W(cid:48)∞: (44) Lemma 3. (Mean-square stability of the long-term model) Under Assumptions 1, 2, 3, and 4, the MSP(cid:48) at time i can be recursively bounded as: k=1 . i MSP(cid:48) i (cid:22) (IN − µηL)(G(cid:48)(cid:48))2MSP(cid:48) i−1 + 3µ2(IN − µηL)diag{β2 k}N k=1MSPi−1 + µ2(IN − µηL)b, where: G(cid:48)(cid:48) (cid:44) diag{γk}N b (cid:44) col(cid:8)σ2 k=1 , k(cid:107)wo γk (cid:44) max{1 − µλk,min,1 − µλk,max}. k,η(cid:107)2 + 3β2 s,k + 3β2 k(cid:107)wo k,η − wk,∞(cid:107)2(cid:9)N , k=1 (45) (46) (47) (48) and MSPi is the mean-square perturbation vector at time i relative to the fixed point W∞ = col{wk,∞}N k=1 of algorithm (7) in the absence of gradient noise (see [2, Section III-A3]). A sufficiently small µ ensures the stability of the above recursion. It follows that (cid:107) lim sup i→∞ MSP(cid:48) i(cid:107)∞ = O(µ), E(cid:107)(cid:101)W(cid:48) i(cid:107)2 = O(µ) + lim sup i→∞ O(µ2η4) (O(1) + O(η))4 = O(µ). (49) (50) and that Proof. See Appendix C. IV. MEAN-SQUARE-ERROR PERFORMANCE We established in Theorem 2 in Part I [2] that a network running strategy (7) is mean-square-error stable for η − Wi(cid:107)2 = O(µ). In the following, we assess sufficiently small µ. Specifically, we showed that lim supi→∞ E(cid:107)Wo the size of the network mean-square-deviation (MSD) using the definition [9, Chapter 11]: (cid:18) (cid:18) 1 N (cid:19)(cid:19) MSD (cid:44) µ lim µ→0 lim sup i→∞ E 1 µ (cid:107)Wo η − Wi(cid:107)2 . (51) In addition to Assumptions 1, 2, 3, 4, and condition (19) on the individual costs, Jk(wk), the gradient noise process, sk,i(wk), and the combination matrix, IN − µηL, we introduce a smoothness condition on the noise covariance matrices. For any wk ∈ F i−1, we let Rs,k,i(wk) (cid:44) E[sk,i(wk)s(cid:62) k,i(wk)F i−1] (52) denote the conditional second-order moment of the gradient noise process, which generally depends on i because the statistical distribution of sk,i(wk) can be iteration-dependent, and is random since it depends on the random 12 iterate wk. We assume that, in the limit, this covariance matrix tends to a constant value when evaluated at wo k,η and we denote the limit by: Rs,k,η (cid:44) lim i→∞ E[sk,i(wo k,η)s(cid:62) k,i(wo k,η)F i−1]. (53) Assumption 5. (Smoothness condition on the noise covariance) It is assumed that the conditional second-order moment of the noise process is locally Lipschitz continuous in a small neighborhood around wo k,η, namely, (cid:107)Rs,k,i(wo k,η + ∆wk) − Rs,k,i(wo k,η)(cid:107) ≤ κd(cid:107)∆wk(cid:107)θ, (54) for small perturbations (cid:107)∆wk(cid:107) ≤ , and for some constant κd ≥ 0 and exponent 0 < θ ≤ 4. One useful conclusion that follows from Assumption 5 is that, after sufficient iterations, we can express the covariance matrix of the gradient noise process, sk,i(wk), in terms of the limiting matrix Rs,k,η defined in (53). Specifically, following the same proof used to establish Lemma 11.1 in [9], we can show that under the smoothness condition and for small step-size, the covariance matrix of the gradient noise process, sk,i(wk,i−1), at each agent k satisfies for i (cid:29) 1: (cid:16) 2}(cid:17) µmin{1, θ Esk,i(wk,i−1)s(cid:62) k,i(wk,i−1) = Rs,k,η + O . (55) For clarity of presentation, we sketch the proof in Appendix D where we used results from Theorems 2 and 3 in Part I [2]. Before studying the steady-state network performance, we establish some properties of the matrix: Fη (cid:44) B(cid:62) η ⊗b B(cid:62) η , (56) which is defined in terms of the block Kronecker operation using blocks of size M × M. In the derivation that follows, we shall use the block Kronecker product ⊗b operator [34] and the block vectorization operator bvec(·). As explained in [9], these operations preserve the locality of the blocks in the original matrix arguments. Since ρ(Fη) = (ρ(Bη))2, the matrix Fη is stable under conditions (17) and (39). This matrix plays a critical role in characterizing the performance of the distributed multitask algorithm. In our derivations, the matrix Fη will also appear transformed under the orthonormal transformation: F η (cid:44) (V ⊗b V)(cid:62)Fη(V ⊗b V), where V (cid:44) V ⊗ IM . Lemma 4. (Coefficient matrix Fη) For sufficiently small step-size, it holds that (I − Fη)−1 = O(µ−1), and (I − F η)−1 = X−1 + W  O(1) 0  + µ−1 ·  (O(1) + O(η))−1 (O(1) + O(η))−1  (O(1) + O(η))−1 (O(1) + O(η))−2 0 (O(1) + O(η))−1 = µ−1 · (57) (58) (59) (60) where X is an N 2 × N 2 block diagonal matrix with each block of dimension M 2 × M 2: X = µ · diag diag{(1 − µηλm)(1 − µηλp)(Hmm ⊕ Hpp) + η(λm + λp − µηλmλp)IM 2}N p=1 (cid:110) with ⊕ denoting the Kronecker sum operator [35]: Hmm ⊕ Hpp = Hmm ⊗ IM + IM ⊗ Hpp, m ⊗ IM )Hη(vn ⊗ IM ). Hmn (cid:44) (v(cid:62) 13 (cid:111)N m=1 , (61) (62) (63) The matrix W is an N 2 × N 2 block matrix arising from the matrices {Hmnm (cid:54)= n}. Moreover, we can also write: (I − Fη)−1 = (V ⊗b V)X−1(V ⊗b V)(cid:62) + µ−1(O(1) + O(η))−1. (64) Proof. See Appendix E. As we shall see in Theorem 1, it turns out that the decomposition in (59) is very useful to highlight some important facts arising in the steady-state performance of the multitask algorithm. Lemma 5. (Steady-state network performance) Under Assumptions 1, 2, 3, 4, and 5, and condition (19), it holds that: lim sup i→∞ 1 N E(cid:107)Wo η − Wi(cid:107)2 = = 1 N 1 N ∞(cid:88) (cid:16)Bn Tr ηY(B(cid:62) η )n(cid:17) + O(µ1+θm) n=0 (bvec(Y(cid:62)))(cid:62)(I − Fη)−1bvec (IM N ) + O(µ1+θm), where θm = 1 2 min{1, θ}, Bη and Fη are defined in (30) and (56), and Y (cid:44) µ2(IM N − µηL)Sη(IM N − µηL), Sη (cid:44) diag{Rs,k,η}N k=1 , (65) (66) (67) Proof. The proof is a direct extension of the arguments used to establish Theorem 11.2 in [9] for single-task diffusion adaptation. See Appendix F. Theorem 1. (Network MSD performance) Under the same conditions of Lemma 5, it holds from Lemma 4 that the steady-state network MSD defined in (51) can be written as: N(cid:88) (cid:32) N(cid:88) (cid:33)−1(cid:32) N(cid:88) (cid:33) + MSD = µ 2N Tr [vm]2 kHk,η + ηλmI [vm]2 kRs,k,η m=1 k=1 k=1 O(µ) (O(1) + O(η)) . (68) Proof. See Appendix G. As the derivation in Appendix G reveals, the second term on the RHS of (68) results from the matrix W in (59) which is zero when {Hmn = 0, m (cid:54)= n}. When the Hessian matrices are uniform across the agents: Hk,η ≡ Hη, k = 1, . . . , N, (69) 14 we have Hmn = 0 for m (cid:54)= n. In this case, the network MSD in (68) simplifies to: (cid:32) N(cid:88) (cid:32) N(cid:88) −1 (cid:33)(cid:33) MSD = µ 2N Tr (Hη + ηλmI) [vm]2 kRs,k,η . (70) m=1 k=1 Moreover, in the non-uniform Hessian matrices scenario, by letting η = µ− with  > 0 chosen such that Assumption 3 is satisfied, we obtain: O(µ) (O(1) + O(η)) = O(µ1+). (71) In this case, the first term on the RHS of (68) dominates the factor O(µ1+) and when we evaluate the network MSD according to definition (51), the last term on the RHS of (68) disappears when computing the limit as µ → 0. As we will see by simulations, the first term on the RHS of (68) provides a good approximation for the network MSD for any η ≥ 0. The first term on the RHS of (68) reveals explicitly the influence of the step-size µ, regularization strength η, network topology (through the eigenvalues λm and eigenvectors vm of the Laplacian), gradient noise (through the covariance matrices Rs,k,η), and data characteristics (through the Hessian matrices Hk,η) on the network MSD performance. Observe that this term consists of the sum of N individual terms, each associated with an eigenvalue λm of the Laplacian matrix, and given by: (cid:16)(cid:0)H m,η + ηλmI(cid:1)−1 (cid:17) Rm,η , (72) µ 2N Tr N(cid:88) N(cid:88) k=1 k=1 where H m,η and Rm,η are transformed versions of Hη in (28) and Sη in (67) at the m-th eigenvalue λm, respectively: H m,η (cid:44) Rm,η (cid:44) [vm]2 kHk,η = (v(cid:62) m ⊗ IM )Hη(vm ⊗ IM ), [vm]2 kRs,k,η = (v(cid:62) m ⊗ IM )Sη(vm ⊗ IM ). (73) (74) As shown in Section VI-A, under some assumptions on the data and noise characteristics, the individual terms in (72) are decaying functions of η or λm. Before proceeding, we note that expression (68) can be written alternatively as: Tr (cid:32) N(cid:88) (cid:32) N(cid:88) N(cid:88) Hk,η Tr k=1 (cid:33)−1(cid:32) N(cid:88) Rs,k,η k=1 (cid:33) + (cid:33)−1(cid:32) N(cid:88) [vm]2 kHk,η + ηλmI [vm]2 kRs,k,η m=2 k=1 k=1 MSD = µ 2N µ 2N (cid:33) + (75) O(µ) (O(1) + O(η)) , where we used the fact that λ1 = 0 and v1 = 1√ performance of the single-task diffusion adaptation employed to estimate w(cid:63) given by: N 1N . Expression (75) allows us to recover the network MSD N(cid:88) k=1 w(cid:63) (cid:44) arg min w Jk(w). (76) To see this, we recall the expression for the network MSD performance of single-task diffusion adaptation derived in [9, pp. 594]: MSD = µ 2N Tr (cid:32) N(cid:88) (cid:33)−1(cid:32) N(cid:88) Hk,(cid:63) Rs,k,(cid:63) k=1 k=1 (cid:33) , 15 (77) wk where Hk,(cid:63) (cid:44) ∇2 Jk(w(cid:63)) and Rs,k,(cid:63) is the covariance of the gradient noise in (53) at w(cid:63). In order to estimate w(cid:63) using the multitask strategy (7), a very large η needs to be chosen. In this case, we have Hk,η = Hk,(cid:63) and Rs,k,η = Rs,k,(cid:63). Moreover, the second and third terms on the RHS of expression (75) will be O(µ/η) which are negligible for a very large η. Thus, we obtain (77). V. MULTITASK LEARNING BENEFIT Now that we have studied in detail the mean-square performance of the multitask strategy (7) relative to Wo η, the minimizer of the regularized cost (4), we will use the results to examine the benefit of multitask learning compared to the non-cooperative solution under the smoothness assumption. Since each cost is strongly convex, each agent k is able to estimate wo k on its own, if desired, in a non-cooperative manner by running strategy (7) with η = 0. We know from previous established results on single-agent adaptation [9, pp. 390] that the network MSD in that case will be given by: MSDncop = µ 2N Tr H−1 k,o Rs,k,o , (78) wk Jk(wo k) and Rs,k,o is the covariance of the gradient noise in (53) at wo where Hk,o (cid:44) ∇2 k. Note that expression (68) allows us to recover the mean-square-error performance of stand-alone adaptive agents. In particular, it can be easily verified that (68) reduces to expression µ k,o Rs,k,o) for the mean-square deviation of single agent learner [9, pp. 390] when the network size is set to N = 1 and the topology is removed. 2 Tr(H−1 When η > 0 is used, the graph Laplacian regularizer (4) induces a bias relative to Wo. However, when Wo is smooth, we expect that promoting the smoothness of Wo through regularization can improve the network MSD performance despite the bias induced in the estimation. (cid:33) (cid:32) N(cid:88) k=1 A. Induced bias relative to Wo The bias of the strategy (7) is given by: From the triangle inequality we have: where lim supi→∞ (cid:107)E(cid:0)Wo lim supi→∞ (cid:107)E(cid:0)Wo η − Wi lim sup i→∞ η − Wi (cid:107)E (Wo − Wi)(cid:107) ≤ (cid:107)Wo − Wo (cid:1)(cid:107) can be replaced by (cid:107)(cid:101)W(cid:48) η(cid:107) + lim sup (80) i→∞ ∞(cid:107) in (40). From expression (31) in Part I [2] we know η(cid:107) will be. Furthermore, we know from Theorem 4 in Part I [2] that (cid:1)(cid:107) is O(µ). Thus, for a smooth signal Wo and a small µ, the bias in (79) will be small. η − Wi that the smoother Wo is, the smaller (cid:107)Wo − Wo E (Wo − Wi) = (Wo − Wo (79) η) + E(cid:0)Wo η − Wi (cid:1) . (cid:107)E(cid:0)Wo (cid:1)(cid:107), 16 Fig. 1. Illustrative example. (Left) Network topology. (Right) Data and noise variances. B. Network MSD relative to Wo The mean-square-error performance of the strategy (7) relative to Wo is given by: E(cid:107)Wo − Wi(cid:107)2 = (cid:107)Wo − Wo η(cid:107)2 + E(cid:13)(cid:13)Wo η − Wi (cid:13)(cid:13)2 + 2(Wo − Wo η)(cid:62)E(cid:0)Wo η − Wi (cid:1) , E(cid:0)Wo (81) (82) (cid:1) , and the network MSD can be expressed as: MSD = 1 N lim sup i→∞ E(cid:107)Wo − Wi(cid:107)2 = MSD + (cid:107)Wo − Wo η(cid:107)2 + 1 N 2 N (Wo − Wo η)(cid:62) lim sup i→∞ η − Wi or (68). Note that lim supi→∞ E(cid:0)Wo where we used the bar notation to denote the network MSD relative to Wo and where MSD is given in (65) ∞ in (40). In order to improve the network MSD (cid:1) can be replaced by (cid:101)W(cid:48) η − Wi compared to the non-cooperative case (78), the regularization strength η must be chosen such that: MSD ≤ MSDncop, (83) and the optimal choice of η is the one minimizing MSD in (82) subject to η ≥ 0. VI. SIMULATION RESULTS We consider a connected network of N = 15 nodes and M = 5 with the topology shown in Fig. 1 (left). Each agent is subjected to streaming data {dk(i), uk,i} that are assumed to satisfy a linear regression model [9], [16]: dk(i) = uk,iwo k + vk(i), k = 1, . . . , N, (84) for some unknown M × 1 vector wo agent k: k with vk(i) a measurement noise. A mean-square-error cost is associated with Jk(wk) = (85) The processes {dk(i), uk,i, vk(i)} are assumed to represent zero-mean jointly wide-sense stationary random pro- cesses satisfying: i) Eu(cid:62) k,iu(cid:96),j = Ru,kδk,(cid:96)δi,j where Ru,k > 0 and the Kronecker delta δm,n = 1 if m = n and k = 1, . . . , N. Edk(i) − uk,iwk2, 1 2 -3-2-10123-2.5-2-1.5-1-0.500.511.522.5 Node,k2468101214<2u;k0.511.52Node,k2468101214<2v;k0.10.20.30.40.50.6 Recall from Part I [2] that S(W) in (3) can be written as: wo m = · col 1√ M (cid:111)M m}N e−τjλm . j=1 (cid:110) N(cid:88) 17 (86) (87) v,kδk,(cid:96)δi,j; iii) the regression and noise processes {u(cid:96),j, vk(i)} are independent zero otherwise; ii) Evk(i)v(cid:96)(j) = σ2 of each other. We set ak(cid:96) = 0.1 if (cid:96) ∈ Nk and 0 otherwise. It turns out that the Laplacian matrix has 15 distinct eigenvalues. We generate Wo according to Wo = VWo = col{wo m=1 with: S(W) = W(cid:62)LW = λm(cid:107)wm(cid:107)2, where wm = (v(cid:62) is. Note that, for MSE networks, it holds that Hk(wk) = ∇2 m ⊗ IM )W. From (87), we observe that the larger {τj ≥ 0} are, the smoother the signal Wo Jk(wk) = Ru,k ∀wk. Thus, the fixed point bias ∞ in (40). Furthermore, from η − W∞ given by (49) in Part I [2] is equal to the long-term model bias (cid:101)W(cid:48) (cid:101)W∞ = Wo wk m=2 the definition (6), the gradient noise process at agent k is given by: sk,i(wk) = (u(cid:62) k,iuk,i − Ru,k)(wo k − wk) + u(cid:62) k,ivk(i). Consider the covariance Rs,k,η defined in (53). From (88), we have: Rs,k,η = E[(u(cid:62) k,iuk,i − Ru,k)Wk,η(u(cid:62) k,iuk,i − Ru,k)] + σ2 v,kRu,k, where Wk,η = (wo k − wo k,η)(wo k − wo k,η)(cid:62). (88) (89) (90) To evaluate (89), we need the fourth order moment of the regressors. Let us assume that the regressors are zero-mean real Gaussian. In this case, using the fact that Wk,η is symmetric, we obtain [36]: E[u(cid:62) k,iuk,iWk,ηu(cid:62) k,iuk,i] = 2Ru,kWk,ηRu,k + Ru,kTr(Ru,kWk,η). Replacing the above expression in (89), we obtain: Rs,k,η = Ru,kWk,ηRu,k + Ru,kTr(Ru,kWk,η) + σ2 v,kRu,k. (91) (92) A. Uniform data profile In this setting, we assume uniform covariance matrices scenario where Ru,k = Ru ∀k. This scenario is encountered for example in distributed denoising problems in wireless sensor networks (or image denoising) [28], [37]. In this case, Ru is equal to one. In such problems, the N sensors in the network are observing N-dimensional signal, with each entry of the signal corresponding to one sensor. Using the prior knowledge that the signal is smooth w.r.t. the underlying topology, the sensor task is to denoise the corresponding entry of the signal by performing local computations and cooperating with its neighbor in order to improve the error variance. It turns out that in this scenario, the output of the network Wo η can be interpreted as the output of a low-pass graph filter applied to the graph signal Wo [1], [28], [38]. To see this, let us first recall the notion of graph frequencies, 18 graph Fourier transform, and graph filters [28], [37] -- [39]. Consider the connected graph G = {N ,E, A} equipped with a Laplacian matrix L, which can be decomposed as L = V ΛV (cid:62). A graph signal supported on the set N is defined as a vector x ∈ RN whose k-th component xk ∈ R represents the value of the signal at the k-th node. By analogy to the classical Fourier analysis, the eigenvectors of the Laplacian matrix L are used to define a attenuating its spectrum as: Φ =(cid:80)N graph Fourier basis V and the eigenvalues are considered as the graph frequencies. The graph Fourier transform (GFT) transforms a graph signal x into the graph frequency domain according to x = V (cid:62)x where {x1, . . . , xN} are called the spectrum of x. A graph filter Φ is an operator that acts upon a graph signal x by amplifying or m=1 Φ(λm)xmvm. The frequency response of the filter Φ(λ) controls how much Φ amplifies the signal spectrum. Low frequencies correspond to small eigenvalues, and low-pass or smooth filters correspond to decaying functions Φ(λ). Since we are dealing with vectors wk ∈ RM instead of scalars xk, the graph transformation x = V (cid:62)x becomes W = (V (cid:62) ⊗ IM )W. In the uniform covariance matrices scenario, we have Ho η = IN ⊗ Ru and relation (24) in Part I [2] reduces to: (cid:16) −1(cid:17) wo m,η = IM − ηλm (ηλmIM + Ru) wo m, m = 1, . . . , N. (93) m ⊗ IM )Ho since (v(cid:62) it holds that the m-th subvector corresponding to the m-th eigenvalue (or graph frequency) of Wo satisfies: η(vn ⊗ IM ) = Ru if m = n and zero otherwise. By applying the matrix inversion identity [40], η = (V (cid:62) ⊗ IM )Wo wo m,η = (ηλmIM + Ru) m,η(cid:107) ≤ (cid:107)wo 1 λm 1 + η λmax(Ru) −1 Ruwo m, m(cid:107), (cid:107)wo (94) (95) If η = 0, we are in the case of an all-pass graph filter since the frequency content of the output signal Wo η, is the same as the frequency content of the input signal Wo. For η > 0, we are in the case of a low-pass graph filter m,η(cid:107), is less than or equal to since the norm of the m-th frequency content of the output signal Wo the norm of the m-th frequency content of the input signal Wo, namely, (cid:107)wo m(cid:107). For fixed η, as m increases, the ratio in (95) decreases. This validates the low-pass filter interpretation. The regularization parameter η controls the sharpness of the low-pass filter. We illustrate this in Fig. 2 (left). In the experiment, we set Ru = IM and τj = 0 in (86) so that (cid:107)wo m,η for different values of η from (94). In order to visualize the frequency response of the graph filter, we also plot in dashed lines the m(cid:107)2 = 1 ∀m and we illustrate in Fig. 2 (left) the squared (cid:96)2-norm of wo η, namely, (cid:107)wo ratio (cid:107)wo m,η(cid:107)2 (cid:107)wo m(cid:107)2 from (94) for λm ∈ [0, 1.2] with (cid:107)wo m(cid:107)2 = 1 ∀m. We observe that a similar behavior arises when studying the network MSD for smooth signal Wo. When Wo is smooth, Wk,η in (90) is small and in this case, the covariance matrix Rs,k,η in (92) can be approximated by Rs,k,η ≈ σ2 v,kRu. In this case, the network MSD expression in (70) can be approximated as: (cid:33) (cid:32) N(cid:88) k=1 (cid:32) N(cid:88) N(cid:88) m=2 k=1 MSD ≈ µM 2 1 N 2 σ2 v,k + µ 2N (cid:33) (cid:16)(cid:0)IM + ηλmR−1 u (cid:1)−1(cid:17) [vm]2 kσ2 v,k Tr . (96) 19 Fig. 2. Uniform data profile scenario. (Left) Spectral content of Wo for λm ∈ [0, 1.2]. (Right) Network MSD at λm from (98) (relative to Wo η from (94) for different η. Dashed lines correspond to the ratio η with Wo a smooth signal) for different η at µ = 0.005. (cid:107)wo (cid:107)wo m,η(cid:107)2 m(cid:107)2 Since the trace of a matrix is equal to the sum of its eigenvalues, we have: (cid:16)(cid:0)IM + ηλmR−1 u (cid:1)−1(cid:17) Tr M(cid:88) = 1 1 + ηλm λq(Ru) q=1 . (97) The above expression shows that for a fixed λm, as η increases, the above trace decreases. We conclude that, when v ∀k, η increases, the sum on the RHS of (96) decreases. By further assuming uniform noise profile, i.e., σ2 v,k = σ2 (cid:16)(cid:0)IM + ηλmR−1 u (cid:1)−1(cid:17) . (98) expression (96) reduces to: N(cid:88) m=1 MSD = MSD(λm) with MSD(λm) ≈ µ 2N σ2 vTr From (97), we conclude that, for a fixed η, as λm increases, the corresponding trace term in (98) decreases. This case is illustrated numerically in Fig. 2 (right). In the experiment, we set Ru = IM , σ2 v = 0.1, µ = 0.005, and τj = 7 + j in (86) so that Wo is smooth and we illustrate MSD(λm) in (98) for different values of η . B. Varying data profile We assume that Ru,k = σ2 u,kIM for all k. In this case, expression (92) reduces to: Rs,k,η = σ4 u,k(Wk,η + (cid:107)wo k − wo k,η(cid:107)2IM ) + σ2 v,kσ2 u,kIM . (99) The variances σ2 u,k and σ2 v,k are given in Fig. 1 (right). We set τj = j in (86). of the algorithm relative to Wo η, we report in Fig. 3 (left) the squared norm of the fixed point bias (cid:101)W∞ = Wo given by (49) in Part I [2] (which is equal to the long-term model bias (cid:101)W(cid:48) In order to characterize the influence of the step-size µ and the regularization parameter η on the performance η − W∞ ∞ in (40)) as a function of η where η = µ− with  ≥ −1 for µ = {10−3, 10−4, 10−5}. We observe that for small η, the squared norm of the bias increases 40 dB per decade (when η goes from η1 to 10η1). This means that the squared norm of the bias is on the 20 Fig. 3. Network performance relative to Wo regularization strength η = 5, varying step-size µ. (Right) Evolution of the learning curves for fixed µ = 0.001, varying η. η. (Left) Squared (cid:96)2-norm of the bias (40). (Middle) Evolution of the learning curves for fixed order of η4 for fixed µ. For large η, the bias becomes constant and we see that, when µ goes from µ1 to 10µ1, it increases 20 dB. This means that the squared norm of the bias is on the order of µ2. Finally, we observe that for fixed η, the squared norm of the bias is on the order of µ2. In Fig. 3 (middle), we report the network MSD learning curves relative to Wo η obtained by running strategy (7) for η = 5 and for two different values of µ. The curves are η − Wi(cid:107)2} over 200 repeated experiments. In the simulations, we obtained by averaging the trajectories { 1 use the following approximation for the network MSD expression in (68): E(cid:107)Wo N (cid:32) N(cid:88) N(cid:88) MSDapp = µ 2N (cid:33)−1 (cid:32) N(cid:88) (cid:33) [vm]2 kσ2 u,k + ηλm Tr [vm]2 kRs,k,η , (100) m=1 k=1 k=1 where we use the subscript "app" to indicate that it is an approximation. Compared with (68), we see that the (O(1)+O(η)) has been removed in (100). It is observed that the learning curves tend to the same MSD value predicted by the theoretical expression (65) (with O(µ1+θm) removed). Furthermore, we observe that the MSD term O(µ) predicted by expression (100) provides a good approximation for the performance of strategy (7). Finally, it can be observed that the MSD is on the order of µ. In Fig. 1 (right), we report the MSD learning curves relative to Wo η obtained by running strategy (7) for µ = 10−3 and for six different values of η. As it can be seen, by increasing η, the network MSD decreases. Furthermore, it is observed that expression (100) provides a good approximation for the network MSD for any η ≥ 0. In Fig. 4, we characterize the influence of η on the performance of strategy (7) relative to Wo with Wo a smooth signal generated according to (86) with τj = 7 + j. We set µ = 5 · 10−3. In Fig. 4 (left), we plot MSD for η ∈ [0, 350]. To generate MSD we use (82) with MSD replaced by MSDapp in (100) which has a low computational complexity. As it can be seen from this plot, η = 4 gives the best MSD. In Fig. 4 (right), we report the network E(cid:107)Wo − Wi(cid:107)2 for η = {0, 4, 350}. It is observed that the learning curves tend to the same MSD value predicted by the theoretical expression (82) with MSD replaced by (65) (with O(µ1+θm) removed) or (100). learning curves 1 N 210-610-410-2100102104106kWo2!W1k2indB-350-300-250-200-150-100-5007=0:0017=0:00017=0:00001X: 0.01Y: -148.7X: 0.001Y: -188.6X: 0.001Y: -208.6X: 0.01Y: -168.7X: 0.0001Y: -268.6X: 1e-05Y: -308.6X: 1.11e+04Y: -74.64X: 1.11e+05Y: -94.63X: 1110Y: -54.71Iteration,i010002000300040005000600070008000900010000MSDindB-35-30-25-20-15-10SimulatedMSDSteady-stateMSD(65)Steady-stateMSD(100)7=0:017=0:001Iteration,i010002000300040005000600070008000900010000MSDindB-45-40-35-30-25-20-15-10-5SimulatedMSDSteady-stateMSD(65)Steady-stateMSD(100)2=02=52=102=1002=10002=1 21 Fig. 4. Network performance relative to Wo with a smooth signal Wo at µ = 0.005. (Left) Network MSD as a function of the regularization strength η ∈ [0, 350]. (Right) Evolution of the network MSD learning curve for three different values of η. VII. CONCLUSION In this paper, and its accompanying Part I [2], we considered multitask inference problems where agents in the network have individual parameter vectors to estimate subject to a smoothness condition over the graph. Based on diffusion adaptation, we proposed a strategy that allows the network to minimize a global cost consisting of the aggregate sum of the individual costs regularized by a term promoting smoothness. We showed that, for small step-size parameter, the network is able to approach the minimizer of the regularized problem to arbitrarily good accuracy levels. Furthermore, we showed how the regularization strength influences the limit point and the steady-state mean-square-error (MSE) performance of the algorithm. Analytical expressions illustrating these effects are derived. These expressions revealed explicitly the influence of the network topology, data settings, step-size parameter, and regularization strength on the network MSE performance and provided insights into the design of effective multitask strategies for distributed inference over networks. Illustrative examples were considered and links to spectral graph filtering were also provided. APPENDIX A SIZE OF THE PERTURBATION SEQUENCE ci−1 The argument is similar to the one presented in [9, Sec. 10.1]. For ease of reference, we provide a sketch of the proof here. Let (cid:101)wk,i−1 = wo k,η − wk,i−1. For each agent k, we have from eq. (174) in Part I [2]: (cid:107)(cid:102)H k,i−1(cid:107) (cid:44) (cid:107)Hk,η − H k,i−1(cid:107) k,η) − ∇2 d(cid:107)t(cid:101)wk,i−1(cid:107)dt = κ(cid:48) 1 2 k,η − t(cid:101)wk,i−1)(cid:107)dt (cid:90) 1 (cid:90) 1 Jk(wo d(cid:107)(cid:101)wk,i−1(cid:107), (cid:107)∇2 wk Jk(wo ≤ ≤ wk 0 0 κ(cid:48) (101) 210-310-210-1100101102103MSDindB-26.5-26-25.5-25-24.5-24-23.5-23-22.5-22X: 0.0035Y: -23.42X: 4.001Y: -25.27X: 350Y: -22.66Non-cooperationSingle-tasklearningIteration,i0500100015002000250030003500400045005000MSDindB-28-26-24-22-20-18-16-14-12-10SimulatedMSDSteady-stateMSD(82),(65)2=3502=02=4X: 4500Y: -22.66X: 4500Y: -23.48X: 4501Y: -25.36 22 so that and, consequently, (cid:107)(cid:101)Hi−1(cid:107) = max 1≤k≤N (cid:107)(cid:102)H k,i−1(cid:107) ≤ 1 2 lim sup i→∞ E(cid:107)ci−1(cid:107) ≤ lim sup i→∞ κ(cid:48) d lim sup i→∞ ≤ 1 2 d(cid:107)(cid:101)Wi−1(cid:107), κ(cid:48) d max 1≤k≤N 2 κ(cid:48) (cid:107)(cid:101)wk,i−1(cid:107) ≤ 1 E(cid:107)(cid:101)Hi−1(cid:107)(cid:107)(cid:101)Wi−1(cid:107) E(cid:107)(cid:101)Wi−1(cid:107)2 = O(µ), (102) (103) from Theorem 2 in Part I [2]. In the following, we argue that (cid:107)ci−1(cid:107) = O(µ) asymptotically with high probability. Let us introduce the nonnegative random variable u = (cid:107)ci−1(cid:107) and let us recall Markov's inequality which states that for any nonnegative random variable u and ξ > 0, it holds that: Prob(u ≥ ξ) ≤ (Eu) /ξ. (104) Let rc = nµ, for any constant integer n ≥ 1 that we are free to choose. We then conclude from (103) and (104) that for i (cid:29) 1: Prob((cid:107)ci−1(cid:107) < rc) = 1 − Prob((cid:107)ci−1(cid:107) ≥ rc) ≥ 1 − E(cid:107)ci−1(cid:107)/rc ≥ 1 − O(1/n) (105) where the term O(1/n) is independent of µ. This result shows that the probability of having (cid:107)ci−1(cid:107) bounded by rc can be made arbitrarily close to one by selecting a large enough value for n. Once the value for n has been fixed to meet a desired confidence level, then rc = O(µ). APPENDIX B PROOF OF LEMMA 1 To simplify the notation, we introduce the difference: zi (cid:44) (cid:101)Wi − (cid:101)W(cid:48) i. Subtracting recursions (32) and (34), we get: zi = Bηzi−1 + µ(IM N − µηL)ci−1. in terms of the random perturbation sequence ci−1 given in (33). For each agent k, we have from (101): (cid:107)(cid:102)H k,i−1(cid:107) ≤ 1 2 d(cid:107)wo κ(cid:48) k,η − wk,i−1(cid:107). (106) (107) (108) It follows that and (cid:107)ck,i−1(cid:107) ≤ (cid:107)(cid:102)H k,i−1(cid:107)(cid:107)wo k,η − wk,i−1(cid:107) ≤ 1 2 ≤ 1 2 d(cid:107)wo κ(cid:48) d(cid:107)Wo κ(cid:48) k,η − wk,i−1(cid:107)2 η − Wi−1(cid:107)2. (cid:107)ck,i−1(cid:107)2 ≤ 1 4 d)2(cid:107)Wo (κ(cid:48) η − Wi−1(cid:107)4. Applying Jensen's inequality [41, pp. 77] to the convex function (cid:107) · (cid:107)2, we obtain from (107): E(cid:107)zk,i(cid:107)2 ≤ (cid:88) (cid:96)∈Nk [C]k,(cid:96)E(cid:107)(I − µH(cid:96),η)z(cid:96),i−1 + µc(cid:96),i−1(cid:107)2. C (cid:44) IN − µηL. where C is given by: Next note that (cid:13)(cid:13)(cid:13)(cid:13)t E(cid:107)(I − µHk,η)zk,i−1 + µck,i−1(cid:107)2 = E ≤ 1 t (IM − µHk,η)zk,i−1 + µ(1 − t) E(cid:107)(IM − µHk,η)zk,i−1(cid:107)2 + µ2 1 1 − t 1 t (cid:13)(cid:13)(cid:13)(cid:13)2 1 ck,i−1 1 − t E(cid:107)ck,i−1(cid:107)2, for any arbitrary positive number t ∈ (0, 1). We select t = γk with γk defined in (48). This gives E(cid:107)(I − µHk,η)zk,i−1 + µck,i−1(cid:107)2 ≤ γkE(cid:107)zk,i−1(cid:107)2 + µ2 1 1 − γk E(cid:107)ck,i−1(cid:107)2, Let us introduce the mean-square perturbation vector at time i: MSPz,i (cid:44) col(cid:8)E(cid:107)zk,i(cid:107)2(cid:9)N k=1 . Replacing (114) into (111), and using (110), we obtain: MSPz,i (cid:22) CG(cid:48)(cid:48)MSPz,i−1 + µ2 1 4 with G(cid:48)(cid:48) = diag{γk}N k=1. Iterating the above recursion starting from i = 1, we obtain: η − Wi−1(cid:107)4), d)2C(IN − G(cid:48)(cid:48))−1(1N ⊗ E(cid:107)Wo (κ(cid:48) i−1(cid:88) (CG(cid:48)(cid:48))jC(IN − G(cid:48)(cid:48))−1(1N ⊗ E(cid:107)Wo η − Wi−1−j(cid:107)4). MSPz,i (cid:22) (CG(cid:48)(cid:48))iMSPz,0 + µ2 1 4 (κ(cid:48) d)2 j=0 23 (109) (110) (111) (112) (113) (114) (115) (116) (117) Under Assumption 3 and condition (39), the matrix CG(cid:48)(cid:48) is guaranteed to be stable. Following similar arguments to the ones used to establish eq. (68) in Part I (Appendix E) [2], and from Theorem 3 in Part I [2], we conclude that: (cid:107) lim sup i→∞ MSPz,i(cid:107)∞ = O(µ2), (118) 24 where we used the fact that (cid:107)(IN − G(cid:48)(cid:48))−1(cid:107)∞ ≤ O(µ−1). It follows that i(cid:107)2 = O(µ2). lim sup i→∞ Finally note that E(cid:107)(cid:101)W(cid:48) i(cid:107)2 = E(cid:107)(cid:101)W(cid:48) i − (cid:101)Wi + (cid:101)Wi(cid:107)2 ≤ E(cid:107)(cid:101)W(cid:48) ≤ E(cid:107)(cid:101)W(cid:48) E(cid:107)(cid:101)Wi − (cid:101)W(cid:48) i − (cid:101)Wi)(cid:62)(cid:101)Wi i − (cid:101)Wi(cid:107)2 + E(cid:107)(cid:101)Wi(cid:107)2 + 2E((cid:101)W(cid:48) (cid:113) i − (cid:101)Wi(cid:107)2 + E(cid:107)(cid:101)Wi(cid:107)2 + 2 E(cid:107)(cid:101)W(cid:48) i − (cid:101)Wi(cid:107)2E(cid:107)(cid:101)Wi(cid:107)2 (119) (120) where we used Ex ≤ Ex from Jensen's inequality and where we applied Holder's inequality: Ex(cid:62)y ≤ (Exp) 1 p (Exq) 1 q , when 1/p + 1/q = 1. Hence we get: lim sup i→∞ 2 for small µ (cid:28) 1. 3 since µ2 < µ (cid:0)E(cid:107)(cid:101)W(cid:48) i(cid:107)2 − E(cid:107)(cid:101)Wi(cid:107)2(cid:1) ≤ O(µ2) + (cid:112) APPENDIX C O(µ3) = O(µ 3 2 ), (121) From (43), we have: k,∞ − w(cid:48) w(cid:48) k,i = where C is defined in (112) and where φ(cid:48) k,i is given by: (cid:96)=1 PROOF OF LEMMA 3 N(cid:88) [C]k(cid:96)φ(cid:48) (cid:96),i, k,i−1) − µsk,i(wk,i−1). Applying Jensen's inequality [41, pp. 77] to the convex function (cid:107) · (cid:107)2, we obtain: k,i = (IM − µHk,η)(w(cid:48) φ(cid:48) k,∞ − w(cid:48) k,i(cid:107)2 ≤ N(cid:88) E(cid:107)w(cid:48) k,∞ − w(cid:48) [C]k(cid:96)E(cid:107)φ(cid:48) (cid:96),i(cid:107)2. Under Assumption 2, we have: (cid:96)=1 E[(cid:107)φ(cid:48) k,i(cid:107)2F i−1] = (cid:107)w(cid:48) k,∞ − w(cid:48) k,i−1(cid:107)2 Σk + µ2E[(cid:107)sk,i(wk,i−1)(cid:107)2F i−1]. where Σk (cid:44) (IM − µHk,η)2, which due to Assumption 1, can be bounded as follows: (122) (123) (124) (125) 0 < Σk ≤ γ2 kIM , (126) where γk is given by (48). Taking expectation again in (125), and using the bound (136) on E[(cid:107)sk,i(wk,i−1)(cid:107)2F i−1] from Part I [2], we obtain: k,∞ − w(cid:48) E(cid:107)φ(cid:48) E(cid:107)w(cid:48) E(cid:107)wk,∞ − wk,i−1(cid:107)2 + µ2(cid:0)3β2 + µ2E(cid:107)sk,i(wk,i−1)(cid:107)2 k,η − wk,∞(cid:107)2 + 3β2 k,i−1(cid:107)2 + 3µ2β2 k,i(cid:107)2 = E(cid:107)w(cid:48) k(cid:107)wo k,η(cid:107)2 + σ2 k,∞ − w(cid:48) k,i−1(cid:107)2 k(cid:107)wo ≤ γ2 k Σk k (cid:1) . s,k (127) Now, combining (127) and (124), we obtain (45). Iterating (45) starting from i = 1, we get: MSP(cid:48) i (cid:22) (C(G(cid:48)(cid:48))2)iMSP(cid:48) 0 + µ2 25 i−1(cid:88) j=0 (C(G(cid:48)(cid:48))2)jC(3diag{β2 k}MSPi−1−j + b). (128) Under Assumption 3 and condition (39), the matrix C(G(cid:48)(cid:48))2 is guaranteed to be stable. Using the fact that b = O(1) from Theorem 1 in Part I [2], 1 − (cid:107)(G(cid:48)(cid:48))2(cid:107)∞ = O(µ), and that (cid:107) limi→∞ MSPi(cid:107)∞ = O(µ) from Theorem 2 in Part I [2], and following similar arguments as the one used to establish eq. (68) in Part I (Appendix E) [2], we conclude (49). From (42), Lemma 2, and (49), we conclude (50). APPENDIX D LIMITING SECOND-ORDER MOMENT OF GRADIENT NOISE It is shown in [9, Sec. 4.1] that the conditional noise covariance matrix satisfying Assumptions 2 and 5 satisfies more globally a condition of the following form for all wk ∈ F i−1: (cid:107)Rs,k,i(wk) − Rs,k,i(wo k,η)(cid:107) ≤ κd(cid:107)wo k,η − wk(cid:107)θ + κ(cid:48) d(cid:107)wo k,η − wk(cid:107)2, for some nonnegative constant κ(cid:48) E[sk,i(wk,i−1)s(cid:62) k,i(wk,i−1)F i−1] =E[sk,i(wo d. By adding and subtracting the same term we have: k,η)F i−1] + E[sk,i(wk,i−1)s(cid:62) k,i(wo k,η)s(cid:62) E[sk,i(wo k,i(wo k,η)s(cid:62) k,η)F i−1] k,i(wk,i−1)F i−1]− which using definition (52) can be rewritten as: E[sk,i(wk,i−1)s(cid:62) k,i(wk,i−1)F i−1] = E[sk,i(wo k,η)s(cid:62) k,i(wo k,η)F i−1] + Rs,k,i(wk,i−1) − Rs,k,i(wo k,η). (129) (130) (131) Subtracting Rs,k,η defined by (53) from both sides and computing expectations, we get: Esk,i(wk,i−1)s(cid:62) k,i(wk,i−1)−Rs,k,η = E(cid:16)E[sk,i(wo (cid:17) +E(cid:0)Rs,k,i(wk,i−1) − Rs,k,i(wo k,η)(cid:1) . k,η)F i−1] − Rs,k,η k,η)s(cid:62) k,i(wo It then follows from the triangle inequality of norms, and from Jensen's inequality that: (cid:107)Esk,i(wk,i−1)s(cid:62) ≤(cid:13)(cid:13)(cid:13)E(cid:16)E[sk,i(wo ≤ E(cid:107)E[sk,i(wo k,i(wk,i−1) − Rs,k,η(cid:107) k,η)s(cid:62) k,η)s(cid:62) k,i(wo k,i(wo (cid:17)(cid:13)(cid:13)(cid:13) + (cid:107)E(cid:0)Rs,k,i(wk,i−1) − Rs,k,i(wo k,η)(cid:1)(cid:107) k,η)F i−1] − Rs,k,η k,η)F i−1] − Rs,k,η(cid:107) + E(cid:107)Rs,k,i(wk,i−1) − Rs,k,i(wo k,η)(cid:107). (132) (133) Computing the limit superior of both sides and using (53) to annihilate the limit of the first term on the RHS, we conclude that: lim sup i→∞ (cid:107)Esk,i(wk,i−1)s(cid:62) k,i(wk,i−1) − Rs,k,η(cid:107) ≤ lim sup i→∞ E(cid:107)Rs,k,i(wk,i−1) − Rs,k,i(wo k,η)(cid:107). (134) 26 We next use the smoothness condition (129) to bound the right-most term as follows: (cid:107)Rs,k,i(wk,i−1) − Rs,k,i(wo (135) Under expectation and in the limit, we have: E(cid:107)Rs,k,i(wk,i−1) − Rs,k,i(wo lim sup i→∞ (cid:0)(cid:107)(cid:101)wk,i−1(cid:107)4(cid:1) θ k,η)(cid:107) ≤ κd (cid:110) κdE(cid:0)(cid:107)(cid:101)wk,i−1(cid:107)4(cid:1) θ (cid:110) (cid:0)E(cid:107)(cid:101)wk,i−1(cid:107)4(cid:1) θ κd 4 + κ(cid:48) d(cid:107)(cid:101)wk,i−1(cid:107)2. E(cid:107)(cid:101)wk,i−1(cid:107)2(cid:111) E(cid:107)(cid:101)wk,i−1(cid:107)2(cid:111) d d 4 + κ(cid:48) 4 + κ(cid:48) k,η)(cid:107) ≤ lim sup i→∞ ≤ lim sup i→∞ where we applied Jensen's inequality to the function f (x) = x (136) 4 ; this function is concave over x ≥ 0 for θ ∈ (0, 4]. Moreover, in the last step we called upon the results in Theorems 2 and 3 in Part I [2] where it is shown that the second and fourth order moments of (cid:101)wk,i−1 are asymptotically bounded by O(µ) and O(µ2), respectively. Accordingly, the exponent θ(cid:48) (cid:44) min{θ, 2} since O(µθ/2) dominates O(µ) for values of θ ∈ (0, 2] and O(µ) dominates O(µθ/2) for values of θ ∈ [2, 4]. Substituting into (134) gives: = O(µ θ θ(cid:48) 2 ), (cid:107)Esk,i(wk,i−1)s(cid:62) k,i(wk,i−1) − Rs,k,η(cid:107) = O(µ θ(cid:48) 2 ), lim sup i→∞ which leads to (55). Consider the matrix F η in (57). Using the block Kronecker product property: APPENDIX E PROOF OF LEMMA 4 it can be verified that: (A ⊗b B)(C ⊗b D) = (AC ⊗b BD), F η = B(cid:62) η ⊗b B(cid:62) η , where so that:  B(cid:62) η = Bη = V(cid:62)BηV = (IM N − µηJ )(IM N − µV(cid:62)HηV) I − µH11 −µH12 ... −µ(1 − µηλ2)H21 (1 − µηλ2)(I − µH22) ... . . . . . . −µ(1 − µηλN )HN 1 −µ(1 − µηλN )HN 2 ... −µH1N −µ(1 − µηλ2)H2N . . . (1 − µηλN )(I − µHN N )  , (137) (138) (139) (140) (141) where Hmn is defined in (63). It can be verified that the matrix Z = I − F η is N × N blocks Zmn with each block of size M 2N × M 2N:  Z11 Z12 . . . Z1N Z21 Z22 ... ... ZN 1 ZN 2 . . . Z2N ... . . . ZN N  , Z = I − F η = (142) We denote by [Zmn]pq the M 2 × M 2 (p, q)-th block of Zmn. We have: I − (1 − µηλm)(1 − µηλp)[(I − µHmm) ⊗ (I − µHpp)], µ(1 − µηλm)(1 − µηλq)[(I − µHmm) ⊗ Hqp], µ(1 − µηλn)(1 − µηλp)[Hnm ⊗ (I − µHpp)], −µ2(1 − µηλn)(1 − µηλq)[Hnm ⊗ Hqp], if m = n, p = q if m = n, p (cid:54)= q if m (cid:54)= n, p = q if m (cid:54)= n, p (cid:54)= q (I − µHmm) ⊗ (I − µHpp) = I − µHmm ⊕ Hpp + µ2Hmm ⊗ Hpp, where Hmm ⊕ Hpp is given by (62) and 1 − (1 − µηλm)(1 − µηλp) = µη(λm + λp − µηλmλp).  [Zmn]pq = We have: Thus, [Zmn]pq = µ ·  27 (143) (144) (145) (147) (148) (149) (150) (151) (152) (1 − µηλm)(1 − µηλp)(Hmm ⊕ Hpp) + η(λm + λp − µηλmλp)I + O(µ), (1 − µηλm)(1 − µηλq)(I ⊗ Hqp) + O(µ), (1 − µηλn)(1 − µηλp)(Hnm ⊗ I) + O(µ), −µ(1 − µηλn)(1 − µηλq)[Hnm ⊗ Hqp] = O(µ), if m = n, p = q if m = n, p (cid:54)= q if m (cid:54)= n, p = q if m (cid:54)= n, p (cid:54)= q (146) Before proceeding, we recall the following useful properties of the Kronecker and Kronecker sum products [35]. Let {λi(A), i = 1, . . . , M} and {λj(B), j = 1, . . . , M} denote the eigenvalues of any two M × M matrices A and B, respectively. Then, {λ(A ⊗ B)} = {λi(A)λj(B)}M,M i=1,j=1, {λ(A ⊕ B)} = {λi(A) + λj(B)}M,M i=1,j=1. From (142), (143), and (146), it can be verified that the matrix Z can be written as: Z = X + Y. The matrix X is N 2 × N 2 block diagonal defined as: (cid:110) X (cid:44) µ · diag diag{[Zmm]pp}N p=1  O(1) 0 = µ ·  , 0 O(1) + O(η) (cid:111)N (cid:80)N m=1 where we used the fact that for m = 1 and p = 1, we have [Z11]11 = µ· H11⊕ H11 + O(µ2) which is µ· O(1). This k=1 Hk,η > 0. For the remaining blocks of X, from (145), is due to property (148) and the fact that H11 = 1 N k=1[vm]2 property (148), and the fact that Hmm =(cid:80)N kHk,η > 0, it can be verified that the matrix: [Zmm]pp = µ(1 − µηλm)(1 − µηλp)(Hmm ⊕ Hpp) + µη(λm + λp − µηλmλp)I is also positive definite when: 0 < (1 − µηλm)(1 − µηλp) ≤ 1. 28 Furthermore, in this case, we have [Zmm]pp = µ · (O(1) + O(η)). The matrix Y = Z − X in (149) is an N 2 × N 2 block matrix where each block is M 2 × M 2 given by:  [Ymn]pq = µ · 0, (1 − µηλm)(1 − µηλq)(I ⊗ Hqp) + O(µ) ≤ O(1), (1 − µηλn)(1 − µηλp)(Hnm ⊗ I) + O(µ) ≤ O(1), −µ(1 − µηλn)(1 − µηλq)[Hnm ⊗ Hqp] ≤ O(µ), if m = n, p = q if m = n, p (cid:54)= q if m (cid:54)= n, p = q if m (cid:54)= n, p (cid:54)= q Applying the matrix inversion identity [40], we obtain: (X + Y )−1 = X−1 − X−1Y (I + X−1Y )−1X−1, From (150), we have: X−1 = µ−1 · diag (cid:110) diag(cid:8)([Zmm]pp)−1(cid:9)N p=1 (cid:111)N m=1 = µ−1 ·  O(1) 0  . 0 (O(1) + O(η))−1 (153) (154) (155) (156) (157) (158) (159) From (155) and (153), we have: X−1Y =  and 0 O(1) (O(1) + O(η))−1 (O(1) + O(η))−1 I + X−1Y = O(1) O(1) (O(1) + O(η))−1 O(1) Applying the block inversion formula to I + X−1Y , we obtain: (I + X−1Y )−1 = O(1) O(1) (O(1) + O(η))−1 O(1)  ,  .  .   Finally, from (155), (156), and (158), we conclude that: X−1Y (I + X−1Y )−1X−1 = µ−1 ·  (O(1) + O(η))−1 (O(1) + O(η))−1  . (O(1) + O(η))−1 (O(1) + O(η))−2 Consider now the matrix (I − Fη)−1 = (V ⊗b V)(I − F η)−1(V ⊗b V)(cid:62). It can be verified that: (I − Fη)−1 = (V ⊗b V)X−1(V ⊗b V)(cid:62) + (V ⊗b V)X−1Y (I + X−1Y )−1X−1(V ⊗b V)(cid:62) N(cid:88) N(cid:88) = [(vm ⊗ IM ) ⊗b (vp ⊗ IM )]([Zmm]pp)−1[(v(cid:62) m ⊗ IM ) ⊗b (v(cid:62) p ⊗ IM )] + µ−1(O(1) + O(η))−1. m=1 p=1 (160) APPENDIX F PROOF OF LEMMA 5 29 zi (cid:44) (cid:101)W(cid:48) i − E (cid:101)W(cid:48) i. Recursion (34) for the long term model includes a constant driving term on the RHS represented by µ2η2L2Wo η. To facilitate the variance analysis, we introduce the centered variable: (161) (162) Subtracting (38) from (34), we obtain: zi = Bηzi−1 − µ(IM N − µηL)si(Wi−1), where the deterministic driving terms are removed. Although we are interested in evaluating the asymptotic size of i(cid:107)2, we can rely on the centered variable zi for this purpose, since, from Lemma 2, it holds for i (cid:29) 1: E(cid:107)(cid:101)W(cid:48) i(cid:107)2 + O(µ2), for fixed η. Furthermore, we established in Lemma 1, that the error variances E(cid:107)(cid:101)W(cid:48) E(cid:107)zi(cid:107)2 = E(cid:107)(cid:101)W(cid:48) i(cid:107)2 = E(cid:107)(cid:101)W(cid:48) i(cid:107)2 − (cid:107)E(cid:101)W(cid:48) i(cid:107)2 and E(cid:107)(cid:101)Wi(cid:107)2 are within (163) O(µ 3 2 ) from each other. Therefore, we may evaluate the mean-square error in terms of the mean-square value of the variable zi by employing the correction: E(cid:107)(cid:101)Wi(cid:107)2 = lim sup i→∞ lim sup i→∞ 1 N E(cid:107)zi(cid:107)2 + O(µ 3 2 ). 1 N (164) We therefore continue with recursion (162) and proceed to examine how the mean-square value of zi evolves over time by relying on the energy conservation arguments. Let Σ denote an arbitrary symmetric positive semi-definite matrix that we are free to choose. Equating the squared weighted values of both sides of (162) and taking expectations conditioned on the past history gives: Taking expectation again removes the conditioning and we get: E(cid:2)(cid:107)zi(cid:107)2 ΣF i−1 E(cid:107)zi(cid:107)2 η ΣBη (cid:3) = (cid:107)zi−1(cid:107)2B(cid:62) Σ = E(cid:16)(cid:107)zi−1(cid:107)2B(cid:62) (cid:104) = µ2Tr (cid:105) + µ2E(cid:104)(cid:107)si(cid:107)2 + µ2E(cid:16)(cid:107)si(cid:107)2 (IM N−µηL)Σ(IM N−µηL)F i−1 (cid:17) (IM N−µηL)Σ(IM N−µηL) . η ΣBη (cid:17) (IM N − µηL)Σ(IM N − µηL)E(cid:16) (cid:17) − Sη(cid:107) = O(µmin{1, θ i (Wi−1) 2}) (cid:17) (cid:107)E(cid:16) lim sup i→∞ si(Wi−1)s(cid:62) si(Wi−1)s(cid:62) i (Wi−1) Consider the right-most term. We have: µ2E(cid:16)(cid:107)si(cid:107)2 (IM N−µηL)Σ(IM N−µηL) Using the sub-multiplicative property of the 2−induced norm, we conclude that: (cid:16)E(si(Wi−1)s(cid:62) i (Wi−1) − Sη (cid:17)(cid:107) = Tr(Σ) · O(µ2+min{1, θ 2}), µ2(cid:107)(IM N − µηL)Σ(IM N − µηL) lim sup i→∞ (165) (166) . (167) (cid:17)(cid:105) (168) (169) Using (55) and the fact that the gradient noises across the agents are uncorrelated under condition (15), we obtain: 30 where we used the fact that (cid:107)Σ(cid:107) ≤ Tr(Σ) for any positive semi-definite Σ. Using the fact that Tr(X) ≤ c(cid:107)X(cid:107) for any square matrix X, we obtain: lim sup i→∞ (IM N−µηL)Σ(IM N−µηL) − Tr(ΣY) = Tr(Σ) · O(µ2+min{1, θ µ2E(cid:107)si(cid:107)2 (170) 2}) ≥ 0. The above relation then implies that, given  > 0, there exists an io large enough 2}) = b1, b1 = Tr(Σ)· O(µ2+min{1, θ such that for all i > io it holds that µ2E(cid:107)si(cid:107)2 (IM N−µηL)Σ(IM N−µηL) − Tr(ΣY) ≤ b1 + . (171) If we select  = Tr(Σ) · O(µ2+min{1, θ 2}) and introduce the sum bo = b1 + , then we arrive at: Tr(ΣY) − bo ≤ µ2E(cid:107)si(cid:107)2 (IM N−µηL)Σ(IM N−µηL) ≤ Tr(ΣY) + bo, (172) 2}). Substituting (172) into (166) we obtain for i (cid:29) 1: for some non-negative constant bo = Tr(Σ) · O(µ2+min{1, θ Σ ≤ E(cid:107)zi−1(cid:107)2B(cid:62) E(cid:107)zi(cid:107)2 + Tr(ΣY) + bo. η ΣBη Using the sub-additivity property of the limit superior, we obtain: E(cid:107)zi−1(cid:107)2B(cid:62) E(cid:107)zi(cid:107)2 Σ ≤ lim sup i→∞ lim sup i→∞ η ΣBη + Tr(ΣY) + bo. Grouping terms we get: lim sup i→∞ E(cid:107)zi(cid:107)2 Σ−B(cid:62) η ΣBη ≤ Tr(ΣY) + bo, We conclude that the limit superior of the error variance satisfies: E(cid:107)zi(cid:107)2 Σ−B(cid:62) η ΣBη lim sup i→∞ = Tr(ΣY) + Tr(Σ)O(µ2+min{1, θ 2}), (173) (174) (175) (176) In order to obtain identity as a weighting matrix on the mean-square value of zi in (176), we select Σ as the solution to the following discrete time Lyapunov equation: (177) We know that Bη is stable under conditions (17) and (39). Accordingly, we are guaranteed that the above Lyapunov equation has a unique solution Σ, and moreover, this solution is symmetric and non-negative definite as desired. Σ − B(cid:62) η ΣBη = IM N . We can then focus on evaluating the RHS of (176). For this purpose, we start by applying the block vectorization operation to both sides of (177) to find that: bvec(Σ) − (B(cid:62) η ⊗b B(cid:62) η )bvec(Σ) = bvec(IM N ), (178) so that in terms of the matrix Fη defined in (56), we can write: (179) Now, substituting this Σ into (176), we obtain E(cid:107)zi(cid:107)2 on the left-hand side while the term Tr(ΣY) on the RHS becomes: bvec(Σ) = (I − Fη)−1bvec(IM N ). Tr(ΣY) = [bvec(Y(cid:62))](cid:62)(I − Fη)−1bvec(IM N ). (180) 31 Likewise the second term on the RHS of (176) becomes: 2}) · Tr(Σ) = O(µ2+min{1, θ O(µ2+min{1, θ 2}) · [bvec(IM N )](cid:62)(I − Fη)−1bvec(IM N ). (181) We now verify that [bvec(IM N )](cid:62)(I − Fη)−1bvec(IM N ) = O(1/µ). This result will permit us to assess the size of the second term on the RHS of (176). We have: [bvec(I)](cid:62)(I − Fη)−1bvec(I) ≤ (cid:107)bvec(I)(cid:107)2 · (cid:107)(I − Fη)−1(cid:107) ≤ r · (cid:107)(I − Fη)−1(cid:107)1(cid:107)bvec(I)(cid:107)2 = O(µ−1), (182) where we used a positive constant r to account for the fact that matrix norms are equivalent. Returning to (176), and using (177), (180), (181), and (182), we conclude that: E(cid:107)zi(cid:107)2 = [bvec(Y(cid:62))](cid:62)(I − Fη)−1bvec(IM N ) + O(µ1+min{1, θ 2}), lim sup i→∞ with θ ∈ (0, 4]. But since Fη is a stable matrix, we can employ the expansion: η )n ⊗b (B(cid:62) ∞(cid:88) (I − Fη)−1 = [bvec(Y(cid:62))](cid:62)(I − Fη)−1bvec(IM N ) = ∞(cid:88) ∞(cid:88) and write: F n η = (B(cid:62) n=0 n=0 η )n, Tr(Bn ηY(B(cid:62) η )n), This series converges to the trace value of the unique solution of the following Lyapunov equation: n=0 where X − BηXB(cid:62) η = Y, ∞(cid:88) n=0 X = Bn ηY(B(cid:62) η )n. Consequently, using (164), we obtain: 1 N lim sup i→∞ E(cid:107)(cid:101)Wi(cid:107)2 = = 1 N 1 N ∞(cid:88) n=0 Tr(X ) + O(µ1+θm) Tr(Bn ηY(B(cid:62) η )n) + O(µ1+θm), (183) (184) (185) (186) (187) (188) 2 min{1, θ} and where Tr(X ) = [bvec(Y(cid:62))](cid:62)(I−Fη)−1bvec(IM N ) which is O(µ) since (cid:107)Y(cid:107) = O(µ2) where θm = 1 and (cid:107)(I − Fη)−1(cid:107) = O(µ−1). Therefore the value of Tr(X ) is O(µ), which dominates the factor O(µ1+θm). APPENDIX G PROOF OF THEOREM 1 From (65) and (160), we have: (bvec(Y(cid:62)))(cid:62)(I − Fη)−1bvec(IM N ) = O(µ)(O(1) + O(η))−1+ (bvec(Y(cid:62)))(cid:62)[(vm ⊗ IM ) ⊗b (vp ⊗ IM )]([Zmm]pp)−1[(v(cid:62) m ⊗ IM ) ⊗b (v(cid:62) p ⊗ IM )]bvec(IM N ) (189) N(cid:88) N(cid:88) m=1 p=1 32 where the bvec operation is relative to blocks of size M × M. Using the property bvec(ACB) = (B(cid:62)⊗bA)bvec(C), we obtain: [(v(cid:62) m ⊗ IM ) ⊗b (v(cid:62) p ⊗ IM )]bvec(IM N ) = and we conclude that: if m = p if m (cid:54)= p (190)  bvec(IM ) = vec(IM ), N(cid:88) 0, (bvec(Y(cid:62)))(cid:62)(I − Fη)−1bvec(IM N ) = O(µ)(O(1) + O(η))−1 + (bvec(Y(cid:62)))(cid:62)[(um ⊗ IM ) ⊗b (um ⊗ IM )]xm where m=1 xm (cid:44) ([Zmm]mm)−1vec(IM ). This vector is the unique solution to the linear system of equations: [Zmm]mmxm = vec(IM ), or, equivalently, by using (151): (cid:104) (cid:104) (cid:105) xm λm(2 − µηλm) η 2 (1 − µηλm)2(Hmm ⊗ I) + µ + µ (1 − µηλm)2(I ⊗ Hmm) + λm(2 − µηλm)I η 2 (cid:105) xm = vec(IM ), Let Xm = unvec(xm). Applying the property vec(ACB) = (B(cid:62) ⊗ A)vec(C), we obtain: where vec(XmTm) + vec(TmXm) = vec(IM ) Tm (cid:44) µ(1 − µηλm)2Hmm + λm(2 − µηλm)I. µη 2 (191) (192) (193) (194) (195) (196) We conclude from the above equation that Xm is the unique solution to the continuous time Lyapunov equation: whose solution is given by: Xm = T −1 m = 1 2 1 2µ XmTm + TmXm = IM , (cid:16) (1 − µηλm)2Hmm + (cid:17)−1 . λm(2 − µηλm)I η 2 Using the definitions (66), (67), and applying properties bvec(ACB) = (B(cid:62) ⊗b A)bvec(C), and Tr(AB) = (bvec(B(cid:62)))(cid:62)bvec(A), (197) (198) (199) we get: (cid:16) m=1 = = m=1 N(cid:88) N(cid:88) N(cid:88) N(cid:88) N(cid:88) N(cid:88) = µ2 µ 2 m=1 m=1 Tr = = µ 2 m=1 [bvec(Y(cid:62))](cid:62)[(vm ⊗ IM ) ⊗b (vm ⊗ IM )]vec(Xm) Tr (unbvec{(vm ⊗ IM ) ⊗b (vm ⊗ IM )bvec(Xm)}Y) (vm ⊗ IM )Xm(v(cid:62) (1 − µηλm)2Tr m ⊗ IM )Sη(vm ⊗ IM )Xm (v(cid:62) m ⊗ IM )Y(cid:17) (cid:16) (cid:32) N(cid:88) [vm]2 k=1 kRs,k,η (cid:33)(cid:32) (1 − µηλm)2Tr (cid:32) N(cid:88) Tr [vm]2 kHk,η + m=1 k=1 33 (cid:33)−1 (200) (201) (cid:33) [vm]2 kHk,η λm(2 − µηλm)I (cid:17) (cid:32) N(cid:88) k=1 (1 − µηλm)2 (cid:33)−1(cid:32) N(cid:88) [vm]2 kRs,k,η k=1 + η 2 (cid:33) (cid:33) . (cid:33)−1(cid:32) N(cid:88) ηλm(2 − µηλm) 2(1 − µηλm)2 I N(cid:88) (cid:32) N(cid:88) Tr [vm]2 kHk,η + m=1 + k=1 O(µ) (O(1) + O(η)) + O(µ1+θm). ηλm(2 − µηλm) 2(1 − µηλm)2 I [vm]2 kRs,k,η k=1 Substituting into (191) and (65), we conclude: lim sup i→∞ 1 N E(cid:107)Wo η − Wi(cid:107)2 = µ 2N Now, according to definition (51), dividing (201) by µ and computing the limit as µ → 0, we arrive at expression (68) for the network MSD. REFERENCES [1] R. Nassif, S. Vlaski, and A. H. Sayed, "Distributed inference over multitask graphs under smoothness," in Proc. IEEE International Workshop on Signal Processing Advances in Wireless Communications, Kalamata, Greece, Jun. 2018. [2] R. Nassif, S. Vlaski, C. Richard, and A. H. Sayed, "Learning over multitask graphs -- Part I: Stability analysis," Submitted for publication, Nov. 2019. [3] D. P. Bertsekas, "A new class of incremental gradient methods for least squares problems," SIAM J. Optim., vol. 7, no. 4, pp. 913 -- 926, 1997. [4] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and cooperation in networked multi-agent systems," Proc. IEEE, vol. 95, no. 1, pp. 215 -- 233, 2007. [5] A. Nedic and A. Ozdaglar, "Distributed subgradient methods for multi-agent optimization," IEEE Trans. Autom. Control, vol. 54, no. 1, pp. 48 -- 61, 2009. [6] A. G. Dimakis, S. Kar, J. M. F. Moura, M. G. Rabbat, and A. Scaglione, "Gossip algorithms for distributed signal processing," Proc. IEEE, vol. 98, no. 11, pp. 1847 -- 1864, 2010. [7] S. S. Ram, A. Nedi´c, and V. V. Veeravalli, "Distributed stochastic subgradient projection algorithms for convex optimization," J. Optim. Theory Appl., vol. 147, no. 3, pp. 516 -- 545, 2010. [8] J. Chen and A. H. Sayed, "Distributed Pareto optimization via diffusion strategies," IEEE J. Sel. Topics Signal Process., vol. 7, no. 2, pp. 205 -- 220, 2013. 34 [9] A. H. Sayed, "Adaptation, learning, and optimization over networks," Foundations and Trends in Machine Learning, vol. 7, no. 4-5, pp. 311 -- 801, 2014. [10] J. Chen and A. H. Sayed, "On the learning behavior of adaptive networks -- Part I: Transient analysis," IEEE Trans. Inf. Theory, vol. 61, no. 6, pp. 3487 -- 3517, Jun. 2015. [11] J. Chen and A. H. Sayed, "On the learning behavior of adaptive networks -- Part II: Performance analysis," IEEE Trans. Inf. Theory, vol. 61, no. 6, pp. 3518 -- 3548, Jun. 2015. [12] A. H. Sayed, "Adaptive networks," Proc. IEEE, vol. 102, no. 4, pp. 460 -- 497, Apr. 2014. [13] S. Vlaski, L. Vandenberghe, and A. H. Sayed, "Diffusion stochastic optimization with non-smooth regularizers," in Proc. Int. Conf. Acoust., Speech, Signal Process., Shanghai, China, Mar. 2016, pp. 4149 -- 4153. [14] J. Plata-Chaves, A. Bertrand, M. Moonen, S. Theodoridis, and A. M. Zoubir, "Heterogeneous and multitask wireless sensor networks -- Algorithms, applications, and challenges," IEEE J. Sel. Topics Signal Process., vol. 11, no. 3, pp. 450 -- 465, Apr. 2017. [15] A. Hassani, J. Plata-Chaves, M. H. Bahari, M. Moonen, and A. Bertrand, "Multi-task wireless sensor network for joint distributed node-specific signal enhancement, LCMV beamforming and DOA estimation," IEEE J. Sel. Topics Signal Process., vol. 11, no. 3, pp. 518 -- 533, 2017. [16] J. Chen, C. Richard, and A. H. Sayed, "Multitask diffusion adaptation over networks," IEEE Trans. Signal Process., vol. 62, no. 16, pp. 4129 -- 4144, 2014. [17] R. Nassif, C. Richard, A. Ferrari, and A. H. Sayed, "Proximal multitask learning over networks with sparsity-inducing coregularization," IEEE Trans. Signal Process., vol. 64, no. 23, pp. 6329 -- 6344, 2016. [18] C. Eksin and A. Ribeiro, "Distributed network optimization with heuristic rational agents," IEEE Trans. Signal Process., vol. 60, no. 10, pp. 5396 -- 5411, Oct. 2012. [19] D. Hallac, J. Leskovec, and S. Boyd, "Network Lasso: Clustering and optimization in large graphs," in Proc. ACM SIGKDD, Sydney, Australia, Aug. 2015, pp. 387 -- 396. [20] J. Szurley, A. Bertrand, and M. Moonen, "Distributed adaptive node-specific signal estimation in heterogeneous and mixed-topology wireless sensor networks," Signal Processing, vol. 117, pp. 44 -- 60, 2015. [21] J. Plata-Chaves, N. Bogdanovi´c, and K. Berberidis, "Distributed diffusion-based LMS for node-specific adaptive parameter estimation," IEEE Trans. Signal Process., vol. 63, no. 13, pp. 3448 -- 3460, 2015. [22] S. A. Alghunaim, K. Yuan, and A. H. Sayed, "Decentralized exact coupled optimization," in Proc. Ann. Allerton Conf. on Communication, Control, and Computing, Illinois, USA, 2017, pp. 338 -- 345. [23] R. Nassif, C. Richard, A. Ferrari, and A. H. Sayed, "Diffusion LMS for multitask problems with local linear equality constraints," IEEE Trans. Signal Process., vol. 65, no. 19, pp. 4979 -- 4993, 2017. [24] J. Chen, C. Richard, and A. H. Sayed, "Diffusion LMS over multitask networks," IEEE Trans. Signal Process., vol. 63, no. 11, pp. 2733 -- 2748, 2015. [25] J. Chen, C. Richard, A. O. Hero, and A. H. Sayed, "Diffusion LMS for multitask problems with overlapping hypothesis subspaces," in Proc. IEEE Int. Workshop Mach. Learn. Signal Process., Reims, France, Sep. 2014, IEEE, pp. 1 -- 6. [26] V. Kekatos and G. B. Giannakis, "Distributed robust power system state estimation," IEEE Trans. Signal Process., vol. 28, no. 2, pp. 1617 -- 1626, 2013. [27] D. Zhou and B. Scholkopf, "A regularization framework for learning from graph data," in Proc. ICML Workshop on Statistical Relational Learning and Its Connections to Other Fields, 2004, vol. 15, pp. 67 -- 68. [28] D. I. Shuman, S. K. Narang, P. Frossard, A. Ortega, and P. Vandergheynst, "The emerging field of signal processing on graphs: Extending high-dimensional data analysis to networks and other irregular domains," IEEE Signal Process. Mag., vol. 30, no. 3, pp. 83 -- 98, May 2013. [29] F. R. K. Chung, Spectral Graph Theory, American Mathematical Society, 1997. [30] R. K. Ando and T. Zhang, "Learning on graph with Laplacian regularization," in Proc. Advances in neural information processing systems, Canada, Dec. 2006, pp. 25 -- 32. 35 [31] X. Dong, D. Thanou, P. Frossard, and P. Vandergheynst, "Learning Laplacian matrix in smooth graph signal representations," IEEE Trans. Signal Process., vol. 64, no. 23, pp. 6160 -- 6173, 2016. [32] P.-Y. Chen and S. Liu, "Bias-variance tradeoff of graph Laplacian regularizer," IEEE Signal Process. Lett., vol. 24, no. 8, pp. 1118 -- 1122, 2017. [33] B. T. Polyak, "Introduction to Optimization," Optimization Software, New York, 1987. [34] R. H. Koning, H. Neudecker, and T. Wansbeek, "Block Kronecker products and the vecb operator," Linear algebra and its applications, vol. 149, pp. 165 -- 184, Apr. 1991. [35] D. S. Bernstein, Matrix Mathematics: Theory, Facts, and Formulas with Application to Linear Systems Theory, Princeton University Press, 2005. [36] L. Isserlis, "On a formula for the product-moment coefficient of any order of a normal frequency distribution in any number of variables," Biometrika, vol. 12, no. 1/2, pp. 134 -- 139, Nov. 1918. [37] D. I. Shuman, P. Vandergheynst, D. Kressner, and P. Frossard, "Distributed signal processing via Chebyshev polynomial approximation," IEEE Trans. Signal Inf. Process. Netw., 2018. [38] A. Sandryhaila and J. M. F. Moura, "Discrete signal processing on graphs," IEEE Trans. Signal Process., vol. 61, no. 7, pp. 1644 -- 1656, Apr. 2013. [39] A. Ortega, P. Frossard, J. Kovacevi´c, J. M. F. Moura, and P. Vandergheynst, "Graph signal processing: Overview, challenges, and applications," Proc. IEEE, vol. 106, no. 5, pp. 808 -- 828, 2018. [40] T. Kailath, Linear Systems, Prentice-Hall, Englewood Cliffs, NJ, 1980. [41] S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, NY, 2004.
1610.08168
1
1610
2016-10-26T05:00:16
Location Aggregation of Spatial Population CTMC Models
[ "cs.MA", "cs.PF" ]
In this paper we focus on spatial Markov population models, describing the stochastic evolution of populations of agents, explicitly modelling their spatial distribution, representing space as a discrete, finite graph. More specifically, we present a heuristic approach to aggregating spatial locations, which is designed to preserve the dynamical behaviour of the model whilst reducing the computational cost of analysis. Our approach combines stochastic approximation ideas (moment closure, linear noise), with computational statistics (spectral clustering) to obtain an efficient aggregation, which is experimentally shown to be reasonably accurate on two case studies: an instance of epidemic spreading and a London bike sharing scenario.
cs.MA
cs
Location Aggregation of Spatial Population CTMC Models Luca Bortolussi University of Trieste, Trieste, Italy CNR-ISTI, Pisa, Italy [email protected] Cheng Feng University of Edinburgh Edinburgh, UK [email protected] In this paper we focus on spatial Markov population models, describing the stochastic evolution of populations of agents, explicitly modelling their spatial distribution, representing space as a discrete, finite graph. More specifically, we present a heuristic approach to aggregating spatial locations, which is designed to preserve the dynamical behaviour of the model whilst reducing the computa- tional cost of analysis. Our approach combines stochastic approximation ideas (moment closure, linear noise), with computational statistics (spectral clustering) to obtain an efficient aggregation, which is experimentally shown to be reasonably accurate on two case studies: an instance of epi- demic spreading and a London bike sharing scenario. 1 Introduction Population processes are widely used to describe a large variety of systems, including systems in bio- logical [17], ecology [1], performance engineering [26], smart cities facilities like bike sharing [16, 18], and the spreading of epidemics [2]. Most of these systems are spatially distributed, and space has to be explicitly modelled to properly capture the relevant features of their dynamics. For example, interactions may only be allowed for entities which are co-located or within a certain physical distance of each other, or space may be segmented in such a way that even physically close entities are unable to communicate or interact. Furthermore, movement in space can be a crucial aspect of the behaviour of entities within the system. Epidemic spreading, in which infection can pass only by physical contact, is a clear example in this sense [2]. Bike sharing is another one, as the geographical location of bike stations influences the travelling time, and different stations have different demands for acquisition or deposit of bikes at different times of the day [16, 18]. Population processes are often modelled as Markovian stochastic processes, mostly as a subclass of continuous-time Markov chains (CTMCs) known as Population CTMCs (PCTMCs). These models have a very large or even infinite state space, a fact resulting in a lot of work in the computer science community to craft efficient algorithms for their analysis, ranging from specialised stochastic simulation to the use of mean-field [6] and moment closure techniques [20, 19]. These methods, in particular, approximate the large or infinite set of linear Kolmogorov equations by a much smaller set of non-linear differential equations, capturing the mean, variance, and possibly other higher order moments. Spatial extensions of PCTMCs typically introduce discrete representations of space in terms of lo- cality, connecting them in a general topology represented by a (weighted) graph [7]. One of the effects of explicit modelling of space is the increase of the computational cost of analysis of the system. For instance, a model with l localities will increase the number of equations for the variance in any moment closure approach by a factor of O(l2). However, although space shapes the behaviour of the system, our interest is often in space-free prop- erties, like the total number of infected individuals in an epidemic scenario, or in localised properties, M. Tribastone and H. Wiklicky (Eds.): International Workshop on Quantitative Aspects of Programming Languages and Systems (QAPL'16) EPTCS 227, 2016, pp. 30 -- 43, doi:10.4204/EPTCS.227.3 c(cid:13) L. Bortolussi & C. Feng This work is licensed under the Creative Commons Attribution License. L. Bortolussi & C. Feng 31 like the number of available bikes in a given station or geographic area. In these cases, a full represen- tation of space may not be needed to compute such quantities with a reasonable accuracy, and model simplification and abstraction can be a viable strategy. In this paper, we pursue this direction by developing an efficient approach to aggregate locations showing a similar dynamical profile. This operation will preserve the dynamical behaviour of the model, but lower the computational cost: for instance, if the number of locations decreases from l to k, then the number of differential equations for the variance is reduced by a factor O(k2/l2). In particular, here we will focus on the reduced cost of the analysis of the full stochastic model by using standard simulation algorithms [17], as this is the most expensive but also most informative computational technique (ex- cluding numerical integration of the Kolmogorov equations, which for PCTMC is unfeasible due to state space explosion). Our approach is based on aggregating locations using state-of-the-art spectral clustering approaches, based on metrics between locations that take the steady state mean or distribution into account. Rather than working with exact solution or estimations of these quantities by simulation, which would be com- putationally expensive, we obtain them applying stochastic approximation ideas, either by solving mean- field equations for the mean or using a linear-noise-like approximation of the distribution, obtaining mean and variance from moment closure equations. The feasibility, effectiveness, and accuracy of our method is discussed on two case studies: an epidemic model and a London bike sharing scenario. The paper is organised as follows: Section 2 introduces the formalism of spatial PCTMCs we will use afterwards and briefly introduces exact and approximate analysis techniques. Section 3 discusses in detail our aggregation approach, and Section 4 presents the two case studies. Conclusions are drawn in Section 5. 2 Spatial PCTMC Models A Population Continuous Time Markov Chain (PCTMC) is a Markovian stochastic process evolving in continuous time. It consists of a number of individually indistinguishable interacting agents of different types which can be in different internal states, so that the state of the system can be described by counting how many agents of each kind are in the system. Agents' interactions are described by a set of transitions, which will change the internal state of one or more agents. In this paper, we specifically consider spatial PCTMC models in which agents are distributed in a finite set of discrete locations, with interactions typically happening either in the same location or in neighbouring ones. Formally, a spatial PCTMC can be expressed as a tuple P = (L ,X, T ): • L = ((cid:96)1, ..., (cid:96)l) is the set of discrete locations in the model, where L = l denotes the total number of locations. • X = (X@(cid:96)1, ...,X@(cid:96)l) ∈ ZN≥0 is an integer vector representing the agent populations distributed over all the locations in the model, where X = N = l × n is the total number of distinct agent populations in the model with n representing the number of agent types. X@(cid:96)i is an sub-vector with the jth component, Xj@(cid:96)i representing the current population of the agent type j at location i. We use X0 to denote the initial state of the model. • T = {τ1, ...,τm} is the set of transitions with size T = m, of the form τ = (rτ (X),Dτ ), where: 1. rτ (X) ∈ R ≥ 0 is the rate function, associating with each transition the rate of an exponential distribution, depending on the global state of the model. 32 Aggregation of Spatial PCTMC Models 2. Dτ ∈ ZN is the update vector which gives the net change for each element of X caused by transition τ. Similarly, we let Dτ@(cid:96)i denote the update vector of agent populations at location i. Transition rules can be easily visualised in the chemical reaction style, as τ@(cid:96)1 + . . . + un u1 τ@(cid:96)l −→ v1 τ@(cid:96)1 + . . . + vn τ@(cid:96)l at rate rτ (X) τ@(cid:96) j − where the net change of agents of type i in location (cid:96) j due to transition τ is given by Di τ@(cid:96) j (1 ≤ i ≤ n, 1 ≤ j ≤ l). This is a general format, encompassing local interactions, interactions ui between agents in neighbouring locations, and movement in space. The tuple P contains all the infor- mation that is needed to build a CTMC on the state space ZN≥0: its infinitesimal generator Q is given by Q(x,y) = ∑{rτ (x)Dτ = y− x}, for x (cid:54)= y. Spatial PCTMC can be simulated using standard stochastic simulation algorithms [17]. τ@(cid:96) j = vi 2.1 Moment Closure, Mean Field, and Linear Noise The analysis of the stochastic model underlying a spatial PCTMC is not an easy task. Numerical methods are hindered by the state space explosion, and even stochastic simulation suffers from the presence of localities and large populations. Furthermore, it is known that for large populations the behaviour of the stochastic model becomes deterministic and converges to the solution of a the mean field differential equation [6, 22], which in the formalism defined above takes the form X = F(X), with F(X) = ∑ τ Dτrτ (X) If populations in each location are in the order of tens or hundreds of thousands, mean-field equations are generally very accurate [6]. However, when populations are smaller, in the order of hundreds, stochastic fluctuations still have an important role, and the linear-noise (central limit) approximation performs better [22, 21]. The idea behind linear noise is to approximate the original stochastic model by a linearized Markov process in continuous states, whose solution is a Gaussian process. The distribution of this process at a given time is thus characterized by solving equations for the mean (incidentally, the mean- field equations above) and equations for the covariance. An alternative strategy for the analysis of the spatial PCTMC is to derive equations for the moments of the population variables [20, 19], up to order k. Due to non-linearities in the rates, there is no exact closed form of these equations, and the differential equations for moments of order k depend on higher- order ones. Hence, equations are closed by relying to some heuristic [20, 19]. Typically, moment closure equations give a better estimation of mean and variance than linear noise, as knowledge of higher-order moments introduce correction terms in the equations of lower order ones. The first two moments can still be used to build a Gaussian approximation to the true distribution at a given time t, formally invoking a maximum entropy argument [3, 9]. 3 Aggregation of Locations of Spatial PCTMC In this section we present the computational methodology to reduce a spatial model by aggregating locations. The main motivation underlying this approach, as discussed in the introduction, is to reduce the computational effort in the analysis of the model. This effort, in fact, is proportional to the number of locations. This is the case for stochastic models, which need to simulate and keep track of the state of L. Bortolussi & C. Feng 33 populations in each location, and for approximate analysis techniques like moment closure. In fact, even when considering only equations for the second order moments, the number of such equations grows quadratically with the number of locations. However, if our final goal is to capture the behaviour of the system at the global level (i.e. to know how many agents of each kind are in the system), then dealing with the full set of locations may incur excessive work which can be reduced by grouping together locations having a similar overall behaviour. To achieve this goal while keeping the error low, we propose the following heuristic scheme, sketched here and detailed in the following subsections. 1. Define distance metrics between locations taking into account the dynamical behaviour of the sys- tem (Section 3.1). More specifically, we want locations showing a similar steady state behaviour to be clustered together. We will define two distances, described below in increasing order of precision: (a) Mean field distance. We will consider the distance between the mean of populations at steady state, approximated by first order moment closure, which corresponds to the mean field ab- straction of the PCTMC model (see Section 2.1). (b) Linear noise distance. We will consider the distance between a Gaussian approximation of the steady state distribution, computed from moment closure equations for mean and vari- ance. 2. Cluster the locations using the previously computed distance (Section 3.2). We will use a spectral clustering algorithm on graphs, exploiting the eigengap heuristic to identify the number of clusters. 3. Given a clustering of locations, construct the reduced model by suitably aggregating together the PCTMC transitions and variables (Section 3.3). 3.1 Distance between Locations We will consider distances between populations of different locations at a given time. The choice of this time is important, and should not be taken too small, in order to minimise the effect of the initial state of the model. In fact, if we took information about the whole trajectory into account, different initial conditions between the populations of two locations would contribute to the distance, often resulting in a separation between the two locations. However, especially if we consider aggregated quantities, like the total number of agents of a certain kind across all locations, this difference is not very relevant, and better results can be obtained by comparing the behaviour after a finite but large time. We will see the experimental validation of this choice in the next Section. Note that we do not consider steady state behaviour (though for a very large time steady state would be reached), as we will use mean-field or linear noise approximations, which do not necessarily converge at steady state. We will consider two distances between each pair of locations (cid:96)i and (cid:96) j, with increasing levels of accuracy: 1. Mean field distance dE((cid:96)i, (cid:96) j). This is just the Eucliden distance between the average value of populations of locations (cid:96)i and (cid:96) j at steady state, i.e. dE((cid:96)i, (cid:96) j) = (cid:107)µX@(cid:96)i − µX@(cid:96) j(cid:107), where µX@(cid:96) is the mean of the population (vector) X@(cid:96) at steady state. To compute this distance efficiently, we resort to the mean-field approximation or to any first order moment closure, see Section 2.1. This reduces the problem to the numerical integration of N differential equations (N = n× l), until they reach equilibrium (or until their temporal average stabilise in case they oscillate).1 1We are implicitly assuming that the mean field or moment closure equations will not show chaotic behaviour, which is typically the case for models of interacting agents. 34 Aggregation of Spatial PCTMC Models 2. Linear noise distance dL((cid:96)i, (cid:96) j). To capture more accurately the steady state behaviour, we can consider a distance between the full distributions. To this end, we will resort to the Bhattacharyya distance dB(Y1,Y2) [4] which measures the distance of the distribution of two one-dimensional vari- ables Y1,Y2. more specifically, we will compute the Bhattacharyya distance between each popou- lation k in locations (cid:96)i and (cid:96) j, denoted by dB(Xk@(cid:96)i,Xk@(cid:96) j), and aggregate over all populations by taking the average: dL((cid:96)i, (cid:96) j) = 1 n (dB(X1@(cid:96)i,X1@(cid:96) j) +··· + dB(Xn@(cid:96)i,Xn@(cid:96) j)) In order to compute dB(Xk@(cid:96)i,Xk@(cid:96) j) without the need to estimate the full distribution, we make a linear noise assumption, i.e. that the steady state distribution is approximately Gaussian, see Section 2.1. Under this hypothesis, dB(Xk@(cid:96)i,Xk@(cid:96) j) can be calculated by the following equation: (cid:33)(cid:33) (cid:32) (cid:33) (cid:32) (cid:32) σ 2 DB(Xk@(cid:96)i,Xk@(cid:96) j) = 1 4 ln 1 4 Xk@(cid:96)i σ 2 Xk@(cid:96) j + σ 2 Xk@(cid:96) j σ 2 Xk@(cid:96)i + 2 + 1 4 (µXk@(cid:96)i − µXk@(cid:96) j )2 σ 2 Xk@(cid:96)i + σ 2 Xk@(cid:96) j where µX@(cid:96) and σX@(cid:96) denote the mean and variance of the population variable X@(cid:96) at the steady state. To numerically compute the values of µX@(cid:96) and σX@(cid:96), we resort to the normal moment- closure approximation of [19], which can be obtained at a much lower computational cost than by simulating the PCTMC, by integrating O(N2) differential equations. We observe that the cost of computing dL((cid:96)i, (cid:96) j) is significantly higher than the cost of computing dE((cid:96)i, (cid:96) j), as we need to integrate O(N2) differential equations rather than O(N). However, this cost is balanced by a higher accuracy in the reduced system, though for certain models (essentially those hav- ing similar variance for the same agent kind at different locations in a cluster) accuracy is comparable. In practice, dE should be used when the cost of solving moment closure equations for the variance is very high due to the very large number of locations. Hence, aggregation with respect to dE can be seen as a reduction of the number of moment closure equations. When the goal is to reduce the cost of stochastic simulation, and solving moment closure equations for the variance is cheap, it is better to rely on the metric dL. In general, our method should be applied when stochastic simulation of the spatial PCTMC model requires excessive computational time, and computing dE or dL is much cheaper than the cost of stochastic simulation. 3.2 Spectral Clustering Spectral clustering methods are common graph-based approaches to (unsupervised) clustering of data [28]. The dataset is composed of n objects S = s1, . . . ,sn, among which some local symmetric and non- negative similarity measure Ai, j is defined. Ai j is often obtained from a distance or difference measure d(si,s j) between the objects. This information is then arranged in a weighted graph G = (S,A). Within this framework, clustering is translated into a graph partitioning problem. The most common class of spectral approaches for graph partitioning (in k subsets) is to map the original data into the first k eigenvectors of some normalized version of the similarity matrix A and then apply a standard clustering algorithm such as k-means on these new coordinates. Among the most commonly used spectral clustering algorithms are the unnormalized spectral clus- tering [28], normalized spectral clustering according to Shi and Malik [25], and normalized spectral clustering according to Ng, Jordan, and Weiss [24]. The three algorithms are very similar; their main distinguishing feature is the fact that they use three different graph Laplacians. As an illustration, the L. Bortolussi & C. Feng 35 normalized spectral clustering algorithm according to Ng, Jordan, and Weiss is given as follows. Given a set of objects S = s1, . . . ,sn that we want to cluster into k subsets: 1. Form the similarity matrix A ∈ Rn×n defined by Ai j = exp(− d(si−s j)2 2. Define D to be the diagonal matrix whose (i,i)-element is the sum of A's i-th row, and construct ) if i (cid:54)= j, and Aii = 0. 2σ 2 the normalized Laplacian matrix L = I − D−1/2AD−1/2 3. Find U1,U2, ...,Uk , the first k eigenvectors of L with k smallest eigenvalues, and form the matrix U = [U1,U2, ...,Uk] ∈ Rn×k by stacking the eigenvectors in columns. 4. Form the matrix Z from U by renormalizing each of U's rows to have unit length (i.e. Zi j = Ui j/(∑ j U 2 i j)1/2). 5. Treating each row of Z as a point in Rk , cluster them into k clusters via k-means. 6. Finally, assign the original object si to cluster j if and only if row i of the matrix Z was assigned to cluster j. We will use the above algorithm hereafter for the clustering of locations in spatial PCMTCs . 3.2.1 Application to Aggregation of Locations of spatial PCTMC Given a spatial PCTMC model we wish to aggregate its locations L = ((cid:96)1, ..., (cid:96)l). The first step is to compute one of the two distances dE or dL of the previous section. From this metric, we can derive the similarity matrix A ∈ Rl×l for the locations L by using Gaussian kernel with width σ: (cid:18) −d(cid:63)((cid:96)i, (cid:96) j)2 (cid:19) Ai j = exp 2σ 2 Then, the standard spectral clustering algorithms can be applied to cluster the locations with a specific choice of the number of clusters k. We will refer to the locations' clusters by L = ( (cid:96)1, ..., (cid:96)k). In order to select k, we rely on the eigengap heuristic [23]. Specifically, we choose the number of clusters k such that all eigenvalues λ1, . . . ,λk are very small, but λk+1 is relatively large. A realisation of this heuristic will be shown while discussing case studies. 3.3 Model Reduction In this section, we show how to generate a reduced version of a spatial PCTMC model once the locations L . Suppose we have clustered L in the original model have been clustered into the aggregated locations locations in a spatial PCTMC into k subsets. Formally, we want to map the original spatial PCTMC L = k < l = L , X < X, and model P = (L ,X, T ) to a reduced one T ≤ T . Hence, we need to construct both the aggregated vector of the populations of agents and the reduced set of transitions. T ), where P = ( L , X, 3.3.1 Generating the aggregated vector of agent populations The algorithm for generating the aggregated vector of agent populations is fairly straightforward. The basic idea is to treat agents of the same type in the same cluster of locations as identical agents. Thus, we only need to sum up the populations of those identical agents. Algorithm 1 gives the corresponding pseudo code for generating the aggregated vector of agent populations. Note that in the pseudo code, we use the same notations for the original spatial PCTMC model as in Section 2. 36 Aggregation of Spatial PCTMC Models L for j = 1 to c do Algorithm 1 The Algorithm for generating the aggregated vector of agent populations Require: X, X, L , Ensure: X = n× k∧ Xi@ (cid:96) j = 0 ∀ Xi@ (cid:96) j ∈ X {all elements in X are set to zero initially} 1: for i = 1 to l do 2: 3: 4: 5: 6: 7: end for 8: return X if (cid:96)i belongs to cluster j then let X@ (cid:96) j = X@ (cid:96) j + X@(cid:96)i end if end for 3.3.2 Generating the reduced set of transitions Three steps are taken to generate the reduced set of transitions. The first step is to copy the transitions in the original spatial PCTMC model to T . Meanwhile, the update of agent populations in the transition should be replaced by update of corresponding aggregated populations, the agent populations appearing in the rate function should also be replaced accordingly. The first step may generate many redundant transitions in which there is no agent population being updated. Thus, the second step is to remove redundant transitions from T . The last step is de-duplication, in which we combine all transitions with the same update vector into one transition. Algorithm 2 gives the pseudo code for the three steps, in which we use (cid:96)i to denote the number of locations belonging to cluster (cid:96)i. Note that this construction will produce an approximate model with respect to the original one, the reason being the treatment of rates. Approximation stems from the fact that in the rates of the aggregated model we replace all occurrences of each X@(cid:96) with X@ (cid:96)/ (cid:96), where (cid:96) ∈ (cid:96). Hence we assume that for each (cid:96)i, (cid:96) j ∈ (cid:96), X@(cid:96)i = X@(cid:96) j. However, the heuristics we use to construct the aggregated model guarantee that this condition should be roughly satisfied (at steady state). 4 Case Studies In this section we test our method on two case studies: a benchmark model of epidemic spreading, Section 4.1, and a realistic model of a portion of the London bike-sharing system, Section 4.2. 4.1 Spatial Epidemic Spreading Model We first consider a classical epidemiological SIS model of individuals partitioned into m communities, where individuals move between communities but infections only take place within communities. Each individual is considered to be susceptible (S) or infected (I) with respect to the disease. A continuous- time SIS epidemiological model is then applied to this population as follows: each individual, regardless of susceptible or infected, can move to his/her connected communities with a specific rate (ri j). Each community is connected with three other randomly chosen communities. Each infected individual can randomly make contact with a susceptible individual in the same community, and infect her with rate βi in community i. Finally, infected individuals independently recover to the susceptible state at rate µ. L. Bortolussi & C. Feng 37 L , T , T {all elements in D τ are set to zero initially} for j = 1 to k do end if end for end for for all X@(cid:96) appears in r τ do for i = 1 to k do if (cid:96)i belongs to cluster j then let D τ@ (cid:96) j = D τ@ (cid:96) j + Dτ@(cid:96)i if (cid:96) belongs to cluster i then replace X@(cid:96) with X@ (cid:96)i/ (cid:96)i create a new τ, set r τ = rτ, D τ = n× k for i = 1 to l do Algorithm 2 The Algorithm for generating the reduced set of transitions Require: L , Ensure: T = 0 1: for all τ in T do 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: end for 18: for all τ in T do 19: 20: end if 21: 22: end for 23: for all τi, τ j (i (cid:54)= j) in T do 24: 25: 26: end if 27: 28: end for 29: return T create a new τ, set D τ = D τi and r τ = r τi + r τ j remove τi, τ j from T , add τ to T if All elements in D τ equal zero then end if end for end for remove τ from T if D τi = D τ j then The model can be studied by a spatial PCTMC containing the following transitions: S((cid:96)i) → I((cid:96)i) I((cid:96)i) → S((cid:96)i) S((cid:96)i) → S((cid:96) j) I((cid:96)i) → I((cid:96) j) at βi #(S((cid:96)i)) #(I((cid:96)i)) at µ #(I((cid:96)i)) at ri j #(S((cid:96)i)) at ri j #(I((cid:96)i)) ∀i ∈ m ∀i ∈ m ∀i, j ∈ m, (cid:96)i and (cid:96) j are connected ∀i, j ∈ m, (cid:96)i and (cid:96) j are connected where S((cid:96)i), I((cid:96)i) represent a susceptible, infected individual in Community i; βi represents the contact rate in community i; ri j denotes the rate for an individual to travel from Community i to Community j. In our experiment, we consider a model with m = 30, βi and ri j to be random values between zero and one, µ = 0.1. We first report the analysis using the Linear-Noise metric dL. Computing the distance and running the spectral clustering algorithm, according to the previous section, we obtained the spectre of the normalized Laplacian matrix shown in Figure 1 (left), for the smallest 10 eigenvalues. As can be seen from the figure, the first four eigenvalues are very close to zero, and there is a large gap between the 4th and 5th eigenvalues. Thus, we set the number of clusters to four. Figure 2 (left) shows the 38 Aggregation of Spatial PCTMC Models Figure 1: (left) The smallest 10 eigenvalues of the normalized Laplacian matrix of the SIS model. (right) The smallest 10 eigenvalues of the normalized Laplacian matrix of the bike-sharing model. Figure 2: (left) Comparison of the infected populations before and after aggregation for the SIS model, using the dL distance. (right) Comparison of the infected populations before and after aggregation for the SIS model, using the dE distance. trajectories of the infected population generated by stochastic simulation before and after aggregation. Table 1 compares the number of transitions, simulation time of 1000 runs of the SIS model before and after aggregation, as well as the average error ratio of the trajectories in Figure 2 (left) after aggregation compared with the counterpart before aggregation. As can be readily seen, our method considerably reduced the simulation cost of the model, at the price of a reasonably small loss of accuracy, the relative error being less than 10% (the average error ratio is computed as the average along the trajectory). In Figure 2 (right), instead, we show the result of the aggregation when using the mean-field distance dE. In this case, the spectral clustering identifies 5 clusters, with a comparable overall accuracy with respect to the linear-noise distance as can be seen in Table 1. 4.2 Public Bike-sharing Model The second example is a spatial PCTMC which models a public bike-sharing system. Bike-sharing systems are becoming more and more important for urban transportation. In such systems, users arrive L. Bortolussi & C. Feng 39 SIS model No. of transitions simulation time (1000 runs) Avg error ratio Before aggregation After aggregation (dL) After aggregation (dE) 240 28 34 8.81 mins 59 secs 3.67 mins N/A 8.67% 10.44% Table 1: Size, simulation cost (including the aggregation cost) of the SIS model before and after aggre- gation, and error introduced by the aggregation. Figure 3: The map of bike-sharing stations near Russell Square in London in which red circles repre- senting bike stations at a station, pick up a bike, use it for a while, and then return it to another station of their choice. Recently, PCTMCs have been used to model bike-sharing systems [16, 18]. Here, we consider a map which consists of N zones. There is one public bike station in each zone. Each station has several bike slots. The pickup rate of bikes in a station is governed by an exponential distribution. When a user picks up a bike, the available number of bikes in the station will decrease by one whereas the available number of slots in that station will increase by one. The user will choose another zone in the city as their destination. When the user arrives at the destination zone, they will return their bike to the bike station in that zone. We use a spatial PCTMC containing the following transitions to represent the model: Bike((cid:96)i) → Slot((cid:96)i) + BikeTo j((cid:96)i) BikeTo j((cid:96)i) + Slot((cid:96) j) → Bike((cid:96) j) at λi pi j at #(BikeTo j((cid:96)i)) µi j where Bike((cid:96)i) and Slot((cid:96)i) denote an available bike or slot in the bike station in Zone i, respectively; BikeTo j((cid:96)i) denotes a bike in transit from Zone i to Zone j. λi is the pickup rate of bikes in the bike station in Zone i, pi j is the probability to choose Zone j as the destination of a trip when picking up a bike from Zone i. 1/µi j is the mean trip time from Zone i to Zone j. Specifically, we use the above spatial PCTMC to model 30 bike stations near Russell Square in London which is illustrated in Figure 3. All the rates in the model are calculated by journey data which is available online 2. 2https://tfl.gov.uk/info-for/open-data-users/our-feeds?intcmp=3671#on-this-page-4 40 Aggregation of Spatial PCTMC Models Bike model No. of transitions simulation time (1000 runs) Avg error ratio Before aggregation After aggregation (dL) After aggregation (dE) 1800 300 180 15.6 mins 2.5 mins 1.6 mins N/A 11.94% 23.06% Table 2: Size, simulation cost (including the aggregation cost) of the bike-sharing model before and after aggregation, and error introduced by the aggregation. We apply our method with the linear noise distance to cluster the 30 bike stations. The smallest 10 eigenvalues of the normalized Laplacian matrix, computed according to the spectral clustering recipe, are shown in Figure 1 (right). According to the eigengap heuristic, there are 5 well separated clusters. Figure 4 (left) shows the trajectories of the number of available bikes in the 5 clusters generated by stochastic simulation before and after aggregation. Table 2 shows the number of transitions, simulation time of 1000 runs of the bike-sharing model before and after aggregation, as well as the average error ratio of the trajectories in Figure 4 (left) after aggregation compared with the counterpart before aggre- gation. In Figure 4 (right), instead, we compare the trajectories of the original model and the reduced one according to the mean-field metric dE. In this case, we have only three clusters and the accuracy decreases considerably, as can be numerically seen in Table 2. Figure 4: (left) Comparison of the available number of bikes before and after aggregation using the dL distance. (right) Comparison of the available number of bikes before and after aggregation using the dE distance. In a bike-sharing scenario, we are often interested in tracking the number of bikes in some specific locations. This can be achieved in our framework by forcing some locations to be a singleton cluster. In order to understand the influence of the aggregation of remaining stations on some isolated ones, we choose, in each experiment, one station from one of the five clusters, and treat that station as a single cluster. Figure 5 shows the trajectories of the number of available bikes of the five chosen stations in five different experiments, comparing results of stochastic simulation of the original and the aggregated model. We can see the population dynamics of available bikes in the five stations still achieve good accuracy (10.84% average error ratio) even if other bike stations are aggregated. L. Bortolussi & C. Feng 41 Figure 5: Comparison of the trajectories of the number of available bikes in the five chosen stations from the original and the aggregated model. Figure 6: Comparison of the available number of bikes before and after aggregation according to physical position of stations Additionally, we also apply a naive approach in which we use spectral clustering to cluster the 30 bike stations according to their physical positions on the map. Figure 6 shows the trajectories of the number of available bikes generated by stochastic simulation before and after aggregation in this case. The average error ratio for the trajectories is 24.51%. Thus, location clustering according to agents' population distribution outperforms clustering according to physical positions. 5 Related Work and Conclusion Spatiality has been shown to be an important factor for modelling different classes of complex systems [10, 11]. As a result, there has been some effort to study the effects of spatial aggregation on stochastic models in order to achieve a balance point between model complexity and accuracy. Most of this work 42 Aggregation of Spatial PCTMC Models focuses on how to discretise continuous space or on the effect of compartment size to represent the space, see for example [13, 12, 5]. Our work can be thought of as above theses approaches, as our goal is to reduce the number of patches (locations). We show that by clustering locations in a spatial PCTMC according to linear noise or mean field distance, the size of the model can be significantly reduced but still retain reasonable accuracy. The experiment on the bike-sharing model shows that our method outperforms aggregation of locations by their physical distance. Moreover, our recent work shows that the cost of deriving higher moments based on fluid approximation can be significantly reduced using correlation heuristics [15]. This means that computing linear noise distance can also be largely reduced, which makes our method more scalable. In the future, we plan to apply this approach to models in spatial process algebras, such as PALOMA [14], CARMA [8] and MELA [27]. 6 Acknowledgments The authors would like to thank Jane Hillston for her helpful comments on an earlier draft of this work. This work is supported by the EU project QUANTICOL, 600708. References [1] Linda JS Allen (2010): An introduction to stochastic processes with applications to biology. CRC Press. [2] H. Andersson & T. Britton (2000): Stochastic Epidemic Models and Their Statistical Analysis. Springer- Verlag, doi:10.1007/978-1-4612-1158-7. [3] A. Andreychenko, L. Mikeev & C. Wolf (2015): Model Reconstruction for Moment-Based Stochastic Chemical Kinetics. ACM Transactions on Modeling and Computer Simulation (TOMACS) 25(2), p. 12, doi:10.1145/2699712. [4] A Bhattacharyya (1943): On a measure of divergence between two statistical population defined by their population distributions. Bulletin Calcutta Mathematical Society 35, pp. 99 -- 109. [5] Juan A Bonachela, Miguel A Munoz & Simon A Levin (2012): Patchiness and demographic noise in three ecological examples. Journal of Statistical Physics 148(4), pp. 724 -- 740, doi:10.1007/s10955-012-0506-x. [6] L. Bortolussi, J. Hillston, D. Latella & M. Massink (2013): Continuous approximation of collective system behaviour: A tutorial. Performance Evaluation 70(5), pp. 317 -- 349, doi:10.1016/j.peva.2013.01.001. [7] L. Bortolussi & L. Nenzi (2014): Specifying and monitoring properties of stochastic spatio-temporal systems in signal temporal logic. In: Proceedings of the 8th International Conference on Performance Evaluation Methodologies and Tools, pp. 66 -- 73, doi:10.4108/icst.Valuetools.2014.258183. [8] Luca Bortolussi, Rocco De Nicola, Vashti Galpin, Stephen Gilmore, Jane Hillston, Diego Latella, Michele Loreti & Mieke Massink (2015): CARMA: Collective Adaptive Resource-sharing Markovian Agents. In: Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL 2015, London, UK., pp. 16 -- 31, doi:10.4204/EPTCS.194.2. [9] Luca Bortolussi & Roberta Lanciani (2014): Stochastic approximation of global reachability probabil- In: Computer Performance Engineering, Springer, pp. 224 -- 239, ities of Markov population models. doi:10.1007/978-3-319-10885-8 16. [10] Richard Durrett & Simon Levin (1994): The importance of being discrete (and spatial). Theoretical popula- tion biology 46(3), pp. 363 -- 394, doi:10.1006/tpbi.1994.1032. [11] Rick Durrett (1999): doi:10.1137/S0036144599354707. Stochastic spatial models. SIAM review 41(4), pp. 677 -- 718, [12] Radek Erban & S Jonathan Chapman (2009): Stochastic modelling of reaction -- diffusion processes: algo- rithms for bimolecular reactions. Physical biology 6(4), p. 046001, doi:10.1088/1478-3975/6/4/046001. L. Bortolussi & C. Feng 43 [13] Cheng Feng (2014): Patch-based Hybrid Modelling of Spatially Distributed Systems by Using Stochas- tic HYPE - ZebraNet as an Example. In: Proceedings Twelfth International Workshop on Quanti- tative Aspects of Programming Languages and Systems, QAPL 2014, Grenoble, France., pp. 64 -- 77, doi:10.4204/EPTCS.154.5. [14] Cheng Feng & Jane Hillston (2014): PALOMA: A process algebra for located markovian agents. In: Quan- titative Evaluation of Systems, Springer, pp. 265 -- 280, doi:10.1007/978-3-319-10696-0 22. [15] Cheng Feng, Jane Hillston & Vashti Galpin (2016): Automatic Moment-Closure Approximation of Spa- tially Distributed Collective Adaptive Systems. ACM Transactions on Modeling and Computer Simulation (TOMACS) 26(4), doi:10.1145/2883608. [16] Christine Fricker & Nicolas Gast (2014): systems with stations of finite capacity. doi:10.1007/s13676-014-0053-5. Incentives and redistribution in homogeneous bike-sharing EURO Journal on Transportation and Logistics, pp. 1 -- 31, [17] Daniel T Gillespie (1977): Exact stochastic simulation of coupled chemical reactions. The Journal of Physical Chemistry 81(25), pp. 2340 -- 2361, doi:10.1021/j100540a008. [18] Marcel C Guenther & Jeremy T Bradley (2013): Journey data based arrival forecasting for bicycle hire In: Analytical and Stochastic Modeling Techniques and Applications, Springer, pp. 214 -- 231, schemes. doi:10.1007/978-3-642-39408-9 16. [19] Marcel C Guenther, Anton Stefanek & Jeremy T Bradley (2013): Moment closures for performance models with highly non-linear rates. In: Computer Performance Engineering, Springer, pp. 32 -- 47, doi:10.1007/978- 3-642-36781-6 3. [20] J. Hasenauer, V. Wolf, A. Kazeroonian & F. J. Theis (2013): Method of conditional moments (MCM) for the Chemical Master Equation: A unified framework for the method of moments and hybrid stochastic- deterministic models. Journal of Mathematical Biology, doi:10.1007/s00285-013-0711-5. [21] N. G. van Kampen (2007): Stochastic processes in physics and chemistry. Elsevier. [22] T. G. Kurtz (1981): Approximation of population processes. SIAM, doi:10.1137/1.9781611970333. [23] Bojan Mohar (1997): Some applications of Laplace eigenvalues of graphs. In: Graph Symmetry, NATO ASI Series 497, Springer Netherlands, pp. 225 -- 275, doi:10.1007/978-94-015-8937-6 6. [24] Andrew Y Ng, Michael I Jordan, Yair Weiss et al. (2002): On spectral clustering: Analysis and an algorithm. Advances in neural information processing systems 2, pp. 849 -- 856, doi:10.1.1.19.8100. [25] Jianbo Shi & Jitendra Malik (2000): Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence 22(8), pp. 888 -- 905, doi:10.1109/34.868688. [26] Anton Stefanek, Richard A Hayden & Jeremy T Bradley (2011): Fluid computation of the performance: energy tradeoff in large scale Markov models. ACM SIGMETRICS Performance Evaluation Review 39(3), pp. 104 -- 106, doi:10.1145/2160803.2160817. [27] Ludovica Luisa Vissat, Jane Hillston, Glenn Marion & Matthew J Smith (to appear): MELA: Modelling in Ecology with Location Attributes. Proceedings of the fourth international symposium on Modelling and Knowledge Management applications: Systems and Domains, MoKMaSD 2015, York, UK. [28] Ulrike Von Luxburg (2007): A tutorial on spectral clustering. Statistics and computing 17(4), pp. 395 -- 416, doi:10.1007/s11222-007-9033-z.
1803.01106
2
1803
2018-08-11T15:04:31
Model-Based Stochastic Search for Large Scale Optimization of Multi-Agent UAV Swarms
[ "cs.MA" ]
Recent work from the reinforcement learning community has shown that Evolution Strategies are a fast and scalable alternative to other reinforcement learning methods. In this paper we show that Evolution Strategies are a special case of model-based stochastic search methods. This class of algorithms has nice asymptotic convergence properties and known convergence rates. We show how these methods can be used to solve both cooperative and competitive multi-agent problems in an efficient manner. We demonstrate the effectiveness of this approach on two complex multi-agent UAV swarm combat scenarios: where a team of fixed wing aircraft must attack a well-defended base, and where two teams of agents go head to head to defeat each other.
cs.MA
cs
Model-Based Stochastic Search for Large Scale Optimization of Multi-Agent UAV Swarms David D. Fan1, Evangelos Theodorou2, and John Reeder3 8 1 0 2 g u A 1 1 ] A M . s c [ 2 v 6 0 1 1 0 . 3 0 8 1 : v i X r a Abstract -- Recent work from the reinforcement learning community has shown that Evolution Strategies are a fast and scalable alternative to other reinforcement learning methods. In this paper we show that Evolution Strategies are a special case of model-based stochastic search methods. This class of algorithms has nice asymptotic convergence properties and known convergence rates. We show how these methods can be used to solve both cooperative and competitive multi- agent problems in an efficient manner. We demonstrate the effectiveness of this approach on two complex multi-agent UAV swarm combat scenarios: where a team of fixed wing aircraft must attack a well-defended base, and where two teams of agents go head to head to defeat each other†. I. INTRODUCTION Reinforcement Learning is concerned with maximizing rewards from an environment through repeated interactions and trial and error. Such methods often rely on various approximations of the Bellman equation and include value function approximation, policy gradient methods, and more [1]. The Evolutionary Computation community, on the other hand, have developed a suite of methods for black box optimization and heuristic search [2]. Such methods have been used to optimize the structure of neural networks for vision tasks, for instance [3]. Recently, Salimans et al. have shown that a particular variant of evolutionary computation methods, termed Evo- lution Strategies (ES) are a fast and scalable alternative to other reinforcement learning approaches, solving the difficult humanoid MuJoCo task in 10 minutes [4]. The authors argue that ES has several benefits over other reinforcement learning methods: 1) The need to backpropagate gradients through a policy is avoided, which opens up a wider class of policy parameterizations; 2) ES methods are massively parallelizable, which allows for scaling up learning to larger, more complex problems; 3) ES often finds policies which are more robust than other reinforcement learning methods; and 4) ES are better at assigning credit to changes in the policy over longer timescales, which enables solving tasks with longer time horizons and sparse rewards. In this work we leverage all four of these advantages by using ES to solve a problem with: 1) a more complex and decipherable policy architecture which allows for safety considerations; 2) a large-scale simulated environment with many interacting 1 Inst. for Robotics and Intelligent Machines, Georgia Institute of Technology. [email protected] 2 Dept. of Aerospace Engineering, Georgia Institute of Technology. [email protected] 3 SPAWAR Systems Center Pacific, San Diego, CA, USA. [email protected] † Video at http://goo.gl/dWvQi7 Fig. 1: The SCRIMMAGE multi-agent simulation environ- ment. In this scenario, blue team fixed-wing agents attack red team quadcopter defenders. White lines indicate missed shots. elements; 3) multiple sources of stochasticity including vari- ations in intial conditions, disturbances, etc.; and 4) sparse rewards which only occur at the very end of a long episode. A common critique of evolutionary computation algo- rithms is a lack of convergence analysis or guarantees. Of course, for problems with non-differentiable and non- convex objective functions, analysis will always be diffi- cult. Nevertheless, we show that the Evolution Strategies algorithm proposed by [4] is a special case of a class of model-based stochastic search methods known as Gradient- Based Adaptive Stochastic Search (GASS) [5]. This class of methods generalizes many stochastic search methods such as the well-known Cross Entropy Method (CEM) [6], CMA- ES [7], etc. By casting a non-differentiable, non-convex optimization problem as a gradient descent problem, one can arrive at nice asymptotic convergence properties and known convergence rates [8]. With more confidence in the convergence of Evolution Strategies, we demonstrate how ES can be used to efficiently solve both cooperative and competitive large-scale multi- agent problems. Many approaches to solving multi-agent problems rely on hand-designed and hand-tuned algorithms (see [9] for a review). One such example, distributed Model Predictive Control, relies on independent MPC controllers on each agent with some level of coordination between them [10], [11]. These controllers require hand-designing dynamics models, cost functions, feedback gains, etc. and require expert domain knowledge. Additionally, scaling these methods up to more complex problems continues to be an issue. Evolutionary algorithms have also been tried as a solution to multi-agent problems; usually with smaller, simpler environments, and policies with low complexity [12], [13]. Recently, a hybrid approach combining MPC and the use of genetic algorithms to evolve the cost function for a hand-tuned MPC controller has been demonstrated for a UAV swarm combat scenario [14]. In this work we demonstrate the effectiveness of our approach on two complex multi-agent UAV swarm combat scenarios: where a team of fixed wing aircraft must attack a well-defended base, and where two teams of agents go head to head to defeat each other. Such scenarios have been previously considered in simulated environments with less fidelity and complexity [15], [14]. We leverage the compu- tational efficiency and flexibility of the recently developed SCRIMMAGE multi-agent simulator for our experiments (Figure 1) [16]. We compare the performance of ES against the Cross Entropy Method. We also show for the competitive scenario how the policy learns over time to coordinate a strategy in response to an enemy learning to do the same. We make our code freely available for use (https:// github.com/ddfan/swarm_evolve). II. PROBLEM FORMULATION We can pose our problem as the non-differentiable, non- convex optimization problem θ∗ = argmax θ∈Θ J(θ ) (1) where Θ ⊂ Rn, a nonempty compact set, is the space of solutions, and J(θ ) is a non-differentiable, non-convex real-valued objective function J : Θ → R. θ could be any combination of decision variables of our problem, including neural network weights, PID gains, hardware design param- eters, etc. which affect the outcome of the returns J. For reinforcement learning problems θ usually represents the parameters of the policy and J is an implicit function of the sequential application of the policy to the environment. We first review how this problem can be solved using Gradient- Based Adaptive Stochastic Search methods and then show how the ES algorithm is a special case of these methods. A. Gradient-Based Adaptive Stochastic Search The goal of model-based stochastic search methods is to cast the non-differentiable optimization problem (1) as a differentiable one by specifying a probabilistic model (hence "model-based") from which to sample [8]. Let this model be p(θω) = f (θ;ω),ω ∈ Ω, where ω is a parameter which defines the probability distribution (e.g. for Gaussian distributions, the distribution is fully parameterized by the mean and variance ω = [µ,σ ]). Then the expectation of J(θ ) over the distribution f (θ;ω) will always be less than the optimal value of J, i.e. J(θ ) f (θ;ω)dθ ≤ J(θ∗) (2) (cid:90) Θ The idea of Gradient-based Adaptive Stochastic Search (GASS) is that one can perform a search in the space of parameters of the distribution Ω rather than Θ, for a distribution which maximizes the expectation in (2): (cid:90) ω∗ = argmax ω∈Ω Θ J(θ ) f (θ;ω)dθ (3) Maximizing this expectation corresponds to finding a distri- bution which is maximally distributed around the optimal θ. However, unlike maximizing (1), this objective function can now be made continuous and differentiable with respect to ω. With some assumptions on the form of the distribution, the gradient with respect to ω can be pushed inside the expectation. The GASS algorithm presented by [8] is applicable to the exponential family of probability densities: where φ (θ ) = ln(cid:82) exp(ω(cid:124)T (θ ))dθ, and T (θ ) is the vector f (θ;ω) = exp{ω(cid:124)T (θ )− φ (θ )} (4) of sufficient statistics. Since we are concerned with showing the connection with ES which uses parameter perturbations f (θ;ω) is sampled with Gaussian noise, we assume that Gaussian. Furthermore, since we are concerned with learning a large number of parameters (i.e. weights in a neural network), we assume an independent Gaussian distribution (cid:124) ∈ R2n and ω = over each parameter. Then, T (θ ) = [θ ,θ 2] [µ/σ 2,−1/nσ 2] (cid:124) ∈ R2n, where µ and σ are vectors of the mean and standard deviation corresponding to the distribu- tion of each parameter, respectively. Algorithm 1 Gradient-Based Adaptive Stochastic Search Require: Learning rate αk, sample size Nk, initial policy (cid:124), smoothing function S(), small parameters ω0 = [µ0,σ 2 0 ] constant γ > 0. 1: for k = 0,1,··· do 2: 3: 4: 5: 6: iid∼ f (θ;ωk),i = 1,2,··· ,Nk. Sample θ i k k)) for i = 1,··· ,Nk. k = S(J(θ i Compute returns wi Compute variance terms Vk = Vk + γI, eq (5),(6) Calculate normalizer η = ∑Nk i=1 wi k. Update ωk+1: ωk+1 ← ωk + αk (cid:18)(cid:20) θ i (cid:21) (cid:20) − µ 1 η V−1 k Nk∑ i=1 wi k 7: 8: end for k (θ i k)2 σ 2 + µ2 (cid:21)(cid:19) We present the GASS algorithm for this specific set of probability models (Algorithm 1), although the analysis for convergence holds for the more general exponential family of distributions. For each iteration k, The GASS algorithm iid∼ f (θ;ωk),i = involves drawing Nk samples of parameters θ i k 1,2,··· ,Nk. These parameters are then used to sample the return function J(θ i k). The returns are fed through a shaping function S(·) : R → R+ and then used to calculate an update on the model parameters ωk+1. The shaping function S(·) is required to be nondecreasing and bounded from above and below for bounded inputs, with the lower bound away from 0. Additionally, the set {argmaxθ∈Θ S(J(θ ))} must be a nonempty subset of the set of solutions of the original problem {argmaxθ∈Θ J(θ )}. The shaping function can be used to adjust the explo- ration/exploitation trade-off or help deal with outliers when sampling. The original analysis of GASS assumes a more general form of Sk(·) where S can change at each iteration. For simplicity we assume here it is deterministic and un- changing per iteration. GASS can be considered a second-order gradient method and requires estimating the variance of the sampled param- eters: Vk = 1 Nk − 1 T (θ i (cid:124) k)T (θ i k) Nk∑ i=1 − (cid:32) Nk∑ i=1 (cid:33)(cid:32) Nk∑ i=1 T (θ i k) (cid:33)(cid:124) T (θ i k) . (5) 1 k − Nk N2 In practice if the size of the parameter space Θ is large, as is the case in neural networks, this variance matrix will be of size 2n× 2n and will be costly to compute. In our work we approximate Vk with independent calculations of the variance on the parameters of each independent Gaussian. With a slight abuse of notation, consider θ i k as a scalar element of k a 2×2 variance k. We then have, for each scalar element θ i θ i matrix: Vk = (cid:21)(cid:2) θ i (cid:20) θ i (cid:32) Nk∑ (cid:20) θ i k ( θ i k)2 k i=1 k ( θ i k)2 ( θ i k)2(cid:3) (cid:21)(cid:33)(cid:32) Nk∑ i=1 1 Nk∑ Nk − 1 − i=1 1 k − Nk N2 k)2(cid:3)(cid:33) . ( θ i (cid:2) θ i k (6) Theorem 1 shows that GASS produces a sequence of ωk that converges to a limit set which specifies a set of distributions that maximize (3). Distributions in this set will specify how to choose θ∗ to ultimately maximize (1). As with most non-convex optimization algorithms, we are not guaranteed to arrive at the global maximum, but using prob- abilistic models and careful choice of the shaping function should help avoid early convergence into suboptimal local maximum. The proof relies on casting the update rule in the form of a generalized Robbins-Monro algorithm (see [8], Thms 1 and 2). Theorem 1 also specifies convergence rates in terms of the number of iterations k, the number of samples per iteration Nk, and the learning rate αk. In practice Theorem 1 implies the need to carefully balance the increase in the number of samples per iteration and the decrease in learning rate as iterations progress. Assumption 1 i) The learning rate αk > 0, αk → 0 as k → ∞, and ∑∞ k=0 αk = ∞. ii) The sample size Nk = N0kξ , where ξ > 0; also αk and √ Nk = O(k−β ). Nk jointly satisfy α/ (cid:82) iii) T (θ ) is bounded on Θ. iv) If ω∗ is a local maximum of (3), the Hessian of Θ J(θ ) f (θ;ω)dθ is continuous and symmetric negative definite in a neighborhood of ω∗. Theorem 1 Assume that Assumption 1 holds. Let αk = α0/kα for 0 < α < 1. Let Nk = N0kτ−α where τ > 2α is a constant. Then the sequence {ωk} generated by Algorithm 1 converges to a √ kτ ). limit set w.p.1. with rate O(1/ B. Evolutionary Strategies We now review the ES algorithm proposed by [4] and show how it is a first-order approximation of the GASS algorithm. The ES algorithm consists of the same two phases as GASS: 1) Randomly perturb parameters with noise sampled from a Gaussian distribution. 2) Calculate returns and calculate an update to the parameters. The algorithm is outlined in Algorithm 2. Once returns are calculated, they are sent through a function S(·) which performs fitness shaping [17]. Salimans et al. used a rank transformation function for S(·) which they argue reduced the influence of outliers at each iteration and helped to avoid local optima. It is clear that policy parameters θ0, smoothing function S(). Algorithm 2 Evolution Strategies Require: Learning rate αk, noise standard deviation γ, initial 1: for k = 0,1,··· do 2: 3: Sample ε1,··· ,εn ∼ N (0,In×n) Compute returns wi k = S(J(θk +γεi)) for i = 1,··· ,Nk Update θk+1: θk+1 ← θk + αk 4: 5: 6: end for 1 Nkγ ∑Nk i=1 wi kεi the ES algorithm is a sub-case of the GASS algorithm when the sampling distribution is a point distribution. We can also recover the ES algorithm by ignoring the variance terms on line 7 in Algorithm 1. Instead of the normalizing term η, ES uses the number of samples Nk. The small constant in GASS γ becomes the variance term in the ES algorithm. The update rule in Algorithm 2 involves multiplying the scaled returns by k−µ in Algorithm 1. We see that the noise, which is exactly θ i ES enjoys the same asymptotic convergence rates offered by the analysis of GASS. While GASS is a second-order method and ES is only a first-order method, in practice ES uses approximate second-order gradient descent methods which adapt the learning rate in order to speed up and stabilize learning. Examples of these methods include ADAM, RM- SProp, SGD with momentum, etc., which have been shown to perform very well for neural networks. Therefore we can treat ES a first-order approximation of the full second-order variance updates which GASS uses. In our experiments we use ADAM [18] to adapt the learning rate for each parameter. As similarly reported in [4], when using adaptive learning rates we found little improvement over adapting the variance of the sampling distribution. We hypothesize that a first order method with adaptive learning rates is sufficient for achieving good performance when optimizing neural networks. For other types of policy parameterizations however, the full second-order treatment of GASS may be more useful. It is also possible to mix and match which parameters require a Fig. 2: Diagram of each agent's policy. Nearby ally states and sensed enemies, base locations, etc. along with the agent's own state are fed into a neural network which produces a reference target in relative xyz coordinates. The target is fed into the safety logic block which checks for collisions with neighbors or the ground. It produces a reference target which is fed to the PID controller, which in turn provides low-level controls for the agent (thrust, aileron, elevator, rudder). full variance update and which can be updated with a first- order approximate method. We use the rank transformation function for S(·) and keep Nk constant. C. Learning Structured Policies for Multi-Agent Problems Now that we are more confident about the convergence of the ES/GASS method, we show how ES can be used to optimize a complex policy in a large-scale multi-agent envi- ronment. We use the SCRIMMAGE multi-agent simulation environment [16] as it allows us to quickly and in parallel simulate complex multi-agent scenarios. We populate our simulation with 6DoF fixed-wing aircraft and quadcopters with dynamics models having 10 and 12 states, respectively. These dynamcis models allow for full ranges of motion within realistic operating regimes. Stochastic disturbances in the form of wind and control noise are modeled as additive Gaussian noise. Ground and mid-air collisions can occur which result in the aircraft being destroyed. We also incorporate a weapons module which allows for targeting and firing at an enemy within a fixed cone projecting from the aircraft's nose. The probability of a hit depends on the distance to the target and the total area presented by the target to the attacker. This area is based on the wireframe model of the aircraft and its relative pose. For more details, see our code and the SCRIMMAGE simulator documentation. We consider the case where each agent uses its own policy to compute its own controls, but where the parameters of the policies are the same for all agents. This allows each agent to control itself in a decentralized manner, while allowing for beneficial group behaviors to emerge. Furthermore, we assume that friendly agents can communicate to share states with each other (see Figure 2). Because we have a large number of agents (up to 50 per team), to keep communication costs lower we only allow agents to share information locally, i.e. agents close to each other have access to each other's states. In our experiments we allow each agent to sense the states of the closest 5 friendly agents for a total of 5∗10 = 50 incoming state messages. Additionally, each agent is equipped with sensors to detect enemy agents. Full state observability is not available here, instead we assume that sensors are capable of sensing an enemy's relative position and velocity. In our experiments we assumed that each agent is able to sense the nearest 5 enemies for a total of 5 ∗ 7 = 35 dimensions of enemy data (7 states = [relative xyz position, distance, and relative xyz velocities]). The sensors also provide information about home and enemy base relative headings and distances (an additional 8 states). With the addition of the agent's own state (9 states), the policy's observation input (cid:126)o(t) has a dimension of 102. These input states are fed into the agent's policy: a neural network f ((cid:126)o(t);θ ) with 3 fully connected layers with sizes 200, 200, and 50, which outputs 3 numbers representing a desired relative heading [xre f ,yre f ,zre f ]. Each agent's neural network has more than 70,000 parameters. Each agent uses the same neural network parameters as its teammates, but since each agent encounters a different observation at each timestep, the output of each agent's neural network policy will be unique. It may also be possible to learn unique policies for each agent; we leave this for future work. With safety being a large concern in UAV flight, we design the policy to take into account safety and control considerations. The relative heading output from the neural network policy is intended to be used by a PID controller to track the heading. The PID controller provides low- level control commands u(t) to the aircraft (thrust, aileron, elevator, rudder). However, to prevent cases where the neural network policy guides the aircraft into crashing into the ground or allies, etc., we override the neural network heading with an avoidance heading if the aircraft is about to collide with something. This helps to focus the learning process on how to intelligently interact with the environment and allies rather than learning how to avoid obvious mistakes. Furthermore, by designing the policy in a structured and interpretable way, it will be easier to take the learned policy ෍-+PID𝑥𝑟𝑒𝑓𝑦𝑟𝑒𝑓𝑧𝑟𝑒𝑓𝑢(𝑡)𝑓(Ԧ𝑜(𝑡);𝜃)Safety LogicԦ𝑜(𝑡)Ally statesSensingNeural NetworkԦ𝑥(𝑡) directly from simulation into the real world. Since the neural network component of the policy does not produce low-level commands, it is invariant to different low-level controllers, dynamics, PID gains, etc. This aids in learning more transferrable policies for real-world applications. III. EXPERIMENTS We consider two scenarios: a base attack scenario where a team of 50 fixed wing aircraft must attack an enemy base defended by 20 quadcopters, and a team competitive task where two teams concurrently learn to defeat each other. In both tasks we use the following reward function: J = 10× (#kills) + 50× (#collisions with enemy base) − 1e− 5× (distance from enemy base at end of episode) (7) The reward function encourages air-to-air combat, as well as suicide attacks against the enemy base (e.g. a swarm of cheap, disposable drones carrying payloads). The last term encourages the aircraft to move towards the enemy during the initial phases of learning. A. Base Attack Task Fig. 3: Snapshot of base attack task. The goal of the blue fixed wing team (lower left) is to attack the red base (red dot, upper right) while avoiding or attacking red quadcopter guards. In this scenario a team of 50 fixed-wing aircraft must attack an enemy base defended by 20 quadcopters (Figure 3). The quadcopters use a hand-crafted policy where in the absence of an enemy, they spread themselves out evenly to cover the base. In the presence of an enemy they target the closest enemy, match that enemy's altitude, and fire repeatedly. We used Nk = 300,γ = 0.02, a time step of 0.1 seconds, and total episode length of 200 seconds. Initial positions of both teams were randomized in a fixed area at opposide ends of the arena. Training took two days with full parallelization on a machine equipped with a Xeon Phi CPU (244 threads). We found that over the course of training the fixed- wing team learned a policy where they quickly form a V- formation and approach the base. Some aircraft suicide- attack the enemy base while others begin dog-fighting (see (a) Training (b) Testing Fig. 4: Scores per iteration for the base attack task. Top: Scores earned by perturbed policies during training. Scores are on average lower because they result from policies which are parameterized by randomly peturbed values. Bottom: Scores during the course of training earned by the updated policy parameters. Red curve is Evolution Strategies algo- rithm, blue is Cross Entropy Method. Bold line is the median, shaded areas are 25/75 quartile bounds. supplementary video1). We also compared our implementa- tion of the ES method against the well-known cross-entropy method (CEM). CEM performs significantly worse than ES (Figure 4). We hypothesize this is because CEM throws out a significant fraction of sampled parameters and therefore obtains a worse estimate of the gradient of (3). Comparison against other full second-order methods such as CMA-ES or the full second-order GASS algorithm is unrealistic due to the large number of parameters in the neural network and the prohibitive computational difficulties with computing the covariances of those parameters. B. Two Team Competitive Match The second scenario we consider is where two teams each equipped with their own unique policies for their agents learn concurrently to defeat their opponent (Figure 5). At each iteration, Nk = 300 simulations are spawned, each with a different random perturbation, and with each team having a different perturbation. The updates for each policy are calculated based on the scores received from playing the opponent's perturbed policies. The result is that each 1http://https://goo.gl/dWvQi7 05001000150020002500Iteration025050075010001250ScoreESCEM05001000150020002500Iteration025050075010001250ScoreESCEM Fig. 5: Snapshot of two team competitive match. The goal of both teams is to defeat all enemy planes while suffering minimum losses, or to attack the opponent's base. Red lines indicate successful firing hit. team learns to defeat a wide range of opponent behaviors at each iteration. We observed that the behavior of the two teams quickly approached a Nash equilibrium where both sides try to defeat the maximum number of opponent aircraft in order to prevent higher-scoring suicide attacks (see supplementary video). The end result is a stalemate with both teams annihilating each other, ending with tied scores (Figure 6). We hypothesize that more varied behavior could be learned by having each team compete against some past enemy team behaviors or by building a library of policies from which to select from, as frequently discussed by the evolutionary computation community [19]. IV. CONCLUSION We have shown that Evolution Strategies are applicable for learning policies with many thousands of parameters for a wide range of complex tasks in both the competi- tive and cooperative multi-agent setting. By showing the connection between ES and more well-understood model- based stochastic search methods, we are able to gain in- sight into future algorithm design. Future work will include experiments with optimizing mixed parameterizations, e.g. optimizing both neural network weights and PID gains. In this case, the second-order treatment on non-neural network parameters may be more beneficial, since the behavior of the system may be more sensitive to perturbations of non-neural network parameters. Another direction of investigation could be optimizing unique policies for each agent in the team. Yet another direction would be comparing other evolutionary computation strategies for training neural networks, includ- ing methods which use a more diverse population [20], or more genetic algorithm-type heuristics [21]. REFERENCES [1] Y. Li, "Deep Reinforcement Learning: An Overview," ArXiv e-prints, [2] K. Stanley and B. Bryant, "Real-time neuroevolution in the NERO [Online]. Available: video game," IEEE transactions on, 2005. http://ieeexplore.ieee.org/xpls/abs{ }all.jsp?arnumber=1545941 [3] O. J. Coleman, "Evolving Neural Networks for Visual Processing," Jan. 2017. Thesis, 2010. (a) Training (b) Testing Fig. 6: Scores per iteration for the team competition task. Top: Scores earned by each team with policies parameterized by randomly peturbed values during training. Bottom: Scores earned when testing the trained architectures using updated policy parameters. Red and blue curves show scores for team 1 and 2 respectively. [4] T. Salimans, J. Ho, X. Chen, S. Sidor, and I. Sutskever, "Evolution Strategies as a Scalable Alternative to Reinforcement Learning," ArXiv e-prints, Mar. 2017. [5] J. Hu, "Model-based stochastic search methods," in Handbook of Simulation Optimization. Springer, 2015, pp. 319 -- 340. [6] S. Mannor, R. Rubinstein, and Y. Gat, "The cross entropy method for fast policy search," in Machine Learning-International Workshop Then Conference-, vol. 20, no. 2, 2003, Conference Proceedings, p. 512. [7] N. Hansen, "The CMA evolution strategy: A tutorial," CoRR, vol. abs/1604.00772, 2016. [Online]. Available: http://arxiv.org/abs/1604. 00772 [8] E. Zhou and J. Hu, "Gradient-based adaptive stochastic search for non- differentiable optimization," IEEE Transactions on Automatic Control, vol. 59, no. 7, pp. 1818 -- 1832, 2014. [9] L. Panait and S. Luke, "Cooperative multi-agent learning: The the art," Autonomous Agents and Multi-Agent Systems, [Online]. Available: http: state of vol. 11, no. 3, pp. 387 -- 434, 2005. //link.springer.com/10.1007/s10458-005-2631-2 [10] J. B. Rawlings and B. T. Stewart, "Coordinating multiple optimization- based controllers: New opportunities and challenges," Journal of Process Control, vol. 18, no. 9, pp. 839 -- 845, 2008. [11] W. Al-Gherwi, H. Budman, and A. Elkamel, "Robust distributed model predictive control: A review and recent developments," The Canadian Journal of Chemical Engineering, vol. 89, no. 5, pp. 1176 -- 1190, 2011. [Online]. Available: http://doi.wiley.com/10.1002/cjce.20555 [12] G. B. Lamont, J. N. Slear, and K. Melendez, "UAV swarm mission planning and routing using multi-objective evolutionary algorithms," in IEEE Symposium Computational Intelligence in Multicriteria Decision Making, no. Mcdm, 2007, Conference Proceedings, pp. 10 -- 20. [13] A. R. Yu, B. B. Thompson, and R. J. Marks, "Competitive evolution of tactical multiswarm dynamics," IEEE Transactions on Systems, Man, 0100200300400500600700Iteration0100200300400500ScoreTeam 1Team 20100200300400500600700Iteration0100200300400500ScoreTeam 1Team 2 and Cybernetics Part A:Systems and Humans, vol. 43, no. 3, pp. 563 -- 569, 2013. [14] D. D. Fan, E. Theodorou, and J. Reeder, "Evolving cost functions for model predictive control of multi-agent uav combat swarms," in Proceedings of the Genetic and Evolutionary Computation Conference Companion, ser. GECCO '17. New York, NY, USA: ACM, 2017, pp. 55 -- 56. [Online]. Available: http://doi.acm.org/10.1145/3067695. 3076019 [15] U. Gaerther, "UAV swarm tactics: an agent-based simulation [Online]. Available: https: and Markov process analysis," 2015. //calhoun.nps.edu/handle/10945/34665 [16] K. J. DeMarco. (2018) SCRIMMAGE multi-agent robotics simulator. [Online]. Available: http://www.scrimmagesim.org/ [17] D. Wierstra, T. Schaul, T. Glasmachers, Y. Sun, J. Peters, and J. Schmidhuber, "Natural evolution strategies." Journal of Machine Learning Research, vol. 15, no. 1, pp. 949 -- 980, 2014. [18] D. P. Kingma and J. Ba, "Adam: A method for stochastic optimiza- tion," arXiv preprint arXiv:1412.6980, 2014. [19] K. O. Stanley and R. Miikkulainen, "Competitive coevolution through evolutionary complexification," Journal of Artificial Intelligence Re- search, vol. 21, pp. 63 -- 100, 2004. [20] E. Conti, V. Madhavan, F. Petroski Such, J. Lehman, K. O. Stanley, and J. Clune, "Improving Exploration in Evolution Strategies for Deep Reinforcement Learning via a Population of Novelty-Seeking Agents," ArXiv e-prints, Dec. 2017. [21] F. Petroski Such, V. Madhavan, E. Conti, J. Lehman, K. O. Stanley, and J. Clune, "Deep Neuroevolution: Genetic Algorithms Are a Competi- tive Alternative for Training Deep Neural Networks for Reinforcement Learning," ArXiv e-prints, Dec. 2017.
cs/0607133
1
0607
2006-07-27T17:55:16
Self-Replication and Self-Assembly for Manufacturing
[ "cs.MA", "cs.CE" ]
It has been argued that a central objective of nanotechnology is to make products inexpensively, and that self-replication is an effective approach to very low-cost manufacturing. The research presented here is intended to be a step towards this vision. We describe a computational simulation of nanoscale machines floating in a virtual liquid. The machines can bond together to form strands (chains) that self-replicate and self-assemble into user-specified meshes. There are four types of machines and the sequence of machine types in a strand determines the shape of the mesh they will build. A strand may be in an unfolded state, in which the bonds are straight, or in a folded state, in which the bond angles depend on the types of machines. By choosing the sequence of machine types in a strand, the user can specify a variety of polygonal shapes. A simulation typically begins with an initial unfolded seed strand in a soup of unbonded machines. The seed strand replicates by bonding with free machines in the soup. The child strands fold into the encoded polygonal shape, and then the polygons drift together and bond to form a mesh. We demonstrate that a variety of polygonal meshes can be manufactured in the simulation, by simply changing the sequence of machine types in the seed.
cs.MA
cs
Self-Replication and Self-Assembly for Manufacturing Robert Ewaschuk* and Peter D. Turney† (corresponding author) Submitted to: Artificial Life; Category: Article; Date: April 26, 2005 Abstract It has been argued that a central objective of nanotechnology is to make products inexpensively, and that self-replication is an effective approach to very low-cost manufacturing. The research presented here is intended to be a step towards this vision. We describe a computational simulation of nanoscale machines floating in a virtual liquid. The machines can bond together to form strands (chains) that self-replicate and self-assemble into user-specified meshes. There are four types of machines and the sequence of machine types in a strand determines the shape of the mesh they will build. A strand may be in an unfolded state, in which the bonds are straight, or in a folded state, in which the bond angles depend on the types of machines. By choosing the sequence of machine types in a strand, the user can specify a variety of polygonal shapes. A simulation typically begins with an initial unfolded seed strand in a soup of unbonded machines. The seed strand replicates by bonding with free machines in the soup. The child strands fold into the encoded polygonal shape, and then the polygons drift together and bond to form a mesh. We demonstrate that a variety of polygonal meshes can be manufactured in the simulation, by simply changing the sequence of machine types in the seed. Keywords: self-replication, self-assembly, nanotechnology, virtual physics, continuous space automata, manufacturing, polygonal meshes. * Institute for Information Technology, National Research Council of Canada, Ottawa, Ontario, Canada, K1A 0R6, [email protected] † Institute for Information Technology, National Research Council of Canada, Ottawa, Ontario, Canada, K1A 0R6, [email protected], (613) 993-8564 (corresponding author) Self-Replication and Self-Assembly for Manufacturing 1 Introduction Researchers have argued that one of the main objectives of nanotechnology is to manufacture products inexpensively, and that this goal can be effectively achieved by self-replication [2], [8], [9]. We believe that it is useful to develop computational simulations of self-replicating nanotechnology, as engineering tools to assist in the design of actual self-replicating machines. In our earlier work with JohnnyVon 1.0, we developed a computational simulation of machines that join to form self-replicating strands (chains of machines linked by flexible bonds) [17]. These machines drifted about in a virtual liquid, simulated as a two- dimensional continuous space with Brownian motion and viscosity. There were two types of machines, which enabled a strand to encode an arbitrary bit string, by designating one type of machine as representing 0 and the other as 1. Although strand replication faithfully preserved the encoded bit strings, the information in the strings played no functional role in JohnnyVon 1.0. In effect, the simulation had genotypes (genetic code) without phenotypes (bodies). From the perspective of potential applications in manufacturing, the absence of phenotypes was a major limitation of JohnnyVon 1.0. This paper introduces JohnnyVon 2.0, which builds on its predecessor by adding phenotypes to the simulation. The design of JohnnyVon 2.0 was partly inspired by the work of Seeman on building nanometer-scale structures with DNA [14], [15]. In living organisms, replication is based on DNA (the genotype) and the information encoded in DNA is used to build proteins (the major structural material of the phenotype). Seeman has shown that DNA can serve both as a device for self-replication (genotype) and (surprisingly) as a building material for nanoscopic structures and tools (phenotype). By choosing the appropriate sequence of codons, DNA can be programmed to self- assemble into a wide variety of structures, such as cubes, octahedra, one-dimensional strands, two-dimensional meshes, and three-dimensional arrays. Seeman discusses a variety of potential nanotechnological applications for these structures. For example, a three-dimensional DNA array could facilitate x-ray crystallography, by serving as a scaffolding for holding molecular samples in a regular lattice [15]. In JohnnyVon 2.0, there are four types of machines, drifting in a two-dimensional continuous space with Brownian motion and viscosity (i.e., a simulated liquid). The 2 Self-Replication and Self-Assembly for Manufacturing machines exert spring-like attractive and repulsive forces on each other, but internally they are finite state machines. The input to each state machine is based on the presence or absence of bonds with neighbouring machines and on the internal states of bonded neighbours. The internal states govern when bonds are formed or broken and the angles at which bonded machines are joined, and thus determine whether a strand will form a straight line or fold into a specific polygonal shape. Following the hint of Seeman’s work, a strand in John nyVon 2.0 serves as both a genotype and a phenotype, at different stages in its career [14], [15]. Like living organisms (but unlike von Neumann’s strategy [21]), John nyVon 2.0 takes a template- based approach to self-replication. A strand begins its career as a genotype. While acting as a genotype, the strand is approximately straight, so that it can provide a good template for replication. Brownian motion and interactions with other machines will cause the strand to bend slightly, because the bonds between the machines are flexible, but the system is designed so that forces will tend to straighten the strand. Later in its career, the strand may become a phenotype. When this happens, the bonding forces change, causing the bonding angles to alter, and the strand folds. This folding is (approximately) analogous to the way that proteins fold. A folded strand acts as a structural element and is no longer capable of replication. A typical run of a JohnnyVon 2.0 simulation begins with a soup of unbonded machines and an initial unfolded seed strand of bonded machines. Free (unbonded) machines connect to the seed strand, eventually forming a double strand (two parallel strands). When the new strand is complete, the two strands break apart, and thus we have self- replication. A strand will continue to self-replicate until unbonded machines become scarce. When a strand has not encountered an unbonded machine for a relatively long period of time, the strand stops replicating and folds. The shape that it folds into depends on the types of machines in the strand and their sequential ordering. Folded strands drift in the virtual liquid and bond with each other, forming a mesh. The user can specify the shape of the holes in the final mesh by selecting the sequence of machine types that compose the initial seed strand. In Section 2, we discuss related work with von Neumann’ s universal constructor, self- replicating loops, and artificial chemistry. The details of JohnnyVon 2.0’s design are explained in Section 3, including the changes that have been made from JohnnyVon 1.0 [17]. We present our experiments in Section 4. Each experiment is a run of the 3 Self-Replication and Self-Assembly for Manufacturing simulation with an initial seed strand. We demonstrate that a variety of polygonal meshes can be manufactured by varying the initial seed. Section 5 examines limitations of JohnnyVon 2.0 and discusses problems and projects for future work. Potential applications are suggested in Section 6 and we conclude in Section 7. 2 Related Work Sipper provides a good survey of research on self-replication [16]. Some of the research involves actual mechanical devices and some is based on organic chemistry, but we restrict our discussion here to computer simulations of self-replication. We briefly review von Neumann’s universal constructor [21], self-replicatin g loops [6], [10], [11], [12], [13], [18], [19], and artificial chemistry [4], [5]. 2.1 Universal Constructor Von Neumann’s approach to self-replication was to design a universal constructor, which could build anything, and therefore could build itself as a special case [21]. He described five different models (i.e., five different kinds of simulations), with varying levels of realism and concreteness. The design of the universal constructor was only worked out in detail for the cellular automata model, which was the most abstract of the five models. In von Neumann’s cellular automata model, the universa l constructor was composed of a group of several thousand cells that begin in a specific configuration of initial states. Another line of cells acts as a kind of tape, which is read by the universal constructor. For any given finite configuration of cell states, there is a tape that can cause the universal constructor to build the given configuration. As a special case, there is a tape that can cause the universal constructor to build a copy of itself, thereby self-replicating. 2.2 Self-Replicating Loops Langton demonstrated self-replication in a cellular automata model that was much simpler than von Neumann’s model [6]. He achieved this simplification by designing a constructor that could construct only itself, instead of trying to make a universal constructor. His cellular automata model had eight states instead of twenty-nine and his constructor was composed of a group of about a hundred cells in a specific initial configuration, instead of a group of several thousand cells. 4 Self-Replication and Self-Assembly for Manufacturing In Langton’s model, the cells of the constructor are arra nged in a loop. The states of the cells in the loop go through a cycle, periodically creating a copy of the original loop. Starting from the initial loop, increasing numbers of copies spread across the grid. The idea of self-replicating loops in cellular automata models has since been developed further by many researchers [11], [12], [13], [19]. Self-replicating loops have exhibited many interesting behaviours, including evolution [11], [13] and self-repair [19]. Tempesti has described a self-replicating cellular automata model that can perform computations and build structures [18]. Morita and Imai have shown how a self-replicating cellular automata model can encode a variety of shapes of loops, beyond the usual square loops [10]. 2.3 Artificial Chemistry Hutton introduced self-replication in an artificial chemistry simulation, using a template- based approach [4]. A chain of molecules forms a template against which other molecules bond, similar in concept to JohnnyVon 1.0 [17]. A run of the simulation begins with a seed chain in a soup of free molecules. By a series of chemical reactions, a parallel chain of molecules forms next to the seed chain. When the parallel chain is complete, it separates from the seed chain and the process repeats. Hutton’s first approach was a cellular automata model [ 4], but the discrete space constrained the mobility of the simulated molecules, hence Hutton’s second approach used a continuous space [5], like JohnnyVon 1.0 [17]. In Hutton’s second model, molecules move in a continuous two-dimensional space, following linear trajectories until an obstacle (e.g., the container wall or another molecule) is encountered (i.e., the motion is a billiard ball model). When molecules make contact with each other, they undergo a chemical reaction that bonds them together, according to the rules of the artificial chemistry. In Hutton’s first model [4], the molecules only replica te, but in his second model [5], they also build a circular barrier, suggestive of a cell wall. Each time a chain replicates, the new chain builds a wall around itself. The basic objects in Hutton’s system ( “molecules”) are simpl er than the basic objects in JohnnyVon ( “machines”), which makes Hutton’s system more com putationally efficient. However, JohnnyVon has a richer virtual physics, including Brownian motion, attractive and repulsive fields, momentum, and viscosity. Hutton’s m olecules are points, with no 5 Self-Replication and Self-Assembly for Manufacturing directional orientation, whereas JohnnyVon ’s machines are shapes with angular orientation, which can rotate, experience twisting forces, and have angular momentum. The richer virtual physics in JohnnyVon may be useful for simulations of manufacturing. 3 JohnnyVon 2.0 We first give an overview of JohnnyVon 2.0 and then describe the system in detail. We encourage the reader to begin by viewing Figure 5 in Section 4.1. This figure should make it easier to understand the following discussion. 3.1 Overview The basic objects in the JohnnyVon simulation are called machines. There are four types of machines, numbered 1 through 4. All four types are shaped like a plus sign ‘+ ’ and appear visually identical in the simulation (see Figure 5). Each machine has five arms, but two of the arms overlap, so the figures seem to show four arms. In the figures, the arms are represented by black lines. The machines are mobile and can rotate at any angle, but it is convenient to describe them when they are rotated into a standard reference position, which we call the canonical position. In the canonical position, the shortest arm points down, the two longest arms point right and left, and the medium-length arm points up. Another short arm points up in canonical position, but it is hidden by the medium-length arm that points up. (The three machines labeled B, D, and F in Figure 1 are in canonical position. The fourth machine is upside-down.) The two longest arms, pointing left and right when the machine is in canonical position, are called the left and right arms. When machines bond to form a strand, adjacent machines in the strand are bonded to each other at the tips of their left and right arms. The up arm is the longer of the two arms that point up when the machine is in canonical position. When a strand replicates by forming a mirror strand, the machines in the mirror strand are bonded to their neighbours in the original strand at the tips of their up arms. Also, when the strands fold into polygons and join to form a mesh, the polygons bond to each other at the tips of their up arms. The shorter of the two arms that point up, when the machine is in canonical position, is the repellor arm. This arm overlaps the up arm in the figures, so it is not visible. When a strand has completely replicated, repulsive fields are briefly activated at the tips of the 6 Self-Replication and Self-Assembly for Manufacturing repellor arms. This splits the original strand from the mirror strand and pushes the two strands apart. The short arm that points down in canonical position is the overlap detector arm. This arm is used to detect when two folded strands (e.g., polygons) overlap in a mesh. Machines move about in a two-dimensional continuous space, bounded by a grey box. The centers of the machines are confined to the interior of the grey box. This space is called the container. A virtual liquid fills the container. The trajectory of a machine is determined by Brownian motion (random drift due to the liquid) and by interaction with other machines and the walls of the container. The liquid has a viscosity that dampens the momentum of the machines. When there are machines suspended in the liquid, we call it a soup. The arms of the machines have attractive or repulsive fields. The range of a field is bounded by a circle. In addition to attracting or repelling, a field can also exert a bending force, which twists the machines to form a particular angle. A field’s interaction (attract, repel, twist, or ignore) with another field is determined by many factors, including the type and state of each machine. The fields behave somewhat like springs. The center of every field is always at the tip (the outer end) of an arm. The point at which the five arms meet is called the middle of the machine. This is not the machine’s geometrical center, but it is treated as the ce nter of mass in the simulation. For example, a rotational force will cause a machine to rotate about its middle. Although the space is two-dimensional, machines can slide over one another, as if they were floating in a thin film of liquid. Machines interact with each other through their fields, rather than by direct contact. They do not experience direct collisions, but their fields can collide. Machines can bond together when the field of one machine intersects the field of another. Not all fields can bond. This is described in detail later. The machine that is bonded to the up (left, right) arm of a given machine is called the up (left, right) neighbour. A chain of machines joined by left arm to right arm bonds forms a strand. During replication, the bond angles are such that the replicating strand tends to be straight. Brownian motion and other forces perturb the strand, so it cannot be perfectly straight, but twisting forces in the bonding fields tend to straighten the strand, so it is 7 Self-Replication and Self-Assembly for Manufacturing rarely far from being straight. We call these approximately straight strands unfolded strands or genes (a strand in its genotype state). Under specific circumstances (described in Section 3.4.1), each bond in a strand will change its angle, causing the strand to fold. Such strands are called folded strands or phenes (a strand in its phenotype state). A phene will fold to form a closed loop. A group of phenes can bond together, forming a mesh. A machine with no bonds is called a free machine. A typical simulation begins with a soup of free machines and a single seed gene. The seed gene is an unfolded strand that initiates the process of self-replication. The first child of the seed gene forms the seed phene, which acts as a starting point for the growth of the mesh. This ensures that one seed phene will yield only one mesh. A left-neighbour-to-right-neighbour bond is a sideways bond. Machines in a strand (both phenes and genes) are joined by sideways bonds. An up-neighbour-to-up-neighbour bond is an up bond. Phenes in a mesh are joined by up bonds. During replication, a parent gene is joined to its partially constructed child gene by up bonds. The JohnnyVon simulation proceeds in a sequence of discrete time steps. The initial configuration is called step 0 or time 0. The state of a machine is the combination of internal information (counters, bonds, and other state variables) and external relationships (position, rotation, and velocity) that determines the behaviour of a machine. A counter is a special piece of information stored in each machine that normally increments during each time step. Each machine has several counters. States are described in more detail in Section 3.3. Each bond has a desired angle (which changes when a strand folds). The two machines that participate in each bond have a tolerance for the difference between the current angle and the desired angle. Forces can push bonds out of tolerance. Bonds that are consistently out of tolerance can break. One of our main design objectives was to make JohnnyVon 2.0 programmable by the user, by specifying the initial configuration of the simulation, without making any changes to the rules of the virtual physics or the behaviours of the machines. By selecting the types of machines in the seed gene and specifying their sequential order, the user can program JohnnyVon to make a variety of polygonal meshes. In a manufacturing application, we envision the user selecting the desired machines from four bins, joining 8 Self-Replication and Self-Assembly for Manufacturing them together to make a seed gene, and then dropping the seed into a vat of free machines. The user would be able to manufacture a variety of products without making any modifications to the individual machines. W ith only one type of machine, the user would be able to program the simulation only by specifying the length of the seed gene. W ith two types of machines (as in JohnnyVon 1.0 [17]), programs can use more efficient binary coding. In principle, two types of machines would be sufficient for programming mesh construction, but we found that four types provide a good balance of simplicity and programmability. Four types are enough to encode a variety of shapes (see Table 6 in Section 3.4.2 and the experiments in Section 4), yet four types are not so many that the system is unwieldy. The four types of machines are somewhat analogous to the four amino acids in DNA (adenine, thymine, guanine, and cytosine), which encode programs for building proteins. 3.2 Basic Modifications This subsection describes the core changes in the simulation that were made from JohnnyVon 1.0 to JohnnyVon 2.0. (Sections 3.3 and 3.4 discuss new features, as opposed to modified features.) 3.2.1 Variable Field Sizes Bonds between machines are formed by spring-like attractive fields. Part of the mechanism that was in place to support mutation in JohnnyVon 1.0 was a variable field size. In certain circumstances, the field would be small, permitting rare accidental bonds, while other times it would be large, to strengthen intentional bonds. The accidental bonds were a cause of mutation (replication errors), whereas the intentional bonds were part of faithful replication. In JohnnyVon 2.0, field sizes do not change. Fields attract, repel, or ignore other fields, but they have a constant circle of influence. In situations where the original version has small fields, the new version has inactive fields. This modification substantially reduces the likelihood of mutations.1 1 Mutations are desirable when modeling biological life, but may be undesirable when modeling manufacturing processes. 9 Self-Replication and Self-Assembly for Manufacturing 3.2.2 Physical Constants The physical constants for viscosity, Brownian motion, and motion dampening were changed to suit the new requirements. The values of these constants were experimentally tuned to achieve our design objectives while maximizing the speed (computation efficiency) of the simulation. 3.2.3 Arms and the Machine In JohnnyVon 1.0, each machine was shaped like a capital letter ‘T ’. Each machine had four arms, but two of the arms overlapped (along the vertical bar of the T), so the figures in the paper seem to show three arms [17]. Each arm had an attractive or repulsive field with a circular shape, centered on the tips of the arms. The fields were colour coded, and we named the arms according to the colours of their associated fields. In JohnnyVon 2.0, each machine is shaped like a plus sign ‘+ ’ (see Figure 5 in Section 4.1). Each machine now has five arms, but two of the arms overlap, so the figures seem to show four arms. It is no longer convenient to refer to the arms by the colours of their fields. We now refer to the arms by their relative positions (up, left, right), when the machine is rotated into a canonical position. The lengths of the arms have been modified to facilitate building meshes. 3.3 Machine States The state of a machine is represented by a vector. The vector elements that represent internal aspects of the machine are all discrete. The vector elements that represent external relationships between machines are mostly continuous. The discrete, internal elements are governed by state transition rules that are applied in discrete timesteps. The continuous, external elements are governed by the laws of the virtual physics. The physical laws are inherently continuous, but they are necessarily approximated discretely in any computational simulation. Internal state information includes various flags, counters, and state variables, as summarized in Table 1. External state information includes spatial location and orientation, angular velocity, linear velocity, the presence or absence of bonds with other machines, and bonding angles, as given in Table 2. Some derived variables are shown in Table 3. The derived variables are calculated from state variables. Insert Table 1 here. 10 Self-Replication and Self-Assembly for Manufacturing Insert Table 2 here. Insert Table 3 here. Machines that are directly bonded together can sense each other ’s states. This is analogous to cells in cellular automata, which can sense the states of their immediate neighbours in the grid. The state transition rules and the virtual physics are local, in the sense that there is no global control structure. No machine can directly sense the state of another machine unless they are directly connected, although state information can be passed neighbour-to-neighbour along a strand. No machine can directly exert a force on another machine unless the circular boundaries of their fields overlap, although forces can be passed neighbour-to-neighbour along a strand. Most of the state transition rules and physical laws in JohnnyVon 2.0 are carried over from JohnnyVon 1.0 without change. The details of JohnnyVon 1.0 are fully described elsewhere [17]. The changes we made in JohnnyVon 2.0 were outlined above, in Section 3.2. 3.4 New Rules The following subsections describe the rules that are new in JohnnyVon 2.0. 3.4.1 Folding The leftmost machine in an unfolded strand determines when the strand will fold. A machine knows it is leftmost when it has a right-neighbour but no left-neighbour. As part of its internal state, each machine maintains a fold-counter. After a strand has replicated and split, the fold-counter in each machine in the newly formed strand starts counting. When a machine gains an up-neighbour, it triggers a reset-counter signal. This signal is passed to the left-neighbour, down the strand, until it reaches the leftmost machine. When the leftmost machine receives the signal, it resets its fold-counter to 0. This is illustrated in Figure 1. In this way, as long as a replicating strand continues to receive new up-neighbours, it will not fold up. If the strand successfully replicates, the leftmost fold-counter in each of the two strands (the child strand and the parent strand) is set to 0. 11 Self-Replication and Self-Assembly for Manufacturing Insert Figure 1 here. Once the fold-counter in the leftmost machine hits a fixed upper limit, that machine triggers a fold-now signal. This signal is passed down the strand, setting the folded flag as it goes. This causes the strand to fold up according to the types of each of the two machines involved in a sideways bond. When a strand folds, there are typically some up-neighbours attached to the folding strand, as the folding strand has usually partially replicated itself. Machines with an up- neighbour, but having a false (0) replicated flag, monitor their up-neighbour ’s folded flag. If this flag becomes true (1), then such a machine will set its own shatter flag to true, and thus release all its bonds. (Shattering is described in detail in 3.4.7.) Machines with the seed-gene flag set to 1 never fold, thus the initial seed strand is always available, to continue replicating as soon as there is a supply of free machines of the right types. This is a safeguard against situations in which a temporary scarcity of free machines persists for longer than the fixed upper limit on fold-counter. 3.4.2 Angles and Bonds In contrast to JohnnyVon 1.0, we now have four types of machines instead of two types, and the type of a machine affects its behaviour in both genes and phenes. In genes, the types govern bonding during replication, where the rule is simply, “Likes attract, others are ignored. ” More formally, the bonding rule for u p bonds in genes is given in Table 4. Insert Table 4 here. This rule implies that each replicated strand is a mirror of its parent, rather than an exact copy. For example, a strand of types 1-2-3, reading left to right, in canonical position, will replicate as 3-2-1. The phenes that we demonstrate here (in Section 4) have this simple symmetry (i.e., the strands and their mirror images both fold into the same polygonal shapes), so this is not a problem. The rules for up bonds in genes are different from the rules for up bonds in phenes. In phenes, only certain combinations of types will bond on their respective up arms, as given in Table 5. 12 Self-Replication and Self-Assembly for Manufacturing Insert Table 5 here. Any type of machine can form a sideways bond with any other type, in both genes and phenes, but a left arm must bond with a right arm (i.e., no left-left nor right-right bonding is allowed). In phenes, the types on each side of a sideways bond govern the angle the bond will take when the strands have folded, as specified in Table 6. This means that the types involved in each bond control the shape that the folded strand will take. Insert Table 6 here. Table 6 shows the sideways bond angle formed by each pair of machine types, when a strand is in its phenotype state; that is, when folded is set to 1 (true). When a strand is in its genotype state (folded is 0 for all machines in the strand), the sideways bond angles are all 0° (straight). Up bond angles are always 0° ( ignoring random perturbations, from Brownian motion, for example). The blank cells in Table 6 represent combinations of types for which we have not yet found a use. From Table 5, it can be seen that a type-3 machine cannot form an up bond with another type-3 machine when they are in phenes. Therefore we could control the shape of a 3-3-…-3 phene by specifying any desired value for the angle of 3-3 bonds in Table 6, but the resulting phenes would not be able to form a mesh. Similarly, we could control the shape of a 3-4-3-4-…-3-4 phene by giving a ny desired value for the angles of 3-4 and 4-3 bonds in Table 6, but the resulting phenes can form up bonds in multiple ways (3-4, 4-3, and 4-4; see Table 5). Thus we have limited control over the shape of the mesh that the phenes will form. In Table 6, it can be seen that all sideways bonds involving type-1 machines are straight. This allows us to expand the size of a phene, without changing its shape, by inserting a sequence of type-1 machines along each edge (see Figure 2). However, it does not allow polygons with exactly two machines on each side, since expansion requires at least one type-1 machine inserted between two other machines. Insert Figure 2 here. 13 Self-Replication and Self-Assembly for Manufacturing Given the angles that are available to us in Table 6, some polygons (e.g., octagons and squares) require two types of machines, while others (e.g., triangles and hexagons) involve only one type. We chose to restrict the JohnnyVon 2.0 to four types of machines, in order to demonstrate that a small number of components can be combined to build a variety of structures (like Lego blocks). The angles that we chose make it easy to build triangular meshes. It may seem inconvenient to require two types of machines to build octagonal meshes, but in fact, having two types of machines is helpful with octagons. An octagonal mesh has both octagonal holes and square holes (see Image 4 in Figure 6 in Section 4.2). W ith two types of machines, we can prevent octagonal phenes from filling in the square holes in the mesh. A single type of machine would be sufficient to create squares, but using two types permits rectangles that will mesh correctly. W ith two types of machines, the long and short sides of the rectangle can be distinguished by type, so that two sides will bond together only if they have the same machine type, and thus the same length (see Figure 3). Insert Figure 3 here. Though they could use two types, hexagons will form a mesh faster with only one type. Furthermore, in order to get the desired behaviour with four machine types, exactly one of the squares or hexagons had to use only one machine type, and the other had to use two. While it would be possible to have an irregular hexagon, this seems much less natural than a rectangle.2 Table 5 shows how machine types control phene bonding in meshes. The bonding rules in Table 5 were designed so that octagonal meshes will form correctly. They prevent octagonal phenes from filling square holes in the mesh. Additional rules were created to support expansion of the size of a phene, without changing its shape, by inserting a sequence of type-1 machines along each edge. These rules are based on the derived variable bend-location. In a phene, a given machine can have either a straight (type 1) or bending (types 2, 3 or 4) machine bonded to its left or right arm. By looking at its neighbours, it can determine where it is in the context of the 2 In a regular polygon, all sides have the same length. Rectangles are irregular. 14 Self-Replication and Self-Assembly for Manufacturing phene, and hence it can calculate the value of bend-location. Certain values of bend- location can override the rules in Table 5 and disallow a bond that would otherwise be permitted. Table 7 explains the meaning of the different values of bend-location. Table 8 shows how bend-location affects bonding. Insert Table 7 here. Insert Table 8 here. When the up field of a machine in one phene overlaps with the up field of a machine in another phene, the rules in both Table 5 and Table 8 must be satisfied before the up fields can bond. If there are no type 1 machines in the phene (i.e., all sideways bonds are bent; the shape is not expanded), then bend-location must have the value 3 for all machines, and thus (by Table 8) up bonds depend only on the machine types (Table 5). In Table 7, we are assuming that the phene forms a closed loop. The error correction system will destroy open loops (Section 3.4.4). When a machine has no left or right neighbour (because it is at the end of an open strand), we treat the missing neighbour as if it were a bending type. 3.4.3 Overlap Detection Because of flexibility in the mesh, and in individual phenes, two phenes can sometimes join a mesh in such a way that their desired positions overlap. This can be most easily seen by imagining a mesh of hexagons that is complete except for a single gap. Suppose that two hexagons jostle (by Brownian motion) into the gap, with slightly different alignments. At roughly the same time, one forms a bond with the phene above the gap, and one with the phene below the gap. As they straighten towards their ideal position (due to twisting forces on their up bonds), each phene may pick up new bonds around the edge of the former gap (see Figure 4). Insert Figure 4 here. If ignored, this problem spreads, since there are now unbonded up arms on each of the two overlapping hexagons, which permit new hexagons to join the mesh, overlapping 15 Self-Replication and Self-Assembly for Manufacturing those around the former gap, and each of these hexagons in turn can bring in more overlapping hexagons. To address this problem, an arm was added to the machines (new since JohnnyVon 1.0), called the overlap detector arm. In a folded strand, it points towards the center, and will only bond with other overlap detector arms. Both machines must be oriented in the same direction (up to a fixed degree of tolerance), and both machines must have their in-mesh flag set to true. When an overlap detector bond is formed between two machines (necessarily in two different phenes), one machine (chosen arbitrarily) sets its unfold signal to true. This signal propagates to its left and right neighbours, setting folded to false as it goes. It also breaks the overlap bond that triggered it. The resulting unfolded strand behaves exactly like a newly replicated strand. It tries to replicate until fold-counter exceeds its limit, and then it folds up again. In summary, when two phenes compete for the same gap in a mesh, one of them is forced to become a gene. Converting one of the phenes to a gene, instead of leaving it as a detached phene, allows time for it to drift away from the problematic area, or for the remaining phene to fill up the open bonds in the mesh. 3.4.4 Stress Detection Another type of error can occur in a mesh, again due to the flexibility of the mesh. In this case, we can imagine five triangles bonding to form a pie shape, missing only one more triangle to form a hexagon. However, instead of a new triangle coming in to fill the gap, the two triangles on either side of the gap jostle together, forming a stressed pentagon rather than a hexagon. This pentagonal mesh may be part of a larger mesh, and thus some of the stress may be distributed through the larger mesh. This problem can be partially addressed by increasing the strength of some of the fields and decreasing the tolerance of some of the bonding angles, but it becomes increasingly hard to prevent as the mesh grows. To detect this kind of problem, each machine maintains a stress-counter, which increments each time interval when the machine is not in-tolerance, and is reset whenever the machine is in-tolerance. This counter can be used to detect cases in which the mesh is stressed because phenes have bonded incorrectly. When the counter exceeds a fixed maximum, it causes the stressed phene to unfold, by setting its unfold 16 Self-Replication and Self-Assembly for Manufacturing signal to true. The signal propagates to left and right neighbours, setting folded to false and dropping up bonds as it spreads through the neighbours. The in-tolerance variable is purely local. Its state depends only on the relation between a machine and its immediate neighbours. Likewise, the unfold variable is purely local, but the information that it conveys can spread through each machine in a phene. When one machine’s unfold variable becomes true, its immediate neighbours sense this, and then set their unfold variables to true. 3.4.5 Seeding the Mesh In the initial seed gene, seed-gene is set to true, but it will be set to false for all of the child genes. If a machine has a true seed-gene, it will never trigger the fold-now signal. Since the initial seed gene will never fold, there will always be a strand that can continue replicating whenever free machines become available.3 The first child of the seed gene, and only the first child of the seed gene, becomes the seed phene. When the seed-phene flag is set to true in a strand, it does not mean that the given strand is the seed phene; it means that the next child of the given strand will become the seed phene. In the initial seed gene, seed-phene is set to true. When the seed gene first replicates, its child examines its parent ’s seed-phene flag and observes that it is set to true. The child then sets it in-mesh flag and its folded flag to true and it immediately folds to become the seed phene. The parent (the initial seed gene) then sets its seed-phene flag to false, so that its future children cannot become seed phenes. (When we say that a strand sets a flag to a value, it is a shorthand way of saying that every machine in the strand sets the flag to the value. Strands do not have flags of their own, other than the flags of their component machines.) Every other gene, created after the first child, will begin its career with its in-mesh flag set to false. If two phenes meet with their in-mesh flags set to false, they cannot bond 3 When the seed gene replicates, all of the information that it encodes, by the sequential order of the machine types in the strand, is also replicated. However, the child strand will have its seed- gene flags set to false, so it m ight be argued that the seed gene has not fully self-replicated, in a very strict sense. The purpose of the seed-gene flag is merely to ensure that replication will continue after a hiatus in the supply of free machines. This is not essential to the simulation. We could remove this flag without causing any major problems. Therefore full self-replication, in a very strict sense, is readily attainable, if desired, by a m inor modification to JohnnyVon. 17 Self-Replication and Self-Assembly for Manufacturing together. A phene can only bond to another phene if the other phene has its in-mesh flag set to true. When a machine (in a phene) with a false in-mesh flag meets a machine (in a second phene) with a true in-mesh flag, they bond (assuming they meet all the conditions in Section 3.4.2), and a signal propagates through the first phene, setting all of the in-mesh flags to true (but the signal only propagates from one machine to its sideways neighbour when their bond is in-tolerance; see Section 3.4.4). This ensures that the mesh can only grow from the seed phene. 3.4.6 Tolerances Each machine will only form up bonds if all existing bond angles are within a certain tolerance. That is, if a machine’s sideways bonds are at angles significantly different from the desired angles (i.e., the angles given by the rules in Section 3.4.2), then no up bonds will form during the current timestep. This prevents unintended up bonds during vulnerable times, such as during splitting or folding. 3.4.7 Shattering There are a number of ways that a gene or phene can break. For example, during splitting, the phase of self-replication when two genes are pushed apart by their repellor arms, if one of them hits the wall of the container at an angle, it puts significant strain on the whole strand. As another example, an error in a mesh can eventually lead to enough strain to pull a phene apart (see Section 3.4.4). If a machine loses a bond unexpectedly (which is any time other than when splitting or unfolding), or if it notices that its neighbour has folded, then the shatter flag is set to true. When a machine observes that its neighbour ’s shatter flag is true, the machine may respond by setting its own shatter flag to true. We say that the first machine is the source of a shatter signal that was received by the second machine. The shatter signal always propagates through sideways bonds, setting the shatter flag to true in left-neighbours and right-neighbours. The shatter signal may also propagate to an up-neighbour, but only if the source machine has replicated but not folded. If the neighbouring machine has replicated, something went wrong with the split (two replicated machines should not be bonded before they’re both fol ded); on the other hand, if the neighbour ’s replicated flag is false, then it may be part of an incomplete copy, and thus should be abandoned. 18 Self-Replication and Self-Assembly for Manufacturing When a machine’s shatter flag is true, it drops all of its bonds (the discrete timesteps ensure that the state is propagated, even if the bonds are broken during that time step, since machines consult their neighbours’ states as they were at the beginning of the step). When the bonds have been dropped, it then sets folded, seed-gene, and replicated flags to false and becomes a free machine. The shatter mechanism is not a subtle way to handle errors, but we have found it to be effective. In our simulations, shattering is relatively rare. This error correction mechanism is similar to Sayama’s method for handling errors in se lf-replicating loops [12], [13]. 3.5 Implementation JohnnyVon 2.0 builds directly on the original JohnnyVon 1.0. Both systems are written in Java and their source code is available under the GNU General Public License (GPL) at http://purl.org/net/johnnyvon/. 4 Experiments and Discussion In our first experiment, we demonstrate the construction of a small mesh of triangles, highlighting several important points in the replication and assembly. In the next set of experiments, we demonstrate replication and assembly of meshes built from each of the supported polygons, with one machine per side. We then show a mesh of polygons with more than one machine per side, a 3×1 rectangle and a triangle with three machines per side. Finally, to demonstrate scalability, we show a large mesh of triangles. In the following figures, the inner grey square represents the container. The middle of a machine must stay inside the grey square. (It takes less computation to check whether the middles are within bounds than to check all of the arms.) 4.1 Self-Replication and Self-Assembly In Figure 5, the images show a typical run of JohnnyVon 2.0. The run starts with a soup of 54 free type-2 machines and a seed gene of the form 2-2-2, and it ends with a triangular mesh. Image 1: This shows the initial configuration. Each of the free machines is in a random position and the seed gene is in the center (it is the strand of three machines, forming a straight line). 19 Self-Replication and Self-Assembly for Manufacturing Image 2: After 2,385 steps, the first replication is complete. We see two genes, immediately after they have split and their repellor arms have pushed them apart. Image 3: The first child of the seed gene is folding up, to become the seed phene. The seed gene has already begun a second copy. Image 4: By time 44,235, nearly all of the free machines are now attached to genes. Since there are so few free machines left, most of these genes cannot complete self- replication. As some of the incomplete strands’ fold-counters hit their upper limit, they will fold and release free machines, allowing other genes to complete self-replication. Image 5: We can see the second phene forming. In this image, it has not completely folded; the triangle has a small gap at the top. Image 6: Slightly more than 3,000 timesteps later, the new phene has bonded with the seed phene. Image 7: Now many more triangles have folded and joined the mesh. Two triangles have not yet joined (one is in the lower left corner and the other is near the center). Image 8: The mesh is almost complete. In the bottom on the right, there is a pentagonal arrangement of five triangles. This would eventually be corrected (by one of the triangles releasing and unfolding; see Section 3.4.4), although the container is just barely large enough to hold a mesh that includes all of the machines, and thus errors may continue to form even as they are corrected. In a situation where the container constrains the mesh, it is possible for a machine to get attached to a mesh in such a way that it can never reach an equilibrium where all of its bonds are in tolerance, since the conditions for accepting new bonds are much looser than the conditions for detecting stress. Insert Figure 5 here. In this simulation, the container is relatively small, and therefore Brownian motion is relatively strong. W ith strong Brownian motion, free machines are quickly distributed throughout the container, thus a replicating strand has a steady supply of free machines. The small container also means that the phenes never have far to go to join the mesh, and will quickly be bumped into the right position. In a larger container, replicating strands will consume the machines in their local area, and then replication slows until diffusion replenishes the supply. It also takes longer for phenes to find a place where 20 Self-Replication and Self-Assembly for Manufacturing they can join the mesh. We could speed up the action in a larger container by increasing the Brownian motion (i.e., turning up the heat), but that could damage the mesh. 4.2 Simple Polygonal Meshes In Figure 6, we show assembled mesh structures. Four different regular polygonal meshes are shown, all with sides that are one machine in length. Each of these four simulations was started with a single seed strand and was executed until the mesh was well developed. The scale of the images in Figure 6 is different from the scale of the images in Figure 5. These simulations use a container about nine times larger in area than the simulations in Figure 5. Table 9 summarizes the four simulations in Figure 6. Insert Figure 6 here. Insert Table 9 here. 4.3 Fancy Meshes In Figure 7, Image 1 (timestep 691,900) shows a mesh built of rectangles, rather than regular polygons. Because squares and rectangles use two types of machines (see Section 3.4.2), the rectangles only join the mesh if they are correctly oriented. The seed for Image 1 was 2-4-2-1-2-4-2-1. Image 2 (timestep 78,800) shows large triangles. The seed was 2-1-2-2-1-2-2-1-2. The bonds between type-2 machines fold to form the corners, while the type-1 machines provide the extension to make these triangles larger. In principle, each phene can be made arbitrarily large using this approach. Insert Figure 7 here. 4.4 Large Mesh The image in Figure 8 demonstrates that meshes can grow correctly beyond a small number of triangles. The seed was 2-2-2. The mesh contains 234 triangles. Insert Figure 8 here. 21 Self-Replication and Self-Assembly for Manufacturing 4.5 Discussion The above experiments demonstrate that four types of machines are sufficient to enable the user to program a variety of meshes. By specifying the seed gene, the user can create triangular, square, hexagonal, or octagonal meshes (Section 4.2). The experiments in Section 4.3 show that the sizes of the holes in the mesh are infinitely adjustable (in principle; in practice, there will be computational limits). For rectangular meshes, an infinite number of shapes are possible, by adjusting the ratios of the lengths of the sides (Section 4.3). To program JohnnyVon to build a mesh, the most important information is in Table 6. Looking at this table, the user can easily predict the shape that will be produced by any given seed. For example, consider the seed 2-4-2-1-2-4-2-1. Take eight sticks of equal length and put them on a flat surface. Reading the seed from left to right, let the first stick be “2”. Place the second stick end-to-end with the first stick, and let it be “4”. Arrange the two sticks so that their angle is 90°, as gi ven in Table 6. Continue in this manner until all eight sticks are arranged. The resulting shape will be a rectangle (see Figure 3). When programming a mesh, note that some seeds will not form a closed shape, which will trigger the stress detection (Section 3.4.4). This may be viewed as a bug in the user ’s program or as a limitation of JohnnyVon 2.0. 5 Limitations and Future Work JohnnyVon 2.0 has several minor limitations. For example, phenes must be closed for the system to work correctly. Although a hexagon composed of five machines and a gap in the sixth side can form a mesh, the error correction system would destroy the resulting mesh. Because closure of the phenes increases their rigidity, a mesh built of open phenes would be more flexible, and there may be other interesting effects. The variety of phenes in JohnnyVon 2.0 is also somewhat limited. Our original goal, to support all regular polygons that tile the plane (triangles, squares and hexagons), is satisfied. JohnnyVon 2.0 also supports partial tiling with octagons (square gaps are left in the mesh), and full tiling with rectangles. However, we would now like to support concave shapes (e.g., stars), as well as more general polygons. It would be interesting to enable Penrose tilings and Kepler tilings [3]. 22 Self-Replication and Self-Assembly for Manufacturing The replication phase takes much longer with two (or more) types of machines than it does with one, since each free machine has fewer places to bond correctly (equivalently, each machine in the strand has fewer free machines available with which it can bond). Supplying two (or more) times as many machines increases the computation per timestep (roughly quadratically). However, JohnnyVon 2.0 should be parallelizable. This is another area for future work. Like JohnnyVon 1.0, version 2.0 still runs on a standard desktop computer, thanks in part to improvements in hardware since the development of version 1.0. However, there were many experiments we wanted to try (e.g., polygons with 4 or 5 machines per side) that were not practical, given our available hardware and our patience. This problem can be addressed by improving the efficiency of our implementation, converting the code to a more efficient language than Java (which is likely to make it much less portable), parallelizing the code, or obtaining better hardware. The computational complexity of the simulation increases with the size of the phenes, since each phene must be jostled to a place near where it belongs, and larger phenes move more slowly. Meshes of large phenes require many timesteps to be constructed. The problem may be alleviated by increasing the Brownian motion or decreasing the viscosity of the simulated liquid, but each of these solutions presents new problems. We have tuned the physical parameters, in an effort to balance these conflicting concerns. The current settings of the physical parameters appear to strike a good balance, but there is likely room for further improvements. JohnnyVon would benefit from increased realism and increased programmability. Although JohnnyVon 2.0 provides a moderate level of programmability, it is not as programmable as we would like. One problem is that the mesh grows without control. Sometimes the mesh is relatively dense (as in Image 2 of Figure 6) while at other times it has many gaps (as in Figure 8). We would like to add a programmable mechanism for controlling the final size and shape of the mesh, and for avoiding meshes with large gaps (or for deliberately creating gaps, which may be useful for some applications). The growth of a mesh from a seed phene may be viewed as a type of dendrite growth, such as is observed in Diffusion-Limited Aggregation (DLA) models (a class of fractal growth models) [22]. The literature on fractal growth models may suggest some useful methods for preventing dendrite growth and encouraging the formation of a filled mesh [20]. It may be possible to modify JohnnyVon so that the user can specify the desired 23 Self-Replication and Self-Assembly for Manufacturing fractal dimension of the mesh. A filled mesh (in the current two-dimensional simulation) would have a fractal dimension of 2, and a dendritic mesh would have a fractal dimension somewhere between 1 and 2. In the context of JohnnyVon’s virtual physics, it may be m eaningful to define a universal constructor (see Section 2.1). For example, we might say that a universal constructor would be capable of building any two-dimensional structure that can be constructed from a finite number of machines, such that up arms are bonded to up arms and left arms are bonded to right arms. The design for the structure should be encoded in a seed gene. Ideally, the seed would contain many fewer machines than the final structure, although this may not be possible when the final structure lacks a regular pattern. Much further work is required to make a universal constructor in the JohnnyVon model. JohnnyVon 2.0 also provides a moderate level of realism, but again it is not as realistic as we would like. Our attractive and repulsive forces are somewhat unlike electrical or magnetic attraction and repulsion. The JohnnyVon simulation also does not attempt to model conservation of energy. Arbesman has recently done some interesting work on computational simulation of artificial life with conservation of energy [1]. Other steps towards increased realism would be to extend the simulation to three dimensions and to model the physics of the internal operations of the machines. Currently the external relations between machines are governed by a simple virtual physics, but the internal operations are described by abstract finite automata. However, both of these steps to realism would involve a significant increase in computational complexity. 6 Applications In our previous work, we suggested that JohnnyVon 1.0 provided a plausible mechanism for nanoscale manufacturing [17]. A vat of liquid containing free machines would be seeded with a single strand, soon resulting in a vat full of copies of the seed strand. JohnnyVon 2.0 takes this application one step further, beyond self-replication to programmable construction of meshes. Since the user has some control over the size and shape of the holes in the mesh, we can imagine these meshes being produced for filtration, insulation, or simply as a kind of cloth. 24 Self-Replication and Self-Assembly for Manufacturing If we can create a mechanism for controlling the size and shape of the mesh, more applications become possible. Since the system is accurate and self-correcting, pieces of cloth could be created exactly to specification, down to the size of a single machine. The design of the individual machines in JohnnyVon is too complex to be implemented at the nanoscale, given the current state of the art of nanotechnology. However, the machines appear to be less complex than typical virsuses, which range in size from about 20 to 250 nanometers. Nanoscale is generally defined as about 1 to 100 nanometers. As mentioned earlier, JohnnyVon 2.0 was partly inspired by Seeman’s work with DNA [14], [15]. A single DNA molecule is about 2 nanometers wide. JohnnyVon’s design is somewhat different from Seeman’s work, so it w ould not be accurate to describe his work as an implementation of JohnnyVon, but it does seem reasonable to say that JohnnyVon could be implemented at the nanoscale, given improvements in the state of the art. On the other hand, it would not be difficult to implement JohnnyVon at the human scale, with current technology, using small robots (such as the Khepera robot) to implement the four types of machines.4 This might be useful for research purposes, to test designs at a level between software simulation and nanoscale hardware. 7 Conclusion JohnnyVon 1.0 demonstrated self-replication in a continuous two-dimensional space with virtual physics. JohnnyVon 2.0 goes beyond its predecessor by introducing a user- programmable phenotype, consisting of a variety of meshes. JohnnyVon 2.0 is more realistic than cellular automata models [6], [10], [11], [12], [13], [18], [19], more programmable than artificial chemistry models [4], [5], and more computationally tractable than von Neumann’s universal constructor [21]. However, there is still much room for improvement in the degree of physical realism of the simulation and in the degree of programmability of the phenotype. Like its predecessor, JohnnyVon 2.0 is a local model. There is no global data structure that represents strands or meshes; these are emergent entities that arise from the interactions of the basic elements (the machines). Each machine is autonomous and can only sense its immediate neighbours. Control is local, distributed, and parallel. 4 http://www.k-team.com/robots/khepera/khepera.htm l 25 Self-Replication and Self-Assembly for Manufacturing From four different types of machines, JohnnyVon can produce four different polygonal meshes, with an infinite number of possible sizes (as per Section 4.3). The user can specify the mesh that will be produced by encoding the desired size and shape in the initial seed, without making any changes to the physics of the simulation. Errors in replication and in mesh formation are automatically detected and corrected, using purely local mechanisms. JohnnyVon 2.0 also avoids the “grey goo” scenario of self -replicating nanobots run amok. Replication and assembly are inherently limited by the supply of machines; when the free machines have all bonded, the process stops. Acknowledgements Thanks to Arnold Smith for starting us down this path, with JohnnyVon 1.0. Thanks to the anonymous reviewers of Artificial Life for their helpful comments. References [1] Arbesman, S. (2004). Erg: A Computational Energetics as an Approach to the Study of the Origins of Life. Senior Thesis, Computer Science Department, Brandeis University. [2] Drexler, K.E. (1992). Nanosystems: Molecular Machinery, Manufacturing, and Computation. New York: W iley. [3] Grunbaum, B., and Shephard, G.C. (1986). Tilings and Patterns. W.H. Freeman. [4] Hutton, T.J. (2002). Evolvable self-replicating molecules in an artificial chemistry. Artificial Life, 8, 341-356. [5] Hutton, T.J. (2004). A functional self-reproducing cell in a two-dimensional artificial chemistry. In J. Pollack et al., eds., Proceedings of the Ninth International Conference on the Simulation and Synthesis of Living Systems (ALIFE9), 444-449. [6] Langton, C.G. (1984). Self-reproduction in cellular automata. Physica D, 10, 134- 144. [7] Maynard Smith, J., and Szathmary, E. (1995). The Major Transitions in Evolution. Oxford University Press. 26 Self-Replication and Self-Assembly for Manufacturing [8] Merkle, R.C. (1992). Self replicating systems and molecular manufacturing. Journal of the British Interplanetary Society, 45, 407-413. [9] Merkle, R.C. (1994). Self replicating systems and low cost manufacturing. In The Ultimate Limits of Fabrication and Measurement, M.E. Welland, J.K. Gimzewski, eds., Dordrecht: Kluwer, pp. 25-32. [10] Morita, K., and Imai, K. (1997). A simple self-reproducing cellular automaton with shape-encoding mechanism. In C.G. Langton and K. Shimohara, eds., Artificial Life V: Proceedings of the Fifth International Workshop on the Synthesis and Simulation of Living Systems, 489-496. Cambridge, MA: MIT Press. [11] Reggia, J.A., Lohn, J.D., and Chou, H.-H. (1998). Self-replicating structures: Evolution, emergence and computation. Artificial Life, 4, 283-302. [12] Sayama, H. (1998). Introduction of structural dissolution into Langton's self- reproducing loop. In C. Adami, R.K. Belew, H. Kitano, and C.E. Taylor, eds., Artificial Life VI: Proceedings of the Sixth International Conference on Artificial Life, 114-122. Los Angeles, CA: MIT Press. [13] Sayama, H. (1999). A new structurally dissolvable self-reproducing loop evolving in a simple cellular automata space. Artificial Life, 5, 343-365. [14] Seeman, N.C. (2003). DNA in a material world. Nature, 421 (January 23), 427-431. [15] Seeman, N.C. (2004). Nanotechnology and the double helix. Scientific American, 290 (6) (June), 65-75. [16] Sipper, M. (1998). Fifty years of research on self-replication: An overview. Artificial Life, 4 (3), 237-257. [17] Smith, A., Turney, P., and Ewaschuk, R. (2003). Self-replicating machines in continuous space with virtual physics. Artificial Life, 9, 21-40. [18] Tempesti, G. (1995). A new self-reproducing cellular automaton capable of construction and computation. In F. Moran, A. Moreno, J.J. Morelo, and P. Chacon, eds., Advances in Artificial Life: Proceedings of the Third European Conference on Artificial Life (ECAL95), 555-563. Berlin: Springer-Verlag. [19] Tempesti, G., Mange, D., and Stauffer, A. (1998). Self-replicating and self-repairing multicellular automata. Artificial Life, 4, 259-282. 27 Self-Replication and Self-Assembly for Manufacturing [20] Vicsek, T. (1992). Fractal Growth Phenomena. Second Edition. Singapore: World Scientific. [21] von Neumann, J. (1966). Theory of Self-Reproducing Automata. Edited and completed by A.W. Burks. Urbana, IL: University of Illinois Press. [22] W itten, T.A., and Sander, L.M. (1981). Diffusion-limited aggregation, a kinetic critical phenomenon, Physical Review Letters, 47, (Issue 19-9), 1400-1403. 28 Self-Replication and Self-Assembly for Manufacturing Table 1. Variables for elements of the state vector that represent internal aspects of the machine. Variable name type Range {1, 2, 3, 4} id fold-counter repel-counter {0, 1, 2, …} {0, 1, 2, …} {0, 1, 2, …} stress-counter strand-position {0, 1, 2, …} {1, 2, 3} split-state {1, 2, 3, 4} reset-counter fold-now unfold seed-gene seed-phene in-mesh replicated shatter folded {0, 1} {0, 1} {0, 1} {0, 1} {0, 1} {0, 1} {0, 1} {0, 1} {0, 1} Description • type of machine • static for a given machine • unique identifier for machine • static for a given machine • used to decide when the strand should fold • during splitting, controls how long the repellor arms of a strand are active • counts the time since a machine was last in-tolerance • used to decide where a machine is in a replicating strand • described in detail elsewhere [17] • used to determ ine when to split • described in detail elsewhere [17], except that split-state now has a fourth value, indicating that shatter should be set to 1 (true) • indicates that the fold-counter should be reset • indicates that each machine in the strand should set its folded flag • indicates that a phene should unfold • this occurs when one phene overlaps another in a mesh • flag for identifying the seed gene • the seed gene never folds, in case more free machines become available for replication • flag for making the seed phene • indicates whether this machine is connected to the mesh • 1 (true) if and only if the machine has been through a successful replication. • in particular, machines in the seed gene have not replicated at the start of a simulation • indicates that the machine should break all bonds and return to being a free machine. • if 1, the machine tries to form angular bonds with its left and right neighbours • if 0, the machine tries to form straight bonds with its left and right neighbours 29 Self-Replication and Self-Assembly for Manufacturing Table 2. Variables for elements of the state vector that represent external relations. Variable name x-position y-position angle x-velocity y-velocity angular-velocity left-neighbour right-neighbour up-neighbour Range ´ ´ [0, 2p] ´ ´ [0, 2p] {0, 1, 2, …} {0, 1, 2, …} {0, 1, 2, …} Description • state of the machine with respect to the container • vary due to Brownian motion, viscosity, and forces from interactions between fields • identifier of the machine (if any) bonded to the named arm 30 Self-Replication and Self-Assembly for Manufacturing Table 3. Derived variables that are calculated from state variables. Variable name Range in-tolerance {0, 1} bend-location {1, 2, 3, 4} Description • indicates whether each existing bond is within a certain (fixed) tolerance of the desired angle • used to help avoid making bonds when the machine is in a potentially unstable situation. • indicates where a machine is located in a phene 31 Self-Replication and Self-Assembly for Manufacturing Table 4. Pairs of machine types that will perm it an up bond when in genes. Bond 1 2 3 4 1 2 3 4 + + + + 32 Self-Replication and Self-Assembly for Manufacturing Table 5. Pairs of machine types that will perm it an up bond when in phenes. Bond 1 2 3 4 1 2 3 4 + + + + 33 Self-Replication and Self-Assembly for Manufacturing Table 6. Folding angles for sideways bonds between two machine types when in phenes. Angle 1 2 3 4 1 0° 0° 0° 0° 2 3 4 0° 120° 45° 90° 0° 45° 0° 90° 60° 34 Self-Replication and Self-Assembly for Manufacturing Table 7. The meaning of the different values of bend-location. Value Meaning of value right of bend: right neighbour is straight (1) and left neighbour is bending (2, 3, 4) 1 left of bend: left neighbour is straight (1) and right neighbour is bending (2, 3, 4) 2 in bend: both left and right neighbours are bending types (2, 3, 4) 3 extender: both left and right neighbours are straight types (1) 4 35 Self-Replication and Self-Assembly for Manufacturing Table 8. Pairs of bend-location values that will perm it an up bond when in phenes. bend-location 1 2 3 4 1 2 3 4 + + + 36 Self-Replication and Self-Assembly for Manufacturing Table 9. Some basic observations about each image in Figure 6. Image Phenes Seed gene Timestep 1 2 3 4 Triangles Squares Hexagons Octagons 2-2-2 4-2-4-2 4-4-4-4-4-4 2-3-2-3-2-3-2-3 246,000 498,600 448,600 1,107,400 Initial free machines 201 200 160 120 Phenes in mesh 50 24 20 9 Genes remaining 5 1 1 2 37 Self-Replication and Self-Assembly for Manufacturing Figure 1. This diagram shows how fold-counter resets when a new machine joins a partially replicated gene. A free machine attaches to a machine in the strand (A), triggering the reset- counter signal and resetting fold-counter in the machine to which it attaches (B). The signal propagates (C) to the left neighbour (D), triggering its reset-counter signal and causing it to reset its fold-counter. In turn, the signal passes (E) to the next machine in the strand (F). The propagation stops at the leftmost machine (F). 38 Self-Replication and Self-Assembly for Manufacturing Figure 2. This diagram demonstrates the mechanism used to expand the size of a polygon. Machines of type 1 are inserted along the edges. 39 Self-Replication and Self-Assembly for Manufacturing Figure 3. In this diagram, we can see why it is useful to have two types of machines for rectangles (types 2 and 4), in addition to type 1, for expanding size. The top phene is oriented incorrectly, relative to the mesh formed by the bottom two phenes. However, the top phene will not join at (A) or (B), because the types do not match (see Table 5). It will only join the mesh when it is oriented correctly. 40 Self-Replication and Self-Assembly for Manufacturing Figure 4. In this diagram, two phenes join a mesh, both trying to fill the same gap. Phene 1 has joined at (A) and (C). Phene 2 has joined at (B). Because these two phenes both have their in- mesh flags set to 1 (true), their overlap detector arms become active, and the two machines at (D) briefly bond their overlap detector arms. The machines then decide arbitrarily which one will set its unfold flag to true, causing the phene to which it belongs to unfold. The remaining phene will then pick up the bonds that were released by the unfolded phene. 41 Self-Replication and Self-Assembly for Manufacturing Image: 1 Time: 0 Image: 3 Time: 3,295 Image: 5 Time: 46,340 Image: 7 Time: 85,810 Image: 2 Time: 2,385 Image: 4 Time: 44,235 Image: 6 Time: 49,780 Image: 8 Time: 294,075 Figure 5. These images illustrate the experiment described in Section 4.1. The eight images are consecutive screenshots from a typical run of JohnnyVon, selected to show interesting stages in the simulation. The first image shows a seed gene in a soup of free machines and the last image presents a nearly completed mesh of triangles. 42 Self-Replication and Self-Assembly for Manufacturing 1 3 2 4 Figure 6. These screenshots illustrate the resulting meshes for each of the four supported regular polygons. The images show the final stages of four separate simulations, each using a different seed gene, as described in Section 4.2 and Table 9. 43 Self-Replication and Self-Assembly for Manufacturing 1 2 Figure 7. Image 1 shows a rectangular mesh and Image 2 is a mesh of expanded triangles. These are screenshots from the final stages of two separate simulations (see Section 4.3). They demonstrate that it is possible to vary the lengths of the sides of the polygons, by encoding the desired lengths in the seed gene. 44 Self-Replication and Self-Assembly for Manufacturing Figure 8. This screenshot shows a mesh of 234 triangles, as discussed in Section 4.4. This demonstrates that JohnnyVon can scale up to larger meshes. 45
1204.6090
1
1204
2012-04-27T00:34:18
Towards a Formal Model of Privacy-Sensitive Dynamic Coalitions
[ "cs.MA", "cs.DC" ]
The concept of dynamic coalitions (also virtual organizations) describes the temporary interconnection of autonomous agents, who share information or resources in order to achieve a common goal. Through modern technologies these coalitions may form across company, organization and system borders. Therefor questions of access control and security are of vital significance for the architectures supporting these coalitions. In this paper, we present our first steps to reach a formal framework for modeling and verifying the design of privacy-sensitive dynamic coalition infrastructures and their processes. In order to do so we extend existing dynamic coalition modeling approaches with an access-control-concept, which manages access to information through policies. Furthermore we regard the processes underlying these coalitions and present first works in formalizing these processes. As a result of the present paper we illustrate the usefulness of the Abstract State Machine (ASM) method for this task. We demonstrate a formal treatment of privacy-sensitive dynamic coalitions by two example ASMs which model certain access control situations. A logical consideration of these ASMs can lead to a better understanding and a verification of the ASMs according to the aspired specification.
cs.MA
cs
Towards a Formal Model of Privacy-Sensitive Dynamic Coalitions Sebastian Bab Nadim Sarrouh Technische Universitat Berlin, Germany Technische Universitat Berlin, Germany [email protected] SOAMED Graduate College [email protected] The concept of dynamic coalitions (also virtual organizations) describes the temporary interconnec- tion of autonomous agents, who share information or resources in order to achieve a common goal. Through modern technologies these coalitions may form across company, organization and system borders. Therefor questions of access control and security are of vital significance for the architec- tures supporting these coalitions. In this paper, we present our first steps to reach a formal framework for modeling and verifying the design of privacy-sensitive dynamic coalition infrastructures and their processes. In order to do so we extend existing dynamic coalition modeling approaches with an access-control-concept, which manages access to information through policies. Furthermore we regard the processes underlying these coalitions and present first works in formalizing these processes. As a result of the present paper we illustrate the usefulness of the Abstract State Machine (ASM) method for this task. We demonstrate a formal treatment of privacy-sensitive dynamic coalitions by two example ASMs which model certain access control situations. A logical consideration of these ASMs can lead to a better understanding and a verification of the ASMs according to the aspired specification. 1 Introduction Modern technologies like service-oriented architectures, online social networks, web 2.0, etc. allow for companies and organizations to form dynamic coalitions across their own system borders. A dynamic coalition first off is a group of through network technologies (temporary) interconnected autonomous agents, who share their resources or information in order to reach a common goal. Although each coali- tion exhibits unique features there exist certain common features like dynamically changing membership, data-transfer mechanisms and authorization structures. Companies cooperating in order to exploit a tem- porary market chance or the cooperation of emergency services, military and civilian institutions during a crisis are popular examples for dynamic coalitions. In most scenarios different institutions have to share and transfer critical information, which raises significance for questions of information flow, security, privacy and trust. In security and privacy critical fields like in the health sector the solving of the question may determine the success of complete software engineering projects. Nevertheless software architects today still lack formal frameworks and methods to evaluate policy decisions at design time and thereby examine their consequences for the to-be-deployed architecture. In [5] Bryans et al. present formal modeling technologies in order to approach a formal framework for dynamic coalitions. With the specification language VDM1 they create a basic formal model of dynamic coalitions, consisting of various dimensions, where each dimension represents a certain per- spective which could be considered by a software architect. According to object oriented paradigms the 1Vienna Development Method: http://www.vdmportal.org/twiki/bin/view Jeremy Bryans and John Fitzgerald (Eds.): Formal Aspects of Virtual Organisations 2011 (FAVO 2011) EPTCS 83, 2012, pp. 10 -- 21, doi:10.4204/EPTCS.83.2 c(cid:13) Sebastian Bab & Nadim Sarrouh This work is licensed under the Creative Commons Attribution License. Sebastian Bab & Nadim Sarrouh 11 models consist of data types as well as operations and invariants over these types. In [8] the authors demonstrate the practicability of their modeling approach. In other works independent of dynamic coalition researches the same authors present concepts for modeling Access-Control-Policies in VDM. Therefor they translate core components of the OASIS2- standard XACML (eXtensible Access Control Markup Language into a VDM-Notation. In an outlook they propose the combination of this approach with the modeling of dynamic coalitions [7]. Modeling and testing of proposed software architectures with respect to their access control policies is of great importance, especially in dynamic coalitions: Different access control policies of certain agents may result in processes that do not run smoothly or prevent the processes from running at all. therefor present a concept of evolution of access control policies in dynamic coalitions Bryans et al. (see figure 1). In this concept a process with certain access control requirements is generated through coalition consensus. With the supposed formal framework agents may investigate these access control requirements and even simulate the impact on their own architecture, thereby being able to detect and avert errors or contradictions. Figure 1: Evolution of access control policies in dynamic coalitions taken from [7] Since one of the authors is affiliated with the SOAMED Graduate College3, a graduate college dedi- cated to "Service-oriented Architectures for the Integration of Software-based Processes exemplified by Health Care Systems and Medical Technology" medical scenarios are of great interest to the authors. In health care systems dynamic factors of coalitions are of great importance. Possibilities of modern networking technologies call for new organizational concepts apart from traditional static concepts like clinical pathways. For example, patient care itself could be seen as a dynamic coalition: During the treatment in one or several hospitals the patient has to pass through various station and organizational units. These departments are often not only spatially separated, 2OASIS is a consortium for advancing open standards for information society. See: http://www.oasis-open.org/. 3For more Information on SOAMED see: http://www.informatik.hu-berlin.de/forschung/gebiete/ soamed-en/willkommen-en. 12 Formal Modeling of Privacy-Sensitive Dynamic Coalitions but also technology wise, acting as separate, autonomous instances, which create there own reports and diagnoses which are transferred to the other instances (up to this day still mostly on paper). In this paper we present our approach of integrating the above-described modeling concepts for ac- cess control and dynamic coalitions. Speaking in terms of Bryans et al. we thereby examine the dimen- sion access control. The models of Bryans et al. solely address structural aspects of dynamic coalitions. Exceeding these structural features the consideration of coalition processes is of high significance in dynamic coalitions. In the core of this paper we discuss how Abstract State Machines (ASMs) may be utilized to enrich the models of Bryans et al. with formal process aspects. The modified VDM-model is considered as the underlying state and processes may be represented as state transitions in the ASM. We provide two examples of access control situations in dynamic coalitions in the formal method of ASMs which shall illustrate the usefulness of a formal treatment and consideration of access control situations. By the verification of certain liveness and safety properties we can furthermore guarantee or check specific properties of the ASMs in the first place. 2 Related Work In recent years several formalizations of single aspects of dynamic coalitions have been presented. Haidar et al. propose a formal model for PKI-based authentication in dynamic coalitions on the basis of a process calculus and the formal description language Z [13]. Bocchi et al. present formal description approaches for breeding environments in virtual organizations, which may be notably relevant in grid-computing. As mentioned above, Bryans et al. contributed various models for dynamic coalitions by means of the specification language VDM (see [8, 7, 4, 5]) . However those approaches only cover structural aspects of dynamic coalition. Process properties and workflows have to be simulated using external (for example java-based) tools to modify a state that is based on a VDM-model structure. Our work extends this approach in so far as in that we pursue a formal modeling framework in which both structure and process properties can be formalized in a single formalism (e.g. Abstract State Machines) and thereby create the means to formally analyze dynamic coalitions with the underlying processes. Other than the taxonomies of Bryans et al. only few holistic modeling approaches for dynamic coalition exist. The work most alike to ours can be found in [18]. Here McGinnis et al. describe a formal framework for virtual organizations in service-grid-environments. The framework catches formal descriptions of agents, services, roles and work flows. The used modeling techniques are not based on standards that we know of. Tool-support in creation and evaluation of dynamic coalitions design, as proposed by us, is therefor only hardly imaginable. Koshutanski et al. model HDC (highly dynamic coalitions), a subclass of dynamic coalitions, defined by them as coalitions with extremely short life time. They also do not make use of any modeling standard, which might create problems in critical application fields like crisis management or the health sector. Furthermore their model assumes a central management of the coalition in form of a coalition platform. Both limitations are too restrictive for the application scenarios we are envisioning. Other approaches present informal models from the view of economic sciences. [14, 17]. 3 Basics In the following we want to describe the basic concepts which are essential for the understanding of the model as to be presented in this paper. In the first subsection we give a short introduction into the Sebastian Bab & Nadim Sarrouh 13 modeling language VDM. In the second subsection we provide the model for dynamic coaliation as described in [8]. In the third part we give a brief introduction to the OASIS XACML standard, for which there also exists a VDM specification. 3.1 VDM and VDM++ The model to be introduced in the present paper is specified in the object-oriented extension of the Vienna Development Method (VDM), called VDM++. This language specifies data, states and functionality and is well suited for the modeling of the structures and functions of dynamic coalitions.[11, 9]. A VDM-Model consists of definitions of classes in which instance variables, types and functionality are specified. Here instance variables are the local variables of an object. Types can be defined as being free of structure (called token) or as complex. Functionality can be specified through functions over the instance variables or through helping functions, which leave the local variables untouched. The use of operations and functions can be limited through the statement of pre- and post-conditions. VDM is widely used method in the modeling of computer-related systems [16, 10] and adequately supported by tools like for example the VDMTools which were used for the present paper. 3.2 Dynamic coalitions in VDM The VDM model for dynamic coalitions as introduced by Bryans et al. consists basically of agents, which can enter or leave certain groups of agents, which are named coalitions. Agents carry a set of information which can be shared with other agents or coalitions. Based on these conceptions [5] introduces certain different dimensions of dynamic coalitions for the modeling of seven further aspects like for example exchanging of information, memberships of coalitions and structures of authorization. The practical usefulness of these models was proven by certain industrial ([8]) and military ([4]) case studies. In [1] we extended this basis model of dynamic coalitions by methods for a handling of access- control. In this respect our approach can be seen as another new dimension of dynamic coalitions: the dimension of access-control. 3.3 XACML in VDM XACML is an OASIS standard based on XML for the description and definition of access-control- policies in distributed systems. A simplified visualization of the functioning of XACML policies can be found in figure 2. Requests for access to certain resources are picked up by the Policy Enforcement Point (PEP) and send to the Policy Decision Point (PDP) as a standardized XACML request. As holder of the policies it is up to the PDP who check whether an access is to be permitted or to be denied and sends this information to the PEP which is responsible for the granting or denying of access to the resource. 3.4 Abstract State Machines The concept of abstract state machines (ASMs) (see for example [3, 12]) allows for a formal representa- tion of computable and non-computable algorithms. Here the concept of ASMs is rather free as it allows for a direct use of specification languages (like for example VDM) as underlying languages of the ASMs. ASMs offer a mathematical framework which allows for a reliable formal modeling of processes. Any ASM is based on the concept of states in which the ASM can occur. Here any state is modeled as a specification of the underlying specification language. State transitions are modeled over rules which 14 Formal Modeling of Privacy-Sensitive Dynamic Coalitions Figure 2: Simplified presentation of XACML-architecture. change the definitions of the functions included in the specification. This change takes place via an up- date operation, which overwrites the result of the function for a certain set of arguments. Thus a state is determined by the definition of its included functions. ASMs allow for a logical handling in the sense that one defines a logic for AMSs in which formulas describe certain states and conditions of the ASM. As a result of the present work we will show in the next sections how two examples for a formal representation of access-control questions in dynamic coalitions can be modeled and studied using the ASM method and its logical considerations. 4 Dimension Access Control: Our VDM state In the following we present our basic state which is used for the ASM modeling approach in the next chapter. The models are loosely based on the work of Bryans et al. [6] although it has been modified and extended on several locations. At first we introduce the basic types of the model, separated in types for the modeling of dynamic coalitions and access control respectively. In the last subsection we explain some example operations on the basis of which simple access controlled information transfer within a coalition becomes possible. 4 4.1 Dynamic coalition types According to the approaches of Bryans et al. our basis state signature is based on agents which carry information and may join forces to form dynamic coalitions and thereby sharing information at their demand. Both, agents and coalitions have unique IDs (Aid- and Cid-token). The model abstracts from the actual content and structure of the information and considers information as unstructured data (token- type). Furthermore we add PDPs, both at agent and at coalition level, which host the access control policies for later evaluation. public Agent :: info aac : set of Information : PDP; public Coalition :: agents : set of Aid info cac : set of Information : PDP; 4The full model ACDimension.vpp including a test scenario can be found under http://www.user.tu-berlin.de/nsarrouh/ Sebastian Bab & Nadim Sarrouh 15 public Information :: item : token; instance variables coals : map Cid to Coalition := {->}; agents: map Aid to Agent := {->}; inv forall c in set dom coals & (coals(c).agents subset dom agents) The invariant (inv) states that only known agents may join coalitions. The PDP of a coalition and the PDPs of the agents are related as follows: As soon as an agent shares information with the coalition, the related access control policies are attached to it and stored in the coalitions PDP. This way access control requirements of the agents may be enforced on coalition level. 4.2 Access control component types We integrate the approach from [6]: According to the OASIS-standard XACML policies consist of rules which in turn consist of an optional target) and an effect. Targets consist of subjects, in our case agents, which want to access certain resources, in our case information. Actions define the type of access in question, which we limit to read and write for sake of simplicity. When an access (request) matches a rule target, the effect is being returned which may be permit, deny or not applicable in case the target of the rule does not match the request. If a rule doesn't contain a target it will be evaluated for each request. public Rule :: target effect : [Target] : Effect; public Target :: subjects : set of Aid resources : set of Information actions : set of Action; public Request :: target : Target; public Action = (<WRITE> <READ>); public Effect = (<PERMIT> <DENY> <NOTAPPLICABLE>); Policies are sets of rules including a combination algorithm which combines different effects in case that more than one rule matches a request. Here we only consider the basic XACML combining algorithms deny overrides) and permit overrides. Policies have obligatory targets, so that only matching requests are evaluated. The effect of a policy is returned to the Policy Decision Point (PDP), which combines the different effects to only one effect, using the above-mentioned combining algorithm. Each request for access on information is evaluated through the PDP which ensures policy compliance. public PDP :: policies : set of Policy policyCombAlg : CombAlg; public Policy :: target rules ruleCombAlg : Target : set of Rule : CombAlg; public CombAlg = (<DENYOVERRIDES> <PERMITAOVERRIDES>); 16 Formal Modeling of Privacy-Sensitive Dynamic Coalitions 4.3 Operations The model operations CreateEmptyCoalition, CreateNewAgent and Join create empty coalitions, new agents carrying information, and join agents to coalitions. Agents in coalitions may share information (method shareInfo) in which case the matching policies are added to the coalitions PDP. Figure 3: Visualization of shareInfo operation. public shareInfo : Aid * Cid * set of Information ==> () ShareInfo(a,c,i_set)== ( for all i in set i_set do coals:= coals ++ {c -> mu(coals(c), info -> coals(c).info union i_set, cac -> mk_PDP(coals(c).cac.policies union GetMatchingPolicies(agents(a).aac, i), <DENYOVERRIDES>))}; ) pre a in set dom agents and c in set dom coals and i_set subset agents(a).info ; If an agent wants to access information, the PDP will at first evaluate the request and then permit or deny the access. public RequestInfo : Aid * Cid * Action * set of Information ==> Effect RequestInfo(a,c,act,i_set)== ( evaluatePDP(mk_Request(mk_Target({a},i_set,{act})), coals(c).cac) ) pre a in set dom agents and c in set dom coals and i_set subset coals(c).info ; Sebastian Bab & Nadim Sarrouh 17 The function evaluatePDP checks the combining algorithm for the policies and calls the according functions. The single policies and rules are evaluated through evaluatePolicy and evaluateRule which in turn use the according function depending of the combining algorithm to evaluate the effects. For the sake of space we refrain from an explicit representation of all the functions and operations in this paper and refer to the complete model descriptions in the internet. 5 Abstract State Machines Abstract state machines (ASMs) offer a formalism for the modeling of arbitrary algorithms (see for ex- ample [12, 3]). ASMs come with different forms of presentation of algorithms, including technical and visualized presentation forms. Furthermore there exists a tool support which allows for the actual pro- gramming with ASMs (see for example the CoreASM project). ASMs offer methods for a representation of algorithms which are not necessarily limited to computer based algorithms, but instead of that allow for the representation of other algorithmic procedures of the real world, too. The essential advantage of ASMs for the purposes of this work lies in the freedom of using nearly any modeling language and formalism as underlying formalism of a certain ASM. Thus it is possible to extend formalisms like VDM by a meta-level consideration which allows for example to reason about a VDM model from a logical perspective. 5.1 ASM Example We now try to illustrate the applicability of the ASM method through a simple example for access control in a dynamic coalition taken from [7]. This example is chosen due to the fact that it includes the essen- tial questions and aspects of an access control in a dynamic coalition, while still being of an adequate simplicity. Assume that a document management tool administers production plan and hazard analysis documents of a chemical plant named compA. Production orders for chemicals are stored in an order database and each order has to undergo identical production processes. Due to market opportunities compA outsources the hazard analysis to compB, thereby forming a kind of dynamic coalition. Figure 4 visualizes this process in the standard ASM terminology as introduced in [3, 12]. The underlying structure is the above-mentioned VDM++-Model. According to common ASM-illustrations we refrain from defining all functions and variables explicitly in this paper and count on the expres- sive power of function and variable names. Round entities represent the abstract states, i.e. the whole VDM++-structure, including instances for the agents, coalitions, etc. whereas rectangles illustrate up- dates of these states. hexagons are symbolic representations of conditions. If-then-else-conditions have two possible outputs "yes" and "no" depending on the Boolean expression inside the hexagon. The pro- cess for the pre-production of a new chemical will start with the creation of a hazard analysis. According to the hazard analysis and its recommendations the production plan is developed. Suppose that legal requirements demand that compB signs off that all security recommendations of the hazard analysis are properly implemented in the production plan. Now suppose that company legislation and therefore the access control policy of compA forbids any other agent but compA to access the production plan, which is reflected by the following two rules5: ruleA1:= ( Target( {compA} , {PP} , {<WRITE>,<READ>} ) , <PERMIT> ); 5In order to let ruleA1 be effective the policy will have to use the PermitOverrides combining algorithm. 18 Formal Modeling of Privacy-Sensitive Dynamic Coalitions Figure 4: ASM visualization of chemical plant process with possible deadlock after i6. ruleA2:= ( Target( {} , {PP} , {<WRITE>,<READ>} ) , <DENY> ); Because all shared information is stored in the coalition together with the according access control policies, the depicted process will run into a deadlock as soon as compB tries to access the production plan in the first condition (we suppose that signoff() will internally make use of the requestInfo()-function). An ASM run easily identifies this deadlock. The resulting error will now have to be reported to the coalition members who will now have to adjust their process or their security policies in order to make the process executable. In the following process we insert another condition, checking if access to the production plan is granted. If not an error message to the participating members will result and thereby we eliminate the previous deadlock. 6 Logical considerations -- Liveness and safety The general method of ASMs allows for a logic based analysis of properties of the abstract state machines (compare with [3, 12]). Based on the example ASMs of the previous section we now want to argue that certain important properties in the modeling of processes like for example liveness and safety can be described by logical formulas over the underlying specifications of the ASMs. Here liveness refers to the property that the ASM is free of deadlocks while safety refers to the general absence of non-desired states in the ASM. A logical treatment of questions of liveness and safety can be seen as an indicator for the correctness of a designated ASM. Consider for example the first ASM example of the previous section (as represented in figure 5.1). As mentioned before this ASM cannot be considered as free from deadlocks as a rejection of the request of compB for the production plan of compA does have not a solution in the ASM. The resulting deadlock Sebastian Bab & Nadim Sarrouh 19 Figure 5: ASM visualization of chemical plant process with new choice to avoid deadlock after i6. however can be described by the following formula over the VDM++ specification which is underlying in the ASM: ϕ := ∃ord.∃HA.∃PP.(createHA(compB,ord) = HA ∧createPP(ord,HA) = PP∧ requestInfo(compB,coal,PP) = DENY Due to the general concept of AMSs with their freedom of choice in their underlying specifications and due to the expressiveness of the describle formulas there cannot exist a general algorithm for the test of satisfiability of formulas in given ASMs. However, this does not imply that such a test is impossible to define in any case. The structure of our example allows for a testing of the above formula ϕ in the ASM as the number of states to consider is finite. It is obvious that the only situation in which ϕ can be considered as a true formula is when calling the signoff()-function after states i6 and i10. Thus a logical consideration could reveal the possible deadlock situation before an explicit test run of the ASM has to take place. Doing that the ASM can be considered as not fulfilling the property of liveness by logical considerations. As mentioned before the second ASM example (as represented in figure 5.1) of the previous section can be considered as free of deadlocks. Thus when attempting to test the validity of the above formula ϕ in this second ASM the formula occurs to be false in all states and thus the ASM can be considered as satisfying the liveness property. Logical considerations of safety properties include all the testing for states of the ASM which are non-desired in the aspired specification of the ASM. Consider for example the following formula ψ: ψ := ∃ord.∃HA.∃PP.(createHA(compB,ord) = HA 20 Formal Modeling of Privacy-Sensitive Dynamic Coalitions ∧createPP(ord,HA) = PP∧ requestInfo(compB,coal,PP) = PERMIT → sendErr(compB,coal,PP)) This formula describes a situation in which the entire process is working as intended, but the system nevertheless sends an error to compA. It is obvious that this formula ψ describes an error state of the ASM which shall not occur as a possible state. Thus when testing the validity of ψ in the ASM and find ψ to be false in any state we can guarantee a priori that this non-desired state cannot occur in the ASM run. Besides the mentioned aspects on liveness and safety there are further benefits of a logical consider- ation of ASMs (like for example consequence relations or other meta-concepts) which lead to more deep analysis of their structure and logical conditions. 7 Conclusion and open questions In this paper we have presented a model in the formal specification language VDM, which may describe dynamic coalitions together with privacy and access control aspects. Our contribution here is the inte- gration of two existing modeling approaches for dynamic coalitions and XACML access control policies respectively. Our next steps in this area will consider context-sensitive XACML as well as role based access control (RBAC) for both of which OASIS-profiles exist. Both extensions to the basic XACML- concept are of high significance in most application fields, i.e. in the medical sector as the main field of interest of the authors. Furthermore we have argued by our two examples of ASMs that the ASM method with its logical considerations can be of great benefit for a formal treatment of access-control-sensitive processes in a dynamic coalition. The VDM-structures serve as the basic states on which the ASMs operate. Here the examples are meant as a first indicator for the usefulness of a formal treatment as provided by the ASM method. However, it remains to define and study a general theory for a formal treatment of access control in dynamic coalitions using the ASM method which is general enough to cover a wide range of access control situations. These studies are part of ongoing and soon to be published work especially of the second author of the present paper. References [1] Sebastian Bab & Nadim Sarrouh (2011): Formale Modellierung von Access-Control-Policies in Dynamischen Koalitionen. In: GI Proceedings, Informatik 2011 - Informatik schafft Communities, p. 402. [2] Laura Bocchi, Jos´e Luiz Fiadeiro, Noor Rajper & Stephan Reiff-Marganiec (2009): Structure and Behaviour of Virtual Organisation Breeding Environments. In: FAVO, pp. 26 -- 40. Available at http://dx.doi.org/ 10.4204/EPTCS.16.3. [3] Egon Borger & Robert Stark (2003): Abstract State Machines: A Method for High-Level System Design and Analysis. Springer Verlag. [4] J. W. Bryans, J. S. Fitzgerald, D. Greathead, C. B. Jones & R. J. Payne (2008): A Dynamic Coalitions Workbench: Final Report. Technical Report, Newcastle University. [5] J. W. Bryans, J. S. Fitzgerald, C. B. Jones, I. Mozolevsky, Jeremy W. Bryans, John S. Fitzgerald, Cliff B. Jones & Igor Mozolevsky (2006): Dimensions of dynamic coalitions. Technical Report. [6] J. W. Bryans, J. S. Fitzgerald & P. Periorellis (2006): Model Based Analysis and Validation of Access Control Polcies. Technical Report, Newcastle University, School of Computing Science. Sebastian Bab & Nadim Sarrouh 21 [7] Jeremy Bryans & John Fitzgerald (2007): Formal Engineering of XACML Access Control Policies in VDM++. In Michael Butler, Michael Hinchey & Mar´ıa Larrondo-Petrie, editors: Formal Methods and Software Engineering, Lecture Notes in Computer Science 4789, Springer Berlin / Heidelberg, pp. 37 -- 56. Available at http://dx.doi.org/10.1007/978-3-540-76650-6_4. [8] Jeremy Bryans, John S. Fitzgerald, Cliff B. Jones & Igor Mozolevsky (2006): Formal Modelling of Dynamic Coalitions, with an Application in Chemical Engineering. Technical Report. Available at http://dx.doi. org/10.1109/ISoLA.2006.21. [9] John Fitzgerald, Peter Gorm Larsen, Paul Mukherjee, Nico Plat & Marcel Verhoef (2005): Validated Designs For Object-oriented Systems. Springer-Verlag TELOS, Santa Clara, CA, USA. [10] John S. Fitzgerald & Peter Gorm Larsen (2006): Triumphs and Challenges for Model-Oriented Formal Meth- ods: The VDM++ Experience (Abstract). In: ISoLA, pp. 1 -- 4. Available at http://dx.doi.org/10.1109/ ISoLA.2006.33. [11] John S. Fitzgerald & Peter Gorm Larsen (2009): Modelling Systems - Practical Tools and Techniques in Software Development (2. ed.). Cambridge University Press. [12] Yuri Gurevich, Philipp W. Kutter, Martin Odersky & Lothar Thiele, editors (2000): Abstract State Machines, Theory and Applications, International Workshop, ASM 2000, Monte Verit`a, Switzerland, March 19-24, 2000, Proceedings. Lecture Notes in Computer Science 1912, Springer. [13] Ali Nasrat Haidar, P. V. Coveney, Ali E. Abdallah, Peter Y. A. Ryan, B. Beckles, J. M. Brooke & M. A. S. Jones (2009): Formal Modelling of a Usable Identity Management Solution for Virtual Organisations. In: FAVO, pp. 41 -- 50. Available at http://dx.doi.org/10.4204/EPTCS.16.4. [14] R. Klueber (1998): A framework for virtual Organizing. In: VoNet Workshop. [15] Hristo Koshutanski & Antonio Mana (2010): Interoperable semantic access control for highly dynamic coali- tions. Security and Communication Networks 3(6), pp. 565 -- 594. Available at http://dx.doi.org/10. 1002/sec.148. [16] Peter Gorm Larsen, John Fitzgerald & Tom Brookes (1996): Applying Formal Specification in Industry. IEEE Softw. 13, pp. 48 -- 56. Available at http://doi.ieeecomputersociety.org/10.1109/52.493020. [17] Nick Lethbridge (2001): An I-Based Taxonomy of Virtual Organisations and the Implications for Effective Management. Informing Science 4 No 1. [18] Jarred McGinnis, Kostas Stathis & Francesca Toni (2009): A Formal Framework of Virtual Organisations as Agent Societies. In: FAVO, pp. 1 -- 14. Available at http://dx.doi.org/10.4204/EPTCS.16.1. [19] Wolfgang Reisig (2010): Petrinetze: Modellierungstechnik, Analysemethoden, Fallstudien. Leitfaden der Informatik, Vieweg+Teubner. 248 pages; ISBN 978-3-8348-1290-2.
1203.1570
1
1203
2012-03-07T19:14:32
In-network Sparsity-regularized Rank Minimization: Algorithms and Applications
[ "cs.MA", "cs.IT", "cs.NI", "cs.IT", "stat.ML" ]
Given a limited number of entries from the superposition of a low-rank matrix plus the product of a known fat compression matrix times a sparse matrix, recovery of the low-rank and sparse components is a fundamental task subsuming compressed sensing, matrix completion, and principal components pursuit. This paper develops algorithms for distributed sparsity-regularized rank minimization over networks, when the nuclear- and $\ell_1$-norm are used as surrogates to the rank and nonzero entry counts of the sought matrices, respectively. While nuclear-norm minimization has well-documented merits when centralized processing is viable, non-separability of the singular-value sum challenges its distributed minimization. To overcome this limitation, an alternative characterization of the nuclear norm is adopted which leads to a separable, yet non-convex cost minimized via the alternating-direction method of multipliers. The novel distributed iterations entail reduced-complexity per-node tasks, and affordable message passing among single-hop neighbors. Interestingly, upon convergence the distributed (non-convex) estimator provably attains the global optimum of its centralized counterpart, regardless of initialization. Several application domains are outlined to highlight the generality and impact of the proposed framework. These include unveiling traffic anomalies in backbone networks, predicting networkwide path latencies, and mapping the RF ambiance using wireless cognitive radios. Simulations with synthetic and real network data corroborate the convergence of the novel distributed algorithm, and its centralized performance guarantees.
cs.MA
cs
In-network Sparsity-regularized Rank Minimization: Algorithms and Applications† Morteza Mardani, Gonzalo Mateos, and Georgios B. Giannakis (contact author)∗ Submitted: January 6, 2014 Abstract Given a limited number of entries from the superposition of a low-rank matrix plus the product of a known fat compression matrix times a sparse matrix, recovery of the low-rank and sparse components is a fundamental task subsuming compressed sensing, matrix completion, and principal components pursuit. This paper develops algorithms for distributed sparsity-regularized rank minimization over networks, when the nuclear- and ℓ1 -norm are used as surrogates to the rank and nonzero entry counts of the sought matrices, respectively. While nuclear-norm minimization has well-documented merits when centralized processing is viable, non-separability of the singular-value sum challenges its distributed minimization. To overcome this limitation, an alternative characterization of the nuclear norm is adopted which leads to a separable, yet non-convex cost minimized via the alternating-direction method of multipliers. The novel distributed iterations entail reduced-complexity per-node tasks, and affordable message passing among single-hop neighbors. Interestingly, upon convergence the distributed (non-convex) estimator provably attains the global optimum of its centralized counterpart, regardless of initialization. Several application domains are outlined to highlight the generality and impact of the proposed framework. These include unveiling traffic anomalies in backbone networks, predicti ng networkwide path latencies, and mapping the RF ambiance using wireless cognitive radios. Simulations with synthetic and real network data corroborate the convergence of the novel distributed algorithm, and its centralized performance guarantees. Index Terms Distributed optimization, sparsity, nuclear norm, low rank, networks, Lasso, matrix completion. EDICS Category: SEN-DIST, SPC-APPL, SEN-COLB. 2 1 0 2 r a M 7 ] A M . s c [ 1 v 0 7 5 1 . 3 0 2 1 : v i X r a † Work in this paper was supported by the MURI Grant No. AFOSR FA9550-10-1-0567. Parts of the paper appeared in the Proc. of the 45th Asilomar Conference on Signals, Systems, and Computers, Paci fic Grove, CA, Nov. 6-9, 2011, and were submitted to the 13th Workshop on Signal Processing Advances in Wireless Communications, Cesme, Turkey, Jun. 17-20, 2012. ∗ The authors are with the Dept. of Electrical and Computer Engineering, University of Minnesota, 200 Union Street SE, Minneapolis, MN 55455. Tel/fax: (612)626-7781/625-4583; Emails: {morteza,mate0058,georgios}@umn.edu IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 1 I . INTRODUCT ION Let X := [xl,t ] ∈ RL×T be a low-rank matrix [rank(X) ≪ min(L, T )], and A := [af ,t ] ∈ RF ×T be a sparse matrix with support size considerably smaller than F T . Consider also a matrix R := [rl,t ] ∈ RL×F and a set Ω ⊆ {1, . . . , L} × {1, . . . , T } of index pairs (l, t) that de fine a sampling of the entries of X. Given R and a number of (possibly) noise corrupted measurements F Xf =1 the goal is to estimate low-rank X and sparse A, by denoising the observed entries and imputing the rl,f af ,t + vl,t , (1) yl,t = xl,t + (l, t) ∈ Ω missing ones. Introducing the sampling operator PΩ (·) which sets the entries of its matrix argument not in Ω to zero and leaves the rest unchanged, the data model can be compactly written in matrix form as PΩ (Y) = PΩ (X + RA + V). (2) A natural estimator accounting for the low rank of X and the sparsity of A will be sought to fit the data PΩ (Y) in the least-squares (LS) error sense, as well as minimize the rank of X, and the number of nonzero entries of A measured by its ℓ0 -(pseudo) norm; see e.g. [9], [21], [8], [12] for related problems subsumed by the one described here. Unfortunately, both rank and ℓ0 -norm minimization are in general NP-hard problems [13], [24]. Typically, the nuclear norm kXk∗ := Pk σk (X) (σk (X) denotes the k-th singular value of X) and the ℓ1 -norm kAk1 := Pf ,t af ,t are adopted as surrogates, since they are the closest convex approximants to rank(X) and kAk0 , respectively [11], [25], [32]. Accordingly, one solves 1 kPΩ (Y − X − RA)k2 (P1) F + λ∗kXk∗ + λ1kAk1 min 2 {X,A} where λ∗ , λ1 ≥ 0 are rank- and sparsity-controlling parameters. Being convex (P1) is appealing, and some of its special instances are known to attain good performance in theory and practice. For instance, when no data are missing (P1) can be used to unveil traffic anomalie s in networks [21]. Results in [21] show that X and A can be exactly recovered in the absence of noise, even when R is a fat (compression) operator. When R equals the identity matrix, (P1) reduces to the so-termed robust principal component analysis (PCA), for which exact recovery results are available in [8] and [12]. Moreover, for the special case R ≡ 0L×F , (P1) offers a low-rank matrix completion alternative with well-documented merits; see e.g., [10] and [9]. Stable recovery results in the presence of noise are also available for matrix completion and robust PCA [9], [35]. Earlier efforts dealing with the recovery of sparse vectors in noise led to similar performance guarantees; see e.g., [6]. In all these works, the samples PΩ (Y) and matrix R are assumed centrally available, so that they can be jointly processed to estimate X and A by e.g., solving (P1). Collecting all this information can be IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 2 challenging though in various applications of interest, or may be even impossible in e.g., wireless sensor networks (WSNs) operating under stringent power budget constraints. In other cases such as the Internet or collaborative marketing studies, agents providing private data for e.g., fitting a low-rank preference model, may not be willing to share their training data but only the learning results. Performing the optimization in a centralized fashion raises robustness concerns as well, since the central processor represents an isolated point of failure. Scalability is yet another driving force motivating distributed solutions. Several customized iterative algorithms have been proposed to solve instances of (P1), and have been shown effective in tackling low- to medium-size problems; see e.g., [21], [10], [25]. However, most algorithms require computation of singular values per iteration and become prohibitively expensive when dealing with high-dimensional data [26]. All in all, the aforementioned reasons motivate the reduced-complexity distributed algorithm for nuclear and ℓ1 -norm minimization developed in this paper. In a similar vein, stochastic gradient algorithms were recently developed for large-scale problems entailing regularization with the nuclear norm [26]. Even though iterations in [26] are highly paralellizable, they are not applicable to networks of arbitrary topology. There are also several studies on distributed estimation of sparse signals via ℓ1 -norm regularized regression; see e.g., [14], [17], [22]. Different from the treatment here, the data model of [22] is devoid of a low-rank component and all the observations Y are assumed available (but distributed across several interconnected agents). Formally, the model therein is a special case of (2) with T = 1, X = 0L×T , and Ω = {1, . . . , L} × {1, . . . , T }, in which case (P1) boils down to finding the least-absolute shrinkage and selec tion operator (Lasso) [31]. Building on the general model (2) and the centralized estimator (P1), this paper develops decentralized algorithms to estimate low-rank and sparse matrices, based on in-network processing of a small subset of noise-corrupted and spatially-distributed measurements (Section III). This is a challenging task however, since the non-separable nuclear-norm present in (P1) is not amenable to distributed minimization. To overcome this limitation, an alternative characterization of the nuclear norm is adopted in Section III-A, which leads to a separable yet non-convex cost that is minimized via the alternating-direction method of multipliers (AD-MoM) [5]. The novel distributed iterations entail reduced-complexity optimization subtasks per agent, and affordable message passing only between single-hop neighbors (Section III-C). Interestingly, the distributed (non-convex) estimator upon convergence provably attains the global optimum of its centralized counterpart (P1), regardless of initialization. To demonstrate the generality of the proposed estimator and its algorithmic framework, four networking-related application domains are outlined in Section IV, namely: i) unveiling traffic volume anomalies fo r large-scale networks [19], [21]; ii) robust PCA [8], [12]; iii) low-rank matrix completion for networkwide path latency prediction [20], and iv) spectrum sensing for cognitive radio (CR) networks [4], [22]. Numerical tests with synthetic and real IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 3 network data drawn from these application domains corroborate the effectiveness and convergence of the novel distributed algorithms, as well as their centralized performance benchmarks (Section V). Section VI concludes the paper, while several technical details are deferred to the Appendix. Notation: Bold uppercase (lowercase) letters will denote matrices (column vectors), and calligraphic letters will be used for sets. Operators (·)′ , tr(·), σmax (·), ⊙ and ⊗, will denote transposition, matrix trace, maximum singular value, Hadamard product, and Kronecker product, respectively; · will be used for the cardinality of a set, and the magnitude of a scalar. The matrix vectorization operator vec(Z) stacks the columns of matrix Z on top of each other to return a supervector, and its inverse is unvec(z). The diagonal matrix diag(v) has the entries of v on its diagonal, and the positive semide finite matrix M will be denoted by M (cid:23) 0. The ℓp -norm of x ∈ Rn is kxkp := (Pn i=1 xi p )1/p for p ≥ 1. For two matrices M, U ∈ Rn×n , hM, Ui := tr(M′U) denotes their trace inner product. The Frobenious norm of matrix M = [mi,j ] ∈ Rn×p is kMkF := ptr(MM′ ), kMk := maxkxk2=1 kMxk2 is the spectral norm, kMk1 := Pi,j mi,j is the ℓ1 -norm, kMk∞ := maxi,j mi,j is the ℓ∞ -norm, and kMk∗ := Pi σi (M) is the nuclear norm, where σi (M) denotes the i-th singular value of M. The n × n identity matrix will be represented by In , while 0n will stand for n × 1 vector of all zeros, and 0n×p := 0n0′ p . Similar notations will be adopted for vectors (matrices) of all ones. I I . PREL IM INAR IE S AND PROBLEM STATEMENT Consider N networked agents capable of performing some local computations, as well as exchanging messages among directly connected neighbors. An agent should be understood as an abstract entity, e.g., a sensor in a WSN, a router monitoring Internet traffic; or a se nsing CR from a next-generation commu- nications technology. The network is modeled as an undirected graph G(N , L), where the set of nodes N := {1, . . . , N } corresponds to the network agents, and the edges (links) in L := {1, . . . , L} represent pairs of agents that can communicate. Agent n ∈ N communicates with its single-hop neighboring peers in Jn , and the size of the neighborhood will be henceforth denoted by Jn . To ensure that the data from an arbitrary agent can eventually percolate through the entire network, it is assumed that: (a1) Graph G is connected; i.e., there exists a (possibly) multi-hop path connecting any two agents. With reference to the low-rank and sparse matrix recovery problem outlined in Section I, in the network setting envisioned here each agent n ∈ N acquires a few incomplete and noise-corrupted rows of matrix Y . Specifically, the local data available to agent n is matrix PΩn (Yn ), where Yn ∈ RLn×T , PN n=1 Ln = L, N ]′ = X + RA + V. The index pairs in Ωn are those in Ω for which the row and Y := [Y ′ 1 , . . . , Y ′ index matches the rows of Y observed by agent n. Additionally, suppose that agent n has available the Ln×F , containing a row subset of R associated with the observed rows in Yn , i.e, local matrix Rn ∈ R IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 4 N ]′ . Agents collaborate to form the wanted estimator (P1) in a distributed fashion, which R := [R′ 1 , . . . , R′ can be equivalently rewritten as N kAk1 (cid:21) . Xn=1 (cid:20) 1 2 The objective of this paper is to develop a distributed algorithm for sparsity-regularized rank minimization via (P1), based on in-network processing of the locally available data. The described setup naturally kPΩn (Yn − Xn − RnA)k2 F + min {X,A} kXk∗ + λ∗ N λ1 N suggests three characteristics that the algorithm should exhibit: c1) agent n ∈ N should obtain an estimate of Xn and A, which coincides with the corresponding solution of the centralized estimator (P1) that uses the entire data PΩ (Y); c2) processing per agent should be kept as simple as possible; and c3) the overhead for inter-agent communications should be affordable and con fined to single-hop neighborhoods. I I I . D ISTR IBUTED ALGOR ITHM FOR IN -NETWORK O PERAT ION To facilitate reducing the computational complexity and memory storage requirements of the distributed algorithm sought, it is henceforth assumed that: (a2) An upper bound ρ ≥ rank( X) on the rank of matrix X obtained via (P1) is available. As argued next, the smaller the value of ρ, the more efficient the algorithm becomes. A small value of ρ is well motivated in various applications. For example, the Internet traffic analysis of backbone networks in [19] demonstrates that origin-to-destination flows have a very low intrinsic dimensionality, which renders the traffic matrix low rank; see also Section IV-A. In additio n, recall that rank( X) is controlled by the choice of λ∗ in (P1), and the rank of the solution can be made small enough, for sufficiently large λ∗ . Because rank( X) ≤ ρ, (P1)’s search space is effectively reduced and one can factorize the decision variable as X = LQ′ , where L and Q are L × ρ and T × ρ matrices, respectively. Adopting this reparametrization (P2) of X in (P1), one obtains the following equivalent optimization problem N Xn=1 (cid:20) 1 kAk1 (cid:21) 2 N ]′ . The number of variables is 1 , . . . , L′ which is non-convex due to the bilinear terms LnQ′ , and L := [L′ reduced from LT + F T in (P1), to ρ(L + T ) + F T in (P2). The savings can be significant when ρ is in the kPΩn (Yn − LnQ′ − RnA)k2 F + kLQ′k∗ + min {L,Q,A} λ∗ N λ1 N order of a few dozens, and both L and T are large. The dominant F T -term in the variable count of (P3) is due to A, which is sparse and can be efficiently handled even when both F and T are large. Problem (P3) is still not amenable to distributed implementation due to: (i) the non-separable nuclear norm present in the cost function; and (ii) the global variables Q and A coupling the per-agent summands. IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 5 A. A separable nuclear norm regularization To address (i), consider the following neat characterization of the nuclear norm [25], [26] 1 2 (cid:8)kLk2 F + kQk2 F (cid:9) , 1/2 For an arbitrary matrix X with SVD X = UX ΣX V′ X , the minimum in (3) is attained for L = UX Σ X 1/2 X . The optimization (3) is over all possible bilinear factorizations of X, so that the and Q = VX Σ number of columns of L and Q is also a variable. Leveraging (3), the following reformulation of (P2) kXk∗ := min {L,Q} s. to X = LQ′ . (3) (P3) provides an important first step towards obtaining a distrib uted estimator: N Xn=1 (cid:20) 1 kAk1 (cid:21) . λ∗ F + kQk2 2N (cid:8)N kLnk2 F (cid:9) + 2 As asserted in the following lemma, adopting the separable Frobenius-norm regularization in (P3) comes with no loss of optimality, provided the upper bound ρ is chosen large enough. kPΩn (Yn − LnQ′ − RnA)k2 F + min {L,Q,A} λ1 N Lemma 1: Under (a2), (P3) is equivalent to (P1). Proof: Let { X, A} denote the minimizer of (P1). Clearly, rank( X) ≤ ρ, implies that (P2) is equivalent to (P1). From (3) one can also infer that for every feasible solution {L, Q, A}, the cost in (P3) is no smaller than that of (P2). The gap between the globally minimum costs of (P2) and (P3) vanishes at ¯A := A, ¯L := U Σ1/2 , and ¯Q := V Σ1/2 , where X = U Σ V′ . Therefore, the cost functions of (P1) and (P3) are identical at the minimum. Lemma 1 ensures that by finding the global minimum of (P3) [whi ch could have significantly less variables than (P1)], one can recover the optimal solution of (P1). However, since (P3) is non-convex, it may have stationary points which need not be globally optimum. Interestingly, the next proposition shows that under relatively mild assumptions on rank( X) and the noise variance, every stationary point of (P3) is globally optimum for (P1). For a proof, see Appendix A. Proposition 1: Let { ¯L, ¯Q, ¯A} be a stationary point of (P3). If kPΩ (Y − ¯L ¯Q′ − R ¯A)k ≤ λ∗ (no subscript in k.k signifies spectral norm), then { X = ¯L ¯Q′ , A = ¯A} is the globally optimal solution of (P1). Condition kPΩ (Y − ¯L ¯Q′ − R ¯A)k ≤ λ∗ captures tacitly the role of ρ, the number of columns of L and Q in the postulated model. In particular, for sufficiently sma ll ρ the residual kPΩ (Y − ¯L ¯Q′ − R ¯A)k becomes large and consequently the condition is violated (unless λ∗ is large enough, in which case a sufficiently low-rank solution to (P1) is expected). This is manifested through the fact that the extra condition rank( X) ≤ ρ in Lemma 1 is no longer needed. In addition, note that the noise variance certainly affects the value of kPΩ (Y − ¯L ¯Q′ − R ¯A)k, and thus satisfaction of the said condition. IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 6 B. Local variables and consensus constraints To decompose the cost function in (P3), in which summands are coupled through the global variables Q and A [cf. (ii) at the beginning of this section], introduce auxiliary variables {Qn , An}N n=1 representing local estimates of {Q, A} per agent n. These local estimates are utilized to form the separable constrained minimization problem (P4) min {L,Qn ,An ,Bn} kPΩn (Yn − LnQ′ n − RnBn )k2 F + N Xn=1 (cid:20) 1 2 s. to Bn = An , n ∈ N λ∗ 2N (cid:8)N kLnk2 F + kQnk2 F (cid:9) + λ1 N kAnk1(cid:21) Qn = Qm , An = Am , m ∈ Jn , n ∈ N . For reasons that will become clear later on, additional variables {Bn }N n=1 were introduced to split the ℓ1−norm regularization on the {An}N n=1 (cf. ℓ2−norm fitting-error part of the cost of (P4), from the Remark 3). These extra variables are not needed if R′R = IF . The set of additional constraints Bn = An ensures that, in this sense, nothing changes in going from (P3) to (P4). Most importantly, (P3) and (P4) are equivalent optimization problems under (a1). The equivalence should be understood in the sense that Q1 = Q2 = . . . = QN = Q and likewise for A, where { Qn , An}n∈N and { Q, A} are the optimal solutions of (P4) and (P3), respectively. Of course, the corresponding estimates of L will coincide as well. Even though consensus is a fortiori imposed within neighborhoods, it extends to the whole (connected) network and local estimates agree on the global solution of (P3). To arrive at the desired distributed algorithm, it is convenient to reparametrize the consensus constraints in (P4) as n = Fm n , and ¯Fm n , Qm = Fm Qn = ¯Fm n , m ∈ Jn , n ∈ N n = Gm n , and ¯Gm n , Am = Gm An = ¯Gm n , m ∈ Jn , n ∈ N (4) (5) n }m∈Jn where { ¯Fm n , Fm n , ¯Gm n , Gm n∈N are auxiliary optimization variables that will be eventually eliminated. C. The alternating-direction method of multipliers To tackle the constrained minimization problem (P4), associate Lagrange multipliers Mn with the splitting constraints Bn = An , n ∈ N . Likewise, associate additional dual variables ¯Cm n ( ¯Dm n and Cm n and Dm n ) with the first pair of consensus constraints in (4) [respect ively (5)]. Next introduce the quadratically augmented Lagrangian function N Xn=1 (cid:20) 1 2 λ∗ 2N (cid:8)N kLn k2 F + kQnk2 F (cid:9) + kPΩn (Yn − LnQ′ n − RnBn )k2 F + λ1 N kAnk1(cid:21) Lc (V1 , V2 , V3 , M) = IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 7 + + + c 2 kBn − Ank2 F N N Xn=1 Xn=1 hMn , Bn − An i + N Xn=1 Xm∈Jn nh ¯Cm n io n i + h Dm n , An − ¯Gm n i + h ¯Dm n , Qm − Fm n i + h Cm n , Qn − ¯Fm n , Am − Gm N c F o Xn=1 Xm∈Jn nkQn − ¯Fm F + kAm − Gm F + kAn − ¯Gm F + kQm − Fm n k2 n k2 n k2 n k2 (6) 2 where c is a positive penalty coefficient, and the primal variables a re split into three groups V1 := n=1 , and V3 := {Bn , ¯Fm n , Fm n , ¯Gm n , Gm n }m∈Jn n=1 , V2 := {Ln}N {Qn , An}N n∈N . For notational convenience, n }m∈Jn n , ¯Dm n , Cm n , Dm collect all multipliers in M := {Mn , ¯Cm n∈N . Note that the remaining constraints in (4) and (5), namely CV := { ¯Fm n = Fm n , ¯Gm n = Gm n , m ∈ Jn , n ∈ N }, have not been dualized. To minimize (P4) in a distributed fashion, a variation of the alternating-direction method of multipliers (AD-MoM) will be adopted here. The AD-MoM is an iterative augmented Lagrangian method especially well-suited for parallel processing [5], which has been proven successful to tackle the optimization tasks encountered e.g., with distributed estimation problems [22], [28]. The proposed solver entails an iterative procedure comprising four steps per iteration k = 1, 2, . . . [S1] Update dual variables: Mn [k ] = Mn [k − 1] + µ(Bn [k ] − An [k ]), n ∈ N n [k − 1] + µ(Qn [k ] − ¯Fm n [k ] = ¯Cm ¯Cm n [k ]), n ∈ N , m ∈ Jn n [k − 1] + µ(Qm [k ] − Fm n [k ] = Cm Cm n [k ]), n ∈ N , m ∈ Jn n [k − 1] + µ(An [k ] − ¯Gm n [k ] = ¯Dm ¯Dm n [k ]), n ∈ N , m ∈ Jn n [k − 1] + µ(Am [k ] − Gm n [k ] = Dm Dm n [k ]), n ∈ N , m ∈ Jn [S2] Update first group of primal variables: V1 [k + 1] = arg min V1 Lc (V1 , V2 [k ], V3 [k ], M[k ]) . [S3] Update second group of primal variables: V2 [k + 1] = arg min V2 Lc (V1 [k + 1], V2 , V3 [k ], M[k ]) . [S4] Update auxiliary primal variables: V3 [k + 1] = arg min V3∈CV Lc (V1 [k + 1], V2 [k + 1], V3 , M[k ]) . (7) (8) (9) (10) (11) (12) (13) (14) This four-step procedure implements a block-coordinate descent method with dual variable updates. At each step while minimizing the augmented Lagrangian, the variables not being updated are treated as IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 8 Algorithm 1 : AD-MoM solver per agent n ∈ N input Yn , Rn , λ∗ , λ1 , c, µ initialize Mn [0] = Pn [0] = An [1] = Bn [1] = 0F ×T , O[0] = 0T ×ρ , and Ln [1], Qn [1] at random for k = 1, 2,. . . do Receive {Qm [k ], Am [k ]} from neighbors m ∈ Jn [S1] Update local dual variables: (Qn [k ] − Qm [k ]) Mn [k ] = Mn [k − 1] + µ(Bn [k ] − An [k ]) On [k ] = On [k − 1] + µ Pm∈Jn Pn [k ] = Pn [k − 1] + µ Pm∈Jn (An [k ] − Am [k ]) [S2] Update first group of local primal variables: Qn [k + 1] = arg minQ (cid:26)rn (Ln [k ], Q, Bn [k ]) + λ∗ F + hOn [k ], Qi + c Pm∈Jn (cid:13)(cid:13)(cid:13) Q − Qn [k]+Qm [k] 2N kQk2 2 An [k + 1] = [c(1 + 2Jn )]−1Sλ1 /N (cid:0)Mn [k ] + cBn [k ] − Pn [k ] + c Pm∈Jm (An [k ] + Am [k ])(cid:1) [S3] Update second group of local primal variables: Ln [k + 1] = arg minL (cid:8)rn (L, Qn [k + 1], Bn [k ]) + λ∗ 2 kLk2 F (cid:9) [S4] Update auxiliary local primal variables: Bn [k + 1] = arg minB (cid:8)rn (Ln [k + 1], Qn [k + 1], B) + hMn [k ], Bi + c 2 kB − An [k + 1]k2 F (cid:9) Broadcast {Qn [k + 1], An [k + 1]} to neighbors m ∈ Jn end for return An , Qn , Ln F (cid:27) 2 (cid:13)(cid:13)(cid:13) fixed and are substituted with their most up to date values. Di fferent from AD-MoM, the alternating- minimization step here generally cycles over three groups of primal variables V1 -V3 (cf. two groups in AD-MoM [5]). In some special instances detailed in Sections IV-C and IV-D, cycling over two groups of variables only is sufficient. In [S1], µ > 0 is the step size of the subgradient ascent iterations (7)-(11). While it is common in AD-MoM implementations to select µ = c, a distinction between the step size and the penalty parameter is made explicit here in the interest of generality. Reformulating the estimator (P1) to its equivalent form (P4) renders the augmented Lagrangian in (6) highly decomposable. The separability comes in two flavors, both with respect to the variable groups V1 , V2 , and V3 , as well as across the network agents n ∈ N . This in turn leads to highly parallelized, simplified recursions corresponding to the aforementioned four steps. Specifically, it is shown in Appendix B that if the multipliers are initialized to zero, [S1]-[S4] constitute the distributed algorithm tabulated under Algorithm 1. For conciseness in presenting the algorithm, de fine the local residuals rn (Ln , Qn , Bn ) := 1 2 kPΩn (Yn − LnQ′ n − RnBn )k2 F . In addition, de fine the soft-thresholding matrix Sτ (M) with (i, j )-th entry given by sign(mi,j ) max{mi,j − τ , 0}, where mi,j denotes the (i, j )-th entry of M. IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 9 Remark 1 (Simplification of redundant variables): Careful inspection of Algorithm 1 reveals that the inherently redundant auxiliary variables and multipliers { ¯Fm n , Dm n , Cm n , Gm n , ¯Gm n , Fm n } have been elimi- nated. Agent n does not need to separately keep track of all its non-redundant multipliers { ¯Cm n , ¯Dm n }m∈Jn , ¯Dm ¯Cm n [k ]. n [k ] and Pn [k ] := 2 Pm∈Jn but only to update their respective (scaled) sums On [k ] := 2 Pm∈Jn Remark 2 (Computational and communication cost): The main computational burden of the algorithm stems from solving unconstrained quadratic programs locally to update Qn , Ln , Bn , and to carry out simple soft-thresholding operations to update An . On a per iteration basis, network agents communicate their updated local estimates {Qn [k ], An [k ]} with their neighbors, to carry out the updates of the primal and dual variables during the next iteration. Regarding communication cost, Qn [k ] is a T × ρ matrix and its transmission does not incur significant overhead when ρ is small. In addition, the F × T matrix An [k ] is sparse, and can be communicated efficiently. Observe that th e dual variables need not be exchanged. Remark 3 (General sparsity-promoting regularization): Even though λ1kAk1 was adopted in (P1) to encourage sparsity in the entries of A, the algorithmic framework here can accommodate more general structured sparsity-promoting penalties ψ(A). To maintain the per-agent computational complexity at affordable levels, the minimum requirement on the admissible penalties is that the proximal operator A (cid:20) 1 F + ψ(A)(cid:21) proxψ ( Y) := arg min k Y − Ak2 2 is given in terms of vector or (and) scalar soft-thresholding operators. In addition to the ℓ1 -norm (Lasso penalty), this holds for the sum of row-wise ℓ2 -norms (group Lasso penalty [33]), or, a linear combination of the aforementioned two – the so-termed hierarchical Lass o penalty that encourages sparsity across and (15) within the rows of A [29]. All this is possible since by introducing the cost-splitting variables Bn , the local sparse matrix updates are An [k + 1] = proxψ ( Yn [k ]) for suitable Yn [k ] (see Appendix B). When employed to solve non-convex problems such as (P4), AD-MoM (or its variant used here) offers no convergence guarantees. However, there is ample experimental evidence in the literature which supports convergence of AD-MoM, especially when the non-convex problem at hand exhibits “favorable ” structure. For instance, (P4) is bi-convex and gives rise to the strictly convex optimization subproblems (12)-(14), which admit unique closed-form solutions per iteration. This observation and the linearity of the constraints endow Algorithm 1 with good convergence properties – extens ive numerical tests including those presented in Section V demonstrate that this is indeed the case. While a formal convergence proof goes beyond the scope of this paper, the following proposition proved in Appendix C asserts that upon convergence, Algorithm 1 attains consensus and global optimality. Proposition 2: If the sequence of iterates {Qn [k ], Ln [k ], An [k ]}n∈N generated by Algorithm 1 converge to { ¯Qn , ¯Ln , ¯An}n∈N , and (a1) holds, then: i) ¯Qn = ¯Qm , ¯An = ¯Am , n, m ∈ N ; and ii) if kPΩ (Y − IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 10 1 − R ¯A1 )k ≤ λ∗ , then X = ¯L ¯Q′ ¯L ¯Q′ 1 and A = ¯A1 , where { A, X} is the global optimum of (P1). IV. A P PL ICAT ION S This section outlines a few applications that could bene fit f rom the distributed sparsity-regularized rank minimization framework described so far. In each case, the problem statement calls for estimating low- rank X and (or) sparse A, given distributed data adhering to an application-dependent model subsumed by (2). Customized algorithms are thus obtained as special cases of the general iterations in Algorithm 1. A. Unveiling traffic anomalies in backbone networks In the backbone of large-scale networks, origin-to-destination (OD) traffic flows experience abrupt changes which can result in congestion, and limit the quality of service provisioning of the end users. These so-termed traffic volume anomalies could be due to external sources such as network failures, denial of service attacks, or, intruders which hijack the network services [30] [19]. Unveiling such anomalies is a crucial task towards engineering network traffic. This is a challenging task however, since the available data are usually high-dimensional noisy link-load measurements, which comprise the superposition of unobservable OD flows as explained next. The network is modeled as in Section II, and transports a set of end-to-end flows F (with F := F ) associated with specific source-destinations pairs. For ba ckbone networks, the number of network layer flows is typically much larger than the number of physical lin ks (F ≫ L). Single-path routing is considered here to send the traffic flow from a source to its intended desti nation. Accordingly, for a particular flow multiple links connecting the corresponding source-destination pair are chosen to carry the traffic. Sparing details that can be found in [21], the traffic Y := [yl,t ] ∈ RL×T carried over links l ∈ L and measured at time instants t ∈ [1, T ] can be compactly expressed as Y = R (Z + A) + V (16) where the fat routing matrix R := [rℓ,f ] ∈ {0, 1}L×F is fixed and given, Z := [zf ,t ] denotes the unknown “clean ” traffic flows over the time horizon of interest, and A := [af ,t ] collects the traffic volume anomalies. These data are distributed. Agent n acquires a few rows of Y corresponding to the link-load traffic measurements Yn ∈ RLn×T from its outgoing links, and has available its local routing table Rn which indicates the OD flows routed through n. Assuming a suitable ordering of links, the per agent quantities N ]′ . N ]′ and R := [R′ 1 , . . . , R′ 1 , . . . , Y ′ relate to their global counterparts in (16) through Y := [Y ′ Common temporal patterns among the traffic flows in addition t o their periodic behavior, render most rows (respectively columns) of Z linearly dependent, and thus Z typically has low rank [19]. Anomalies IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 11 are expected to occur sporadically over time, and only last for short periods relative to the (possibly long) measurement interval [1, T ]. In addition, only a small fraction of the flows are supposed t o be anomalous at any given time instant. This renders the anomaly matrix A sparse across rows and columns. Given local measurements {Yn}n∈N and the routing tables {Rn }n∈N , the goal is to estimate A in a distributed fashion, by capitalizing on the sparsity of A and the low-rank property of Z. Since the primary goal is to recover A, de fine X := RZ which inherits the low-rank property from Z, and consider [cf. (16)] Y = X + RA + V. (17) Model (17) is a special case of (2), when all the entries of Y are observed, i.e., Ω = {1, . . . , L} × {1, . . . , T }. Note that RA is not sparse even though A is itself sparse, hence principal components pursuit is not applicable here [35]. Instead, the following estimator is adopted to unveil network anomalies [21] N Xn=1 (cid:20) 1 kAk1 (cid:21) 2 which is subsumed by (P1). Accordingly, a distributed algorithm can be readily obtained by simplifying the general iterations under Algorithm 1, the subject dealt with next. { X, A} = arg min {X,A} λ∗ N kYn − Xn − RnAk2 F + kXk∗ + λ1 N Distributed Algorithm for Unveiling Network Anomalies (DUNA). For the specific case here in which Ω = {1, . . . , L} × {1, . . . , T }, the residuals in Algorithm 1 reduce to rn (Ln , Qn , Bn ) := 1 2 kYn − LnQ′ n − RnBnk2 F . Accordingly, to update the primal variables Qn [k + 1], Ln [k + 1] and Bn [k + 1] as per Algorithm 1, one needs to solve respective unconstrained strictly convex quadratic optimization problems. These admit closed-form solutions detailed under Algorithm 2. The DUNA updates of the local anomaly matrices An [k + 1] are given in terms of soft-thresholding operations, exactly as in Algorithm 1. Conceivably, the number of flows F can be quite large, thus inverting the F × F matrix R′ nRn + cIF to update Bn [k + 1] could be complex computationally. Fortunately, the inversion needs to be carried out once, and can be performed and cached off-line. In addition, to reduce the inversion cost, the SVD of the local routing matrices Rn = URn ΣRn V′ can be obtained first, and the matrix inversion Rn lemma can be subsequently employed to obtain [R′ nRn + cIF ]−1 = (1/c) (cid:2)Ip − VRn CV′ Rn (cid:3), where p (cid:17) and p = rank(Rn ) ≪ F . This computational shortcut is commonly adopted C := diag (cid:16) σ2 σ2 p 1 c+σ2 c+σ2 1 in statistical learning algorithms when ridge regression estimates are sought, and the number of variables is much larger than the number of elements in the training set [15, Ch. 18]. During the operational phase , ..., of the algorithm, the main computational burden of DUNA comes from repeated inversions of (small) ρ × ρ matrices, and parallel soft-thresholding operations. The communication overhead is identical to the one incurred by Algorithm 1 (cf. Remark 2). Remark 4 (Incomplete link traffic measurements): In general, one can allow for missing traffic data and the DUNA updates are still expressible in closed form. IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 12 Algorithm 2 : DUNA per agent n ∈ N input Yn , Rn , λ∗ , λ1 , c, µ initialize Mn [0] = Pn [0] = An [1] = Bn [1] = 0F ×T , O[0] = 0T ×ρ , and Ln [1], Qn [1] at random for k = 1, 2,. . . do Receive {Qm [k ], Am [k ]} from neighbors m ∈ Jn [S1] Update local dual variables: (Qn [k ] − Qm [k ]) Mn [k ] = Mn [k − 1] + µ(Bn [k ] − An [k ]) On [k ] = On [k − 1] + µ Pm∈Jn Pn [k ] = Pn [k − 1] + µ Pm∈Jn (An [k ] − Am [k ]) [S2] Update first group of local primal variables: n [k ]Ln [k ] + (λ∗ /N + 2cJn )Iρ ]−1 Qn [k+1] = (cid:8)Y′ (Qn [k ] + Qm [k ])(cid:9) [L′ n [k ]R′ nLn [k ] − B′ nLn [k ] − On [k ] + c Pm∈Jn An [k + 1] = [c(1 + 2Jn )]−1Sλ1 /N (cid:0)Mn [k ] + cBn [k ] − Pn [k ] + c Pm∈Jm (An [k ] + Am [k ])(cid:1) [S3] Update second group of local primal variables: n [k + 1]Qn [k + 1] + λ∗ Iρ ]−1 Ln [k + 1] = (Yn − RnBn [k ]) Qn [k + 1] [Q′ [S4] Update auxiliary local primal variables: nRn + cIF ]−1 {R′ Bn [k + 1] = [R′ n(Yn − Ln [k + 1]Q′ n [k + 1]) − Mn [k ] + cAn [k + 1]} Broadcast {Qn [k + 1], An [k + 1]} to neighbors m ∈ Jn end for return An , Qn , Ln B. In-network robust principal component analysis Principal component analysis (PCA) is the workhorse of high-dimensional data analysis and dimension- ality reduction, with numerous applications in statistics, networking, engineering, and the biobehavioral sciences; see, e.g., [18]. Nowadays ubiquitous e-commerce sites, complex networks such as the Web, and urban traffic surveillance systems generate massive volume s of data. As a result, extracting the most in- formative, yet low-dimensional structure from high-dimensional datasets is of paramount importance [15]. Data obeying postulated low-rank models include also outliers, which are samples not adhering to those nominal models. Unfortunately, similar to LS estimates PCA is very sensitive to the outliers [18]. While robust approaches to PCA are available, recently polynomial-time algorithms with remarkable performance guarantees have emerged for low-rank matrix recovery in the presence of sparse – but otherwise arbitrarily large – errors [8], [12], [35]. Robust PCA is of great interes t in networking-related applications. One can think of distributed estimation using reduced-dimensionality sensor observations [27], and unveiling anomalous flows in backbone networks from Netflow data [2]; se e also Section V-B. IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 13 In the network setting of Section II, each agent n ∈ N acquires Fn outlier-plus-noise corrupted rows N ]′ , where PN 1 , . . . , Y ′ of matrix Y := [Y ′ n=1 Fn = F . Local data can thus be modeled as Yn = Xn + 1 , . . . , X′ N ]′ has low rank. Agents want to estimate Xn (and the outliers An ) An + Vn , where X := [X′ in a distributed fashion by forming the global estimator [35] N Xn=1 (cid:20) 1 2 which is once more a special case of (P1) when R = IF . Distributed Robust Principal Component Analysis (DRPCA) Algorithm. Regarding the general dis- kXk∗ + λ1 kAnk1(cid:21) { X, A} = arg min {X,A} kYn − Xn − Ank2 F + λ∗ N (18) tributed formulation in (P4), the first constraint is no long er needed since R = IF [cf. the discussion after (P4)]. As agent n is interested in estimating An and kAk1 is separable over the rows of A, the only required constraints are Qn = Qm , m ∈ Jn , n ∈ N . These are associated with the dual variables On per agent, and are updated according to Algorithm 3. All in all, each agent stores and recursively updates the primal variables {Qn , Ln}, along with the Fn × T matrix An . Mimicking the procedure that led to Algorithm 1, one finds tha t primal variable updates in DRPCA are expressible in closed form. In particular, the local outlier matrix An [k + 1] minimizes the Lasso cost {An } (cid:26) 1 F + λ1 kAnk1(cid:27) kYn − Ln [k + 1]Q′ n [k + 1] − Ank2 An [k + 1] = arg min 2 and is given in terms of soft-thresholding operations as seen in Algorithm 3 [observe that An [k + 1] = proxk·k1 (Yn − Ln [k + 1]Q′ n [k + 1]), where proxψ (·) is de fined in (15)]. DRPCA iterations are simple with small ρ × ρ matrices inverted per iteration to update Ln and Qn (see Algorithm 3). Regarding communication cost, each agent only broadcasts a T × ρ matrix Qn to its neighbors. C. Distributed low-rank matrix completion The ability to recover a low-rank matrix from a subset of its entries is the leitmotif of recent advances for localization of wireless sensors [23], Internet traffic analysis [20], [34], and preference modeling for recommender systems [3]. In the low-rank matrix completion problem, given a limited number of (possibly) noise corrupted entries of a low-rank matrix X, the goal is to recover the entire matrix while denoising the observed entries, and accurately imputing the missing ones. In the network setting envisioned here, agent n ∈ N has available Ln incomplete and noise-corrupted 1 , . . . , Y ′ N ]′ . Local data can thus be modeled as PΩn (Yn ) = PΩn (Xn + Vn ). Relying rows of Y := [Y ′ on in-network processing, agents aim at completing their own rows by forming the global estimator N Xn=1 (cid:20) 1 kXk∗ (cid:21) 2 kPΩn (Yn − Xn )k2 F + X = arg min X λ∗ N (19) IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 14 Algorithm 3 : DRPCA algorithm per agent n ∈ N input Yn , λ∗ , λ1 , c, µ initialize An [1] = 0Fn×T , O[0] = 0T ×ρ , and Ln [1], Qn [1] at random. for k = 1, 2,. . . do Receive {Qm [k ]} from neighbors m ∈ Jn [S1] Update local dual variables: On [k ] = On [k − 1] + µ Pm∈Jn (Qn [k ] − Qm [k ]) [S2] Update first group of local primal variables: n [k ]Ln [k ] + (λ∗ /N + 2cJn )Iρ ]−1 Qn [k+1] = (cid:8)Y′ (Qn [k ] + Qm [k ])(cid:9) [L′ nLn [k ] − A′ n [k ]Ln [k ] − On [k ] + c Pm∈Jn [S2] Update second group of local primal variables: n [k + 1]Qn [k + 1] + λ∗ Iρ ]−1 Ln [k + 1] = (Yn − An [k ]) Qn [k + 1] [Q′ [S3] Update third group of local primal variables: An [k + 1] = Sλ1 (Yn − Ln [k + 1]Q′ n [k + 1]) Broadcast {Qn [k + 1]} to neighbors m ∈ Jn end for return An , Qn , Ln which exploits the low-rank property of X through nuclear-norm regularization. Estimator (19) was proposed in [9], and solved centrally whereby all data PΩn (Yn ) is available to feed an e.g., off-the- shelf semide finite programming (SDP) solver. The general es timator in (P1) reduces to (19) upon setting R = 0L×F and λ1 = 0. Hence, it is possible to derive a distributed algorithm for low-rank matrix completion by specializing Algorithm 1 to the setting here. Before dwelling into the algorithmic details, a brief parenthesis is in order to touch upon properties of local sampling operators. Operator PΩn is a linear orthogonal projector, since it projects its matrix argument onto the subspace Ψn := {Z ∈ RLn×T : supp(Z) ∈ Ωn} of matrices with support contained in Ωn . Linearity of PΩn implies that vec(PΩn (Z)) = AΩn vec(Z), where AΩn ∈ RLn×T is a symmetric and idempotent projection matrix that will prove handy later on. To characterize AΩn , introduce an Ln × T masking matrix Ωn whose (l, t)-th entry equals one when (l, t) ∈ Ωn , and zero otherwise. Since PΩn (Z) = Ωn ⊙ Z, from standard properties of the vec(·) operator it follows that AΩn = diag(vec(Ωn)). Distributed Matrix Completion (DMC) Algorithm. Going back to the general distributed formulation in (P4), since there is no sparse component A in the matrix completion problem (19), the only constraints that remain are Qn = Qm , m ∈ Jn , n ∈ N . These correspond to the dual variables On [k ] per agent, and are updated as shown in Algorithm 4. In the absence of {An }n∈N and the auxiliary variables {Bn }n∈N , it suffices to cycle over two groups IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 15 of primal variables to arrive at the DMC iterations. The primal variable updates can be readily obtained by λ∗ 2N kQk2 F Qn [k ] + Qm [k ] 2 capitalizing on the properties of the vec(·) operator. In particular, Algorithm 1 indicates that the recursions for Qn are given by [let q := vec(Q′ )] Q (cid:26) 1 kPΩn (Yn − Ln [k ]Q′ )k2 Qn [k + 1] = arg min F + 2 +hOn [k ], Qi + c Xm∈Jn (cid:13)(cid:13)(cid:13)(cid:13) Q − = unvec(cid:18) arg min q (cid:26) 1 kAΩn vec(Yn ) − AΩn (I ⊗ Ln [k ])qk2 + 2 2) (cid:19). ′ [k ]), qi + c Xm∈Jn (cid:13)(cid:13)(cid:13)(cid:13) (cid:13)(cid:13)(cid:13)(cid:13) +hvec(On q − Likewise, Ln is updated by solving the following subproblem per iteration (let l := vec(L)) F (cid:27) L (cid:26) 1 λ∗ kPΩn (Yn − LQ′ kLk2 n [k + 1])k2 F + Ln [k + 1] = arg min 2 2 = unvec (cid:18)arg min l (cid:26) 1 klk2(cid:27)(cid:19) . λ∗ kAΩn vec(Yn ) − AΩn (Qn [k + 1] ⊗ ILn )lk2 + 2 2 Both (20) and (21) are unconstrained convex quadratic problems, which admit the closed-form solutions (cid:13)(cid:13)(cid:13)(cid:13) λ∗ 2N ′ [k ] + Qm 2 F ) 2 kqk2 vec(Qn ′ [k ]) (20) (21) tabulated under Algorithm 4. The per-agent computational complexity of the DMC algorithm is dominated by repeated inversions of ρ × ρ and ρLn × ρLn matrices to obtain En [k + 1] and Dn [k + 1], respectively (see Algorithm 4). Notice that En [k + 1] ∈ RρT ×ρT has block-diagonal structure with blocks of size ρ× ρ. Inversion of ρ× ρ matrices is affordable in practice since ρ is typically small for a number of applications of interest (cf. the low-rank assumption). In addition, Ln is the number of row vectors acquired per agent which can be controlled by the designer to accommodate a prescribed maximum computational complexity. On a per iteration basis, network agents communicate their updated local estimates Qn [k ] only with their neighbors, in order to carry out the updates of primal and dual variables during the next iteration. In terms of communication cost, Qn [k ] is a T × ρ matrix and its transmission does not incur significant overh ead for small values of ρ. Observe that the dual variables On [k ] need not be exchanged, and the overall communication cost does not depend on the network size N . D. Distributed sparse linear regression for spectrum cartography In a classical linear regression setting, training data {Y , R} related through Y = RA + V are given and the goal is to estimate the regression coefficient matrix A based on the LS criterion1 . However, LS 1Even though vector responses and model parameters are typically considered, i.e., y = Ra + v, the matrix notation is retained here for consistency. IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 16 Algorithm 4 : DMC algorithm per agent n ∈ N Input Yn , AΩn , λ∗ , c, µ Initialize O[0] = 0T ×ρ , and Ln [1], Qn [1] at random for k = 1, 2,. . . do Receive {Qm [k ]} from neighbors m ∈ Jn [S1] Update local dual variables: On [k ] = On [k − 1] + µ Pm∈Jn (Qn [k ] − Qm [k ]) [S2] Update first group of local primal variables: n [k ])AΩn (IT ⊗ Ln [k ]) + (λ∗ /N + 2cJn )IρT }−1 En [k + 1] = {(IT ⊗ L′ n [k ]) + cvec(Pm∈Jn n [k ])AΩn vec(Yn ) − vec(O′ n [k+1] = unvec (cid:0)En [k + 1] (cid:8)(IT ⊗ L′ Q′ [S3] Update second group of local primal variables: n [k + 1] ⊗ ILn )AΩn (Qn [k + 1] ⊗ ILn ) + λ∗ IρLn }−1 Dn [k + 1] = {(Q′ n [k + 1] ⊗ ILn )AΩn vec(Yn )) Ln [k + 1] = unvec (Dn [k + 1] (Q′ Broadcast {Qn [k + 1]} to neighbors m ∈ Jn end for Return Qn , Ln m [k ]))(cid:9)(cid:1) (Q′ n [k ] + Q′ often yields unsatisfactory prediction accuracy and fails to provide parsimonious estimates; see e.g., [15]. To deal with such limitations, one can adopt a regularization technique known as Lasso [31]. The general framework in this paper can accommodate distributed estimators of the regression coeffi- cients via Lasso, when the training data are scattered across different agents, and their communication to a central processing unit is prohibited for e.g., communication cost or privacy reasons. With reference to the setup described in Section II, each agent has available the training data {Yn , Rn } and wishes to find N Xn=1 (cid:20) 1 kAk1(cid:21) 2 in a distributed fashion. The Lasso estimator (22) is a special case of (P1) in the absence of a low-rank component; that is when X = 0L×T , and Ω = {1, . . . , L} × {1, . . . , T }. An application domain where this problem arises is spectrum sensing in cognitive radio (CR) networks ALasso := arg min A (22) kYn − RnAk2 F + λ1 N whereby sensing CRs collaborate to estimate the radio-frequency power spectrum density maps Φ(x, f ) across space x ∈ R2 and frequency f ; see [4], [22]. These maps enable identification of opportun isti- cally available spectrum bands for re-use and handoff operation; as well as localization, transmit-power estimation, and tracking of primary user activities. A cooperative approach to spectrum cartography is introduced in [4], based on a basis expansion model IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 17 of Φ(x, f ). Spatially-distributed CRs collect smoothed periodogram samples Yn of the received signal at given sampling frequencies, based on which they want to determine the unknown expansion coefficients in A. The sensing scheme capitalizes on two forms of sparsity: the first one introduced by the narrow-band nature of transmit-PSDs relative to the broad swaths of usable spectrum; and the second one emerging from sparsely located active radios in the operational space. All in all, locating the active transmitters boils down to a variable selection problem, which motivates well employment of the Lasso in (22). Since data are collected by cooperating CRs at different locations, estimation of A amounts to solving a distributed parameter estimation problem which demands taking into account the network topology, and devising a protocol to share the data. All these are accomplished by the algorithm outlined next. Distributed Lasso (DLasso) Algorithm [22]. In the Lasso setting here, (P4) reduces to N Xn=1 (cid:20) 1 kAn k1(cid:21) 2 s. to Bn = An , n ∈ N kYn − RnBn k2 F + min {An ,Bn} λ1 N An = Am , m ∈ Jn , n ∈ N which is a convex optimization problem equivalent to (22). Accordingly, the DLasso algorithm (tabulated under Algorithm 5) is readily obtained from Algorithm 1, after retaining only the update recursions for {An , Bn } and the multipliers {Mn , Pn }. A distributed protocol to select λ1 via K -fold cross valida- tion [15, Ch. 7] is also available in [22], along with numerical tests to assess its performance. Since Lasso in (22) and its separable constrained reformulation are convex optimization problems, the general convergence results for AD-MoM iterations can be invoked to establish convergence of DLasso as well. A detailed proof of the following proposition can be found in [22, App. E]. Proposition 3: Under (a1) and for any value of the penalty coefficient c > 0, the iterates An [k ] converge to the Lasso solution [cf. (22)] as k → ∞, i.e., limk→∞ An [k ] = ALasso , ∀ n ∈ N . V. NUMER ICAL TE ST S This section corroborates convergence and gauges performance of the proposed algorithms, when tested on the applications of Section IV using synthetic and real network data. Synthetic network data. A network of N = 20 agents is considered as a realization of the random geometric graph model, that is, agents are randomly placed on the unit square and two agents communicate with each other if their Euclidean distance is less than a prescribed communication range of 0.35; see Fig. 1. The network graph is bidirectional and comprises L = 106 links, and F = N (N − 1) = 380 OD flows. The entries of V are independent and identically distributed (i.i.d.), zero-mean, Gaussian with variance IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 18 Algorithm 5 : DLasso per agent n ∈ N input Yn , Rn , λ1 , c, µ initialize Mn [0] = Pn [0] = An [1] = Bn [1] = 0F ×T for k = 1, 2,. . . do Receive {Am [k ]} from neighbors m ∈ Jn [S1] Update local primal variables: (An [k ] − Am [k ]) Mn [k ] = Mn [k − 1] + c(Bn [k ] − An [k ]) Pn [k ] = Pn [k − 1] + c Pm∈Jn [S2] Update primal variables: An [k + 1] = [c(1 + 2Jn )]−1Sλ1 /N (cid:0)Mn [k ] + cBn [k ] − Pn [k ] + c Pm∈Jm [S3] Update auxiliary local primal variables: nRn + cIF ]−1 {R′ Bn [k + 1] = [R′ nYn − Mn [k ] + cAn [k + 1]} Broadcast An [k + 1] to neighbors m ∈ Jn end for return An (An [k ] + Am [k ])(cid:1) σ2 ; i.e., vl,t ∼ N (0, σ2 ). Low-rank matrices with rank r are generated from the bilinear factorization model X0 = WZ′ , where W and Z are L × r and T × r matrices with i.i.d. entries drawn from Gaussian distributions N (0, 100/F ) and N (0, 100/T ), respectively. Every entry of A0 is randomly drawn from the set {−1, 0, 1} with Pr(ai,j = −1) = Pr(ai,j = 1) = π/2. Unless otherwise stated, r = 3, ρ = 3 and T = F = 380 are used throughout. Different values of σ , and π are examined. Internet2 network data. Real data including OD flow traffic levels and end-to-end late ncies are collected from the operation of the Internet2 network (Internet backbone network across USA) [1]. Both versions of the Internet2 network, referred as v1 and v2, are considered. OD flow traffic levels are recorded for a three-week operation of Internet2-v1 during Dec. 8 –28, 200 8 [19], and are used to assess performance of DUNA and DRPCA (see Sections V-A and V-B next). Internet2-v1 contains N = 11 agents, L = 41 links, and F = 121 flows. To test the DMC algorithm, end-to-end flow latencies ar e collected from the operation of Internet2-v2 during Aug. 18 –22, 2011 [1]. The Internet2- v2 network comprises N = 9 agents, L = 26 links, and F = 81 flows. Selection of tuning parameters. The sparsity- and rank-controlling parameters λ1 and λ∗ are tuned to optimize performance. The optimality conditions for (P1) indicate that for λ1 > kR′Yk∞ and λ∗ > kYk, {X0 = 0L×T , A0 = 0F ×T } is the unique optimal solution. This in turn con fines the sear ch space for λ1 and λ∗ to the intervals (0, kR′Yk∞ ] and (0, kYk], respectively. In addition, for the case of matrix completion and robust PCA one can use the heuristic rules proposed in e.g., [9] and [8]. IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 19 A. Unveiling network anomalies Data is generated from Y = R(X0 +A0)+V, where the routing matrix R is obtained after determining shortest-path routes of the OD flows. For µ = c = 0.1, DUNA is run until convergence is attained. These values were experimentally chosen to obtain the fastest convergence rate. The time evolution of consensus among agents is depicted in Fig. 2 (left), for representative agents in the network. The metric of interest here is the relative error kQn [k ] − ¯Q[k ]kF /k ¯Q[k ]kF per agent n, which compares the corresponding local N PN estimate with the network-wide average ¯Q[k ] := 1 n=1 Qn [k ]; and likewise for the An [k ]. Fig. 2 (left) shows that DUNA converges and agents consent on the global matrices {Q, A} as k → ∞. To corroborate that DUNA attains the centralized performance, the accelerated proximal gradient al- gorithm of [21] is employed to solve (P1) after collecting all the per-agent data in a central processing unit. For both the distributed and centralized schemes, Fig. 2 (right) depicts the evolution of the relative error k A[k ] − A0 kF /kA0 kF for various sparsity levels, where A[k ] := ¯A[k ] for DUNA. It is apparent that the distributed estimator approaches the performance of its centralized counterpart, thus corroborating convergence and global optimality as per Proposition 2. Unveiling Internet2-v1 network anomalies from SNMP measurements. Given the OD flow traffic mea- surements discussed at the beginning of Section V, the link loads in Y are obtained through multiplication with the Internet2-v1 routing matrix [1]. Even though Y is “constructed ” here from flow measurements, link loads can be typically acquired from simple network management protocol (SNMP) traces [30]. The available OD flows are a superposition of “clean ” and anomalo us traffic, i.e., the sum of unknown “ground- truth ” low-rank and a sparse matrices X0 + A0 adhering to (16) when R = IF . Therefore, the proposed algorithms are applied first to obtain a reasonably precise e stimate of the “ground-truth ” {X0 , A0 }. The estimated X0 exhibits three dominant singular values, con firming the low -rank property of X0 . The receiver operation characteristic (ROC) curves in Fig. 3 (left) highlight the merits of DUNA when used to identify Internet2-v1 network anomalies. Even at low false alarm rates of e.g., PFA = 0.04, the anomalies are accurately detected (PD = 0.93). In addition, DUNA consistently outperforms the landmark PCA-based method of [19], and can identify anomalous flows. F ig. 3 (right) illustrates the magnitude of the true and estimated anomalies across flows and time. B. Robust PCA Next, the convergence and effectiveness of the proposed DRPCA algorithm is corroborated with the aid of computer simulations. An F × T data matrix is generated as Y = X0 + A0 + V, and the centralized estimator (18) is obtained using the AD-MoM method proposed in [8]. In the network setting, each agent has available Ln = 19 rows of Y . Fig. 2 (right) is replicated as Fig. 4 (left) for the robust PCA problem IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 20 dealt with here, and for different values of ρ [the assumed upper bound on rank(X0 )]. It is again apparent that DRPCA converges and approaches the performance of (18) as k → ∞. Unveiling Internet2-v1 network anomalies from Netflow meas urements. Suppose a router n ∈ N monitors the traffic volume of OD flows to unveil anomalies usi ng e.g., the Netflow protocol [2], [30]. Collect the time-series of all OD flows as the rows of the F × T matrix Y = X0 + A0 + V, where A0 and V account for anomalies and noise, respectively. As elaborated in Section IV-A, the common temporal patterns across flows renders the traffic matrix X0 low-rank. Owing to the difficulties of measuring the large number of OD flows, in practice only a few entries of Y are typically available [30], or, link traffic measurements are utilized as in Section V-A (recall that L ≪ F ). In this example, because the Internet2-v1 network data comprises only F = 121 flows, it is assumed that Ω = {1, ..., F } × {1, ..., T }. To better assess performance, large spikes are injected into 1% randomly selected entries of the ground truth-traffic matrix X0 estimated in Section V-A. The DRPCA algorithm is run on this Internet2-v1 Netflow data to identify the anomalies. The results are depicted in Fig. 4 (right). DRPCA accurately identifies the anomalies, achieving PD = 0.98 when PFA = 10−3 . C. Low-rank matrix completion In addition to the synthetic data specifications outlined at the beginning of this section, the sampling set Ω is picked uniformly at random, where each entry of the matrix Ω is a Bernoulli random variable taking the value one with probability p. Data for the matrix completion problem is thus generated as PΩ (Y) = PΩ (X0 + V) = Ω ⊙ (X0 + V), where Y is an L × T matrix with L = T = 106. The data available to agent n is PΩn (Yn ), which corresponds to a row subset of PΩ (Y). As with the previous test cases, it is shown first that the DMC a lgorithm converges to the (centralized) solution of (19). To this end, the centralized singular value thresholding algorithm is used to solve (19) [10], when all data PΩ (Y) is available for processing. For both the distributed and centralized schemes, Fig. 5 (left) depicts the evolution of the relative error k X[k ] − X0 kF /kX0 kF for different values of σ (noise strength), and percentage of missing entries (controlled by p). Regardless of the values of σ and p, the error trends clearly show the convergent behavior of the DMC algorithm and corroborate Proposition 2. Interestingly, for small noise levels where the estimation error approaches zero, the distributed estimator recovers X0 almost exactly. Internet2-v2 network latency prediction. End-to-end network latency information is critical towards enforcing quality-of-service constraints in many Internet applications. However, probing all pairwise delays becomes infeasible in large-scale networks. If one collects the end-to-end latencies of source-sink pairs (i, j ) in a delay matrix X := [xi,j ] ∈ RN ×N , strong dependencies among path delays render X low- IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 21 rank [20]. This is mainly because the paths with nearby end nodes often overlap and share common bottleneck links. This property of X along with the distributed-processing requirements of large-scale networks, motivates well the adoption of the DMC algorithm for networkwide path latency prediction. Given the n-th row of X is partially available to agent n, the goal is to impute the missing delays through agent collaboration. The DMC algorithm is tested here using the real path latency data collected from the operation of Internet2-v2. Spectral analysis of X0 reveals that the first four singular values are markedly domi nant, demonstrating that X0 is low rank. A fraction of the entries in X0 are purposely dropped to yield an incomplete delay matrix PΩ (X0 ). After running the DMC algorithm till convergence, the true and predicted latencies are depicted in Fig. 5 (right) (for 20% missing data). The relative prediction error is around 10%. V I . CONCLUD ING SUMMARY A framework for distributed sparsity-regularized rank minimization is developed in this paper, that is suitable for (un)supervised inference tasks in networks. Fundamental problems such as in-network compressed sensing, matrix completion, and principal components pursuit are all captured under the same umbrella. The novel distributed algorithms can be utilized to unveil traffic volume anomalies from SNMP and Netflow traces, to predict networkwide path latencies in large-scale IP networks, and to map-out the RF ambiance using periodogram samples collected by spatially-distributed cognitive radios. A P PEND IX A. Proof of Proposition 1. Recall the cost function of (P3) de fined as 1 λ∗ F + kQk2 2 (cid:0)kLk2 F (cid:1) + λ1kAk1 . 2 The stationary points { ¯L, ¯Q, ¯A} of (P3) are obtained by setting to zero the (sub)gradients, and solving [7] kPΩ (Y − LQ′ − RA)k2 F + f (L, Q, A) := (23) ∂Af ( ¯L, ¯Q, ¯A) = R′PΩ (Y − ¯L ¯Q′ − R ¯A) − λ1 sign( ¯A) = 0F ×T ∇Lf ( ¯L, ¯Q, ¯A) = PΩ (Y − ¯L ¯Q′ − R ¯A) ¯Q − λ∗ ¯L = 0L×ρ ∇Q′ f ( ¯L, ¯Q, ¯A) = ¯L′PΩ (Y − ¯L ¯Q′ − R ¯A) − λ∗ ¯Q′ = 0ρ×T . (24) (25) (26) Clearly, every stationary point satis fies ∇Lf ( ¯L, ¯Q, ¯A) ¯L′ = 0L×L and ¯Q∇Q′ f ( ¯L, ¯Q, ¯A) = 0T ×T . Using the aforementioned identities, the optimality conditions (24)-(26) can be rewritten as R′PΩ (Y − ¯L ¯Q′ − R ¯A) = λ1 sign( ¯A) tr(PΩ (Y − ¯L ¯Q′ − R ¯A) ¯Q ¯L′ ) = λ∗ tr{ ¯Q ¯Q′} = λ∗ tr{ ¯L ¯L′}. (27) (28) IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 22 (P5) Consider now the following convex optimization problem {X,A,W1 ,W2} (cid:20) 1 kPΩ (Y − X − RA)k2 F + min 2  s. to W :=    W2 which is equivalent to (P1). The equivalence can be readily inferred by minimizing (P5) with respect to {W1 , W2} first, and taking advantage of the following alternative cha racterization of the nuclear norm (see e.g., [25]) {tr{W1 } + tr{W2 }} + λ1kAk1(cid:21) W1 X λ∗ 2 (29) (cid:23) 0 ′ X s. to     W2 In what follows, the optimality conditions for the conic program (P5) are explored. To this end, the kXk∗ = min {W1 ,W2 } {tr(W1 ) + tr(W2 )} , W1 X (cid:23) 0. 1 2 ′ X Lagrangian is first formed as L(X, W1 , W2 , A, M) = 1 λ∗ 2 2 where M denotes the dual variables associated with the conic constraint (29). For notational convenience, {tr(W1 ) + tr(W2 )} − hM, Wi + kAk1 kPΩ (Y − X − RA)k2 F + partition M in four blocks M1 := [M]11 , M2 := [M]12 , M3 := [M]22 , and M4 := [M]21 , in accordance with the block structure of W in (29), where M1 and M3 are L × L and T × T matrices. The optimal solution to (P5) must: (i) null the (sub)gradients ∇XL(X, W1 , W2 , A, M) = −PΩ (Y − X − RA) − M2 − M4 ′ (30) ∂AL(X, W1 , W2 , A, M) = −R′PΩ (Y − X − RA) − λ1 sign(A) λ∗ 2 λ∗ 2 and satisfy (ii) the complementary slackness condition hM, Wi = 0; (iii) primal feasibility W (cid:23) 0; and ∇W1 L(X, W1 , W2 , A, M) = ∇W2 L(X, W1 , W2 , A, M) = IT − M3 IL − M1 (31) (33) (32) (iv) dual feasibility M (cid:23) 0. Recall the stationary point of (P3), and introduce candidate primal variables X := ¯L ¯Q′ , A := ¯A, 2 IL , M3 := λ∗ 2 IT , M2 := −(1/2)PΩ (Y − W1 := ¯L ¯L′ and W2 := ¯Q ¯Q′ ; and the dual variables M1 := λ∗ ¯L ¯Q′ − R ¯A), and M4 := M′ 2 . Then, (i) holds since after plugging the candidate primal and dual variables in (30)-(33), the subgradients vanish. Moreover, (ii) holds since 2 , X′ i + h M3 , W2 i h M, Wi = h M1 , W1 i + h M2 , Xi + h M′ λ∗ λ∗ 2 2 λ∗ F − λ∗k ¯Lk2 k ¯Qk2 F = 0 2 hIL , ¯L ¯L′ i + k ¯Lk2 F + λ∗ 2 = hLT , ¯Q ¯Q′ i − hPΩ (Y − ¯L ¯Q′ − R ¯A), ¯L ¯Q′ i = IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 23 where the last two equalities follow from (28). Condition (iii) is also met since ′   =  ¯Q ¯Q′   ¯Q  ¯Q  ¯L ¯Q′ ¯L ¯L      To satisfy (iv), based on a Schur complement argument [16] it suffices to enforce σmax ( M2 ) ≤ λ∗ . (cid:4) B. Derivation of Algorithm 1. It is shown here that [S1]-[S4] in Section III-C give rise to the set of ¯L ¯L′ ¯Q ¯L′ (cid:23) 0. (34) recursions tabulated under Algorithm 1. To this end, recall the augmented Lagrangian function in (6) and focus first on [S4]. From the decomposable structure of Lc , (14) decouples into simpler strictly convex sub-problems for n ∈ N and m ∈ Jn , namely c Bn nrn (Ln [k + 1], Qn [k + 1], Bn ) + hMn [k ], Bn i + F o kBn − An [k + 1]k2 (35) Bn [k + 1] = arg min 2 n n c n io 2 (cid:0)kQn [k + 1] − ¯Fm F + kQm [k + 1] − ¯Fm F (cid:1) − h ¯Cm n [k ], ¯Fm n [k ] + Cm ¯Fm n k2 n k2 n [k + 1] = arg min ¯Fm (36) n n c n io . F + kAm [k + 1] − ¯Gm 2 (cid:0)kAn [k + 1] − ¯Gm ¯Gm n [k ] + Dm F (cid:1) − h ¯Dm n [k ], ¯Gm n k2 n k2 n [k + 1] = arg min ¯Gm (37) n and Gm Note that in formulating (36) and (37), the auxiliary variables Fm n were eliminated using the constraints ¯Fm n = Fm n and ¯Gm n = Gm n , respectively. The unconstrained quadratic problems (36) and (37) admit the closed-form solutions n [k ] + Dm ( ¯Dm n [k ]) + (An [k + 1] + Am [k + 1]) . (Qn [k + 1] + Qm [k + 1]) n [k + 1] = Fm ¯Fm n [k + 1] = n [k ] + Cm ( ¯Cm n [k ]) + n [k + 1] = Gm ¯Gm n [k + 1] = 1 1 2c 2 1 1 2c 2 n [k ] and Fm Using (38) to eliminate ¯Fm n [k ] from (8) and (9) respectively, a simple induction argument n [k ] = − Cm n [0] = 0T ×ρ , then ¯Cm n [0] = − Cm establishes that if the initial Lagrange multipliers obey ¯Cm n [k ] n [k ] and Dm for all k ≥ 0, where n ∈ N and m ∈ Jn . Likewise, the same holds true for ¯Dm n [k ]. The n [k ], Dm collection of multipliers { Cm n [k ]}m∈Jn n∈N is thus redundant, and (38)-(39) simplify to 1 2 1 2 n [k ] = ¯Gn Observe that ¯Fm n [k ] = ¯Fn m [k ] and ¯Gm m [k ] for all k ≥ 0, identities that will be used later on. By plugging (40) and (41) into (8) and (10) respectively, the non-redundant multiplier updates become (An [k + 1] + Am [k + 1]) , n ∈ N , m ∈ Jn . (Qn [k + 1] + Qm [k + 1]) , n ∈ N , m ∈ Jn n [k + 1] = Gm ¯Gm n [k + 1] = n [k + 1] = Fm ¯Fm n [k + 1] = (38) (39) (40) (41) n [k ] = ¯Cm ¯Cm n [k − 1] + n [k ] = ¯Dm ¯Dm n [k − 1] + µ 2 µ 2 (Qn [k ] − Qm [k ]) , n ∈ N , m ∈ Jn (An [k ] − Am [k ]) , n ∈ N , m ∈ Jn . (42) (43) IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 24 If ¯Cm n [0] = − ¯Cn m [0] = 0T ×ρ , then the structure of (42) reveals that ¯Cm n [k ] = − ¯Cn m [k ] for all k ≥ 0, where n ∈ N and m ∈ Jn . Clearly, the same holds true for ¯Dm n [k ], and these identities will become handy in the sequel. Moving on to [S3], (13) decouples into N unconstrained quadratic sub-problems Ln (cid:26)rn (Ln , Qn [k + 1], Bn [k ]) + F (cid:27) . kLnk2 Ln [k + 1] = arg min The minimization (12) in [S2] also decomposes into simpler sub-problems, both across agents and across λ∗ 2 + λ∗ 2N λ∗ 2N the variables {Qn}n∈N and {An }n∈N , which are decoupled in the augmented Lagrangian when all other variables are fixed. Specifically, the per agent updates of Qn are given by Qn (rn (Ln [k ], Qn , Bn [k ]) + F + Xm∈Jn h ¯Cm n [k ] + Cn kQnk2 m [k ], Qn i Qn [k + 1] = arg min F (cid:17)) c 2 Xm∈Jn (cid:16)kQn − ¯Fm F + kQn − Fn m [k ]k2 n [k ]k2 Qn (cid:26)rn (Ln [k ], Qn , Bn [k ]) + kQnk2 F + hOn [k ], Qn i = arg min F ) 2 +c Xm∈Jn (cid:13)(cid:13)(cid:13)(cid:13) (cid:13)(cid:13)(cid:13)(cid:13) Qn [k ] + Qm [k ] Qn − 2 n [k ] = Cn where the second equality was obtained after using: i) ¯Cm m [k ] which follows from the identities ¯Cm n [k ] = − ¯Cn n [k ] and ¯Cm n [k ] = − Cm ¯Cm n [k ]; m [k ] established earlier; ii) the de finition On(k) := 2 Pm∈Jn n [k ] = Fn and iii) the identity ¯Fm m [k ], which allows to merge the identical quadratic penalty terms and eliminate both ¯Fm n [k ] and Fn m [k ] using (40). ¯Dm n [k ] and following similar steps as the ones that led to the second Upon de fining Pn (k) := 2 Pm∈Jn equality in (44), one arrives at An (cid:26) λ1 kAnk1 − hMn [k ], An i + An [k + 1] = arg min N +c Xm∈Jn (cid:13)(cid:13)(cid:13)(cid:13) An ( N 2 (cid:13)(cid:13)(cid:13)(cid:13) (cid:13)(cid:13)(cid:13)(cid:13) An − = arg min where the second equality follows by completing the squares. Problem (45) is a separable instance of the Lasso (also related to the proximal operator of the ℓ1 -norm); hence, its solution is expressible in terms of the soft-thresholding operator as in Algorithm 1. kBn [k ] − Ank2 F + hPn [k ], An i F ) 2 (cid:13)(cid:13)(cid:13)(cid:13) An [k ] + Am [k ] 2 Mn [k ] + cBn [k ] − Pn [k ] + c Pm∈Jn c(1 + 2Jn ) (An [k ] + Am [k ]) c 2 An − (44) 2 F + λ1 kAnk1) (45) IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 25 C. Proof of Proposition 2. Let ¯Qn := limk→∞ Qn [k ], and likewise for all other convergent sequences in [ ¯Qn − Algorithm 1. Examination of the recursion for On [k ] in the limit as k → ∞, reveals that Pm∈Jn ¯Qm ] = 0T ×ρ , ∀ n ∈ N . Upon vectorizing the matrix quantities involved, this system of equations implies that the supervector ¯q := [vec[ ¯Q1 ]′ , . . . , vec[ ¯QN ]′ ]′ belongs to the nullspace of L ⊗ IT ρ , where L is the Laplacian of the network graph G(N , L). Under (a1), this guarantees that ¯Q1 = ¯Q2 = . . . = ¯QN . From the analysis of the limiting behavior of Pn [k ], the same argument leads to ¯A1 = ¯A2 = . . . = ¯AN , which establishes the consensus results in the statement of Proposition 2. Hence, one can go ahead and de fine ¯Q := ¯Qn and ¯A := ¯An . Before moving on, note that convergence of Mn [k ] implies that ¯Bn = ¯An = ¯A, n ∈ N . These observations guarantee that the limiting solution is feasible for (P4). To prove the optimality claim it suffices to show that upon con vergence, the fixed point { ¯L, ¯Q, ¯A, ¯B} of the iterations comprising Algorithm 1 satis fies the Karush- Kuhn-Tucker (KKT) optimality conditions for (P4). Proposition 1 asserts that if kPΩ (Y − LQ′ − RA)k ≤ λ∗ , { ¯L, ¯Q, ¯A} is indeed an optimal solution to (P1). To this end, consider the updates of the primal variables in Algorithm 1, which satisfy λ∗ ∇Qn rn (Qn [k + 1], Ln [k ], Bn [k ]) + Qn [k + 1] + On [k + 1] N + 2c Xm∈Jn (cid:18)Qn [k + 1] − ∇Ln rn (Qn [k + 1], Ln [k + 1], Bn [k ]) + λ∗Ln [k + 1] = 0L×ρ Qn [k ] + Qm [k ] 2 (cid:19) = 0T ×ρ (47) (46) ∇Bn rn (Qn [k + 1], Ln [k + 1], Bn [k + 1]) + Mn [k ] + c(Bn [k + 1] − An [k + 1]) = 0F ×T . Taking the limit from both sides of (46) –(48), and summing up over all n ∈ N yields ∇Qr( ¯Q, ¯L, ¯A) + λ∗ ¯Q = 0T ×ρ (48) (49) (50) (51) ¯Mn = 0F ×T ∇Lr( ¯Q, ¯L, ¯A) + λ∗ ¯L = 0L×ρ ∇Br( ¯Q, ¯L, ¯A) + Xn∈N F . To arrive at (49), the assumption that ¯Cm where r(L, Q, B) := 1 2 kPΩ (Y − LQ′ − RB)k2 n [1] = 0, ∀m ∈ ¯Cm Jn , n ∈ N is used, and thus ¯Cm n [k ] = − ¯Cn n [k ] = 0. m [k ] which leads to Pn∈N On [k ] = Pn∈N Pm∈Jn Next, consider the auxiliary matrices Θn := ¯Mn − ¯Pn + c(1 + 2Jn ) ¯A, n ∈ N . In the limit as k → ∞, the update recursion for An [k + 1] in Algorithm 1 can be written as c(1 + 2Jn ) ¯A = S (Θn , λ1 /N ) . Proceed by de fining Ψn := Θn − c(1 + 2Jn ) ¯A, and observe that the input-output relationship of the soft-thresholding operator S yields [Ψn ]f ,t =   −λ1/N , f ,t : ξ (n) ξ (n) f ,t ≤ λ1 /N , [ ¯A]f ,t > 0, [ ¯A]f ,t < 0, [ ¯A]f ,t = 0. λ1 /N , (52) IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 26 n=1 Ψn(cid:17) and Γ2 := 1 n=1 Ψn(cid:17), 2 (cid:16)λ11F 1′ 2 (cid:16)λ11F 1′ T − PN T + PN Given (52), de fine the matrices Γ1 := 1 and show that they satisfy the following properties: (i) Γ1 , Γ2 ≥ 0 (entrywise); (ii) [Γ1 ]f ,t = 0, if ¯Mn . [ ¯A]f ,t < 0; (iii) [Γ2 ]f ,t = 0, if [ ¯A]f ,t > 0; (iv) Γ1 + Γ2 = λ11F 1′ T ; and (v) Γ1 − Γ2 = Pn∈N Properties (i)-(iii) follow after adding up the result in (52) for n = 1, 2, . . . , N . Property (iv) is readily checked from the de finitions of Γ1 and Γ2 . Finally, (v) follows since N N N N N Xn=1 (cid:0)Θn − c(1 + 2Jn ) ¯A(cid:1) = Xn=1 Xn=1 Xn=1 Xn=1 Γ1 − Γ2 = Ψn = ¯Pn = 0 (from the identity PN where PN n=1 Pn [k ] = 0) is used to obtain the last equality. n=1 The proof is concluded by noticing that properties (i)-(v) along with (49)-(51) comprise the KKT conditions for the following optimization problem ¯Mn − ¯Pn = ¯Mn min {L,Q,A,T} 1 2 kPΩ (Y − LQ′ − RA)k2 F + s. to − T ≤ A ≤ T (entrywise) λ∗ F (cid:9) + λ11′ 2 (cid:8)kLk2 F + kQk2 F T1T where { ¯L, ¯Q, ¯A} and {Γ1 , Γ2 } play the role of the optimal primal and dual variables, respectively. This last problem is clearly equivalent to (P4). (cid:4) RE FERENCE S [1] [Online]. Available: http://internet2.edu/observatory/archive/data- collections.html [2] A. Abdelkefi, Y. Jiang, W. Wang, A. Aslebo, and O. Kvittem, “Robust traffic anomaly detection with principal component pursuit,” in Proc. of ACM CoNEXT Student Wkshp., Philadelphia, USA, Nov. 2010. [3] G. Adomavicius and A. Tuzhilin, “Toward the next generat ion of recommender systems: A survey of the state-of-the-art and possible extensions,” IEEE Trans. Knowledge and Data Engineering, vol. 17, no. 6, pp. 734–749, Jun. 2005. [4] J. A. Bazerque and G. B. Giannakis, “Distributed spectru m sensing for cognitive radio networks by exploiting sparsity,” IEEE Trans. Signal Process., vol. 58, pp. 1847–1862, Mar. 2010. [5] D. P. Bertsekas and J. N. Tsitsiklis, Parallel and Distributed Computation: Numerical Methods. Athena-Scienti fic, 1999. [6] P. J. Bickel, Y. Ritov, and A. Tsybakov, “Simultaneous an alysis of Lasso and Dantzig selector,” Ann. Statist., vol. 37, pp. 1705–1732, Apr. 2009. [7] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, 2004. [8] E. J. Candes, X. Li, Y. Ma, and J. Wright, “Robust principa l component analysis?” Journal of the ACM, vol. 58, no. 1, pp. 1–37, May 2011. [9] E. J. Candes and Y. Plan, “Matrix completion with noise,” Proceedings of the IEEE, vol. 98, pp. 925–936, Jun. 2010. [10] E. J. Candes and B. Recht, “Exact matrix completion via c onvex optimization,” Found. Comput. Math., vol. 9, no. 6, pp. 717–722, Dec. 2009. [11] E. J. Candes and T. Tao, “Decoding by linear programming ,” IEEE Trans. Info. Theory, vol. 51, no. 12, pp. 4203–4215, Dec. 2005. [12] V. Chandrasekaran, S. Sanghavi, P. R. Parrilo, and A. S. Willsky, “Rank-sparsity incoherence for matrix decomposi tion,” SIAM J. Optim., vol. 21, no. 2, pp. 572–596, 2011. IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 27 [13] A. Chistov and D. Grigorev, “Complexity of quanti fier el imination in the theory of algebraically closed fields,” in Math. Found. of Computer Science, ser. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 1984, vol. 176, pp. 17–31. [14] S. Chouvardas, K. Slavakis, Y. Kopsinis, and S. Theodoridis, “A sparsity-aware adaptive algorithm for distribute d learning,” IEEE Trans. Signal Process., 2011, see also arXiv:1112.5716v1 [cs.IT]. [15] T. Hastie, R. Tibshirani, and J. Friedman, The Elements of Statistical Learning, 2nd ed. Springer, 2009. [16] R. A. Horn and C. R. Johnson, Matrix Analysis. Cambridge University Press, 1985. [17] D. Jakovetic, J. Xavier, and J. Moura, “Cooperative con vex optimization in networked systems: Augmented Lagrangian algorithms with directed gossip communication,” IEEE Trans. Signal Process., vol. 59, pp. 3889 –3902, Aug. 2011. [18] I. T. Jolliffe, Principal Component Analysis. New York: Springer, 2002. [19] A. Lakhina, M. Crovella, and C. Diot, “Diagnosing netwo rk-wide traffic anomalies,” in Proc. of ACM SIGCOMM, Portland, USA, Aug. 2004. [20] Y. Liao, W. Du, P. Geurts, and G. Leduc, “DMFSGD: A decent ralized matrix factorization algorithm for network distance prediction,” IEEE/ACM Trans. Network., 2011, see also arXiv:1201.1174v1 [cs.NI]. [21] M. Mardani, G. Mateos, and G. B. Giannakis, “Unveiling n etwork anomalies across flows and time via sparsity and low rank,” IEEE Trans. Info. Theory, Feb. 2012 (submitted). [22] G. Mateos, J. A. Bazerque, and G. B. Giannakis, “Distrib uted sparse linear regression,” IEEE Trans. Signal Process., vol. 58, pp. 5262–5276, Oct. 2010. [23] A. Montanari and S. Oh, “On positioning via distributed matrix completion,” in Sensor Array and Multichannel Signal Processing Workshop, Jerusalem, Oct. 2010, pp. 197–200. [24] B. K. Natarajan, “Sparse approximate solutions to line ar systems,” SIAM J. Comput., vol. 24, pp. 227–234, 1995. [25] B. Recht, M. Fazel, and P. A. Parrilo, “Guaranteed minim um-rank solutions of linear matrix equations via nuclear norm minimization,” SIAM Rev., vol. 52, no. 3, pp. 471–501, 2010. [26] B. Recht and C. Re, “Parallel stochastic gradient algor ithms for large-scale matrix completion,” 2011 (submitted ). [27] I. D. Schizas, G. B. Giannakis, and Z. Q. Luo, “Distribut ed estimation using reduced-dimensionality sensor observations,” IEEE Trans. Signal Process., vol. 55, pp. 4284–4299, Aug. 2007. [28] I. D. Schizas, A. Ribeiro, and G. B. Giannakis, “Consens us in ad hoc WSNs with noisy links - part I: Distributed estimation of deterministic signals,” IEEE Trans. Signal Process., vol. 56, pp. 350–364, Jan. 2008. [29] P. Sprechmann, I. Ramirez, G. Sapiro, and Y. Eldar, “C-H iLasso: A collaborative hierarchical sparse modeling framework,” IEEE Trans. Signal Process., vol. 59, no. 9, pp. 4183–4198, Sep. 2011. [30] M. Thottan and C. Ji, “Anomaly detection in IP networks, ” IEEE Trans. Signal Process., vol. 51, pp. 2191–2204, 2003. [31] R. Tibshirani, “Regression shrinkage and selection vi a the Lasso,” J. Royal. Statist. Soc B, vol. 58, pp. 267–288, 1996. [32] J. Tropp, “Just relax: Convex programming methods for i dentifying sparse signals,” IEEE Trans. Info. Theory, vol. 51, pp. 1030–1051, Mar. 2006. [33] M. Yuan and Y. Lin, “Model selection and estimation in re gression with grouped variables,” J. Royal. Statist. Soc B, vol. 68, pp. 49–67, 2006. [34] Y. Zhang, M. Roughan, W. Willinger, and L. Qiu, “Spatio- temporal compressive sensing and internet traffic matrices ,” in Proc. of ACM SIGCOM Conf. on Data Commun., New York, USA, Oct. 2009. [35] Z. Zhou, X. Li, J. Wright, E. Candes, and Y. Ma, “Stable pr incipal component pursuit,” in Proc. of Intl. Symp. on Info. Theory, Austin, USA, Jun. 2010, pp. 1518–1522. IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 28 s i x a − y 1 0.8 0.6 0.4 0.2 0 Fig. 1. A network of N = 20 agents. 0 0.2 0.4 x−axis 0.6 0.8 1 102 100 10−2 10−4 r o r r e s u s n e s n o c e v i t a l e R 10−6 0 Q A 1000 2000 3000 5000 4000 Iteration index 6000 7000 8000 101 100 10−1 r o r r e n o i t a m i t s e e v i t a l e R 10−2 0 Distributed, π=0.01 Centralized, π=0.01 Distributed, π=0.002 Centralized, π=0.002 2000 4000 6000 Iteration index 8000 10000 Fig. 2. Performance of DUNA. (left) Relative consensus error for representative network agents with σ = 0.01 and π = 0.01. (right) Relative estimation error for distributed and centralized algorithms under various sparsity levels. 1 0.8 0.6 0.4 0.2 y t i l i b a b o r p n o i t c e t e D 0 0 1 PCA−based method, rank=1 PCA−based method, rank=2 PCA−based method, rank=3 PCA−based method, rank=4 Proposed method, per time and flow 0.2 0.6 0.4 False alarm probability 0.8 x 108 True Estimated 4 3 2 e d u t i l p m a y l a m o n 0 A 120 1 110 Flow index (f) 100 50 150 100 Time index (t) Fig. 3. Unveiling anomalies from Internet2-v1 SNMP data. (left) ROC curves of the proposed versus the PCA-based method. (right) Amplitude of the true and estimated anomalies for ρ = 5, PFA = 0.04 and PD = 0.93. IEEE TRANSACTIONS ON SIGNAL PROCESSING (SUBMITTED) 29 101 100 10−1 r o r r e n o i t a m i t s e e v i t a l e R 10−2 0 Centralized Distributed, ρ=3 Distributed, ρ=5 Distributed, ρ=10 True Estimated x 108 4 3 2 1 e d u t i l p m a y l a m o n A 0 50 50 100 150 Iteration index 200 250 300 Flow index (f) 40 30 20 10 20 30 10 40 50 Time index (t) Fig. 4. Performance of DRPCA. (left) Relative estimation error for distributed and centralized algorithms under different ρ. (right) Amplitude of true and estimated anomalies using Internet2-v1 network data when ρ = 5, PFA = 10−3 and PD = 0.98. 100 10−1 10−2 r o r r e n o i t a m i t s e e v i t a l e R Distributed, σ=0.01, p=0.1 Centralized, σ=0.01, p=0.1 Distributed, σ=0.1, p=0.1 Centralized, σ=0.1, p=0.1 Distributed, σ=0.1, p=0.3 Centralized, σ=0.1, p=0.3 y a l e D 40 30 20 10 0 True Estimated 10−3 0 100 200 300 400 600 500 Iteration index 700 800 900 1000 8 6 4 Node index 2 2 4 8 6 Node index Fig. 5. Performance of DMC. (left) Relative estimation error for distributed and centralized algorithms under various noise strengths and percentage of missing entries. (right) Predicted and true ene-to-end delays of Internet2-v2 network for p = 0.2.
1301.3347
1
1301
2013-01-15T14:00:55
Multi-agent learning using Fictitious Play and Extended Kalman Filter
[ "cs.MA", "cs.LG", "math.OC", "stat.ML" ]
Decentralised optimisation tasks are important components of multi-agent systems. These tasks can be interpreted as n-player potential games: therefore game-theoretic learning algorithms can be used to solve decentralised optimisation tasks. Fictitious play is the canonical example of these algorithms. Nevertheless fictitious play implicitly assumes that players have stationary strategies. We present a novel variant of fictitious play where players predict their opponents' strategies using Extended Kalman filters and use their predictions to update their strategies. We show that in 2 by 2 games with at least one pure Nash equilibrium and in potential games where players have two available actions, the proposed algorithm converges to the pure Nash equilibrium. The performance of the proposed algorithm was empirically tested, in two strategic form games and an ad-hoc sensor network surveillance problem. The proposed algorithm performs better than the classic fictitious play algorithm in these games and therefore improves the performance of game-theoretical learning in decentralised optimisation.
cs.MA
cs
Multi-agent learning using Fictitious Play and Extended Kalman Filter Michalis Smyrnakis∗1 1Complex Systems and Statistical Physics Group, School of Physics and Astronomy, University of Manchester, UK August 21, 2018 Abstract Decentralised optimisation tasks are important components of multi- agent systems. These tasks can be interpreted as n-player potential games: therefore game-theoretic learning algorithms can be used to solve decen- tralised optimisation tasks. Fictitious play is the canonical example of these algorithms. Nevertheless fictitious play implicitly assumes that play- ers have stationary strategies. We present a novel variant of fictitious play where players predict their opponents' strategies using Extended Kalman filters and use their predictions to update their strategies. We show that in 2 by 2 games with at least one pure Nash equilibrium and in potential games where players have two available actions, the pro- posed algorithm converges to the pure Nash equilibrium. The performance of the proposed algorithm was empirically tested, in two strategic form games and an ad-hoc sensor network surveillance problem. The proposed algorithm performs better than the classic fictitious play algorithm in these games and therefore improves the performance of game-theoretical learning in decentralised optimisation. Keywords: Multi-agent learning, game theory, fictitious play, decen- tralised optimisation, learning in games, Extended Kalman filter. 1 Introduction Recent advance in technology render decentralised optimisation a crucial com- ponent of many applications of multi agent systems and decentralised control. Sensor networks (Kho et al., 2009), traffic control (van Leeuwen et al., 2002) and scheduling problems (Stranjak et al., 2008) are some of the tasks where decentralised optimisation can be used. These tasks share common character- istics such as large scale, high computational complexity and communication constraints that make a centralised solution intractable. It is well known that many decentralised optimisation tasks can be cast as potential games (Wolpert and Turner, 1999.; Arslan et al., 2006), and the search of an optimal solution ∗[email protected] 1 can be seen as the task of finding Nash equilibria in a game. Thus it is feasi- ble to use iterative learning algorithms from game-theoretic literature to solve decentralised optimisation problems. A game theoretic learning algorithm with proof of convergence in certain kinds of games is fictitious play (Fudenberg and Levine, 1998; Monderer and Shapley, 1996). It is a learning process where players choose an action that maximises their expected rewards according to the beliefs they maintain about their opponents' strategies.The players update their beliefs about their oppo- nents' strategies after observing their actions. Even though fictitious play con- verges to Nash equilibrium, this convergence can be very slow. This is because it implicitly assumes that other players use a fixed strategy in the whole game. Smyrnakis and Leslie (2010) addressed this problem by representing the ficti- tious play process as a state space model and by using particle filters to predict opponents' strategies. The drawback of this approach is the computational cost of the particle filters that render difficult the application of this method in real time applications. The alternative that we propose in this article is to use instead of particle filters, extended Kalman filters (EKF) to predict opponents' strategies. There- fore the proposed algorithm has smaller computational cost than the particle filter variant of fictitious play algorithm that proposed by Smyrnakis and Leslie (2010). We show that the EKF fictitious play algorithm converges to a pure Nash equilibrium, in 2 by 2 games with at least one pure Nash equilibrium and in potential games where players have two available actions. We also empirically observe, in a range of games, that the proposed algorithm needs less iterations than the classic fictitious play to converge to a solution. Moreover in our simu- lations, the proposed algorithm converged to a solution with higher reward than the classic fictitious play algorithm. The remainder of this paper is organised as follows. We start with a brief description of game theory, fictitious play and extended Kalman filters. Section 3 introduces the proposed algorithm that combines fictitious play and extended Kalman filters. The convergence results we obtained are presented in Section 4. In Section 5 we propose some indicative values for the EKF algorithm pa- rameters. Section 6 presents the simulation results of EKF fictitious play in a 2×2 coordination game, a three player climbing hill game and an ad-hoc sensor network surveillance problem. In the final section we present our conclusions. 2 Background In this section we introduce some definition from game theory that we will use in the rest of this article and the relation between potential games and decentralised optimisation. We also briefly present the classic fictitious play algorithm and the extended Kalman filter algorithm. 2.1 Game theory definitions We consider a game Γ with I players, where each player i,i = 1, 2, . . . , I, choose his action, si, from a finite discrete set Si. We then can define the joint action that is played in a game as the set product S = ×i=I i=1Si. Each Player i receive a reward, ui, after choosing an action . The reward is a map from the joint action 2 space to the real numbers, ui : S → R. We will often write s = (si, s−i), where si is the action of Player i and s−i is the joint action of Player i's opponents. When players select their actions using a probability distribution they use mixed strategies. The mixed strategy of a player i, σi, is an element of the set ∆i, where ∆i is the set of all the probability distributions over the action space Si. The joint mixed strategy, σ, is then an element of ∆ = ×i=I i=1∆i. Analogously to the joint actions we will write σ = (σi, σ−i). In the special case where the players choose an action with probabiity one we will say that players choose their actions using pure strategies. The expected utility a player i will gain if he chooses a strategy σi (resp. si), when his opponents choose the joint strategy σ−i is ui(σi, σ−i) (resp. ui(si, σ−i)). A common decision rule in game theory is best response (BR). The best response is defined as the action that maximizes players' expected utility given their opponents' strategies. Thus for a specific opponents' strategy σ−i we evaluate the best response as: BRi(σ−i) = argmax si∈S ui(si, σ−i) (1) Nash (1950) showed that every game has at least one equilibrium, which is a fixed point of the best response correspondence, σi ∈ BR(σ−i). Thus when a joint mixed strategy σ is a Nash equilibrium then: ui(σi, σ−i) ≥ ui(si, σ−i) for all si ∈ Si (2) Equation 2 implies that if a strategy σ is a Nash equilibrium then it is not possible for a player to increase his utility by unilaterally changing his strategy. When all the players in a game select their actions using pure strategies then the equilibrium actions are referred as pure strategy Nash equilibria. A pure equilibrium is strict if each player has a unique best response to his opponents actions. 2.2 Decentralised optimisation tasks as potential games A class of games that are of particular interest in multi agent systems and decentralised optimisation tasks are potential games, because of their utility structure. In particular in order to be able to solve an optimisation task de- centrally the local functions should have similar characteristics with the global function that we want to optimise. This suggests that an action which improves or reduces the utility of an individual should respectively increase or reduce the global utility. Potential games have this property, since the potential func- tion (global function) depict the changes in the players' payoffs (local functions) when they unilaterally change their actions. More formally we can write ui(si, s−i) − ui( si, s−i) = φ(si, s−i) − φ( si, s−i) where φ is a potential function and the above equality stands for every player i, for every action s−i ∈ S−i, and for every pair of actions si, si ∈ Si, where Si and S−i represent the set of all available actions for Player i and his opponents respectively. Moreover potential games has at least one pure Nash equilibrium, hence there is at least one joint action s where no player can increase their reward, therefore the potential function, through a unilateral deviation. 3 It is feasible to choose an appropriate form of the agents' utility function in order for the global utility to act as a potential of the system. Wonderful life utility is a utility function that introduced by Wolpert and Turner (1999.) and applied by Arslan et al. (2006) to formulate distributed optimisation tasks as potential games. Player i's utility, when wonderful life utility is used, can be defined as the difference between the global utility ug and the utility of the system when a reference action is used as player's i action. More formally when player i chooses an action si we write ui(si) = ug(si, s−i) − ug(si 0, s−i) where si 0 denotes the reference action of player i. Hence the decentralised op- timisation problem can be cast as a potential game and any algorithm that is proved to converge to a Nash equilibrium of a potential game, which is a local or the global optimum of the optimisation problem, will converge to a joint action from which no player can increase the global reward through unilateral deviation. 2.3 Fictitious play Fictitious play (Brown, 1951), is a widely used learning technique in game the- ory. In fictitious play each player chooses his action according to the best response to his beliefs about his opponents' joint mixed strategy σ−i. Initially each player has some prior beliefs about the strategy that each of his opponents uses to choose an action based on a weight function κt. The play- ers, after each iteration, update the weight function and therefore their beliefs about their opponents' strategies and play again the best response according to their beliefs. More formally in the beginning of a game Player i maintains 0, ∀j ∈ [1, I]\{i}, that are some arbitrary non-negative initial weight functions κj updated using the formula: κj t (sj) = κj t−1(sj) + Isj t =sj (cid:26) 1 for each j, where Isj The mixed strategy of opponent j is estimated from the following formula: t =sj = 0 . if sj t = sj otherwise. σj t (sj) = . (3) (cid:80) κj t (sj) s(cid:48)∈Sj κj t (s(cid:48)) Player i based on his beliefs about his opponents' strategies, chooses the action which maximises his expected payoffs. When player i uses equation (3) to update the beliefs about his opponents' strategies he treats the environment of the game as stationary and implicitly assumes that the actions of the players are sampled from a fixed probability distribution. Therefore the recent observations have the same weight as the initial ones. This approach leads to poor adaptation when the other players choose to change their strategies. 2.4 Fictitious play as a state space model We follow Smyrnakis and Leslie (2010) and we will represent fictitious play process as a state-space model. According to this state space model each player 4 t(si) to play each of his available actions si ∈ Si, and then has a propensity Qi he forms his strategy based on these propensities. Finally he chooses his actions based on his strategy and the best response decision rule. Because players have no information about the evolution of their opponents' propensities, and under the assumption that the changes in propensities are small from one iteration of the game to another, we model propensities using a Gaussian autoregressive prior on all propensities. We set Q0 ∼ N (0, I) and recursively update the value of Qt according to the value of Qt−1 as follows: Q(st) = Q(st−1) + ηt where ηt ∼ N (0, χ2I). The action of a player then is related to his propensity by the following sigmoid equation for every si ∈ Si (cid:80) si = e(Qi(si)/τ ) s∈Si e(Qt(s)/τ ) . Therefore players will assume that at every iteration t their opponents have a different strategy σt. 2.5 Kalman filters and Extended Kalman filters Our objective is to estimate player i's opponent propensity and thus to estimate the marginal probability p(Qt, s1:t). This objective can be represented as a Hidden Markov Model (HMM). HMMs are used to predict the value of an unobserved variable xt, the hidden state, using the observations of another variable z1:t. There are two main assumptions in the HMM representation. The former one is that the probability of being at any state xt at time t depends only at the state of time t − 1, xt−1. The latter one is that an observation at time t depends only on the current state xt. One of the most common methods to estimate p(x1:t, z1:t) is Kalman filters and its variations. Kalman filter (Kalman et al., 1960) is based on two assumptions, the first is that the state variable is Gaussian. The second is that the observations are the result of a linear combination of the state variable. Hence Kalman filters can be used in cases which are represented as the following state space model: xt =Axt−1 + ξt−1 hidden layer yt =Bxt + ζt observations where ξt and ζt follow a zero mean normal distribution with covariance matrices Ξ = qtI and Z = rtI respectively, and A, B are linear transformation matrices. When the distribution of the state variable xt is Gaussian then p(xty1:t) is also a Gaussian distribution, since yt is a linear combination of xt. Therefore it is enough to estimate its mean and variance to fully characterise p(xty1:t). Nevertheless in the state space model we want to implement, the relation between Player i's opponent propensity and his actions is not linear. Thus we should use a more general form of state space model such as: xt = f (xt−1) + ξt yt = h(xt) + ζt 5 (4) where ξt and ζt are the hidden and observation state noise respectively, with zero mean and covariance matrices Ξ = qtI and Z = rtI respectively. The distribution of p(xty1:t) is not a Gaussian distribution because f (·) and h(·) are non-linear functions. A simple method to overcome this shortcoming is to use a first order Taylor expansion to approximate the distributions of the sate space model in (4). In particular we let xt = mt−1 + , where mt denotes the mean of xt and  ∼ N (0, P ). We can rewrite (4) as: xt = f (mt−1 + ) + wt−1 = f (mt−1) + Fx(mt−1) + ξt−1 yt = h(mt + ) + ζt = h(mt) + Hx(mt) + ζt (5) where Fx(mt−1) and Hx(mt) is the Jacobian matrix of f and h evaluated at mt−1 and mt, respectively. If we use the transformations in (5) then p(xty1:t) is a Gaussian distribution. Since p(xty1:t) is a Gaussian distribution to fully characterise it we need to evaluate its mean and its variance. The EKF process (Jazwinski, 1970; Grewal and Andrews, 2011) estimates this mean and variance in two steps the prediction and the update step. In the prediction step at any iteration t the distribution of the state variable is estimated based on all the observations until time t − 1, p(xty1:t−1). The distribution of p(xty1:t−1) is Gaussian and we will denote its mean and variance as m− respectively. During the update step the estimation of the prediction step is corrected in the light of the new observation at time t, so we estimate p(xty1:t). This is also a Gaussian distribution and we will denote its mean and variance as mt and Pt respectively. The prediction and the update steps of the EKF process (Jazwinski, 1970; Grewal and Andrews, 2011) to estimate the mean and the variance of p(xty1:t−1) and p(xty1:t) respectively are the following: Prediction Step t and P − t m− t =f (mt−1) P − t =F (mt−1)Pt−1F (mt−1) + Ξt−1 where the j, j(cid:48) element of F (mt) is defined as [F (m− t )]j,j(cid:48) = ∂f (xj, r) ∂xj(cid:48) x=m − t ,q=0 Update Step vt = zt − h(m− t ) t H T (m− t )P − St = H(m− Kt = P − t H T (m− t )S−1 mt = m− t + Ktvt t − KtStK T Pt = P − t t ) + Z t where zt is the observation vector (with 1 in the entry of the observed action and 0 everywhere else) and the j, j(cid:48) element of H(mt) is defined as: [H(m− t )]j,j(cid:48) = ∂h(xj, r) ∂xj(cid:48) x=m − t ,r=0 6 3 Fictitious play and EKF For the rest of this paper we will only consider inference over a single opponent mixed strategy in fictitious play. Separate estimates will be formed identically and independently for each opponent. We therefore consider only one opponent, and we drop all dependence on player i, and write st, σt and Qt for Player i's opponent's action, strategy and propensity respectively. Moreover for any vector x, x[j] will denote the jth element of the vector and for any matrix y, y[i, j] will denote the (i, j)th element of the matrix. We can use the following state space model to describe the fictitious play process: Qt = Qt−1 + ξt−1 st = h(Qt) + ζt where ξt−1 ∼ N (0, Ξ), is the noise of the state process and ζt is is the error of the observation state with zero mean and covariance matrix Z, which occurs because we approximate a discrete process like best responses, equation (1), using a continuous function h(·). Hence we can combine the EKF with fictitious play as follows. At time t − 1 Player i has an estimation of his opponent's propensity using a Gaussian distribution with mean mt−1 and variance Pt−1, and has observed an action st−1. Then at time t he uses EKF prediction step to estimate his opponent's propensity. The mean and variance of p(Qts1:t−1) of the opponent's propensity approximation are: m− t = mt−1 P − t = Pt−1 + Ξ Player i then evaluates his opponents strategies using his estimations as: (cid:80) exp(m− s∈S exp(m− t [st]/τ ) t [s]/τ ) σt(st) = . (6) where m− t [st] is the mean of Player i's estimation about the propensity of his opponent to play action st. Player i then uses the estimation of his opponent strategy , equation (6), and best responses, equation (1), to choose an action. After observing the opponent's action st, Player i correct his estimations about his opponent's propensity using the update equations of EKF process. The update equations are: vt = zt − h(m− t ) St = H(m− t )P − t H T (m− Kt = P − t )S−1 t H T (m− mt = m− t + Ktvt t − KtStK T Pt = P − t t t ) + Z (cid:80) (cid:48) where h = exp(Qt[s s∈S exp(Qt[s]/τ ) , and τ is a temperature parameter. The Jacobian matrix H(m− t ) is defined as ]/τ ) 7  [H(m− t )]j,j(cid:48) = (cid:80) ((cid:80) j(cid:54)=j(cid:48) exp(m ((cid:80) − exp(m − t [j(cid:48)]) j exp(m − t [j]) exp(m − t [j]))2 − t [j(cid:48)]) − t [j]) exp(m j exp(m − t [j]))2 if j = j(cid:48) if j (cid:54)= j' . Table 1 summarises the fictitious play algorithm when EKF is used to predict opponents strategies. At time t 1. Player i maintains some estimations about his opponents propensity up to time t − 1, p(Qt−1s1 : t − 1). Thus he has an estimation of the mean mt−1 and the covariance Pt−1 of this distribution. 2. Then Player i is updating his estimations about his opponents propensi- ties p(Qts1 : t − 1) using equations, m− (cid:80) opponents strategies using σj − t (sj) = exp(m t (j)/τ ) j(cid:48) exp(m − t (j)/τ ) . t = mt−1, P − t = Pt−1 + Wt−1. 3. Based on the weights of step 1 each player updates his beliefs about his 4. Choose an action based on the beliefs of step 3 according to best response. 5. Observe opponent's action st. 6. Update the propensities estimates using mt = m− t + Ktvt and Pt = P − t − KtStK T t . 7. set t=t+1 Table 1: EKF Fictitious Play algorithm 4 Theoretical Results In this section we present the convergence results we obtained for games with at least one pure Nash equilibrium and players who have 2 available actions, s = (1, 2). We will denote as −s the action that a player does not choose, for example if Player i's opponent chooses action 1, s = 1 and hence −s = 2. Also we will denote as m[1] and m[2] the estimated means of opponent's propensity of action 1 and 2 respectively. Similarly P [1, 1] and P [2, 2] will represent the variance of the propensity's estimation of action 1 and 2 respectively, and P [1, 2], P [2, 1] their covariance. The proposed algorithm has the following two properties: Proposition 1. If at iteration t of the EKF fictitious play algorithm, action s is played from Player i's opponent, then the estimation of his opponent propensity to play action s increases, mt−1[s] < mt[s]. Also the estimation of his opponent propensity to play action −s decreases, mt−1[−s] > mt[−s] Proof. The proof of Proposition 1 is on Appendix A. 8 L U 1,1 D 0,0 R 0,0 1,1 Table 2: Simple coordination game Proposition 1 implies that players, when they use EKF fictitious play, learn their opponent's strategy and eventually they will choose the action that will maximise their reward base on their estimation. Nevertheless there are cases where players may change their action simultaneously and trapped in a cycle instead of converging in a pure Nash equilibrium. As an example we consider the game that is depicted in Table 2. This is a simple coordination game with two pure Nash equilibria the joint actions (U, L) and (D, R). In the case were the two players start from joint action (U, R) or (D, L) and they always change their action simultaneously then they will never reach one of the two pure Nash equilibria of the game. Proposition 2. In a 2 × 2 game where the players use EKF fictitious play process to choose their actions, and the variance of the observation state is set to Z = rI + I, with high probability the two players will not change their action simultaneously infinitely often. We define  as a random number from normal distribution with zero mean and arbitrarily small covariance matrix, I is the identity matrix. Proof. The proof of Proposition 2 is on Appendix B. We should mention here that the reason we set Z = rI + I is in order to break any symmetries that occurred because the initialisation of the EKF fictitious play algorithm. Based on Proposition 1 and 2 we can infer the following propositions and theorems. Proposition 3. (a) In a game where players have two available actions if s is a Nash equilibrium, and s is played at date t in the process of EKF fictitious play, s is played at all subsequent dates. That is, strict Nash equilibria are absorbing for the process of EKF fictitious play. (b) Any pure strategy steady state of EKF fictitious play must be a Nash equilibrium. Proof. Consider the case where players beliefs σt, are such that their optimal choices correspond to a strict Nash equilibrium s. In EKF fictitious play pro- cess players' beliefs are formed identically and independently for each opponent based on equation (6). By Proposition 1 we know that players' estimations about their opponents' propensities and therefore their strategies, that each player maintains for the other players, will increase for the actions that are included in s and will be reduced otherwise. Thus the best response to their beliefs σt+1 will be again s and since s is a Nash equilibrium they will not de- viate from it. Conversely, if a player remains at a pure strategy profile, then eventually the assessments will become concentrated at that profile, because of Proposition 1, hence if the profile is not a Nash equilibrium, one of the players would eventually want to deviate. 9 Proposition 4. Under EKF fictitious play, if the beliefs over each player's choices converge, the strategy profile corresponding to the product of these dis- tributions is a Nash equilibrium. Proof. Suppose that the beliefs of the players at time t, σt, converges to some profile σ. If σ were not a Nash equilibrium, some player would eventually want to deviate and the beliefs would also deviate since based on Proposition 1 players eventually learn their opponents actions. Theorem 1. The EKF fictitious play process converges to the Nash equilibrium in 2 × 2 games with at least one pure Nash equilibrium, when the covariance matrix of the observation space error, Z, is defined as in Proposition 2, Z = rI + I. Proof. We can distinct two possible initial states in the game. In the first players' initial beliefs of the players actions are such that their initial joint action s0 is a Nash equilibrium. From Proposition 3 and equation (6) we know that they will play the joint action which is a Nash equilibrium for all the iterations of the game. The second case where the initial beliefs of the players are such that their initial joint action s0 is not a Nash equilibrium is divided in 2 subcategories. The first include 2× 2 games with only one pure Nash equilibrium. In this case, one of the two players has a dominant action, thus for all the iterations of the game he will choose the dominant action. This action maximises his expected payoff regardless the other player's strategy and thus he will select this action in every iteration of the game. Therefore because of Proposition 1 the other player will learn his opponent's strategy and players will choose the joint action which is the pure Nash equilibrium. The second category includes 2 × 2 games with 2 pure Nash equilibria, like the simple coordination game that is depicted in Table 2. In this case players initial joint action s0 = (s1, s2) is not a Nash equilibrium. Then the players will learn their opponent's strategy, Proposition 1 and Equation (6), and they will change their action. We know from Proposition 2 that in a finite time with high probability the players will not change their actions simultaneously, and hence they will end up in a joint action that will be one of the two pure Nash equilibria of the game. We can extend the results of Theorem 1 in n × 2 games with a better reply path. A game with a better reply path can be represented as a graph were its edges are the join actions of the game s and there is a vertex that connects s with s(cid:48) iff only one player i can increasing his payoff by changing his action (Young, 2005). Potential games have a better reply path. Theorem 2. The EKF fictitious play process converges to the Nash equilib- rium in n × 2 games with a better reply path when the covariance matrix of the observations space error, Z, is Z = r + I. Proof. Similarly to the 2 × 2 games if the initial beliefs of the players are such that their initial joint action s0 is a Nash equilibrium, from Proposition 3 and equation (6), we know that they will play the joint action which is a Nash equilibrium for the rest of the game. 10 Moreover in the case of the initial beliefs of the players are such that their initial joint action s0 is not a Nash equilibrium based on Proposition 1 and Proposition 2 after a finite number of iterations because the game has a better reply path the only player that can improve his payoff by changing his actions will choose a new action which will result in a new joint action s. If this action is not the a Nash equilibrium then again after finite number of iterations the player who can improve his payoff will change action and a new joint action s(cid:48) will be played. Thus after the search of the vertices of a finite graph, and thus after a finite number of iterations, players will choose a joint action which is a Nash equilibrium. 5 Simulations to define algorithm parameters Ξ and Z. The covariance matrix of the state space error Ξ = qI and the measurement error Z = rI are two parameters that we should define in the beginning of the EKF fictitious play algorithm and they affect its performance. Our aim is to find values, or range of values, of q and r that can efficiently track opponents' strategy when it smoothly or abruptly change, instead of choosing q and r heuristically for each opponent when we use the EKF algorithm. Nevertheless it is possible that for some games the results of the EKF algorithm will be improved for other combinations of q and r than the ones that we propose in this section. n +1 2 We examine the impact of EKF fictitious play algorithm parameters in its performance in the following two tracking scenarios. In the first one a single opponent chooses his actions using a mixed strategy which changes smoothly and has a sinusoidal form over the iterations of the tracking scenario. In particular = 1 − σt(2), for t = 1, 2, . . . , 100 iterations of the game: σt(1) = cos 2πt In the second toy example Player i's opponent change his where n = 100. strategy abruptly and chooses action 1 with probability σ2 t (1) = 1 during the first 25 and the last 25 iterations of the game and for the rest iterations of the game σ2 t (1) = 0. The probability of the second action is calculated as: t (2) = 1 − σ2 σ2 We tested the performance of the proposed algorithm for the following range of parameters 10−4 ≤ q ≤ 1 and 10−4 ≤ r ≤ 1. We repeated both examples 100 times for each of the combinations of q and r. Each time we measured the absolute error of the estimated strategy against the real one. The combined average absolute error when both examples are considered is depicted on Figure 1. The darkest areas of the contour plot represent the areas where the average absolute error is minimised. t (1). The average absolute error is minimised for a range of values of q and r, that form two distinct areas. In the first area, the wide dark area of Figure 1, the range of q and r were 0.08 ≤ q ≤ 0.4 and 0.2 ≤ r ≤ 1 respectively. In the second area, the narrow dark area of Figure 1, the range of q and r were 0.001 ≤ q ≤ 0.025 and 0.08 ≤ r ≤ 0.13 respectively. The minimum error which we observed in our simulations was in the narrow area and in particular when Ξ = 0.01I and Z = 0.1I, where I is the identical matrix. 11 Figure 1: Combined absolute error for both tracking scenarios. The range of both parameters, q and r is between 10−4 and 1. U M D U M D 0 0 40 0 0 30 0 50 0 U U -300 -300 0 M D 80 70 0 60 0 0 M U 100 M -300 0 0 0 0 D D 90 0 0 Table 3: Climbing hill game with three players. Player 1 selects rows, Player 2 selects columns, and Player 3 selects the matrix. The global reward depicted in the matrices, is received by all players. The unique Nash equilibrium is in bold 6 Simulation results This section is divided in two parts. The first part contains results of our simu- lations in two strategic form games and the second part contains the results we obtained in an ad-hoc sensor network surveillance problem. In all the simula- tions of this section we set the covariance matrix of the hidden and the observa- tions state to Ξ = 0.01I and Z = (0.1 + )I respectively, where  ∼ N (0, 10−5) and I is the identical matrix. 6.1 Simulations results in strategic form games In this section we compare the results of our algorithm with those of fictitious play in two coordination games. These games are depicted in Tables 2 and 3. The game that is depicted in Table 2, as it was described in Section 4 , is a simple coordination game with two pure Nash equilibria, its diagonal elements. Table 3 presents an extreme version of the climbing hill game (Claus and Boutilier, 1998) in which three players must climb up a utility function in order to reach the Nash equilibrium where their reward is maximised. We present the results of 50 replications of a learning episode of 50 iterations for each game. As it is depicted in Figures 2 and 3 the proposed algorithm performs better than fictitious play in both cases. In the simple coordination game that is shown in Table 2, the EKF fictitious play algorithm converges to 12 Figure 2: Results of EKF and classic fictitious play in the simple coordination game of Table 2 one of the pure equilibria after a few iterations. On the other hand fictitious play is trapped in a limit cycle in all the replications where the initial joint action was not one of the two pure Nash equilibria. For that reason the players' payoff for all the iterations of the game was either 1 utility unit or 0 utility units depending to the initial joint action. In the climbing hill game, Table 3 the proposed algorithm converges to the Nash equilibrium after 35 iterations when fictitious play algorithm do not converge even after 50 iterations. 6.2 Ad-hoc sensor network surveillance problem. We compared the results of our algorithm against those of fictitious play in a coordination task of a power constrained sensor network, where sensors can be either in a sense or sleep mode (Farinelli et al., 2008; Chapman et al., 2011). When the sensors are in sense mode they can observe the events that occur in their range. During their sleep mode the sensors harvest the energy they need in order to be able function when they are in the sense mode. The sensors then should coordinate and choose their sense/sleep schedule in order to maximise the coverage of the events. This optimisation task can be cast as a potential game. In particular we consider the case where I sensors are deployed in an area where E events occur. If an event e, e ∈ E, is observed from the sensors then it produce some utility Ve. Each of the sensors i = 1, . . . , I should choose an action si = j, from one of the j = 1, . . . , J time intervals which they can be in sense mode. Each sensor i when it is in sense mode can observe an event e, if it is in its sense range, with probability pie = 1 , where die is the distance between die the sensor i and the event e. We assume that the probability each sensor has to observe an event is independent from the other sensors. If we denote as iin the sensors that are in sense mode when the event e occurs and e is in their sensing range, then we can write the probability an event e to be observed from 13 Figure 3: Probability of playing the (U,U,D) equilibrium for the EKF fictitious play (solid line) and fictitious play (dash line) for the three player climbing hill game the sensors, iin as 1 − (cid:89) i∈iin (1 − pie) The expected utility that is produced from the event e is the product of its utility Ve and the probability it has to be observed by the sensors, iin that are in sense mode when the event e occurs and e is in their sensing range. More formally we can express the utility that is produced from an event e as: The global utility is then the sum of the utilities that all events, e ∈ E, produce (1 − pie)) Ue(s) = Ve(1 − (cid:89) (cid:88) i∈iin Uglobal(s) = Ue(s). e Each sensor after each iteration of the game receives some utility which is based on the sensors and the events that are inside his communication and sense range respectively. For a sensor i we denote e the events that are in its sensing range and s−i the joint action of the sensors that are inside his communication range. The utility that sensor i will receive if his sense mode is j will be (cid:88) Ui(si = j, s−i) = Ue(si = j, s−i). e We compared the performance of the two algorithms in 2 instances of the above scenario one with 20 and one with 50 sensors that are deployed in a unit square. In both instances sensors had to choose one time interval of the day that they will be in sense mode and use the rest time intervals to harvest energy. We consider cases where sensors had to choose their sense mode between 2, 3 and 14 4 available time intervals. Sensors are able to communicate with other sensors that are at most 0.6 distance units away, and can only observe events that are at most 0.3 distance units away. Moreover in both instances we assumed that 20 events took place in the unite square area. Those events were uniformly distributed in space and time, so an event could evenly appear in any point of the unit square area and it could occur at any time with the same probability. The duration of each event was uniformly chosen between (0-6] hours and each event had a value Ve ∈ (0 − 1]. Figures 4 and 5 depict the average results of 50 replications of the game for the two algorithms. For each instance, both algorithms run for 50 iterations. To be able to average across the 50 replications we normalise the utility of a replication by the global utility that the sensors will gain if they were only in sense mode during the whole day. (a) Results when sensors have to choose between two time intervals. (b) Results when sensors have to choose between three time intervals. (c) Results when sensors have to choose between four time intervals. Figure 4: Results of the instance where 20 sensors should coordinate for both algorithms. The results of EKF fictitious play are the solid lines and the results of the classic fictitious play are the dash lines. The horizontal axis of the figures depict the iteration of the game and the vertical axis the global utility as a percentage of the global utility of the system in the case that sensors were always in sense mode. As we observe in Figures 4 and 5 EKF fictitious play converges to a stable joint action faster than the fictitious play algorithm. In particular on average the EKF fictitious play algorithm needed 10 "negotiation" steps between the sensors in order to reach a stable joint action, when fictitious ply needed more than 25. Moreover the classic fictitious play algorithm was always resulted in joint actions with smaller reward than the proposed algorithm. 15 (a) Results when sensors have to choose between two time intervals. (b) Results when sensors have to choose between three time intervals. (c) Results when sensors have to choose between four time intervals. Figure 5: Results of the instance where 50 sensors should coordinate for both algorithms. The results of EKF fictitious play are the solid lines and the results of the classic fictitious play are the dash lines. The horizontal axis of the figures depict the iteration of the game and the vertical axis the global utility as a percentage of the global utility of the system in the case that sensors were always in sense mode. 7 Conclusion We have introduced a variation of fictitious play that uses Extended Kalman filters to predict opponents' strategies. This variation of fictitious play addresses the implicit assumption of the classic algorithm that opponents use the same strategy in every iteration of the game. We showed that, for 2 × 2 games with at least one pure Nash equilibrium, EKF fictitious play converges in the pure Nash equilibrium of the game. More over the proposed algorithm converges in games with a better reply path, like potential games, and n players that have 2 available actions. EKF fictitious play performed better than the classic algorithm algorithm in the strategic form games and the ad-hoc sensor network surveillance problem we simulated. Our empirical observations indicate that EKF fictitious play con- verges to a solution that is better than the classic algorithm and needs only a few iterations to reach that solution. Hence by slightly increasing the computa- tional intensity of fictitious play less communication is required between agents to quickly coordinate on a desired solution. 16 8 Acknowledgements This work is supported by The Engineering and Physical Sciences Research Council EPSRC (grant number EP/I005765/1). A Proof of Proposition 1 We will base the proof of Proposition 1 on the properties of EKF when they used to estimate opponent's strategy with two available actions. If player i's opponent has two available actions 1 and 2, then we can assume that at time t−1 Player i maintains beliefs about his opponent's propensity, with mean mt−1 and variance Pt−1. Moreover based on these estimations he chooses his strategy σt−1. At the prediction step of this process he uses the following equations to predict his opponent's propensity and choose an action using best response. (cid:18) m− (cid:19) m− (cid:18) P − t−1[1] m− t = t−1[2] t−1[1, 1] P − P − t−1[2, 1] P − t−1[1, 2] t−1[2, 2] (cid:19) + qI P − t = without loss of generality we can assume that his opponent in iteration t chooses action 2. Then the update step will be : since Players i's opponent played action 2 and h = write vt and Ht(m− t ) as: (cid:48) exp(Qt[s s∈S exp(Qt[s]/τ ) we can ]/τ ) (cid:80) (cid:19) vt = zt − h(m− t ) vt = = 1 − σt−1(1) (cid:19) (cid:18) 0 (cid:18) −σt−1(1) − 1 σt−1(1) (cid:18) σt−1(1) (cid:19) (cid:18) at −at (cid:19) (cid:18) b −b −at at (cid:19) −b b + Z Ht(m− t ) = where at is defined at = σt−1(1)σt−1(2). The estimation of St = H(m− will be: t )P − t H T (m− t ) + Z t [1, 2]. The Kalaman gain, Kt = P − t t H T (m− t )S−1 (cid:19) b (cid:19)(cid:18) b + r b b + r where b = P − can be written as t [1, 1]+P − St = a2 t [2, 2]−2P − (cid:18) P − Kt = 1 t [1, 1] 2rb + r2 k k P − t [2, 2] up to a multiplicative constant we can write (cid:19)(cid:18) at −at (cid:18) c −c −at (cid:19) at −d d K1 ∼ 17 where c = P − the mean and variance are: t [1, 1]− P − t [1, 2] and d = P − t [2, 2]− P − t [1, 2]. The updates then for mt =m− Pt =P − t + Ktvt t − KtStK T t The mean of the Gaussian distribution that is used to estimate opponent's propensities is: (cid:18) mt[1] mt[2] (cid:32) (cid:19) = mt = (cid:33) t [1] − 2σ(1) m− m− t [2] + 2σ(1) a(b−k) a(b−k) 4a2(b−k)+(r+) 4a2(b−k)+(r+) (7) Based on the above we observe that mt(1) < mt−1(1) and mt(2) > mt−1(2) which completes the proof. B Proof of Proposition 2 We consider 2 × 2 games with at least one pure Nash equilibrium. In the case that only one Nash equilibrium exists, a dominant strategy exists and thus one of the players will not deviate from this action. Hence we are interested in in 2 × 2 games with two pure Nash equilibria. Without loss of generality we consider a game with similar structure to the simple coordination game that is depicted in Table 2. with two equilibria, the joint actions in the diagonal of the payoff matrix, (U, L) and (D, R). We will present calculations for Player 1,but the same results hold also for Player 2. We define λ as the necessary confidence level that Player 1's estimation of σt(L) should reach in order to choose action U . Hence we Player 1 will choose D if: σt(1) > λ ⇔ > λ ⇔ exp(m− t [1]) exp(m− t [1]) + exp(m− t [2]) m− t [1] > ln( mt−1[1] > ln( λ 1 − λ λ 1 − λ ) + m− t [2] ⇔ ) + mt−1[2] In order to prove Proposition 2, we need to show that when a player changes his action his opponent will change his action at the same iteration with proba- bility less than 1. In the case where at time t − 1 the joint action of the players is U, R then Player 1 believes that his opponent will play L, while he observing him playing R. Assume that Player 2's beliefs about Player 1's strategies has reached the necessary confident level about Players 1's strategy and at iteration t he will change his action from R to L. Player 1 will also change his action at the same time if mt−1[2] > ln( 1 − λ λ ) + mt−1[1] We want to show that players will not change actions simultaneously with prob- ability 1. Hence it is enough to show that 18 P rob(mt−1[1] > ln( λ 1 − λ ) + mt−1[2]) > 0 (8) We can replace mt−1[1] and mt−1[2] with their equivalent from (7) and write: t [1] − 2σ(1) m− a(b − k) 4a2(b − k) + (r + ) > ln( λ 1 − λ ) + m− t [2] + 2σ(1) a(b − k) 4a2(b − k) + (r + ) ⇔ − 4σ(1) 4a2(b − k) + (r + ) > ln( 4a2(b − k) + (r + ) < −4σ(1) a(b − k) a(b − k) ) + m− λ 1 − λ 1−λ ) + m− t [2] − m− t [2] − m− t [1] ln( λ t [1] ⇔ Solving this with respect to  we have a(b − k)σ(1)  > ln( λ 1−λ ) + m− t [2] − m− t [1] Thus we can write (8) as: P rob( > a(b − k)σ(1) ln( λ 1−λ ) + m− t [2] − m− t [1] − a2(b − k) − r − a2(b − k) − r) > 0 (9) Since  is a Gaussian white noise (9) is always true. We also consider the case where at time t − 1 the joint action of the players is D, L then Player 1 believes that his opponent will play R, while he observing him playing L. Assume that Player 2's beliefs about Player 1's strategies has reached the necessary confident level and at t he will change his action from L to R. Player 1 will also change his action at the same time if mt−1[1] > ln( λ 1 − λ ) + mt−1[2] We want to show that Players will not change actions simultaneously with prob- ability 1. Hence it is enough to show that 1 − λ λ P rob(mt−1[2] > ln( ) + mt−1[1]) > 0 (10) We can rewrite (10) using the results we obtained for mt−1[1] and mt−1[2] in (7) again as P rob( > a(b − k)σ(1) ln( λ 1−λ ) + m− t [2] − m− t [1] − a2(b − k) − r) > 0 (11) Since  is a Gaussian white noise (11) is always true. If we define ξt the event that both players change their action at time t simul- taneously, and assume that the two players have change their actions simultane- ously at the following iterations t1, t2, . . . , tt, then the probability that they will also change their action simultaneously at time tT +1, P (ξt1 , ξt2, . . . , ξtT , ξtT +1) is almost zero for large but finite T . 19 References Arslan, G., Marden, J., Shamma, J.. Autonomous vehicle-target assignment: A game theoretical formulation. 2006. Brown, G.W.. Iterative solutions of games by fictitious play. In: Koopmans, T.C., editor. Activity Analysis of Production and Allocation. Wiley; 1951. p. 374 -- 376. Chapman, A.C., Leslie, D.S., Rogers, A., Jennings, N.R.. Convergent learn- ing algorithms for potential games with unknown noisy rewards. Working Papers 05/2011; University of Sydney Business School, Discipline of Business Analytics; 2011. Claus, C., Boutilier, C.. The dynamics of reinforcement learning in cooperative In: Proceedings of the fifteenth nationalon Artificial multiagent systems. intelligence. 1998. . Farinelli, A., Rogers, A., Jennings, N.. Maximising sensor network efficiency through agent-based coordination of sense/sleep schedules. In: Workshop on Energy in Wireless Sensor Networks in conjuction with DCOSS 2008. 2008. p. 43 -- 56. Fudenberg, D., Levine, D.. The theory of Learning in Games. The MIT Press, 1998. Grewal, M., Andrews, A.. Kalman filtering: theory and practice using MAT- LAB. Wiley-IEEE press, 2011. Jazwinski, A.. Stochastic processes and filtering theory. volume 63. Academic press, 1970. Kalman, R., et al. A new approach to linear filtering and prediction problems. Journal of basic Engineering 1960;82(1):35 -- 45. Kho, J., Rogers, A., Jennings, N.R.. Decentralized control of adaptive sam- pling in wireless sensor networks. ACM Trans Sen Netw 2009;5(3):1 -- 35. van Leeuwen, P., Hesselink, H., Rohlinga, J.. Scheduling aircraft using constraint satisfaction. Electronic Notes in Theoretical Computer Science 2002;76:252 -- 268. Monderer, D., Shapley, L.. Potential games. Games and Economic Behavior 1996;14:124 -- 143. Nash, J.. Equilibrium points in n-person games. In: Proceedings of the National Academy of Science, USA. volume 36; 1950. p. 48 -- 49. Smyrnakis, M., Leslie, D.S.. Dynamic Opponent Modelling in Fictitious Play. The Computer Journal 2010;. Stranjak, A., Dutta, P.S., Ebden, M., Rogers, A., Vytelingum, P.. A multi- agent simulation system for prediction and scheduling of aero engine overhaul. In: AAMAS '08: Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems. 2008. p. 81 -- 88. 20 Wolpert, D., Turner, K.. An overview of collective intelligence. Handbook of Agent Technology 1999.;. Young, H.P.. Strategic Learning and Its Limits. Oxford University Press, 2005. 21
1004.3809
1
1004
2010-04-21T21:33:32
Artificial Immune Systems Metaphor for Agent Based Modeling of Crisis Response Operations
[ "cs.MA", "cs.AI", "cs.CY" ]
Crisis response requires information intensive efforts utilized for reducing uncertainty, calculating and comparing costs and benefits, and managing resources in a fashion beyond those regularly available to handle routine problems. This paper presents an Artificial Immune Systems (AIS) metaphor for agent based modeling of crisis response operations. The presented model proposes integration of hybrid set of aspects (multi-agent systems, built-in defensive model of AIS, situation management, and intensity-based learning) for crisis response operations. In addition, the proposed response model is applied on the spread of pandemic influenza in Egypt as a case study.
cs.MA
cs
Artificial Immune Systems Metaphor for Agent Based Modeling of Crisis Response Operations Khaled M. Khalil1, M. Abdel-Aziz1, Taymour T. Nazmy1, Abdel-Badeeh M. Salem1 1Faculty of Computer and Information Science Ain shams University Cairo, Egypt [email protected], [email protected], [email protected], [email protected] Abstract. Crisis response requires information intensive efforts utilized for reducing uncertainty, calculating and comparing costs and benefits, and managing resources in a fashion beyond those regularly available to handle routine problems. This paper presents an Artificial Immune Systems (AIS) metaphor for agent based modeling of crisis response operations. The presented model proposes integration of hybrid set of aspects (multi-agent systems, built- in defensive model of AIS, situation management, and intensity-based learning) for crisis response operations. In addition, the proposed response model is applied on the spread of pandemic influenza in Egypt as a case study. Keywords: Crisis Response, Multi-agent Systems, Agent-Based Modeling, Artificial Immune Systems, Process Model. 1 Introduction The challenge of crisis response is reducing the influence crises cause to society, the economy, and the lives of individuals and communities. This challenge is extreme in several dimensions. The demand is highly diverse and largely unpredictable in terms of location, time, and specific resources needed. Moreover, the urgency associated with crisis has many implications, such as the need to rapidly identify information about the developing situation, and to have the capability to make good decisions in the face of an inevitable degree of uncertainty and incompleteness of information. An efficient crisis response is of paramount importance, because if not responded to promptly and managed properly, even a small mishap could lead to a very big catastrophe with significantly severe consequences. Being equipped with a profusion of resources does not ensure a successful response to the crisis situation. Thus, the key to the successful response necessitates an effective and expedited allocation of the requested resources to the emergency locations. Such complexity suggests the use of intelligent agents for adaptive real-time modeling of the crisis response operations [16]. Multi-agent Systems are computational systems where software agents cooperate or compete with each other to achieve an individual or collective task [30]. In order to build multi-agent architecture, and increase the effectiveness of the crisis response operations, a similar metaphor is required that mimics the crisis response operations. AIS metaphor is selected in this study. AIS are a computational systems inspired by the principles and processes of the biological immune system [5] [9] . AIS represent an area of vast research over the last few years. For example, developed AIS in a variety of domains, such as machine learning [14], anomaly detection [4] [10], data mining [21], computer security [20] [6], adaptive control [24] and fault detection [7]. The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distributed task force that has the intelligence to take action from a local and also a global perspective using its network of chemical messengers for communication [6]. A more detailed overview of the immune system can be found in many textbooks [23] [26]. The immune system combines a priori knowledge with the adapting capabilities of a biological immune system to provide a powerful alternative to currently available techniques for pattern recognition, learning and optimization [22] . It uses several computational models and algorithms such as Bone Marrow Model, Negative Selection Algorithm, and Clonal Selection Algorithm [13]. In this paper we propose a multi-agent based model for crisis response. The proposed model architecture and operations process are adopted from AIS. Then the proposed response model is applied on controlling pandemic influenza in Egypt. Section 2 provides the proposed response model, while section 3 presents design of the proposed model for pandemic influenza in Egypt. Section 4 includes experiments. Finally, section 5 includes conclusions. 2 The Proposed Response Model The view of the biological immune system provides the basis for a representation of AIS as systems of autonomous agents which exist within a distributed and compartmentalized environment [29]. In what follows, we present the multi-agent model based on the AIS metaphor for crisis response operations. 2.1 Proposed Hierarchical Architecture for Multi-Agent Response Model The architecture of the AIS can be abstracted into hierarchy of three levels (cells, tissue, and host) (see Fig. 1). Cells are able to interact with their environment and communicate and coordinate their behavior with other cells by synthesizing and responding to a range of molecules. Cells within the body aggregate to form tissue, such as muscle or connective tissue. Tissues themselves combine to form hosts, such as the heart, brain, or thymus. Hosts work together to form the immune system. The proposed multi-agent architecture follows the same hierarchical architecture of the biological immune systems with mapping of the functionalities of cells to agents and adopting crisis response domain attributes and operations levels (operational, tactical and strategic levels [2] [3]) (see Table 1). Pathogens represent source of danger to the body entity, in which immune systems antibody cells tries to detect and kill. Pathogens are mapped to danger sources or undesired situations in the crisis domain, in which agents have to detect and overcome. Cells are represented by agents working as first responders and voluntaries. Cells contain different type of receptors which affect their capability to match pathogens and to kill them. Thus, receptors are mapped to agents skills or resources required to overcome danger. Agents are working in groups belonging to certain organization (tissue) which provide help by other agents teams dedicated in the tactical level. Host represents the grouping of different tissues working together. This can be mapped to emergency operations center (EOC) of different working divisions and each division contains specialized teams. Human Immune System Hos t Hos t Hos t Tissues T issues Tissues ..... ..... Cells Cells Cells ..... Fig. 1. Hierarchical architecture of human immune system Table 1. Mapping biological immune system levels to crisis response operations and levels Biological Immune System Level Pathogens Cellular Tissue Host System Crisis Response Level - Operational Tactical Strategic - Crisis Domain Danger sources – harmful situations First Responders and Voluntaries Helper Agents staff Emergency Operations Centers Human Society and Important Properties 2.2 AIS Operational Architecture for Multi-Agent Model However, the AIS layered structure which is adopted in previous section is not complete from the conceptual framework perspective, which is required to allow effective algorithms to be developed [28]. Brownlee [1] said that "The acquired immune system provides a general pattern recognition and defense system that modifies itself, adapting to improve its capability with experience". Decision Making Process of AIS (Conceptual Model Formalization) The effectiveness of the system is due to a set of internal strategies to cope with pathogenic challenges. Such strategies remodel over time as the organism develops, matures, and then ages. Towards determining the decision making process of AIS, rational reconstructions approach is used. Rational reconstructions operate so as to transform a given problematic philosophical scientific account-particularly of a terminological, methodological or theoretical entity-into a similar, but more precise, consistent interpretation [8] . Proposed rational reconstruction of AIS follows the same steps of Grant et al. work [12] . Grant et al. steps include: definition of requirements of the model, definition of the top-level use-cases, selection of notation, formalization of the process model by walking through use-cases, implementation, and evaluation. Definition of requirements of the proposed response model follows crisis response systems design requirements [17] [18]. The following requirements were defined as: • The model processes are concurrent. • Support multiple instances of agents. • Agents located in different layers should share required information only. • Allow continuous monitoring of the situation and available resources. • Permit relationships between agents to be collaborative. • Allow separate behavior of each agent based on its role and objectives. • Allow removal and adding of new agents and components at run time. • Allow continuous planning/re-planning. • Integrate planning and learning processes. • Each process defined can be done by one or more agents. Agents with different roles differ by their allocated processes. Definition of the top-level use cases is as follows (see Fig. 2): • Use-case (0): no change in environment. This use-case applies when no pathogens found in the environment. • Use-case (1): antibody found a pathogen. This use-case applies when the antibody finds a pathogen in the environment. • Use-case (2): antibody receptors detect the required response for pathogens. This use-case applies when the antibody receptors match the pathogen, and can provide required response. • Use-case (3): antibody receptors cannot detect the type of the pathogen thus failed to provide required response. This use-case applies when the antibody failed to match the pathogen and failed to provide response. • Use-case (4): antibody cell asks for help for handling the unknown pathogen. This use-case applies when antibody failed to response to the pathogen. Antibody sends signals to activate the adaptive response. • Use-case (5): adaptive cells mutate to match the pathogen and generate required receptors. This use-case applies when the adaptive cells mutate to match the pathogen and generate the required receptors. • Use-case (6): required receptors are cloned to be applied to pathogen. This use-case applies when the required receptors for response are cloned to provide response to pathogen. • Use-case (7): successful response is sustained as memory cells. This use-case applies when a successful response is executed; the receptors are stored in memory cells for later usage. Go to use-case (0). • Use-case (8): failed response is ignored. This use-case applies when a failed response is gained; the receptors are ignored and not stored in memory. Go to use-case (5). Selection of Notation includes selection of process notation for representing the process model. Integrated DEFinition Methods Technique (IDEFS0) [15] represents a common notation used in process modeling which is highly suited to specifying systems in terms of functional processes [12] . Fig. 2. Rationally reconstructed AIS model, formalized using SADT notation The rationally reconstructed model (see Fig. 2) can be explained by starting at the environment and considering the activity of a typical Cell. Antibody cell checks other cells in the environment. Antibody cell determines if the examined cell is self or non- self based on the available receptors in the system using specific discrimination method. If cell is identified as non-self, cell immediately tries to match the receptors of the cell with existing receptors for response using matching method. If response receptors are found, clonal of the antibodies using clonal algorithm is applied to attack the pathogen cell. In case of new pathogen receptors not currently recognized, cell activates the adaptive response mechanism. Cells in the adaptive response mechanism mutate to match the non-self receptors using available genes library and negative selection algorithm. When reach an acceptable receptors form, the generated antibodies are cloned to provide response to the pathogen cell. Then, the newly generated receptors are added to the receptors library. Table 2 shows comparison between the AIS rational reconstructed model and other process models such as OODA, RPDM, and Rasmussen models. Comparison criteria and OODA, RPDM, and Rasmussen models values are presented by Grant et al. [11]. Table 2. Comparing proposed AIS, OODA, RPDM, and Rasmussen models Criteria/Process Model Control Loop Detailed Tempo (fast decision making) Planning Learning OODA √ × √ × × Rasmussen √ × × √ × RPDM √ √ × × × AIS Model √ √ × √ √ Formalizing the process model by walking through use-case. Use case (8) represents failing to response to pathogen cells. To formalize the process model, steps of the use case are presented as follows (see Fig. 3): 1. Antibody cell examines other cells looking for pathogens. 2. Antibody cell detects that cell is non-self. 3. Antibody cell tries to find proper receptors to kill the pathogen. 4. Antibody cell failed to response. 5. Antibody cell activates the adaptive system to generate proper receptors. 6. Adaptive cells mutate to match the pathogen and generate required receptors. 7. Required receptors are cloned and response is provided. 8. Failed response is reported as the pathogen is detected again which backs to step 1. Fig. 3. Walk through use case (8), failed response to pathogen Mapping AIS Operational Model to Crisis Response Multi-Agent Model After definition of the conceptual model of the AIS, mapping the proposed model to multi-agent model for crisis response is a straight forward process (see Tables 3 and 4). An agent can examine environment searching for danger sources or undesired feature. This can be mapped to operational agents. When agent finds an un-desired situation in environment, agent tries to handle the problem using available procedures. If the situation exceeds the available routine procedures, agents ask for help from tactical agents. Tactical agents check available memory for similar situations and check if the old experienced situation can be adopted for the current situation or not. If an old situation matches the current state of the environment, apply the course of actions coupled with the experienced situation. Otherwise, tactical agent asks for decision making (strategic) agent help. Using nearest matched situation, decision making agent mutates different course of actions to handle the current situation till reach an acceptable course of actions (intensity-based learning [25]). Decision making agent allocates course of actions to tactical agents to be deployed (cloned). During the execution of actions, operational agents report status of tasks execution, and in case of failed task re-planning is presented. Finally, generation and death of agents are related to the application domain of the proposed model. In crisis response death of cells and generation of new cells can be mapped to deployment of effective actions and neglecting others, or removal and adding new responders to the response field. Table 3. Mapping AIS operational model to crisis response multi-agent model Biological Immune System Level Cells Helper Cells Cells mutation Memory Cells Crisis Response Domain Operational agent Tactical agents Decision making agents Case Memory Table 4. Mapping AIS Operational Model Processes to agents' roles Biological Immune System Process Self or non-self discrimination Matching existing receptors Identify new receptors Clone required receptors Response Cells generation and death Crisis Domain Agent Role Reporting un-desired situation Situation Recognition Planning (Situation Assessment) Allocation of plan tasks Executing plan tasks Deployment of effective actions and neglecting non-effective actions Operational Tactical Decision making Tactical Operational 3 Crisis Response to Pandemic Influenza in Egypt This section presents the design, and implementation of the proposed response model for pandemic influenza in Egypt. Agent environment includes two parts: the pandemic model which is implemented in the previous work [19], and the available resources (control strategies or actions). Agent retrieves the current pandemic situation based on the agents' health states. Each control strategy is represented by (resource type, amount, cost, from/to date, and efficiency [19]). Agents' roles argue that each agent has its own profile and roles which specify its responsibilities and skills. For example decision making agent has the role of making decisions and adding new memory cases, while tactical agent has the role of processing information and allocating tasks to operational agents. Table 5 shows different agent roles, role responsibilities, and number of agents allowed per emergency operations center. Added here a new role titled tactical communication agent. Actually tactical communication agent is a tactical agent which is specialized for managing communication among the EOC parties. Tactical communication agent has to receive reports from operation agents, send reports to other tactical agents, deliver reports to crisis decision maker, and deliver plans back to the tactical agents. Crisis decision making agent follows the BDI (Belief-Desire-Intention) cognitive model [27]. While, tactical and operational agents are recognized as reactive helper agents for the decision making agents, and do not have believes nor desires. Decision making agents need to work with other agents in EOC through collaboration to deliver resources information and to deploy actions. Decision making agents need to make decisions to control the spread of pandemic influenza using available effective resources. Decision making agents need to determine the course of actions to be deployed to control the pandemic. Agent Role Decision Making Agent Tactical Communication Agent Tactical Agent Operational Agent Table 5. Agent roles and number of agents per EOC Responsibilities Providing course of actions Adding new cases to memory Receiving reports from operational agents Receiving resources reports from tactical agents Sending reports to decision making agent Receiving plan from decision making agent Assigning plan tasks to tactical agents Receiving status of plan execution Sending plans status to decision making agent Handling reports from communication agent Processing available resources Reporting current environment state Deployment of course of actions # of Agents 1 1 1 or more 1 or more Design of the AIS Planning Methodology in the Proposed Response Model Design of AIS planning methodology follows Stepney et al. [28] structure of AIS engineering. Pandemic situation is represented as a record of the total number of agents based on agents' health states. For example, situation can be represented by: (Susceptible: 50 agents, In-Contact: 10 agents, Infectious: 20 agents, Isolated Infected: 10 agents, Recovered: 1 agent, and Dead: 3 agents). The required course of actions to control given pandemic situation is represented as follows: (identifier, successfulness of the course of actions, and current pandemic situation). In addition the course of actions is coupled with deployed actions. The entry of course of actions and its coupled actions constructs a memory case. The city block distance is used here to find the similarity between situations. For example: distance between situation 1 (Infectious: 2 agents, Isolated Infectious: 1 10 0 33 31 20 =− +−+− agent) and situation 2 (Immunized: 31 agents) is: . Immune algorithms present the mutation (dynamic) behavior of AIS. Bone marrow algorithm, positive selection algorithm, clonal selection is used in the proposed model implementation. 4 Experiments The main goal of experiments scenarios is to validate the proposed response model. Scenarios basically include simulation of pandemic influenza in a closed population of 1000 agents and initially three infected agents located in Cairo. Cairo EOC contains 3 operational agents, 2 tactical agents, and one decision making agent. The duration of the simulation round is 50 days. All simulation rounds involve randomly generated resources pool. Each action in the resource pool has efficacy of (0.75). The basic simulation round with no control strategies gives pandemic peak on day 10 with %60.8 infected agents [19]. Fig. 4 shows the flow of control during a simulation round, and the total cost of deployed actions (total cost = 2821.4 and plan certainty = 0 due to there are no previous plans in the system). While, Fig. 5 shows the stored case memory for the finished simulation round (case id = 174, successfulness = 0.001198). It is found that the pandemic peak is shifted to day 16 with %55 infected agents of the population. Fig. 4. Round 1 - Crisis Response Log Fig. 5. Round 1 - Case Memory 5 Conclusions Currently, multi-agent architecture is the essence of response systems. The original idea comes out from agent characteristics in MAS, such as autonomy, local view of environment, capability of learning, planning, coordination and decentralized decision making. The incorporation of multi-agent systems can be clarified by discussing major disciplines involved during crisis response operations; situation management, and decision making and planning. The study of biological systems is of interest to scientists and engineers as they turn out to be a source of rich theories. They are useful in constructing novel computer algorithms to solve complex engineering problems. Immunology as a study of the immune system inspired the evolution of artificial immune system, which is an area of vast research over the last few years. Detecting non-self, matching receptors, clone antibodies, response then detecting non-self cells again represents the control loop in the AIS metaphor. This process loop (control loop) is the core of the decision making process in AIS metaphor. The AIS model allows learning by mutating genes to generate acceptable receptors and store them in memory cells. Selection of required antibodies to be cloned and the cloning process represents the planning methodology of AIS. Artificial immune systems represent an interesting metaphor for building effective based and defensive multi-agent crisis response operations model. The proposed architecture proposed by AIS, promises effective operations and system architecture for crisis response. According to experiments scenarios, AIS model shows slow learning process but it is very fast in handling desired or un-desired situations. Number of cases represents the growth of the system. While, scenarios results show that the effectiveness of response operations and utilization of resources are improved within the growth of the response model by ignoring low successfulness memory cases while deliberating new course of actions. The simulation process is very slow and consumes a lot of computation power. Each round takes at least 10 minutes to complete. It is recommended to implement the model using high performance computing to enable fast growth of case memory. References 1. Brownlee, J.: A Hierarchical Framework of the Acquired Immune System. Technical Report, Victoria, Australia: Complex Intelligent Systems Laboratory (CIS), Swinburne University of Technology (2007). 2. Builder, C. H., Steven, C., Bankes, Nordin, R.: Command Concepts A Theory Derived from the Practice of Command and Control. RAND Corporation's National Defense Research Institute, ISBN/EAN: 0-8330-2450-7 (1999). 3. Chen, R., Sharman, R., Rao, H. R., and Upadhyaya, S.: Design Principles for Critical Incident Response Systems. In Journal of Information Systems and E-Business Management, Volume 5, Number 3, pp. 201-227 (2007). 4. Dasgupta, D., and Forrest, S.: Novelty detection in time series data using ideas from immunology. In ISCA 5th International Conference on Intelligent Systems (1996). 5. Dasgupta, D., Attoh-Okine, N.: Immunity-Based Systems: A Survey. In the proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Orlando, Florida, Volume 1, pp. 369-374 (1997). 6. Dasgupta, D.: Immune-based intrusion detection system: A general framework. In proceedings of the National Information Systems Security Conference, pp.147–160 (1999). 7. Dasgupta, D., Krishna, K. K., Wong, D., and Berry, M.: Negative selection algorithm for aircraft fault detection. In proceedings of the Third International Conference, ICARIS2004 on Artificial Immune Systems, pp. 1-13 (2004). 8. Davia, G.A.: Thoughts on a Possible Rational Reconstruction of the Method of "Rational Reconstruction". In Twentieth World Congress of Philosophy Boston, Massachusetts U.S.A., pp. 10-15 (1998). 9. Golzari, S., Doraisamy, S., Sulaiman, M. N. B., and Udzir, N. L.: A Review on Concepts, Algorithms and Recognition-Based Applications of Artificial Immune System. Springer- Verlag Berlin Heidelberg, CCIS 6, pp. 569–576 (2008). 10. Gonzalz, F., and Dasgupta, D.: Anomaly detection using real-valued negative selection.Genetic Programming and Evolvable Machines, pp. 383-403 (2004). 11. Grant, T.J., and Kooter, B.M.: Comparing OODA and Other Models as Operational View C2 Architecture. In Proceedings, 10th International Command and Control Research and Technology Symposium (ICCRTS 2005), Washington DC, USA (2005). 12. Grant, T.: Unifying Planning and Control using an OODA-based Architecture. In Proceedings of Annual Conference of South African Institute of Computer Scientists and Information Technologists (SAICSIT), White River, Mpumalanga, South Africa, pp. 111 – 113 (2005). 13. Hofmeyr, S.A.: An interpretative introduction to the immune system. In Design Principles for the Immune System and other Distributed Autonomous Systems, edited by Cohen I., and Segel L.A., Oxford University Press: New York (2000). 14. Hunt, J.E., and Cooke, D.E.: Learning using an artificial immune system. Journal of Network Computing Applications, Volume19, pp. 189-212 (1996). 15. Integrated DEFinition (IDEF) methods IDEF0 – Function Modeling Method, http://www.idef.com/IDEF0.htm. 16. Khalil, K.M., Abdel-Aziz, M. H., Nazmy, M. T., Salem, A. M.: The Role of Artificial Intelligence Technologies in Crisis Response. Mendel Conference, 14th International Conference on Soft Computing, pp. 293-298 (2008). 17. Khalil, K.M., Abdel-Aziz, M. H., Nazmy, M. T., Salem, A. M.: Multi-Agent Crisis Response systems – Design Requirements and Analysis of Current Systems. Fourth International Conference on Intelligence Computing and Information Systems, Cairo, Egypt, pp. 920-925 (2009). 18. Khalil, K.M., Abdel-Aziz, M. H., Nazmy, M. T., Salem, A. M.: Bridging the Gap between Crisis Response Operations and Systems. Annals of University of Craiova, Mathematics and Computer Science Series, Volume 36, Number 2, ISSN: 1223-6934, pp. 141 -145 (2009). 19. Khalil, K.M., Abdel-Aziz, M. H., Nazmy, M. T., Salem, A. M.: An agent-based modeling for pandemic influenza in Egypt. INFOS2010: 7th International Conference on Informatics and Systems, Cairo, Egypt, AOM 24-30 (2010). 20. Kim, J., and Bentley, P.: Toward an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection. In Proceedings of the 2002 Congress on Evolutionary Computation, Honolulu, Hawaii, pp. 1244-1252 (2002). 21. Knight, T., and Timmis, J.: AINE: An immunological approach to data mining. IEEE International Conference on Data Mining, pp. 297-304 (2001). 22. Krishnakumar, K.: Artificial Immune System Approaches for Aerospace Applications. Technical Report, AIAA (2003). 23. Kubi, J.: Immunology. W H Freeman, Fifth Edition (2002). 24. Krishna, K.K., and Neidhoefer, J.: Immunized adaptive critic for an autonomous aircraft control application. Springer-Verlag, Inc., Chapter 20 in the book entitled Artificial Immune Systems and Their Applications, pp. 221-240 (1999). 25. Lewis, L.: Managing Computer Networks: A Case-Based Reasoning Approach. Artech House (1995). 26. Perelson, A.S., and Weisbuch, G.: Immunology for physicists Reviews of Modern Physics. Volume 69, pp. 1219-1267 (1997). 27. Shendarkar, A., Vasudevan, K., Lee, S., Son, Y.: Crowd simulation for emergency response using BDI agent based on virtual reality. In WSC '06: Proceedings of the 38th conference on Winter simulation, pp. 545-553 (2006). 28. Stepney, S., Smith, R., Timmis, Jon, and Tyrrell, A.: Towards a Conceptual Framework for Artificial Immune Systems. In the proceedings of the CARIS 2004: Third International Conference on Artificial Immune Systems, Catania, Sicily, Volume 3239 of Lecture Notes in Computer Science, Springer, pp 53-64 (2004). 29. Twycross, J., Aickelin, U.: Information Fusion in the Immune System. Information Fusion, Volume 11, Issue 1, pp. 35-44 (2010). 30. Weiss, G.: Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press, pp. 1–23 (2000).
1503.07220
2
1503
2015-04-02T22:58:57
Individual Planning in Agent Populations: Exploiting Anonymity and Frame-Action Hypergraphs
[ "cs.MA", "cs.AI", "cs.GT" ]
Interactive partially observable Markov decision processes (I-POMDP) provide a formal framework for planning for a self-interested agent in multiagent settings. An agent operating in a multiagent environment must deliberate about the actions that other agents may take and the effect these actions have on the environment and the rewards it receives. Traditional I-POMDPs model this dependence on the actions of other agents using joint action and model spaces. Therefore, the solution complexity grows exponentially with the number of agents thereby complicating scalability. In this paper, we model and extend anonymity and context-specific independence -- problem structures often present in agent populations -- for computational gain. We empirically demonstrate the efficiency from exploiting these problem structures by solving a new multiagent problem involving more than 1,000 agents.
cs.MA
cs
Individual Planning in Agent Populations: Exploiting Anonymity and Frame-Action Hypergraphs Ekhlas Sonu, Yingke Chen and Prashant Doshi THINC lab, Dept. of Computer Science University of Georgia Athens, Georgia 30602 {esonu,ykchen}@uga.edu, [email protected] Abstract Interactive partially observable Markov decision processes (I-POMDP) provide a formal framework for planning for a self-interested agent in multiagent settings. An agent operat- ing in a multiagent environment must deliberate about the ac- tions that other agents may take and the effect these actions have on the environment and the rewards it receives. Tradi- tional I-POMDPs model this dependence on the actions of other agents using joint action and model spaces. Therefore, the solution complexity grows exponentially with the num- ber of agents thereby complicating scalability. In this paper, we model and extend anonymity and context-specific indepen- dence -- problem structures often present in agent populations -- for computational gain. We empirically demonstrate the ef- ficiency from exploiting these problem structures by solving a new multiagent problem involving more than 1,000 agents. Introduction We focus on the decision-making problem of an in- dividual agent operating in the presence of other self-interested agents whose actions may affect the the environment and the subject agent's re- state of In stochastic and partially observable environ- wards. ments, this problem is formalized by the interactive POMDP (I-POMDP) (Gmytrasiewicz and Doshi 2005). I-POMDPs cover an important portion of the multiagent planning problem space (Seuken and Zilberstein 2008; Doshi 2012), and applications in diverse areas such as security Seymour and Peterson 2009), Woodward and Wood 2012), robotics ad and human (Doshi et al. 2010; behavior Wunder et al. 2011) testify to its wide appeal while critically motivating better scalability. (Ng et al. 2010; (Wang 2013; teams (Chandrasekaran et al. 2014) modeling hoc value iteration Previous I-POMDP solution approximations such as in- teractive particle filtering (Doshi and Gmytrasiewicz 2009), (Doshi and Perez 2008) point-based and policy (I- interactive (Sonu and Doshi 2014) scale I-POMDP solutions BPI) to larger physical state, observation and model spaces. introduced the specialized I- Hoang and Low (2013) POMDP Lite framework that promotes efficiency by bounded iteration Copyright c(cid:13) 2015, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. modeling other agents as nested MDPs. However, to the best of our knowledge no effort specifically scales I-POMDPs to many interacting agents -- say, a population of more than a thousand -- sharing the environment. For illustration, consider the decision-making problem of the police when faced with a large protest. The degree of the police response is often decided by how many protestors of which type (disruptive or not) are participating. The individ- ual identity of the protestor within each type seldom matters. This key observation of frame-action anonymity motivates us in how we model the agent population in the planning process. Furthermore, the planned degree of response at a protest site is influenced, in part, by how many disruptive protestors are predicted to converge at the site and much less by some other actions of protestors such as movement be- tween other distant sites. Therefore, police actions depend on just a few actions of note for each type of agent. The example above illustrates two known and power- ful types of problem structure in domains involving many agents: action anonymity (Roughgarden and Tardos 2002) and context-specific independence (Boutilier et al. 1996). Action anonymity allows the exponentially large joint ac- tion space to be substituted with a much more compact space of action configurations where a configuration is a tu- ple representing the number of agents performing each ac- tion. Context-specific independence (wherein given a con- text such as the state and agent's own action, not all actions performed by other agents are relevant) permits the space of configurations to be compressed by projecting counts over a limited set of others' actions. We extend both action anonymity and context-specific independence to allow con- siderations of an agent's frame as well. 1 We list the specific contributions of this paper below: 1. I-POMDPs are severely challenged by large numbers of agents sharing the environment, which cause an ex- ponential growth in the space of joint models and ac- tions. Exploiting problem structure in the form of frame- action anonymity and context-specific independence, we present a new method for considerably scaling the so- lution of I-POMDPs to an unprecedented number of 1I-POMDPs distinguish between an agent's frame and type with the latter including beliefs as well. Frames are similar in se- mantics to the colloquial use of types. agents. 2. We present a systematic way of modeling the prob- lem structure in transition, observation and reward func- tions, and integrating it in a simple method for solving I- POMDPs that models other agents using finite-state ma- chines and builds reachability trees given an initial belief. 3. We prove that the Bellman equation modified to include action configurations and frame-action independences continues to remain optimal given the I-POMDP with explicated problem structure. 4. Finally, we theoretically verify the improved savings in computational time and memory, and empirically demon- strate it on a new problem of policing protest with over a thousand protestors. The above problem structure allows us to emphatically mitigate the curse of dimensionality whose acute impact on I-POMDPs is well known. However, it does not lessen the impact of the curse of history. In this context, an additional step of sparse sampling of observations while generating the reachability tree allows sophisticated planning with a popu- lation of 1,000+ agents using about six hours. Related Work Building on graphical games (Kearns, Littman, and Singh 2001), action graph games (AGG) (Jiang, Leyton-Brown, and Bhat 2011) utilize problem structures such as action anonymity and context-specific independence to concisely represent single shot complete-information games involving multiple agents and to scalably solve for Nash equilibrium. The indepen- dence is modeled using a directed action graph whose nodes are actions and an edge between two nodes indicates that the reward of an agent performing an action indicated by one node is affected by other agents performing action of the other node. Lack of edges between nodes encodes the context-specific independence where the context is the action. Action anonymity is useful when the action sets of agents overlap substantially. Subsequently, the vector of counts over the set of distinct actions, called a configuration, is much smaller than the space of action profiles. We substantially build on AGGs in this paper by ex- tending anonymity and context-specific independence to in- clude agent frames, and generalizing their use to a par- tially observable stochastic game solved using decision- theoretic planning as formalized by I-POMDPs. Indeed, Bayesian AGGs (Jiang and Leyton-Brown 2010) extend the original formulation to include agent types. These result in type-specific action sets with the benefit that the ac- tion graph structure does not change although the number of nodes grows with types: ΘA nodes for agents with Θ types each having same A actions. If two actions from different type-action sets share a node, then these ac- tions are interchangeable. A key difference in our repre- sentation is that we explicitly model frames in the graphs due to which context-specific independence is modeled us- ing frame-action hypergraphs. Benefits are that we natu- rally maintain the distinction between two similar actions but performed by agents of different frames, and we add less additional nodes: Θ + A. However, a hypergraph is a more complex data structure for operation. Tempo- ral AGGs (Jiang, Leyton-Brown, and Pfeffer 2009) extend AGGs to a repeated game setting and allow decisions to con- dition on chance nodes. These nodes may represent the ac- tion counts from previous step (similar to observing the ac- tions in the previous game). Temporal AGGs come closest to multiagent influence diagrams (Koller and Milch 2001) al- though they can additionally model the anonymity and inde- pendence structure. Overall, I-POMDPs with frame-action anonymity and context-specific independence significantly augment the combination of Bayesian and temporal AGGs by utilizing the structures in a partially observable stochastic game setting with agent types. al. Varakantham et (2014) building on previous work (Varakantham et al. 2012) recently introduced a de- centralized MDP that models a simple form of anonymous interactions: rewards and transition probabilities specific to a state-action pair are affected by the number of other agents regardless of their identities. The interaction influence is not further detailed into which actions of other agents are relevant (as in action anonymity) and thus configurations and hypergraphs are not used. Furthermore, agent types are not considered. Finally, the interaction hypergraphs in networked-distributed POMDPs (Nair et al. 2005) model complete reward independence between agents -- analogous to graphical games -- which differs from the hypergraphs in this paper (and action graphs) that model independence in reward (and transition, observation probabilities) along a different dimension: actions. Background Interactive POMDPs allow a self-interested agent to plan individually in a partially observable stochastic environ- ment in the presence of other agents of uncertain types. We briefly review the I-POMDP framework and refer the reader to (Gmytrasiewicz and Doshi 2005) for further details. A finitely-nested interactive I-POMDP for an agent (say agent 0) of strategy level l operating in a setting inhabited by one of more other interacting agents is defined as the fol- lowing tuple: I-POMDP0,l = hIS0,l, A, T0, Ω0, O0, R0, OC0i • IS0,l denotes the set of interactive states defined as, IS0,l = S × QN j=1 Mj,l−1, where Mj,l−1 = {Θj,l−1 ∪ SMj}, for l ≥ 1, and ISi,0 = S, where S is the set of physical states. Θj,l−1 is the set of computable, inten- tional models ascribed to agent j: θj,l−1 = hbj,l−1, θji, where bj,l−1 is agent j's level l − 1 belief, bj,l−1 ∈ △ △(ISj,l−1), and θj = hA, Tj, Ωj, Oj, Rj, OCj i, is j's frame. Here, j is assumed to be Bayes-rational. At level 0, bj,0 ∈ △(S) and a level-0 intentional model reduces to a POMDP. SMj is the set of subintentional models of j, an example is a finite state automaton; • A = A0 × A1 × . . . × AN is the set of joint actions of all agents; • T0 : S × A0 × QN function; j=1 Aj × S → [0, 1] is the transition • Ω0 is the set of agent 0's observations; j=1 Aj × Ω0 → [0, 1] is the observation function; • O0 : S × A0 ×QN • R0 : S × A0 ×QN j=1 Aj → R is the reward function; and • OC0 is the optimality criterion, which is identical to that for POMDPs. In this paper, we consider a finite-horizon optimality criteria. Besides the physical state space, the I-POMDP's interac- tive state space contains all possible models of other agents. In its belief update, an agent has to update its belief about the other agents' models based on an estimation about the other agents' observations and how they update their models. As the number of agents sharing the environment grows, the size of the joint action and joint model spaces increases expo- nentially. Therefore, the memory requirement for represent- ing the transition, observation and reward functions grows exponentially as well as the complexity of performing belief update over the interactive states. In the context of N agents, interactive bounded policy iteration (Sonu and Doshi 2014) generates good quality solutions for an agent interacting with 4 other agents (total of 5 agents) absent any problem structure. To the best of our knowledge, this result illustrates the best scalability so far to N > 2 agents. Many-Agent I-POMDP To facilitate understanding and experimentation, we intro- duce a pragmatic running example that also forms our eval- uation domain. Figure 1: Protestors of different frames (colors) and police troops at two of three sites in the policing protest domain. The state space of police decision making is factored into the protest intensity lev- els at the sites. Example 1 (Policing Protest) Consider a policing sce- nario where police (agent 0) must maintain order in 3 geo- graphically distributed and designated protest sites (labeled 0, 1, and 2) as shown in Fig. 1. A population of N agents are protesting at these sites. Police may dispatch one or two riot-control troops to either the same or different locations. Protests with differing intensities, low, medium and high (dis- ruptive), occur at each of the three sites. The goal of the police is to deescalate protests to the low intensity at each site. Protest intensity at any site is influenced by the number of protestors and the number of police troops at that loca- tion. In the absence of adequate policing, we presume that the protest intensity escalates. On the other hand, two police troops at a location are adequate for de-escalating protests. Factored Beliefs and Update joint models of other agents, b0,l ∈ ∆(S × QN As we mentioned previously, the subject agent in an I- POMDP maintains a belief over the physical state and j=1 Mj,l−1), where ∆(·) is the space of probability distributions. For settings such as Example 1 where N is large, the size of the interactive state space is exponentially larger, IS0,l = SMj,l−1N , and the belief representation unwieldy. How- ever, the representation becomes manageable for large N if the belief is factored: b0,l(s, m1,l−1, m2,l−1, . . . , mN,l−1) = P r(s) P r(m1,l−1s) (1) × P r(m2,l−1s) × . . . × P r(mN,l−1s) This factorization assumes conditional independence of models of different agents given the physical state. Conse- quently, beliefs that correlate agents may not be directly rep- resented although correlation could be alternately supported by introducing models with a correlating device. j ), where M ∗ The memory consumed in storing a factored belief is j is the size of the largest O(S + N SM ∗ model space among all other agents. This is linear in the number of agents, which is much less than the exponentially growing memory required to represent the belief as a joint j N ). distribution over the interactive state space, O(SM ∗ 0 and the , the updated belief at Given agent 0's belief at time t, bt 0,l, its action at subsequent observation it makes, ωt+1 time step t + 1, bt+1 0,l , may be obtained as: 0 P r(st+1, mt+1 bt 0,l, at bt 0,l, at 0, ωt+1 0, ωt+1 N,l−1bt 0,l, at 1,l−1st+1, mt+1 1,l−1, . . . , mt+1 ) P r(mt+1 ) × . . . × P r(mt+1 0 0 2,l−1, . . . , mt+1 N,l−1st+1, bt 0,l, at 0, ωt+1 0 ) = P r(st+1 N,l−1, 0, ωt+1 0 ) (2) Each factor in the product of Eq. 2 may be obtained as follows. The update over the physical state is: P r(st+1bt ) ∝ P r(st+1, ωt+1 bt 0 1,l−1st) × . . . × bt N,l−1st) 0,l, at 0) 0,l(mt 0, ωt+1 0 bt 0,l(mt bt 0,l, at 0,l(st) Xmt 1mt −0 P r(at = Xst ×Xat −0 1,l−1) × . . . × P r(at N mt N,l−1) × Ot+1 0 (st+1, hat 0, at −0i, ωt+1 0 ) T0(st, hat 0, at −0i, st+1) (3) and the update over the model of each other agent, j = P r(mt+1 1 . . . N , conditioned on the state at t + 1 is: N,l−1, bt 1,l−1st) × . . . × bt j+1,l−1, . . . , mt+1 bt 0,l(mt bt j,l−1st+1, mt+1 0(st) Xmt 1mt −j,l−1 P r(at 1,l−1) × . . . × P r(at nmt N,l−1) 0,l, at 0, ωt+1 0,l(mt ) = 0 N,l−1st) Xst Xat Xωt+1 −j j Oj(st+1, haj , at −ji, ωt+1 j ) P r(mt+1 j mt j, at j, ωt+1 j ) (4) Derivations of Eqs. 3 and 4 are straightforward and not given here due to lack of space. In particular, note that models of agents other than j at t+1 do not impact j's model update in the absence of correlated behavior. Thus, under the assump- tion of a factored prior as in Eq. 1 and absence of agent cor- relations, the I-POMDP belief update may be decomposed into an update of the physical state and update of the models of N agents conditioned on the state. Frame-Action Anonymity As noted by Jiang et al. (2011), many noncooperative and co- operative problems exhibit the structure that rewards depend on the number of agents acting in particular ways rather than which agent is performing the act. This is particularly evi- dent in Example 1 where the outcome of policing largely de- pends on the number of protestors that are peaceful and the number that are disruptive. Building on this, we additionally observe that the transient state of the protests and observa- tions of the police at a site are also largely influenced by the number of peaceful and disruptive protestors moving from one location to another. This is noted in the example below: Example 2 (Frame-action anonymity of protestors) The transient state of protests reflecting the intensity of protests at each site depends on the previous intensity at a site and the number of peaceful and disruptive protestors entering the site. Police (noisily) observes the intensity of protest at each site which is again largely determined by the number of peaceful and disruptive protestors at a site. Finally, the outcome of policing at a site is contingent on whether the protest is largely peaceful or disruptive. Consequently, the identity of the individual protestors beyond their frame and action is disregarded. Here, peaceful and disruptive are different frames of others in agent 0's I-POMDP, and the above definition may be ex- tended to any number of frames. Frame-action anonymity is an important attribute of the above domain. We formally de- fine it in the context of agent 0's transition, observation and reward functions next: Definition 1 (Frame-action anonymity) Let ap −0 be a joint −0 be a joint action of action of all peaceful protestors and ad all disruptive ones. Let ap −0 be permutations of the two joint action profiles, respectively. An I-POMDP models frame-action anonymity iff for any a0, s, s′, ap T0(s, a0, ap −0, s′) = T0(s, a0, ap −0 and ad −0 and ad −0, s′), −0, ad −0, ad −0: −0, ad −0, ad −0, ad −0, ad −0) ∀ ap −0, ω0), and −0. −0, ω0) = O0(s′, a0, ap −0) = R0(s, a0, ap −0, ad O0(s′, a0, ap R0(s, a0, ap Recall the definition of an action configuration, C, as the vector of action counts of an agent population. A permu- tation of joint actions of others, say ap −0, assigns different actions to individual agents. Despite this, the fact that the transition and observation probabilities, and the reward re- mains unchanged indicates that the identity of the agent per- forming the action is irrelevant. Importantly, the configura- tion of the joint action and its permutation stays the same: C(ap −0). This combined with Def. 1 allows re- defining the transition, observation and reward functions to be over configurations as: T0(s, a0, C(ap −0), s′), O0(s′, a0, C(ap −0), C(ad −0 )). −0), o) and R0(s, a0, C(ap −0) = C( ap −0), C(ad −0), C(ad Let Ap 1, . . . , Ap −0. Observe that multiple joint actions from Ap n be overlapping sets of actions of n peace- ful protestors, and Ap −0 is the Cartesian product of these sets. Let C(Ap −0) be the set of all action configurations for Ap −0 may re- sult in a single configuration; these joint actions are config- uration equivalent. Consequently, the equivalence partitions the joint action set Ap −0) classes. Furthermore, when other agents of same frame have overlapping sets of ac- tions, the number of configurations could be much smaller than the number of joint actions. Therefore, definitions of the transition, observation and reward functions involving configurations could be more compact. −0 into C(Ap Frame-Action Hypergraphs In addition to frame-action anonymity, domains involving agent populations often exhibit context-specific indepen- dences. This is a broad category and includes the context- specific independence found in conditional probability ta- bles of Bayesian networks (Boutilier et al. 1996) and in action-graph games. It offers significant additional structure for computational tractability. We begin by illustrating this in the context of Example 1. Example 3 (Context-specific independence in policing) At a low intensity protest site, reward for the police on passive policing is independent of the movement of the protestors to other sites. The transient intensity of the protest at a site given the level of policing at the site (context) is independent of the movement of protestors between other sites. The context-specific independence above builds on the similar independence in action graphs in two ways: (i) We model such partial independence in the transitions of fac- tored states and in the observation function as well, in ad- dition to the reward function. (ii) We allow the context- specific independence to be mediated by the frames of other agents in addition to their actions. For example, the rewards received from policing a site is independent of the number of protestors at another site, instead the rewards are influenced by the number of peaceful and disruptive protestors present at that site. The latter difference generalizes the action graphs into frame-action hypergraphs, and specifically 3-uniform hyper- graph indicates that the reward for agent 0 on performing action a0 at state s is affected (in part) by the agents of frame θ−0 who perform action in A−0. We illustrate a general frame-action hypergraph for context- specific independence in a transition function and a reward function as bipartite Levi graphs in Figs. 2(a) and (b), re- spectively. We point out that the hypergraph for the reward function comes closest in semantics to the graph in ac- tion graph games (Jiang, Leyton-Brown, and Bhat 2011) al- though the former adds the state to the context and frames. Hypergraphs for the transition and observation functions dif- fer substantially in semantics and form from action graphs. To use these hypergraphs in our algorithms, we first define the general frame-action neighborhood of a context node. Definition 3 (Frame-action neighborhood) The frame- action neighborhood of a context node ψ ∈ Ψ, ν(ψ), given a frame-action hypergraph G is defined as a subset of A × Θ such that ν(ψ) = {(a−0, θ)a−0 ∈ A−0, θ ∈ Θ, (ψ, a−0, θ) ∈ E}. As an example, the frame-action neighborhood of a state- action pair, hs, a0i in a hypergraph for the reward function is the set of all action and frame nodes incident on each hy- peredge anchored by the node hs, a0i. We move toward integrating frame-action anonymity in- troduced in the previous subsection with the context-specific independence as modeled above by introducing frame- action configurations. Definition 4 (Frame-action configuration) A configura- tion over the frame-action neighborhood of a context node, ψ, given a frame-action hypergraph is a vector, C ν(ψ) △ = h C(A θ1 −0), C(A θ2 −0), . . . , C(A θ Θ −0 ), C(φ) i θ where each a included in A −0 is an action in ν(ψ) with θ frame θ, and C(A −0) is a configuration over actions by agents other than 0 whose frame is θ. All agents with frames other than those in the frame-action neighborhood are as- sumed to perform a dummy action, φ. Definition 4 allows further inroads into compacting the transition, observation and rewards functions of the I-POMDP using context-specific independence. Specifi- cally, we may redefine these functions one more time to limit the configurations only over the frame-action neighborhood of the context as, T0(s, a0, C ν(s,a0,s′), s′), O0(s′, a0, C ν(s′,a0,ω0), ω0) and R0(s, a0, C ν(s,a0)). 2 Revised Framework To benefit from structures of anonymity and context-specific independence, we redefine I-POMDP for agent 0 as: I-POMDP0,l = hIS0,l, A, Ω0, T0, O0, R0, OC0i where: 2Context in our transition function is hs, a0, s′i compared with the context of just hs, a0i in Varakantham et al's (2014) transitions. (a) (b) Figure 2: Levi (incidence) graph representation of a generic frame- action hypergraph for (a) the transition function, and (b) the re- ward function. The shaded nodes represent edges in the hypergraph. Each edge has the context, ψ, denoted in bold, agent's action, a, and its frame, θ, incident on it. For example, the reward for a state and agent 0's action, hs, a0i1 is affected by others' actions a1 j and j performed by any other agent of frame θ1 a2 j only. graphs where each edge is a set of 3 nodes. We formally define it below: Definition 2 (Frame-action hypergraph) A frame-action hypergraph for agent 0 is a 3-uniform hypergraph G = hΨ, A−0, Θ−0, Ei, where Ψ is a set of nodes that represent the context, A−0 is a set of action nodes with each node rep- resenting an action that any other agent may take; Θ−0 is a set of frame nodes, each node representing a frame ascribed to an agent, and E is a 3-uniform hyperedge containing one node from each set Ψ, A−0, and Θ−0, respectively. Both context and action nodes differ based on whether the hypergraph applies to the transition, observation or reward functions: • For the transition function, the context is the set of all pairs of states between which a transition may occur and each action of agent 0, Ψ = S × A0 × S, and the ac- tion nodes includes actions of all other agents, A−0 = SN j=1 Aj. Neighbors of a context node ψ = hs, a0, s′i are all the frame-action pairs that affect the probability of the transition. An edge (h s, a0, s′i, a−0, θ) indicates that the probability of transitioning from s to s′ on performing a0 is affected (in part) by the other agents of frame θ perform- ing the particular action in A−0. • The context for agent 0's observation function is the state- action-observation triplet, Ψ = S × A0 × Ω0, and the action nodes are identical to those in the transition func- tion. Neighbors of a context node, hs, a0, ω0i, are all those frame-action pairs that affect the observation probability. Specifically, an edge (hs, a0, ω0i, a−0, θ) indicates that the probability of observing ω0 from state s on perform- ing a0 is affected (in part) by the other agents performing action, a−0, who possess frame θ. • For agent 0's reward function, the context is the set of pairs of state and action of agent 0, Ψ = S × A0, and the action nodes the same as those in transition and observa- tion functions. An edge (h s, a0i, a−0, θ−0) in this hyper- • IS0,l, A, Ω0 and OC0 remain the same as before. The k=1 Xk. physical states are factored as, S = QK • T0 is the transition function, T0(x, a0, C ν(x,a0,x′), x′) where C ν(x,a0,x′) is the configuration over the frame- action neighborhood of context hx, a0, x′i obtained from a hypergraph that holds for the transition function. This transition function is significantly more compact than the original that occupies space O(X2A0A−0N ) com- ν∗ )ν∗) of T0, where the frac- pared to the O(X2A0( N ν∗+1 (cid:1), ν∗ is the maxi- ν∗ (cid:1) is obtained from mum cardinality of the neighborhood of any context, and ( N combinatorial compositions and represents the number of ways ν∗ + 1 non-negative values can be weakly com- posed such that their sum is N . tion is the complexity of (cid:0)N +ν∗+1 ν∗ )ν∗ ≪ A−0N . The value(cid:0)N +ν∗ • The is redefined observation is function O0(x′, a0, C ν(x′,a0,ω0), ω0) where C ν(x′,a0,ω0) the configuration over the frame-action neighborhood of context hx′, a0, ω0i obtained from a hypergraph that holds for the observation function. Analogously to the transition function, the original observation function consumes space O(XΩA0A−0N ), which is much ν∗ )ν∗) occupied by larger than space O(XΩA0( N this redefinition. • R0 is the reward function defined as R0(x, a0, C ν(x,a0)) where C ν(x,a0) is defined analogously to the configu- rations in the previous parameters. The reward for a state and actions may simply be the sum of rewards for the state factors and actions (or a more general function if needed). As with the transition and observa- tion functions, this reward function is compact occupy- ν∗ )ν∗) that is much less than ing space O(XA0( N O(XA0A−0N ) of the original. Belief Update For this extended I-POMDP, we compute the updated belief over a physical state as a product of its factors using Eq. 5 and belief update over the models of each other agent using Eq 6 as shown below: P r(st+1bt 0,l, at 0, ωt+1 0 ) ∝ (cid:26)Xst bt 0,l(st) P r(C ν(xt+1 k ,at 0,ωt+1 0 )bt 0,l(M1,l−1st), . . . , bt O0(xt+1 k , at 0, C ν(xt+1 k ,at 0,ωt+1 0 ), ωt+1 0 K ) ,ω ,at 0 t+1 k t+1 0 Cν(x Yk=1 X 0,l(MN,l−1st)) Yk=1 bt 0,l(st) K )(cid:27) ×(cid:26)Xst X ,at 0 ,x Cν(xt k P r(C ν(xt k ,at 0,xt+1 k )bt 0,l(M1,l−1st), . . . , t+1 k ) 0,l(MN,l−1st))T0(xt bt k, C ν(xt k,at 0,xt+1 k ), xt+1 k )(cid:27) (5) the term, P r(C ν(xt+1 Here, 0,l(M1,l−1st), . . . , 0,l(MN,l−1st)), is the probability of a frame-action con- bt figuration (see Def. 4) that is context specific to the triplet, 0,ωt+1 )bt ,at k 0 hxt+1, a0, ωt+1i. It is computed from the factored beliefs over the models of all others. We discuss this computation in the next section. The second configuration term has an analogous meaning and is computed similarly. The factored belief update over the models of each other agent, j = 1 . . . N , conditioned on the state at t+1 becomes: 0(mt bt j 0(st)Xmt j bt 0) = Xst P r(C ν(xt+1,at j ,ωj) P r(mt+1 j,l−1st+1, mt+1 −j,l−1, bt 0,l, at j mt P r(at st)Xat bt 0,l(M1,l−1st), . . . , bt C j) X ν(xt+1 ,at j j ,ωj ) Oj(xt+1, 0,l(MN,l−1st))Xot+1 j, at ) P r(mt+1 mt j j j j ) (6) j, ωt+1 j ,ωj ), ωt+1 j, C ν(xt+1,at at Proofs for obtaining Eqs. 5 and 6 are omitted due to space restrictions. Notice that the distributions over configurations are computed using distributions over other agents' models. Therefore, we must maintain and update conditional beliefs over other agents' models. Hence, the problem cannot be re- duced to a POMDP by including configurations with physi- cal states. Value Function The finite-horizon value function of the many-agent I-POMDP continues to be the sum of agent 0's immediate reward and the discounted expected reward over the future: V h(mt 0,l) = max 0∈A0 at ER0(bt 0,l, at 0)+ 0 0 bt (7) 0,l, at P r(ωt+1 0)V h−1(mt+1 0,l ) γ Xωt+1 0) is the expected immediate reward of where ER0(bt 0,l, at agent 0 and γ is the discount factor. In the context of the re- defined reward function of the many-agent I-POMDP frame- work in this section, the expected immediate reward is ob- tained as: bt 0,l, at ER0(bt 0) = Xst bt 0,l(M1,l−1st), . . . , bt 0,l(st)(cid:18) K Xk=1 XCν(xt k ,at 0) P r(C ν(xt k,at 0) 0,l(MN,l−1st))R0(xt k, at 0, C ν(xt k,at 0 )(cid:19) (8) = hxt over all and outermost the st k,at 0)bt the Ki, the 0,l(MN,l−1st)) sum is 1, . . . , xt 0,l(M1,l−1st), . . . , bt state where term, factors, P r(C ν(xt de- notes the probability of a frame-action configuration that is context-specific to the factor, xt k. Importantly, Propo- sition 1 establishes that the Bellman equation above is exact. The proof is given in the extended version of this paper (Sonu, Chen, and Doshi 2015). Proposition 1 (Optimality) The dynamic programming in Eq. 7 provides an exact computation of the value function for the many-agent I-POMDP. Algorithms We present an algorithm that computes the distribution over frame-action configurations and outline our simple method for solving the many-agent I-POMDP defined previously. for Distribution Over Frame-Action Configurations Algorithm 1 generalizes an algorithm by Jiang and Lleyton-Brown (2011) computing configurations over actions given mixed strategies of other agents to include frames and conditional beliefs over models of other agents. It computes the probability distribution of configurations over the frame-action neighborhood of an action given the belief over the agents' models: 0,l(MN,l−1st)) and P r(C ν(x,a0,ω0)bt . . . , bt P r(C ν(x,a0,x′)bt in 0,l(MN,l−1st)) bt Eq. 5, P r(C ν(x,ωj )bt in and 0,l(MN,l−1st)) in Eq. 8. bt 0,l(M1,l−1st), . . . , bt P r(Cν(x,a0)bt 0,l(M1,l−1st), 0,l(M1,l−1st), . . . , 0,l(MN,l−1st)) 0,l(M1,l−1st), . . . , Eq. 6, cremented (lines 9-12). Similarly, we update the probability of a configuration using the probability of aj and that of the base configuration cj−1 (line 15). This algorithm is invoked multiple times for different values of ν(·) as needed in the belief update and value function computation. We utilize a simple method for solving the many-agent I- POMDP given an initial belief: each other agent is modeled using a finite-state controller as part of the interactive state space. A reachability tree of beliefs as nodes is projected for as many steps as the horizon (using Eqs. 5 and 6) and value iteration (Eq. 7) is performed on the tree. In order to mitigate the curse of history due to the branching factor that equals the number of agent 0's actions and observations, we utilize the well-known technique of sampling observations from the propagated belief and obtain a sampled tree on which value iteration is run to get a policy. Action for any observation that does not appear in the sample is that which maximizes the immediate expected reward. Computational Savings Computing P r(C ν(·)b0,l(M1,l−1s), Algorithm 1 . . . , b0,l(MN,l−1s)) Input: ν(·), hb0,l(M1,l−1s), . . . , b0,l(MN,l−1s)i Output: A trie Pn representing distribution over the frame- action configurations over ν(·) 1: Initialize c0 ← (0, . . . , 0), one value for each frame- action pair in ν(·) and for φ. Insert into empty trie P0 2: Initialize P0[c0] ← 1 3: for j ← 1 to N do 4: 5: 6: 7: Initialize Pj to be an empty trie for all cj−1 from Pj−1 do for all mj,l−1 ∈ Mj,l−1 do for all aj ∈ Aj such that P r(aj mj,l−1) > 0 do 8: 9: 10: 11: 12: 13: 14: 15: cj ← cj−1 if haj, θji ∈ ν(·) then cj[aj] ← cj[aj] + 1 else cj[φ] ← cj[φ] + 1 if Pj[cj] does not exist then Initialize Pj[cj] ← 0 Pj[cj] ← Pj[cj] + Pj−1[cj−1] × P r(aj mj,l−1) × b0,l(mj,l−1s) 16: return Pn Algorithm 1 adds the actions of each agent one at a time. A Trie data structure enables efficient insertion and access of the configurations. We begin by initializing the configu- ration space for 0 agents (P0) to contain one tuple of inte- gers (c0) with ν + 1 0s and assign its probability to be 1 (lines 1-2). Using the configurations of the previous step, we construct the configurations over the actions performed by j agents by adding 1 to a relevant element depending on j's action and frame (lines 3-15). If an action aj performed by j with frame mj is in the frame-action neighborhood ν(·), then we increment its corresponding count by 1. Otherwise, it is considered as a dummy action and the count of φ is in- The complexity of accessing an element in a ternary search trie is Θ(ν). The maximum number of configurations encountered at any iteration is upper bounded by total ν∗ )ν∗). number of configurations for N agents, i.e. O(( N The complexity of Algorithm 1 is polynomial in N , ν∗ )ν∗) where M ∗ j are largest O(N M ∗ sets of models and actions for any agent. j ν∗( N j and A∗ j A∗ j N Ω∗ j N A∗ j N Ω∗ j N A∗ j N A∗ j S2M ∗ For the traditional I-POMDP belief update, the complex- j N ) and that ity of computing Eq. 3 is O(SM ∗ for computing Eq. 4 is O(SM ∗ j ) where ∗ denotes the maximum cardinality of a set for any agent. For a factored representation, belief update operator in- vokes Eq. 3 for each value of all state factors and it in- vokes Eq. 4 for each model of each agent j and for all values of updated states. Hence the total complexity of be- lief update is O(N M ∗ j ). The com- plexity of computing updated belief over state factor xt+1 ν∗ )ν∗) (recall using Eq. 5 is O(SN KM ∗ the complexity of Algorithm 1). Similarly, the complex- ity of computing updated model probability using Eq. 6 is ν∗ )ν∗). These complex- O((SN M ∗ ity terms are polynomial in N for small values of ν∗ as opposed to exponential in N as in Eqs. 3 and 4. The overall complexity of belief update is also polynomial in N . immediate ex- pected reward in the absence of problem structure is the com- O(SKM ∗ plexity of computing expected reward using Eq. 8 is ν∗ )ν∗), which is again polyno- O(SKN M ∗ mial in N for low values of ν∗. These complexities are discussed in greater detail in (Sonu, Chen, and Doshi 2015). j N ). On the other hand, j ν∗ + Ω∗ Complexity j ν∗( N j ν∗( N computing j N A∗ j )( N j A∗ of the j A∗ j A∗ Experiments We implemented a simple and systematic I-POMDP solv- ing technique that computes reachable beliefs over the fi- nite horizon and then calculates the optimal value at the root node using the Bellman equation for the Many-Agents I-POMDP framework. We evaluate its performance in the aforementioned non-cooperative policing protest scenario (S = 27, A0 = 9, Aj = 4, Oj = 8, Oi = 8). We model the other agents as POMDPs and solve them using bounded policy iteration (Poupart and Boutilier 2003), rep- resenting the models as finite state controllers. This repre- sentation enables us to have a compact model space. We set the maximum planning horizon to 4 throughout the experi- ments. The frame-action hypergraphs are encoded into the transition, observation and reward functions of the Many- Agent I-POMDP (Fig. 3). All computations are carried out on a RHEL platform with 2.80 GHz processor and 4 GB memory. < x, (0,0), x'> < x, (0,0)> Peaceful Disruptive Peaceful Disruptive < x, (0,1), x'> < x, (2,2), x'> < x, (0,1)> < x, (2,2)> GoTo2 GoTo0 GoTo1 GoTo2 GoTo0 GoTo1 < x, (0,2), x'> < x, (1,1), x'> < x, (0,2)> < x, (1,1)> < x, (1,2), x'> Disperse < x, (1,2)> Disperse (a) (b) Figure 3: A compact Levi graph representation of policing protest as a frame-action hypergraph for (a) the transition function, and (b) the reward function at site 0. Variables x and x′ represent the start and end intensities of the protest at site 0 and the action shows the location of the two police troops. As two police troops are sufficient to de-escalate any protest, the contexts in which both troops are at site 0 are independent of the actions of other agents. All other contexts depend on the agents choosing to protest at site 0 only. To evaluate the computational gain obtained by exploiting problem structures, we implemented a solution algorithm similar to the one described earlier that does not exploit any problem structure. A comparison of the Many-Agent I-POMDP with the original I-POMDP yields two impor- tant results: (i) When there are few other agents, the Many- Agent I-POMDP provides exactly the same solution as the original I-POMDP but with reduced running times by ex- ploiting the problem structure. (ii) Many-Agent I-POMDP scales to larger agent populations, from 100 to 1,000+, and the new framework delivers promising results within reason- able time. Protestors H I-POMDP Many-Agent Exp. Value 2 3 4 5 2 3 2 3 2 3 2 3 1 s 19 s 3 s 38 s 39 s 223 s 603 s 2,480 s 0.55 s 17 s 0.56 s 17 s 0.57 s 17 s 0.60 s 18 s 77.42 222.42 77.34 222.32 76.96 221.87 76.88 221.77 Table 1: Comparison between traditional I-POMDP and Many- Agent I-POMDP both following same solution approach of com- puting a reachability tree and performing backup. In the first setting, we consider up to 5 protestors with dif- ferent frames. As shown in Table 1, both the traditional and the Many-Agent I-POMDP produce policies with the same expected value. However, as the Many-Agent I-POMDP losslessly projects joint actions to configurations, it requires much less running time. For Horizon H = 3 With Observation Sampling Without Observation Sampling 0 200 400 600 800 1000 1200 1400 1600 Number of Agents (a) With Observation Sampling H = 3 H = 4 ) c e s ( e m T i ) c e s ( e m T i 20000 15000 10000 5000 0 25000 20000 15000 10000 5000 0 0 200 400 600 800 1000 1200 1400 1600 Number of Agents (b) Figure 4: (a) The computational gain obtained by observation sampling. (b) Performance of Many-Agent I-POMDP with obser- vation sampling for horizon 3 and 4. The time required to solve a problem is polynomial in the number of agents. Our second setting considers a large number of protestors, for which the traditional I-POMDP does not scale. Instead, we first scale up the exact solution method using Many- Agent I-POMDP to deal with a few hundreds of other agents. Although the exploitation of the problem structures reduces the curse of dimensionality that plagues I-POMDPs, the curse of history is unaffected by such approaches. To miti- gate the curse of history we use the well-known observation sampling method (Doshi and Gmytrasiewicz 2009), which allows us to scale to over 1,000 agents in a reasonable time of 4.5 hours as we show in Fig. 4(a). This increases to about 7 hours if we extend the horizon to 4 as shown in Fig. 4(b). Conclusion The key contribution of the Many-Agent I-POMDP is its scalability beyond 1,000 agents by exploiting problem struc- tures. We formalize widely existing problem structures -- frame-action anonymity and context-specific independence -- and encode it as frame-action hypergraphs. Other real-world examples exhibiting such problem structure are found in eco- nomics where the value of an asset depends on the num- ber of agents vying to acquire it and their financial standing (frame), in real estate where the value of a property depends on its demand, the valuations of neighboring properties as well as the economic status of the neighbors because an up- scale neighborhood is desirable. Compared to the previous best approach (Sonu and Doshi 2014), which scales to an ex- tension of the simple tiger problem involving 5 agents only, the presented framework is far more scalable in terms of number of agents. Our future work includes exploring other types of problem structures and developing approximation algorithms for this I-POMDP. An integration with existing multiagent simulation platforms to illustrate the behavior of agent populations may be interesting. Acknowledgements This research is supported in part by a NSF CAREER grant, IIS-0845036, and a grant from ONR, N000141310870. We thank Brenda Ng for valuable feedback that led to improve- ments in the paper. References P., [Boutilier et al. 1996] Boutilier, C.; Friedman, N.; Gold- szmidt, M.; and Koller, D. 1996. Context-specific indepen- dence in bayesian networks. In Twelfth international con- ference on Uncertainty in artificial intelligence (UAI), 115 -- 123. [Chandrasekaran et al. 2014] Chandrasekaran, M.; Doshi, P.; Zeng, Y.; and Chen, Y. 2014. Team behavior in interac- tive dynamic influence diagrams with applications to ad hoc teams (extended abstract). In Autonomous Agents and Multi- Agent Systems Conference (AAMAS), 1559 -- 1560. [Doshi and Gmytrasiewicz 2009] Doshi, and Gmy- trasiewicz, P. J. 2009. Monte Carlo sampling methods for approximating interactive POMDPs. Journal of Artificial Intelligence Research 34:297 -- 337. [Doshi and Perez 2008] Doshi, P., and Perez, D. 2008. Generalized point based value iteration for interactive POMDPs. In Twenty Third Conference on Artificial Intel- ligence (AAAI), 63 -- 68. [Doshi et al. 2010] Doshi, P.; Qu, X.; Goodie, A.; and Young, D. 2010. Modeling recursive reasoning in humans using em- pirically informed interactive POMDPs. In International Au- tonomous Agents and Multiagent Systems Conference (AA- MAS), 1223 -- 1230. [Doshi 2012] Doshi, P. 2012. Decision making in complex multiagent settings: A tale of two frameworks. AI Magazine 33(4):82 -- 95. [Gmytrasiewicz and Doshi 2005] Gmytrasiewicz, P. J., and Doshi, P. 2005. A framework for sequential planning in mul- tiagent settings. Journal of Artificial Intelligence Research 24:49 -- 79. [Hoang and Low 2013] Hoang, T. N., and Low, K. H. 2013. Interactive POMDP lite: Towards practical planning to pre- dict and exploit intentions for interacting with self-interested agents. In International Joint Conference on Artificial Intel- ligence (IJCAI), 2298 -- 2305. [Jiang and Leyton-Brown 2010] Jiang, A. X., and Leyton- Brown, K. 2010. Bayesian action-graph games. In Advances in Neural Information Processing Systems (NIPS), 991 -- 999. [Jiang, Leyton-Brown, and Bhat 2011] Jiang, A. X.; Leyton- Brown, K.; and Bhat, N. A. 2011. Action-graph games. Games and Economic Behavior 71(1):141 -- 173. [Jiang, Leyton-Brown, and Pfeffer 2009] Jiang, X.; Leyton-Brown, K.; and Pfeffer, A. 2009. Temporal action- graph games: A new representation for dynamic games. In Twenty-Fifth Conference on Uncertainty in Artificial Intelligence (UAI), 268 -- 276. [Kearns, Littman, and Singh 2001] Kearns, M.; Littman, M.; and Singh, S. 2001. Graphical models for game theory. In Uncertainty in Artificial Intelligence (UAI), 253 -- 260. [Koller and Milch 2001] Koller, D., and Milch, B. 2001. Multi-agent influence diagrams for representing and solving games. In IJCAI, 1027 -- 1034. [Nair et al. 2005] Nair, R.; Varakantham, P.; Tambe, M.; and Yokoo, M. 2005. Networked distributed POMDPs: A synthe- sis of distributed constraint optimization and POMDPs. In A. Twentieth AAAI Conference on Artificial Intelligence, 133 -- 139. [Ng et al. 2010] Ng, B.; Meyers, C.; Boakye, K.; and Nitao, J. 2010. Towards applying interactive POMDPs to real-world adversary modeling. In Innovative Applications in Artificial Intelligence (IAAI), 1814 -- 1820. [Poupart and Boutilier 2003] Poupart, P., and Boutilier, C. 2003. Bounded finite state controllers. In Neural Informa- tion Processing Systems. [Roughgarden and Tardos 2002] Roughgarden, T., and Tar- dos, E. 2002. How bad is selfish routing? Journal of ACM 49(2):236 -- 259. [Seuken and Zilberstein 2008] Seuken, S., and Zilberstein, S. 2008. Formal models and algorithms for decentralized de- cision making under uncertainty. Journal of Autonomous Agents and Multiagent Systems 17(2):190 -- 250. [Seymour and Peterson 2009] Seymour, R., and Peterson, G. L. 2009. A trust-based multiagent system. In IEEE International Conference on Computational Science and En- gineering, 109 -- 116. [Sonu and Doshi 2014] Sonu, E., and Doshi, P. 2014. Scal- able solutions of interactive POMDPs using generalized and bounded policy iteration. Journal of Autonomous Agents and Multi-Agent Systems DOI: 10.1007/s10458 -- 014 -- 9261 -- 5, in press. [Sonu, Chen, and Doshi 2015] Sonu, E.; Chen, Y.; and Doshi, P. 2015. Individual planning in agent populations: Exploiting anonymity and frame-action hypergraphs. Tech- nical Report http://arxiv.org/abs/1503.07220, arXiv. [Varakantham, Adulyasak, and Jaillet 2014] Varakantham, P.; Adulyasak, Y.; and Jaillet, P. 2014. Decentralized stochastic planning with anonymity in interactions. In AAAI Conference on Artificial Intelligence, 2505 -- 2511. [Varakantham et al. 2012] Varakantham, P.; Cheng, S.; Gor- don, G.; and Ahmed, A. 2012. Decision support for agent populations in uncertain and congested environments. In Un- certainty in artificial intelligence (UAI), 1471 -- 1477. [Wang 2013] Wang, F. 2013. An I-POMDP based multi- agent architecture for dialogue tutoring. In International Conference on Advanced ICT and Education (ICAICTE-13), 486 -- 489. [Woodward and Wood 2012] Woodward, M. P., and Wood, R. J. 2012. Learning from humans as an i-pomdp. CoRR abs/1204.0274. [Wunder et al. 2011] Wunder, M.; Kaisers, M.; Yaros, J.; and Littman, M. 2011. Using iterated reasoning to predict oppo- nent strategies. In International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), 593 -- 600. Appendix Factored Belief Update: , . . . , mt+1 n ) 1 b0,l(st+1, mt+1 = P r(st+1, mt+1 1 = P r(st+1bt 0, at × · · · × P r(mt+1 0, at 0, ωt+1 ) n bt , . . . , mt+1 0, ωt+1 n st+1, mt+1 0 1 ) × P r(mt+1 1 , . . . , mt+1 0 st+1, bt n−1bt ) 0, at 0, at 0, ωt+1 0, ωt+1 ) 0 0 Derivation of equation 5: Starting with equation 3, we have: P r(st+1bt 0,l, at = P r(st+1bt 0, ωt+1 0 0)P r(ωt+1 0,l, at ) ∝ P r(st+1, ωt+1 bt 0,l, at 0) 0 0,l, at 0) st+1, bt 0 The update term for physical states may be represented as a product of its factors such that for any factor Xk: P r(xt+1 k bt 0,l, at P r(at −0mt Xat −0 0,l(mt bt −0st)× bt 0) = Xst −0) T0(xt 0,l(st) Xmt k, hat 0, at −0 −0i, xt+1 k ) where bt P r(at 0,l(mt −0st) = bt −0) = P r(at 0,l(mt 1mt 1st) × . . . × bt 1) × . . . × P r(at 0,l(mt N mt N st), and N ). −0mt We introduce a projection function δν(ψ) that maps joint actions to the corresponding frame-action configurations as defined in definition 4. Formally δν(ψ) : a → Cν(ψ), where Cν(ψ) is the set of all possible configurations such that for all agents j with frame θ, C(a, θ) = {j : aj = a, θj = θ, (aj, θ) ∈ ν(ψ)}. Next we partition the set of joint action of all other agents such that the A−0 into smaller subsets A1 projection function δν(ψ) maps all joint actions belonging to any given partition Ac −0 to the same value configuration. Hence, we may rewrite the above equation as: . . . , ACν(ψ) −0, −0 P r(xt+1 k bt 0,l, at 0) = Xst 0,l(st) bt Cν(xt k ,at 0 ,x t+1 k ) Xc=1 Xmt −0 bt 0,l(mt −0st) Xat k, hat −0∈Ac −0i, xt+1 0, at −0 k ) T0(xt P r(at −0mt −0) Under independence, T0(xt 0, at k, hat k,at where C ν(xt frame-action for all −0i, xt+1 k 0,xt+1 ) = δν(xt k anonymity and joint actions at −0 ) = T0(xt k, at 0,xt+1 k 0, C ν(xt,at )(at −0). k,at frame-action ∈ Ac −0 0,xt+1), xt+1 ), k P r(xt+1 k bt 0,l, at 0) = Xst bt 0,l(st) Cν(xt k ,at 0 ,x t+1 k ) Xc=1 Xmt −0 P r(at −0mt −0) bt 0,l(mt −0st) Xat 0, C ν(xt k, at −0∈Ac k,at −0 0,xt+1 k T0(xt ), xt+1 k ) The cumulative probability of ping to the same joint actions map- −0st) 0,l(mt bt configuration, Pmt −0 −0), is computed tractably using algo- P r(at −0mt Pat −0∈Ac 0,xt+1 rithm 1 as P r(C ν(xt Hence, the equation becomes: k ,at −0 k )b0,l(M t 1st), . . . b0,l(M t nst)). P r(xt+1 k b0,l(M t bt bt 0,l, at 0) = Xst 1st), . . . b0,l(M t 0,l(st) X 0 ,x nst)) × T0(xt, at Cν(xt ,at k t+1 k P r(C ν(xt k,at 0,xt+1 k ) ) 0, C ν(xt k,at 0,xt+1 k ), xt+1) Similarly, the observation probability may also be ) = −0) may be substitued instead of the joint obtained in a factored form and C ν(st+1,at δν(st+1,at action. 0,ωt+1 0,ωt+1 )(at 0 0 K P r(ωt+1 0 st+1, bt 0,l, at bt 0,l(st) 0) = Xst )bt 0,l(M1,l−1st), . . . , bt 0,ωt+1 0, C ν(xt+1 ,at ), ωt+1 0,ωt+1 ,at ) k 0 0 0 Yk=1 X ,at t+1 k t+1 0 ) 0 ,ω Cν(x 0,l(MN,l−1st)) k P r(C ν(xt+1 O0(xt+1 , at k Therefore, we may rewrite equation 3 as follows: P r(st+1bt 0,l, at 0, ωt+1 0 ) ∝ (cid:26)Xst bt 0,l(st) P r(C ν(xt+1 k ,at 0,ωt+1 0 )bt 0,l(M1,l−1st), . . . , bt K Yk=1 X 0,l(MN,l−1st)) Cν(x t+1 k t+1 0 ,at 0 ,ω ) O0(xt+1 k , at 0, C ν(xt+1 k ,at 0,ωt+1 0 ), ωt+1 0 )(cid:27) ×(cid:26)Xst bt 0,l(st) K Yk=1 X ,at 0 ,x Cν(xt k P r(C ν(xt k ,at 0,xt+1 k )bt 0,l(M1,l−1st), . . . , t+1 k ) bt 0,l(MN,l−1st))T0(xt k, C ν(xt k,at 0,xt+1 k ), xt+1 k )(cid:27) (9) Derivation of equation 6: The belief update over the models of agent j shown in equa- N,l−1, bt 0,l, at P r(at 0, ωt+1 1mt 1,l−1) ) 0 j A∗ j ν∗(cid:0)N +ν∗ O(S×{N M ∗ complexity terms are polynomial in N for small values of ν∗ as opposed to exponential in N as in equations 3 and 4. The overall complexity of belief update is also polynomial in N . ν∗ (cid:1)}). These ν∗ (cid:1)+Ω∗ j (cid:0)N +ν∗ Proof of Proposition 1: P r(at j−1mt j−1,l−1) The expected reward of agent 0 is obtained as the sum of reward factors. bt 0,l(st)(cid:18) K bt 0,l(mt Xk=1 Xmt 1,l−1) × . . . × P r(at −0 P r(at 1mt 1st) × . . . × N mt N,l−1) ER0(bt bt 0,l(mt 0,l, at 0) = Xst N st) ×Xat −0i)(cid:19) 0, at −0 R0(xt k, hat j )N (A∗ Complexity of computing expected reward using the j )N ). Equation 8 is above equation is O(SK(M ∗ derived similarly to the belief update by substituting dis- tribution over frame-action configurations for distributions over joint models and joint actions. This combined with the proofs for Eqs. 5 and 6 allow us to obtain Eq.7 from the Bellman equation of the original I-POMDP. The complexity of computing expected reward using equation 8 is O(SK{N M ∗ nomial in N for low values of ν∗. j ν∗+1}(cid:0)N +ν∗ j A∗ ν∗ (cid:1)) which is again poly- tion 4 can be rewritten as follows: j+1,l−1, . . . , mt+1 j,l−1st+1, mt+1 0(st) Xmt 1,l−1st)Xat bt bt 0,l(mt bt 0,l(mt 1,l−1 1 j−1,l−1st) Xat j mt P r(at j−1 j−1,l−1 bt 0,l(mt j,l−1st)Xat j P r(mt+1 = Xst . . . Xmt Xmt bt 0,l(mt j,l−1 P r(at j+1mt j+1,l−1st) Xat N,l−1st)Xat j+1 N bt 0,l(mt P r(at N mt j,l−1) Xmt j,l−1) . . . Xmt j+1,l−1 N,l−1 N,l−1) Xωt+1 j, at mt j j Oj (st+1, haj, at −ji, ωt+1 j ) P r(mt+1 j, ωt+1 j ) Substituting frame-action configuration as in equation 9, we get: P r(mt+1 j+1,l−1, . . . , mt+1 j,l−1st+1, mt+1 0(st)Xmt bt bt 0(mt P r(at N,l−1, bt j mt = Xst P r(C ν(xt+1,at j ,ωj )at bt 0,l(Mj+1st), . . . bt j j jst)Xat 0, bt 0,l(M1st), . . . , bt 0,l(mN st)) × Xot+1 j, at mt j j j, ωt+1 j ) 0 0, ωt+1 0,l, at j) X 0,l(Mj−1st), Oj(xt+1, at j, ν(xt+1 ,at j C ,ωj ) C ν(xt+1,ωj ), ωt+1 j ) P r(mt+1 ) (10) Where the probability over the configurations is computed as in algorithm 1 using belief over models of all other agents except j. In the end we add 1 to the count of action a0 in every configuration. Complexity of belief update: j )N (A∗ j N A∗ For the traditional I-POMDP belief update, the complex- j )N ) and ity of computing equation 3 is O(S(M ∗ that for computing equation 4 is O(SM ∗ j N Ω∗ j ) where ∗ denotes the maximum cardianlity of a set for any agent. For factored representation, belief update oper- ator invokes equation 3 for each value of all state factors and it invokes equation 4 for each model of each agent j and for all values of updated states. Hence the total complexity of belief update is O(KX ∗SM ∗ j N +N M ∗ j N A∗ j S2(M ∗ j )N A∗ j N Ω∗ j ). In equation 5, algorithm is called once for all values of st. The two inner summations iterate over all possible config- urations over transition and observation contexts. The num- ber of configurations is upper bounded by (cid:0)N +ν∗ ν∗ is the maximum cardinality of the frame-action neigh- borhood for any context. Hence the complexity of comput- ing updated belief of state factor xt+1 using equation 5 is O(SK × {N M ∗ the complexity of algorithm 1). Similarly, the complexity of computing updated model probability using equation 6 is ν∗ (cid:1) +(cid:0)N +ν∗ ν∗ (cid:1)}) (recall j ν∗(cid:0)N +ν∗ ν∗ (cid:1) where j A∗
0909.4349
1
0909
2009-09-24T02:05:06
Leader-following Consensus Problems with a Time-varying Leader under Measurement Noises
[ "cs.MA", "cs.IT", "cs.IT" ]
In this paper, we consider a leader-following consensus problem for networks of continuous-time integrator agents with a time-varying leader under measurement noises. We propose a neighbor-based state-estimation protocol for every agent to track the leader, and time-varying consensus gains are introduced to attenuate the noises. By combining the tools of stochastic analysis and algebraic graph theory, we study mean square convergence of this multi-agent system under directed fixed as well as switching interconnection topologies. Sufficient conditions are given for mean square consensus in both cases. Finally, a numerical example is given to illustrate our theoretical results.
cs.MA
cs
Leader-following Consensus Problems with a Time-varying Leader under Measurement Noises Yilun Shang1 Department of Mathematics, Shanghai Jiao Tong University, Shanghai 200240, P. R. China. Abstract In this paper, we consider a leader-following consensus problem for networks of continuous-time integrator agents with a time-varying leader under measurement noises. We propose a neighbor-based state-estimation protocol for every agent to track the leader, and time-varying consensus gains are introduced to attenuate the noises. By combining the tools of stochastic analysis and algebraic graph theory, we study mean square convergence of this multi-agent system under directed fixed as well as switching interconnection topologies. Sufficient conditions are given for mean square consensus in both cases. Finally, a numerical example is given to illustrate our theoretical results. Keywords: consensus problems; multi-agent system; leader-following; stochastic system. 1. Introduction In recent years, there has been an increasing research interest in the distributed co- ordination for multi-agent systems. This is partly due to its broad applications in many areas such as cooperative control of unmanned aerial vehicles, formation control [1, 26, 27] and swarming behaviors of social living beings [11, 16, 30]. Consensus problems have a long history in computer science and formed the foundation of the field of distributed computing [12]. In consensus control, it is critical to design a decentralized network algorithm based on neighborhood information for agents to reach an agreement on their states, asymptotically in some sense. For a variety of consensus algorithms and convergence results we refer the reader to the comprehensive surveys [17, 24] and references therein. Most researches in the previous literature assume the exchange of messages between agents is error-free. However, this is only an ideal approximation for real communication processes. Recently, consensus of dynamic networks with random measurement noises has attracted the attention of some researchers. In [8, 25], the authors introduce time-varying consensus gains and design control schemes based on a Kalman filter structure. The decreasing consensus gain a(k) (where k is the discrete time instant) in the protocols is proposed in [5] to attenuate the measurement noises in a strongly connected circulant network. The analysis in [5] is generalized to strongly connected digraphs in [7] and digraphs containing a spanning tree in [6] by the same authors. The work in [10] deals with discrete-time average consensus problems in switching balanced digraphs under stochastic communication noises, while [9] investigates the continuous-time average consensus control with fixed topology and Gaussian communication noises. The authors in [13] treat a continuous-time leader-following consensus control under measurement noises with a constant state leader. In this paper, motivated by the above works, we consider a leader-following consensus problem for networks of continuous-time integrator agents with a time-varying leader in directed fixed and switching topologies. The control input of each agent is based on the 1email: [email protected] 1 measurement of its neighbors’ states and some estimated data of the leader which are both corrupted by white noises. We design a leader-following consensus protocol such that the leader has an underlying dynamics and some variables (e.g. velocity and acceleration) of the leader cannot be measured and every follower can obtain the measured information (e.g. position) of the leader only when they are connected with the leader directly. The collective behavior of self-organized groups of agents with active (or dynamical) leaders is one of the most interesting topics in distributed cooperative control. However, as [22] suggests, the extension of consensus algorithms from a constant reference to a time-varying one is non-trivial. Some related results can be found e.g. in [3, 20, 31], where the systems considered are all deterministic and free of noise. Inspired by [5, 9, 13], we introduce time-varying consensus gains in the followers control protocol to attenuate the measurement noises, which lead to a time-varying stochastic dif- ferential equation of the system. The state matrix of the equation is time-dependent and no longer a Laplacian matrix, and is neither symmetric nor diagonalizable. To implement the convergence study, we merge stochastic analysis and algebraic graph theory, by devel- oping a Lyapunov-based approach and addressing the Ito integral by the stopping time truncation method. Firstly, we derive a sufficient condition for the state of each follower to converge to that of the leader in mean square under fixed and directed interconnection topology. Then it is shown that the algorithm also render each follower track the leader in mean square under switching topology when the subgraph induced by the followers is balanced. The rest of the paper is organized as follows. In Section 2, we provide some preliminar- ies and present the leader-following consensus protocol. Section 3 contains the convergence analyses under directed fixed and switching interaction topologies. A numerical example is given in Section 4 and we conclude the paper in Section 5. 2. Problem formulation Before we proceed, some basic concepts on graph theory (see e.g. [2]) are provided as below. Let G = (V, E, A) be a weighted digraph with the set of vertices V = {1, 2, · · · , n} and the set of arcs E ⊆ V × V. The vertex i in G represents the ith agent, and a directed edge (i, j) ∈ E means that agent j can directly receive information from agent i. The set of neighbors of vertex i is denoted by Ni = {j ∈ V (j, i) ∈ E}. A = (aij) ∈ Rn×n is called the weighted adjacency matrix of G with nonnegative elements and aij > 0 if and j=1 aij If din(i) = dout(i) for i = 1, 2, · · · , n, then the digraph G is called balanced [18]. The Laplacian of G is defined as L = D − A, where D = diag(din(1), din(2), · · · , din(n)). A digraph G is called strongly connected if there is a directed path from i to j between any two distinct vertices i, j ∈ V. There exists a directed path from vertex i to vertex j, then j is said to be reachable from i. For every vertex in digraph G, if there is a path from vertex i to it, then we say i is globally reachable in G. This is much weaker than strong connectedness. only if j ∈ Ni. The in-degree and out-degree of vertex i are defined as din(i) =Pn and dout(i) = Pn j=1 aji, respectively. Here, we consider a system consisting of n + 1 agents, in which an agent indexed by 0 is assigned as the leader and the other agents indexed by 1, 2, · · · , n are referred as follower agents. The information interaction topology among n followers are described by the digraph G as defined above; and the whole system including n + 1 agents is conveniently 2 modeled by a weighted digraph G = (V, E, A) with V = {0, 1, · · · , n} and A = 0 0 a10 a11 ... ... an0 an1 · · · · · · . . . · · · 0 a1n ... ann ∈ R(n+1)×(n+1),  where the lower right block submatrix of order n can be viewed as A. We define a diagonal matrix B = diag(b1, b2, · · · , bn) to be the leader adjacency matrix associated with G, where bi = ai0 ≥ 0 and bi > 0 if and only if 0 ∈ Ni(G). Here, Ni(G) is the set of neighbors of agent i in G. The continuous-time dynamics of n followers is described as follows: xi(t) = ui(t), i = 1, 2, · · · , n, (1) where xi(t) ∈ R is the state of the ith agent, and ui(t) ∈ R is the control input. The leader of this considered multi-agent system is described by a double integrator of the form: x0(t) = g(t)v0(t) v0(t) = a0(t) y(t) = x0(t) (2)  where g(t) : [0, ∞) → (0, ∞) is piecewise continuous, y(t) is the measured output and a0(t) is the input. We assume g(t) and a0(t) are known, that is, the dynamical behavior of the leader is precisely known (c.f. Remark 1). On the other hand, y(t) = x0(t) is the only data that may be gotten by the followers when they are connected to the leader directly. Since v0(t) cannot be measured, we have to estimate v0(t) in a distributed way during the evolution. The estimate of v0(t) by agent i is denoted by vi(t), i = 1, 2, · · · , n. In our model, the ith agent receives information from its neighbors with measurement noises: yji(t) = xj(t) + σjinji(t), j ∈ Ni, y0i(t) = x0(t) + σ0in0i(t), (3) (4) where yji(t) (i ∈ V, j ∈ V) denotes the measurement of the jth agent’s state xj(t) by the ith agent. The {nji(t) j ∈ V, i ∈ V} are independent standard white noises and σji ≥ 0 is the noise intensity. A group of controls U = {ui i = 1, 2, · · · , n} is called a measurement-based distributed protocol [9], if ui(t) ∈ σ(cid:0)xi(s),Sj∈N i Herein σ(ξλ, λ ∈ Λ) denotes the σ-algebra generated by a family of random variables {ξλ, λ ∈ Λ}. The so-called leader-following consensus problem is to design a measurement- based distributed protocol such that each follower’s state will converge to the leader’s in some sense as time goes on. yji(s), 0 ≤ s ≤ t(cid:1), for t ≥ 0, i = 1, 2, · · · , n. Consequently, we propose the distributed control protocol which consists of two parts: • a neighbor-based feedback law: ui(t) = h(t)(cid:16)Xj∈Ni aij(yji(t) − xi(t)) + bi(y0i(t) − xi(t))(cid:17) + g(t)vi(t), i = 1, 2, · · · , n (5) where t ≥ 0 and h(t) : [0, ∞) → (0, ∞) is a piecewise continuous function, called a time- varying consensus gain [9]. 3 • a dynamic neighbor-based system to estimate v0(t): vi(t) = a0(t) + γh(t)(cid:16)Xj∈Ni aij(y′ ji(t) − xi(t)) + bi(y′ 0i(t) − xi(t))(cid:17), i = 1, 2, · · · , n (6) where 0 < γ < 1 is some constant, and moreover y′ of yji(t) and y0i(t), respectively. In other words, we have ji(t) and y′ 0i(t) are independent copies y′ ji(t) = xj(t) + σjin′ ji(t), y′ 0i(t) = x0(t) + σ0in′ 0i(t), j ∈ Ni, (7) (8) where {n′ {nji(t) j ∈ V, i ∈ V}. ji(t) j ∈ V, i ∈ V} are independent standard white noises and independent with The set of neighbors Ni of agent i in (5) and (6) varies when the interconnection topology is switching and we defer the corresponding protocol formulation to Section 3.2. Remark 1. We take individual state xi as scalar for simplicity in (1) and it can be extended to multi-dimensional scenarios as studied in [20, 31] without much effort. For example, if xi ∈ R2, it can be thought as the position of agent i moving in a plane. Therefore, gv0 and ga0 + gv0 are the velocity and acceleration of the leader respectively, which are known since the exact dynamics of the leader is assumed. Remark 2. We separate a factor g from the ‘velocity term’ of the leader in (2) in order to tone the decreasing consensus gain h, which appears to be a notable feature distinct from some kinds of uncertain environment (see e.g. [28, 29]), where a random term is directly appended behind the equation of the system. In such works, the consensus gains are supposed to have positive lower bound. Remark 3. From (5) and (6) it is clear that the designed protocol for the ith agent is indeed a measurement-based distributed protocol since it relies only on the state of itself and its neighbors. Let x(t) = (x1(t), · · · , xn(t))T and v(t) = (v1(t), · · · , vn(t))T . Denote the ith row of the matrix A by αi, and Σi := diag(σ1i, · · · , σni) for i = 1, 2, · · · , n. Hence Σ := diag(α1Σ1, · · · , αnΣn) is an n × n2 dimensional block diagonal matrix. Let n0(t) = (n01(t), · · · , n0n(t))T and ni(t) = (n1i(t), · · · , nni(t))T for i = 1, 2, · · · , n. In addition, n′ 0(t) and n′ i(t) can be defined in a similar way. The juxtaposed matrix Q := (B, Σ) is an n × n(n + 1) dimensional block matrix. Combining (1) with (5) and (6), we may write the protocol in a matrix form: ( dx(t) dt = −h(t)(L + B)x(t) + h(t)B1x0(t) + g(t)v(t) + h(t)QZ(t) dv(t) dt = a0(t)1 − γh(t)(L + B)x(t) + γh(t)B1x0(t) + γh(t)QZ ′(t) (9) 0 (t), nT 1 (t), · · · , nT T (t))T are two where Z(t) = (nT n(n + 1) dimensional independent standard white noise sequences, and 1 = (1, · · · , 1)T ∈ Rn. The system (9) may be further written in the form of the Ito stochastic differential equations: n (t))T and Z ′(t) = (n′ 0 T (t), · · · , n′ n T (t), n′ 1 (cid:26) dx(t) = −h(t)(L + B)x(t)dt + h(t)B1x0(t)dt + g(t)v(t)dt + h(t)GdW1(t) dv(t) = a0(t)1dt − γh(t)(L + B)x(t)dt + γh(t)B1x0(t)dt + γh(t)GdW2(t) (10) where W1(t) = (W11(t), · · · , W1n(t))T and W2(t) = (W21(t), · · · , W2n(t))T are two n dimensional standard Brownian motions which are independent with each other, and G := diag(cid:16)qb2 1 +Pj∈N1 σ2 j1a2 1j , · · · ,qb2 n +Pj∈Nn σ2 jna2 nj (cid:17). 4 3. Convergence analysis In this section we will give the convergence analysis of the system (10) and show that the state of every follower will track that of the leader in the sense of mean square convergence, that is, Ekx(t) − x0(t)1k → 0, as t → ∞. Here k · k denotes Frobenius norm. Two different cases, fixed topology and switching topology, are explored. Remark 4. Mean square consensus protocols for stochastic systems are first introduced in [5] and then further studied by several researchers (e.g. [6, 7, 9, 10, 13]). Mean square convergence seems to be an important alternative for almost sure convergence in consensus problems under noisy environments. For a given symmetric matrix A, let λmax(A) and λmin(A) denote its maximum and minimum eigenvalue, respectively. To get the main result, we need the following assump- tions: (A1) The vertex 0 is globally reachable in G. (A2) There is a δ > 0, such that h(t) Here, P is a positive definite matrix defined by Equation (13), see below. (A3) (A4) Remark 5. Assumption (A1) is imposed on the network topology, which is much weaker than strong connectedness. The technical Assumption (A2) roughly means that g is com- parable with the consensus gain h. Assumptions (A3) and (A4) are called convergence condition and robustness condition respectively in [9], and which are standard assump- tions often used in the stochastic approximation [15]. 0 h(s)ds = ∞. 0 h2(s)ds < ∞. R ∞ R ∞ g(t) > λmax(P ) 2γ(1−γ 2) + δ for t ≥ 0. 3.1. Fixed topology Let x∗ = x − x01 and v∗ = v − v01. We then obtain an error dynamics of (10) as follows: dε(t) = F (t)ε(t)dt + G(t)dW (t), t ≥ 0 (11) where ε(t) = (x∗(t), v∗(t))T , W (t) = (W1(t), W2(t))T and F (t) =(cid:18) −h(t)(L + B) −γh(t)(L + B) g(t)In 0 (cid:19) , Here In denotes the n × n dimensional identity matrix. We will need a lemma for Laplacian matrix. G(t) = h(t)(cid:18) G γG (cid:19) := h(t)eG. Lemma 1.[2, 23] The Laplacian matrix L of a digraph G = (V, E, A) has at least one zero eigenvalue and all of the nonzero eigenvalues are in the open right half plane. Furthermore, L has exactly one zero eigenvalue if and only if there is a globally reachable vertex in G. The main result in this section is given as follows: Theorem 1. For system (1) with the consensus protocols (5) and (6), if Assumptions (A1)-(A4) hold, then Ekε(t)k2 = 0. lim t→∞ (12) Proof. By Assumption (A1) and Lemma 1, we know L + B is a positive stable matrix, or in other words, −L − B is a stable matrix. From Lyapunov theorem, there is a unique positive definite matrix P ∈ Rn×n such that (L + B)T P + P (L + B) = In. (13) 5 −γP −γP Let eP = (cid:18) P P (cid:19) and define a Lyapunov function V (t) = εT (t)eP ε(t). Since 0 < γ < 1, eP is a positive definite matrix. In fact, we have λmin(eP ) = (1 − γ)λmin(P ) and λmax(eP ) = (1 + γ)λmax(P ). Utilizing Ito formula and (11), we have dV (t) = εT (t)(cid:0)eP F (t) + F T (t)eP(cid:1)ε(t)dt + tr(GT (t)eP G(t))dt + 2εT (t)eP G(t)dW (t). Here tr(·) means the trace of a matrix. From the Lyapunov equation (13), we get eP F (t) + F T (t)eP = −h(t) (1 − γ2)In −P g(t) h(t) ! := −h(t)eQ(t). h(t) 2γP g(t) −P g(t) h(t) Invoking the Haynsworth inertia additivity formula [21], Assumption (A2) and the positive definiteness of P , we know that eQ(t) is positive definite with ρ := mint≥0(cid:8)λmin(eQ(t))(cid:9) > 0. Thereby, we have dV (t) ≤ −h(t) Next we want to prove V (t)dt + h2(t)tr(eGTePeG)dt + 2h(t)εT (t)ePeGdW (t). (14) (15) ρ λmax(eP ) EZ t t0 h(s)εT (s)ePeGdW (s) = 0, ∀ 0 ≤ t0 ≤ t. For any given T ≥ t0 ≥ 0 and K ∈ N, let τ t0,T is a stopping time. By (14) we have, for t0 ≤ t ≤ T , K = T ∧ inf{t ≥ t0 εT (t)eP ε(t) ≥ K}, which ρ [t≤τ ≤ − K )1 E(cid:0)V (t ∧ τ t0,T λmax(eP )Z t ≤ tr(eGTePeG)Z T t0 t0 t0 ,T K ](cid:1) − EV (t0) h(s)E(cid:0)V (s ∧ τ t0,T h2(s)ds. K )1 [s≤τ t0,T K ](cid:1)ds + tr(eGTePeG)Z t t0 h2(s)ds This implies that there is a constant Ct0,T > 0 such that E(cid:0)V (t ∧ τ t0,T K )1 [t≤τ t0 ,T K ](cid:1) ≤ Ct0,T , ∀ t0 ≤ t ≤ T. Since limK→∞ t ∧ τ t0,T K = t a.s., for t0 ≤ t ≤ T , by Fatou lemma, we derive sup t0≤t≤T EV (t) ≤ Ct0,T . Accordingly, EZ t t0 h2(s)V (s)ds ≤ sup t0≤s≤t EV (s) ·Z T 0 h2(s)ds < ∞, ∀ 0 ≤ t0 ≤ t. Combining this with EZ t t0 h2(s)kεT (s)ePeGk2ds ≤ keP kkeGk2EZ t t0 6 h2(s)V (s)ds yields (15) (c.f. [19]). Now employing (14) and (15), we obtain 0 0 ρ λmax(eP )Z t EV (t) ≤ EV (0) exp(cid:16) − + tr(eGTePeG)Z t h(s)EV (s)ds + tr(eGTePeG)Z t λmax(eP )Z t h2(s) exp(cid:16) − h(s)ds(cid:17) λmax(eP )Z t ρ ρ 0 0 s h2(s)ds, ∀ t ≥ 0. h(u)du(cid:17)ds. (16) Clearly, by Assumption (A3) the first term on the right hand side of (16) tends to 0, as t → ∞. For any η > 0, by Assumption (A4), there exists some s0 > 0 such that EV (t) − EV (0) ≤ − Thus, from the comparison principle [14], s0 R ∞ Z t 0 h2(s)ds < η. Hence, s 0 ρ ρ h2(s) exp(cid:16) − =Z s0 ≤ exp(cid:16) − ≤ exp(cid:16) − λmax(eP )Z t h2(s) exp(cid:16) − λmax(eP )Z t λmax(eP )Z t h(u)du(cid:17)ds λmax(eP )Z t h(u)du(cid:17)Z s0 h(u)du(cid:17)Z ∞ ρ ρ s0 s0 0 s h(u)du(cid:17)ds +Z t h2(s)ds +Z t s0 s0 0 h2(s) exp(cid:16) − h2(s)ds ρ λmax(eP )Z t s h(u)du(cid:17)ds h2(s)ds + η, ∀ t ≥ s0 By Assumptions (A3), (A4) and the arbitrariness of η, the last expression tends to zero, as t → ∞. Therefore, (16) yields limt→∞ EV (t) = 0. Note that kε(t)k2 ≤ V (t) λmin(eP ) which concludes the proof. ✷ Remark 6. As is known, the solution to Lyapunov matrix equation may be obtained by using Kronecker product. Thus the positive definite matrix P involved in Assumption (A2) can be given explicitly. Remark 7. Theorem 1 implies that in the fixed topology, under Assumptions (A1)-(A4), the designed protocol guarantees the state of each follower tracks that of the leader in mean square. 3.2. Switching topology In this section we deal with the convergence of the protocol under switching topology. Let σ(t) : [0, ∞) → SH = {1, 2, · · · , N } be a switching signal that determines the communication topology. The set H is a set of digraphs with the common vertex set V and can be denoted as H = {G1, G2, · · · , GN }, where N is the total number of digraphs in H. Naturally, let Gσ(t) be the subgraph of Gσ(t) induced by V. Thereby, we rewrite the 7 consensus protocols (5) and (6) as: ui(t) = h(t)(cid:16) Xj∈Ni(σ(t)) and aij(σ(t))(yji(t) − xi(t)) + bi(σ(t))(y0i(t) − xi(t))(cid:17) + g(t)vi(t), i = 1, 2, · · · , n (17) vi(t) = a0(t) + γh(t) ·(cid:16) Xj∈Ni(σ(t)) aij(σ(t))(y′ ji(t) − xi(t)) + bi(σ(t))(y′ i = 1, 2, · · · , n (18) 0i(t) − xi(t))(cid:17), where, Ni(σ(t)) is the set of neighbors of agent i in the digraph Gσ(t) formed by n fol- lowers; aij(σ(t)) is the (i, j)-th element of the adjacency matrix of Gσ(t), and let Bσ(t) := diag(cid:0)b1(σ(t)), b2(σ(t)), · · · , bn(σ(t))(cid:1) represent the leader adjacency matrix associated with Gσ(t) such that bi(σ(t)) > 0 if and only if 0 ∈ Ni(Gσ(t)). In parallel with Section 2, substituting the protocols (17), (18) to the system (1), we can describe the system in the form of the Ito differential equations: (cid:26)dx(t) = −h(t)(Lσ(t) + Bσ(t))x(t)dt + h(t)Bσ(t)1x0(t)dt + g(t)v(t)dt + h(t)Gσ(t)dW1(t) dv(t) = a0(t)1dt − γh(t)(Lσ(t) + Bσ(t))x(t)dt + γh(t)Bσ(t)1x0(t)dt + γh(t)Gσ(t)dW2(t) (19) where Lσ(t) is the Laplacian matrix of Gσ(t), and Gσ(t) := diag(cid:16)sb2 1(σ(t)) + Xj∈N1(σ(t)) σ2 j1a2 1j(σ(t)) , · · · ,sb2 n(σ(t)) + Xj∈Nn(σ(t)) σ2 jna2 nj(σ(t))(cid:17). Let x∗ = x − x01 and v∗ = v − v01 as in Section 3.1. We get an error dynamics of (19) as follows: dε(t) = Fσ(t)ε(t)dt + Gσ(t)dW (t), where ε(t) = (x∗(t), v∗(t))T , W (t) = (W1(t), W2(t))T and t ≥ 0 (20) Fσ(t) =(cid:18) −h(t)(Lσ(t) + Bσ(t)) −γh(t)(Lσ(t) + Bσ(t)) g(t)In 0 (cid:19) , Gσ(t) = h(t)(cid:18) Gσ(t) γGσ(t) (cid:19) := h(t)eGσ(t). In the sequel, we show that under switching topology, the consensus protocols (17) and (18) ensure that each follower tracks the leader in mean square. We will use the following lemma. Lemma 2.[4] Given t ≥ 0 and suppose the digraph Gσ(t) is balanced. Then Lσ(t) +Bσ(t) + (Lσ(t) + Bσ(t))T is positive definite if and only if the vertex 0 is globally reachable in Gσ(t). The matrix Lσ(t) + Bσ(t) + (Lσ(t) + Bσ(t))T plays a key role in the convergence analysis below. Define µ := mint≥0(cid:8)λmin(Lσ(t) + Bσ(t) + (Lσ(t) + Bσ(t))T )(cid:9). Prior to establishing the main result, we present a condition analogous with Assump- tion (A2) in Section 3.1: (A5) There is a δ > 0, such that h(t) Remark 8. It is easily shown that µ > 0 under the assumptions of Theorem 2 below by exploiting Lemma 2 and the fact that H is a finite set. This validates the expression in Assumption (A5). 2γ(1−γ 2)µ + δ for t ≥ 0. g(t) > 1 8 Theorem 2. For system (1) with the consensus protocols (17) and (18), if for any t ≥ 0, Gσ(t) is balanced, and vertex 0 is globally reachable in Gσ(t), then under Assumptions (A3)- (A5), we have Ekε(t)k2 = 0. lim t→∞ (21) −γIn −γIn By Ito formula and (20), we have Straightforward calculation yields Proof. Let eI :=(cid:18) In In (cid:19). Obviously, we have λmin(eI) = 1 − γ and λmax(eI) = 1 + γ. Hence eI is a positive definite matrix by recalling 0 < γ < 1. Define a Lyapunov function V (t) = εT (t)eIε(t). dV (t) = εT (t)(cid:0)eIFσ(t) + F T σ (t)eIGσ(t))dt + 2εT (t)eIGσ(t)dW (t). h(t) ! σ (t)eI = −h(t) (1 − γ2)(cid:0)Lσ(t) + Bσ(t) + (Lσ(t) + Bσ(t))T(cid:1) −In eIFσ(t) + F T eQσ(t) is positive definite with ν := mint≥0(cid:8)λmin(eQσ(t))(cid:9) > 0. By using the Haynsworth inertia additivity formula [21], Assumption (A5), we get that σ (t)eI(cid:1)ε(t)dt + tr(GT := −h(t)eQσ(t). g(t) h(t) g(t) 2γIn Therefore, we have −In g(t) h(t) dV (t) ≤ −h(t) ν 1 + γ V (t)dt + h2(t)tr(cid:0)eGT σ(t)eIeGσ(t)(cid:1)dt + 2h(t)εT (t)eIeGσ(t)dW (t). The remaining proofs are similar with those in Theorem 1 by noting that H is a finite (22) set, and hence omitted. ✷ Remark 9. From Theorem 2 we see that the designed protocol may guarantee the state of each follower tracks that of the leader in mean square even under the switching topology. 4. Numerical example In this section, we provide a numerical simulation to illustrate the theoretical results. We consider a network consisting of four agents including one leader labeled by vertex 0, as shown in Fig. 1. The digraph in this figure is assumed to have 0−1 weights. With simple calculation, it is not hard to solve P from Equation (13) and obtain λmax(P ) = 0.9447. We take σij = 0.1 for all i, j, h(t) = 1 6(t+2) and γ = 0.5. Therefore, Assumptions (A1)-(A4) in Theorem 1 hold. t+2 , g(t) = 1 The simulation results for the consensus errors x∗ and v∗ are shown in Fig. 2 and Fig. 3 respectively, with initial value ε(0) = (−2, 1.5, 3, 2, −1.5, −1)T . From Fig. 2 and Fig. 3, we can see that three followers can eventually follow the leader. 5. Conclusion This paper studies a leader-following coordination problem for multi-agent systems with a time-varying leader under measurement noises. Although the state of the leader keeps changing and the measured information by each follower is corrupted by white noises, we propose a neighborhood-based protocol for each agent to follow the leader. We present sufficient conditions for each follower to track the leader in mean square under directed fixed topologies. Sufficient conditions are also provided when the interaction topology 9 is switching and the subgraph formed by the followers is balanced. Finally, numerical simulations are presented to illustrate the theoretical results. Topics worth investigating in the future include time-delay cases and the design of almost sure consensus protocols. References [1] J. A. Fax, R. M. Murray, Information flow and cooperative control of vehicle forma- tions. IEEE Trans. Autom. Control, 49(2004), pp.1465–1476 [2] C. Godsil, G. Royle, Algebraic Graph Theory. Spring, New York, 2001 [3] Y. Hong, J. Hu, L. Gao, Tracking control for multi-agent consensus with an active leader and variable topology. Automatica, 42(2006) pp.1177–1182 [4] J. Hu, Y. Hong, Leader-following coordination of multi-agent systems with coupling time delays. Physica A, 374(2006) pp.853–864 [5] M. Huang, J. H. Manton, Coordination and consensus of networked agents with noisy measurement: stochastic algorithms and asymptotic behavior. submitted to SIAM Journal on Control and Optimization: Special issue on Control and Optimization in Cooperative Networks, 2006 [6] M. Huang, J. H. Manton, Stochastic consensus seeking with measurement noise: convergence and asymptotic normality. Proc. American Control Conference, 2008, pp.1337–1342 [7] M. Huang, J. H. Manton, Stochastic approximation for consensus seeking: mean square and almost sure convergence. Proc. 46th IEEE Conference on Decision and Control, 2008, pp.306–311 [8] D. B. Kingston, W. Ren, R. W. Beard, Consensus algorithms are input-to-state stable. Proc. American Control Conference, 2005, pp.1686–1690 [9] T. Li, J. Zhang, Mean square average consensus under measurement noises and fixed topologies: necessary and sufficient conditions. Automatica, 2009, to appear. [10] T. Li, J. Zhang, Consensus conditions of multi-agent systems with time-varying topologies and stochastic communication noises. IEEE Trans. Autom. Control, 2009, to appear. [11] Y. Liu and F. Yang, Some theoretical results of synchronization of a linearly coupled dynamical system with random perturbation on a network. J. Phys. A: Math. Theor., 42(2009) 065101 [12] N. Lynch, Distributed Algorithms. Morgan Kaufmann, San Matero, 1996 [13] C. Ma, T. Li, J. Zhang, Leader-following consensus control for multi-agent systems under measurement noises. Proc. 17th IFAC Congress, 2008, pp.1528–1533 [14] A. N. Michel, R. K. Miller, Qualitative Analysis of Large Scale Dynamical Systems. Academic Press, New York, 1977 10 [15] M. B. Nevelson, R. A. Hasminskii, Stochastic Approximation and Recursive Estima- tion. American Mathematical Society, Providence RI, 1976 [16] R. Olfati-Saber, Flocking for multi-agent dynamic systems: Algorithms and theory. IEEE Trans. Autom. Control, 51(2006) pp.401–420 [17] R. Olfati-Saber, J. A. Fax, R. M. Murray, Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE, 95(2007) pp.215–233 [18] R. Olfati-Saber, R. M. Murray, Consensus problems in networks of agents with switch- ing topology and time-delays. IEEE Trans. Autom. Control, 49(2004) pp.1520–1533 [19] B. Øksendal, Stochastic Differential Equations: An Introduction with Applications. Springer-Verlag, Berlin, 2003 [20] K. Peng, Y. Yang, Leader-following consensus problem with a varying-velocity leader and time-varying delays. Physica A, 388(2009) pp.193–208 [21] S. Puntanen, G. P. H. Styan, Historical introduction: Issai Schur and the early de- velopment of the Schur complement: in The Schur Complement and Its Applications, F. Zhang, Ed. Springer, New York, 2004, pp.1–16 [22] W. Ren, Multi-vehicle consensus with a time-varying reference state. Systems & Con- trol Letters, 56(2007) pp.474–483 [23] W. Ren, R. W. Beard, Consensus seeking in multi-agent systems under dynamically changing interaction topologies. IEEE Trans. on Autom. Control, 50(2005) pp.655– 661 [24] W. Ren, R. W. Beard, E. M. Atkins, A survey of consensus problems in multi-agent coordination, Proc. American Control Conference, 2005, pp.1859–1864 [25] W. Ren, R. W. Beard, D. B. Kingston, Multi-agent Kalman consensus with relative uncertainty. Proc. American Control Conference, 2005, pp.1865–1870 [26] A. Sinha, D. Ghose, Generalization of linear cyclic pursuit with application to ren- dezvous of multiple autonomous agents. IEEE Trans. Autom. Control, 51(2006), pp.1819–1824 [27] H. Su, W. Zhang, Second-order consensus of multiple agents with coupling delay. Commun. Theor. Phys., 51(2009) pp.101–109 [28] Y.-Z. Sun, J. Ruan, Leader-follower consensus problems of multi-agent systems with noise perturbation and time delays. Chin. Phys. Lett., 25(2008) pp.3493–3495 [29] J. N. Tsitsiklis, D. P. Bertsekas, M. Athans, Distributed asynchronous determinis- tic and stochastic gradient optimization algorithms. IEEE Trans. Autom. Control, 31(1986) pp.803–812 [30] T. Vicsek, A. Czir´ok, E. Ben-Jacob, I. Cohen, O. Shochet, Novel type of phase tran- sition in a system of self-driven particles. Phys. Rev. Lett., 75(1995) pp.1226–1229 [31] J. Wang, J. Hu, D. Cheng, Consensus problem of multi-agent systems with an active leader and time delay. Proc. Chinese Control Conference, 2006, pp.340–345 11 Figure captions Fig. 1 Directed network G of four agents involving one leader. G has 0 − 1 weights. Fig. 2 Consensus error x∗ for the agents. Fig. 3 Consensus error v∗ for the agents. 0 ✲ ✒ 2 ✻ ✠ ❄ 1 ✲ 3 3 2 1 agent 3 agent 2 * x 0 agent 1 10 20 30 40 50 Time 60 70 80 90 100 agent 3 −1 −2 −3 0 4 3 2 agent 2 * v 1 0 −1 −2 0 agent 1 10 20 30 40 60 70 80 90 100 50 Time 12
1905.08087
2
1905
2019-08-19T12:26:07
A Regularized Opponent Model with Maximum Entropy Objective
[ "cs.MA", "cs.AI", "cs.LG" ]
In a single-agent setting, reinforcement learning (RL) tasks can be cast into an inference problem by introducing a binary random variable o, which stands for the "optimality". In this paper, we redefine the binary random variable o in multi-agent setting and formalize multi-agent reinforcement learning (MARL) as probabilistic inference. We derive a variational lower bound of the likelihood of achieving the optimality and name it as Regularized Opponent Model with Maximum Entropy Objective (ROMMEO). From ROMMEO, we present a novel perspective on opponent modeling and show how it can improve the performance of training agents theoretically and empirically in cooperative games. To optimize ROMMEO, we first introduce a tabular Q-iteration method ROMMEO-Q with proof of convergence. We extend the exact algorithm to complex environments by proposing an approximate version, ROMMEO-AC. We evaluate these two algorithms on the challenging iterated matrix game and differential game respectively and show that they can outperform strong MARL baselines.
cs.MA
cs
A Regularized Opponent Model with Maximum Entropy Objective Zheng Tian1∗ , Ying Wen1∗ , Zhichen Gong1 , Faiz Punakkath1 , Shihao Zou2 and Jun Wang 1 1University College London 2University of Alberta {zheng.tian, ying.wen, jun.wang}@cs.ucl.ac.uk 9 1 0 2 g u A 9 1 ] A M . s c [ 2 v 7 8 0 8 0 . 5 0 9 1 : v i X r a Abstract less well studied. In a single-agent setting, reinforcement learning (RL) tasks can be cast into an inference problem by introducing a binary random variable o, which stands for the "optimality". In this paper, we rede- fine the binary random variable o in multi-agent set- ting and formalize multi-agent reinforcement learn- ing (MARL) as probabilistic inference. We derive a variational lower bound of the likelihood of achiev- ing the optimality and name it as Regularized Op- ponent Model with Maximum Entropy Objective (ROMMEO). From ROMMEO, we present a novel perspective on opponent modeling and show how it can improve the performance of training agents theoretically and empirically in cooperative games. To optimize ROMMEO, we first introduce a tab- ular Q-iteration method ROMMEO-Q with proof of convergence. We extend the exact algorithm to complex environments by proposing an approx- imate version, ROMMEO-AC. We evaluate these two algorithms on the challenging iterated matrix game and differential game respectively and show that they can outperform strong MARL baselines. 1 Introduction Casting decision making and optimal control as an inference problem have a long history, which dates back to [Kalman, 1960] where the Kalman smoothing is used to solve opti- mal control in linear dynamics with quadratic cost. Bayesian methods can capture the uncertainties regarding the transi- tion probabilities, the rewards functions in the environment or other agents' policies. This distributional information can be used to formulate a more structured exploration/exploitation strategy than those commonly used in classical RL, e.g. - greedy. A common approach in many works [Toussaint and Storkey, 2006; Rawlik et al., 2013; Levine and Koltun, 2013; Abdolmaleki et al., 2018] for framing RL as an inference problem is by introducing a binary random variable o which represents "optimality". By this way, RL problems are able to lend itself to powerful inference tools [Levine, 2018]. How- ever, the Bayesian approach in a multi-agent environment is ∗The first two authors contributed equally. In many single-agent works, maximizing entropy is part of a training agent's objective for resolving ambiguities in in- verse reinforcement learning [Ziebart et al., 2008], improv- ing the diversity [Florensa et al., 2017], robustness [Fox et al., 2015] and the compositionality [Haarnoja et al., 2018a] of the learned policy. In Bayesian RL, it often presents in the evidence lower bound (ELBO) for the log likelihood of optimality [Haarnoja et al., 2017; Schulman et al., 2017; Haarnoja et al., 2018b], commonly known as maximum en- tropy objective (MEO), which encourages the optimal policy to maximize the expected return and long term entropy. In MARL, there is more than one agent interacting with a stationary environment. In contrast with the single agent en- vironment, an agent's reward not only depends on the current environment state and the agent's action but also on the ac- tions of others. The existence of other agents increases the uncertainty in the environment. Therefore, the capability of reasoning about other agents' belief, private information, be- havior, strategy, and other characteristics is crucial. A rea- soning model can be used in many different ways, but the most common case is where an agent utilize its reasoning model to help its self decision making [Brown, 1951; Hein- rich and Silver, 2016; He et al., 2016; Raileanu et al., 2018; Wen et al., 2019; Tian et al., 2018]. In this work, we use the word "opponent" when referring to another agent in the environment irrespective of the environment's cooperative or adversarial nature. In our work, we reformulate the MARL problem into Bayesian inference and derive a multi-agent version of MEO, which we call the regularized opponent model with maxi- mum entropy objective (ROMMEO). Optimizing this objec- tive with respect to one agent's opponent model gives rise to a new perceptive on opponent modeling. We present two off- policy RL algorithms for optimizing ROMMEO in MARL. ROMMEO-Q is applied in discrete action case with proof of convergence. For the complex and continuous action environ- ment, we propose ROMMEO Actor-Critic (ROMMEO-AC), which approximates the former procedure and extend itself to continuous problems. We evaluate these two approaches on the matrix game and the differential game against strong baselines and show that our methods can outperform all the baselines in terms of the overall performance and speed of convergence. (cid:34) ∞(cid:88) 2 Method 2.1 Stochastic Games For an n-agent stochastic game [Shapley, 1953], we define a tuple (S,A1, . . . ,An, R1, . . . , Rn, p,T , γ), where S denotes the state space, p is the distribution of the initial state, γ is a discount factor, Ai and Ri = Ri(s, ai, a−i) are the action space and the reward function for agent i ∈ {1, . . . , n} re- spectively. States are transitioned according to T : S × A, where A = {A1,··· ,An}. Agent i chooses its action ai ∈ Ai according to the policy πi θi(ais) parameterized by θi conditioning on some given state s ∈ S. Let us define the joint policy as the collection of all agents' policies πθ with θ representing the joint parameter. It is convenient to interpret the joint policy from the perspective of agent i such θi(ais), π−i θ−i(a−is)), where a−i = (aj)j(cid:54)=i, that πθ = (πi θ−i(a−is) is a compact representation θ−i = (θj)j(cid:54)=i, and π−i of the joint policy of all complementary agents of i. At each stage of the game, actions are taken simultaneously. Each agent is presumed to pursue the maximal cumulative reward, expressed as (cid:35) t, a−i t ) , (1) max ηi(πθ) = E t, a−i t=1 t ) sample from (πi γtRi(st, ai θi, π−i θ−i). In fully cooperative with (ai games, we assume there exists at least one joint policy πθ such that all agents can achieve the maximal cumulative re- ward with this joint policy. 2.2 A Variational Lower Bound for Multi-Agent Reinforcement Learning Problems We transform the control problem into an inference problem by introducing a binary random variable oi t which serves as the indicator for "optimality" for each agent i at each time step t. Recall that in single agent problem, reward R(st, at) is bounded, but the achievement of the maximum reward given the action at is unknown. Therefore, in the single-agent case, ot indicates the optimality of achieving the bounded maxi- mum reward r∗ t . It thus can be regarded as a random vari- able and we have P (ot = 1st, at) ∝ exp(R(st, at)). Intu- itively, this formulation dictates that higher rewards reflect a higher likelihood of achieving optimality, i.e., the case when ot = 1. However, the definition of "optimality" in the multi- agent case is subtlety different from the one in the single- agent situation. reinforcement cooperative multi-agent learning (CMARL), to define agent i's optimality, we first introduce the definition of optimum and optimal policy: Definition 1. In cooperative multi-agent reinforcement learning, optimum is a strategy profile (π1∗, . . . , πn∗) such that: In (cid:35) where π = (πi, π−i) and Agent i's optimal policy is πi∗. In CMARL, a single agent's "optimality" oi t cannot imply that it obtains the maximum reward because the reward de- pends on the joint actions of all agents (ai, a−i). Therefore, t = 1 only indicates that agent i's policy at time we define oi step t is optimal. The posterior probability of agent i's opti- t is the probability that the action is mality given its action ai sampled from the optimal policy: P (oi tai t) = P (ai t ∼ πi∗ai t) = πi∗(ai t). (3) We also assume that given other players playing optimally (o−i t = 1), the higher the reward agent i receives the higher the probability of agent i's current policy is optimal (oi t = 1): t, a−i t ) ∝ exp(R(st, ai t = 1o−i t = 1, st, ai t, a−i t )). P (oi (4) The conditional probabilities of "optimality" in both of CMARL and single-agent case have similar forms. However, it is worth mentioning that the "optimality" in CMARL has a different interpretation to the one in single-agent case. For cooperative games, if all agents play optimally, then agents can receive the maximum rewards, which is the opti- mum of the games. Therefore, given the fact that other agents are playing their optimal policies o−i = 1, the probability that agent i also plays its optimal policy P (oi = 1o−i = 1) is the probability of obtaining the maximum reward from agent i's perspective. Therefore, we define agent i's objective as: max J ∆= log P (oi 1:T = 1o−i 1:T = 1) (5) 1:T , a−i 1:T , a−i 1:T , s1:Toi 1:T , s1:Toi As we assume no knowledge of the optimal policies and the model of the environment, we treat them as latent variables. To optimize the observed evidence defined in Eq. 5, there- fore, we use variational inference (VI) with an auxiliary dis- tribution over these latent variables q(ai 1:T = 1, o−i 1:T = 1). Without loss of generality, we here derive the solution for agent i. We factorize q(ai 1:T = 1, o−i 1:T = 1) so as to capture agent i's conditional policy on the current state and opponents actions, and beliefs regard- ing opponents actions. This way, agent i will learn optimal policy, while also possessing the capability to model oppo- nents actions a−i. Using all modelling assumptions, we may 1:T , a−i factorize q(ai (cid:89) 1:T , s1:Toi 1:T , a−i = P (s1) (cid:89) × q(a−i = P (s1) 1:T = 1, o−i P (st+1st, at)q(ai t = o−i P (st+1st, at)π(ai 1:T = 1) ta−i 1:T = 1, o−i 1:T , s1:Toi 1:T = 1) as: t = o−i t )ρ(a−i tst, a−i st, oi t = 1) t = 1) st), , st, oi q(ai t t t t (cid:34) ∞(cid:88) (cid:34) ∞(cid:88) t=1 γtRi(st, ai∗ ) t t , a−i∗ (cid:35) t, a−i t ) E s∼ps,ai∗ t ∼πi∗,a −i∗ t ∼π−i∗ s∼ps,ai ≥ E ∀π ∈ Π, i ∈ (1 . . . n), t∼πi,a −i t ∼π−i γtRi(st, ai (2) t t=1 where we have assumed the same initial and states transitions as in the original model. With this factorization, we derive a lower bound on the likelihood of optimality of agent i: log P (oi ≥ J (π, ρ) ∆= + H(π(ai (cid:88) 1:T = 1o−i 1:T = 1) t, a−i E t ) (st,ai tst, a−i t )) − DKL(ρ(a−i st)P (a−i st))] (cid:124) (cid:123)(cid:122) t, a−i t ∼ρ[Ri(st, ai t ) + H(π(ai −i t∼π,a ai t )∼q[Ri(st, ai −i t,a Est[E t t t −i (cid:123)(cid:122) t ∼ρ[DKL(ρ(a−i t Regularizer of ρ MEO st)P (a−i st))] ]. t (cid:125) (cid:88) (cid:124) a t = − E tst, a−i t )) ] (6) (cid:125) (7) t t t t t st, o−i st, o−i tst, a−i t = 1, o−i 1:T = 1o−i t = 1) and P (a−i Written out in full, ρ(a−i t = 1) is agent i's op- ponent model estimating optimal policies of its opponents, t = 1, o−i t = 1) is the agent i's conditional π(ai , oi t = o−i policy at optimum (oi t = 1) is the prior of optimal policy of opponents. In our work, we st, o−i set the prior P (a−i t = 1) equal to the observed em- pirical distribution of opponents' actions given states. As we are only interested in the case where (oi t = 1), we st) here and thereafter. H(·) is drop them in π, ρ and P (a−i the entropy function. Eq. 6 is a variational lower bound of 1:T = 1) and the derivation is deferred to log P (oi Appendix B.1. 2.3 The Learning of Opponent Model We can further expand Eq. 6 into Eq. 7 and we find that it resembles the maximum entropy objective in single-agent re- inforcement learning [Kappen, 2005; Todorov, 2007; Ziebart et al., 2008; Haarnoja et al., 2017]. We denote agent i's ex- pectation of reward R(st, ai t ) plus entropy of the condi- tional policy H(π(ais, a−i)) as agent i's maximum entropy objective (MEO). In the multi-agent version, however, it is worthy of noting that optimizing the MEO will lead to the optimization of ρ. This can be counter-intuitive at first sight as opponent behaviour models are normally trained with only past state-action data (s, a−i) to predict opponents' actions. t = 1) is modelling op- ponents' optimal policies in our work. Given agent i's policy πi being fixed, optimizing MEO with respect to ρ updates agent i's opponent model in the direction of the higher shared reward R(s, ai, a−i) and the more stochastic conditional pol- icy πi(ais, a−i), making it closer to the real optimal policies of the opponents. Without any regularization, at iteration d, agent i can freely learn a new opponent model ρi d+1 which is the closest to the optimal opponent policies π−i∗ from its d(ais, a−i). Next, agent i can optimize perspective given πi the lower bound with respect to πi d+1. Then we have an EM-like iterative training and can show it monotonically increases the probability that the opponent model ρ is optimal policies of the opponents. Then, by act- ing optimally to the converged opponent model ρi∞, we can recover agent i's optimal policy πi∗. However, recall that ρ(a−i d+1(ais, a−i) given ρi st, o−i t, a−i However, it is unrealistic to learn such an opponent model. As the opponents have no access to agent i's conditional pol- d(ais, a−i), the learning of its policy can be different icy πi t from the one of agent i's opponent model. Then the actual op- ponent policies π−i d+1 can be very different from agent i's con- verged opponent model ρi∞ learned in the above way given d(ais, a−i). Therefore, acting agent i's conditional policy πi optimally to an opponent model far from the real opponents' policies can lead to poor performance. The last st)P (a−i term in Eq. 7 can prevent agent i build- ing an unrealistic opponent model. The Kullback-Leibler (KL) divergence between opponent model and a prior st)) can act as a regularizer of ρ. By DKL(ρ(a−i setting the prior to the empirical distribution of opponent past behaviour, the KL divergence penalizes ρ heavily if it deviates from the empirical distribution too much. As the objective in Eq. 7 can be seen as a Maximum Entropy objective for one agent's policy and opponent model with regularization on the opponent model, we call this objective as Regularized Oppo- nent Model with Maximum Entropy Objective (ROMMEO). t t 3 Multi-Agent Soft Actor Critic To optimize the ROMMEO in Eq. 7 derived in the previous section, we propose two off-policy algorithms. We first intro- duce an exact tabular Q-iteration method with proof of con- vergence. For practical implementation in a complex continu- ous environment, we then propose the ROMMEO actor critic ROMMEO-AC, which is an approximation to this procedure. 3.1 Regularized Opponent Model with Maximum Entropy Objective Q-Iteration In this section, we derive a multi-agent version of Soft Q- iteration algorithm proposed in [Haarnoja et al., 2017] and we name our algorithm as ROMMEO-Q. The derivation follows from a similar logic to [Haarnoja et al., 2017], but the exten- sion of Soft Q-learning to MARL is still nontrivial. From this section, we slightly modify the objective in Eq. 7 by adding a weighting factor α for the entropy term and the original ob- jective can be recovered by setting α = 1. We first define multi-agent soft Q-function and V-function respectively. Then we can show that the conditional policy and opponent model defined in Eq. 10 and 11 below are opti- mal solutions with respect to the objective defined in Eq. 7: Theorem 1. We define the soft state-action value function of agent i as a−i P (a−is) sof t(s, ai, a−i)) (9) Then the optimal conditional policy and opponent model for Eq. 6 are ai exp( 1 α Q∗ π∗(ais, a−i) = (cid:80) exp( 1 ai exp( 1 α Qπ∗,ρ∗ sof t (s, ai, a−i)) α Qπ∗,ρ∗ sof t (s, ai, a−i)) , (10) Qπ∗,ρ∗ sof t (st, ai ∗ + αH(π (ai −i t ) = rt + E t+l, st+l)) − DKL(ρ −i (st+l,ai t, a t+la t+l,a ∗ and soft state value function as V ∗(s) = log(cid:80) (cid:16)(cid:80) ∞(cid:88) −i t+l,...)∼q[ t+lst+l)P (a t+lst+l))], −i −i (a γl(rt+l l=1 (8) (cid:17)α , and P (a−is) ρ∗(a−is) = (cid:16)(cid:80) sof t(s, ai, a−i)) ai exp( 1 α Q∗ exp(V ∗(s)) (cid:17)α . (11) Proof. See Appendix C.2. Following from Theorem 1, we can find the optimal solu- tion of Eq. 7 by learning the soft multi-agent Q-function first and recover the optimal policy π∗ and opponent model ρ∗ by Equations 10 and 11. To learn the Q-function, we show that it satisfies a Bellman-like equation, which we name it as multi- agent soft Bellman equation: Theorem 2. We define the soft multi-agent Bellman equation sof t(s, ai, a−i) of for the soft state-action value function Qπ,ρ agent i as sof t(s, ai, a−i) = rt + γE(st+1)[Vsof t(st+1)]. Qπ,ρ (12) Proof. See Appendix C.3. sof t and V ∗ With this Bellman equation defined above, we can derive a solution to Eq. 12 with a fixed point iteration, which we call ROMMEO Q-iteration (ROMMEO-Q). Additionally, We can show that it can converge to the optimal Q∗ sof t with certain restrictions as stated in [Wen et al., 2019]: Theorem 3. ROMMEO Q-iteration. with only one global optimum, Eπ Qsof t(·,·,·) and Vsof t(·) be bounded and assume Eπ∗(cid:2)Qi t(s)(cid:3) ≥ t(s)(cid:3), where π∗ is the optimal strategy profile. Let (cid:2)Qi (cid:33)α (cid:88) sof t(s, ai, a−i)) Q∗ In a symmetric game (cid:32)(cid:88) P (a−is) < ∞ exp( i.e. 1 α a−i ai and that Q∗ sof t < ∞ exists. Then the fixed-point iteration where (cid:16)(cid:80) Qsof t(st, ai log(cid:80) t, a−i Vsof t(st) α Qsof t(st, ai t ) ← rt + γE(st+1)[Vsof t(st+1)], P (a−i t, a−i ← t, a−i t )) sof t respectively. , ∀st, ai (cid:17)α −i t a (13) st) × t , converges t ai t exp( 1 sof t and V ∗ to Q∗ Proof. See Appendix C.3. 3.2 Regularized Opponent Model with Maximum Entropy Objective Actor Critic The ROMMEO-Q assumes we have the model of the envi- ronment and is impractical to implement in high-dimensional continuous problems. To solve these problems, we pro- pose the ROMMEO actor critic (ROMMEO-AC) which is a model-free method. We use neural networks (NNs) as function approximators for the conditional policy, opponent model and Q-function and learn these functions by stochastic gradient. We parameterize the Q-function, conditional policy and opponent model by Qω(s, ai, a−i), πθ(ai t ) and ρφ(a−i st) respectively. tst, a−i t Without access to the environment model, we first replace the Q-iteration with Q-learning. Therefore, we can train ω to minimize: (14) JQ(ω) = E (st,ai t,a − R(st, ai with ¯V (st+1) = Q¯ω(st+1, ai − α log πθ(ai 1 2 t, a−i t ) (Qω(st, ai t )∼D[ −i t ) − γEst+1∼ps [ ¯V (st+1)])2], t, a−i t+1st+1) t+1, a−i t+1st+1, a−i t+1) − log ρφ(a−i t t+1) + logP (a−i t+1st+1), (15) where Q¯ω are target functions for providing relatively stable target values. We use a−i t denoting the action sampled from st) and it should be distin- agent i's opponent model ρ(a−i guished from a−i t which is the real action taken by agent i's opponent. Eq. 15 can be derived from Eq. 10 and 11. To recover the optimal conditional policy and oppo- nent model and avoid intractable inference steps defined in Eq. 10 and 11 in complex problems, we follow the method in [Haarnoja et al., 2018b] where θ and φ are trained to min- imize the KL-divergence: −i st∼D,a t ∼ρ πθ(·st, a−i t ) Jπ(θ) = E (16) (cid:32) ρ(·st) (st,ai (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) exp( 1 α Qω(st,·, a−i t )) Zω(st, a−i t ) (cid:17)α (cid:16) exp( 1 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) P (·st) α Q(st,ai tst,·) πθ(ai Zω(st) t,·)) t)∼D (cid:34) DKL , (cid:33)(cid:35)  .  DKL Jρ(φ) = E (17) By using the reparameterization trick: a−i t = fθ(i ai ; st) and t ), we can rewrite the objectives above as: st∼D,i t = gφ(−i Jπ(θ) = E t; st, a−i t )) t; st, a−i t (19) The gradient of Eq. 14, 18 and 19 with respect to the cor- t responding parameters are listed as below: ∇ωJQ(ω) = ∇ωQω(st, ai t, a−i tst, a−i tst, a−i − R(st, ai ∇θJπ(θ) = ∇θα log πθ(ai α log πθ(ai t, a−i t )(Qω(st, ai t ) − γ ¯V (st+1)), t ) + ∇θfθ(i t ) − ∇ai (∇ai t Qω(st, ai t t, a−i t ) (20) t; st, a−i t ) t, a−i t )), (21) t st) + (∇a ∇φJρ(φ) = ∇φ log ρφ(a−i st) − ∇a log P (a−i α log πθ(aist, a−i st) t, a−i t ) ; st). (22) We list the pseudo-code of ROMMEO-Q and ROMMEO- log ρφi(a−i t Qωi(st, ai t ))∇φgφ(−i − ∇a + ∇a −i t −i t −i t −i t t t AC in Appendix A. t∼N,a − Qω(st, fθ(i (st,at)∼D, Jρ(φ) = E − logP (a−i + α log πθ(ai t t )], t ), a−i t ∼ρ[α log πθ(fθ(i −i t; st, a−i t ∼N [log ρφ(gφ(−i st) − Q(st, ai t, gφ(−i tst, gφ(−i ; st))]. −i t t (18) ; st)st) ; st)) (a) (b) (c) Figure 1: (a): Learning curves of ROMMEO and baselines on ICG over 100 episodes. (b): Probability of convergence to the global optimum for ROMMEO and baselines on ICG over 100 episodes. The vertical axis is the joint probability of taking actions A for both agents. (c): Probability of taking A estimated by agent i's opponent model ρi and observed empirical frequency P i in one trail of training, i ∈ {1, 2}. 4 Related Works In early works, the maximum entropy principle has been used in policy search in linear dynamics [Todorov, 2010; Toussaint, 2009; Levine and Koltun, 2013] and path integral control in general dynamics [Kappen, 2005; Theodorou et al., 2010]. Recently, off-policy methods [Haarnoja et al., 2017; Schulman et al., 2017; Nachum et al., 2017] have been pro- posed to improve the sample efficiency in optimizing MEO. To avoid complex sampling procedure, training a policy in su- pervised fashion is employed in [Haarnoja et al., 2018b]. Our work is closely related to this series of recent works because ROMMEO is an extension of MEO to MARL. A few related works to ours have been conducted in multi- agent soft Q-learning [Wen et al., 2019; Wei et al., 2018; Grau-Moya et al., 2018], where variants of soft Q-learning are applied for solving different problems in MARL. How- ever, unlike previous works, we do not take the soft Q- learning as given and apply it to MARL problems with mod- ifications. In our work, we first establish a novel objective ROMMEO and ROMMEO-Q is only an off-policy method we derive with complete convergence proof, which can opti- mize the objective. There are other ways of optimizing ROM- MEO, for example, the on-policy gradient-based methods, but they are not included in the paper. There has been substantial progress in combining RL with probabilistic inference. However, most of the existing works focus on the single-agent case. The literature of Bayesian methods in MARL is limited. Among these are methods performing on cooperative games with prior knowledge on distributions of the game model and the possible strategies of others [Chalkiadakis and Boutilier, 2003] or policy pa- rameters and possible roles of other agents [Wilson et al., 2010]. In our work, we assume very limited prior knowl- edge of the environment model, optimal policy, opponents or the observations during the play. In addition, our al- gorithms are fully decentralized at training and execution, which is more challenging than problems from the cen- tralized training [Foerster et al., 2017; Lowe et al., 2017; Rashid et al., 2018]. In our work, we give a new definition of optimality in CMARL and derive a novel objective ROMMEO. We provide two off-policy RL algorithms for optimizing ROMMEO and the exact version comes with convergence proof. In addition, we provide a natural perspective on opponent modeling in co- ordination problems: biasing one's opponent model towards the optimum from its perspective but regularizing it with the empirical distribution of opponent's real behavior. Iterated Matrix Games 5 Experiments 5.1 We first present the proof-of-principle result of ROMMEO- Q1 on iterated matrix games where players need to cooperate to achieve the shared maximum reward. To this end, we study the iterated climbing games (ICG) which is a classic purely cooperative two-player stateless iterated matrix games. (CG) is [Claus a fully and Boutilier, summarized cooperative 1998] follows: Climbing game game whose R = A B C in proposed payoff matrix  (11, 11) A (−30,−30) (0, 0) is B (−30,−30) (7, 7) (0, 0) as  . C (0, 0) (6, 6) (5, 3) It is a challenging benchmark because of the difficulty of conver- gence to its global optimum. There are two Nash equilibrium (A, A) and (B, B) but one global optimal (A, A). The punishment of miscoordination by choosing a certain action increases in the order of C → B → A. The safest action is C and the miscoordination punishment is the most severe for A. Therefore it is very difficult for agents to converge to the global optimum in ICG. We compare our method to a series of strong baselines including Joint Action Learner (JAL) [Claus in MARL, and Boutilier, 1998], WoLF Policy Hillclimbing (WoLF- PHC) [Bowling and Veloso, 2001], Frequency Maximum Q (FMQ) [Kapetanakis and Kudenko, 2002] and Probabilistic Recursive Reasoning (PR2) [Wen et al., 2019]. ROMMEO- Q-EMP is an ablation study to evaluate the effectiveness of our proposed opponent model learning process, where we re- place our opponent model with empirical frequency. Fig. 1a shows the learning curves on ICG for different algorithms. The difference of rewards between ROMMEO-Q and FMQ- c10 may seem small because of the small reward margin between the global optimum and the local one. However, ROMMEO-Q actually outperforms all baselines significantly in terms of converging to the global optimum, which is shown 1The experiment code and appendix are available at https://github.com/rommeoijcai2019/rommeo. 050100150200250300Episodes302010010RewardJALWoLF-PHCPR2FMQ-c10ROMMEO-QROMMEO-Q-EMP050100150200250300Episodes0.000.250.500.751.00P(A,A)JALWoLF-PHCPR2FMQ-c10ROMMEO-QROMMEO-Q-EMP050100150200250300Episodes0.00.20.40.60.81.0p(A)1212 (a) (b) (c) Figure 2: Experiment on Max of Two Quadratic Game. (a) Reward surface and learning path of agents. Scattered points are actions taken at each step; (b) Learning curve of ROMMEO and baselines. (c) Mean of agents' policies π and opponent models ρ. in Fig. 1b. To further analyze the opponent modeling de- scribed in Sec. 2.3, we visualize the probability of agent −i taking the optimal action A estimated by agent i's opponent model ρi and its true policy π−i in Fig. 1c. Agent i's op- ponent model "thinks ahead" of agent −i and converges to agent −i's optimal policy before agent −i itself converges to the optimal policy. This helps agent i to respond to its op- ponent model optimally by choosing action A, which in turn leads to the improvement of agent −i's opponent model and policy. Therefore, the game converges to the global optimum. To note, the big drop of P (A) for both policies and opponent models at the beginning of the training comes from the severe punishment of miscoordination associated with action A. )2 − ( a2−5 1 1 3 3 5.2 Differential Games We adopt the differential Max of Two Quadratic Game [Wei et al., 2018] for continuous case. The agents have continu- ous action space of [−10, 10]. Each agent's reward depends on the joint action following the equations: r1(cid:0)a1, a2(cid:1) = r2(cid:0)a1, a2(cid:1) = max (f1, f2) , where f1 = 0.8 × [−( a1+5 )2], f2 = 1.0 × [−( a1−5 )2 − ( a2+5 )2] + 10. We compare the algorithm with a series of baselines includ- ing PR2 [Wen et al., 2019], MASQL [Wei et al., 2018; Grau-Moya et al., 2018], MADDPG [Lowe et al., 2017] and independent learner via DDPG [Lillicrap et al., 2015]. To compare against traditional opponent modeling methods, similar to [Rabinowitz et al., 2018; He et al., 2016], we im- plement an additional baseline of DDPG with an opponent module that is trained online with supervision in order to capture the latest opponent behaviors, called DDPG-OM. We trained all agents for 200 episodes with 25 steps per episode. This is a challenging task to most continuous gradient based RL algorithms because gradient update tends to direct the training agent to the sub-optimal point. The reward sur- face is provided in Fig. 2a ; there is a local maximum 0 at (−5,−5) and a global maximum 10 at (5, 5), with a deep valley staying in the middle. If the agents' policies are initial- ized to (0, 0) (the red starred point) that lies within the basin of the left local maximum, the gradient-based methods would tend to fail to find the global maximum equilibrium point due to the valley blocking the upper right area. A learning path of ROMMEO-AC is summarized in Fig. 2a and the solid bright circle on the right corner implies the convergence to the global optimum. The learning curve is presented in Fig. 2b, ROMMEO-AC shows the capability of converging to the global optimum in a limited amount of steps, while most of the baselines can only reach the sub- optimal point. PR2-AC can also achieve the global optimum but requires many more steps to explore and learn. Addition- ally, fine tuning on the exploration noise or separate explo- ration stage is required for deterministic RL methods (MAD- DPG, DDPG, DDPG-OM, PR2-AC), and the learning out- comes of energy-based RL method (MASQL) is extremely sensitive to the annealing scheme for the temperature. In con- trast, ROMMEO-AC employs a stochastic policy and con- trols the exploration level by the weighting factor α. It does not need a separate exploration stage at the beginning of the training or a delicately designed annealing scheme for α. Furthermore, we analyze the learning path of policy π and modeled opponent policy ρ during the training, the results are shown in Fig. 2c. The red and orange lines are mean of modeled opponent policy ρ, which always learn to approach the optimal ahead of the policy π (in dashed blue and green lines). This helps the agents to establish the trust and con- verge to the optimum quickly, which further justifies the ef- fectiveness and benefits of conducting a regularized opponent model proposed in Sec. 2.3. 6 Conclusion In this paper, we use Bayesian inference to formulate MARL problem and derive a novel objective ROMMEO which gives rise to a new perspective on opponent modeling. We design an off-policy algorithm ROMMEO-Q with complete conver- gence proof for optimizing ROMMEO. For better general- ity, we also propose ROMMEO-AC, an actor critic algorithm powered by NNs to solve complex and continuous problems. We give an insightful analysis of the effect of the new learning process of the opponent modeling on agent's performance in MARL. We evaluate our methods on the challenging matrix game and differential game and show that they can outper- form a series of strong base lines. It is worthy of noting that Theorems 1,2 and 3 only guarantees the convergence to opti- mal solutions with respect to ROMMEO objective but not the optimum in the game. The achievement of the optimum in the game also relies on the opponent learning algorithm. In our work, we demonstrate that ROMMEO-Q/AC's convergence to the optimum of the game in self-play setting. The conver- gence to optimum of games in non-self-play settings will be studied in our future work. 10505Action of Agent 110505Action of Agent 2-30.0-30.0-26.0-26.0-22.0-22.0-22.0-18.0-18.0-18.0-14.0-14.0-10.0-10.0-6.0-6.0-2.0-2.02.06.002004006008001000Step0255075100125150175200Episodes302010010ReturnROMMEO-ACPR2-ACDDPG-OMDDPGMADDPGMASQL01020304050Episodes10505Mean of Policy1212 References [Abdolmaleki et al., 2018] Abbas Abdolmaleki, Jost Tobias Sprin- genberg, Yuval Tassa, R´emi Munos, Nicolas Heess, and Mar- tin A. Riedmiller. Maximum a posteriori policy optimisation. CoRR, abs/1806.06920, 2018. [Bowling and Veloso, 2001] Michael Bowling and Manuela Veloso. Rational and convergent learning in stochastic games. In IJCAI, San Francisco, CA, USA, 2001. [Brown, 1951] George W. Brown. Iterative solution of games by fictitious play. In AAPA. New York, 1951. [Chalkiadakis and Boutilier, 2003] Georgios Chalkiadakis and Craig Boutilier. Coordination in multiagent reinforcement learning: A bayesian approach. In AAMAS, pages 709 -- 716, New York, NY, USA, 2003. ACM. [Claus and Boutilier, 1998] Caroline Claus and Craig Boutilier. The dynamics of reinforcement learning in cooperative multia- gent systems. AAAI '98/IAAI '98, Menlo Park, CA, USA, 1998. American Association for Artificial Intelligence. [Florensa et al., 2017] Carlos Florensa, Yan Duan, and Pieter Abbeel. Stochastic Neural Networks for Hierarchical Reinforce- ment Learning. arXiv e-prints, April 2017. [Foerster et al., 2017] Jakob Foerster, Gregory Farquhar, Tri- antafyllos Afouras, Nantas Nardelli, and Shimon Whiteson. Counterfactual Multi-Agent Policy Gradients. arXiv e-prints, page arXiv:1705.08926, May 2017. [Fox et al., 2015] Roy Fox, Ari Pakman, and Naftali Tishby. Tam- ing the Noise in Reinforcement Learning via Soft Updates. arXiv e-prints, page arXiv:1512.08562, December 2015. [Grau-Moya et al., 2018] Jordi Grau-Moya, Felix Leibfried, and Haitham Bou-Ammar. Balancing Two-Player Stochastic Games with Soft Q-Learning. IJCAI, 2018. [Haarnoja et al., 2017] Tuomas Haarnoja, Haoran Tang, Pieter Abbeel, and Sergey Levine. Reinforcement learning with deep energy-based policies. CoRR, abs/1702.08165, 2017. [Haarnoja et al., 2018a] Tuomas Haarnoja, Vitchyr Pong, Aurick Zhou, Murtaza Dalal, Pieter Abbeel, and Sergey Levine. Com- posable Deep Reinforcement Learning for Robotic Manipulation. arXiv e-prints, page arXiv:1803.06773, March 2018. [Haarnoja et al., 2018b] Tuomas Haarnoja, Aurick Zhou, Pieter Abbeel, and Sergey Levine. Soft Actor-Critic: Off-Policy Max- imum Entropy Deep Reinforcement Learning with a Stochastic Actor. arXiv e-prints, page arXiv:1801.01290, January 2018. [He et al., 2016] He He, Jordan Boyd-Graber, Kevin Kwok, and Hal Daum´e III. Opponent modeling in deep reinforcement learn- In International Conference on Machine Learning, pages ing. 1804 -- 1813, 2016. [Heinrich and Silver, 2016] Johannes Heinrich and David Silver. learning from self-play in imperfect- Deep reinforcement information games. CoRR, abs/1603.01121, 2016. [Kalman, 1960] Rudolf Kalman. A new approach to linear filtering and prediction problems. Transactions of the ASME - Journal of basic Engineering, 82:35 -- 45, 01 1960. [Kapetanakis and Kudenko, 2002] Spiros Kapetanakis and Daniel Kudenko. Reinforcement learning of coordination in coopera- tive multi-agent systems. In Eighteenth National Conference on Artificial Intelligence, Menlo Park, CA, USA, 2002. [Kappen, 2005] Hilbert J. Kappen. Path integrals and symmetry breaking for optimal control theory. Journal of Statistical Me- chanics: Theory and Experiment, 2005(11), 2005. [Levine and Koltun, 2013] Sergey Levine and Vladlen Koltun. Variational policy search via trajectory optimization. In C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Wein- berger, editors, NIPS '13. 2013. [Levine, 2018] Sergey Levine. Reinforcement Learning and Con- trol as Probabilistic Inference: Tutorial and Review. arXiv e- prints, page arXiv:1805.00909, May 2018. [Lillicrap et al., 2015] Timothy P Lillicrap, Jonathan J Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval Tassa, David Silver, and Daan Wierstra. Continuous control with deep rein- forcement learning. arXiv preprint arXiv:1509.02971, 2015. [Lowe et al., 2017] Ryan Lowe, Yi Wu, Aviv Tamar, Jean Harb, Pieter Abbeel, and Igor Mordatch. Multi-Agent Actor-Critic for Mixed Cooperative-Competitive Environments. arXiv e-prints, page arXiv:1706.02275, June 2017. [Nachum et al., 2017] Ofir Nachum, Mohammad Norouzi, Kelvin Xu, and Dale Schuurmans. Bridging the Gap Between Value and Policy Based Reinforcement Learning. arXiv e-prints, page arXiv:1702.08892, February 2017. [Rabinowitz et al., 2018] Neil C Rabinowitz, Frank Perbet, H Fran- cis Song, Chiyuan Zhang, SM Eslami, and Matthew Botvinick. Machine theory of mind. arXiv preprint arXiv:1802.07740, 2018. [Raileanu et al., 2018] Roberta Raileanu, Emily Denton, Arthur Szlam, and Rob Fergus. Modeling others using oneself in multi- agent reinforcement learning. CoRR, abs/1802.09640, 2018. [Rashid et al., 2018] Tabish Rashid, Mikayel Samvelyan, Christian Schroeder de Witt, Gregory Farquhar, Jakob Foerster, and Shi- mon Whiteson. QMIX: Monotonic Value Function Factorisation for Deep Multi-Agent Reinforcement Learning. arXiv e-prints, page arXiv:1803.11485, March 2018. [Rawlik et al., 2013] Konrad Rawlik, Marc Toussaint, and Sethu Vijayakumar. On stochastic optimal control and reinforcement learning by approximate inference. IJCAI '13, 2013. [Schulman et al., 2017] John Schulman, Xi Chen, and Pieter Abbeel. Equivalence Between Policy Gradients and Soft Q- Learning. arXiv e-prints, page arXiv:1704.06440, April 2017. [Shapley, 1953] Lloyd S Shapley. Stochastic games. Proceedings of the national academy of sciences, 39(10):1095 -- 1100, 1953. [Theodorou et al., 2010] Evangelos Theodorou, Jonas Buchli, and Stefan Schaal. A generalized path integral control approach to re- inforcement learning. J. Mach. Learn. Res., 11, December 2010. [Tian et al., 2018] Zheng Tian, Shihao Zou, Tim Warr, Lisheng Wu, and Jun Wang. Learning Multi-agent Implicit Communi- cation Through Actions: A Case Study in Contract Bridge, a Collaborative Imperfect-Information Game. arXiv e-prints, page arXiv:1810.04444, October 2018. [Todorov, 2007] Emanuel Todorov. Linearly-solvable markov de- cision problems. In B. Scholkopf, J. C. Platt, and T. Hoffman, editors, NIPS '19. 2007. [Todorov, 2010] Emanuel Todorov. Policy gradients in linearly- In J. D. Lafferty, C. K. I. Williams, J. Shawe- solvable mdps. Taylor, R. S. Zemel, and A. Culotta, editors, NIPS. 2010. [Toussaint and Storkey, 2006] Marc Toussaint and Amos Storkey. Probabilistic inference for solving discrete and continuous state markov decision processes. ICML '06, pages 945 -- 952, New York, NY, USA, 2006. ACM. [Toussaint, 2009] Marc Toussaint. Robot trajectory optimization using approximate inference. ICML '09, pages 1049 -- 1056, New York, NY, USA, 2009. ACM. [Wei et al., 2018] Ermo Wei, Drew Wicke, David Freelan, and Sean Luke. Multiagent soft q-learning. AAAI, 2018. [Wen et al., 2019] Ying Wen, Yaodong Yang, Rui Luo, Jun Wang, and Wei Pan. Probabilistic recursive reasoning for multi-agent reinforcement learning. In ICLR, 2019. [Wilson et al., 2010] Aaron Wilson, Alan Fern, and Prasad Tade- palli. Bayesian policy search for multi-agent role discovery. AAAI'10, pages 624 -- 629. AAAI Press, 2010. [Ziebart et al., 2008] Brian D. Ziebart, Andrew Maas, J. Andrew Bagnell, and Anind K. Dey. Maximum entropy inverse reinforce- ment learning. In AAAI '08, 2008. A Algorithms Algorithm 1 Multi-agent Soft Q-learning Result: policy πi, opponent model ρi Initialization: Initialize replay buffer M to capacity M. Initialize Qωi(s, ai, a−i) with random parameters ωi, P (a−is) arbitrarily, set γ as the discount factor. Initialize target Q¯ωi(s, ai, a−i) with random parameters ¯ωi, set C the target parameters update interval. while not converge do Collect experience For the current state st compute the opponent model ρi(a−i st) and conditional policy πi(ai tst, a−i t ) respectively from: α , ρi(a−i t st) ∝ P (a−i t st) exp( 1 α Qωi(st, ai t, a−i t )) πi(ai tst, a−i Qωi (st, ai t, a−i t )). Compute the marginal policy πi(ai tst) and sample an action from it: t ∼ πi(ai ai tst) = πi(ai tst, a−i t )ρ(a−i t st). t (cid:88) ai t 1 α t ) ∝ exp( (cid:88) a−i Observe next state st+1, opponent action a−i t and reward ri t, save the new experience in the reply buffer: Update the prior from the replay buffer: P (a−i t st) = M ← M ∪ {(st, ai t, a−i t , st+1, ri t)}. (cid:80)M m=1 (cid:80)M m=1 I(s = st, a−i = a−i t ) I(s = st) ∀st, a−i t ∈ M. Sample a mini-batch from the replay buffer: {s(n) t , ai,(n) t −i,(n) , a t , s(n) t+1, r(n) t }N n=1 ∼ M. t t t , s(n) −i,(n) , a t Sample {a−i,(n,k)}K Compute empirical ¯V i(s(n) Update Qωi(s, ai, a−i): for each tuple (s(n) ) do , ai,(n) t+1, r(n) k=1 ∼ ρ, {ai,(n,k)}K k=1 ∼ π. (cid:16) K(cid:88) (cid:40)  1 t+1) = log t+1) as: ¯V i(s(n) P 1 Set k=1 K α (a−i,(n,k)s(n) t+1) exp( 1 α Q¯ωi(s(n) t+1, ai,(n,k), a−i,(n,k))) π(ai,(n,k)s(n) t+1, a−i,(n,k))ρ(a−i,(n,k)s(n) t+1) (cid:17)α  . y(n) = r(n) t r(n) t + γ ¯V i(s(n) t+1) for terminal s(n) t+1 for non-terminal s(n) t+1 Perform gradient descent step on (y(n) − Qωi(s(n) Every C gradient descent steps, reset target parameters: t+1, ai,(n), a−i,(n)))2 with respect to parameters ωi ¯ωi ← ω end for end while Compute converged πi and ρi Algorithm 2 Multi-agent Variational Actor Critic Result: policy πθi, opponent model ρφi Initialization: Initialize parameters θi, φi, ωi, ψi for each agent i and the random process N for action exploration. Assign target parameters of joint action Q-function: ¯ωi ← ω. Initialize learning rates λV , λQ, λπ, λφ, α, and set γ as the discount factor. for Each episode d = (1, . . . , D) do Initialize random process N for action exploration. for each time step t do For the current state st, sample an action and opponent's action using: t ← gφ−i(−i; st), where −i a−i t ← fθi(i; st, a−i t ), where i ai Observe next state st+1, opponent action a−i t ∼ N , t ∼ N . t and reward ri Di ← Di ∪ {(st, ai t, save the new experience in the replay buffer: t, a−i , st+1, ri , a−i t)}. t t Update the prior from the replay buffer: ψi = arg max EDi[−P (a−is) log Pψi(a−is)] Sample a mini-batch from the reply buffer: {s(n) t , ai,(n) t −i,(n) , a t −i,(n) , a t , s(n) t+1, r(n) t }N n=1 ∼ M. t+1, sample an action and opponent's action using: For the state s(n) −i,(n) t+1 ← gφ−i (−i; s(n) a t+1 ← f¯θi(i; s(n) ai,(n) t+1, a ¯V i(s(n) t+1) = Q¯ω(s(n) t+1, ai,(n) Set t+1), where −i −i,(n) ), where i t+1 −i,(n) t+1 , a t+1 t+1 ∼ N , t+1 ∼ N . (cid:40) )− α log πθi(ai,(n) t+1 s(n) t+1, a −i,(n) t+1 )− log ρφi(a −i,(n) t+1 s(n) t+1) + log Pψi(a −i,(n) t+1 s(n) t+1). y(n) = r(n) t r(n) t + γ ¯V i(s(n) t+1) for terminal s(n) t+1 for non-terminal s(n) t+1 ∇ωiJQ(ωi) = ∇ωiQωi(s(n) t , ai,(n) t −i,(n) , a t )(Qωi(s(n) t , ai,(n) t −i,(n) , a t ) − y(n)) s(n) ∇θiJπ(θi) = ∇θiα log πθi(ai,(n) −i,(n) + (∇ai,(n) , a t α log πθi(ai,(n) s(n) −i,(n) , a t ) − ∇ai,(n) ) t t t t t t Qω(s(n) t , ai,(n) t −i,(n) , a t ))∇θfθi(i t; s(n) t −i,(n) , a t ) −i,(n) ∇φiJρ(φi) = ∇φi log ρφi (a t −i,(n) + (∇a s(n) log ρφi(a t + ∇a α log πθi(ai,(n)s(n) s(n) ) − ∇a −i,(n) , a t −i,(n) t −i,(n) t t t t ) −i,(n) t −i,(n) log P (a t ))∇φigφi(−i ; s(n) t t ) s(n) t ) − ∇a −i,(n) t Qωi (s(n) t , ai,(n) t −i,(n) , a t ) Update parameters: ωi = ωi − λQ∇ωiJQ(ωi) θi = θi − λπ∇θiJπ(θi) φi = φi − λφi∇φiJρ(φi) end for Every C gradient descent steps, reset target parameters: ωi = βωi + (1 − β)ωi . end for B Variational Lower Bounds in Multi-agent Reinforcement Learning B.1 The Lower Bound of The Log Likelihood of Optimality We can factorize P (ai 1:T , s1:To−i 1:T ) as : (cid:89) 1:T , a−i P (ai 1:T , s1:To−i 1:T , a−i t ) is the conditional policy of agent i when other agents −i achieve optimality. As agent i has no P (st+1st, at)P (ai t )P (a−i st, o−i t ), 1:T ) = P (s1) , st, o−i ta−i (23) t t t ta−i t , st, o−i where P (ai ta−i knowledge about rewards of other agents, we set P (ai (cid:89) 1:T , o−i 1:T ) as: (cid:89) Analogously, we factorize q(ai 1:T , s1:Toi 1:T , s1:Toi 1:T ) = P (s1) 1:T , a−i 1:T , o−i 1:T , a−i q(ai t t = P (s1) , st, o−i t ) ∝ 1. P (st+1st, at)q(ai P (st+1st, at)π(ai ta−i t , st) is agent 1's conditional policy at optimum and ρ(a−i t t where π(ai policies. With the above factorization, we have: t t st, oi t, o−i t ) t )q(a−i st), t, o−i , st, oi t )ρ(a−i ta−i tst, a−i st) is agent 1's model about opponents' optimal (25) (24) t log P (oi (cid:88) 1:To−i 1:T ) = log ≥(cid:88) ai 1:T ,a −i 1:T ,s1:T q(ai 1:T , a−i P (oi 1:T , ai 1:T , a−i 1:T , s1:To−i 1:T ) 1:T , o−i 1:T ) log P (oi q(ai 1:T , s1:Toi T(cid:88) = E (ai 1:T ,a 1:T ,s1:T ∼q)[ −i , st, ai t t=1 log P (oi log P (st+1st, ai to−i T(cid:88) XXXXXXXXXXXX t, a−i t ) t ) − T(cid:88) ρ(a−i tst, a−i P (a−i T(cid:88) log t=1 t=1 t t st) st, o−i t ) t, a−i t ) − log π(ai T(cid:88) t=1 + 1:T ,s1:T ∼q)[ −i t=1 Ri(st, ai t, a−i t )∼q[Ri(st, ai −i t,a t ) + H(π(ai log π(ai XXXXXX − log P (s1) − − T(cid:88) (cid:88) = E 1:T ,a t=1 (ai E (st,ai = t 1:T , ai 1:T , a−i t, a−i 1:T , a−i 1:T , s1:Toi 1:T , s1:To−i 1:T ) T(cid:88) 1:T , o−i 1:T ) XXXXXXXXXXXX t, a−i t ) log P (st+1st, ai XXXXX log P (s1) + t ) + t=1 log P (ai tst, a−i t , o−i t )] st) st, o−i t ) st)P (a−i t t ρ(a−i P (a−i t + log 1] st, o−i t ))]. t ) − log tst, a−i t )) − DKL(ρ(a−i t tst, a−i C Multi-Agent Soft-Q Learning C.1 Soft Q-Function We define the soft state-action value function Qπ,ρ t, a−i t ) Qπ,ρ sof t(st, ai = rt + E (st+l,ai t+l,a t+l,...)∼q[ −i ∞(cid:88) l=1 = E = E (st+1,ai t+1,a t+1)[rt + γ(αH(π(ai −i t+1)[rt + γ(αH(π(·st+1, a−i −i (st+1,a sof t(s, a, a−i) of agent i in a stochastic game as: γl(rt+l + αH(π(ai t+la−i t+l, st+l)) − DKL(ρ(a−i t+lst+l)P (a−i t+1)) − DKL(ρ(a−ist+1)P (a−ist+1)) + Qπ,ρ t+1∼π[Qπ,ρ t+1)) − DKL(ρ(a−ist+1)P (a−ist+1)) + E t+1st+1, a−i ai t+lst+l))] sof t(st+1, ai sof t(st+1, ai t+1, a−i t+1, a−i t+1))] t+1)])] = E(st+1)[rt + γ(E + E −i t+1∼ρ,ai a t+1∼π[Qπ,ρ sof t(st+1, ai −i t+1∼ρ,ai a t+1∼π[αH(π(ai t+1, a−i t+1)])], t+1st+1, a−i t+1))] − DKL(ρ(·st+1)P (·st+1))] (26) (27) (28) (29) (30) (31) (32) (33) (34) (35) (36) Then we can easily see that the objective in Eq. 7 can be rewritten as: J (π, φ) = E (st,ai t,a t )∼(ps,π,ρ)[Qπ,ρ −i sof t(st, ai t, a−i t ) + αH(π(ai tst, a−i t )) − DKL(ρ(a−i t st)P (a−i t st))], (37) (cid:88) t by setting α = 1. C.2 Policy Improvement and Opponent Model Improvement Theorem 4. (Policy improvement theorem) Given a conditional policy π and opponent model ρ, define a new conditional policy π as Assume that throughout our computation, Q is bounded and(cid:80) π). Then Qπ,ρ sof t(s, ai, a−i) ≥ Qπ,ρ sof t(s, ai, a−i)∀s, a. π(·s, a−i) ∝ exp( sof t(s,·, a−i)),∀s, a−i. Qπ,ρ 1 α ai Q(s, ai, a−i) is bounded for any s and a−i (for both π and (38) (39) (cid:88) Theorem 5. (Opponent model improvement theorem) Given a conditional policy π and opponent model ρ, define a new oppo- nent model ρ as ρ(·s) ∝ exp( sof t(s, ai,·)π(ai·, s) + αH(π(s)) + log P (·s)),∀s, ai. Qπ,ρ Assume that throughout our computation, Q is bounded and(cid:80) ai a−i exp((cid:80) sof t(s, ai, a−i) ≥ Qπ,ρ sof t(s, ai, a−i)∀s, a. and ai (for both ρ and ρ). Then Qπ, ρ ai Q(s, ai, a−i)π(ais, a−i)) is bounded for any s The proof of Theorem 4 and 5 is based on two observations that: αH(π(·s, a−i)) + Eai∼π[Qπ,ρ sof t(s, ai, a−i)] ≤ αH(π(·s, a−i)) + Eai∼π[Qπ,ρ sof t(s, ai, a−i)], (40) and E −i t+1∼ρ,ai a ≤ E t+1∼π[αH(π(ai t+1st+1, a−i t+1))] − DKL(ρ(·st+1)P (·st+1))] + E −i t+1∼ ρ,ai t+1∼π[αH(π(ai a t+1st+1, a−i t+1))] − DKL(ρ(a−i t+1∼π[Qπ,ρ −i t+1∼ρ,ai t+1st+1)P (·st+1)) + E −i t+1∼ ρ,ai a sof t(st+1, ai t+1∼π[Qπ,ρ a t+1, a−i sof t(st+1, ai t+1)] t+1, a−i (41) t+1)]. (42) First, we notice that αH(π(·s, a−i)) + Eai∼π[Qπ,ρ sof t(s, ai, a−i)] = −αDKL(π(·s, a−i)π(·s, a−i)) + α log (cid:88) ai exp( 1 α sof t(s, ai, a−i)). (43) Qπ,ρ Therefore, the LHS is only maximized if the KL-Divergence on the RHS is minimized. This KL-Divergence is minimized only when π = π, which proves the Equation 40. Similarly, we can have Ea−i∼ρ,ai∼π[αH(π(ais, a−i))] − DKL(ρ(·s)P (·s))]) + Ea−i∼ρ,ai∼π[Qπ,ρ = −DKL(ρ(·s)ρ(·s)) + log exp( Qπ,ρ(s, ai, a−i)π(ais, a−i) + αH(π(·s, ai)) + log P (a−is)), sof t(s, ai, a−i)] (44) (cid:88) a−i (cid:88) ai which proves the Equation 42. With the above observations, the proof of Theorem 4 and 5 is completed by as follows: Qπ,ρ sof t(st, ai = E t, a−i t ) t+1)[rt + γ(αH(π(ai −i t+1)) − DKL(ρ(a−i t+1st+1)P (a−i t+1st+1, a−i (st+1,ai t+1,a t+1st+1)) + Qπ,ρ sof t(st+1, ai t+1, a−i t+1))] = E ≤ E (st+1,a (st+1,a −i t+1)[rt + γ(αH(π(·st+1, a−i t+1)[rt + γ(αH(π(·st+1, a−i −i t+1)) − DKL(ρ(a−i t+1st+1)P (a−i t+1st+1)) + E t+1∼π[Qπ,ρ sof t(st+1, ai ai t+1, a−i t+1)])] t+1)) − DKL(ρ(a−i t+1st+1)P (a−i t+1st+1)) + E t+1∼π[Qπ,ρ sof t(st+1, ai ai t+1, a−i t+1)])] t+1, a−i t+1∼π[αH(π(ai t+1)])] t+1∼π[αH(π(ai t+1)])] t+1st+1, a−i t+2)) − DKL(ρ(a−i a a −i t+1∼ ρ,ai −i t+1∼ρ,ai = E(st+1)[rt + γ(E + E ≤ E(st+1)[rt + γ(E + E = E + γ2E ≤ E + γ2E ... (st+1,ai (st+1,ai (st+2,a (st+2,a t+1,a t+1,a −i −i t+1∼ρ,ai a t+1∼π[Qπ,ρ sof t(st+1, ai −i t+1∼ ρ,ai a t+1∼π[Qπ,ρ sof t(st+1, ai −i t+1, a−i t+1)∼q[rt + γ(αH(π(ai −i t+2)[αH(π(·st+2, a−i t+1)[rt + γ(αH(π(ai −i t+2)[αH(π(·st+2, a−i ∞(cid:88) γl(rt+l + αH(π(ai ≤ rt + E (st+l,ai t+l,a t+l,...)∼q[ −i l=1 = Qπ, ρ sof t(st, ai t, a−i t ). t+1st+1, a−i t+1))] − DKL(ρ(·st+1)P (·st+1)) t+1st+1, a−i t+1))] − DKL(ρ(·st+1)P (·st+1)) t+1)) − DKL(ρ(a−ist+1)P (a−ist+1)) + rt+1) t+2st+2)P (a−i t+2st+2)) + E t+2∼π[Qπ,ρ sof t(st+2, ai ai t+2, a−i t+2)]]] t+1st+1, a−i t+1)) − DKL(ρ(a−ist+1)P (a−ist+1)) + rt+1) t+2)) − DKL(ρ(a−i t+2st+2)P (a−i t+2st+2)) + E t+2∼π[Qπ,ρ sof t(st+2, ai ai t+2, a−i t+2)]]] t+la−i t+l, st+l)) − DKL(ρ(a−i t+lst+l)P (a−i t+lst+l))] (45) (46) (47) (48) (49) (50) (51) (52) (53) (54) (55) (56) (57) With Theorem 4 and 5 and the above inequalities, we can see that, if we start from an arbitrary conditional policy π0 and an arbitrary opponent model ρ0 and we iterate between policy improvement as πi+1(·s, a−i) ∝ exp( sof t (s,·, a−i)), Qπt,ρt 1 α and opponent model improvement as ρt+1(·s) ∝ exp( Qπt+1,ρt sof t (s, ai,·)πt+1(ai·, s) + αH(πt+1(s)) + log P (·s)), (cid:88) ai sof t (s, ai, a−i) can be shown to increase monotonically. Similar to [Haarnoja et al., 2017], we can show that with then Qπt,ρt certain regularity conditions satisfied, any non optimal policy and opponent model can be improved this way and Theorem 1 is proved. C.3 Soft Bellman Equation As we show in Appendix C.2, when the training converges, we have: π∗(ais, a−i) = 1 (cid:80) α exp(Q∗(s, ai, a−i)) α Q∗(s, ai, a−i)) ai exp( 1 , and ρ∗(a−is) = = exp((cid:80) (cid:80) a−i exp((cid:80) (cid:16)(cid:80) P (a−is) ai Q∗(s, ai, a−i)π∗(ais, a−i) + αH(π∗(ais, a−i)) + log P (a−is)) ai Q∗(s, ai, a−i)π∗(ais, a−i) + αH(π∗(ais, a−i)) + log P (a−is)) ai exp(Q∗ exp(V ∗(s)) sof t(s, ai, a−i)) (cid:17)α , where the equality in Eq. 57 comes from substituting π∗ with Eq. 56 and we define the soft sate value function V π,ρ agent i as: sof t(s) of (cid:88) −i t a (cid:88) ai t (cid:18) 1 α (cid:19)α V π,ρ sof t(st) = log P (a−i t st) exp Qπ,ρ sof t(st, ai t, a−i t ) . (58) Then we can show that Qπ∗,ρ∗ sof t (s, ai, a−i) = rt + γEs(cid:48)∼ps [(E −i t+1∼ρ,ai + E t+1∼π[Qπ,ρ sof t(st+1, ai = rt + γEs(cid:48)∼ps[V ∗(s(cid:48))]. −i t+1∼ρ,ai a a t+1∼π[αH(π(ai t+1)])] t+1, a−i (cid:34) log t+1st+1, a−i t+1))] − DKL(ρ(·st+1)P (·st+1))] (59) 1 2 . exp ai(cid:48) log a−i(cid:48) 2019], maxs,ai,a−i P (a−i(cid:48)s(cid:48)) P (a−i(cid:48)s(cid:48)) (cid:18) 1 α (cid:88) a−i(cid:48) Q(s(cid:48), ai(cid:48), a−i(cid:48)) (60) (cid:13)(cid:13) ∆= T Q(s, ai, a−i) = R(s, ai, a−i) + γEs(cid:48)∼ps We define the soft value iteration operator T as: In a symmetric fully cooperative game with only one global optimum, we can show as done in [Wen et al., (cid:0)s, ai, a−i(cid:1) − Qi (cid:32)(cid:88) (cid:18) 1 (cid:0)s, ai, a−i(cid:1)(cid:12)(cid:12). Let ε =(cid:13)(cid:13)Qi (cid:19)(cid:33)α (cid:32)(cid:88) (cid:13)(cid:13), then we have: (cid:32)(cid:88) (cid:32)(cid:88) (cid:19)(cid:33)α(cid:35) the operator defined above is a contraction mapping. We define a norm on Q-values (cid:13)(cid:13)Qi (cid:12)(cid:12)Qi (cid:19)(cid:33)α (cid:88) (cid:33)α (cid:19)(cid:33)α (cid:19)(cid:33)α α Q2(s(cid:48), ai(cid:48), a−i(cid:48))(cid:1)(cid:1)α (cid:18) 1 (cid:18) 1 (cid:32)(cid:88) (cid:18) 1 (cid:32)(cid:88) (cid:18) 1 a−i(cid:48) P (a−i(cid:48)s(cid:48))(cid:0)(cid:80) 1 − Qi (cid:88) (cid:88) (cid:88) a−i(cid:48) P (a−i(cid:48)s(cid:48))(cid:0)(cid:80) ai(cid:48) exp(cid:0) 1 (cid:13)(cid:13) ≤ γε = γ(cid:13)(cid:13)Qi 1 − T Qi = αε + log α Q1(s(cid:48), ai(cid:48), a−i(cid:48))(cid:1)(cid:1)α ≥ −αε+log(cid:80) (cid:13)(cid:13), where α = 1. 1 − Qi ai(cid:48) exp(cid:0) 1 Q2(s(cid:48), ai(cid:48), a−i(cid:48)) + ε P (a−i(cid:48)s(cid:48)) exp(ε)α Q2(s(cid:48), ai(cid:48), a−i(cid:48)) Q1(s(cid:48), ai(cid:48), a−i(cid:48)) Q2(s(cid:48), ai(cid:48), a−i(cid:48)) Q2(s(cid:48), ai(cid:48), a−i(cid:48)) (cid:88) a−i(cid:48) P (a−i(cid:48)s(cid:48)) P (a−i(cid:48)s(cid:48)) Similarly, log(cid:80) Therefore(cid:13)(cid:13)T Qi ≤ log P (a−i(cid:48)s(cid:48)) a−i(cid:48) a−i(cid:48) a−i(cid:48) exp α ai(cid:48) exp α ai(cid:48) exp ai(cid:48) exp exp 1 − Qi 2 ai(cid:48) ai(cid:48) = log = log 2 2 2 α . (61) α α (cid:19) exp(ε) .
1702.02541
1
1702
2017-02-08T17:49:31
Modelling community formation driven by the status of individual in a society
[ "cs.MA", "cs.SI", "physics.soc-ph" ]
In human societies, people's willingness to compete and strive for better social status as well as being envious of those perceived in some way superior lead to social structures that are intrinsically hierarchical. Here we propose an agent-based, network model to mimic the ranking behaviour of individuals and its possible repercussions in human society. The main ingredient of the model is the assumption that the relevant feature of social interactions is each individual's keenness to maximise his or her status relative to others. The social networks produced by the model are homophilous and assortative, as frequently observed in human communities and most of the network properties seem quite independent of its size. However, it is seen that for small number of agents the resulting network consists of disjoint weakly connected communities while being highly assortative and homophilic. On the other hand larger networks turn out to be more cohesive with larger communities but less homophilic. We find that the reason for these changes is that larger network size allows agents to use new strategies for maximizing their social status allowing for more diverse links between them.
cs.MA
cs
Modelling community formation driven by the status of individual in a society Jan E. Snellman1, Gerardo Iniguez2,1,3, Tzipe Govezensky4, R. A. Barrio5, and Kimmo K. Kaski1 1Department of Computer Science, Aalto University School of Science, FI-00076 AALTO, Finland, 2Instituto de Investigaciones en Matem´aticas Aplicadas y en Sistemas, Universidad Nacional Aut´onoma de M´exico, 01000 M´exico D.F., Mexico 3Centro de Investigaci´on y Docencia Econ´omicas, Consejo Nacional de Ciencia y Tecnolog´ıa, 01210 M´exico D.F., Mexico 4Instituto de Investigaciones Biom´edicas, Universidad Nacional Aut´onoma de M´exico, 04510 M´exico D.F., Mexico and 5Instituto de F´ısica, Universidad Nacional Aut´onoma de M´exico, 01000 M´exico D.F., Mexico (Dated: November 14, 2018) In human societies, people's willingness to compete and strive for better social status as well as being envious of those perceived in some way superior lead to social structures that are intrinsically hierarchical. Here we propose an agent-based, network model to mimic the ranking behaviour of individuals and its possible repercussions in human society. The main ingredient of the model is the assumption that the relevant feature of social interactions is each individual's keenness to maximise his or her status relative to others. The social networks produced by the model are homophilous and assortative, as frequently observed in human communities and most of the network properties seem quite independent of its size. However, it is seen that for small number of agents the resulting network consists of disjoint weakly connected communities while being highly assortative and homophilic. On the other hand larger networks turn out to be more cohesive with larger communities but less homophilic. We find that the reason for these changes is that larger network size allows agents to use new strategies for maximizing their social status allowing for more diverse links between them. community formation, opinion formation, social hierarchy PACS numbers: I. INTRODUCTION One of the most pervasive tendencies of humans is putting things in ranking order. In human societies these tendencies are reflected in their social interactions and networks being hierarchical in many respects. Hierar- chies and ranks emerge due to individuals' subjective per- ceptions that some other individuals are in some respect better. Then a relevant research question is whether or not the formation and structure of hierarchies in human societies can be understood by making the assumption that the dominant driving force of people in social in- teractions is to enhance their own "value" or "status" relative to others. We call this assumption "better than- hypothesis" (BTH) and note that it is closely related to the thinking of the school of individual psychology founded by Adler in the early 1900s [1], which, while starting with the assumption that human individuals uni- versally strive for "superiority" over others, emphasizes inferiority avoidance as a motive for many human actions. Further studies of this kind of individuals' status- seeking behaviour, especially concerning consumer be- haviour and economics, include the canonical references by Veblen [2], Duesenberry [3] and Packard [4] (See also Refs [5 -- 8]). In addition there is a closely related socio- logical model called Social Dominance Theory [9], which proposes that the construction and preservation of so- cial hierarchies is one of the main motivations of humans in their social interactions and networks. However, the most relevant observational facts concerning BTH come from the field of experimental economics, especially from the results of experiments on the so-called "ultimatum game" [10], where the human players have been shown to reject too unequal distributions of money. The con- cept of inequity aversion, that is the observed social phe- nomenon of humans preferring equal treatment in their societies, is often invoked to explain these observations. Recently some models featuring inequity aversion have been proposed in Refs. [11, 12]. All of these models, although from different fields of study, have something to do with the relative standings between different human individuals and groups, and so they could all be considered to emerge from or be based on a single principle such as BTH. It is this generality which makes BTH an intriguing and interesting object of study. There are even some studies on economic data, such as [13], that suggest a link between relative social standings and human well-being, and considerations of social status have measurable effects on brain functions, as shown in e.g. [14, 15]. These studies imply that BTH could well be something fundamental to human nature. The competition for a better hierarchical position among humans can be intense and sometimes even vio- lent. However, humans have other characteristics includ- ing egalitarianism as well as striving for fairness. These traits could be interpreted in the context of BTH by re- marking that people need to live in societies and make diverse social bonds, which in turn would contribute to their social status. This means that the members of soci- ety when they make decisions, need to take the feelings of others into account. Hence the behavioral patterns of in- dividuals in social networks should then be characterised by sensitivity to the status of the other individuals in the network. This sensitivity manifests itself as inequity aversion and treating others fairly. To find out what in this context are the plausible and relevant mechanisms of human sociality driving societal level community forma- tion we will focus on improving the BTH-based approach by using the frame of agent-based models and studying the emergence of social norms in such social systems, fol- lowing the tradition presented in Refs. [16 -- 21]. In this study we use an agent-based network model applying BTH-based approach to simulate social inter- actions dependent on societal values and rank, to get insight to their global effects on the structure of soci- ety. We find that in such a model society with a given constant ranking system the social network forms a de- gree hierarchy on top of the ranking system under BTH, such that the agents' degrees tend to increase, the further away their rank is from the average. The structure of the paper is as follows. In Section II we motivate the basics of BTH using the simple and well-researched ultimatum game as an example, and in Section III we show how the findings from this can be utilised as a part of agent-based models. In Section IV we present the numerical results of the simulations from the model, and in Section V we analyse them. The two final Sections discuss the possible interpretations of the results and present the conclusions. II. BETTER THAN-HYPOTHESIS AND ULTIMATUM GAME In this section we describe the theoretical basis for our model. We start by analysing the ultimatum game first proposed in [10], as it allows us to derive a basic form for the social gain function in our model. The ultimatum game is a game with two players, where one player has the task to make a proposal to the other player about how a given sum of money should be divided between them. The second player then gets to choose if the pro- posal is acceptable or not; if it is, the money is divided as proposed. If not, neither player gets anything. Exper- iments show that humans playing this game normally do not accept deals that are perceived to be unfair, i.e. in situations in which the proposer gets too large a share of the money (see, e.g. Refs. [22 -- 27]). This is a classic problem in the mainstream economics, where humans are assumed to be rational and, therefore, accept something rather than nothing. We implement BTH in the ultimatum game by inter- preting the money used in a deal as a way of compar- ing the status between the one who accepts the proposal (called from now on the accepter) and its proposer. We denote the change of "status" of the accepter as ∆a, which takes into account it's own monetary gain, and the gain in relation to the proposer. Therefore, the simplest expression for ∆a is, ∆a =Ra(t1) − Ra(t0) + [Ra(t1) − Rp(t1)] − [Ra(t0) − Rp(t0)], (1) where Ra(t) and Rp(t) stand for the monetary reserves 2 (in the context of the game) of the accepter and proposer, respectively, at time t, with t0 being the time before the deal and t1 the time after the deal. In terms of economic theory, ∆a would be called the accepter's change of util- ity, which is ordinarily assumed to consist of the term Ra(t1) − Ra(t0) or the absolute payoff of the accepter. The additional terms [Ra(t1)−Rp(t1)]−[Ra(t0)−Rp(t0)] that stem from the BTH measuring the change in rela- tive standings of the accepter and proposer. The actual BTH utility function for the accepter in the ultimatum game takes the form U BT H a = Ra + [Ra − Rp]. (2) According to Eq. (1), the accepter will refuse the deal for ∆a < 0, and will accept it for ∆a > 0, with ∆a = 0 being the borderline case. Should the deal be rejected, Ra(t1) = Ra(t0) and Rp(t1) = Rp(t0), and, consequently, ∆a = 0. If we denote by Rmax the total amount of money to be shared and by Rshare the actual amount money that the proposer has reserved for the accepter, then in the case where the transaction does take place we have Ra(t1) = Ra(t0) + Rshare and Rp(t1) = Rp(t0) + (Rmax − Rshare). If we further assume that Ra(t0) = Rp(t0) (i.e. the players start on equal footing, which may very well be the case in the context of the game at least), it follows from Eq.(1) that the smallest offer that the accepter expects from the proposer is one third of the maximum Rmax, i.e. the condition Rshare > Rmax 3 (3) must hold for the proposal to be acceptable. Previous literature shows that the minimum offers that people are usually willing to accept are around 30% of a given quantity [24], in close agreement with the cal- culation above. Moreover, we note that if the term Ra(t1)− Ra(t0) in Eq. (1) is neglected, then the accepter will never settle for less than half of the total amount. Next we use Eq. (1) to illustrate how the BTH-based approach can be implemented in the context of agent based social simulations. The trick is to generalise this equation to the cases of many players, and with multiple and different kinds of items being exchanged. If there are N players (denoted by i = 1, . . . , N ), the change of status ∆i of the individual i may be written as follows [Ri(t0) − Rj(t0)]. (4) In the case that players have several ways to measure their status, we may introduce normalisation factors to compare the relative value of the exchanged items, and ∆i = Ri(t1) − Ri(t0) + [Ri(t1) − Rj(t1)] (cid:88) −(cid:88) j(cid:54)=i j(cid:54)=i write the change of status as, ∆i = i (cid:26) (cid:2)Rα (cid:2)Rα α (cid:88) (cid:88) −(cid:88) j(cid:54)=i + j(cid:54)=i 1 N α i (t1) − Rα Rα i (t0) j (t1)(cid:3) j (t0)(cid:3)(cid:27) i (t1) − Rα i (t0) − Rα (5) where the index α runs over the various items determin- ing the status, and N α is the normalisation factor of each item, which may vary from one player to another. The utility function associated with Eq. (5) reads then i U BT H i = 1 N α i Rα i + i − Rα j . (6) (cid:26) (cid:88) α (cid:2)Rα (cid:88) j(cid:54)=i (cid:3)(cid:27) III. THE BTH AND AGENT-BASED NETWORK MODEL In this section we present an agent-based model of a ranked social system of N agents, in which the agents exchange their views of the ranking system itself. To each agent i we assign a parameter ai to describe the rank of the agent, and a state variable xi to denote the opinion of the agent i of the social value attached to pa- rameter a. The social value is then a relative quantity in the minds of the agents, and they value each other in either ascending or descending order according to the "ranking parameter", we call a, and xi determines which order a given agent i prefers and how strongly. Generally speaking, the sign of xi represents the chosen order, − for descending and + for ascending order, while its mag- nitude represents the strength of conviction: with xi= 0 the agent can be said to support equality of all the agents irrespective of the ranking parameter, with xi= 1 the agent thinks that a should directly define the hierarchy of the society, and for the case xi< 1 or xi> 1 cor- respondinly downplaying or emphasizing the significance of a, respectively. Here, we adopt the maximum value for xi to be 1000. To put the relation of the social value and the opinion parameter into more precise terms, we adopt the follow- ing expression for the term we call "ranking pressure": Pj = 1 max(a) − min(a) (aj − ak), (7) where the summation is over the whole network. Now, we define the social value of the agent i in the eyes of agent j as xjPi, and assume that the agents take into account the views of their neighbours in addition to their own when evaluating their total social value Vi. Thus, we write (cid:88) k (cid:88) k∈m1(i) Vi = xiPi + xkPi, (8) 3 (cid:88) where m1(i) denotes agents that are one step away from agent i. The first term on the right could be considered as the agent's "self esteem" and the second the "social value" given to it by its first neighbours. It should be noted at this point that in defining Vi in terms of Pi we have assumed that ai does not confer direct advantages or disadvantages for the agents. Therefore, the most nat- ural interpretation for ai is that it represents the owner- ship of pure status symbols or Veblen goods, i.e. goods that are only, or mostly, desirable due to their status- enhancing properties, such as luxury items. If ai would give some advantages or disadvantages for the agents, Eq. (8) would have to be revised accordingly. The agents in our simulations attempt to gain as much social value as possible, both in absolute and relative terms, and do this either by changing their opinion variables or adjusting their relations to other agents. The system we use here is purely reactive, with agents reacting to the changes in their social environment in accordance with BTH. The social gain function could then be written as ∆i(t1, t0) = Vi(t1) − Vi(t0) + (Vi(t1) − Vk(t1)) −(cid:88) k (Vi(t0) − Vk(t0)), (9) k where t0 and t1 are the two consecutive time steps. The sign of this function determines the direction of the changes in xi. The decision making method employed by the agents is thus a simple hill climbing algorithm: At a given time step t, first an agent observes the quantity ∆i(t−1, t−2), and then changes its variable xi(t − 1), which leads to a recurrence relation of the form (cid:26) xi(t − 1) + dx, xi(t − 1) − dx, xi(t) = if Gi > 0, otherwise (10) where Gi = sign[(∆i(t− 1, t− 2)× (xi(t− 2)− xi(t− 1))] and dx is a small increment. In the spirit of simulated an- nealing techniques, the magnitude of the change is larger at the beginning of the dynamics and falls linearly with time to a minimum value, the maximum and minimum values being dx = 0.11 and dx = 0.01, respectively, and the time period to reach the minimum is 1000 time steps. In general, the links between the agents in the social network may change in time for which purpose we use the following rewiring scheme of Ref. [28]. The social network of the agents is initially random, but will change periodically, i.e. at every g time steps of the dynamical Eq. (10). Given the definition of the total social value of an agent in Eq. (8), the gain function Eq.(9) can be used to calculate the loss or gain in total social status when forming or breaking new social bonds. In this study, we take any positive gain as sufficient to justify the rear- rangement of social relations between the agents. When agent i considers cutting an existing bond with agent j, the gain function has the form this study, homophily refers to agents with similar rank- ing parameters forming connections with each other. 4 i,j = Vj − Vi − (ki + 2)xjPi, ∆c (11) where ki is the current number of neighbours of agent i. Similarly, when agent i considers forming a new bond with agent j, the social gain function reads i,j = Vi − Vj + (ki + 2)xjPi − xiPj. ∆f (12) Since any positive change indicated by the functions above leads to rewiring, it is the sign of these functions that determines whether or not links between agents are broken or created. For instance, if ∆c i,j > 0, the link be- tween agents i and j will be cut, and preserved if ∆c i,j < 0. In the same vein, a link between agents i and j will be cre- ated if ∆f i,j > 0, and not created otherwise. It should be noted that when forming links the opinions of both agents are taken into account: The relation formation only suc- ceeds if ∆f j,i are both positive. The agents will form all the relationships they can in a rewiring cycle. i,j and ∆f The averaged numerical results extracted from the sim- ulations consist then of the standard network properties, i.e. degree (cid:104)k(cid:105) the shortest path (cid:104)L(cid:105), the average clus- tering coefficient (cid:104)C(cid:105), the mean number of second neigh- bours (cid:104)n(2)(cid:105), susceptibility (cid:104)s(cid:105) and average assortativity coefficient (cid:104)ra(cid:105), and a homophily coefficient (cid:104)rh(cid:105). Sus- ceptibility here refers to average cluster size, which is calculated as the second moment of the number of s sized clusters, ns: (cid:80) s nss2(cid:80) s nss (cid:104)s(cid:105) = . (13) As customary in percolation theory, the largest connected component of the network is not counted in calculating s. For the assortativity coefficient we use the definition given in [29], and the homophily coefficient is defined using Pearson's product moment coefficient, which mea- sures the goodness of a linear fit to a given data. For a sample it can be defined as (cid:80)M (cid:113)(cid:80)M i (vi − v)(wi − w) i (vi − v)2 (cid:113)(cid:80)M i (wi − w)2 IV. NUMERICAL RESULTS rh = , (14) The numerical simulations of the models of social sys- tem described in the previous sections are performed as follows. First, the initial state of the system is set at random with the agents given a relatively small initial opinion xi between −1 and 1, a ranking parameter ai between 0 and maximum value of 100.0 and initial con- nections to other agents, with initial average degree of 5. The opinion and ranking parameters are chosen using a random number generator, which returns a flat dis- tribution. The dynamics are then run for 200000 time steps, which is, according to our test runs, sufficient for the general structure of the network to settle. However, the dynamics of the opinion variables do not have a set stopping point, so they may experience fluctuations even when such fluctuations do not have an effect on the net- work structure anymore. To obtain reliable statistics, the same simulations are repeated 100 times with random initial values, and av- erages are calculated from these repeated tests for the quantities under study. The rewiring timescale g is fixed to 100 in our simulations, since this value lies in the range where communities are formed in the opinion formation model of Ref. [28]. The main parameter whose effect is studied here is the number of simulated agents, N . The main objective of this research is to study the structure of the social networks created under BTH as- sumption in the case of a rigid ranking system, which we perform using the model explained in Section III. The most interesting properties of the system are then asso- ciated with assortativity, or the tendency of agents with high degrees connecting to other highly connected agents, and homophily, or the inclination of similar agents form- ing connections between each other. In the context of where v and w are vectors containing the value param- eters of agents linked by link i, v and w are the mean values of these vectors, respectively, and M is the total number of links. More specifically, if agents α and β are connected by link i, then vi = aα and wi = aβ. The links are indexed as follows: the links involving the first agent are given the first indices, then follow the links involving the second agent but not the first, and so on, without re- peating links that have already been indexed. It should be noted, however, that rh only measures linear correla- tion between the ranking parameters of linked agents, it does not indicate how steep these trends are. To check whether the system is truly homophilic, then, one needs to make a linear fit to the data: the closer the obtained linear coefficients are to 1, the greater the homophily. The average network properties of the system, with graphs illustrating the behaviour of the system are shown in Fig. 1 as functions of the population size, which is varied between 50 and 500. The main observations that can be made about the graphs in Fig.1(a) are that at lower population levels they show a tendency of breaking apart into many subcomponents of different sizes, while for larger population sizes they tend to consist of a sin- gle large component and possibly some smaller separate clusters. A noteworthy fact about these clusters is that they consist of agents with similar values of the rank- ing pressure Pi, which means that the network exhibits homophily in this case. The largest clusters are found at extreme values, and they become smaller when one approaches 0, which also corresponds to average ranking parameters. In the high population case the picture becomes more complicated due to the emergence of clusters that con- 5 signs then the "self esteem" part of Vi is negative, which in itself does not mean that the agent cannot develop a contrarian opinion, since the second sum in the equation could be positive because it depends on the opinions of the neighbours j. This allows the contrarian to be able to make connections with agents of the same or opposite ranking pressure. Additionally, by looking at all connec- tions among contrarians we find that they mostly have Pi of the same sign as xj, as illustrated in the example of Fig. 2. FIG. 1: (a) Graphs showing examples of the network structure for three different sizes, N , where the colour represents the value of the agent's normalized ranking pressure, Pi/Pmax. Observe communities of tightly bound agents of the same colour. The circular vertices represent agents whose opin- ion variable xi and ranking pressure Pi have the same sign, while the triangular vertices represent agents having oppo- (b) Network properties, such as degree (cid:104)k(cid:105), the site signs. shortest path (cid:104)L(cid:105), the average clustering coefficient (cid:104)C(cid:105), the mean number of second neighbours (cid:104)n(2)(cid:105), susceptibility (cid:104)s(cid:105), assortativity coefficient (cid:104)ra(cid:105), and homophily coefficient (cid:104)rh(cid:105) as averages over 100 realizations for the model as a function of the population size, ranging from 50 to 500. tain agents with opposing opinions as well. These new clusters tend to be less connected than the previously de- scribed homogeneous ones, and they tend to connect to the large subgraphs, thus forming a single giant graph. A closer look reveals that these agents generally have opin- ion variables and ranking pressures with opposite signs and are depicted as triangles in Fig. 1 and named 'con- trarians" from now on. A naive analysis would indicate that the agents with positive ranking pressures should always support the as- cending hierarchy, and the agents with negative rank- ing pressures should always support the descending hier- archy. However, the contrarian agents exhibit opposite preferences. The reason why this behaviour is status-wise profitable can be found by looking into the connections of the contrarian agents, details of which are shown in Figs. 2 and 3. As it turns out, most of the connections they form are to other similar agents but with opposite "po- larity" to theirs, i.e. the contrarian agent with negative ranking pressure forms connections mostly with contrar- ian agents of positive ranking pressure, and vice versa. An important quantity in the model is the social value Vi, which is a product of the opinion and ranking pres- sure, as it is seen in Eq. 8. If xi and Pi have opposite FIG. 2: Scatterplot for ranking pressure Pi of agent i vs. the opinion variable xj of agent j, taken from 10 realisations for networks with N = 250 agents. Observe that in most cases xj and Pi have the same sign (especially for normal-normal and contrarian-contrarian links), while only in case of normal - contrarian links they can have opposite signs. This situation can be status-wise beneficial to all par- ties involved, since the small penalty to an agent's self- esteem is more than compensated by the respect that the agent will gain in this case from other agents. The fact that the agents could find this strategy using as primi- tive an intelligence setup as hill climbing is astounding. Another interesting thing about the contrarians is that they appear mostly as connections between clusters that are defined as communities of "normal" agents. The various kinds of behaviour exhibited by the social networks have a marked effect on the network properties also shown in Fig. 1(b). The most obvious is the gradu- ally rising normalised maximum cluster size ((cid:104)cmax(cid:105)/N ), which is about 40% of total population size for N = 50, and over 95% for N = 500. From the figure it seems that the maximum cluster size reaches 50% of the popu- lation size for approximately N = 180, after which point we may assume that the contrarian behavioural patterns start to become progressively more pronounced. The susceptibility ((cid:104)s(cid:105)) at first rises pretty much lin- early, which is not too surprising because of the tendency of network to break into smaller subgraphs at low pop- ulation sizes. However, once the population size reaches about 200, the susceptibility starts to decay, most likely due to the main component of the network becoming aN=50N=250normalagentcontrariancontrarianN=5001.00.50.00.51.0Pi/Pmax0.00.20.40.60.81.0propertyb›cmaxfi/N›csfi/N›Cfi›rafi›rhfi›kfi/N›n(2)fi/N50100150200250300350400450500networksizeN01020304050property›sfi›Lfi›ncfi1501005050100150rankingpressurePi10005005001000opinionxjN=250normalnormalcontrariancontrariannormalcontrarian more prominent, with a decay pattern that is almost piecewise linear itself, apart from fairly large fluctuations. While fairly high throughout, the homophily ((cid:104)rh(cid:105)) and clustering coefficients ((cid:104)C(cid:105)) gradually fall as func- tions of population size, almost certainly due to the pro- liferation of contrarians. There are no great changes in other network properties, as in the average assortativity coefficient ((cid:104)ra(cid:105)), although some faint systematic tenden- cies can be discerned, a slight rising of the average path length ((cid:104)L(cid:105)), as well as slightly decreasing average num- ber of clusters ((cid:104)nc(cid:105)). The rest of the properties per agent are nearly constant, a slight rise of the average number number of second neighbours ((cid:104)n(2)(cid:105)/N ), and a just per- ceptible decrease of the average cluster size ((cid:104)cs(cid:105)/N ) and average degree ((cid:104)k(cid:105)/N ). A way to illustrate the homophily of the system is to make a scatterplot of the ranking parameters of linked agents. As it is seen in Fig.3, the correlation turns out to be very homophilous, as the ranking parameters of linked agents correspond very closely to one other. The emer- gence of the contrarians is also clearly seen: for N = 50, the percentage of contrarians in 10 realisations is 5.4%, while for N = 250 is 13.8%, for N = 500 is 24.9% and for one realisation in in a network of 1000 agents is 38.5%. There is also a clear decreasing linear trend due to the contrarians. The rising trend is without doubt caused by the normal agents, who tend to associate with agents of similar rank, and the decreasing trend is likewise due to the contrari- ans. Both trends have a similar tendency to form square- like patterns along the diagonals, with each "square" cor- responding to some of the many visible communities of the graphs. 6 As explained above, it is necessary to check whether the correspondence of the rankings is truly homophilic. In Table I we show the value of the homophily coefficient of normal and contrarian agents for networks of various sizes. The data were taken from 10 different numerical realisations in each case. Observe that normal agents have values very near one, and contrarians are around one half. Also in the table we show the slope of the re- gression of ai vs. aj. Normal agents are very close to one, indicating high degree of homophily, and the contrarians are negative and around 0.6, indicating that they mostly form connection with agents that have opposite signs of the ranking pressure, and are much less homophilic. Normals Contrarians N=50 N=250 N=500 N=50 N=250 N=500 -0.606 -0.607 -0.707 -0.588 -0.636 -0.731 Slope 0.955 0.968 rh 0.959 0.963 0.963 0.959 TABLE I: Homophily measurement from 10 numerical reali- sations of networks with different sizes. In Fig. 4 we show the degree and the final state of the opinion variable as functions of the ranking parameter of the agents. One can see that the agents with relatively large or low values for the ranking parameter seem to have more neighbours than the agents with the ranking parameters close to the average rank. The communities are also visible in this figure in the form of plateaus at progressively more extreme values of the ranking param- eter. The appearance of contrarians is also very clearly visibly in this figure. FIG. 3: A scatterplot of the ranking parameters ai vs. aj of linked agents i and j for one realisation of networks of differ- ent sizes. The colour code: dark blue for connections between normal agents with positive ranking pressure and opinion vari- ables, light blue for connections between normal agents with negative ranking pressure and opinion variables, dark green for connections between contrarian agents of different "polar- ity", light green for connections between contrarian agents of same "polarity" (these are almost non-existent), light red for connections between normal and contrarian agents with differ- ent signs of the opinion variable, and dark red for connections between normal and contrarian agents with same signs of the opinion variable. FIG. 4: The degree ki and the final state of the opinion variable xi/xmax as a function of the ranking parameter ai of agent i . The colour code is as follows: light blue for normal agents with positive ranking pressure, light red for normal agents with negative ranking pressure, dark blue for contrarian agents with positive ranking pressure, and dark red for contrarian agents with negative ranking pressure. The lower row of panels in Fig.4 shows the correla- tion of agents' ranking parameters and opinion variables. As expected, most of the agents below the average rank- ing parameters have negative opinion variables, and sim- 050100020406080100rankingparameterajN=50050100rankingparameteraiN=250normalagents,P,x>0normalagents,P,x<0contrarians,differentpolaritycontrarians,samepolaritynormal/contrarian,sgnxi=sgnxjnormal/contrarian,sgnxisgnxj050100N=500051015degreekiN=50normalagent,Pi>0normalagent,Pi<0contrarian,Pi>0contrarian,Pi<00204060N=250050100N=5000501001.00.50.00.51.0opinionxi/xmax050100rankingparameterai050100 ilarly, the agents with the above average ranking param- eters have positive opinion variables, at least for small N . There are some exceptions to this rule. The contrar- ian agents are seen clearly in the figure as agents whose opinion variables have opposing signs to agents of similar ranking. On the other hand, when they are present, there are often such normal agents that have more egalitarian views, i.e. less extreme opinions. There is a clear tendency for the agents to attain the most extreme values for opinion variables in either case, although this tendency is smaller as the size of the net- work increases. A clear visualisation of this phenomenon is depicted in Fig. 5 where one can see that the cumula- tive relative frequency of values of x is almost vertical at the extremes for normal agents. The proportion of nor- mal agents with x > 980 is 51.6, 47.4, 39.5 and 34.3%, for N = 50, 250, 500 and 1000, respectively. The picture is very different for contrarians, their distribution tends to be uniform independent of the network size, except at the extreme values where the percentage of agents with x > 980 is 4.8, 10.4, 11.6 and 6.4%, for N = 50, 250, 500 and 1000, respectively. FIG. 5: Empirical distributions of opinions for 10 realisations on networks of sizes 50, 250, and 500 and for single realisation for the system size of 1000 agents, where blue and orange symbols stand for normal and contrarian agents, respectively. As simulations with over 500 agents are very time- consuming, we have not tried to obtain results with large statistics for these cases. We did, however, run some sin- gular simulations with very high agent numbers, to see whether the patterns observed above would hold even there. Fig. 6 shows the resultant graph, rank-rank, and rank-degree correlation scatterplots for a simulation with 1000 agents. As we can see, the contrarians have become more numerous and have ever more extreme ranking pa- rameters, as could be expected from the earlier results. Another interesting feature that emerges from the anal- ysis of 10 numerical realisations is that the degree distri- bution is bimodal for normal agents, that is, there is a large number of agents with low or high degree and very few around the mean degree value. The range of degrees 7 FIG. 6: The rank-rank (a) and rank-degree correlations (b) for a single simulation with N = 1000 agents, along with the final configuration of the network (c); the colour codes and symbols are the same as in Figs 1 (c), 3 (a), and 4 (b). and the median of the distribution increase with the size of the network. For contrarians the picture is different. their degree distribution is unimodal (although not normal) and their median is smaller. Furthermore, their degree range is about half the one for normal agents. This is clearly seen in Fig. 7, were we plot the relative frequency as a function of the degree (k). Observe that the proportion of isolated agents (k = 0) is larger for the contrarians although this tendency diminishes as the networks become larger. FIG. 7: Histogram showing the degree distribution of agents for 10 realisations on networks of sizes 50, 250, and 500 and for single realisation for the system size of 1000 agents. 0.00.20.40.60.81.0cumulativerelativefrequencyN=50normalagentcontrarianN=250100050005001000opinionxi0.00.20.40.60.81.0cumulativerelativefrequencyN=500100050005001000opinionxiN=1000050100rankingparameterai020406080100rankingparameterajN=1000anormalagents,P,x>0normalagents,P,x<0contrarians,differentpolaritynormal/contrarian,sgnxi=sgnxjnormal/contrarian,sgnxisgnxj050100rankingparameterai050100150200degreekibnormalagent,Pi>0normalagent,Pi<0contrarian,Pi>0contrarian,Pi<0cnormalagentcontrariancontrarian1.00.50.00.51.0Pi/Pmax0510150.000.100.200.300.40relativefrequencyN=500204060N=250normalagentcontrarian050100degreeki0.000.050.100.150.20relativefrequencyN=5000100200degreekiN=1000 V. APPROXIMATIVE ANALYSIS OF THE NUMERICAL RESULTS In order to better understand the behaviour of the model we need to perform a thorough analysis of its me- chanics. A convenient starting point for this effort is studying the tendency of the agents with extreme rank- ing parameters to form large fully connected communi- ties, while the agents of more average rank form small fully connected communities. Just from considering the nature of the BTH one might formulate the hypothesis that this may be because of agents with average rankings not forming links with agents with extreme rankings due to it not being status-wise beneficial. If an agent sees that the other agent would gain more in having a link between them, that link will probably not be created by the agent. By inspecting the rewiring rules Eqs.(11) and (12) this hypothesis can be verified. Without loss of gen- erality, we can limit our investigation to the case of two agents with positive ranking pressures and opinion vari- ables considering forming a link, as the case with agents with negative ranking pressures and opinion variables fol- lows from a similar line of reasoning. From Eq. (12) one finds that if agent i considers forming a link with agent j, the ranking pressures and the opinion variables of the agents and their neighbours must satisfy the condition xj +(cid:80) (ki + 2)xj + xi +(cid:80) k∈m1(j) xk + xi k∈m1(i) xk Pi Pj > (15) for the potential link to be acceptable to agent i. If we assume, for simplicity, that the opinion variables of the agents and their neighbours have about the same value, then condition (15) simplifies to Pi Pj > 1 2 kj + 1 ki + 3/2 , which in turn simplifies to Pi Pj > 1 2 , (16) (17) if we further assume that ki, kj (cid:29) 1 and ki ≈ kj, which is reasonable considering that most of the agents at least have large number of neighbours and tend to belong to almost fully connected communities. Here the implicit assumption is that the agents i and j would belong to the same block, if they formed a link. Written in terms of ranking parameters (17) becomes where (cid:104)a(cid:105) = N−1(cid:80) ai > (aj + (cid:104)a(cid:105)) , 1 2 (18) k ak is the average of the rank- ing parameters. From (18) it directly follows that if agent j has the maximum allowed ranking parameter, aj = amax, the link between the agents i and j will only be formed if ai > 0.75amax, since (cid:104)a(cid:105) ≈ 0.5amax. 8 Similarly, if aj = 0.75amax, the two agents will only bond if ai > 0.625amax, and if aj = 0.625amax, only if ai > 0.5625amax, and with every iteration the range of possible ranking parameters of agent i shrinks. This pat- tern is remarkably apparent in the rank-rank correlation Figs. 3 and 6, in which the emergence of the contrarians becomes increasingly clear as the population numbers are increased. For aj = 0.5amax we find that ai must also be 0.5amax for a link to be formed, which explains the tendency of the agents with average ranking parameters to have so few neighbours, as is seen in Figs.3 and 6. To understand the emergence of the contrarians one must analyze the dynamics of the opinion variables, en- capsulated in Eqs.(9) and (10). Naively thinking, one would expect agents to always choose the orientation of their opinion parameters according to their ranking pres- sures. This means that agents with positive ranking pres- sures would prefer positive opinion variables, and simi- larly agents with negative ranking pressures would pre- fer negative opinion variables. The first hypothesis as to how some agents would choose to go against these logi- cal positions is related to the competitive nature of the model's social interactions. It may be that some agents cannot compete in this setting and, therefore, choose to use contrarian strategies instead. Let us approach this question the same way as above, focusing on an agent with positive ranking pressure and initially positive opinion variable, connected to other sim- ilar agents in the way revealed in Section IV. Let us as- sume that, initially, all the agents with positive ranking pressure increase their opinion variables and, conversely, that all the agents with negative ranking pressure de- crease their opinion variables in a simulation step. In this case the social gain function of agent i is ∆i(t1, t0) = dx(N + 1)(ki + 1)Pi − dx (cid:88) (kj + 1)Pj j∈P + +dx (kj + 1)Pj, (19) (cid:88) j∈P − where P + is the set of agents with positive ranking pres- sure and P − the set of agents with negative ranking pres- sure. Now,∆i(t1, t0) needs to be positive if agent i is to continue raising its opinion variable. This yields a con- dition of the form (cid:88) j∈P + (kj + 1)Pj − (cid:88) (kj + 1)Pj j∈P −  . (ki+1)Pi > 1 N + 1 (20) If we denote the number of agents in P + and P − with N + and N−, respectively, we can write this formula in terms of averages over P + and P − as follows: (cid:0)N +(cid:104)(k + 1)P(cid:105)+ − N−(cid:104)(k + 1)P(cid:105)−(cid:1) , (ki+1)Pi > 1 N + 1 (21) where (cid:104)(cid:105)+ denotes average over P +, and, likewise, (cid:104)(cid:105)− denotes average over P −. If we assume N (cid:29) 1 and that the situation is symmetric, i.e. N +(cid:104)(k + 1)P(cid:105)+ ≈ −N−(cid:104)(k + 1)P(cid:105)−, which further simplifies to (ki + 1)Pi > (cid:104)(k + 1)P(cid:105)+, since N = N + + N− and N + ≈ N−. (22) (23) Condition (23) basically states that revising opinion parameter upwards, which is the "natural" direction for an agent in P +, is only status-wise beneficial for the agent if the product of the agent's degree (plus one) and the ranking pressure are above the average of the same prod- uct over the whole group P +. We can see from this that the agents with low ranking pressures and the amounts of connections fare badly under the condition (23). As observed earlier, in the simulations the agents with av- erage ranking parameters, who correspondingly have low ranking pressures, are also the ones with least connec- tions, which accordingly means that they are most likely to become contrarians, at least with regard to (23). But what about the observed phenomenon of more and more of agents with higher and higher ranking parame- ters (and thus ranking pressures) to become contrarians as the total numbers of simulated agents increases?. The answer to this question can be found by substituting the numbers obtained for the sizes of the different communi- ties to the right hand side of inequality (23), along with the average ranking parameters for these communities, as shown in Table II. (cid:104)a(cid:105)n n Mn 0.875amax 1 0.25N 2 0.125N 0.6875amax 3 0.0625N 0.59375amax 4 0.03125N 0.546875amax TABLE II: The approximate number of members and the average ranking parameters of the 4 largest communities in P +. From condition(18) it follows that the largest commu- nity in P + comprises of those agents with ranking param- eters over 0.75amax, which means that the community will have approximately 0.25N members, when one takes into account the fact that the ranking parameters are uniformly distributed. The second largest community, likewise, consists of those agents with ranking param- eters between 0.625amax and 0.75amax, and has about 0.125N members. The nth (n > 1) largest group will i=2 2−i) i=2 2−n), and have 2−(n+1)N members. While ranking parameters naturally vary from agent to agent within the communities, the average value of the ranking parameters of each group (cid:104)a(cid:105)n falls approxi- mately to the middle point of each ranking range due to the uniform distribution of the parameters: have ranking parameters between amax(1 −(cid:80)n+1 and amax(1 −(cid:80)i+2 (cid:104)a(cid:105)n = amax 1 − ( 2−i + 2−(n+1)) . (24) (cid:33) (cid:32) n+1(cid:88) i=2 9 From Figs. 3 and 6 we see that only a maximum of four to five of these communities exist in practice at any one time, so we limit our approximation to these groups. By assuming the groups to be fully connected, as they seem to be in the graphs, and approximating sums of the products of the degrees and ranking parameters with the products of their average values we get (cid:104)(k + 1)P(cid:105)+ ≈ 2 M 2 n , (25) 4(cid:88) n=1 (cid:16)(cid:104)a(cid:105)n − amax (cid:17) 2 where (cid:104)(cid:105)n denotes the average ranking parameter and Mn the number of members of the nth largest group. Substituting the values given in Table II we get (cid:104)(k + 1)P(cid:105)+ ≈ 0.05N 2amax, which in turn can be inserted into (23): (ki + 1)Pi > 0.05N 2amax. (26) (27) Finally, using the definition of Pi the condition (27) can be written in the form αi > 1 2 + 0.05 N ki + 1 , (28) where αi = ai/amax. From condition (28) we can see that the probability of agent i following the conventional wisdom diminishes with rising N and decreasing ki, which is what we saw happening in our simulations judging from the results shown in the previous Section. To take an example, for the N = 500 case the largest community of agents with positive ranking pressures comprises of about 125 agents. This means, according to the inequality (28), that the agents with αi > 0.7 could definitively be expected to always choose to have positive opinion variables. From Fig. 3 we can tell that the real threshold is closer to αi > 0.8, which is, however, in remarkably good agree- ment with the approximate value of 0.7 when one takes into the consideration the fact that the appearance of the contrarians themselves was not taken into account in the derivation of (28), and that for N = 500 they are al- ready very prominent. If one were to derive the condition equivalent to (28) with contrarian strategies taken into account, one would need to consider the effect that the contrarians have on their neighbours' total social value V . Thus, condition (28) will most likely not hold for networks with larger N . The last question we need to address as regards to the contrarians is the fact that they are often embed- ded in the groups of normal agents. So why would it be status-wise beneficial for an agent using normal strategy to retain, let alone form, a link with a contrarian agent? Let us consider a situation where an agent pursues con- trarian strategies in a group of normal agents. Returning to inequality (15), we see that it is acceptable for a nor- mal agent i with Pi > 0 and maximal xi = xmax to form 10 a link with a contrarian agent j with Pj > 0 and minimal xj = −xmax if VI. DISCUSSION > −kj Pi Pj (29) and we assume that all the neighbours of agents i and j also have the maximal opinion parameters. The striking fact about this relation is that it is always fulfilled in this case, meaning that i would always find formation of links with contrarians acceptable. From the point of view of agent j, however, linking to i is only acceptable if Pj Pi > 1 2 ki kj + 1/2 , (30) i.e. which leads to the very same result as before. j will not form a link with i unless Pj > Pi/2, if i and j are to belong to the same group. Thus the contrarian agents would behave and be treated as normal agents when forming relations, which is surprising considering that their contribution to the total social value of other agents is negative. The latter fact is demonstrated in the simulations with some of the most counterintuitive be- haviours of the model, namely, relations between agents being first broken and immediately reinstated. Let us use Eq. (11) to determine, whether the agent i from the previous calculations would benefit from cutting the link with agent j, even when expression (29) says that i would also form a link with j in the event that such a link did not exist. With the previously stated assumptions, we arrive to the following condition Pj Pi > − 1 kj − 1 (31) for the link to be cut. From (31) we see that unless kj = 0, agent i will cut its ties with the contrarians. Since kj (cid:29) 1 for the largest groups, the inequality (31) is likely to be true most of the time, leading to links be- tween agents i and j being cut and immediately reformed repeatedly, since inequality (29) also holds. As suggested above, we have observed this behavioural pattern in our simulations, and to some extent it can be observed in Fig. 2, in which it is seen that only the connections be- tween contrarian and normal agents i and j can the signs of xi and Pj being of opposite signs. It should again be stressed, however, that the calculations above do not take into account the existence of more than one contrarian. Having more contrarians in the system allows them to form links between each other, which has a sizeable ef- fect on the overall structure of the network. In summary, it could be said that while conditions (17) and (30) provide surprisingly well fitting approximations as to how a given agent chooses to link with other agents, the conditions (28), (29) and (31) (though pointing to the right direction) only give vague qualitative explanations for the behaviour of contrarians and can not be expected to yield precise numerical predictions. The interpretation of the ranking parameter ai serves as the key to find possible parallels between our model and the real world. As it describes a single property of an agent, the links between the agents only correspond to exchanges of opinion on whether the agents with larger ai are "better" than the agents with smaller ai, or vice versa. Agents could be considered as being embedded a larger social context, and in this context they could, in prin- ciple, have other social connections. In this case, the results presented in the previous Section are best in- terpreted in terms of echo chambers, which means that agents prefer such a social hierarchy in which they have better relative rank, and seek to communicate their opin- ion to others. The agents whose ranking parameters are further away from the average, are more vocal in broad- casting their views and gather supporters, since they rank highly in their chosen hierarchy and, therefore, would benefit from their hierarchy becoming more widely ac- cepted. On the other, the agents with average ranking param- eters are much more reluctant to take part in the conver- sation at all, since they do not rank highly in either of the hierarchies. Then the end result for small system sizes is that agents divide themselves according to their ranking pressure into two or more distinct communities support- ing opposing hierarchies, in which the agents with similar rankings lump together and refuse to communicate with those that disagree. It is the shutting out of the opposing point of view that makes this system's behaviour remi- niscent of echo chambers found in reality. However, with increasing system size the agents develop more nuanced positions on their preferred hierarchies due to mounting social competition, as is seen in the emergence of the contrarians. There is, however, an alternative way to interpret the ranking parameter. It could be taken to represent an ag- gregate of all the social properties of an agent, thereby representing its total standing in the societal status mea- sures. In this case the connections could represent the totality of the agents' social interactions, and the opin- ion variables the agents' attitude to the (current) state society at large. With this interpretation the rupture be- tween the different communities observed for smaller sys- tem sizes would actually represent a real disintegration of the society. This might have implications concerning early human migrations, as they could easily have been influenced by social pressures as well as material needs. If the environmental pressures define a minimum group size necessary for a comfortable life for a tribe, and this minimum is smaller than the limit at which the tribe is forced to be adopting more advanced strategies to en- hance social stability, as exemplified by the contrarians in our simulations, the tribe may well split, with splinter groups migrating elsewhere. Other than the different economic games, BTH can also shed some light into the well known paradox of value, also known as diamond-water paradox, which refers to the fact that diamonds are far more valued in monetary terms than water, even though water is necessary for life and diamonds not. From the BTH view point the so- lution to this paradox is obvious: Water, being neces- sary requirement for life, has to be available in sufficient quantities to all living humans, which means that owning water or its source does not set an individual apart from others, that is, an individual cannot really compare fa- vorably to others on grounds of having water. Diamonds, on the other hand, are relatively rare, and thus cannot be owned by everyone. Therefore, an individual possess- ing diamonds is compared favourably to others, and so diamonds acquire a relatively high value in comparison to water in the minds of humans, in a very similar man- ner with which the Veblen goods become valuable. Then BTH, in a sense, contains in itself a natural definition of value, although further work is needed to determine how exactly this status-value relates to other forms of value, such as value derived from usefulness or necessity. In Section II we only analysed the behaviour of the accepter, since this is straightforward in comparison to predicting the behaviour of the proposer. The experi- ments on the Ultimatum Game often find that the pro- posers tend to offer fair shares to accepters, which is eas- ily explained in the context of BTH by the desire of the proposer to have the proposal accepted: the proposers only offer shares that they would accept themselves, and in this way Eq.(3) also restricts the proposers offers, al- though it cannot tell the exact amount of money offered. To be able to give a better estimate for the offers one would need to study the learning processes that shape the proposers experience on how uneven treatment peo- ple are usually willing to tolerate. This is, however, out- side the scope of this paper. The behaviour of dictators in the dictator game [30] is somewhat more difficult to analyse using BTH. The dictator game is similar to the Ultimatum game, the only difference being that the other player does not even get to make a choice, and only receives what the first player, or dictator, endows. It has been observed that [24] in this game the dictators tend to be rather generous, which is difficult but not impossible to explain in the context of BTH, if one takes into account the effect of reputation and other "social goods". The nature of such influence on the behaviour of the dictator will be studied in a later work. However, there are some indications that BTH could very well be applied to the dictator game when all the social effects are taken into account. It has been reported [31] that when the rules of the dictator game are modified so that instead of giving money to the other players, the dictator gets to take some or all of the money given to the other players (thus turning the game into a "taking game"), the dictator's behaviour changes from egalitar- ian to self serving, i.e. taking often the majority or even all of the available money. From the BTH point of view, 11 the dictator's observed behaviour change can potentially be explained in terms of social norms. In the ordinary dictator game the dictator may still feel bound by the usual norms of the society, while in the "taking game" it is encouraged to go against these norms. This sets the "taker" apart from the other player in particular, and other members of the society in general. Hence the dic- tator feels "better" than the others when breaking the norms with impunity, and act on this feeling by taking money from the other players. The fact that BTH can possibly lead to formation of norms as well as rebellion against these norms is well worth of further studies. VII. CONCLUSIONS Relating to the known results of the Ultimatum game, we have formulated a hypothesis explaining the observed behaviour of humans in terms of superiority maximiza- tion, or "better than"-hypothesis, and presented a sim- ple agent-based model to implement this hypothesis. The model describes agents with constant ranking parameters and raises the question whether the agents with larger ranks are "better" than agents with smaller ranks or the other way around. We have found that the social system produced by our model, features homophily, meaning that agents form- ing social ties with other agents with similar ranking pa- rameters, and assortativity, describing the tendency of highly/lowly connected agents forming links with other highly/lowly connected agents. In addition we find com- munity formation, both in terms of there being commu- nities with opposing opinions and in terms of the commu- nities with the same opinion fracturing into smaller ones according to their ranking parameters. Furthermore, we have observed the formation of a hierarchy, in the sense of a connectivity hierarchy being formed on top of the one defined by the ranking parameters, with the agents with extreme ranking parameters presenting higher connectiv- ity than the agents with average ranking parameters. Moreover, we have found that the resulting social net- works tend to be disconnected for small system sizes, but mostly connected for larger system sizes. This fact may have some relevance for research of early human migra- tions, hinting of the effects of social pressure in shaping the social network. Acknowledgments J.E.S. acknowledges financial support from Niilo He- lander's foundation, G.I. acknowledges a Visiting Fellow- ship from the Aalto Science Institute, and K.K. acknowl- edges financial support by the Academy of Finland Re- search project (COSDYN) No. 276439 and EU HORI- ZON 2020 FET Open RIA project (IBSEN) No. 662725. R.A.B. wants to thank Aalto University for kind hospital- ity during the development of this work. RAB acknowl- edges financial support from Conacyt through project 799616. We acknowledge the computational resources provided by the Aalto Science-IT project. 12 [1] Adler, A. (1924) The Practice and Theory of Individual Psychology. Routledge, Trench and Trubner & Co, Ltd. [2] Veblen, T. (1899) The Theory of the Leisure Class. Macmillan. [3] Duesenberry, J. S. (1949) Income, savings, and the theory of consumer behaviour. Harvard University Press: Cambridge, Massachusetts. [4] Packard, V. (1959) The Status Seekers. LONGMANS, GREEN AND CO LTD6 & 7 CLIFFORD STREET, LONDON WI. [5] Eastman, J. K., Goldsmith, R. E. & Flynn, L. R. (1999) Status Consumption in Consumer Behaviour: Scale Development and Validation. Journal of Market- ing Theory and Practice, 7(3), 41 -- 51. [6] Weiss, Y. & Fershtman, C. (1998) Social status and economic performance: A survey. European Economic Review, 42, 801 -- 820. [7] Rege, M. (2008) Why do people care about social sta- tus?. Journal of Economic Behavior & Organization, 66, 233 -- 242. [8] Gaspart, F. & Seki, E. (2008) Cooperation, status seeking and competitive behaviour: theory and evidence. Journal of Economic Behavior & Organization, 51, 51 -- 77. [9] Sidanius, J. & Pratto, F. (1999) Social Dominance: An Intergroup Theory of Social Hierarchy and Oppres- sion. Cambridge University Press. [10] Guth, W., Schmittberger, R. & Schwarze, B. (1982) An Experimental Analysis of Ultimatum Bargain- ing. Journal of Economic Behavior & Organization, 3(4), 367 -- 388. [11] Fehr, E. & Schmidt, K. (1999) A theory of fairness, competition and cooperation. Quarterly Journal of Eco- nomics, 114(3), 817 -- 868. [12] Bolton, G. & Ockenfels, A. (2000) Erc: A theory of equity, reciprocity and competition. The American Eco- nomic Review, 90, 166 -- 193. [13] Luttmer, E. F. P. (2005) Neighbors as Negatives: Rel- ative Earnings and Well Being. Quarterly Journal of Eco- nomics, pp. 963 -- 1002. [14] Izuma, K., Saito, D. N. & Sadato, N. (2008) Pro- cessing of Social and Monetary Rewards in the Human Striatum. Neuron, 58(2), 284 -- 294. [15] Zink, C. F., Tong, Y., Chen, Q., Bassett, D. S., Stein, J. L. & Meyer-Lindenberg, A. (2008) Know Your Place: Neural Processing of Social Hierarchy in Hu- mans. Neuron, 58(2), 273 -- 283. [16] Axelrod, R. & Hamilton, W. D. (1981) The Evolu- tion of Cooperation. Science, 211, 1390 -- 1396. [17] Axelrod, R. (1981) An Evolutionary Approach to Norms. American Political Science Review, 80(4), 1095 -- 1111. [18] Young, H. P. (1993) The evolution of conventions. Econometrica, 61, 57 -- 84. [19] (1995) The economics of convention. The Jour- nal of Economic Perspectives, 10, 105 -- 122. [20] Centola, D., Willer, R. & Macy, M. (2005) The Emperor's Dilemma: A Computational Model of Self- Enforcing Norms. American Journal of Sociology, 10(4), 1009 -- 1040. [21] Fagundes, M. S., Ossowski, S., Cerquides, J. & Noriega, P. (2016) Design and evaluation of norm- aware agents based on Normative Markov Decision Pro- cesses. International Journal of Approximate Reasoning, 78, 33 -- 61. [22] Thaler, R. H. (1988) Anomalies: The Ultimatum Game. The Journal of Economic Perspectives, 2(4), 195 -- 206. [23] Guth, W. & Tietze, R. (1990) Ultimatum bargaining behavior: A survey and comparison of experimental re- sults. Jornal of Econonomic Psychology, 11(3), 417 -- 449. [24] J., H., Boyd, R., Bowles, S., Camerer, C., Fehr, E. & Gintis, H. (2004) Foundations of Human Sociality: Economic Experiments and Ethnographic Evidence from Fifteen Small-Scale Societies. Oxford University Press. [25] Oosterbeek, H., Sloof, R. & van de Kuilen, G. (2004) Cultural Differences in Ultimatum Game Exper- iments: Evidence from a Meta-Analysis. Experimental Economics, 7(2), 171 -- 188. [26] Forsythe, R., Horowitz, J., Savin, N. E. & Sefton, M. (1994) Fairness in Simple Bargaining Experiments. Games and Economic Behavior, 6, 347 -- 369. [27] Bolton, G. E. & Zwick, R. (1995) Anonymity versus punishments in ultimatum bargaining. Games and Eco- nomic Behavior, 10(1), 95 -- 121. [28] Iniguez, G., Kert´esz, J., Kaski, K. K. & & Bar- rio, R. A. (2009) Opinion and community formation in coevolving networks. Physical Review E, 80, 066119. [29] Piraveenan, M., Prokopenko, M. & Zomaya, A. Y. (2008) Local assortativeness in scale-free networks. Eu- rophysics Letters, 84(2), 28002. [30] Kahneman, D., Knetsch, J. L. & Thaler, R. H. (1986) Fairness and the Assumptions of Economics. The Journal of Business, 59(4), 285 -- 300. [31] List, J. A. (2007) On the Interpretation of Giving in Dictator Games. Journal of Political Economy, 115(3), 482 -- 493.
1905.08085
5
1905
2019-11-28T03:39:46
Arena: A General Evaluation Platform and Building Toolkit for Multi-Agent Intelligence
[ "cs.MA", "cs.AI" ]
Learning agents that are not only capable of taking tests, but also innovating is becoming a hot topic in AI. One of the most promising paths towards this vision is multi-agent learning, where agents act as the environment for each other, and improving each agent means proposing new problems for others. However, existing evaluation platforms are either not compatible with multi-agent settings, or limited to a specific game. That is, there is not yet a general evaluation platform for research on multi-agent intelligence. To this end, we introduce Arena, a general evaluation platform for multi-agent intelligence with 35 games of diverse logics and representations. Furthermore, multi-agent intelligence is still at the stage where many problems remain unexplored. Therefore, we provide a building toolkit for researchers to easily invent and build novel multi-agent problems from the provided game set based on a GUI-configurable social tree and five basic multi-agent reward schemes. Finally, we provide Python implementations of five state-of-the-art deep multi-agent reinforcement learning baselines. Along with the baseline implementations, we release a set of 100 best agents/teams that we can train with different training schemes for each game, as the base for evaluating agents with population performance. As such, the research community can perform comparisons under a stable and uniform standard. All the implementations and accompanied tutorials have been open-sourced for the community at https://sites.google.com/view/arena-unity/.
cs.MA
cs
Arena: A General Evaluation Platform and Building Toolkit for Multi-Agent Intelligence Yuhang Song,1 Andrzej Wojcicki,3 Thomas Lukasiewicz,1 Jianyi Wang,4 Abi Aryan,5 Zhenghua Xu,1,2∗ Mai Xu,4 Zihan Ding,6 Lianlong Wu1 1Department of Computer Science, University of Oxford, United Kingdom 2State Key Laboratory of Reliability and Intelligence of Electrical Equipment, Hebei University of Technology, China 3Lighthouse, 4School of Electronic and Information Engineering, Beihang University, China 5University of California, Los Angeles, United States, 6Imperial College London, United Kingdom {yuhang.song,thomas.lukasiewicz}@cs.ox.ac.uk, [email protected], [email protected] Abstract Learning agents that are not only capable of taking tests, but also innovating is becoming a hot topic in AI. One of the most promising paths towards this vision is multi-agent learning, where agents act as the environment for each other, and im- proving each agent means proposing new problems for others. However, existing evaluation platforms are either not compat- ible with multi-agent settings, or limited to a specific game. That is, there is not yet a general evaluation platform for re- search on multi-agent intelligence. To this end, we introduce Arena, a general evaluation platform for multi-agent intel- ligence with 35 games of diverse logics and representations. Furthermore, multi-agent intelligence is still at the stage where many problems remain unexplored. Therefore, we provide a building toolkit for researchers to easily invent and build novel multi-agent problems from the provided game set based on a GUI-configurable social tree and five basic multi-agent re- ward schemes. Finally, we provide Python implementations of five state-of-the-art deep multi-agent reinforcement learn- ing baselines. Along with the baseline implementations, we release a set of 100 best agents/teams that we can train with different training schemes for each game, as the base for eval- uating agents with population performance. As such, the re- search community can perform comparisons under a stable and uniform standard. All the implementations and accompa- nied tutorials have been open-sourced for the community at https://sites.google.com/view/arena-unity/. Introduction Modern learning algorithms are more of outstanding test- takers, but less of innovators, i.e., the ceiling of an agent's intelligence may be limited by the complexity of its environ- ment (Leibo et al. 2019). Thus, the emergence of innovation is becoming a hot topic for AI. One of the most promising paths towards such a vision is learning via social interaction, i.e., multi-agent learning. In multi-agent learning, how the agents should beat the opponents or collaborate with each other is not defined or limited by the creator of the environ- ment, e.g., the inventor of the ancient Go never defines what strategies are good. However, enormous and sophisticated ∗Corresponding author: Zhenghua Xu. Copyright c(cid:13) 2020, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. strategies are invented while a population of human play- ers/artificial agents evolves by improving themselves over the others, i.e., each agent is acting as an environment for the others and improving itself means proposing new problems for the others. To study a new class of intelligence, general evaluation platforms with diverse games are milestones that push for- ward the research to the next levels. For example, ALE (Bellemare et al. 2013), Mujoco (Todorov, Erez, and Tassa 2012), and DM-Suite (Tassa et al. 2018) are the most spread general evaluation platforms that greatly acceler- ate the research in general reinforcement learning. How- ever, there is no such general evaluation platform for multi- agent intelligence. Although some platforms support multi- agent settings (Wydmuch, Kempka, and Ja´skowski 2018; Vinyals et al. 2017), they are not general evaluation plat- forms, i.e., built for specific games. Thus, in this paper, we propose the first general evaluation platform for multi-agent intelligence, called Arena, containing 35 multi-agent games in total, with diverse logics and representations; see Fig. 1. Apart from training and evaluation, multi-agent intelli- gence research is still at a stage where many problems remain undiscovered or unexplored. Thus, the second contribution of Arena is a building toolkit for multi-agent intelligence, enabling the easy creation of different multi-agent scenarios. For example, in the sample game in Fig. 2 (a), after defining the basic behavior of the agent (i.e., moving and turning) and the "alive" state of the agent (i.e., it stays on the playground), it can be extended to different multi-agent scenarios with minimal effort. For example, (1) five players fight each other until only one agent is left alive (see Fig. 2 (b)), or (2) 5 2 players form 2 teams, and each agent fights for its own team until all players in a team are dead (see Fig. 2 (c)), or (3) multiple players form multiple teams in hierarchies, where the collaboration and competition relationships between the teams are customized (see Fig. 3). Thus, Arena is not just a research platform for the evalua- tion with a fixed set of games, but also a building toolkit for researchers to invent and build novel multi-agent problems. To achieve the above vision of building a toolkit for multi- agent intelligence, (1) we provide a GUI-configurable tree that defines the social structure of agents, called social tree; Figure 1: Game set of Arena. and (2) based on the social tree, we propose 5 basic multi- agent reward schemes (BMaRSs), which define different social paradigms at each node in the social tree. Specifically, each BMaRS is a restriction applied to the reward function, so it corresponds to a batch of reward functions that can lead to a specific social paradigm. For each BMaRS, Arena provides multiple ready-to-use reward functions, simplifying the con- struction of games with complex social relationships. Further- more, if the agent is controlling each joint of a robot, it has long been a burden for researchers that low-level intelligence (such as the basic skill of moving) must first be built, before they can study high-level multi-agent intelligence (Heess et al. 2017). Thus, Arena provides many ready-to-use dense reward functions in each BMaRS that handle such low-level intelligence. Additionally, Arena also offers a verification option for customized reward functions, so the researchers can make sure that the programmed reward functions lie in one of the BMaRSs that produces a specific social paradigm. Thus, with the above efforts towards a building toolkit for multi-agent intelligence and the provided set of 35 games for a general evaluation platform, one can easily customize a set of games of a new social paradigm to study a yet unexplored problem. Finally, we provide Python implementations of several state-of-the-art deep multi-agent reinforcement learning base- lines, which can be used as starting points for the develop- ment of novel multi-agent algorithms, as well as the valida- tion of new environments. Along with the baseline imple- mentations, we also release a set of 100 best agents/teams that we can train with different training schemes for each game, as the base for evaluating agents with population per- formance (Balduzzi et al. 2019; Balduzzi et al. 2018). So, the research community can perform comparisons under a stable and uniform standard. To summarize, this paper's contributions are as follows: (1) a general evaluation platform for multi-agent intelligence with a set of diverse games, most of which are new to the community or still stand as a challenge for state-of-the-art algorithms, (2) a building toolkit for multi-agent games, en- abling the easy creation of new social paradigms based on GUI-configurable social trees and BMaRSs, (3) the baseline implementations of 5 state-of-the-art multi-agent algorithms for both competitive and collaborative settings, and (4) sets of benchmark agents/teams for the community to conduct stable and uniform population evaluation (Balduzzi et al. 2018). Code for games, building toolkit, and baselines, as well as all corresponding tutorials have been released online at https://sites.google.com/view/arena-unity/. The Platform State-of-the-Art Engine. The engine behind Arena is the world-leading game engine Unity (Juliani et al. 2018), which provides Arena with several desirable features on render- ing, physics, customizability, and community. There are also other choices of popular engines. Some platforms con- tain a wide set of diverse games (Bellemare et al. 2013; Nichol et al. 2018; Perez-Liebana et al. 2016; OpenAI 2016). However, they are designed mostly for single-agent scenarios and are extremely hard to customize (adding multiple players or creating new games), since the games are provided as com- piled binary ROMs. Other downsides of these choices include deterministic environments, unrealistic rendering, and unreal- istic physics. Other platforms (Todorov, Erez, and Tassa 2012; Tassa et al. 2018) are, in nature, more physics engines than game engines, which lack a visual editor for eas- ily creating customized games, and cannot handle more "game-like" features, such as instantiating and destroying objects in real-time during the simulation. The rest of the platforms are limited in the sense that they are built for specific tasks, such as for first-person shooting (Wyd- AirHockeyBilliardsBlowBlowBoomerCrawlerPushCrossroadsOffTheGroundFighterKickBoxingMiniPUBG-VillageMiniPUBG-WindridgeMiniPUBG-ForestMiniPUBG-FloodedGroundMiniPUBG-SunTemplePingPongRealRace-LakesRealRace-NightBattleCity-FPRealRace-DriftFightForFoodSoccersBattleCity-TPTennisPushBoxDestroyPyramidTransportBricks RunToGoalYouShallNotPassSumoPushBallTowerDefenseLiftBallReacherGoBangCaptureFlagRunner Figure 2: Game examples of the extensible multi-agent platform. much, Kempka, and Ja´skowski 2018), Real-Time Strategy (RTS) (Tian et al. 2017), vision understanding (Qiu et al. 2017), in-door scene understanding (Handa et al. 2016; Brodeur et al. 2017; Savva et al. 2017; Chang et al. 2017; Puig et al. 2018; Gao et al. 2019), surviving (Suarez et al. 2019), and interaction (Wu et al. 2018; Savva et al. 2019; Kolve et al. 2017), or specific games, such as Starcraft (Vinyals et al. 2017) and Dota2 (OpenAI 2018). Thus, creat- ing a general evaluation platform on these engines is not a reasonable choice. DeepMind Lab (Beattie et al. 2016), Psy- chlab (Leibo et al. 2018), and Malmo (Johnson et al. 2016) are more appropriate choices when building a customizable general evaluation platform. However, the main drawbacks of the above engines are tied to their dated nature. The render- ing system of these engines are either low-polygon pixelated (Malmo, based on Minecraft) or outdated (DeepMind Lab and Psychlab, based on Quake III). The physics systems of these engines are either rudimentary (Malmo), or have a gap (Juliani et al. 2018) to the physical world (DeepMind Lab and Psychlab). Besides, they are all incompatible with a vi- sual editor, making it quite cumbersome to build customized scenarios. To summarize, built on Unity, Arena has the following advantages over other platforms: (1) realistic rendering, so that features, such as complex lighting, textures, and shaders, are fully handled by the background engine and easily pro- duced in a customized game, (2) realistic physics, so that enough and realistic stochasticity is introduced in the game and transferring a policy learned within a simulator to the real world is easier, (3) user-friendly visual editor, so that building new multi-agent scenarios in Arena is easy, and (4) a large and active development community, so that creating new games is easy with millions of off-the-shelf assets. Game Sets Towards General Intelligence. The first con- tribution of Arena is to provide a set of multi-agent games with diverse game logics and representations, so that it may push forward the research of general multi-agent intelligence. Specifically, Arena provides: (1) 27 new games that are not yet studied in the community, (2) 8 games, of which the ba- sic logics are inspired by other research, but equipped with realistic rendering effects, physics engine, and all features described in the following two paragraphs, such as extensibil- ity to other social paradigms, and (3) interface to the popular stand-alone domain StarCraft. The game set is shown in Fig. 1. For more detailed information, see Tables 2-7 in the ex- tended paper (Song et al. 2019). Building Toolkit for Multi-Agent Environments. As the second contribution, we provide a building toolkit for multi- agent environments: we provide (1) a GUI-configurable so- cial tree that defines how agents are grouped together with each other, and (2) 5 basic multi-agent reward schemes (BMaRSs) applied on each node in the social tree, so that different social relationships can be easily built and verified, and low-level intelligence (like motor skills) can be handled. Other Features. Learning to communicate is an important research area in multi-agent intelligence (Das et al. 2017; Mordatch and Abbeel 2018). Thus, Arena provides a broad- cast board at each node of the social tree (accessible for any agent as a child of the node), which enables the study of learn- ing communication at each level. Also, global states may be used in research for different purposes (Lowe et al. 2017; Gupta, Egorov, and Kochenderfer 2017; Foerster et al. 2017; Foerster et al. 2018). Thus, Arena provides the option to broadcast it to all agents. Besides, a top-down view of the global game is often appreciated for visualizing population behavior (Johnson et al. 2016; Wydmuch, Kempka, and Ja´skowski 2018; Jaderberg et al. 2018; Liu et al. 2019). Thus, Arena by default enables this option. Finally, there is a neces- sity for competitive agents to evaluate against human players, and also a research trend for collaborative agents to team up with human players. Thus, Arena provides a gaming interface for humans, so that a human player can take the place of any agent in the game. Basic Multi-Agent Reward Schemes and Social Trees Preliminaries. We consider a Markov game as defined in (Littman 1994), consisting of multiple agents x P X , a fi- nite global state space S, a finite action space Ax for each Ś(cid:32) ( agent x, and a bounded-step reward space rx,t P R for each ` agent x. The environment consists of a transition function Ś(cid:32) ( Ax : x P X Ñ S, which is a stochastic function g : S ` st`1 „ g st,pax,tqxPX , a reward function for each agent fx : S Ax : x P X Ñ R, which is a deterministic st,pax,tqxPX function rx,t`1 " fx , a joint reward function f " pfxqxPX , and episode reward Rf x " t"1 rx,t for each agent x under the joint reward function f. For the agent, we consider that it observes sx,t P Sx, where Sx consists of a part of the information from the global state space S. Thus, we have a policy πx : Sx Ñ Ax, which is a stochastic func- tion ax,t „ πxpsx,tq. Besides, we consider that the agent x can take a policy πx from a set of policies Πx and assume that the random seed of all sampling operations is k, which is sampled from the whole seed space K. We investigate the effect of tx : x P Xu and tπx : πx P ř T (c)5 VS 5(a)(b)Action SpacePlayground1 VS 1 VS 1 VS 1 VS 1Single agent x : x P Xu. By applying different restrictions on Πxu on tRf the effect, we have different BMaRSs, each one of which is a set of joint reward functions F " tf : u that produce a similar effect on the population X . The term reward scheme first appears in (Tampuu et al. 2017) as a tabular, which is applied to a special case of Pong. While we define it in a general form and show that many examples are special cases within this general form. In a non-sequential setting (normal-form game), the re- ward scheme serves a similar purpose as the payoff matrix (Myerson 2013), which is also represented as a tabular. See Lemma 2 in the extended paper (Song et al. 2019) for how the payoff matrix is aligned with BMaRSs. In the following, we define 5 different BMaRSs. Along defining these BMaRSs, we also describe the ready-to-use reward functions f within these BMaRSs, which is provided by Arena as a dropdown list. Non-learnable BMaRSs (F N L) are a set of joint reward functions f as follows: (cid:32) ( f : @k P K,@x P X ,@πx P Πx, x {Bπx " 0 , BRf F N L " (1) , (2) F IS " BRf xBπx1 @x1 P Xztxu,@πx P Πx,@πx1 P Πx1 , where 0 is a zero matrix of the same size and shape as the parameter space that defines πx. Intuitively, F N L means that x for any agent x P X cannot be optimized by improving Rf its policy πx. Isolated BMaRSs (F IS) are a set of joint reward functions f as follows: (cid:32) ( f : f R F N L and @k P K,@x P X , " 0 Intuitively, F IS means that the episode reward Rf x received by any agent x P X is not related to any policy πx1 taken by any other agent x1 P Xztxu. Reward functions fx in f of F IS are often called internal reward functions in other multi-agent approaches (Hendtlass 2004; Jaderberg et al. 2018; Bansal et al. 2018), meaning that apart from the reward functions applied at a population level (such as win/loss), which are too sparse to learn, there are also reward functions directing the learning process to- wards receiving the population-level rewards, but are more frequently available, i.e., more dense (Heess et al. 2017). F IS is especially practical if the agent is a robot requiring continuous control of applying force on each of its joints, which means basic motor skills (such as moving) need to be learned before generating population-level intelligence. Thus, we provide f in F IS of energy cost, punishment of applying a big force, encouragement of keeping a steady velocity, and moving distance towards target. Competitive BMaRSs (F CP ), Daskalakis 2011), are defined as F CP " (cid:32) ( f : f R F N L Y F IS and @k P K,@x P X , " 0 @πx P Πx,@πx1 P Πx1 , inspired by (Cai and x1dx1 ş (3) B , x1PX Rf Bπx which intuitively means that for any agent x P X , taking any possible policy πx P Πx, the sum of the episode reward of all agents will not change. If the episode length is 1, it expresses a classic multi-player zero-sum game (Cai and Daskalakis 2011). Useful examples of f within F CP are: (1) agents fight for a limited amount of resources that are always exhausted at the end of the episode, and the agent is rewarded for the amount of resources that it gained, and (2) fight till death, and the reward is given based on the order of death (the reward can also be based on the reversed order, so that the one departing the game first receives the highest reward, such as in some poker games, the one who first discards all cards wins). Rock, Paper, and Scissors in normal-form game (Myerson 2013) and Cyclic Game in (Balduzzi et al. 2019) are both special cases of F CP ; see Lemmas 2 and 3 in the extended paper (Song et al. 2019). Collaborative BMaRSs (F CL), Daskalakis 2011), are defined as F CL " (cid:32) ( f : f R F N L Y F IS and @k P K,@x P X , ě 0 @x1 P Xztxu,@πx P Πx,@πx1 P Πx1, inspired by (Cai and (4) , BRf x1 BRf x x1 {BRf x1 {BRf which, intuitively, means that there is no conflict of interest x ă 0) for any pair of agents px1, xq. Besides, (BRf since f R F N L Y F IS, there is at least one pair of agents x ą 0. This indicates that this px, x1q that makes BRf pair of agents shares a common interest, so that improving x1 for agent x1. The most x for agent x means improving Rf Rf common example of f within F CL is that fx for all x P X is identical, such as the moving distance of an object that can be pushed forward by the joint effort of multiple agents, or the alive duration of the population (as long as there is at least one agent alive in the population, the population is alive). Thus, we provide f in F CL: living time of the team (both positive and negative, since some games require the team to survive as long as possible, while other games require the team to depart as early as possible, such as poker). Competitive and Collaborative Mixed BMaRSs (F CC) ş are defined as a catch-all for any other than the above four ones. First, the term B x1dx1 {Bπx " 0 in (3) can be xdx1 " 0 (see Lemma 1 in ex- x1PX BRf written as tended paper (Song et al. 2019), which makes an alternative (3). Considering F CP in this alternative (3) and F CL in (4), an intuitive explanation of F CC is that there exist circum- ş stances when BRf x ă 0, meaning that the agents are x1 {BRf competitive at this point. But the derivative of total interest x1 {BRf x1PX BRf xdx1 is not always 0; thus, the total interest can be maximized with specific policies, meaning that the agents are collaborative at this point. ş x1 {BRf x1PX Rf Apart from providing several practical f in each BMaRS, we also provide a verification option for each BMaRS, mean- ing that one can customize an f and use this verification option to make sure that the programmed f lies in a specific BMaRS. The implementation of verification option can be found in Section 1 in the extended paper (Song et al. 2019). The Social Tree. The BMaRSs defined above apply to an Figure 3: An example of a social tree and BMaRSs applied on it. agent group of all sizes. To define more complex and struc- tured social paradigms, we use a tree structure (social tree) to organize the agents and apply BMaRSs on each node of the tree. We illustrate this by an example. The GUI interface in Fig. 3 (a) defines a tree structure in Fig. 3 (b), representing a population of 4 agents. The tree structure can be easily reconfigured by dragging, duplicating, or deleting nodes in the GUI interface in Fig. 3 (a). In this example, each agent has an agent-level BMaRS. The agent is a robot ant, so that the agent-level BMaRSs are F IS, specifically, the option of ant-motion that directs the learning towards basic motion skills such as moving forward, as shown in Fig. 3 (c). Each two agents form a team (which is a set of agents or teams), the two agents have team-level BMaRSs. In this example, the two robot ants collaborate with each other to push a box forward, as shown in Fig. 3 (d). Thus, the team-level BMaRSs are F CL, specifically, the moving distance of the box. On the two teams, we have global-level BMaRSs. In this example, the two teams are set to have a match regarding which team pushes its box to the target point first, as shown in Fig. 3 (e). Thus, the global-level BMaRSs are F CP , specifically, the ranking of the box reaching the target. The final reward function applied to each agent is a weighted sum of the above three BMaRSs at three levels. One can imagine defining a social tree of more than three levels, where small teams form bigger teams, and BMaRSs are defined at each node to give more complex and structured social problems. After defining the social tree and applying BMaRSs on each node, the environment is ready for use with an abstraction layer handling everything else, such as assigning viewports to each agent in the window, applying the team color, displaying the agent ID, and generating a top-down view. The Learning Agents The Baselines. We provide Python implementations of sev- eral state-of-the-art baselines that can be used as starting points for the development of novel multi-agent algorithms, as well as for the validation of new environments. Specifically, we first implement a fully decentralized system, where each agent is a self-contained PPO (Schulman et al. 2017), with in- dependent critic, actor, and optimizer. We also implement two state-of-the-art methods based on self-play in (OpenAI 2018) (SP) and population-based training in (Jaderberg et al. 2018; DeepMind 2019) (PB). For collaborative agents, we imple- ment two state of the arts: centralized critic (Lowe et al. 2017) (CC) and centralized critic with a counterfactual baseline (Fo- erster et al. 2018) (CF). The Evaluation Metric. It is recently raising attention that evaluating an agent against a single-agent or hand-coded bot is unstable and misleading (Balduzzi et al. 2018). Thus, the population performance is introduced to evaluate an agent's (or an agent group's) performance among a base population. To enable population evaluation, we release 100 best agents, which we can train with different training schemes for each game as the base population. One can call the provided func- tion to get the ranking of an agent among the base population, or get the averaged ranking of a population among the base population. Moreover, we provide a human ranking among the base population, which provides an indication of human- level intelligence in the game. We will accept the submission of agents from the community as well as keep implementing algorithms introduced in the future, so that the base popula- tion will be upgraded, as the level of research in multi-agent intelligence advances. Experiments Experiments are conducted from three aspects. First, we eval- uate our game set from the perspective of stochasticity, realis- tic rendering, and simulation speed, all of which are presented in the extended paper (Song et al. 2019) due to page limit. Other advantages from the Unity engine have been verified by (Juliani et al. 2018). Second, we evaluate our design of the extensible multi-agent building toolkit with a case study, showing that by applying different social trees and BMaRSs, different population-level strategies can be learned. Third, we report the experimental results of 5 baselines that we im- plemented and show that by using the provided population performance evaluation metric, the training progress can be visualized in a less noisy and more analyzable way. Case Study of Social Tree and BMaRSs. We use the game Crossroads from Arena to study the effectiveness of the pro- posed social tree and BMaRSs via designing different social paradigms. Specifically, in the game Crossroads shown in Fig. 5 (a), the agent can move and turn, the final goal of the agent is to reach the target on the other side of the crossroad. By defining different social trees and applying different BMaRSs, as shown in Fig. 5 (b) to (d), the agents learn different strate- gies. In Fig. 5 (b), isolated BMaRSs (F IS) are applied to all agents, i.e., each agent minimizes the time that it takes to reach the target. The result shows that the learned agents simply rush forward, and they easily crash with each other at the center of the crossroad, producing a traffic jam. In Fig. 5 (c), collaborative BMaRSs (F CL) are applied to the parent Team-level(b)(c)(d)(e)Agent-levelGlobal-level(a) Figure 4: Visualizing training progress over episode reward (a,b) and population performance (c,d) of different baselines: D-PPO (Decentralized Proximal Policy Optimization), SP (Self-Play), PB (Population-Based training), CC (Centralized Critic), and CF (Counterfactual Baseline). with clear performance gaps. Related Work Surveys of multi-agent intelligence research can be found in (Hernandez-Leal, Kartal, and Taylor 2018). Different ideas have been explored on competitive and collaborative multi- agent settings. Collaborative Settings. The simplest way to deploy multi- agent collaborative systems is to make each agent have a completely independent learning process (fully decentral- ized) (Matignon, Laurent, and Le Fort-Piat 2012). However, collaborative behaviors are hardly observed under such fully decentralized setting; thus, a fully centralized system is uti- lized in (Peng et al. 2017), where the policy has access to the global state and is shared by all agents. However, it is imprac- tical, since the global state is mostly unavailable in practice, and the system does not support extending the number of agents. Thus, centralized training and decentralized execu- tion are gaining attention (Kraemer and Banerjee 2016). For multi-agent systems, this idea is mostly explored under actor- critic algorithms (Foerster et al. 2018). Other ideas include using a joint action-value function, (Lauer and Riedmiller 2004) addressing the variance problem by a large batch size (Bansal et al. 2018), and learning grounded cooperative com- munication protocols between agents (Foerster et al. 2016). Competitive Settings. Competitive multi-agent intelligence originally comes from computational game theory (Bowl- ing et al. 2015). Later on, deep multi-agent reinforcement learning (D-MARL) is preferred, due to its scalability, and as it achieves notable advances on two-player games, such as Poker and Go (Moravcík et al. 2017; Silver et al. 2017). Later, D-MARL was applied to more diverse prob- lems, such as high-dimensional video games (OpenAI 2018; DeepMind 2019) and those involving physics control (Bansal et al. 2018). When solving more practical problems, many issues have been raised, such as ensuring diversity amongst agents (Marivate 2015), avoiding overfitting to the policy of the opponents (Lanctot et al. 2017). Many ideas address such issues (Kleiman-Weiner et al. 2016). Following on D-MARL, a very promising recent direction is self-play (Tesauro 1995). Fictitious self-play (Heinrich and Silver 2016) first shows promising performance on the competitive game Leduc Poker. However, as the stability and parallelizability are improving with the invention of new reinforcement learning algorithms, state-of-the-art approaches adopt a simpler form of self-play (OpenAI 2018), which produces a superior-human intelli- gence on large video games, like Dota2. Another promising Figure 5: Case Study of Social Tree and BMaRSs. node of all agents, i.e., all agents are rewarded with the time that the last one of them takes to reach the target. The result shows that the agents learn to wait for each other to go across the crossroad, so that they can all get across as efficiently as possible. In Fig. 5 (d), collaborative BMaRSs (F CL) are applied on the parent node of every 4 agents (which form a team), and competitive BMaRSs (F CP ) are applied on the parent node of the two teams. Specifically speaking, each two agents in the same team are rewarded with the same reward, and the reward is 1 for the team that gets all of its agents to the target first, 0 for the other team. The results show that each team learns to block the road of the other team with one agent, so that the other agents in the team can get across undisturbed. Then, the agent that blocks the road leaves for the target, after all its teammates have reached the target. Baselines and Evaluation Metric. We compare 5 baselines on two games: (1) Crossroads in Fig. 5 (a) with the BMaRS settings of Fig. 5 (d) and (2) PushBox in Fig. 3 (e) with the BMaRS settings of Fig. 3 (b). The BMaRS settings of both games contain competitive as well as collaborative social relationships, i.e., multiple agents form collaborative teams, and teams compete with each other. Thus, we investigate SP and PB baselines at the level of teams competing with each other, as well as investigate CC and CF baselines at the level of agents collaborating with each other in a team. As can be seen, the curve of episode reward shown in Fig. 4 (a) and (b) is extremely noisy, as the environment is non-stationary with the strategy of other collaborators and/or competitors evolving during the training. However, in Fig. 4 (c) and (d), which is the curve of ranking in the released base population, i.e., population performance, all methods are comparable (a) Crossroads(b) PushBox(c) Crossroads(d) PushBoxEpisode RewardEpisode RewardPopulation PerformancePopulation Performance(b)(a)(c)(d) recent idea is population-based training, as adopted in Star- Craft (DeepMind 2019). Summary and Outlook This paper has introduced the first general evaluation plat- form for multi-agent intelligence research. Besides, with the efforts on a building toolkit of multi-agent environments, the platform also allows for easily building new multi-agent problems. Additionally, with the released implementations of several state-of-the-art baselines, researchers can start their adventure instantly. Finally, by releasing a base population, the community can conduct comparisons under a stable and uniform evaluation metric. Acknowledgments. This work was supported by the China Scholarship Council under the State Scholarship Fund, by the Graduate Travel and Special Project Grants from the Somerville College of the University of Oxford, by the Alan Turing Institute under the UK EPSRC grant EP/N510129/1, by the AXA Reseach Fund, by the National Natural Science Foundation of China under the grants 61906063, 61876013, and 61922009, by the Natural Science Foundation of Tianjin under the grant 19JCQNJC00400, by the "100 Talents Plan" of Hebei Province, and by the Yuanguang Scholar Fund of Hebei University of Technology. Experiments: Realistic Rendering, Simulation Speed and Stochasticity Realistic Rendering. Realistic rendering in games is gaining more consideration, as the research community is moving towards transferring the algorithms to real-world scenarios. Some of such platforms are (Brodeur et al. 2017; Qiu et al. 2017; Yan et al. 2018; Kolve et al. 2017; Wu et al. 2018). In Fig. 6, we report an objective comparison of the most realistic scenes provided in these works against those in our platform. The results show that our platform provides a realistic rendering effect at the same level as the best of them. Simulation Speed. Simulation speed and parallelism of an environment are two important factors for carrying out research. Thus, we compare our game Boomer in Fig. 7 (a) with MsPacman in Fig. 7 (b) from the most widely used general evaluation platform ALE (Bellemare et al. 2013), both of which run on our parallel implementation of the PPO (D-PPO) baseline on a server with 32 CPU threads. Then, we compare these two games, as they are of similar complexity. The result in Fig. 7 (c) shows that Arena allows for parallel implementations while maintaining a similar simulation speed as ALE (Bellemare et al. 2013) on games of similar complexity when the number of concurrent threads is below the number of CPU threads of the machine, i.e., smaller than 32. Stochasticity. According to (Jaderberg et al. 2018), having enough stochasticity is essential for researchers to verify that their algorithms are learning general knowledge instead of memorizing action sequences. Thus, we conduct a stochasticity study on the existing general evaluation platforms ALE (Bellemare et al. 2013), Retro (Nichol et al. 2018), GVG-AI (Perez-Liebana et al. 2016), Mujoco (Todorov, Erez, and Tassa 2012), and DM-Suite (Tassa et al. 2018) by running a fixed sequence of 1000 actions repeatedly 1000 times and investigating how many branches are produced (averaged over all games in the corresponding platform). Table 1 shows that our platform generates most stochasticity among them, measured by the number of branches that the environment produces when applying the same action sequence on it. This is accomplished by introducing stochasticity from the initial setup (e.g., a randomly generated map), the rendering effect (e.g., randomized light conditions and particle systems), and the physics system (e.g., randomized physics properties). How Verification for BMaRSs is Implemented Since the definitions of BMaRSs contain the statement of @, which requires enumerating over the entire space of some variables, we first set a hyper-parameter of N, denoting the number of samples that we will apply the verification operation to. If a statement Y of sample i P I holds true for all N samples from I, we approximately make the judgement that p@i P I, Yq is true. If a statement Y of sample i P I holds false for any one of N samples from I, we make the judgement that p@i P I, Yq is false. Thus, in the following, we describe how to make the judgment of whether a statement Y of sample i holds true or not. Non-learnable BMaRSs (F N L) are defined as: (cid:32) f : @k P K,@x P X ,@πx P Πx, ( " 0 , (5) F N L " x and denote it Rf x x. We denote it Rf x x1 1´Rf x1 2 x´π2 π1 Isolated BMaRSs (F IS) are defined as: BRf xBπx where 0 is a zero matrix of the same size and shape as the parameter space that defines πx. For each sample i, we first sample k P K, x P X ,tπx P ΠxuxPX randomly. Then, we first run one episode to get Rf 1, since it is from the first 2, since it is from the second episode. In the second episode, episode. We run the second episode to get Rf we keep the following variables the same as the first episode: k, tπxu for all x P Xztxu. In the second episode, we sample a different πx from that in the first episode. The πx in the first and second episode are denoted π1 x respectively. Then, we can compute one sample of BRf xBπx (cid:32) f : @k P K,@x P X ,@x1 P Xztxu,@πx P Πx,@πx1 P Πx1, (6) For each sample i, we first sample k P K, x P X , x1 P Xztxu,tπx P ΠxuxPX randomly. Then, we first run one episode to get 2, since it is x. We denote it Rf Rf from the second episode. In the second episode, we keep the following variables the same as the first episode: k, tπxu for all x x P Xztx1u. In the second episode, we sample a different πx1 from that in the first episode. The πx1 in the first and second episode are denoted π1 x1 and make the judgement whether BRf 1, since it is from the first episode. We run the second episode to get Rf and make the judgement whether BRf xBπx " 0 for sample i holds true. x and denote it Rf x ( " 0 BRf xBπx1 F IS " x1 and π2 " Rf x x and π2 . xBπx1 " 0 for sample i holds true. Competitive BMaRSs (F CP ) are defined as: xBπx1 " Rf x1 respectively. Then, we can compute one sample of BRf (cid:32) ( f : f R F N L Y F IS and @k P K,@x P X ,@πx P Πx,@πx1 P Πx1, " 0 1´Rf x1´π2 x1 dx1 ş x π1 B . x 2 x1PX Rf Bπx F CP " (7) Figure 6: Comparison of realistic rendering effect. (a) Boomer (Arena) (b) MsPacman (Atari) (c) Comparison of train Frames Per Second (FPS) under different numbers of concurrent threads. Figure 7: Comparison of simulation speed. Table 1: Comparison of the stochasticity of platforms. Platform ALE Retro GVG-AI Mujoco DM-Suite Arena 922.4 Branches 431.2 50.2 0.0 23.1 12.2 HoMEAI2-THORCHALETUnrealCVHouse3DArenaFPSNumber of Concurrent ThreadsNumber of CPU Threads ş ş BRf x1 BRf x ş 1 x1PX Rf x1 For each sample i, we first sample k P K, x P X ,tπx P ΠxuxPX randomly. Then, we first run one episode to get x1dx1. ş x1dx1 and denote it We denote it dx1, since it is from the second episode. In the second episode, we keep the following variables the same as the first x1PX Rf x1 episode: k, tπxu for all x P Xztxu and we sample a different πx from that in the first episode. The πx in the first and second dx1 episode are denoted π1 dx1, since it is from the first episode. We run the second episode to get x respectively. Then, we can compute one sample of x1PX Rf ş x1PX Rf x and π2 x1PX Rf x1PX Rf x1 dx1 " x1 1 x1 2 ş B 2 ş dx1´ x´π2 π1 x x1PX Rf Bπx ş B and make the judgement of whether Collaborative BMaRSs (F CL) are inspired by (Cai and Daskalakis 2011) and defined as, x1 dx1 x1PX Rf Bπx " 0 for sample i holds true. (cid:32) ( f : f R F N L Y F IS and @k P K,@x P X ,@x1 P Xztxu,@πx P Πx,@πx1 P Πx1, ě 0 . F CL " x For each sample i, we first sample k P K, x P X , x1 P Xztxu,tπx P ΠxuxPX randomly. Then, we first run one episode to get 1 and Rf x and Rf x1. We denote it Rf x and Rf x1 x 2, respectively, since it is from the second episode. In the second episode, we keep the following 2 and Rf Rf x1 and denote it Rf x1 variables the same as the first episode: k, tπxu for all x P Xztxu and we sample a different πx from that in the first episode. Then, we can compute one sample of ě 0 for sample i holds true. Competitive and Collaborative Mixed BMaRSs (F CC) are defined to be any situations other than the above four ones: 1, respectively, since it is from the first episode. We run the second episode to get Rf BRf x1 BRf BRf x1 BRf x1 1´Rf x1 2 2 and make the judgement whether 1´Rf Rf x " Rf (cid:32) f : f R F N L Y F IS Y F CP Y F CL (9) which means if a reward function f is verified to be not among above F N L, F IS, F CP or F CL, it is verified to be among F CC. Lemma 1 An equivalent expression of F CC " ( , x x x Proof of Lemma 1: Following the defination of F CP , since f R F N L, we have: ‰ 0. Dk P K,Dx P X ,Dπx P Πx, (8) (10) (11) (12) (13) (14) F CP " F CP " is: Thus, F CP equals to: F CP " " ş (cid:32) ( f : f R F N L Y F IS and @k P K,@x P X ,@πx P Πx,@πx1 P Πx1, " 0 (cid:32) ( f : f R F N L Y F IS and @k P K,@x P X ,@πx P Πx,@πx1 P Πx1, dx1 " 0 x1PX Rf Bπx x1dx1 ż B . BRf x1 BRf x x1PX BRf xBπx ż (cid:32) ( f : f R F N L Y F IS and @k P K,@x P X ,@πx P Πx,@πx1 P Πx1, " 0 (cid:32) ( f : f R F N L Y F IS and @k P K,@x P X ,@πx P Πx,@πx1 P Πx1, dx1 " 0 dx1 BπxBRf BRf x1 Bπx x1PX ż x , BRf x1 BRf x x1PX completing the proof. Lemma 2 Rock, Paper, and Scissors in normal-form game (Myerson 2013) is a special case of F CP , which is defined in (11). Player 1 Strategy 1: Rock Strategy 2: Paper Strategy 3: Scissors Strategy 1: Rock p0, 0q p1,´1q p´1, 1q Strategy 2: Paper Player 2 p´1, 1q p0, 0q p1,´1q Strategy 3: Scissors p1,´1q p´1, 1q p0, 0q Table 2: Payoff matrix of Rock, Paper, and Scissors. BRf x1 BRf x BRf x1 BRf x " 1´p´1q , we can verify that the payoff matrix satisfies the definition of F CP in (11). Proof of Lemma 2: The payoff matrix in a normal-form game (Myerson 2013) is a matrix aligning the tuple of tplayer, strategyu with the payoff received by each player. The reward scheme in a multi-agent learning context is a map aligning the tuple of tagent x, policy πxu to the episode reward Rf x received by the agent x. Thus, player is equivalent to agent, strategy is a special case of policy when the episode length is one, payoff is equivalent to episode reward Rf x when the episode length is one. Payoff matrix of Rock, Paper, and Scissors is shown in Table 2. By selecting any pair of cells in the payoff matrix, say p1,´1q and p´1, 1q, we can compute a p´1q´1. Thus, by enumerating over all possible pairs of cells in the payoff matrix to compute all Lemma 3 Symmetric zero-sum games and cyclic games in (Balduzzi et al. 2019) are a special case of F CP , which is defined in (11). Proof of Lemma 3: In (Balduzzi et al. 2019), W denotes a set of agents parameterized by the weights of a neural net. For instance, w P W and v P W are two agents of specific policies from the full policy set W . φpv, wq evaluates a pair of agents pw, vq (15) The higher φpv, wq, the better for agent v. They refer to φ ą 0, φ ă 0, and φ " 0 as wins, losses, and ties, respectively, for v. A game is defined as symmetric zero-sum game if: φ : W W Ñ R. @w P W,@v P W, φpv, wq " ´φpv, wq. A cyclic game is a symmetric zero-sum game. As can be seen, when the game is symmetric @x P X , Πx is the same and Πx " ΠX , (16) (17) (19) (20) W is equivalent to ΠX . When the game has only two players x1 and x2 tx1u " Xztx2u, (18) φ is equivalent to Rx1. Thus, v and w are equivalent to πx1 and πx2, respectively and the equivalent expression of symmetric zero-sum game in (16) is: The equivalent expression of (11) when there are only two players x1 x2, i.e., satisfying (18), is: F CP " @πx1 P ΠX ,@πx2 P ΠX , Rx1 " ´Rx2 . (cid:32) ( f : f R F N L Y F IS and @x1 P X ,tx2u " Xztx1u,@πx1 P ΠX ,@πx2 P ΠX , " ´1 . BRx1 BRx2 This shows that symmetric zero-sum games are a special case of F CP . Since cyclic games are symmetric zero-sum games, cyclic games are also a special case of F CP . Game Name Observation Action Space Description Crossroads-2T1P- v1. Visual; Continuous Discrete; / ArenaCrawlerMove- 2T1P-v1. Visual RAM; / Continuous; Get to the target at the other side of the crossroad. The game uses dense reward function of IS_Target at agent level (Reward- SchemeScale at this level is 1), and use reward function of CP_Ranking at global level (RewardSchemeScale at this level is 100). Get to the target in the middle. The game uses dense reward func- tion of IS_Target at agent level (RewardSchemeScale at this level is 1), specifically, it uses IsRewardMovingTowardsTarget and Is- PenaltyHeadDown, and use reward function of CP_Ranking at global level (RewardSchemeScale at this level is 100). AirHockey. Visual; Continuous Discrete; / See (Wiki Page). Billiards. Visual; Discrete; See (Wiki Page). BlowBlow. Visual; Continuous Discrete; / Stay on the playground, push the opponent off the playground using your body, or the particles blown from you. Boomer. Visual; Discrete; Inspired by (Wiki Page). PushBox. Visual; Continuous (forces at every joint of the robot ant); Push the box forward as a team, and try to push the box to the target point first. OffTheGround. Visual; Continuous Discrete; / Stay on the playground, push the opponent using your body and try to take advantages of the terrain. KickBoxing. Visual; Discrete; MiniPUBG- Village. Visual; Discrete; MiniPUBG- FloodedGround. Visual; Discrete; MiniPUBG- Windridge. MiniPUBG- SunTemple. Visual; Discrete; Visual; Discrete; Learn to use 18 different movements, such as Jab, Cross, Hook, Uppercut and etc. See (Wiki Page) for more information about the movements. Different movements cost different amount of energy. If the energy runs out, no movements can be made. Hitting different parts of the opponent's body results in different levels of harm. Thus, the agent is expected to learn to hit the soft part of the opponent's body with the hard part of its own body, meanwhile, try to keep a budget of the energy cost. (Wiki Page) for basic rules of PlayerUnknown's Battlegrounds (PUBG). In this map of Village, the agent is expected to learn to take various advantages of the buildings, grass and trees. See (Wiki Page) for basic rules of PlayerUnknown's Battlegrounds (PUBG). In this map of FloodedGround, the playground is rela- tively large, so this game is designed for agents to learn in a larger population and learn long term planning. See (Wiki Page) for basic rules of PlayerUnknown's Battlegrounds (PUBG). In this map of FloodedGround, there are both city areas and grass land areas. Thus, the agent is expected to learn the strategies of surviving between city and grassland areas. See (Wiki Page) for basic rules of PlayerUnknown's Battlegrounds (PUBG). In this map of SunTemple, there are mainly various build- ings. Thus, the agent is expected to learn to hide, fight and take the advantages of the buildings. PingPong. Visual; Continuous Discrete; / Adopt with full rules of standard table tennis, see (Wiki Page). RealRace-Lakes. Visual; Discrete; This track is general. RealRace-Sprint. Visual; Discrete; This track contains many long straight roads, where driving too fast will result in the car easily losing control. Thus, the agent is expected to learn to maintain the speed within a range that is high enough but safe and controllable at the same time. RealRace-Drift. Visual; Discrete; This track is designed for learning drafting. RealRace-Night. Visual; Discrete; Snake. Visual; Soccers. Visual; BattleCity-TP. Visual; Tennis. Visual; Continuous Discrete; Continuous Discrete; Continuous Discrete; Continuous Discrete; / / / / This scene is at night, so the agent is dealing with more complex night rendering conditions. Besides, this track contains lots of crossroads, where the agent needs to learn to recognize the road signs. Based on a classic video game, see (Wiki Page). If two players collide with each other, the one of smaller length will be killed. Adopted from (Liu et al. 2019). See (Wiki Page). This version of BettleCity is of third-person view. Adopted from Unity ML-Agents (Juliani et al. 2018). DestroyPyRAMid. TransportBricks. RunToGoal. YouShallNotPass. Sumo. Reacher. LiftBall. Visual RAM; Visual RAM; Visual RAM; Visual RAM; Visual RAM; Visual RAM; Visual RAM; / / / / / / / Continuous; The goal is to destroy the pyramid. Continuous; The task is to transport all bricks to the target point. Continuous; Adopted from (Bansal et al. 2018). Continuous; Adopted from (Bansal et al. 2018). Continuous; Adopted from (Bansal et al. 2018). Continuous; Reach the target first. Continuous; Collaborate to lift the ball. TowerDefense. Visual; Discrete; Adopted from (Tian et al. 2017). PushBall. GoBang. CaptureFlag. Visual RAM; Visual RAM; Visual RAM; / / / Continuous; Control the robot arm to push the ball to the base of the opponent. Discrete; See (Wiki Page). Discrete; Adopted from (Jaderberg et al. 2018). BattleCity-FP. Visual; Fighter. Visual; Continuous Discrete; Continuous Discrete; / / See (Wiki Page). This version of BettleCity is of first-person view. Take advantages of various bunkers and destroy the opponent. MiniPUBG-Forest. Visual; Discrete; See (Wiki Page) for basic rules of PlayerUnknown's Battlegrounds (PUBG). In this map of FloodedGround, there are mainly grass- lands. Thus, the agent is expected to learn the strategies of hiding and attacking. FightForFood. Visual; Continuous Discrete; / A simple game where agents fight for limited food. When the food is exhausted, the episode ends. Runner. Visual; Discrete; A simple game where agents fight for higher score. When there is a score reach the specified threshold, the episode ends. References [Balduzzi et al. 2018] Balduzzi, D.; Tuyls, K.; Perolat, J.; and Graepel, T. 2018. Re-evaluating evaluation. In NIPS. [Balduzzi et al. 2019] Balduzzi, D.; Garnelo, M.; Bachrach, Y.; Czarnecki, W. M.; Perolat, J.; Jaderberg, M.; and Graepel, T. 2019. Open-ended learning in symmetric zero-sum games. arXiv:1901.08106. [Bansal et al. 2018] Bansal, T.; Pachocki, J.; Sidor, S.; Sutskever, I.; and Mordatch, I. 2018. Emergent complexity via multi-agent competition. In ICLR. [Beattie et al. 2016] Beattie, C.; Leibo, J. Z.; Teplyashin, D.; Ward, T.; Wainwright, M.; Küttler, H.; Lefrancq, A.; Green, S.; Valdés, V.; Sadik, A.; et al. 2016. Deepmind lab. arXiv:1612.03801. [Bellemare et al. 2013] Bellemare, M. G.; Naddaf, Y.; Veness, J.; and Bowling, M. 2013. The Arcade learning environment: An evaluation platform for general agents. JAIR. [Bowling et al. 2015] Bowling, M.; Burch, N.; Johanson, M.; and Tammelin, O. 2015. Heads-up limit hold'em poker is solved. Science. [Brodeur et al. 2017] Brodeur, S.; Perez, E.; Anand, A.; Golemo, F.; Celotti, L.; Strub, F.; Rouat, J.; Larochelle, H.; and Courville, A. 2017. Home: A household multimodal environment. arXiv:1711.11017. [Cai and Daskalakis 2011] Cai, Y., and Daskalakis, C. 2011. On minmax theorems for multiplayer games. In SIAM. [Chang et al. 2017] Chang, A.; Dai, A.; Funkhouser, T.; Hal- ber, M.; Niessner, M.; Savva, M.; Song, S.; Zeng, A.; and Zhang, Y. 2017. Matterport3D: Learning from RGB-D data in indoor environments. arXiv:1709.06158. [Das et al. 2017] Das, A.; Kottur, S.; Moura, J. M.; Lee, S.; and Batra, D. 2017. Learning cooperative visual dialog agents with deep reinforcement learning. In ICCV. [DeepMind 2019] DeepMind. 2019. AlphaStar: Mastering the real-time strategy game StarCraft II. In DeepMind. [Foerster et al. 2016] Foerster, J.; Assael, I. A.; de Freitas, N.; and Whiteson, S. 2016. Learning to communicate with deep multi-agent reinforcement learning. In NIPS. [Foerster et al. 2017] Foerster, J.; Nardelli, N.; Farquhar, G.; Afouras, T.; Torr, P. H.; Kohli, P.; and Whiteson, S. 2017. Sta- bilising experience replay for deep multi-agent reinforcement learning. In ICML. [Foerster et al. 2018] Foerster, J. N.; Farquhar, G.; Afouras, T.; Nardelli, N.; and Whiteson, S. 2018. Counterfactual multi-agent policy gradients. In AAAI. [Gao et al. 2019] Gao, X.; Gong, R.; Shu, T.; Xie, X.; Wang, S.; and Zhu, S.-C. 2019. VRKitchen: An interactive 3D environment for learning real life cooking tasks. In ICML Workshop RL4RealLife. [Gupta, Egorov, and Kochenderfer 2017] Gupta, K.; Egorov, M.; and Kochenderfer, M. 2017. Cooperative multi-agent control using deep reinforcement learning. In AAMAS. [Handa et al. 2016] Handa, A.; Patraucean, V.; Stent, S.; and J. Cipolla, R. 2016. SceneNet: An annotated model generator for indoor scene understanding. In ICRA. [Heess et al. 2017] Heess, N.; Sriram, S.; Lemmon, J.; Merel, J.; Wayne, G.; Tassa, Y.; Erez, T.; Wang, Z.; Eslami, S.; Ried- miller, M.; et al. 2017. Emergence of locomotion behaviours in rich environments. arXiv:1707.02286. [Heinrich and Silver 2016] Heinrich, J., and Silver, D. 2016. Deep reinforcement learning from self-play in imperfect- information games. arXiv:1603.01121. [Hendtlass 2004] Hendtlass, T. 2004. An introduction to collective intelligence. In SAP. [Hernandez-Leal, Kartal, and Taylor 2018] Hernandez-Leal, P.; Kartal, B.; and Taylor, M. E. 2018. Is multiagent deep reinforcement learning the answer or the question? A brief survey. arXiv preprint arXiv:1810.05587. [Jaderberg et al. 2018] Jaderberg, M.; Czarnecki, W. M.; Dun- ning, I.; Marris, L.; Lever, G.; Castaneda, A. G.; Beattie, C.; Rabinowitz, N. C.; Morcos, A. S.; Ruderman, A.; et al. 2018. Human-level performance in first-person multiplayer games with population-based deep reinforcement learning. In CoRR. [Johnson et al. 2016] Johnson, M.; Hofmann, K.; Hutton, T.; and Bignell, D. 2016. The Malmo platform for artificial intelligence experimentation. In IJCAI. [Juliani et al. 2018] Juliani, A.; Berges, V.-P.; Vckay, E.; Gao, Y.; Henry, H.; Mattar, M.; and Lange, D. 2018. Unity: A general platform for intelligent agents. arXiv:1809.02627. [Kleiman-Weiner et al. 2016] Kleiman-Weiner, M.; Ho, M. K.; Austerweil, J. L.; Littman, M. L.; and Tenenbaum, J. B. 2016. Coordinate to cooperate or compete: abstract goals and joint intentions in social interaction. In CogSci. [Kolve et al. 2017] Kolve, E.; Mottaghi, R.; Gordon, D.; Zhu, Y.; Gupta, A.; and Farhadi, A. 2017. AI2-THOR: An interac- tive 3D environment for visual AI. arXiv:1712.05474. [Kraemer and Banerjee 2016] Kraemer, L., and Banerjee, B. 2016. Multi-agent reinforcement learning as a rehearsal for decentralized planning. Neurocomputing. [Lanctot et al. 2017] Lanctot, M.; Zambaldi, V.; Gruslys, A.; Lazaridou, A.; Tuyls, K.; Pérolat, J.; Silver, D.; and Graepel, T. 2017. A unified game-theoretic approach to multiagent reinforcement learning. In NIPS. [Lauer and Riedmiller 2004] Lauer, M., and Riedmiller, M. 2004. Reinforcement learning for stochastic cooperative multi-agent systems. In AAMAS. [Leibo et al. 2018] Leibo, J. Z.; d'Autume, C. d. M.; Zoran, D.; Amos, D.; Beattie, C.; Anderson, K.; Castañeda, A. G.; Sanchez, M.; Green, S.; Gruslys, A.; et al. 2018. Psychlab: A psychology laboratory for deep reinforcement learning agents. arXiv:1801.08116. [Leibo et al. 2019] Leibo, J. Z.; Hughes, E.; Lanctot, M.; and Graepel, T. 2019. Autocurricula and the emergence of inno- vation from social interaction: A manifesto for multi-agent intelligence research. arXiv:1903.00742. [Littman 1994] Littman, M. L. 1994. Markov games as a framework for multi-agent reinforcement learning. In ICML. [Schulman et al. 2017] Schulman, J.; Wolski, F.; Dhariwal, P.; Radford, A.; and Klimov, O. 2017. Proximal policy optimization algorithms. arXiv:1707.06347. [Silver et al. 2017] Silver, D.; Schrittwieser, J.; Simonyan, K.; Antonoglou, I.; Huang, A.; Guez, A.; Hubert, T.; Baker, L.; Lai, M.; Bolton, A.; et al. 2017. Mastering the game of Go without human knowledge. Nature. [Song et al. 2019] Song, Y.; Wang, J.; Lukasiewicz, T.; Xu, Z.; Xu, M.; Ding, Z.; and Wu, L. 2019. Arena: A gen- eral evaluation platform and building toolkit for multi-agent intelligence. arXiv preprint arXiv:1905.08085. [Suarez et al. 2019] Suarez, J.; Du, Y.; Isola, P.; and Mor- datch, I. 2019. Neural MMO: A massively multiagent game environment for training and evaluating intelligent agents. arXiv preprint arXiv:1903.00784. [Tampuu et al. 2017] Tampuu, A.; Matiisen, T.; Kodelja, D.; Kuzovkin, I.; Korjus, K.; Aru, J.; Aru, J.; and Vicente, R. 2017. Multiagent cooperation and competition with deep reinforcement learning. PloS one. [Tassa et al. 2018] Tassa, Y.; Doron, Y.; Muldal, A.; Erez, T.; Li, Y.; Casas, D. d. L.; Budden, D.; Abdolmaleki, A.; Merel, J.; Lefrancq, A.; et al. 2018. Deepmind control suite. arXiv:1801.00690. [Tesauro 1995] Tesauro, G. 1995. Temporal difference learn- ing and TD-Gammon. Communications of ACM. [Tian et al. 2017] Tian, Y.; Gong, Q.; Shang, W.; Wu, Y.; and Zitnick, C. L. 2017. Elf: An extensive, lightweight and flexible research platform for real-time strategy games. In NIPS. [Todorov, Erez, and Tassa 2012] Todorov, E.; Erez, T.; and Tassa, Y. 2012. MuJoCo: A physics engine for model-based control. In IROS. [Vinyals et al. 2017] Vinyals, O.; Ewalds, T.; Bartunov, S.; Georgiev, P.; Vezhnevets, A. S.; Yeo, M.; Makhzani, A.; Küttler, H.; Agapiou, J.; Schrittwieser, J.; et al. 2017. StarCraft II: A new challenge for reinforcement learning. arXiv:1708.04782. [Wu et al. 2018] Wu, Y.; Wu, Y.; Gkioxari, G.; and Tian, Y. 2018. Building generalizable agents with a realistic and rich 3D environment. arXiv:1801.02209. [Wydmuch, Kempka, and Ja´skowski 2018] Wydmuch, M.; Kempka, M.; and Ja´skowski, W. 2018. ViZDoom compe- titions: Playing doom from pixels. IEEE Transactions on Games. [Yan et al. 2018] Yan, C.; Misra, D.; Bennnett, A.; Walsman, A.; Bisk, Y.; and Artzi, Y. 2018. Chalet: Cornell house agent learning environment. arXiv:1801.07357. 2015. [Liu et al. 2019] Liu, S.; Lever, G.; Merel, J.; Tunyasuvu- nakool, S.; Heess, N.; and Graepel, T. 2019. Emergent coordination through competition. In ICLR. [Lowe et al. 2017] Lowe, R.; Wu, Y.; Tamar, A.; Harb, J.; Abbeel, O. P.; and Mordatch, I. 2017. Multi-agent actor- critic for mixed cooperative-competitive environments. In NIPS. Improved Em- [Marivate 2015] Marivate, V. N. pirical Methods in Reinforcement-Learning Evaluation. Ph.D. Dissertation, Rutgers University-Graduate School-New Brunswick. [Matignon, Laurent, and Le Fort-Piat 2012] Matignon, L.; Laurent, G. J.; and Le Fort-Piat, N. 2012. Independent reinforcement learners in cooperative Markov games: A survey regarding coordination problems. The Knowledge Engineering Review. [Moravcík et al. 2017] Moravcík, M.; Schmid, M.; Burch, N.; Lis`y, V.; Morrill, D.; Bard, N.; Davis, T.; Waugh, K.; Johan- son, M.; and Bowling, M. 2017. DeepStack: Expert-level artificial intelligence in heads-up no-limit poker. Science. [Mordatch and Abbeel 2018] Mordatch, I., and Abbeel, P. 2018. Emergence of grounded compositional language in multi-agent populations. In AAAI. [Myerson 2013] Myerson, R. B. 2013. Game theory. Harvard University Press. [Nichol et al. 2018] Nichol, A.; Pfau, V.; Hesse, C.; Klimov, O.; and Schulman, J. 2018. Gotta learn fast: A new bench- mark for generalization in RL. arXiv:1804.03720. [OpenAI 2016] OpenAI. https://github.com/openai/ universe. [OpenAI 2018] OpenAI. 2018. https://blog.openai.com/openai-five/. [Peng et al. 2017] Peng, P.; Yuan, Q.; Wen, Y.; Yang, Y.; Tang, Z.; Long, H.; and Wang, J. 2017. Multiagent bidirectionally- coordinated nets for learning to play StarCraft combat games. arXiv:1703.10069. [Perez-Liebana et al. 2016] Perez-Liebana, D.; Samothrakis, S.; Togelius, J.; Schaul, T.; and Lucas, S. M. 2016. General video game AI: Competition, challenges and opportunities. In AAAI. [Puig et al. 2018] Puig, X.; Ra, K.; Boben, M.; Li, J.; Wang, T.; Fidler, S.; and Torralba, A. 2018. VirtualHome: Simulat- ing household activities via programs. In CVPR. [Qiu et al. 2017] Qiu, W.; Zhong, F.; Zhang, Y.; Qiao, S.; Xiao, Z.; Kim, T. S.; and Wang, Y. 2017. UnrealCV: Virtual worlds for computer vision. In International Conference on Multimedia. [Savva et al. 2017] Savva, M.; Chang, A. X.; Dosovitskiy, A.; Funkhouser, T.; and Koltun, V. 2017. MINOS: Multimodal indoor simulator for navigation in complex environments. arXiv:1712.03931. [Savva et al. 2019] Savva, M.; Kadian, A.; Maksymets, O.; Zhao, Y.; Wijmans, E.; Jain, B.; Straub, J.; Liu, J.; Koltun, V.; Malik, J.; et al. 2019. Habitat: A platform for embodied AI research. arXiv:1904.01201. 2016. Openai universe. In Openai five.
1709.08505
1
1709
2017-09-25T14:17:50
Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid
[ "cs.MA", "cs.CR" ]
In the smart grid, smart meters, and numerous control and monitoring applications employ bidirectional wireless communication, where security is a critical issue. In key management based encryption method for the smart grid, the Trusted Third Party (TTP), and links between the smart meter and the third party are assumed to be fully trusted and reliable. However, in wired/wireless medium, a man-in-middle may want to interfere, monitor and control the network, thus exposing its vulnerability. Acknowledging this, in this paper, we propose a novel two level encryption method based on two partially trusted simple servers (constitutes the TTP) which implement this method without increasing packet overhead. One server is responsible for data encryption between the meter and control center/central database, and the other server manages the random sequence of data transmission. Numerical calculation shows that the number of iterations required to decode a message is large which is quite impractical. Furthermore, we introduce One-class support vector machine (machine learning) algorithm for node-to-node authentication utilizing the location information and the data transmission history (node identity, packet size and frequency of transmission). This secures data communication privacy without increasing the complexity of the conventional key management scheme.
cs.MA
cs
A Novel Key Management and Data Encryption Method for Metering Infrastructure of Smart Grid Imtiaz Parvez, Student Member, IEEE, Arif I. Sarwat, Member, IEEE, My T. Thai, Senior Member, IEEE, and Anurag K. Srivastava, Senior Member, IEEE 1 Furthermore, from the fine grained energy consumption data, the home appliance companies receive information about the life style patterns of consumers and the energy utilization of their home appliances. Thus competing companies can use this valuable information in their businesses. The consumers might want to alter the consumption data to reduce their electricity bill. The most crucial thing is that the opponent/hacker might jam or take over the AMI network by sending false signal to meters on an unsecured system, which may cause power outage in a wide area as well as an imbalance in the demand generation model. 7 1 0 2 p e S 5 2 ] A M . s c [ 1 v 5 0 5 8 0 . 9 0 7 1 : v i X r a Abstract-In the smart grid, smart meters, and numerous control and monitoring applications employ bidirectional wire- less communication, where security is a critical issue. In key management based encryption method for the smart grid, the Trusted Third Party (TTP), and links between the smart meter and the third party are assumed to be fully trusted and reliable. However, in wired/wireless medium, a man-in-middle may want to interfere, monitor and control the network, thus exposing its vulnerability. Acknowledging this, in this paper, we propose a novel two level encryption method based on two partially trusted simple servers (constitutes the TTP) which implement this method without increasing packet overhead. One server is responsible for data encryption between the meter and control center/central database, and the other server manages the random sequence of data transmission. Numerical calculation shows that the number of iterations required to decode a message is large which is quite impractical. Furthermore, we introduce One-class support vector machine (machine learning) algorithm for node-to-node authentication utilizing the location information and the data transmission history (node identity, packet size and frequency of transmission). This secures data communication privacy without increasing the complexity of the conventional key management scheme. Keywords-AMI, Key Management Scheme (KMS), localization, machine learning, One-class Support Vector Machine, RSS, smart grid, smart meter. I. INTRODUCTION Smart grid is the modern power system infrastructure whose distribution system is upgraded via bidirectional communica- tion, and pervasive and intelligent computing capabilities in order to provide improved control, efficiency, reliability and safety. In the arena of smart grid, the Advanced Metering Infrastructure (AMI) is the distribution level building block. It consists of millions of meters interlinked by a hierarchical or mesh-connected or hybrid network. The meters communicate with the control center in a wireless fashion. The typical communication standards for the AMI are ZigBee, WiFi and LTE [1]. In the AMI, smart meters collect and store the instantaneous energy consumption and report it periodically to the back office (the control center) as against reporting of monthly total energy consumption recorded in the conventional meters. It also allows the consumers to actively engage in electricity trade by selling home- generated, unused electricity (from solar panel, windmill etc.) to the grid. AMI also outfits the service provider with control and monitoring equipment, including outage management, demand response, and disaster prevention and recovery information. Since AMI has to use wireless communication, security issues become a critical problem. Observing the usage patterns, an adversary/thief can predict the presence of the targeted con- sumers at home which can be a threat to civil lives and privacy. This research was supported in part through U.S. National Science Foun- dation under the grant RIPS-1441223. Like all other systems, AMI needs to comply with the requirements of security- confidentiality, integrity, availability and accountability (non-repudiation) [2], [3]. Confidentially implies the accessibility of data by any authorized entity, and any intentional or unintentional disclosures of data must be denied. Since the main objective of the AMI is to collect energy consumption information that conveys consumer life patterns, habits and energy usage, this data must be concealed. Integrity requires reflecting authentic data correctly without any modifications, additions, or deletions. If any unauthorized subject performs (or attempts to perform) such actions, this must be detected. Since not only the hacker, but also the consumer, might want to alter the consumption data by trap- ping and resending, the integrity of data is very important. Availability requires the accessibility of data by an authorized user on demand. If the required data is not found at the time of need, the system violates the availability aspect of the security requirement of the system. Any natural or intentional incidents (i.e. hacking) must not hamper the system from operating correctly. For example, if the hacker wants to jam the network, the system must comply with the availability aspect. Accountability (non-repudiation) means non-deniability of an action, i.e., the entities used in receiving or transmitting data must not deny it. If an entity does not receive data, it will not, subsequently, state that it has received it. In the AMI network, accountability ensures a timely response to the command and control, and integrity of billing profile, etc. The main drawback of implementing security scheme in AMI is the limited memory and low computational ability of the smart meters. Furthermore, AMI is a huge network, consists of millions of meters. So we need a lightweight but robust security scheme. In the literature, the key management- based encryption method has been proposed as a prominent security scheme for smart grid, which includes a Trusted Third Party (TTP) [4]–[6]. In all TTP management systems, it is assumed that the TTP is fully trusted. However, the TTP itself, and the meters and communication links among the TTP and the meters could also be compromised. Based on the semi-trusted servers of the TTP and un- trustworthy/unreliable communication links, in this paper, we propose a key management scheme which includes a node (meter) to the Service Provider (SP) data encryption as well as randomized packet transmission. In our early work [7], the scheme consists of two independent servers. The master server manages the public-private key before data is sent to the back office of the SP. Additionally, the auxiliary server receives the random sequence of data from the smart meter, in response to the public key sent by the master server. Both the private key associated with public key and the random sequence are used to retrieve the data at the back office. In this paper, we extend [7] by using Received Signal Strength (RSS) and One class Support Vector Machine (OCSVM) techniques for node to node authentication. RSS is used for localization of meters using the received signal strength from neighbor meters. On the other hand, OCSVM is used to detect new and outlier data/packet, using current and previous data transmission his- tory, which has not been considered in the literature to our best knowledge. The introduction of two separate servers for key management and random sequenced packet transmission increases robustness in security in untrustworthy communica- tion medium and servers. Additionally, OCSVM based node authentication increases sturdiness in key management system without increasing any overhead and it is easy to implement in devices with limited memory and computational ability. The rest of the paper is organized as follows. Section II describes the literature review of the security schemes pro- posed for the AMI. In Section III, details of the proposed structure of the AMI are introduced. In Section IV, the the- oretical background of RSS based localization, OCSVM and entropy of data packet are presented. Section V presents the communication and traffic flow among smart meters, servers and SPs. Furthermore, in Section VI, simulation results and theoretical security strength of a data packet are analyzed. Finally, concluding remarks are provided in Section VII. II. LITERATURE REVIEW In the recent years, security issues in AMI attracted signif- icant attention of different communities (electrical engineers, computer science graduates, IT experts etc.) due to extensive use of wireless communication. In [8], a 128-bit Asymmetric Encryption Scheme Galois Counter Mode (AES GCM) cryp- tography based security IC has been proposed and performance comparison between the hardware-based and software-based crypto-engines is presented. In [9], [10], a game theory based security system has been introduced where two parties (an attacker and a defender) interact pro-actively and reactively for different attack severity levels. In [11], several nodes are selected randomly for intermediate node-to-node authentica- tion. Even though this reduces the packet overhead, it still has vulnerability in the middle of communication. In [12], randomization of the AMI configuration has been proposed to make its behavior unpredictable to the hacker, whereas the behavior is predictable to the control center. In [13], Costas et al. introduced anonymization of data by randomizing node identity using a TTP. But communication overhead is increased due to the need for the TTP to communicate with all nodes simultaneously. Moreover, retrieving information from a large network becomes complicated. In [14], homomorphic encryption has been introduced, which also has the problem of retrieving data from a large network being complicated. In [15], an Identity Based Signcryption (IBS) for zero configuration encryption and authentication has been proposed for end-to-end communication solution. In [16], a node-to- node encryption with its own secret key has been proposed. But for a large network, the packet overhead increases for both IBS and node-to-node authentication. To distribute the keys and 2 Fig. 1: AMI architecture consisting of a cluster of mesh/hybrid connected meters, data concentrator, KMS and control center. manage the network, a wireless sensor network based Public Key management Infrastructure (PKI) has been proposed in [17] which has problem of generation large number of unique keys. In [18], a key management system has been introduced based on DLMS/COSEM standard providing two main infor- mation security features: data access security and data transport security. Since DLMS/COSEM is an open standard and allows a number of variations in the protocol it increases the complexity in the client side. In [19], a two layer security scheme for meter to Data Concentrator (DC) and DC to control center of SP has been provided in Taiwan. For meter to DC, IEC 62056 based encryption method, and for DC to the back office, public key management system has been proposed. But here in each time step, encryption and decryption need to be performed twice. implementation, Different than these earlier work in the literature, in our proposed scheme, we provide improvements in the key man- agement schemes for AMI systems. In particular, in our approach, we introduce randomization of data transmission as well as node-to-node authentication method considering unreliable communication scenario and using machine learning technique. The introduction of randomization and the machine learning based node authentication increases the robustness of the key management system without increasing any overhead. III. ARCHITECTURE OF AMI The AMI is a web like network with millions of meters as shown in Fig. 1. In here we provide the insights into AMI architecture, which encompasses components including home appliances, control center of utility service provider and security infrastructure. • Smart meter: It is a solid state device responsible for collecting, storing and sending data to the back office using wireless communication and at interval less than 1 hour. The home appliances are connected to a smart meter by a network, forming Home Area Network (HAN). • Neighborhood Area Network (NAN): The meters are connected among themselves through a mesh or hierar- chical or hybrid network termed as NAN. The network may be wired (e.g. PLC) or wireless (e.g. WiFi, ZigBee, GPRS). The head end of the NAN is the data concen- trator or gateway which is connected to back office by a dedicated wired or wireless connection (optical fiber, cellular network, etc.). • Control center/Hardware and software control sys- tem/Utility back office/SP: The control center receives MDMS (Metering data management service)Back OfficeMaster serverAuxiliary server jSMnSMiSMkSMWireless communication linkDedicated network (wired/wireless)Data collector/concentrator the consumption data from the AMI network and uses them for making bills. This fine grained data can be used to optimize power generation and distribution. Besides that, electricity distribution, control, and monitoring is performed from the control center. • Master server: In our architecture, the master server is semi- trusted. When a meter requests the key, the master server generates a public key and private key pair. The master server uni-casts the public key to the specific meter for data encryption and the corresponding private key is sent to the auxiliary server and control center for data decryption. • Auxiliary server: Before the encryption of data with the public key sent by the master server, the smart meter generates a random sequence. This random sequence is sent as encrypted by public key to auxiliary server. The auxiliary server receives random sequence and au- thenticates it by the private key of smart meter before forwarding it to the control center for final decryption. IV. OC-SVM AND RSS ALGORITHM, AND ENTROPY OF A DATA PACKET In our scheme, we use RSS for the localization of meter, and OC-SVM for node-to-node authentication. In the rest of this section, we describe the two algorithms, and security strength calculation of a data packet by entropy in further detail. A. Received Signal Strength (RSS) based localization RSS based localization can be used in localizing a new meter in collaboration with meters whose positions are already known. The location information is used to authenticate the source node using OCSVM. Let us consider an unknown positioned meter at a location (x, y) accompanied by partially dispersed known position meters at locations (xl, yl), where 1 ≤ l ≤ n. The received signal strength at location (xl, yl) can be denoted by ψl ψl = c − 10γ log(dl) + wl, (1) where c is an unknown constant that depends on transmitted power, frequency etc, and γ is the path loss constant. For a lossy environment, the typical value of γ is 4-6. In our model, γ = 2.93 has been used considering residential area. The parameter dl is the euclidean distance between the known and unknown position meter defined as follows: dl =(cid:112)(x − xl)2 + (y − yl)2, (2) and wl is the zero mean random Gaussian noise with standard deviation σl. The value of σl ranges from 6 to 12 dB. Let us define, the θ and ψ as θ = [x, y, z]T and ψ = [ψ1, ψ2, ......., ψn]T . The likelihood function of θ for a given RSS measurement ψ, f (θψ) is given by (cid:41) {ψl − c + 10γ log(dl)}2 2σ2 l , (3) (cid:40) − n(cid:88) f (θψ) = c1 exp where c1 is a constant. l=1 The Maximum Likelihood (ML) estimate of θ, denoted by θ, can be found from the following equation 3 (cid:41) θ = arg max f (θψ) = arg min (cid:40) − n(cid:88) l=1 {ψl − c + 10γ log(dl)}2 2 2σl (4) , The above equation is an optimization problem. Various op- timization techniques such as differential evolution, dynamic relaxation and particle swarp optimization (PSO) can be used to solved (4). In our problem, we used PSO to solve the non- linear optimization problem. Finally, the ML estimator yields the location (x, y) and reference power z of the unknown positioned meter (x, y, z) = {θ(1), θ(2), θ(3)}. (5) B. OCSVM algorithm The Support Vector Machine (SVM) is a machine learning algorithm based on modern statistical learning theory [20], [21]. It separates two classes by constructing a hyper surface in the input space. In this input space, the input is mapped to a higher dimensional feature space by non-linear mapping. In this section, we describe OCSVM for segregating outliers from a cluster of data. Let us consider a data space Ψ = (xi, yi) ∈ Rd i = {1, 2, 3, ...., n} where xi ∈ Rd is the input data and yi ∈ {−1, +1} is the corresponding output pattern in the dedicating class membership. SVM first projects the input vector x to a higher dimensional space H by a non-linear operator Φ(·) : Rn ←→ H where the data projection is linearly separable. The non-linear SVM classification is defined as Ω(x) = wT Φ(x) + b, w ∈ H, b ∈ R, (6) which is linear in terms of projected data Φ(x) and non-linear in terms of original data x. Fig. 2: Separation of two class in hyperplane. SVM tries to maximize the separation margin between two classes of data in hyperplane as shown in Fig. 2. To prevent SVM from over fitting with noisy data (or create soft margin), slack variables (ξi) are introduced to allow some data to lie within the margin. Then the objective function which includes the minimization of (cid:107)w(cid:107) can be written as (cid:107)w(cid:107) 2 min w,b,ξi + c n(cid:88) i=1 ξi, such that yi(wT Φ(xi) + b) ≥ 1 − ξi, and ξi ≥ 0. (7) (8) Class 1 Class 2Optimal Hyperplane where c > 0 is the regularization parameter that determines the trade-off of maximizing the margin and the number of training data within the margin (thus reducing the training errors). To minimize the objective function of (7) by using the Lagrange multipliers technique, the necessary condition for w is w = γiyiΦi(x) (9) n(cid:88) i=1 where γi > 0, i = 0, 1, 2.....n are Lagrange multipliers corresponding to the constraints in equation (8). The Lagrange multipliers (γi) can be solved from equation (7) and written as max w(γi) = n nγiγjyiyjk(xi, xj) (10) (cid:88) j=1 (cid:88) i=1 nγi − 1 2 (cid:88) n(cid:88) i=1 such that 0 ≤ γi ≤ c, and γiyi = 0. (11) i=1 In (10), k(x, y) = Φ(x)T Φ(y) is known as the kernel function. It determines the mapping of the input vector to a high dimensional feature space. In this paper, we consider two kernel functions. The Guassian RBP kernel is given by: Gaussian RBF kernel: k(x, y) = exp( (cid:107)x−y(cid:107)2 σ ) while the Polynomial kernel is given by: Polynomial kernel: k(x, y) = ((xy) + 1)p where p ∈ N is the degree of the polynomial function and σ ∈ R is the width of the RBF function. OCSVM detects abnormal data within a class [21]. OCSVM maps the input vector to feature dimension according to the kernel function and separates it from the origin with maximum margin. It penalizes the outliers by employing slack variables ξ in the objective function and controls carefully the trade off between empirical risk and regularize the penalty. (cid:88) i=1 Fig. 3: Feature dimensional space for OCSVM The quadratic programming minimization function min w,ξi,ρ 1 2 (cid:107)w(cid:107)2 + 1 vn nξi − ρ such that (w · Φ(xi) ≥ ρ − ξi, and ξi ≥ 0, i = 1, 2, 3, ...., n. (12) (13) where Φ is the kernel function for mapping, ξi is the slack variables, v ∈ (0, 1] is a prior fixed constant, and ρ is the decision value that determines whether a given point falls within the estimated high density region. Then the resultant decision function f m w,p(x) takes the form 4 f (x) = sgn(w∗T Φ(x) − ρ∗) (14) where ρ∗ and w∗ are the values of w and ρ solving from the equation (12). In OCSVM, v characterizes the solution instead of c • • It determines an upper bound on the fraction of outliers. It is the lower bound on the number of training examples used as support vector. (smoothness operation)- Due to the high significance of v, OCSVM is also termed as v − SVM. Since RSS algorithm can pinpoint the location of neigh- boring meters based on received electromagnetic signals, and OCSVM can detect anomaly in input data set, the combination of these two algorithms makes it possible to identify false nodes. In our security scheme, OCSVM utilizes packet size, frequency of data transmission and node identity along with the node position for meter authentication. The details have been provided in the next section. C. Entropy of a data packet Entropy is used to measure the uncertainty of a random variable or data packet. The more certain about a value, the smaller is the entropy value. The entropy for a sequence S S P (S = x) log2 P (S = x) where P (S = x) is the probability of taking S a value over H(s) =(cid:80) If the size of a random variable or packet generated by the meter is n bit, then the entropy and security strength of the data packet are n and 2n respectively. x. V. TRAFFIC FLOW PROCESS In this section, the privacy scheme implementation process and the data flow are described in detail. ability. meters are not fully reliable. In our architecture, we assume the following assumption: • The Master and Auxiliary servers are independent and semi-trusted. However, the servers might physically be one but virtually divided into two servers. • The wireless communication links between servers and • The meters have limited memory and computational • The control center has adequate computational ability. • The meters keep the records of position of neighboring meters, frequency of transmission, packet size and node identity. Frequency of transmission, node identity and packet size are extracted from the packet header. The node position is derived from electromagnetic signals using RSS based localization as explained in previous section IV(A). • Every meter transmits data at a constant transmission • The packet size is constant for every meter. • When a new meter is installed, it starts to record the position of the neighbor meters, frequency of data transmission, node identity and packet size. power. wwpw 5 consumption data is encrypted and processed by the following method: Encryption of data: pk1 ⊕ M1 −→ C1 Segmentation of the encrypted data into n packets: C1 −→ sequence: Ordering (m1, m2, m3......mn) random (m1, m2, m3......mn) S−→ (h1, h2, h3........hn) packets by STEP 3: Data transmission The packets are transmitted by the transmitting algorithm as explained in Algorithm 1: time instant t Go to Initialization Proceed to next step Algorithm 1 Transmitting algorithm 1: Initialization: 2: Generate Random Sequence, St = (s1, s2, ........, sn) at 3: if St−1 == St then 4: 5: else 6: 7: end if 8: Segment C −→ (m1, m2, m3.....mn) 9: Set Pi = 1 Si , p3 = 1 s3  P = (p1, p2, p3, ......., pn) where p1 = 10: Transmission: 11: Transmit packet mi chosen from (m1, m2, m3, ....., mn) with greater probability  probability distribution (p1, p2, p3, ...., pn) ..........., pn = 1 sn , p2 = 1 s2 1 s1 12: End STEP 4: Hop to hop data aggregation and forwarding Based on previous data receiving records containing node identity, sender node's position, frequency of data received and packet size- the node SM2 verifies source node SM1 and forwards data to the next node SM3. OCSVM algorithm is used to authenticate the source node. The data aggregation and forwarding algorithm pseudocode is tabulated in Algorithm 2: STEP 5: Data retrieval The control center receives the randomized and encrypted packets and decodes them by the secret key pk and random sequence S. S−→ Reordering (h1, h2, h3, ...., hn) (m1, m2, m3......., mn) Message unification: (m1, m2, m3......., mn) −→ C1 pk−→ M1 Decryption: C1 data: the VI. SIMULATION RESULT AND SECURITY ANALYSIS A. Simulation result To get insights into the localization of the meters, we used a suburban building block topology (Manhattan grid) [22] in which we used rectangle and hexagon shape as area of interest (AOI). In an AOI, each edge is a known positioned meter and the center is the emitter (unknown positioned meter). In Matlab simulation, we used γ = 2.93 and σl = 12 dB. Furthermore, for optimization PSO was used whereas residential pathloss model was considered for pathloss calculation. With an increase in the number of nodes (meters), the Mean Square Error (MSE) from the exact position of the meter decreases as illustrated in Fig. 5. Furthermore, as the variance TABLE I: Symbol notation. Fig. 4: Data flow among various components of AMI. Notation SMi AEi ki Ei Di pk sk Mi Ci t (m1, m2, ......., mn) ∈ C (s1, s2, ...., sn) ∈ S (p1, p2, ......, pn) ∈ P γ δl PSO One-class SVM for encryption scheme Description Smart meter i Asymmetric node/ meter i Randomized key generation algorithm for node/ meter i Encryption algorithm for node i Deterministic decryption algorithm for node i Public key Secret key Message/data of meter/node i Encrypted data/ Message of node/ meter i Time instance Segmented packets of message C Random sequences Probability of ith packet transmission at each time instant t Path loss component Variance of random noise Particle swarm optimization One class Support Vector Machine A. Basic Notifications and definitions The notifications and definitions used in our algorithm are stated in Table I. B. Data flow The data flow (as shown in Fig. 4) among the meters, servers and control center has be explained here in details. STEP 1: Initialization SM1 sends a request for a public key before sending data. The Master server generates a public key and private key pair. The public key is unicasted to SM1 for data encryption. Additionally, to the Auxiliary server and the control center. the corresponding private key is sent Key generation by asymmetric algorithm: AE1 = (k1,E1, D1) k1 −→ (pk1, sk1) STEP 2: Encryption The SM1 generates a random sequence (S). S is encrypted by the received public key and is sent to the Auxiliary server. The Auxiliary server receives the cypher text and decodes it by the secret key. After that the Auxiliary server sends the sequence S to the control center. At the same time, the SM_1MSASSM_2Control CenterRequest key Generates keys (p_k,s_k)Send public key(p_k) Random sequence (S) generationSend S encrypted by public keyDecrypt S by node secret key (s_k)Send random sequence (S)Data encryption by public key (p_k)Data send according to sequence (S)Node (SM_1) authentication by OC-SVMSM_iData/packet forwardNode (SM_2) authentication by OC-SVMPacket forwardSend secret key (p_k)Send secret key (p_k) Algorithm 2 Data aggregation and forwarding 1: Initialization: 2: if source meter SMi is new meter then 3: Record data transmission history (frequency of trans- mission, location of neighbor meter, packet size, node identity ) for time h Send attach request to control center Receive approval of new meter 4: 5: 6: else 7: signal 8: 9: 10: 11: 12: 13: then else ter 14: end if 15: end if Derive SMi's location from received electromagnetic Get frequency (time difference between two packet sending), node identity, packet size from header informa- tion of packet Run OCSVM algorithm if the new data and previous data belong to same group Forward data to the next meter Cease data transmission and report to control cen- Fig. 5: MSE from the exact position of the meter vs. Number of nodes of noise increases, the MSE also increases as depicted in Fig. 6. In the second part of simulation using Python, we use OCSVM for novelty/anomaly detection in a given data set. It takes node identity, node's position, frequency of transmission and packet size as new data set. The previous authenticate data set or fraction of new data set can be used as training data. In the simulation environment, we generate random 100 training observations, 20 normal regular observations and 20 abnormal observations. The red line (as shown in Fig. 7 and Fig. 8) is the learned decision function that separates abnormal data from the normal regular data. As shown in Fig.7, OCSVM draws a learned decision boundary based on 100 training clean data, of which 12 data falls outside the decision boundary erroneously. Following this, among the 20 regular novel data 3 data falls outside the boundary and all 20 abnormal data falls outside the decision boundary. So for 100 training data, OCSVM can detect anomaly with 100% accuracy (0 error in novel abnormal detection). If we reduce the number of training samples to 20, the performance of OCSVM decreases (1 error in 20 novel abnormal detection) which is depicted in Fig. 8. Now we use the polluted data for training purposes, which is a fraction of the input data. There is no separate clean training sample in this case. We also compare OCSVM with 6 Fig. 6: MSE from the exact position of the meter vs. Variance (σ2) of Gaussian noise. robust covariance estimator for different kinds of input data distribution. In this case, we generate 100 samples, 10% of which are outliers/abnormal. For a well-centered and elliptic input data set, OCSVM and robust covariance estimator show the same performance as illustrated in Fig. 9. For a bi-modal distribution of data, OCSVM shows better performance than the robust covariance estimator. This is depicted in Fig. 10. For the non- Gaussian distributed input data, the performance of both the methods degrades, wherein OCSVM shows better performance than the robust covariance estimator, illustrated in Fig. 11. B. Security strength analysis Let us assume, a meter sends a consumption unit packet of size 256 bit encrypted by 256 bit asymmetric key to the central database of control center. If the packet is subdivided into 32 blocks with each block having a size of 8, and a block is transmitted each time according to a random sequence, then the entropy is 256. The security strength of the data packet is 2256. Furthermore, the security strength of a 256 bit asymmetric So, for 32 random sequenced packets and 256 bit asymmet- key is 2256/2. ric key, Total security strength of the data packet = 2256 + 2256/2 Hence, a hacker needs a maximum (2256 + 2256/2) number of iterations (tries) to decrypt a message, which is impractical. VII. CONCLUSION In our security scheme, a two-level security method has been proposed- data encryption and node authentication. In the data encryption level, encryption by asymmetric keys and randomization of data packets have been proposed. In the conventional key management system, only data encryption is used. On the other hand, in our scheme, randomization of packets along with data encryption ensures enhanced data security. Another contribution of our scheme is the introduction of node-to-node authentication by OCSVM, which utilizes four variables- meter ID, frequency of data reception from a specific meter, packet size and meter position. The information of meter ID, data frequency and packet size is easily extractable from the packet header. On the otherhand, for meter's position RSS is used and it is almost constant due to stationary position of the meters. For TTP-to-smart meter communication, we need a bi- directional communication similar to meter data communi- cation. Since the communication between meters and servers 7 Fig. 7: Anomaly detection in 40 data with training data size 100. (a) Contour diagram of decision function. (b) Statistics of error. (a) (b) Fig. 8: Anomaly detection in 40 data with training data size 20. (a) Contour diagram of decision function. (b) Statistics of error. (a) (b) happens once per every session of sending the meter data to the control center, it doesn't hamper the normal traffic flow between the meters and control center. Further, since a random sequence along with the asymmetric key is used to retrieve data in the control center, it also helps to verify data flow from a specific smart meter. REFERENCES [1] V. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati, and G. Hancke, "Smart Grid Technologies: Communication Technologies and Standards," Industrial Informatics, IEEE Transactions on, vol. 7, no. 4, pp. 529–539, Nov 2011. [2] F. Cleveland, "Cyber security issues for Advanced Metering Infrast- tructure (AMI)," in Proc. IEEE conf. on Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, July 2008, pp. 1–5. [3] Z. Lu, X. Lu, W. Wang, and C. Wang, "Review and evaluation of security threats on the communication networks in the smart grid," in Proc. Conf. on MILITARY COMMUNICATIONS CONFERENCE (MILCOM), Oct 2010, pp. 1830–1835. [4] Y. Yan, Y. Qian, and H. Sharif, "A secure and reliable in-network col- laborative communication scheme for advanced metering infrastructure in smart grid," in Proc. IEEE Int. conf. on Wireless Communications and Networking Conference (WCNC), March 2011, pp. 909–914. [5] S. Das, Y. Ohba, M. Kanda, D. Famolari, and S. Das, "A key management framework for AMI networks in smart grid," IEEE Com- munications Magazine, vol. 50, no. 8, pp. 30–37, August 2012. [6] Z. Wan, G. Wang, Y. Yang, and S. Shi, "SKM: Scalable Key Man- agement for Advanced Metering Infrastructure in Smart Grids," IEEE Trans. on Industrial Electronics, vol. 61, no. 12, pp. 7055–7066, Dec 2014. I. Parvez, A. Islam, and F. Kaleem, "A key management-based two-level encryption method for AMI," in PES General Meeting - Conference Exposition, 2014 IEEE, July 2014, pp. 1–5. [7] [8] W. Somkaew, S. Thepphaeng, and C. Pirak, "Data security implemen- tation over ZigBee networks for AMI systems," in Proc. 11th Int. Conf. on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON, May 2014, pp. 1–5. [9] Z. Ismail, J. Leneutre, D. Bateman, and L. Chen, "A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid AMI," IEEE J. on Selected Areas in Communications,, vol. 32, no. 7, pp. 1486–1499, July 2014. [10] S. Amin, G. Schwartz, A. Cardenas, and S. Sastry, "Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks: Providing New Capabilities with Advanced Metering Infrastructure," IEE J. on Control Systems, vol. 35, no. 1, pp. 66–81, Feb 2015. [11] Y. Yan, R. Hu, S. Das, H. Sharif, and Y. Qian, "An efficient security protocol for advanced metering infrastructure in smart grid," IEEE J. on Network, vol. 27, no. 4, pp. 64–71, July 2013. [12] M. Ali, E. Al-Shaer, and Q. Duan, "Randomizing AMI configuration for proactive defense in smart grid," in IEEE Int. Conf. on Smart Grid Communications (SmartGridComm), Oct 2013, pp. 618–623. [13] C. Efthymiou and G. Kalogridis, "Smart Grid Privacy via Anonymiza- tion of Smart Metering Data," in Proc. First IEEE Int. Conf. on Smart Grid Communications (SmartGridComm), Oct 2010, pp. 238–243. [14] N. Yukun, T. Xiaobin, C. Shi, W. haifeng, Y. Kai, and B. Zhiyong, "A security privacy protection scheme for data collection of smart meters based on homomorphic encryption," in Proc. IEEE conf. on EUROCON, July 2013, pp. 1401–1405. [15] H. So, S. Kwok, E. Lam, and K.-S. Lui, "Zero-Configuration Identity- Based Signcryption Scheme for Smart Grid," in Proc. First IEEE Int. Conf. on Smart Grid Communications (SmartGridComm), Oct 2010, pp. 321–326. [16] Y. Yan, Y. Qian, and H. Sharif, "A secure and reliable in-network col- laborative communication scheme for advanced metering infrastructure in smart grid," in Proc. IEEE Int. Conf. on Wireless Communications and Networking Conference (WCNC), March 2011, pp. 909–914. [17] R. Bhatia and V. Bodade, "Defining the framework for wireless- AMI security in smart grid," in Proc. Int. conf. on Green Computing Communication and Electrical Engineering (ICGCCEE), March 2014, pp. 1–5. 8 Fig. 9: Comparison of OCSVM and robust covariance estimator for outliers (abnormal data) detection when inlier mode well-centered and elliptic. Fig. 10: Comparison of OCSVM and robust covariance estimator for outliers (abnormal data) detection when inlier distribution is bimodal. Fig. 11: Comparison of OCSVM and robust covariance estimator for outliers (abnormal data) detection when inlier distribution is strongly non Gaussian. [18] M. Thomas, I. Ali, and N. Gupta, "A secure way of exchanging the secret keys in advanced metering infrastructure," in Proc. IEEE Int. Conf. on Power System Technology (POWERCON), Oct 2012, pp. 1–7. [19] P.-H. Hsu, W. Tang, C. Tsai, and B.-C. Cheng, "Two-Layer Security Scheme for AMI System in Taiwan," in Proc. Ninth IEEE Int. Symp. on Parallel and Distributed Processing with Applications Workshops (ISPAW), May 2011, pp. 105–110. [20] V. N. Vapnik, Statistical learning theory, 1st ed. Wiley, Sep. 1998. [21] R. Zhang, S. Zhang, S. Muthuraman, and J. Jiang, "One Class Support Vector Machine for Anomaly Detection in the Communication Network Performance Data," in Proceedings of the 5th Conference on Applied Electromagnetics, Wireless and Optical Communications, ser. ELEC- TROSCIENCE'07, 2007, pp. 31–37. J. Markkula and J. Haapola, "LTE and hybrid sensor-LTE network performances in smart grid demand response scenarios," in Proc. IEEE Conf. on Smart Grid Communications (SmartGridComm), Oct 2013, pp. 187–192. [22]
1812.05296
1
1812
2018-12-13T07:31:54
Aerial Robot Model based design and verification of the single and multi-agent inspection application development
[ "cs.MA" ]
In recent decade, potential application of Unmanned Aerial Vehicles (UAV) has enabled replacement of various operations in hard-to-access areas, such as, inspection, surveillance or search and rescue applications in challenging and complex environments. Furthermore, aerial robotics application with multi-agent systems are anticipated to further extend its potential. However, one of the major difficulties in aerial robotics applications is the testing of the elaborated system within safety concerns, especially when multiple agents are simultaneously applied. Thus, virtual prototyping and simulation-based development can serve in development, assessment and improvement of the aerial robot applications. In this research, two examples of the specific applications are highlighted, harbor structure and facilities inspection with UAV, and development of autonomous positioning of multi-UAVs communication relaying system. In this research, virtual prototype was designed and further simulated in multi-body simulation (MBS) feigning the sensing and actuating equipment behaviors. Simultaneous simulation of the control and application system running with software in the loop (SITL) method is utilized to assess the designed hardware behavior with modular application nodes running in Robot Operating System. Furthermore, prepared simulation environment is assessed with multi-agent system, proposed in previous research with autonomous position control of communication relaying system. Application of the virtual prototype's simulation environment enables further examination of the proposed system within comparison degree with postfield tests. The research aims to contribute through case assessment of the design process to safer, time and cost-efficient development and application design in the field of aerial robotics.
cs.MA
cs
Aerial Robot Model based design and verification of the single and multi-agent inspection application development Seiko P. Yamaguchi1a,2, Masaru Sakuma1a, Takaki Ueno1a, Filip Karolonek 2 Tadeusz Uhl 2, Ankit A. Ravankar1b, Takanori Emaru1b, Yukinori Kobayashi1b* 1 Laboratory of Robotics & Dynamics, Div. of Human Mechanical Systems and Design a Graduate School / b Faculty of Engineering, Hokkaido University, Sapporo, Japan 2 Department of Robotics and Mechatronics, Faculty of Mechanical Engineering and Robotics, AGH University of Science and Technology, Cracow, Poland [email protected], *[email protected] Abstract In recent decade, potential application of Unmanned Aerial Vehicles (UAV) has enabled replacement of various operations in hard-to-access areas, such as: inspection, surveillance or search and rescue applications in challenging and complex environments. Furthermore, aerial robotics application with multi-agent systems are anticipated to further extend its potential. However, one of the major difficulties in aerial robotics applications is the testing of the elaborated system within safety concerns, especially when multiple agents are simultaneously applied. Thus, virtual prototyping and simulation-based development can serve in development, assessment and improvement of the aerial robot applications. In this research, two examples of the specific applications are highlighted: harbor structure and facilities inspection with UAV, and development of autonomous positioning of multi-UAVs communication relaying system. In this research, virtual prototype was designed and further simulated in multi-body simulation (MBS) feigning the sensing and actuating equipment behaviors. Simultaneous simulation of the control and application system running with software in the loop (SITL) method is utilized to assess the designed hardware behavior with modular application nodes running in Robot Operating System. Furthermore, prepared simulation environment is assessed with multi-agent system, proposed in previous research with autonomous position control of communication relaying system. Application of the virtual prototype's simulation environment enables further examination of the proposed system within comparison degree with postfield tests. In future work, the proposed simulation environment can be further applied for motion and vibration control of the UAV applications. The research aims to contribute through case assessment of the design process to safer, time and cost-efficient development and application design in the field of aerial robotics. Keywords : Aerial Robotics, UAV, Mechatronic Design, Multi-UAV System, System Integration, FANET, MBS ,ROS 1. Introduction Evolution and development of UAVs have enabled their utilization in variety of robotic operations [1] [2]. Although, enormous potential of aerial robots exists, high concern to safety and regulatory restrictions is a major bottleneck during system design and development phase. Hence, the article presents the design procedure with mechatronic approach, verified and confirmed to be effective and time-efficient for innovative product and system design [3].Virtual prototyping and verification with simulation tools decreases the risk of damage while failures. In this research, two cases of aerial robots anticipated applications are concerned, presenting the system and software design process with mechatronic model-based approach of: hard-to-access area structure inspections, and multi-UAV communication relaying [4]. 2. Problem Formulation As one of the challenges considered, operation range of aerial platforms are limited due to its wireless communication. Increasing operation range of UAV missions can be achieved by multi-agent communication relaying, anticipated to serve in better endurance of the system applications [5] (Fig.1). However, multi-UAV system design where several agents are simultaneously applied in air faces a high risk of damage during failures. Hence, virtual-prototype and simulation-based development should decrease design time and improve its reliability before the hardware laboratory model is tested. Preprint Submitted to: The 14th International Conference on Motion and Vibration Control (MoViC 2018) 1 Application requirements considering monitoring of port facilities including pier structure and breakwater monitoring had been revised (Fig.2). Challenges of UAV utilization in this area arise due to several reasons; Wide area coverage and long-range flight required for a single mission, hard-to- access environment as well as possibility of GPS-denied missions. The large aspect of the wide requirements needs reflection in application development. 3. Virtual Prototyping and Simulation based Design Aerial robotic system includes UAV platform, sensing and actuating components, flight controller and computational responsibility. Fig.3(i) presents the set-up of the aerial robot. Virtual prototype of the UAV's rigid body model was developed with CAD and converted to simulation supported format to be applied for multi-body simulations. Thus, integrating the simulation model with flight simulator and software operating system, one can imitate the behavior of the aerial robot within SITL simulation, as in Fig.3(ii). In combination, HIL setup is enabled prior to field tests. 4. Implementation and Verification Model based designing process was applied to following application design and development with proposed methods to highlight its strength. 4.1 Multi-UAV Communication Relaying System structure as well as autonomous positioning system for formation control [4] was developed and verified. Fig.4(i) presents dynamic MBS simulation interfacing with system developed, Fig.4(ii) formation control monitoring with SITL simulation. It is remarkable that during the software design of the fail-safe collision avoidance between UAVs, proposed system enabled to verify algorithm developed with no hardware damaged due to SITL tests proceeded within software development stage. 4.2 Harbor Inspection Scenarios In order to test capabilities in challenging environments, application development for data acquisition, localization and navigation methods were considered. Modular experimental possibilities of the simulation environment accelerated the choice of components and verification for application building. For example, 3D point-cloud data accusation and processing presented in Fig.5, or SLAM [6]and navigation techniques [7] for GPS-denied environment [8] [9]. 5. Conclusion and Future Work Figure 1: Operation principle of the Multi-UAV communication relaying and its system design through model based simulations, followed by hardware tests. Figure 2: Multi-copter requirements on port facilities inspection. System design process should concern wide requirements characteristics within its application. Figure 3: System diagram comparison of aerial robot components and model-based simulation environment Figure 4: Multi-UAV Communication relaying system design and verification with simulation environment, The applied method has presented its effectiveness in acceleration of design process and prototyping, as well as increased reliability in safety. Although, further verification of the simulation accuracy is required, communication relaying had been developed with this method. Thus, practical challenges highlighted during actual hardware tests are brought over to improvements with model-based simulations, including necessary improvement in simulations. Harbor inspection application is still in the development phase. Advantages of simulation-based development was highlighted due to the access difficulties to aimed structures. The research plans to further verify the solution developed with testbed implementations. 6. References [1] N. Eduardo, A. A. Ravankar, A. Ravankar, Y. Kobayashi and T. Emaru, "Vision based autonomous docking of VTOL UAV using a mobile robot manipulator," in IEEE/SICE International Symposium on System Integration Figure 5: Simulation of the UAV-based breakwater 3D point-cloud acquisition with 2D lidar and flight data. Preprint Submitted to: The 14th International Conference on Motion and Vibration Control (MoViC 2018) 2 (SII), Taipei, 2017. [2] E. Feron and E. N. Johnson, "Aerial robotics," in Springer Handbook of Robotics, Berlin Heidelberg, Springer, 2008, pp. 1009-1029. [3] A.Martowicz, M.Ciszewski, T.Buratowski, A.Gallina, M.Rosiek, K.Seweryn, W.Teper, A.J.Zwierzyński and T.Uhl, "Mechatronic approach in application to solution of research and design problems," Mechatronics, vol. 36, pp. 1- 17, 2016. [4] S. P. Yamaguchi, F. Karolonek, T. Emaru, Y. Kobayashi and T. Uhl, "Autonomous position control of multi- unmanned aerial vehicle network designed for long range wireless data transmission," in IEEE/ SICE, SII 2017, Taipei, 2017. [5] W. Akihisa, Y. Toshiaki, M. Masaaki, A. Takanari, A. Hideo and T. Hirokazu, "A Surveillance System Using Small Unmanned Aerial Vehicle (UAV) Related Technologies," NEC Technical Journal, Vols. 8-1, no. Special Issue on Solving Social Issues, pp. 68-72, 2016. [6] A. Ravankar, A. A. Ravankar, Y. Hoshino, E. Takanori and Y. Kobayashi, "On a hopping-points svd and hough transform-based line detection algorithm for robot localization and mapping," International Journal of Advanced Robotic Systems, vol. 13, no. 3, p. 98, 2016. [7] A. Ravankar, A. A. Ravankar, Y. Kobayashi, Y. Hoshino and C.-C. Peng, "Path smoothing techniques in robot navigation: State-of-the-art, current and future challenges," Sensors, vol. 18, no. 9, p. 3170, 2018. [8] T. Yamaguchi, T. Emaru, Y. Kobayashi and A. A. Ravankar, "3D map-building from RGB-D data considering noise characteristics of Kinect," in IEEE/SICE International Symposium on System Integration (SII), Sapporo, 2016. [9] M. Sakuma, Y. Kobayashi, T. Emaru and A. A. Ravankar, "Mapping of pier substructure using UAV," in IEEE/SICE International Symposium on System Integration (SII), Sapporo, Japan, 2016. [10] M. Sakuma, "Development of Port Facilities Inspection Robot Using Multi-Copter," Graduate School of Engineering, Hokkaido University, Sapporo, Japan, 2018. [11] OSRF, "Robot Operating System," Open Source Robotics Foundation, [Online]. Available: http://www.ros.org/. [Accessed July 2018] Preprint Submitted to: The 14th International Conference on Motion and Vibration Control (MoViC 2018) 3
cs/0407024
1
0407
2004-07-10T11:06:57
An agent-based intelligent environmental monitoring system
[ "cs.MA", "cs.CE" ]
Fairly rapid environmental changes call for continuous surveillance and on-line decision making. There are two main areas where IT technologies can be valuable. In this paper we present a multi-agent system for monitoring and assessing air-quality attributes, which uses data coming from a meteorological station. A community of software agents is assigned to monitor and validate measurements coming from several sensors, to assess air-quality, and, finally, to fire alarms to appropriate recipients, when needed. Data mining techniques have been used for adding data-driven, customized intelligence into agents. The architecture of the developed system, its domain ontology, and typical agent interactions are presented. Finally, the deployment of a real-world test case is demonstrated.
cs.MA
cs
In Management of Environmental Quality, An International Journal vol.15, no.3, pp.238-249, 2004. Emerald Publishers. An agent -based intelligent environmental monitoring system Ioannis N. Athanasiadis and Pericles A. Mitkas ABSTRACT Fairly rapid environmental changes call for continuous surveillance and on- line decision- making. Two areas where IT technologies can be valuable. In this paper we present a multi-agent system for monitoring and assessing air-quality attributes, which uses data coming from a meteorological station. A community of software agents is assigned to monitor and validate measurements coming from several sensors, to assess air -quality, and, finally, to fire alarms to appropriate recipients, when needed. Data mining techniques have been used for adding data-driven, customized intelligence into agents. The architecture of the developed system, its domain ontology, and typical agent interactions are presented. Finally, the deployment of a real-world test case is demonstrated. Keywords : Multi-Agent Systems, Intelligent Applications, Data Mining, Inductive Agents, Air-Quality Monitoring Introduction Enviro nmental Information Systems (EIS) is a generic term that describes the class of systems that perform one or more of the following tasks: environmental monitoring, data storage and access, disaster description and response, environmental reporting, planning and simulation, modeling and decision- making. As the requirements for accurate and timely information in these systems are increasing, the need for incorporating advanced, intelligent features in EIS is revealed. In this context advances in Information Te chnology (IT) sector are promising to satisfy these requirements. Enviromatics (an abbreviation of the term (cid:147)environmental informatics(cid:148)) is the research initiative examining the application of Information Technology in environmental research, monitoring, assessment, management, and policy (IFIP 1999). The deployment of modern, intelligent systems for monitoring and evaluating meteorological data series and assessing air quality is only one of several enviromatics applications. Our focus in this work is to take advantage of powerful tools for software development and demonstrate their application for monitoring air- quality attributes. Air Quality Operational Centers (AQOC) have been established worldwide in areas with potential air pollution problems. Their responsibility is to monitor critical atmospheric variables and publish regularly their analysis results. Currently, real- time decisions are made by human experts, whereas mathematical models are used for off- line study and understanding of the atmospher ic phenomena involved. For example, in the London Air Quality Network (http://www.erg.kcl.ac.uk/london/) flexible data analysis is supported through statistical tools and in the Texas Natural Resource Conservation Commission (http://www.tnrcc.state.tx.us), meteorologists set criteria for making predictions. the Several Environmental Monitoring Information Systems (EMIS) have been developed worldwide for assisting environmentalists in their tasks. These systems vary from platforms for integrating heterogeneous data sources, to real- time monitoring systems. For example, the New Zealand Distributed Information System (NZDIS) is an agent - based architecture for integrating environmental information systems (Purvis et al. 2003). Similarly, the InfoSleuth project used agents for querying distributed environmental data-clusters in a transparent way (Nodine et al. 2000) and Java Agents for Monitoring and Management use a collection of software agents that can perform various administrative tasks in a monitoring network (Tierney et al. 2000). Other approaches towards EMIS include the Knowledge -based Environmental Data Analysis Assistant project , which provides an interface between the user and off- the- shelf analysis packages for off- line study (Fine 1998) and DNEMO, a multi-agent system for managing air quality in real- time (Kalapanidas & Avouris 2002). These systems incorporate domain knowledge and their reasoning capabilities are deployed in the form of expert systems, case-based reasoning, or knowledge bases. The system described in this paper, adapts a different approach since it employs data mining techniques for adding customized intelligence into an EMIS. The system, 2 called O3RTAA, is developed as a multi- agent system. Several software agents co(cid:150) operate in a distributed agent society, in order to monitor both meteorological and air (cid:150) pollutants attributes in an effort to evaluate air quality and, ultimately, to trigger alarms. O3RTAA relies on the Agent Paradigm for building intelligent software applications, while taking advantage of Machine Learning algorithms and Data Mining methodologies for extracting knowledge. The implemented system is equipped with powerful, advanced features, such as measurement validation, missing measurement estimation and custom alarm identification, while it also performs more rudimentary tasks, such as data monitoring, storage, and access. The approach The system developed, improves existing environmental monitoring systems by adding customized intelligence into their modules. Our approach is to couple the software agent paradigm with the knowledge discovery roadmap, in order to provide Intelligent Environmental Software Applications. This approach has been enabled by the use of Agent Academy, an integrated platform for creating intell igent agents, with training and retraining capabilities. (Agent Academy Consortium 2000 ) According to the software agent paradigm (Jennings et al. 1998), agents in our system are autonomous problem- solvers that co-operate to achieve the overall goals of the system. Thus, certain system goals are assigned to specific agents. Advanced tasks, such as incoming measurement validation or custom alarm identification, are performed with the use of decision models discovered using data mining algorithms. In general, the knowledge discovery roadmap is used for identifying useful patterns in vast volumes of data. In the case of environmental systems, there is certainly an abundance of data. In our approach, interesting patterns hidden in environmental data sets are discovered and subsequently embedded into our system, essentially adapting the problem- solving method to local conditions. As a consequence, decision- making is performed more accurately since the characteristics of the problem at hand may differ from general trends or (cid:145)rules of thumb(cid:146). 3 In the following sections the approach for developing an agent-based environmental monitoring system is described. The system(cid:146)s functionality and architecture are detailed and deployment steps are outlined. Functional Description The overall goal of O3RTAA is to monitor air -quality data, including pollutants(cid:146) distributions, measured by a single meteorological station. Currently, the station(cid:146)s field sensors measure these attributes and human experts are responsible for assess ing these measurements and identifying possible alarms. Our system intervenes between the sensors and the experts and undertakes several tasks in order to assist humans in their evaluation. Besides the usual housekeeping tasks, such as the updating of the database with incoming measurements, O3RTAA is empowered with advanced features including measurement validation, estimation of missing values, and custom alarm identification. These advanced features are enabled through the exploitation of data mining tec hniques. - The system operates between the field sensors and human experts in order to achieve specific goals, organized in three layers, as shown in Figure 1. The system goals form a pyramid, as the success of higher- level goals depends on the fulfillment o f lower- level ones. 4 System Goals Agent Roles Distribution Layer Alarm distribution User profiling Management Layer Data analysis & storing Alarm identification D M Distribution Agents Alarm distribution to appropriate users based on their profiles Alarm Agents Formal alarm triggering Custom alarm identification Database Agents Database updates Contribution Layer Measurement caption Data conditioning-verification C Diagnosis Agents Measurement validation Estimation of missing or erroneous values Take in Figure 1 Caption: System goals and corresponding agent roles. At the first layer, the Contribution Layer, system goals related to preprocessing activities are gathered. Preprocessing includes efficient measurement caption, incoming data- series verification, possible malfunctions identification and restoration, and, finally, delivery of preprocessed measurement values. These tasks are assigned to the diagnosis agent role. The second layer of goals, the Management Layer, is responsible for the manipulation of the preprocessed measurement values arriving from the contribution layer. Its major objective is the identification of alarms. There are two types of alarms: a) the (cid:147)formal alarms(cid:148), regulated by law- imposed thresholds, and b) the (cid:147)custom alarms(cid:148), defined by user requirements and taking under account local phenomena and trends. Alarm agent and database agent roles deliver these tasks in close collaboration. At the top level, the Distribution Layer, goals are related to the distribution of the identified alarms to the appropriate recipients, based on previously described profiles 5 of the interested parties. The alarms triggered at the management layer are resolved and finally delivered to the appropriate recipients at the manner they have specified (i.e., email message, SMS, etc). System Architecture The implemented multi-agent system is shown in Figure 2. Agents are organized in three layers, contribution, management and distribution, following the classification of system goals discussed in the previous section. Thick arrows below the agent layers indicate the critical tasks realized through each one of them. Contribution Management Distribution Sensor 1 Diagnosis Agent 1 Sensor 2 Diagnosis Agent 2 Sensor n Diagnosis Agent n Incoming Measurement Validation Missing Values Estimation Alarm Agent Database Agent Measurements Database Custom Alarm Identification Distribution Agent User A User B Use r Profiles Formal Alarm Triggering Alarm Distribution Database Updates Contribution Management Distribution Take in Figure 2. Caption: Agent System Architecture and related critical tasks. 6 Information flows from field sensors (on the left in Figure 2) to the users (on the right) through the three agent layers. Air -quality measurements arrive into the system from the sensors. Diagnosis Agents capture them, and after the validation process, deliver them to the Management layer. The Alarm Agent receives the validated measurements and determines whether a formal or custom alarm must be issued. The validated measurements are stored into the database for future use by the Database Agent. Possible alarms are forwarded to the Distribut ion Agent, which delivers them in the appropriate format to the corresponding end - users. Diagnosis Agent Type Diagnosis Agents are in charge of monitoring various air quality attributes including pollutants emissions and meteorological attributes. Each one of the Diagnosis Agent instances is assigned to monitor a certain field sensor. For the developed system there are eleven attributes monitored: SO2 (Sulfur dioxide), O3 (Ozone), NO (Nitrogen oxide), NO2 (Nitrogen dioxide), NOX (Nitrogen oxides), VEL (Wind velocity), DIR (Wind direction) , TEM (Temperature), HR (Relative humidity), RAD (Radiation), and PRE (Pressure). Diagnosis agents are also responsible for ensuring the efficient operation of sensors. In case of a sensor breakdown, diagnosis agents are in charge of estimating the missing values. 7 Process message Reply with current value Yes Measurement request No Reply: (cid:147)Not understood(cid:148) No Incoming measurement Yes Incoming Measurement Validation Valid Measurement Yes Sensor breakdown check Semantic Representation Missing Value Estimation Send measurement to Alarm Agent Take in Figure 3 Caption: Diagnosis Agent type internal structure. (Reasoning Engines are in bold) The internal structure of the Diagnosis Agent type is shown in Figure 3. When a message is received by a diagnosis agent it is checked. If it is a measurement request by another agent, the diagnosis agent will respond by sending the value of its current 8 measurement. If a new measurement has arrived, it is checked for its validity. In any other case, the incoming messa ge is not understood and the agent responds with an appropriate message. The incoming measurement validation (IMV) procedure involves the application of the corresponding inference engine. The IMV engine runs a decision model extracted with the use of data mining on historical data. The outcome of this decision model is the classification of the incoming measurement either as (cid:145)valid(cid:146) or (cid:145)invalid(cid:146). In the first case, the valid measurement is preprocessed in a semantic way. Qualitative interpretations of the real value are calculated, such as value range, trend, or persistence. The real measurement along with the qualitative attributes is sent to the A larm Agent. When the measurement is classified as invalid, the Missing Value Estimation (MVE) rule engine is activated. This rule engine incorporates an inductive decision strategy discovered also by performing data mining on historical data. The MVE engine estimates the missing value level in a qualitative form (i.e. (cid:145)low value(cid:146)). The qualitative indication of the missing measurement is forwarded to the Alarm Agent. When a Diagnosis Agent identifies that the sensor(cid:146)s measurements are persistently invalid, triggers a sensor malfunction message to the alarm agent. The Diagnosis Agent behavior implements JADE(cid:146)s cyclic behavior. This is indicated in Figure 3 with the dotted arrow connecting the end state to the starting node. Alarm Agent Type Alarm Agents are responsible for triggering formal alarms and custom alarms. Formal alarms are the ones imposed by law, indicating dangerous situations in the atmosphere exceeding legal thresholds. Custom alarms are alerts for the system users about situations of their concern. In the present implementation custom alarms warn environmentalists for events based on their scientific interest related to ozone pollution. An expanded version of the system may include other type of custom alarms for patients, public administration, or industry, among others. 9 Process message Reply: (cid:147)Not understood(cid:148) No Measurement from sensor Yes No Add to tuple Tuple completed Yes Send tuple to Database Agent Formal Alarm Triggering Custom Alarm Identification Alarm exists Yes Send Alarm(s) to Distribution Agents Take in Figure 4 Caption: Alarm Agent type internal structure. (Reasoning Engines are in bold) No 10 The Alarm Agent workflow is shown in Figure 4. Alarm Agent gathers the measurements coming from field sensors through the Contribution Layer.As the Alarm Agent receives the validated measurements from the Diagnosis Agent, a tuple (record) of all concurrent measurements is created. When the tuple is completed, the Alarm Agent performs three parallel activities: - It sends the measurements to the Database Agent in order for them to be stored to the Database. - It may trigger (cid:145)formal alarms (cid:146). This activity involves the application of an inference engine for Formal Alarm Triggering (FAT Engine). - It may identify and subsequently issue a custom alarm through the Identification of Custom Alarms (ICA) engine. The ICA rule engine implements a dec ision model extracted using data mining techniques. Whenever Formal or Custom alarms are identified, appropriate messages are forwarded to the Distribution Agent. Note that the behavior of the Alarm Agent is also cyclic. Database Agent Type The Database Agent is responsible for updating environmental databases with data from field sensors. This task, although trivial, is vital for the system performance, as it relieves humans from manipulating all this amount of information. The Database Agent receives a message from the Alarm Agent, containing the measurement tuple. It establishes a connection to the related databases and stores all information in the appropriate format to the corresponding table. Distribution Agent Type The Distribution Agent pushes the alarms raised by the alarm agent to the appropriate users. As an alarm message is received, the Distribution Agent queries user profiles for selecting target users interested in the alarm and selects the appropriate medium of notification (i.e. email or SMS). As the set of recipients and mediums has been prespecified, the alarm is transformed properly into an alert and finally transmitted to the users. 11 System Deployment The aforementioned agent types have been developed using the Agent Academy platform following a certain procedure discussed in Mitkas et al. 2003. This procedure involves the definition of agent type functions, domain ontology, along with agent interactions, and communication language. Agent Academy Agent Academy is a framework for developing agents empowered with training capabilities exploiting data mining techniques and is distributed under the less-GPL license. (Agent Academy Consortium 2000, Mitkas et al. 2002). Agent Academy facilitates the whole procedure for developing a multi-agent community. Agent Academy supports the creation of agents with limited initial referenc ing capabilities, along with a certain agent training process targeting to augment agent intelligence efficiently, through the embedding of data(cid:150)driven decision strategie s into them (Athanasiadis et al. 2003b). Technologies adopted The development of O3RTAA involved a variety of technologies. The JADE platform was used for agent creation (Bellifemine et al. 2000) and JESS engine for rule execution (Friedman-Hill 2003). Ont ology design and specification was done with ProtØgØ 2000 Ontology Editor (Grosso et al. 1999). Data mining experiments were performed using the core of the WEKA tool for knowledge analysis (Witten & Frank 1999) and PMML format was selected for knowledge model representation (Data Mining Group 2001). FIPA standards were adopted for agent communication (FIPA 2000). Information flow among agents is structured in agent messages, while rule engines support data-driven decision- making. Agent Ontology and Messaging In our system, the content of agent messages is structured using a common ontology, created with the ProtØgØ 2000 ontology editor. Part of the developed ontology is shown in Figure 5, containing the main concepts of the system. The slots of the 12 various concepts have been configured in order to contain the appropriate information communicated by the agents. For example, concept (cid:145)Pollutants(cid:146) has the following slots: value, level, and variability for describing a measurement in both quantitative and qualitative form. Meteorological Station Alarms Measurements Station Info Formal Custom Pollutants T ime Meteorological CO NO2 SO2 NO O3 NOX Temperature Pressure Wind Relative Humidity Speed Direction Take in Figure 5 Caption: Main concept structure as a part of the domain ontology. Information shifts between agent layers via messages communicated among agent instances. The ontology is exported in RDFS format, which is compatible with JADE agents. The agent communication language is FIPA-ACL and a sample message between a Diagnosis Agent and the Alarm agent is shown in Figure 6. Using the implemented ontology, the ozone Diagnosis Agent reports its measurement to the alarm agent, as needed. Agent predicate concept (cid:145)sendMeasurement(cid:146) is used for informing the Alarm Agent about a measurement and has two slots: one is instance of the (cid:145)TimeStamp(cid:146) concept and the other an instance of the (cid:145)O3(cid:146) concept. Note that O3 concept inherits its slots from t he Pollutants concept. In a similar way, all information is exchanged between agents, conforming to FIPA specifications and realizing the developed domain ontology. 13 Contribution Diagnosis Agent Content: ((sendMeasurement (TimeStamp :date 01/06/2001 :time 08:30) (O3 :value 53.00 :level low :variability increasing) )) Management Alarm Agent Take in Figure 6 Caption: Ozone Diagnosis Agent reports measurement. Agent Decision Making Models to the Alarm Agent the current Agent decision- making is the most critical part of the system as it is related with all advanced features of the system. O3RTAA contains four different reasoning engines. IVM, MVE and ICA Engines realize inductive decision models and FAT Engine realizes a deductive decision model. Inductive decision models are those created using data mining techniques and incorporating data-driven knowledge into the system. In general, the goal of the data mining procedure is to reveal interesting patterns from data volumes and use them for future decision making. A predictive model is built based on these patterns . Predictive models are comprised of two parts: the predictor and the response. The predictor consists of a set of indepe ndent attributes used to make the prediction, while the response is the target value or class. Predictive models could be in the form of decision trees, neural networks or association rules. A predictive model can be transformed into logical rules having the form: (cid:145)If assumption then consequence(cid:146) and thus is easy to implement and execute through a Rule Engine. To develop our system, we have used data mining techniques for adding customized intelligence in the form of data-driven decision strategies. For the knowledge extraction process, Agent Academy(cid:146)s Data Miner component was used, which extends the Waikato Environment for Knowledge Analysis (WEKA) tool. Predictive models extracted with the Agent Academy Data Miner are formed using Predictive Model Markup Language (PMML). PMML documents are transformed into JESS rules and finally incorporated into software agents. 14 The test case deployment Historical data coming from the Onda meteorological station, in the Community of Valencia, Spain, were used for creating data-driven rules. More specifically, several meteorological attributes and air -pollutant values, along with validation tags, were recorded on a quarter- hourly basis during years 2000 and 2001. There are about 70,000 records in the volume. Raw measurements have been preprocessed properly in order to create training and validation datasets compliant with agent goals and suitable for data mining. As an example, let us focus on the Incoming Measurement Validation process. The dataset was preprocessed in order to co ntain the corresponding validation tag as the response attribute and the current value of a specific pollutant along with a set of previous values and measures as predictor attributes. These measures are shown in Table 1. The preprocessed dataset was split into two sets. Data recorded in year 2000 were used as the training set and data recorded in 2001 were used as the test set. Quinlan(cid:146)s C4.5 algorithm for decision tree induction (Quinlan 1993) was applied on the data. The resulted decision tree contains 15 leaves, i.e. it can be implemented as a set of fifteen rules. The predictive accuracy of the decision model on the validation set is 99.71%, which is satisfactory. Our data mining experiments are discussed in detail in Athanasiadis et al (2003a,b). O3 O3_30 O3_90 The current ozone value The ozone value 30 min ago The ozone value 90 min ago MinMax60 The difference between the maximum and the minimum ozone value in the last 60 min MinMax150 The difference between the maximum and the minimum ozone value in the last 150 O3va l min The corresponding validation tag (valid/erroneous) Take in Table 1 Caption: Attributes used for the validation decision model Summary and future work In this paper we have presented an intelligent environmental monitoring system, developed with software agents and using data mining techniques for adding customized intelligence into them. System goals have been assigned successfully to 15 agents, which act as media tors and deliver validated information to the appropriate stakeholders. Agent communication and semantic representation of information is performed using state of the art tools. System customization has been based on the application of data mining techniques on historical environmental data for adding data-driven intellige nce. The use of C4.5 algorithm yielded trustworthy decision models for validating incoming measurements, estimating the erroneous ones and identifying custom alarms in the described application. The system developed will be installed as a pilot case at the Mediterra nean Centre for Environmental Studies Found a tion (CEAM), Valencia, Spain, in collaboration with IDI-EIKON, Valencia, Spain. Having the system validated for a single meteorological station, future work will be focused on expanding the architecture for covering the whole network. Acknowledgements Authors would like to express their gratitude to the Agent Academy Consortium for their valuable help. Special thanks go to the IDI-EIKON team for their efforts within Agent Academy project to deploy the O3RTAA system and to CEAM for the provision of the ONDA dataset. The Agent Academy project is partially funded by the European Commission under the IST programme (IST-2000-31050). References Agent Academy Consortium (2000), Agent Academy: A Data Mining Framework for Developing Intelligent Agents. (Available at: http://AgentAcademy.iti.gr). Athanasiadis, I. N., Kaburlasos, V. G., Mitkas, P. A. and Petridis, V. (2003), Applying machine learning techniques on air quality data for real- time decision support, in (cid:147)Information Technologies in Environmental Engineering(cid:148), ICSC- NAISO, Canada. Athanasiadis, I. N., Mitkas, P. A., Laleci, G. B.and Kabak, Y. (2003), Embedding data-driven decision strategies on software agents: The case of a multi-agent system for monitoring air-quality indexes, in Jardim- Goncalves, R., Cha J. and Steiger-Garcao A. (eds), (cid:147)Concurrent Engineering: The Vision for the Future Generation in Research and Applications(cid:148), Balkema Publishers, Madeira, Portugal, pp.23-30. Bellifemine, F., Poggi, A. and Rimassa, G. (2000), Developing multi-agent systems with JADE, in (cid:147)Seventh International Workshop on Agent Theories, Architectures and Languages (ATAL-2000)(cid:148), Boston, MA. (Available at: http://jade.cselt.it). Data Mining Group (2002), Predictive Model Mark up Language (PMML), Specifications, (Available at: http://www.dmg.org). 16 Fine, S. S., Smith, W. T., Thorpe, S. R., Wheeler, N. J. M. and Eyth, A. M. (1998), An automated assistant for environmental data analysis, in (cid:147)Fourteenth International Conference on Interactive Information and Processing Systems for Meteorology, Oceanography and Hydrology(cid:148), American Meteorological Society, Phoenix, AZ, pp. 38-40. FIPA (1999), Foundation for Intelligent Physical Agents, Specifications, (Available at: http://www.fipa.org). Friedman-Hill, E. J. (2003), Jess, the expert system shell for the java platform, version 6.1, Sandia National Laboratories, CA. (Available at: http://herzberg.ca.sandia.gov/jess/). Grosso, W. E. et al. (1999), Knowledge modeling at the millennium, The design and evolution of Prot_ eg_e-2000. (Available at:http://protege.stanford.edu). IFIP (1999), Computers and the environment, Working Group 5.11, International Federation for Information Processing. (Available at: http://www.environmatics.org). Jennings, N. R., Sycara, K. and Wooldridge, M. J. (1998), A roadmap of agent research and development, in (cid:147)Autonomous Agents and Multi-Agent Systems 1(cid:148), Kluwer Academic Publishers, Boston, pp. 7-38. Kalapanidas, E. and Avouris, N. (2002), (cid:147)Air quality management using a multi-agent system(cid:148), International Journal of Computer Aided Civil and Infrastructure Engineering 17(2), 119-130. Mitkas, P., Symeonidis, A., Kehagias, D., Athanasiadis, I. et al. (2002), An agent framework for dynamic agent retraining: Agent academy, in B. Stanford-Smith, E. Chiozza and M. Edin, eds, (cid:147)Challenges and Achievements in e-business and e-work(cid:148), Prague, Czech Republic, pp. 757-764. Mitkas, P. A., Symeonidis, A. L., Kehagias, D. and Athanasiadis, I. N. (2003), A framework for constructing multi- agent applications and training intelligent agents, in (cid:147)Fourth International Workshop on Agent-oriented Software Engineering (AOSE-2003). Held at Autonomous Agents and Multi- Agent Systems (AAMAS 2003)(cid:148), Melbourne, Australia. Nodine, M., Fowler, J., Ksiezyk, T., Perry, B., Taylor, M. and Unruh, A. (2000), (cid:147)Active information gathering in InfoSleuth(cid:148), International Journal of Cooperative Information Systems 9(1-2), 3-28. Purvis, M., Cranefield , S., Ward, R., Nowostawski, M., Carter, D. and Bush, G. (2003), (cid:147)A multi-agent system for the integration of distributed environmental information(cid:148), Environmental Modelling and Software 18(6), 565-572. Tierney, B., Crowley, B. et al. (2000), A monitoring sensor management system for grid environments, in (cid:147)High Performance Distributed Computing (HPDC -9)(cid:148), American Meteorological Society, Pittsburg, Pennsylvania. Witten, I. H. and Frank, E. (1999), Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations, Morgan Kaufmann Publishers, USA. 17
1909.06537
1
1909
2019-09-14T05:38:50
Speeding Up Distributed Pseudo-tree Optimization Procedure with Cross Edge Consistency to Solve DCOPs
[ "cs.MA", "cs.AI" ]
Distributed Pseudo-tree Optimization Procedure (DPOP) is a well-known message passing algorithm that has been used to provide optimal solutions of Distributed Constraint Optimization Problems (DCOPs) -- a framework that is designed to optimize constraints in cooperative multi-agent systems. The traditional DCOP formulation does not consider those constraints that must be satisfied (also known as hard constraints), rather it concentrates only on soft constraints. However, the presence of both types of constraints are observed in a number of applications, such as Distributed Radio Link Frequency Assignment and Distributed Event Scheduling, etc. Although the combination of these types of constraints is recently incorporated in DPOP to solve DCOPs, scalability remains an issue for them as finding an optimal solution is NP-hard. Additionally, in DPOP, the agents are arranged as a DFS pseudo-tree. Recently it has been observed that the constructed pseudo-trees in this way often come to be chain-like and greatly impair the algorithm's performance. To address these issues, we develop an algorithm that speeds up the DPOP algorithm by reducing the size of the messages exchanged and increasing parallelism in the pseudo tree. Our empirical evidence suggests that our approach outperforms the state-of-the-art algorithms by a significant margin.
cs.MA
cs
SPEEDING UP DISTRIBUTED PSEUDO-TREE OPTIMIZATION PROCEDURE WITH CROSS EDGE CONSISTENCY TO SOLVE DCOPS 9 1 0 2 p e S 4 1 ] A M . s c [ 1 v 7 3 5 6 0 . 9 0 9 1 : v i X r a Department of Computer Science and Engineering Department of Computer Science and Engineering Department of Computer Science and Engineering Department of Computer Science and Engineering Mashrur Rashik University of Dhaka [email protected] Md. Mamun-or-Rashid University of Dhaka [email protected] Md. Musfiqur Rahman University of Dhaka [email protected] Md. Mosaddek Khan University of Dhaka [email protected] ABSTRACT Distributed Pseudo-tree Optimization Procedure (DPOP) is a well-known message passing algorithm that has been used to provide optimal solutions of Distributed Constraint Optimization Problems (DCOPs) -- a framework that is designed to optimize constraints in cooperative multi-agent systems. The traditional DCOP formulation does not consider those constraints that must be satisfied (also known as hard constraints), rather it concentrates only on soft constraints. However, the presence of both types of constraints are observed in a number of applications, such as Distributed Radio Link Frequency Assignment and Distributed Event Scheduling, etc. Although the combination of these types of constraints is recently incorporated in DPOP to solve DCOPs, scalability remains an issue for them as finding an optimal solution is NP-hard. Additionally, in DPOP, the agents are arranged as a DFS pseudo-tree. Recently it has been observed that the constructed pseudo-trees in this way often come to be chain-like and greatly impair the algorithm's performance. To address these issues, we develop an algorithm that speeds up the DPOP algorithm by reducing the size of the messages exchanged and increasing parallelism in the pseudo tree. Our empirical evidence suggests that our approach outperforms the state-of-the-art algorithms by a significant margin. 1 Introduction Distributed Constraint Optimization Problems (DCOP) are a framework involving multiple agents that are used to interact with one another to achieve a common goal [1]. A number of real world problems, such as distributed event scheduling [2], scheduling smart home devices [3] and allocating tasks in mobile sensor networks [4], can be modelled with this framework. Specifically, a DCOP consists of a number of distributed cost functions which collectively form a global objective function (i.e. the common goal). Each of these cost functions represents a constraint relationship among a set of variables that are controlled by the agents contributing to that constraint. In more detail, each agent is responsible for setting value(s) of its own variable(s) from a finite domain(s). However, they can communicate with their neighbouring agents, and thus can influence value assignment of each other. The goal of a DCOP solution approach is to set every variable to a value from its domain in order to minimize the number of constraint violations or maximize the global objective function. Over the last couple of decades, a number of algorithms have been proposed to solve DCOPs, and they have been primarily classified into two types: incomplete and complete algorithms. The former experiences better computation and communication cost at the expense of solution quality. Among the incomplete DCOP algorithms DBA [5], DSA [6] and Max-Sum [7] are the most notable ones. Although it is obvious that this class of algorithms perform well in terms of computation and communication cost, a good number of applications, such as Wi-Fi Channel Assignment [8], Reactive Network Resilience [9] and many other besides, cannot afford sacrificing the quality of solution. In x5 0 0 1 1 x6 Cost 0 12 3 1 7 0 1 3 (a) A constraint graph representation of a DCOP. Here, the edges having rela- tional operators are the hard constraints. (b) A sample cost table for soft constraint involving variable x5 and x6. Figure 1: Example of a DCOP Instance containing both soft and hard constraints effect, a number of complete DCOP algorithms have been proposed in the literature, and a lot of efforts can be seen to improve those algorithms. This class of algorithms can be further classified as search-based and inference-based algorithms. The former use a search technique to find the optimal solution from a set of possible assignments. Some of the notable search-based complete algorithms are SyncBB [10], ConcFB [11], ADOPT [12]. On the other hand, the latter, such as DPOP [13], Action-GDL [14], BrC-DPOP [15], are based on dynamic programming techniques. Among them, Distributed Pseudo-tree Optimization Procedure (DPOP) has gained particular attention from the DCOP community. This is due to the fact that DPOP requires a linear number of messages compared to the search-based complete algorithms. To date, several DPOP variants have been proposed. Specifically, O-DPOP [16] and MB-DPOP [17] have made improvements in terms of memory requirements of the original algorithm. Then an extension of DPOP, named SS- DPOP [18], improves participating agents' privacy. Whereas, a partially centralized version of DPOP (i.e. PC-DPOP) achieves shorter runtime but sacrifices some privacy [19]. A notable issue with all of the above variants is that they are not able to handle such constraints that must be satisfied (i.e. hard constraints). In contrast, a soft constraint poses a profit/loss for each possible value assignment to its corresponding variables. Nonetheless, the hard constraints are frequently seen in a number of well-known DCOPs, such as distributed Radio Link Frequency Assignment (RLFA)[20] and distributed event scheduling problem[2]. In the wake of this shortcoming, two notable extensions of DPOP, H-DPOP [21] and BrC-DPOP [15], have been proposed. In more detail, H-DPOP reduces the computation cost of DPOP by ruling out infeasible combination of the variables, and thus generating smaller messages. This is done by a Constraint Decision Diagram (CDD), which graphically represents a solution set for n-ary constraints [22]. To do so, H-DPOP performs join and projection operations on CDDs that are computationally expensive. At the same time, it is not possible to fully exploit hard constraints to prune the domain of a variable using this approach. This particular issue has been addressed by BrC-DPOP through the use of Value Reachability Matrix (VRM) which is a representation of a constraint between two variables in the form of a matrix. It is worth noting that similar to the aforementioned DPOP extensions, BrC-DPOP uses depth-first search pseudo tree to graphically represent a DCOP. Notably, it is shown in [23] that a depth first search pseudo tree often results in a chain-like structure thus impairing the performance of the algorithm due to the lack of parallelism. Nevertheless, the algorithm proposed in the paper, the so-called BFS-DPOP, has shown the significance of an alternative graphical representation− breadth-first search pseudo tree. To be exact, BFS-DPOP enhances parallelism, and thus reduces the runtime of the algorithm. However, BFS-DPOP cannot handle hard constraints, and thus is not directly applicable to BrC-DPOP. Against this background, we propose a new variant of the DPOP algorithm, that we call CeC-DPOP. CeC-DPOP takes the advantage of parallelism through the use of BFS pseudo tree as the communication structure. It can also deal with hard constraints. However, unlike BrC-DPOP that enforces branch consistency, CeC-DPOP uses a new form of consistency, namely Cross-edge Consistency (CeC). This particular phenomenon enables CeC-DPOP to produce smaller message size and improve DPOP's runtime of by pruning the domain of the corresponding variables. To be precise, We empirically evaluate the performance of our approach, and observe a significant reduction of runtime, average of 60% by using this technique. 2 X1X2X3X4X5X6X7Soft>==<SoftSoft 2 Background and Problem Formulation A DCOP model can be formally expressed as a tuple (cid:104)A, X, D, F, α(cid:105) where: • A = {a1, a2, ...., ak} is a set of agents. • X = {x1, x2, ...., xn} is a set of variables, where n≥k. • D = {d1, d2, ...., dn} is a set of domains for the variables in X, where di ∈ D is the available domain for the corresponding variable xi ∈ X. • F = {f1, f2, ...., fm} is a set of constraint functions (also known as utility or cost functions). Here, each function fi(xi) depends on a subset of variables xi ⊆ X that can be mentioned as the scope of that function. In order to represent the relationship among the variables in xi, the function fi(xi) denotes the utility value for each possible assignment of those variables. Each constraint fi ∈ F can be hard in which the value combinations that must be avoided are denoted as the cost 0 and the combinations that are allowed have the cost 1. The remaining type is the soft constraint indicating that each value combination results in a finite utility/cost value and need not to be avoided. The dependencies among the variables can be used to construct a constraint graph that has been used to represent DCOPs graphically. In this representation, each variable is associated with a node and connected to each other through an edge. • α : X → A is an onto mapping function that assigns the variables X to the set of agents A. (cid:88) fi∈F X∗ = arg max x fi(xi) (1) Within this model, the main objective of a DCOP algorithm can be expressed as each agent assigning the values to its associated variable(s) from the corresponding domain(s) that can be expressed as X∗, in the pursuit of maximization or minimization of the sum of the utility functions (i.e. the global objective function). In this paper, we are going to consider the maximization problem only (Equation 1). For example, in Figure 1a ,a DCOP instance is graphically represented as a constraint graph. Here, we consider the set of variables X = {x1, x2, ..., x7}, each having domain di = {0, 1}. The cost matrix of the soft constraint involving variables x5 and x6 is showed in figure 1b. The remaining constraints in the graph that are defined by relational operators are hard constraints. As aforementioned, Distributed Pseudo-tree Optimization Procedure is a complete, synchronous message passing algorithm for solving DCOPs. Specially it uses the dynamic programming technique on a DFS pseudo-tree in a distributed manner. DPOP is executed through three phases. In the first phase, a distributed DFS traversal is started from the root(held by an agent) of the constraint graph using the distributed DFS algorithm like in [24]. As a result, a DFS pseudo-tree structure is built where each agent labels its neighbours as parents, pseudo-parents, children or pseudo-children and edges are identified as tree or back edges. For example, after this phase, the constraint graph in Figure 1a will result in a DFS pseudotree like in Figure 2a. The resulting DFS pseudo-tree serves as a communication structure for the subsequent phases of DPOP. The next phase is the Util propagation phase in which each agent, starting from the leaves of the constraint graph, sends UTIL message to its parent. The UTIL message is generated by aggregating the constraint utilities between the current node and the variables in its separator that is the ancestors of the current node that are connected directly to this node or its descendants and also the utilities in the UTIL message received from its children and finally projecting out its own variables by optimizing over them. At last, the value propagation phase is initiated from the root agent. Each agent selects its optimal assignment using the cost function computed in the UTIL propagation phase and the VALUE message received from its parent. Afterwards, each agent broadcasts its assignment to its children. When every agent has chosen its optimal assignment, the algorithm terminates. DPOP can be executed on different branches independently using DFS pseudo-tree as communication structure. Though DPOP produces linear number of messages as mentioned before, message size in this algorithm is exponential. Another notable limitation of the DPOP algorithm is that it does not exploit hard constraint along with soft constraints which has been found useful in many real life DCOP problems. These two situation can be resolved by another algorithm BrC-DPOP proposed by [15]. BrC-DPOP exploits hard constraints by enforcing arc consistency and introducing a weaker form of the path consistency which can be applied along the path of a pseudo-tree in pursuit of reducing message size.The algorithm starts with generating a pseudo-tree structure followed by a path construction Phase which is later used to get the knowledge of the direct paths from each agent to its parent and pseudo-parents. In the next phase, arc consistency is enforced in a distributed environment.Then the most important phase is executed where branch consistency is exploited in a distributed way. The aim of this phase is to ensure mutual reachability of every pair of values of an agent and its pseudo-parents considering every pseudo-tree path between them. Finally, the UTIL and VALUE propagation phase are executed considering the updates of the pseudo-tree. The advantages of BrC-DPOP includes smaller message size due to BrC propagation enforcement as well as faster runtime since it prunes the values of the variables. Though 3 (a) DFS Pseudo-tree Figure 2: DCOP Pseudo-trees (b) BFS Pseudo-tree Algorithm 1 Path-Construction(Gbf s, P, C) Input: Pseudo tree Gbf s, set of parents P, set of child C. Output: A list containing path information from current variable to enforce cross-edge consistency. 1: for each cross edge (xi, xj) of Gbf s do xl ← LCA(xi, xj) 2: send N EXT _U P DAT E(xl, xi) to P i 3: 4: if xi is not an end point of a cross edge then 5: 6: while cnt_nexti < Ci do 7: N EXT i ← N EXT i ∪ (xl, xc) 8: 9: cnt_nexti ← cnt_nexti + 1 10: 11: if N EXT i not equals NULL then 12: 13: 14: send complete(xi) to P i send N EXT _U P DAT E(N U LL, xi) to P i if receive N EXT (xl, xc) from xc ∈ Ci then if receive complete(xc) from xc ∈ Ci then for each xl such that (xl, xc) ∈ N EXT i do send N EXT _U P DAT E(xl, xi) to P i BrC-DPOP improves the DPOP algorithm to a great scale, the communication structure is DFS pseudo-tree, and as previously mentioned often becomes chain-like in many experiments for example in Figure 2a. This condition greatly reduces performances of solving DCOPs by Brc-DPOP or other variants of DPOP that use DFS pseudo-tree as the communication structure. To deal with this drawback, [23] propose a variant of DPOP algorithm (the so-called BFS-DPOP) which uses the Breadth First Search (BFS) pseudo-tree as the communication structure. In more detail, BFS-DPOP operates on Breadth First Search (BFS) pseudo-tree that is used as the communication structure intending to increase parallelism. This is because it produces more branches than that of the DFS counterpart. Here, Figure 2b depicts the transformed BFS pseudo-tree of the corresponding constraint graph of Figure 1a. In BFS-DPOP, following the construction of BFS Pseudo-tree, the cluster removal phase occurs wherein the allocation of cross-edges are decided so that it can reduce the maximal message size as much as possible by the disposal of cross-edge constraints. Finally, the UTIL and VALUE propagation phase is executed on the BFS Pseudo-tree considering the changes occurred in the previous phases. Even though BFS-DPOP experiences shorter communication paths, and hence less communication time, through the use of BFS pseudo-tree, the algorithm produces messages with exponential size as the system grows, as in traditional DPOP. Moreover, as aforementioned, this algorithm can not deal with hard constraints which is utilized in BrC-DPOP by enforcing branch consistency. On the other hand, BFS-DPOP is not suitable for exploiting branch consistency. In light of the above background, we address these issues in the section that follows. 3 Cross-Edge Consistent DPOP (CeC-DPOP) CeC-DPOP improves DPOP by enforcing cross-edge consistency that reduces the domain size of the variables of a DCOP. In effect, it reduces the message size and runtime of the DPOP algorithm. Moreover, unlike the traditional DPOP algorithms, CeC-DPOP uses BFS pseudo tree instead of a DFS pseudo tree in order to take its inherent benefits of increased parallelism and shorter tree depth. Specifically, this algorithm comprises of four phases, BFS pseudo tree construction, consistency enforcement, UTIL propagation and VALUE propagation phase. 4 X1X2X3X4X5X6X7>==<SoftSoftSoftX1X2X3X4X5X6X7Soft>==<SoftSoft (a) A part of pseudo-tree depicted in Figure 2b, used as an example to enforce cross-edge consistency after pairs arc- (b) Consistent consistency enforcement. Here, an arrow indicates an allowable pair Figure 4: Simulation of the algorithm (c) Consistent pairs along cross-edge af- ter applying CeC-DPOP which shows an overall 76% domain size reduction Initially, a pseudo tree is constructed from the constraint graph. In order to generate the corresponding BFS pseudo tree, we use the same method as prescribed in the BFS-DPOP algorithm. For example, Figure 2b illustrates a sample BFS pseudo tree of the constraint graph depicted in Figure 1a. For simplicity, we use a part (Figure 4a) of the pseudo tree of Figure 2b as the worked example of our algorithm. Having a BFS pseudo tree Gbf s constructed, CeC-DPOP enforces arc-consistency. This phase uses the distributed Arc-Consistency (AC) algorithm that is introduced in BrC-DPOP algorithm. This algorithm results in a reduced domain for all the variables having hard constraints, as shown in Figure 4b, where domain of each variable is {0, 1, 2, 3, 4}. After arc-consistency is enforced, CeC-DPOP enforces a new form of consistency (i.e. the so-called cross edge consistency) on the BFS pseudo tree. To do so, we need the lowest common ancestor LCA(xi, xj) for every pair of variables xi and xj in Gbf s. To find the LCA of every pair of variables, we followed the distributed algorithm shown in [25]. In order to represent hard constraints we use consistency matrices, where a matrix Mij represents a hard constraint between variables, xi and xj. The consistency matrix between x1 and x2, which represents the constraint x1 < x2 as shown in Figure 3.   M12 = 0 1 2 3 4 0 0 0 0 0 0 1 1 0 0 0 0 2 1 1 0 0 0 3 1 1 1 0 0 4 1 1 1 1 0 Figure 3: An example consistency matrix (M12) between x1 and x2 where a 1 along a particular row (ri) and column (ci) indicates that x1 = ri and x2 = ci is allowable for x1 < x2 Now the algorithm enforces cross edge consistency on the pseudo tree Gbf s. For this, we need to construct a path for each cross-edge in Gbf s (Algorithm 1). The BFS pseudo tree Gbf s, parent set P and set of child C are the inputs of the algorithm. Throughout the algorithm, we construct a N EXTi list containing information in the form of (xl, xc). It informs the current agent xi about the next agent xc to enforce cross-edge consistency for an edge whose endpoints have LCA at xl. The for loop in line 1 selects a cross edge having one end point xi from Gbf s, and sends a message N EXT _U P DAT E(xl, xi) to its parent Pi. This message contains information about the LCA xl of two variables xi and xj and the current variable xi. To do this, line 2 computes a LCA, xl of xi with another variable xj with whom it holds cross edge. Then in line 3 xi sends a N EXT _U P DAT E(xl, xi) to its parent Pi. In line 4, CeC-DPOP checks whether xi is a member of a cross edge, and if this is not the case, it sends a N EXT _U P DAT E(N U LL, xi) to parent Pi. Here, NULL indicates that xi is not an end point of any cross edge. In our exemplary pseudo tree of Figure 4a, x5 computes a LCA (i.e. x1) for its cross edge connecting x5 and x6 and then sends N EXT _U P DAT E(x1, x5) to its parent x2. Afterwards, the while loop in line 6 compares a counter variable, cnt_nexti with the child count of current variable (i.e. Ci) to check whether the current variable received a N EXT _U P DAT E message from each child in Ci. Within this loop, if a N EXT _U P DAT E(xl, xc) is received from a child, appends (xl, xc) to the list, N EXTi (line 7-8). Then line 9 checks for any complete(xc) received from a child. This message informs the current variable xi 5 X1X2X3X5X6Soft>==<X1 < X20011223344X2 = X50011223344X3 > X60011223344X1 = X30011223344X5 - X60011223344Possible assignments52=25After enforcing cross-edge consistency 6% reduction76% // CeC message propagation initiated by root Algorithm 2 Cross-Edge-Consistency-Propagation(Gbf s, M, C, N EXT ) Input: Pseudo tree Gbf s, set of consistency matrix M, set of child C, next list N EXT . Output: A cross edge consistent pseudo tree. 1: if xi is root then 2: 3: 4: if received CeC(xp, M pl) from xp such that xp is parent of xi then // propagating the updated consistency matrix 5: 6: 7: 8: 9: 10: 11: 12: for each xc ∈ Ci such that xc received no CeCi message do 13: 14: for each ceij ∈ CEi such that xl equals LCAij do 15: 16: send CeC(xi, NULL) to xc M lj ← M jl M ij ← M il × M lj // computing reduced domain along cross-edge // matrix transpose if xc not equals NULL then send CeC(xi, M il) to xc if xl equals xi then M il ← M ii M il ← M ip × M pl else // initializing to unary constraint for each xc in Ci do send CeC(xi, M ii) to xc for each (xl, xc) ∈ N EXT i do T that path construction for the sub tree rooted at xc is complete. For each received complete(xc) message, line 10 increments cnt_nexti by 1. The while loop terminates when each child xc in Ci sends a complete(xc) message. In our example, after receiving N EXT _U P DAT E(x1, x5) from x5, x2 appends (x1, x5) to N EXT2. Now, in line 11, the algorithm checks whether N EXTi is not empty. If this is true, the for loop in line 12 selects each (xl, xc) pair from the N EXTi list and line 13 sends a N EXT _U P DAT E(xl, xi) message to Pi. Next, the algorithm terminates after sending a complete(xi) message to Pi after line 14. In this context, in our example after x5 sends a next message to x2, x5 generates a complete(x5) message and sends it to x2. Upon receiving a complete message from its only child x2, increments cnt_nexti by 1 and the while loop of line 6 terminates. In our example of Figure 4a, x2 sends N EXT _U P DAT E(x1, x2) to x1. After receiving this, x1 obtains information about its next child x2 to enforce cross edge consistency. At the same time, x2 obtains information about x5. Thus, a path from x1 to x5 through the variable x2 is established. Similarly, another path from x1 to x6 through the variable x3 is established. Finally, we enforce cross edge consistency on the path that is established on the pseudo tree (Algorithm 2). The BFS pseudo tree Gbf s, set of consistency matrices M, set of child C and the N EXT list are the inputs of the algorithm. The algorithm works as follows. Line 1 of the algorithm checks whether the current variable xi is root. If this true, it initiates CeC message propagation by iterating every child using the for loop in line 2. Line 3 then sends a CeC(xi, Mii) to every xc in Ci, where xi is the variable which sent the message along with its consistency matrix Mii. Line 4 of the algorithm checks whether any CeC message has been received from its parent. If this is the case, line 5 iterates over each pair (xl, xc) of the N EXTi list to propagate CeC message. For this purpose, line 6-7 checks whether the current variable equals to LCA xl of a cross edge in the subtree. If this is the case, it initializes Mil with its unary constraint Mii which represents the domain of the current variable xi. Otherwise, line 8-9 computes Mil, which is a multiplication of Mip and Mpl. Next, line 10 checks whether xc is not null. If this is true, line 11 sends a CeC(xi, Mil) message to xc. In our example of Figure 4a, x1 initializes CeC message propagation and sends a CeC(x1, M11) to both x2 and x3. When x2 receives CeC(x1, M11) from x1, it computes M21 by multiplying M21 with M11 and sends this new consistency matrix to its child x5 through a CeC(x2, M21) message. Now, line 12-13 of the algorithm checks whether any child exists that did not receive any CeC message. If this is true, xi sends a CeC(xi, N U LL) to that child. Line 14-16 finally computes the consistency matrices along each cross edge by iterating over every cross edge and multiplying the matrices obtained for each end point of the cross edge. In our example, after x5 receives a CeC(x2, M21) from x2, it computes M51. In a similar way x6 computes M61. To obtain the reduced set of assignable pairs, CeC-DPOP multiplies M51 with M16. The output for our simulation is shown in Figure 4c. Here a total number of allowable pairs is 52 = 25. After cross-edge consistency is enforced, the number of allowable pairs is reduced to 6. Hence, the reduction is 25−6 25 = 0.76, which is a 76% reduction in the total number of assignable pairs along x5 and x6. After cross edge consistency is enforced, we obtain a set of variables with reduced domain size. Now, we execute the UTIL and VALUE propagation phase. These two steps correspond to the UTIL and VALUE propagation phase of BFS-DPOP algorithm. 4 Complexity Analysis For enforcing cross-edge consistency we have constructed a path and next enforced arc-consistency. The path con- struction phase needs to send a message containing information about its subtree to its parent for each endpoint of the 6 (a) number of variables vs runtime (random graph) (b) domain size vs runtime (random graph) (c) graph density vs runtime (random graph) (d) number of variables vs runtime (distributed RLFA prob- lem) Figure 5: Experimental results for random graphs and the distributed RLFA problem cross-edge. Therefore, the complexity of this phase is O(CE log(X)), where CE is the number of cross-edge and X is the number of variables. The path construction phase requires the lowest common ancestor for each pair of nodes, which is found in a preprocessing phase having a complexity of O(log(X)). The next phase is the arc-consistency enforcement phase. In this phase, each hard constraints are evaluated to check whether the domain of both variables connecting the endpoints is consistent with each other. Given the number of hard constraints is CH and the average domain of each variable is d, the complexity of this phase is O(CH d3). Here, in order to check whether each value in the domain of an endpoint is consistent with every value of the other endpoint, it requires three nested loops thus resulting in d3 computations. The final phase is enforcing cross-edge consistency. In this phase, each agent waits for its parent agent to send a CeC message which it uses to find the final cross-edge consistent matrix which requires a complexity of O(d3) which is required for the multiplication of two matrices. Apart from regular matrix multiplication, entry-wise matrix multiplication has a complexity of O(d2). The process continues for each variable, and as such the total complexity of cross-edge consistency enforcement phase is O(X(d3 + d2)). The arc-consistency enforcement phase requires O(dX) messages, where the size of each message is O(d). In each step of arc-consistency enforcement, the domain information of a variable is only required to be propagated. Therefore, the cross-edge consistency enforcement phase requires CH messages and the size of each message is O(d2). In this phase, we only propagate CeC messages which contain the consistency matrices and the size of a message depends on the size of these matrices. 5 Experimental Results We now empirically evaluate how much performance improvement can be attained using CeC-DPOP in comparison to the original DPOP algorithm and two important variants of DPOP named BFS-DPOP and BrC-DPOP. Unlike CeC-DPOP, the original DPOP uses DFS pseudo-tree as the communication structure and do not actively exploit hard constraints. Therefore, it is reasonable to observe the attributes of CeC-DPOP (i.e. inclusion of soft constraints along 7 with hard constraints and use of BFS pseudo-tree as the communication structure) with respect to the original DPOP. Additionally, We consider with BFS-DPOP algorithm as a benchmark because it also uses BFS pseudo-tree as the communication structure. Finally, we compare CeC-DPOP with BrC-DPOP as both the algorithms can deal with DCOPs having both type of constraints. Note that another DPOP variants H-DPOP has not been considered as a benchmark because it already shown in the work of BrC-DPOP that it is outperformed for its high runtime. To benchmark the runtime of our algorithm CeC-DPOP as well as the benchmarks, we run our experiments on two different types of DCOP settings: random constraint graph and the distributed RLFA problems. These choices are made following the experimental settings of BrC-DPOP. In case of random DCOPs, the runtime of the algorithms have been reported varying three parameters: number of variables, their domain size and graph density (i.e. the ratio of the constraint number and n ∗ (n − 1)/2 where n is the number of varaibles). For the first parameter, we vary the number of nodes from 5 to 30 in Figure 5a setting the domain size, D = 10 and edges are created by taking pairs of variables randomly and connecting them considering fix graph density, ρ = 0.5. For the second parameter, we execute the algorithms by changing domain size from 5 to 30 in Figure 5b where we consider the parameters number of variables X at 20 and graph density ρ at 0.5. Then for the third parameter, we increase the graph density from 0.1 to 0.9 in Figure 5c setting the number of variables and domain size as above mentioned. In case of Distributed RLFA Problem, we observe runtime by varying number of nodes from 5 to 30 in Figure 5d and setting other parameters with the same as the previous setting. In both type of settings, we generated 30 instances and calculated the average runtime that we found by running each of the algorithms. All of the experiments were performed on a simulator implemented in an Intel i7 Octacore 3.4GHz machine with 16GB of RAM. Our experimental results for solving random DCOPs are depicted in Figures 5a -- 5c. In so doing, we generate three synthesized graphs. Specifically, we use hard constraints that are either "less than", "greater than" or "equal" alongside soft constraints for which we randomly generated utility values from the range [0, 100]. In Figure 5a, we observe that runtime of Cec-DPOP increases in a steady way with respect to other algorithms as we increase the number of nodes. The result can be understood by observing the fact that the larger the constraint graph, the greater the advantages in parallelism and communication efficiency are found by CeC-DPOP. Another notable advantage of CeC is that it can avoid performing operations on the values pruned during the consistency enforcement phase. As a result, our algorithm is slightly faster than both BFS-DPOP and BrC-DPOP. More precisely, we observer that CeC-DPOP experiences 17 − 81% reduction in runtime compared to DPOP, 25 − 62% compared to Bfs-DPOP and 36 − 66% compared to Brc-DPOP. Figure 5b illustrates the results based on the next setting that is varying the domain size while setting the number of nodes and graph density, we observe that runtime of Cec-DPOP increases at smaller rate than that of other algorithms. To be precise, we find 49 − 75% smaller runtime than DPOP, 42 − 65% than Bfs-DPOP and 22 − 48% than Brc-DPOP. The reason behind this performance is that when domain size increases, more values in each domain is pruned by CeC-DPOP through consistency enforcement producing UTIL message of smaller dimension. As a result, the required time to compute messages decreases at a significant rate. Though Brc-DPOP have relatively smaller runtime than DPOP and BFS-DPOP for enforcing branch consistency, Cec-DPOP is always the winner through enforcing cross edge consistency. In the third experimental setting, we vary the the graph density and set the other two parameters (Figure 5c). we observe a notable performance gain of CeC-DPOP in terms of runtime compared to other algorithms. To be exact, we detect 47 − 85%, 35 − 84% and 10 − 50% reduction of runtime with comparison to DPOP, Bfs-DPOP and Brc- DPOP, respectively. This behavior can be explained when we notice that CeC-DPOP uses BFS pseudo-tree as the communication structure which is generated from dense constraint graph resulting more branches. As a result, more parallelism is experienced. Another reason is that the number of edges is relatively higher in the dense constraint graphs creating the opportunity of cross edge consistency enforcement at a significant level. Thus, more domain values are pruned and more shorter messages are produces resulting in a smaller computation time. Overall, a great reduction in runtime is observed. Another important behavior that should be mentioned is phase transition occurs for DPOP, BFS-DPOP and BrC-DPOP in Figure 5a when number of variables goes across 20. DPOP and BFS-DPOP experiences phase transition in Figure 5b when domain size increase towards 20. In both cases, transition for CeC-DPOP is relatively smooth than other algorithms. As aforementioned, Distributed RLFA Problem is considered as the second type of problem to evaluate CeC-DPOP against the benchmarking algorithms. The distributed RLFA problem [20] consists of a set of channels, each having a transmitter and receiver at both ends. The aim is to assign a frequency from a given set F by minimizing the total interference at the receivers below an acceptable level and at the same time using as few and also as low frequencies as possible. For our experiment, we mapped a transmitter as a variable and for simplicity, we assigned a single agent to a variable. The domain of a variable consists of frequencies (chosen from available spectral resources) that can be assigned to a variable. The interference between transmitter is modeled as a constraint of the form xi − xj > s where xi, xj are variables and s is a random frequency separation. We varied the number of variables in Figure 5d and observed the runtime with DPOP, BFS-DPOP, and BrC-DPOP. We set the domain size, D = 10, s ∈ {3, 4} and graph 8 density, ρ = 0.5. Significantly, the results are similar as observed to that in case of random DCOPs. More specifically, CeC-DPOP outperforms other algorithms contributing 27− 75%, 12− 66% and 16− 35% reduction in runtime relative to DPOP, Bfs-DPOP and Brc-DPOP. It is worth mentioning that in the distributed RLFA problem and also in random DCOPs that was previously described, CeC-DPOP reduces message size around 5% than Brc-DPOP. 6 Conclusion We present a new algorithm, CeC-DPOP, that significantly reduces the runtime of the DPOP algorithm that can be used to solve DCOPs having both soft and hard constraints. We empirically observe that our algorithm performs around 10-85% faster than the state of the art algorithms. This is mainly possible because of the introduction of cross edge consistency. In addition, the use of the BFS pseudo tree as a communication structure enables CeC-DPOP to perform even faster. As a result, CeC-DPOP extends the use of DPOP in solving real-life problems that include both hard and soft constraints. In future work, we intend to investigate whether our approach can be applied to other DPOP extensions, as well as how much speedup can be achieved for them. References [1] M. Yokoo, E. H. Durfee, T. Ishida, and K. Kuwabara, "The distributed constraint satisfaction problem: Formal- ization and algorithms," IEEE Transactions on knowledge and data engineering, vol. 10, no. 5, pp. 673 -- 685, 1998. [2] R. T. Maheswaran, M. Tambe, E. Bowring, J. P. Pearce, and P. Varakantham, "Taking dcop to the real world: Efficient complete solutions for distributed multi-event scheduling," in Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems-Volume 1, pp. 310 -- 317, IEEE Computer Society, 2004. [3] F. Fioretto, W. Yeoh, and E. Pontelli, "A multiagent system approach to scheduling devices in smart homes," in Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, pp. 981 -- 989, International Foundation for Autonomous Agents and Multiagent Systems, 2017. [4] M. Jain, M. Taylor, M. Tambe, and M. Yokoo, "Dcops meet the real world: Exploring unknown reward matri- ces with applications to mobile sensor networks," in Twenty-First International Joint Conference on Artificial Intelligence, 2009. [5] K. Hirayama and M. Yokoo, "The distributed breakout algorithms," Artificial Intelligence, vol. 161, no. 1-2, pp. 89 -- 115, 2005. [6] W. Zhang, G. Wang, Z. Xing, and L. Wittenburg, "Distributed stochastic search and distributed breakout: properties, comparison and applications to constraint optimization problems in sensor networks," Artificial Intelligence, vol. 161, no. 1-2, pp. 55 -- 87, 2005. [7] A. Farinelli, A. Rogers, A. Petcu, and N. R. Jennings, "Decentralised coordination of low-power embedded devices using the max-sum algorithm," in Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems-Volume 2, pp. 639 -- 646, International Foundation for Autonomous Agents and Multiagent Systems, 2008. [8] D. Orden, J. Gimenez-Guzman, I. Marsa-Maestre, and E. de la Hoz, "Spectrum graph coloring and applications to wi-fi channel assignment," Symmetry, vol. 10, no. 3, p. 65, 2018. [9] E. de la Hoz, J. M. Gimenez-Guzman, I. Marsa-Maestre, L. Cruz-Piris, and D. Orden, "A distributed, multi-agent approach to reactive network resilience," in Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, pp. 1044 -- 1053, International Foundation for Autonomous Agents and Multiagent Systems, 2017. [10] K. Hirayama and M. Yokoo, "Distributed partial constraint satisfaction problem," in International Conference on Principles and Practice of Constraint Programming, pp. 222 -- 236, Springer, 1997. [11] A. Netzer, A. Grubshtein, and A. Meisels, "Concurrent forward bounding for distributed constraint optimization problems," Artificial Intelligence, vol. 193, pp. 186 -- 216, 2012. [12] P. J. Modi, W.-M. Shen, M. Tambe, and M. Yokoo, "Adopt: Asynchronous distributed constraint optimization with quality guarantees," Artificial Intelligence, vol. 161, no. 1-2, pp. 149 -- 180, 2005. [13] A. Petcu and B. Faltings, "A scalable method for multiagent constraint optimization," tech. rep., 2005. [14] M. Vinyals, J. A. Rodriguez-Aguilar, and J. Cerquides, "Generalizing dpop: Action-gdl, a new complete algorithm for dcops," in Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems- Volume 2, pp. 1239 -- 1240, International Foundation for Autonomous Agents and Multiagent Systems, 2009. 9 [15] F. Fioretto, T. Le, W. Yeoh, E. Pontelli, and T. C. Son, "Improving dpop with branch consistency for solving distributed constraint optimization problems," in International Conference on Principles and Practice of Constraint Programming, pp. 307 -- 323, Springer, 2014. [16] A. Petcu and B. Faltings, "Odpop: An algorithm for open/distributed constraint optimization," in AAAI, vol. 6, pp. 703 -- 708, 2006. [17] A. Petcu and B. Faltings, "Mb-dpop: A new memory-bounded algorithm for distributed optimization.," in IJCAI, pp. 1452 -- 1457, 2007. [18] R. Greenstadt, B. Grosz, and M. D. Smith, "Ssdpop: improving the privacy of dcop with secret sharing," in Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, p. 171, ACM, 2007. [19] A. Petcu, B. Faltings, and R. Mailler, "Pc-dpop: A new partial centralization algorithm for distributed optimization.," in IJCAI, vol. 7, pp. 167 -- 172, 2007. [20] B. Cabon, S. De Givry, L. Lobjois, T. Schiex, and J. P. Warners, "Radio link frequency assignment," Constraints, vol. 4, no. 1, pp. 79 -- 89, 1999. [21] A. Kumar, A. Petcu, and B. Faltings, "H-dpop: Using hard constraints for search space pruning in dcop.," in AAAI, pp. 325 -- 330, 2008. [22] K. C. Cheng and R. H. Yap, "Constrained decision diagrams," in Proceedings of the national conference on artificial intelligence, vol. 20, p. 366, Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999, 2005. [23] Z. Chen, Z. He, and C. He, "An improved dpop algorithm based on breadth first search pseudo-tree for distributed constraint optimization," Applied Intelligence, vol. 47, no. 3, pp. 607 -- 623, 2017. [24] A. Petcu, B. Faltings, and D. C. Parkes, "M-dpop: Faithful distributed implementation of efficient social choice problems," Journal of Artificial Intelligence Research, vol. 32, pp. 705 -- 755, 2008. [25] B. Schieber and U. Vishkin, "On finding lowest common ancestors: Simplification and parallelization," SIAM Journal on Computing, vol. 17, no. 6, pp. 1253 -- 1262, 1988. 10
1908.08637
1
1908
2019-08-23T01:57:30
Immediate Observation in Mediated Population Protocols
[ "cs.MA", "cs.DC" ]
In this paper we analyze the computational power of variants of population protocols (PP), a formalism for distributed systems with anonymous agents having very limited capabilities. The capabilities of agents are enhanced in mediated population protocols (MPP) by recording the states in the edges of the interaction graph. Restricting the interactions to the communication model of immediate observation (IO) reduces the computational power of the resulting formalism. We show that this enhancement and restriction, when combined, yield a model (IOMPP) at least as powerful as the basic PP. The proof requires a novel notion of configurations in the MPP model allowing differentiation of agents and uses techniques similar to methods of analyzing encoding criteria, namely operational correspondence. The constructional part of the proof is generic in a way that all protocols can be translated into the new model without losing the desirable properties they might have besides a stable output. Furthermore, we illustrate how this approach could be utilized to prove our conjecture of IOMPP model being even as expressive as the MPP model. If our conjecture holds, this would result in a sharp characterization of the computational power and reveal the nonnecessity of two-way communication in the context of mediated population protocols.
cs.MA
cs
Immediate Observation in Mediated Population Protocols Tobias Prehn Modelle und Theorie Verteilter Systeme TU Berlin, Germany Myron Rotter TU Berlin, Germany [email protected] [email protected] In this paper we analyze the computational power of variants of population protocols (PP), a formal- ism for distributed systems with anonymous agents having very limited capabilities. The capabilities of agents are enhanced in mediated population protocols (MPP) by recording the states in the edges of the interaction graph. Restricting the interactions to the communication model of immediate observation (IO) reduces the computational power of the resulting formalism. We show that this en- hancement and restriction, when combined, yield a model (IOMPP) at least as powerful as the basic PP. The proof requires a novel notion of configurations in the MPP model allowing differentiation of agents and uses techniques similar to methods of analyzing encoding criteria, namely operational correspondence. The constructional part of the proof is generic in a way that all protocols can be translated into the new model without losing the desirable properties they might have besides a sta- ble output. Furthermore, we illustrate how this approach could be utilized to prove our conjecture of IOMPP model being even as expressive as the MPP model. If our conjecture holds, this would result in a sharp characterization of the computational power and reveal the nonnecessity of two-way communication in the context of mediated population protocols. 1 Introduction Population protocols have been introduced in 2004 as a computational model for passively mobile fi- nite state sensors by Angluin et al. [2, 3]. They feature a finite state space, making them suitable for computation units with very limited capabilities and full anonymity, resulting directly from this restric- tion. Since the number of possible states that each agent could be in may not grow with the number of participating agents, there is no space for memorizing the ids of already met communication partners or similar constructs. Therefore, the outcome of any binary communication does not depend on whether the participants have communicated before. Another feature is the fully distributed approach of the base version for population protocols that does not need a base station, leader, or scheduler of any kind. The impact of such extensions has been studied [5, 7, 1]. It is well known that predicates computable by population protocols are exactly the semilinear pred- icates. The first study on the computational power of this model was in 2007 by Angluin et al. [4]. In this context, also several different communication patterns have been modeled in population protocols and their computational power have been studied as well. One of those mechanisms has been the imme- diate observation model, which is a special kind of one-way communication as opposed to the two-way communication that comes with the base model. The idea is that an agent may observe another agent without it noticing being observed. Clearly the observed agent cannot change its state in such an in- teraction whereas the observer can use the information given by its own and the observed agent's state. In contrast to stronger mechanisms no synchronization between the communication partners is needed. Consequently the communication in such a model is asynchronous and applicable to a broader variety of systems. With the fully distributed setting in mind the immediate observation communication seems to be a desirable feature. But these qualities come with a price. Protocols with this limitation to the J.A. P´erez and J. Rot (Eds.): Combined Workshop on Expressiveness in Concurrency and Structural Operational Semantics (EXPRESS/SOS 2019). EPTCS 300, 2019, pp. 102 -- 113, doi:10.4204/EPTCS.300.7 c(cid:13) T. Prehn & M. Rotter This work is licensed under the Creative Commons Attribution License. T. Prehn & M. Rotter 103 communication can only compute predicates in COUNT∗, i.e. predicates that count multiplicities of input values and compare them to previously given thresholds. Another approach to altering population protocols has been the work of Michail et al. [12]. In their model agents are allowed to store distinct information for different communication partners. To achieve this they extended the base formalism by states for each pair of agents residing in the edges of the interaction graph. Some previous work on mediated population protocols modelled directed interaction graphs with one state per edge [12] and others used undirected graphs where each edge has a state for each of its two endpoints [8]. This extension is a reasonable compromise between maintaining the anonymity of each agent and being able to memorize the already met communication partners. An agent is capable of telling an agent, that it has not yet communicated with, apart from one it has already met. But two other agents being in the same state and with the same communication history are still indistinguishable. Aside from this the edge states can be used for storing several other information. This mediated population protocols are able to compute all symmetric predicates in NSPACE(n2). We now present a model in this paper that combines the extended storage possibilities of mediated population protocols and the limited communication model of immediate observation protocols. The computational power of our resulting formalism has to be studied as it is unclear how this extension and restriction interact. In section 2 the basic formalisms and existing models are defined. We are using a representation of population that allows the distinction of agents from a global point of view. This does not interfere with the anonymity of the agents and is for analysis purposes only. Based on this we define our model of immediate observation mediated population protocols (IOMPP) in section 3. Subsequently we study the computational power of our model in section 4. We take the approach simulating population protocols in immediate observation mediated population protocols in 3.1. Additionally, we give a translation of configurations from one model to the other and define criteria such a translation has to meet for it to express desirable attributes in 4.1. Our work is inspired by and makes use of the encodability criteria stated by Gorla in [11]. To the best of our knowledge this technique is novel to population protocols in the way we utilize it in 4.2 to prove that immediate observation mediated population protocols are at least as expressive as the base model of population protocols. In 4.3 we conjecture that our approach could also be used to show that immediate observation does not restrict the computational power of mediated population protocols. We conclude our paper by a discussion on the given results and possible application of the used techniques in section 5. We also give an outlook on future work and open questions. 2 Technical preliminaries First we introduce populations, which form the base of all population protocols. They are often modeled as multisets to emphasize the indistinguishability of the participating agents. We will use vectors where each entry represents the state of a specific agent, because we want to efficiently compare populations in different models from a global viewpoint. Note that this will not give agents a distinct id they could make use from their local point of view. A different kind of vector representation can be found in [10] and is not to be confused with ours. They use vectors where each entry describes for an agent state the multiplicities of agents in that state. Their vector representation efficiently stores sets of agents with their states, making it easy to identify equivalent protocol states. In contrast to this, our representation can be used to compare sets of agents in population protocols with sets of agents in extended variants like mediated population protocols. 104 Immediate Observation in Mediated Population Protocols Definition 1 (Populations). Let A be a nonempty finite set and n ∈ N. Then An describes the set of n-tuples over A also referred to as vectors of length n. A population over A, denoted by POP (A), is the set of all vectors of arbitrary but finite length over A. If v ∈ An we use v = n to denote the length of v and (v)i to reference the ith element of v (with i ∈ N+ ≤n). Next we define how calculations in population protocols are modeled from a local point of view. Each agent has the same set of states and rules how to change states according to a communication partner's state. Additionally, functions to map input to an initial state and a state to some output are defined to be identical for each agent. δ) where Definition 2 (Population Protocols [6]). A population protocol P is a 5-tuple P = (Q, Q is a finite set of agent states, Σ a finite input alphabet, I : Σ → Q describes the input function, O : Q → {0, 1} is the output function, and δ : Q2 → Q2 is referred to as transition function and describes all possible pairwise interactions. We also making use of a set representation of δ ⊆ Q4 whenever we write t = (p, q) →δ (p′ , q′) referring to a specific transition t ∈ δ. , I , O, Σ To analyze protocols we need a global perspective. Here states are configurations holding state information for each agent. This kind of global view has been used to study the computational power of population protocols [4]. , , , I Σ Σ O , I , O, δ) be a population protocol. The global protocol Definition 3 (Global Protocols [4]). Let P = (Q, to P is a 5-tuple GP = (C , −→) where C = POP (Q) is the set of configurations, i.e., vectors of agent states Q, I : POP (Σ) → C maps input vectors to initial configurations, O : C → {0, 1, ⊥} maps configurations to outputs, and −→: C → C is the global transition function with −→∗ being its reflexive and transitive closure. For C,C′ ∈ C it holds that C −→ C′ iff there is a transition t ∈ δ and i, j ∈ N+ with i 6= j such that t = ((C)i , (C) j) →δ ((C′)i , (C′) j) and (C)k = (C′)k for every k ∈ N+ \ {i, j}. We also ti, j−→ C′ and call agent i the initiator of t and j the responder or (if the state of i is not changed by write C t) observer. The global input function takes use of I to get an agent state for each single value in its input and O aggregates the outputs of the agents according to O. It holds that O(C) = x ∈ {0, 1} iff O((C)i) = x for each i ∈ N+ ≤C and O(C) = ⊥ in every other case. When the underlying protocol P is clear from the context we often omit the index of GP and simply state that G is the global protocol to P. Based on a global protocol we can describe what it means for a protocol to compute some predicate. For this we need to define executions and fairness. , , , I Σ O Definition 4 (Computation). Let G = (C , −→) be a global protocol. A configuration C ∈ C is output stable with output x ∈ {0, 1} iff O(C′) = x for each C′ ∈ C with C −→∗ C′. We call a sequence of configurations C0 ,C1 ,C2 , · · · ∈ C with Ci −→ Ci+1 for each i ∈ N an execution. An execution is fair iff for each C ∈ C with Ci = C for infinitely many i ∈ N it holds that if there is a transition C −→ C′ then also C j = C′ for infinitely many j ∈ N. A population protocol P is well-specified if for each input Inp, it holds that all fair executions of P starting in I (Inp) reach a configuration that is output stable. P computes a predicate if this reached configuration is output stable with output 1 if Inp satisfies the predicate and with output 0 otherwise. In the context of population protocols several communication mechanisms have been studied [4]. Immediate observation is one of those mechanisms. It reduces the class of computable predicates to predicates counting multiplicities of input values COUNT∗. To model this kind of communication, restric- tions to the allowed form of transitions are made. δ) be a population protocol. P is an immedi- Definition 5 (Immediate Observation). Let P = (Q, ate observation protocol, if there is no transition that changes the state of the initiator. In other words, all transitions t ∈ δ have to be of the form t = (p, q) →δ (p, q′). , I , O, Σ T. Prehn & M. Rotter 105 Another extension to population protocols is the mediated variant. The idea is to introduce states in all edges of the communication graph. Since the most general graph is the complete graph, each pair of agents is given such a state. In the context of an immediate observation communication mechanism, it is not reasonable to assume a storage that both agents can write to. Therefore, we introduce a pair of edge states for each pair of agents. Edge states are always initialized with the same value. Σ , S, s0 , I , O, Definition 6 (Mediated Population Protocols [12]). A mediated population Protocol P is a 7-tuple P = (Q, , I and O are analogous to population protocols. The set of edge states S includes the initial edge state s0 ∈ S and the transition function δ : (Q × S)2 → (Q × S)2 incorporates the edge states for each pair of agents. δ) where Q, Σ Configurations in mediated population protocols cannot be represented by simple vectors. We need to introduce matrices as configurations containing the agent states on the diagonal and the states of the edge between agents a and b in fields Ca,b (side of agent a) and Cb,a (side of agent b). Definition 7 (Mediated Populations). An×n describes the set of square matrices over A of size n × n. A mediated population over A denoted by POPM (A) is the set of all matrices of arbitrary but finite length over A. If m ∈ An×n we use (m)i, j to reference the element of m at column i and row j with i, j ∈ N+ ≤n and m = n to denote the length as well as the height of a square matrix m. We can now proceed with lifting our global protocol definitions to represent mediated population protocols as well. δ) be a Definition 8 (Global Protocols for Mediated Population Protocols). Let P = (Q, Σ mediated population protocol. The global protocol to P is again a 5-tuple G = (C In contrast to global protocols for simple population protocols C = POPM (Q) is the set of configurations and I : POP (Σ) → C maps input vectors to initial configurations, initializing the diagonal fields with the corresponding agent states and every other field with s0. The output function O : C → {0, 1, ⊥} ignores all fields not on the diagonal and −→: C → C now also changes the respective edge states. For C,C′ ∈ C it holds that C −→ C′ iff there is a transition t ∈ δ and i, j ∈ N+ with i 6= j such that t = ((C)i,i , (C)i, j , (C) j, j , (C) j,i) →δ ((C′)i,i , (C′)i, j , (C′) j, j , (C′) j,i) and (C′)k,l = (C′)k,l for every k, l ∈ N+ \ {i, j}. , S, s0 , I , O, , −→). O Σ I , , , 3 Modelling immediate observation in mediated population protocols From the technical preliminaries in section 2 we can easily combine the models for mediated population protocols and immediate observation conform communication. We get our model of population protocols with two edge states in every edge, one per communication partner, and transitions that keeps the states of the initiator unaltered and changes the states of the observer. Definition 9 (Immediate Observation Mediated Population Protocols). An immediate observation me- δ) where Q is a finite set of agent states, diated population protocol P is a 7-tuple P = (Q, Σ a finite input alphabet, I : Σ → Q describes the input function, O : Q → {0, 1} is the output func- tion, and δ : (Q × S)2 → (Q × S)2 is referred to as transition function and describes all possible pair- wise interactions. We also making use of a set representation of δ ⊆ (Q × S)4 whenever we write , r′) referring to a specific transition t ∈ δ. Since our model uses the im- t = (p, s, q, r) →δ (p′ mediate observation communication mechanism, all transitions t = (p, s, q, r) →δ (p′ , r′) have to satisfy p = p′ and s = s′. , S, s0 , I , O, , q′ , q′ , s′ , s′ Σ 106 Immediate Observation in Mediated Population Protocols 3.1 Simulating population protocols by immediate observation mediated population pro- tocols We can now simulate protocols in the basic population protocol model by immediate observation me- diated population protocols. The main idea is to split every two-way communication with an initiator and a responder into 4 steps. Two steps are required to signal the request and the acknowledgement of a communication and another two steps are needed to finish the communication resolving all pending state changes. Additionally, a reset transition is given for the case of an unsuccessful communication. Simulation 10. Let P = (Q, mediated population protocol P′ simulates the protocol P and is given by the tuple (Q′ where δ) be a population protocol. The following immediate observation δ′) , I , O, , O′ , s′ 0 , I′ Σ Σ′ , S′ , , Σ′ Q′ S′ s′ 0 I′(σ) O′(l , q) := Σ , := {L,U } × Q, := {sinit , sponr} ∪ Q, := sinit , := (U , I(σ)) for all σ ∈ Σ := O(q) for all (l , q) ∈ Q′ , . The states of the agents are of the form (l , q) where l ∈ {L,U } indicates whether the agent is locked or unlocked and q ∈ Q is the computation state according to the original population protocol P. For easier referencing we call the first component of an agent state (l , q) the locking state l of this agent and the second component its computation state q. We use the formulation of an agent being locked whenever its locking state is L and say this agent is unlocked otherwise. W.l.o.g. we assume that {sinit , sponr} ∩ Q = /0. The input function I maps each input symbol σ ∈ Σ to the state (U , I(σ)). The output function O′ maps each state (l , q) ∈ Q to O(q) independent of the locking indicator l. We specify for each transition t = (p, q) →δ (p′ , q′ ∈ Q the following transitions for δ′. , q′) of δ with p, q, p′ t(1) = ((U , p), sinit , (U , q), sinit ) →δ′ t(2) = ((L, q′), q, (U , p), sinit ) →δ′ t(3) = ((L, p′), sponr , (L, q′), q) →δ′ t(4) = ((x, y), sinit , (L, p′), sponr) →δ′ t(5) = ((x, y), z, (L, q′), q) →δ′ ((U , p), sinit , (L, q′), q) ((L, q′), q, (L, p′), sponr) ((L, p′), sponr , (U , q′), sinit ) ((x, y), sinit , (U , p′), sinit ) for every (x, y) ∈ Q′ ((x, y), z, (U , q), sinit ) for every (x, y) ∈ Q′ and z ∈ S′ \ {sponr} (1) (2) (3) (4) (5) The locking state of each agent prohibits simultaneous participation in several different communi- cations. Whenever an agent took part in a two-way communication t in the original protocol, it could be the observer of a transition of type (1) in the simulation. A t(1) transition locks the observing agent and puts its old computation state in the edge state this agent controls on the edge with the observed agent. This has two reasons: First it signals the interest in a communication with the other agent and second it backups the old state for a potential future reset. If the other agent observes the change in the edge state, it may signal the acknowledgement of requested communication by locking itself, changing T. Prehn & M. Rotter 107 its computation state according to the transition t and putting sponr in its edge state. This is achieved by transition t(2). Now the two agents have to reset their edge states to sinit and unlock themselves. The agent mimicking the responder of the original transition t starts by taking t(3), followed by the simulator of the original initiator taking t(4). If a communication was not successful, either because the initiators surrogate has taken an other transition with another agent in the meantime or because responder sim- ulating agent observes its partner before it could acknowledge the communication, t(5) is taken. This transition assures that in the described cases an agent can give up on a communication attempt and reset its state, readying itself for another attempt, potentially with a different partner. Note that if a transition t = (p, q) →δ (p, q′) is already immediate observation compliant we do not need to add the whole set of transitions. We could instead add a slightly altered version of the original transition as follows. t(6) = ((U , p), sinit , (U , q), sinit ) →δ′ ((U , p), sinit , (U , q′), sinit ) (6) Clearly the result would be the same. This kind of transition is only needed if the simulation needs to be more efficient in the sense of steps needed to get to an output stable configuration. We will therefore omit this type of transitions in our analyses. Observation 11 (Output Changing Transitions). By definition of O′ the output of an agent only depends on its computation state. As transitions t(3), t(4) do not change the computation states, only transitions t(1), t(2), and t(5) can have an impact on the output of an agent. Since Simulation 10 is an immediate observation protocol, this agent has to be the observer of such transitions. Observation 12 (Number of Started Conversations). Every agent has at most one started and not yet concluded conversation at any point in time. Starting a conversation by taking transition t(1) as respon- der brings an agent to a locked state. Therefore, no other conversation can be started or acknowledged by this agent until the conversation is concluded with transition t(3) or aborted with transition t(5). Acknowl- edging a conversation by taking transition t(2) as responder also brings an agent to a locked state. Again no other conversation can be started or acknowledged by this agent until the conversation is concluded with transition t(4) or aborted with transition t(5). (2) Observation 13 (Point of no Return). Every occurrence of transition t i, j with acting agents i and j is (2) i, j agent i is locked with q ∈ Q in eventually followed by transitions t its edge state to j and agent j is locked with sponr in its edge state to i. From Observation 12 we know that neither i nor j can be observer of any transition with some agent different from i and j. From (4) i, j . After execution of t (3) j,i and t is enabled and will be taken at some point because of the fairness the transitions with i and j only t assumptions in population protocols. After that agent j is still locked with sponr in its edge state to i. Therefore, j can only be observer of transitions t(3) ,t(4), or t(5). Again from Observation 12 we know that only t is possible. (3) j,i (4) i, j 4 Computational power We now show that our model can compute all predicates computable in population protocols by giving a translation, that relates configurations from a protocol to configurations from its simulation representing the same state of computation. Additionally, we identify requirements imposed on such a translation to be helpful in proving the equality of computed predicates. We will ultimately show how this proof is executed. 108 Immediate Observation in Mediated Population Protocols 4.1 Translation and criteria We provide a translation, that constructs configurations in mediated population protocols from configu- rations of population protocols by giving all agents an unlocked state and setting all edges to the neutral sinit state. , s′ 0 , I′ , Definition 14 (Translation of Configurations). Let P = (Q, (Q′ δ) be a population protocol and P′ = δ′) a immediate observation mediated population protocol constructed from P using , I , O, , O′ , S′ Σ Σ′ , Simulation 10. ByJ·K : POP (Q) → POPM (Q′) we denote the translation of configurations C ∈ POP (Q) in the population protocol into configurations D ∈ POPM (Q′) from the mediated population protocol. This translation is defined as follows: (U , q1) sinit sinit ... sinit (U , q2) . . . . . . . . . . . . . . . sinit   sinit ... sinit (U , qn)   J(q0 , q1 , . . . , qn)K = From the criteria for good encodings defined by Gorla [11] we adopt the notion of operational corre- spondence. corresponding if it is Definition 15 (Operational Correspondence). A translation J·K : POP (Q) → POPM (Q′) is operationally (1) (operationally) complete, i.e., for all C,C′ ∈ POP(Q) with C −→∗ C′ it holds that JCK −→∗ JC′K, (2) (operationally) sound, i.e., for all C ∈ POP (Q) and D ∈ POPM (Q′) withJCK −→∗ D there exists a and C′ ∈ POP (Q) with D −→∗ JC′K and C −→∗ C′. If our translation in Def. 14 instantiated with concrete population protocol P and mediated popula- tion protocol P′ is operationally corresponding, we get that every configuration reachable in P is also reachable in P′ and vice versa. Definition 16 (Input/Output Correspondence). Let P be a population protocol, P′ be a mediated popula- POPM (Q′) is I/O corresponding if it is tion protocol and G, G′ be the global protocols to P and P′ respectively. A translation J·K : POP(Q) → (1) input corresponding, i.e., for all V ∈ POP (Σ) it holds that JI (V )K = I′ (V ), and (2) output corresponding, i.e., for all C ∈ POP (Q) it holds that O (C) = O′ (JCK). Input/Output Correspondence gives us the assurance that input and output functions of the protocols related by a translation behave in a similar way. If it holds, translating an input configuration of the original protocol or directly using the input function of the corresponding mediated population protocol yields the same result. Additionally, configurations are always translated into configurations with the same output. Definition 17 (Output Stability Preservation). Let P be a population protocol, P′ be a mediated popula- tion protocol and G, G′ be the global protocols to P and P′ respectively. A translation J·K : POP(Q) → POPM (Q′) is output stability preserving if for each C ∈ POP (Q) it holds that JCK is output stable iff C is output stable. From the output stability preservation we get that each output stable configuration is translated into a configuration also being output stable. T. Prehn & M. Rotter Lemma 18. Let P = (Q, Σ , I , O, δ) be a population protocol and P′ = (Q′ , Σ′ , S′ 109 , O′ , δ′) a mediated , s′ 0 , I′ population protocol. If there is a translation J·K : POP(Q) → POPM (Q′) that is operationally corre- sponding, input/output corresponding, and output stability preserving, then P and P′ compute the same predicate. Proof. Since the translation is input corresponding every initial configuration in P has a correspond- ing initial configuration in P′. From the operational correspondence we know that a configuration is reachable from an initial configuration in P′ iff it has a corresponding configuration reachable from the corresponding initial configuration in P. With output correspondence both configurations clearly have the same output and, since the translation is output stability preserving, the output is either stable in both configurations or in none. Therefore, the protocol P calculates the same semilinear predicate as P′. 4.2 All semilinear predicates can be computed by immediate observation mediated pop- ulation protocols Lemma 19. The translation J·K given in Def. 14 is operationally corresponding for any population pro- δ) and the mediated population protocol P′ = (Q′ δ′) constructed 0 , I′ , O′ , S′ , s′ Σ′ , , tocol P = (Q, , I , O, using Simulation 10. Σ Proof. To prove operational completeness assume that C,C′ ∈ POP (Q) with C −→∗ C′. Since −→∗ is defined as reflexive-transitive closure of −→ we get that C1 ,C2 , . . . ,Cn ∈ POP (Q) exist with C −→ C1 −→ C2 −→ . . . −→ Cn −→ C′. We can always simulate a step Ci −→ Ci+1 in P by making 4 steps in P′. Assume that the step is due to transition t ∈ δ and agents at a and b are acting as initiator and responder respectively in Ci ta,b−→ Ci+1. This can be simulated as JCiK JCiK −→4 JCi+1K holds. Thus, JCK −→4 JC1K −→4 b,a−→ JCi+1K and thus . . . −→4 JCnK −→4 JC′K exemplifies JCK −→∗ JC′K. To prove operational soundness assume that C ∈ POP (Q) and D ∈ POPM (Q′) withJCK −→∗ D. We construct C′ as follows. For this assume (D)i,i = (li , di). t b,a−→ C3 i t a,b−→ C4 i t a,b−→ C2 i t (1) (2) (3) (4) (C′)i =(g di , if there is exactly one j ∈ N+ ≤D,6=i such that (D)i, j = g and (D) j,i 6= sponr , otherwise We can show that D −→∗ JC′K by taking the appropriate transitions for all i, j ∈ N+ follows. ≤D with i 6= j as if (D)i, j = q if (D)i, j = sinit if (D)i, j = q and and and (D) j,i = sponr (D) j,i = sponr (D) j,i 6= sponr take transitions t take transition t take transition t (4) i, j (3) j,i ,t (4) i, j (5) j,i otherwise do nothing (2) is a step Dx t i, j−→ Dy in this path, take transition Cv SinceJCK −→∗ D by assumption and D −→∗JC′K we get thatJCK −→∗JC′K. We can construct C −→ C1 −→ C2 −→ . . . −→ C′ from the pathJCK −→ D1 −→ D2 −→ . . . −→JC′K as follows. Whenever there ti, j−→ Cw in the path of C −→∗ C′. By Observation 12 we get that each such step of type (2) is eventually followed by transitions of type (3) and (4) and since JC′K has only edge states sinit , this has to happen beforeJC′K is reached. Therefore, there exists a C′ ∈ POP (Q) with D −→∗ JC′K and C −→∗ C′. 110 Immediate Observation in Mediated Population Protocols Lemma 20. The translation J·K given in Def. 14 is I/O corresponding for any population protocol δ) and the mediated population protocol P′ = (Q′ δ′) constructed using 0 , I′ , O′ , S′ , s′ Σ′ , , Σ P = (Q, , I , O, Simulation 10. Proof. The input function I′ of P′ makes use of the input function I of P by putting an agent in the unlocked state (U , I(σ)) iff the same agent would be in state I(σ) in P. Also every edge state is initialized agents state q to a tuple with q being the second component i.e. its computation state. For each agent a The output function O′ of P′ makes use of the output function O of P by ignoring the locking state of with sinit . This matches J·K that translates each state q to (U , q) and sets every edge state to sinit . Thus, JI (V )K = I′ (V ) and J·K is input corresponding. an agent and giving back the output of O for the computation state. As seen above, J·K translates every it holds that O ((C)a) = O′(cid:16)(D)a,a(cid:17). As O aggregates the outputs of all agents, which are the same in P and P′, O (C) = O′ (JCK) and consequently J·K is output corresponding. Lemma 21. The translationJ·K given in Def. 14 is output stability preserving for any population protocol δ) and the mediated population protocol P′ = (Q′ δ′) constructed using 0 , I′ , O′ , S′ , s′ Σ′ , , Σ P = (Q, , I , O, Simulation 10. output stable in P′. From the definition of output stability follows that a configuration D exists with Proof. Let C be a configuration that is output stable in P. Assume towards contradiction JCK is not O′ (JCK) 6= O′ (D) and D is reachable from JCK, i.e. there is a path JCK −→ D1 −→ D2 −→ . . . −→ D. W.l.o.g assume that D is the first such configuration in this path, i.e. O′ (JCK) = O′ (Di) for each such Di. Since O′ aggregates the values of O′ for each agent and because P′ is an immediate observation protocol, there has to be a single agent a that has changed its output because of the transition leading to D. From Observation 11 we know that this transition has to be of type (1), (2), or (5) and a has to be its observer. If it is (1) or (2) we can construct a configuration in the same way as C′ was constructed in the proof O (C) 6= O (C′), a contradiction to C being output stable. If the transition agent a took was of type (5), there has to be a configuration along the path from changes the output of a, the corresponding type (1) transition must also have changed it, contradicting (1), (2), or (5) and therefore does not change its output. Because our translation maintains outputs for of operational soundness for Lemma 19. This C′ is reachable from C in P and JC′K is reachable from D in P′. Note that on the path from D to JC′K agent a is never an observer of any transition with type each agent O ((C)a) = O′(cid:16)(JCK)a,a(cid:17) 6= O′(cid:16)(D)a,a(cid:17) = O′(cid:16)(JC′K)a,a(cid:17) = O ((C′)a) holds. This results in JCK to D where agent a took a transition of type (1). Observation 12 states that there has to be such a transition in advance and by the definition of J·K this has to be after JCK. But if the transition of type (5) our assumption of D being the first configuration with an output different from O′ (JCK). This is due For the other direction assume towards contradiction JCK is output stable in P′ and C is not output stable in P. Then there exists a configuration C that is reachable from C with O (C) 6= O(cid:0)C(cid:1). BecauseJ·K is operationally complete by Lemma 19 it holds that qCy is reachable from JCK. From the output corre- spondence ofJ·K in Lemma 20 follows that O′ (JCK) = O (C) 6= O(cid:0)C(cid:1) = O′(cid:0)qCy(cid:1). This is a contradiction to the output stability of JCK in P′. to a type (5) transition resetting the computation state of an agent back to the state it had before the corresponding type (1) transition. Theorem 22. For any population protocol P = (Q, ulation protocol P′ constructed from P using Simulation 10 calculates the same semilinear predicate. δ), the immediate observation mediated pop- , I , O, Σ T. Prehn & M. Rotter 111 Proof. We have shown thatJ·K from Definition 14 is operationally corresponding, I/O corresponding and output stability preserving in Lemmas 19, 20, and 21. By Lemma 18 the statement directly follows. Corollary 23. Immediate observation mediated population protocols can compute every semilinear predicate and are therefore at least as expressive as population protocols. 4.3 Immediate observation does not restrict the computational power of mediated pop- ulation protocols The approach in the previous sections can be used to prove that two-way communication in mediated population protocols does not add to the computational power of the model. To achieve this we define a simulation of mediated population protocols into the variant with immediate observation communication. Simulation 24. Let P = (Q, δ) be a mediated population protocol. The following imme- diate observation mediated population protocol P′ simulates the protocol P and is given by the tuple (Q′ δ′) where , S, s0 , I , O, , O′ , S′ Σ′ Σ , , , s′ 0 , I′ Σ′ Q′ S′ s′ 0 I′(σ) O′(l , q) := Σ , := {L,U } × Q, := ({sinit , sponr} ∪ (Q × S)) × S, := (sinit , s0) , := (U , I(σ)) for all σ ∈ Σ := O(q) for all (l , q) ∈ Q′ . , W.l.o.g. we assume that {sinit , sponr} ∩ (Q ∪ S) = /0. In contrast to Simulation 10 the edge state has two components. The first component again signals the current state of the simulated communication and serves as a backup for the condition prior to the communication. Here we need to save both, computation state and edge state. The second component represents the actual edge state present in the original protocol. We specify for each transition t = (p, r, q, s) →δ (p′ , q′ ∈ Q and r, s, r′ , s′ ∈ S the following transitions for δ′. , s′) of δ with p, q, p′ , q′ , r′ t(1) = ((U , p), (sinit , r), (U , q), (sinit , s)) →δ′ t(2) = ((L, q′), ((q, s), s′), (U , p), (sinit , r)) →δ′ t(3) = ((L, p′), (sponr , r′), (L, q′), ((q, s), s′)) →δ′ t(4) = ((x, y), (sinit , s′), (L, p′), (sponr , r′)) →δ′ t(5) = ((x, y), (v, w), (L, q′), ((q, s), s′)) →δ′ ((U , p), (sinit , r), (L, q′), ((q, s), s′)) ((L, q′), ((q, s), s′), (L, p′), (sponr , r′)) ((L, p′), (sponr , r′), (U , q′), (sinit , s′)) ((x, y), (sinit , s′), (U , p′), (sinit , r′)) for every (x, y) ∈ Q′ ((x, y), (v, w), (U , q), (sinit , s)) for every (x, y) ∈ Q′ and (v, w) ∈ S′ \ {(sponr , r′)} This simulation follows the same ideas as the Simulation 10. The only difference is the edge state of the original protocol that needs to be taken into account by transitions of the simulation and that needs to be backed up for possible future resets. We can now give a translation similar to Definition 14 required for our line of argumentation. 112 Immediate Observation in Mediated Population Protocols Definition 25 (Translation of Mediated Configurations). Let P = (Q, ulation protocol and P′ = (Q′ δ) be a mediated pop- δ′) a immediate observation mediated population protocol , S, s0 , I , O, , O′ , S′ , s′ Σ′ Σ , , constructed from P using Simulation 24. By J·K : POPM (Q) → POPM (Q′) we denote the translation of configurations C ∈ POPM (Q) in the population protocol into configurations D ∈ POPM (Q′) from the mediated population protocol. This translation is defined as follows: 0 , I′ (sinit , sn,1) ... (sinit , sn,n−1)   (sinit , sn−1,n) (U , qn) u wwwwv   q1 s2,1 s1,2 ... s1,n q2 . . . . . . . . . . . . . . . sn−1,n sn,1 ... sn,n−1 qn } (cid:127)(cid:127)(cid:127)(cid:127)~ =     (U , q1) (sinit , s2,1) (sinit , s1,2) ... (sinit , s1,n) (U , q2) . . . . . . . . . . . . . . . With this simulation and translation we conjecture that each mediated population protocol can be simulated by a immediate observation mediated population protocol that shares several attributes, espe- cially computing the same predicates. Conjecture 26. For any mediated population protocol P = (Q, tion mediated population protocol P′ = (Q′ calculates the same semilinear predicate. 0 , I′ , O′ , S′ , s′ Σ′ , , Σ , S, s0 , I , O, δ), the immediate observa- δ′) constructed from P using Simulation 24 5 Conclusion and future work We have given a proof for the model of immediate observation mediated population protocols to compute all semilinear predicates. Thus they are as least as powerful in computation as population protocols. Additionally, we have given arguments why we believe this model is even equivalent to the model of mediated population protocols with two-way communication. Consequently allowing the initiator of a transition to change its agent and edge states does not contribute to the computational power. The proof of our Conjecture 26 can hopefully be done in our future research. Our approach asks for a simulation and a translation which might seem overly complicated for a proof of equal computational power. But additionally several other attributes, besides the computation of the same predicate, carry over from the one protocol to the other if our Simulation 10 and translation from Definition 14 are used. Consider for example livelock freedom, i.e. no configuration is reached that has no successor besides itself. The simulation can reach a livelock iff the original protocol can reach such a configuration. This can easily be derived from the operational correspondence in Definition 15. In the context of protocols computing some predicate, a livelock is only possible if an output is reached. Otherwise the requirements for a well-specified protocol are not met. A livelock can be a desirable state as the computation can clearly be stopped in such a configuration. If the protocol does something else than computing a predicate, livelocks can be even more important to be reached or avoided, depending on the situation. Another example is the analysis of a required communication structure. Whereas some protocols need a full interaction graph to carry out a computation, a path structure would suffice for others to get a correct result. The interaction graphs supporting a protocol do also support its simulation. As a last example consider failure resistance [9]. If a protocol is designed to tolerate a certain number and type of faults, the simulation of this protocol could be capable of a comparable behaviour. This however depends on the type of failure and the chosen strategy to handle it. Crash failures, where an agent may leave the population at any time, should be manageable in the simulation with the same mechanisms as the original protocol did. Message losses could lead to new problems in the simulation T. Prehn & M. Rotter 113 like deadlocked communication partners. Some error handling and error masking strategies could lead to the number of failures tolerable by the simulation being reduced in contrast to the original protocol. A study on desirable attributes and how they carry over from one protocol to another by our simula- tion is something we wish to address in the future. References [1] Dan Alistarh, Rati Gelashvili & Milan Vojnovi´c (2015): Fast and Exact Majority in Population Protocols. In: Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, PODC '15, ACM, New York, NY, USA, pp. 47 -- 56, doi:10.1145/2767386.2767429. [2] Dana Angluin, James Aspnes, Zoe Diamadi, Michael J. Fischer & Ren´e Peralta (2004): Computation in net- works of passively mobile finite-state sensors. In: Proceedings of the twenty-third annualACM symposium on Principlesof distributedcomputing, ACM, pp. 290 -- 299, doi:10.1145/1011767.1011810. [3] Dana Angluin, James Aspnes, Zoe Diamadi, Michael J. Fischer & Ren´e Peralta (2006): Computation in networks of passively mobile finite-state sensors. Distributed Computing 18(4), pp. 235 -- 253, doi:10.1007/ s00446-005-0138-3. [4] Dana Angluin, James Aspnes, David Eisenstat & Eric Ruppert (2007): The computational power of popula- tion protocols. DistributedComputing 20(4), pp. 279 -- 304, doi:10.1007/s00446-007-0040-2. [5] Dana Angluin, James Aspnes, Michael J. Fischer & Hong Jiang (2008): Self-stabilizing Population Protocols. ACM Trans.Auton.Adapt. Syst. 3(4), pp. 13:1 -- 13:28, doi:10.1145/1452001.1452003. [6] James Aspnes & Eric Ruppert (2009): An Introduction to Population Protocols, pp. 97 -- 120. Springer Berlin Heidelberg, Berlin, Heidelberg, doi:10.1007/978-3-540-89707-1_5. [7] Shantanu Das, Giuseppe Antonio Di Luna, Paola Flocchini, Nicola Santoro & Giovanni Viglietta (2017): Mediated Population Protocols: Leader Election and Applications. In T V Gopal, Jager Gerhard & Silvia Steila, editors: TheoryandApplicationsofModelsofComputation, Springer International Publishing, Cham, pp. 172 -- 186, doi:10.1007/978-3-319-55911-7_13. [8] Shantanu Das, Giuseppe Antonio Di Luna, Paola Flocchini, Nicola Santoro & Giovanni Viglietta (2017): Mediated Population Protocols: Leader Election and Applications. In: Theory and Applications of Mod- els of Computation, Lecture Notes in Computer Science, Springer, Cham, pp. 172 -- 186, doi:10.1007/ 978-3-319-55911-7_13. [9] Carole Delporte-Gallet, Hugues Fauconnier, Rachid Guerraoui & Eric Ruppert (2006): When Birds Die: Making Population Protocols Fault-tolerant. In: Proceedings of the Second IEEE InternationalConference on Distributed Computing in Sensor Systems, DCOSS'06, Springer-Verlag, Berlin, Heidelberg, pp. 51 -- 66, doi:10.1007/11776178_4. [10] Javier Esparza, Pierre Ganty, J´erome Leroux & Rupak Majumdar (2017): Verification of population proto- cols. Acta Informatica 54(2), pp. 191 -- 215, doi:10.1007/s00236-016-0272-3. [11] Daniele Gorla (2010): Towards a unified approach to encodability and separation results for process calculi. Informationand Computation 208(9), pp. 1031 -- 1053, doi:10.1016/j.ic.2010.05.002. [12] Othon Michail, Ioannis Chatzigiannakis & Paul G. Spirakis (2011): Mediated population protocols. Theo- reticalComputerScience 412(22), pp. 2434 -- 2450, doi:10.1016/j.tcs.2011.02.003.
1909.09087
1
1909
2019-09-19T16:42:21
Real-Time Verification for Distributed Cyber-Physical Systems
[ "cs.MA" ]
Safety-critical distributed cyber-physical systems (CPSs) have been found in a wide range of applications. Notably, they have displayed a great deal of utility in intelligent transportation, where autonomous vehicles communicate and cooperate with each other via a high-speed communication network. Such systems require an ability to identify maneuvers in real-time that cause dangerous circumstances and ensure the implementation always meets safety-critical requirements. In this paper, we propose a real-time decentralized reachability approach for safety verification of a distributed multi-agent CPS with the underlying assumption that all agents are time-synchronized with a low degree of error. In the proposed approach, each agent periodically computes its local reachable set and exchanges this reachable set with the other agents with the goal of verifying the system safety. Our method, implemented in Java, takes advantages of the timing information and the reachable set information that are available in the exchanged messages to reason about the safety of the whole system in a decentralized manner. Any particular agent can also perform local safety verification tasks based on their local clocks by analyzing the messages it receives. We applied the proposed method to verify, in real-time, the safety properties of a group of quadcopters performing a distributed search mission.
cs.MA
cs
Real-Time Verification for Distributed Cyber-Physical Systems Hoang-Dung Tran1, Luan Viet Nguyen2, Patrick Musau1, Weiming Xiang3, and Taylor T. Johnson1 1 Institute for Software Integrated Systems, Vanderbilt University, TN, USA 2 Department of Computer Science and Engineering, University of Notre Dame, USA 3 School of Computer and Cyber Sciences, Augusta University, USA Abstract. Safety-critical distributed cyber-physical systems (CPSs) have been found in a wide range of applications. Notably, they have displayed a great deal of utility in intelligent transportation, where autonomous vehicles communicate and cooperate with each other via a high-speed communication network. Such systems require an ability to identify ma- neuvers in real-time that cause dangerous circumstances and ensure the implementation always meets safety-critical requirements. In this paper, we propose a real-time decentralized reachability approach for safety veri- fication of a distributed multi-agent CPS with the underlying assumption that all agents are time-synchronized with a low degree of error. In the proposed approach, each agent periodically computes its local reachable set and exchanges this reachable set with the other agents with the goal of verifying the system safety. Our method, implemented in Java, takes advantages of the timing information and the reachable set information that are available in the exchanged messages to reason about the safety of the whole system in a decentralized manner. Any particular agent can also perform local safety verification tasks based on their local clocks by analyzing the messages it receives. We applied the proposed method to verify, in real-time, the safety properties of a group of quadcopters performing a distributed search mission. 1 Introduction The emergence of 5G technology has inspired a massive wave of the research and development in science and technology in the era of IoT where the commu- nication between computing devices has become significantly faster with lower latency and power consumption. The power of this modern communication tech- nology influences and benefits all aspects of Cyber-Physical Systems (CPSs) such as smart grids, smart homes, intelligent transportation and smart cities. In par- ticular, the study of autonomous vehicles has become an increasingly popular research field in both academic and industrial transportation applications. Au- tomotive crashes pose significant financial and life-threatening risks, and there is an urgent need for advanced and scalable methods that can efficiently verify a distributed system of autonomous vehicles. 9 1 0 2 p e S 9 1 ] A M . s c [ 1 v 7 8 0 9 0 . 9 0 9 1 : v i X r a Over the last two decades, although many methods have been developed to conduct reachability analysis and safety verification of CPS, such as the ap- proaches proposed in [1, 3, 4, 6, 12, 13, 16, 18, 21, 27, 29], applying these techniques to real-time distributed CPS remains a big challenge. This is due to the fact that, 1) all existing techniques have intensive computation costs and are usu- ally too slow to be used in a real-time manner and, 2) these techniques target the safety verification of a single CPS, and therefore they naturally cannot be applied efficiently to a distributed CPS where clock mismatches and communi- cation between agents (i.e., individual systems) are essential concerns. Since the future autonomous vehicles systems will work distributively involving effective communication between each agent, there is an urgent need for an approach that can provide formal guarantees of the safety of distributed CPS in real-time. More importantly, the safety information should be defined based on the agents local clocks to allow these agents to perform "intelligent actions" to escape from the upcoming dangerous circumstances. For example, if an agent A knows based on its local clock that it will collide with an agent B in the next 5 seconds, it should perform an action such as stopping or quickly finding a safe path to avoid the collision. In this paper4, we propose a decentralized real-time reachability approach for safety verification of a distributed CPS with multiple agents. We are particularly interested in two types of safety properties. The first one is a local safety property which specifies the local constraints of the agent operation. For example, each agent is only allowed to move within a specific region, does not hit any obstacles, and its velocity needs to be limited to specific range. This type of property does not require the information of other agents and can be verified locally at run- time. The second safety property is a global property defined on the states of multiple agents. Particularly, we consider a peer-to-peer collision free property and a generalized property where we want to verify if all agents satisfy a set of linear constraints (on the states of all agents) defining the property, e.g., two agents do not go into the same region at the same time. Our decentralized real-time reachability approach works as follows. Each agent locally and periodically computes the local reachable set from the current local time to the next T seconds, and then encodes and broadcasts its reachable set information to the others via a communication network. When the agent receives a reachable set message, it immediately decodes the message to read the reachable set information of the sender, and then performs peer-to-peer collision checking based on its current state and the reachable set of the sender. Verifying a generalized global property involving the states of N agents is done at the time an agent receives all needed reachable sets from other agents. Additionally, the local safety property of the agent is verified simultaneously with the reach- able set computation process at run-time. The proposed verification approach is based on an underlying assumption that is, all agents are time-synchronized to some level of accuracy. This assumption is reasonable as it can be achieved by using existing time synchronization protocols such as the Network Time Proto- 4 This paper is an extension of [28] col (NTP). Our approach has successfully verified in real-time the local safety properties and collision occurrences for a group of quadcopters conducting a search mission. The rest of the paper is organized as follows. Section 2 presents briefly the distributed CPS modeling and its verification problems. Section 3 gives the de- tail of real-time reachability for single agent and how to use it for real-time local safety verification. Section 4 addresses the utilization reachable set mes- sages for checking peer-to-peer collision. Section 5 investigates the global safety verification problem. Section 6 presents the implementation and evaluation of our approach via a distributed search application using quadcopters. 2 Problem Formulation In this paper, we consider a distributed CPS with N agents that can communi- cate with each other via an asynchronous communication channel. Communication Model The communication between agents is implemented by the actions of sending and receiving messages over an asynchronous communi- cation channel. We formally model this communication model as a single au- tomaton, Channel, which stores the set of in-flight messages that have been sent, but are yet to be delivered. When an agent sends a message m, it invokes a send(m) action. This action adds m to the in-flight set. At any arbitrary time, the Channel chooses a message in the in-flight set to either delivers it to its re- cipient or removes it from the set. All messages are assumed to be unique and each message contains its sender and recipient identities. Let M be the set of all possible messages used in communication between agents. The sending and receiving messages by agent i are denoted by Mi,∗ and M∗,i, respectively. Agent Model The ith agent is modeled as a hybrid automaton [15,25] defined by the tuple (cid:104)Ai = Vi, Ai,Di,Ti(cid:105), where: a) Vi is a set of variables consisting of the following: i) a set of continuous vari- ables Xi including a special variable clki which records the agent's local time, and ii) a set of discrete variables Yi including the special variable msghisti that records all sent and received messages. A valuation vi is a function that associates each vi ∈ Vi to a value in its type. We write val(Vi) for the set of all possible valuations of Vi. We abuse the notion of vi to denote a state of Ai, which is a valuation of all variables in Vi. The set Qi ∆= val(Vi) is called the set of states. b) Ai is a set of actions consisting of the following subsets: i) a set {sendi(m) m ∈ Mi,∗} of send actions (i.e., output actions), ii) a set {receivei(m) m ∈ M∗,i} of receive actions (i.e., input actions), and iii) a set Hi of other, ordinary actions. c) Di ⊆ val(Vi) × Ai × val(Vi) is called the set of transitions. For a transition i in short. i) If ai = sendi(m) or receivei(m), i) ∈ Di, we write vi (vi, ai, v(cid:48) ai→ v(cid:48) then all the components of vi and v(cid:48) i are identical except that m is added to msghist in v(cid:48) i. That is, the agent's other states remain the same on message sends and receives. Furthermore, for every state vi and every receive action ai, there must exist a v(cid:48) i, i.e., the automaton must have well-defined behavior for receiving any message in any state. ii) If ai ∈ Hi, then vi.msghist = v(cid:48) d) Ti is a collection of trajectories for Xi. Each trajectory of Xi is a function mapping an interval of time [0, t], t ≥ 0 to val(Vi), following a flow rate that specifies how a real variable xi ∈ Xi evolving over time. We denote the duration of a trajectory as τdur, which is the right end-point of the interval t. i such that vi i.msghist. ai→ v(cid:48) Agent Semantics The behavior of each agent can be defined based on the concept of an execution which is a particular run of the agent. Given an initial state v0 i , an execution αi of an agent Ai is a sequence of states starting from v0 i , defined as αi = v0 i , . . ., and for each index j in the sequence, the state update from vj i to vj+1 is either a transition or trajectory. A state vj i is reachable if there exists an executing that ends in vj i . We denote Reach(Ai) as the reachable set of agent Ai. i , v1 i System Model The formal model of the complete system, denoted as System, is a network of hybrid automata that is obtained by parallel composing the agent's models and the communication channel. Formally, we can write, System ∆= A1(cid:107) . . .AN(cid:107)Channel. Informally, the agent Ai and the communication channel Channel are synchronized through sending and receiving actions. When the agent Ai sends a message m ∈ Mi,j to the agent Aj, it triggers the sendi(m) action. At the same time, this action is synchronized in the Channel automaton by putting the message m in the in-flight set. After that, the Channel will trigger (non-deterministically) the receivej(m) action. This action is synchronized in the agent Aj by putting the message m into the msghistj. In this paper, we investigate three real-time safety verification problems for distributed cyber-physical systems as defined in the following. Problem 1 (Local safety verification in real-time). The real-time local safety ver- ification problem is to compute online the reachable set Reach(Ai) of the agent and verify if it violates the local safety property, i.e., checking Reach(Ai) ∩ Ui = ∅?, where Ui (cid:44) Cixi ≤ di, xi ∈ Xi is the unsafe set of the agent. Problem 2 (Decentralized real-time collision verification). The decentralized real- time collision verification problem is to reason in real-time whether an agent Ai will collide with other agents from its current local time ti c to the computable, safe time instance in the future Tsaf e based on i) the clock mismatches, and ii) the exchanging reachable set messages between agents. Formally, we require c ≤ t ≤ Tsaf e, dij(t) ≥ l, where dij(t) is the distance between agents that ∀ ti Ai and Aj at the time t of the agent Ai local clock, and l is the allowable safe distance between agents. Problem 3 (Decentralized real-time global safety verification). The decentralized real-time global safety verification problem is to construct online (at each agent) the reachable set of all agents globalReach and verify if it violates the global safety property, i.e., checking globalReach ∩ U = ∅, where U (cid:44) Cx ≤ d, x = 1 , . . . , xT [xT N ]T , xi ∈ Xi, is the unsafe set of the whole system. 3 Real-Time Local Safety Verification The first important step in our approach is, each agent Ai computes forwardly its reachable set of states from the current local time ti to the next (ti + T ) seconds which is defined by Ri[ti, ti +T ]. Since there are many variables used in the agent modeling that are irrelevant in safety verification, we only need to compute the reachable set of state that is related to the agent's physical dynamics (so called as motion dynamics) which is defined by a nonlinear ODE xi = f (xi, ui), where xi ∈ Rn is state vector and ui ∈ Rm is the control input vector. The agent can switch from one mode to the another mode via discrete transitions, and in each mode, the control law may be different. When the agent computes its reachable set, the only information it needs are its current set of states xi(ti) and the current control input ui(ti). It should be clarified that although the control law may be different among modes, the control signal ui is updated with the same control period T i c . Consequently, ui is a constant vector in each control period. j = j × Tc, using its local sensors and GPS, we have the current state of the agent xi. Note that the local sensors and the provided GPS can only provide the information of interest to some accuracy, therefore the actual state of the agent is in a set xi ∈ Ii. The control signal ui is computed based on the state xi and a reference signal, e.g., a set point denoting where the agent needs to go to, and then computed control signal is applied to the actuator to control the motion of the agent. From the current set of states Ii and the control signal ui, we can compute the forward reachable set of the agent for the next ti j +T seconds. This reachable set computation needs runtime ≥ T i to be completed after an amount of time T i c , a new ui will be updated. The control period T i c is chosen based on the agent's motion dynamics, and thus to control an agent with fast dynamics, the control period T i c needs to be sufficiently small. This is the source of the requirement that the allowable run-time for reachable set computation be small. Assuming that the agent's current time is ti runtime < T i c because if T i To compute the reachable set of an agent in real-time, we use the well-known face-lifting method [5, 8] and a hyper-rectangle to represent the reachable set. This method is useful for short-time reachability analysis of real-time systems. It allows users to define an allowable run-time T i runtime, and has no dynamic data structures, recursion, and does not depend on complex external libraries as in other reachability analysis methods. More importantly, the accuracy of the reachable set computation can be iteratively improved based on the remaining allowable run-time. Algorithm 3.1 describes the real-time reachability analysis for one agent. The Algorithm works as follows. The time period [ti, ti + T ] is divided by M steps. Algorithm 3.1 Real-time reachability analysis for agent Ai. Input: Ii, ui, ti, T , hi, T i Output: Ri[ti, ti + T ], saf e = true or saf e = uncertain runtime, Ui % Current reachable set % Remaining reach time % Reach time step runtime % Remaining run-time 1 > 0) do while (T i CR = Ii saf e = true T i while T i 2 = T 2 > 0 do step = hi T i 1 = T i 1: procedure Initialization 2: 3: 4: procedure Reachability Analysis 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: % Update remaining runtime T i 1 = T i if T i else return Ri[ti, ti + T ] = CR, saf e 1 ≤ 0 then break % Do Single Face Lifting R, T (cid:48) = SF L(CR, step, T i 2, ui) CR = R % Update reach set 2 = T (cid:48) % Update remaining reach time T i if (CR ∩ Ui (cid:54)= ∅) then: saf e = uncertain Ri[ti, ti + T ] = CR 1 − (Ai.currentT ime() − ti) step = hi/2 % Reduce reach time step The reach time step is defined by hi = T /M . Using the reach time step and the current set Ii, the face-lifting method performs a single-face-lifting opera- tion. The results of this step are a new reachable set and a remaining reach time T i remainReachT ime < T . This step is iteratively called until the reachable set for the whole time period of interest [ti, ti + T ] is constructed completely, i.e., the remaining reach time is equal to zero. Interestingly, with the reach time step size hi defined above, the face-lifting algorithm may be finished quickly after an amount of time which is smaller than the allowable run-time T i runtime specified by user, i.e., there is still an amount of time called remaining run time T i runtime that is available for us to recall the face-lifting algorithm with a smaller reach time step size, for example, we can recall the face-lifting algorithm with a new reach time step hi/2. By doing this, the con- servativeness of the reachable set can be iteratively improved. The core step of face-lifting method is the single-face-lifting operation. We refer the readers to [5] for further detail. As mentioned earlier, the local safety property of each agent can be verified at run-time simultaneously with the reachable set computation process. Precisely, let Ui (cid:44) Cixi ≤ di be the unsafe region of the ith agent, the agent is said to be safe from ti to ti + t ≤ ti + T if Ri[ti, ti + t] ∩ Ui = ∅. Since remainRunT ime < T i Fig. 1: Timeline for reachable set computing, encoding, transferring, decoding and collision checking. the reachable set Ri[ti, ti + t] is given by the face-lifting method at run-time, the local safety verification problem for each agent can be solved at run-time. Since the Algorithm 3.1 computes an over-approximation of the reachable set of each agent in a short time interval, it guarantees the soundness of the result as described in the following lemma. [5, 8] The real-time reachability analysis algorithm is sound, i.e., Lemma 1. the computed reachable set contains all possible trajectories of agent Ai from ti to ti + T . 4 Decentralized Real-Time Collision Verification Our collision verification scheme is performed based on the exchanged reachable set messages between agents. For every control period Tc, each agent executes the real-time reachability analysis algorithm to check if it is locally safe and to obtain its current reachable set with respect to its current control input. When the current reachable set is available, the agent encodes the reachable set in a message and then broadcasts this message to its cooperative agents and listens to the upcoming messages sent from these agents. When a reachable set message arrives, the agent immediately decodes the message to construct the current reachable set of the sender and then performs peer-to-peer collision detection. The process of computing, encoding, transferring, decoding of the reachable set along with collision checking is illustrated in Figure 1 based on the agent's local clock. Let ti rs, ti e, ti c respectively be the instants that we compute, encode, transfer, decode the reachable set and do collision checking on the agent d, and ti tf , ti Agent Ai 's (local) time lineGlobal timeAgent Aj's (local) time line≤δjCompute reach setFinish computationEncode reach set≤δiFinish encodingBroadcast reach set Receive reach setDecode reach set Finish decodingCheck collisionReach set computation timeτrsiReach set computation timeτrsjEncoding timeτeiEncoding timeτejReach set transferring timeτtfjReach set transferring timeτtfiDecoding timeτdjDecoding timeτdi+1trsitrsteittfitditcitettftdtctrsjtejttfjtdjtcjElapsed time between computing reachable set and checking collision of agent AjτelapsedjτelapsediElapsed time between computing reach set and checking collision of agent Ai Fig. 2: Useful reachable set. Ai. Note that these time instants are based on the agent Ai's local clock. The actual run-times are defined as follows. τ i rs = ti τ i e = ti tf ≈ tj τ i τ i d = ti e − ti tf − ti d − ti c − ti rs, % reachablet set computation time, e, % encoding time, tf , % transferring time, d, % decoding time. Note that we do not know the exact transfer time τ i tf since it depends on two different local time clocks. The above transfer time formula describes its approximate value when neglecting the mismatch between the two local clocks. The actual reachable set computation time is close to the allowable run-time chosen by user, i.e., τ i runtime. We will see later that the encoding time and decoding time are fairly small in comparison with the transferring time, i.e., e ≈ τ i τ i tf . All of these run-times provide useful information for selecting an appropriate control period Tc for an agent. However, for collision checking pur- pose, we only need to consider the time instants that an agent starts computing reachable set ti rs and checking collision ti c. rs ≈ T i d (cid:28) τ i A reachable set message contains three pieces of information: the reachable set which is a list of intervals, the time period (based on the local clock) in which this reachable set is valid, i.e., the start time ti rs + T and the time instant that this message is sent. Based on the timing information of the reachable set and the time-synchronization errors, an agent can examine whether or not a received reachable set contains information about the future behavior of the sent agent which is useful for checking collision. The usefulness of the reachable sets used in collision checking is defined as follows. rs and the end time ti Definition 1 (Useful reachable sets). Let δi and δj respectively be the time- synchronization errors of agent Ai and Aj in comparison with the virtual global time t, i.e, t − δi ≤ ti ≤ t + δi and t − δj ≤ tj ≤ t + δj, where ti and tj are current local times of Ai and Aj respectively. The reachable sets Ri[ti rs + T ] and Rj[tj rs + T ] of the agent Aj that are available at the agent Ai at time ti c rs, tj rs, ti Agent i 's (local) time lineGlobal timeAgent j's (local) time linetrsitrstcitctrsjtcj Useful reach set R itrsi+TUseless reach set L itrsi+T>tcitrsi+T≤tci Useful reach set Rjtrsj+TUseless reach set L jtrsj+T≤tcjtrsj+T>tcjFuture timePast time Future time Past time are useful for checking collision between Ai and Aj if: ti c < tj ti c < ti rs + T − δi − δj, rs + T. (1) rs, tj Assume that we are at a time instant where the agent Ai checks if a collision occurs. This means that the current local time is ti c. Note that agent Ai and Aj are synchronized to the global time with errors δi and δj respectively. The reachable set Rj[tj rs + T ] is useful if it contains information about the future behavior of agent Aj under the view of the agent Ai based on its local clock. This can be guaranteed if we have: tj c + δi. Additionally, the current reachablet set of agent Ai contains information about its future behavior if ti rs + T + δi + δj, then the reachable set of Aj contains a past information, and thus it is useless for checking collision. One interesting case is when tj c < tj rs + T + δi + δj. In this case, we do not know whether the received reachable set is useful or not. rs + T as depicted in Figure 2. We can see that if ti rs + T − δi − δj < ti rs − δj + T > ti rs + T ≥ ti c < ti c > tj Remark 1. We note that the proposed approach does not rely on the concept of Lamport happens-before relation [20] to compute the local reachable set of each agent. If the agent could not receive reachable messages from others until a requested time-stamp expires, it still calculates the local reachable set based on its current state and the state information of other agents in the messages it received previously. In other words, our method does not require the reachable set of each agent to be computed corresponding to the ordering of the events (sending or receiving a message) in the system, but only relies on the local clock period and the time-synchronization errors between agents. Such implementation ensures that the computation process can be accomplished in real-time, and is not affected by the message transmission delay. The peer-to-peer collision checking procedure depicted in Algorithm 4.2 works as follows: when a new reachable set message arrives, the receiving agent decodes the message and checks the usefulness of the received reachable set and its cur- rent reachable set. Then, the agent combines its current reachable set and the received reachable set to compute the minimum possible distance between two agents. If the distance is larger than an allowable threshold l, there is no collision between two agents in some known time interval in the future, i.e., Tsaf e. Lemma 2. The decentralized real-time collision verification algorithm is sound. Proof. From Lemma 1, we know that the received reachable set Rj[tj rs + T ] contains all possible trajectories of the agent Aj from tj rs + T . Also, the current reachable set of the agent Ai, Ri[ti rs + T ], contains all possible trajectories of the agent from ti rs + T . If those reachable sets are useful, then they contains all possible trajectories of two agents from ti c to sometime rs + T − δi − δj, ti Tsaf e = min(tj rs + T ) in the future based on the agent Ai clock. Therefore, the minimum distance dmin between two agents computed from two rs to tj rs to ti rs, tj rs, ti Algorithm 4.2 Decentralized Real-Time Collision Verification at Agent Ai. Input: l, % safe distance between agents Output: collision, Tsaf e % collision flag and safe time interval in the future rs, tj rs + T ] arrive then if new message Rj[tj rs % current reachable set start time rs + T − δi − δj and ti decode message ti c = Ai.current time() % current time rs = Ri.ti ti c < tj if ti compute possible minimum distance dmin between two agents if dmin > l then 1: procedure Peer-to-Peer Collision Detection 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: Collision = false Tsaf e = min(tj Collision = uncertain, Tsaf e = [ ] rs + T − δi − δj, ti store the message rs + T ) c < ti rs + T then % check usefulness else reachable sets is the smallest distance among all possible distances in the time interval [ti c, Tsaf e]. Consequently, the collision free guarantee is sound in the time interval [ti c, Tsaf e]. We have studied how to use exchanged reachable sets to do peer-to-peer collision detection. Next, we consider how to verify online the global behavior of a distributed CPS in decentralized manner. 5 Decentralized Real-Time Global Safety Verification Definition 2 (Globally useful reachable set.). Consider a distributed CPS with N agents with time synchronization errors δi, i = 1, 2, . . . , N , a globally useful reachable set of the whole system under the view of agent Ai based on its current local time clock ti c is defined below: N(cid:94) globalReach = Ri[ti rs, ti c ≤ t ≤ T + min{ti i=1 rs + T ] ∧ T , rs − δi − δj}, j (cid:54)= i, 1 ≤ j ≤ N ). T ∆= (ti (2) For any time t such that ti we have Ri(t) ⊆ Ri[ti possible trajectories of all agents from the current local time ti the future time defined by T + min{ti rs−δi−δj} for ∀ 1 ≤ j ≤ N, i (cid:54)= j, rs + T ],∀i. In other words, globalReach contains all c of agent Ai to rs − δi − δj}, j (cid:54)= i, 1 ≤ j ≤ N . c ≤ t ≤ T +min{ti rs, ti It should be noted that to construct a global reachable set, an agent needs to wait for all messages arrive and then decodes all these messages. This process may have an expensive computation cost especially when the number of agents increases. Since this global reachable set is only valid in an interval of time, the amount of time that is available for verify the global property may be small and not enough for the agent to perform the global safety verification. Having additional hardware for handling in parallel the processes of receiving/decoding messages is a good solution to overcome this challenge. Using the globally useful reachable set, the global safety verification problem is equivalent to checking whether the globally useful reachable set intersects with the global unsafe region defined by U ∆= Cx ≤ d, where x = [xT N ]T and xi is the state vector of agent Ai. The procedure for global safety verification is summarized in Algorithm 5.3. 2 ,··· , xT 1 , xT Algorithm 5.3 Decentralized Real-Time Global Safety Verification at Agent Ai. Input: U, % global unsafe constraints Output: global saf e, Tglobal saf e % global safe flag and safe time interval in the future global saf e = true % global safety flag 1: procedure Initialization 2: 3: procedure Global Safety Verification 4: if all useful messages are available then 5: 6: 7: 8: 9: 10: 11: 12: 13: ti c = Ai.current time() recheck if all messages are still useful construct globally useful reach set globalReach if (globalReach ∩ U (cid:54)= ∅) then global saf e = uncertain Tglobal saf e = [ ] global saf e = true Tglobal saf e = T + min{ti else rs − δi − δj}, j (cid:54)= i, 1 ≤ j ≤ N Lemma 3. The decentralized real-time global safety verification algorithm is sound. Proof. Similar to Lemma 2, the soundness of the verification algorithm is guar- antee because of the soundness of the globally useful reachable set containing all possible trajectories of all agents at any time t ∈ T , where T ∆= (ti c ≤ t ≤ T + min{ti rs − δi − δj}, j (cid:54)= i, 1 ≤ j ≤ N ). 6 Case study The decentralized real-time safety verification for distributed CPS proposed in this paper is implemented in Java as a package called drreach. This package is Fig. 3: Distributed Search Application Using Quadcopters. currently integrated as a library in StarL, which is a novel platform-independent framework for programming reliable distributed robotics applications on An- droid [22]. StarL is specifically suitable for controlling a distributed network of robots over WiFi since it provides many useful functions and sophisticated algorithms for distributed applications. In our approach, we use the reliable com- munication network of StarL which is assumed to be asynchronous and peer-to- peer. There may be message dropouts and transmission delays; however, every message that an agent tries to send is eventually delivered with some time guar- antees. All experimental results of our approach are reproducible and available online at: http://www.verivital.com/rtreach/. 6.1 Experiment setup We evaluate the proposed approach via a distributed search application using quadcopters5 in which each quadcopter executes its search mission provided by users as a list of way-points depicted in Figure 3. These quadcopters follow the way-points to search for some specific objects. For safety reasons, they are required to work only in a specific region defined by users. In this case study, the quadcopters are controlled to operate at the same constant altitude. It has been shown from the experiments that the proposed approach is promisingly scalable as it works well for a different number of quadcopters. We choose to present in this section the experimental results for the distributed search application with eight quadcopters. The first step in our approach is locally computing the reachable set of each quadcopter using face-lifting method. The quadcopter has nonlinear motion dy- namics given in Equation 3 in which θ, φ, and ψ are the pitch, roll, and yaw angles, f = Σ4 i=1Ti is the sum of the propeller forces, m is the mass of the 5 A video recording is available at: https://youtu.be/YC_7BChsIf0 𝓐𝟏𝓐𝟐𝓐𝟔𝓐𝟕𝓐𝟖𝓐𝟑𝓐𝟓𝓐𝟒𝓐𝟏𝓐𝟐𝓐𝟑𝓐𝟒𝓐𝟓𝓐𝟔𝓐𝟖𝓐𝟕 quadcopter and g = 9.81m/s2 is the gravitational acceleration constant. As the quadcopter is set to operate on a constant altitude, we have z = 0 which yields cos(θ)cos(φ) . Let vx and vy be the velocities of a the following constraint: f = quadcopter along with x- and y- axes. Using the constraint on the total force, the motion dynamics of the quadcopter can be rewritten as a 4-dimensional nonlinear ODE as depicted in Equation 4. mg x = y = f m f m f m (sin(ψ)sin(φ) + cos(ψ)sin(θ)cos(φ)), (sin(ψ)sin(θ)cos(φ) − sin(φ)cos(ψ)), cos(θ)cos(φ) − g, x = vx, vx = gtan(θ), y = vy, (4) (3) tan(φ) cos(θ) . vy = g z = A PID controller is designed to control the quadcopter to move from its cur- rent position to desired way-points. Details about the controller parameters can be found in the available source code. The PID controller has a control period of Tc = 200 milliseconds. In every control period, the control inputs pitch (θ) and roll (φ) are computed based on the current positions of the quadcopter and the current target position (i.e., the current way-point it needs to go). Using the con- trol inputs, the current positions and velocities given from GPS and the motion dynamics of the quadcopter, the real-time reachable set computation algorithm (Algorithm 3.1) is executed inside the controller. This algorithm computes the reachable set of a quadcopter from its current local time to the next T = 2 sec- onds. The allowable run-time for this algorithm is Truntime = 10 milliseconds. The local safety property is verified by the real-time reachable set computation algorithm at run-time. The computed reachable set is then encoded and sent to another quadcopter. When a reachable set message arrives, the quadcopter decodes the message to reconstruct the current reachable set of the sender. The GPS error is assumed to be 2%. The time-synchronization error between the quadcopters is δ = 3 milliseconds. We want to verify in real-time: 1) local safety property for each quadcopter; 2) collision occurrence; and 3) geospatial free property. The local safety property is defined by vx ≤ 500, i.e., the maximum allowable velocities along the x-axis of two arbitrary quadcopters are not larger than 500m/s. The collision is checked using the minimum allowable distance between two arbitrary quadcopters dmin = 100. The geospatial free property requires that the some quadcopters never go into a specific region at the same time. 6.2 Verifying local safety property and collision occurrence Figure 4 presents a sample of a sequence of events happening in the distributed search application. One can see that each quadcopter can determine based on its local clocks if there is no collision to some known time in the future. In addition, the local safety property can also be verified at run-time. For example, in the figure, the quadcopter 1 receives a reachable set message from the quadcopter 0 which is valid from 17 : 29 : 49.075 to 17 : 29 : 51.074 of the quadcopter 0's Fig. 4: A sample of events for verifying local safety property and collision occur- rence. Fig. 5: One sample of the reachable sets of eight quadcopters in [0, 2s] time interval and their interval hulls. clock. After decoding this message, taking into account the time-synchronization error δ, quadcopter 1 realizes that the received reachable set message is useful for checking collision for the next 1.645 seconds of its clock. After checking collision, quadcopter 1 knows that it will not collide with the quadcopter 0 in the next 1.645 seconds (based on its clock). It should be noted that we can intuitively verify the collision occurrences by observing the intermediate reachable sets of all quadcopters and their interval hulls. The intermediate reachable sets of the quadcopters in every [0, 2s] time interval computed by the real-time reachable set computation algorithm (i.e., Algorithm 3.1) is described in Figure 5. The zoom plot within the figure presents a very short-time interval reachable set of the quadcopters. We note that the intermediate reachable set of a quadcopter is represented as a list of hyper- rectangles and is used for verifying the local safety property at run-time. The reachable set that is sent to another quadcopter is the interval hull of these hyper-rectangles. The intermediate reachable set cannot be transferred via a network since it is very large (i.e., hundreds of hyper-rectangles). The interval hull of all hyper-rectangles contained in the intermediate reachable set covers all possible trajectories of a quadcopter in the time interval of [0, 2s]. Therefore, it can be used for safety verification. One may question why we use the interval hull instead of using the convex hull of the reachable set since the former one results in a more conservative result. The reason is that we want to perform the safety verification online, convex hull of hundreds of hyper-rectangles is a time- consuming operation. Therefore, in the real-time setting, interval hull operation is a suitable solution. From the figure, we can see that the interval hulls of the reachable set of all quadcopters do not intersect with each other. Therefore, there is no collision occurrence (in the next 2 seconds of global time). Time Quad. 1 Quad. 2 Quad. 3 Quad. 4 Quad. 5 Quad. 6 Quad. 7 Quad. 8 Ecoding Time τe (ms) 0.058 0.055 0.0553 0.0525 0.0557 0.0583 0.0584 0.0597 Decoding Time τd (ms) 0.0169 0.0193 0.0197 0.019 0.0210 0.0181 0.0177 0.022 Transferring Time τtf (ms) Collision Checking Time τc (ms) 2.64 0.04 2.48 0.05 1.42 0.07 1.11 0.05 1.12 0.03 1.08 0.07 1.05 0.07 1.13 0.14 Total Verification Time V T (ms) 28.9363 19.1037 Table 1: The average encoding time τe, decoding time τd, transferring time τtf , collision checking time τc and total verification time V T of the quadcopters. 18.2527 18.0223 18.235 27.9 20.6232 18.3055 Since we implement the decentralized real-time safety verification algorithm inside the quadcopter's controller, it is important to analyze whether or not the verification procedure affects the control performance of the controller. To reason about this, we measure the average encoding, decoding, transferring and collision checking times for all quadcopters using 100 samples which are pre- sented in Table 1. We note that the transferring time τtf is the average time for one message transferred from other quadcopters to the ith quadcopter. It can be seen that the encoding, decoding and collision checking times at each quad- copter constitute a tiny amount of time. The total verification time is the sum of the reachable set computation, encoding, transferring, decoding and collision e + (N − 1) × (τ i checking times. Note that the allowable runtime for reachable set computation algorithm is specified by users as Truntime = 10 milliseconds. Therefore, the (average) total time for the safety verification procedure on each quadcopter is V Ti = Truntime + τ i c), where i = 1, 2, . . . , N , and N is the number of quadcopters. As shown in the Table, the (average) total veri- fication time for each quadcopter is small (< 30 milliseconds), compared to the control period Tc = 200 milliseconds. Besides, from the experiment, we observe that the computation time for the control signal of the PID controller τ i control (not presented in the table) is also small, i.e., from 5 to 10 milliseconds. Since V Ti + τ i control < Tc/4 = 50 milliseconds, we can conclude that the verification procedure does not affect the control performance of the controller. tf + τ i d + τ i Interestingly, from the verification time formula, we can estimate the range of the number of agents that the decentralized real-time verification procedure can deal with. The idea is that, in each control period Tc, after computing the control signal, the remaining time bandwidth Tc − τcontrol can be used for verification. Let ¯τe(τ e), ¯τtf (τ tf ), ¯τd(τ d), ¯τc(τ c) be the maximum (minimum) encoding, transferring, decoding and collision checking times on a quadcopter, ¯τcontrol(τ control) be the maximum (minimum) control signal computation time for each control period Tc, then the number of agents that the decentralized real-time safety verification procedure can deal with (with assumption that the communication network works well) satisfies the following constraint: Tc − ¯τcontrol − Truntime − ¯τe + 1 ≤ N ≤ Tc − τ control − Truntime − τ e + 1. (5) ¯τtf + ¯τd + ¯τc τ tf + τ d + τ c Let consider our case study, from the Table, we assume that ¯τe = 0.0597, τ e = 0.0525, ¯τtf = 2.64, τ tf = 1.05, ¯τd = 0.022, τ d = 0.0169, ¯τc = 0.14, τ c = 0.03 milliseconds. Also, we assume that ¯τcontrol = 10 and τ control = 5 milliseconds. We can estimate theoretically the number of quadcopters that our verification approach can deal with is 64 ≤ N ≤ 168. 6.3 Verifying geospatial free property To illustrate how our approach verifies the global behavior of a distributed CPS, we consider the geospatial free property which requires that the some (or all) quadcopters never go into a specific region at the same time. For simplification, we reconsider the distributed search application with two quadcopters (quad 1 and quad 2) whose forbidden region is defined by 900 < x0 < 1200∧ 900 < x1 < 1200. Figure 6 describes a sample of events describing that the quadcopter 2 can verify based on its local clock that it will not collide with the quadcopter 1 and the global geospatial free property is guarantee in the next 1.838 seconds. 7 Discussion The current implementation of our approach deploys the safety verifier of each agent inside the controller, and a single thread is used to execute the control Fig. 6: A sample of events for verifying geospatial free property. Fig. 7: Software architecture for deploying decentralized real-time safety verifi- cation approach on a real platform. and verification tasks. The main drawback of this implementation is that it may decrease the overall performance of the controller and even cause the controller to crash. To prevent this happens, in practice, the controller and verifier should be implemented in two separate software components. In this case, the computation burden for safety checks in the verifier does not affect the performance of the quadcopter0 computes it reach set from 2019-09-16 17:26:20.957 to 2019-09-16 17:26:22.956quadcopter0 encodes its reach set to send out in 0.017749 millisecondsquadcopter0 broadcasts its reach set to othersquadcopter0 may violates its local safety specification at time 2019-09-16 17:26:22.956quadcopter1 receives reach set (hull) from quadcopter0Time for transferring this reach set over network is around (not considering clock mismatch) 66 millisecondsDecoding message from quadcopter0 takes 0.029057 milliseconds Reach set (hull) of quadcopter0 that is valid from 2019-09-16 17:26:20.957 to 2019-09-16 17:26:22.956 of its local time is:dim = 0 -> [89.18, 280.21] dim = 1 -> [39.31, 58.43] dim = 2 -> [804.58, 1240.06] dim = 3 -> [91.37, 126.26] Current reach set (hull) of quadcopter1 that is valid from 2019-09-16 17:26:20.119 to 2019-09-16 17:26:22.118 of its local time is:dim = 0 -> [1946.28, 2060.66] dim = 1 -> [25.17, 33.29] dim = 2 -> [787.92, 1566.04] dim = 3 -> [184.97, 203.86] Current local time of quadcopter1 is 2019-09-16 17:26:21.112Useful time for checking collision and global safety property is 1838 millisecondsThe received reachable set from quadcopter0 is useful quadcopter1 will not collide with quadcopter0 in the next 1.838 secondsThe geospatial free property is guarantee in the next 1.838 secondsComplex ControllerVerifierPlanerPlantSensingSafe ControllerMapDecision MakerActuator CommandsEncoderDecoderSafety CheckerDecoder 1...Decoder 2Decoder NBroadcast ReachSet messagesComing ReachSet MessagesChecker 1Checker 2Checker N...Global Checker Reachable Set CalculatorLocal Checker Global Safety SpecificationsLocal Safety SpecificationsCollision Checkers controller. The control task and the verification task can be executed efficiently in parallel as depicted in Figure 7. More importantly, this software architecture adopts the architecture of a fault-tolerant system [14] to prevent the propagation of failure from one component to others. It also benefits the use of simplex- architecture for safety control in the case of dangerous circumstances. As shown in Figure 7, the verifier component consists of four sub-components including reachable set calculator, encoder, decoder, and safety checker. These sub-components should also be implemented conveniently for parallel execution. The local safety property is verified inside the reachable set calculator at run- time. As the number of reachable set messages needs to be decoded increases with the number of participating agents, it is necessary to have multiple decoders working in parallel. These decoders listen to upcoming reachable set messages on different ports assigned to them by the verifier and immediately decode any arrived message. This parallel decoding helps to reduce the decoding time signif- icantly. The decoded reachable sets are then sent to the safety checker containing multiple checkers run in parallel in which each checker is responsible for checking collision between the agent with another. The ith checker and the ith decoder is a pair worker, i.e., the checker only waits for the decoded reachable set of its corresponding co-worker. Therefore, the pair to pair collision detection task can be done very quickly. The safety checker also has a global checker which is responsible for checking global properties. The global checker is only triggered when the decoder component finishes decoding all arrived reachable set mes- sages. For this reason, having parallel working decoders is essential to speed up the overall verification time which is required to be very small to work in the real-time setting. To analyze how fast our verification technique can achieved with the proposed software architecture, let ¯τrs, ¯τe, ¯τtf and ¯τd respectively be the worst case times of reachable set computation, encoding, transferring and decoding, ¯τcc and ¯τgc be the worst case times of peer-to-peer collision detection and global safety verification. For a system with N agents, the total worst-case verification time is ¯τtotal = ¯τrs + ¯τe + ¯τtf + ¯τd + ¯τcc + ¯τgc. If we do the verification in sequential way, i.e., using only one port for reachable set communication and one checker for all peer-to-peer collision detection and global safety verification, the total worst-case verification is: ¯τ∗ total = ¯τrs + ¯τe + ¯τtf + N ¯τd + N ¯τcc + ¯τgc >> ¯τtotal. Scalability. From the above discussion, one can see that the software ar- chitecture plays an important role when we implement our approach in a real platform. In practice, if each participating agent has the powerful hardware for communication and computation, and the software for our approach is imple- mented in a parallel manner as proposed above, then the worst-case verification time does not depend on the number of agents in the system. Therefore, our decentralized real-time safety verification approach is scalable for systems with a large number of agents. Also, the proposed software architecture is especially useful in the case that there are losses of reachable set messages. In this hazardous situation, the agent still has some partial information to check if a collision oc- curs based on the available, reachable set messages. Therefore, the planner still can re-perform path planning algorithm based on the current information and past information it has to find the safest path for the agent for this incomplete information situation. 8 Related Work Our work is inspired by the static and dynamic analysis of timed distributed traces [10] and the real-time reachability analysis for verified simplex design [5]. The former one proposes a sound method of constructing a global reachable set for a distributed CPS based on the recorded traces and time synchronization errors of participating agents. Then the global reachable set is used to verify a global property using Z3 [9]. This method can be considered to be a centralized analysis where the reachable set of the whole system is constructed and verified by one analyzer. Such a verification approach is offline which is fundamentally different from our approach as we deal with online verification in a decentralized manner. Our real-time verification method borrows the face-lifting technique developed in [5] and applies it to a distributed CPS. Another interesting aspect of real-time monitoring for linear systems was recently published in [7]. In this work, the authors proposed an approach that combines offline and online computation to decide if a given plant model has entered an uncontrollable state which is a state that no control strategy can be applied to prevent the plant go to the unsafe region. This method is useful for a single real-time CPS, but not a distributed CPS with multiple agents. Additionally, there has been other significant works for verifying distributed CPS. Authors of [11, 26, 30] presented a real-time software for distributed CPS but did not perform a safety verification of individual components and a whole system. The works presented in [2,17, 19] can be used to verify distributed CPS, but they do not consider a real-time aspect. An interesting work proposed in [24] can formally model and verify a distributed car control system against several safety objectives such as collision avoidance for an arbitrary number of cars. However, it does not address the verification problem of distributed CPS in a real-time manner. The novelty of our approach is that it can over-approximate of the reachable set of each agent whose dynamics are non-linear with a high precision degree in real-time. The most related work to our scheme was recently introduced in [23]. The au- thors proposed an online verification using reachability analysis that can guaran- tee safe motion of mobile robots with respective to walking pedestrians modeled as hybrid systems. This work utilizes CORA toolbox [1] to perform reachability analysis while our work uses a face-lifting technique. However, this work does not consider the time-elapse for encoding, transferring and decoding the reachable set messages between each agent, which play an important role in distributed systems. 9 Conclusion and Future Work We have proposed a decentralized real-time safety verification method for dis- tributed cyber-physical systems. By utilizing the timing information and the reachable set information from exchanged reachable set messages, a sound guar- antee about the safety of the whole system is obtained for each participant based on its local time. Our method has been successfully applied for a dis- tributed search application using quadcopters built upon StarL framework. The main benefit of our approach is that it allows participants to take advantages of formal guarantees available locally in real-time to perform intelligent actions in dangerous situations. This work is a fundamental step in dealing with real-time safe motion/path planing for distributed robots. For future work, we seek to deploy this method on a real-platform and extend it to distributed CPS with heterogeneous agents where the agents can have different motion dynamics and thus they have different control periods. In addition, the scalability of the pro- posed method can be improved by exploiting the benefit of parallel processing, i.e., each agent handles multiple reachable set messages and checks for collision in parallel. Acknowledgments The material presented in this paper is based upon work supported by the Air Force Office of Scientific Research (AFOSR) through contract number FA9550- 18-1-0122 and the Defense Advanced Research Projects Agency (DARPA) through contract number FA8750-18-C-0089. The U.S. Government is authorized to re- produce and distribute reprints for Government purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the offi- cial policies or endorsements, either expressed or implied, of AFOSR or DARPA. References 1. Althoff, M.: An introduction to cora 2015. In: Proc. of the Workshop on Applied Verification for Continuous and Hybrid Systems (2015) 2. Bae, K., Krisiloff, J., Meseguer, J., Olveczky, P.C.: Designing and verifying dis- tributed cyber-physical systems using multirate pals: An airplane turning control system case study. Science of Computer Programming 103, 13 -- 50 (2015) 3. Bak, S., Duggirala, P.S.: Hylaa: A tool for computing simulation-equivalent reach- ability for linear systems. In: Proceedings of the 20th International Conference on Hybrid Systems: Computation and Control. pp. 173 -- 178. ACM (2017) 4. Bak, S., Duggirala, P.S.: Simulation-equivalent reachability of large linear systems with inputs. In: International Conference on Computer Aided Verification. pp. 401 -- 420. Springer (2017) 5. Bak, S., Johnson, T.T., Caccamo, M., Sha, L.: Real-time reachability for verified simplex design. In: Real-Time Systems Symposium (RTSS), 2014 IEEE. pp. 138 -- 148. IEEE (2014) 6. Chen, X., ´Abrah´am, E., Sankaranarayanan, S.: Flow*: An analyzer for non-linear hybrid systems. In: International Conference on Computer Aided Verification. pp. 258 -- 263. Springer (2013) 7. Chen, X., Sankaranarayanan, S.: Model predictive real-time monitoring of linear systems. In: Real-Time Systems Symposium (RTSS), 2017 IEEE. pp. 297 -- 306. IEEE (2017) 8. Dang, T., Maler, O.: Reachability analysis via face lifting. In: Hybrid Systems: Computation and Control (HSCC '98). pp. 96 -- 109. Springer (1998), lNCS 1386 9. De Moura, L., Bjørner, N.: Z3: An efficient smt solver. In: International conference on Tools and Algorithms for the Construction and Analysis of Systems. pp. 337 -- 340. Springer (2008) 10. Duggirala, P.S., Johnson, T.T., Zimmerman, A., Mitra, S.: Static and dynamic analysis of timed distributed traces. In: Real-Time Systems Symposium (RTSS), 2012 IEEE 33rd. pp. 173 -- 182. IEEE (2012) 11. Eidson, J.C., Lee, E.A., Matic, S., Seshia, S.A., Zou, J.: Distributed real-time software for cyber -- physical systems. Proceedings of the IEEE 100(1), 45 -- 59 (2012) 12. Frehse, G., Le Guernic, C., Donz´e, A., Cotton, S., Ray, R., Lebeltel, O., Ripado, R., Girard, A., Dang, T., Maler, O.: Spaceex: Scalable verification of hybrid systems. In: Computer Aided Verification. pp. 379 -- 395. Springer (2011) 13. Girard, A., Le Guernic, C., Maler, O.: Efficient computation of reachable sets of linear time-invariant systems with inputs. In: Hybrid Systems: Computation and Control, pp. 257 -- 271. Springer (2006) 14. Goodloe, A.E., Pike, L.: Monitoring distributed real-time systems: A survey and future directions (2010) 15. Henzinger, T.A.: The theory of hybrid automata. In: IEEE Symposium on Logic in Computer Science (LICS). p. 278. IEEE Computer Society, Washington, DC, USA (1996) 16. Henzinger, T.A., Ho, P.H., Wong-Toi, H.: Hytech: A model checker for hybrid systems. In: Computer aided verification. pp. 460 -- 463. Springer (1997) 17. Johnson, T.T., Mitra, S.: Parametrized verification of distributed cyber-physical systems: An aircraft landing protocol case study. In: Cyber-Physical Systems (IC- CPS), 2012 IEEE/ACM Third International Conference on. pp. 161 -- 170. IEEE (2012) 18. Kong, S., Gao, S., Chen, W., Clarke, E.: dreach: δ-reachability analysis for hybrid systems pp. 200 -- 205 (2015) 19. Kumar, P., Goswami, D., Chakraborty, S., Annaswamy, A., Lampka, K., Thiele, L.: A hybrid approach to cyber-physical systems verification. In: Proceedings of the 49th Annual Design Automation Conference. pp. 688 -- 696. ACM (2012) 20. Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Communications of the ACM 21(7), 558 -- 565 (1978) 21. Le Guernic, C., Girard, A.: Reachability analysis of hybrid systems using support functions. In: Computer Aided Verification. pp. 540 -- 554. Springer (2009) 22. Lin, Y., Mitra, S.: Starl: Towards a unified framework for programming, simulating and verifying distributed robotic systems. CoRR abs/1502.06286 (2015), http: //arxiv.org/abs/1502.06286 23. Liu, S.B., Roehm, H., Heinzemann, C., Lutkebohle, I., Oehlerking, J., Althoff, M.: Provably safe motion of mobile robots in human environments. In: Intelligent Robots and Systems (IROS), 2017 IEEE/RSJ International Conference on. pp. 1351 -- 1357. IEEE (2017) 24. Loos, S.M., Platzer, A., Nistor, L.: Adaptive cruise control: Hybrid, distributed, and now formally verified. In: International Symposium on Formal Methods. pp. 42 -- 56. Springer (2011) 25. Lynch, N., Segala, R., Vaandrager, F., Weinberg, H.B.: Hybrid i/o automata. Springer (1996) 26. Tang, Q., Gupta, S.K., Varsamopoulos, G.: A unified methodology for scheduling in distributed cyber-physical systems. ACM Transactions on Embedded Computing Systems (TECS) 11(S2), 57 (2012) 27. Tran, H.D., Nguyen, L.V., Hamilton, N., Xiang, W., Johnson, T.T.: Reachability analysis for high-index linear differential algebraic equations (daes). In: 17th Inter- national Conference on Formal Modeling and Analysis of Timed Systems (FOR- MATS'19). Springer International Publishing (August 2019) 28. Tran, H.D., Nguyen, L.V., Musau, P., Xiang, W., Johnson, T.T.: Decentralized real-time safety verification for distributed cyber-physical systems. In: P´erez, J.A., Yoshida, N. (eds.) Formal Techniques for Distributed Objects, Components, and Systems (FORTE'19). pp. 261 -- 277. Springer International Publishing, Cham (June 2019) 29. Tran, H.D., Nguyen, L.V., Xiang, W., Johnson, T.T.: Order-reduction abstractions for safety verification of high-dimensional linear systems. Discrete Event Dynamic Systems 27(2), 443 -- 461 (2017) 30. Zhang, Y., Gill, C., Lu, C.: Reconfigurable real-time middleware for distributed cyber-physical systems with aperiodic events. In: Distributed Computing Systems, 2008. ICDCS'08. The 28th International Conference on. pp. 581 -- 588. IEEE (2008)
cs/0612012
1
0612
2006-12-04T03:20:25
Geographic Gossip on Geometric Random Graphs via Affine Combinations
[ "cs.MA", "cs.IT", "cs.IT" ]
In recent times, a considerable amount of work has been devoted to the development and analysis of gossip algorithms in Geometric Random Graphs. In a recently introduced model termed "Geographic Gossip," each node is aware of its position but possesses no further information. Traditionally, gossip protocols have always used convex linear combinations to achieve averaging. We develop a new protocol for Geographic Gossip, in which counter-intuitively, we use {\it non-convex affine combinations} as updates in addition to convex combinations to accelerate the averaging process. The dependence of the number of transmissions used by our algorithm on the number of sensors $n$ is $n \exp(O(\log \log n)^2) = n^{1 + o(1)}$. For the previous algorithm, this dependence was $\tilde{O}(n^{1.5})$. The exponent 1+ o(1) of our algorithm is asymptotically optimal. Our algorithm involves a hierarchical structure of $\log \log n$ depth and is not completely decentralized. However, the extent of control exercised by a sensor on another is restricted to switching the other on or off.
cs.MA
cs
Geographic Gossip on Geometric Random Graphs via Affine Combinations Hariharan Narayanan Department of Computer Science, University of Chicago [email protected] February 2, 2018 Abstract In recent times, a considerable amount of work has been devoted to the develop- ment and analysis of gossip algorithms in Geometric Random Graphs. In a recently introduced model termed "Geographic Gossip," each node is aware of its position but possesses no further information. Traditionally, gossip protocols have always used convex linear combinations to achieve averaging. We develop a new protocol for Geo- graphic Gossip, in which counter-intuitively, we use non-convex affine combinations as updates in addition to convex combinations to accelerate the averaging process. The dependence of the number of transmissions used by our algorithm on the number of sensors n is n exp(O(log log n)2) = n1+o(1). For the previous algorithm, this depen- dence was O(n1.5). The exponent 1+ o(1) of our algorithm is asymptotically optimal. Our algorithm involves a hierarchical structure of log log n depth and is not completely decentralized. However, the extent of control exercised by a sensor on another is re- stricted to switching the other on or off. 1 Introduction Geometric Random Graphs have become an accepted model for wireless ad hoc and sensor networks. Due to applications in distributed sensing, a significant amount of effort has been directed towards developing energy efficient algorithms for information exchange on these graphs. The problem of distributed averaging has been studied intensively because it appears in several applications such as estimation on ad hoc networks, and encapsulates many of the difficulties faced in asynchronous distributed computation. Let v1, . . . , vn be n points independently chosen uniformly at random from a unit square in R2. A Geometric Random Graph G(n, r) is obtained from these points by connecting any two points within 1 Euclidean distance r. A Gossip Algorithm is an averaging algorithm that, after a certain number of information exchanges and updates, leaves each node with a value close to the average of all the originally held values. 1.1 Related Work There is an extensive body of work surrounding the subject of gossip algorithms in various contexts. Here, we only survey the results relevant in a narrow sense to the question under consideration. Gupta and Kumar [4] gave conditions under which G(n, r) is connected with high probability n ) in order that G(n, r) be connected with (w.h.p.). It is sufficient that r scales as Ω(q log n probability greater than 1 − n−Θ(1). A distributed Gossip Algorithm for arbitrary graphs was presented by Boyd et al [1]. In this algorithm, when the clock of a sensor s ticks, s sends its value xs to a sensor v chosen uniformly at random from its neighbors, and receives the value xv of v. Thereafter s and v set their values to xs+xv . The dependence of the number of transmissions required by this algorithm on n is O(n2). The performance was related to the mixing time of the natural random walk on that graph. In fact they showed that if the connectivity graph is G, the number of transmissions made in the course of the algorithm is Θ(nTmix(G)), where Tmix(G) is the mixing time of G. 2 In the standard framework for modeling sensor networks, n sensors are placed at random n ). One does not assume that a sensor possesses any information about its own location. In this model, the number of transmissions that the best known algorithm uses is O(n2) as described above.1 on a unit square (cid:3) and have a radius of connectivity r = Θ(q log n A more powerful model was proposed by Dimakis et al [5], wherein each sensor is aware of its own location with reference to (cid:3) , but possess no further information. It is mentioned in [5] that this is reasonable in typical scenarios. With this model, by exploiting geographic information, they were able to provide an algorithm that requires O(n1.5) transmissions. In their algorithm, each node exchanges its value with the node nearest to a position chosen randomly on (cid:3), and both nodes replace their values by the average as in the algorithm of Boyd et al [1]. Rejection sampling is used to make the distribution roughly uniform on nodes. The routing takes O(√n) hops w.h.p, but since the mixing time on the complete graph is O(1), one obtains an algorithm using O(n1.5) transmissions, which is an improvement over [1] by a factor of O(√n). A natural approach to obtaining more efficient algorithms would be to engage in long-range 1In using O, we ignore polylogarithmic factors and depending on context, the dependence on parameters other than n. 2 information exchanges less frequently than short-range ones. However, it appears that the benefit derived from an improved mixing time with long-range transmissions more than compensates for the additional cost in terms of hops for a long-range routing. Due to this fact, simply altering the probability distribution with which a node picks targets seems to be counterproductive. 1.2 Our Contribution An affine combination of two vectors a and b has the form αa + (1− α)b. Unlike the case of convex combinations, α need not belong to [0, 1]. We introduce counter-intuitive update rules which are affine combinations rather than convex combinations (with coefficients possibly as large as Ω(√n)) to achieve faster averaging. The total number of transmissions used by the proposed algorithm in order that the ℓ2-distance of the output from the average diminish by a multiplicative factor of ǫ w.h.p, is n exp(O((log log n) log log n log log n ) the number of transmissions is n1+o(1). The exponent 1+o(1) is asymptotically optimal, since every node must make at least one transmission for an averaging algorithm to work. Like previous algorithms, ours makes packet exchanges with random nodes. Due to the instability introduced into the system by the use of non-convex combinations, for the present analysis to hold, a certain amount of control needs to be exercised and our algorithm is not truly decentralized. However, the extent of control exerted by any sensor on another is restricted to switching the other on or off. ǫ )). When ǫ = exp(n o(1) 2 Preliminaries The standard model for a sensor network is as follows. We assume that each node or sensor has a clock that is a Poisson process with rate 1, and that these processes are independent. This model is equivalent to having a single clock that is Poisson of rate n, and assigning clock ticks to nodes uniformly at random. We assume that the time units are adjusted so communication time between any two adjacent nodes is insignificant in comparison with the length of an average time slot n−1. Our algorithm involves packet forwarding when two non-adjacent nodes communicate. We shall assume that the time taken to forward a packet is also insignificant in comparison with n−1, and that a single packet exists in the network in each time slot w.h.p.. We assume some limited computational power, which amounts to memory of logarithmic size, and the ability to do floating point computations. For our purposes, a Geometric Random Graph is defined in the following way. Let v1, . . . , vn be n points independently chosen uniformly at random from a unit square in R2. A Geometric Random Graph G(n, r) is obtained from these points by connecting any two points within Euclidean distance r. 3 2.1 Problem Statement Let node vi for i = 1, . . . , n hold a value xi(t) at the tth global clock tick, the initial values being xi(0). Without loss of generality, we assume x(0) = 0. Given ǫ, δ > 0, the task is to design an algorithm such that kx(t)k < ǫkx(0)k for all possible choices of x(0) with probability > 1− δ. The cost of the algorithm is the expected number of transmissions made until t. nectivity r(n) = Θ(q log n In the rest of the paper, we shall make the standard assumption that the radius of con- n ) (eg [5].) Under this assumption, the probability of the graph G(n, r) being disconnected is Ω(n−O(1)), for an appropriate constant a. As a consequence, it is not possible to drive δ below n−O(1). For this reason, in the analysis, we shall assume that δ = n−O(1). On the other hand ǫ can be made arbitrarily small by running the aver- aging algorithm for a sufficiently long interval of time. In this paper, we shall assume that log 1 log log n . This does not allow ǫ to be exponentially small but permits it to be the reciprocal of a quasipolynomial. A sufficiently large constant a will appear in the parameters of our algorithm described later.When we use the term high probability, we shall mean with probability 1 − n−Θ(1). ǫ = n o(1) 3 Overview of Algorithm Let (cid:3) be the unit square in which the n sensors are randomly placed. Let the initial values carried by sensors be xi(0), for i = 1 to n. We consider a partition of (cid:3) into ∼ n1/2 smaller squares (cid:3)i. Let (cid:3)i contain #((cid:3)i) sensors. Let time(n) represent the expected number of transmissions until kx(t)k ≤ ǫkx(0)k w.h.p., where ǫ is some function of n that we shall not investigate at the moment. Suppose that we had a "nearly perfect" averaging protocol A on the smaller squares (cid:3)i, i. e. when A is run on each square, after t = timeA(√n) transmissions, within (cid:3)i the values are for practical purposes equal to the the average of the original values. That is, xs(0) (∀i)(∀s ∈ (cid:3)i)xs(t) ⋍ Ps∈(cid:3)i . #((cid:3)i) Definition 1 For each square (cid:3)i, let s((cid:3)i) be the sensor closest to the center of (cid:3)i. This can be determined by each square, using a constant number of transmissions w.h.p. The s((cid:3)i) exchange values among themselves by Greedy Geographic Routing (see [5]). Consider the following protocol. Suppose that A has been run on each subsquare of the form (cid:3)i independently, and the values carried by the nodes within (cid:3)i are all equal. When s((cid:3)i) 4 becomes active, the following round takes place. 1. si := s((cid:3)i) picks a square (cid:3)j uniformly at random. si geographically routes a packet with its value to sj := s((cid:3)j). 2. sj routes its own value to si by greedy geographic routing. 3. xsi ← xsi + 2√n 4. xsj ← xsj + 2√n 5. A is independently run on (cid:3)i (the process being activated by si by switching certain 5 (xsj − xsi). 5 (xsi − xsj ). nodes on) and on (cid:3)j (initiated by sj similarly). 6. A is ended on square (cid:3)i by si (by turning certain nodes off), and A is ended on (cid:3)j by sj (by switching certain nodes off.) xs(t). Without loss of generality, we assume that Pi xi = 0, since this only adds a constant offset and does not affect the rate of convergence. An application of 10 w.h.p . If we examine the evolution Now, let zi(t) := Ps∈(cid:3)i the Chernoff Bound tells us that (∀i)(cid:12)(cid:12)(cid:12) of z, we see that after a round of the kind described above #((cid:3)i) √n − 1(cid:12)(cid:12)(cid:12) < 1 • zi(t) = (1 − αi)zi(t − 1) + αjzj(t − 1) • zj(t) = (1 − αj)zj(t − 1) + αizi(t − 1) where ∀i, αi ∈ ( 1 2 , 1 3). From Lemma 1, it follows that 2√n )tkz(0)k2. Roughly speaking after O(√n log( n E[kz(t)k2] < (1− 1 a distribution x(t′) such that kx(t′)k < ǫkx(0)k. Each geographical routing mentioned above takes O(√n) transmissions w.h.p (see [5]). Also, each process of initiating or ending A on a square (cid:3)i takes O(√n) transmissions. ǫ )) of these steps, we have So, the total number of transmissions with n nodes time(n) satisfies a recurrence of the form: time(n) ⋍ O(cid:16)√n log( n ǫ )(timeA(√n) + O(√n))(cid:17) . Ignoring the dependence on ǫ, it would allows us to recursively define the algorithm A on (cid:3), for which timeA(n) = n exp(O(log log n)2). 5 4 Description of the Algorithm 4.1 Notation The square (cid:3) is partitioned into n1 subsquares (cid:3)i, where n1 is the nearest integer to √n that is the square of an even number. For a square (cid:3)i1...ir , let E#(cid:3)i1...ir denote the expected number of sensors within (cid:3)i1...ir . Then, while E#(cid:3)i1...ir > (log n)8, the square (cid:3)i1...ir is partitioned into nr+1 subsquares (cid:3)i1...ir+1, where nr+1 is the nearest integer to pE#(cid:3)i1...ir that is the square of an even number. Let r, ℓ := 1 + sup (cid:3)i1...ir i. e. the number of levels in this recursion. Given a square (cid:3)<i>, let s((cid:3)<i>) denote the sensor nearest to its center. By our construction, these centers are well separated, and any sensor has this property with respect to at most one square w.h.p.. We shall denote this by (cid:3)(s). We assign a Level to each node by the following rule: If s = s((cid:3)i1...ir ), s has level ℓ − r. These nodes are have Levels 1, . . . , ℓ. There is a single root node at Level ℓ, namely s((cid:3)). The nodes at Level 0 are the nodes not of the form s((cid:3)i1...ir ). In the informal discussion earlier, we did not concern ourselves with the error in the averaging carried out on subsquares (cid:3)i. However, these errors propagate up the hierarchy rapidly, and hence it is necessary to obtain results with greater accuracy in smaller squares. Thus we define the desired accuracy recursively. Let ǫr be the accuracy for the averaging process in a square ǫr−1 poly(n) for a polynomial of (cid:3)i1...ir−1. Lemma 2 tells us that it is sufficient to take ǫr, to be sufficiently large degree. Let ǫ0 = ǫ, δ0 = δ. We recursively define ǫr+1 := ǫr 25n 2 +a and δr+1 = δr n2a r 7 . We define time(n, ℓ−1, ǫr, δr) to be(cid:16)(log n 1, ǫr−1, δr−1) := time(n, r, ǫr, δr)na(cid:16)log( nr Let s ∈ (cid:3)i1...iℓ−1. ǫr ǫℓ−1 ) log(δ−1 ) log(δ−1 ℓ−1)(cid:17)16 r )(cid:17)16 . . Thereafter, we define time(n, r− 4.2 The Protocol Every node s has two states, a local.state and a global.state, both of which are initially = of f , but can also take the value on. Each node s possesses a private counter counter(s). During initialization, the global.state of s((cid:3)) is set to on but every other global.state is 0. The local.state of all nodes is set to of f at this juncture. Let us suppose that the clock of s ticks. We describe the protocol followed by it below. We consider two cases. If s is at Level 0, it obeys the following protocol: { 6 1. If local.state(s) = on N ear(s); } N ear(s){ 1. s picks an adjacent node v contained in (cid:3)i1...iℓ−1 uniformly at random. 2. s sets xs(t + 1) = xs(t)+xv (t) v sets xv(t + 1) = xs(t)+xv (t) 2 2 ; ; } We next describe the protocol if s is at a Level greater than 0. The subroutine N ear is the same as above. Let (cid:3)(s) =: (cid:3)i1...ir . { 1. If global.state(s) = on (a) If counter(s) = 0 Activate.square(s); (b) With probability n−atime(n, r, ǫr, δr)−1 • F ar(s); • counter(s) ← 0; 2. If local.state(s) = on N ear(s); 3. If counter(s) ≥ time(r, n, ǫr, δr) Deactivate.square(s); Else counter(s) ← counter(s) + 1; } F ar(s){ 1. s picks a square (cid:3)i′ its value to s′ geographically. 1...i′ r 6∋ s uniformly at random. Let s′ := s((cid:3)i′ r ) . Node s routes 1...i′ 2. xs(t + 1) = xs(t) + 2 5(E#(cid:3)i1...ir xs′(t) − E#(cid:3)i1...ir xs(t)). 3. s′ sends back to a packet with its value xs′(t) to s by greedy geographic routing. 4. Node s computes xs(t + 1) = xs(t) + 2 5(E#(cid:3)i1...ir xs′(t) − E#(cid:3)i1...ir xs(t)). 7 5. counter(v) ← 0. } Activate.square(s){ 1. If s ∈ Level 1, send packets to each node s′ in (cid:3)(s) setting local.state(s′) ← on by flooding. 2. If s ∈ Level i > 1, send packets to each Level i−1 node s′ in (cid:3)(s) by greedy geographic routing, setting global.state(s′) ← on. } Deactivate.square(s){ 1. If s ∈ Level 1, send packets to each node s′ in square(s) setting local.state(s′) ← of f by flooding. 2. If s ∈ Level i > 1, send packets to each Level i−1 node s′ in (cid:3)(s) by greedy geographic routing, setting global.state(s′) ← of f . } 5 Analyzing the number of Transmissions Let H(n, r, ǫr, δr) denote the number of transmissions used in our protocol in one round of (cid:3)i1...ir , in order to diminish the variance (of the values carried by sensors in (cid:3)i1...ir ) by a factor ǫr, with probability 1 − δr. Observation 1 In one round, i. e. the duration between s activating (cid:3)(s) := (cid:3)i1...ir and deactivating (cid:3)(s), the number of long-range packet exchanges between sensors of the kind s((cid:3)i1...irir+1) is Θ(cid:16)n log( n ǫr )(cid:17) w.h.p, where E#[(cid:3)i1...ir ] E#[(cid:3)i1...irir+1] n = . Each of these involves O(pE#[(cid:3)(s)])n hops w.h.p (see [5]). Therefore the total number of transmissions here is O(cid:16)n2 log( n )(cid:17) w.h.p. ǫr 8 Each of these long-range packet exchanges is followed by a period of averaging within the involved subsquares, and this takes H(n, r + 1, ǫr+1, δr) = Ω(n) transmissions. Thus we have the recurrence H(n, r, ǫr, δr) = O(cid:18)(H(n, r + 1, ǫr+1, δr+1) + n)n log( )(cid:19) . = O(cid:18)H(n, r + 1, ǫr+1, δr+1)n log( n ǫr n ǫr )(cid:19) . For these parameters, δr = Ω( As mentioned in subsection 4.1, we let ǫ0 = ǫ, δ0 = δ and recursively define ǫr+1 := ǫr 25n7/2 and δr+1 = δr poly(n)) and the n telescope. n2 r ǫr = ǫ0Ωn−O(log log n) since ℓ ∼ log log n. Now, the smallest squares that we create have O(polylogn) sensors each w.h.p. Since the ordinary averaging that we do there (described by the procedure "Near(s)") has an averaging time that is quadratic [1, 2], H(n, ℓ, ǫℓ, δℓ) = Ω(polylog( n )). And so using the recurrence for H and telescoping, we see that the total ǫℓ number of transmissions is poly(n) ), since δ0 = Ω( 1 1 H(n, 0, ǫ0, δ0) = (H(n, ℓ, ǫr+1, δr+1))Yr (cid:26) E#[(cid:3)i1...ir ] E#[(cid:3)i1...irir+1] log n ǫr(cid:27) = n(log )O(log log n). n ǫ This is n1+o(1) if ǫ = exp(−n o(1) log log n ), and δ = n−O(1). 6 Notes on Correctness In the algorithm proposed in this paper, each square (cid:3)(s) has a certain latency, which is the averaging time restricted to that square. In order for our algorithm to be correct, we require that (cid:3)(s) be undisturbed by the long-range exchanges that s is involved in, during this period. This is not a condition that can be imposed without the long-range exchanges of s losing their i.i.d property, which is crucial in our analysis of convergence. In order to retain this, and have an algorithm that is successful w.h.p we have set the rates at which long-range exchanges of s occur to be lower than the inverse of the latency by a factor na. As a consequence, w.h.p, in the course of the entire algorithm, there are no long-range transmissions made by any node s while (cid:3)(s) is active. The only issue that we have not dealt with in detail is of showing that our choice of errors ǫr achieves the desired end. This follows from Lemma 2 interpreted as follows: The nodes i represent subsquares (cid:3)i1...irir+1 of (cid:3)i1...ir and the yj(t) for different j represent the sum of the values held by the nodes in a subsquare (cid:3)i1...irj after t long distance transmissions between subsquares since the activation of (cid:3)i1...ir . We set ǫ := ǫr+1kx(0)k. The perturbations n(t) represent the errors generated from imperfect averaging within these subsquares. 9 7 Concluding Remarks We introduced non-convex affine combinations, in our averaging protocol in order to accel- erate Geographic Gossip in Geometric random graphs. The number of transmissions used in the course of our protocol is n1+o(1). This exponent is asymptotically optimal. Our algo- rithm, unlike the previous one in [5] is not completely decentralized. However as far as we can see, this is not a necessary feature associated with the use of affine combinations. 8 Future Directions It would be interesting to study whether affine combinations can be used to develop a completely decentralized algorithm for Geographic Gossip that is also energy efficient. References [1] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah. Gossip algorithms : Design, analysis and applications. In Proceedings of the 24th Conference of the IEEE Communications Society (INFOCOM 2005), 2005. [2] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah. Mixing Times for Random Walks on Geometric Random Graphs. SIAM ANALCO 2005. [3] S. Carruthers, V. King. Connectivity of Wireless Sensor Networks with Constant Density.ADHOC-NOW, 2004, 149-157 [4] P. Gupta and P. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2):388–404, March 2000. [5] A. Dimakis, A. Sarwate, M. Wainwright. Geographic gossip: efficient aggregation for sensor networks. In Proceedings of the fifth international conference on information processing in sensor networks (IPSN), 2006. [6] R. Karp, C. Schindelhauer, S. Shenker, and B. Vöcking. Randomized rumor spreading. In Proc. IEEE Conference of Foundations of Computer Science, (FOCS), 2000. [7] D. Kempe, J. Kleinberg, A. Demers. Spatial gossip and resource location protocols. in Proc. 33rd ACM Symposium on Theory of Computing, 2001. [8] D. Kempe, J. Kleinberg. Protocols and Impossibility Results for Gossip-Based Com- munication Mechanisms. In Proc. 43rd IEEE Symposium on Foundations of Computer Science, 2002. 10 [9] D. Mosk-Aoyama and D. Shah. Information dissemination via gossip: Applications to averaging and coding. http://arxiv.org/cs.NI/0504029, April 2005. [10] R. Motwani and P. Raghavan. Randomized Algorithms. Cambridge University Press, Cambridge, 1995. [11] M. Penrose.Random Geometric Graphs.Oxford studies in probability. Oxford University Press, Oxford, 2003. [12] L. Xiao, S. Boyd, and S. Lall. A scheme for asynchronous distributed sensor fusion based on average consensus. In 2005 Fourth International Symposium on Information Processing in Sensor Networks (IPSN), 2005. A Appendix Let Kn be the complete graph on n vertices {1, . . . , n}. ∀i, let αi ∈ ( 1 2). At time t ≥ 0, for i = 1, . . . , n, let node i hold the value xi(t). Consider the following update rule. If the tth clock tick belongs to node i, then, i chooses a node j uniformly at random, and the following update occurs: 3 , 1 • xi(t) = (1 − αi)xi(t − 1) + αjxj(t − 1). • xj(t) = (1 − αj)xj(t − 1) + αixi(t − 1). 2n )tx(0)T x(0). Lemma 1 E[x(t)T x(t)] < (1 − 1 Proof:Let the update rule for x(t) be given by A(t − 1), i. e. x(t) = A(t − 1)x(t − 1). Note j ), if the ith vector of the standard basis is denoted that A(t − 1) = I − (αiei − αjej)(eT by ei. i − eT E[x(t)T x(t)x(t − 1)] = E[x(t − 1)T A(t − 1)T A(t − 1)x(t − 1)x(t − 1)] = x(t − 1)T E[A(t − 1)T A(t − 1)]x(t − 1). Let αiei−αjej = αij and ei−ej = eij. Then, E[A(t−1)T A(t−1)] = E[(I−eij αT Let Eij denote the n × n matrix whose ijth entry is 1 and every other entry is 0. Then, by expanding, one finds that ij)T (I−eijαT ij)]. E[A(t − 1)T A(t − 1)] = I +Xi = I(1 − (1 − 2αi)2 − 1 n Eii +Xi6=j 1 n − 1 ) + 11T n(n − 1) − (1 − 2α)(1 − 2α)T n(n − 1) n(n − 1) +Xi (1 − (1 − 2αi)(1 − 2αj))Eij (1 − 2αi)2Eii n − 1 . 11 An application of the formula for E[x(t)T x(t)x(t − 1)], now gives us the following: E[x(t)T x(t)x(t − 1)] = E[x(t − 1)T A(t − 1)T A(t − 1)x(t − 1)x(t − 1)] = x(t − 1)T E[A(t − 1)T A(t − 1)]x(t − 1) We know that ∀i, 1 − 2αi ∈ (0, 1 3). Let us upper bound x(t − 1)T E[A(t − 1)T A(t − 1)]x(t − 1) using the the expression for E[A(t − 1)T A(t − 1)] derived earlier. 1 (1) (2) x(t − 1)T I(1 − )x(t − 1) = (1 − n − 1 x(t − 1)T 11T x(t − 1) 1 n − 1 = 0, )kx(t − 1)k2, − and, x(t − 1)T (1 − 2α)(1T − 2αT )x(t − 1) ≤ 0 n − 1 n(n − 1) x(t − 1)T Xi (1 − 2αi)2Eii n − 1 ! x(t − 1) ≤ kx(t − 1)k2 9(n − 1) . Adding up the above inequalities, E[x(t)T x(t)x(t − 1)] ≤(cid:18)1 − 8 9(n − 1)(cid:19) x(t − 1)T x(t − 1). As a consequence, E[kx(t)k2 x(t − 1)] <(cid:18)1 − 1 2n(cid:19)kx(t − 1)k2. Successively conditioning on x(t − 2), . . . , x(0), we see that E[kx(t)k2] <(cid:18)1 − 1 2n(cid:19)t kx(0)k2. This proves the lemma. (cid:3) An application of Markov's inequality gives us the following corollary. Corollary 1 P (kx(t)k > ǫkx(0)k) ≤ ǫ−2(cid:18)1 − 1 2n(cid:19)t . 12 Proof: > ǫ2(cid:19) P (kx(t)k > ǫkx(0)k) = P(cid:18)kx(t)k2 kx(0)k2 ≤ ǫ−2E(cid:18)kx(t)k2 kx(0)k2(cid:19) (Markov's inequality) 2n(cid:19)t ≤ ǫ−2(cid:18)1 − 1 (cid:3) An application of Markov's inequality gives us the following corollary. Corollary 2 P (kx(t)k > ǫkx(0)k) ≤ ǫ−2(cid:18)1 − 1 2n(cid:19)t . We now consider a modified update rule, and prove a lemma similar to Lemma 1. Let Kn be the complete graph on n vertices {1, . . . , n}. ∀i, let αi ∈ ( 1 2 ). At time t ≥ 0, for i = 1, . . . , n, let node i hold the value xi(t). Let n(0), n(1), . . . be a sequence of real numbers. Consider the following update rule. If the tth clock tick belongs to node i, then, i chooses a node j uniformly at random, and the following update occurs: 3 , 1 • yi(t) = (1 − αi)yi(t − 1) + αjyj(t − 1) + n(t − 1). • yj(t) = (1 − αj)yj(t − 1) + αiyi(t − 1) − n(t − 1). Lemma 2 Suppose that for each t, n(t) < ǫ, and that a > 0. Then, )t/2ky(0)k + 8√2n3/2ǫ(cid:19)(cid:21) ≤ P(cid:20)ky(t)k > n 2 (cid:18)(1 − a 1 2n 5 na . Proof:y(t) = A(t − 1)y(t − 1) + n(t − 1), where A(t) = I − (αiei − αjej)(eT j ), and n(t − 1) = n(t − 1)(ei − ej). Let x(0) = y(0), and let the x(t) satisfy x(t + 1) = A(t)x(t) as in Lemma 1. We observe that i − eT y(1) = x(1) + n(0) and more generally, y(t + 1) = x(t + 1) + n(t) + A(t)A(t − 1) . . . A(i + 1)n(i). t−1 Xi=0 13 An application of the triangle inequality now gives us ky(t + 1)k ≤ kx(t + 1)k + kn(t)k + t−1 Xi=0 kA(t)A(t − 1) . . . A(i + 1)n(i)k. Our approach to proving this Lemma is to upper bound each term in the right hand side. Observation 2 P(cid:20)kx(t)k > (1 − 1 2n )t/2na/2kx(0)k(cid:21) ≤ (cid:18)(1 − ≤ (cid:18)(1 − = 1 na . 1 2n 1 2n )t/2na/2(cid:19)−2 )t/2na/2(cid:19)−2 E(cid:18)kx(t)k2 kx(0)k2(cid:19) (1 − 1 2n )t The above inequalities follow from Lemma 1 and Corollary 2. We shall now upper bound the other terms as well with high probability. Using Corollary 2 P(cid:20)kA(t − 1) . . . A(i)n(i − 1)k kn(i − 1)k > (1 − 1 2n t−i 4 n ) a+1 2 (cid:21) ≤ ((1 − 1 2n t−i 4 n ) However, and so, = n−(a+1)(1 − (1 − 1 2n t−1 Xi=1 t−i 2 n−(a+1) < ) 4 na a+1 2 )−2(cid:18)1 − 1 2n(cid:19)t−i 1 2n t−i 2 . ) P(cid:20)∃i(cid:26)kA(t − 1) . . . A(i)n(i − 1)k kn(i − 1)k > (1 − 1 2n t−i 4 n ) a+1 2 (cid:27)(cid:21) ≤ 4 na . We next observe that As a consequence we have Observation 3 (1 − 1 2n Xi≤t t−i 4 n ) a+1 2 < 8n a+3 2 . P"Xi kA(t − 1) . . . A(i)n(i − 1)k kn(i − 1)k > 8n a+3 2 # ≤ 4 na . 14 Once we put the above two observations together and note that (∀i)√2ǫ ≥ kn(i)k, an application of the union bound gives P(cid:20)ky(t)k > n a 2 (cid:18)(1 − 1 2n )t/2ky(0)k + 8√2n3/2ǫ(cid:19)(cid:21) ≤ 5 na . (cid:3) 15
1802.07280
1
1802
2018-02-19T01:58:28
Simulating the Ridesharing Economy: The Individual Agent Metro-Washington Area Ridesharing Model
[ "cs.MA", "nlin.AO" ]
The ridesharing economy is experiencing rapid growth and innovation. Companies such as Uber and Lyft are continuing to grow at a considerable pace while providing their platform as an organizing medium for ridesharing services, increasing consumer utility as well as employing thousands in part-time positions. However, many challenges remain in the modeling of ridesharing services, many of which are not currently under wide consideration. In this paper, an agent-based model is developed to simulate a ridesharing service in the Washington D.C. metropolitan region. The model is used to examine levels of utility gained for both riders (customers) and drivers (service providers) of a generic ridesharing service. A description of the Individual Agent Metro-Washington Area Ridesharing Model (IAMWARM) is provided, as well as a description of a typical simulation run. We investigate the financial gains of drivers for a 24-hour period under two scenarios and two spatial movement behaviors. The two spatial behaviors were random movement and Voronoi movement, which we describe. Both movement behaviors were tested under a stationary run conditions scenario and a variable run conditions scenario. We find that Voronoi movement increased drivers' utility gained but that emergence of this system property was only viable under variable scenario conditions. This result provides two important insights: The first is that driver movement decisions prior to passenger pickup can impact financial gain for the service and drivers, and consequently, rate of successful pickup for riders. The second is that this phenomenon is only evident under experimentation conditions where variability in passenger and driver arrival rates are administered.
cs.MA
cs
ORCID #: 0000-0003-2234-8756 Simulating the Ridesharing Economy: The Individual Agent Metro-Washington Area Ridesharing Model (IAMWARM) Joseph A. E. Shaheen [email protected] Computational and Data Science Department, George Mason University 4400 University Drive, MS 6A2 Fairfax, VA 22030-4444 Abstract The ridesharing economy is experiencing rapid growth and innovation. Com- panies such as Uber and Lyft are continuing to grow at a considerable pace while providing their platform as an organizing medium for ridesharing services, in- creasing consumer utility as well as employing thousands in part-time positions. However, many challenges remain in the modeling of ridesharing services, many of which are not currently under wide consideration. In this paper, an agent-based model is developed to simulate a ridesharing service in the Washington D.C. met- ropolitan region. The model is used to examine levels of utility gained for both riders (customers) and drivers (service providers) of a generic ridesharing service. A description of the Individual Agent Metro-Washington Area Ridesharing Model (IAMWARM) is provided, as well as a description of a typical simulation run. We investigate the financial gains of drivers for a 24-hour period under two scenarios and two spatial movement behaviors. The two spatial behaviors were random movement and Voronoi movement, which we describe. Both movement behaviors were tested under a stationary run conditions scenario and a variable run conditions scenario. We find that Voronoi movement increased drivers' util- ity gained but that emergence of this system property was only viable under var- iable scenario conditions. This result provides two important insights: The first is that driver movement decisions prior to passenger pickup can impact financial gain for the service and drivers, and consequently, rate of successful pickup for riders. The second is that this phenomenon is only evident under experimentation conditions where variability in passenger and driver arrival rates are adminis- tered. ORCID #: 0000-0003-2234-8756 2 1. Introduction Ridesharing services such as Uber and Lyft have been experiencing explosive growth driven by rider demand and a number of other factors in industry [1]. One challenge for both ride-sharing service providers as well as for their driver con- tractors is how to maximize driver acceptance of new customers while ensuring drivers gain maximum utility from rides given. In other words, how to maximize both financial gains for the service and its drivers while ensuring maximum ser- vice-level quality for its customers. Perhaps as a reflection of the growth of the ridesharing industry and of the aforementioned challenges, empirical research in this area is also experiencing a surge, exemplified by a growing number of journal publications [1-18] that ex- plore the multidimensional challenges and opportunities produced by the wide- spread adoption of ridesharing services. This paper aims to investigate spatial behavioral conditions under which driv- ers can gain increased financial returns (utility) on their invested time, while simultaneously ensuring that a maximum number of potential passengers reach their destination. The model produced utilizes an agent-based modeling (ABM) framework that has the potential to be extended, expanded, and tested under many variable conditions. And therefore, while it would be immediately salient that much can and should be tested with the model, we reserve future extensions and testing for future papers. It is worthwhile to note that the agent simulation perspective is highly suitable for testing spatial behaviors; when utilizing agent simulations it is considered trivial to create many autonomous, heterogeneous agents following one or more behavioral rule-sets and to simulate behaviors for various initial conditions and parameters without the constraints of rigid assumptions. Additionally, as will be shown by the results of our experimentation, other modeling techniques may not fully capture the true temporal dynamics of a ridesharing service because of het- erogeneity in agent decision-making, the spatial significance to end results, and the variable scenario conditions under which emergent properties could arise. In a subsequent section, we will show the relevance of the later. The model described in this paper focuses on simulating drivers and riders in the Washington, D.C. metro region and attempts to simulate the movement of drivers under two spatial movement conditions. Ultimately, the aim of this model is to gain insight into whether drivers, riders and ridesharing services benefit more or less from optimized decision-making during the drive-pickup-drop-off lifecycle familiar to ridesharing customers, ORCID #: 0000-0003-2234-8756 3 while the aim of this paper is to highlight testing of some specific conditions.1 In later iterations of the model, an increased variety of behaviors will be investi- gated. 1.1 Background There have been a number of studies in the last few years taking aim at under- standing ride-sharing services and carpooling schemes – each of which takes a different investigative position on the challenges faced by resource pooling ser- vices as a whole [1, 22], while some consider some facet of modeling behaviors [3] using agent-based approaches. The majority of papers reviewed were of mod- eling carpooling decisions as an optimization problem [7, 11, 12] and finally, some approaches intended to make early-stage predictions about carpooling and ridesharing trends [6, 9] were pre-existent in the literature. What becomes very clear during a topical literature review over the last few years is that no real attempt had been made to provide for a comprehensive rides- haring agent-based simulation that captures prevalent dynamics; though much of the research attempts to understand the effects of ridesharing in general. For example, Cho et. al. [3] provided a full description of a hypothetical agent- based model for a carpooling application without offering an actual build of the model hypothesized. The authors focused on the systemic theoretical structure of the proposed model, the mathematics and optimization techniques that would be used and the general form of social network types that could be used between the driver agents of said model. The same group [4] later proposed another agent- based model – this time only based on social network interactions without implementation. Significant advances in the area of heuristics and algorithm development that propose better route optimization techniques have also been made over the last few years and this is an area where high-value and productive work has been put forward. For example, Pelzer et. al. [12] developed a method which aims to best utilize "ridesharing potential while keeping detours below a specific limit" using a spatial partitioning method. IAMWARM aims to build a foundational baseline to test a small number of interesting spatial problems for which answers have not been provided as of yet and to use the model created as the basis for future improvements, extensions, expansions, and experiments. We begin that endeavor by discussing our primary and most central question: Can ridesharing utility for both riders, drivers, and service be increased through varying the information-shared among agents, 1 The author of this paper registered with one ridesharing service in order to gain insight into the natural behaviors of drivers and riders of the service. A total of 30 trips were carried out. ORCID #: 0000-0003-2234-8756 4 ultimately affecting spatial movement behaviors? And if so, under what condi- tions could one note a difference in system-level properties? 1.2 Information Asymmetry vs Information Symmetry Our path is to find the simplest method of testing ridesharing utility schemes spatially, so we begin by discussing the problem of increased information sharing briefly implied in the previous section. For our specific context, we define information-asymmetry as a lack of infor- mation regarding the location of other drivers by other drivers. That is-drivers, in an information-asymmetric service, would not be given the locations of other drivers, or riders2, with exception of a single potential rider within their vision's radius who has just requested a pick-up, and thus without that information and without clear route planning driven by spatial demographics, drivers would simply move about randomly hoping to 'luck out' and be near a potential cus- tomer when they request a pickup. This is currently the method by which all rides- haring services manage their respective platforms. Drivers of those services are not given location information of other drivers, and must move about based on randomness, their own past experiences and information gleaned from their social networks; and so ultimately, must make their spatial movement and positioning decisions based on either luck or experience gained from learning. We will omit learning behavior from this iteration of the model. Symmetry represents a condition such that driver agents have all the available information about other driver agents and rider agents. For this model however we bound true information symmetry to a localized version that limits driver agents' knowledge to the nearest driver agent and only to the nearest rider agent. The comparison between information asymmetry and symmetry which will be established by the comparison between random movement and Voronoi movement will be applied such that agents have no vision for information asymmetry scenario runs (no knowledge of the position of any other driver) and have only local vision in the information symmetry variation of the model (knowledge of the nearest driver agent's position). This modification is a direct result of the platform chosen for the development of the simulation and its ability to perform, and due to a lack of a clear theoretical or even observed cognitive standard to base spatial behaviors upon in this case. This model will investigate how drivers would benefit from having local in- formation about peer drivers available in real time using a hypothesized spatial 2 We will later explain our terminology in detail, but for now we define a driver as an agent who is picking up a rider from one location on our model's spatial grid to another. Once a rider is "picked up" we will refer to him as a passenger. In our model a passenger is no longer an agent but is a data point in the driver agent's attributes list. ORCID #: 0000-0003-2234-8756 5 behavior and whether that additional information would maximize driver utility. And, though there are a number of differing spatial behaviors that can be consid- ered, we will only test one behavior which we theorize would result from access to that information. We will extend this model in future iterations with more be- haviors. Fig. 1. Shows an example of a Euclidean space with generator points and their corresponding Voronoi polygons. The polygons are "emerged" from the collective positions of the generator points such that all points in each area corresponding to a polygon are closer to the corresponding generator point than to any other point [20]. We call the assumed behavior resulting from information symmetry Voronoi behavior or Voronoi movement. We propose this behavior using the spatial con- cept of a Voronoi polygon [19] as a base. A Voronoi polygon or diagram-as it is commonly known-is a partitioning of a spatial plane such that "all locations in the Voronoi polygon are closer to the generator point of that polygon than any other generator point…in Euclidian plane" [18]. In other words, it is the space such that maximum territory is created for each generator point without overlapping the area belonging to any other generator point. Figure 1. shows an illustration of generator points and their respective Voronoi polygons. Voronoi movement essentially amounts to driver agents receiving location in- formation about the nearest driver agent and moving away from them so as to increase the potential of picking up a new customer and reducing local competi- tion-a diverging topological behavior where each agent maximizes the distance and the territory between self and all other agents. This viewpoint is a corollary to the Voronoi polygon-from the view of the generator point (agent) not the adjacent spatial points in the polygon, hence we call this behavior Voronoi be- havior. We compare Voronoi movement behavior with a random movement pattern where driver agents move randomly across our spatial grid until they are close enough to a rider agent to execute a pickup. The random movement behavior is a ORCID #: 0000-0003-2234-8756 6 reflection of driver agents having no knowledge of where other drivers and where customers might be. In this iteration of the model, we assume agents do not learn. In a high-fidelity model, it would likely be the case that drivers would learn about rider behaviors and adjust their own behaviors accordingly. However, as you will see in the results section, even with this simplification, our baseline model offers interesting conclusions nonetheless. Finally, rider (potential passen- ger) agents do not move in this iteration of the model but enter the simulation at a spatially random location on the Washington, D.C. geographic lattice. Figure 2 and 3 show the graphical representation of the model which was developed in NetLogo [20] and subsequent sections will discuss model design particulars. Fig. 2. This is the graphical representation of the model. Yellow agent types (person icons) are rider agents. Red (car icons) are driver agents. When a driver agent performs a pickup, their color turns from red to white to display that they are no longer available. ORCID #: 0000-0003-2234-8756 7 Fig. 3. This model was implemented in NetLogo 5.3 and utilized open access data from the Washington, D.C. government website. In this figure, we show the graphical user interface of the model. Inputs, such as the number of drivers and the number of potential riders active at any moment are complemented by outputs on the far right such as profitability, average cash on hand, and passenger pick-ups. ORCID #: 0000-0003-2234-8756 8 2. Model & Methods IAMWARM was implemented in NetLogo 5.3 and utilized the GIS extension native to the platform to import map and GIS data into the model. The model's spatial configuration was based on a road network imported from the Washing- ton, D.C. government Open Data Project website3, which included highly accu- rate, editable shapefiles. The data included feature labels for roads and intersec- tions. These features are used in the instantiation and location initialization of agents, and for certain critical agent behaviors to be discussed in later sections of this paper. At the current iteration of the model we chose not to include additional layers of geographic information for simplicity (only the road network was included), but in future iterations utilizing the Open Data project more broadly can be ad- vantageous in increasing the efficacy of our model specifically by adding more spatial configuration data. Figure 4. provides a complete graphical summary of the model's logic. The road network was imported to NetLogo and an internal spatially-equiva- lent configuration was assigned (labeling). All roads were labeled internally by a variable to help identify spatial cells that contained a road, versus spatial cells that did not. This would later be an important step when designing the movement choices of agents in the simulation since all movement and agent entry will occur on road cells as one might expect. The model contains two agent types: drivers and riders. Drivers can move across the model space, but only on cells that contain a road, while riders do not move, but can only be initialized on roads, specifically intersections. The movement of the driver agents was designed to be based on a direct line of sight-that is-although the drivers must always remain on roads, we assume that following actual traffic routes would not provide a negligible difference in destination arrival times. This is mainly due to the size of our spatial lattice which numbers in the several thousand. Moreover, for our research goals, it suffices that driver agents move in a direct path to their destinations once rider agents are picked up. In future iterations of the model, traffic and road direction movement could be taken into account to create a greater sense of realism. For now, driver agents move on roads in a direct fashion to their destinations. 2.1 Agent Behaviors Before we discuss the specifics of agents used in our model we define the ter- minology used in the model. We define driver agents as those agents who are intending to pick up a rider. A rider agent is an agent who has been instantiated and can be picked up by a driver. Once a driver agent picks up a rider agent, the 3 www.dcogc.org ORCID #: 0000-0003-2234-8756 9 rider agent becomes a passenger. Passengers are not agents and do not interact with their environment. In other words, riders who become passengers simply become an attribute of the driver agents, releasing with them certain data points which are then used by the driver agents post pick-up. This terminology will be used throughout the model description. Fig. 4. A complete breakdown of the model's process is presented in this figure. The area labeled inside the yellow box is where the majority of driver agent behavior takes place. The small orange box at the top of the diagram represents the model moving to the next time unit/time cycle. Note that the majority of rider agent interactions are included as part of the driver agent behaviors since much of the rider agent behaviors in the model is restricted to entering or leaving the simulation. Load Spatial Data, and Build Envrionment from GIS Faile Data.Start of Simulation SetupLoad original setting parameters (number of drivers and riders) at random shapefile locationsStart SimulationMovement parameter setting: Voronoi or RandomStep/TurnVoronoiAre there drivers nearby (within Vision setting)Check and record all other driver agents within vision settingPick Random driver agent from collected list, record relative position.Find target patch as set by distance setting at an angle of 180deg from alternative driver agent. (Opposite direction)Does target cell contain a road?YesMove to Target CellNoStayAny Rider Agents within Vision parameter setting?YesPerform Rider Agent PickupRandomChoose a random angle between 0 and 360.YesAccording to Distance parmater setting, assign a target cellNoRider agent becomes Passenger; Shares Destination with driver agent.Driver agent identifies destination coordinates; faces direction of coordinates.Driver agent chooses random angle between +45 and -45 of destination; Currently carrying passenger?Yes24-hour simulation?YesStep/turn = 24 hours eqivilant?YesStop SimulationNoVariable or Stationary run selected?NoVariableSet agent parameter settings according to programmed schedule (arrival rates).StationaryNoUpdate measures, counts, statistics, locations for driver, rider agents, and environment properties.Is entry & exit module checked?YesAllow for random creation of new rider and driver agents according to parameter settings.Allow for the removal of rider and driver agents randomly within limits of parameter settings.If driver agent has no more energy, remove from simulation. If rider agent has exceeded maximum wait time remove from simulation.NoDriver Agent ProcessSimulation Setup ORCID #: 0000-0003-2234-8756 10 2.2 Driver Agents Driver agents are instantiated in the initial setup of the model according to a user input parameter and a random distribution set to uniform properties. Spatially, the driver agents are initialized at random road intersections of the geospatial model, and according to a randomization test score that allows for a greater randomized spatial distribution of agent objects. Driver agents are also instantiated throughout the model run according to the aforementioned user set parameter. Those agents are also instantiated at road intersections and their rates of arrival are also set according to a user set parameter. Driver agents move from one spatial cell to another by first checking whether a road exists in the cell ahead. If it does, then an agent may move to that cell. If no road exists in that cell then for the random movement behavior without an active passenger procedure, agents are instructed to rotate a random number of degrees between 0 and 360 and repeat the process. For driver agents who are carrying a passenger, the process is the same. How- ever, the randomized degree value is set to be between -45 and +45 degrees if a road is not found directly in the heading of the driver agent. By doing so, we ensure that drivers are constantly moving in the direction of their destination, but are still able to overcome the majority of obstacles in their way, such as the lack of available roads to travel on. This method does have grounds in reality in that drivers who may not necessarily know precisely how to optimize their routes, may in general, pick a random route that they know to be in the general direction of their destination. In future iterations of the model a more advanced pathfinding algorithm could be adopted such as the A* pathfinding algorithm, but for our purposes, we assume that the difference is negligible and it is trivial to show so through a model run.4 Driver agents are assigned a number of attributes at instantiation and some are assigned as the model is run situationally. Attributes include energy level, cash- on-hand, time driven, current driver destination (if carrying a passenger), riders who are nearby, current passenger id, time the current passenger has been on a trip, how many riders the driver has picked up, and how many passengers the driver has dropped off, as well as a Boolean passenger variable indicating if the driver agent is currently carrying a passenger. The attributes are more critical to the progress of the model at varying times through simulation runs, depending on the active phase of the drive-pickup-drop-off-drive cycle of the driver agents. Therefore, a deeper explanation of the attributes and their relevance is appropriate at this time. We assign a level of energy to every driver agent set to be a random number following a normal distribution between a 4 and 8-hour range translated into model time units (which is set to be at 1 minute per time unit) by estimation. The a video of 4 For a typical model run, please visit https://www.youtube.com/watch?v=apJEvDl4aqc ORCID #: 0000-0003-2234-8756 11 underlying assumption is that the majority of drivers will only be able to drive, regardless of their level of success, for a period determined by time availability and physical and/or mental fatigue. This is an appropriate assumption and the Gaussian shape of this distribution is not far-fetched. Time-driven is a variable that counts the amount of time driven by each driver and is used to display and calculate the model's summary statistics. Cash-on-hand is the variable attribute that stores the accumulation of fares each driver agent has gained, as well as the variable in which cash is deducted (vehicle and transportation costs) for drivers who are not carrying active passen- gers. In other words, it is the driver agents' total utility and financial gain at any given time-period. Pick-up count and drop-off count are variables that store the total number of riders successfully picked up from their initialized location and successfully dropped off at their destination, respectively. The Boolean passenger variable shows whether the current driver is currently seeking a rider or already has a pas- senger (as discussed earlier, riders that receive a pickup by a driver agent become 'passengers'-simply an attribute of the driver agent) and is used in a number of important model mechanics. Passenger-id is a variable that stores the id of the rider currently within the driver agent's vehicle when she becomes a passenger. It is equivalent to the driver asking for the rider's name prior to pick-up and is used in the verification process of the model to ensure that drivers are successfully picking up intended riders. Variables for nearby riders and nearby drivers were also implemented as at- tributes of the driver agents. The first being the number, and id of any nearby riders waiting for pickup. This attribute is used to evaluate whether there are any riders nearby available for pickup. The second is whether there are any nearby driver agents, and is used in the Voronoi movement mechanism. The details of the Voronoi movement mechanism will be discussed in a subsequent section. 2.3 Rider Agents Rider agents are instantiated at initialization of the model at random locations (intersections). Rider agents do not move but await their intended pick up in the same location. This is in line with expected behaviors of ridesharing service cus- tomers. Rider agents are instantiated utilizing a user-set input and a random var- iable to allow for some stochasticity in the model runs. Spatially, and in a similar fashion to driver agents, they are placed randomly across the available intersec- tions of the model's geographic configuration, and only on road cells. Rider agents are instantiated throughout the model's runs but at a rate per time unit user fixed parameter, unlike driver agents who typically remain in the model's space until they decide to leave (randomly) or because they have ex- hausted their energy variable and are replaced stochastically up to a maximum user set parameter. In other words, while the number of driver agents is set by a ORCID #: 0000-0003-2234-8756 12 maximum capacity global (exogenous) variable, the number of rider agents is set to be a rate of arrival following a probability distribution. For simplicity, we chose the arrival rate probability distribution to be normal, though in subsequent itera- tions of the model testing of other probability distribution types, such an expo- nential arrival function, would be necessary. Rider agents possess two attributes for this iteration of the model. The first is the rider destination, which is a randomly assigned destination converted to the spatial coordinate equivalent. This destination is assigned at the moment of in- stantiation of the rider agents. The second is the wait time variable which is a count of how long a rider has been waiting for pickup and which is used to com- pare to a user-set input to determine whether the rider agent should look for 'al- ternative' transportation methods (like metro or bus service). A user designated input allows for varying the waiting time of rider agents. For typical model runs we assigned this variable to 20 minutes. Once a rider agent reaches their maxi- mum waiting time assigned they leave the simulation. This is a proxy behavior for the rider agent attempting to find alternative modes of transportation to their destination. 2.4 Model Mechanics The model relies on user inputs for the number of drivers (capacity), the num- ber of riders arriving per given time unit, the maximum waiting time for rider agents, whether or not to use random movement while attempting to find a rider or whether to maximize distance from any other drivers in the area of assigned vision (Voronoi movement). Based on these inputs and the parameters of the model a typical model run behaves as follows. Rider and driver agents are instantiated on a highly accurate road map of Washington, D.C. at random intersections in accordance with the input parame- ters assigned by the model user. Once the model is run, rider agents are spawned while others, according to the user input, will leave the simulation. The same is applied to driver agents. Driver agents move according to one of the predetermined movement methods (random movement or Voronoi movement based on which version of the simula- tion is run) until they are within a user-set proximity setting of a rider agent (for our model the vision was set to 3 cells). During this time, driver agents lose en- ergy at a rate of 0.75 per time unit and lose cash at a rate of $0.1 per time unit.5 Once a driver agent is within a designated (by modeler) vicinity of the rider agent, a pick-up occurs, and the rider is converted to a passenger. A transfer of 5 We assigned these cash variables based on a rough estimate of distance trav- elled versus fare/ride gained from observations and experiences with a rideshar- ing service. ORCID #: 0000-0003-2234-8756 13 the destination of the rider occurs from rider agent to the driver agent at this time. Once a driver agent has successfully executed a pickup, the agent can no longer make any additional pickups, and it is at this point that the driver agent begins to accumulate 'cash', set at a rate of $2.00 + 0.60/time unit. Calibration of the model was conducted to reach a dollar amount that could be probable through qualitative observations of distance and time of real-world trips versus the model's spatial geometry. The key was to set the fare rate to include a fixed amount and a variable amount so as to reflect actual ridesharing services. Driver agents then proceed in a direct path to the coordinates of the transferred destination while earning 'cash' and losing 'energy'. Once they reach their prox- imate destination, a drop-off is executed, their passenger-carry variable is reduced from 1 to 0, and a successful trip is recorded as being now completed. All relevant attribute and model-level variables are updated with this new information. The driver then continues to move searching for new riders and repeats the drive- pickup-drop-off process. Rider agents who are not picked up within their waiting time-period limit find alternative transportation and leave the simulation, while driver agents who are not carrying a passenger could "give up" and leave the simulation. The latter could also run out of energy and leave the simulation due to fatigue. Typical runs are for a 24-hour period, but a model user can run the model indefinitely if they desire. 2.5 Model Inputs and Parameters We implemented 7 inputs in our model that can be assigned and varied by the user. Table 1. summarizes those inputs and contains their descriptions. The most important of which are the maximum capacity for driver agents (drivers-count) and the rate of entry of new rider agents into the model (riders-per-time-unit). Other inputs are also critical but were not tested in a significant way-though adjusted for calibration and realism. Those are the Voronoi vision setting which controls how far driver agents can see other driver agents, the local-regional scale which amounts to an adjustment for the speed of movement of the driver agents, and a binary-switch which turns on or off the possibility for both driver and rider agents leaving the simulation randomly. In Table 2, we describe the parameters and distributions used in various parts of the model. As mentioned in an earlier section we used a normal distribution of varying means and standard deviations as the basis for a number of statistical tests and parameter values so as not to add any additional unverified assumptions or complexity to the model. Hence, we rely on the Central Limit Theorem heavily. However, in future iterations of this model specific testing and data collection of the distributions' parameters must be undertaken and compared to real data from a ridesharing service. ORCID #: 0000-0003-2234-8756 14 Table 1. Inputs of the model with typical value assignments. Type Input Description Typical Value(s) Driver Agents Driver Agent Number Assigns a maximum number of drivers to be ac- 50-150 tive at any given time unit Normal Random Move- ment (Choice) Sets the movement behavior of drivers to be of a random nature while they await a rider pickup Voronoi Movement (Choice) Sets the movement behavior of driver agents to follow a Voronoi-distance maximizing method Voronoi Vision If Voronoi Movement is chosen, sets the Voro- noi movement vision distance Local-Regional Scale Sets the vision and movement range for driver agents. This amounts to a speed setting and is used to calibrate the model. N/A N/A 3 0.5 Rider Agents Riders Active Per Time Unit Sets the rate by which new riders enter the sim- ulation and await pickup 20-75 Environment Scenario (Choice) Sets the model into a run type where an expected rate of arrival for riders and an expected maxi- mum capacity for drivers is set at different hours of the day. Saturday Table 2. Parameters used in model mechanics. Parameter Type Value Description Driver Agent Placement Test X > 0.5 Rider Agent Placement Test X > 0.5 Normal (1,1) Tests whether a random number from a nor- mal distribution with a mean of 1 and standard deviation of 1 is greater than 0.5. If so, place- ment of a driver agent succeeds at a given in- tersection. Normal (1,1) Tests whether a random number from a nor- mal distribution with a mean of 1 and standard deviation of 1 is greater than 0.5. If so, place- ment of a rider agent succeeds at a given inter- section. Driver Agent Energy Attribute Normal(360,120) Sets the energy of a driver agent at instantia- tion as a number drawn from a random distri- bution with a mean of 360 and a standard de- viation of 120 (minutes) Kill Count Variable (Normal (0,1) Sets the number of driver and rider agents who will leave the simulation, randomly without depleting their energy (driver agents) or reach- ing maximum wait time (rider agents) to be the absolute value of a random number drawn from a normal distribution with mean 0 and standard deviation of 1. ORCID #: 0000-0003-2234-8756 15 2.6 Model Outputs A number of outputs were included in the model to assist in the verification process, to understand model mechanics and to derive results from model runs. Table 3. lists those outputs and their descriptions. Our focus was to understand driver agent utility given some set of inputs, parameters, and pre-conditions. There are many forms of driver agent utility to consider, each of which would require a focus on a different set of output measures. For this iteration of the model, we chose to focus our attention on total driver agent utility in the form of total profit from each model run. We include no outputs to measure ridesharing service utility or rider/passenger utility in our final analysis and conclusions, however, a number of outputs aimed towards the measurement of rider agents, passengers, and ridesharing service utility are designed into our model and are displayed to the user. We hope to expand on our analysis of system utility by considering rider, passenger and service utility in future iterations of the model. Table 3. Model outputs and measures Output Description Number of driver agents active The number of driver agents active in the model Number of rider agents active The number of rider agents active in the model Total riders giving up The total riders giving up based on randomly set pa- rameters Average number of riders picked up per time unit The average number of riders picked up per time is cal- culated for each time unit and displayed Total number of rider agents picked up This is the total number of rider agents converted to passengers Total number of successful drop- offs Total number of successful drop-offs, which tends to be lower than the number of pickups as some driver agents don't reach their destinations Number of idle driver agents Number of driver agents without an active passenger Number of working driver agents Number of driver agents with an active passenger Average cash on hand The total amount of cash held by all driver agents (ac- tive) Number of agents who left (ran- domly) Number of agents who left the simulation due to ran- dom tests Number of passengers in active trips Number of passengers carried by driver agents Average wait time Rider agent average wait time Average energy level Driver agent average energy level Total cash with active driver agents Total cash for all active driver agents at any given time unit Average fare per ride Average fare per ride at any given time unit Total profit generated Total profit generated by all activity of the model ORCID #: 0000-0003-2234-8756 16 2.7 Scenarios Much of the model can be run in a stationary mode-that is-it can be run in a form of equilibrium where driver agents and rider agents arrive at predetermined rates resulting in a constantly changing but variably fixed dynamic. This is inter- esting for general runs, verification of model mechanics and quality, as well as to gain a general understanding of the ridesharing process. It is trivial to hypothesize that in any transportation system the rates by which riders and drivers arrive, in- teract, and exit are variable but also subservient to the city (the spatial lattice) in which the ridesharing service operates. This would include seasonal variables such as the time of year, month, day, and time of day. Additionally, rider and driver rates and activity are also affected by current events, traffic, roadworks, weather patterns and other exogenous factors. Therefore, though running the model in situ yields important insights, it is important to run experimentation in some variable scenario for comparative reasons and for a closer approximation of real-world dynamics simply because the variance itself could yield insight. Therefore, based on anecdotal evidence gained from the author's registering with a ridesharing service and gaining first-hand experience in typical driver de- cisions made, we develop a scenario which is not entirely hypothetical in order to test the model's effectiveness under varying conditions. In future iterations of this model, we intend to develop scenarios grounded in real data collected and to de- velop a number of them to test different scenarios under different conditions with- out such heavy reliance on qualitative observations. For this model iteration, we conducted a test of one scenario-the "Saturday" scenario which varies only arrival rates of both driver and rider agents according to what might be expected on a typical weekend day-Saturday. Table 4. provides a summary of the scenario and reasoning, where appropriate, for selection of sce- nario inputs and parameters. As you will see from the table, we varied the arrival rates and expected capacities of rider agents and driver agents respectively. For example, on 'Saturday' we would expect high customer demand for the hour be- fore 'lunch' as many city dwellers may be engaging in social activities in the subsequent hour and so they intend to arrive before 'lunch-hour'. In this time- period (11 AM) and in this specific scenario, we expect that in anticipation of higher customer demand the number of driver agents may also increase, and so we increase the maximum capacity of the driver agents. ORCID #: 0000-0003-2234-8756 17 Table 4. This is a variable model scenario used in testing the model under realistic condi- tions drawn from anecdotal observations. Hour Driver Capacity Rider Rate of En- Reasoning/Explanation 5AM 8AM 11AM 12PM 1.30PM 2.30PM 3.30PM 5.30PM 6.30PM 7.30PM 8.30PM 10 20 50 5 45 50 25 40 45 60 80 try 5 10 20 10 25 15 10 5 5 30 Early Morning - Airport Traffic - Mostly Quiet Drivers starting their day for the Saturday Brunch/Lunch Lunch Time - low activity Post-Lunch Rush Post-Lunch Rush Stationary Activity Evening Drivers Beginning Their Shifts Evening Drivers Beginning Their Shifts Night Activity Period - Riders are going out to so- cial events 40 Night Activity Period - Riders are going out to so- cial events 9.30PM 100 40 Night Activity Period - Riders are going out to so- cial events 10.30PM 90 10 Low Rider Activity - Riders are at their destina- tions. Drivers still on the road expecting a rush of new riders. 80 75 65 35 11.30PM 12.30AM 2AM 4AM 10 30 Some drivers give up, exit the simulation More drivers give up. Riders beginning to end their work shifts. 30 More drivers give up. Riders beginning to end their work shifts. 10 End of night traffic. End of 24 our cycle. 2.8 Testing, Verification, and Validation To test whether spatial movement behaviors can affect driver financial gain, we aimed to compare Voronoi movement prior to agent-pickup with random move- ment prior to agent-pickup. In other words, having drivers access information ORCID #: 0000-0003-2234-8756 18 about other local drivers and having chosen to 'spread out' maximizing their per- sonal territory and likelihood of rider pickup, when compared with random move- ment, regardless of where other driver agents may be. This collection of tests translates to: 1. Comparing Voronoi movement with random movement under stationary con- ditions (constant capacity and arrival times through entire run) 2. Comparing Voronoi movement with random movement under variable condi- tions, namely a 'Saturday' scenario (varying arrival rates and capacity for rider agents' entry and driver agent entry). Therefore, to test our model we conducted 4 standard runs: A scenario-based set of runs with a comparison of random movement and Voronoi movement, and a stationary standard run with Voronoi movement and random movement. We also conducted a number of verification and validation tests to ensure that the model is run correctly as well as that it is running as intended. We summarize those efforts in Table 5. Table 5. Verification and Validation Methods Goal Method Result Verify that road network imported cor- rectly Display and check spatial cell attributes Success Verify that agents instantiate on roads, specifically intersections. Compared spatial coordinates of agents with cell coordinates of intended intersection Success Verify that agents instantiate with the correct attribute values Verify that the movement of agents is as intended Verify that the model mechanics for rider entry functions as intended Verify that the rider capacity functions as intended Validate Pickup Mechanics Validate Drop-off Mechanics Validate agent attribute changes through model runs Displayed agent attributes at random Success Visual observation and numerous model runs Success Raised and lowered the rider entry value and monitored expected increases or decreases in out- puts Success Raised and lowered the rider entry value and monitored expected increases or decreases in out- puts Success Verified through the transfer of rider id and desti- nation Success Observed attribute changes for increases in drop- off values Success Through many runs and observations Success ORCID #: 0000-0003-2234-8756 19 3. Results 3.1 A Typical Run We present typical model results for the 4 possible variations of our test runs. Figure 5-7 and table 6-7 show plots and summary results of our model run. Figure 5-7 contain the total and accumulated financial gain of all agents with total profit on the y-axis and time units on the x-axis. This measure includes the financial gain made by agents who have left the simulation due to fatigue or for any other reason. We see no real and substantial difference in terms of total profit (financial gain) between either of our stationary conditions model runs for random move- ment and Voronoi movement (yellow and grey). That is-whether drivers chose to 'spread out' or move about randomly in the hopes of picking up more custom- ers did not affect, on average, their financial gain. In fact, the difference was com- fortably within 2 standard deviations for both Voronoi and random movement runs. Remarkably, for the variable scenario runs a stark difference emerged between the two spatial movement types, unexpectedly. Divergence in the profitability between random movement choices and Voronoi movement choices for driver agents was clear, and exhibited in both the total profit made by driver agents in a 24-hour run (Figure. 6-7) and in the summary statistics of the model run as a whole (Table. 7). Specifically, we can comfortably note that Voronoi movement for driver agents provides greater utility (financial gains) for drivers when varying rates are executed on the agents' arrival rates i.e. when a scenario is utilized. Where for stationary model runs neither movement method prior to rider pickup provided any visible change in driver agent utility. Consequently, our observations and analysis of the model run took a focus on the variable scenario runs, and more precisely on the moments of divergence of the variable scenario random move- ment run when compared to the Voronoi movement variable scenario model run. Table 6. Summary statistics for stationary run for both random and Voronoi movement Stationary Random Stationary Voronoi Mean $ 6,284.02 Mean $ 6,483.38 Standard Error $ 94.35 Standard Error $ 88.71 Median $ 6,161.00 Median $ 6,400.90 Standard Deviation $ 3,580.49 Standard Deviation $ 3,366.40 Maximum $ 12,426.55 Maximum $12,059.45 ORCID #: 0000-0003-2234-8756 20 Fig. 5. This figure shows the total profit made by all driver agents over a 24-hour period-a single run of the model for both random driver movement (gray) and Voronoi driver movement (yellow). The figure shows that while there are stochastic gains made at different times in the model run by both random and Voronoi movement behavior, there are no clear advantages in utilizing either behavior type when the arrival conditions of drivers and riders are stationary. Table 7. Summary statistics for variable properties run for random and Voronoi move- ment Variable (Saturday) Random Variable (Saturday) Voronoi Mean $ 2,845.05 Mean $ 3,931.65 Standard Error $ 68.96 Standard Error $ 87.31 Median $ 1,828.90 Median $ 3,332.50 Standard Deviation $ 2,617.00 Standard Devia- tion $ 3,313.05 Maximum $ 8,195.65 Maximum $ 10,565.45 ORCID #: 0000-0003-2234-8756 21 More importantly than the observation that Voronoi movement outperformed random movement only in variable run conditions, is whether we can deduce pre- cisely where the divergence between the two behaviors began to take shape under variable entry conditions. The first instance of divergence in a typical run occurs at around 1 PM (marked on Figure 7) into the model run which we hypothesize as being representative of "lunchtime" activity and model as being a constant driver agent capacity of 5 drivers and an arrival rate of new riders of 10. Both rates are a reduction from the 11 AM hour which had a maximum capacity of 50 driver agents and 20 respec- tively. At 1.30 PM the capacity for new driver entry increased to 45 and the rate of arrival of rider agents also increases to 25 (Table. 8). Figure 7 has both the random movement and Voronoi movement drawn with separate y-axis on the same time-scale (x-axis) so as to allow us a better visual comparison of both run- types, and we can see that at this lunch-time hour a slight divergence of perfor- mance begins to emerge, allowing drivers who are using Voronoi movement to make placement decisions that outperform those that move randomly. Table 8. This table shows the relevant arrival rates for drivers (left) and riders(right) for the first point of divergence in the variable conditions model run. 11AM 12PM 1.30PM 50 5 45 20 10 25 Drivers starting their day for the Saturday Brunch/Lunch Lunch Time - low activity Post-Lunch Rush The most salient divergence between the performance of the two behaviors we tested occurred at around the 3.30 PM time-period. Figure 7 shows the stark dif- ference in performance and thus in utility-gain between the two behaviors. Our scenario at this time-period calls for the decrease of both driver capacity and rider entry from the 2.30 PM period (from 50, 15 to 25, 10, for driver and rider agents respectively). Table 9 summarizes the relevant part of the scenario run. Table 9. This table shows the relevant arrival rates for drivers and riders (left, right) for the second point of divergence in performance of the variable conditions model run. 50 25 40 15 10 5 Post-Lunch Rush Stationary Activity Evening Drivers Beginning Their Shifts 2.30PM 3.30PM 5.30PM ORCID #: 0000-0003-2234-8756 22 Thus, we saw a divergence in performance for a case when both driver and rider entry were increasing simultaneously, and for a case where they were de- creasing simultaneously as well, which dispels any notion that divergence in per- formance would solely be due to a decreasing rate of one arrival rate while an- other was increasing. We will propose candidate theories in the discussion section of this paper. The objective of our "lunchtime" change in both driver and rider agent demand and supply was to create drastic changes similar to that what would be expected in a major metropolitan area during this time period. What is critical to note is that this performance difference-this emergent pattern-is only seen under var- iable run conditions, and not stationary run conditions. Consequently, during a statistical analysis for our model's stationary run, we find that the mean, median and maximum financial gain (by all agents) during a 24-hour period was not sig- nificantly different between driver agents employing a Voronoi movement versus random movement behavior. Wherein the variable ("Saturday") scenario run, the median, mean, and maximum were contrasted, with Voronoi movement outper- forming random movement decisions on the aggregate; though the majority of the performance improvements came from the time-periods where Voronoi movement allowed a greater rate of customer pick-ups (1 PM and 3.30 PM). It was not immediately apparent that Voronoi movement outperformed random movement for every time-period of the variable run scenario. ORCID #: 0000-0003-2234-8756 23 Fig. 6. This figure shows the total profit made by all agents over time. Not the divergence be- tween Voronoi movement (Orange), and the random movement (Blue) under variable condi- tions. Voronoi movement outperforms random movement. Fig. 7. This figure utilizes 2 axes, one for the variable conditions scenario run (Saturday) Voro- noi movement (Left axis) and another for the random movement (right axis). This makes for easier visual comparison and yields insight into precisely which point in time the divergence between the two behaviors would typically occur. In this particular run it is clear that Voronoi movement begins to outperform random movement at 630 minutes. ORCID #: 0000-0003-2234-8756 24 4. Discussion Clearly, the model shows that driver agent positioning prior to rider agent pickup influences the financial utility gained by driver agents (consequently this also means that riders receive more consistent pickups with shorter wait-times). But this emergent phenomenon is not recognizable unless a realistic variable ar- rival rate scenario is utilized. I argue that this is true because of the spreading nature of Voronoi movement. In highly volatile rider-supply and driver-demand areas of our variable scenario runs, spreading-out behavior ensures that drivers are more evenly distributed, and by being so they are better positioned to "catch" riders in a moment of higher demand. Where, if driver agents choose to continue moving and placing themselves randomly in moments of drastic change to supply and demand, their catching behavior is set to be limited and thus are unable to maximize their financial gain and adapt to their surroundings. This is the case for when both rates of entry for drivers and riders are increasing and decreasing sim- ultaneously, thus it should be noted that opposite signs for the first derivative of the profit variable are not a requirement for this phenomenon to occur. The details of when this occurred are also important. In the "Saturday" scenar- ios, Voronoi movement did not outperform random movement in all variance combinations. For example, Table 10 shows a portion of the variable scenario at the 10.30 PM time-period. Note the decrease in driver capacity throughout the listed time-periods from 90 to 75, while rider arrival rates remained constant and then increased to 30 per time unit. Figure 7 shows that in this time-period there was no divergence in performance between Voronoi and random movement, even though elements of both the rise and fall seen in the scenario portions (where visible drastic change was present) was also embedded in this particular sequence of agent arrivals. Table 10. A portion of the "Saturday" scenario that contains elements of the scenario portions where performance divergence was seen, yet, no divergence emerged for this sequence. 10.30PM 90 10 Low Rider Activity - Riders are at their destina- tions. Drivers still on the road expecting a rush of new riders. 11.30PM 12.30AM 80 75 10 30 Some drivers give up, exit the simulation More drivers give up. Riders beginning to end their work shifts. Thus, we must then conclude that sudden increase and decrease in rider de- mand in conjunction with a steady or a slightly decreasing capacity (supply) pro- vides a sudden spatial vacuum in the model's geographic configuration which is best enclosed by agents who are actively trying to move away from each other – ORCID #: 0000-0003-2234-8756 25 a Voronoi movement pattern. But, that this pattern-that allows drivers to cover more space and 'catch' more riders-occurs only where there is enough drivers on the spatial geography such that there are actual additional riders who will be picked up by this movement. In other words, if decreasing or increasing variations in both agents' entry are occurring, Voronoi movement will provide drivers with an advantage over random movement, given that there are enough free drivers (without a passenger) and enough riders (without a driver) ready for pickup; an opportunity for maximizing utility must exist. After all, an increase in the spatial spread of driver agents allows for an increased probability of executing a pickup of a rider agent, but only when there are riders to be picked up. The key to reproducing this pattern is that it must be part of a sudden and/or variable change scenario for arrival rates. We hypothesize that a stationary run will not emerge this phenomenon because, with unchanging arrival rates, incre- mental improvements will not allow for a critical mass of spatial imbalance in the location of riders and drivers. There is a connected phenomenon observed in supply chain management the- ory that can be associated with this system property-what is known as the bull- whip effect. The phenomenon is widely understood as that of being a powerful reaction at the far end of a long supply chain which is often created from a small change in the point of origin of the chain. If the change is more sudden the effect is more compounded. In this case, the effect can be seen in the time-delayed spa- tial response of one agent group to another, not in a supply chain. This behavior can be described as emergent. The pattern of maximizing utility through the prior, strategic positioning of driver agents is somewhat unexpected since all entry and exit of agents and their locations on the geography of the model are random. One might surmise (incorrectly, as we have shown) that if the random placement of rider agents and random placement of driver agents forms the core of the topological interactions of agents in this model, that through intuition alone there would be no clear gain in Voronoi movement behavior over random move- ment behavior. But as we have shown that while this is true for constant arrival rates, there is a difference in variable run conditions. This emergent behavior does not seem to occur in the stationary runs of the model because at a constantly random and stable rate of entry for both agent types there is never a sudden vacuum to be capitalized upon. This result provides researchers in this area with several important lessons: If one seeks to test movement behaviors of a ridesharing or an autonomous vehicle system, it should be tested under highly variable conditions in order to observe true emergent behavior. Stationary testing of spatial models would seem to be misleading and ineffective in this regard. Moreover, I propose that the testing of agent-agent interaction on any topological space for which there exists an entry or arrival dynamic would be subservient to the conclusions presented herein; though additional testing remains to conclude so irrefutably. It's also paramount to realize that typical system dynamics modeling (differ- ential equations) would most likely fail in producing the phenomenon as we have ORCID #: 0000-0003-2234-8756 26 observed it, assuming a closed form equation for the mechanics of the model can be found, to begin with. Thus, we consider the experiment an added piece of im- portant evidence for the utilization of agent-based techniques in autonomous ve- hicle and ridesharing service modeling and simulation (theoretically the differ- ence between autonomous vehicle and ridesharing service modeling is negligible from the modeler's perspective.) 5. Summary & Future Work In this paper, we described the development of an agent-based model for rides- haring services in the Washington, D.C. area. The model simulates riders and drivers through simple interactions on an accurate data-driven geospatial config- uration. This model forms the basis for a number of experiments and model ex- tensions that could yield greater insights into the ridesharing economy as it de- velops, expands, and evolves. Our conclusions showed the importance of running experiments utilizing agent- based modeling runs not only in the form of stationary runs but in the form of variable scenario runs designed to create unpredictable effects that can-and in our case did-yield greater insights which otherwise would not have been ob- served. Specifically, we found the emergence of a pattern where prior positioning of driver agents had a significant effect on pickup rates, and thus on the financial gain (utility) of drivers. We also found that this pattern emerged from a simple spreading-out behavior, which we called Voronoi movement and that this move- ment pattern outperformed random movement patterns even with randomly dis- tributed arrival rates for both agent types. However, this emergent phenomenon was not observable unless a variable scenario was utilized in the experimentation process. Consequently, we showed that driver to driver agent interactions, which form a symmetrical information environment can provide increased utility for drivers, and consequently for the ridesharing service and riders as well in some cases. Current operating procedures of the leading ridesharing services do not allow drivers to gain access to location information of other drivers, and thus do not allow for movement behaviors that are dependent on that additional information. The symmetrizing of information can yield greater utility for all sides of this equation, including service, rider, and driver. Perhaps ridesharing services believe that giving less information to drivers would allow them more centralized control which they can use to better optimize the ridesharing experience, but evidence that this is true is not without question if we consider the natural fluctuations in drivers' and customers' supply and demand. The question posed by us here is whether more information may allow drivers to create adaptive and cooperative ORCID #: 0000-0003-2234-8756 27 strategies to maximize their financial gain and by consequence, all other parties. We showed that this may be the case for one simple behavior and we demon- strated the conditions under which future spatial behavioral testing should be im- plemented if we are to be confident in the outputs of our simulations. There are many pathways that this model can take-going forward. Primarily, the most interesting extension would be to add more spatially complex behaviors in agent-to-agent interactions and then to observe the results. It is not trivial that we test expected utility for an information symmetry scenario with only one movement-type behavior. More spatial movement patterns grounded in expected behaviors should be tested to quantify the difference in a service that allows more drivers to have more information and one that does not. There are improvements to be made in the spatial configuration of the model itself as well. For example, the inclusion of spatial demographics to enrich probability distribution calcula- tions, adding road direction and traffic patterns, as well as utilizing more detailed geographic datasets would all make significant improvements to the model's ef- ficacy and predictive power. ORCID #: 0000-0003-2234-8756 28 References 1. Anderson, D. N. (2014). Not just a taxi: For-profit ridesharing, driver strategies, and VMT. Transportation, 41(5), 1099–1117. doi:10.1007/s11116-014-9531-8 2. Bash, E. (2015). Dynamic Ridesharing: An Exploration of the Potential for Reduction in Vehicle Miles Traveled. Ph.D. Proposal. 3. Cho, S., Yasar, A. U. H., Knapen, L., Bellemans, T., Janssens, D., & Wets, G. (2012). A Conceptual Design of an Agent-based Interaction Model for the Carpooling Application. Procedia Computer Science, 10, 801–807. doi:10.1016/j.procs.2012.06.013 4. Cho, S., Yasar, A.-U.-H., Knapen, L., Patil, B., Bellemans, T., Janssens, D., & Wets, G. (2013). Social networks in agent-based models for carpooling. In Transportation Research Board 92nd Annual Meeting (p. no. 13–2055). 5. Furuhata, M., Dessouky, M., F., Brunet, M. E., Wang, X., & Koenig, S. (2013). Rideshar- ing: The state-of-the-art and future directions. Transportation Research Part B: Methodo- logical, 57, 28–46. doi:10.1016/j.trb.2013.08.012 6. Hussain, I., Knapen, L., Galland, S., Yasar, A.-U.-H., Bellemans, T., Janssens, D., & Wets, G. (2015). Agent-based Simulation Model for Long-term Carpooling: Effect of Activity Planning Constraints. Procedia Computer Science, 52(Ant), 412–419. doi:10.1016/j.procs.2015.05.006 7. Knapen, L., Keren, D., Yasar, A. U. H., Cho, S., Bellemans, T., Janssens, D., & Wets, G. (2012). Analysis of the co-routing problem in agent-based carpooling simulation. Procedia Computer Science, 10(270833), 821–826. doi:10.1016/j.procs.2012.06.106 8. Knapen, L., Keren, D., Yasar, A.-U.-H., Cho, S., Bellemans, T., Janssens, D., & Wets, G. (2013). Estimating Scalability Issues While Finding an Optimal Assignment for Carpool- ing. Procedia Computer Science, 19(Ant), 372–379. doi:10.1016/j.procs.2013.06.051 9. Martin, C. J. (2016). The sharing economy: A pathway to sustainability or a nightmarish form of neoliberal capitalism? Ecological Economics, 121, 149–159. doi:10.1016/j.ecolecon.2015.11.027 10. Nielsen, J. R., Hovmøller, H., Blyth, P. L., & Sovacool, B. K. (2015). Of "white crows" and "cash savers:" A qualitative study of travel behavior and perceptions of ridesharing in Denmark. Transportation Research Part A: Policy and Practice, 78, 113–123. doi:10.1016/j.tra.2015.04.033 11. Nourinejad, M., & Roorda, M. J. (2015). Agent-based model for dynamic ridesharing. Transportation Research Part C: Emerging Technologies, 1, 117–132. doi:10.1016/j.trc.2015.07.016 12. Pelzer, D., Xiao, J., Zehe, D., Lees, M. H., Knoll, A. C., & Aydt, H. (2015). A Partition- Based Match Making Algorithm for Dynamic Ridesharing. IEEE Transactions on Intelli- gent Transportation Systems, 16(5), 2587–2598. doi:10.1109/TITS.2015.2413453 13. Rayle, L., Shaheen, S., Chan, N., Dai, D., & Cervero, R. (2014). App-Based, On-Demand Ride Services: Comparing Taxi and Ridesourcing Trips and User Characteristics in San Francisco. University of California Transportation Center, 94720(August), 1–20. doi:10.1007/s13398-014-0173-7.2 14. Rayle, L., Dai, D., Chan, N., Cervero, R., & Shaheen, S. (2016). Just a better taxi? A sur- vey-based comparison of taxis, transit, and ridesourcing services in San Francisco. Transport Policy, 45, 168–178. doi:10.1016/j.tranpol.2015.10.004 16. Shaheen, S. A. (2016). Shared mobility innovations and the sharing economy. Transport Policy, 1–2. doi:10.1016/j.tranpol.2016.01.008 17. Shaheen, S. A., Chan, N. D., & Gaynor, T. (2016). Casual carpooling in the San Francisco Bay Area: Understanding user characteristics, behaviors, and motivations. Transport Pol- icy, 1–9. doi:10.1016/j.tranpol.2016.01.003 ORCID #: 0000-0003-2234-8756 29 18. Tran, Q. T.; Tainar, D.; Safar, M. (2009). Transactions on Large-Scale Data- and Knowledge-Centered Systems. p. 357. ISBN 9783642037214. 19. Voronoi, G. (1908). Nouvelles applications des paramètres continus à la théorie des formes quadratiques. Premier mémoire. Sur quelques propriétés des formes quadratiques positives parfaites. Journal Für Die Reine Und Angewandte Mathematik (Crelle's Jour- nal), 1908(133). doi:10.1515/crll.1908.133.97 20. Wilensky, U. (1999). NetLogo. http://ccl.northwestern.edu/netlogo/. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL 21. Zargayouna, M., Zeddini, B., Scemama, G., & Othman, A. (2013). Agent-based simulator for travelers multimodal mobility. Frontiers in Artificial Intelligence and Applications, 252, 81–90. doi:10.3233/978-1-61499-254-7-81 22. Zhang, W., Guhathakurta, S., Fang, J., & Zhang, G. (2015). Exploring the impact of shared autonomous vehicles on urban parking demand: An agent-based simulation ap- proach. Sustainable Cities and Society, 19, 34–45. doi:10.1016/j.scs.2015.07.006 23. Zolnik, E. J. (2015). The effect of gasoline prices on ridesharing. Journal of Transport Ge- ography, 47, 47–58. doi:10.1016/j.jtrangeo.2015.07.009
1812.04848
1
1812
2018-12-12T08:43:12
Optimal Prizes for All-Pay Contests in Heterogeneous Crowdsourcing
[ "cs.MA", "cs.GT" ]
Incentives are key to the success of crowdsourcing which heavily depends on the level of user participation. This paper designs an incentive mechanism to motivate a heterogeneous crowd of users to actively participate in crowdsourcing campaigns. We cast the problem in a new, asymmetric all-pay contest model with incomplete information, where an arbitrary n of users exert irrevocable effort to compete for a prize tuple. The prize tuple is an array of prize functions as opposed to a single constant prize typically used by conventional contests. We design an optimal contest that (a) induces the maximum profit---total user effort minus the prize payout---for the crowdsourcer, and (b) ensures users to strictly have the incentive to participate. In stark contrast to intuition and prior related work, our mechanism induces an equilibrium in which heterogeneous users behave independently of one another as if they were in a homogeneous setting. This newly discovered property, which we coin as strategy autonomy (SA), is of practical significance: it (a) reduces computational and storage complexity by n-fold for each user, (b) increases the crowdsourcer's revenue by counteracting an effort reservation effect existing in asymmetric contests, and (c) neutralizes the (almost universal) law of diminishing marginal returns (DMR). Through an extensive numerical case study, we demonstrate and scrutinize the superior profitability of our mechanism, as well as draw insights into the SA property.
cs.MA
cs
T. Luo, S. S. Kanhere, S. K. Das and H-P. Tan, "Optimal prizes for all-pay contests in heterogeneous crowdsourcing", Proc. IEEE MASS, 2014, pp. 136-144. Optimal Prizes for All-Pay Contests in Heterogeneous Crowdsourcing Tie Luo∗, Salil S. Kanhere†, Sajal K. Das‡, Hwee-Pink Tan∗ ∗Institute for Infocomm Research, A*STAR, Singapore †School of Computer Science and Engineering, The University of New South Wales, Australia ‡Department of Computer Science, Missouri University of Science and Technology, USA E-mail: [email protected], [email protected], [email protected], [email protected] 8 1 0 2 c e D 2 1 ] A M . s c [ 1 v 8 4 8 4 0 . 2 1 8 1 : v i X r a Abstract -- Incentive is key to the success of crowdsourcing which heavily depends on the level of user participation. This paper designs an incentive mechanism to motivate a heterogeneous crowd of users to actively participate in crowdsourcing campaigns. We cast the problem in a new, asymmetric all-pay contest model with incomplete information, where an arbitrary n of users exert irrevocable effort to compete for a prize tuple. The prize tuple is an array of prize functions as opposed to a single constant prize typically used by conventional contests. We design an optimal contest that (a) induces the maximum profit -- total user effort minus the prize payout -- for the crowdsourcer, and (b) ensures users to strictly have incentive to participate. In stark contrast to intuition and prior related work, our mechanism induces an equilibrium in which heterogeneous users behave independently of one another as if they were in a homogeneous setting. This newly discovered property, which we coin as strategy autonomy (SA), is of practical significance: it (a) reduces computational and storage complexity by n-fold for each user, (b) increases the crowdsourcer's revenue by counteracting an effort reservation effect existing in asymmetric contests, and (c) neutralizes the (almost universal) law of diminishing marginal returns (DMR). Through an extensive numerical case study, we demonstrate and scrutinize the superior profitability of our mechanism, as well as draw insights into the SA property. Index terms -- Incentive mechanism, all-pay auction, asymmetric contest, strategy autonomy, participatory sens- ing, network economics. I. INTRODUCTION Crowdsourcing offers a cost-effective approach to distributed problem solving and data collection by soliciting contributions (solutions, ideas, data, etc.) from a large group of people. Com- pared to conventional means of hiring employees, crowdsourc- ing can be potentially more cost-efficient. It has thus catalyzed new computing and sensing paradigms such as participatory sensing [1]. Key to the viability of crowdsourcing is providing incentives to attain a sufficient level of user participation. While incentives can be classified into intrinsic motivation (e.g., self-fulfillment, enjoyment, and esteem) and extrinsic incentives (e.g., peer pres- sure, financial rewards) [2], we focus on monetary incentives which fall in the second category and have wider applications in practice. Specifically, in this paper, we employ the theory of mechanism design, in particular auctions [3], to design an incentive mechanism for crowdsourcing. We choose auction theory to be the tool primarily because, to reward users for their contributions, a unilaterally stipulated pricing scheme -- say by some authority -- for such informational products as ideas, data, solutions, etc., is hard to satisfy both the crowdsourcer and users. On the other hand, auctions offer a perfect mechanism for a principal (crowdsourcer) and agents (users) to implicitly negotiate and mutually agree on a deal (e.g., solving a problem, contributing data). Indeed, auctions as a bilateral pricing scheme have been widely adopted by a sizable body of literature [4] -- [7]. In this paper, we design an incentive mechanism by modeling crowdsourcing as an all-pay contest [8]. All-pay contests are isomorphic to all-pay auctions [3] -- given an equilibrium in one model, one can construct one and only one equilibrium in the other model1 -- yet contests are semantically closer to our mechanism which uses prizes as auctioned goods. Auctions have many flavors in which the most common and well-known ones, such as English (or second-price) and Dutch (or first- price) auctions, belong to the intuitive "winner-pay" genre -- only the winner (i.e., the highest bidder) pays for a bid. On the contrary, "all-pay" auctions require every bidder to pay for his bid regardless of who wins the auction. This seemingly peculiar form, however, precisely describes most crowdsourc- ing platforms (e.g., Amazon mechanical turk (AMT), task.cn, TaskRabbit.com) in which there is only one winner but all participants will have to exert their irrevocable effort before the winner is announced. This is why we model crowdsourcing as an all-pay auction or contest. The vast majority of prior work using auctions (either all- pay or winner-pay) [5] -- [7], [9] -- [11] is based on symmetric auctions where bidders are ex post or ex ante identical, i.e., either they have exactly the same type2 (ex post), or their types follow the same, single probabilistic distribution (ex ante). As a result, they all model an environment of homogeneous agents, which is amicable to analysis. However, in many real crowdsourcing scenarios (e.g., AMT, task.cn, TaskRabbit.com, TopCoder.com), users come from dissimilar backgrounds and possess different skill levels, constituting a heterogeneous en- vironment. Therefore, a more realistic model would be asym- metric auctions. Unfortunately, asymmetric auctions are much less studied and understood because their associated analysis is much more challenging, due to the fact the most celebrated revenue equivalence theorem3 [12], [13] breaks under asymmetry. Thus, as a compromise for analytical tractability, most research on asymmetric auctions is limited to two-player cases [14] -- [16] or complete-information settings [8], [17] in which all types are commonly known. A significant progress that 1Drawing an analogy may shed light on the isomorphism: contestants exerting effort in a contest is like bidders tendering bids in an auction, and the highest- effort contestant winning the prize is like the highest bidder securing the auctioned good. 2In Bayesian games and mechanism design, type is a term that refers to an agent's private information or signal (e.g., ability, skill level, valuation of the auctioned good), which essentially characterizes an agent. 3This theorem states that, under a set of standard assumptions including symmetric agents, any auction generates the same revenue for the principal. was made by [18] toward understanding asymmetric first-price auctions with multiple players and incomplete information, but only an approximate solution was obtained and it only applies to weakly asymmetric agents. Other studies in this context resort to numerical methods [19]. Unlike prior work, our model accommodates asymmetric -- regardless of weak or strong -- all-pay contests with an arbitrary n of players and incomplete information (i.e., agent types are uncertain). This is a much closer characterization of most real crowdsourcing scenarios. Furthermore, we obtain precise, analytical solutions rather than approximate or numerical ones. Thus, this work presents the first attempt to offer a rigorous understanding toward more realistic crowdsourcing campaigns, with results of a much wider applicability. This constitutes the first contribution of this paper. The second contribution is that we explore another degree of freedom in contest design, by furnishing the contest with a prize tuple that consists of an array of n prize functions to cater for the heterogeneous agents. This is distinct from all the standard contests or auctions where a single fixed prize or good is used. The rationale for this exploration is to understand whether and how such a prize tuple can elicit higher profit -- revenue (agent effort) minus cost (prize payout) -- for the principal. In this paper, we derive the optimal prize tuple under asymmetry, and demonstrate that it can induce significantly higher profit than both symmetric and asymmetric fixed-prize contests. this paper is the first The third contribution is that to incorporate the principal's valuation of the prize into profit formulation, thereby enabling our model and results to apply to different crowdsourcers. It also means that, even if a contest adopts a fixed prize, the cost (valuation of the prize) can still be variable. Therefore, regardless of fixed or variable prizes, this work provides an example of how to cover different crowdsourcers or the same crowdsourcer's varying valuations. Our fourth contribution, which we stress, is the discov- ery and investigation of a new and counter-intuitive property pertaining to asymmetric auctions and contests, called strategy autonomy (SA). It captures the phenomenon that agents in an asymmetric equilibrium behave independently of one another as if they were in a symmetric one. This is in stark contrast to all prior work on asymmetric auctions, and has three practical significances: it (a) reduces computational and storage complex- ity from O(n) to O(1) for each agent, (b) increases principal's revenue by counteracting an effort reservation effect engendered by asymmetric belief, and (c) dramatically enhances the system scalability by neutralizing the (almost universal) law of dimin- ishing marginal returns (DMR). Moreover, in addition to SA, our mechanism also strictly satisfies individual rationality (IR), which means that all agents strictly have incentive to participate in our mechanism. The rest of this paper proceeds as follows. Section II reviews the literature. Section III presents our model and Section IV provides the analysis. A detailed numerical case study is then given in Section V which demonstrates key results, offers intuitions, as well as draw some insights. Section VI concludes the paper. II. RELATED WORK A. Incentive mechanisms and Symmetric auctions While auctions are widely recognized as an effective incentive mechanism for various activities such as online sales, govern- 2 ment procurement, crowdsourcing and participatory sensing, the vast majority of prior work on auction-based incentive presumes symmetric auctions. For example, in [5] and [6], users bid their costs and the crowdsourcer or service provider determines their payments such that the users bid their costs truthfully. Along a different spirit, [7] investigates an all-pay auction based incentive mechanism that is tailored to realistic settings, including uncertain population sizes, unknown (yet symmetric) user types, and risk-averse (subsuming risk-neutral) users. Other studies on optimal design of auctions or contests consider different approaches and objectives. For example, [11], [20] investigate whether a single or multiple prizes is optimal in terms of maximizing the highest k bids [11] or total bids [20]. Under a similar setting, [9] shows that the highest bid is at least half of the total bids, and [21] finds that there is no advantage to have multiple prizes under certain conditions. Similarly in a symmetric model, [22] introduces variable rewards and examines a paradoxical behavior where a reduction in reward or an increase in cost may increase the total or the highest bid in expectation. Indeed, almost all auction theory, including the above, con- cerns symmetric auctions, as concurred by [23]. On the contrary, this paper tackles the challenge of asymmetry in order to accommodate heterogeneous and more realistic crowdsourcing environments. B. Asymmetric auctions This domain is relatively much less understood due to its analytical complexity. Most work in this domain is devoted to two-player cases or complete-information settings for the sake of tractability. Amann and Leininger's seminal work [15] offers an analysis of the equilibrium strategies for a two- player asymmetric case. It was then extended by Maskin and Riley [24], [25] who proved the monotonicity and uniqueness of the equilibrium. Unfortunately, till now, there still lacks a closed-form solution to general n-player cases with incomplete information. Fibich and Gavious [18] proposed a perturbation approach to obtain an analytical, but approximate, solution to equilibria on the premise of weak asymmetry. Improvement in terms of some other mathematical properties was made later using a dynamic-system approach [23]. Another work [26] on asymmetric contests focuses on risk aversion and gives some exploratory yet inconclusive results. Other studies assume complete information. Siegel [8] was probably the first who coined the term "all-pay contests", where he analyzed closed-form player payoffs in equilibrium with complete information. Under a similar model, Xiao [17] studied the problem of allocating more than one prizes to a number of winners and proposed an algorithm to construct the equilibrium. Franke et al. [27] aimed to maximize the revenue (which is part of the profit we study in this paper) through discriminating players by associating differentiated weights to players, assuming complete information is available. Moreover, all the above studies presume fixed prizes. In this paper, we allow for more generality by not assuming the availability of complete information and by accommodat- ing multiple asymmetric players. Secondly, we empower the crowdsourcer to provision a tuple of individually different prize functions, in order to induce the highest possible profit. All these are clearly different from prior art. III. THE MODEL The overall problem setting is that a principal aims to crowdsource from n heterogeneous agents for the maximal profit -- total effort (revenue) minus prize (cost). In this paper, "effort" is a general term that can be interpreted according to different contexts; for example, it can refer to the quantity of tasks completed, the quality of solutions submitted [28], or a quality-modulated quantity of sensing data [29]. We design this crowdsourcing campaign under an all-pay contest framework, in which all participating agents exert effort (which is irrevocable and will be sunk, i.e., "all-pay", regardless of the outcome) in order to win some prize (i.e., as if in a "con- test"). An agent i = 1, 2, ..., n is characterized by his type vi which is private information (e.g., skillfulness or competency): agent i knows his own type vi but does not know any other vj,∀j (cid:54)= i. On the other hand, it is common knowledge that all the agent types vin i=1 are independently drawn from [v, ¯v] according to Fi(v)n i=1, respectively, where Fi(v) are the c.d.f. of vi and [v, ¯v] is a continuous and nonnegative support. This setting corresponds to an incomplete-information setting and, essentially, constitutes an asymmetric Bayesian game where the common prior consists of n generally different distributions. Without loss of much generality, we assume that each Fi(v) is differentiable and the corresponding p.d.f. fi(v) is continuous and positive over (v, ¯v). To provide incentive, the principal will reward the agent who exerts the highest effort, i.e., the "winner", a prize. In this paper, we allow the prize to depend on the winner's effort rather than fixing the prize ex ante. Furthermore, in view of the asymmetric agents, we provision the prize as a prize tuple Z := (cid:104)Z1(b1), Z2(b2), ..., Zn(bn)(cid:105), where Zi(bi) is a prize function in agent i's effort bi and takes effect when i is the winner. This prize tuple is known to all the agents before the contest. The value of a prize to an agent is characterized by a value function V (v, Z): an agent of type v values a prize Z (the face value) to be of real worth V (v, Z) to him. That is, agent i values the prize he competes for to be of real value V (vi, Zi(bi)). An example of the value function is V (v, Z) = vZ, meaning that an agent with higher ability can gain more benefit out of a prize; in fact, V (·) = vZ is a generalization of standard all-pay auctions where the fixed auctioned good is normalized and V (·) = v. With out loss of much generality, we assume that V (v, Z) is differentiable with respect to v. Exerting effort incurs cost; an agent i who exerts effort bi has to pay for his cost as per a payment function p(bi, vi). We do not assume a specific form for p(·) or V (·), thereby covering a broad class of auctions and contests.4 Now we can formulate the expected utility of agent i, as ui := qiV (vi, Zi(bi)) − p(bi, vi) (1) where qi is the probability that agent i wins the contest. The principal aims to maximize his expected profit π, defined as the total crowdsourced effort minus his prize payout, or formally, π := E(cid:2)(cid:88) bi − V (λ, Zw(bw))(cid:3) (2) i 4For example, letting p(b, v) = b and V (v, Z(b)) = v yields standard all- pay auctions; letting p(b, v) = 0 and V (v, Z(b)) = v − b yields standard first-price auctions. 3 where w ∈ [1...n] is the winner's index which is a random variable, and λ > 0 is the principal's type (valuation of prize) which is common knowledge. In this profit formulation, the revenue is defined in terms of total effort, which covers data- gathering kinds of applications; it can also be defined in terms of the highest effort, which covers solution-eliciting kinds of applications, but the corresponding analysis completely parallels this paper. Throughout, we follow the notation convention of g(cid:48) x := ∂g ∂x, g(cid:48)(cid:48) xy := ∂2g ∂x2∂y , for any differentiable function g(x, y). We assume that the payment function p(b, v) is twice continuously differentiable, p(0, v) = 0, p(cid:48) b(b, v) > 0 which v(b, v) ≤ 0 which means higher effort, higher payment (cost); p(cid:48) means higher type (ability), lower payment; p(cid:48)(cid:48) bb(b, v) > 0 which means striving from higher effort levels is more costly than from lower effort levels, or conversely, the marginal output by adding b2v(b, v) ≤ 0 which means lower effort is decreasing; finally, p(cid:48)(cid:48)(cid:48) types are more vulnerable to the decreasing marginal output. We note that these assumptions are not restrictive. ∂x∂y , and g(cid:48)(cid:48)(cid:48) x2y := ∂3g In practice, our mechanism modeled in this section can be realized as follows. The agent type distributions Fi can be constructed by the crowdsourcer from user contribution history, or from social acquaintance in the case of a small local community of users, and then published on a website or via a mobile app. The prize tuple can be either published or downloaded, where each user has software (e.g., a mobile app) to act as his agent. The user effort can be measured (in terms of time, data volume, sampling rate, etc.) (a) by each agent itself, or (b) by the principal (e.g., in a cloud) and continually fed back to each corresponding agent, so that the agent can decide how much effort to contribute. IV. ANALYSIS We first analyze the asymmetric equilibrium strategy for each agent (Lemma 2), which is a function of any given prize tuple. Then we determine the optimal prize tuple that induces the maximum profit for the principal (Theorem 1). Following that is an exposition of three important properties (Section IV-C). A. Equilibrium strategy Definition 1 (Bayesian Nash equilibrium). A pure-strategy ∗ Bayesian Nash equilibrium is a strategy profile b := (b∗ 1, b∗ n) that satisfies 2, ..., b∗ ui(b∗ i , b∗ −i) ≥ ui(bi, b∗ −i),∀bi,∀i. In words, each agent in a Bayesian Nash equilibrium plays a strategy that maximizes his expected payoff given his belief about other agents' types and that other agents play their respective equilibrium strategies. Lemma 1 (Existence, monotonicity, uniqueness, and common support). Our asymmetric all-pay contest with incomplete in- formation admits a unique, asymmetric, pure-strategy Bayesian Nash equilibrium that is strictly monotonic, i.e., the equilibrium bids are strictly increasing in type. Furthermore, given that the agent types have a common and nonnegative support, i.e., [v, ¯v], the equilibrium bids also have a common support [0, ¯b], where ¯b is unknown. We defer the proof to [30] due to space constraint. Notation convention: Henceforth, we will exclusively deal with the equilibrium state. Hence for brevity, we slightly deviate i (·). from the general national convention by dropping the superscript ∗ on equilibrium variables. For example, we write bi instead of i and vi(·) instead of v∗ b∗ Lemma 1 tells that an agent's equilibrium strategy bi is a strictly monotone (increasing) function of vi, which we denote by βi(·), i.e., bi = βi(vi). Thus, its inverse function exists and is also increasing, which we denote by vi(·) := β−1 (·). Moreover, because of the strict monotonicity, the event bi = bj is of zero probability and tie-breaking is trivial. Thus, i It is equivalent to arg max bi Zi(bi) (cid:89) j(cid:54)=i Fj(vj(bi)) − p(bi, vi) 4 (6) where p(b, v) = p(b, v)/h(v) for v > 0. Theorem 1. The optimal prize tuple that maximizes the princi- pal's profit is given by Z = (cid:104)Z1(b1), Z2(b2), ..., Zn(bn)(cid:105) where p(bi, vi(bi)) −(cid:82) bi (cid:81) (bi, vi(bi)) dvi(bi) 0 p(cid:48) j(cid:54)=i Fj(vj(bi)) vi (cid:81) Pr(bi > bj) = Pr(β−1 j (bi) > vj) = Fj(vj(bi)). Zi(bi) = Furthermore, because agent i's winning probability qi = j(cid:54)=i Pr(bi > bj), (1) can be rewritten as ui = V (vi, Zi(bi)) Fj(vj(bi)) − p(bi, vi). (3) in which the optimal effort bi(vi) is implicitly given by p(cid:48) bi (bi, vi) = 1 h(λ) + p(cid:48)(cid:48) bi,vi (bi, vi) 1 − Fi fi Lemma 2. Given a prize function Zi(·), an agent i's equilib- rium strategy bi(vi) is determined by V (vi, Zi(bi)) Fj(vj(bi)) − p(bi, vi) (cid:89) j(cid:54)=i [V (cid:48) vi (vi, Zi(bi)) Fj(vj(bi)) − p(cid:48) vi (bi, vi)] dvi. (4) (cid:90) vi = v Proof: As the equilibrium bid bi is also the solution to the optimization problem maxbi{ui} (3), we invoke the envelope theorem [31] on (3) with respect to vi and obtain Fj(vj(bi)) − p(cid:48) (vi, Zi(bi)) = V (cid:48) (bi, vi) vi vi where vi(bi) is the inverse function of bi(vi). The maximum profit achieved is given by π = bi(vi) − h(λ)p(bi, vi) + h(λ)p(cid:48) (bi(vi), vi) vi dFi. (cid:90) ¯v (cid:104) (cid:88) v i (9) Proof: First, we expand the principal's expected profit (2) by calculating the expected cost, i.e., prize. Noticing that an j(cid:54)=i Fj(vj(bi)), we use agent i's winning probability is qi =(cid:81) (cid:89) the law of total expectation to have (cid:88) (cid:90) ¯v Zi(bi(vi)) Fj(vj(bi)) dFi(vi). Ew[Zw(bw)] = (7) (8) (cid:105) 1 − Fi fi (cid:89) j(cid:54)=i (cid:89) j(cid:54)=i (cid:89) (cid:89) j(cid:54)=i j(cid:54)=i ⇒ ui(vi) = ui(v) ∂ui ∂vi (cid:90) vi (cid:104) + v V (cid:48) vi (vi, Zi(bi)) Fj(vj(bi)) − p(cid:48) (bi, vi) dvi. vi (5) Since an agent with the lowest possible type never wins the auction, he will bid zero (i.e., exert no effort) in an all-pay auction (rather than bidding bi = v as in first or second-price auctions). As a result, he reaps zero utility, i.e., ui(v) = 0. Then, equating the r.h.s of (5) to that of (3) yields the result. Recall in (4) that the derivatives in the integrand denote partial derivatives, and hence no further reduction is allowed. Remark: Asymmetric auctions, regardless of winner-pay or all-pay, do not have closed-form expressions for equilibrium strategies in general (while an approximate solution to the first- price flavor can be found in [18]). However, we can solve for the optimal prize tuple using Lemma 2 without obtaining the closed form of equilibrium strategies, as shown next. B. Optimal prize tuple Solving for the optimal, i.e., profit-maximizing, prize tuple Z requires an explicit form of the value function V (·), for which we consider V (v, Z) := h(v)Z where h(·) satisfies h(0) = 0 and h(cid:48)(v) > 0. This form further generalizes the form V = vZ which, as mentioned in Section III, is already a generalization of the standard all-pay auctions. First note that the utility maximization problem of each agent, {ui} (3), can be reformulated as arg maxbi{ui} without max bi change in principle, i.e., (cid:89) j(cid:54)=i (cid:90) ¯v (cid:104)(cid:88) (cid:90) ¯v (cid:104) (cid:88) v i v i π = = (cid:105) j(cid:54)=i Then, by expanding the revenue portion, v i (cid:105) − h(λ)Ew[Zw(bw)] bi(vi) dFi(vi) bi(vi) − h(λ)Zi(bi(vi)) Fj(vj(bi)) (10) With Lemma 2, we substitute Zi(bi) for V (vi, Zi(bi)) in (4) (cid:105) dFi(vi). (cid:89) j(cid:54)=i (cid:90) vi v p(cid:48) vi (bi(vi), vi) dvi, (11) where note that Zi Substituting (11) into (10) yields (cid:48) vi (bi) = 0 due to the envelope theorem. π = bi(vi) − h(λ)p(bi, vi) + h(λ) p(cid:48) vi (bi(vi), vi) dvi dFi. (cid:105) (cid:90) vi v and p(bi, vi) for p(bi, vi), and obtain Fj(vj(bi)) − p(bi, vi) = − Zi(bi) (cid:89) j(cid:54)=i i v (cid:90) ¯v (cid:104) (cid:88) (cid:90) ¯v (cid:90) vi (cid:90) ¯v (cid:90) ¯v = v v v = v By integrating the last term by parts, p(cid:48) vi (bi(vi), vi) dvi dFi (cid:90) ¯v v dFi. v(bi(vi), vi) dvi − p(cid:48) 1 − Fi (bi(vi), vi) p(cid:48) vi fi Fi(vi)p(cid:48) vi (bi(vi), vi) dvi arg max bi h(vi)Zi(bi) Fj(vj(bi)) − p(bi, vi). Substituting this back proves the principal's profit (9). The principal originally faces the problem of maxZ{π}, yet it is equivalent to maxb{π} because, essentially, the prize tuple is used to induce the optimal effort vector b. Furthermore, in (9) we have decoupled each agent i from other agents j (cid:54)= i. Therefore, maximizing π can be achieved by maximizing each individual integrand Ii over bi, where Ii := bi(vi) − h(λ)p(bi, vi) + h(λ)p(cid:48) vi (bi, vi) 1 − Fi . fi Simply applying the first order condition to Ii with respect to bi proves the optimal effort bi (8) for each agent i. To verify that the above effort bi is the unique maximizer, we examine the second derivative (cid:48)(cid:48) b2 i Ii = −h(λ)p(cid:48)(cid:48) b2 i (bi, vi) + h(λ)p(cid:48)(cid:48)(cid:48) b2 i vi (bi, vi) 1 − Fi fi . Since p = p/h(v), and v > 0 is treated as a fixed value due to the envelope theorem, our assumptions on p(·) also hold for ≤ 0. Since h(λ) > 0 for λ > 0, p(·), i.e., p(cid:48)(cid:48) b2 therefore I(cid:48)(cid:48) i i < 0. Thus Ii is strictly concave, which validates the existence and uniqueness of bi given by (8). > 0 and p(cid:48)(cid:48)(cid:48) b2 i vi The optimal prize function (7) is then obtained, by rearrang- ing (11) and changing variables from vi to bi. Note that the lower limit of integral, 0, is due to bi(v) = 0 as the lowest-type agent will bid zero (cf. proof of Lemma 2). C. Qualitative properties This section states three properties pertaining to our mech- anism, denoted by OPT since it is equipped with an optimal prize tuple. 1) Strategy Autonomy (SA): This is perhaps the most salient property of OPT, particularly in the presence of asymmetry. SA is of practical significance and none of prior work on asymmetric mechanisms possesses this property. Definition 2 (Strategy Autonomy). A mechanism satisfies strat- egy autonomy if, given that the common prior Fi(vi)n i=1 are individually different, the equilibrium strategy bi(viF−i) = bi(vi),∀i. In words, in an asymmetric incomplete-information setting where agents are ex ante heterogeneous, each agent adopts in equilibrium a strategy that is independent of (the prior about) the other agents. In other words, despite an asymmetric environment (belief), agents behave autonomously as if they were in a symmetric one. Proposition 1. The OPT mechanism satisfies strategy autonomy. Proof: Immediately follows from Theorem 1, where the equilibrium strategy bi (8) is independent of any j (cid:54)= i. This is a rather counter-intuitive, and somewhat surprising result. This is because Lemma 2 shows that the equilibrium strategy bi does depend on Fjj(cid:54)=i, or the strategy is not autonomous, which also conforms to our intuition as the en- vironment is asymmetric. Indeed, SA is in direct opposition to all prior work on asymmetric auctions, regardless of winner-pay or all-pay, with complete or incomplete information; see, e.g., [15], [17], [18] and a comprehensive survey [32]. So the key question is: why do agents behave autonomously in the OPT mechanism? The fundamental reason is that the asymmetric belief about agent types is endogenized (i.e., "absorbed") by the optimal prize functions (7), or in other words, any bidder i's reasoning about other bidders' bids is implicitly captured by the function 5 Zi(·). The rationale of this, isolating asymmetry from agents, is to counteract an effort reservation effect arising from asymmetric belief, which is explained below. i.e., SA has three important practical implications: • Reduces complexity and saves energy: SA remarkably reduces the computational complexity and storage requirement, from O(n) to O(1), for each agent. The O(n) can be understood from (4) where each agent's strategy involves reasoning about all the j (cid:54)= i, which is also the case in, e.g., [18], [23], [27]. This advantage enables each agent, which is embodied in practice typically by software that resides on distribute portable devices (e.g., mobile phones), to shed substantial computational and storage burden and, as a result, save considerable energy. • Counteracts effort reservation: SA overcomes an effort reservation effect that exists in standard (fixed-prize) asymmet- ric auctions [33]: when the prize is fixed, any agent only needs to win the other agents by an infinitesimal winning margin; there- fore, using a two-player scenario to illustrate, if the stronger agent believes that the other agent is statistically weaker, he has the incentive to reserve effort in order to reduce his winning margin since a larger margin does not make the winner better off at all. This effect outweighs the strategy adjustment of the weaker agent and results in a reduced total revenue compared to symmetric auctions [33], which will also be demonstrated in Section V. However, SA insulates such negative inter-agent influence, allowing agent not to be concerned with other agents and to concentrate on exerting higher effort to increase the winning margin which is now qualified for the (variable) prize. • Neutralizes the law of DMR: The prevailing law of di- minishing marginal returns (DMR) governs many phenomena in (network) economics. It states that, as the number of new employees increases, the marginal product of an additional employee will at some point be less than the marginal product of the previous employee [34]. Mathematically, DMR leads to a concave growth of profit or revenue as employees are being added, which is also demonstrated by our evaluation of a stan- dard (fixed-prize) auction in Section V (Fig. 4). However, the independence connoted by SA neutralizes this submodularity- resembling law of DMR, and indeed, we will show in Section V that the principal's profit increases linearly as the number of agents increases. This translates to a dramatically enhanced system scalability. 2) Individual Rationality (IR): Definition 3 (Individual Rationality). A mechanism satisfies individual rationality if, in equilibrium, all participating agents expect (weakly) higher surplus than from not participating. That is, ui(bi, b−i) ≥ ui(0, b−i) for all i in equilibrium. In other words, a mechanism satisfying IR ensures that any agent has incentive to participate. Proposition 2. The OPT mechanism satisfies individual ratio- nality. In particular, an agent reaps strictly positive utility if he exerts positive effort. Proof: Combining (11) and (6) yields (cid:90) vi ui = − h(vi) ⇒ ui = −h(vi) v p(cid:48) vi (cid:90) vi (bi(vi), vi) dvi p(cid:48) vi (bi, vi)h(vi) − p(bi, vi)h(cid:48)(vi) dvi. v h2(vi) Based on the monotonicity of equilibrium (Lemma 1), the assumptions on the payment function p (cf. Section III) imply that p(b, v) > 0 for any b > 0 = b(v). Furthermore, as v(b, v) ≤ 0 and h(v) ≥ 0, we conclude that ui ≥ 0, h(cid:48)(v) > 0, p(cid:48) which proves IR, and that the equality holds iff vi = v (which subsumes the case of vi = 0 since v ≥ 0). However, an agent of vi = v will choose not to participate (bi = 0) as explained in the proof of Lemma 2. Therefore, any agent who exerts nonzero effort reaps a strictly positive payoff. 3) Incentive Compatibility (IC): We say a (direct revelation) mechanism satisfies IC if agents will report their types truthfully. In our mechanism, prize allocation is based on agents' observ- able efforts and the common prior about all the agents' types, instead of on reported (if any), unobservable types. Therefore, the issue of truthful type-reporting is technically irrelevant to our mechanism. V. CASE STUDY In order to derive an intuitive understanding and draw further insights, we provide a numerical case study that involves six mechanisms: OPT, FIX, SYM-1, SYM-2, OPT-n, and FIX-n. OPT is instantiated with two agents of types v1, v2 ∈ [0, 1] which are independently drawn from F1(v) = v (uniform 2 , respectively. Hence, f2(v) = distribution) and F2(v) = v+1 2 where δ(·) is the Dirac delta function.5 That is, 2 δ(v) + 1 1 agent 2 is of type zero with probability 0.5, and draws his type uniformly from (0,1] with probability of the other half; so, agent 1 is statistically stronger than agent 2. The value function V (v, Z) = vZ and the payment function is p(b, v) = b2. Hence, h(v) = v and p(b, v) = b2/v. We compare OPT with all counterpart mechanisms which are three canonical auctions: • FIX: Fixed-prize asymmetric all-pay auctions. • SYM: Fixed-prize symmetric all-pay auctions, including -- SYM-1: both types follow F1(v); -- SYM-2: both types follow F2(v). In order to investigate how SA neutralizes the law of DMR and enhances scalability, which requires a larger-scale simula- tion, we compare OPT-n and FIX-n, which are OPT and FIX both with n symmetric agents (choosing agent 1 for illustration). A. Theoretical underpinnings To carry out the comparison, we need the following analytical results for FIX and SYM. The proofs are available in [30]. Proposition 3 (Equilibrium strategy in FIX). In a two-player asymmetric all-pay contest with incomplete information, if the common prior is F1(v), F2(v), v ∈ [v, ¯v], and the payment function p(b) satisfies p(0) = 0 and p(cid:48)(b) > 0, there exists a unique Bayesian Nash equilibrium b = (b1, b2) which is given by b1(v1) = p−1(cid:16)(cid:90) v1 k−1(v) b2(v2) = b1(k−1(v2)), (cid:17) k(v)F (cid:48) 1(v) dv , (12) (13) 5Neither our model nor analysis assumes continuity of the p.d.f. at the boundary of the support, and hence our results still apply. We also chose a power-law distribution F2(v) = vα, α > 0, in the comparison and obtained similar results; however, the actual expressions are too long (due to the inverse effort function v2(b2)) to suit a neat presentation and hence omitted. 6 where b1(v) = 0 iff v1 = k−1(v), and k(v) is determined by k(cid:48)(v) = 1(v) 2(k(v)) k(v)F (cid:48) vF (cid:48) with boundary condition k(¯v) = ¯v. Proposition 4 (Equilibrium strategy in SYM). In a n-player symmetric all-pay auction with incomplete information, if the common prior is F (v), v ∈ [v, ¯v], and the payment function p(b) satisfies p(0) = 0 and p(cid:48)(b) > 0, there exists a unique Bayesian Nash (symmetric) equilibrium which is given by (cid:90) v (cid:17) vF n−1(v) − F n−1(t) dt . (14) b(v) = p−1(cid:16) B. Agent strategy, Contest prize, and Principal's profit v 1) Agent strategy: (cid:112) (cid:112) OPT: Using Theorem 1, we apply (8) with p(bi, vi) = b2 and F1 = v1 to obtain 2b1 v1 (1 − v1), − 2b1 v2 1 1 λ = which gives the optimal equilibrium strategy for agent 1: i /vi b1(v1) = v2 1 2λ , v1(b1) = 2λb1. (15) Similarly, applying (8) with F2 = v2+1 yields for agent 2: 2 b2(v2) = v2 2 2λ , v2(b2) = 2λb2 (16) f (v) which is the same (i.e., symmetric) as agent 1. This is because the two type distributions happen to have identical hazard rate [12], 1−F (v), which is used (inversely) in (8). Clearly, this should not be generalized to all c.d.f.'s; indeed, we shall see later that the optimal prizes for the two agents (21)(22) as well as their individual contributions to the principal's profit (23)(24) are different. FIX: Instantiating Proposition 3 with F1(v) = v and F2(v) = 2 yields v+1 k(cid:48)(v) = 2k(v) v ⇒ k(v) = v2, (cid:16)(cid:90) v1 v2 dv (cid:17) 1 2 k−1(v) = = v3/2 1√ 3 , Therefore bf ix 1 (v1) = bf ix 2 (v2) = 0 v3/4 2√ 3 . √ v. (17) (18) SYM: For SYM-1, applying Proposition 4 with F (v) = v gives bsym 1 (v) = v√ 2 . (19) For SYM-2, applying Proposition 4 with F (v) = v+1 2 gives Theorem 1 gives the optimal prize for agent 1 via (7): (v) = 2) Optimal prize tuple in OPT: bsym 2 4λ2 +(cid:82) v1 v3 1 0 v1+1 2 (cid:12)(cid:12)(cid:12)v1= v2 4λ2 dv1 1 Z1(b1) = v 2 . (20) √ √ 2( 3λ2( 2λb1)3 2λb1 + 1) . √ = 2λb1 (21) The optimal prize for agent 2 is similarly obtained to be Z2(b2) = 2 3λ b2. (22) 3) Principal's profit: OPT: The principal's maximized profit can again be calculated using Theorem 1. Particularly in (9), we calculate each agent's contribution corresponding to each summation term of π = π1+ π2, as follows: (cid:90) 1 (cid:90) 1 0 (cid:2) v2 (cid:2) v2 2λ π1 = π2 = ∴ π = π1 + π2 = 2λ 0+ − v3 4λ − v3 4λ 1 8λ − v2 4λ − v2 4λ . (1 − v)(cid:3) dv = (1 − v)(cid:3) dv = 2 1 12λ 1 24λ , . (23) (24) (25) In the above when calculating π2, although there is a probability atom of 0.5 at v = 0, the effort and payment are both zero, and hence it does not contribute to the profit and we can take the integral from 0+ onward. 2 − λ where FIX: The profit in this case is πf ix = πf ix 1 + πf ix πf ix 1 = πf ix 2 = ∴ πf ix = bf ix 1 (v1) dF1(v1) = bf ix 2 0+ √ 24 (v2) dF2(v2) = − λ. 35 3 √ 2 5 3 √ 2 7 3 , . (26) (cid:90) 1 (cid:90) 1 0 Like in OPT, bf ix (0) = 0 nullifies the atom at f2(0). SYM: The profits of SYM-1 and SYM-2 are, respectively, bsym 1 (v1) dF1(v1) − λ = bsym 2 (v2) dF2(v2) − λ = − λ, 1√ 2 − λ. 1 4 (27) (28) 2 (cid:90) 1 (cid:90) 1 0 0 πsym 1 = 2 πsym 2 = 2 C. Results √ In line with the organizer's ultimate objective, we first com- pare the profit of the above four mechanisms in Fig. 1, based on formulae (25) -- (28). The plot clearly shows that OPT garners the highest profit compared to all the other mechanisms over all possible λ. In particular, even though SYM-1 is privileged to benefit from two strong agents, it is still outperformed by OPT, apart from being tangent to OPT at only one point 2/4). Specifically, eight profit values are also marked in (λ = Fig. 1 at λ = 0.1 and 0.3, where we see that OPT significantly outperforms the other three mechanisms, by about 105%, 315% and 730%, respectively (at λ = 0.1). If λ is sufficiently high, FIX, SYM-1, and SYM-2 even run into deficit (negative profit), at λ > 0.396, λ > 0.707, and λ > 0.25, respectively. On the other hand, as λ becomes smaller (i.e., the principal values the prize less), OPT reaps exponential profit growth whereas the other mechanisms only have linear profit increase. 1) Profit ranking and rationale: According to Fig. 1, the profit of the four mechanisms can be ranked as SYM-2 ≺ FIX ≺ SYM-1 ≺ OPT, where ≺ denotes "is inferior to". To understand the rationale behind this ranking result, we examine the agent strategies, by plotting formulae (15) -- (20) in Fig. 2. In general, the ranking SYM-2 ≺ FIX ≺ SYM-1 can be understood by the composition of the three contests: SYM-1 and SYM-2 are composed of two strong and two weak agents, respectively, and FIX is a mixture. However, it is worth noting that FIX is much lower than the average of SYM-1 and SYM-2; in fact, it is even lower than half of SYM-1 alone. This is due to 7 Figure 1: Profit comparison of different mechanisms. the effort reservation effect existing in asymmetric auctions, as mentioned in Section IV-C, where a stronger agent shades his bid when facing a weaker agent. Indeed, Fig. 2 shows that agent 1 in FIX bids significantly lower than in SYM-1, although agent 2 exerts higher effort than in SYM-2.6 The reason why the effort reduction of the stronger agent outweighs the effort increase of the weaker agent is that, mathematically, the p.d.f. of the stronger type concentrates on the higher region of the common support [v, ¯v] and thus has a larger impact on the revenue (calculated by an integral). Intuitively, this tells that "stronger agents matter more", and offers us the following insight: it is more productive for a mechanism to focus on incentivizing stronger agents who constitute the main contributors to the revenue. This hints toward a discriminatory contest design, and indeed, this discriminatory design principle is used by both this work (the agent-specific prize functions) and some prior work such as [35]. To understand why SYM-1 ≺ OPT, first we see in Fig. 2 that OPT incentivizes agents to exert significantly higher effort than all the other mechanisms, particularly at higher types, which concurs the productivity of incentivizing stronger agents mentioned above. To draw deeper insights into how this is achieved, we examine the optimal prize tuple of OPT, by plotting formulae (21)(22) in Fig. 3. We see that OPT gives slightly higher reward to agent 2 if he exerts the same amount of effort as agent 1. The rationale is to motivate the weaker agent insofar as he becomes a competitive rival to the stronger agent, thereby "threatening" the stronger agent not to reserve effort. In principle, the prize tuple endogenizes agent asymmetry and enables the contest to recuperate from the fierceness of competition existing in symmetric contests. Moreover, the increasing monotonicity of 6The reason why agent 2 works harder in FIX than in SYM-2 is because he can deduce that the stronger agent will reserve effort and hence he (agent 2) sees a better chance to win by striving above his (usual) effort level as in the symmetric case (SYM-2). 00.10.20.30.40.500.20.40.60.811.21.41.61.82λ: Principal's Valuation of Prizeπ: Profit OPTFIXSYM−1SYM−20.6250.510.200.050.150.300.611.25 8 (a) λ = 0.1. (b) λ = 0.3. (c) λ = 0.5. Figure 2: Equilibrium strategy (agent effort). The same line-spec is used for both agents in OPT as they adopt the same strategy. (a) λ = 0.1; the maximum effort is 5. (b) λ = 0.3; the maximum effort is 5 3 . (c) λ = 0.5; the maximum effort is 1. Figure 3: Optimal prizes as functions of winner efforts in OPT. The range of X axis is determined by the maximum effort. the prize functions also motivates agents to work harder as the reward grows with their effort. These incentives render OPT superior to SYM-1 and the other mechanisms. Lastly, as a side note, Fig. 2 also indicates that the agent strategy in all the mechanisms is monotone increasing in agent type, which conforms to Lemma 1. 2) Neutralizing DMR: In this subsection, we investigate how SA neutralizes the law of DMR, by comparing OPT-n and FIX- n. In OPT-n, since the n agents are now homogeneous (same as agent 1, for illustration), the prize tuple collapses into a single prize function. Using Theorem 1, this single, optimal prize function can be calculated as Z opt-n(b) = (2λb)2− n 2 3λ2 . In addition, the equilibrium agent strategy becomes and the resultant profit is , b = v2 2λ πopt-n = n 12λ . (29) (30) For FIX-n, the equilibrium agent strategy is calculated using Proposition 4, as (cid:114) n − 1 n bf ix-n(v) = n 2 , v (31) and the resultant profit is πf ix-n = n bf ix-n(v) dF1(v) − λ = (cid:90) 1 0 2(cid:112)n(n − 1) n + 2 − λ (32) We plot πopt-n and πf ix-n in Fig. 4 with respect to n for different λ values. As we can see, as a standard auction, FIX-n is indeed governed by the law of DMR, and exhibits concave profit growth as n increases. Eventually, it saturates at the upper bound of limn→∞ πf ix-n = 2 − λ, which is indicated in Fig. 4 as well. n(cid:82) 1 λ(cid:82) 1 On the contrary, OPT-n is not confined by the law of DMR and its profit grows linearly as n increases. To understand why, we note that in the symmetric case, SA is reinterpreted as that the agent strategy is independent of the number of agents. This is also evidenced by (29), whereas the strategy in FIX-n (31) does depend on n. Therefore the revenue -- the sum of all the agents' bids -- is a linear function of n (in detail, revenue is 6λ). The cost is also linear in n: λE[Z] = 12λ. Therefore, the profit is a linear function 6λ − n 12λ which coincides with (30). Moreover, when n is not too small, as in most real scenarios, Fig. 4 shows that OPT-n garners much larger profit which is even superior to the upper bound of FIX-n by far. These observations manifest a very healthy scalability for OPT-based crowdsourcing systems. v2 2λ dF (v) = n v4−n 3λ2 dvn = n of n, verified by n 12λ = n 0 0 00.20.40.60.8100.511.522.533.544.55Agent TypeEquilibrium Strategyλ=0.1 OPT: Agent 1OPT: Agent 2FIX: Agent 1FIX: Agent 2SYM−1SYM−200.20.40.60.8100.20.40.60.811.21.41.61.8Agent TypeEquilibrium Strategyλ=0.3 OPT: Agent 1OPT: Agent 2FIX: Agent 1FIX: Agent 2SYM−1SYM−200.20.40.60.8100.10.20.30.40.50.60.70.80.91Agent TypeEquilibrium Strategyλ=0.5 OPT: Agent 1OPT: Agent 2FIX: Agent 1FIX: Agent 2SYM−1SYM−201234505101520253035Winner EffortOptimal Prizeλ=0.1 Agent 1Agent 200.511.5200.511.522.533.54Winner EffortOptimal Prizeλ=0.3 Agent 1Agent 200.20.40.60.8100.20.40.60.811.21.4Winner EffortOptimal Prizeλ=0.5 Agent 1Agent 2 9 (a) λ = 0.1. (b) λ = 0.3. (c) λ = 0.5. Figure 4: Strategy autonomy neutralizes the law of diminishing marginal returns. VI. CONCLUSION This paper frames the problem of incentive mechanism design for crowdsourcing into an all-pay contest model. To the best of our knowledge, our model represents the first contest or auction model that (a) accommodates multiple heterogeneous users with incomplete information, and (b) is instrumented with a prize function tuple as opposed to the conventional, single, fixed prize. Not only does it more closely characterizes realistic crowdsourcing campaigns, but it also induces the highest pos- sible total effort from self-interested agents, which is of utmost importance to most crowdsourcing campaigns. The strategy autonomy (SA) property, which is discovered during the course of investigating this new model, captures a counter-intuitive and surprising phenomenon: agents in a het- erogeneous environment behave independently of one another as if they were in a homogeneous one. SA bears practical significances pertaining to system complexity, profitability, and scalability. It could also be an enrichment to the theory of mechanism design. REFERENCES [1] D. Estrin, "Participatory sensing: Applications and architecture," in ACM MobiSys, 2010, pp. 3 -- 4. [2] D. M. Kreps, "Intrinsic motivation and extrinsic incentives," American Economic Review, vol. 87, no. 2, pp. 359 -- 364, 1997. [3] V. Krishna, Auction theory, 2nd ed. Academic Press, 2009. [4] J.-S. Lee and B. Hoh, "Sell your experiences: A market mechanism based incentive for participatory sensing," in IEEE PerCom, 2010. [5] D. Yang, G. Xue, X. Fang, and J. Tang, "Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing," in ACM Mobi- Com, 2012. [6] I. Koutsopoulos, "Optimal incentive-driven design of participatory sensing systems," in IEEE INFOCOM, 2013. [7] T. Luo, H.-P. Tan, and L. Xia, "Profit-maximizing incentive for participa- tory sensing," in IEEE INFOCOM, 2014, pp. 127 -- 135. [8] R. Siegel, "All-pay contests," Econometrica, vol. 77, no. 1, pp. 71 -- 92, 2009. [9] S. Chawla, J. D. Hartline, and B. Sivan, "Optimal crowdsourcing contests," in ACM-SIAM Symposium on Discrete Algorithms, 2012. [10] D. DiPalantino and M. Vojnovic, "Crowdsourcing and all-pay auctions," in ACM EC, 2009, pp. 119 -- 128. [11] N. Archak and A. Sundararajan, "Optimal design of crowdsourcing contests," in 30th International Conference on Information Systems, 2009. [12] R. Myerson, "Optimal auction design," Mathematics of Operations Re- search, vol. 6, no. 1, pp. 58 -- 73, 1981. [13] J. Riley and W. Samuelson, "Optimal auctions," American Economic Review, vol. 71, no. 3, pp. 381 -- 392, 1981. [14] E. S. Maskin and J. G. Riley, "Asymmetric auctions," Review of Economic Studies, vol. 67, no. 3, pp. 413 -- 438, 2000. [15] E. Amann and W. Leininger, "Asymmetric all-pay auctions with incom- plete information: The two-player case," Games and Economic Behavior, vol. 14, no. 1, pp. 1 -- 18, May 1996. [16] N. Szech, "Asymmetric all-pay auctions with two types," Working Paper, University of Bonn, January 2011. [17] J. Xiao, "Asymmetric all-pay contests with heterogeneous prizes," Work- ing Paper, University of Melbourne, September 2013. [18] G. Fibich and A. Gavious, "Asymmetric first-price auctions - a perturba- tion approach," Math. Oper. Res., vol. 28, no. 4, pp. 836 -- 852, 2003. [19] G. Fibich and N. Gavish, "Numerical simulations of asymmetric first-price auctions," Games and Economic Behavior, vol. 73, pp. 479 -- 495, 2011. [20] B. Moldovanu and A. Sela, "The optimal allocation of prizes in contests," American Economic Review, vol. 91, no. 3, pp. 542 -- 558, 2001. [21] C. Cohen, T. Kaplan, and A. Sela, "Optimal rewards in contests," The RAND Journal of Economics, vol. 39, no. 2, pp. 434 -- 451, 2008. [22] T. Kaplan, I. Luski, A. Sela, and D. Wettstein, "All-pay auctions with variable rewards," Journal of Industrial Economics, vol. 50, no. 4, pp. 417 -- 430, 2002. [23] G. Fibich and N. Gavish, "Asymmetric first-price auctions - a dynamical- systems approach," Mathematics of Operations Research, vol. 37, no. 2, pp. 219 -- 243, 2012. [24] E. S. Maskin and J. G. Riley, "Equilibrium in sealed high bid auctions," Review of Economic Studies, vol. 67, no. 3, pp. 439 -- 454, 2000. [25] -- -- , "Uniqueness of equilibrium in sealed high-bid auctions," Games and Economic Behavior, vol. 45, no. 2, pp. 395 -- 409, 2003. [26] S. O. Parreiras and A. Rubinchik, "Contests with three or more hetero- geneous agents," Games and Economic Behavior, vol. 68, pp. 703 -- 715, 2010. [27] J. Franke, C. Kanzow, W. Leininger, and A. Schwartz, "Effort maxi- mization in asymmetric contest games with heterogeneous contestants," Economic Theory, vol. 52, no. 2, pp. 589 -- 630, 2013. [28] T. Luo, S. S. Kanhere, and H.-P. Tan, "SEW-ing a simple endorsement web to incentivize trustworthy participatory sensing," in IEEE SECON, 2014, pp. 636-644. [29] C.-K. Tham and T. Luo, "Quality of contributed service and market equilibrium for participatory sensing," in IEEE DCOSS, 2013, pp. 133 -- 140. [30] Appendix. [Online]. Available: https://tonylt.github.io/pub/mass14app.pdf [31] P. Milgrom and I. Segal, "Envelope theorems for arbitrary choice sets," Econometrica, vol. 70, no. 2, pp. 583 -- 601, 2002. [32] K. A. Konrad, Strategy and Dynamics in Contests. Oxford University Press, 2009. [33] E. Cantillon, "The effect of bidders asymmetries on expected revenue in auctions," Games and Economic Behavior, vol. 62, pp. 1 -- 25, 2008. [34] P. A. Samuelson and W. D. Nordhaus, Microeconomics, 17th ed. McGraw-Hill, 2001. [35] F. Naegelen and M. Mougeot, "Discriminatory public procurement policy and cost reduction incentives," Journal of Public Economics, vol. 67, no. 3, pp. 349 -- 367, 1998. 24681012141618051015Number of AgentsProfitλ=0.1 OPT−nFIX−nUpper bound: 1.92468101214161800.511.522.533.544.55Number of AgentsProfitλ=0.3 OPT−nFIX−nUpper bound: 1.72468101214161800.511.522.53Number of AgentsProfitλ=0.5 OPT−nFIX−nUpper bound: 1.5
1910.08942
1
1910
2019-10-20T10:10:21
Autonomous Industrial Management via Reinforcement Learning: Self-Learning Agents for Decision-Making -- A Review
[ "cs.MA", "cs.AI" ]
Industry has always been in the pursuit of becoming more economically efficient and the current focus has been to reduce human labour using modern technologies. Even with cutting edge technologies, which range from packaging robots to AI for fault detection, there is still some ambiguity on the aims of some new systems, namely, whether they are automated or autonomous. In this paper we indicate the distinctions between automated and autonomous system as well as review the current literature and identify the core challenges for creating learning mechanisms of autonomous agents. We discuss using different types of extended realities, such as digital twins, to train reinforcement learning agents to learn specific tasks through generalization. Once generalization is achieved, we discuss how these can be used to develop self-learning agents. We then introduce self-play scenarios and how they can be used to teach self-learning agents through a supportive environment which focuses on how the agents can adapt to different real-world environments.
cs.MA
cs
AUTONOMOUS INDUSTRIAL MANAGEMENT VIA REINFORCEMENT LEARNING: SELF-LEARNING AGENTS FOR DECISION-MAKING -- A REVIEW A PREPRINT Leonardo A. Espinosa Leal∗ Magnus Westerlund Department of Business Management and Analytics Department of Business Management and Analytics Arcada University of Applied Sciences Helsinki, Finland Arcada University of Applied Sciences Helsinki, Finland Anthony Chapman Computing Department University of Aberdeen Aberdeen, UK. October 22, 2019 ABSTRACT Industry has always been in the pursuit of becoming more economically efficient and the current focus has been to reduce human labour using modern technologies. Even with cutting edge technologies, which range from packaging robots to AI for fault detection, there is still some ambiguity on the aims of some new systems, namely, whether they are automated or autonomous. In this paper we indicate the distinctions between automated and autonomous system as well as review the current literature and identify the core challenges for creating learning mechanisms of autonomous agents. We discuss using different types of extended realities, such as digital twins, to train reinforcement learning agents to learn specific tasks through generalization. Once generalization is achieved, we discuss how these can be used to develop self-learning agents. We then introduce self-play scenarios and how they can be used to teach self-learning agents through a supportive environment which focuses on how the agents can adapt to different real-world environments. Keywords Autonomous systems · reinforcement learning · self-play · digital twin · industry4.0 1 Introduction Recent developments in industry, such as Industry4.0, have emphasized the need for a comprehensive automation of operational processes [1]. Similar developments in both the automobile [2] and maritime industry [3] has highlighted the need for vehicle/vessel driving automation. In recent media, we often see the term autonomous used as a synonym for automated. Hence, automated driving often become autonomous driving, without a deeper reflection on what an autonomous system would entail. Within information systems research we also have a long history of researching autonomous entities, sometimes as an abstract futuristic entity that is often ill-defined in terms of true autonomy, although some efforts have been made [4]. We consider an autonomous entity as an evolutionary leap compared to an automated entity. Meanwhile, the automation component is far from solved for many physical environments. On the other hand, for digital environments such as stock exchanges and advertisement auctions, the process has, to a large extent, already been automated, but autonomous behaviour is rarely needed or desired in such environments. To address this gap we delimit our focus in this paper, to consider one part of an autonomous system, the learning mechanisms ∗Corresponding author: [email protected] A PREPRINT - OCTOBER 22, 2019 of an autonomous entity. To achieve this, we first expand on the subject of what an autonomous system entails and relevant areas that may assist in achieving autonomy. The need for automation has led to a realization that we also need to digitize our industrial environments and processes. These processes include manufacturing, warehousing, building management, or hospital management. Digitization may happen by introducing IoT sensors, communication networks, and cameras into an environment and then digitally capture the physical reality. Advanced types of automation will often form a model using past events and test the model using more recent events in a controlled environment before testing the model in real scenarios. A common approach has been to use fuzzy logic to describe expert behaviour for an entity or an agent that operates in or oversees the environment [5]. Prediction is sometimes required in automation and neural networks are a popular way to compare on the outcomes of the predictions [6]. In order to verify a number of algoritmically derived scenarios in the physical factory may often be expensive, dangerous, and disruptive. Instead a digital representation of the process/environment, a so called extended reality, can be used for verification and optimization, before ideas/changes are moved into the physical realm. An example of an extended reality is the digital twin technology [7], which can be described in many formats, e.g. process graphs, a 2D flat model, a 3D space, or a 4D space-time environment (can be seen as stacked 3D models with temporal dependencies). Although, the more realistic the environment and simulation is, the better the final result can be expected. Complexity tend to increase for each added dimension and different strategies must be devised to conquer the different environments. A state-of-the-art form of digital twin technology is physics-based (follows physical laws) and allows the agent to interact with the environment, i.e. bi-directional data-exchange [8]. Furthermore, the environment may be also be modified within certain parameters to allow for an improved process. Hence, both the agent and the extended reality environment are part of the modelling process and may be enhanced in order to improve an outcome. In this article, we focus on a method and experimental study for self-playing agents which can use deep reinforcement learning, in what can best be generalized as an extended reality environment [9]. Our aim is to address the topic of designing self-play scenarios for self-learning agents that combine various sources for discovering and generating training data. By reviewing the literature we noticed a gap which could improve existing architectures used for creating self-learning agents that can be used for enabling autonomous industrial management. [8] also highlight the need for more concrete digital twin case-studies. Combining AI research and digital twin technology offer an interesting avenue for further research. The structure of the paper is the following. Section 2 reflect on three core terms used throughout the paper. The first subsection provides a discussion on autonomous vs. automated systems, and notes that although media and information systems literature provide a considerable history of autonomous systems, real-world examples of such systems do not yet exist in a strict language or legal sense. Following this, eXtended Reality (XR) is introduced as a self-play environment for teaching models through interactivity. The last sub-section discusses the need for data augmentation to bridge the gap between training in extended reality and inference in the physical reality. The third section introduces reinforcement learning and recent advancements. The fourth section presents how algorithms can learn by self-play, i.e. learning from the interaction in XR, and a conceptual architecture. The fifth section contributes a design and proposes applications in some relevant areas. The final section concludes our findings and presents future directions for research. 2 Research methods and concepts In the first part of this paper, a literature review of the relevant concepts is presented. Through the literature review we provide a foundational understanding of root definitions for the second part, where we provide an analysis of our findings. In this latter part, we follow a soft systems methodology (SSM) by framing a problem formulation (model learning) and an action plan (conceptual model for learning) aimed at future research [10]. [11] state that SSM consist of an analysis of the current status of the system. This includes inherent problems and activities, and a definition of the system that derives the actual goal of the targeted system ("root definition") in order to propose a conceptual system model. 2.1 Requirements for achieving autonomous systems Autonomous systems have long been a promise of both academia and industry alike. One of the early academic papers discussing autonomous systems was presented in the 1950s, where the author discusses an autonomous nonlinear oscillation system [12]. Much later, in the 1990's with the introduction of the personal computer and precursors to the Internet, autonomous agents became a topic of interest. The agent implementations tended to cover relatively narrow and software localized areas. [13] defines the agent as a persistent software entity dedicated to a specific purpose. [4] reviews the early definitions of autonomous agents, and then summarizes that the autonomous property can be defined 2 A PREPRINT - OCTOBER 22, 2019 Figure 1: Agent properties adapted from [4]. as something which exercises control over its own actions. Given the progress since, we would argue these definitions do not qualify an entity for being autonomous, but mere automated. The definition of the word autonomous, in a language sense, can be describe as an autonomous entity is independent and has the freedom to govern itself (adapted from the Cambridge Online Dictionary). Using a strict interpretation, it suggests that truly autonomous systems have yet to come into existence, and that traditional methods have not been able to deliver beyond the automation component. Automation can here be defined as an entity made to operate by the use of machines or computers in order to reduce the work done by humans (adapted from the Cambridge Online Dictionary). This latter definition of automated systems corresponds better to the original definition of autonomous agents, as presented above. An autonomous system should have the freedom to govern itself, and governance implies some form of understanding of real-world repercussions of ones actions, for example the limits the legal framework provide us with. Additionally, an autonomous entity should show independence, suggests that a mere exploitation of the historical world is not sufficient, but rather that the entity must learn to explore unknown worlds through self-play. Hence, an entity that employs an intelligence derived from a rule-set or a neural network trained on historical data, will likely fail the test of true autonomy. A similar standpoint has been taken by organizations regulating and standardizing the automotive industry [14]. The Society of Automotive Engineers (SAE) through the On-Road Automated Vehicle Standards Committee is responsible for defining levels of driving automation for cars and provides a classification of levels from 0-5. In the SAE classification, the highest level, "Level 5 (steering wheel optional)" is defined as a fully automated sysem, and not as an autonomous system [15]. There have been several methods proposed for creating agents, e.g. fuzzy logic or neural networks. In [5] the authors use the concept of intelligent agents for describing an important property of the entity. Intelligence or rather reasoning, allows an agent to react to different defined circumstances or even unforeseen circumstances. Some early considerations realized the challenge of defining a globally validated view of a contained entity, with so called artificial intelligence, and instead highlighted that at the essence of an intelligent entity is an ability to perform subjective probability analysis over both logical and natural (physical) conditions, [16] and [5] approach this through an expert system governed by fuzzy logic and highlight certain abilities an agent must achieve to be considered intelligent. They highlight certain abilities an agent must achieve to be considered intelligent. For example, an agent must be able to plan a set of actions and needs to adapt its plan to changing conditions. [4] provide a classification of properties an agent may have (see Fig. 1). On a more philosophical note, for an autonomous entity to achieve independence and freedom to govern itself, one can argue only an AI with consciousness can achieve such a feat. However, [17] highlights that consciousness, although not properly understood, may indeed be a representation rather than an agency. Hence, the consciousness created in our minds are a result of the brain attempting to make sense of sensory inputs, and consciousness is but an illusion, a model of the contents of our attention. Therefore, the state of dreaming and the state of awakeness is a change in sensory details and not a termination/commencement of conscious experience. Assuming that the cortical conductor theory interpretation is correct [18], we can reduce an autonomous system into four main concepts that feeds an attention layer, 3 Agentautonomouslearninggoal-orientedtemporally continuouscommuni-cativereactivemobileflexiblecharacter A PREPRINT - OCTOBER 22, 2019 learning, reasoning, control, and selection. In this paper we delimit our focus to the learning mechanism that occur from an interaction and describe some industrial environments were learning can occur. Our position is that without an interactive learning mechanism and an ability to self-improve, such that reinforcement learning provide us with, the system cannot be considered autonomous. Still, as discussed above there are other properties that must also be fulfilled for a system to be considered truly autonomous. 2.2 Extended reality The term eXtended Reality (XR) has become known as a common term for fields were digitally enhanced environments and human-interaction are combined for various purposes. This includes Virtual Reality (VR), Mixed Reality (MR), and Augmented Reality (AR). Compared to, for example, autonomous driving, these environments offer AI researchers an important and relatively low-cost setting for implementing human-interacting algorithms, such algorithms may contain reasoning that can be considered "true" AI. Perhaps most importantly, these digital environments allow us to study an agent's decision making, and thereby, offering a feed-back loop between the agent-environment-user. Still, the need for training new abilities often require that agents are presented with big data. The traditional approach was often to gather the data from users, e.g. playing a game, and then train on this data. Today, the deep networks' need for massive data and relatively complex training scenarios for reinforcement learning presents researchers with a problem that is often better solved by augmenting additional data for training networks, than using real data. Data augmentation methods depend on the problem at hand, an agent may for example have to learn how to deal with object recognition, spatial actions to take in relation to detected objects, or temporal differences in scenarios, to name a few. The following sub-section reviews some of the relevant literature regarding the performance of data augmentation for training agents. 2.3 Data augmentation Data augmentation has gained prominence as a studied method for extending available datasets [19]. The ability to train deep networks often depends on the availability of big data. The fields of both image recognition and voice recognition has been strongly influenced by deep learning methods [20, 21], and this has motivated the emergence of data augmentation. For RL many of the same concepts can be utilized, but there is also a need for methods that work particularly in the temporal dimension. Traditional, naïve approaches tend to manipulate the investigated environment or dataset in various ways. For visual tasks, these have included scaling of objects, translating i.e. moving objects spatially to various positions, rotation of objects at various angles, flipping objects as to remove bias from any direction, adding noise, changing lightning conditions, and transforming perspective of a known object by changing the angle of view [19, 22]. For audio tasks, data augmentation often includes deformations into a temporal dimension. Approaches include time stretching by changing audio speed, pitch shifting by raising or lowering the tone frequency by various degrees, dynamic range compression, and introducing background noise using gaussian or natural noise methods [23]. The naïve data augmentation approaches tend to produce limited alternative data for RL agents to learn from in an extended reality setting. For an RL agent to learn new abilities, data augmentation must support the agent's scenario learning process. As suggested by [24], we shift from learning to generalize on spatial data to reacting to continuous-time dynamical systems without a-priori discretization of time, state, and action. Several approaches exist for the creation of these scenarios. An important method is adversarial learning, as it can produce new and complex augmented datasets by pitting a generative model against an adversary [25]. A generative model in combination with XR, can also address the exploration problem, as exploring some states in the physical reality could be very costly and dangerous. This combination also allows the system developer to understand which state spaces in the virtual environment has been visited and trained upon, and the model's ability to generalize in the extended reality environment. These generative techniques for extending the learning environment are further explored in the following section. 3 Reinforcement learning Although XR is slowly receiving more recognition, AI and machine learning's use of XR to enhance learning is lagging behind. XR could help improve an AI's behaviour by providing information from either pure virtual or semi-real environments. Reinforcement learning is one machine learning technique which, when combined with XR, could produce interesting and beneficial results for many applications, such as driverless cars, autonomous factories, smart cities, gaming and more. 4 A PREPRINT - OCTOBER 22, 2019 RL's primary purpose is to calculate the best action an agent should take when an environment is provided. With RL, we could be able to calculate what best action to take by maximizing the cumulative reward from previous actions, thus learning a policy. RL has long roots from areas such as dynamical programming [26], and for a historical review see [27]. However, recently it has received a lot of attention for its potential to advance and improve applications in gaming, robotics, natural language processing (including dialogue systems, machine translation, and text generation), computer vision, neural architecture design, business management, finance, healthcare, intelligent transportation systems, and other computer systems [28]. Attention and memory are two parts from RL which, if done impetuously, could negatively affect performance. Attention is the mechanism which focuses on the salient parts. Whereas, memory provides long term data storage, and attention is an approach for memory addressing [28]. Using XR and self-play, agents may be able to learn desired behaviour before an action an agent makes become crucial to their performance. As an example, autonomous helicopter software could learn fundamental mechanisms for flight using virtual data in simulations in order to achieve high level of attention using the memory required, without the risks posed by real world applications. Once the attention has reached a desired level, it can be applied to real agents in the physical world. General value functions can be used to represent knowledge. RL, arguably, mimics knowledge in the sense that it (generally) learns from the results of actions taken. Thus, one may be able to represent knowledge with general value functions using policies, termination functions, reward functions, and terminal reward functions as parameters [29]. Doing so, an agent may be able to predict the values of sensors, and policies to maximize those sensor values, and answer predictive or goal-oriented questions. Generative Adversarial Networks (GANs) estimate generative models via an adversarial process by training two models simultaneously [25], a generative model G to capture the data distribution, and a discriminative model D to estimate the probability that a sample comes from the training data but not the generative model G. Such an approach could be extended to XR by training a generative model G on virtual / simulated test data and then a discriminative model D to estimate the probability that a sample comes from the real world. This could help tackle some of the issues with RL within virtual environments and extended to the real world. RL and XR could be used before the agent is applied to a real environment, this could save on resources and make autonomous systems a more viable option for general use. GANs together with transfer learning could advance self-play using virtual environments for real world agents [30]. By combining virtual data generative models and transferring the learning model to a discriminative model, we may be able to accurately express what was learned from the virtual learning environment to the real agent. Again, unforeseen problem will inevitably arise due to the nature of modelling. By using RL both in the virtual learning phase and embedded into the real agent, we may drastically improve a real agent's learning time. [31] proposed a strategic attentive writer (STRAW), a deep recurrent neural network architecture, for learning high-level temporally abstracted macro-actions in an end-to-end manner based on observations from the environment. Macro- actions are sequences of actions commonly occurring. STRAW builds a multi-step action plan, updated periodically based on observing rewards, and learns for how long to commit to the plan by following it without re-planning. Similar to GANs, STRAW could be used after the simulation learning stage so the agent copes with any discrepancies between the simulation and the real world. Adaptive learning is a core characteristic to achieving strong AI [32]. Several adaptive learning methods have been proposed which utilize prior knowledge [33, 34, 28]. [33] proposed to represent a particular optimization algorithm as a policy, and convergence rate as reward. [34, 28] proposed to learn a flexible recurrent neural network (RNN) model to handle a family of RL tasks, to improve sample efficiency, learn new tasks in a few samples, and benefit from prior knowledge. The notion of self-play is one of the biggest advancements of modern AI. AlphaGo AI is Deepmind's newest Go playing AI [35], that learns, tabula rasa, superhuman proficiency in challenging domains. Starting with the basic rules, they used self-play for the AI to learn strategies by playing against itself and storing efficient / rewarding moves. Fictitious Self-Play is a machine learning framework that implements fictitious play in a sample-based fashion [36]. The three strategies that are compared are: Learning by self-play, learning from playing against a fixed opponent, and learning from playing against a fixed opponent while learning from the opponent's moves as well [37]. 4 Self-play Scenarios and Architectures Generalizing from training into real scenarios is not easy for self learning agents. This problem is known as the reality gap [38]. In the initial stages of AI research, the training of self-learning agents included rules or limited scenarios where it can learn and improve upon competition against other introduced players. Interestingly, video games have emerged as one of the main source of benchmark environments for the training and testing of such agents, mostly due 5 A PREPRINT - OCTOBER 22, 2019 Figure 2: Proposed general architecture for a self-learning agent interacting with its environment. to its realistic, yet controlled approach to the real world, and the easy access to large amounts of data. For example, an AI agent is trained by playing with a perfect copy of itself without any supervision [39]. In this scenario, a set of basic rules of the game have been introduced at the beginning and the agent improves much faster using a vector of rewards instead of the classical scalar quantity [40]. Initially, self-play agents were trained to play board games (such as chess and go, among others) [35] but it has now been successfully extended from the classic and simpler Atari 2600 video games [41] to more complex first-person shooters: Doom [42], Battlefield [43], Quake [44]; Role Playing games2: Warcraft [45]; Real-Time Strategic Games: Starcraft [46, 47, 48] and more recently Multiplayer Online Battle Arena (Dota 2, [49]). For a more comprehensive review see the work by [50]. Motivation for studying self-play scenarios has increased in recent years mainly due to the advances in neural network architectures suitable to the reinforcement learning paradigm: DQN [41], AC3 [51], DSR [52], Dueling networks[53] among others as well as the development of powerful and accessible graphics processing unit (GPU) computing resources. This area of research is broadly known as Deep Reinforcement Learning [28, 54, 55]. The challenge of training self-playing agents in order to develop more complex policies inside realistic and highly specific or general environments remain as an open problem. Most of the recent developments tend to focus on very particular properties of the learning agent or the way that they interact with their surroundings. To address this issue, we identify two general mechanism that can be improved in order to design a better self-learning agent: self-play scenarios and self-learning architectures. 4.1 Improving self-play scenarios and self-learning agents: closing the reality gap Constructing realistic self-play scenarios plays a fundamental role in training self-learning agents. Once an agent is immersed in a specific environment, we expect (independently of the self-learning architecture) that it will learn a set of policies accordingly to the received experiences3. A problem which is widely understood, is that when agents learn from strict simulated scenarios, they may not be prepared for unexpected situations when the environment changes, such as a pigeon flying towards the sensor of a driverless car. Here, we propose a general scheme that uses the versatility of the video games or simulators as a source of synthetic data and the wide array of capabilities of modern extended reality technologies, to enrich the properties of the real environment during the training of self-learning agents. An agent may learn independently, but the environment can be controlled to persuade the agent to learn a set of additional policies for unexpected scenarios. In addition to the enriched data, the self-learning agent may be trained using purely synthetic data. But the limitations of this method rely in the accuracy of the representation of the real scenarios. For the self-learning mechanism, we have identified three key steps which could improve the design of architectures for self-learning agents, which may improve policies both in terms of effectiveness and robustness. The three areas 2Including the Massively Multiplayer Online type of games. 3A learning agent can learn a set of policies, or will optimize the parameters of a given set of policy. New policies can emerge even without previous knowledge. The sum of the whole policies is called general policy. 6 A PREPRINT - OCTOBER 22, 2019 Figure 3: Illustration of how different components from Figure 2 can be used on complete self-learning systems. a. Adapted from [56], b. Adapted from [57], c. Adapted from [58], d. Adapted from [59], e. Adapted from [60] and f. Adapted from [61]. are: Data collection, task generalization and emergent behaviour (see Fig. 2). For a given agent, in the first stage the agent will need to interact with the environment, possibly by accessing a data collection, then the agent should be able to generalize a set of given tasks and, simultaneously, new skills should emerge (independently or due to the task generalization). In the final stage, the emergent and the generalization skills interact with the environment to create a continuous self-learning agent. To illustrate the steps, we present a set of representative developments in the area of (deep) reinforcement learning. Note that this list is not comprehensive but the examples are presented to highlight their own specific properties then to introduce them in our general model (see Figure 3). Each can be used as a building block inside a complete self-play scenario, for example, Figure 3a shows a low-fidelity rendered images with random camera positions, lighting conditions, object positions, and non-realistic textures use to train a self-learning agent [56]; Figure 3b shows an agent which uses a compressed representation of a real scenario to learn a set of policies which are successfully use back to the real environment [57]. Figure 3c shows an image of a robot used as a one-demonstration example during the training stage [58]. Figure 3d shows another image of a robot used during a training stage to teach a robot to place an object in a target position [59], Figure 3e depicts an agent stacking two blocks, behaviour learn from sparse rewards [60] and Figure 3f illustrates one competitive environment where one the agents develops a new set skills [61]. 1. Data collection: Domain randomization (DR): DeepMind have recently shown how an agent can be trained on artificially generated scenarios. In their paper, the authors successfully transferred the knowledge from a neural network purely trained on low resolution rendered RGB images: domain randomization [56]. This method can be extensively used for training agents in the case that the amount of data available is low or when the separation between the real and the train environment is immense. World models (WM): Self-learning agents can be trained in a compressed spatial and temporal representation of real environments by [57]. This method is highly powerful because an agent can learn in a more compact or hallucinated universe and then go back to the original environment exporting the set of learned abilities. One of the main advantages of this method is the possibility to perform a much faster and accurate in situ training of the agents by using less demanding computational resources. 2. Task generalization: One-shot imitation learning (OSIL): the authors present an improved method that uses a meta-learning framework built upon the soft attention model [62] named one-shot imitation learning [58]. Here, the agents are able to learn a new policy and solve a task after being exposed to a few demonstrations during the training stage. 7 A PREPRINT - OCTOBER 22, 2019 One-shot visual imitation learning (OSVIL): Meta-imitation learning algorithm that teaches an agent to learn how to learn efficiently [59]. In this work, a robot reuses past experiences and then upon a single demonstrations, it develops new skills. 3. Emergent behaviour: Scheduled auxiliary control (SAC): another research team from DeepMind introduced a new framework that allows agents to learn new and complex behaviours in presence of a stream of sparse rewards [60]. Multi-agent competition (MAC): a paper by one research team from OpenAI, the authors showed that multi- agents self-play on complex environments can produce behaviours which can be more complex than the environment itself [61]. The emergent skills can improve the capabilities of the agents upon unexpected changes in the real environment. To summarize, Figure 2 illustrates how an agent can retrieves data from an environment and then generalizes to a specific task and simultaneously develops new abilities. The new skills can emerge independently or due to the task generalization process. In the final stage, the environment gets modified by the agent itself. A combination of such methods could be used to create more effective architectures for teaching self-learning agents. The novelty of this idea is that it builds upon the concept of modularity to create more complex architectures which develop new untrained behaviours. This notion has been explored before to improve learning agents, for instance by synergistically combining two modelling methods such as type-based reasoning and policy reconstruction [63]. Interestingly, it has been stated recently that this is still a promising area under research [64]. In addition, the proposed architecture establishes a general framework for the design of intelligent agents or rational agents searching to maximize their reward upon interaction with an external environment [65] via specific goals (task generalization and emergent behaviour). Once an architecture is defined, targeting the most adequate general policies are dependent on the external information gathered by the agent. In the data collection module, the main goal is to optimize the data used by the agent for learning. In the general case however, a proper design should include a non-static complete representation of the environment for exploring extensively all possible scenarios. In the next section, we present a complete general design for a self-learning agent including an extra module for extending the description of the world experienced by the agent and then, upon an ad-hoc division and by using the concept of multi-agent [66]. We discuss the application in the design of a central autonomous agent able provide via rational decision-making, strategies to tackle the possible consequences derived from changes on any stage of a specific industrial infrastructure. 5 Proposed Design As already discussed, our goal of designing general self-play scenarios for teaching self-learning agents can be tackled by separating the data retrieved from the environment and the agent's self-learning architecture. In the spirit of the SMM (see Section 2) we present a general scheme in which we divide the general architecture into two modules, in Module 1, the agent retrieves the data from its surroundings as a combination of information from the real world and synthetic data (or pure synthetic data), and in Module 2 (equivalent to the structure of the Fig 3), the agent creates its final policies. The general scheme is depicted in the Fig 4. For a self-learning agent inside a specific self-learning scenario, there is no difference between synthetic or real data. Here we call real data the information extracted from physical world without any previous or further digital modifications. The agent uses exclusively the information, in terms of raw bytes, independently of the sensors that connect it with the environment. The use of synthetic data arises as a need to expose the self-learning agent to unexpected situations or conditions that allow it to create a set of optimal related policies. The representation of the real world can be done also via pure synthetic data, however the best case scenario is such where the synthetic data is used to extend the real world. The agent also can modify its own environment during the learning process, and if the whole process is fully done in a simulation environment, the use of engines that mimic the physical rules of the real world become necessary. The proposed general design can be encapsulated and used as a basic element in a more complex multi-agent based learning architecture [66]. The communication among its moieties can be performed via the local information modules that represents their individual real worlds. Posteriorly, a central agent retrieves and updates its state providing a final decision. Several mathematical strategies can be applied to interchange the information, for instance, by defining scalar, vectorial or probabilistic representations. In the next part we aim to present an example or how we can build a minimal supra-modular architecture for the specific case of industrial management. We discuss the advantages and the characteristics for the modular parts of the design, as well as review (not exhaustively), the state-of-the-art developments for learning agents in decision making. 8 A PREPRINT - OCTOBER 22, 2019 Figure 4: Two module design of a general architecture for a self-learner agent interacting with its enriched or altered environment. Figure 5: Proposed architecture for a reinforcement learning agent in Autonomous Industrial Management (AIM) for adaptive industrial infrastructure. 5.1 Application in Autonomous Industrial Management The aforementioned improvements can be employed in specific applications using specific designs. In particular, by using the new and open simulation frameworks such as OpenAI Gym4 or Dopamine5 among others. Here we discuss a particular application for industrial environments solving a managerial problem, however the developed ideas can be used for other purposes upon a clear definition of their parts. In the industrial regime, decision-making is one of the key elements in the adaptive business intelligence discipline [67]. Despite the advances in the computational tools, still many relevant decisions are taken by real persons. Here, we propose a general model where self-learning agents can be trained to make decisions on industrial scale upon self- 4https://github.com/openai/gym 5https://github.com/google/dopamine 9 A PREPRINT - OCTOBER 22, 2019 playing using extended reality training scenarios. We devised an strategy where an industrial infrastructure is divided ad-hoc in three independent sections managed by three independent self-learning agents (see Figure 5). Each agent replicates the physical process but it has the property to explore (and improve) in its own learning space based in the perturbation via self-learning mechanisms. Upon external perturbations in their environments, the final decision is done by a central agent which learns thanks to the information gathered for the independent agents. This Multi-Agent Reinforcement Learning (MARL) structure will bring a modularity structure that can be exploited in the industrial realm to improve and optimize the decision-making processes. Our example focuses mainly in the type of manufacturing industry, but the methodology can be extended easily to other industrial fields. Similar conceptual frameworks have been presented and described in the literature [68, 69] and in some cases including full computational frameworks or software applied on specific industrial environments [70, 71] were described. The niche of industrial management is a fruitful source of academic research with the application of the cutting-edge methods for the design of intelligent systems. Our division in three different entities: Supply Chain Management (SCM), Warehouse or Inventory Management and Digital Twin responds to the fact that a lot of work on modelling and creation of autonomous agents has been done in the last years independently in each area, therefore a low level description of an autonomous agent for industrial management is possible by following our proposed architecture (see Fig. 4). In the next subsection we present a non exhaustive review of methods by highlighting some of the relevant strategies employed in the creation of autonomous systems. 5.1.1 Supply Chain Management (SCM) The use of RL for optimization in the SCM has been discussed largely in the last decades [72, 73], in particular, in the seminal works by [74] where the authors propose a multi-agent systems for the optimization of tasks in the SCM, [75] that solves the multi-agent problem as a semi-Markov decision problem, [76] that reduces the complexity by dividing the agents into three components (in a similar concept presented in this work), among others. Here, the self-learning agent must be able to decide about the different suppliers (external and internal) in coordination with the warehouse manager agent. 5.1.2 Warehouse or Inventory Management Models for warehouse management have been developed in parallel to the state-of-the-art technological developments to achieve short and optimized responses in delivering goods [77] meanwhile an optimal stock level is maintained. In particular, it is worth to highlight two types of warehousing systems: automatic and automated warehousing systems. Several methods for self-learning agents in warehouses have shown to be effective in solving real problems, for instance, Stochastic Learning [78], temporal difference Actor-Critic algorithm [79] or more recently Deep Reinforcement Learning [80]. In general, the information can be controlled and retrieved via an optimized wireless network of sensors inside the warehouse [81]. In this case, the self-learning agent must be able not only to gather the internal information about the location of the goods inside the warehouse but also optimize the architecture of the network via self-play mechanisms. 5.1.3 Digital Twin The use of digital tools in the industry has outgrown the level in which only individual applications were able to be modelled accurately for very specific topics, in the sixties, towards a complete simulation of the systems during the whole entire life cycle in modern times [82]. The concept that includes a detailed model and description of a product, system or component in all its possible phases (product design, production system engineering, production planning, production execution, production intelligence and closed-loop optimization) [83] is known as digital twin6 In general terms, the digital twin is an extension of the model-based systems engineering (MBSE) concept [85]. The three important aspects of the digital twin have been discussed previously by other authors [82, 83, 8]: modularity, connectivity and autonomy. These aspects can be linked with our proposed design in the Fig 4. Our design can be extended into the MARL context. 6 Conclusion & Future Work The design of self-learning and self-play scenarios is still an area of fruitful development and research. Many critics have pointed out that AI research is limited by its own ideas [86] as well as it's usefulness for industrial purposes. The creation and discussion of general architectures can open the door to new proposals, in particular, for the final emergence of the expected autonomous systems (see Section 2.1). Despite a boom in the field during the last years, there are many open questions about how to enable self-learning agents to achieve specific tasks without any supervision. We 6A term coined by NASA during the Apollo missions, but brought recently to the general public [84]. 10 A PREPRINT - OCTOBER 22, 2019 propose to tackle this question by using our general architecture, which can be, in principle, limited by the modular developments and the availability of specific data sets or sensors. In this work we grounded our position in autonomous systems by providing a definition of requirements and presented a general review of the relevant literature. We provided a proposal for a design of a general architecture for self-learning agents. Our design included two separate modules, one for the creation of the data and the second for the independent self-learning of an agent. We conclude by stating that the second module is, in general, divided into three stages, where each stage is in charge of accomplishing an independent task: data collection, task generalization and emergent behaviour. In very particular designs, generalization can influence emergent behaviours, but only in one direction. We expanded our findings by presenting a concrete example of our ideas in the industrial manufacturing sector. Here we suggest a division in three modular elements that feed a central agent for decision-making. Each module is able to explore and learn from all possible scenarios and available data, taking into account changes or disruptions in its own infrastructure and the information provided by the other modules. In the near future, we plan to present the first implementation of our ideas and publish the conclusions about the feasibility of our design. References [1] Klaus Schwab. The Fourth Industrial Revolution. Crown Publishing Group, New York, NY, USA, 2017. [2] Tesla. Future of driving. https://www.tesla.com/autopilot, 2019. Accessed: 2019-07-04. [3] Rolls-Royce. Rolls-royce and finferries demonstrate world's first fully autonomous ferry. https://www.rolls- royce.com/media/press-releases/2018/03-12-2018-rr-and-finferries-demonstrate-worlds-first-fully-autonomous- ferry.aspx, 2018. Accessed: 2019-07-04. [4] Stan Franklin and Art Graesser. Is it an agent, or just a program?: A taxonomy for autonomous agents. In International Workshop on Agent Theories, Architectures, and Languages, pages 21 -- 35. Springer, 1996. [5] Christer Carlsson, Mario Fedrizzi, and Robert Fullér. Fuzzy logic in management, volume 66. Springer Science & Business Media, 2012. [6] Tong Wang, Huijun Gao, and Jianbin Qiu. A combined adaptive neural network and nonlinear model predictive control for multirate networked industrial process control. IEEE Transactions on Neural Networks and Learning Systems, 27(2):416 -- 425, 2016. [7] Stefan Boschert, R Rosen, and C Heinrich. Next generation digital twin. In Proceedings of the 12th International Symposium on Tools and Methods of Competitive Engineering TMCE, pages 209 -- 218, 2018. [8] Werner Kritzinger, Matthias Karner, Georg Traar, Jan Henjes, and Wilfried Sihn. Digital twin in manufacturing: A categorical literature review and classification. IFAC-PapersOnLine, 51(11):1016 -- 1022, 2018. [9] Leonardo Espinosa Leal, Anthony Chapman, and Magnus Westerlund. Reinforcement learning for extended reality: designing self-play scenarios. In Proceedings of the 52nd Hawaii International Conference on System Sciences, pages 156 -- 163, 2019. [10] Peter Checkland and John Poulter. Soft systems methodology. In Martin Reynolds and Sue Holwell, editors, Systems Approaches to Managing Change: A Practical Guide, pages 1430 -- 1436. Springer, 2010. [11] CG Sørensen, S Fountas, E Nash, Liisa Pesonen, Dionysis Bochtis, Søren Marcus Pedersen, B Basso, and SB Blackmore. Conceptual model of a future farm management information system. Computers and electronics in agriculture, 72(1):37 -- 47, 2010. [12] Lawrence Lee Rauch. Oscillation of a third order nonlinear autonomous system. In S. Lefschetz, editor, Contributions to the theory of nonlinear oscillations, volume 1, page 39. Princeton University Press, 1950. [13] David Canfield Smith, Allen Cypher, and Jim Spohrer. Kidsim: programming agents without a programming language. Communications of the ACM, 37(7):54 -- 67, 1994. [14] Miltos Kyriakidis, Riender Happee, and Joost CF de Winter. Public opinion on automated driving: Results of an international questionnaire among 5000 respondents. Transportation research part F: traffic psychology and behaviour, 32:127 -- 140, 2015. [15] SAE On-Road Automated Vehicle Standards Committee. Taxonomy and definitions for terms related to on-road motor vehicle automated driving systems. SAE International, 2014. [16] Francis J Anscombe, Robert J Aumann, et al. A definition of subjective probability. Annals of mathematical statistics, 34(1):199 -- 205, 1963. [17] Joscha Bach. Phenomenal experience and the perceptual binding state. In Papers of the 2019 Towards Conscious AI Systems Symposium. CEUR-WS, 2019. 11 A PREPRINT - OCTOBER 22, 2019 [18] Joscha Bach. The cortical conductor theory: Towards addressing consciousness in ai models. In Biologically Inspired Cognitive Architectures Meeting, pages 16 -- 26. Springer, 2018. [19] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097 -- 1105, 2012. [20] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. nature, 521(7553):436, 2015. [21] Leonardo Espinosa Leal, Kaj-Mikael Björk, Amaury Lendasse, and Anton Akusok. A web page classifier library based on random image content analysis using deep learning. In Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, PETRA '18, pages 13 -- 16, New York, NY, USA, 2018. ACM. [22] Prasad Pai. Data augmentation techniques in CNN using Tensorflow. https://bit.ly/2KLm8K6, 2017. Accessed: 2018-06-12. [23] Justin Salamon and Juan Pablo Bello. Deep convolutional neural networks and data augmentation for environmental sound classification. IEEE Signal Processing Letters, 24(3):279 -- 283, 2017. [24] Kenji Doya. Reinforcement learning in continuous time and space. Neural computation, 12(1):219 -- 245, 2000. [25] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In Advances in neural information processing systems, pages 2672 -- 2680, 2014. [26] R Bellman. Dynamic Programming. Princeton University Press, 1957. [27] Leslie Pack Kaelbling, Michael L Littman, and Andrew W Moore. Reinforcement learning: A survey. Journal of artificial intelligence research, 4:237 -- 285, 1996. [28] Yuxi Li. Deep reinforcement learning: An overview. arXiv preprint arXiv:1701.07274, 2017. [29] Richard S Sutton, Joseph Modayil, Michael Delp, Thomas Degris, Patrick M Pilarski, Adam White, and Doina Precup. Horde: A scalable real-time architecture for learning knowledge from unsupervised sensorimotor interaction. In The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, pages 761 -- 768. International Foundation for Autonomous Agents and Multiagent Systems, 2011. [30] Sinno Jialin Pan and Qiang Yang. A survey on transfer learning. IEEE Transactions on knowledge and data engineering, 22(10):1345 -- 1359, 2010. [31] Alexander Vezhnevets, Volodymyr Mnih, Simon Osindero, Alex Graves, Oriol Vinyals, John Agapiou, et al. Strategic attentive writer for learning macro-actions. In Advances in neural information processing systems, pages 3486 -- 3494, 2016. [32] Brenden M Lake, Tomer D Ullman, Joshua B Tenenbaum, and Samuel J Gershman. Building machines that learn and think like people. Behavioral and Brain Sciences, 40, 2017. [33] Sergey Levine, Chelsea Finn, Trevor Darrell, and Pieter Abbeel. End-to-end training of deep visuomotor policies. The Journal of Machine Learning Research, 17(1):1334 -- 1373, 2016. [34] Yutian Chen, Matthew W Hoffman, Sergio Gómez Colmenarejo, Misha Denil, Timothy P Lillicrap, Matt Botvinick, and Nando de Freitas. Learning to learn without gradient descent by gradient descent. arXiv preprint arXiv:1611.03824, 2016. [35] David Silver, Thomas Hubert, Julian Schrittwieser, Ioannis Antonoglou, Matthew Lai, Arthur Guez, Marc Lanctot, Laurent Sifre, Dharshan Kumaran, Thore Graepel, et al. Mastering chess and shogi by self-play with a general reinforcement learning algorithm. arXiv preprint arXiv:1712.01815, 2017. [36] Johannes Heinrich, Marc Lanctot, and David Silver. Fictitious self-play in extensive-form games. In International Conference on Machine Learning, pages 805 -- 813, 2015. [37] Michiel Van Der Ree and Marco Wiering. Reinforcement learning in the game of othello: learning against a fixed opponent and learning from self-play. In Adaptive Dynamic Programming And Reinforcement Learning (ADPRL), 2013 IEEE Symposium on, pages 108 -- 115. IEEE, 2013. [38] Nick Jakobi, Phil Husbands, and Inman Harvey. Noise and the reality gap: The use of simulation in evolutionary robotics. In European Conference on Artificial Life, pages 704 -- 720. Springer, 1995. [39] Alexey Dosovitskiy and Vladlen Koltun. Learning to act by predicting the future. arXiv preprint arXiv:1611.01779, 2016. [40] Richard S Sutton and Andrew G Barto. Reinforcement learning: An introduction. Cambridge, MA: MIT Press, 2011. 12 A PREPRINT - OCTOBER 22, 2019 [41] Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A Rusu, Joel Veness, Marc G Bellemare, Alex Graves, Martin Riedmiller, Andreas K Fidjeland, Georg Ostrovski, et al. Human-level control through deep reinforcement learning. Nature, 518(7540):529, 2015. [42] Michał Kempka, Marek Wydmuch, Grzegorz Runc, Jakub Toczek, and Wojciech Ja´skowski. Vizdoom: A doom-based ai research platform for visual reinforcement learning. In Computational Intelligence and Games (CIG), 2016 IEEE Conference on, pages 1 -- 8. IEEE, 2016. [43] Jack Harmer, Linus Gisslén, Henrik Holst, Joakim Bergdahl, Tom Olsson, Kristoffer Sjöö, and Magnus Nordin. Imitation learning with concurrent actions in 3d games. arXiv preprint arXiv:1803.05402, 2018. [44] Charles Beattie, Joel Z Leibo, Denis Teplyashin, Tom Ward, Marcus Wainwright, Heinrich Küttler, Andrew Lefrancq, Simon Green, Víctor Valdés, Amir Sadik, et al. Deepmind lab. arXiv preprint arXiv:1612.03801, 2016. [45] Per-Arne Andersen, Morten Goodwin, and Ole-Christoffer Granmo. Towards a deep reinforcement learning approach for tower line wars. In International Conference on Innovative Techniques and Applications of Artificial Intelligence, pages 101 -- 114. Springer, 2017. [46] Oriol Vinyals, Timo Ewalds, Sergey Bartunov, Petko Georgiev, Alexander Sasha Vezhnevets, Michelle Yeo, Alireza Makhzani, Heinrich Küttler, John Agapiou, Julian Schrittwieser, et al. Starcraft ii: a new challenge for reinforcement learning. arXiv preprint arXiv:1708.04782, 2017. [47] Gabriel Synnaeve, Nantas Nardelli, Alex Auvolat, Soumith Chintala, Timothée Lacroix, Zeming Lin, Florian Richoux, and Nicolas Usunier. Torchcraft: a library for machine learning research on real-time strategy games. arXiv preprint arXiv:1611.00625, 2016. [48] Yuandong Tian, Qucheng Gong, Wenling Shang, Yuxin Wu, and C Lawrence Zitnick. Elf: An extensive, lightweight and flexible research platform for real-time strategy games. In Advances in Neural Information Processing Systems, pages 2656 -- 2666, 2017. [49] OpenAI. Dota 2. https://blog.openai.com/dota-2/, 2018. Accessed: 2018-06-12. [50] Niels Justesen, Philip Bontrager, Julian Togelius, and Sebastian Risi. Deep learning for video game playing. arXiv preprint arXiv:1708.07902, 2017. [51] Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timothy Lillicrap, Tim Harley, David Silver, and Koray Kavukcuoglu. Asynchronous methods for deep reinforcement learning. In International Conference on Machine Learning, pages 1928 -- 1937, 2016. [52] Tejas D Kulkarni, Ardavan Saeedi, Simanta Gautam, and Samuel J Gershman. Deep successor reinforcement learning. arXiv preprint arXiv:1606.02396, 2016. [53] Ziyu Wang, Tom Schaul, Matteo Hessel, Hado Van Hasselt, Marc Lanctot, and Nando De Freitas. Dueling network architectures for deep reinforcement learning. arXiv preprint arXiv:1511.06581, 2015. [54] Seyed Sajad Mousavi, Michael Schukat, and Enda Howley. Deep reinforcement learning: an overview. In Proceedings of SAI Intelligent Systems Conference, pages 426 -- 440. Springer, 2016. [55] Kai Arulkumaran, Marc Peter Deisenroth, Miles Brundage, and Anil Anthony Bharath. A brief survey of deep reinforcement learning. arXiv preprint arXiv:1708.05866, 2017. [56] Joshua Tobin, Rachel Fong, Alex Ray, Jonas Schneider, Wojciech Zaremba, and Pieter Abbeel. Domain ran- domization for transferring deep neural networks from simulation to the real world. CoRR, abs/1703.06907, 2017. [57] David Ha and Jürgen Schmidhuber. World models. CoRR, abs/1803.10122, 2018. [58] Yan Duan, Marcin Andrychowicz, Bradly C. Stadie, Jonathan Ho, Jonas Schneider, Ilya Sutskever, Pieter Abbeel, and Wojciech Zaremba. One-shot imitation learning. CoRR, abs/1703.07326, 2017. [59] Chelsea Finn, Tianhe Yu, Tianhao Zhang, Pieter Abbeel, and Sergey Levine. One-shot visual imitation learning via meta-learning. CoRR, abs/1709.04905, 2017. [60] Martin A. Riedmiller, Roland Hafner, Thomas Lampe, Michael Neunert, Jonas Degrave, Tom Van de Wiele, Volodymyr Mnih, Nicolas Heess, and Jost Tobias Springenberg. Learning by playing - solving sparse reward tasks from scratch. CoRR, abs/1802.10567, 2018. [61] Trapit Bansal, Jakub Pachocki, Szymon Sidor, Ilya Sutskever, and Igor Mordatch. Emergent complexity via multi-agent competition. CoRR, abs/1710.03748, 2017. [62] Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473, 2014. 13 A PREPRINT - OCTOBER 22, 2019 [63] Stefano V Albrecht and Subramanian Ramamoorthy. A game-theoretic model and best-response learning method for ad hoc coordination in multiagent systems. In Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, pages 1155 -- 1156. International Foundation for Autonomous Agents and Multiagent Systems, 2013. [64] Stefano V Albrecht and Peter Stone. Autonomous agents modelling other agents: A comprehensive survey and open problems. Artificial Intelligence, 258:66 -- 95, 2018. [65] Stuart J Russell and Peter Norvig. Artificial intelligence: a modern approach. Malaysia; Pearson Education Limited„ 2016. [66] Michael Wooldridge. An introduction to multiagent systems. John Wiley & Sons, 2009. [67] Zbigniew Michalewicz, Martin Schmidt, Matthew Michalewicz, and Constantin Chiriac. Adaptive business intelligence. Springer, 2006. [68] Michael Wooldridge, Nicholas R. Jennings, and David Kinny. The gaia methodology for agent-oriented analysis and design. Autonomous Agents and Multi-Agent Systems, 3(3):285 -- 312, Sep 2000. [69] Jacques Ferber, Olivier Gutknecht, and Fabien Michel. From agents to organizations: An organizational view of multi-agent systems. In Paolo Giorgini, Jörg P. Müller, and James Odell, editors, Agent-Oriented Software Engineering IV, pages 214 -- 230, Berlin, Heidelberg, 2004. Springer Berlin Heidelberg. [70] Jaelson Castro, Manuel Kolp, and John Mylopoulos. Towards requirements-driven information systems engineer- ing: the tropos project. Information systems, 27(6):365 -- 389, 2002. [71] Rafael H Bordini, Jomi Fred Hübner, and Michael Wooldridge. Programming multi-agent systems in AgentSpeak using Jason, volume 8. John Wiley & Sons, 2007. [72] Annapurna Valluri, Michael J North, and Charles M Macal. Reinforcement learning in supply chains. International journal of neural systems, 19(05):331 -- 344, 2009. [73] Xianyu Zhang, Xinguo Ming, Zhiwen Liu, Dao Yin, Zhihua Chen, and Yuan Chang. A reference framework and overall planning of industrial artificial intelligence (i-ai) for new application scenarios. The International Journal of Advanced Manufacturing Technology, pages 1 -- 23, 2018. [74] Mihai Barbuceanu and Mark S Fox. Coordinating multiple agents in the supply chain. In Proceedings of WET ICE'96. IEEE 5th Workshop on Enabling Technologies; Infrastucture for Collaborative Enterprises, pages 134 -- 141. IEEE, 1996. [75] Pierpaolo Pontrandolfo, Abhijit Gosavi, O Geoffrey Okogbaa, and Tapas K Das. Global supply chain management: a reinforcement learning approach. International Journal of Production Research, 40(6):1299 -- 1317, 2002. [76] Tim Stockheim, Michael Schwind, and Wolfgang Koenig. A reinforcement learning approach for supply chain management. In 1st European Workshop on Multi-Agent Systems, Oxford, UK, 2003. [77] Jeroen P Van den Berg and Willem HM Zijm. Models for warehouse management: Classification and examples. International journal of production economics, 59(1-3):519 -- 528, 1999. [78] Reza Moazzez Estanjini, Yingwei Lin, Keyong Li, Dong Guo, and Ioannis Ch Paschalidis. Optimizing warehouse forklift dispatching using a sensor network and stochastic learning. IEEE Transactions on Industrial Informatics, 7(3):476 -- 486, 2011. [79] Reza Moazzez Estanjini, Keyong Li, and Ioannis Ch Paschalidis. A least squares temporal difference actor -- critic algorithm with applications to warehouse management. Naval Research Logistics (NRL), 59(3-4):197 -- 211, 2012. [80] Joren Gijsbrechts, Robert N Boute, Jan A Van Mieghem, and Dennis Zhang. Can deep reinforcement learning improve inventory management? performance and implementation of dual sourcing-mode problems. Performance and Implementation of Dual Sourcing-Mode Problems (December 17, 2018), 2018. [81] Lukasz Golab and Theodore Johnson. Data stream warehousing. In 2014 IEEE 30th International Conference on Data Engineering, pages 1290 -- 1293. IEEE, 2014. [82] Stefan Boschert and Roland Rosen. Digital twin -- the simulation aspect. In Mechatronic Futures, pages 59 -- 74. Springer, 2016. [83] Roland Rosen, Georg Von Wichert, George Lo, and Kurt D Bettenhausen. About the importance of autonomy and digital twins for the future of manufacturing. IFAC-PapersOnLine, 48(3):567 -- 572, 2015. [84] Mike Shafto, Mike Conroy, Rich Doyle, Ed Glaessgen, Chris Kemp, Jacqueline LeMoigne, and Lui Wang. Model- ing, simulation, information technology & processing roadmap. National Aeronautics and Space Administration, 2012. 14 [85] A Wayne Wymore. Model-based systems engineering. CRC press, 1993. [86] Judea Pearl and Dana Mackenzie. The Book of Why: The New Science of Cause and Effect. Basic Books, 2018. A PREPRINT - OCTOBER 22, 2019 15
1904.08310
1
1904
2019-04-13T18:36:39
LegenDary 2012 Soccer 2D Simulation Team Description Paper
[ "cs.MA", "cs.RO" ]
In LegenDary project, we started a new research based on Agent2D in RoboCup 2D soccer simulation. In this paper, we mainly present the team algorithms and structures which we used to develop our team in separated section. We have focused on passing, dribbling and blocking skills. We improved them and made the team ready for this competition. Through pass is the most important part of our team that we work a lot on it.
cs.MA
cs
LegenDary 2012 Soccer 2D Simulation Team Description Paper Pourya Saljoughi1, Reza Ma'anijou1, Ehsan Fouladi1, Narges Majidi1, Saber Yaghoobi1, Houman Fallah1 and Saeideh Zahedi1 1 Islamic Azad University of Lahijan [email protected] Abstract. In LegenDary project, we started a new research based on Agent2D in RoboCup 2D soccer simulation. In this paper, we mainly present the team algorithms and structures which we used to develop our team in separated section. We have focused on passing, dribbling and blocking skills. We improved them and made the team ready for this competition. Through pass is the most important part of our team that we work a lot on it. Keywords: 2D, Block, Through Pass, Agent, Dribble 1 Introduction The main goals of LegenDary project are both increasing our knowledge level in artificial intelligence and helping to improve this field of study in the world. For achieving these purposes we tried so hard in last few years and improved so well as it is described in continue. LegenDary team is competing for the first time in RoboCup 2012. The first implementation of team was based on UVA base source code [1] after a few competitions we were involved we decided to use agent 2d base source code [2] as code to work on due to the good implementation of low level layer and also by experience; it has been proven that it performs much better than UVA base. We've added our own AI methods to the code and made many changes in original code to have our own team strategies and make it more flexible and powerful than it was. The project's research focus is also concerned about developing cooperation models for soccer playing. Although most approaches to cooperation in multi-robot systems consider the control of individual robot behavior separately from the cooperative group behavior [3], we tried to have a good cooperation in our team between different agents. Any Multi-Agent cooperation is based on how the single agent adapts to the Multi-Agent System. If every element in the system can accommodate with the system, the system is steady [ 4]. Agent's action is done based on current world model state and zone and every decision is based on main goal of team in that state and agent's goal don't conflict each other. Therefore corporation will be possible. Our team's code consists of many different parts that are discussed in following sections. We've focused on passing, dribbling and defensive skills. Through pass and blocking system are powerful parts of our team strategy. In defensive part of team, we used both blocking system and positioning system together to have a strong defensive system and for advantage of using these abilities together we used an experiment against three different teams by using and not using blocking system. 2 Pass Passing is the most important skill in every team. A good passing system can make a good scoring position and also can clear the ball from the danger area. When a player can't make a better situation for himself, and the others have a better one, the pass function will be called. For this skill we inspire from MarliK[5]. We generally can classify the passing in some categories which are mentioned below. 2.1 Direct Pass A direct pass is a simple pass that its target is one of our teammate's exact positions. This skill will be used when our teammates are close enough. So when the target is far, the direct pass won't have enough accuracy and it won't arrive to the target. First of all the appropriate target will be chosen. In choosing a good target different factors will be considered and we will rate our targets. So the summation of them will be the final result of that pass rate. A pass rate will be calculated with the formula 1. Cn is the factors coefficient and En is the value of that factor in formula 1. Score = C1 * E1 + C2 * E2 + C3 * E3 + … . (1) After sorting targets by their rate, the best target will be chosen and the player will kick the ball with an appropriate angle and speed to that target. 2.2 Through Pass If there is no possibility to dribble or direct pass, through pass is used as a strategy to break the opponent's defense line. This skill is useful in offensive situations when passing and dribbling are not effective enough to make an attacking situation. To see if there is a possibility to pass, we use prediction system for different points around each player to find possible points for passing. The prediction system that we used is similar to Ball Interception Model in Bahia2D team [6].The algorithm for this process is shown in table 1. Table 1. A simplified algorithm for through pass While r < 5 Initialize canReachBall to false Initialize distancePoint with angle of t and radius of r Initialize targetPoint array and its members according to: targetPoint[i] ← teammate player position + distancePoint SORT targetPoint array from longest distance to shortest distance Repeat for every member of targetPoint array: Initialize the environment's current situations. Repeat for every teammate in offensive situation: Initialize r to 0 Initialize t to 35 While t>3 Until next member of targetPoint is not checked. Until next seen teammate is not checked and targetPoint is not reliable. RETURN kick the ball to this reliablePoint RETURN Call predict to see if teammate is first player who reach the ball and SET canReachBall. If canReachBall THEN SET r TO r+1 SET t TO t-1 For each point, prediction algorithm considers the possibility of getting the ball to the teammate. Different factors are used. We consider ball direction, ball speed and other parameters. These points are usually closest points to the goal with different angels and different distances from each player. To send more through pass and make better situations, it's better for teammates to be near the offside line. Therefore they can reach faster than other player to the ball. This method is implemented separately for each player who is in offensive situation and each player tries to keep a minimum distance to offside line. So more through passes happen. An example of through pass is shown bellow. Fig. 1. Player 7 makes a good through Pass to player 9 which is positioned near the offside line in order to reach the ball faster. 3 Dribble Dribbling is one of the most useful abilities of a team. We get the idea for this skill from ESKILAS [10]. Moving ball forward and keeping it away from the opponents is the main part of this skill. In the algorithm which we used, our main purpose is to reach the opponent's goal in predetermined ways as fast as possible. As a matter of fact paths which lead us closer to opponent's goal are in priority. When agent has the ball, this algorithm specifies which direction can place him in safer and better situation. This process will be done with aid of player's individual vision and information about teammates' and opponents' position in the last cycles and his position towards the opponent's goal. With this information the predetermined ways will be rated and the best way will be chosen. In our dribble skill, the dribble path is based on the predetermined paths (figure 2). So the player would rather to choose the path which is near by the main dribble path. And if he (or his chosen path) got blocked by the opponent(s), according to the position of the ball and the player itself, he decides to change the path or pass the ball to the safest teammate. If the player decides to change the path, the new path will be the nearest one to the main path and the furthest to the opponents, to keep the ball safe. Fig. 2. Predetermined Paths for Dribbling 4 Block and Defensive system Our Defensive system is divided into two parts. The first part is positioning. We realized that with an optimized formation system and a simple intercept action for the ball we can make base defense more powerful. Player's position is based on ball position in each cycle. We created our formation by fedit software that is available for agent2d base [7].The second part is blocking system. Block system is one of the most important and efficient way for defending. We inspire this skill from LEAKIN'DROPS [8]. For capturing the opponent's ball, the player can choose between two different ways. The first and simple way is forcing straight ahead to the ball's position and intercepts it. The other way is to predict the target of opponent and get to the position to block the player and intercept the ball. It seems to be more effective and faster, also this method saves the stamina. The second way is called "blocking system". As a matter of fact the first method is useless, because the opponent's position may change every moment and the player is not fixed. And the better way is forecasting the opponent's target and move through that direction to face the opponent. This method is better than the first one, because the player is not going to get dribbled and he saves time for other teammates to arrive to defense position. Our blocking algorithm calculates a point (which is the best) between the opponent's direction and our goal according to the information he receives from the servers, like position, velocity and direction of the ball. According to the calculations, if the chosen point wasn't too far to approach and the agent was not so weak on stamina, the blocking commands will be executed. Our blocking system is somehow dynamic and intelligent. Its decision changes according to the zone and opponent goal. We defined two ways to intercept the ball after standing in the proper block position. The player decides whether standing right there and waits for the opponent (with ball) to get close, or forcing the opponent and intercepts the ball. We made an experiment to test our blocking system. In this experiment, we use 3 teams in 3 level of attacking power, Oxsy [9], MarliK, Helios Base. We selected these teams according to average scored in RoboCup 2011. We run 10 games against each teams (5 with blocking system and 5 without blocking system). The results of these matches are mentioned in table 2. Table 2. Experiment's results Team Name Blocking System Condition M1 M2 M3 M4 M5 Total score Average Scored Oxsy MarliK Helios Base on off on off on off 4:2 1-2 0-0 1-0 1-0 1-0 20:0 3-0 2-0 6-0 6-0 3-0 4:1 0-0 2-0 0-0 1-0 1-1 15:0 3-0 3-0 4-0 2-0 3-0 1-6 0-6 1-4 0-3 1-4 3:23 2-3 6-3 6-3 3-4 4-6 21:19 0.8 4 0.8 3 0.6 4.2 opponent average score in RoboCup 2011 8.5 3.92 - As we see in the table, we can decrease the average against scored from 3.73 to 0.73 per match with blocking system. And this result shows that our blocking system is useful. 5 Future Work In this paper we described some parts of our team. We spent a lot of time to improve our team's way of playing in different situation. But we have to work more and more to achieve our goal which we mentioned in the introduction section and there are several problems which must be corrected and some bugs that need to be fixed. In the next phase of LegenDary project we are going to improve our team and make it more stable and realistic by using AI algorithms. References 1. UvA Trilearn 2003. http://www.science.uva.nl/jellekok/robocup/2003/ 2. agent2d source: http://sourceforge.jp/projects/rctools/ 3. Jung, D., Zelinsky, A.: An Architecture for Distribute Cooperative-Planning in A Behavior- Based Multi-Robot System n: Journal of Robotics & Autonomous Systems (RA&S), special issue on Field & Service Robotics. 4. Rongya Chen, Yiming Li, Hao Wang, Baofu Fang: HfutEngine2011 Simulation 2D Team Description Paper. In: RoboCup 2011 Symposium and Competitions, Turkey (2011) 5. Tavafi, A., Nozari, N., Vatani, R., Rad Yousefi, M., Rahmatinia, S., Pirdeyr, P.: MarliK 2011 Team Description Paper. In: RoboCup 2011 Symposium and Competitions, Turkey (2011) 6. Silva, B., Frias, d., Eloi, I., Grimaldo, J,. Simões, M.:Bahia2D 2010 Team Description Paper. In: RoboCup 2010 Symposium and Competitions, Singapore(2010) 7. Hidehisa Akiyama, Hiroki Shimora, Tomoharu Nakashima, Yosuke Narimoto, and Tomohiko Okayama. HELIOS2011 Team Description Paper. In: RoboCup 2011 Symposium and Competitions, Turkey (2011) 8. Tavafi, A., Nozari, N., Vatani, R., Rahmatinia, S.:LEAKIN'DROPS 2D 2010 Team Description Paper. In: IranOpen 2010 Symposium and Competitions, Iran(2010) 9. Marian, S., Luca, D., Sarac, B., Cotarlea O.: Oxsy 2011 Team Description Paper. In: RoboCup 2011 Symposium and Competitions, Turkey (2011) 10. Bakhtiari, M., Montazeri, M., Saharkhiz, S., Kaviani, P.: ESKILAS 2011 Team Description Paper. In: RoboCup 2011 Symposium and Competitions, Turkey (2011)
1001.5275
1
1001
2010-01-28T21:38:04
An Agent-Based Modeling for Pandemic Influenza in Egypt
[ "cs.MA", "cs.CY" ]
Pandemic influenza has great potential to cause large and rapid increases in deaths and serious illness. The objective of this paper is to develop an agent-based model to simulate the spread of pandemic influenza (novel H1N1) in Egypt. The proposed multi-agent model is based on the modeling of individuals' interactions in a space time context. The proposed model involves different types of parameters such as: social agent attributes, distribution of Egypt population, and patterns of agents' interactions. Analysis of modeling results leads to understanding the characteristics of the modeled pandemic, transmission patterns, and the conditions under which an outbreak might occur. In addition, the proposed model is used to measure the effectiveness of different control strategies to intervene the pandemic spread.
cs.MA
cs
An Agent-Based Modeling for Pandemic Influenza in Egypt Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy, Abdel-Badeeh M. Salem Faculty of Computer and Information Science Ain shams University Cairo, Egypt [email protected], [email protected], [email protected], [email protected] Abstract Pandemic influenza has great potential to cause large and rapid increases in deaths and serious illness. The objective of this paper is to develop an agent-based model to simulate the spread of pandemic influenza (novel H1N1) in Egypt. The proposed multi-agent model is based on the modeling of individuals' interactions in a space- time context. The proposed model involves different types of parameters such as: social agent attributes, distribution of Egypt population, and patterns of agents' interactions. Analysis of modeling results leads to understanding the characteristics of the modeled pandemic, transmission patterns, and the conditions under which an outbreak might occur. In addition, the proposed model is used to measure the effectiveness of different control strategies to intervene the pandemic spread. Keywords Pandemic Influenza, Epidemiology, Agent-Based Model, Biological Surveillance, Health Informatics. 1. Introduction The first major pandemic influenza H1N1 is recorded in 1918-1919, which killed 20-40 million people and is thought to be one of the most deadly pandemics in human history. In 1957, a H2N2 virus originated in China, quickly spread throughout the world and caused 1-4 million deaths world wide. In 1968, an H3N2 virus emerged in Hong Kong for which the fatalities were 1-4 million [16]. In recent years, novel H1N1 influenza has appeared. Novel H1N1 influenza is a swine-origin flue and is often called swine flue by the public media. The novel H1N1 outbreak began in Mexico, with evidence that there had been an ongoing epidemic for months before it was officially recognized as such. It is not known when the epidemic will occur or how sever it will be. Such an outbreak would cause a large number of people to fall ill and possibly die. In the absence of reliable pandemic detection systems, computer models and systems have become an important information tools for both policy-makers and the general public [15]. Computer models can help in providing a global insight of the infectious disease outbreaks' behavior by analyzing the spread of infectious diseases in a given population, with varied geographic and demographic features [12]. Computer models promise an improvement in representing and understanding the complex social structure as well as the heterogeneous patterns in the contact networks of real-world populations determining the transmission dynamics [4]. One of the most recent approaches of such sophisticated modeling is agent-based modeling [3]. Agent-based modeling of pandemics recreates the entire populations and their dynamics through incorporating social structures, heterogeneous connectivity patterns, and meta-population grouping at the scale of the single individual [3]. In this paper we propose a stochastic multi-agent model to mimic the daily person-to-person contact of people in a large scale community affected by a pandemic influenza in Egypt. The proposed model is used to: (i) assess the understanding of transmission dynamics of pandemic influenza, (ii) assess the potential range of consequences of pandemic influenza in Egypt, and (iii) assess the effectiveness of different pandemic control strategies on the spread of the pandemic. We adopt disease parameters and recommended control the strategies from WHO [16]. While, we use Egypt census data of 2006 [7] to create the population structure, and the distribution of social agent attributes. Section 2 reviews approaches: epidemiological modeling different mathematical modeling, cellular automata based modeling, and agent based modeling. While, section 3 reviews related multi-agent models in literature. Section 4 discusses the proposed model, and section 5 validates the proposed model. Section 6 discusses the pandemic control strategies and their effect on the spread of the pandemic. Section 7 presents the modeling experiments and analysis of results, and then we conclude in Section 8. 2. Epidemiological modeling approaches The search for an understanding of the behavior of infectious diseases spread has resulted in several attempts to model and predict the pattern of many different communicable diseases through a population [5]. The earliest account was carried out in 1927 by Kermack and McKendrick [9]. Kermack and McKendrick created a mathematical model named SIR (Susceptible-Infectious- Recovered) based on ordinary differential equations. Kermack and McKendrick started with the assumption that all members of the community are initially equally susceptible to the disease, and that a complete immunity is conferred after the infection. The population is divided into three distinct classes (see figure 1): the susceptible (S) healthy individuals who can catch the disease; the infectious (I) those who have the disease and can transmit it; and the recovered (R) individuals who have had the disease and are now immune to the infection (or removed from further propagation of the disease by some other means). Figure 1. SIR (Susceptible–Infectious– Recovered) Model Let ( )tS , and ( )tR be the number of susceptible, , ( )tI infected and recovered individuals, respectively, at time t, and N is the size of the fixed population, so we have: ( ) ( )tR ( ) + + = tSN tI Upon contact with an infected a susceptible individual contracts the disease with probabilityβ , at which time he immediately becomes (no infectious infected and incubation period); infectious recover at an individual rate γ per unit time. Based on mentioned assumptions; Kermack and McKendrick derived the classic epidemic SIR model as follows: dS (1) β−= SI dt dI dt dR = β − SI γ I (2) γ= I dt From equations (1) and (2), we found that SIR model is deterministic and doesn't study the nature of population vital dynamics (handling newborns and deaths). Following Kermack and McKendrick, other physicians contributed to modern mathematical epidemiology; extending SIR model with more classes and supporting vital dynamics such as: SEIR (Susceptible–Exposed– Infectious–Recovered), (Immunized– and MSEIR Susceptible–Exposed–Infectious–Recovered) models [9]. However, mathematical models had not taken into account spatial and temporal factors such as variable population structure, and dynamics of daily individuals' interactions which drive more realistic modeling results [1]. The second type of developed models is cellular incorporate spatial automata based models, which parameters to better reflect the heterogeneous environment found in nature [13]. Cellular automata based to using deterministic models are an alternative two-dimensional differential equations, which use a cellular automaton to model location specific characteristics of the susceptible population together with stochastic parameters which captures the probabilistic nature of disease transmission [2]. Typically a cellular automaton consists of a graph where each node is a cell. This graph is usually in the form of a two-dimensional lattice whose cells evolve according to a global update function applied uniformly over all the cells [13]. Cell state takes one of the SIR model states, and is calculated based on cell present state and the states of the cells in its interaction neighborhood. As the Cellular automata based model evolves, cells states will determine how the overall behavior of a complex system [2]. However, cellular automata based models neglect the social behavior and dynamics interactions among individuals in the modeled community. Therefore, cellular automata gave way to a new approach; Agent-based models. Agent-based models (ABM) are similar to cellular automata based models, but leverage extra tracking of the effect of the social interactions of individual entities [1]. Agent-based model consists of a population of agents, an environment, and set of rules managing agents' behavior [12]. Each agent has two components: a state and a step function. Agent state describes every agent attributes values at the current state. The step function creates a new state (usually stochastically) representing the agent attributes at the next time step. The great benefit of agent- based models that these models allow epidemiological researchers to do a preliminary "what-if" analysis with the purpose of assessing systems' behavior under various conditions and evaluating which alternative control strategies to adopt in order to fight epidemics [12]. 3. Multi-agent related models Related agent-based models are Perez-Dragicevi model, BIOWar, and EpiSims. Perez-Dragicevi [12] had developed a multi-agent model to simulate the spread of a communicable disease in an urban environment using measles outbreak in an urban environment as a case study. The model uses SEIR (Susceptible–Exposed–Infectious– Recovered) model and makes use of census data of Canada. The goal of this model is to depict the disease progression based on individuals' interactions through calculation of ratios of susceptible/infected in specific time frames and urban environments. BIOWar [10] is a computer model that combines computational models of social networks, communication media, and disease transmission with demographically resolved agent models, urban spatial models, weather models, and a diagnostic error model to produce a single integrated model of the impact of a bioterrorist attack on an urban area. BIOWar models the population of individual agents as they go about their lives. BIOWar allows the study of various attacks and containment policies as revealed through indicators such as medical phone calls, insurance claims, death rates, over-the counter pharmacy purchases, and hospital visit rates, among others. EpiSims [8] is an agent- based model, which combines realistic estimates of population mobility, based on census and land-use data of USA, with configurable parameters for modeling the progress of a disease. EpiSims involves a way to generate synthetic realistic social contact networks in a large urban region. However, the proposed agent-based model will differ from the above models for: (i) usage of census data of Egypt, (ii) proposed extension to SIR model, (iii) and studying the effect of different control strategies on the spread of the disease. This study is considered very important which incorporate Egypt population structure in modeling process. We have adopted Egypt census data of 2006 for creating realistic social contact networks such as home, work and school networks. While, the proposed extension to SIR model encompasses new classes; modeling the real pandemic behavior and control states such as (in contact, quarantined, not quarantined, dead, and immunized). In addition, we involve the study of the effect of different control strategies on the spread of the pandemic influenza. We plan in future work to integrate the proposed model with different simulation tools and models such as weather models, transportation models, and decision support models to build a complete system for pandemic management in Egypt. 4. Proposed model In what follows, we propose an extension to SIR model. Then we propose the multi-agent model based on the proposed extension of SIR model states. Finally, we validate the proposed multi-agent model by aligning with the classical SIR model. 4.1. Proposed extension to SIR model We propose an extension to SIR model by adding extra classes to represent more realistic agent states (see figure 2). In addition, we adopt stochastic approach to traverse among agent states using normal distribution. Agents are grouped based on the proposed extension to SIR model into nine classes. The first class is the (S) Susceptible agents, who are not in contact with infectious agents and are subject to be infected. At the start of the modeling, all agents fall in the (S) Susceptible class. The second class is the (C) in Contact agents, who are in direct contact with other infectious agents. The third class is the (E) Exposed agents, who are infected agents during the incubation time (latent) of the disease. The fourth class is the (I) Infectious agents, who are contagious. The fifth class is the (Q) Quarantined agents, who are infected agents quarantined by the health care authorities. The sixth class is the (NQ) Not Quarantined agents, who are infected agent but not quarantined. The seventh class is the (D) Dead agents. The eighth class is the (R) Recovered agents. The ninth class is the (M) Immunized agents, who are immunized against the disease infection. Figure 3 presents flow chart which explains in details the sequence of the state chart of the proposed extension to SIR model. All population members are born susceptible then may contact contagious agents (move into in-contact class). In-contact agents may acquire the infection (move into the exposed class) based on given distribution. Exposed agents remain non-contagious for given latent time. At the end of the latent time, agents will become contagious (move into the infectious class). Infected agents may ask for doctor help and thus become Figure 2. State chart of proposed extension to SIR model. (S) Susceptible, (C) in Contact, (E) Exposed, (I) Infectious, (Q) Quarantined, (NQ) Not Quarantined, (D) Dead, (R) Recovered, and (M) Immunized. Ind ivid ual is Sus cep tible No No No Is in co ntact with infectio us individual? Yes Individual is in-Co ntact Individual is infec ted by given probability? Yes Individual is Expos ed Has the expos ed period concluded? Individual is Infec tious Is ind ivid ual quarantined ? Yes Individual is Quarantined Yes No No Individual is Not Quarantined Is ind ividua l quarantined ? No Is individual dead by given probability? Is individua l recovered? Individual is Recovered Yes Yes Yes No No Is ind ividual dead ? Is individual immunized? Yes No Individual is Dead Yes Individual is Immunized Figure 3. Flow chart of the proposed extension to SIR model. quarantined by health care authorities (move into quarantined class), or ignore disease symptoms (move to non-quarantined class) based on given distribution. Non- quarantined agents are the main source of disease in this model. Non-quarantined agents may ask for doctor help and thus become quarantined, or die (move to dead class) based on given distribution. Quarantined agents may response to disease drugs and become recovered (move to recovered class) or die (move to dead class) based on given distribution. Recovered agents may become immunized (move to immunized class) based on given distribution, or become susceptible again. 4.2. Proposed multi-agent model The proposed multi-agent based model attempts to realistically represent the behavior of individuals' daily activities, and the natural biological process of the pandemic influenza spread among individuals as a result of individuals' interactions. Proposed agent-based model involves (i) population agents, (ii) agents' rules which govern the behavior of the agents, (iii) and the infection transmission patterns following the proposed extension to SIR model. Agents represent human population, in which each agent is involved in a sequence of daily basis activities according to the agent social type. These daily activities allows agents to interact themselves in groups or even travel and join other groups. The daily activities of working, travelling, and public gathering are modeled, while agents' states are calculated on discrete time steps during agent life time. Proposed multi-agent model has several parameters such as: simulation parameters, disease model parameters, agents' attributes, and population distribution based on census data. First: simulation parameters which include (i) number of days to be simulated, (ii) random seed for the gaussian random number generator, (iii) population size, (iv) and initial agents. Second: disease model parameters which include: (i) incubation time which is the average time of infected agent before being contagious, (ii) percentage of recovered infected agents after treatment, (iii) percentage of immunized agents after the recovery, (iv) percentage of dead agents, (v) average minimum and maximum time required to recover infected agent, and finally (vi) percentage of quarantined infected agents (see Table 1 for parameters default values). Third: agent attributes which are crucial for describing the nature of the pandemic and control the behavior of agent among time and space. Agent attributes includes: (i) health state (based on proposed extension to SIR Model states), (ii) social activities level (High, Moderate, Low), (iii) daily movement, (iv) spatial location, (v) infection time, (vi) social type (SPOUSE, PARENT, SIBLING, CHILD, OTHERFAMILY, COWORKER, GROUPMEMBER, NEIGHBOR, FRIEND, ADVISOR, SCHOOLMATE, OTHER), and (vii) agent social networks. Social activities level controls the number of daily contacts of the agent, which proportionally affect the number of in-contact agents interacting with the infected agent. Increasing number of in-contact agents adds more chance to the reproduction number to increase which means epidemic outbreak [4]. Reproduction number (R) can be defined as the average number of secondary agents infected by a primary agent case [16]. We have distributed number of daily infected cases based on the social activities level as following: Low: 2 agents, Moderate: 3 agents, and High 4 agents. Social type distribution is based on Egypt Census data of 2006 [7]. Egypt census data has classified population into five classes (see Table 2). The distribution of social types based on census data leads to different social network structure. All involved distributions are assumed to be Gaussian distribution with mean of 0 and standard deviation of 1. Distributions are subject to be replaced in future work according to the availability of more information about Egypt population. At the beginning of the system startup, configurations are loaded and user is required to set up initial agents. The simulation runs in a loop for a pre-specified number of days. When the simulation starts, the first step is to create the initial agents instances. Next, agents start practicing their natural daily activities. During each day, every member of the agent community moves around, and communicates with their social network agents or with public agents. See figure 4 for the spatial representation of agents moving and contacting each other, and their health states represented with different icons. Daily moved distance by agents and the number of contacted agents are randomly determined by each agent attributes. During the day activities, simulation keeps track of the social networks of each agent which can be at work, home, or school. Table 1: Default values of model parameters Parameter Default Value 50 Number of simulated days 0 Random Seed 72798031* Population Size Agents Initial agents 2 days** Incubation Time (latent) 0.95** Percentage of immunized agents 0.9** Percentage of recovered agents 0.14** Percentage of dead agents 5 day*s* Min. time to be recovered 14 days** Max. time to be recovered Percentage of quarantined agents 0.1 * Egypt census data of 2006 [7]. ** WHO [16] values for novel H1N1 pandemic. Selection of contact agents is random and most likely results in contacting new agents who are created at runtime. Newly created agents are initially susceptible, and are placed randomly across the landscape. Agent social types are drawn from normal distribution based on the population structure of census data of Egypt 2006. Agent health state and disease clock are changed according to the proposed extension to SIR model. Infected agent will affect all agents in his social networks to be exposed. Thus, probability of agent to be infected increases according to the number of infected agents in his social networks. 5. Proposed model validation It is often very difficult to validate epidemiological simulation models due to the lack of reliable field data, and the lack of real geographical location of the individual cases occurred. We have to validate the proposed multi- agent model against other available models that have been validated such as SIR model [14]. SIR Model has a long history and has proved to be a plausible model for real epidemics. The proposed model should be aligned with Table 2. Age distribution of Egypt Age (years) Percentage Possible social types SIBLING, CHILD, OTHER 10.60 % < 4 SIBLING, CHILD, OTHERFAMILY, COWORKER, GROUPMEMBER, NEIGHBOR, 05–14 21.10 % FRIEND, SCHOOLMATE, OTHER SPOUSE, PARENT, SIBLING, OTHERFAMILY, COWORKER, GROUPMEMBER, NEIGHBOR, FRIEND, ADVISOR, SCHOOLMATE, OTHER SPOUSE, PARENT, SIBLING, OTHERFAMILY, COWORKER, GROUPMEMBER, NEIGHBOR, FRIEND, ADVISOR, OTHER SPOUSE, PARENT, SIBLING, OTHERFAMILY, GROUPMEMBER, NEIGHBOR, FRIEND, OTHER 49.85 % 15–44 45–59 12.36 % > 59 6.08 % Figure 4. Snapshot displays agents with different health states moving and contacting each others. the SIR model at least for some simplified scenarios. In order to align the proposed model to SIR model, we have evaluated SIR model using Mathematica [11] based on given parameters (basic reproduction number R0 =3, duration of Infection = 9.5, initially immunized = 0, initially infected = 0.01% - see Figure 5) and we have evaluated the same model parameters in the proposed multi-agent model (see Figure 6). Two graphs are not a perfect match, but the proposed multi-agent model graph match the general behavior of SIR model graph. Two graphs differ by the magnitude and the smoothness of the curves. The source of difference of curves behavior is confined in the following factors: (i) the heterogeneous structure of the population, (ii) different reproduction numbers which are calculated for each agent independently, (iii) and the usage of random variable for infection time instead of deterministic values in SIR model. Figure 5. Mathematica SIR Model. Parameters: R0=3, Duration of Infection=9.5, initially immunized = 0, initially infected = 0.01%. population with deployed 50% of vaccination control strategy, (iv) population with deployed 50% of social distancing control strategy, and (v) population with deployed 50% of quarantining control strategy. We display susceptible, infectious and removed curves of each scenario to be compared with each other. In the first scenario with no deployed control strategies, we have found that epidemic has a steep infection curve which reaches its peak (608 infected agents – 60.8% of the population is infected) on day 10 (see figure 7). At the end of the simulation, we have analyzed the distribution of health states among social types. Mortality rate is high among schoolmates, neighbors, and advisors. Numbers of immunized agents are close for schoolmates, and parents, while equals zero with child agents (see figure 8). Figure 7. Scenario 1: pandem ic peak is at day 10. Figure 8. Scenario 1: distribution of health states to social types. We have a pandemic peak at day 10. Thus, we choose to apply control strategies from day 8 to day 12 in the rest of the scenarios to study the effect of the control strategy on the pandemic peak. In the second scenario, we found that the number of infected agents is reduced during the deployment period of increase awareness control strategy to reach it is minimum value of 67 infected agents (6.7 % of the population) at day 12 (see figure 9.a). This is Figure 6. Proposed multi-agent model. Parameters: 3 infected agents – Population Size: 300 agents – Duration: 50 days. 6. Pandemic control strategies Control strategies are useful for the development of an action plan to control disease outbreak. Controlling outbreak is related to the peak of infectious and the time required reaching the peak. Time required reaching the peak is helpful for giving time for different control strategies to be effective. Without a properly planned strategy, the pandemic chaos might be disastrous causing large-scale fatalities and substantial economic damage. A proven control strategy would incorporate increasing awareness of population, vaccination, social distancing, and quarantining decisions [16] [6]. The proposed multi- agent model permits injection of control strategies to study different scenarios for controlling the outbreak. User can determine control strategies and the coverage percentage applied to the population. Control strategies will affect the agent health states, and the agent daily activities. Increasing awareness will increase the number of doctors' visit and the number of quarantined infected agents. Vaccination moves susceptible and in-contact agents to be immunized. Social distancing and quarantining reduce the number of possible contacts among individual agents. In experiments we will run different scenarios of applied control strategies. 7. Experiments and analysis of results The proposed multi-agent model was programmed using Java programming language and run on AMD Athlon 64 X2 Dual 2.01 GHz processor with 1GB memory. To demonstrate the model behavior, we have run five scenarios of pandemic in a closed influenza population of 1000 agents, and initially three infected agents. Each run takes about eight minutes to be completed. Simulated scenarios are: (i) population with no deployed control strategies, (ii) population with deployed increasing awareness control strategy, (iii) 50% of because agents are asking for doctor help when they have influenza symptoms. a. b. c. d. Figure 9. a: Scenario 2, b: Scenario 3, c: Scenario 4, d: Scenario 5. In the third scenario, we found that the number of infected agents is reduced to 320 agents (32% of the population) at day 9 (see figure 9.b). In the fourth and the fifth scenarios, we found that the number of infected agents is increased to 614 (61.4% of the population) at day 10 (see figure 9.c - d). This means that there are control strategies which not affect the pandemic spread when applied on given outbreak duration such as: social distancing and quarantining through the outbreak peak. Finally, we conclude that the aggregate attack rate is exponentially increasing without any deployed control strategies. Attack rate is controlled by different factors such as: the daily travelling distance of agents, and the percentage of vaccinated agents. As a result, proper combination of deployed control strategies can be effective to decrease the pandemic damage. 8. Conclusion The field of computational epidemiology has arisen as a new branch of epidemiology to understand epidemic transmission patterns, and to help in planning precautionary measure. For this reason a spatially explicit agent-based epidemiologic model of pandemic contagious disease is proposed in this paper. The methodology for this paper involves the development of a multi-agent model of pandemic influenza in Egypt. The proposed model simulates stochastic propagation of pandemic influenza outbreaks, and the impact of the decisions made by the healthcare authorities in population with millions of agents. We have proposed extension to SIR model, in which we have investigated the agent attributes. The model can be easily customized to study the pandemic spread of any other communicable disease by simply adjusting the model parameters. We have simulated the spread of novel H1N1 pandemic in Egypt. Experiments are run in a closed population of 1000 agents, and initially 3 infected agents. Modeled novel H1N1 reaches infection peak (608 agents) with in 10 days without deployment of control strategies. Number of dead agents reaches its peak at the end of the simulation with mortality of 658 dead agents. Deployment of proper combination of control strategies can limit the pandemic chaos and reduce the fatalities and substantial economic damage. Further work on proposed model includes: agents with additional attributes that allow a better realistic model (e.g., ages, gender, etc), as well as finding optimal combination of control strategies to manage the pandemic outbreak waves. 9. References [1] Bonabeau, Eric. Agent-based modeling: methods and techniques for simulating human systems. Proc. National Academy of Sciences 99(3): 7280-7287, 2002. [2] Ching Fu S, Milne G. Epidemic Modeling Using Cellular Automata. Proceedings of the ACAL2003: The First Australian Conference on Artificial Life; Canberra, Australia, 2003. [3] Chowell, G., Hyman, J.M., Eubank, S., Castillo-Chavez, C. Scaling laws for the movement of people between locations in a large city. Phys. Rev. E 68, 066102, 2003. [4] Colizza V, Barrat A, Barthélemy M, Vespignani A. The modeling of global epidemics: stochastic dynamics and predictability. Bull Math Biol, 68:1893-1921, 2006. [5] Daley, D. J. & Gani, J. Epidemic Modeling and Introduction. NY: Cambridge University Press, 2005. [6] d'Onofrio A, Manfredi P, Salinelli E. Vaccinating behavior, information, and the dynamics of SIR vaccine preventable diseases. Th. Pop. Biol.: 301–17, 2007. [7] Egypt Census Data of 2006, http://www.capmas.gov.eg/. [8] Eubank, H. Guclu, M. V. Marathe et al. Modeling disease outbreaks in realistic urban social networks. Nature, vol. 429, no. 6988, pp. 180--184, May 2004. [9] Hethcote. The Mathematics of Infectious Diseases. SIAM Review. 42(4):599–653, 2000. [10] K. M. Carley, D. B. Fridsma, E. Casman et al. Biowar: Scalable agent-based model of bioattacks. IEEE Transactions on Systems, Man, and Cybernetics, Part A, vol. 36, no. 2, pp. 252--265, 2006. [11] Mathematica: http://www.wolfram.com/. [12] Perez, L., Dragicevic, S. An agent-based approach for modeling dynamics of contagious disease spread. International Journal of Health Geographics, 8:50, 2009. [13] Quan-Xing Liu, Zhen Jin and Mao-Xing Liu. Spatial organization and evolution period of the epidemic model using cellular automata. Phys. Rev. E. (74) 031110, 2006. [14] Skvortsov, R..B. Connell, P. Dawson, R. Gailis. Epidemic Modeling: Validation of Agent-based Simulation by Using Simple Mathematical Models. Proceedings of Land Warfare Conference, pp 221-227, 2007. [15] Toomas Timpka, Henrik Eriksson, Elin A Gursky, James M Nyce, Magnus Morin, Johan Jenvald, Magnus Strömgren, Einar Holm & Joakim Ekberg. Population- based simulations of influenza pandemics: validity and significance for public health policy. Bull World Health Organ.vol.87, n.4, pp. 305-311. ISSN 0042-9686, 2009. [16] World Health Organization, http://www.who.int/en/.
1805.10906
1
1805
2018-05-28T13:15:52
Tangramob: an agent-based simulation framework for validating urban smart mobility solutions
[ "cs.MA" ]
Estimating the effects of introducing a range of smart mobility solutions within an urban area is a crucial concern in urban planning. The lack of a Decision Support System (DSS) for the assessment of mobility initiatives, forces local public authorities and mobility service providers to base their decisions on guidelines derived from common heuristics and best practices. These approaches can help planners in shaping mobility solutions, but given the high number of variables to consider the effects are not guaranteed. Therefore, a solution conceived respecting the available guidelines can result in a failure in a different context. In particular, difficult aspects to consider are the interactions between different mobility services available in a given urban area, and the acceptance of a given mobility initiative by the inhabitants of the area. In order to fill this gap, we introduce Tangramob, an agent-based simulation framework capable of assessing the impacts of a Smart Mobility Initiative (SMI) within an urban area of interest. Tangramob simulates how urban traffic is expected to evolve as citizens start experiencing the newly offered traveling solutions. This allows decision makers to evaluate the efficacy of their initiatives taking into account the current urban system. In this paper we provide an overview of the simulation framework along with its design. To show the potential of Tangramob, 3 mobility initiatives are simulated and compared on the same scenario. This shows how it is possible to perform comparative experiments so as to align mobility initiatives to the user goals.
cs.MA
cs
INTERNAL VERSION FOR ARXIV.ORG 1 Tangramob: an agent-based simulation framework for validating urban smart mobility solutions Carlo Castagnari, Flavio Corradini, Francesco De Angelis, Jacopo de Berardinis, Giorgio Forcina, Andrea Polini School of Science and Tecnology, University of Camerino, via Madonna delle Carceri 9, Camerino MC, Italy 8 1 0 2 y a M 8 2 ] A M . s c [ 1 v 6 0 9 0 1 . 5 0 8 1 : v i X r a Abstract-Estimating the effects of introducing a range of smart mobility solutions within an urban area is a crucial concern in urban planning. The lack of a Decision Support System (DSS) for the assessment of mobility initiatives, forces local public authorities and mobility service providers to base their decisions on guidelines derived from common heuristics and best practices. These approaches can help planners in shaping mobility solutions, but given the high number of variables to consider the effects are not guaranteed. Therefore, a solution conceived respecting the available guidelines can result in a failure in a different context. In particular, difficult aspects to consider are the interactions between different mobility services available in a given urban area, and the acceptance of a given mobility initiative by the inhabitants of the area. In order to fill this gap, we introduce Tangramob, an agent- based simulation framework capable of assessing the impacts of a Smart Mobility Initiative (SMI) within an urban area of interest. Tangramob simulates how urban traffic is expected to evolve as citizens start experiencing the newly offered traveling solutions. This allows decision makers to evaluate the efficacy of their initiatives taking into account the current urban system. In this paper we provide an overview of the simulation framework along with its design. To show the potential of Tangramob, 3 mobility initiatives are simulated and compared on the same scenario. This shows how it is possible to perform comparative experiments so as to align mobility initiatives to the user goals. Index Terms-Smart City, Smart Mobility, Agent-Based Traffic Simulations, Reinforcement Learning, Smart Urban Planning I. INTRODUCTION According to the United Nations [1], in 2016, world's population was 7.4 billions inhabitants and about 54.5% of them lived in urban areas. Despite all the benefits histori- cally brought by urbanization, like poverty reduction, longer life expectancy and economic wealth, such an uncontrolled demographic growth is pushing cities to deal with several management problems. In particular, focusing on urban mo- bility, infrastructures are close to saturation and this comes with a bunch of problems like car dependence, spatial footprint, traffic congestion, air and noise pollution. Novel smart mobility solutions need to be introduced, and investments have to be carefully assessed in relation to their effective potential to improve the mobility ecosystem. transport Novel mobility initiatives are generally shaped, and their adoption assessed, considering common guidelines and best practices. Nevertheless it is not seldom the case that the ob- served effects, after the concrete deployment of a solution, are not satisfactory. In particular, there are two complex aspects Manuscript under revision. Corresponding author: F. De Angelis ([email protected]). that are difficult to assess when following such approaches to planning. The first one relates to how the new mobility solution will interact with the already available ones, whereas the second one relates to citizens acceptance. Indeed as many articles report ([2, 3, 4, 5, 6, 7, 8]), there are many cases in which the adoption of a smart mobility initiative did not bring the expected benefits. In particular, many real scenarios from Europe ([5, 7, 2]), China ([6]) and U.S.A ([3, 4, 8]) demonstrated how proposed smart mobility services failed, since they were not accepted by communities. As argued by [2], the carsharing failure in London is attributed to a bad service configuration. Similarly, [3, 4, 5] argue how initially promising bikesharing solutions for the city of Salerno (IT) and Seattle (USA) have not been adopted by the population. The lack of a formal way to estimate the impacts of a range of smart mobility services and their interactions is also reported in [9] and [10], remarking both the importance, and the actual absence of a "common framework" for this purpose. Indeed, decision makers are in urgent need of innovative approaches providing quantitative forecasts in relation to the different aspects connected with the introduction of a novel mobility initiative. Resulting Decision Support Systems (DSS) will complement already available approaches in the definition and shaping of the smart mobility solution to adopt. This considerations motivated us in developing a novel DSS named Tangramob. This is an agent-based simulation framework capable of assessing the impacts of the intro- duction of a novel smart mobility initiative (i.e. a range of either homogeneous or heterogeneous smart mobility services) within an urban area of interest taking into account the current mobility ecosystem, as well as salient features of citizens in relation to the usage of mobility services. Indeed, agent-based approaches are considered effective for searching a solution within huge state spaces when the domain to represent can be easily conceived as a composition of heterogeneous entities interacting in a distributed setting [11, 12]. This is certainly the case of a mobility ecosystem in which many different entities can be identified, each one with its specific characteristics (e.g. commuters, transport means, roads, etc.), and the system behaviour and its features emerge from the interactions among such entities. Tangramob will simulate one day of mobility starting from a description of the population of interest and of the mobility resources available in the considered area, including the ones related to the initiative to evaluate. The day will be simulated many times over many iterations to derive a final configuration and the corresponding output. The iterations are needed since learning mechanisms are applied in INTERNAL VERSION FOR ARXIV.ORG 2 Tangramob to let commuter agents try out the different avail- able mobility solutions. After each iteration each commuter will provide a score for the travel experience according to its own profile, and taking into account quantitative parameters, such as travel times. In this way, a commuter agent will learn which are the transportation solutions that better fit its profile. Notably, the possibility to change transportation means in relation to the different segments of a travel allows intermodality and multimodality within a simulation. Clearly, the more the provided data input are effectively representative of the reality of interest, the more the returned data set will approximate the possible effects introduced by the mobility solution under evaluation. From the output data it will be possible to derive quantitative analysis in relation to changes in emissions, costs etc, as detailed in the following sections. Summarizing, Tangramob is a DSS that helps decision makers in planning SMIs. The DSS is distinguishable from other proposals in relation to two main aspects: (i) it supports the simulation of intermodal and multimodal transport ser- vices; and (ii) it makes it possible to reflect the diversities of commuters with respect to their personal characteristics (e.g. gender, age, travel demand). The simulator is built over MATSim, a powerful traffic simulator [13]. Tangramob is aimed at all people involved in defining and planning new mobility services: urban planners, who are in charge of improving urban mobility; transport com- panies, which need to ponder their investments; researchers, aiming at testing and validating new mobility solutions. The rest of the paper is organized as follows: Section II outlines the idea behind the Tangramob simulator and how it is expected to address the research problem. In section III we provide an overview of the agent-based model of Tangramob and section IV describes its architecture. Finally, section V proves the effectiveness and the potentialities of Tangramob by reporting an example of use. Section VI shows the current attempts in supporting urban planners and mobility service providers in urban mobility planning. and section VII reports some conclusions and opportunities for future work. II. THE TANGRAMOB SIMULATOR Tangramob is an agent-based simulation framework that intends to support public and private decision makers in the task of shaping smart mobility initiatives for a specific urban area of interest. It can be considered as a Decision Support System (DSS) for smart mobility validation, focusing on the ability to capture and reproduce the mobility behaviour of each single commuter belonging to the selected sample population. For this purpose, Tangramob is organized as a simulation environment that the urban planner can easily use in order to understand if introducing a smart mobility initiative, i.e. a collection of mobility services, can improve the traveling experience of citizens as well as the performance of the urban transport system. Since the simulator is based on an Agent-Based Model (ABM), for each person in the sample population, represented as an autonomous reasoning agent, we can observe whether or not it will make use of the new mobility services. These fine-grained results also provide users with a measure concerning the expected adoption rate of the simulated mobility initiative, so as to figure out beforehand if the initiative can potentially succeed or not. Technically, a Tangramob simulation requires four inputs: • the urban road network of the area under study, • a representative population of the area with the mobility agendas of people. An agenda summarizes what a person does during an ordinary working day (i.e. activities) and how he moves from one place to the next one (i.e. legs). • the description of the mobility services already offered by the city: public transport timetable, etc.; • the smart mobility initiative to evaluate, that is a list of geographically located containers (called tangrhubs) of one or more smart mobility services. Each smart mobility service belongs to a tangrhub and it comes with a number of mobility resources (e.g. vehicles), as well as a service charge (i.e. cost per km and cost per hour). It is worth mentioning that the definition of an agent popula- tion is certainly the most complex and critical information to supply, in particular in relation to profiles, and details on daily travels. Obviously, the more the population is representative of the reality of interest the more the results of the simulation can be considered a good approximation. Strategies for the derivation of a population are out of scope for this paper, nevertheless different sources are available to define a repre- sentative synthetic population. Relevant data can be certainly collected from periodic census or questionnaires distributed to a sample population. Particularly effective nowadays is Mobile Crowd Sensing (MCS) [14] that uses mobile apps developed for large scale sensing, and involve the contribution from a crowd of people that behave as probes of the dynamics of the mobility in the city [15]. GPS data produced by the crowd are an excellent source of planning and transport information, and they are widely used in mobility project (e.g., the community based GPS navigator Waze (www.waze.com) that tracks users to understand roadway congestion). Activity recognition of travel demand models can also be derived using Input-Output Hidden Markov Models (IOHMMs) to infer travelers' activity patterns from call detail records as suggested in [16]. Starting from the provided information, the execution of Tangramob can be thought of as performing a comparative experiment. The experiment consists in introducing the smart mobility initiative (i.e. applying the treatment) into the urban area of interest (i.e. the treated system) while observing the same reality as it is today, namely with no smart mobility initiative (i.e. control system). In the end, we can observe how these systems differ with respect to the following measures: • travel distance, expressed in metres and referred to the distance traveled by each commuter; • travel time, expressed in seconds and referred to the time spent traveling for each commuter; • CO2 emissions, expressed in grams and referred to the quantity of CO2 produced by each commuter according to the used means of transport; • cost of mobility, expressed in euros and referred to the cost of mobility for each commuter; • urban traffic levels, expressed as the number of traveling INTERNAL VERSION FOR ARXIV.ORG 3 vehicles on each road at a given moment in time band. This statistic is a picture of the road infrastructure under study and it is useful when one needs to understand which are the most congested roads within a time slot. Such a comparison would allow the user to understand if the proposed mobility initiative is in line with their expectations. In case they are not satisfied with the achieved results, the user can change the configuration of the mobility initiative (e.g. relocating tangrhubs, adding/removing one or more tangrhubs, modifying the parameters of a mobility service and so forth) in order to repeat the experiment as before. A. The tangrhub In Tangramob, the actual placement of smart mobility services within the urban area under study is made possible by tangrhubs. A tangrhub can be defined as a geo-located entity providing citizens with one or more mobility services. A tangrhub collects one or more smart mobility services, each of which is offered by either private or public providers. For instance, a carsharing service provided by two different com- panies, results in two different characterizations of resources and their usage deployed within the tangrhubs of interest. Considering the typical urban conformation, such a flexible and modular abstraction allows urban planners to represent all the existing transport facilities like railway stations, bus stops and so forth, and to introduce intermodality among the mobility services. Indeed, a bus stop could be represented as a tangrhub where only the bus service is available. Examples of smart mobility services that the user can add to a tangrhub are: dynamic public transport, shared transport services (e.g. carsharing, bikesharing), dynamic ridesharing, autonomous taxis and so forth [17]. However, each smart mobility service mi provided by a tangrhub th j must belong to only one of the following service types: • intra-hub services, used for moving people to and from th j thereby serving first mile trips, e.g. from a commuter's home-place (departure) to th j, as well as last mile trips, e.g. from th j to a commuter's workplace (destination). • inter-hub services, for moving commuters from th j to another tangrhub thk supporting the service type of mi. From the simulator's perspective, we can think of a tan- grhub as an entity with which people interact every time they need to travel. As a result of such interactions, tangrhubs are expected to collaborate with each other in order to provide commuters with a list of valid traveling solutions. Thus, it is up to each person to evaluate and choose the most suitable solution according to their own needs and preferences. B. Smart Mobility Initiative (SMI) According to the concept of tangrhub seen before, shaping a Smart Mobility Initiative (SMI) is about placing a number of tangrhubs within the urban area of interest, adding one or more smart mobility services to each of them, and providing a specific characterization for the added mobility services. Thus, it is up to the user (e.g. an urban planner) to design a list of candidate SMIs according to the goals and the available financial resources of his local authority. To define a smart mobility service for a tangrhub, such as carsharing, the user has to specify the service type (i.e. intra-hub or inter-hub), the initial number of vehicles and the service charge (i.e. cost per km, per hour, and fixed), the CO2 footprint, and other parameters depending of the type of vehicles. Therefore, in Tangramob, a mobility service provided by an organization is represented as a whole as the sum of all the services made available by the same organization within the selected tangrhubs. It is worth noticing that the cost of a mobility service does not need to correspond to a real currency. In fact, we can consider cost in terms of "points" since such an approach fits the idea of mobility as a service [18, 19]. These cost-related parameters are expected to affect the mobility decisions of commuters. More precisely, commuters are more inclined to choose the most convenient services, i.e. the ones with the greatest efficiency/cost trade-off. Thus, leveraging the cost of mobility services allows urban planners to achieve a mobility policy, thereby promoting some services against others. For instance, a cheap bikesharing service would hopefully be more preferable for commuters than an expensive carsharing service in case of short trips. C. Tangramob commuting patterns Fig. 1: 3-trip path Fig. 2: 2-trip path I Fig. 3: 2-trip path II Fig. 4: Direct path As new mobility opportunities are introduced, commuters are expected to change their daily commuting patterns. A commuting pattern is the intermodal representation of how a person moves from one place to another. Such a trip can be either simple (e.g. by car) or more complex (e.g. by a combination of travel modes). A clear example of a commuting pattern is a route provided by Google Maps. In Tangramob, the complexity of commuting patterns can be limited thanks to the direct interconnection of tangrhubs via their inter-hub mobility services. Commuters are never offered with traveling solutions made up of more than three sub-trips. Letting T Ho, T Hd be tangrhubs respectively close to origin o and destination d of a trip, we can group all the possible commuting patterns in four classes. In the first class (Figure 1) a person p is expected to reach T Ho either by walk or using an intra-hub mobility service provided by the same tangrhub; once arrived at T Ho, an inter-hub mobility service will bring p at T Hd; finally, the commuter will be able to reach his destination d either by walk or using an intra-hub mobility service offered by T Hd. Analogously, the second and the third classes (Figures 2 and 3) represent a combination of two modal trips performed either by intra-hub services or by personal traveling modes. Finally, the last class (Figures 4) corresponds either to a direct trip (e.g. by car, bike, walk), or to the case a single inter-hub service is used. INTERNAL VERSION FOR ARXIV.ORG 4 III. TANGRAMOB AGENT-BASED MODEL OVERVIEW Starting from the idea of Tangramob, we present the Agent- Based Model (ABM) on which it is conceived. The Tangramob ABM is composed of two agent types: commuter and tan- grhub. A commuter agent is the computational representation of a single person that is part of the sample population under study. Every commuter agent comes with some relevant personal characteristics, like gender and age, affecting the outcomes of the actions taken during the simulation. These effects also impact on the behavior of commuters. For instance, an elderly person will be less prone to travel by bicycle for long trips, since this would take too long for him. More importantly, every commuter has a personal mobility agenda, i.e. a sequence of daily activities (e.g. home, work, etc.) interleaved by mobility segments that tells how the agent manages to get from one activity location to the next one. On the other hand, a tangrhub agent can be defined as a local mobility service provider with the ability to improve its services as the simulation iterates; in the real-world, this active behaviour might corresponds to a daily enhancement. Both agents live and operate, albeit with different per- ceptions, in a composite environment that is made of three different spaces: the temporal space, the geographical space and the smart mobility services' state space. Specifically, the temporal space reflects the passage of time in seconds. The ge- ographical space can be defined as the directed weighted graph resulting from the road network infrastructure of the urban area under study; in particular, nodes represent intersections and edges denote streets. Such a space is the actual core of the transport simulation, since the physical limitations of the road infrastructure can create bottlenecks and delays as people move with a certain pace. Finally, the last sub-environment is meant to represent the status of all the smart mobility services which are currently provided by tangrhubs. This space can be conceived as a tuple space in which the status of each mobility service breaks down into a number of smaller sub-states. For instance, the status of a carsharing service can be expressed as the combination of the states of all its vehicles. This complex environment allows agents to perform actions that can eventually alter the state of affairs of one or more sub-environments. In particular, as depicted in Figure 5, every time a commuter needs to move from one place to another, an interaction with the surrounding tangrhubs takes place. During this interaction, a smart mobility negotiation occurs: the tangrhubs collaborate with each other in order to provide the commuter with a number of traveling alternatives. A traveling alternative can be thought of as a combination of one or more (up to three) mobility segments, each of which can involve a smart mobility service and it is based on the Tangramob commuting patterns seen in section II-C. Next, the commuter agent will perform a decision-making process so as to select the traveling alternative that is expected to maximize his performance criteria. The alternative selection process is organized as follows: first, every single travelling alternative is evaluated according to the expected performance of each segment it is made of; is introduced to influence such preference- then, the cost ordered rank; finally, a travelling alternative is selected and then simulated. Once the commuter agent has reached his final destination, he is expected to assign a score to every single commuted mobility segment to record its traveling experience so as to make more informed decisions for the next iterations. As soon as a traveling alternative is chosen, the involved tangrhubs will reserve the required mobility services so that the commuter can start his journey. Finally, once the commuter has reached his destination, he will be asked to leave a feedback for each smart mobility service used. Fig. 5: Commuter-Tangrhub interaction loop The behaviour of a commuter revolves around four actions: (i) synchronizing his mobility agenda with the closest tan- grhubs, to obtain a list of traveling alternatives for reaching the location of the forthcoming activity; (ii) choosing a traveling alternative out of the proposed ones; (iii) performing the chosen traveling alternative; and finally (iv) leaving as many feedback as the number of mobility services used in the course of the day. A commuter will then try to maximize his/her traveling experience minimizing travel time, covered distance, emissions and the cost of mobility. More precisely, this is done by selecting the traveling alternative that is expected to optimize such criteria from time to time. On the other hand, the tangrhub agent has the following two goals: to maximize the traveling experience of commuters and minimize the number of mobility resources for each service. Thus, in order to achieve these objectives, a tangrhub can perform the following actions: (i) building a list of traveling alternatives in collaboration with other tangrhubs, (ii) provide a commuter with a list of valid traveling alternatives, (iii) update the status of its own mobility services, (iv) improve and optimize its own mobility services. The tangrhub's service adaptation process is made possible by commuters feedback. In particular, each feedback qualifies the traveling experience of a commuter using a specific mo- bility service. Collecting and averaging all the feedback of a mobility service can give a metric concerning the performance of that service, thereby contributing to its improvement and optimization. For instance, if all the daily-collected carsharing feedback are negative, a tangrhub would have a valid indicator of such an inefficiency to run for cover. Therefore, the purpose of a feedback is twofold: on one hand, it pushes the commuter agent to reason about the quality of the mobility services to make more informed decisions for the next iterations; on the INTERNAL VERSION FOR ARXIV.ORG 5 other hand, it enables tangrhubs to align to the actual mobility needs of the population. Tangramob simulations are thus iterative: each iteration corresponds to a typical day in which commuters experiment with the introduced smart mobility services in order to record their performance, while tangrhubs can improve their services iteration by iteration. This time-evolving behaviour, driven by feedback, enables commuters to make more informed deci- sions every time they are offered a list of traveling alternatives. Therefore, commuters are modeled as proactive agents since there is need of an iteration-persistent memory structure, i.e. a knowledge base, to implement such an experience-based learning capability. With that idea, the decision-making pro- cess of commuters exploits their personal knowledge base in order to evaluate the expected score of a traveling alternative, thanks to the experience accumulated from past iterations. This is achieved by updating the knowledge base, by means of a Hebbian-like learning function. This will permit to grad- ually accumulate scores so as to let the commuter maturate an experience-based perception for every segment. Similarly, tangrhubs are modeled as self-adaptive agents which can use different strategies and optimization methodologies to enable their travel improving behavior at the end of each iteration and by means of feedbacks. IV. DESIGN & IMPLEMENTATION OVERVIEW Considering the Tangramob agent-based nature, the frame- work has been developed on an already validated and robust agent-based traffic simulator named MATSim [13] (Multi Agent Transport Simulation). Such a design choice is due to the fact that it is possible to represent the characterizations and the behaviors of both our agent types in MATSim. Moreover, such a simulator can be adapted to support all the sub- environments of the model, allowing Tangramob to evaluate the performance criteria as outcomes from the interactions among such spaces and agents. A. Multi Agent Transport Simulation: MATSim MATSim [13] is an activity-based multi-agent simulation framework for implementing large-scale agent-based transport scenarios. It is an open-source project implemented in Java under the GNU public license. As in Figure 6, the framework consists of several modules which can be combined, used standalone, or replaced by own implementations. Fig. 6: MATSim modules MATSim is designed to model a single day and it is based on a co-evolutionary approach in order to reproduce real-life scenarios. Every agent repeatedly optimizes its daily activity schedule while in competition for space-time slots with all other agents on the transportation infrastructure. This optimization follows an iterative process and it is based on different choice dimensions such as route selection, time choice and mode choice. A MATSim run consists of a number of iterations in which the steps in Figure 6 are repeated in a cyclical manner. The initial demand arises from the study of the area to simulate, and it comprehends its topology (i.e. the network), the mobility habits of its inhabitants and their per- sonal features. Every citizen possesses a memory containing a fixed number of daily plans, each of which is composed of a daily activity chain and an associated score, i.e. the utility of that plan. Once the features of the scenario's components are acquired, and before the MATSim mobility simulation, every agent selects a plan from its memory according to the score associated with each of them: higher score plans are more likely to be selected. Afterwards, the selected plans are executed by means of the mobility simulation module; the latter relies on the concept of queue simulation, which was demonstrated to efficiently approximate real-life traffic flows. In particular, MATSim models roads as FIFO queues with a limited vehicle capacity; every time a vehicle asks permission to access a road, the corresponding road agent can either respond positively, in case there still is space, or negatively, if the queue capacity is reached. Thus, in case a commuter is not allowed to enter a road segment a delay is produced in the system as long as the regular flow is restored. Finally, when a commuter manages to enter a road, he is added to the queue tail until he reaches its head in order to move to the next segment. The score computation is made after every mobsim run, and it is performed on the last executed plans by means of a scoring function. The score represents a measure about how the traveling choices made by agents affected the execution of their activities: the higher the score the better the day. Once all plans have been scored, the replanning phase takes place, as a portion of the population is allowed to modify their plans, in accordance with the co-evolutionary approach. Then, such plans are modified by applying a mutation operator according to the previously mentioned choice dimensions. Finally, in the last iteration the replanning phase is not executed anymore and it is replaced with the analysis module. In fact, MATSim is strongly based on events stemming from the mobsim and this allows to record every action in the simulation for further analysis. These events' records can be aggregated to evaluate any measure at the desired resolution. MATSim can be applied in large scenarios. We show an example considering a small city in the paper, nevertheless scalability to bigger cities should not be much a problem since MATsim simulations of large-scale agent-based micro simulation models are proved scalable [20]. An experiment made by MATSim developers with 1.62 million agents and 163K links in the area of Zurich city were simulated in about 20 minutes in a machine with 128GB RAM and 8 dual- core AMD Opteron CPUs. Also the Switzerland traffic was modeled in about 3 hours for a single MATSim iteration: one million roads and 7.3 million agents clearly show that large- scale, multi-agent micro-simulation can reasonably be used. INTERNAL VERSION FOR ARXIV.ORG 6 B. Tangramob meets MATSim Our framework has been implemented on top of MATSim, taking advantage of its flexible and modular architecture and trying to maintain the same design principles. We redefined and extended the behavior of some original MATSim modules, whereas other remarkable contributions were introduced in such a way to capture all the features of the Tangramob AB model of Section III. Fig. 7: Tangramob architecture In particular, the module initial demand, in which the simulation input data are collected and validated, is integrated with the specification of the SMI, describing the locations of the tangrhubs on the map as well as the list of the mobility services available on each of them. Making this integration possible required us to implement the concepts of tangrhub agent, a new static but active entity that is responsible both for managing and offering new traveling opportunities to the nearby population, and for managing the associated mobility services, which can be seen as services provided by private or public companies/organizations and that overall constitute the infrastructure of the SMIs available in the urban area. The mobsim module, specialized in simulating the urban traffic, has been integrated with the MATSim "multimodal" extension, that allows to deal with different transport modes as well as simulating the overtaking of vehicles. This way, Tangramob can also evaluate the impact on the urban system caused by unconventional kinds of vehicles (e.g. scooters, bicycles, etc.). For this purpose, we redesigned the original concept of MATSim's vehicles, and we introduced the char- acterization of mobility services with the ability to manage such vehicles. Furthermore, our characterization takes into account the most relevant vehicles features like: dimension, velocity, fuel type and consumption; all these specifications are expected to impact on the traffic simulation, especially for what concerns travel delays and times, and thus are relevant information in relation to the mobility decisions of commuters. Concerning the scoring module, Tangramob still exploits the original Charypar-Nagel scoring function [13]. This allowed us to validate the new learning process of Tangramob, exploiting the existing MATSim's validation work. The replanning phase designed for Tangramob is completely different from that followed by MATSim. Whereas MATSim adopts a co-evolutionary algorithm, our framework is based on a reinforcement learning approach, allowing each commuter to evaluate his past traveling experience in order to improve their daily personal mobility. This is made possible by the implementation of iteration-persistent memory structures, that every commuter can exploit as knowledge base, in order to accumulate the score given for each mobility service used during the simulation. Thus, the score of a service acts as a reward for the action of choosing that service for a certain trip. Such a different approach allows commuters to maximize the expected utility of their mobility decisions. In particular, during the last iteration of the simulation, each commuter will decide to either use the new mobility services, or not to accept the mobility initiative, according to the collected knowledge. Finally, the analysis module has been integrated with new to compare statistical collectors to gather all data useful the legacy urban mobility with the one emerging after the introduction of a SMI. Some stats correspond to the agents' performance criteria described in section III, and others are focused on the urban system as a whole. In particular, we aim at collecting the following statistical data: (i) urban traffic levels, (ii) CO2 emissions, (iii) traveled distances, (iv) travel times, (v) land use levels, (vi) cost of mobility, (vii) number of adopters, and (viii) resource usage level. As depicted in Figure 7, all these redefined modules form the core of Tangramob, sitting on the top of MATSim and some of its well-known extensions. Moreover, to make the simulator more accessible and user-friendly, we have designed and implemented the following features: • a census data converter, namely a tool for translating Italian census data into suitable input mobility agendas; • a population generator, for synthesizing a sample popu- lation from some statistical data about an urban area for which neither census nor plans are available; • tangrhub aided placement, a tool that analyzes the loca- tions of people daily activities in order to spot the most populated urban areas. By using clustering algorithms, this tool supports users in the task of placing tangrhubs in a more rational way, since keeping them close to the population is expected to minimize micro-mobility. • a web-based Graphical User Interface (GUI), which allows users to select the geographical area of interest to automatically retrieve the urban road network of the selected area from OpenStreetMap. In case the user cannot generate the data of the sample population under study from the census data converter, the user is expected to load the mobility agendas manually or to generate a synthetic but realistic population from other sources. Finally, once the geographical context is defined, the user can shape a smart mobility initiative by geographically placing a number of tangrhubs and configuring each of them with one or more mobility services. The resulting architecture is fully extensible in every layer, providing the possibility to develop extensions over both the MATSim layer and the Tangramob codebase. V. TANGRAMOB: AN EXAMPLE OF USE In order to show an example of use of Tangramob, we report some experiments performed on a real scenario in the city of INTERNAL VERSION FOR ARXIV.ORG 7 Ascoli Piceno (Italy). Ascoli Piceno is a small city with about 50.000 inhabitants over 158 km2 and several other thousand of people who live in near places outside the city perimeter. the city center can be served by the same hub. Each hub is characterized as in Table II, for readability we use the same resources for each tangrhub in this example. As shown in Table II, each SMI shares the same number of tangrhubs, each of which is provided with the same choice set of mobility services. Even the geographical location of tangrhubs is the same for all the initiatives, and it is denoted by the triangles depicted in Figure 8. For each tangrhub we specify the dimension of the fleet the hub manage at the start of the simulation, its total capacity to store vehicles is set a 25% more than the initial fleet. What differs among these initiatives is just the number of mobility resources, which in this case, correspond to the vehicle fleet of each service. TH Total Mobility Services SMI-1 bikesharing carsharing e-scootersharing bikesharing carsharing e-scootersharing 10 – – 110 – – Fleet SMI-2 SMI-3 10 10 10 110 110 110 50 50 50 550 550 550 TABLE II: Grid network: tangrhubs experimental setup For each mobility service we specify costs. For this experi- ment, we set the costs of the chosen mobility services, which in turn were set according to the actual average service charges in Europe, as summarized in Table III. Cost per h Cost per km Fixed Cost Bikesharing Carsharing e-scootersharing 0.5 e 13 e 2,5 e 0 e 0.1 e 0.1 e 0.01 e 0.01 e 0.01 e TABLE III: Grid network: mobility services' costs As argued in Section II, understanding how the proposed SMIs impact both commuters and the transport system re- quires a comparative experiment. In particular, considering that commuters in this scenario are used to move by private cars, first we simulate the current urban mobility (i.e. the pre-SMI simulation), then we simulate each SMI separately (i.e. SMI-1, SMI-2 and SMI-3 simulations). Afterwards, we compare these simulations with respect to the following variables: traveled distance, travel time, CO2 emissions, cost of mobility and urban traffic levels; all these values are collected during the last iteration of each simulation. The first 4 variables are intended as per-capita indicators (averaged values) and summarize the traveling experience of commuters, whereas the last one can be seen as a performance measure of the urban system. A. Experimental results In this section, we show and discuss the results obtained from our simulations to compare them according to the just mentioned indicators. We also provide some interesting insights concerning the impact of the 3 SMIs on people acceptance and on mobility resource usage levels. 1) Number of tangrhubs' subscribers: A subscriber is a person who uses the mobility services provided by tangrhubs. This value may measure the success of a SMI in terms of people acceptance. As noticeable in Figure 9, the number of Fig. 8: Ascoli Piceno network with tangrubs positioning for SMI's As depicted in Figure 8 the network represents all the city roads and infrastructures including the city center and the roads that connect the city with other places. Starting from available statistics, we identified 15 areas and for each one we identified inhabitants and jobs as described in Table I. Areas P.ta Solest´a P.ta Romana Centro Piazzarola C. Parignano P.ta Maggiore Monticelli Brecciarolo People 5009 1839 7740 409 3368 11500 10633 645 Jobs 3170 700 6760 250 2170 10900 8000 1300 Areas P. di Bretta Battente Marino Villa Pigna Z. Industriale C. di Lama Frazioni People 1694 103 576 3000 500 3000 6242 Jobs 500 3000 1400 2000 6500 5000 6000 TABLE I: Population and jobs in the city areas In the experiment, we modeled the whole population con- sidering the suburbs with 56.000 agents. Using the statistics of the municipality we have built a normally distributed population age with a 45% in range 25-49. Female are 52% and male 48%. These parameters are expected to affect the act of travelling of commuters, thus impacting on their score. Basically, mobility agendas has been organized with three daily activities in the following order: home, work, home. Thus, a commuter moves from its home to a workplace in another area and viceversa. For sake of clarity, we consider in this experiment as work each kind of activity different to stay at home. We also do not consider multi-trip commutes. As a typical real-case scenario, peak activity hours can be split into two different moments: 8:00 a.m. commuters start moving towards the workplaces; while at 16:00 p.m. commuters come back home from work. The first activity in the morning is distributed in the 5:00 a.m. - 13:00 a.m. time slot with 45% included in the 07:00 a.m. - 08:00 a.m. hour. The homecoming happens at the end of the work activity. That time is modeled using a Gaussian distribution centered over 6 hour of duration. In this scenario, we aim at investigating the impacts of three different smart mobility initiatives that integrate trans- port services: a bikeshare, an electric carshare, and an e- scootersharing service. All vehicles used are zero emissions. We use 11 tangrhubs in the city areas as several locations in INTERNAL VERSION FOR ARXIV.ORG 8 Fig. 9: Tangrhubs subscriptions Fig. 10: Traveled distances comparison Fig. 11: Travel times comparison Fig. 12: Emissions comparison Fig. 13: Mobility costs comparison Fig. 14: Mobility resources usage subscribers increase as the SMI has more mobility resources, where the horizontal line denotes the entire population. 2) Commuters' performance measures: The first variable involved in the comparison is the traveled distance of com- muters shown in Figure 10. In the 3 SMI simulations, com- muters are expected to travel shorter distances than the pre- SMI ones even if the differences are not so marked. For what concerns travel times (Figure 11), in the simulations of SMI- 1 and SMI-2 commuters spend less time traveling. This is a good indicator of the effectiveness of the SMIs. Conversely, in SMI-3 commuters spend much more time traveling than before. This indicates that SMI-3 has some problems either in the configuration or in moving people respect to the pre-SMI. Concerning the comparison of CO2 emissions produced by commuters, we found that the carbon footprint of the 3 SMIs simulations tends to decrease in directly proportional way with the number of subscribers. Therefore, we can affirm that the more the SMI satisfies a large section of the population, the more the simulation becomes eco-friendly if we use green vehicles. SMI-1, SMI-2 and SMI-3 reduce CO2 respectively of 20%, 25% and 35%. Besides the environmental impact, we also found that there exists an inverse relationship between the number of subscriptions and the daily costs of mobility. As can be seen in Figure 13, a commuter in the pre-SMI simulation spends on average e13.5 a day for traveling, whereas a commuter can satisfy his/her needs with a lower expense of e10, e9 and e8 in the SMI-1, SMI-2 and SMI-3 respectively. 3) Mobility resources usage: Tangramob can provide stats concerning the level of mobility resources usage of the SMIs (Figure 14). The analysis of these data allows to understand if a SMI is efficiently configured, so as to refine it for obtaining similar results with fewer mobility resources. In our case, it turns out that SMI-1 and SMI-2 are properly configured and they resources are used. SMI-3 have a large number of unused vehicles, we can reduce its fleets in other simulation attempt. A closer look to the resource usage of SMI-3 in Figure 15 shows the incorrect sizing for the car and scooter services highlighting however the right usage of bikes. Fig. 15: Mobility resource usage SMI-3 Gathering together all the results, we can conclude that a properly configured SMI helps reducing several urban problems, like traffic congestion levels and consequently air pollution. The experiment conclude that SMI-2 shortly reduced distances by 20% mantaining substantially the same travel times but lowering significantly emissions and costs. Moreover its application actually use all the resources associated with services. The same conclusion can be made for SMI-1 also if the benefit is less noticeable. SMI-1 and SMI-2 could be evaluated in relation to their implementation costs by a urban planner and a decision maker. SMI-3 on the contrary increases the travel time while maintaining important benefits in travel distances, emission and costs. However, its implementation requires many resources, many of which are left unused. The 3 simulations of this experiment took about two and a half hours each, with 110 iterations on a Linux machine with an i7-7700k CPU @ 4.8GHz and 16GB RAM. We used in the test the whole 56000 agents population. Running a mid-sized INTERNAL VERSION FOR ARXIV.ORG 9 scenario with a real population of 500K inhabitants should be done scaling the population to 10% as suggested by [13] thus such data makes us confident on feasibility of Tangramob simulations also for scenarios larger. VI. RELATED WORK To the best of our knowledge, the state of the art does not provide any easy-to-use tool for assessing the impacts of smart mobility initiatives, in particular when several mobility services are considered. This section thus aims at presenting and discussing the main relevant studies sharing our intent. We present simulation-based studies that can be defined as in-silico experiments in which scientists investigate how the introduction of a certain smart mobility service could improve the urban transport system of a chosen area of interest. These studies are performed by extending traffic simulators, like MATSim [13] and SUMO [21], and the rigorous nature of such experiments can guarantee the reliability of their results. For instance, in [22], Bischoff et al. extended MATSim in order to investigate a city-wide replacement of private cars with variously sized Autonomous Taxicab (AT) fleets. Results showed that a fleet of 100,000 AT vehicles could satisfy all the inner city trip demand with: an average waiting time for a vehicle of under three minutes at most times of the day, and under five minutes during peak hours. In [23], Balac et al. simulated the introduction of two different carsharing initiatives: round-based and one-way. The first one allows users to pick-up a car from a nearby station and return it later to the same location. The second one is similar to the round- based type, but it allows one to park the car at the closest station from the destination. The simulation was performed by means of a MATSim extension, limiting the scenario to the centre of Zurich. Results proved that the round-based carsharing is mostly chosen for shopping and leisure trips, whilst one-way for commuting ones. All these studies bring insightful results with regard to how a transportation system is expected to improve after the introduction of a smart mobility service. This is made possible by the scientific nature of such traffic simulations, as showed by the MATSim team in [13]. However, each of these studies deals with a single solution, so there still is no common framework to assess the impacts and performance of a range of heterogeneous smart mobility services [10] as well as an holistic and interrelated vision of these actions [9]. Furthermore, each study pertains to a specific geographical area (e.g. Berlin for AT, Zurich for carsharing) and the technical organization of the corresponding extension is not flexible enough to be adapted to other areas. Finally, it is worth mentioning that only IT-skilled users would be able to customise such extensions because of their in-code nature. Other than MATSim and SUMO, traffic simulators like Sim- Mobility [24], Vissim [25] and SMART (Scalable Microscopic Adaptive Road Traffic Simulator) [26] do not currently provide relevant studies on the impacts of smart mobility solutions. crucial task in the Urban Planning field. Local public author- ities and mobility service providers currently design mobility initiatives according to common heuristics and best practices; these approaches cannot be expected to generalize to every geographical context due to the complexity and the diversity of urban systems. Thus, deploying a mobility initiative is the only way to get measure ex post, but this also comes with potential risks since a failing initiative would result in a considerable waste of resources and trust. To address this problem we introduced Tangramob, an agent-based simulation framework that allows users to assess impacts and performances of a mobility initiative within an urban area of interest. Tangramob performs comparative experiments between, before, and after the introduction of a mobility initiative, approximating real-world urban dynamics by adopting reinforcement learning techniques. The computa- tional nature of these experiments makes it easy to support urban mobility decisions permitting to reduce costs and risks. Tangramob is still under active development and improve- ment, nonetheless the current version already permitted to run meaningful experiments that provided positive results on the usefulness and the potentialities of the simulator. In particular, users can measure the impacts of a simulated smart mobility initiative with respect to: urban traffic levels, CO2 emissions, traveled distances, travel times, land use levels, cost of mobility, number of adopters and resources usage level. Thus, it is up to the user evaluate which variables are more relevant for understanding whether or not an initiative is in line with his objectives. The experiment we shown help urban planner to consider future initiatives and policies. SMI-1 is the cost effective solution impacting significantly CO2 emissions and personal costs. SMI-2 is the most powerful initiative able to lower again that values while offering a variety of services to the commuters. SMI-3 is clearly oversized and the improvements made possible by its use are not justified by implementation costs and resource unused rate. From these, planners could refine SMI-1 and SMI-2 to arrive at a simulated city planning useful to the decision makers. Planned future work includes the extension of the current scoring function with additional traveling comfort criteria to measure the comfort of a traveling experience with a certain vehicle to let the commuter agents evaluate a mobility service as a whole. We are also working on additional evaluations, taking into account more complex scenarios. REFERENCES [1] UN, "The world's cities in 2016," New York, 2016. [2] C. Pitas and D. Goodman. Bmw tries to succeed where daimler failed with london car-share scheme. [Online]. Available: https://goo.gl/19SsS5 [3] L. Alter. succeed others https://goo.gl/DM3KvQ (2013) Why do some bike-share systems and [Online]. Available: fail? VII. CONCLUSIONS AND FUTURE WORK [4] D. Westneat. (2016) Bike shares failure deflates seattles self-image. [Online]. Available: https://goo.gl/fCliOa Understanding how urban mobility is expected to evolve after the introduction of new smart mobility services is a [5] E. Negri. (2016) Salerno, un fallimento il servizio di bici condivise. [Online]. Available: https://goo.gl/RWQNmC INTERNAL VERSION FOR ARXIV.ORG 10 [6] A. Mamiit. (2016) Why the ride-sharing company failed to conquer china and what it means for everyone else. [Online]. Available: https://goo.gl/cHuC9n [7] O. Sulopuisto. on-demand bus https://goo.gl/7FOhzy (2016) Why helsinki's service failed. innovative [Online]. Available: [8] K. Fehrenbacher. Another failed attempt to make ride sharing work in the u.s., ridejoy to shut down. [Online]. Available: https://goo.gl/3ITYce [9] L. McGrath, "Smart Mobility in Smart City: Action Taxonomy, ICT Intensity and Public Benefits Clara," Lecture Notes in Information Systems and Organisation, 2016. [10] K. Zavitsas, I. Kaparias, and M. G. H. Bell, "Transport problems in cities," Transport, 2011. [11] P. Davidsson, J. A. Persson, and J. Holmgren, "On the integration of agent-based and mathematical optimization techniques," in Agent and Multi-Agent Systems: Tech- nologies and Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 1–10. [12] M. Barbati, G. Bruno, and A. Genovese, "Applications of agent-based models for optimization problems: A litera- ture review," Expert Systems with Applications, vol. 39, no. 5, pp. 6020–6028, 2012. [13] A. Horni, K. Nagel, and K. W. Axhausen, The London: Multi-Agent Transport Simulation MATSim. Ubiquity-Press, 2016. [14] B. Guo, Z. Wang, Z. Yu, Y. Wang, N. Y. Yen, R. Huang, and X. Zhou, "Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm," ACM Comput. Surv., vol. 48, no. 1, pp. 7:1–7:31, Aug. 2015. [Online]. Available: http://doi.acm.org/10.1145/2794400 [15] H. Ma, D. Zhao, and P. Yuan, "Opportunities in mo- bile crowd sensing," IEEE Communications Magazine, vol. 52, no. 8, pp. 29–35, 2014. [16] M. Yin, M. Sheehan, S. Feygin, J.-F. Paiement, and A. Pozdnoukhov, "A generative model of urban activities from cellular data," IEEE Transactions on Intelligent Transportation Systems, 2017. [17] M. Ciuffini, C. Aneris, V. Gentili, S. Operto, L. Refrigeri, and L. Trepiedi, "La sharing mobility in italia: numeri, fatti e potenzialit´a," Osservatorio Nazionale Sharing Mo- bility (Italia), Tech. Rep., 2016. [18] E. M. Finger, N. Bert, and D. Kupfer, "From the Helsinki experiment to a European model?" FSR Transport, 2015. [Online]. Available: https://goo.gl/AFzcOI [19] Catapult Transport Systems, "Exploring the opportunity for Mobility as a Service in the UK," 2016. [20] R. A. Waraich, D. Charypar, M. Balmer, and K. W. Axhausen, Performance Improvements for Large-Scale Traffic Simulation in MATSim. Cham: Springer International Publishing, 2015, pp. 211–233. [Online]. Available: https://doi.org/10.1007/978-3-319-11469-9 9 [21] M. Behrisch, L. Bieker, J. Erdmann, and D. Krajzewicz, "Sumo–simulation of urban mobility: an overview," in Proceedings of SIMUL 2011, The Third International Conference on Advances in System Simulation, 2011. [22] J. Bischoff and M. Maciejewski, "Autonomous taxicabs in berlin–a spatiotemporal analysis of service perfor- mance," Transportation Research Procedia, vol. 19, pp. 176–186, 2016. [23] M. Balac and F. Ciari, "Modeling station-based car- sharing in Switzerland," 14th Swiss Transport Research Conference, no. May, 2014. [24] M. Adnan, F. C. Pereira, C. M. L. Azevedo, K. Basak, M. Lovric, S. Raveau, Y. Zhu, J. Ferreira, C. Zegras, and M. Ben-Akiva, "Simmobility: A multi-scale integrated agent-based simulation platform," in 95th Annual Meet- ing of the Transportation Research Board Forthcoming in Transportation Research Record, 2016. [25] M. Fellendorf and P. Vortisch, Microscopic Traffic Flow Simulator VISSIM. Springer New York, 2010. [26] K. Ramamohanarao, H. Xie, L. Kulik, S. Karunasek- era, E. Tanin, R. Zhang, and E. B. Khunayn, "Smarts: Scalable microscopic adaptive road traffic simulator," ACM Transactions on Intelligent Systems and Technology (TIST), vol. 8, no. 2, p. 26, 2017.
1110.0105
1
1110
2011-10-01T15:03:52
Multi-Agent Programming Contest 2011 - The Python-DTU Team
[ "cs.MA" ]
We provide a brief description of the Python-DTU system, including the overall design, the tools and the algorithms that we plan to use in the agent contest.
cs.MA
cs
Multi-Agent Programming Contest 2011 -- The Python-DTU Team Jørgen Villadsen, Mikko Berggren Ettienne, and Steen Vester Department of Informatics and Mathematical Modelling Technical University of Denmark Richard Petersens Plads, Building 321, DK-2800 Kongens Lyngby, Denmark Abstract. We provide a brief description of the Python-DTU system, including the overall design, the tools and the algorithms that we plan to use in the agent contest. Updated 1 October 2011: Appendix with comments on the contest added. Introduction 1. The name of our team is Python-DTU. We participated in the contest in 2009 and 2010 as the Jason-DTU team [2,3], where we used the Jason platform [1], but this year we use just the programming language Python. We intend in a later paper to elaborate on the reasons for abandoning the Jason platform and its agent-oriented programming language AgentSpeak. 2. The members of the team are as follows: -- Jørgen Villadsen, PhD -- Mikko Berggren Ettienne, MSc student (new in the team this year) -- Steen Vester, MSc student We are affiliated with DTU Informatics (short for Department of Informatics and Mathematical Modelling, Technical University of Denmark, and located in the greater Copenhagen area). 3. The main contact is associate professor Jørgen Villadsen, DTU Informatics, email: [email protected] 4. We expect that we will have invested approximately 400 man hours when the tournament starts. 1 System Analysis and Design 1. The competition is built on the Java MASSim platform and the Java EIS- MASSim framework is distributed with the competition files. This framework is based on EIS and abstracts the communication between the server and the agents to simple Java method calls and callbacks. To utilize this framework we started out with the Java implementation of Python called Jython which in contrast to Python can import Java libraries and classes. To support agent communication in our multi-agent system we have so far used the Apache ActiveMQ as a messaging server which offers clients for all popular programming languages. Using the EISMASSim Java framework together with ActiveMQ clients written in Python gluing it all together with Jython gave some performance issues when exchanging percepts between the agents. We found that each component performed well tested in a controlled context which suggested that the issues were related to the interaction between the components. We decided to skip Jython and EISMASSim to instead follow a much cleaner Python-only implementation. Even though some work was needed to imple- ment the protocol specific parts which EISMASSim handled, this left us with a more flexible implementation of which we have complete knowledge and control of every part of the implementation. It also solved the performance issues related to component interaction. We also plan to skip the messaging server and instead let the agents com- municate directly using a simple and efficient text-based protocol to further improve the performance of the system. A simple text-based protocol allows us to keep the distributivity and modularity. Thus it will still be posible to use agents written in different programming languages. Furthermore, by implementing our own message server, we can tweak the low-level features to suit the need of our specific system. 2. We do not use any existing multi-agent system methodology. 3. We do not plan to distribute the agents on several machines. 4. We do not plan a solution with a centralization of coordination/information on a specific agent. Rather we plan a decentralized solution where agents share percepts through messages and coordinate actions using distributed algorithms. 5. The team communication is based on the publisher-subscriber pattern. Our message server has a number of topics to which agents can subscribe and publish messages. This supports one-to-one communication and one-to-many communication in a simple way where the agents determine which topics to subscribe to. 2 6. To assign goals to agents we use a ring-based auction algorithm. Each round in an auction includes n messages where n is the number of agents participat- ing. Before participating in an auction all agents score their top n goals and use this score to determine their bidding strategy. The algorithm terminates when all n agents are assigned to a unique goal. 7. Each agent acts on its own behalf based on its local view of the world which is updated through percepts and is thus autonomous and reactive. This is implemented as an agent-control-loop in which the agents decide which ac- tions to execute based on their current view of the world. We have considered implementing an algorithm to determine the best way to parry a series of attacks from a saboteur agent which would make the agents proactive. Software Architecture 1. We implement the multi-agent system using just the programming language Python. Even though we all have more experience with Java, we choose Python as our programming language, as we think it has some advantages over Java, mainly in development speed/programmer effectiveness. Some of the reasons being that Python in contrast to Java: -- is dynamically typed -- is concise -- is compact -- supports multiple programming paradigms (object-oriented, imperative, functional) -- is popular for scripting -- does not need to be compiled before execution 2. We use Python 2.7 on Ubuntu Linux and Mac OS X as the development platforms and GEdit, Eclipse and TextMate as code editors/IDEs. 3. As the runtime platform for the competition we plan to use a suitable Linux system with Python 2.7. 4. We plan to use the following algorithms: -- All-pair shortest path extended to support dynamic vertex addition -- Custom breadth-first-searches -- Ring-based agreement algorithm 3 References 1. Rafael H. Bordini, Jomi Fred Hubner, and Michael Wooldridge. Programming Multi- Agent Systems in AgentSpeak Using Jason. John Wiley & Sons, 2007. 2. Niklas Skamriis Boss, Andreas Schmidt Jensen, and Jørgen Villadsen. Building Multi-Agent Systems Using Jason. Annals of Mathematics and Artificial Intelli- gence, Springer Online First 6 May 2010. 3. Steen Vester, Niklas Skamriis Boss, Andreas Schmidt Jensen, and Jørgen Villadsen. Improving Multi-Agent Systems Using Jason. Annals of Mathematics and Artificial Intelligence, Springer Online First 5 March 2011. Acknowledgements Thanks to Niklas Christoffer Petersen, MSc student, for comments. More information about the Python-DTU team is available here: http://www.imm.dtu.dk/~jv/MAS Appendix Our idea to skip the message server and implement our own text-based protocol was slightly modified during the implementation phase. Instead of implementing our own message system, we reached the pragmatic conclusion to instead let the agents communicate trough direct reference to a shared data structure. This allowed us to spend more time on other important issues and freed us from all performance issues. The main reason for the message system idea was to preserve modularity and this could easily be implemented at a later state if time allowed. In the early development phase we suspected our dynamic all-pair shortest path algorithm as a candidate for our performance issues. However we discovered that the issues were I/O related, and found that we had plenty of processing time and power to perform multiple stock graph search algorithms at each simulation step. This made our dynamic all-pair shortest path algorithm superfluous for this scenario. However it could be highly relevant in case of less processing time or bigger graphs. 4
0806.3031
1
0806
2008-06-18T15:46:10
Multi Site Coordination using a Multi-Agent System
[ "cs.MA" ]
A new approach of coordination of decisions in a multi site system is proposed. It is based this approach on a multi-agent concept and on the principle of distributed network of enterprises. For this purpose, each enterprise is defined as autonomous and performs simultaneously at the local and global levels. The basic component of our approach is a so-called Virtual Enterprise Node (VEN), where the enterprise network is represented as a set of tiers (like in a product breakdown structure). Within the network, each partner constitutes a VEN, which is in contact with several customers and suppliers. Exchanges between the VENs ensure the autonomy of decision, and guarantiee the consistency of information and material flows. Only two complementary VEN agents are necessary: one for external interactions, the Negotiator Agent (NA) and one for the planning of internal decisions, the Planner Agent (PA). If supply problems occur in the network, two other agents are defined: the Tier Negotiator Agent (TNA) working at the tier level only and the Supply Chain Mediator Agent (SCMA) working at the level of the enterprise network. These two agents are only active when the perturbation occurs. Otherwise, the VENs process the flow of information alone. With this new approach, managing enterprise network becomes much more transparent and looks like managing a simple enterprise in the network. The use of a Multi-Agent System (MAS) allows physical distribution of the decisional system, and procures a heterarchical organization structure with a decentralized control that guaranties the autonomy of each entity and the flexibility of the network.
cs.MA
cs
COMPUTERS IN INDUSTRY Multi Site Coordination using a Multi-Agent System Monteiro Thibaud(1), Roy Daniel(2), Anciaux Didier(1) INRIA – MACSI project, LGIPM – SdP team (1)Université Paul Verlaine, Île du Saulcy, F-57045 Metz CEDEX 01 – FRANCE (2)École Nationale d’Ingénieurs de Metz, Île du Saulcy, F-57045 Metz CEDEX 01 – FRANCE Email: {roy, anciaux, monteiro}@agip.sciences.univ-metz.fr Abstract A new approach of coordination of decisions in a multi site system is proposed. It is based this approach on a multi-agent concept and on the principle of distributed network of enterprises. For this purpose, each enterprise is defined as autonomous and performs simultaneously at the local and global levels. The basic component of our approach is a so-called Virtual Enterprise Node (VEN), where the enterprise network is represented as a set of tiers (like in a product breakdown structure). Within the network, each partner constitutes a VEN, which is in contact with several customers and suppliers. Exchanges between the VENs ensure the autonomy of decision, and guarantiee the consistency of information and material flows. Only two complementary VEN agents are necessary: one for external interactions, the Negotiator Agent (NA) and one for the planning of internal decisions, the Planner Agent (PA). If supply problems occur in the network, two other agents are defined: the Tier Negotiator Agent (TNA) working at the tier level only and the Supply Chain Mediator Agent (SCMA) working at the level of the enterprise network. These two agents are only active when the perturbation occurs. Otherwise, the VENs process the flow of information alone. With this new approach, managing enterprise network becomes much more transparent and looks like managing a simple enterprise in the network. The use of a Multi-Agent System (MAS) allows physical distribution of the decisional system, and procures a heterarchical organization structure with a decentralized control that guaranties the autonomy of each entity and the flexibility of the network. Keywords: Multi-agent systems, decision support systems, coordination, negotiation, distributed control, supply chain 1. Introduction Product design, manufacture, conditioning, or the combination of the three do not result from isolated and autarkical companies but from increasingly complex corporative networks. Such networks can take various forms and can be as complex as clusters of several “Industrial Architectures”. It is necessary to develop rigorous methods to improve the performance of such complex architecture development and the efficiency of these enterprises. In a complex network, enterprise performance is sensitive to the relationships and behaviors of participating companies, a dimension which does not exist for individual companies. Being a function of product quality and costs (including the societal cost) of the products, it is also defined in terms of time to design or to manufacture, and depends mainly on the information and the material flows. To improve the reactivity and the costs of a company involved in such a complex architecture, it is necessary to consider subcontracting and the relationships with partners. The “make or buy” decisions involved in this architecture occur in various time frames. A long term decision or strategic decision, corresponds to the whole set of external and internal nodes of production, distribution and supply. A medium term decision or tactic decision characterizes the contracts (quantities of products to deliver, delays, costs, penalties…) that the company is likely to have with its internal and/or external providers in order to carry out a production program that accomplishes the best balance between cost and delay. Finally, a short term decision or operational decision, considers for instance subcontractors, simply for overloading capacity in order to absorb a transitory fluctuation of demand. The paper only focuses on operational decisions. There is a need to better coordinate actions in complex cooperative network, especially among the partners (Altersohn, 1992; Rota, 1998; Kjenstad, 1998). Recent research shows a growing interest in studying cooperation relationships among multiple actors of industrial architectures (Axelrod, 1992; Rapoport, 1987; Ferrarini, 2001; Monteiro and Ladet, 2001b). It appears from these studies that cooperation has two different forms. Cooperation can be a form of collaboration between partners in which each has equivalent decisional capacity and acts with others towards a common objective, such as in the co-design in the automotive sector (Womack et al., 1992) or aeronautical sector (Cauvin et al., 2003). Cooperation can also be a form of coordination and a synchronization of operations carried out by independent actors (Malone, and Crowston, 1994; Monteiro and Ladet, 2001a). In this case, each partner has a limited decision power that corresponds to its action field (Camalot, et al., 1997; Camalot, 2000; Huguet, 1994). Multi site resources are considered in this paper to study the planning management of complex enterprise networks. A performance criterion valid locally as well as globally is used, and a “win-win” policy, based on costs is used, that controls the network (OUZIZI, et al., 2003). In addition, the distribution of the enterprise network cannot be managed only by one and unique data-processing and data base application. The main reason is that the exchange of information and the behaviors, wich are specific to operations of the network members, are so complex that they require 2 computing be to need paradigms which decentralized and shared. Consequently, it seems that a multi-agent architecture can best meet this need (Ferber, 1995; Patriti, et al., 1997). Therefore, a new approach is proposed. It is based on a cooperative multi-agent architecture in order to represent and manage the operational decisions made in complex enterprise networks. First, relevant research work on the coordination of supply chains is reviewed. Then, a simple case for water tab production is described and used to develop the approach by presenting the model architecture and the agent specifications. 2. Literature review on coordination of the supply chains and enterprise networks Nowadays, there is a large and growing number of research efforts on coordination and management of supply chains. The first area concerns operational research models. The aim of these models is to coordinate distributed planning with a collaborative approach (Dudek and Stadler, 2005; Schneeweiss and Zimmer, 2004). Each partner, supplier or producer, is described in the mathematical model by an objective function. The models are combined to coordinate activities, but do not consider information flows and decisional processes. The second area of research concerns collaborative architectures, mostly viewed as a centralized architecture. A large literature review on this area can be found in the paper of Stadtler (2005). Some research papers deal with distributed architectures. Verwijmeren (2004) develops a software component architecture dedicated to coordination, which chain supply supports cooperative distributed and organizations. Nevertheless, none of these authors consider cooperative and synchronization behaviors. Finally, the third area concerns the Multi-Agent Systems (MAS) that describe coordination of supply chains. The MAS are regarded as one of the most promising technologies in supply chain management. Fox et al. (2000) model such a system with functional agents, which are responsible of several activities such as order acquisition, logistics, transport, or scheduling. The specificity of the agents is to support distributed decision making. A review of agent-based approaches in the supply chain management can be found in a paper of Parunak (1999) and a critical analysis in Caridi and
0806.3032
1
0806
2008-06-18T15:46:29
Multi-agents architecture for supply chain management
[ "cs.MA" ]
The purpose of this paper is to propose a new approach for the supply chain management. This approach is based on the virtual enterprise paradigm and the used of multi-agent concept. Each entity (like enterprise) is autonomous and must perform local and global goals in relation with its environment. The base component of our approach is a Virtual Enterprise Node (VEN). The supply chain is viewed as a set of tiers (corresponding to the levels of production), in which each partner of the supply chain (VEN) is in relation with several customers and suppliers. Each VEN belongs to one tier. The main customer gives global objectives (quantity, cost and delay) to the supply chain. The Mediator Agent (MA) is in charge to manage the supply chain in order to respect those objectives as global level. Those objectives are taking over to Negotiator Agent at the tier level (NAT). These two agents are only active if a perturbation occurs; otherwise information flows are only exchange between VENs. This architecture allows supply chains management which is completely transparent seen from simple enterprise of the supply chain. The used of Multi-Agent System (MAS) allows physical distribution of the decisional system. Moreover, the hierarchical organizational structure with a decentralized control guaranties, in the same time, the autonomy of each entity and the whole flexibility.
cs.MA
cs
1904.01882
1
1904
2019-04-03T09:48:57
Learning Nash Equilibria in Monotone Games
[ "cs.MA", "cs.GT" ]
We consider multi-agent decision making where each agent's cost function depends on all agents' strategies. We propose a distributed algorithm to learn a Nash equilibrium, whereby each agent uses only obtained values of her cost function at each joint played action, lacking any information of the functional form of her cost or other agents' costs or strategy sets. In contrast to past work where convergent algorithms required strong monotonicity, we prove algorithm convergence under mere monotonicity assumption. This significantly widens algorithm's applicability, such as to games with linear coupling constraints.
cs.MA
cs
Learning Nash Equilibria in Monotone Games Tatiana Tatarenko and Maryam Kamgarpour, IEEE Member 1 9 1 0 2 r p A 3 ] A M . s c [ 1 v 2 8 8 1 0 . 4 0 9 1 : v i X r a Abstract -- We consider multi-agent decision making where each agent's cost function depends on all agents' strategies. We propose a distributed algorithm to learn a Nash equilibrium, whereby each agent uses only obtained values of her cost function at each joint played action, lacking any information of the functional form of her cost or other agents' costs or strategy sets. In contrast to past work where convergent algorithms required strong monotonicity, we prove algorithm convergence under mere monotonicity assumption. This significantly widens algorithm's applicability, such as to games with linear coupling constraints. Index Terms -- learning in games, distributed algorithms I. INTRODUCTION Game theory is a powerful framework for analyzing and optimizing multi-agent decision making problems. In several such problems, each agent (referred to also as a player) does not have full information on her objective function, due to the unknown interactions and other players' strategies affecting her objective. Consider for example, a transportation network in which an agent's objective is minimizing travel time or an electricity network in which an agent's objective is minimizing own's electricity prices. In these instances, the travel times and prices, respectively, depend non-trivially on the strategies of other agents. Motivated by this limited information setup, we consider computing Nash equilibria given only the so- called payoff-based information. That is, each player can only observe the values of its objective function at a joint played action, does not know the functional form of her or others' objectives, nor the strategy sets and actions of other players, and cannot communicate with other players. In this setting, we address the question of how agents should update their actions to converge to a Nash equilibrium strategy. A large body of literature on learning Nash equilibria with payoff-based information has focused on finite action setting or potential games, see for example, [11, 12, 7] and references therein. For games with continuous (uncountable) action spaces, a payoff-based approach was developed based on the extremum seeking idea in optimization [3, 13], and assuming strongly convex objectives almost sure convergence to the Nash equilibrium was proven. A payoff-based approach, inspired by the logit dynamics in finite action games [2] was extended to continuous action setting for the case of potential games [14]. The work in [16] considered learning Nash equilibria in continuous action games on networks. Crucially, the work additionally assumed that each player exchanges information with her neighbors, to facilitate estimation of the gradient of her objective function online. T. Tatarenko ([email protected]) is with the Control Methods and Robotics Lab Technical University Darmstadt, Darmstadt, Ger- many 64283, M. Kamgarpour ([email protected]) is with the Automatic Control Laboratory, ETH Z urich, Switzerland. M. Kamgarpour gratefully acknowledges ERC Starting Grant CONENE. Recently, we proposed a payoff-based approach to learn Nash equilibria in a class of convex games [15]. Our approach hinged upon connecting Nash equilibria of a game to the solution set of a related variational inequality problem. Our algorithm convergence was established for the cases in which the game mapping is strongly monotone or the game admits a potential function. Apart from possibly limited scope of a potential game, strong monotonicity can be too much to ask for. In particular, if the objective function of an agent is linear in her action or in the presence of coupling constraints of the action sets the game mapping will not be strongly monotone. Our goal here is to extend the existing payoff-based learning approaches to a broader class of games characterized by mono- tone game mappings. While algorithms for solving monotone variational inequalities exist (see, for example, Chapter 12 in [9]), these algorithms either consist of two timescales (Tikhonov regularization approach) or have an extra gradient step (extra-gradient methods). As such, they require more coordination between players than that possible in a payoff- based only information structure. Our contributions are as follows. First, we propose a dis- tributed payoff-based algorithm to learn Nash equilibria in a monotone game, extending our past work [15] applicable to strongly monotone games, inspired by the single timescale algorithm for solving stochastic variational inequalities [6]. Second, despite lack of gradients in a payoff-based informa- tion, contrary to the setup in [6], we show that our proposed procedure can be interpreted as a stochastic gradient descent with an additional biasL and regularization terms. Third, we prove convergence of the proposed algorithm to Nash equi- libria by suitably bounding the bias and noise variance terms using established results on boundedness and convergence of discrete-time Markov processes. Notations. The set {1, . . . , N} is denoted by [N ]. Bold- face is used to distinguish between vectors in a multi- dimensional space and scalars. Given N vectors xi ∈ Rd, i ∈ [N ], (xi)N := (x1, . . . , xi−1, xi+1, . . . , xN ) ∈ R(N −1)d. Rd + and Z+ denote respectively, vectors from Rd with non-negative coordinates and non-negative whole numbers. The standard inner product )⊤ ∈ RN d; x−i i=1 := (x1⊤ , . . . , xN ⊤ on Rd is denoted by (·,·): Rd×Rd → R, with associated norm kxk := p(x, x). Given some matrix A ∈ Rd×d, A (cid:23) (≻)0, if and only if x⊤Ax ≥ (>)0 for all x 6= 0. We use the big-O notation, that is, the function f (x) : R → R is O(g(x)) as g(x) ≤ K for x → a, f (x) = O(g(x)) as x → a, if limx→a some positive constant K. We say that a function f (x) grows not faster than a function g(x) as x → ∞, if there exists a positive constant Q such that f (x) ≤ g(x) ∀x with kxk ≥ Q. Definition 1: A mapping M : Rd → Rd is monotone over X ⊆ Rd, if (M (x)− M (y), x− y) ≥ 0 for every x, y ∈ X. f (x) II. PROBLEM FORMULATION Consider a game Γ(N,{Ai},{Ji}) with N players, the sets of players' actions Ai ⊆ Rd, i ∈ [N ], and the cost (objective) functions Ji : A → R, where A = A1 × . . .× AN denotes the set of joint actions. We restrict the class of games as follows. Assumption 1: The game under consideration is convex. Namely, for all i ∈ [N ] the set Ai is convex and closed, the cost function Ji(ai, a−i) is defined on RN d, continuously differentiable in a and convex in ai for fixed a−i. Assumption 2: The mapping M : RN d → RN d, referred to as the game mapping, defined by M (a) = (∇ai Ji(ai, a−i))N i=1 = (M 1(a), . . . , M N (a))⊤, where M i(a) = (Mi,1(a), . . . , Mi,d(a))⊤, and Mi,k(a) = ∂Ji(a) ∂ai k , a ∈ A, i ∈ [N ], k ∈ [d], (1) is monotone on A (see Definition 1). We consider a Nash equilibrium in game Γ(N,{Ai},{Ji}) as a stable solution outcome because it represents a joint action from which no player has any incentive to unilaterally deviate. Definition 2: A point a∗ ∈ A is called a Nash equilibrium if for any i ∈ [N ] and ai ∈ Ai Ji(ai∗, a−i∗) ≤ Ji(ai, a−i∗). Theorem 1: Our goal is to learn such a stable action in a game through designing a payoff-based algorithm. We first connect existence of Nash equilibria for Γ(N,{Ai},{Ji}) with solution set of a corresponding variational inequality problem. Definition 3: Consider a mapping T (·): Rd → Rd and a set Y ⊆ Rd. A solution SOL(Y, T ) to the variational inequality problem V I(Y, T ) is a set of vectors y∗ ∈ Y such that (T (y∗), y − y∗) ≥ 0, ∀y ∈ Y . (Proposition 1.4.2 in [9]) Given a game Γ(N,{Ai},{Ji}) with game mapping M , suppose that the action sets {Ai} are closed and convex, the cost functions {Ji} are continuously differentiable in a and convex in ai for every fixed a−i on the interior of A. Then, some vector a∗ ∈ A is a Nash equilibrium in Γ, if and only if a∗ ∈ SOL(A, M ). It follows that under Assumptions 1 and 2 for a game with mapping M , any solution of V I(A, M ) is also a Nash equi- librium in such games and vice versa. While Γ(N,{Ai},{Ji}) under Assumptions 1 and 2 might admit a Nash equilibrium, these two assumptions alone do not guarantee existence of a Nash equilibrium. To guarantee existence, one needs to consider a more restrictive assumption, for example, strong monotonicity of the game mapping or compactness of the action sets [9]. Here, we do not restrict our attention to such cases. However, to have a meaning discussion, we do assume existence of at least one Nash equilibrium in the game. Assumption 3: The set SOL(A, M ) is not empty. Corollary 1: Let Γ(N,{Ai},{Ji}) be a game with game mapping M for which Assumptions 1, 2, and 3 hold. Then, there exists at least one Nash equilibrium in Γ. Moreover, any Nash equilibrium in Γ belongs to the set SOL(A, M ). 2 Assumption 4: Each element M i of the game mapping M : RN d → RN d, defined in Assumption (2) is Lipschitz continuous on Rd with a Lipschitz constant Li. Assumption 5: Each cost function Ji(a), i ∈ [N ], grows not faster than a linear function of a as kak → ∞. III. PAYOFF-BASED ALGORITHM 1, . . . , xi Given a payoff-based information, each agent has access to its current action, referred to as its state and denoted by d)⊤ ∈ Rd, and the cost value Ji(t) at the xi(t) = (xi joint states x(t) = (x1(t), . . . , xN (t)), Ji(t) = Ji(x(t)) = Ji(x1(t), . . . , xN (t)) at iteration t. Using this information in the proposed algorithm each agent i "mixes" its next state xi(t + 1). Namely, it chooses xi(t + 1) randomly according to the multidimensional normal distribution N(µi(t + 1) = (µi d(t + 1))⊤, σ(t + 1)) with the density: 1(t + 1), . . . , µi pi(xi 1, . . . , xi d; µi(t + 1), σ(t + 1)) 1 = (√2πσ(t + 1))d ) . The initial value of the means µi(0), i ∈ {N}, can be set to k − µi 2σ2(t + 1) any finite value. The successive means are updated as follows: exp(− k(t + 1))2 d Xk=1 (xi µi(t + 1) = ProjAi(cid:2)µi(t) − γ(t)σ2(t)(cid:18) Ji(t) xi(t) − µi(t) σ2(t) + ǫ(t)µi(t)(cid:19)(cid:3). (2) In the above, ProjC [·] denotes the projection operator on set C, γ(t) is a step-size parameter and ǫ(t) > 0 is a regularization parameter. We highlight the difference between the proposed approach and that of [15] due to the additional term ǫ(t) in (2). In the absence of this term the algorithm would not be convergent under a mere monotonicity assumption on the game mapping (see counterexample provided in [4]). Let us provide insight into the algorithm by deriving an analogy to a regularized stochastic gradient algorithm. Given σ > 0, for any i ∈ [N ] define Ji : RN d → R as Ji(µ1, . . . , µN , σ) =ZRN d Ji(x)p(µ, x, σ)dx, (3) 1, . . . , xi i=1 pi(xi where p(µ, x, σ) = QN d; µi, σ). Above, Ji, i ∈ [N ], can be interpreted as the ith player's cost function in mixed strategies. We can now show that the second term inside the projection in (2) is a sample of the gradient of this cost function Ji with respect to the mixed strategies. Let µ(t) = (µ1(t), . . . , µN (t)). Lemma 1: Under Assumptions 1 and 5, ∀i ∈ [N ], k ∈ [d] ∂ Ji(µ(t), σ(t)) ∂µi k =E{Ji(x1(t), . . . , xN (t)) xi k(t) ∼ N(µi = Ex(t){ Ji(t) k(t) } xi k(t) − µi σ2(t) k(t) xi k(t) − µi σ2(t) k(t), σ(t)), i ∈ [N ], k ∈ [d]}. (4) The following additional assumptions are needed for con- vergence of the proposed payoff-based algorithm to a Nash equilibrium (see proofs of Lemma 3 and Theorem 2). Proof: We verify that the differentiation under the integral sign in (3) is justified. It can then readily be verified that (4) holds, by taking the differentiation inside the integral. A sufficient condition for differentiation under the integral is that the integral of the formally differentiated function with respect to µi k converges uniformly, whereas the differentiated function is continuous (see [17], Chapter 17). By formally differentiating the function under the integral sign and omitting the arguments t, we obtain Ji(x)(xi k)p(µ, x, σ)dx. (5) 1 σ2 ZRN d k − µi k − µi Given Assumption 1, Ji(x)(xi k)p(µ, x, σ) is continuous. Thus, it remains to check that the integral of this function converges uniformly with respect to any µ ∈ RN d. To this end, we can write the Taylor expansion of the function Ji around the point µ(i, k) ∈ RN d with the coordinates µ(i, k)i k = µi k and µ(i, k)j m for any j 6= i, m 6= k, in the integral (5): k − µi [Ji(µ(i, k)) k)p(µ, x, σ)dx Ji(x)(xi m = xj ZRN d =ZRN d + =ZRN d =ZRN d ∂Ji(η(x, µ)) ∂xi k ∂Ji(η(x, µ)) ∂xi k ∂Ji(η1(y, µ)) ∂xi k k)p(µ, x, σ)dx (xi k − µi (xi k)](xi k − µi k)2p(µ, x, σ)dx k − µi k)2p(0, y, σ)dy, (yi where η(x, µ) = µ(i, k) + θ(x − µ(i, k)), θ ∈ (0, 1), y = x − µ(i, k), η1(y, µ) = µ(i, k) + θy. The uniform convergence of the integral above follows from the fact1 that, under Assumption 5, ∂Ji(η1(y,µ)) k for some positive constant li k and for all i ∈ [N ] and k ∈ [d]. Hence, ≤ li ∂xi k k)2p(0, y, σ) ≤ h(y) = l(yi (yi k)2p(0, y, σ), ∂Ji(η1(y, µ)) ∂xi k where RRN d h(y)dy < ∞. σ(t) = 1 Lemma (1) shows that the second term inside the projection in (2) is a sample of the gradient of the cost function in mixed strategies. Hence, algorithm (2) can be interpreted as a regularized stochastic projection algorithms. To bound the bias and variance terms of the stochastic projection and consequently establish convergence of the iterates µ(t), the parameters γ(t), σ(t), ǫ(t) need to satisfy certain assumptions. Assumption 6: Let β(t) = γ(t)σ2(t) and choose γ(t) = 1 ta , Theorem 2: Let limt→∞ ǫ(t) = 0, tc , a, b, c > 0 respectively, such that < ∞, t=0 β(t)σ(t) < ∞, t=0 β(t)ǫ(t) = ∞. tb and ǫ(t) = 1 a) P∞ t=0 β(t) = ∞, β(t)ǫ(t)(cid:17) ǫ(t−1)−ǫ(t)2 t=0(cid:16)1 + 1 b) P∞ c) P∞ t=0 γ2(t) < ∞, P∞ d) limt→∞ σ(t) = 0, P∞ the players in game Γ(N,{Ai},{Ji}) choose the states {xi(t)} at time t according to the normal distribution N(µi(t), σ(t)), where the mean µi(0) is arbitrary and µi(t) is updated as in (2). Under Assumptions 1-6, as t → ∞, the mean vector µ(t) converges almost surely to a Nash equilibrium µ∗ = a∗ of the game Γ and the joint state x(t) converges in probability to a∗. ǫ2(t) 1see the basic sufficient condition using majorant [17], Chapter 17.2.3. Remark 1: As an example for existence of parameters to 3 satisfy Assumption 6, let a = 5 9 , b = 5 27 , c = 1 27 . IV. ANALYSIS OF THE ALGORITHM To prove Theorem 2 we first prove boundedness of the iterates µ(t). Due to the regularization term ǫ(t), this is done by analyzing distance of µ(t) from the so-called Tikhonov trajectory. Having established this boundedness, we can read- ily show that the limit of the iterates µ(t) exists and sat- isfies the conditions of a Nash equilibrium of the game Γ(N,{Ai},{Ji}). For the boundedness and the convergence proofs, we use established results on boundedness ([8], The- orem 2.5.2) and convergence of a sequence of stochastic processes (Lemma 10 (page 49) in [10]), respectively. For ease of reference, we provide the statement of ([8], Theorem 2.5.2) and (Lemma 10 (page 49) in [10] ) in the appendix. A. Boundedness of the Algorithm Iterates We first show that algorithm (2) falls under the framework of well-studied Robbins-Monro stochastic approximations pro- cedures [1] with an additional regularization ǫ(t). Next, lever- aging this analogy and results on stability of discrete-time Markov processes ([8], Theorem 2.5.2) applied to the sequence µ(t) we prove boundedness of the iterates. Using the notation M i(·) = (Mi,1(·), . . . , Mi,d(·)), we can rewrite the algorithm step in (2) in the following form: µi(t + 1) = ProjAi [µi(t) − γ(t)σ2(t) ×(cid:0)M i(µ(t)) + Qi(µ(t), σ(t)) + Ri(µ(t), x(t), σ(t)) (6) + ǫ(t))µi(t)(cid:1), for all i ∈ [N ] Qi(µ(t), σ(t)) = M i(µ(t), σ(t)) − M i(µ(t)), Ri(x(t), µ(t), σ(t)) = F i(x(t), µ(t), σ(t)) − M i(µ(t), σ(t)), F i(x(t), µ(t), σ(t)) = Ji(t) xi(t) − µi(t) , σ2(t) and M i(·) = ( Mi,1(·), . . . , Mi,d(·))⊤ is the d-dimensional mapping with the following elements: Mi,k(µ(t), σ(t)) = ∂ Ji(µ(t), σ(t)) ∂µi k , for k ∈ [d]. (7) The vector M (µ(t)) = (M 1(µ(t)), . . . , M N (µ(t))) cor- responds to the gradient term in stochastic approximation procedures, whereas Q(µ(t), σ(t)) = (Q1(µ(t), σ(t)), . . . ,QN (µ(t), σ(t))) is a disturbance of the gradient term. Finally, R(x(t), µ(t), σ(t)) = (R1(x(t), µ(t), σ(t)), . . . , RN (x(t), µ(t), σ(t))) is a martingale difference, namely, according to (4), Ri(x(t), µ(t), σ(t)) = F i(x(t), µ(t), σ(t)) − Ex(t){F i(x(t), µ(t), σ(t))}, i ∈ [N ]. (8) To ensure boundedness of µ(t) (Lemma 3) we bound the martingale term above (see Inequality (23)). To bound the disturbance of the gradients Q(µ(t), σ(t)) (see Equation (20)), we observe that the mapping M i(µ(t)) evaluated at µ(t) is equivalent to the game mapping in mixed strategies (please see Appendix for the proof of this observation). That is, Proof: Define V (t, µ) = kµ − y(t − 1)k2, where y(t) is the Tikhonov sequence defined by (10). We consider the generating operator of the Markov process µ(t) LV (t, µ) = E[V (t + 1, µ(t + 1)) µ(t) = µ] − V (t, µ), and aim to show that LV (t, µ) satisfies the following decay 4 M i(µ(t)) =ZRN d M i(x)p(µ(t), x)dx. (9) In contrast to stochastic approximation algorithms and the proof in [15], we have an addition term ǫ(t)µ(t) to be able to address merely monotone game mappings. As such, to bound µ(t) we also relate the variations of the sequence µ(t) to those of the Tikhonov sequence defined below. Let y(t) = (y1(t), . . . , yN (t)) denote the solution of the varia- tional inequality V I(A, M (y) + ǫ(t)y), namely y(t) ∈ SOL(A, M (y) + ǫ(t)y). (10) The sequence {y(t)} is known as the Tikhonov sequence and enjoys the following two important properties. Theorem 3: (Theorem 12.2.3 in [9]) Under Assumptions 2, 3, and 4, y(t) defined in (10) exists and is unique for each t. Moreover, for ǫ(t) ↓ 0, y(t) is uniformly bounded and converges to the least norm solution of V I(A, M ). Lemma 2: (Lemma 3 in [6]) Under Assumption 2 ky(t) − y(t − 1)k ≤ My ǫ(t − 1) − ǫ(t) ǫ(t) , ∀t ≥ 1, With the results above in place, we connect the squared where My is a uniform bound on the norm of the Tikhonov sequence, i.e. ky(t)k ≤ My for all t ≥ 0. distance kµ− y(t)k2 to the squared distance kµ− y(t− 1)k2 for any µ ∈ A and t ≥ 1. Due to the triangle inequality, kµ − y(t)k ≤ kµ − y(t − 1)k + ky(t − 1) − y(t)k ≤ kµ − y(t − 1)k + My ǫ(t − 1) − ǫ(t) ǫ(t) , (11) where in the last inequality we used Lemma 2. Hence, by taking into account that for any a, b ∈ R and θ > 0 2ab ≤ θa2 + b2 θ , we conclude from (11) that for any θ > 0 (13) LV (t, µ) ≤ −α(t + 1)ψ(µ) + φ(t)(1 + V (t, µ)), where ψ ≥ 0 on RN d, φ(t) > 0, ∀t, P∞ 0, P∞ t=0 φ(t) < ∞, α(t) > t=0 α(t) = ∞. This enables us to apply Theorem 2.5.2 in [8] to directly conclude almost sure boundedness of µ(t). Let us bound the growth of V (t + 1, µ) in terms of V (t, µ). Let θ = β(t)ǫ(t) in (12). From Assumption 6 b), → 0 as t → ∞. Hence, ∀µ ∈ A (14) β(t)ǫ(t)(cid:17) ǫ(t−1)−ǫ(t)2 (cid:16)1 + 1 V (t + 1, µ) =kµ − y(t)k2 ǫ2(t) ≤(1 + β(t)ǫ(t))kµ − y(t − 1)k2 +(cid:18)1 + =O(1 + kµ − y(t − 1)k2) = O(1 + V (t, µ)). β(t)ǫ(t)(cid:19) M 2 y ǫ(t − 1) − ǫ(t)2 ǫ2(t) 1 From the procedure for the update of µ(t), the non- expansion property of the projection operator, the fact that y(t) belongs to SOL(A, M (y) + ǫ(t)y), namely, that ∀i ∈ [N ] yi(t) = ProjAi [yi(t) − β(t)(M i(y(t)) + ǫ(t)yi(t)], we obtain that for any i ∈ [N ] kµi(t + 1) − yi(t)k2 ≤ kµi(t) − yi(t) − β(t)(cid:2)ǫ(t)(µi(t) − yi(t)) + (M i(µ(t)) − M i(y(t)) + Qi(µ(t)) + Ri(x(t), µ(t))(cid:3)k2 = kµi(t) − yi(t)k2 − 2β(t)(M i(µ(t)) − M i(y(t)), µi(t) − yi(t)) − 2β(t)ǫ(t)(µi(t) − yi(t), µi(t) − yi(t)) − 2β(t)(Qi(µ(t)) + Ri(x(t), µ(t)), µi(t) − yi(t)) + β2(t)kGi(x(t), µ(t))k2, (15) where, for ease of notation, we have defined Gi(x(t), µ(t)) =ǫ(t)(µi(t) − yi(t)) + M i(µ(t)) − M i(y(t)) + Qi(µ(t)) + Ri(x(t), µ(t)). (16) kµ − y(t)k2 ≤(1 + θ)kµ − y(t − 1)k2 +(cid:18)1 + 1 θ(cid:19) M 2 y ǫ(t − 1) − ǫ(t)2 ǫ2(t) . (12) Our goal is to bound E{kµi(t+1)−yi(t)k2µ(t) = µ} above, and use this bound in constructing Inequality (13). As such, we expand Gi as below and bound the terms in the expansion. The above bound serves as the main new inequality in order to show almost-sure boundedness of kµ(t)k in comparison to non-regularized stochastic gradient procedures. Lemma 3: Let Assumptions 2-6 hold in Γ(N,{Ai},{Ji}) and µ(t) be the vector updated in the run of the payoff-based algorithm (6). Then, Pr{supt≥0 kµ(t)k < ∞} = 1. In the following, for simplicity in notation, we omit the ar- gument σ(t) in the terms M , Q, and R. In certain derivations, for the same reason we omit the time parameter t as well. kGi(x(t), µ(t))k2 = ǫ2(t)kµi(t) − yi(t)k2 + kM i(µ(t)) − M i(y(t))k2 + kQi(µ(t))k2 + kRi(x(t), µ(t))k2 + 2(Qi(µ(t)), Ri(x(t), µ(t))) + 2ǫ(t)(M i(µ(t)) − M i(y(t)), µi(t) − yi(t)) + 2(ǫ(t)(µi(t) − yi(t)) + M i(µ(t)) − M i(y(t)), Qi(µ(t)) + Ri(x(t), µ(t))), (17) Due to Assumption 4, we conclude that ikµ − y(t)k2 = O(V (t + 1, µ)) kM i(µ) − M i(y(t))k2 ≤ L2 ≤ O(1 + V (t, µ)), (M i(µ) − M i(y(t)), µi − yi(t)) ≤ kM i(µ) − M i(y(t))kkµi − yi(t)k ≤ O(1 + V (t + 1, µ)) ≤ O(1 + V (t, µ)), where in the last inequalities in (18)-(19) we used (14). Let us analyze the terms containing the disturbance of gradient, (18) (19) namely Qi, in Equation (17). Since Qi(µ(t)) = M i(µ(t)) − M i(µ(t)), due to Assumption 2 and Equation (9), we obtain kQi(µ)k = kZRN d [M i(x) − M i(µ)]p(µ, x)dxk ≤ZRN d kM i(x) − M i(µ)kp(µ, x)dx ≤ZRN d Likx − µkp(µ, x)dx Li N ≤ZRN d Xi=1 Xi=1 xi k − µi Xk=1 = O( σ), k! p(µ, x)dx N d (20) where the last equality is due to the fact the first central absolute moment of a random variable with a normal distribution N(µ, σ) is O(σ). The estimation above and (14) imply, in particular, that for any µ ∈ A that N σ)(1 + V (t, µ)) Xi=1 kQi(µ)kkµi − yi(t)k ≤ O( kQi(µ)kkMi(µ) − Mi(y(t))k ≤ LikQi(µ)kkµ − y(t)k Xi=1 ≤ O( σ)(1 + V (t, µ)). N (21) (22) Finally, we bound the martingale term kRi(x(t), µ(t))k2. d E{kRi(x(t), µ(t))k2µ(t) = µ} k(t))2 Xk=1ZRN d ≤ k − µi σ4(t) 2(x) (xi Ji fi(µ, σ(t)) O(1 + V (t, µ)) ≤ σ4(t) ≤ σ4(t) p(µ, x)dx , (23) where the first inequality is due to the fact that E(ξ − Eξ)2 ≤ Eξ2 and taking into account (8), the second inequality is due to Assumption 5, with fi(µ, σ(t)) being a quadratic function of µ and σ(t), i ∈ [N ]. Bringing the inequalities (18)-(23) in the inequality (15), taking into account (14), the Cauchi- Schwarz inequality, and the martingale properties in (8) of Ri, i ∈ [N ], we get E{kµi(t + 1) − yi(t)k2µ(t) = µ} ≤ (1 − 2β(t)ǫ(t))kµi − yi(t)k2 − 2β(t)(M i(µ) − M i(y(t)), µi − yi(t)) − 2β(t)(Qi(µ), µi − yi(t)) + β2(t)E{kGi(x(t), µ)k2µ(t) = µ} ≤ (1 − 2β(t)ǫ(t))kµi − yi(t)k2 − 2β(t)(M i(µ) − M i(y(t)), µi − yi(t)) + 2β(t)O( σ(t))(1 + V (t, µ)) N Xi=1 + O(γ2(t))(1 + V (t, µ)), 5 (24) where in the last inequality we used the fact that ǫ(t) → 0 (Assumption 6 a)), γ(t) → 0, and σ(t) → 0 for all i ∈ [N ] as t → ∞ (Assumption 6 c), d)). Thus, taking into account Assumption 6 c), d) and (24), we obtain N E[kµi(t + 1) − yi(t)k2µ(t) = µ] E[kµ(t + 1) − y(t)k2µ(t) = µ] Xi=1 = ≤(1 − 2ǫ(t)β(t))kµ − y(t)k2 − 2β(t)(M (µ) − M (y(t)), µ − y(t)) + O(β(t)σ(t) + γ2(t))(1 + V (t, µ)). (25) Using the first inequality in (14), we get LV (t, µ) = E[kµ(t + 1) − y(t)k2µ(t) = µ] − kµ − y(t − 1)k2 ≤ E[kµ(t + 1) − y(t)k2µ(t) = µ] β(t)ǫ(t)(cid:17) ǫ(t−1)−ǫ(t)2 y(cid:16)1 + 1 kµ − y(t)k2 − M 2 1 + β(t)ǫ(t) ǫ2(t) − . (26) We conclude from (26) and (25) that LV (t, µ) ≤(cid:18)1 − 2ǫ(t)β(t) − − 2β(t)(M (µ) − M (y(t)), µ − y(t)) 1 1 + ǫ(t)β(t)(cid:19)kµ − y(t)k2 + h(t)(1 + V (t, µ)) ≤ −2β(t)(M (µ) − M (y(t)), µ − y(t)) + h(t)(1 + V (t, µ)), where h(t) =O(β(t)σ(t) + γ2(t)) + O(cid:18)(cid:18)1 + 1 β(t)ǫ(t)(cid:19) ǫ(t − 1) − ǫ(t)2 ǫ2(t) (27) (cid:19) , (28) and the second inequality above is due to the fact that (1 − 2ǫ(t)β(t))(1 + ǫ(t)β(t)) ≤ 1. account this, (27), and monotonicity of M implying According to Assumption 6 b)-c), P∞ more, from Assumption 6 a) P∞ (M (µ) − M (y(t)), µ − y(t)) ≥ 0, ∀t, ∀µ ∈ A, t=0 h(t) < ∞. Further- t=0 β(t) = ∞. Taking into (29) we conclude that LV (t, µ) satisfies the decay needed for the application of Theorem 2.5.2 in [8] and consequently, µ(t) is finite almost surely for any t ∈ Z+ irrespective of µ(0). B. Convergence of the Algorithm Fortunately, the derivations in the previous section in prov- ing boundedness of the iterates can be used to also prove convergence of the algorithm. In particular, we use Inequality (25), which bounds the decay of the sequence E[kµ(t + 1) − y(t)k2µ(t)] in terms of kµ − y(t)k2. We can show that this decay satisfies the conditions for applying Lemma 10 in [10]. From this, it can readily be inferred that random variables kµ(t)−y(t−1)k converge to zero. In essence, the approach is similar to showing that V (t, µ) serves as a stochastic Lyapunov function for the sequence of random variables. Proof: (of Theorem 2) First, rewrite (25) as follows: E[kµ(t + 1) − y(t)k2Ft] ≤(1 − 2ǫ(t)β(t))kµ(t) − y(t)k2 + O(γ2(t) + β(t)σ(t))(1 + V (t, µ(t))) (30) ≤(1 − 2ǫ(t)β(t))kµ(t) − y(t)k2 + O(γ2(t) + β(t)σ(t)) ≤(1 − 2ǫ(t)β(t))(1 + ǫ(t)β(t))kµ(t) − y(t − 1)k2 + O(h(t)) ≤(1 − ǫ(t)β(t))kµ(t) − y(t − 1)k2 + O(h(t)), where Ft is the σ-algebra generated by the random variables {x(k), µ(k)}t k=0 and h(t) is defined in (28). In (30) to get the first inequality we used (29), to get the second inequality we used Lemma 3, namely the fact that µ(t) is almost surely bounded for all t ∈ Z+, to get the third inequality we used (14), and to get the last inequality we used the fact that (1 − 2ǫ(t)β(t))(1 + ǫ(t)β(t)) < (1 − ǫ(t)β(t)). From Assumption 6, and the choices of γ(t), σ(t), ǫ(t), we get O(h(t)) = 1 tm , with l > 1, m ≤ 1. Thus, tl , ǫ(t)β(t) = 1 lim t→∞ O(h(t)) ǫ(t)β(t) = 0. Assumption 6 d), the fact that P∞ t=0 h(t) < ∞ and the above result in the decay (30) imply that we can apply Lemma 10 in [10] to the sequence kµ(t + 1) − y(t)k2 to conclude its almost sure convergence to 0 as t → ∞. Next, by taking into account Theorem 3 and Theorem 1, we obtain that t→∞ is µ(t) = a∗} = 1, Pr{ lim where a∗ the least norm Nash equilibrium in the game Γ(N,{Ai},{Ji}). Finally, Assumption 6 implies that limt→∞ σ(t) = 0. Taking into account that x(t) ∼ N(µ(t), σ(t)), we conclude that x(t) converges weakly to a Nash equilibrium a∗ = µ∗. Moreover, according to Portman- teau Lemma [5], this convergence is also in probability. V. SIMULATION RESULTS As noted in the introduction, the work [4] provides a counterexample showing that the class of gradient-based pro- cedures proposed in [16] and [15] fail to converge to a Nash equilibrium, if the game mapping is merely monotone. In this section, we demonstrate that the inclusion of the Tikhonov regularization term in algorithm [15] rectifies this issue. In particular, the payoff-based algorithm proposed here converges to the Nash equilibrium in the game under consideration. 6 Following the discussion in [4], we consider the game with 2 players, whose action sets are 1-dimensional sets A1 = A2 = [−1, 1] and the cost functions are J1(a1, a2) = a1a2 and J2(a1, a2) = −a1a2 respectively. It can be verified that the game mapping M (a1, a2) = (a2,−a1) is monotone and the unique Nash equilibrium in this game is a∗ = (0, 0). By implementing the payoff-based algorithm (6) with randomly chosen initial values µ1(0) and µ2(0) and the parameters γ(t), σ(t), and ǫ(t) set up according to Remark 1, we obtain the updates for the mean values µ1(t) and µ2(t) of the players, presented in Figure 1. As we can see, the procedure ensures the means arrive at a sufficiently small neighborhood of the Nash equilibrium after approximately 900 iterations and continue approaching it in its further run. 1 0.8 0.6 0.4 0.2 0 -0.2 -0.4 -0.6 0 1 2 500 1000 time 1500 2000 Fig. 1. The mean values for µ1 and µ2 based on Procedure (2). VI. CONCLUSIONS We proposed a payoff-based algorithm for learning Nash equilibria in convex games with monotone game mappings. Our algorithm relied on a suitable regularization to handle monotonicity. The convergence proof relied on the analysis of the Tikhonov sequence related to the regularization and well-established results on boundedness and convergence of stochastic processes. Our current work addresses establishing convergence rate of the algorithm under suitable assumptions. REFERENCES [1] B. Bharath and V. S. Borkar. Stochastic approxima- tion algorithms: Overview and recent trends. Sadhana, 24(4):425 -- 452, 1999. [2] L. E. Blume. The statistical mechanics of strategic interaction. Games and economic behavior, 5(3):387 -- 424, 1993. [3] P. Frihauf, M. Krstic, and T. Basar. Nash equilibrium seeking in noncooperative games. IEEE Transactions on Automatic Control, 57(5):1192 -- 1207, 2012. [4] S. Grammatico. Comments on "distributed robust adaptive equilibrium computation for generalized con- vex games [automatica 63(2016) 82-91)". Automatica, 97:186 -- 188, 2018. [5] A. Klenke. Probability theory: a comprehensive course. Springer, London, 2008. [6] J. Koshal, A Nedi´c, and U. Shanbhag. Single timescale regularized stochastic approximation schemes for mono- tone nash games under uncertainty. In IEEE Conference on Decision and Control, pages 231 -- 236, 2010. [7] J. R. Marden and J. S. Shamma. Revisiting log- linear learning: Asynchrony, completeness and payoff- based implementation. Games and Economic Behavior, 75(2):788 -- 808, 2012. [8] M. B. Nevelson and R. Z. Khasminskii. Stochastic approximation and recursive estimation. American Math- ematical Society, 1973. [9] J.-S. Pang and F. Facchinei. Finite-dimensional varia- tional inequalities and complementarity problems : vol. 1. Springer series in operations research. Springer, New York, Berlin, Heidelberg, 2003. [10] B. T. Poljak. Introduction to optimization. Optimization Software, 1987. [11] B. Pradelski and H. P. Young. Learning efficient Nash equilibria in distributed systems. Games and Economic behavior, 75(2):882 -- 897, 2012. [12] J. S. Shamma and G. Arslan. Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria. IEEE Transactions on Automatic Con- trol, 50(3):312 -- 327, March 2005. [13] M. S Stankovic, K. H. Johansson, and D. M. Stipanovic. Distributed seeking of Nash equilibria with applications to mobile sensor networks. IEEE Transactions on Auto- matic Control, 57(4):904 -- 919, 2012. [14] T. Tatarenko. Stochastic payoff-based learning in multi- agent systems modeled by means of potential games. In IEEE Conference on Decision and Control, pages 5298 -- 5303, 2016. [15] T. Tatarenko and M. Kamgarpour. Learning generalized IEEE to appear. nash equilibria in a class of convex games. Transactions on Automatic Control, 2018. URL: https://arxiv.org/abs/1703.04113. [16] M. Zhu and E. Frazzoli. Distributed robust adaptive equilibrium computation for generalized convex games. Automatica, 63:82 -- 91, 2016. [17] V.A. Zorich and R. Cooke. Mathematical Analysis II. Mathematical Analysis. Springer, 2004. A. Supporting Theorems APPENDIX Let {X(t)}t, t ∈ Z+, be a discrete-time Markov process on some state space E ⊆ Rd, namely X(t) = X(t, ω) : Z+ × Ω → E, where Ω is the sample space of the probability space on which the process X(t) is defined. The transition function of this chain, namely Pr{X(t+1) ∈ ΓX(t) = X}, is denoted by P (t, X, t + 1, Γ), Γ ⊆ E. Definition 4: The operator L defined on the set of measur- able functions V : Z+ × E → R, X ∈ E, by LV (t, X) =Z P (t, X, t + 1, dy)[V (t + 1, y) − V (t, X)] = E[V (t + 1, X(t + 1)) X(t) = X] − V (t, X), is called a generating operator of a Markov process {X(t)}t. 7 Next, we formulate the following theorem for discrete-time Markov processes, which is proven in [8], Theorem 2.5.2. Theorem 4: Consider a Markov process {X(t)}t and sup- there exists a function V (t, X) ≥ 0 such that pose that inf t≥0 V (t, X) → ∞ as kXk → ∞ and LV (t, X) ≤ −α(t + 1)ψ(t, X) + f (t)(1 + V (t, X)), where ψ ≥ 0 on R× Rd, f (t) > 0, P∞ t=0 f (t) < ∞. Let α(t) be such that α(t) > 0, P∞ t=0 α(t) = ∞. Then, almost surely supt≥0 kX(t, ω)k = R(ω) < ∞. The following result related to the convergence of the stochastic process is proven in Lemma 10 (page 49) in [10]. Theorem 5: Let v0, . . . , vk be a sequence of random vari- ables, vk ≥ 0, Ev0 < ∞ and let E{vk+1Fk} ≤ (1 − αk)vk + βk, where Fk is the σ-algebra generated by the random variables k=0 αk = ∞, βk ≥ 0, = 0. Then vk → 0 almost surely, {v0, . . . , vk}, 0 < αk < 1, P∞ P∞ k=0 βk < ∞, limk→∞ Evk → 0 as k → ∞. βk αk B. Verification of Equation (9) We will show that the mapping M i(µ(t), σ(t)) (see (7)) evaluated at µ(t) is equivalent to the extended game mapping: M i(µ(t)) =ZRN d M i(x)p(µ(t), x)dx. 1 p(µi −k) = −k, xi k−1, µi k−1, xi 1, . . . , µi 1, . . . , xi k−1, . . . µi k−1, . . . xi µi −k = (µi xi −k = (xi Note that for simplicity in notation, we drop the dependence on σ(t) and on t. Now, using the notations d) ∈ Rd−1, d) ∈ Rd−1, exp (xi −Xj6=k  exp(− i   (xj k − µj k)2 2σ2 j (√2πσi)d−1 p(µ−i, x−i) = (√2πσj)d Yj6=i,j=1 Xk=1 we have that for any i ∈ [N ], k ∈ [d], Mi,k(η) Mi,k(µ) = ∂ Ji(µ(t), σ(t)) j − µi 2σ2 ) , j)2 1 N d ∂µi k = 1 σ2 i ZRN d = −ZRN d Ji(x)(xi k)p(µ, x)dx k − µi −k, xi Ji(x)p(µi −k)p(µ−i, x−i) 1 √2πσi − × d e (xi k −µi 2σ2 k )2 i ! dx−i = −ZRN d−1 Ji(x)e × p(µi −k, xi (xi − k −µi 2σ2 k) ∞(xi k )2 i !(cid:12)(cid:12)(cid:12)(cid:12) −∞(xi k) −k)p(µ−i, x−i) 1 √2πσi dx−i +ZRN d ∂Ji(x) ∂xi k p(µ, x)dx =ZRN d ∂Ji(x) ∂xi k p(µ, x)dx. (31) In the above, for the second equality, we used Lemma (1) to enable differentiation under the integral and for the last equality, we used the fact that according to Assumption 5, 8 − (xi k )2 k −µi 2σ2 i = 0, lim Ji(x)e xi k→∞(−∞) k, x−i. Now, by definition of M i(x), we have for any fixed µi that ZRN d ∂Ji(x) ∂xi k p(µ, x)dx =ZRN d as desired. M i(x)p(µ(t), x)dx,
1611.06413
1
1611
2016-11-19T18:57:05
Formalizing Multi-Agent Systems Using Action Descriptions in Single Agent Perspective
[ "cs.MA", "cs.LO" ]
Logic-based representations of multi-agent systems have been extensively studied. In this work, we focus on the action language BC to formalize global views of MAS domains. Methodologically, we start representing the behaviour of each agent by an action description from a single agent perspective. Then, it goes through two stages that guide the modeler in composing the global view by first designating multi-agent aspects of the domain via potential conflicts and later resolving these conflicts according to the expected behaviour of the overall system. Considering that representing single agent descriptions is relatively simpler than representing multi-agent description directly, the formalization developed here is valuable from a knowledge representation perspective.
cs.MA
cs
Formalizing Multi-Agent Systems Using Action Descriptions in Single Agent Perspective Orkunt Sabuncu1,2 Torsten Schaub1 Christian Schulz-Hanke1 1 University of Potsdam, Germany 2 NOVA LINCS, Universidade Nova de Lisboa, Portugal Abstract. Logic-based representations of multi-agent systems have been exten- sively studied. In this work, we focus on the action language BC to formalize global views of MAS domains. Methodologically, we start representing the be- haviour of each agent by an action description from a single agent perspective. Then, it goes through two stages that guide the modeler in composing the global view by first designating multi-agent aspects of the domain via potential con- flicts and later resolving these conflicts according to the expected behaviour of the overall system. Considering that representing single agent descriptions is rel- atively simpler than representing multi-agent description directly, the formaliza- tion developed here is valuable from a knowledge representation perspective. 1 Introduction Logic-based representations of multi-agent systems (MAS) have been extensively stud- ied. Well-defined semantics of such representations allow for carrying out various rea- soning tasks about MAS. Action languages [1] are among these representations of MAS. They have been successfully applied to represent and reason not only on sin- gle agent [2,3] but also multi-agent domains [4,5,6]. In this work, we focus on the action language BC [7] to formalize MAS domains. More specifically, the formalization deals with the global view of MAS domains, which captures all knowledge about environment and capabilities of agents. It is basically modelled as a transition diagram whose vertices and edges denote states of the domain and sets of agents' actions occurring concurrently, respectively. Unlike earlier works [5,6,8], where the modeler is expected to encode the global view using an action language from scratch, our formalization takes action descriptions of each agent from a single agent perspective as input and goes through two stages focusing on different aspects of the domain. Note that representing an action description of an agent with a local perspective is relatively easier than representing the whole multi-agent domain directly due to interacting concurrent actions. The first stage in our methodology establishes an intermediate action description that covers all valid states of the global view and identifies cases of the domain where actions of agent interact and have effects that are invisible from a single agent perspective. To this end, we use potential conflict to specify such cases formally. The second stage addresses identified potential conflicts by resolving them so that corresponding concurrent actions have the desired effect in the environment of the domain. The resolution is achieved via defeating involved dynamic laws of the intermediate description. This is possible via a syntactic transformation that makes dynamic laws of an action description defeasible. Formal properties of this transformation are given and the existence of a resolution at the second stage is proved. The resulting action description represents the transition diagram corresponding to the global view of the MAS domain. The action language BC can express defeasible laws. This capacity is crucial for our formalization and has been our main motivation in selecting BC as the underlying action language. The formalization, which is the novel contribution of this work, guides the modeler and structures her efforts by making multi-agent aspects of the domain explicit. To the best of our knowledge, such a methodology has not been explicitly defined and employed before. While the scope of this work focuses on the global view of a MAS domain, it is important to emphasize that real agents residing in the environment may have autonomy via their own local view exhibiting a behaviour different than the one represented by the agent description from a single agent perspective used in the methodology. In fact they can utilize their own strategies on how to behave and even try to perform illegal actions. It is up to the MAS architecture utilizing this global view to react to these illegal actions (by simply discarding them or issuing an execution failure). In what follows, we provide background information on the action language BC. We also illustrate an action description describing a single Sumo agent, which is the base of the running example used throughout the paper. In Section 3, we describe our methodology of formalizing MAS with two stages. Finally, we conclude the paper with discussion that also includes future lines of research in Section 4. 2 Background We give below syntax and semantics of the Boolean fragment of slightly modified action language BC, as introduced in [7]. We consider a signature of Boolean action and fluent symbols, denoted by A and F, respectively. In what follows, we simply refer to them as actions and fluents. Fluents are further divided into regular and defined fluents. A defined fluent is useful for repre- senting a property that is statically determined in terms of other fluents. A fluent literal is a fluent a or its negation ¬a. Similarly, an action literal is an action c or its negation ¬c. A static law is an expression of the form a0 if a1, . . . , am ifcons am+1, . . . , an (1) where ai is a fluent literal for 0 ≤ m ≤ n; a dynamic law is an expression of the form a0 after a1, . . . , am ifcons am+1, . . . , an (2) where a0 is a regular fluent literal, each of a1, . . . , am is a fluent or action literal, and am+1, . . . , an are fluent literals. An action description is a finite set of of static and dynamic laws. The ifcons part of a law is important for representing defaults. Various abbreviations, such as impossible, nonexecutable, inertial, and default laws, are use- ful for developing succinct action descriptions. They can be rewritten in terms of static and dynamic laws (refer to [7] for their definitions). The semantics of action descriptions is given in terms of transition systems induced by a translation into logic programs under stable models semantics [9]. To be more precise, an action description D and a horizon l yield a program Pl(D) whose stable models represent all paths of length l in the transition system corresponding to D. The signature of each program Pl(D) consists of labeled expressions of the form i : a, where i ≤ l and a is a fluent literal, or i < l and a is an action literal. As defined in [7], each program Pl(D) consists of the following rules 1. for each static law of form (1) in D and i ≤ l a rule of form i : a0 ← i : a1, . . . , i : am, not not i : am+1, . . . , not not i : an (3) 2. for each dynamic law of form (2) in D and i < l a rule of form (i+1) : a0 ← i : a1, . . . , i : am, not not (i + 1) : am+1, . . . , not not (i + 1) : an (4) 3. for each regular fluent f in D a choice rule of form 4. for each action a in D and i < l a choice rule of form {0 : f, 0 : ¬f } {i : a} 5. for each fluent f in D and i ≤ l an integrity constraint of form 6. for each action a in D and i < l a rule of form ← {i : f, i : ¬f } 6= 1 i : ¬a ← not i : a (5) (6) (7) (8) For a set X of labeled expressions and i ≥ 0, define Xi = {a i : a ∈ X} The transition system (S(D), T (D)) induced by an action description D is then defined as follows. 3 S(D) = {X0 X is a stable model of P0(D)} T (D) = {hX0 ∩ L, X0 ∩ A, X1i X is a stable model of P1(D)} (9) (10) where L = F ∪ {¬f f ∈ F} Note that unlike the logic program used for semantics of BC in [7] we name unper- formed actions by explicitly generating negative action literals in (8) and consequently allow negative action literals in the after part of a dynamic law. This is critical in a 3 Note that X1 = X1 ∩ L. multi-agent setting to represent situations where an agent does not perform a specific action. Such a case is illustrated using the running example in Section 3. For illustration, consider a (single) Sumo agent in a ring divided into l horizontal slots. A Sumo can move left or right to adjacent slots in the ring, and may drop out at each end. We capture this through fluents at (A, L), out (A) and actions left (A), right (A), respectively, where the variable A stands for an agent identifier4 and L, L′ ∈ {1, . . . , l}. The behavior of our simple Sumo agent in an l slot ring is represented by the follow- ing action description, composed of static laws (11) -- (14) and dynamic laws (15) -- (21), respectively. ¬at (A, L) if at (A, L′) ¬out (A) if at(A, L) ¬at (A, L) if out (A) impossible ¬at (A, 1), . . . , ¬at (A, l), ¬out (A) at (A, L) after left (A), at (A, L′) at (A, L) after right (A), at (A, L′) out(A) after left (A), at (A, 1) out(A) after right (A), at (A, l) nonexecutable left (A) if out (A) nonexecutable right (A) if out (A) inertial at (A, L), out(A) (L 6= L′) (L = L′ − 1) (L = L′ + 1) (11) (12) (13) (14) (15) (16) (17) (18) (19) (20) (21) Instantiating this action description with an agent a moving in a two-slot ring where l = 2 yields a transition system with three states; s1 = {at(a, 1), ¬at (a, 2), ¬out (a)}, s2 = {¬at (a, 1), at (a, 2), ¬out (a)}, and s3 = {¬at(a, 1), ¬at (a, 2), out (a)}, along with four transitions hs1, {right (a)}, s2i, hs2, {left (a)}, s1i, hs1, {left (a)}, s3i, and hs2, {right (a)}, s3i. 3 Foundations We consider a set A of agents whose actions are governed by an environment. We formalize such multi-agent systems by means of action descriptions in BC, one for each agent in A and descriptions capturing their interplay. Our formalization has two stages, which will be described in the following two subsections. The first one focuses on designating aspects of the domain that do not show up from a single-agent perspective but arise once there are multiple agents. In the second stage, all these aspects are handled so that we get a global view of the overall multi-agent system. To be more precise, the signature of a multi-agent system (A, c, r) consists of ac- tions A and fluents F. Each agent a ∈ A is represented by an action description Da 4 Strictly speaking, agent identifiers are obsolete in a single-agent environment but their intro- duction paves the way for the multi-agent setting in the next section. over Aa ⊆ A and Fa ⊆ F such that Aa ∩ Aa′ = ∅ for all a 6= a′. That is, while agents may share fluents, their actions are distinct. Each action description represents the correct behavior of an agent within the environment from a single-agent perspective -- specific agents may or may not behave accordingly. Components c and r are repre- sented by action descriptions Dc and Dr over A and F, respectively. They correspond to the first and second stage in our methodology respectively. While the role of the component c is identifying potential conflicts, the role of r is resolving such conflicts. 3.1 Identifying potential conflicts (the first stage) Let us extend our previous example with a second Sumo b. This results in two action descriptions Da and Db, which are composed of laws (11) -- (21) only differing in the used agent identifier, viz. a and b, respectively. Both Sumos can thus move left or right to adjacent slots in the ring and drop out at each end. Also, there can only be one Sumo in a slot at a time. A Sumo who moved or is pushed out of the ring cannot return. It can, however, resist a moving opponent by moving in the reverse direction. This results in both Sumos staying in their previous slots. Similarly, if both Sumos want to move to the same slot at the same time, they bounce back and stay in their previous slots. The mere union of all action descriptions capturing single agents in A may lack some valid states of the multi-agent system. One role of component c is to rectify this via action description Dc. In particular, it may be necessary for the action description Dc to defeat some of the static laws of single agent descriptions. To this end, we turn static laws of single agent descriptions into default rules by introducing abnormality fluents. Definition 1. Let D be an action description in BC. Then, we define τ (D) as the result of 1. replacing each static law of form (1) in D by a0 if a1, . . . , am ifcons am+1, . . . , an, ¬ab(a0) 2. adding for each defined fluent ab(a0) introduced in (22) a rule of form 3. copying each dynamic law without change. default ¬ab(a0) (22) (23) At the end of the first stage of our formalization of the global view of a multi-agent system, we get the intermediate action description: U(A,c) = [ τ (Da) ∪ Dc a∈A In our Sumo example, we do not need to defeat any static laws since the union of all sin- gle agent descriptions does not lack any states of the multi-agent system. In Section 3.3 we give an example domain where the component c has to defeat some static laws to generate some previously lacking valid states of U(A,c). Apart from lacking states, the mere union of agent action descriptions is prone to in- valid states and transitions from a multi-agent perspective. For instance, the union of ac- tion descriptions Da and Db tolerates both Sumos in the same slots, as manifested by the states {at(a, L), at (b, L)}. Also, it permits both Sumos passing through each other, ex- hibited by the transition h{at (a, 2), at (b, 3)}, {right(a), left (b)}, {at(a, 3), at(b, 2)}i. Such invalid states and transitions must be ruled out by appropriate laws in Dc to gov- ern the interplay of Da and Db. Consider the action description Dc consisting of the laws in (24) and (25). ¬at (A, L) if at (A′, L) nonexecutable right (A), left (A′) if at (A, L), at (A′, L + 1) (A 6= A′) (A 6= A′) (24) (25) The action description U(A,c) induces 21 states. The part of the transition system where Sumo a is left of b is given in Figure 1. Note that ab fluents introduced by the transformation τ are statically defined and they are false by default due to law (23). Since there are no laws in Dc causing an ab fluent to be true in the Sumo example, there are no states of U(A,c) in which an ab fluent holds. Fig. 1. A part of the transition system of the union of action descriptions. Self loops with ∅ compound action are omitted for clearance. lx and rx abbreviate left(x) and right (x). s5 a b ra, rb la, lb s2 a b rb la lb la, rb ra, lb ra lb lb s1 la a b s6 a b la, lb ra, rb rb la ra a b s3 rb la, lb ra ra, rb a b s4 The other role of component c, as stated at the beginning of this section, is to desig- nate aspects of the domain regarding the interplay of multiple agents in the environment. To this end, we first define the notion of potential conflict to cover such multi-agent as- pects. A potential conflict is a compound action that cannot be executed in a state in view of the laws of an action description. Definition 2. Let D be an action description in BC, (S(D), T (D)) the corresponding transition system, and s ∈ S(D). We define a potential conflict in s and D as χD(s) = {c ⊆ A there exists no s′ ∈ S(D) s.t. hs, c, s′i ∈ T (D)} . In our running example, there are basically 3 cases of such multi-agent aspects of the domain: (i) a Sumo can push another Sumo, (ii) Sumos can resist a push by moving in the reverse direction, and (iii) two Sumos bounce back when they want to move to the same slot at the same time. The description Dc composed of laws (24) and (25) already identifies all potential conflicts corresponding to these 3 cases. For some representative potential conflicts of (ii) and (iii) case, consider the compound action {right (a), left (b)}. While it can be used to switch from s1 to s2, it cannot be used to leave any other state in Figure 1. A transition with this compound action is ruled out in states s5, s2, and s6 by (25) and in s3 and s4 by (24). Clearly, we have {right (a), left (b)} ∈ χU({a c) (s) for s = s2, . . . , s6. Additionally, for the first case, we observe that {right (a)} ∈ χU({a c) (s) for s = s2, s5, s6. c)(s) and {left (b)} ∈ χU({a b}, b}, , b}, , , 3.2 Resolving potential conflicts (the second stage) The first stage of our formalization ends with identifying potential conflicts. Such con- flicts are inadmissible in a multi-agent setting. It should be allowed for the individual agents to perform the corresponding compound action. The second stage is about pre- venting identified conflicts that are related to the multi-agent aspects of the domain from becoming actual conflicts. The role of the conflict resolution component r in the multi-agent system (A, c, r) is to rectify this. To this end, the action description Dr has to defeat some of the dynamic laws of U(A,c). Similar to the transformation τ, we turn dynamic laws of the description U(A,c) into default rules by introducing an abnormality fluent using the transformation β. Definition 3. Let D be an action description in BC. Then, we define β(D) as the result of 1. replacing each dynamic law of form (2) in D by a0 after a1, . . . , am ifcons am+1, . . . , an, ¬ab ′(a0) 2. adding for each fluent ab ′(a0) introduced in (26) a rule of form 3. copying each static law without change. default ¬ab ′(a0) (26) (27) Note that unlike transformation τ, abnormality fluents introduced in β are regular flu- ents. This allows the modeler to use such fluents in heads of dynamic laws in Dr. At the end of the second stage of the formalization we get the global view of the overall multi-agent system represented by the action description: M(A,c,r) = β(U(A,c)) ∪ Dr Before illustrating the resolution step for our running example, we analyze the prop- erties of transformation β and action description Dr. Due to Lemma 1, we can be sure that potential conflicts of U(A,c) are preserved after applying β. Lemma 1. Let D be an action description in BC. c ∈ χD(s) iff c ∈ χ β(D)(s∗) where s ⊆ s∗ and s∗ \ s has either ab′ or ¬ab′ for each ab′ fluent introduced in β(D) and no other literal. Although the modeler knows that potential conflicts identified in the first stage of the formalization are preserved by β, she is not guided on the structure of laws needed in Dr in order to resolve a conflict. To remedy this situation, we define a condition of a dynamic law being covered by a compound action at a state. Definition 4. A dynamic law of the form (2) in D is covered by compound action c at state s ∈ S(D) iff for all 1 ≤ i ≤ m (i) ai ∈ c when ai is a positive action literal, (ii) ai 6∈ c when ai is a negative action literal, and (iii) ai ∈ s when ai is a fluent literal. Furthermore, Lemma 2 shows that laws of Dr needed for resolving a potential con- flict must be dynamic laws that are covered by the related compound action and the state. When the compound action and state are clear from the context, we may only use the statement that a law is covered. Lemma 2. Let D be an action description in BC over actions A. Given a compound action c ⊆ A and a state s ∈ S(D), hs, c, s′i ∈ T (D) iff hs, c, s′i ∈ T (D′) where D′ is equal to D except all its dynamic laws not covered by c at s are taken out. For resolving a potential conflict, the modeler has to encode covered dynamic laws in Dr. Basically, some laws in Dr should first defeat dynamic laws of β(U(A,c)) caus- ing contradictory effects w.r.t. the desired successor state . Then additional laws in Dr generate effect fluent literals that are previously not possible. We illustrate this method- ology using our running example. Consider the potential conflict related to two Sumos trying to move to the same slot at the same time for the state s4 in Figure 1, i.e., {right (a), left (b)} ∈ χU({a c)(s4). Considering instances of dynamic laws (15), (16), and (21), the laws (28) -- (31) in β(U(A,c)) are covered by {right (a), left (b)} at s4. b}, , at (a, 3) after right (a), at (a, 2) ifcons ¬ab ′(at (a, 3)) at (b, 3) after left (b), at (b, 4) ifcons ¬ab ′(at (b, 3)) at (a, 2) after at(a, 2) ifcons at (a, 2), ¬ab ′(at (a, 2)) at (b, 4) after at (a, 4) ifcons at (b, 4), ¬ab ′(at (b, 4)) (28) (29) (30) (31) Since Sumos bounce back in this case, effect fluents at (a, 3) and at(b, 3) do not hold in the desired successor state. Hence, we need to defeat the laws (28) and (29) by causing abnormality fluents ab ′(at (a, 3)) and ab ′(at (b, 3)) to be true in order to resolve the potential conflict. In the general case, laws (32) and (33) in Dr cause these abnormality fluents and resolve all potential conflicts related to Sumos trying to move to the same slot at the same time. Considering these potential conflicts, notice that laws (32) and (33) are covered by respective compound actions at respective states as formally stated in Lemma 2. ab ′(at (A, L + 1)) after right (A), left (A′), at (A, L), at (A′, L + 2), ¬left (A), ¬right (A′) (A 6= A′) ab ′(at (A′, L + 1)) after right (A), left (A′), at (A, L), at (A′, L + 2), ¬left (A), ¬right (A′) (A 6= A′) (32) (33) Next, we resolve the potential conflicts related to a Sumo pushing another Sumo. For example, consider {right (a)} ∈ χU({a c)(s2). In such a case, at the desired successor state the pushed Sumo moves one slot in the direction of push (and maybe pushed out of the ring if he is at a border slot). Dynamic laws (34) -- (37) in Dr resolve such potential conflicts. b}, , at (A′, L + 2) after at (A, L), at (A′, L + 1), right (A), ¬left (A′) (A 6= A′, L + 1 < 4) at (A, L − 1) after at(A, L), at (A′, L + 1), left (A′), ¬right (A) (A 6= A′, L > 1) out (A′) after at (A, L), at (A′, L + 1), right (A), ¬left (A′) (A 6= A′, L = 3) out (A) after at (A, L), at (A′, L + 1), left (A′), ¬right (A) (A 6= A′, L = 1) (34) (35) (36) (37) Note that unlike the previous case, we have not defeated some covered laws by explic- itly causing some ab′ fluents to be true. Actually, related literals in the successor state caused by laws (34) -- (37) defeat contradictory covered laws (in this case laws of intertia for the pushed Sumo) via indirect effects. The last case concerns the potential conflicts related to two Sumos trying to push each other at the same time. In the successor state Sumos should be in their previous slots. The laws (38) -- (40) in Dr defeat contradictory covered laws, which represent effects of movement, by causing related ab′ fluents to be true. ab ′(at (A, L + 1)) after right (A), left (A′), at (A, L), at (A′, L + 1), ¬left (A), ¬right (A′) (A 6= A′) ab ′(at (A′, L)) after right (A), left (A′), at (A, L), at (A′, L + 1), ¬left (A), ¬right (A′) (A 6= A′) ab ′(n(A, A′, L)) after right (A), left (A′), at (A, L), at (A′, L + 1), ¬left (A), ¬right (A′) (A 6= A′) (38) (39) (40) The law (40) defeats the law in β(U(A,c)) that is β transformed version of (25). In principle such nonexecutable laws are abbreviations of pairs of dynamic laws with contradictory head fluents [7]. We assume that these head literals are unique for each nonexecutable law in order to avoid overly defeating such laws in the second stage. For an action description, this can be achieved by introducing some fresh fluents for each of such dynamic law pairs. Otherwise, a slightly modified version of β may generate a unique id in the introduced abnormality fluent for each nonexecutable law.5 For in- stance, in our Sumo example β adds the ¬ab ′(n(A, A′, L)) abnormality fluent to the ifcons part when transforming dynamic laws abbreviated by (25) in a uniquely identi- fied fashion. Proposition 1 guarantees that a potential conflict in U(A,c) can always be resolved in M(A,c,r). The resolution used in the proposition is clearly not the only way and may also not be the pragmatic way to resolve a potential conflict (for instance, a more concise way has already been illustrated in the Sumo example). However, it forms a basic guideline as a general methodology on resolving conflicts, i.e., defeating dynamic laws causing contradictory effects and generating desired effects in the successor state. Proposition 1. Let D be an action description in BC over actions A and c ⊆ A be a compound action. If c ∈ χD(s), then for any state s′ ∈ S(D), hs∗, c, s′ ∪ di ∈ T (β(D) ∪ R) such that s ⊆ s∗ and s∗ \ s has either ab′ or ¬ab′ for each ab′ fluent introduced in β(D) and no other literal; R is a set of dynamic laws covered by c at s of the form ab ′(a0) after a1, . . . , am (41) for each dynamic law in D that is covered by c at s, where ab ′(a0) is introduced in β(D) for the covered law in D, and of the form f after a1, . . . , am (42) for each literal f ∈ s′; and set d is composed of positive ab′ literals that appear in heads of laws (41) in R and negative ab′ literals for all the rest ab′ fluent symbols introduced in β(D). Let Dr be composed of laws (32) -- (40). At the end of the second stage, the ac- tion description M(A,c,r) gives the global view of the Sumo agents. Considering a specific potential conflict, for instance, {right (a), left (b)} ∈ χU({a c) (s4) holds given the state s4 in Figure 1. After the resolution stage, however, it is not anymore a potential conflict of M(A,c,r) and the transition diagram has a corresponding transi- tion, i.e., hs4, {right (a), left (b)}, s7i ∈ T (M(A,c,r)) where the successor state s7 = {at(a, 2), at (b, 4), ab ′(at (a, 3)), ab ′(at (b, 3))} (Sumos bounce back and stay in their previous slots). b}, , Since the ab′ fluents introduced by the transformation β are regular fluents, there may be states of M(A,c,r) that include superfluous ab′ fluents. In our Sumo exam- ple, for instance, {at(a, 1), at (b, 4), ab ′(at (a, 3))} ∈ S(M(A,c,r)) holds. Such states, however, are not accessible from sound initial states. We plan to address this issue for- mally by augmenting our formalization with a query language that enables one to ex- press initial states and reasoning tasks (see also Section 4 for the related future work). 5 This also applies to impossible laws and the transformation τ . 3.3 Defeating static laws in the first stage Recall that in the Sumo example, we have not used ab fluents introduced by τ to defeat some static laws, since all valid states of the multi-agent domain are generated by the mere union of agent descriptions of single agent perspective. Consider another domain where there are two agents next to opposite ends of a table [10]. The table is initially on the floor. Each agent may lift the table up using its respective end. Whenever an agent lifts up the table, it holds the table steady in its resulting state. The table is fully lifted when it is lifted from both ends by respective agents. Agent l is next to the left end of the table. The behaviour of this agent can be captured through fluents table(P ) and the action lift l where P ∈ {onf loor, lef tup}. The fluent table(lef tup) represents the situation where the left end of the table is lifted up and the right end of it is on the floor. The behaviour of l from a single agent perspective can be modeled by the action description Dl that is composed of laws (43) -- (48). ¬table(lef tup) if table(onf loor) ¬table(onf loor) if table(lef tup) impossible ¬table(onf loor), ¬table(lef tup) table(lef tup) after lift l nonexecutable lift l if table(lef tup) inertial table(P ) (43) (44) (45) (46) (47) (48) Dl has 2 states; s1 = {table(onf loor), ¬table(lef tup)} and s2 = {table(lef tup), ¬table(onf loor)}. It has 3 transitions; hs1, {}, s1i, hs2, {}, s2i, and hs1, {lift l}, s2i. The behaviour of agent r is similar to that of l and the description Dr is equal to Dl except fluent table(rightup) and action lift r are used instead of table(lef tup) and lift l respectively. The mere union of descriptions Dl and Dr has two states; a state where the only positive fluent literal is table(onf loor) and an invalid state where both table(lef tup) and table(rightup) hold. Besides, it is easy to see that the state where the table is fully lifted is invisible to agents from a single agent perspective. At the end of the first stage of our formalization, U(A,c) must cover all valid states of the multi-agent system. Let Dc be laws (49) -- (56). Note that Dc uses the new fluent table(lif ted) to cover a state that is invisible from single agent perspective. However, this needs defeating static laws (45) from descriptions Dl and Dr. This is achieved by static laws (52) and (53) where ¬ab(imp(l)) and ¬ab(imp(r)) are abnormality fluents introduced by τ to make the corresponding impossible laws defeasible. ¬table(P ) if table(lif ted) ¬table(lif ted) if table(P ) ¬table(P ) if table(P ′) ab(imp(l)) (P 6= lif ted) (P 6= lif ted) (P 6= P ′; P, P ′ ∈ {rightup, lef tup}) (49) (50) (51) (52) (53) ab(imp(r)) impossible ¬table(onf loor), ¬table(lef tup), ¬table(rightup), ¬table(lif ted) nonexecutable lift l if table(P ) nonexecutable lift r if table(P ) (P 6∈ {lef tup, onf loor}) (P 6∈ {rightup, onf loor}) (54) (55) (56) Dynamic laws (55) and (56) eliminate some invalid transitions so that all multi- agent aspects of the domain are identified by potential conflicts in U(A,c). There are two cases of multi-agent aspects of the domain; the table is fully lifted when both agents lift from their respective ends at the same time, or when an agent lifts up the table from his end and the table is already lifted up from the opposite end. U(A,c) has 4 states, one for each position of the table. All the states satisfy lit- erals ab(imp(l)) and ab(imp(r)). It has 6 transitions. Among the 6 transitions, 4 are from each state to itself with no performed actions. The remaining transitions are from {table(onf loor)} to {table(lef tup)} and {table(rightup)} by compound ac- tions {lift l } and {lift r }, respectively.6 One important remark is that the modeler may encode U(A,c) in a more compact way. Our formalization is independent of how it is encoded. Given that U(A,c) covers all valid states of the multi-agent domain and identifies potential conflicts for all desired multi-agent aspects of the domain, it can be used in the second stage, where potential conflicts are resolved and the global view is captured by M(A,c,r). For the second stage of our formalization, we only show resolution of potential con- flict related to the case which is about both agents lifting from their respective ends at c) (s) where s = {table(onf loor)}.6 the same time. Observe that {lift l , lift r } ∈ χU(A The dynamic laws (57) -- (59) in Dr effectively resolve this potential conflict. While laws (58) and (59) defeat the laws in β(U(A,c)) related to individual effects of actions lift l and lift r, (57) caused the effect fluent in the desired successor state. , table(lif ted) after lift l , lift r , table(onf loor) ab ′(table(lef tup)) after lift l , lift r , table(onf loor) ab ′(table(rightup)) after lift l , lift r , table(onf loor) (57) (58) (59) 4 Discussion and Future Work We have developed a formalization for capturing global view of MAS domains. Method- ologically, we start representing the behaviour of each agent by an action description 6 Here we show only positive fluent literals satisfied in a state and omit the literals ab(imp(l)) and ab(imp(r)). in BC from a single agent perspective. Then, a two-stage process guides the modeler in composing these single agent descriptions into a single description representing the global view of the overall MAS domain. While the modeler designates multi-agent as- pects of the domain via potential conflicts in the first stage, she resolves these conflicts according to the expected behaviour of the overall system in the second stage. Consid- ering that representing single agent descriptions is relatively simpler than representing multi-agent description directly, the formalization developed here is valuable from a knowledge representation perspective and is different from earlier works using action languages to represent MAS domains in a monolithic way. Our choice of BC as the used action language is backed by its clean semantics based on ASP and ability to express defeasible laws. Our formalization, however, is not developed with a fixed action language in mind. One can use another action language instead and update the methodology with less effort given that it can express defeasible laws (e.g., C [11]). The global view of a MAS domain is useful for carrying out reasoning tasks such as projection, planning, or postdiction. We plan to extend our formalization with a query language so that a modeler can represent such reasoning tasks. Using the query lan- guage, for example, an initial and goal state of the domain can be represented to facili- tate planning for the overall system. The formalization introduced here paves the way for a number of avenues for fu- ture work. An important one is to utilize online solving capacity of the ASP solver clingo [12] to develop a complete multi-agent architecture based on logical represen- tations. The solver may control execution in the environment using the formalization of the global view. Moreover, this can be performed without restarting the solver from scratch every time it communicates with the real agents residing in the environment with the help of its online solving capacity. References 1. Gelfond, M., Lifschitz, V.: Action languages. Electronic Transactions on Artificial Intelli- gence 3(6) (1998) 193 -- 210 2. Baral, C., Gelfond, M.: Reasoning agents in dynamic domains. In Minker, J., ed.: Logic- Based Artificial Intelligence. Kluwer Academic Publishers, Dordrecht (2000) 257 -- 279 3. Balduccini, M., Gelfond, M.: The autonomous agent architecture: An overview. In: Working Notes of the AAAI Spring Symposium on Architectures for Intelligent Theory-Based Agents (AITA08), Proceedings of the National Conference on Artificial Intelligence (AAAI) (2008) 1 -- 6 4. Baral, C., Gelfond, M.: Reasoning about effects of concurrent actions. The Journal of Logic Programming 31(1) (1997) 85 -- 117 5. Baral, C., Son, T., Pontelli, E.: Reasoning about multi-agent domains using action language C: A preliminary study. In Dix, J., Fisher, M., Nov´ak, P., eds.: Computational Logic in Multi- Agent Systems - 10th International Workshop, CLIMA X, Hamburg, Germany, September 9-10, 2009, Revised Selected and Invited Papers. Volume 6214 of Lecture Notes in Computer Science., Springer-Verlag (2009) 46 -- 63 6. Gelfond, G., Watson, R.: Modeling cooperative multi-agent systems. In Costantini, S., Watson, R., eds.: Proceedings of the 4th Workshop Answer Set Programming: Advances in Theory and Implementation (ASP'07). (2007) 67 -- 81 7. Lee, J., Lifschitz, V., Yang, F.: Action language BC: Preliminary report. In Rossi, F., ed.: Proceedings of the Twenty-third International Joint Conference on Artificial Intelligence (IJ- CAI'13), IJCAI/AAAI Press (2013) 983 -- 989 8. Chintabathina, S., Gelfond, M., Watson, R.: Defeasible laws, parallel actions, and reason- ing about resources. In Amir, E., Lifschitz, V., Miller, R., eds.: Proceedings of the Eighth International Symposium on Logical Formalization of Commonsense Reasoning (COM- MONSENSE'07), Proceedings of the National Conference on Artificial Intelligence (AAAI) (2007) 9. Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In Kowalski, R., Bowen, K., eds.: Proceedings of the Fifth International Conference and Symposium of Logic Programming (ICLP'88), MIT Press (1988) 1070 -- 1080 10. Pednault, E.: Formulating multi-agent dynamic-world problems in the classical planning framework. In Georgeff, M., Lansky, A., eds.: Reasoning about actions and plans, Morgan Kaufmann Publishers (1987) 47 -- 82 11. Giunchiglia, E., Lifschitz, V.: An action language based on causal explanation: Preliminary report. In: Proceedings of the National Conference on Artificial Intelligence (AAAI). (1998) 623 -- 630 12. Gebser, M., Kaminski, R., Kaufmann, B., Schaub, T.: Clingo = ASP + control: Preliminary report. In Leuschel, M., Schrijvers, T., eds.: Technical Communications of the Thirtieth International Conference on Logic Programming (ICLP'14). Volume arXiv:1405.3694v1 of Theory and Practice of Logic Programming, Online Supplement. (2014) Available at http://arxiv.org/abs/1405.3694v1.
1812.07887
1
1812
2018-12-19T11:32:46
Hierarchical Macro Strategy Model for MOBA Game AI
[ "cs.MA", "cs.AI" ]
The next challenge of game AI lies in Real Time Strategy (RTS) games. RTS games provide partially observable gaming environments, where agents interact with one another in an action space much larger than that of GO. Mastering RTS games requires both strong macro strategies and delicate micro level execution. Recently, great progress has been made in micro level execution, while complete solutions for macro strategies are still lacking. In this paper, we propose a novel learning-based Hierarchical Macro Strategy model for mastering MOBA games, a sub-genre of RTS games. Trained by the Hierarchical Macro Strategy model, agents explicitly make macro strategy decisions and further guide their micro level execution. Moreover, each of the agents makes independent strategy decisions, while simultaneously communicating with the allies through leveraging a novel imitated cross-agent communication mechanism. We perform comprehensive evaluations on a popular 5v5 Multiplayer Online Battle Arena (MOBA) game. Our 5-AI team achieves a 48% winning rate against human player teams which are ranked top 1% in the player ranking system.
cs.MA
cs
Hierarchical Macro Strategy Model for MOBA Game AI 1Bin Wu, 1Qiang Fu, 1Jing Liang, 1Peng Qu, 1Xiaoqian Li, 1Liang Wang, 2Wei Liu, 1Wei Yang, 1Yongsheng Liu 1,2Tencent AI Lab 1{benbinwu, leonfu, masonliang, pengqu, xiaoqianli, enginewang, willyang, kakarliu}@tencent.com [email protected] 8 1 0 2 c e D 9 1 ] A M . s c [ 1 v 7 8 8 7 0 . 2 1 8 1 : v i X r a Abstract The next challenge of game AI lies in Real Time Strategy (RTS) games. RTS games provide partially observable gam- ing environments, where agents interact with one another in an action space much larger than that of GO. Mastering RTS games requires both strong macro strategies and delicate mi- cro level execution. Recently, great progress has been made in micro level execution, while complete solutions for macro strategies are still lacking. In this paper, we propose a novel learning-based Hierarchical Macro Strategy model for mas- tering MOBA games, a sub-genre of RTS games. Trained by the Hierarchical Macro Strategy model, agents explicitly make macro strategy decisions and further guide their micro level execution. Moreover, each of the agents makes indepen- dent strategy decisions, while simultaneously communicat- ing with the allies through leveraging a novel imitated cross- agent communication mechanism. We perform comprehen- sive evaluations on a popular 5v5 Multiplayer Online Battle Arena (MOBA) game. Our 5-AI team achieves a 48% win- ning rate against human player teams which are ranked top 1% in the player ranking system. Introduction Light has been shed on artificial general intelligence after AlphaGo defeated world GO champion Lee Seedol (Silver et al. 2016). Since then, game AI has drawn unprecedented attention from not only researchers but also the public. Game AI aims much more than robots playing games. Rather, games provide ideal environments that simulate the real world. AI researchers can conduct experiments in games, and transfer successful AI ability to the real world. Although AlphaGo is a milestone to the goal of general AI, the class of problems it represents is still simple com- pared to the real world. Therefore, recently researchers have put much attention to real time strategy (RTS) games such as Defense of the Ancients (Dota) (OpenAI 2018a) and Star- Craft (Vinyals et al. 2017; Tian et al. 2017), which represents a class of problems with next level complexity. Dota is a fa- mous set of science fiction 5v5 Multiplayer Online Battle Arena (MOBA) games. Each player controls one unit and cooperate with four allies to defend allies' turrets, attack en- emies' turrets, collect resources by killing creeps, etc. The goal is to destroy enemies' base. Copyright c(cid:13) 2019, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. There are four major aspects that make RTS games much more difficult compared to GO: 1) Computational com- plexity. The computational complexity in terms of action space or state space of RTS games can be up to 1020,000, while the complexity of GO is about 10250 (OpenAI 2018b). 2) Multi-agent. Playing RTS games usually involves mul- tiple agents. It is crucial for multiple agents to coordinate and cooporate. 3) Imperfect information. Different to GO, many RTS games make use of fog of war (Vinyals et al. 2017) to increase game uncertainty. When the game map is not fully observable, it is essential to consider gaming among one another. 4) Sparse and delayed rewards. Learn- ing upon game rewards in GO is challenging because the rewards are usually sparse and delayed. RTS game length could often be larger than 20,000 frames, while each GO game is usually no more than 361 steps. To master RTS games, players need to have strong skills in both macro strategy operation and micro level execu- tion. In recent study, much attention and attempts have been put to micro level execution (Vinyals et al. 2017; Tian et al. 2017; Synnaeve and Bessiere 2011; Wender and Watson 2012). So far, Dota2 AI developed by OpenAI us- ing reinforcement learning, i.e., OpenAI Five, has made the most advanced progress (OpenAI 2018a). OpenAI Five was trained directly on micro level action space using proxi- mal policy optimization algorithms along with team rewards (Schulman et al. 2017). OpenAI Five has shown strong teamfights skills and coordination comparable to top pro- fessional Dota2 teams during a demonstration match held in The International 2018 (DOTA2 2018). OpenAI's ap- proach did not explicitly model macro strategy and tried to learn the entire game using micro level play. However, OpenAI Five was not able to defeat professional teams due to weakness in macro strategy management (Vincent 2018; Simonite 2018). Related work has also been done in explicit macro strat- egy operation, mostly focused on navigation. Navigation aims to provide reasonable destination spots and efficient routes for agents. Most related work in navigation used in- fluence maps or potential fields (DeLoura 2001; Hagelbäck and Johansson 2008; do Nascimento Silva and Chaimow- icz 2015). Influence maps quantify units using handcrafted equations. Then, multiple influence maps are fused using rules to provide a single-value output to navigate agents. Providing destination is the most important purpose of nav- igation in terms of macro strategy operation. The ability to get to the right spots at right time makes essential differ- ence between high level players and the others. Planning has also been used in macro strategy operation. Ontanon et al. proposed Adversarial Hierarchical-Task Network (AHTN) Planning (Ontanón and Buro 2015) to search hierarchical tasks in RTS game playing. Although AHTN shows promis- ing results in a mini-RTS game, it suffers from efficiency issue which makes it difficult to apply to full MOBA games directly. Despite of the rich and promising literature, previous work in macro strategy failed to provide complete solution: First, reasoning macro strategy implicitly by learning upon micro level action space may be too difficult. OpenAI Five's ability gap between micro level execution and macro strategy operation was obvious. It might be over-optimistic to leave models to figure out high level strategies by sim- ply looking at micro level actions and rewards. We consider explicit macro strategy level modeling to be necessary. Second, previous work on explicit macro strategy heavily relied on handcrafted equations for influence maps/potential fields computation and fusion. In practice, there are usu- ally thousands of numerical parameters to manually decide, which makes it nearly impossible to achieve good perfor- mance. Planning methods on the other hand cannot meet ef- ficiency requirement of full MOBA games. Third, one of the most challenging problems in RTS game macro strategy operation is coordination among multiple agents. Nevertheless, to the best of our knowledge, previ- ous work did not consider it in an explicit way. OpenAI Five considers multi-agent coordination using team rewards on micro level modeling. However, each agent of OpenAI Five makes decision without being aware of allies' macro strat- egy decisions, making it difficult to develop top coordination ability in macro strategy level. Finally, we have found that modeling strategic phase is crucial for MOBA game AI performance. However, to the best of our knowledge, previous work did not consider this. Teaching agents to learn macro strategy operation, how- ever, is challenging. Mathematically defining macro strat- egy, e.g., besiege and split push, is difficult in the first place. Also, incorporating macro strategy on top of OpenAI Five's reinforcement learning framework (OpenAI 2018a) requires corresponding execution to gain rewards, while macro strat- egy execution is a complex ability to learn by itself. There- fore, we consider supervised learning to be a better scheme because high quality game replays can be fully leveraged to learn macro strategy along with corresponding execution samples. Note that macro strategy and execution learned us- ing supervised learning can further act as an initial policy for reinforcement learning. In this paper, we propose Hierarchical Macro Strat- egy (HMS) model - a general supervised learning frame- work for MOBA games such as Dota. HMS directly tack- les with computational complexity and multi-agent chal- lenges of MOBA games. More specifically, HMS is a hi- erarchical model which conducts macro strategy operation by predicting attention on the game map under guidance of game phase modeling. Thereby, HMS reduces computa- tional complexity by incorporating game knowledge. More- over, each HMS agent conducts learning with a novel mech- anism of communication with teammates agents to cope with multi-agent challenge. Finally, we have conducted ex- tensive experiments in a popular MOBA game to evaluate our AI ability. We matched with hundreds of human player teams that ranked above 99% of players in the ranked system and achieved 48% winning rate. The rest of this paper is organized as follows: First, we briefly introduce Multiplayer Online Battle Arena (MOBA) games and compare the computational complexity with GO. Second, we illustrate our proposed Hierarchical Macro Strategy model. Then, we present experimental results in the fourth section. Finally, we conclude and discuss future work. Multiplayer Online Battle Arena (MOBA) Games Game Description MOBA is currently the most popular sub-genre of the RTS games. MOBA games are responsible for more than 30% of the online gameplay all over the world, with titles such as Dota, League of Legends, and Honour of Kings (Mur- phy 2015). According to a worldwide digital games market report in February 2018, MOBA games ranked first in gross- ing in both PC and mobile games (SuperData 2018). In MOBA, the standard game mode requires two 5-player teams play against each other. Each player controls one unit, i.e., hero. There are numerous of heroes in MOBA, e.g., more than 80 in Honour of Kings. Each hero is uniquely designed with special characteristics and skills. Players con- trol movement and skill releasing of heroes via the game interface. As shown in Figure. 1a, Honour of Kings players use left bottom steer button to control movements, while right bot- tom set of buttons to control skills. Surroundings are ob- servable via the main screen. Players can also learn full map situation via the left top corner mini-map, where observable turrets, creeps, and heroes are displayed as thumbnails. Units are only observable either if they are allies' units or if they are within a certain distance to allies' units. There are three lanes of turrets for each team to defend, three turrets in each lane. There are also four jungle areas on the map, where creep resources can be collected to increase gold and experience. Each hero starts with minimum gold and level 1. Each team tries to leverage resources to obtain as much gold and experience as possible to purchase items and upgrade levels. The final goal is to destroy enemy's base. A conceptual map of MOBA is shown in Figure. 1b. To master MOBA games, players need to have both excel- lent macro strategy operation and proficient micro level exe- cution. Common macro strategies consist of opening, laning, ganking, ambushing, etc. Proficient micro level execution re- quires high accuracy of control and deep understanding of damage and effects of skills. Both macro strategy operation and micro level execution require mastery of timing to excel, which makes it extremely challenging and interesting. More (a) (b) Figure 1: (a) Game UI of Honour of Kings. Players use left bottom steer button to control movements, while right bottom set of buttons to control skills. Players can observe surroundings via the screen and view the mini full map using the left top corner. (b) An example map of MOBA. The two teams are colored in blue and red, each possesses nine turrets (circled in rounds) and one base (circled in squares). The four jungle areas are numbered from 1 to 4. Table 1: Computational complexity comparison between GO and MOBA. Action Space State Space GO 250150 ≈ 10360 (250 pos available, 150 decisions per game in average) 3360 ≈ 10170 (361 pos, 3 states each) MOBA 101500 (10 options, 1500 actions per game) 1020000 (10 heroes, 2000+pos * 10+states) discussion of MOBA can be found in (Silva and Chaimow- icz 2017). Next, we will quantify the computational complexity of MOBA using Honour of Kings as an example. Computational Complexity The normal game length of Honour of Kings is about 20 minutes, i.e., approximately 20,000 frames in terms of gamecore. At each frame, players make decision with tens of options, including movement button with 24 directions, and a few skill buttons with corresponding releasing posi- tion/directions. Even with significant discretization and sim- plification, as well as reaction time increased to 200ms, the action space is at magnitude of 101,500. As for state space, the resolution of Honour of Kings map is 130,000 by 130,000 pixels, and the diameter of each unit is 1,000. At each frame, each unit may have different status such as hit points, levels, gold. Again, the state space is at magnitude of 1020,000 with significant simplification. Comparison of action space and state space between MOBA and GO is listed in Table. 1. MOBA AI Macro Strategy Architecture Our motivation of designing MOBA AI macro strategy model was inspired from how human players make strategic decisions. During MOBA games, experienced human play- ers are fully aware of game phases, e.g., opening phase, lan- ing phase, mid game phase, and late game phase (Silva and Chaimowicz 2017). During each phase, players pay atten- tion to the game map and make corresponding decision on where to dispatch the heroes. For example, during the laning phase players tend to focus more on their own lanes rather than backing up allies, while during mid to late phases, play- ers pay more attention to teamfight spots and pushing ene- mies' base. To sum up, we formulate the macro strategy operation process as "phase recognition -> attention prediction -> ex- ecution". To model this process, we propose a two-layer macro strategy architecture, i.e., phase and attention: • Phase layer aims to recognize current game phase so that attention layer can have better sense about where to pay attention to. • Attention layer aims to predict the best region on game maps to dispatch heroes. Phase and Attention layers act as high level guidance for micro level execution. We will describe details of model- ing in the next section. The network structure of micro level model is almost identical to the one used in OpenAI Five1 (OpenAI 2018a), but in a supervised learning manner. We did minor modification to adapt it to Honour of Kings, such as deleting Teleport. Hierarchical Macro Strategy Model We propose a Hierarchical Macro Strategy (HMS) model to consider both phase and attention layers in a unified neural network. We will first present the unified network architec- ture. Then, we illustrate how we construct each of the phase and attention layers. 1https://d4mucfpksywv.cloudfront. net/research-covers/openai-five/ network-architecture.pdf Model Overview We propose a Hierarchical Macro Strategy model (HMS) to model both attention and phase layers as a multi-task model. It takes game features as input. The output consists of two tasks, i.e., attention layer as the main task and phase layer as an auxiliary task. The output of attention layer directly con- veys macro strategy embedding to micro level models, while resource layer acts as an axillary task which help refine the shared layers between attention and phase tasks. The illustrating network structure of HMS is listed in Fig- ure. 2. HMS takes both image and vector features as in- put, carrying visual features and global features respectively. In image part, we use convolutional layers. In vector part, we use fully connected layers. The image and vector parts merge in two separate tasks, i.e., attention and phase. Ul- timately, attention and phase tasks take input from shared layers through their own layers and output to compute loss. Attention Layer Similar to how players make decisions according to the game map, attention layer predicts the best region for agents to move to. However, it is tricky to tell from data that where is a player's destination. We observe that regions where at- tack takes place can be indicator of players' destination, be- cause otherwise players would not have spent time on such spots. According to this observation, we define ground-truth regions as the regions where players conduct their next at- tack. An illustrating example is shown in Figure. 3. Let s to be one session in a game which contains several frames, and s − 1 indicates the session right before s. In Figure. 3, s − 1 is the first session in the game. Let ts to be the starting frame of s. Note that a session ends along with attack behavior, therefore there exists a region ys in ts where the hero conducts attack. As shown in Figure. 3, label for s−1 is ys, while label for s is ys+1. Intuitively, by setting up labels in this way, we expect agents to learn to move to ys at the beginning of game. Similarly, agents are supposed to move to appropriate regions given game situation. Phase layer Phase layer aims to recognize the current phase. Extracting game phases ground-truth is difficult because phase defini- tion used by human players is abstract. Although roughly correlated to time, phases such as opening, laning, and late game depend on complicated judgment based on current game situation, which makes it difficult to extract ground- truth of game phases from replays. Fortunately, we observe clear correlation between game phases with major resources. For example, during the opening phase players usually aim at taking outer turrets and baron, while for late game, players operate to destroy enemies' base. Therefore, we propose to model phases with respect to major resources. More specifically, major resources indicate turrets, baron, dragon, and base. We marked the major re- sources on the map in Figure. 4a. Label definition of phase layer is similar to attention layer. The only difference is that ys in phase layer indicates attack behavior on turrets, baron, dragon, and base instead of in regions. Intuitively, phase layer modeling splits the entire game into several phases via modeling which macro resource to take in current phase. We do not consider other resources such as lane creeps, heroes, and neutral creeps as major objectives because usu- ally these resources are for bigger goal, such as destroying turrets or base with higher chance. Figure. 4b shows a series of attack behavior during the bottom outer turret strategy. The player killed two neutral creeps in the nearby jungle and several lane creeps in the bottom lane before attacking the bottom outer turret. We expect the model to learn when and what major re- sources to take given game situation, and in the meanwhile learn attention distribution that serve each of the major re- sources. Imitated Cross-agents Communication Cross-agents communication is essential for a team of agents to cooperate. There is rich literature of cross-agent communication on multi-agent reinforcement learning re- search (Sukhbaatar, Fergus, and others 2016; Foerster et al. 2016). However, it is challenging to learn communication using training data in supervised learning because the actual communication is unknown. To enable agents to communicate in supervised learning setting, we have designed a novel cross-agents communi- cation mechanism. During training phase, we put attention labels of allies as features for training. During testing phase, we put attention prediction of allies as features and make decision correspondingly. In this way, our agents can "com- municate" with one another and learn to cooperate upon al- lies' decisions. We name this mechanism as Imitated Cross- agents Communication due to its supervised nature. Experiments In this section, we evaluate our model performance. We first describe the experimental setup, including data preparation and model setup. Then, we present qualitative results such as attention distribution under different phase. Finally, we list the statistics of matches with human player teams and evaluate improvement brought by our proposed model. Experimental Setup Data Preparation To train a model, we collect around 300 thousand game replays made of King Professional League competition and training records. Finally, 250 million in- stances were used for training. We consider both visual and attributes features. On visual side, we extract 85 features such as position and hit points of all units and then blur the visual features into 12*12 resolution. On attributes side, we extract 181 features such as roles of heroes, time period of game, hero ID, heroes' gold and level status and Kill-Death- Assistance statistics. Model Setup We use a mixture of convolutional and fully-connected layers to take inputs from visual and at- tributes features respectively. On convolutional side, we set five shared convolutional layers, each with 512 channels, padding = 1, and one RELU. Each of the tasks has two con- volutional layers with exactly the same configuration with Figure 2: Network Architecture of Hierarchical Macro Strategy Model Figure 3: Illustrating example for label extraction in atten- tion layer. shared layers. On fully-connected layers side, we set two shared fully-connected layers with 512 nodes. Each of the tasks has two fully-connected layers with exactly the same configuration with shared layers. Then, we use one concate- nation layer and two fully-connected layers to fuse results of convolutional layers and fully-connected layers. We use ADAM as the optimizer with base learning rate at 10e-6. Batch size was set at 128. The loss weights of both phase and attention tasks are set at 1. We used CAFFE (Jia et al. 2014) with eight GPU cards. The duration to train an HMS model was about 12 hours. Finally, the output for attention layer corresponds to 144 regions of the map, resolution of which is exactly the same as the visual inputs. The output of the phase task corresponds to 14 major resources circled in Figure. 4a. Experimental Results Opening Attention Opening is one of the most important strategies in MOBA. We show one opening attention of dif- ferent heroes learned by our model in Figure. 5. In Figure. 5, each subfigure consists of two square images. The left- hand-side square image indicates the attention distribution of the right-hand-side MOBA mini-map. The hottest region is highlighted with red circle. We list attention prediction of four heroes, i.e., Diaochan, Hanxin, Arthur, and Houyi. The four heroes belong to master, assasin, warrior, and archer re- spectively. According to the attention prediction, Diaochan is dispatched to middle lane, Hanxin will move to left jun- gle area, and Authur and Houyi will guard the bottom jungle area. The fifth hero Miyamoto Musashi, which was not plot- ted, will guard the top outer turret. This opening is consid- ered safe and efficient, and widely used in Honour of Kings games. Attention Distribution Affected by Phase Layer We vi- sualize attention distribution of different phases in Figure. 6a and 6b. We can see that attention distributes around the major resource of each phase. For example, for upper outer turret phase in Figure. 6a, the attention distributes around upper outer region, as well as nearby jungle area. Also, as shown in Figure. 6b, attention distributes mainly in the mid- dle lane, especially area in front of the base. These examples show that our phase layer modeling affects attention distri- bution in practice. To further examine how phase layer cor- relates with game phases, we conduct t-Distributed Stochas- tic Neighbor Embedding (t-SNE) on phase layer output. As shown in Figure. 7, samples are coloured with respect to dif- ferent time stages. We can observe that samples are clearly separable with respect to time stages. For example, blue, or- ange and green (0-10 minuets) samples place close to one another, while red and purple samples (more than 10 min- uets) form another group. Macro Strategy Embedding We evaluate how important is the macro strategy modeling. We removed the macro strat- egy embedding and trained the model using micro level ac- tions from the replays. The micro level model design is sim- ilar to OpenAI Five (OpenAI 2018a). Detail description of the micro level modeling is out of the scope of this paper. The result is listed in Table. 2, column AI Without Macro Strategy. As the result shows, HMS outperformed AI With- out Macro Strategy with 75% winning rates. HMS per- formed much better than AI Without Macro Strategy in terms of number of kills, turrets destruction, and gold. The most obvious performance change is that AI Without Macro Strategy mainly focused on nearby targets. Agents did not (a) (b) Figure 4: (a) Major resources (circled, i.e., turrets, base, dragon, and baron) modeled in phase layer. (b) Illustrating example for label extraction in phase layer. Figure 5: One of the opening strategies learned for different hero roles. The hottest regions are highlighted with red circle. (a) (b) Figure 6: Attention distribution of different strategies. The two attention figures describe attention distribution of the two major resources, i.e., upper outer turret and base respec- tively. care much about backing up teammates and pushing lane creeps in relatively large distance. They spent most of the time on killing neutral creeps and nearby lane creeps. The performance change can be observed from the compari- son of engagement rate and number of turrets in Table. 2. This phenomenon may reflect how important macro strategy modeling is to highlight important spots. Match against Human Players To evaluate our AI per- formance more accurately, we conduct matches between our AI and human players. We invited 250 human player teams whose average ranking is King in Honour of Kings rank sys- tem (above 1% of human players). Following the standard procedure of ranked match in Honour of Kings, we obey ban-pick rules to pick and ban heroes before each match. The ban-pick module was implemented using simple rules. Note that gamecores of Honour of Kings limit commands frequency to a level similar with human. The overall statistics are listed in Table. 2, column Human Teams. Our AI achieved 48% winning rate in the 250 games. The statistics show that our AI team did not have advantage on teamfight over human teams. The number of kills made by AI is about 15% less than human teams. Other items such as turrets destruction, engagement rate, and gold per minute were similar between AI and human. We have further ob- served that our AI destroyed 2.5 more turrets than human on average in the first 10 minutes. After 10 minutes, turrets dif- ference shrank due to weaker teamfight ability compared to human teams. Arguably, our AI's macro strategy operation ability is close to or above our human opponents. Imitated Cross-agents Communication To evaluate how important the cross-agents communication mechanism is to the AI ability, we conduct matches between HMS and HMS trained without cross-agents communication. The result is listed in Table. 2, column AI Without Communication. HMS achieved a 62.5% winning rate over the version without communication. We have observed obvious cross-agents co- operation learned when cross-agents communication was in- troduced. For example, rate of reasonable opening increased from 22% to 83% according to experts' evaluation. Figure 7: t-Distributed Stochastic Neighbor Embedding on phase layer output. Embedded data samples are coloured with respect to different time stages. Table 2: Match statistics. 250 games were played against Human Teams, while 40 games were played against Without Macro Strategy, Without Communication, and Without Phase Layer, respectively. Opponents Winning rate Kill Game Length Gold/Min Engagement Rate Turrets Dragons Barons Dark Barons AI Without Macro Strategy 75% - 25% 26.0 - 21.1 16.1 min 2399 - 2287 49% - 42% 6.1 - 3.2 1.22 - 0.2 0.62 - 0.31 0.41 - 0.22 Human Teams 48.3% - 51.7% 22.6 - 26.3 16.1 min 2603 - 2616 48% - 48% 6.1 - 6.2 0.55 - 0.55 0.64 - 0.61 0.36 - 0.38 AI Without Communication 62.5% - 37.5% 19.9 - 19.4 18.2 min 2633 - 2554 49% - 47% 6.21 - 5.26 0.65 - 0.49 0.45 - 0.41 0.35 - 0.32 AI Without Phase Layer 65% - 35% 25.6 - 22.8 18.2 min 2500 - 2333 50% - 49% 6.73 - 5.42 1 - 0.41 0.71 - 0.2 0.49 - 0.04 Phase layer We evaluate how phase layer affects the per- formance of HMS. We removed the phase layer and com- pared it with the full version of HMS. The result is listed in Table. 2, column AI Without phase layer. The result shows that phase layer modeling improved HMS significantly with 65% winning rate. We have also observed obvious AI abil- ity downgrade when phase layer was removed. For example, agents were no longer accurate about timing when baron first appears, while the full version HMS agents got ready at 2:00 to gain baron as soon as possible. Conclusion and Future Work In this paper, we proposed a novel Hierarchical Macro Strategy model which models macro strategy operation for MOBA games. HMS explicitly models agents' attention on game maps and considers game phase modeling. We also proposed a novel imitated cross-agent communication mechanism which enables agents to cooperate. We used Honour of Kings as an example of MOBA games to implement and evaluate HMS. We conducted matches between our AI and top 1% human player teams. Our AI achieves a 48% winning rate. To the best of our knowledge, our proposed HMS model is the first learning based model that explicitly models macro strategy for MOBA games. HMS used supervised learning to learn macro strategy op- eration and corresponding micro level execution from high quality replays. A trained HMS model can be further used as an initial policy for reinforcement learning framework. Our proposed HMS model exhibits a strong potential in MOBA games. It may be generalized to more RTS games with appropriate adaptations. For example, the attention layer modeling may be applicable to StarCraft, where the definition of attention can be extended to more meaningful behaviors such as building operation. Also, Imitated Cross- agents Communication can be used to learn to cooperate. Phase layer modeling is more game-specific. The resource collection procedure in StarCraft is different from that of MOBA, where gold is mined near the base. Therefore, phase layer modeling may require game-specific design for differ- ent games. However, the underlying idea to capture game phases can be generalized to Starcraft as well. HMS may also inspire macro strategy modeling in do- mains where multiple agents cooperate on a map and histor- ical data is available. For example, in robot soccer, attention layer modeling and Imitated Cross-agents Communication may help robots position and cooperate given parsed soccer off digital games market: 2018. 2018. ai bots -- for February World- 2018. elon musk-backed Pro gamers now. [Simonite 2018] Simonite, T. fend https://www.wired.com/story/pro-gamers-fend-off-elon- musks-ai-bots/ (Aug 23, 2018). [Sukhbaatar, Fergus, and others 2016] Sukhbaatar, S.; Fer- gus, R.; et al. 2016. Learning multiagent communication with backpropagation. In Advances in Neural Information Processing Systems, 2244 -- 2252. [SuperData 2018] SuperData. wide https://www.superdataresearch.com/us-digital-games- market/. [Synnaeve and Bessiere 2011] Synnaeve, G., and Bessiere, P. 2011. A bayesian model for rts units control applied to starcraft. In Computational Intelligence and Games (CIG), 2011 IEEE Conference on, 190 -- 196. IEEE. [Tian et al. 2017] Tian, Y.; Gong, Q.; Shang, W.; Wu, Y.; and Zitnick, C. L. 2017. Elf: An extensive, lightweight and flexible research platform for real-time strategy games. In Advances in Neural Information Processing Systems, 2656 -- 2666. [Vincent 2018] Vincent, J. Humans grab vic- tory in first of three dota 2 matches against openai. https://www.theverge.com/2018/8/23/17772376/openai- dota-2-pain-game-human-victory-ai (Aug 23, 2018). [Vinyals et al. 2017] Vinyals, O.; Ewalds, T.; Bartunov, S.; Georgiev, P.; Vezhnevets, A. S.; Yeo, M.; Makhzani, A.; Küt- tler, H.; Agapiou, J.; Schrittwieser, J.; et al. 2017. Star- craft ii: a new challenge for reinforcement learning. arXiv preprint arXiv:1708.04782. [Wender and Watson 2012] Wender, S., and Watson, I. 2012. Applying reinforcement learning to small scale combat in the real-time strategy game starcraft: Broodwar. In Compu- tational Intelligence and Games (CIG), 2012 IEEE Confer- ence on, 402 -- 408. IEEE. 2018. recordings. In the future, we will incorporate planning based on HMS. Planning by MCTS roll-outs in Go has been proven essen- tial to outperform top human players (Silver et al. 2016). We expect planning can be essential for RTS games as well, be- cause it may not only be useful for imperfect information gaming but also be crucial to bringing in expected rewards which supervised learning fails to consider. References 2018. The international 2018. [DeLoura 2001] DeLoura, M. A. 2001. Game programming gems 2. Cengage learning. Nasci- [do Nascimento Silva and Chaimowicz 2015] do 2015. On the mento Silva, V., and Chaimowicz, L. development of intelligent agents for moba games. In Computer Games and Digital Entertainment (SBGames), 2015 14th Brazilian Symposium on, 142 -- 151. IEEE. [DOTA2 2018] DOTA2. https://www.dota2.com/international/announcement/. [Foerster et al. 2016] Foerster, J. N.; Assael, Y. M.; de Fre- itas, N.; and Whiteson, S. 2016. Learning to communicate to solve riddles with deep distributed recurrent q-networks. arXiv preprint arXiv:1602.02672. [Hagelbäck and Johansson 2008] Hagelbäck, J., and Johans- son, S. J. 2008. The rise of potential fields in real time strategy bots. In Fourth Artificial Intelligence and Interac- tive Digital Entertainment Conference. Stanford University. [Jia et al. 2014] Jia, Y.; Shelhamer, E.; Donahue, J.; Karayev, S.; Long, J.; Girshick, R.; Guadarrama, S.; and Darrell, T. 2014. Caffe: Convolutional architecture for fast feature em- bedding. arXiv preprint arXiv:1408.5093. 2015. Most played games: [Murphy 2015] Murphy, M. November 2015 -- fallout 4 and black ops iii arise while starcraft ii shines. http://caas.raptr.com/most-played-games- november-2015-fallout-4-andblack-ops-iii-arise-while- starcraft-ii-shines/. [Ontanón and Buro 2015] Ontanón, S., and Buro, M. 2015. Adversarial hierarchical-task network planning for complex real-time games. In Twenty-Fourth International Joint Con- ference on Artificial Intelligence. [OpenAI 2018a] OpenAI. https://blog.openai.com/dota-2/ (17 Apr 2018). [OpenAI 2018b] OpenAI. https://blog.openai.com/openai-five/ (25 Jun 2018). [Schulman et al. 2017] Schulman, J.; Wolski, F.; Dhariwal, P.; Radford, A.; and Klimov, O. 2017. Proximal policy op- timization algorithms. arXiv preprint arXiv:1707.06347. [Silva and Chaimowicz 2017] Silva, V. D. N., and Chaimow- icz, L. 2017. Moba: a new arena for game ai. arXiv preprint arXiv:1705.10443. [Silver et al. 2016] Silver, D.; Huang, A.; Maddison, C. J.; Guez, A.; Sifre, L.; Van Den Driessche, G.; Schrittwieser, J.; Antonoglou, I.; Panneershelvam, V.; Lanctot, M.; et al. 2016. Mastering the game of go with deep neural networks and tree search. nature 529(7587):484 -- 489. 2018a. Openai blog: Dota 2. Openai five. 2018b.
1708.01925
1
1708
2017-08-06T19:24:00
Designing Autonomous Vehicles: Evaluating the Role of Human Emotions and Social Norms
[ "cs.MA", "cs.AI", "cs.CY", "cs.RO", "eess.SY" ]
Humans are going to delegate the rights of driving to the autonomous vehicles in near future. However, to fulfill this complicated task, there is a need for a mechanism, which enforces the autonomous vehicles to obey the road and social rules that have been practiced by well-behaved drivers. This task can be achieved by introducing social norms compliance mechanism in the autonomous vehicles. This research paper is proposing an artificial society of autonomous vehicles as an analogy of human social society. Each AV has been assigned a social personality having different social influence. Social norms have been introduced which help the AVs in making the decisions, influenced by emotions, regarding road collision avoidance. Furthermore, social norms compliance mechanism, by artificial social AVs, has been proposed using prospect based emotion i.e. fear, which is conceived from OCC model. Fuzzy logic has been employed to compute the emotions quantitatively. Then, using SimConnect approach, fuzzy values of fear has been provided to the Netlogo simulation environment to simulate artificial society of AVs. Extensive testing has been performed using the behavior space tool to find out the performance of the proposed approach in terms of the number of collisions. For comparison, the random-walk model based artificial society of AVs has been proposed as well. A comparative study with a random walk, prove that proposed approach provides a better option to tailor the autopilots of future AVS, Which will be more socially acceptable and trustworthy by their riders in terms of safe road travel.
cs.MA
cs
Designing Autonomous Vehicles: Evaluating the Role of Human Emotions and Social Norms Faisal Riaz1, Muaz Niazi 2,* 1Dept. Of Computing-Iqra University, Islamabad, Pakistan 2Dept. Of Computer Sciences-COMSATS, Islamabad, Pakistan [email protected] *[email protected] Abstract Humans are going to delegate the rights of driving to the autonomous vehicles in near future. However, to fulfill this complicated task, there is a need for a mechanism, which enforces the autonomous vehicles to obey the road and social rules that have been practiced by well-behaved drivers. This task can be achieved by introducing social norms compliance mechanism in the autonomous vehicles. This research paper is proposing an artificial society of autonomous vehicles as an analogy of human social society. Each AV has been assigned a social personality having different social influence. Social norms have been introduced which help the AVs in making the decisions, influenced by emotions, regarding road collision avoidance. Furthermore, social norms compliance mechanism, by artificial social AVs, has been proposed using prospect based emotion i.e. fear, which is conceived from OCC model. Fuzzy logic has been employed to compute the emotions quantitatively. Then, using SimConnect approach, fuzzy values of fear has been provided to the Netlogo simulation environment to simulate artificial society of AVs. Extensive testing has been performed using the behavior space tool to find out the performance of the proposed approach in terms of the number of collisions. For comparison, the random-walk model based artificial society of AVs has been proposed as well. A comparative study with a random walk, prove that proposed approach provides a better option to tailor the autopilots of 1 future AVS, Which will be more socially acceptable and trustworthy by their riders in terms of safe road travel. Key Word: - Autonomous Vehicles, Social Norms, OCC Model, Prospect Based Emotions, Fuzzy Logic, Netlogo 1. Introduction Autonomous road vehicles (ARVs) have been considered better than human driven vehicles in road safety and traffic management. According to the investigation of Riaz and Niazi [1], autonomous vehicles have been found helpful in decreasing road accidents as compared to the human-driven vehicles. Furthermore, the issue of road jams can be solved by replacing human drivers with fully connected autonomous cars, as noted by Litman [2]. In addition, Mersky and Samaras [3] have illustrated that AVs are very helpful in decreasing the road pollution and making the environment green. From these benefits, it might be possible that the law agencies delegate the driving task to AVs by issuing them the driving license. However, to fulfill this complicated task of driving, there is a need for a mechanism, which enforces the autonomous vehicles, which is a robot, to obey the road and social rules that have been practiced by well- behaved drivers. The Role of ethics and social norms have been considered important in making robots social, well behaved and more compatible with humans. According to Malle [4], robots can serve as competent social agents by integrating moral norms in their basic architecture. A. Rakotonirainy et al. [5] have proven that social norms can be utilized to design human compatible social AVs robots. According to Kummer et al. [6], social norms can be used in tailoring crash free AVs robot by operating on roads wisely. From the above discussion, it is implied that social norms with some norms compliance mechanism can be used to tailor the next generation of more trustworthy social AVs. 2 Emotions can be used as norms compliance mechanism as it is already proven that emotions help in sustaining the social norms in human society. According to Elster [7], self-attribution emotions like shame helps the human to avoid the violation due to fear of losing their social status. According to N. Criado [8], prospect based emotions like fear enforce the human to follow the social norms in order to avoid the punishment from the law enforcement agencies. Inspired by the role of emotions in social norm compliance in the human society, researchers have used emotions to enforce the artificial agents' norm compliance. According to staller et al. [9]emotions act as an important factor in the sustainability of social norms. Hence, it is implied that we can use emotions as the norms compliance mechanism to design social norms enabled AVs. Gerdes and Thornton [10] have suggested the mathematical model of social norms for designing the control algorithms of AVs but still their works lack the simulation or proof of concept of proposed mathematical models. Problem statement- However, to the best of our knowledge the existing literature has not proposed such procedures that allow AVs to configure their autopilots to make collision avoidance decisions about norm compliance using emotional motivations as human drivers would do. For example, Amitai and Oren[11], just suggested the use of social norms in AVs in the theoretical aspect without discussing any working mathematical model and its implementation aspects. A. Rakotonirainy et al. [5] have been proposed a novel concept of measuring the emotional state of a driver using the HUD-UP technology and transmitting the social norms from driver to driver to modify the behavior behind the steering of AV. However, the concept of social norms has not been integrated into the autopilot of the AV, which helps them to make the collision avoidance decisions by their own. The major challenge for AVs is that how it will take decisions at the time of the crashes and this issue has been addressed by the 3 Kumfer and Burgess in [6]. The authors have used social norms as a decision mechanism to choose a less harming crash among possible collision options. However, this paper does not provide any collision avoidance strategy using some social norms compliance mechanism, which avoids the collision situations. Contribution - The existing research work is proposing a set of contributions in building the norm compliance collision free artificial society of Autonomous vehicles inspired by human society social norms and related emotions. Our aim is to provide humans with reliable AVs to which they can delegate driving tasks that are regulated by legal and social norms. The main contributions of the paper are given as. • Viewpoint of incorporating the social norms and emotions in Autonomous vehicles and conceiving them as artificial social entities • Modeling of social norms inspired artificial society of Autonomous Vehicles • Modeling of prospected based emotions to make AVs emotions enabled • Simulation of social norms compliance artificial society of AVs using the Net logo • Detailed experiment design • Rigor analysis ,in terms of number of collisions, of the proposed approach in the comparison with random walk travelling strategy This article is organized as follows: Section 2 illustrates the literature review; Section 3 describes the method; Section 4 provides the description of the proposed model; section 5 illustrates the experiments; section 6 elaborates the results and discussion and section 7 contains conclusion. 2.-Literature Review In this section, detailed literature review related to the proposed scheme has been performed. The literature review has been divided into three main categories. The first category addresses the 4 literature supporting the role of ethics in robots using theoretical debate. The second category discusses the literature that supports the role of using ethics or norms in the design of AVs but only theoretically. Then the third category discusses the state of the art literature, which has used the social norms in autonomous vehicles using a simulation approach. According to Voort et al. [12] computers are getting autonomous day by day and are capable of making decisions of their own. Intelligent computer systems can get information from human, analyze it, take decisions and store that information or provide it to third parties. There is a need to check the moral values of computer decisions. Authors have suggested that there is a need to add ethics in technology, which is still lacking behind. Malle1 [4] summarized that from 1995 to 2015 very little efforts have been made on the implementation of ethics in robots. Past studies provide a thought that whether a robot could be a moral agent or not. In addition, researchers found that robot could be treated as a living thing that can take actions on its own decisions, and it can decide what is right and what is wrong with humans. According to Amitai and Oren [13], the latest smart machines like AVs are getting smarter due to the incorporation of artificial intelligence (AI) algorithms. Furthermore, these AVs are becoming more and more autonomous in the sense that they are now taking decisions on their own using these AI algorithms. The authors suggest that as these AVs basic purpose is to serve humans, and then there is a need to equip them with ethical and social rules so that the autonomous devices like AVs can take decisions of their own that could not harm the passengers and other road commuters [7]. According to Gerdes and Thornton [10], it is the responsibility of researchers and programmers to devise ethics enabled control algorithms for AVs that make them more acceptable to human society. The authors argue that the incorporation of ethics of the society in which AVs are operating will help the court of law to decide the responsibility level of 5 AV in the case of an accident. In this regard, they have proposed a mathematical model of ethical frameworks to incorporate them in the control algorithms of Autonomous vehicles. The proposed model can read the error rate for the actual and desired path of the car based on different constraints. However, the authors have not mentioned any case study that implements any of the proposed mathematical model using simulation or real field tests. Social and autonomous robots are the motivation to build social cars so that road accidents can be eliminated. Vehicle-to-vehicle (V2V) is a sub-part of intelligent transportation system (ITS) equipped with sensing technologies and wireless communication system is helpful in road accident prevention. A. Rakotonirainy et al. [14] have been proposed a novel concept that HUDs , Human-Computer-interaction, HCI and communicating social information between cars can provide social awareness and he named it as 'social car'. This social car can sense the driving behavior of driver by capturing the facial expression, gesture and eye contacts of the driver. Further, the author has argued that self-efficacy and social norms can change the driver's behavior. Social norms can be transmitted in V2V using social networks and most of the time in the form of non-verbal communication. Hence, the combination of driver and car (machine) become the cyborg so the driver of one can treat the other driver as a machine. He also added that the "social pressure is particularly suitable to influence human driving behaviors for the better and that this aspect is still relevant in the age of looming autonomous cars". A complete autonomous vehicle (AV) was introduced first time in response to Defense Advanced Research Projects Agency Grand Challenges. The major challenge for AVs is that how it will take decisions at the time of the crashes. This is the key point where ethics and social norms are required for AV's development. To address this requirement the Kumfer and Burgess [15]evaluated three ethical theories, i.e. utilitarianism, respect for persons, and virtue ethics, 6 which help AVs to make least harming collision decision when the collision become unavoidable. They performed the experiments using MATLAB their results revealed that the utilitarian system produced the lowest number of death while on the other hand, the virtue ethics system resulted in a supreme number of losses. However, the virtue ethics if fully integrated with good AI techniques can be the best ethical solution. It is suggested that these ethical theories can be implemented in AVs in different scenarios and complex environments. 3-Method This section presents the method that has been used to propose the social norms and emotions inspired artificial society of AVs. Figure 1 is the pictorial representation of our proposed method. To introduce the emotions, a suitable appraisal model was required. According to [25], OCC model is a best emotion appraisal model. Hence, the OCC model has studied thoroughly and Prospect-based emotions have been selected. Further, emotion Fear has been selected to devise the mechanism, which enforces the agents to obey the social norms in different collision leading road scenarios. Afterward Fuzzy logic has been employed to compute the quantitative values of different intensities of fear. Then social norms and emotions based rules have been designed, which define the code of conduct for the artificial society of AVs. In addition, artificial social actors along with different characteristics have been defined. Now to test the behavior of non- social norms and social norms based artificial society, standard agent-based modeling tool NetLogo has been used. Using, Sim-connector approach the numeric values of Fear emotion have been provided in the simulation of artificial society. Then extensive experiments have been performed, which helps to perform the comparison between non-social norms and social norms 7 Study OCC Model Select Prospect Based Emotions Explore the variables of prospect based emotion i.e. Fear (likelihood, undesirability, Ig) Model Fear variables (likelihood, undesirability, Ig) according to autonomous vehicles real road operations Quantitative Computation of Fear variables using Fuzzy Logic Design Norms obedience Willingness function Fw Based on the different Intensities of Fear Provide quantitative values of Fear emotion to Netlogo simulation using SimConnect approach Build Autonomous Vehicles artificial social society actors/agents and design social characters Pre-crash Scenario Explore different types of social norms 𝑭𝒆𝒂𝒓 − 𝑷𝒐𝒕𝒆𝒏𝒕𝒊𝒂𝒍(𝑨𝒗𝒊, 𝒆𝒊, 𝒕𝒊) = 𝒇𝒇[ 𝑫𝒆𝒔𝒊𝒓𝒆 (𝑨𝒗𝒊,𝒆𝒊,𝒕𝒊), 𝑳𝒊𝒌𝒍𝒊𝒉𝒐𝒐𝒅 (𝑨𝒗𝒊,𝒆𝒊,𝒕𝒊), 𝑰𝒈(𝑨𝒗𝒊,𝒆𝒊,𝒕𝒊)] Design the operational rules for interaction between 𝑭𝒆𝒂𝒓 − 𝑰𝒏𝒕𝒆𝒏𝒔𝒊𝒕𝒚 (𝑨𝒗𝒊, 𝒆𝒊, 𝒕𝒊) members of artificial society = 𝑭𝒆𝒂𝒓 − 𝑷𝒐𝒕𝒆𝒏𝒕𝒊𝒂𝒍 (𝑨𝒗𝒊, 𝒆𝒊, 𝒕𝒊) − 𝑭𝒆𝒂𝒓𝒕𝒉𝒓𝒆𝒔𝒉𝒐𝒍𝒅 (𝑨𝒗𝒊, 𝒆𝒊, 𝒕𝒊) of AVs based on social norms and emotions Simulate the Artificial society of AVs using Netlogo based on defined social interaction rules Compare with existing work Perform experiments using behavior space Fig 1. Proposed Method compliance artificial society of AVs. Furthermore, the method of using prospect-based emotion for generating emotions in agents has been compared with existing work in literature. 8 4-Description of the Novel Solution (A view point) In this section, the detailed description of the proposed viewpoint and model has been presented. 4.1 Humanizing the AVs: A Possible Design Decision? In order to include the social norms and emotions in the AVs, their fundamental design needs to be changed because it is important since it can lead to more human-like behavior on the future roads. It is important to note that emotional action is a social action that helps to regulate and adapt other actors' emotions and emotional expressions according to valid norms and rules [16]. The emulation of emotions and social norms in the design of AVs can help in building a possibly more comfortable, trustworthy and collision free AVs. However, the exact mode of implementation is still debatable. The supposition guiding this method would be that the rules and norms guiding human-human interaction/communication might also be pertinent in AV design. Thus, the design principle would have a goal to introduce anthropomorphism capabilities in AVs (Fig. 2). 4.2 How emotions enforce social Norms in Autonomous Vehicle: A scenario To analyze the above discussion further, let us examine a conjectural interaction situation of two autonomous vehicles as shown in figure 3. Suppose "A" is a heavy autonomous truck followed by a smaller-sized autonomous vehicle "B" considerably less in weight but occupying the same lane. Here, one way of representing "A" could be to consider it as a strong influencing person having a strong social status, whereas "B" is a less influencing person having a weak social character. For safe driving, both actors have to follow social norms and rules. In different social societies of the world, weaker feels the emotion of fear from stronger, whereas stronger 9 Fig 2. Autonomous vehicles exhibiting different emotions based on their size and situation Fig 3. Collision avoidance scenario using emotions enforced social norms can have multiple emotions for the weaker like sympathy and pride, etc. Actor "B" should maintain a safe distance from actor "A" or actor "A" should practice sympathetic emotion for "B" to avoid the collision. Let us suppose," A" decreases its speed without taking care of in- 10 between distance from "B", which might lead to the collision. Suddenly another actor "C" (having strong social status) appears on the road. "A" starts feeling the fear that if it collides with "B", then "C" will have the evidence of its cruelty. According to a social norm, "You will be punished for your act of crime "generates an emotion of fear of losing its status in social society and get punished from the law enforcement institutes. Consequently, A maintains a safe distance from B and avoids the collision. What has happened here? The primary event of fretting the weaker autonomous vehicle can be defined by some appraisal theory. This is the social norm that "Any actor of any status will be punished for performing evil deed". Therefore, actor "A" avoids or feels hesitation in the execution of collision scenarios in the presence of witnesses. This social norm generates the fear of being punished. It means fear forces the actor to follow the norm. 4.3- Artificial Social Society of AVs To further elaborate the idea presented in the previous section, we have given a concept of an artificial society of AVs, consists of different actors, and having each one different characteristic, which depicts their different social personalities. These different actors having different personality characteristics along their short abbreviated nicknames are presented in table 1. These characteristics have been assigned to these AVs from the real life behavior of human drivers driving these types of non- autonomous vehicles. It has been observed that drivers of heavy vehicles act dominantly, do not let the lighter vehicles to overtake or treat them harshly, in the real road traffic. 11 DIFFERENT ACTORS OF ARTIFICIAL SOCIETY OF AVS TABLE 1 Actor AV_Truck Symbol Actor T of Personality Type Weight Very Dominating >5000 AV_Bus B Very Dominating 4500<<50000 AV_Toyota_Small TY Dominating 3000 <4000 truck AV_Carry C Weak Dominating 2000 <2800 AV_Car 3000cc CB Weak Dominating 2000 <2500 AV_Car 2000cc CS Weak Dominating 1500 <1700 AV_Rickshaw AV_Ambulance AV_Motorbike R A M Weak Dominating 1200 <1400 Weak Dominating 1200^<1400 Very weak 800 <1100 Dominating AV_Cycle CL Very weak 400 Dominating 4.3.1 -Operational rules for artificial society of AVs Humans live socially following some rules, which help them to live peacefully, avoiding any possible conflicts, if follow them properly. In the analogy of these social rules, we have proposed some rules as well for the proposed artificial society of AVs. These rules have been designed in the light of different possible road scenarios, though all cannot be mentioned here, and further, the social norms have been presented as well along with the best-suited emotions. Furthermore, to check weather following social norm, according to the given condition, does not lead to the violation of the road traffic rules, we have applied a check to assure that the social norm will be followed only when the social norm and road norm both are in the compliance of each other. The last column of table 2 presents the action that the actor has to be taken to avoid the road collision. 12 We have used both formal and informal social norms, in our proposed model, and these have been rewritten in the context of AVs collision avoidance strategies. For example: • You ought to maintain a safe distance from stronger vehicles to avoid the collision. • You ought to be kind to the weak vehicles to avoid the collisions • Keep on your Lane • Help in executing safe overtaking maneuver SOCIAL NORMS AND EMOTIONS BASED ROAD INTERACTION RULES TABLE 2 Road Scenarios T is leading the CB and CB Social norm (1=Self-norm 2=Religious norm 3=Enforced Norms) Help the weaker Emotion Road norm (P) (p &q) Action Sympathy, Guilt, (Should assist P & q -> social norm wants to overtake the T Shame overtaking vehicle to p & q !-> social get past swiftly and norm securely) & (Keep your lane). CB is leading the T and T Maintain distance Fear (Must not drive in a P & q -> social norm wants to overtake the CB from stronger one bus lane) & (Should p & q !-> social assist overtaking norm vehicle to get past swiftly and securely) CB–CB following scenario Give the right or Tit Guilt, shame, (Must not drive in a P & q->social norm and the following CB wants for Tat Sympathy bus lane) & (Should p & q !-> social to overtake the leading CB. assist overtaking norm vehicle to get past swiftly and securely) T is following the B and T Give the right or Tit Fear ,guilt ,shame (Increase your speed P&q -> social norm wants to overtake B for Tat to keep a safe p&q !-> social norm distance from other vehicles) &(Should 13 assist overtaking vehicle to get past swiftly and securely) If CB following T in bright Keep the distance Fear Keep the safe P -> social norm conditions from stronger one distance and use the p!->social norm two-second rule. If CB following T in rainy Keep the distance Fear Keep the safe P -> social norm p conditions from stronger one distance and use the !-> social norm two-second rule. If CB is involved in Keep the distance Fear (Increase your speed P -> social norm tailgating with T from stronger one to keep a safe p!->social norm distance from other vehicles ) If T is involved in tailgating Keep the distance Fear (Increase your speed P & q -> social norm with CB from stronger one, to keep a safe p & q !-> social Abide the rule distance from other norm vehicles) & (must not drive in a bus lane) 4.3.2-Generate Prospect-based Emotions using OCC Model A very popular model of emotions was developed by Ortony, Clore and Collins also known as OCC model [17]. The reason for choosing the OCC model is they are presenting 22 basic emotions along with the concept of computing the emotions as well. In OCC model, the authors answer the question that what concludes the strength of the emotions. They commence a number of variables in enjoining to answer this problem. To address this problem, they introduce three types of variables as shown in Table 3. The OCC model is shown in the figure below. The variables given in Table 3 help to compute the strength of the emotions. However, these values 14 are still computed in qualitative manners. However, we will compute their quantitative values using fuzzy logic first and then use them to evaluate proposed schemes given in coming sections. 4.4 Overall functionality of proposed approach The overall functionality of the proposed approach is presented in figure 4 and its description is given as under. 1. In EventPart1, CB is following T and it requests the T to give safe passage for performing an overtaking maneuver. Belief will depict the situation awareness of CB and T. The current values of Belief are passed to the Prospect Based Emotion Generation module. 2. Prospect Based Emotion Generation module computes the emotion fear based on equation 1 and 2 provided by OCC model [25]. 𝐹𝑒𝑎𝑟 − 𝑃𝑜𝑡𝑒𝑛𝑡𝑖𝑎𝑙(𝐴𝑣𝑖, 𝑒𝑖, 𝑡𝑖) = 𝑓𝑓[ 𝐷𝑒𝑠𝑖𝑟𝑒 (𝐴𝑣𝑖,𝑒𝑖,𝑡𝑖), 𝐿𝑖𝑘𝑙𝑖ℎ𝑜𝑜𝑑 (𝐴𝑣𝑖,𝑒𝑖,𝑡𝑖), 𝐼𝑔(𝐴𝑣𝑖,𝑒𝑖,𝑡𝑖)] ..(1) 𝐹𝑒𝑎𝑟 − 𝐼𝑛𝑡𝑒𝑛𝑠𝑖𝑡𝑦 (𝐴𝑣𝑖, 𝑒𝑖, 𝑡𝑖) = 𝐹𝑒𝑎𝑟 − 𝑃𝑜𝑡𝑒𝑛𝑡𝑖𝑎𝑙 (𝐴𝑣𝑖, 𝑒𝑖, 𝑡𝑖) − 𝐹𝑒𝑎𝑟𝑡ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 (𝐴𝑣𝑖, 𝑒𝑖, 𝑡𝑖) .. (2) 3. The computed Intensity of fear will update Belief of the agent. 4. Based on Intensity of fear Fw is computed. The Fw function is computed using equation 3. Equation 3 shows that the willing function of T, which allows the overtaking, depends on the intensity of fear. 𝐹𝑤 (𝑜𝑏𝑒𝑦−𝑛𝑜𝑟𝑚)= 𝐹𝑒𝑎𝑟 − 𝐼𝑛𝑡𝑒𝑛𝑠𝑖𝑡𝑦 (𝐴𝑣𝑖, 𝑒𝑖, 𝑡𝑖) .. (3) In the first iteration, the value of the emotion will be zero. In the Willing Function part, it will be checked whether the value of Willing Function of T is higher than λ or it is less than λ. Here two scenarios exist; first, if the Fw of T is less than λ, and second if the Fw is greater than λ. 5. If the value of Fw is smaller than the egoist value of agent then it disobeys the Norm. 15 6. In the case of disobeying the Norm, T will be entered in the pre-crash scenario. For the pre-crash scenario we have considered the variables defined by [18] 7. The event of pre-crash scenario will contribute in the shape of the High likelihood of an accident and it will increase the intensity of fear. Again, the belief of agent will be updated and Fw will be computed. If the Fw is still smaller than λ then the emotion generation center will be consulted again to depict a highly dangerous situation. If the value of Fw is greater than λ then the egoist agent will change its mind and turn into the emotional agent and the emotions act as a norm compliance mechanism. In next step agent will check the road norm that accepting the preceding AV (CB) request is not against the road norm, then it will load possible solutions and execute the maneuver, which will ultimately help in CB in performing an overtaking maneuver by avoiding rear end collision. 5-Experiments This section describes the two types of experiments: Quantitative Computation of Prospect-based Emotion using Fuzzy Logic and validation of EEC_Agent . 5.1 Experiment 1 Since human emotions are fuzzy and complex in nature, using fuzzy sets for modeling the human emotions can be a suitable choice [19]. For modeling the emotions, fuzzy logic has been extensively utilized [20]. A computational model of emotions has been proposed that can be included in any cognitive agent or program. In [21], the Takagi-Sugeno (TS) fuzzy model has been utilized to develop an online learning system of emotions. The purpose of designing this system was to investigate that how multi-model actions can be generated and understand by cognitive robots. In [22], a novel method is proposed which helps to model the emotions using 16 different types of physiological data. For this purpose two fuzzy logic models are employed: one model is used for converting the signals into valence and arousal and the second model is used Event Part 1 11 1 Belief 2 (Initialize Likelihood, Desirability, Ig) 3 Fw > = λ Yes 4b No 4a Generate Emotions using Prospect Based Emotion defined by OCC Model 𝑭𝒆𝒂𝒓 − 𝑷𝒐𝒕𝒆𝒏𝒕𝒊𝒂𝒍(𝑨𝒗𝒊, 𝒆𝒊, 𝒕𝒊) = 𝒇𝒇[ 𝑫𝒆𝒔𝒊𝒓𝒆 (𝑨𝒗𝒊,𝒆𝒊,𝒕𝒊), 𝑳𝒊𝒌𝒍𝒊𝒉𝒐𝒐𝒅 (𝑨𝒗𝒊,𝒆𝒊,𝒕𝒊), 𝑰𝒈(𝑨𝒗𝒊,𝒆𝒊,𝒕𝒊)] 𝑭𝒆𝒂𝒓 − 𝑰𝒏𝒕𝒆𝒏𝒔𝒊𝒕𝒚 (𝑨𝒗𝒊, 𝒆𝒊, 𝒕𝒊) = 𝑭𝒆𝒂𝒓 − 𝑷𝒐𝒕𝒆𝒏𝒕𝒊𝒂𝒍 (𝑨𝒗𝒊, 𝒆𝒊, 𝒕𝒊) − 𝑭𝒆𝒂𝒓𝒕𝒉𝒓𝒆𝒔𝒉𝒐𝒍𝒅 (𝑨𝒗𝒊, 𝒆𝒊, 𝒕𝒊) Disobey Norms 6 5 Leads Road Norms Pre-crash Scenario Execute Collision Avoidance Maneuver 10 Load Possible Collision Avoidance Solutions Controls 9 Obey Norms Yes 8b 7 Comply No 8a Fig 4. Overall functionality of proposed approach for converting this valence and arousal to five emotional states related to the computer games e.g. boredom, excitement, challenge, frustration, and fun. In our case, the OCC model provides a computation traceability algorithm shown below for computing the intensity of fear in [23]. 17 However, it is useless if the numeric values of linguistic variables like likelihood, desire and Ig variables are not known. If Prospect (v, e, t) and Undesirable (v, e, t) < 0 Then set Fear-Potential (v, e, t) = ff [Desire (v, e, t) , Likelihood (v, e, t), Ig (v, e, t)] If Fear-Potential (v, e, t) > Fear-Threshold (v, t) Then set Fear-Intensity (v, e, t) = Fear-Potential (v, e, t) - Fear-Threshold (v, t) Else set Fear-Intensity (v, e, t) =0 5.1.1 Implementation details of fuzzy logic to compute the numeric values of Fear Emotion In order to compute the Fear-Potential as given in part 1 of the computation traceability algorithm, we have to calculate the values of Desirability, Likelihood, and Intensity of a global variable. In the context of the state of the art given above, we used fuzzy logic to compute the numeric values of Desirability, Likelihood, and Intensity of global variable. a) Likelihood: For the variable of Likelihood the five linguistic tokens VLLH, LLH, MLH, HLH and VHLH were defined which represent Very low likelihood, Low likelihood, Medium likelihood, High likelihood and Very High likelihood respectively shown in table 3. LIKELIHOOD LINGUISTIC TOKENS AND THEIR DESCRIPTION TABLE 3 Linguistic Tokens Description VHLH Very High Likelihood HLH MLH LLH High Likelihood Medium Likelihood Low Likelihood VLLH Very Low Likelihood The variable of likelihood is affected by Distance and Speed variables. Twenty-five rules were defined to obtain the value of the variable likelihood; these rules are given in the following table. 18 TABLE 4 LIKELIHOOD FUZZY INFERENCE RULES If Distance is And Speed is VHD VHS Then Likelihood is MLH VHD VHD VHD VHD HD HD HD HD HD MD MD MD MD MD LD LD LD LD LD V LD V LD V LD V LD V LD HS MS LS VLS VHS HS MS LS VLS VHS HS MS LS VLS VHS HS MS LS VLS VHS HS MS LS VLS LLH VLLH VLLH VLLH HLH MLH VLLH VLLH VLLH VHLH VHLH MLH LLH VLLH VHLH VHLH HLH MLH VLLH VHLH VHLH VHLH HLH MLH The remaining details are given in appendix A. 19 5.2 -Experiment 2 The purpose of the second main experiment is to simulate the concept of an artificial society of AVs, which consists of different actors having different characteristics. Another reason of simulation is to study the behavior of these actors according to the defined social rules during autonomous driving. For this purpose, Netlogo 5.3 has been utilized which is a standard agent-based simulation environment. The NetLogo environment consists of patches, links, and turtles [24]. The algorithms used in this experiment have already been given in section 3.1.3. Figure 5 presents the experimental environment along with input and output parameters. The left side of the simulation world contains input sliders for providing fuzzy logic based numeric values of prospect based emotion variables (Undesirability, Likelihood, Ig). It is important to recall here that these numeric values of prospect-based emotions were computed through experiments a, b and c using fuzzy logic and then provided to the agent based simulation by following proposed SimConnector approach. Fig. 5 Main Simulation Screen of Social Norms and Emotions inspired artificial society of AVs 5.2.1- Simulation Parameters Description 20 The simulated world consists of different types of input and output parameters. To provide the inputs, different sliders have been used, whereas to get the outputs, monitors and plots are used. The description of each input and output object along with defined range is presented in table 5. Simulation Parameters Number of Autonomous General Range [1-30] SIMULATION PARAMETERS AND THEIR DESCRIPTION TABLE 5 Description This slider helps in defining the maximum members of the artificial Vehicles Agents society of AVs. Vehicles Ratio [2:1, 3:1, 4:1] It defines the ratio of AV Trucks and cars within a total number of vehicles set by the Number of Autonomous Vehicles Agents slider. Maximum Velocity [0 -1; with increment This slider helps in defining the maximum velocity that can be achieved of 0.01] by all actors of artificial society Minimum Velocity [0 -1; with increment This slider helps in defining the lower boundary of velocity achieved by of 0.01] all actors of artificial society Acceleration-rate [0 -1; with increment This slider helps in defining the maximum acceleration rate that can be of 0.05] used by all actors of artificial society Declaration-rate [0 -1; with increment This slider helps in defining the minimum declaration- rate that can be of 0.05] used by all actors of artificial society Safety Distance [2 -10-; with increment This slider helps in defining the safety distance between each actor. of 1] Sonar Range [1 -10-; with increment This slider helps in defining the sonar range of each AV to find out the of 1] position and distance between neighboring Avs. Metacognition On/Off This switch helps in defining that the simulation is in Random walk or social norms mode. Prospect Based Emotion Range Description i.e. Fear Generation Parameters Likelihood [0 -1; with increment This slider helps in defining the likelihood of accident perceived by AV of 0.1] 21 Desirability [0 -1; with increment This slider helps in defining the current desirability value of AV. of 0.1] Ig [0 -1; with increment This slider helps in defining the current Ig value of AV. of 0.1] 5.2.2 Experimental design In this section, further experimental design has been proposed to perform the experiment 2 in proper manners. a) Experiments_TypeA In this category of experiments, total five sets of experiments have been designed to test the non- social norms random walk based artificial society of AVs. In the first set of experiments, the Max Velocity Range parameter has been set to 0.8, which represents a high velocity of AVs. The Acceleration/ Deceleration Rate parameters are set to 0.1 along with the Safety Distance equal to 3. In the second set of experiments, the Max Velocity Range parameter has been set to 0.5, which represents a medium velocity of AVs. The Acceleration Rate parameter is set to 0.2 along with the Safety Distance equal to 2. In the third set of experiments, the Max velocity range is set to 0.3, which represent the low velocity of AVs. The Acceleration Rate and Declaration Rate parameters are both set to 0.1. In the fourth set of experiments, Acceleration and Deceleration Rates are set to 0.3 and the values of safety Distance and Sonar Range are set to 3. This set of experiment helps in measuring the performance of non-social norms random walk based artificial society of autonomous vehicles having equal safety distance and sonar range. In the fifth set of experiments, safety distance, and sonar range parameters are set to 1. This set of experiment helps in testing the behavior of AVs having equal low safety distance and sonar range. All of these sets of experiments have been executed using the behaviour space tool within the Netlogo 22 5.3 environment. Furthermore, each set of experiments has been repeated seven times and the total number of collisions along with their mean and standard deviation has been computed. The details of these 5 sets of experiments are presented in table 6, table 7, table 8, table 9, and table 10 respectively. Experiment No Number of AVs 1 2 3 4 5 10 15 20 25 30 Experiment No Number of AVs 1 2 3 4 5 10 15 20 25 30 Experiment No Number of AVs 10 15 20 25 30 1 2 3 4 5 EXPERIMENT TYPE_A SET 1: PARAMETERS AND THEIR VALUES TABLE 6 Min Velocity Range 0.14 Max Velocity Range 0.8 0.14 0.14 0.14 0.14 0.8 0.8 0.8 0.8 Acceleration Rate Deceleration Rate Safety Distance Sonar Range 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 3 3 3 3 3 2, 5 2, 5 2, 5 2, 5 2, 5 EXPERIMENT TYPE_A SET 2: PARAMETERS AND THEIR VALUES TABLE 7 Min Velocity Range 0.14 Max Velocity Range 0.5 0.14 0.14 0.14 0.14 0.5 0.5 0.5 0.5 Acceleration Rate Deceleration Rate Safety Distance Sonar Range 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.2 2 2 2 2 2 2, 5 2, 5 2, 5 2, 5 2, 5 EXPERIMENT TYPE_A SET 3: PARAMETERS AND THEIR VALUES TABLE 8 Min Velocity Range 0.14 Max Velocity Range 0.3 0.14 0.14 0.14 0.14 0.3 0.3 0.3 0.3 Acceleration Rate Deceleration Rate Safety Distance Sonar Range 0.1 0.1 0.1 0.1 0.1 2 2 2 2 2 2 2 2 2 2 0.1 0.1 0.1 0.1 0.1 23 Experiment No Number of AVs 1 2 3 4 5 10 15 20 25 30 Experiment No Number of AVs 1 2 3 4 5 10 15 20 25 30 EXPERIMENT TYPE_A SET 4: PARAMETERS AND THEIR VALUES TABLE 9 Min Velocity Range 0.14 Max Velocity Range 0.3 0.14 0.14 0.14 0.14 0.3 0.3 0.3 0.3 Acceleration Rate Deceleration Rate Safety Distance Sonar Range 0.3 0.3 0.3 0.3 0.3 0.3 0.3 0.3 0.3 0.3 3 3 3 3 3 3 3 3 3 3 EXPERIMENT TYPE_A SET 5: PARAMETERS AND THEIR VALUES TABLE 10 Min Velocity Range 0.14 Max Velocity Range 0.3 0.14 0.14 0.14 0.14 0.3 0.3 0.3 0.3 Acceleration Rate Deceleration Rate Safety Distance Sonar Range 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 1 1 1 1 1 1 1 1 1 1 b) Experiments_TypeB In this category of experiments, total five sets of experiments in parallel the Experiments_TypeA have been designed to test and compare the social norms and emotions inspired artificial society of AVs with non-social norms random walk based artificial society of AVs. These five sets of experiments are designed in parallel to the Type_A experiments. These sets of experiments have the same values of parameters as type_A experiments have. The additional parameter added in these experiments is the variables of fear, which help in computing the intensity of fear. Table 11 through 15 presents these 5 sets of experiments respectively. 24 EXPERIMENT TYPE_B SET 1: PARAMETERS AND THEIR VALUES TABLE 11 Experiment No Number of AVs 1 2 3 4 5 10 15 20 25 30 Min Velocity Range 0.14 Max Velocity Range 0.8 0.14 0.14 0.14 0.14 0.8 0.8 0.8 0.8 Acceleration Rate Deceleration Rate Safety Distance Sonar Range LI, UD, Ig 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 3 3 3 3 3 2 , 5 0.1-0.1-1 2 , 5 0.1-0.1-1 2 , 5 0.1-0.1-1 2, 5 0.1-0.1-1 2 , 5 0.1-0.1-1 EXPERIMENT TYPE_B SET 2: PARAMETERS AND THEIR VALUES TABLE 12 Experiment No Number of AVs 1 2 3 4 5 10 15 20 25 30 Min Velocity Range 0.14 Max Velocity Range 0.5 0.14 0.14 0.14 0.14 0.5 0.5 0.5 0.5 Acceleration Rate Deceleration Rate Safety Distance Sonar Range LI, UD, Ig 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.2 2 2 2 2 2 2, 5 0.1-0.1-1 2, 5 2, 5 2, 5 2, 5 0.1-0.1-1 0.1-0.1-1 0.1-0.1-1 0.1-0.1-1 EXPERIMENT TYPE_B SET 3: PARAMETERS AND THEIR VALUES TABLE 13 Experiment No Number of AVs 1 2 3 4 5 10 15 20 25 30 Min Velocity Range 0.14 Max Velocity Range 0.3 0.14 0.14 0.14 0.14 0.3 0.3 0.3 0.3 Acceleration Rate Deceleration Rate Safety Distance Sonar Range LI, UD, Ig 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 2 2 2 2 2 2 2 2 2 2 0.1-0.1-1 0.1-0.1-1 0.1-0.1-1 0.1-0.1-1 0.1-0.1-1 EXPERIMENT TYPE_B SET 4: PARAMETERS AND THEIR VALUES TABLE 14 Min Velocity Range 0.14 Max Velocity Range 0.3 0.14 0.3 Acceleration Rate Deceleration Rate Safety Distance Sonar Range LI, UD, Ig 0.3 0.3 0.3 0.3 3 3 3 3 0.1-0.1-1 0.1-0.1-1 25 Experiment No Number of AVs 10 15 1 2 3 4 5 20 25 30 0.14 0.14 0.14 0.3 0.3 0.3 0.3 0.3 0.3 0.3 0.3 0.3 3 3 3 3 3 3 0.1-0.1-1 0.1-0.1-1 0.1-0.1-1 EXPERIMENT TYPE_B SET 5: PARAMETERS AND THEIR VALUES TABLE 15 Min Velocity Range 0.14 Max Velocity Range 0.3 0.14 0.14 0.14 0.14 0.3 0.3 0.3 0.3 Acceleration Rate Deceleration Rate Safety Distance Sonar Range LI, UD, Ig 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 1 1 1 1 1 1 1 1 1 1 0.1-0.1-1 0.1-0.1-1 0.1-0.1-1 0.1-0.1-1 0.1-0.1-1 Experiment No Number of AVs 10 15 20 25 30 1 2 3 4 5 6-Results and Discussion This section elaborates the detailed discussion according to the results achieved for experiment1 and experiment 2. 6.1 Experiment 1 Criado et al. [8], have utilized prospect based emotions defined by the OCC model to enforce the agents to obey the social norms. However, the authors have not proposed any proper mechanism, which helps to quantify the different intensities of fear. Furthermore, the authors have considered only Desirability and likelihood variables, whereas ignoring Ig variable. In addition, the values of desirability and Likelihood variable are just supposed between [-1 1] without providing any justification. Our approach is better than [8] in this regard that we have used fuzzy logic to compute the numeric values of Fear variables (Likelihood, Desirability, Ig) to computer Fear Potential and then Fear Intensity has been computed using the proper algorithm defined by the inventors of the OCC model [25]. Table 1 shows the quantitative values of undesirability from very low (VL) to very high (VH). The terms VLD, LD, MD, HD, and VHD are the acronyms of very low desirability, low 26 desirability, medium desirability, high desirability and very high desirability respectively. If the agent has a value between 0-0.24 for its undesirability of an event, then it can be interpreted as the very low undesirability. However, from an abstract analysis, it can be noted that due to the fuzzy nature of the emotion fear the boundary of one intensity level mixes in the boundary of another intensity level. Hence, the intensity levels lie between 0.24 and 0.5 will be interpreted as low undesirability and lower than these values as the very low undesirability. In the same way, the other intensity levels of undesirability variable can be interpreted. In the same way, Table 2 and table 3 are showing the five quantitative values for finding the different intensity levels of likelihood and Ig variables. These quantitative values of Desirability, Likelihood and Ig are presented in table 16, 17 and 18 respectively. These values are then provided to the EEC_Agent for computing different intensities of fear in the next section by following the proposed SimConnector design. VLD 0-0.24 VLL 0-0.24 VLIg 0-0.24 Quantitative Values of Five Intensity levels of Desirable Variable TABLE 16 LD MD HD 0.1-0.5 0.25-0.73 0.51-0.9 QUANTITATIVE VALUES OF FIVE INTENSITY LEVELS OF LIKELIHOOD VARIABLE TABLE 17 LL ML HL 0.1-0.5 0.25-0.73 0.51-0.9 VHD 0.76-1 VHL 0.76-1 Quantitative Values of Five Intensity levels of Global Variable (Ig) TABLE 18 LIg 0.1-0.5 MIg HIg 0.25-0.73 0.51-0.9 VIg 0.76-1 27 6.2 Experiment 2 7.2.1 The Results: Experiment_TypeA set 1 Vs Experiment_TypeB set 1 and Experiment_TypeA set 2 Vs Experiment_TypeB set 2 The results of both experiments_TypeA set 1 and experiments_Type B set1 are presented in the form of average accidents along with standard deviation in table 19. From the results, it can be seen that there is a high average of accidents in case of non-social norms random walk based artificial society of AVs as compared to the social norms and emotions based artificial society of AVs. For example, the average accidents performed by non- social norms random walk based are 48.63 for 10 AVs. Comparatively, 2.57 are the average accidents performed by social norms and emotions based technique. In the same way, for 30 AVs total average accidents by non-social norms random walk are 305. 43 and 59. 35 by the social norms and emotions based technique. From the results, another interesting phenomenon can be observed that the average accidents in both techniques are gradually increasing as the number of AVs is increasing. Figure 6 (A) is representing the graphical representation of the results of table 19. In comparison to the table 19, table 20 has been presented. Table 20 presents the results of both experiment_TypeA set2 and experiment_TypeB set 2 in the form of average accidents along with standard deviation. Before discussing the results of table 20 it would be interesting to perform the comparison of table 19 and table 20. Experiments_TypeA set 1 and experiments_TypeB set1 have a high maximum velocity range, i.e. 0.8 with acceleration and deceleration rate 0.1. Whereas, experiments_TypeA set2 and experiments_TypeB set 2 have medium maximum velocity range, i.e. 0.5 with acceleration and deceleration rates 0.2. From table 20, it can be seen that average accidents have been decreased due to medium maximum velocity range as compared to the average accidents 28 presented in table 19 having a high maximum velocity range. For example, in table 19 and 20 for social norms and emotions based technique, the average accidents performed by 10 AVs are 2.57 and 44.35 respectively. In the same way, in the case of 30 AVs, the average accidents performed by social norms and emotions based technique are 59.35 and 24.065 respectively. From the table 20, it can be seen that social norms and emotions based technique have less number of collisions as compared to the non-social norms random walk based technique. For example, the average accidents performed by social norms and emotions based artificial society are 6.35 for 20 AVs. Whereas, for the same number of AVs the average accidents performed by non-social norms based artificial society are 147.03. Figure 6 (B) is representing the graphical representation of the results of table 20. TABLE 19 Set 1 Type A & B Experiments Results TABLE 20 Set 2 Type A & B Experiments Results No. of AVs Social norms and Emotions Based Nonsocial norms Random walk based 10 AVs Mean 2.573837 Stdev 1.597861 Mean 48.63886 Stdev 10.05186 No. of AVs 10 AVs Social norms and Emotions Based Non-social norms Random walk based Mean 0.83308 Stdev 0.75219454 Mean 44.35492 Stdev 10.41238 15 AVs 7.317401 3.12966 95.57575 13.87058 15 AVs 2.688164 1.50878434 92.14185 12.76792 20 AVs 16.17935 6.106475 152.584 18.13361 20 AVs 6.358672 2.40534634 147.0383 15.39402 25 AVs 32.20731 11.09385 222.3648 21.98538 25 AVs 13.37643 3.34040996 207.6984 17.56855 30 AVs 59.35412 17.14856 305.439 25.01929 30 AVs 24.06544 4.45493639 276.0833 19.05506 29 Social norms and Emotions Based Non social norms Random walk based 330 300 270 240 210 180 150 120 90 60 30 0 10 AVs 15 AVs 20 AVs 25 AVs 30 AVs Social norms and Emotions Based Non social norms Random walk based 300 270 240 210 180 150 120 90 60 30 0 10 AVs 15 AVs 20 AVs 25 AVs 30 AVs (A) (B) Fig. 6 Graphical representation of the results (A) Experiment_TypeA set 1 Vs Experiment_TypeB set 1 (B) Experiment_TypeA set 2 Vs Experiment_TypeB set 2 In the same way, for the 10, 20, 25, and 30 number of AVs, average number of collisions by the social norms and emotions based artificial society of AVs are less than non-social norms and random walk based artificial society of AVs. It would be interesting to present here the analysis of TypeB set 1 and set 2 experiments with Type B set 3 experiments. From the comparative study of table 19, 20 and 21 it can be seen that Type B set 3 results are better than Type B set1 and set 2 experiments. For example, for 30 AVs, the average collisions performed by set1 and set 2 are 59.35 and 24.06. Whereas there are only 14.69 collisions on average by TypeB set 3. Hence, it can be concluded that social norms and emotions based artificial society of AVs can have less number of collisions by adapting low maximum velocity range i.e. 0.3 and both safety and sonar distances equal to 2. Figure 7 (C) and (D) are the graphical representations of table 21 and 22 respectively. 30 TABLE 21 Set 3 Type A & B Experiments Results TABLE 22 Set 4 Type A & B Experiments Results No. of AVs 10 AVs Social norms and Emotions Based Nonsocial norms Random walk based No. of AVs Mean 0.785513 Stdev 0.916095 Mean 22.66486 Stdev 10.09421 10 AVs Social norms and Emotions Based Stdev 2.067026 Mean 1.889218 Non-social norms Random walk based Mean 25.12701 Stdev 9.707391 15 AVs 2.268417 1.664854 55.82655 13.73423 15 AVs 6.042479 3.723965 60.30161 13.30325 20 AVs 4.767293 2.38503 101.9607 17.59697 20 AVs 14.54727 5.010924 106.1374 14.68821 25 AVs 8.728624 3.078323 158.7121 20.06934 25 AVs 28.01678 6.281523 158.8475 17.78358 30 AVs 14.69935 3.936857 222.0574 22.18164 30 AVs 44.53196 7.017011 219.4805 18.46683 Social norms and Emotions Based Non social norms Random walk based 10 AVs 15 AVs 20 AVs 25 AVs 30 AVs Social norms and Emotions Based Non social norms Random walk based 270 240 210 180 150 120 90 60 30 0 Number of AVs (C) 10 AVs 15 AVs 20 AVs Number of AVs (D) 25 AVs 30 AVs Fig. 7 Graphical representation of the results (C)_TypeA set 3 Vs Experiment_TypeB set 3 (D) Experiment_TypeA set 4 Vs Experiment_TypeB set 4 270 240 210 180 150 120 90 60 30 0 6.2.3 The Results: Experiment_TypeA and TypeB set 3 Vs Experiment_TypeA set 5 Vs Experiment_TypeA and Type_B set 5 Both sets 3 and 5 of Experiments_Type A and B have the same values of parameters expect safety distance and sonar range. In the set 3, both safety and sonar range are set to 3. Whereas for the set 5, both of these parameters are set to 1. From the comparative analysis, it can be seen that the set 3 has less number of collisions for 10, 15, 20 and 25 AVs. However, for 30 AVs, set 5 haS less number of accidents. From the trend line shown 31 in figure 8 (E) for experiments_TypeA set 3, it can be seen that the number of collisions is increasing gradually as the number of AVs is increasing. In contrast to the trend line shown in figure 8 (F) for experiments_TypeA set 3 presents a gradual increase for 10, 15, 20, and 25 AVs but then suddenly drop down for 30 AVs. Hence, it means that the set 3 provides optimal operational parameters for the artificial society of AVs within the range 1 to 25. Whereas, for 30 AVs experiment no 5 of set 5 is the optimal option. From these results, we can also deduce that for higher AVs, small and equal safety distance and sonar range parameters are most optimal one. If we see the results of table 23 then it is obvious that social norms and emotions based artificial society of AVs have less number of collisions for all numbers of AVs as compared to the non-social norms and emotions based artificial society of AVs. 6.2.4 Analysis of most optimal Sonar Range Vs. Safety Distance for less number of collisions in Social norms and Emotions Based artificial society of AVs Table 24 presents the number of collisions for different number of AVs according to different safety distances and sonar ranges in experiments_TypeA set1 to set5. From the results, it can be seen that when safety distance and sonar range parameters having values (1, 1) and (2, 2) respectively, the average number of collisions is lesser. For example, for 10 AVs with safety distance and sonar range parameters set to (1, 1) and (1, 2) the average number of collisions are 0.79 and 0.78 respectively as compared to the 3.01, 1.88 and 2.12 for sonar range and safety distance parameters set to (3, 2), (3, 3), and (3, 5) respectively. From the set4, experiments_TypeA with safety distance and sonar range parameters set to (3, 2) the average number of collisions is higher than all other experiments. Its reason is smaller safety distance than the sonar range. It means that when the AV has higher safety 32 TABLE 21 Set 3 Type A & B Experiments Results Social norms and Emotions Based Nonsocial norms Random walk based TABLE 23 Set 5 Type A & B Experiments Results Social norms and Emotions Based Nonsocial norms Random walk based No. of AVs No. of AVs 10 AVs Mean 0.785513 Stdev 0.916095 Mean 22.66486 Stdev 10.09421 10 AVs Mean 0.791342 Stdev 0.576955 Mean 37.75169 Stdev 11.27174 15 AVs 2.268417 1.664854 55.82655 13.73423 15 AVs 2.084906 0.999392 85.15609 14.30291 20 AVs 4.767293 2.38503 101.9607 17.59697 20 AVs 7.152462 1.965884 145.9167 16.50659 25 AVs 8.728624 3.078323 158.7121 20.06934 25 AVs 11.63587 2.745418 215.4169 18.68783 30 AVs 14.69935 3.936857 222.0574 22.18164 30 AVs 4.069908 1.37926 294.7733 20.14137 Social norms and Emotions Based Non social norms Random walk based 270 240 210 180 150 120 90 60 30 0 Social norms and Emotions Based Non social norms Random walk based 300 270 240 210 180 150 120 90 60 30 0 10 AVs 15 AVs 20 AVs 25 AVs 30 AVs 10 AVs 15 AVs 20 AVs 25 AVs 30 AVs Number of AVs (E) Number of AVs (F) Fig. 8 Graphical representation of the results (E) Experiment_TypeA set 3 Vs Experiment_TypeB set 3 (F) Experiment_TypeA set 5 Vs Experiment_TypeB set 5 distance and low capability of detecting its neighbors then the number of collisions increases. Figure 9 presents the graphical representation of the results of table 24. Experimental results of TypeA set1- set 5 regarding different sonar ranges TABLE 24 range, Safety Sonar distance 1, 1 10 AVs1 0.791342 15 AVs 2.084906 20 AVs 7.152462 25 AVs 11.63587 30 AVs 4.069908 2, 2 0.785513 2.268417 4.767293 8.728624 14.69935 33 2, 5 3, 2 3, 3 3, 5 0.814496 2.711523 6.390049 13.36398 24.04687 3.01972 8.936398 20.14434 40.31569 72.42839 1.889218 6.042479 14.54727 28.01678 44.53196 2.127955 5.698404 12.21435 24.09892 46.27984 Comparison of different safety distances and sonar ranges settings in experiments_TypeA set 1 to set 5 80 70 60 50 40 30 20 10 0 10 AVs1 15 AVs 20 AVs 25 AVs 30 AVs 1, 1 2, 2 2, 5 3, 2 3, 3 3, 5 FIG. 9 Graphical representation of Results regarding different sonar ranges given in Experiments: TypeA set1- set 5 7-Conclusion The paper has been written in the context of proposing a novel collision avoidance solution for the AVs, when they will be the main players of the road traffic. In the near future, it has been assumed that AVs will be very common and people will delegate their driving powers to them. To answer the question that how AVs will be able to fulfill the expectations of humans in terms of safer road operations with less number of collisions and harmless interactions with each other , especially when human drivers have no role in their operations, this research work has been done. The answer has been provided through the human social life protocol, which lies in their core, humans, to interact with each other, avoiding the conflicts, and keeping the social society in equilibrium. The key is following 34 social norms under the influence of primary emotions. Furthermore, the simulation results have provided optimal parameters, like optimal sonar range and different optimal speeds suitable for avoiding the road collisions in different road traffic situations. This research work might be suitable for AV vendors to reinvent the autopilot design, in terms of including social norms, emotions and optimal operating parameters. Hopefully it will make AVs capable to cope with the current dilemma that how the AVs make themselves more trustworthy in terms of safe travelling. References F. Riaz and M. A. Niazi, "Road collisions avoidance using vehicular cyber-physical systems: a taxonomy and review," Complex Adaptive Systems Modeling, vol. 4, p. 1, 2016. T. Litman, "Autonomous Vehicle Implementation Predictions," Victoria Transport Policy Institute, vol. 28, 2014. A. C. Mersky and C. Samaras, "Fuel economy testing of autonomous vehicles," Transportation Research Part C: Emerging Technologies, vol. 65, pp. 31-48, 2016. B. F. Malle, "Integrating robot ethics and machine morality: the study and design of moral competence in robots," Ethics and Information Technology, pp. 1-14, 2015. A. Rakotonirainy, R. Schroeter, and A. Soro, "Three social car visions to improve driver behaviour," Pervasive and Mobile Computing, vol. 14, pp. 147-160, 2014. W. Kumfer and R. Burgess, "Investigation into the Role of Rational Ethics in Crashes of Automated Vehicles," Transportation Research Record: Journal of the Transportation Research Board, pp. 130-136, 2015. J. Elster, "Social norms and economic theory," in Culture and Politics, ed: Springer, 2000, pp. 363-380. N. Criado, E. Argente, P. Noriega, and V. Botti, "Human-inspired model for norm compliance decision making," Information Sciences, vol. 245, pp. 218-239, 2013. A. Staller and P. Petta, "Introducing emotions into the computational study of social norms: A first evaluation," Journal of artificial societies and social simulation, vol. 4, pp. U27-U60, 2001. J. C. Gerdes and S. M. Thornton, "Implementable Ethics for Autonomous Vehicles," in Autonomous Driving, ed: Springer, 2016, pp. 87-102. H. T. Tavani, Ethics and technology: Controversies, questions, and strategies for ethical computing: John Wiley & Sons, 2011. M. Van de Voort, W. Pieters, and L. Consoli, "Refining the ethics of computer-made decisions: a classification of moral mediation by ubiquitous machines," Ethics and Information Technology, vol. 17, pp. 41-56, 2015. A. Etzioni and O. Etzioni, "AI assisted ethics," Ethics and Information Technology, vol. 18, pp. 149-156, 2016. T. Schmidt, R. Philipsen, and M. Ziefle, "User Diverse Privacy Requirements for V2X-Technology," 2016. J. Gogoll and J. F. Müller, "Autonomous cars: in favor of a mandatory ethics setting," Science and Engineering Ethics, pp. 1- 20, 2016. A. R. Hochschild, "Emotion work, feeling rules, and social structure," American journal of sociology, pp. 551-575, 1979. A. Ortony, G. L. Clore, and A. Collins, The cognitive structure of emotions: Cambridge university press, 1990. W. G. Najm, J. D. Smith, and M. Yanagisawa, "Pre-crash scenario typology for crash avoidance research," in DOT HS, 2007. M. S. El-Nasr and J. Yen, "Agents, emotional intelligence and fuzzy logic," in Fuzzy Information Processing Society- NAFIPS, 1998 Conference of the North American, 1998, pp. 301-305. M. S. El-Nasr, J. Yen, and T. R. Ioerger, "Flame-fuzzy logic adaptive model of emotions," Autonomous Agents and Multi- agent systems, vol. 3, pp. 219-257, 2000. A. Aly and A. Tapus, "An Online Fuzzy-Based Approach for Human Emotions Detection: An Overview on the Human Cognitive Model of Understanding and Generating Multimodal Actions," in Intelligent Assistive Robots, ed: Springer, 2015, pp. 185-212. R. L. Mandryk and M. S. Atkins, "A fuzzy physiological approach for continuously modeling emotion during interaction with play technologies," International journal of human-computer studies, vol. 65, pp. 329-347, 2007. C. E. Izard, Human emotions: Springer Science & Business Media, 2013. M. A. Niazi, "Emergence of a Snake-Like Structure in Mobile Distributed Agents: An Exploratory Agent-Based Modeling Approach," The Scientific World Journal, vol. 2014, 2014. 35 [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] Appendix A The Intensity of global variables (Ig): To compute the intensity of Ig variable, five linguistic tokens VLIG, LIG, MIG, HIG and VHIG were defined, which represent the very low intensity of Low likelihood, medium likelihood, high likelihood and the very high likelihood respectively. The linguistic tokens of Ig are presented in table 25. IG - LINGUISTIC TOKENS AND THEIR DESCRIPTION TABLE 25 Linguistic Tokens Description VLIG LIG MIG HIG VHIG Very low intensity of global variable Low intensity of global variable Medium intensity of global variable High intensity of global variable Very high intensity of global variable The intensity of global variable depends on proximity and a sense of reality variables. Twenty-five rules were defined to obtain the value of the variable likelihood; these rules are given in table 26. TABLE 26 IG - LIKELIHOOD FUZZY INFERENCE RULES If Sense of Reality is VLSOR VLSOR VLSOR VLSOR VLSOR LSOR LSOR LSOR LSOR LSOR MSOR MSOR MSOR MSOR MSOR HSOR HSOR HSOR HSOR HSOR VHSOR VHSOR And Proximity is About to Going to MChance LChance NChance About to Going to MChance LChance NChance About to Going to MChance LChance NChance About to Going to MChance LChance NChance About to Going to Then Intensity of Goal will be MIG MIG LIG VLIG VLIG HIG MIG MIG LIG VLIG HIG HIG MIG LIG VLIG VHIG HIG MIG LIG VLIG VHIG VHIG 36 VHSOR VHSOR VHSOR MChance LChance NChance HIG HIG MIG Experiment A. Computing Undesirability According to the OCC model, desirability is a local variable, which affects only event, and agent-based emotions. The desirability variable further comprises two sub-variables: First, one is the importance of the goal and the second one is the achievement of the goal. The effects of these two sub-variables in computing the desirability can be seen in the following scenario. Suppose that the goal of AV is reaching its destination on time. Suddenly the battery of the AV gets down. Now here the undesirability of the event can have more than one values. We are just representing here two cases. If the importance of goal is very high and it has traveled only 30 % of the distance towards its destination, then undesirability of the said event will be very high. In the second case, if the importance of goal is very low and it has achieved 100 % of an assigned task (battery gets down after reaching its destination) then the undesirability of the event will be very low. The main simulation screen of computing desirability (undesirability in the case of fear) is shown in figure 10. The screen is showing two input variables and one output variable. The input variables are the importance of Goal (ImpGoal), achievement of the goal (AchGoal) and the output variable is Undesirability. 37 Fig. 10 Main simulation screen for Desirability computation To compute undesirability trigonometric function (trimf) has been used with linguistic tokens VLUD, LUD, MUD, HUD and VHUD which represent Very low Undesirable, Low Undesirable, Medium Undesirable, High Undesirable and Very High Undesirable respectively to represent different intensity levels of undesirability. Twenty-five rules were defined to obtain the value of the variable undesirability; these rules are given in table 27. Validation of fuzzy logic rules for computing the Undesirability The validation of undesirability fuzzy rules has been performed in rule view of FIS editor. Rule viewer was provided random values for different linguistic tokens and in the result, fuzzy inference system computed different intensities of undesirability. To cross check the 38 outcomes hand trace mechanism has been adopted, which further validated the outcomes of different undesirability values shown in table 28. In test 1, it can be seen that the input variables ImpGoal, AchGoal have values 0.1 and 0.5, which lies in the very low range and medium range respectively. In result, the FIS system computes low undesirability i.e. 0.25, which is correct. In the same way in test 7 linguistic tokens medium importance of goal i.e. MImpG, medium achieved goal MAG has values 0.56 and 0.5, which lies in the medium range. In a result, the FIS system computes medium intensity of undesirability i.e. DESIRABILITY- LIKELIHOOD FUZZY INFERENCE RULES TABLE 27 If Importance of Goal is VLImpG VLImpG VLImpG VLImpG VLImpG LImpG LImpG LImpG LImpG LImpG MImpG MImpG MImpG MImpG MImpG HImpG HImpG HImpG HImpG HImpG VHImpG VHImpG VHImpG VHImpG And Achievement of goal is NAG LAG MAG HAG HFAG NAG LAG MAG HAG VHFAG NAG LAG MAG HAG VHFAG NAG LAG MAG HAG VHFAG NAG LAG MAG HAG Then undesirability will be MUD LUD LUD VLUD VLUD MUD MUD LUD VLUD VLUD HUD MUD MUD LUD LUD VHUD HUD HUD MUD VHUD VHUD HUD HUD HUD VHImpG VHFAG MUD 0.567, which is correct. In the same way, other validation results can be cross-checked using hand tracing mechanism. The following table shows that different values for ImpGoal and AchGoal were entered as input and each time output value of the Undesirability variable is according to the rules. 39 VALIDATION OF FUZZY LOGIC RULES FOR COMPUTING THE UNDESIRABILITY TABLE 28 No. Tests 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Of ImpGoal AchGoal Undesirability 0.1(VLImpG) 0.2(VLImpG) 0.27(LImpG) O.30(LImpG) 0.4(LImpG) 0.5(MImpG) 0.56(MImpG) 0.6(MImpG) 0.8(HImpG) 0.85(HImpG) 0.79(HImpG) 0.96(VHImpG) 0.98(VHImpG) 1.0(VHImpG) 0.5(MAG) 1.0(VHAG) 0(NAG) 0.5(MAG) 1.0(VHAG) 0(NAG) 0.5(MAG) 1.0(VHAG) 0(NAG) 0.5(MAG) 1.0(VHAG) 0(NAG) 0.5(MAG) 1.0(VHAG) 0.25(LUD) 0.08(VLUD) 0.52(MUD) 0.31(LUD) 0.09(VLUD) 0.74(HUD) 0.567(MUD) 0.09(VLUD) 0.91(VHUD) 0.746(HUD) 0.085(VLUD) 0.917(VHUD) 0.747(HUD) 0.08(VLUD) Experiment B. Computing Likelihood The Likelihood of the event depends on the Distance and speed of the following and leading AVs. In our case, the Likelihood is representing TTA (Time To Avoid). For example, if the distance between two vehicles is low and their speed is in high range then it leads to the higher Likelihood of collision between these two vehicles. Therefore, the two variables, which affect the likelihood of an event, are; the first one is the distance between both AVs and the second one is the speed of Bullet AV. The figure 11 is representing the main simulation screen utilized to compute the Likelihood variable. The screen is showing two input variables and one output variable. The input variables are Speed and Distance and the output variable is Likelihood as discussed above. 40 Fig. 11 Main simulation screen for Likelihood computation Experiment C. Intensity of Global Variable The intensity of global variable further depends on proximity and the sense of reality variables. The sense of reality is the scene interpretation by the sensing module of AV or the reality of the event on which AV believes or not. This variable has the global influence on the intensity of emotions. Proximity is the distance between the AVs. The proximity influences the intensity of emotions that can involve future situations. We have taken proximity here in spatial terms. Figure 12 depicts the main simulation screen regarding the quantitative computation of Ig variable. Here the sense of reality and proximity are acting as two input variables to compute Ig. 41 Fig.12 Main Simulation Screen of the Intensity of global variable 42
1312.4048
1
1312
2013-12-14T14:15:28
Toward an agent based distillation approach for protesting crowd simulation
[ "cs.MA" ]
This paper investigates the problem of protesting crowd simulation. It considers CROCADILE, an agent based distillation system, for this purpose. A model of protesting crowd was determined and then a CROCADILE model of protesting crowd was engineered and demonstrated. We validated the model by using two scenarios where protesters are varied with different personalities. The results indicated that CROCADILE served well as the platform for protesting crowd modeling simulation
cs.MA
cs
TOWARD AN AGENT BASED DISTILLATION APPROACH FOR PROTESTING CROWD SIMULATION* Lam Thu BUI and Van Vien MAC Abstract— This paper investigates the problem of protesting crowd simulation. It considers CROCADILE, an agent based distillation system, for this purpose. A model of protesting crowd was determined and then a CROCADILE model of protesting crowd was engineered and demonstrated. We validated the model by using two scenarios where protesters are varied with different personalities. The results indicated that CROCADILE served well as the platform for protesting crowd modeling simulation. I. INTRODUCTION Crowd control poses a great challenge for authorities. We are usually expecting a well-managed crowd; however, it also usually has a surprise factor. If a disruption happened to the crowd, disorder will appear and hence cause a mess and casualties accordingly. The research question is how to predict, manage and control crowd behaviors? A part of the solution is modeling and simulation [4, 6, 7]. Crowd simulation has been a significant research topic. There have been several methods proposed for modeling and simulating the crowd including System Dynamics, Particle Systems, Cellular Automata and Multi-Agent Systems as i.e Massive, well as commercial software systems AI.implant, Age of Empires 3, and Crowd – MAGS. Among these, multi agent systems have emerged as a promising technology and play as the foundation of crowd simulation. The modeling and simulation methods can be classified into three types of crowd simulation: (1) Flow-based Approach, modeling a crowd as continuous flow of fluid [8, 9]; (2) Entity-based Approach, being suitable for medium- sized and homogeneous crowds. The movement of individuals is affected by some global/local laws that are introduced to represent various physical/ social/ psychological influences, such as flocking; and (3) Agent- based Approach, being for both medium and small sized heterogeneous crowds. In this paper, we propose to investigate the CROCADILE system, a well-known multi-agent based system for battlefield simulation and apply it for protesting crowd simulation. Our research focuses on how to design the crowd model and map it to CROCADILE. We presented a case study where all aspects of protesting crowd were quantified and installed to CROCADILE. Through a case study adopted from [5], we demonstrated a protesting crowd model and showed that CROCADILE can be appropriately extended towards civilian crowd simulation. The paper structure is organized as follow: the second section describes CROCADILE system. The third and fourth ones are for modeling and simulation of protesting crowds with CROCADILE. The paper is concluded in Section V. *Lam Thu BUI is with Le Quy Don Technical University, 236 Hoang Quoc Viet, Ha Noi, Vietnam (e-mail: [email protected]). Van Vien MAC is with Institute of Information Technology, Ha Noi, Vietnam (e-mail: [email protected]). II. CROCADILE SYSTEM We overview the CROCADILE system, which is used for modelling the protesting crowd in this paper. CROCADILE is basically an agent-based simulation system [1]. This simulation system concerns on emergent behaviour of the system; it represents the environment at an abstract level and therefore provides a broad perspective. The main focus of CROCADILE is that agents are working and interacting based on the behaviour weight system. The outcome of the simulations emerges from the interaction among the agents. That is why CROCADILE is called as an agent-based “distillation”. Note that the concept of “distillations” is understood as any agent-based approach that concentrates on interaction between agents and does not concentrate as much on individual agents (see also [2, 3, 5]). CROCADILE applies quite simple techniques to control the motion of agents on the field, for example calculating the movement vector for agents based on the behaviour weight vectors. Under the control of these techniques, the motion of the agents can often be quite different from the reality of entities. It has been widely investigated in the area of military simulation where agents, representing soldiers, are hard-wired strict rules. There has been a question of how to extend these systems toward civilian crowd modelling and simulation? It is the main topic reported in the paper. The agents in CROCADILE are provided with a wide range of capabilities, such as sensor, weapon, command, communication, and movement. In addition, the agents can belong to different teams, so they can be friendly, neutral, or hostile with each other. Further, they can communicate or command their subordinates to do specific tasks (missions). Agents have different behaviours and a number of triggers that help them deal with current, arbitrary events. III. CROWD SIMULATION WITH CROCADILE A. Protesting crowd characterization We propose a model of the following characteristics for all agents and mapping to CROCADILE: Characteristics Description CROCADILE’s capacity Number of agents, Position, speed, sensor, communications, health Weapon, Armor Strength Red-teaming structure 1.Commander- subordinate structure 2.Behavior: Caring the Size, location, speed, sensor, communication, strength Physically describe the crowd l a c i s y h P Lethality Organization l a i c o S Leadership Level of violence and property damage Likelihood of injuries and Deaths How organized is the group? How established is the leadership? l a c i g o l o h c y s P Mission Aggressiveness Cohesiveness Emotion (panic/ angry) How much aggression an agent has? Have members of the crowd bonded with each other? Is the crowd goal- oriented? Is the crowd emotionally intense? commanders 1.Command considerations (Formation) 2.Design to maintain spacing Mission assignment Caring behaviors: 1.Caring the allied 2.Caring the friend 3.Caring the opponent 1.Behavior: Caring the opponent 2.Behavior:Caring the mission 3.Capability considerations Note that our selection of CROCADILE is just because it is a complete system allowing customization of the agents and environment; no need to engineer agents from the scratch. B. Scenario formulation We followed a similar formulation in [5]. A scenario for protesting crowd simulation has two sides: the police force and the protesting crowd. For the police, they are assigned to protect the objective, keep the formation, and prevent the protesters penetrating to the area and avoid clashing with the protesters at the minimum. The police only use the weapon when they are under an attack or are being approached closely by the protesters. They have two types of behaviors: default and being-hit. Their weapon includes the short guns, tear gas, water cannon and plastic bullets. For the protesters, they can be divided into several groups and have the leaders. The groups can be classified based on the aggressiveness level [11]. We considered the following types of protester groups: Passive group: the one with tendency to avoid the police. They always follow the leaders and maintain the distance with the partners. If being hit or collided, they will change to the behavior of running away from the police and cannot maintain the distance with the partners. They have two types of behaviors: default and being hit. The passive group usually does not have the capability of the weapon. Moderate group: They are moderate people. They are organized, follow the leaders, and maintain the distance. They will not change their behavior during the protesting. Aggressive group: this is for aggressive people. They might not follow the leader’s orders and also might separate from their crowd. Their action might include attacking the police and might be more aggressive if being hit. They might be equipped with lethal and non-lethal weapon. IV. A CASE STUDY We setup two teams (meaning sides): the police and protesting; each team might have several groups. The values were adjusted reflecting relative relationship among entities. A. Behavioral settings: - The police’s default behavior: The police agents will be initialized with this behavioral setting (values are ranged from 0 to 1). There are a lot of behavioral parameters in CROCADILE; here we described only the ones that we setup different values from the default value (zero). When the value is equal zero, it means that behavior is neutral and will not have effects on the movement of the agent. Here we setup only two behaviors reflecting this default behavior: “Caring the opponent” and “Caring the allied” with the weight values of 0.2 and 0.8 respectively. Also the “Likelihood of using movement ability” is set at 0.1. Note that weight is different from the likelihood concept. - The police’s being-hit behavior: The police will change their behavior adapting to the new situation as being attacked. The likelihoods of using movement ability and using firing ability are increased to maximum (1.0). The “Caring the allied” is unchanged, however the behavior of “Caring the opponent” are changed with more details using sub-behavioral settings. Note that the sub-behavior’s value ranges from -1 to 1; the negative value means the sub-behavior will have the opposite effect. For example instead of getting close to the opponent, the agent will run away. Behavior’s Sub-behavior’s name name Value 0.1 0.1 0.1 0.1 0.1 Caring the opponent Getting close to the opponent Getting close to the opponent in the weapon range Getting close to the opponent in the sensor range Getting close to the wounded opponent Getting close to the wounded opponent in the weapon range Getting close to the wounded opponent in the sensor range - The passive protester’s default behavior: We use only three behaviors “Caring the opponent”, “Caring the allied” and “Caring the leader” with the values of 0.05, 0.45, and 0.5 respectively. This means they tend to follow the leaders and avoid the police. - The passive protester’s being-hit behavior: This behavior setting is to be used once the agent is hit. In more details, the agent will run away from the police and does not care its leaders or partners. The changes are applied only to all sub-behaviors of “Caring the opponent” with the value of -0.5 - The moderate protester’s default behavior: This type of protesters has only one behavioral setting with behaviors Caring the opponent, Caring the allied, Caring the leaders, Caring the terrain are set 0.15, 0.35, 0.35, and 0.15 respectively - The aggressive protester’s default behavior: Sub-behavior’s name Value Behavior’s name Caring the 0,4 opponent Caring the allied Caring the leaders Keep the leaders in the sensor range Keep the leaders in the communication range - The aggressive protester’s being-hit behavior: This behavior will be triggered whenever the agents got hit. They will be more aggressive and lawless. The values of behaviors Caring the opponent, Caring the allied, and Caring the leaders are 0.5, 0.25, and 0.25 respectively. value 0,3 0,3 0,5 0.1 0,5 With Short gun 5 10 5 Amount 5 5 5 Amount 25 20 20 B. Other major capability settings Weapon: The weapon capabilities are included Plastic Bullet, Water Cannon, Tear Gas, Short gun, Baton, and Stone where baton and stone are for the protesters while others are for the police. Health: A police agent is setup as twice stronger than a protester (200 units in comparison to that of 100 units for a protester) reflecting that the police is more well-trained than the protesters C. Simulation Scenarios Our scenarios are assumed in a flat urban terrain (i.e the park, or city square). A group of protesters gathered for a while and they are facing the police. To counter the protesters, the police setups several obstacles (05 fence objects) separating the protesting and the protected area. They will act if the protesters break the fence and enter the area. The numbers of police and protesters are as follows: Protesters Police Items Items Passive agents With plastic bullets Moderate agents with Stone With Tear Gas Aggressive With Water Canon agents with stone Moderate agents with Baton Aggressive agents with Baton 1 Leader agents with Stone Since the protesting crowd is very much depending on the leaders, we propose to investigate in two cases being equivalent with two types of protesting leaders: ‐ Case 1: Moderate leaders With this case, the protesting leaders were quite moderate in which they tend to avoid the police and pay the care to their movement and formation of the crowd. Behavior’s name Caring the opponent Caring the terrain ‐ Case 2: Aggressive leaders The leaders are different. They are more aggressive and are keen to confrontation with the police, meaning the sub- behaviors of “Caring the opponent” are increased from 0 to 0.1 D. Results and discussion Based on the results logged during the simulation run, we reported the summary as in the following table: Simulated results Criteria Case 2 Case 1 Achieved the goal? 1 No Yes 2 Dead protesters 0 0 3 Wounded protesters 0 22/106 4 Dead Police 0 0 5 Wounded police 8/20 0 Destroyed obstacles 5 8/12 5/12 7 Protester Health Damage 0/10600 220/10600 8 Police Health Damage 0/4000 20/4000 It is quite clear that in the first case, the police was able to contain the crowd. Although the protesters damaged several obstacles, they cannot penetrate further after the fence. Hence, the police successfully achieved their goal. However, Value 0,45 0,55 the first case demonstrated quite peaceful scenario. There was no use of the weapon during the time of simulation. In the second case, the situation is quite similar except the protester leaders where they were more aggressive. The dynamic of the scenario was changed accordingly in which the police failed to prevent the protesters. It again showed the importance of the leadership in the protesting crowd. In this case, 22 protesters were wounded in comparison to 8 police. There were lots of violent confrontation between the police and protesters. Note that both police and aggressive protesters are triggered when being hit for adapting to the new situations; during the simulation these triggers were all activated. For the protesters, once being hit, they become more aggressive, hence the confrontation is more serious. In summary, the results supported the usability of CROCADILE for crowd modeling and simulation. The agents in CROCADILE are equipped with behaviors and triggers, which are capable of modeling all protesting crowd characteristics V. CONCLUSION This paper overviewed research on protesting crowd and the usage of agent-based distillation for crowd simulation. For the protesting crowd modeling and simulation, we summarized its characteristics and classification. Based on this knowledge, we proposed to design a mapping of the protesting crowd to the model supported by CROCADILE, an agent based distillation system. To validate it, we carried out a case study on different scenarios. The results indicated the appropriateness of CROCADILE for crowd simulation. REFERENCES [1] Barlow M. and Easton A., CROCADILE - An Open, Extensible Agent-Based Distillation Engine, Information & Security, Vol. 8, No 1, 2002. [2] Bent N., Socrates v1.1 UserManual, Emergent Information Technologies inc, USA, 2001. Stephen R., Agent-Based Combat Model, Project Albert 3rd International Workshop, Auckland, New Zealand, 2001. [4] Challenger R., Clegg .C, Robinson M., Understanding Crowd Behaviors: Supporting Evidence, ISBN 978-1-874321-24-8, 2009 [5] LAROCHELLE B., Multi-Agent Geo-Simulation of Crowds and Control Forces in Conflict Situations: Models, Application, and Analysis, the Master’s Thesis, University of Laval Quebec, Canada, 2009 [6] Zhou S., Chen D., Cai W., Luo L., Low W., Tian F., Tay V., Ong D., and Hamilton B., Crowd modeling and simulation technologies. ACM Trans. Model. Comp. Sim. 20, 4. 2010 [7] Brown R.. The Handbook of Social Psychology, G. Lindzey (ed.), Mass Phenomena, pages 833–876. Addison-Wesley, Cambridge, MA, 1954. [8] Chenney, S. Flow tiles. Proc. of the ACM SIGGRAPH symposium on computer animation, 233–242, 2004. [9] Kisko, T. M., Francis, R. L., and Nobel, C. R. 1998. Evacnet4 user’sguide, 1998. http://www.ise.ufl.edu/kisko/files/evacnet/EVAC4UG.HTM [10] Helbing, D., Farkas I ., and Vicsek, T. Simulating dynamical features of escape panic. Letters to Nature407, 487–490, 2000 [11] McKenzie, F. D., Xu, Q., Nguyen, Q.-A. H., and Petty, M. D. Designing physical layer components in a reconfigurable crowd federate. In Proceedings of the Spring 2005 Simulation Interoperability Workshop, 2005 [3]
1301.6400
1
1301
2013-01-27T20:54:07
Achieving Fully Proportional Representation is Easy in Practice
[ "cs.MA", "cs.GT" ]
We provide experimental evaluation of a number of known and new algorithms for approximate computation of Monroe's and Chamberlin-Courant's rules. Our experiments, conducted both on real-life preference-aggregation data and on synthetic data, show that even very simple and fast algorithms can in many cases find near-perfect solutions. Our results confirm and complement very recent theoretical analysis of Skowron et al., who have shown good lower bounds on the quality of (some of) the algorithms that we study.
cs.MA
cs
Achieving Fully Proportional Representation is Easy in Practice Piotr Skowron University of Warsaw Warsaw, Poland Piotr Faliszewski AGH University Krakow, Poland Arkadii Slinko University of Auckland Auckland, New Zealand September 7, 2018 Abstract We provide experimental evaluation of a number of known and new algorithms for approx- imate computation of Monroe's and Chamberlin-Courant's rules. Our experiments, conducted both on real-life preference-aggregation data and on synthetic data, show that even very simple and fast algorithms can in many cases find near-perfect solutions. Our results confirm and com- plement very recent theoretical analysis of Skowron et al., who have shown good lower bounds on the quality of (some of) the algorithms that we study. 1 Introduction Many countries are governed using indirect democracy, where the people do not make decisions directly, but rather select representatives (e.g., a parliament, a senate, a congress) who rule in their interest. Unfortunately, relatively little effort was so far invested in the algorithmic study of proce- dures for electing committees of representatives (few exceptions include papers [2,5,9,14]). Here, we consider two particularly appealing rules for electing a set of representatives, namely those of Monroe and of Chamberlin and Courant, and we argue that while these rules in the worst case scenario may be difficult to compute [5,14], in practice, very simple and efficient algorithms find almost-perfect approximate results. There are several ways in which countries can choose their parliaments (or, more generally, in which societies can choose committees of representatives). Often, voters are divided into districts and in each district we hold a local election. For the case of single-representative districts, in each district we have a single-winner election held according to one of the standard, well-known, rules such as the Plurality rule or Borda's rule. In particular, if the Plurality rule is used then this system is known as First-Past-the-Post (FPP): In each district the candidate supported by the largest number of voters is elected. However, FPP has a number of drawbacks. For example, it is possible that in a country with two major parties, A and B, even if 49% of the citizens support party B, only members of party A enter the parliament (this happens if in each district party A has a slight advantage over party B). Indeed, under FPP the election organizers are particularly tempted 1 to tamper with the partition of voters into districts. To circumvent this problem one might use multi-representative districts, where elections are held using some multi-winner voting rule (e.g., using Single Transferable Vote (STV),1 or using a voting rule that assigns scores to the candidates and picks a group of those with highest scores). However, this approach only partially solves the problem. Further, compared to single-representative districts, multi-representative districts loosen the connection between the candidates and the voters that have elected them. Fortunately, there is a very attractive way to avoid the problems mentioned above: Instead of using fixed districts, we may partition the voters dynamically, based on the votes that they cast. Indeed, this is exactly the idea behind the fully proportional representation rules of Monroe [10] and of Chamberlin and Courant [3]. If we seek a parliament of K representatives, then Monroe's rule says that we should pick a set of K candidates for whom there is an assignment of these candidates to the voters such that: (a) each candidate is assigned to roughly the same number of voters, and (b) the total satisfaction of the voters (measured in one of the ways introduced later) is maximal. Chamberlin-Courant's rule is similar except that it allows each selected candidate to be matched to a different number of voters. (Thus if one were to elect a parliament using Chamberlin-Courant's rule then one should use weighted voting within the parliament, weighted by the number of voters matched to each representative.) In the above description we focus on political elections, but we mention that both Monroe's rule and Chamberlin-Courant's rule have many different applications as well. For example, Skowron et al. [15] have presented several (multi-agent) resource allocation settings that can be modeled using these rules and Lu and Boutilier [5] have proposed to use Chamberlin-Courant's rule for constructing recommendations for groups of agents. Unfortunately, computing Monroe's and Chamberlin-Courant's rules is both NP-hard [5,14] and difficult in the parametrized sense [2]. Thus using them in practice might simply be impossible. The goal of this paper is to show that not all is lost. We provide experimental evaluation of a number of known and new algorithms for approximate computation of Monroe's and Chamberlin-Courant's rules. Our experiments, conducted both on real-life preference-aggregation data and on synthetic data, show that even very simple and fast algorithms can in many cases find near-perfect solutions. Our results confirm and complement very recent theoretical analysis of Skowron et al. [15], who have shown good lower bounds on the quality of (some of) our algorithms. While for single-winner rules using approximate algorithms may be debatable, for the case of electing a large body of repre- sentatives, e.g., a parliament, using approximation algorithms seems far easier to justify. Indeed, a good approximate solution for Monroe's or Chamberlin-Courant's rule represents the society almost as well as a perfect solution would. The paper is organized as follows. In Section 2 we formally define Monroe's and Chamberlin- Courant's rules. In Section 3 we give an overview of the algorithms that we evaluate and in Section 4 we describe the data sets that we use in our experiments. Section 5 contains our main results. We conclude in Section 6. 1STV for more than one winner is sometimes referred to as "Alternative Vote" (AV). In a recent referendum Great Britain rejected AV as a method for choosing its members of parliament. 2 2 Preliminaries In this section we briefly review basic notions regarding social choice theory and we define Mon- roe's [10] and Chamberlin and Courant's [3] proportional representation systems. We assume the reader is familiar with standard notions regarding algorithms. For each positive integer n, by [n] we mean the set {1, . . . , n}. Elections. We consider elections over a given set A = {a1, . . . , am} of alternatives. We have a set N = [n] of agents (the voters), where each voter i, 1 ≤ i ≤ n, has a preference order ≻i over A. A preference order of an agent i is a linear order over the set A; the maximal element is this agent's most preferred alternative, the minimal element is this agent's least preferred alternative, and the alternatives in the middle represent the agent's spectrum of preference. We refer to the collection V = (≻1, . . . , ≻n) as the preference profile for a given election. Let us fix an agent i, 1 ≤ i ≤ n, and an alternative a ∈ A. By posi(a) we mean the position a has in i's preference order. If a is i's most preferred candidate then posi(a) = 1, and if a is i's least preferred candidate then posi(a) = kAk = m. Positional Scoring Functions. Let m be the number of candidates in eleciton. A positional scor- ing function (PSF) is any function α : [m] → N that satisfies the following two conditions: (a) α(m) = 0, and (b) for each i, j, 1 ≤ i < j ≤ m, α(i) ≥ α(j). In Monroe's and in Chamberlin- Courant's proportional representation rules we will match agents to the alternatives that represent them. Intuitively, α(i) is the amount of satsifaction that an agent derives from being represented by an alternative that this agent ranks on the i'th position. In this paper we focus on Borda count PSF, Borda(i) = m − i. However, occasionally we will consider which for m alternatives is defined as αm other PSFs as well. In our algorithms we assume that the PSF α to be used is given explcitly, as a vector (α1, . . . , αm) of integers such that for each i, 1 ≤ i ≤ m, α(i) = αi. We will implcitly assume that the number of alternatives matches the domain of the given PSF. Proportional Representation. Let A = {a1, . . . , am} be the set of alternatives and N = [n] be the set of agents (with preference orders over A). A representation function is any function Φ : N → A. For an m-candidate PSF α and a representation function Φ, Φ's satisfaction is defined as: α(Φ) = n X i=1 α(posi(Φ(i))). Let K be a positive integer. A K-CC-representation function is any representation function Φ such that kΦ−1(N )k ≤ K (that is, any representation function that matches voters to at most K alternatives). A K-Monroe-representation function Φ is any K-CC-representation func- tion that additionally satisfies the following requirement: For each a ∈ A it holds that either K ⌋ ≤ kΦ−1(a)k ≤ ⌈ n ⌊ n K ⌉ or kΦ−1(a)k = 0 (that is, each alternative represents either roughly n K agents or none of them). We will also consider partial representation functions. A partial CC-representation function is defined in the same way as a regular one, except that it may assign a null alternative, ⊥, to some of the agents. By convention, we take that for each agent i we have posi(⊥) = m. A partial 3 Monroe-representation function is defined analogously: It may assign the null alternative to some voters (there are no constraints on the number of agents to whom the null alternative is assigned) but it must be possible to extend it to a regular Monroe-representation function by replacing the occurrences of the null alternative with the real ones. We now define Monroe's and Chamberlin-Courant's (CC) rules. Definition 1. Let R be a member of {Monroe, CC}. Let A = {a1, . . . , am} be a set of alter- natives, N = [n] be a set of agents, and α be an m-candidate PSF. Let K be the size of the set of representatives that we seek (K ≤ m). We say that a K-element set W , W ⊆ A, is a set of α-R winners if there exists a K-R-representation function Φ : N → W such that for every other K-R-representation function Ψ it holds that α(Φ) ≥ α(Ψ). We point out that for both Monroe's and Chamberlin-Courant's rule there may be several dif- ferent winner sets and that some form of tie-breaking should be applied in these settings. Here we disregard tie-breaking and simply are interested in some winner set (and, not being able to compute that, in any set with as high a satsifaction as possible). It is well-known that for many natural families of PSFs, both for Monroe's rule and for Chamberlin-Courant's rule, it is NP-complete to decide if there exists a winner set that achieves a given satisfaction [2,5,14]. However, for each R in {Monroe, CC}, for each PSF α (with the domain matching the number of alternatives in the election), and for each set S of up to K alterna- tives we can compute in polynomial time a (possibly partial) K-R-representation function ΦS R that maximizes the agent satisfaction under the condition that agents are matched to the alternatives in S only. Indeed, it is easy to see that for α-CC this function is: ΦS CC(i) = argmina∈S posi(a) and that it is never a partial representation function. For the case of α-Monroe, computing ΦS Monroe is more involved and requires solving a certain min-cost/max-flow problem (see the work of Betzler et al. [2]; here if kSk < K then ΦS Monroe is a partial Monroe-representation function). One can see that for a given set S, there may be many different (partial) K-Monroe-representation functions that achieve optimal satisfaction; when we write ΦS Monroe, we mean, w.l.o.g., the particular one computed by the algorithm of Betzler et al. [2]. 3 Algorithms Let us now describe the algorithms that we will consider in this work. Some of our algorihtms can be applied both to Monroe's rule and to Chamberlin-Courtant's rule, while some are specific to only one of them. For each algorithm we will exactly specify for which rules it is applicable and, if it is applicable to both, what are the differences. While most of the algorithms described below are based on ones already given in the literature, in a number of cases we added heuristics on top of existing algorithms (which proved to be quite effective, as we will see later) and, in one case, provided a completely new theortical analysis. For each algorithm we will carefully describe what was already known in the literature, and which additions are due to this paper. 4 Throughout this section we assume we are given the following setting. A = {a1, . . . , am} is a set of alternatives, α is an m-candidate PSF, N = [n] is a set of agents, each with a preference order over A, and K is a positive integer, K ≤ m (the size of the committee we want to elect). 3.1 ILP Formulation (Monroe and CC) To measure the quality of our approximation algorithms, we compare their results against op- timal solutions that we obtain using integer linear programs (ILPs) that describe Monroe's and Chamberlin-Courant's rules. An ILP for Chamberlin-Courant's rule, for arbitraty PSF α, was pro- vided by Lu and Boutilier [5]; the analogous formulation for Monroe's rule was provided by Potthoff and Brams [13]. We used the GLPK 4.47 package (GNU Linear Programming Kit, version 4.47) to solve these ILPs, whenever it was possible to do so in reasonable time. 3.2 Algorithms A, B, and C (Monroe) Skowron et al. [15] have suggested and studied the following algorithm for Monroe's rule, which we will call Algorithm A. We start with an empty partial Monroe-representation function Φ and we execute K iterations. In each iteration we do the following: 1. For each alternative a ∈ A that does not yet represent any agents, we compute the maximal satisfaction that some not-yet-represented ⌈ n K ⌉ agents derive from being represented by a (we call this number score(a) and we refer to these agents as bests(a)). 2. We pick an alternative a with maximum score(a) and extend Φ by assigning a to represent agents in bests(a). Borda it This algorithm clearly works in polynomial time. Skowron et al. [15] have shown that for αm finds a solution whose satisfaction is at least a (1− K−1 K ) fraction of a (possibly nonexistent) perfect solution, where each agent is represented by his or her top preference (HK is the K'th 1 harmonic number, i.e., HK = Pi=1 i = Θ(log K)). This suggests that the algorithm performs best in elections where the size of the committee we seek is relatively small with respect to the number of alternatives. 2(m−1) − HK Based on Algorithm A we have derived Algorithm B. The only difference is that after complet- ing the operation of Algorithm A, we take the set S of alternatives that were assigned to represent some agents by Algorithm A, and replace function Φ with function ΦS Monroe, that optimally reas- signs the alternatives to the voters. This very simple heuristic turned out to noticeably improve the results of the algorithm in practice (and, of course, the approximation guarantees carry over from Algorithm A to Algorithm B). Algorithm C is a further heuristic improvement over Algorithm B. This time the idea is that instead of keeping only one partial function Φ, we keep a list of up to d partial representation func- tions, where d is a parameter of the algorithm. At each iteration, given these d partial representation functions, for each Φ of them and for each alternative a that does not yet have agents assigned to by this Φ, we compute an optimal extension of this Φ that assigns agents to a. As a result we obtain possibly more than d (partial) representation functions. For the next iteration we keep those d of them that have highest satisfaction. 5 Figure 1: The pseudocode for Algorithm C. Notation: Φ ← a map defining a (partial) representation function, iteratively built by the algorithm. Φ← ← the set of agents already represented by some alternative Φ→ ← the set of alternatives already used in the representation function. P ar ← a list of partial representation functions P ar = [] P ar.push({}) for i ← 1 to K do newP ar = [] for Φ ∈ P ar do score ← {} bests ← {} foreach ai ∈ A \ Φ→ do agents ← sort N \ Φ← so that j ≺ k in agents =⇒ posj(ai) ≤ posk(ai) K ⌉ elements of agents bests[ai] ← chose first ⌈ N Φ′ ← Φ foreach j ∈ bests[ai] do Φ′[j] ← ai newP ar.push(Φ′) sort newP ar according to descending order of the total satisfaction of the assigned agents P ar ← chose first d elements of newP ar for Φ ∈ P ar do Φ ← compute the optimal representative function using an algorithm of Betzler et al. [2] for the set of winners Φ→ return the best representative function from P ar We provide pseudocode for Algorithm C in Figure 1. If we take d = 1, we obtain Algorithm B. If we also disregard the last two lines prior to returning solution, we obtain Algorithm A. 3.3 Algorithm GM (Monroe and CC) Algorithm GM (greedy marginal improvement) was introduced by Lu and Boutilier for the case of Chamberlin-Courant's rule. Here we generalize it to apply to Monroe's rule as well, and we show that it is a 1 − 1 e approximation algorithm for α-Monroe. We point out that this is the first approximation result for Monroe rule that applies to all PSFs α (approximability results of Lu and Boutilier [5] did not apply to α-Monroe, and results of Skowron et al. [15] applied to Monroe with Borda count PSF only). For the case of Monroe, the algorithm can also be viewed as an extension of Algorithm B. Let R be one of Monroe and CC. The algorithm proceeds as follows. We start with an emtpy set S. Then we execute K iterations. In each iteration we find an alternative a that is not assigned to agents yet, and maximizes the value ΦS∪{a} . (A certain disadvantage of this algorithm for the case of Monroe is that it requires a large number of computations of ΦS Monroe, which is a slow process based on min-cost/max-flow algorithm.) We provide the pseudocode for Algorithm GM in Figure 2. R Theorem 1. Algorithm GM is an (1 − 1/e)-approximation algorithm for the Monroe'e election 6 Figure 2: Pseudocode for Algorithm GM. Notation: R is either Monroe or CC. S ← ∅ for i ← 1 to K do a ← argmaxa∈A\Sα(ΦS∪{a} S ← S ∪ {a} R return ΦS M ) problem for arbitrary positional scoring functions. Proof. The proof is based on the powerful result of Nemhauser et al. [11], who have shown that greedy algorithms achieve 1 − 1 e approximation ratio when used to optimize submodular functions. Let A be a set of alternatives, N = [n] a set of agents with preferences over A, α an kAk-candidate PSF, and K ≤ kAk the number of representatives that we want to elect. We consider function z : 2A → N defined, for each set S, S ⊆ A and kSk ≤ K, as z(S) = Monroe). Clearly, z(S) is monotonic (that is, for each two sets A and B, if A ⊆ B and kBk ≤ K α(ΦS then z(A) ≤ z(B). The main part of the proof below is to show that z is submodular (we provide the definition below). Since argmaxS⊂A,kSk=Kz(S) is the set of winners of our election (under α-Monroe) and since Algorithm GM builds the solution iteratively by greedily extending initially empty set S so that each iteration increases the value of z(S) maximally, by the results of Nemhauser et al. [11] we get that Algorithm GM is a (1 − 1 e )-approximation algorithm. Let us now prove that z is submodular. That is, our goal is to show that for each two sets S and T , S ⊂ T , and each alternative a /∈ T it holds that z(S ∪ {a}) − z(S) ≥ z(T ∪ {a}) − z(T ). First, we introduce a notion that generalizes the notion of a partial set of winners S. Let s : A → N denote a function that assigns a capacity to each alternative (i.e., s gives a bound on the number of agents that a given alternative can represent). Intuitively, each set S, S ⊆ A, corresponds to the capacity function that assigns ⌈ n k ⌉ to each alternative a ∈ S and 0 to each a /∈ S. Given a capacity function Monroe to be one that maximizes the total satisfaction of the agents s, we define a partial solution Φs Monroe)−1(a)k ≤ s(a). To simplify notation, we and that satisfies the capacity constraints: ∀a∈Sk(Φs write s∪{a} to denote the function such that (s∪{a})(a) = s(a)+1 and ∀a′∈S(s∪{a})(a′) = s(a′). (Analogously, we interpret s\{a} as subtracting one from the capacity for a; provided it is nonzero.) Also, by s ≤ t we mean that ∀a∈As(a) ≤ t(a). We extend our function z to allow us to consider a subset of the agents only. For each subset N ′ of the agents and each capacity function s, we define zN ′(s) to be the satisfaction of the agents in N ′ obtained under Φs Monroe. We will now prove a stronger variant of submodularity for our extended z. That is, we will show that for each two capacity functions s and t it holds that: s ≤ t ⇒ zN (s ∪ {a}) − zN (s) ≥ zN (t ∪ {a}) − zN (t) (1) Our proof is by induction on N. Clearly, Equation (1) holds for N ′ = ∅. Now, assuming that Equation (1) holds for every N ′ ⊂ N we will prove its correctness for N. Let i denote an agent such 7 Monroe(i) = a (if there is no such agent then clearly the equation holds). Let as = Φs Monroe(i) that Φt∪{a} and at = Φt Monroe(i). We have: zN (t ∪ {a}) − zN (t) = α(posi(a)) + zN \{i}(t) − α(posi(at)) − zN \{i}(t \ {at}). We also have: zN (s ∪ {a}) − zN (s) ≥ α(posi(a)) + zN \{i}(s) − α(posi(as)) − zN \{i}(s \ {as}). Since Φt have that: Monroe describes an optimal representation function under the capacity restrictions t, we α(posi(at)) + zN \{i}(t \ at) ≥ α(posi(as)) + zN \{i}(t \ {as}) Finally, from the inductive hypothesis for N ′ = N \ {i} we have: zN \{i}(s) − zN \{i}(s \ {as}) ≥ zN \{i}(t) − zN \{i}(t \ {as}) By combining these inequalities we get: zN (s ∪ {a}) − zN (s) ≥ α(posi(a)) + zN \{i}(s) − (α(posi(as)) + zN \{i}(s \ {as})) ≥ α(posi(a)) − α(posi(as)) + zN \{i}(t) − zN \{i}(t \ {as}) ≥ α(posi(a)) + zN \{i}(t) − α(posi(at)) − zN \{i}(t \ {at}) = zN (t ∪ {a}) − zN (t) This completes the proof. 3.4 Algorithm C (CC) This algorithm, introduced in this paper, proceeds like Algorithm GM for Chamberlin-Courant's rule, but in each iteration it keeps up to d (partial) CC-representation functions ΦS CC, for distinct subsets S of alternatives (d is a parameter of the algorithm). In each iteration the algorithm extends each function ΦS CC by every possible alternative (obtaining O(dm) new representation functions) and stores up to d of them, that obtain highest satisfaction. 3.5 Algorithm P (CC) Algorithm P (position restriction) was introduced and studied by Skowron et al. [15]. The algorithm proceeds as follows. First, we consider a certain number x (specifically, x = ⌈ mW(K) K ⌉, where W(x) is Lambert's W function, defined as the solution of equality x = W(x)eW(x)). Then, the algorithm tries to greedily find a cover of as many agents as possible with K alternatives (an alternative is said to cover a given agent if this agent ranks this alternative among top x positions). Skowron et al. [15] have shown that for αm times worse than a perfect (possibly nonexistent) solution, where every agent is represented by his or her top-preferred alternative. The pseudocode for Algorithm P is presented in Figure 3. Borda this algorithm finds a solution that is at most 1 − 2W(K) K 8 Figure 3: Pseudocode for Algorithm P. Notation: We use the same notation as in Algorithm 1 num posx(a) ← k{i ∈ [n] \ Φ← : posi(a) ≤ x}k (the number of not-yet assigned agents that rank alternative a in one of their first x positions) Φ = {} x = ⌈ mW(K) K ⌉ for i ← 1 to K do ai ← argmaxa∈A\Φ→num posx(a) foreach j ∈ [n] \ Φ← do if posj(ai) < x then Φ[j] ← ai foreach j ∈ A \ Φ← do a ← such server from Φ→ that ∀a′∈Φ→ posj(a) ≤ posj(a′) Φ[j] ← a 3.6 Algorithm R (Monroe and CC) 2 (1 + K m − K 2 m2−m + K 3 Kǫ2 Algorithm R (random sampling) is based on picking the set of winners randomly and matching them optimally to the agents. Skowron et al. [15] have shown that if one chooses a set S of K alterna- tives uniformly at random, then for αm Monroe) is 1 times, to reach probability λ of achieving this satisfaction. For example, for λ = 0.99 and ǫ = 0.1 this algo- rithm would require to repeat the sampling process 340000/K times (each time executing a costly matching algorithm). This makes the algorithm impractical, especially for small instances (where K is low). Thus in our experimental evaluation we will consider the modification of the algorithm that repeats the sampling process only 100 times. m3−m2 ) − ǫ, and that one has to repeat this process −512 log(1−λ) Borda-Monroe, the expected satisfaction of αm Borda(ΦS Oren [12] has shown an analogous result for the case of Chamberlin-Courant's rule. 3.7 Summary of the Algorithms We summarize the algorithms that we use in Table 1. In particular, the table clearly shows that for the case of Monroe, Algorithms B and C are not much slower than Algorithm A but offer a chance of improved peformance. Algorithm GM is intuitively even more appealing, but achieves this at the cost of high time complexity. For the case of Chamberlin-Courant's rule, it is unclear which of the algorithms to expect to be superior. One of the main goals of this paper is to establish if either of the presented algorithms clearly dominates the others. Our implementations are available at http://mimuw.edu.pl/ps219737/monroe/experiments.tar.gz. 4 Experimental Data We have considered both real-life preference-aggregation data and synthetic data, generated accord- ing to a number of election models. 9 Algorithm Approximation ratio for Borda PSF A B C GM R P GM C R 2(m−1) − HK K 1 − K−1 as in Alg. A as in Alg. A as in Alg. A for Borda PSF; 1 − 1 1 2 (1 + K 1 − 2W(K) 1 − 1 e as in Alg. GM (1 − 1 m − K 2m−K 3 m3−m2 ) K+1 )(1 + 1 m ) K e for others KmO(ΦS) Runtime Kmn Kmn+O(ΦS) dKmn+dO(ΦS) log(1−λ) Kǫ2 O(ΦS) nmW(K) Kmn dKm(n+log dm) log(1−λ) n ǫ2 Reference Skowron et al. [15] (this paper) (this paper) (this paper) Skowron et al. [15] Skowron et al. [15] Lu and Boutilier [5] (this paper) Oren [12] Table 1: A summary of the algorithms studied in this paper. The top of the table presents algorithms for Monroe's rule and the bottom for Chamberlin-Courant's rule. In column "Approx." we give cur- rently known approximation ratio for the algorithm under Borda PSF, on profiles with m candidates and where the goal is to select a committee of size K. Here, O(ΦS) = O(n2(K + logn)) is the complexity of finding a partial representation function with the algorithm of Betzler et al. [2]. 4.1 Real-Life Data We have used real-life data regarding people's preference on sushi types, movies, college courses, and competitors' performance in figure-skating competitions. One of the major problems regarding real-life preference data is that either people express preferences over a very limited set of alterna- tives, or their preference orders are partial. To address the latter issue, for each such data set we complemented the partial orders to be total orders using the technique of Kamishima [4]. (The idea is to complete each preference order based on those reported preference orders that appear to be similar.) Some of our data sets contain a single profile, whereas the others contain multiple profiles. When preparing data for a given number m of candidates and a given number n of voters from a given data set, we used the following method: We first uniformly at random chose a profile within the data set, and then we randomly selected n voters and m candidates. We used preference orders of these n voters restricted to these m candidates. Sushi Preferneces. We used the set of preferences regarding sushi types collected by Kamishima [4].2 Kamishima has collected two sets of preferences, which we call S1 and S2. Data set S1 contains complete rankings of 10 alternatives collected from 5000 voters. S2 contains partial rankings of 5000 voters over a set of 100 alternatives (each vote ranks 10 alternatives). We used Kamishima [4] technique to obtain total rankings. Movie Preferences. Following Mattei et al. [8], we have used the NetFlix data set3 of movie preferences (we call it MV). NetFlix data set contains ratings collected from about 480 thousand 2The sushi data set is available under the following url: http://www.kamishima.net/sushi/ 3http://www.netflixprize.com/ 10 distinct users regarding 18 thousand movies. The users rated movies by giving them a score between 1 (bad) and 5 (good). The set contains about 100 million ratings. We have generated 50 profiles using the following method: For each profile we have randomly selected 300 movies, picked 10000 users that ranked the highest number of the selected movies, and for each user we have extended his or her ratings to a complete preference order using the method of Kamishima [4]. Course Preferences. Each year the students at the AGH University choose courses that they would like to attend. The students are offered a choice of six courses of which they have to at- tend three. Thus the students are asked to give an unordered set of their three top-preferred courses and a ranking of the remaining ones (in case too many students select a course, those with the highest GPA are enrolled and the remaining ones are moved to their less-preferred courses). In this data set, which we call CR, we have 120 voters (students) and 6 alternatives (courses). How- ever, due to the nature of the data, instead of using Borda count PSF as the satisfaction measure, we have used the vector (3, 3, 3, 2, 1, 0). We made this data set publicly available under the url: http://mimuw.edu.pl/ps219737/monroe/registration.tar.gz. Figure Skating. This data set, which we call SK, contains preferences of the judges over the performances in a figure-skating competitions. The data set contains 48 profiles, each describing a single competition. Each profile contains preference orders of 9 judges over about 20 participants. The competitions include European skating championships, Olympics, World Junior, and World Championships, all from 19984. (Note that while in figure skating judges provide numerical scores, this data set is preprocessed to contain preference orders.) 4.2 Synthetic Data For our tests, we have also used profiles generated using three well-known distributions of prefer- ence orders. Impartial Culture. Under impartial culture model of preferences (which we denote IC), for a given set A of alternatives, each voter's preference order is drawn uniformly at random from the set of all possible total orders over A. While not very realistic, profiles generated using impartial culture model are a standard testbed of election-related algorithms. Polya-Eggenberger Urn Model. Following Walsh [16], we have used the Polya-Eggenberger urn model [1] (which we denote UR). In this model we generate votes as follows. We have a set A of m alternatives and an urn that initially contains all m! preference orders over A. To generate a vote, we simply randomly pick one from the urn (this is our generated vote), and then -- to simulate correlation between voters -- we return a copies of this vote to the urn. When generating an election with m candidates using the urn model, we have set the parameter a so that a m! = 0.05 (Walsh [16] calls this parameter b; we mention that other authors use much higher values of b but we felt that too high a value of b leads to a much too strong a correlation between votes). Generalized Mallow's Model. We refer to this data set as ML. Let ≻ and ≻′ be two preference orders over some alternative set A. Kendal-Tau distance between ≻ and ≻′, denoted dK(≻, ≻′), 4This data set is available under the following url: http://rangevoting.org/SkateData1998.txt. 11 is defined as the number of pairs of candidates x, y ∈ A such that either x ≻ y ∧ y ≻′ x or y ≻ x ∧ x ≻′ y. Under Mallow's distribution of preferences [7] we are given two parameters: A center prefer- ence order ≻ and a number φ between 0 and 1. The model says that the probability of generating preference order ≻′ is proportional to the value φdK (≻,≻′). To generate preference orders following Mallow's distribution, we use the algorithm given by Lu and Boutilier [6]. In our experiments, we have used a mixture of Mallow's models. Let A be a set of al- ternatives and let a be a positive integer. This mixture model is parametrized by three vec- tors, Λ = (λ1, . . . , λa) (where each λi, 1 ≤ i ≤ a is between 0 and 1, and Pa i=1 λ1 = 1), Φ = (φ1, . . . , φa) (where each φi, 1 ≤ i ≤ a, is a number between 0 and 1), and Π = (≻1, . . . , ≻a) (where each ≻i, 1 ≤ i ≤ a, is a preference order over A). To generate a vote, we pick a random in- teger i, 1 ≤ i ≤ a (each i is chosen with probability λi), and then generate the vote using Mallow's model with parameters (≻i, φi). For our experiments we have used a = 5, and we have generated vectors Λ, Φ, and Π uniformly at random. 5 Experiments In this section we present the results of the evaluation of algorithms from Section 3 on the data sets from Section 4. In all cases, except for the college courses data set, we have used Borda PSF to measure voter satisfaction. For the case of the courses data set, we have used vector (3, 3, 3, 2, 1, 0). We have conducted three sets of experiments. First, we have tested all our algorithms on rela- tively small elections (up to 10 candidates, up to 100 agents). In this case we were able to compare our algorithms' solutions with the optimal ones. (To obtain the optimal solutions we were using the ILP formulations and GLPK's ILP solver.) Thus we report the quality of our algorithms as the av- erage of fractions C/Copt, where C is the satisfaction obtained by a respective algorithm and Copt is the satisfaction in the optimal solution. For each algorithm and data set, we also report the aver- age fraction C/Cideal, where Cideal is the satisfaction that the voters would have obtained if each of them were matched to his or her most preferred alternative. In our further experiments, where we consider larger elections, we were not able to compute optimal solutions, but fraction C/Cideal gives a lower bound for C/Copt. We report this value for small elections so that we see an example of relation between C/Copt and C/Cideal and so that we can compare the results for small elections with the results for the larger ones. Further, for the case of Borda PSF the C/Cideal fraction has a very natural interpretation: If its value is α (for a given solution), then, on the average, in this solution each voter is matched to an alternative that he or she prefers to (m − 1)α alternatives. In our second set of experiments we have run our algorithms on large elections (thousands of agents, hundreds of alternatives), coming either from the NetFlix data set or generated by us using one of our models. Here we reported the average fraction C/Cideal only. We have analyzed the quality of the solutions as a function of the number of agents, the number of candidates, and the relative number of winners (fraction K/m). (This last set of results is particularly interesting because in addition to measuring the quality of our algorithms, it allows one to asses the size of a committee one should seek if a given average agent satisfaction is to be obtained). 12 Monroe C A 0.94 0.95 B S1 0.99 ≈ 1.0 S2 0.99 MV 0.96 ≈ 1.0 CR 0.98 0.99 SK 0.99 ≈ 1.0 IC 0.94 ML 0.94 UR 0.95 0.99 ≈ 1.0 0.99 0.99 ≈ 1.0 1.0 1.0 1.0 1.0 1.0 GM 0.99 ≈ 1.0 ≈ 1.0 ≈ 1.0 ≈ 1.0 0.99 0.99 0.99 R 0.99 0.99 0.98 0.99 0.94 0.99 0.99 0.99 CC GM C 1.0 ≈ 1.0 1.0 ≈ 1.0 1.0 ≈ 1.0 1.0 ≈ 1.0 1.0 ≈ 1.0 1.0 ≈ 1.0 1.0 ≈ 1.0 0.99 1.0 P R 0.99 0.99 0.98 0.99 0.96 ≈ 1.0 1.0 ≈ 1.0 0.99 0.85 0.99 0.99 0.99 0.99 0.99 0.97 Table 2: The average quality of the algorithms compared with the optimal solution (C/Copt) for the small instances of data and for K = 3. Monroe C 1.0 B A S1 0.95 ≈ 1.0 S2 0.94 MV 0.95 CR SK IC ML UR 0.99 ≈ 1.0 0.99 0.96 ≈ 1.0 0.99 ≈ 1.0 0.95 0.95 0.96 0.99 ≈ 1.0 0.99 ≈ 1.0 0.99 ≈ 1.0 1.0 1.0 1.0 R GM 0.99 0.99 0.99 0.99 ≈ 1.0 0.98 ≈ 1.0 0.99 ≈ 1.0 0.88 0.99 0.99 0.99 0.99 0.99 ≈ 1.0 CC C GM 1.0 ≈ 1.0 1.0 ≈ 1.0 1.0 ≈ 1.0 1.0 1.0 1.0 ≈ 1.0 1.0 ≈ 1.0 1.0 ≈ 1.0 1.0 1.0 P R 0.97 0.99 0.98 ≈ 1.0 0.97 ≈ 1.0 1.0 1.00 0.91 ≈ 1.0 0.99 0.99 0.99 0.98 0.96 0.99 Table 3: The average quality of the algorithms compared with the optimal solution (C/Copt) for the small instances of data and for K = 6. In the third set of experiments we have measured running times of our algorithms and of the ILP solver. 5.1 Evaluation on Small Instances We now present the results of our experiments on small elections. For each data set, we generated elections with the number of agents n = 100 (n = 9 for data set SK because there are only 9 voters there) and with the number of alternatives m = 10 (m = 6 for data set CR because there are only 6 alternatives there) using the method described in Section 4.1 for the real-life data sets, and in the natural obvious way for synthetic data. For each algorithm and for each data set we ran 500 experiments on different instances for K = 3 (for the CR data set we used K = 2) and 500 experiments for K = 6 (for CR we set K = 4). For Algorithms C we set the parameter d = 15. The results (average fractions C/Copt and C/Cideal) for K = 3 are given in Tables 2 and 4; the results for K = 6 are given in Tables 3 and 5 (they are almost identical as for K = 3). For each 13 Monroe CC A S1 0.85 S2 0.85 MV 0.88 CR 0.94 SK 0.96 IC 0.8 ML 0.83 UR 0.8 B 0.89 0.89 0.92 0.97 0.96 0.84 0.88 0.85 C 0.9 0.89 0.92 0.96 0.97 0.85 0.88 0.86 GM R 0.89 0.89 0.89 0.89 0.91 0.92 0.96 0.96 0.91 0.97 0.84 0.84 0.9 0.88 0.85 0.87 C 0.92 0.93 0.97 0.97 1.0 0.85 0.92 0.9 GM 0.89 0.9 0.92 0.97 0.97 0.83 0.90 0.87 P 0.91 0.91 0.93 0.97 0.82 0.84 0.89 0.87 R 0.92 0.92 0.97 0.97 0.99 0.85 0.94 0.89 Table 4: The average quality of the algorithms compared with the simple lower bound (C/Cideal) for the small instances of data and for K = 3. A S1 0.91 S2 0.88 Mv 0.85 Cr 0.95 Sk 0.91 IC 0.91 Ml 0.89 Ur 0.91 Monroe B 0.96 0.93 0.89 0.98 0.92 0.95 0.94 0.95 C 0.96 0.93 0.89 0.99 0.92 0.95 0.94 0.95 GM R 0.95 0.95 0.93 0.93 0.88 0.89 0.98 0.99 0.92 0.81 0.95 0.94 0.93 0.94 0.94 0.95 C 0.98 0.98 0.99 1.0 1.0 0.96 0.97 0.98 GM 0.98 0.98 0.99 1.0 1.0 0.96 0.98 0.98 CC P R 0.98 0.98 0.99 1.0 0.96 0.96 0.97 1.0 0.91 ≈ 1.0 0.95 0.95 0.98 0.95 0.94 0.97 Table 5: The average quality of the algorithms compared with the simple lower bound (C/Cideal) for the small instances of data and for K = 6. experiment in this section we also computed the standard deviation; it was always on the order of 0.01. The results lead to the following conclusions: 1. Even Algorithm A obtains very good results, but nonetheless Algorithms B and C improve no- ticeably upon Algorithm A. In particular, Algorithm C (for d = 15) obtains the highest satisfaction on all data sets and in almost all cases was able to find an optimal solution. 2. Algorithm R gives slightly worse solutions than Algorithm C. 3. The quality of the algorithms does not depend on the data set used for verification (the only exception is Algorithm R for Monroe's system on data set SK; however SK has only 9 voters so it can be viewed as a border case). 14 5.2 Evaluation on Larger Instances For experiments on larger instances we needed data sets with at least n = 10000 agents. Thus we used the NetFlix data set and synthetic data. (Additionally, we run the subset of experiments (for n ≤ 5000) also for the S2 data set.) For Monroe's rule we present results for Algorithm A, Algo- rithm C, and Algorithm R, and for Chamberlin-Courant's rule we present results for Algorithm C and Algorithm R. We limit the set of algorithms for the sake of the clarity of the presentation. For Monroe we chose Algorithm A because it is the simplest and the fastest one, Algorithm C because it is the best generalization of Algorithm A that we were able to run in reasonable time, and Algo- rithm R to compare a randomized algorithm to deterministic ones. For Chamberlin-Courant's rule we chose Algorithm C because it is, intuitively, the best one, and we chose Algorithm R for the same reason as in the case of Monroe. Further, we present results for the NetFlix data set and for the urn model only. We chose these data sets because the urn model results turned out to be the worst ones among the synthetic data sets, and the NetFlix data set is our only large real-life data set. First, for each data set and for each algorithm we fixed the value of m and K and for each n ranging from 1000 to 10000 with the step of 1000 we run 50 experiments. We repeated this procedure for 4 different combinations of m and K: (m = 10, K = 3), (m = 10, K = 6), (m = 100, K = 30) and (m = 100, K = 60). We measured the statistical correlation between the number of voters and the quality of the algorithms C/Cideal. The ANOVA test in most cases showed that there is no such correlation. The only exception was S2 data set, for which we obtained an almost negligible correlation. For example, for (m = 10, K = 3) Algorithm C under data set S2 for Monroe's system for n = 5000 gave C/Cideal = 0.88, while for n = 100 (in the previous section) we got C/Cideal = 0.89. Thus we conclude that in practice the number of agents has almost no influence on the quality of the results provided by our algorithms. Next, we fixed the number of voters n = 1000 and the ratio K/m = 0.3, and for each m ranging from 30 to 300 with the step of 30 (naturally, as m changed, so did K to maintain the ratio K/m), we run 50 experiments. We repeated this procedure for K/m = 0.6. The relation between m and C/Cideal for MV and UR, under both Monroe's rule and Chamberlin-Courant's rule, is given in Figures 4 and 5 (the results for K/m = 0.6 look similar). Finally, we fixed n = 1000 and m = 100, and for each K/m ranging from 0.1 and 0.5 with the step of 0.1 we run 50 experiments. The relation between the ratio K/m and the quality C/Cideal is presented in Figures 6 and 7. For the case of Chamberlin-Courant's system increasing the size of the committee we elect improves agent satisfaction: Since there are no constraints on the number of agents matched to a given alternative, larger committees mean more opportunities to satisfy the agents. For Monroe, larger committees may lead to lower total satisfaction. This happens if many agents like a particular alternative a lot, but only some of them can be matched to this alternative and others have to be matched to their less-preferred ones. Nonetheless, we see that Algorithm C achieves C/Cideal = 0.925 even for K/m = 0.5 for the NetFlix data set. Our conclusions from these experiments are the following. For Monroe's rule, even Algorithm A achieves very good results. However, Algorithm C consistently achieves better ones (indeed, almost perfect ones). Randomized algorithms consistently do worse than our deterministic ones. 15 Figure 4: The relation between the number of alternatives m and the quality of the algorithms C/Cideal for the Monroe's system. Figure 5: The relation between the number of alternatives m and the quality of the algorithms C/Cideal for the Chamberlin-Courant's system. 5.3 Running time In our final set of experiments we have measured running times of our algorithms on the data set MV. We have used a machine with Intel Pentium Dual T2310 1.46GHz processor and 1.5GB of 16 Figure 6: The relation between the ratio K/m and the quality of the algorithms C/Cideal for the Monroe's system. Figure 7: The relation between the ratio K/m and the quality of the algorithms C/Cideal for the Chamberlin-Courant's system. RAM. In Figure 8 we show the running time of GLPK ILP solver for Monroe's and for Chamberlin- Courant's rules. These running times are already large for small instances and they are increasing exponentially with the number of voters. For Monroe's rule, even for K = 9, m = 30, n = 100 some of the experiments timed out after 1 hour, and for K = 9, m = 30, n = 200 none of the 17 Figure 8: The running time of the standard ILP solver for the Monroe's and for the Chamberlin- Courant's systems. For the Monroe's system, for K = 9, m = 30, and for n ≥ 200 none of the single algorithm execution finished within 1 day. experiments finished within one day. Thus we conclude that the real application of the ILP algorithm is very limited. Example running times of the other algorithms for some combinations of n, m, and K are presented in Table 6. 6 Conclusions We have provided experimental evaluation of a number of algorithms (both known ones and their extensions) for computing the winners under Monroe's rule and under Chamberlin-Courant's rule. While finding winners under these rules is NP-hard [2,5,14], it turned out that in practice we can obtain very high quality solutions using simple algorithms. Indeed, both for Monroe's rule and for Chamberlin-Courant's rule we recommend using Algorithm C (or Algorithm A on very large Mon- roe elections). We believe that our results mean that (approximations of) Monroe's and Chamberlin- Courant's rules can be used in practice. Acknowledgements The authors were supported in part by AGH Univ. grant 11.11.120.865, by the Foundation for Polish Science's Homing/Powroty program, by Poland's National Science Center grant DEC-2011/03/B/ST6/01393, and by EU's Human Capital Program "National PhD Programme in Mathematical Sciences" carried out at the University of Warsaw. 18 m = 10, K = 3 m = 10, K = 6 n = 2000 A 0.01 B 0.08 C 1.1 GM 0.8 R 7.6 C 0.02 GM 0.003 P 0.009 R 0.014 6000 0.03 0.9 8 7.3 50 0.07 0.009 0.032 0.04 10000 0.05 2.3 22 20 180 0.12 0.015 0.05 0.065 2000 0.01 0.2 2.1 1.9 6.5 0.05 0.003 0.008 0.02 6000 0.04 1.4 16 13 52 0.14 0.01 0.02 0.06 10000 0.07 3.6 37 52 140 0.26 0.018 0.05 0.11 m = 100, K = 30 m = 100, K = 60 n = 2000 A 0.5 B 0.8 C 38 GM 343 R 41 C 4.3 GM 0.06 P 0.03 R 0.06 6000 1.6 4 140 2172 329 11 0.2 0.1 0.24 10000 2.8 9.5 299 5313 830 19 0.4 0.26 0.45 2000 0.9 1.7 64 929 88 7.5 0.09 0.03 0.1 6000 2.8 8 221 5107 608 19 0.3 0.1 0.4 10000 4.9 18 419 13420 1661 31 0.7 0.2 0.8 e o r n o M C C e o r n o M C C Table 6: Example running times of the algorithms [in seconds]. References [1] S. Berg. Paradox of voting under an urn model: The effect of homogeneity. Public Choice, 47:377 -- 387, 1985. [2] N. Betzler, A. Slinko, and J. Uhlmann. On the computation of fully proportional representa- tion. Technical report, U. of Auckland, November 2011. [3] B. Chamberlin and P. Courant. Representative deliberations and representative decisions: Pro- portional representation and the Borda rule. American Political Science Review, 77(3):718 -- 733, 1983. [4] T. Kamishima. Nantonac collaborative filtering: recommendation based on order responses. In Proceedings of KDD-03, pages 583 -- 588, 2003. [5] T. Lu and C. Boutilier. Budgeted social choice: From consensus to personalized decision making. In Proceedings of IJCAI-2011, pages 280 -- 286, 2011. 19 [6] T. Lu and C. Boutilier. Learning Mallows models with pairwise preferences. In Proceedings of ICML-11, pages 145 -- 152, June 2011. [7] C. L. Mallows. Non-null ranking models. i. Biometrika, 44(1-2):114 -- 130, June 1957. [8] N. Mattei, J. Forshee, and J. Goldsmith. An empirical study of voting rules and manipulation with large datasets. In COMSOC, 2012. [9] R. Meir, A. Procaccia, J. Rosenschein, and A. Zohar. The complexity of strategic behavior in multi-winner elections. JAIR, 33:149 -- 178, 2008. [10] B. Monroe. Fully proportional representation. American Political Science Review, 89(4):925 -- 940, 1995. [11] G. Nemhauser, L. Wolsey, and M. Fisher. An analysis of approximations for maximizing submodular set functions. Mathematical Programming, 14(1):265 -- 294, 1978. [12] J. Oren. Personal communication, 2012. [13] R. Potthoff and S. Brams. Proportional representation: Broadening the options. Journal of Theoretical Politics, 10(2):147 -- 178, 1998. [14] A. Procaccia, J. Rosenschein, and A. Zohar. On the complexity of achieving proportional representation. Social Choice and Welfare, 30(3):353 -- 362, 2008. [15] P. Skowron, P. Faliszewski, and A. Slinko. Fully proportional representation as resource allo- cation: Approximability results. Technical Report arXiv:0809.4484 [cs.GT], arXiv.org, Aug. 2012. [16] T. Walsh. Where are the hard manipulation problems? JAIR, 42:1 -- 29, 2011. 20
1712.01648
1
1712
2017-12-05T14:23:35
The Role of Compliance in Heterogeneous Interacting Agents: Data from Observations
[ "cs.MA" ]
The dynamics of agent-based systems provide a framework to face the complexity of pedestrian-vehicle interactions in future cities, in which the compliance to traffic norms plays a fundamental role. The data of an observation performed at a non-signalized intersection are presented to provide useful insights for supporting the future development of agent-based models. Results focus on drivers' compliance to crossing pedestrians, describing potentially conflictual interactions among heterogeneous agents. The discussion closes with the potential applications of the collected data set for modelling the phenomenon.
cs.MA
cs
The Role of Compliance in Heterogeneous Interacting Agents: Data from Observations Stefania Bandini1, 2, Luca Crociani1, Giuseppe Vizzari1, Flavio Soares Correa da Silva3, and Andrea Gorrini1 1 Complex Systems and Artificial Intelligence research center, Univ. Milano - Bicocca (Italy) 2 Research Center for Advance Science and Technology, The University of Tokyo (Japan) 3 Institute of Mathematics and Statistics, University of Sao Paulo (Brazil) Abstract. The dynamics of agent-based systems provide a framework to face the complexity of pedestrian/vehicle interactions in future cities, in which the compliance to traffic norms plays a fundamental role. The data of an observa- tion performed at a non-signalized intersection are presented to provide useful insights for supporting the future development of agent-based models. Results focus on drivers' compliance to crossing pedestrians, describing potentially con- flictual interactions among heterogeneous agents. The discussion closes with the potential applications of the collected data set for modelling the phenomenon. Keywords: Agent-based Modelling, Compliance, Pedestrian, Vehicular Traffic 1 Introduction and Related Work Agent-based modelling and simulations of pedestrian and crowd dynamics have been increasingly reported in the technical and scientific specialized literature. Scientific communities started to incorporate agent-based systems to improve the expressiveness of traditional approaches and to simulate the complex behaviour of people and traf- fic in outdoor and indoor urban scenarios. The intrinsically dynamical properties of agent-based models offer a research framework to face the complexity of the future cities [7], offering new possibilities to incorporate and integrate the growing presence of autonomous entities/artefacts both physical (e.g. autonomous vehicles) and virtual (e.g. data coming from heterogeneous sources: social media, distributed sensors etc.). The development of agent-based models and systems requires to check the quality, robustness and plausibility of the obtained simulations against real data, in order to tackle decision making problems related to urban mobility. Recent literature contains a wide range of methods and study cases supporting this view [1]. The aim of this paper is to present a real case of data collection performed to collect useful insights about pedestrian-vehicles interactions at non-signalized intersections, supporting the future development of a heterogeneous agent-based system to simulate the phenomenon. From pioneering works, several models have been developed and applied for the simulation of pedestrian and vehicular dynamics, including both CA and particles mod- els [3]. These two approaches have, separately and independently, produced a signifi- cant impact, yet efforts characterized by an integrated model considering the simulta- neous presence of vehicles and pedestrians are not as frequent or advanced. With the 7 1 0 2 c e D 5 ] A M . s c [ 1 v 8 4 6 1 0 . 2 1 7 1 : v i X r a 2 Bandini, S., Crociani, L., Vizzari, G., Correa da Silva, F., Gorrini, A. Fig. 1. The work flow for selecting the sample of crossing episodes from the video images. notable exception of [6], most efforts in this direction are relatively simplistic, narrow (i.e. targeting extremely specific situations), homogeneous for the simulated entities, and they are often not validated against real data [4, 10]. In this framework, we con- sider the possibility to model and simulate the complex aspect of drivers' compliance to pedestrian yielding rules in the context of interactions among heterogeneous agents, and its implications on self-organization dynamics. 2 Observation Results A video recorded observation [5] has been performed at a non-signalized intersection in Milan (from noon, 73 minutes), characterized by a high number of pedestrian acci- dents in the past years. We selected from the video a sample of 812 crossing episodes considering only the cases in which one vehicle directly interacted with one or more pedestrians (see Fig. 1). At non-signalized intersections traffic laws require drivers to yield those pedestrians who are already occupying the zebra, but also those who are localized nearby or in correspondence of the curb waiting to cross. The level of compli- ance of drivers to pedestrians' right-of-way have been estimated considering the posi- tion of crossing pedestrians with respect to the curb (i.e. pedestrian about 1.5 meter far from the curb, waiting at the curb, crossing on the zebra) and to the direction of travel of vehicles (i.e. pedestrian from the near or the far side-walk). Preliminary analyses on results (see Tab. 1) showed that 48% of the total number of crossing episodes was characterized by non-compliant drivers with crossing pedes- trians from the two side-walks. A multiple linear regression was calculated to predict the percentage of non-compliant drivers per minute based on: (i) number of vehicles per minute (18.89 veh/min in average; p = 0.007, significant predictor) and (ii) num- ber of crossing pedestrian per minute (8.01 ped/min in average; p < 0.001, significant predictor). A significant regression equation was found [F(2,70) = 14.526, p < 0.001], with R2 of 0.293. This demonstrates that the non-compliance of drivers is negatively determined by traffic conditions and positively determined by pedestrian flows on ze- bra. Despite the low level of drivers' compliance, no accidents or risky situations have been observed, thanks to the self-organization of the system based on pedestrians' yield- ing/collaborative behaviour to approaching cars. The Role of Compliance in Heterogeneous Interacting Agents 3 Table 1. Results about the drivers' compliance to the right-of-way of crossing pedestrians. Compliant Non-compliant Types of pedestrian/vehicle interaction Ped. approaching/waiting/crossing from the near side-walk 191 (46.14%) 223 (53.86%) Ped. approaching/waiting/crossing from the far side-walk 230 (57.69%) 168 (42.21%) Fig. 2. The relation between non-compliant drivers and the number of vehicles (left) and crossing pedestrians (right) in the observed intersection. Each data refers to one minute of the video. 3 Discussion The results showed in the previous section represent applicable insights towards the extension of a model for the analysis of pedestrian crossings [2], considering poten- tially conflictual interactions among heterogeneous agents. As shown in Figure 3(a), the model is based on the integration of two independent models for the simulation of vehicles, moving in continuous lanes, and pedestrians, moving in a 2-dimensional dis- crete environment. The two environments are superimposed, and car-agents perceive pedestrian-agents while they are crossing or in the nearby of the curb (grey cells in Fig. 3(a)) and vice-versa. The interactions between them are described in Figure 3(b). Pedestrian-agents consider the speed and distance of cars to avoid collisions, giving way to non-compliant vehicles. The compliance of car-agents is mainly influenced by the necessary braking distance. On the other hand, according to a fixed probability that will be set on the collected data on compliance, car-agents can deliberately avoid to stop even if the braking distance is sufficient, requiring pedestrian-agents to yield. The potential applications of such research are related to the possibility to test the effect of non-compliance on emergent observables like: near accident situations, ex- posure to accidents, traffic capacity of the road and Level of Service [8]. In addition, this kind of research is also potentially relevant to complement studies on autonomous vehicles [9] to evaluate future transportation scenarios in Smart Cities. References [1] Campanella, M., Hoogendoorn, S., Daamen, W.: Quantitative and qualitative validation procedure for general use of pedestrian models. In: Pedestrian and Evacuation Dynamics 4 Bandini, S., Crociani, L., Vizzari, G., Correa da Silva, F., Gorrini, A. (a) (b) Fig. 3. A description of the environment and the two classes of agents (a). Car-agents life-cycle considering their possible non-compliance with respect to the presence of pedestrian-agents (b). 2012, 891 -- 905. Springer (2014) [2] Crociani, L., Vizzari, G.: An integrated model for the simulation of pedestrian crossings. In: Cellular Automata for Research and Industry, 670 -- 679. Springer (2014) [3] Duives, D.C., Daamen, W., Hoogendoorn, S.P.: State-of-the-art crowd motion simulation models. Transportation research part C: emerging technologies 37, 193 -- 209 (2013) [4] Godara, A., Lassarre, S., Banos, A.: Simulating Pedestrian-Vehicle Interaction in an Urban Network Using Cellular Automata and Multi-Agent Models. Traffic and Granular Flow'05, 411 -- 418 (2007) [5] Gorrini, A., Vizzari, G., Bandini, S.: Towards modelling pedestrian-vehicle interactions: Empirical study on urban unsignalized intersection. In: Pedestrian and Evacuation Dynam- ics, 25 -- 33 (2016) [6] Helbing, D., Jiang, R., Treiber, M.: Analytical investigation of oscillations in intersecting flows of pedestrian and vehicle traffic. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics 72(4) (2005) [7] Masthoff, J., Vasconcelos, W.W., Aitken, C., Correa da Silva, F.: Agent-based group mod- elling for ambient intelligence. In: Symposium on Affective Smart Environments (2007) [8] Milazzo II, J.S., Rouphail, N.M., Hummer, J.E., Allen, D.P.: Highway capacity manual 2000. Journal of the Transportation Research Board 1678(1), 25 -- 31 (2000) [9] Tachet, R., Santi, P., Sobolevsky, S., Reyes-Castro, L.I., Frazzoli, E., Helbing, D., Ratti, C.: Revisiting street intersections using slot-based systems. PLoS ONE 11(3), 1 -- 9 (2016) [10] Zeng, W., Nakamura, H., Chen, P.: A Modified Social Force Model for Pedestrian Behavior Simulation at Signalized Crosswalks. Social and Behavioral Sciences 138, 521 -- 530 (2014)
1909.08345
1
1909
2019-09-18T10:43:09
Limited-budget output consensus for descriptor multiagent systems with energy constraints
[ "cs.MA", "eess.SY", "eess.SY" ]
The current paper deals with limited-budget output consensus for descriptor multiagent systems with two types of switching communication topologies; that is, switching connected ones and jointly connected ones. Firstly, a singular dynamic output feedback control protocol with switching communication topologies is proposed on the basis of the observable decomposition, where an energy constraint is involved and protocol states of neighboring agents are utilized to derive a new two-step design approach of gain matrices. Then, limited-budget output consensus problems are transformed into asymptotic stability ones and a valid candidate of the output consensus function is determined. Furthermore, sufficient conditions for limited-budget output consensus design for two types of switching communication topologies are proposed, respectively. Finally, two numerical simulations are shown to demonstrate theoretical conclusions.
cs.MA
cs
IEEE TRANSACTIONS ON CYBERNETICS 1 Limited-budget output consensus for descriptor multiagent systems with energy constraints Jianxiang Xi, Cheng Wang, Xiaojun Yang, Bailong Yang Abstract -- The current paper deals with limited-budget output consensus for descriptor multiagent systems with two types of switching communication topologies; that is, switching connected ones and jointly connected ones. Firstly, a singular dynamic output feedback control protocol with switching communication topologies is proposed on the basis of the observable decom- position, where an energy constraint is involved and protocol states of neighboring agents are utilized to derive a new two- step design approach of gain matrices. Then, limited-budget output consensus problems are transformed into asymptotic stability ones and a valid candidate of the output consensus function is determined. Furthermore, sufficient conditions for limited-budget output consensus design for two types of switching communication topologies are proposed, respectively. Finally, two numerical simulations are shown to demonstrate theoretical conclusions. Index Terms -- Multiagent system, descriptor system, output consensus, limited budget, switching topology. I. INTRODUCTION D URING the last decade, consensus of multiagent sys- tems receives considerable attention, which designs a distributed control protocol to drive multiple agents to achieve an agreement about some interested variables such as time, position, velocity and temperature, et al., as shown in [1]- [6]. Consensus has potential practical applications in formation control [7]-[10], target tracking [11]-[12], network synchroni- sation [13]-[14] and multiple source data analysis [15]-[16], et al. The communication topologies are critically important for multiagent systems to achieve consensus, which can usually be categorized into the fixed ones and switching ones. For fixed communication topologies, the neighboring relationship and communication weights are time-invariant, as discussed in [17] and [18]. For switching communication topologies, the neighboring relationships may be time-varying, but communi- cation weights are time-invariant. In this case, the associated Laplacian matrices of the communication topologies are piece- wise continuous, as shown in [19]-[21], where switching com- munication topologies are divided into switching connected ones and jointly connected ones. For switching connected communication topologies, each topology in the switching set is connected. For jointly connected communication topologies, the union of topologies in certain time interval is connected, but each topology in the switching set can be unconnected. It is well-known that consensus for jointly connected com- munication topology cases is more complex than the one for switching connected communication topology cases. Jianxiang Xi, Cheng Wang, Bailong Yang are with Rocket Force University of Engineering, Xi'an, 710025, P.R. China, and Xiaojun Yang is with School of Information Engineering, Guangdong University of Technology, Guangzhou, 510006, P.R. China. (Corresponding author: Xiaojun Yang, [email protected]) According to the dynamics of each agent, multiagent sys- tems can be categorized into normal ones and descriptor ones. For normal multiagent systems, each agent is modeled as differential equations and only owns dynamic modes, as addressed in [22]-[24]. For descriptor multiagent systems, the dynamics of each agent may contain algebraic constrains and cannot be modeled by differential equations. In practical appli- cations, descriptor multiagent systems can be used in complex networks and multiagent supporting systems, as discussed in [25]. Moreover, the motion of each agent may be derived by impulsive modes, static modes and dynamic modes, where impulsive modes should be eliminated since they destroy the operation of the whole system, and the motions associated with both static modes and dynamic modes should achieve con- sensus. Yang and Liu [26] proposed necessary and sufficient consensus conditions of descriptor multiagent systems with fixed communication topologies by a static output feedback control protocol, where a specific rank constrain is required. In [27], the impacts of communication delays on consensus of descriptor multiagent systems were analyzed, where it was also supposed that communication topologies are fixed. Wang and Huang [28] dealt with consensus analysis and design problems for descriptor multiagent systems with switching communication topologies. Based on different interested variables, consensus can be categorized into state consensus and output consensus, where it is only required that partial states or state combinations achieve agreement for output consensus. Chopra and Spong [29] first introduced the concept of output consensus and proposed the associated consensus criteria for normal non- linear multiagent systems with relative degree one. Xiao et al. [30] modeled the dynamics of each agent in multiagent systems as a normal second-order integrator and gave sufficient conditions for output consensus. Liu and Jia [31] proposed an H∞ analysis approach to investigate output consensus for normal multiagent systems with external disturbances, where each agent was modeled as a type of special controllability canonical form. In [32], output consensus for normal single- input-single-output high-order linear multiagent systems was addressed by the output regulation theory. Xi et al. [33] focused general normal high-order multiagent systems and proposed output consensus analysis and design criteria by a partial stability method. It should be pointed that the dynamics of each agent is normal in [29]-[33], where it was shown that output consensus is more challenging than state consensus. In the above literatures, the energy limitation and/or the consensus performance were not considered, which can be modeled as certain optimization consensus problems. Cao and Ren [34] gave optimal consensus criteria by the linear quadratic regulator, where it was required that the communi- IEEE TRANSACTIONS ON CYBERNETICS 2 cation topology is complete, which means that the nonzero eigenvalues of the corresponding Laplacian matrix are iden- tical. Actually, this requirement of optimal consensus on the communication topology is conservatism, and suboptimal consensus was extensively studied. Guaranteed-performance consensus for normal multiagent systems was dealt with in [35] and [36], where it was supposed that communication topologies are fixed. Linear matrix inequality criteria for guaranteed-cost consensus with communication delays were presented in [37] and [38]. In [39] and [40], guaranteed- cost consensus for normal multiagent systems with switching topologies was discussed and the associated guaranteed-cost consensus analysis and design criteria were proposed. In [35]- [40], state consensus instead of output consensus for normal multiagent systems was investigated and the guaranteed cost cannot be given previously. To the best of our knowledge, limited-budget output consensus for descriptor multiagent sys- tems with switching communication topologies is still open and the following three challenging problems should be dealt with: (i) How to eliminate impulsive modes and guarantee that the motions associated with static modes achieve output consensus; (ii) How to introduce the given budget into consen- sus criteria and construct the relationship between the given budget and initial outputs instead of initial states; (iii) How to determine the impacts of switching topologies and ensure the checkable feature of the associated consensus criteria. The current paper focuses on limited-budget output con- sensus for descriptor multiagent systems and addresses the impacts of two types of switching communication topologies. Based on the observable decomposition of the dynamics of each agent, a singular dynamic output feedback consensus protocol with an energy constraint and topology switching is presented, which can make the dynamics of the whole multiagent system satisfy some separation feature; that is, its gain matrices lies on diagonal boxes of an upper triangular matrix. Furthermore, using the characteristics that the row sum of the Laplaican matrix of the communication topology is zero, the disagreement and consensus dynamics of a descriptor mul- tiagent system are determined and they are independent with each other. For switching connected communication topology cases, a new two-step design approach is proposed to design gain matrices of consensus protocols, the relationship between the given energy budget and the matrix variable is constructed, and limited-budget output consensus design criteria are given, respectively. For jointly connected communication topology cases, by the Cauchy convergence criterion and Barbalat's lemma, sufficient conditions for limited-budget output consen- sus design are presented, respectively. II. PROBLEM DESCRIPTION The dynamics of the mth agent of a high-order homoge- neous descriptor multiagent system is modeled by (cid:26) E xm(t) = Axm(t) + Bum(t), ym(t) = Cxm(t), (1) where m = 1, 2,··· , N, E ∈ Rn×n, A ∈ Rn×n, B ∈ Rn×k, C ∈ Rl×n and xm(t), um(t) and ym(t) denote the system state, the control input and the system output,  respectively. Because the matrix E may be singular; that is, rank(E) ≤ n , multiagent system (1) is called the descriptor multiagent system. Compared with normal multiagent systems modeled by differential equations, multiagent system (1) may contain static modes and impulsive modes besides dynamic modes. Impulsive modes must be eliminated by designing proper consensus protocols since they destroy the operation of the whole system. For multiagent system (1), all the states associated with both dynamic modes and static modes should achieve consensus. This autonomous system of multiagent system (1) can also be represented by the pair (E, A), whose some specific properties compared with normal systems are listed as follows. Definition 1: [41] The pair (E, A) is regular if σE−A (cid:54)= 0 for some σ ∈ C and impulse-free if deg(σE− A) = rank(E) for ∀σ ∈ C. Lemma 1: [41] The pair (E, A) is regular and impulse-free if and only if rank = n + rank(E). (cid:20)E 0 (cid:21) A E Lemma 2: [41] The pair (E, A) is regular, impulse-free and asymptotically stable if and only if there exists a matrix R such that ET R = RT E ≥ 0 and AT R + RT A < 0. We first introduce the observable decomposition of the tripe (E, A, C). Let Uo be an invertible matrix such that (cid:21) (cid:21) (cid:20) Eo (cid:20) Ao 0 0 Eo Eo Ao Ao U−1 o EUo = U−1 o AUo = (cid:20) Bo Bo (cid:21) , , U−1 o B = , CUo = [Co, 0] , where Eo ∈ Rh×h, Ao ∈ Rh×h, Bo ∈ Rh×k, Co ∈ Rl×h and the triple (Eo, Ao, Co) is observable. Then, the following consensus protocol with switching topologies and an energy constraint is proposed: (cid:80) Eo zm(t) = (Ao + BoKu) zm(t) − KzCo (cid:80) j∈Nm,κ(t) wmj,κ(t) (zj(t) − zm(t)) wmj,κ(t) (yj(t) − ym(t)) , (2) + Kz j∈Nm,κ(t) um(t) = Kuzm(t), N(cid:80) (cid:82) +∞ 0 m=1 m(t)M um(t)dt, uT Je = where m = 1, 2,··· , N, Ku ∈ Rk×h, Kz ∈ Rh×l, M T = M > 0, Nm,κ(t) is the neighbor set of the mth agent at time t, zm(t) with zm(0) = 0 stands for the protocol state, and Je represents the energy consumption of the whole multiagent system. Let J∗ e > 0 be a given energy budget; that is, the whole energy consumption of multiagent system (1) with consensus protocol (2) must be less than J∗ e . In the following, we give the definition of the limited-budget output consensus of descriptor multiagent systems. Definition 2: For any given J∗ e > 0, multiagent system (1) is said to be limited-budget output consensualizable by consensus protocol (2) if it is regular and impulse-free and there exist Ku and Kz such that limt→+∞ (ym(t) − co(t)) = 0 (m = 1, 2,··· , N ) and Je ≤ J∗ for any bounded disagreement e IEEE TRANSACTIONS ON CYBERNETICS initial outputs, where co(t) is said to be the output consensus function. The current paper gives two design approaches of gain matrices Ku and Kz such that multiagent system (1) with con- sensus protocol (2) achieves limited-budget output consensus for switching connected communication topologies and jointly connected communication topologies, respectively. III. PROBLEM TRANSFORMATION By the observable decomposition and the separation prin- ciple, consensus problems for multiagent system (1) with consensus protocol (2) are transformed into asymptotic sta- bility ones for a reduced-order subsystem, and the consensus dynamics is also determined. Let U−1 om(t), xT tem (1) can be transformed into o xm(t) =(cid:2)xT (cid:21)(cid:20) xom(t) (cid:21) (cid:20) Eo 0 Eo Eo xom(t) = om(t)(cid:3)T , then multiagent sys- (cid:20) Ao 0 (cid:20) Bo(t) (cid:21)(cid:20) xom(t) (cid:21) Ao Ao xom(t) (cid:21) (3) + Bo(t) um(t),  IN ⊗ (Ao + BoKu) + Lκ(t) ⊗ KzCo where xo(t) = (cid:2)xT (cid:2)zT 2 (t),··· , zT 1 (t), zT ym(t) = Coxom(t), where m = 1, 2,··· , N. It can be found that the system output ym(t)(m ∈ 1, 2,··· , N ) depends on the observable compo- nent xom(t), but it is not associated with the unobservable component xom(t). Hence, when the limited budget is not considered, multiagent system (1) achieves output consensus if and only if the observable component of each agent achieves consensus. In this case, the unobservable component of each agent can be neglected and the observable component of multiagent system (1) with consensus protocol (2) can be written in the following Kronecker form as IN ⊗ (cid:21)(cid:20) xo(t) (cid:20) Eo IN ⊗ Ao (cid:21) (cid:20) Eo −Lκ(t) ⊗ KzCo (cid:21)(cid:20) xo(t) = zo(t) IN ⊗ BoKu (cid:21) N (t)(cid:3)T and Lκ(t) is the Laplacian matrix , (4) zo(t) = oN (t)(cid:3)T o2(t),··· , xT o1(t), xT zo(t) , of the switching communication topology, which is piecewise continuous since the switching signal κ(t) is piecewise con- tinuous. √ (cid:104) Since each communication topology in the switching set is undirected, the associated Laplacian matrix Lκ(t) is sym- metric, where zero is its eigenvalue with an eigenvector there exists an orthonormal matrix 1/ Uκ = (cid:105) κ Lκ(t)Uκ = diag(cid:8)0, ∆κ(t) N. In this case, √ 1/ such that (cid:9) , N , Uκ U T κ Lκ(t) Uκ ∈ R(N−1)×(N−1) and Uκ is where ∆κ(t) = U T set to be time-varying for switching connected communica- tion topology cases and time-invariant for jointly connected communication topology cases. We introduce the following nonsingular transformation xo(t) =(cid:0)U T κ ⊗ Ih (cid:1) xo(t) =(cid:2)xT oN (t)(cid:3)T , o1(t), xT o2(t),··· , xT , (5) 3 . (cid:21) (6) and , = = Eo Eo Ao × (cid:21) (cid:21) BoKu xo1(t) xo∆(t) xo1(t) xo∆(t) o1(t), zT κ ⊗ Ih IN−1⊗ zo(t) =(cid:0)U T (cid:20) Eo oN (t)(cid:3)T (cid:21) (cid:21)(cid:20) zo1(t) (cid:1) zo(t) =(cid:2)zT (cid:21) (cid:21)(cid:20) zo∆(t) IN−1⊗Ao IN−1⊗BoKu (cid:20) Ao + BoKu 0 o2(t),··· , zT Thus, multiagent system (4) can be transformed into (cid:21)(cid:20) zo1(t) (cid:20) Eo (cid:20) IN−1⊗(Ao + BoKu)+∆κ(t)⊗KzCo −∆κ(t) ⊗ KzCo (cid:20) zo∆(t) where xo∆(t) = (cid:2) xT zo∆(t) =(cid:2) zT (cid:20) I(N−1)h (cid:21) (cid:20) zo∆(t) (cid:21)(cid:20) zo∆(t) (cid:20) Eo (cid:20)IN−1⊗(Ao + BoKu) (cid:21) (cid:20) zo∆(t) xo∆(t) then subsystem (6) can be transformed into IN−1⊗ o3(t), ··· , xT (cid:21) oN (t) ]T . Let (cid:21) IN−1⊗Ao+∆κ(t)⊗KzCo (cid:20) zo∆(t) I(N−1)h −I(N−1)h o2(t), xT o3(t), ··· , zT ∆κ(t) ⊗ KzCo o2(t), zT oN (t) ]T xo∆(t) xo∆(t) Us = = Us (cid:21) (cid:21) Eo , , = 0 0 (7) × xo∆(t) . Let the minimum and maximum nonzero eigenvalues of the Laplacian matrices of all the communication topologies in the switching set denote as λmin = min{λm,min,∀m ∈ χ} and λmax = max{λm,min,∀m ∈ χ}, where λm,min and λm,max represent the minimum and maximum nonzero eigenvalues of the Laplacian matrix of the mth communication topology in the switching set, respectively. These two notations are used for both switching connected communication topology cases and jointly connected communication topology cases. Moreover, subsystems (5) and (6) determine consensus and disagreement dynamics of multiagent system (1). The following theorem converts the consensus problem into the asymptotic stability one and determines a candidate of the output consensus function. tocol (2) is regular and impulse-free and limt→+∞(cid:2)zT o∆(t)(cid:3)T = 0, Theorem 1: If multiagent system (1) with consensus pro- o∆(t), then it achieves output consensus and (cid:17) √ (cid:16) co(t) − Co xo1(t)/ N = 0. Proof: Let em(m ∈ 1, 2,··· , N ) denote the N-dimensional column vector with the mth component 1 and 0 elsewhere. Due to xT limt→∞ Uκe1 = one can show that 1√ N 1, Uκe1 ⊗ xo1(t) = 1 ⊗ xo1(t). 1√ N (8) IEEE TRANSACTIONS ON CYBERNETICS 4 o∆(t))T(cid:3)T with xm where ET ··· , xN it can be deduced by (7) that o Rx=RT x m=2 (xm x Eo≥0. Let xo∆(t)=(cid:2)(x2 N(cid:88) o∆(t))T(cid:0)RT +(cid:0)Ao + λκ(t),mKzCo o∆(t))T(cid:0)RT o∆(t))T(cid:0)RT x Ao + AT minR−T x Ao+AT x C T Vx(t) = Let Kz = −λ−1 Vx(t)= (xm N(cid:88) ≤ N(cid:88) m=2 m=2 (xm o∆(t))T , o∆(t) ∈ Rh (m = 2, 3,··· , N ), then o∆(t))T , x3 (cid:1) (cid:0)Ao + λκ(t),mKzCo (cid:1)T o∆(t). o /2, then one can obtain that Rx ) xm o Rx−λκ(t),mλ−1 minC T o Co (cid:1) xm o∆(t) (cid:1) xm (cid:16) (11) o Co o∆(t). o Rx − C T (cid:17) (cid:104)(cid:0)z2 o∆(t)(cid:1)T ,(cid:0)z3 o∆(t)(cid:1)T zo∆(t), Rz , o∆(t) ∈ Rh (m = 2, 3,··· , N ), Furthermore, construct the following Lyapunov function can- didate From the property of the Kronecker product, one can find that Uκe1 ⊗ xo1(t) = (Uκ ⊗ Ih) Uκem ⊗ xom(t) = (Uκ ⊗ Ih) N(cid:88) Because Us is invertible, limt→∞(cid:2)zT limt→∞(cid:2)zT o∆(t)(cid:3)T o∆(t), xT = 0. Due to m=2 (cid:21) (cid:20) xo1(t) (cid:20) 0 0 xo∆(t) o∆(t), xT , (cid:21) o∆(t)(cid:3)T . (9) (10) = 0 if xo(t) = (Uκ ⊗ Ih) xo(t), the conclusion can be obtained from (8) to (10). The proof of Theorem 1 is completed.(cid:4) IV. SWITCHING CONNECTED COMMUNICATION TOPOLOGY CASES For multiagent system (1) with switching connected com- munication topologies, this section gives sufficient conditions for limited-budget output consensualization and consensus in terms of matrix inequality techniques. κ(t)∆κ(t) Since each communication topology in the switching set is connected, zero is its simple eigenvalue of the Laplacian matrix Lκ(t) and all other eigenvalues are positive. With- out loss of generality, we can set that Uκ = Uκ(t) such that U T with 0 < λκ(t),2 ≤ λκ(t),3 ≤ ··· ≤ λκ(t),N . In this case, Uκ is piecewise continuous, λmin = min{λm,2,∀m ∈ χ} and λmax = max{λm,N ,∀m ∈ χ}. Let yo(0) = 1 (0), yT (cid:9) Uκ(t) = diag(cid:8)λκ(t),2, λκ(t),3,··· , λκ(t),N N (0)(cid:3)T . The following theorem proposes 2 (0),··· , yT (cid:2)yT a limited-budget output consensualization criterion by matrix inequality techniques. Theorem 2: For any given J∗ e > 0, multiagent system (1) with switching connected cummnication topologies is limited- budget output consensualizable by consensus protocol (2) if there exist Rx and Rz such that = h + rank(Eo), (II) (I)rank (cid:21) Ao Eo (cid:20) Eo 0  ET o (0)(cid:0)(cid:0)IN−N−111T(cid:1)⊗Ih   Θ11 Θm x Eo ≥ 0, o Rx − C T o = EoRz ≥ 0, o Rx = RT x Ao + AT RT yT z ET RT (III) Θm = 12 Θ22 ∗ where λm = λmin, λmax and ∗ ∗ o Co < 0, 0.5BoM 0 −M (cid:1) yo(0)ET  < 0, o Rx≤J∗ e C T o Co, Θ11 = AoRz + RT 12 = −0.5λmR−T Θm x Ao + AT Θ22 = RT In this case, Ku=−BT o R−1 o /2. Proof: Consider a Lyapunov function candidate as follows o Co. z /2 and Kz=−λ−1 o − BoBT z AT o , x C T o Co, o Rx − C T minR−T x C T o∆(t)(cid:0)IN−1 ⊗ ET o Rx (cid:1) xo∆(t), Vx(t) = xT where ET o ··· ,(cid:0)zN o o∆(t) Rz= RT Vz(t) = zT IN−1 ⊗ ET o∆(t)(cid:1)T(cid:105)T z Eo≥0. Let zo∆(t)= N(cid:88) o∆(t))T(cid:16) RT with zm Vz(t) = (zm then it can be deduced by (7) that z (Ao + BoKu) (cid:17) m=2 + (Ao + BoKu)T Rz zm o∆(t) o∆(t))T RT z KzCo xm + 2λκ(t),m (zm z /2 and Rz = R−1 o R−1 o∆(t). o∆(t)(cid:1) Let Ku = −BT that z , then it can be derived o m=2 N(cid:88) z AT o∆(t). z zm z zm z zm Vz(t)= KzCo xm + 2λκ(t),m o−BoBT (cid:0)R−1 (cid:1)(cid:0)R−1 o∆(t)(cid:1)T(cid:0)AoRz+RT o∆(t)(cid:1)T (cid:0)R−1 (cid:1) (m = 2, 3,··· , N ) and (Eo, Ao + (cid:0)Eo, Ao + λκ(t),mKzCo By Lemma 2, (cid:0)Eo, Ao + λκ(t),mKzCo (cid:1) (m = 2, 3,··· , N ) (12) Because Uκ(t)⊗Ih and Us are nonsingular, multiagent system (4) is regular and impulse-free if and only if (Eo, Ao), BoKu) are regular and impulse-free. From Lemma 1, the pair (Eo, Ao) is regular and impulse-free if Condition (I) holds. x Eo ≥ 0 and are regular and impulse-free if ET o Rx = RT o Co < 0, and (Eo, Ao + BoKu) is RT o = EoRz ≥ 0 and regular and impulse-free if RT o < 0. Thus, by (11) and (12), according AoRz+RT to Theorem 1, multiagent system (1) with consensus protocol (2) achieves output consensus if Conditions (I)-(III) hold. o Rx − C T o −BoBT x Ao + AT z ET z AT In the sequel, the limited-budget output consensus is ad- dressed. It can be shown by (2) that (cid:90) +∞ o (t)(cid:0)IN ⊗ K T zT Je = (cid:16) (13) Due to zm(0) = 0 (m = 1, 2,··· , N ) and zo(t) = o = EoRz ≥ 0 κ(t) ⊗ Ih U T zo(t), one has zo1 = 0. If RT u M Ku z ET (cid:17) 0 (cid:1) zo(t)dt. IEEE TRANSACTIONS ON CYBERNETICS 5 and AoRz + RT Hence, it can be deduced by (13) that z AT o − BoBT o < 0, then limt→∞ zo1(t) = 0. z zom(t)(cid:1)T (cid:0)R−1 z zom(t)(cid:1)dt.(14) Je= For any  ≥ 0, it can be shown that 0 BoMBT o dt = Vx()−Vx(0)+Vz()−Vz(0). (15) Due to zo∆(t) = zo∆(t), from (14) and (15), it can be deduced that 0 m=2 (cid:90) +∞ N(cid:88) 0.25(cid:0)R−1 (cid:90)  (cid:16) Vx(t)+ Vz(t) (cid:17) (cid:90)  o (t)(cid:0)IN ⊗ K T (cid:90)  N(cid:88) 0.25(cid:0)R−1 z zom(t)(cid:1)T (cid:90)  (cid:16) Vx(t)+ Vz(t) (cid:17) (cid:20) R−1 N(cid:88) zT (cid:44)  e + 0 0 0 m=2 J = u M Ku (cid:1) zo(t)dt (cid:0)R−1 z zom(t)(cid:1) dt BoM BT o dt+Vx(0)+Vz(0)−Vx()−Vz(). (16) By (11) and (12), one can find that Vx(t)+ Vz(t)= o∆(t) z zm xm o∆(t) minR−T x C T o Rx − C T o Co o Co m=2 −0.5λκ(t),mλ−1 RT x Ao + AT (cid:21)T(cid:20) AoRz+RT (cid:21)(cid:20) R−1 o∆(t) z zm xm o∆(t) z AT ∗ o o−BoBT (cid:21) . (17) From (16) and (17), based the convex property of the linear matrix inequality, then it can be derived as  → +∞ that if Condition (III) holds, Je ≤ Vx(0) + Vz(0). (cid:16) (18) Since it is assumed that zm(0) = 0 (m = 1, 2,··· , N ), one has zo(0) = zo(0) = 0; which means that zo∆(0) = 0. According to the structure of Us, it can be obtained that κ(0) ⊗ Ih U T (cid:17) zo∆(0) = zo∆(0) = 0, xo∆(0) = zo∆(0) − xo∆(0) = −xo∆(0). o∆(0)(cid:0)IN−1 ⊗ ET (cid:1)(cid:20) 0T o Rx (cid:1) xo∆(0). (cid:21)(cid:0)IN−1 ⊗ ET I(N−1)h o Rx (19) (20) (cid:1) Thus, one can see that From (18) to (20), it can be derived that Vx(0) + Vz(0) = xT Je ≤ xT o (0)(cid:0)Uκ(0) ⊗ Ih (cid:3)(cid:16) (cid:2)0, I(N−1)h κ(0) ⊗ Ih U T κ(0) = IN , one has Due to Uκ(0)U T (cid:17) xo(0). (21) Uκ(0) (cid:3)(cid:16) Due to(cid:2)0, I(N−1)h (cid:18)(cid:18) by (21) and (22) that (cid:17) κ(0) = IN − 1 U T N κ(0) ⊗ Ih = U T U T (cid:19) Je ≤ xT o (0) IN − 1 N 11T ⊗ ET o Rx (cid:19) (22) 11T . κ(0) ⊗ Ih, one can find xo(0). (23) 0 11T (cid:21) o Co o Co = xT xo(0) (cid:19) xT o (0) (cid:18)(cid:18) IN − 1 N Furthermore, one can obtain that ⊗ C T (cid:19) o∆(0)(cid:0)IN−1 ⊗ C T (cid:1) xo∆(0). (24) Due to xo(0) =(cid:0)Uκ(0) ⊗ Ih (cid:1) xo(0), it can be obtained that yo(0) =(cid:0)Uκ(0) ⊗ Co (cid:1) xo(0). (cid:1)(cid:20) 1⊗Co(0)xo1(0)=(cid:0)Uκ(0)⊗Co (cid:1)(cid:20) (cid:21)(cid:19)T(cid:0)Uκ(0) ⊗ Co (cid:1) xo∆(0) > 0. (cid:19) (cid:19) By (9) and (10), the disagreement output component at t = 0 is y(0)− 1√ . (25) N Because it is supposed that ym(0) (m = 1, 2,··· , N ) are not agreement completely, it can be shown by (25) that (cid:18)(cid:0)Uκ(0) ⊗ Co o∆(0)(cid:0)IN−1 ⊗ C T (cid:18)(cid:18) (cid:18)(cid:18) By (24) and (26), one has IN − 1 N o Co In this case, the given energy budget J∗ ⊗ ζC T (27) where ζ > 0. For the matrix IN − N−111T , zero eigenvalue is simple and all the other eigenvalues are positive. By (23) e . Due to and (27), ET e can be denoted by IN − 1 N J∗ e = xT (cid:1)(cid:20) xo(0) > 0. ⊗ C T xT o (0) xo∆(0) xo∆(0) xo∆(0) xo(0), (cid:19) (cid:19) = xT o (0) o Co o Co (26) (cid:21) 11T 11T 0 0 11T (cid:19) ⊗ C T (cid:18)(cid:18) o Rx ≤ ζC T IN − 1 N (cid:19) o Co can ensure that Je ≤ J∗ (cid:19) (cid:18)(cid:18) o (0)(cid:0)(cid:0)IN − N−111T(cid:1) ⊗ Ih (cid:1) yo(0)ET o Rx ≤ J∗ IN − 1 N ⊗ Ih (cid:19) xo(0) = yT o (0) o Co 11T one can obtain that e C T o Co. xT o (0) yo(0), yT Based on the above analysis, the conclusion of Theorem 2 can be obtained.(cid:4) V. JOINTLY CONNECTED COMMUNICATION TOPOLOGY CASES This section investigates limited-budget output consensus design problems for multiagent systems with jointly connected communication topologies and gives the corresponding output consensus criteria in terms of the Cauchy convergence criterion and Barbalat's lemma. It is assumed that the time interval [tm, tm+1) consists of a series of non-overlapping contiguous subintervals as follows (cid:1),(cid:2)t1 (cid:2)ti at m, t1 m m, t2 m m − ti nonnegative t0 m, t1 m, ti+1 m where ti+1 a switch during m , tkm m (cid:1), t0 (cid:1),···,(cid:2)tkm−1 (cid:1) (i = 0, 1,··· , km − 1). m = tm+1, m ≥ Td (i = 0, 1,···, km − 1) and m is topologies integer. The m,··· , tkm−1 time-invariant jointly For communication m = tm, tkm and is m (cid:2)t0 (cid:98)RT o (cid:98)Rx ≤ 0 and (cid:98)RT o∆(t)(cid:0)−λ−1 x Ao + AT o Co < 0, one o (cid:98)Rx − C T (cid:1) xo∆(t) ≤ 0, 6 (29) Vx(t) ≤ xT min∆κ(t) ⊗ C T o Co x Ao + AT can find by (28) that which means that Vx(t) converges to a finite value as time tends to infinity. In the following, it is shown that Vx(t) converges to zero as time tends to infinity. By the Cauchy convergence criterion, for the infinite sequence V (tm) (m = 0, 1,··· ) and any δ > 0, there exists an integer M > 0 such that the following inequality holds for ∀m > M : V (tm) − V (tm+1) < δ; that is, V (t)dt < δ. tm Thus, one can obtain that (cid:90) t1 m − (cid:90) t2 m − V (t)dt− V (t)dt−···− t0 m t1 m Since Td {0, 1,··· , km − 1}, it can be found by (29) that the minimum dwell time, is (cid:90) ti − m+Td V (t)dt ≤ − ti m ti m (cid:90) ti+1 m (cid:90) tkm m tkm−1 m V (t)dt < δ. (30) for any i ∈ (cid:90) tm+1 e C T o Co, m+Td xT min∆κ(ti m) ⊗ C T From (30) to (31), one has (cid:90) ti km−1(cid:88) i=0 ti m o∆(t)(cid:0)λ−1 o∆(t)(cid:0)λ−1 Hence, one can show that (cid:90) t+Td km−1(cid:88) IEEE TRANSACTIONS ON CYBERNETICS , m m m m m m m i=0 Lκ(ti m), Lκ(t1 , Gt1 Lκ(tm)=(cid:80)km−1 connected communication topology cases, ,··· , Gtkm−1 , Gt1 Gt0 connected. Let Lκ(t0 union is be the Laplacian matrices of Gt0 the topologies their can be unconnected, but m),··· , Lκ(tkm−1 ) ,··· , Gtkm−1 then m) is the Laplacian matrix of a connected (cid:9) topology if the communication topologies during [tm, tm+1) are jointly connected. Here, we set that the transformation Uκ is time-invariant. Let U T with ∆κ(ti can be obtain directly. m)Uκ = diag(cid:8)0, ∆κ(ti κ Lκ(ti m) Uκ, then the following conclusion Lemma 3: ∆κ(tm) = (cid:80)km−1 m) is symmetric and positive definite and its eigenvalues are nonzero eigenvalues of Lκ(tm). m) = U T i=0 ∆κ(ti κ Lκ(ti In the following, a limited-budget output consensus design criterion for jointly connected communication topology cases is proposed. Theorem 3: For any given J∗ e > 0, multiagent system (1) with jointly connected cummnication topologies is limited- budget output consensualizable by consensus protocol (2) if (Eo, Ao, Co) is detectable, (Eo, Ao, Bo) is stabilizable, and m) 12 yT (II) (III) z ET (I) rank o Co < 0, 0 Ao Eo = h + rank (Eo) , ∗ ∗ z AT 0.5BoM 0 −M   ET x Ao + AT x Ao + AT (cid:1) yo(0)ET o (cid:98)Rx≤J∗  < 0, there exist (cid:98)Rx and (cid:98)Rz such that (cid:20) Eo (cid:21) o (cid:98)Rx = (cid:98)RT o (cid:98)Rx ≤ 0, (cid:98)RT x Eo ≥ 0, o (cid:98)Rx − C T (cid:98)RT o (0)(cid:0)(cid:0)IN−N−111T(cid:1)⊗Ih (cid:98)RT o = Eo(cid:98)Rz ≥ 0,  (cid:98)Θ11 (cid:98)Θm (cid:98)Θm = (cid:98)Θ22 Ao(cid:98)Rz + (cid:98)RT ∗ o ≤ 0, (cid:98)Θ11 = Ao Rz + (cid:98)RT where λm = λmin, λmax and (cid:98)Θm 12 = −0.5λm(cid:98)R−T (cid:98)Θ22 = (cid:98)RT o (cid:98)R−1 o Co. z /2 and Kz=−λ−1 (cid:16) o − BoBT o , o (cid:98)Rx − C T o Co, (cid:17) o (cid:98)Rx IN−1 ⊗(cid:16)(cid:98)RT min(cid:98)R−T min(cid:98)R−T o∆(t) x Eo ≥ 0. Let Kz = −λ−1 (cid:17) (cid:16) o (cid:98)Rx o∆(t) min∆κ(t) ⊗ C T − λ−1 o (cid:98)Rx = (cid:98)RT IN−1 ⊗ ET z AT x C T Vx(t) = xT x Ao + AT x Ao + AT Vx(t) = xT xo∆(t). xo∆(t), (cid:17) o Co where ET o /2, then by taking the time derivative of Vx(t), one can see by (7) that x C T In this case, Ku=−BT o /2. Proof: Construct the following Lyapunov function candidate x C T (28) κ Lκ(t) Since ∆κ(t) = U T is the Laplacian matrix of an undirected communication topology, ∆κ(t) is symmetric and positive definite and its eigenvalues are the ones of Lκ(t) except one zero eigenvalue. Furthermore, since Uκ and Lκ(t) V (t)dt. (31) o Co (cid:1) xo∆(t)dt < δ. (cid:1)xo∆(t)dt = 0. (32) o∆(t)(cid:0)λ−1 (cid:1) xo∆(t) = 0. (33) m)⊗C T xT t i=0 o Co min∆κ(ti lim t→∞ Due to V (t) ≤ 0, xo∆(t) is bounded. By (7), bounded. Hence, one can obtain that xT ⊗C T lemma in [43], one can find that xo∆(t) is min∆κ(tm) o Co ) xo∆(t) is uniformly continuous. From Barbalat's o∆(t)(cid:0)λ−1 t→∞ xT lim min∆κ(tm) ⊗ C T o Co By Lemma 3, there exists an orthonormal matrix Utm such ∆κ(tm)Utm = diag {λtm,2, λtm,3,··· , λtm,N} > 0. that U T tm From (32) and (33), one can see that t→∞ λ−1 minλtm,i o Co lim tm xi C T (cid:0)U T o∆(t)(cid:1)T ×(cid:0)U T o (cid:98)Rx = (cid:98)RT x Eo ≥ 0, (cid:98)RT o (cid:98)Rx − C T xi tm o∆(t)(cid:1) = 0 (i = 2, 3,··· , N ). o (cid:98)Rx ≤ 0 and x Ao + AT (cid:98)RT Because (Eo, Ao, Co) is detectable and Us is nonsingu- lar, ET x Ao + AT o Co < 0 in Condition (I) can guarantee that limt→∞ xo∆(t) = 0. Similarly, one can show that limt→∞ zo∆(t) = 0 if Condition (II) holds. Furthermore, the proofs of the regular, impulse-free and limited-budget property are similar to Theorem 2. Thus, the conclusions of Theorem 3 can be obtained.(cid:4) IEEE TRANSACTIONS ON CYBERNETICS 7 VI. NUMERICAL SIMULATION In this section, we present two simulation examples to illustrate the validity of the theoretical results given in the above section and consider a singular system with five agents. ) t ( κ Fig. 2: Switching signal for switching connected case. t / s ) 5 , · · · , 2 , 1 = m ( ) t ( 1 m y ) 5 , · · · , 2 , 1 = m ( ) t ( 2 m y t / s t / s Fig. 3: Output trajectories for switching connected case. J∗ e Je (t) Fig. 4: Trajectories of Je (t) and J∗ e . t / s Fig. 1: Switching connected topologies. Example 1: (Switching connected case) The system matrices of each agent in multiagent system (1) are set as   E = A = 0 1.5 0 1.6 1.6 1.0 0 1 3 2 0 4 0.3556 0.7111 −2.4 2.4 0.4667 −0.8 −2.4 −0.6 −0.8 −2.4 0.6 0.4667 −2.4 1.2 1.2 −1.0667 −1.6 −0.0667 0 2.4 −0.1333 −3.2 −1.1333 3.4 4.5333 −3.2 0.8 2.4 6.8667 −2.6 4.2 2 0 3 3 3.8 5.7333 −2.4 −8.7667 −0.4889 2.5333 −3.0222 0 1.8667 −3.2444 −3 −2.4 −3.9 3 −4 0 2 −3.6667 −6 4 6 6.6 2 7 0.4222 (cid:21)T (cid:20) −35 −12 −14 −4 −33 9 (cid:20) −1 −4.3333 3 −2.3333 2.8889 18 25 14 12 51 7 B = C = −1 −2.0 3 −3.5 1.3333 (cid:21) , , 0 0  ,  , and the system can be decomposed into an observable system by the invertible matrix Uo as  Uo =  . 4 0 3 0 0 0 0 3 0 4 0 1 0 1 3 2 0 2 9 0 0 0 0 4 0 2 0 0 3 0 0 0 0 0 0 1 Fig. 1 shows four different undirected connected topologies, which are chosen as the switching topologies set κ. For the convenience of analysis, the communication weights among five agents of each topology are assumed to be 0-1. Fig. 2 indicates that the switching signal is random. Let (cid:20)1 0 (cid:21) 0 1 , M = IEEE TRANSACTIONS ON CYBERNETICS 8 e = 50000, then one can and the energy budget is set as J∗ obtain from Theorem 2 that −2.6807 14.8810 Rx =  ,  , 0 0 −2.6807 −18.1199 −12.2003 −10.0022  20.8005  1.0833 (cid:20) 7.3118 −5.1748 −0.0027 (cid:20)−0.3686 −0.4183 (cid:21)T −909.7727 −910.3096 −911.3356 11.0466 −8.1502 1.5299 2.2577 1.5299 0.0011 (cid:21) 0 0 Ku = Rz = Kz = −0.2873 0.2121 0 0 . We set the initial state value of each agent as follows: x1(0) = [60,−26, 81,−6,−102, 38]T , x2(0) = [64,−81, 75,−16,−186, 24]T , x3(0) = [−60, 103,−6, 62, 189, 37]T , x4(0) = [−68, 49,−30, 48, 114, 19]T , x5(0) = [52, 38, 87, 54, 66, 52]T . In Fig. 3, the output trajectories of the descriptor multiagent system are depicted, where the red circle markers describe the trajectory of the output consensus function in Theorem 4. Fig. 4 shows the trajectory of the energy cost function Je(t) with  = 5. One can see that output trajectories of all agents converge to the curve formed by circle markers and Je(t) < J∗ e , which means that the descriptor multiagent system achieves limited- budget output consensus. Example 2: (Jointly connected case) In this case, the system matrices of each agent in multiagent system (1) are set as   , 1.5 12 11 22 4 21 −8 9 −5 9 −12 14.5 −10 14 3 0 −10 14 −9 −17 6 −6 −14 4 9 21.25 −12 −28 −12 −28 8 −4 1 0 −12 −27 8 13 −11.5 −8 −15.75 11 22 −4 −1 −2 1.75 31 −38.5 −21 −55.75 33 75 −20 −22 −56 43.5 −64 84 34 26 −24 50.25 −26 −65 (cid:20) −11 −11 10 −6 17 −11 (cid:20) −32 15 −5 58 −2 −32 −76 58 24 29.75 −20 −41 −20 22.5 15 27 16 −41 −19 19 31.5 −3 36 (cid:21)T 30 4 , (cid:21) ,  , E =  A = B = C = and the system can be decomposed into an observable system by the invertible matrix Uo as  Uo =  . 1 0 3 0 1 0 0 3 0 3 0 1 0 4 0 2 0 2 0 0 0 3 0 2 0 1 2 0 1 0 0 0 3 −1 0 0 , Fig. 5: Jointly connected topologies. Fig. 5 shows two different jointly connected topologies and each topology is composed of two unconnected topologies. For the convenience of analysis, the communication weights among these agents of each topology are assumed to be 0-1. The switching order of four topologies is designed as G1 → G2 → G3 → G4 → G1 → G2 ··· ; that is, the switching process is repeated every four times as shown in Fig. 6. Let M = (cid:20)1 0 (cid:21) 0 1 , and the energy budget is given as J∗ Theorem 3, one can show that e = 10000. Then, by −6.7489 0 0 0 0  ,  , (cid:21) , 0 0 0 0 0 26.9957 26.9957 56.8087 (cid:20)−0.1320 (cid:20) 0.2856 −0.1428 −0.1056 56.8087 −0.1785 −0.1428 0 0 −14.2022 0 0.0440 −0.3169 0.1760 0.0264 (cid:21)T 0 0 . (cid:98)Rx = (cid:98)Rz = Ku = Kz = We set the initial state value of each agent as follows: x1(0) = [2,−7,−9,−6, 6,−14]T , x2(0) = [14, 41, 15, 42,−4, 52]T , x3(0) = [11,−29, 18,−18, 15,−34]T , x4(0) = [2, 19,−18, 2,−7, 8]T , x5(0) = [16,−3, 33,−14, 27,−21]T . Fig. 7 depicts the output trajectories of this descriptor multiagent system, where the red circle markers depict the curves of the output consensus function shown in Theorem 4. Fig. 8 shows the trajectory of the energy cost function Je(t) with  = 14. From these figures, two output trajectories of all agents converge to the curves formed by the red circle markers and Je(t) < J∗ e , which means that this descriptor multiagent system achieves limited-budget output consensus. IEEE TRANSACTIONS ON CYBERNETICS 9 ) t ( κ Fig. 6: Switching signal for jointly connected cases. t / s ) 5 , · · · , 2 , 1 = m ( ) t ( 1 m y ) 5 , · · · , 2 , 1 = m ( ) t ( 2 m y t / s t / s Fig. 7: Output trajectories for jointly connected case. J∗ e Je (t) t / s Fig. 8: Trajectories of Je (t) and J∗ e . VII. CONCLUSIONS For descriptor multiagent systems with both switching con- nected communication topologies and jointly connected com- munication topologies, a descriptor dynamic output feedback consensus protocol with an energy constraint was proposed to realize limited-budget output consensus. By the matrix inequality tool, sufficient conditions for limited-budget output consensus design of multiagent systems with switching con- nected communication topologies were presented, where a new two-step design approach was given to deal with the nonlinear coupled design problems of two gain matrices and those sufficient conditions are checkable since they are independent of the number of agents. Furthermore, by combining the Cauchy convergence criterion and Barbalat's lemma, limited- budget output consensus design criteria for jointly connected communication topology cases were proposed, where it was required that each agent is Lyapunov stable. REFERENCES [1] T. Vicsek, A. Czir´ok, E. Ben-Jacob, I. Cohen, and O. Shochet, "Novel type of phase transition in a system of self-driven particles," Physic Review Letters, vol. 75, no. 6, pp. 1226-1229, Aug. 1995. [2] A. Jadbabaie, J. Lin, and A. S. Morse, "Coordination of groups of mobile autonomous agents using nearest neighbor rules," IEEE Transactions on Automatic Control, vol. 48, no. 6, pp. 988-1001, Jun. 2003. [3] R. Olfati-Saber, "Flocking for multi-agent dynamic systems: Algorithms and theory," IEEE Transactions on Automatic Control, vol. 51, no. 3, pp. 401-420, Mar. 2006. [4] L. Tian, Z. Ji, T. Hou, and K. Liu, "Bipartite consensus on coopetition networks with time-varying delays," IEEE Access, vol. 6, pp. 10169- 10178, Feb. 2018. [5] Y. Zhang, J. Sun, H. Liang, and H. Li, "Event-triggered adaptive tracking control for multi-agent systems with unknown disturbances," IEEE Transactions on Cybernetics, DOI: 10.1109/TCYB.2018.2869084. [6] J. Qu, Z. Ji, C. Lin, and H. Yu, "Fast consensus seeking on net- works with antagonistic interactions," Complexity, 7831317, 2018. (DOI: 10.1155/2018/7831317) [7] L. Consolini, F. Morbidi, D. Prattichizzo, and M. Tosques, "Leader- follower formation control of nonholonomic mobile robots with input constraints," Automatica, vol. 44, no. 5, pp. 1343-1349, May 2008. [8] K. K. Oh and H. S. Ahn, "Formation control of mobile agents based on distributed position estimation," IEEE Transactions on Automatic Control, vol. 58, no. 3, pp. 737-742, Mar. 2013. [9] X. Dong, Y. Zhou, Z. Ren, and Y. Zhong, "Time-varying formation tracking for second-order multi-agent systems subjected to switching topologies with application to quadrotor formation flying," IEEE Trans- actions on Industrial Electronics, vol. 64, no. 6, pp. 5014-5024, Jun. 2017. [10] H. Liu, T. Ma, F. L. Lewis, and Y. Wan, "Robust formation control for multiple quadrotors with nonlinearities and disturbances," IEEE Transactions on Cybernetics, DOI: 10.1109/TCYB.2018.2875559. [11] N. Ili´c, M. S. Stankovi´c, and S. S. Stankovi´c, "Adaptive consensus- based distributed target tracking in sensor networks with limited sensing range," IEEE Transactions on Control Systems Technology, vol. 22, no. 2, pp. 778-785, Mar. 2014. [12] Q. Zhou, S. Zhao, H. Li, R. Lu, and C. Wu, "Adaptive neural network tracking control for robotic manipulators with dead-zone," IEEE Transactions on Neural Networks and Learning Systems, DOI: 10.1109/TNNLS.2018.286937. Jia, N. Cai, "Adaptive guaranteed- performance consensus control for multi-agent systems with an ad- justable convergence speed," Discrete Dynamics in Nature and Society, https://arxiv.org/abs/1905.03404. [13] H. Ma, X. and J. Xi, [14] T. Zheng, J. Xi, M. Yuan, and G. Liu, "Guaranteed-performance con- sensus design for Lipschitz nonlinear multi-agent systems with jointly connected topologies," International Journal of Robust and Nonlinear Control, to be published. DOI: 10.1002/rnc.4572. [15] Z. Y. Tan, N. Cai, J. Zhou, and S. G. Zhang, "On performance of peer review for academic journals: Analysis based on distributed parallel system," IEEE Access, 2019, DOI: 10.1109/ACCESS.2019.2896978. IEEE TRANSACTIONS ON CYBERNETICS 10 [16] W. Ren and R. W. Beard, "Consensus seeking in multiagent systems under dynamically changing interaction topologies," IEEE Transactions on Automatic Control, vol. 50, no. 5, pp. 655-661, May. 2005. [17] J. Qin, X. Z. Wei, and H. Gao, "Coordination of multiple agents with double-integrator dynamics under generalized interaction topologies," IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cyber- netics), vol. 42, no. 1, pp. 44-57, Feb. 2012. [18] Z. Wu, Y. Xu, Y. Pan, H. Su, and Y. Tang, "Event-triggered control for consensus problem in multi-agent systems with quantized relative state measurement and external disturbance," IEEE Transactions on Circuits and Systems I: Regular paper, DOI: 10.1109/TCSI.2017.2777504. [19] Z. Wu, Y. Xu, R. Lu, Y. Wu, and T. Huang, "Event-triggered control for consensus of multi-agent systems with fixed/switching topologies," IEEE Transactions on Systems, Man and Cybernetics: Systems, DOI: 10.1109/TSMC.2017.2744671. [38] J. Xu, G. Zhang, J. Zeng, J. Xi, and B. Du, "Robust guaranteed cost consensus for high-order discrete-time multi-agent systems with parameter uncertainties and time-varying delays," IET Control Theory & Applications, vol. 11, no. 5, pp. 647-667, May. 2017. [39] J. Xi, C. Wang, H. Liu, and L. Wang, "Completely distributed guaranteed-performance consensualization for high-order multiagent systems with switching topologies," IEEE Transactions on Systems, Man, and Cybernetics: Systems, DOI: 10.1109/TSMC.2018.2852277. [40] Y. Zhao, G. Guo, and L. Ding, "Guaranteed cost control of mobile sensor networks with Markov switching topologies," ISA Transactions, vol. 58, no. 9, pp. 206-213, Sept. 2015. [41] L. Dai, Singular Control Systems, Springer, Berlin, 1989. [42] I. Masubuchi, Y. Kamitane, A. Ohara, and N. Suda, "H∞ control for descriptor systems: a matrix inequalities approach," Automatica, vol. 33, no. 4, pp. 669-673, Apr. 1997. [20] B. Cheng, X. Wang, and Z. Li, "Event-triggered consensus of ho- mogeneous and heterogeneous multi-agent systems with jointly con- nected switching topologies," IEEE Transactions on Cybernetics, DOI: 10.1109/TCYB.2018.2864974. [21] J. Xi, Z. Fan, H. Liu, and T. Zheng, "Guaranteed-cost consensus for multiagent networks with Lipschitz nonlinear dynamics and switching topologies," International Journal of Robust and Nonlinear Control, vol. 28, no. 7, pp. 2841-2852, May. 2018. [22] Y. Zheng, J. Ma, and L. Wang, "Consensus of hybrid multi-agent systems," IEEE Transactions on Neural Networks and Learning Systems, to be published. DOI: 10.1109/TNNL-S.2017.2651402. [23] F. Xiao, L. Wang, and T. Chen, "Finite-time consensus in networks of integrator-like dynamic agents with directional link failure," IEEE Transactions on Automatic Control, vol. 59, no. 3, pp. 756-762, Mar. 2014. [24] X. Lin and Y. Zheng, "Finite-time consensus of switched multiagent sys- tems," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 47, no. 7, pp. 1535-1545, Jul. 2017. [25] J. Xi, Z. Shi, and Y. Zhong, "Admissible consensus and consensualiza- tion of high-order linear time-invariant singular swarm systems," Physica A: Statistical Mechanics and its Applications, vol. 391, no. 23, pp. 5839- 5849, Nov. 2012. [26] X. R. Yang and G. P. Liu, "Necessary and sufficient consensus conditions of descriptor multi-agent systems," IEEE Transactions on Circuits and Systems-I: Regular Papers, vol. 59, no. 11, pp. 2669-2677, Nov. 2012. [27] J. Xi, M. He, H. Liu, and J. Zheng, "Admissible output consensualization control for singular multi-agent systems with time delays," Journal of the Franklin Institute, vol. 353, no. 16, pp. 4074-4090, Nov. 2016. [28] S. Wang and J. Huang, "Cooperative output regulation of singular multi- agent systems under switching networks by standard reduction," IEEE Transactions on Circuits and Systems-I: Regular Papers, vol. 65, no. 4, pp. 1377-1385, Apr. 2018. [29] N. Chopra and W. Spong, "Output synchronization of nonlinear systems with relative degree one," Recent Advances in Learning Control, vol. 371, no. 1, pp. 51-64, Jan. 2008. [30] F. Xiao, L. Wang, and J. Chen, "Partial state consensus for networks of second-order dynamic agents," Systems & Control Letters, vol. 59, no. 12, pp. 775-781, Dec. 2010. [31] Y. Liu and Y. Jia, "Consensus problem of high-order multi-agent systems with external disturbances: An H∞ analysis approach," International Journal of Robust and Nonlinear Control, vol. 20, no. 9, pp. 1579-1593, Sep. 2009. [32] H. Kim, H. Shim, and J. H. Seo, "Output consensus of heterogeneous uncertain linear multi-agent systems," IEEE Transactions on Automatic Control, vol. 56, no. 1, pp. 200-206, Jan. 2011. [33] J. Xi, Z. Shi, and Y. Zhong, "Output consensus analysis and design for high-order linear swarm systems: Partial stability method," Automatica, 2012, vol. 48, no. 9, pp. 2335-2343, Sept. 2012. [34] Y. C. Cao and W. Ren, "Optimal linear-consensus algorithms: An LQR perspective," IEEE Transactions on Systems, Man, and Cybernetics -- Part B Cybernetics, vol. 40, no. 3, pp. 819-829, Mar. 2010. [35] Z. H. Guan, B. Hu, M. Chi, D. X. He, and X. M. Cheng, "Guaranteed performance consensus in second-order multi-agent systems with hybrid impulsive control," Automatica, vol. 50, no. 9, pp. 2415-2418, Sept. 2014. [36] X. Zhou, P. Shi, C. Lim, C. Yang, and W. Gui, "Event based guaranteed- the cost consensus for distributed multi-agent systems," Journal of Franklin Institute, vol. 352, no. 9, pp. 3546-3563, Mar. 2015. [37] Y. Zhao and W. Zhang, "Guaranteed cost consensus protocol design for linear multi-agent systems with sampled-data information: An input delay approach," ISA Transactions, vol. 67, pp. 87-97, Mar. 2017.
1807.02856
5
1807
2019-05-08T16:04:30
Resilient Synchronization of Distributed Multi-agent Systems under Attacks
[ "cs.MA" ]
In this paper, we first address adverse effects of cyber-physical attacks on distributed synchronization of multi-agent systems, by providing conditions under which an attacker can destabilize the underlying network, as well as another set of conditions under which local neighborhood tracking errors of intact agents converge to zero. Based on this analysis, we propose a Kullback-Liebler divergence based criterion in view of which each agent detects its neighbors' misbehavior and, consequently, forms a self-belief about the trustworthiness of the information it receives. Agents continuously update their self-beliefs and communicate them with their neighbors to inform them of the significance of their outgoing information. Moreover, if the self-belief of an agent is low, it forms trust on its neighbors. Agents incorporate their neighbors' self-beliefs and their own trust values on their control protocols to slow down and mitigate attacks. We show that using the proposed resilient approach, an agent discards the information it receives from a neighbor only if its neighbor is compromised, and not solely based on the discrepancy among neighbors' information, which might be caused by legitimate changes, and not attacks. The proposed approach is guaranteed to work under mild connectivity assumptions.
cs.MA
cs
Resilient Synchronization of Distributed Multi-agent Systems under Attacks Aquib Mustafa, Student Member, IEEE, Rohollah Moghadam, Student Member, IEEE, Hamidreza Modares, Senior Member, IEEE 1 9 1 0 2 y a M 8 ] A M . s c [ 5 v 6 5 8 2 0 . 7 0 8 1 : v i X r a Abstract -- In this paper, we first address adverse effects of cyber-physical attacks on distributed synchronization of multi- agent systems, by providing conditions under which an attacker can destabilize the underlying network, as well as another set of conditions under which local neighborhood tracking errors of intact agents converge to zero. Based on this analysis, we propose a Kullback-Liebler divergence based criterion in view of which each agent detects its neighbors' misbehavior and, consequently, forms a self-belief about the trustworthiness of the information it receives. Agents continuously update their self- beliefs and communicate them with their neighbors to inform them of the significance of their outgoing information. Moreover, if the self-belief of an agent is low, it forms trust on its neighbors. Agents incorporate their neighbors' self-beliefs and their own trust values on their control protocols to slow down and mitigate attacks. We show that using the proposed resilient approach, an agent discards the information it receives from a neighbor only if its neighbor is compromised, and not solely based on the dis- crepancy among neighbors' information, which might be caused by legitimate changes, and not attacks. The proposed approach is guaranteed to work under mild connectivity assumptions. Index Terms -- Distributed control, Resilient Control, Attack Analysis, Multi-agent systems. I. Introduction A Distributed Multi-Agent System (DMAS) is collection of dynamical systems or agents that interact with each other over a communication network to achieve coordinated operations and behaviors [1] -- [4]. In the case of synchronization of DMASs, the objective is to guarantee that all agents reach agreement on a common value or trajectory of interest. Despite their numerous applications in a variety of disciplines, DMASs are vulnerable to attacks, which is one of the main bottleneck that arise in their wide deployment. In contrast to other undesirable inputs, such as disturbances and noises, cyber- physical attacks are intentionally planned to maximize the damage to the overall system or even destabilize it. There has been extensive research progress in developing attack detection/identification and mitigation approaches for both spatially distributed systems [5] -- [14] and DMASs [15] -- [30]. Despite tremendous and welcoming progress, most of the mentioned mitigation approaches for DMASs use the discrepancy among agents and their neighbors to detect and mitigate the effect of an attack. However, as shown in this paper, a stealthy attack can make all agents become un- stable simultaneously, and thus misguide existing mitigation approaches. Moreover, this discrepancy could be caused by a legitimate change in the state of an agent, and rejecting this useful information can decrease the speed of convergence to the desired consensus and harm connectivity of the network. In this paper, we present attack analysis, detection, and mitigation mechanisms for DMASs with linear structures. We show that local neighborhood tracking errors of intact agents converge to zero, regardless of the attack, if the set of eigenvalues of the attacker signal generator dynamics matrix is a subset of the set of eigenvalues of the system dynamics matrix. We call these types of attacks internal model principle (IMP)-based attacks. In spite of convergence to zero of local neighborhood tracking errors, the overall network could be destabilized, and we provide sufficient conditions for this to happen. We then develop attack detectors that identify both IMP-based and non-IMP-based attacks. To detect IMP- based attacks, two local error sequences with folded Gaussian distributions are introduced based on the relative information of the agents. We show that they diverge under an IMP- based attack. A Kullback-Liebler (KL) divergence criterion is then introduced to measure the divergence between these two univariate folded Gaussian distributions, and consequently capture IMP-based attacks. Similarly, since non-IMP based attacks change the statistical properties of the local neighbor- hood tracking error, to detect non-IMP-based attacks, the KL divergence is employed to measure the discrepancy between the Gaussian distributions of the actual and nominal expected local neighborhood tracking errors. Then, a self-belief value, as a metric capturing the probability of the presence of attacks directly on sensors or actuators of the agent itself or on its neighbors, is presented for each agent by combining these two KL-based detectors. The self-belief indicates the level of trustworthiness of the agent's own outgoing information, and is transmitted to its neighbors. Furthermore, when the self- belief of an agent is low, the trustworthiness of its incoming information from its neighbors is estimated using a particular notion of trust. Trust for each individual neighbor is developed based on the relative entropy between the neighbor's informa- tion and agent's own information. Finally, by incorporating neighbor's self-belief and trust values, we propose modified weighted control protocols to ensure mitigation of both types of attacks. Simulation results included in the paper validate the effectiveness of the approach. II. Preliminaries A directed graph (digraph) G consists of a pair (V, E) in which V = {v1,··· , vN} is a set of nodes and E ⊆ V ×V is a set of edges. We denote the directed link (edge) from v j to vi by the ordered pair (v j, vi). The adjacency matrix is defined as A = [ai j], with ai j > 0 if (v j, vi) ∈ E, and ai j = 0 otherwise. We assume there are no repeated edges and no self loops, i.e., in-degree matrix, with di = (cid:80) aii = 0 ∀i ∈ N with N = {1, . . . , N} . The nodes in the set Ni = {v j : (v j, vi) ∈ E} are said to be neighbors of node νi. The in-degree of vi is the number of edges having vi as a head. The out-degree of a node vi is the number of edges having vi as a tail. If the in-degree equals the out-degree for all nodes vi ∈ V the graph is said to be balanced. The graph Laplacian matrix is defined as L = D − A, where D = diag(di) is the ai j as the weighted in-degree of node νi. A node is called as a root node if it can reach all other nodes of the digraph G through a directed path. A leader is a root node with no incoming link. A (directed) tree is a connected digraph where every node except one, called the root, has in-degree equal to one. A spanning tree of a digraph is a directed tree formed by graph edges, which connects all the nodes of the graph. j∈Ni Throughout the paper, we denote the set of integers by Z. The set of integers greater than or equal to some integer q ∈ Z is denoted Z(cid:62)q. The cardinality of a set S is denoted by S. λ(A) and tr(A) denote, respectively, the eigenvalues and trace of the matrix A. Furthermore, λmin(A) represents minimum eigenvalue of matrix A. The Kronecker product of matrices A and B is denoted by A ⊗ B, and diag (A1, . . . , An) represents a block diagonal matrix with matrices Ai, ∀ i ∈ N as its diagonal entries. 1N is the N-vector of ones and IN is the N × N identity matrix. Im(R) and ker(R) represent, respectively, the range space and the null space of R, and span(a1, . . . , an) is the set of all linear combinations of the vectors a1, . . . , an. A Gaussian distribution with mean µ and covariance Σ is denoted by N (µ, Σ). Moreover, F N(cid:16) ¯µ, ¯σ2(cid:17) represents univariate folded Gaussian distribution with ¯µ and ¯σ2 as mean and variance, respectively [?]. E[.] denotes the expectation operator. Assumption 1. The communication graph G is directed and has a spanning tree. Definition 1 [31]- [32]. A square matrix A ∈ Rn×n is called a singular M-matrix, if all its off-diagonal elements are non- positive and all its eigenvalues have non-negative real parts. (cid:3) Definition 2 [31]- [32]. A square matrix A ∈ Rn×n is called a non-singular M-matrix, if all its off-diagonal elements are non-positive and all its eigenvalues have positive real parts. (cid:3) Lemma 1 [31]- [32]. The graph Laplacian matrix L of a directed graph G has at least one zero eigenvalue, and all its nonzero eigenvalues have positive real parts. Zero is a simple eigenvalue of L, if and only if Assumption 1 is satisfied. III. Overview of Consensus in DMASs In this section, we provide an overview of the consensus problem for leaderless DMAS. Consider a group of N homo- geneous agents with linear identical dynamics described by ∀ i ∈ N xi(t) = Axi(t) + Bui(t) (1) where xi ∈ Rn and ui ∈ Rm denote, respectively, the state and the control input of agent i. The matrices A ∈ Rn×n and B ∈ Rn×m are, respectively, the drift dynamics and the input matrix. 2 Problem 1. Design local control protocols ui for all agents ∀i ∈ N in (1) such that all agents reach consensus or synchro- nization (agreement) on some common value or trajectory of interest, i.e., t→∞x j(t) − xi(t) = 0 ∀i, j ∈ N lim (2) Assumption 2. The system dynamics matrix A in (1) is assumed to be marginally stable. Remark 1. Based on Assumption 2, all the eigenvalues of A have non-positive real part. This is a standard assumption in the literature for consensus or synchronization problems [33]. Note that if A is Hurwitz, the synchronization problem has a trivial solution and can be solved by making the dynamics of each agent stable independently. Moreover, stable eigenvalues of A, if there are any, can be ignored by reducing the dimension of A, because they only contribute to the transient response of the consensus trajectories [33]. Consider the distributed control protocol for each agent i as [31]- [32] ui = cKηi ∀ i ∈ N where ηi = ai j(x j − xi) N(cid:88) (3) (4) j=1 represents the local neighborhood tracking error for the agent i with ai j as the (i, j)-th entry of the graph adjacency matrix A. Moreover, c and K ∈ Rm×n denote, respectively, scalar coupling gain and feedback control gain matrix. The control design (3)- (4) is distributed in the sense that each agent seeks to make the difference between its state and those of its neighbors equal to zero using only relative state information of its neighbors provided by (4). 1 Several approaches are presented to design c and K locally the gains K to solve Problem 1 [31]- [34]. To this end, and c are designed such that A − cλiBK is Hurwitz for all i = 2, . . . , N [31]- [34]. Specifically, it is shown in [31], [34] that under Assumption 1, if K is designed locally for each agent by solving an algebraic Riccati equation and c > 2λmin(L), then A − cλiBK is Hurwitz and Problem 1 is solved. In the subsequent sections, we assume that c and K are designed appropriately so that in the absence of attacks Problem 1 is solved. We then analyze the effect of attacks and propose mitigation approaches. Remark 2. Note that the presented results subsume the leader- follower synchronization problem and the average consensus as special cases. For the leader-follower case, the leader is only root node in the graph and thus the desired trajectory is dictated by the leader, whereas for the average consensus case, the graph is assumed to be balanced and A = 0 and B = Im. IV. Attack Modelling and Analysis for DMASs In this section, attacks on agents are modelled and a complete attack analysis is provided. A. Attack Modelling In this subsection, attacks on DMASs are modelled. Attacks on actuators of agent i can be modelled as uc i = ui + βiud i (5) i and uc where ui, ud i denote, respectively, the nominal value of the control protocol for agent i in (1), the disrupted signal directly injected into actuators of agent i, and the corrupted control protocol of agent i. If agent i is under actuator attack, then βi = 1, otherwise βi = 0. Similarly, one can model attacks on sensors of agent i as xc i = xi + αixd i (6) i and xc where xi, xd i denote, respectively, the nominal value of the state of agent i in (4), the disrupted signal directly injected into sensors of agent i, and the corrupted state of agent i. If agent i is under sensor attack, then αi = 1, otherwise αi = 0. Using the corrupted state (6) in the controller (3)-(4) with the corrupted control input (5) in (1), the system dynamics under attack becomes xi = Axi + Bui + B fi (7) where fi denotes the overall attack affecting the agent i which can be written as fi = βiud i + cK α jxd j − αixd i ai j (8) (cid:16) (cid:88) j∈Ni (cid:17) with xd j as the disruption in the received state of the jth neighbor due to injected attack signal either into sensors or actuators of agent j or into the incoming communication link from agent j to agent i. The following definition categorizes all attacks into two categories. The first type of attack exploits the knowledge of the system dynamics A and use it in the design of its attack signal. That is, for the first type of attack for fi in (8), one has Define fi = Ψ fi (9) where Ψ ∈ Rm×m depends on the knowledge of the system dynamics A as discussed in Definition 3. On the other hand, for the second type of attack, the attacker has no knowledge of the system dynamics A and this can cover all other attacks that are not in the form of (9). (cid:40) EΨ = {λ1(Ψ), . . . , λm(Ψ)} EA = {λ1(A), . . . , λn(A)} (10) where λi(Ψ) ∀i = 1, . . . , m and λi(A) ∀i = 1, . . . , N are, re- spectively, the set of eigenvalues of the attack signal generator dynamics matrix Ψ and the system dynamics matrix A. Define a set of eigenvalues of the system dynamics matrix A which lie A ⊆ EA. on imaginary axis as Em A Definition 3 (IMP-based and non-IMP-based Attacks). fi in (7) is generated by (9), then the If the attack signal attack signal is called the internal model principle (IMP)-based attack, if EΨ ⊆ EA. Otherwise, i.e., EΨ (cid:49) EA or if the attacker has no dynamics (e.g. a random signal), it is called a non-IMP (cid:3) based attack. = {λ1(A), . . . , λl(A)} where Em 3 Remark 3. Note that we do not limit attacks to the IMP-based attacks given by (9). Attacks are placed into two classes in Definition 3 based on their impact on the system performance, as to be shown in the subsequent sections. The non-IMP based attacks cover a broad range of attacks. Definition 4 (Compromised and Intact Agent). We call an agent that is directly under attack as a compromised agent. An agent is called intact if it is not compromised. We denote the set of intact agents as NInt, i.e.,NInt = N\NComp where NComp denotes the set of compromised agents. (cid:3) Using (3)-(4), the global form of control input, i.e., u = 1 , . . . , uT N]T can be written as [uT u = (−cL ⊗ K)x (11) where L denotes the graph Laplacian matrix. By using (11) in (7), the global dynamics of agents under attack becomes x(t) = (IN ⊗ A) x(t) + (IN ⊗ B) uc(t) where uc(t) = u(t) + f (t) ∆ = (−cL ⊗ K)x(t) + f (t) (12) (13) 1 (t), . . . , f T with f (t) = [ f T N(t)]T denote, respectively, the overall vector of attacks on agents and the global vector of the states of agents. N (t)]T and x(t) = [xT 1 (t), . . . , xT If agents are not under attack, i.e., f (t) = 0, then, the control input (11) eventually compensates for the difference between the agents' initial conditions and becomes zero once they reach an agreement. That is, in the absence of attack, uc(t) = u(t) goes to zero (i.e., uc(t) → 0), and, on consensus, the global dynamics of agents become xss(t) = (IN ⊗ A) xss(t) (14) t→∞x(t) is called the global steady state of agents. where xss = lim Throughout the paper, regardless of whether agents are under attack or not, we say that agents reach a steady state and their steady state is generated by (14) if uc(t) → 0. Otherwise, if uc(t) (cid:54)→ 0, we say agents never reach a steady state, and thus (14) does not hold true. Remark 4. In the presence of attack, whether agents reach a steady state or not, i.e., whether uc(t) → 0 or uc(t) (cid:54)→ 0, plays an important role in the attack analysis and mitigation to follow. Reaching a steady state is necessary for agents to achieve consensus. However, we show that even if agents reach a steady state, they will not achieve consensus if the system is under attack. More specifically, we show that under a non- IMP based attack, agents do not reach a steady state and their local neighborhood tracking errors also do not converge to zero. For an IMP-based attack, the attacker can either 1) make all agents reach a steady state, but agents are still far from synchronization or consensus, or 2) destabilize the entire network by assuring that agents do not reach a steady state. B. Attack Analysis In this subsection, a graph theoretic-based approach is utilized to analyze the effect of attacks on DMASs. To this end, the following notation and lemmas are used. Let the graph Laplacian matrix L be partitioned as (cid:34) Lr×r L = 0r×nr Lnr×r Lnr×nr (cid:35) (15) where r and nr in (15) denote, respectively, the number of root nodes and non-root nodes. Moreover, Lr×r and Lnr×nr are, respectively, the sub-graph matrices corresponding to the sub-graphs of root nodes and non-root nodes. Lemma 2. Consider the partitioned graph Laplacian matrix (15). Then, Lr×r is a singular M-matrix and Lnr×nr is a non- singular M-matrix. Proof. We first prove that the subgraph of root nodes is strongly connected. According to the definition of a root node, there always exists a directed path from a root node to all other nodes of the graph G, including other root nodes. Therefore, in the graph G, there always exists a path from each root node to all other root nodes. We now show that removing non- root nodes from the graph G does not affect the connectivity of the subgraph comprised of only root nodes. In the graph G, if a non-root node is not an incoming neighbor of a root node, then its removal does not harm the connectivity of the subgraph of the root nodes. Suppose that removing a non-root node affects the connectivity of the subgraph of root nodes. This requires the non-root node to be an incoming neighbor of a root node. However, this makes the removed node a root node, as it can now access all other nodes through the root node it is connected to. Hence, this argument shows that the subgraph of root nodes is always strongly connected. Then, based on Lemma 1, Lr×r has zero as one of its eigenvalues, which implies that Lr×r is a singular M-matrix according to Definition 1. On the other hand, from (15), since L is a lower triangular matrix, the eigenvalues of L are the union of the eigenvalues of Lr×r and Lnr×nr. Moreover, as stated in Lemma 1, L has a simple zero eigenvalue and, as shown above, zero is the eigenvalue of Lr×r. Therefore, all eigenvalues of Lnr×nr have positive real parts only, and thus based on Definition 2, Lnr×nr is a non-singular M-matrix. (cid:3) In the following Lemmas 3-4 and Theorem 1, we now provide the conditions under which the agents can reach a steady state. Lemma 3. Consider the global dynamics of DMAS (12) under attack. Let the attack signal f (t) be a non-IMP based attack. Then, agents never reach a steady state, i.e., uc(t) (cid:54)→ 0. Proof. We prove this result by contradiction. Assume that the f (t) is a non-IMP based attack, i.e., EΨ (cid:49) EA, attack signal but uc(t) → 0 in (12), which implies xi → Axi for all i ∈ N. Using the modal decomposition, one has (r jxi(0))eλ j(A)tm j (16) xi(t) → n(cid:88) j=1 4 ai j(x j(t) − xi(t)) fi(t) →(cid:88) where r j and m j denote, respectively, the left and right eigenvectors associated with the eigenvalue λ j(A). On the other hand, based on (13) uc(t) → 0 implies f (t) → (cL ⊗ K)x(t) or equivalently j∈Ni (17) for all i ∈ N. As shown in (16), the right-hand side of (17) is generated by the natural modes of the system dynamics whereas the left-hand side is generated by the natural modes of the attack signal generator dynamics in (9). By the prior assumption, EΨ (cid:49) EA, the attacker's natural modes are differ- ent from those of the system dynamics. Therefore, (17) cannot be satisfied which contradicts the assumption. This completes (cid:3) the proof. Equation (17) in Lemma 3 also shows that for non-IMP based attacks, the local neighborhood tracking error is nonzero for a compromised agent. The following results show that under IMP-based attack, either agents' state diverge, or they reach a steady state while their local neighborhood tracking errors converge to zero, despite attack. The following lemma is needed in Theorem 1, which gives conditions under which agents reach a steady state under IMP-based attack. Then, Theorem 2 shows that under what conditions an IMP-based attack makes the entire network of agents unstable. (cid:40) S A(t) = [eλA1 t, . . . , eλAn t] Define S ψ(t) = [eλΨ1 t, . . . , eλΨn t] (18) where eλAi t ∀i = 1, . . . , n and eλΨi t ∀i = 1, . . . , m are, respec- tively, the set of natural modes of agent dynamics A in (1) and the attacker dynamics Ψ in (9). Lemma 4. Consider the global dynamics of DMAS (12) under attack on non-root nodes. Then, for an IMP-based attack, agents reach a steady state, i.e., uc(t) → 0. Proof. According to (14), in steady state, one has xss(t) → (IN ⊗ A) xss(t) since uc(t) → 0. This implies that xss(t) ∈ span(S A) where S A is defined in (18). On the other hand, if agents reach a steady state, then based on (13), one has (cL ⊗ K)xss(t) = f (t) Define the global steady state vector xss(t) = [ ¯xT (19) nrs]T , where ¯xrs and ¯xnrs are, respectively, the global steady states of root nodes and non-root nodes. Since attack is only on non-root nodes, f (t) can be written as f (t) = [0r, ¯f T nr]T , where ¯fnr = [ f T N ]T represents the attack vector on non-root nodes. r+1, . . . , f T rs, ¯xT Then, using (15) and (19), one has (cLr×r ⊗ K) ¯xrs = 0 (cLnr×r ⊗ K) ¯xrs + (cLnr×nr ⊗ K) ¯xnrs = ¯fnr (20) As stated in Lemma 2, Lr×r is a singular M-matrix with zero as an eigenvalue and 1r is its corresponding right eigenvector and, thus, the solution to the first equation of (20) becomes ¯xrs = c11r for some positive scalar c1. Using ¯xrs = c11r in the second equation of (20), the global steady states of non-root nodes becomes ¯xnrs = (cLnr×nr ⊗ K)−1(cid:104)−(cLnr×r ⊗ K)c11r + ¯fnr (21) (cid:105) (cid:40) Equation (21) shows that the steady states of non-root nodes f (t). If EΨ (cid:49) EA, it results are affected by the attack signal in ¯xnrs ∈ span(S A, S Ψ) where S A and S Ψ are defined in (18) which contradicts xss(t) ∈ span(S A). Therefore, condition EΨ ⊂ EA is necessary to conclude that for any f = [0r, ¯f T nr]T , there exists a steady state solution xss(t), i.e., uc(t) → 0 holds true. (cid:3) This completes the proof. The following theorem provides necessary and sufficient conditions for IMP-based attacks to assure uc(t) → 0. Theorem 1. Consider the global dynamics of DMAS (12) with the control protocol (13), where the attack signal f (t) is generated based on an IMP-based attack. Then, agents reach a steady state, i.e., uc(t) → 0 if and only if the attack signals satisfy pk fk = 0 (22) N(cid:88) k=1 where pk are the nonzero elements of the left eigenvector of the graph Laplacian matrix L associated with its zero eigenvalue. Proof. It was shown in the Lemma 4 that for the IMP- based attack on non-root nodes, agents reach a steady state, i.e., uc(t) → 0. Therefore, whether agents reach a steady state or not depends solely upon attacks on root nodes. Let f (t) = [ ¯fr, ¯fnr] where ¯fr represents the vector of attacks for root nodes given by ¯fr = [ f T r ]T . Now, we first prove the necessary condition for root nodes. If uc(t) → 0, then, using (15) and (19) , there exists a nonzero vector ¯xrs for root nodes such that 1 , . . . , f T (cLr×r ⊗ K) ¯xrs = ¯fr (23) where ¯xrs can be considered as the global steady state of the root nodes. Moreover, based on Lemma 3, (23) does not hold, if EΨ (cid:49) EA which implies that (23) is true only for EΨ ⊆ EA. As stated in Lemma 2, Lr×r is a strongly connected graph of root nodes and, therefore, it is a singular M-matrix. Let ¯wT = [p1, . . . , pr] be the left eigenvector associated with the zero eigenvalue of Lr×r. Now, pre-multiplying both sides of (23) by ¯wT and using the fact that ¯wTLr×r = 0 yield ¯wT (cLr×r ⊗ K) ¯xrs = ¯wT ¯fr = 0 (24) k=1 This states that IMP-based attacks on root nodes have to pk fk = 0 to ensure agents reach a steady state, i.e., satisfy uc(t) → 0. Note that pk = 0 for k = r + 1, . . . , N, i.e., the elements of the left eigenvector of the graph Laplacian matrix L, corresponding to its zero eigenvalue, are zero for non-root nodes [31]- [32]. This proves the necessity part. N(cid:80) Now, we prove the sufficient part by contradiction for root nodes. Assume agents reach a steady state, i.e., uc(t) → 0, but pk fk (cid:44) 0. Note that, agents reach a steady state implies that k=1 there exists a nonzero vector ¯xrs such that (23) holds. Using pk fk (cid:44) 0, one can conclude that ¯wT (cLr×r⊗K) ¯xrs (cid:44) (24) and 0. This can happen only when Lr×r does not have any zero eigenvalue, which violates the fact in Lemma 2 that Lr×r is a strongly connected graph. Therefore, ¯wT (cLr×r ⊗ K) ¯xrs = 0 N(cid:80) k=1 N(cid:80) N(cid:80) 5 which results in made. This completes the proof. pk fk = 0 and contradicts the assumption (cid:3) k=1 A Theorem 2. Consider the global dynamics of DMAS (12) with the control protocol (13) under IMP-based attack. If (22) is not satisfied and EΨ ∩ Em (cid:44) ∅, then the dynamics of agents become unstable. Proof. Since it is assumed that the condition in (22) is not satisfied, then based on Theorem 1, uc(t) (cid:54)→ 0 even under IMP-based attack. Thus, the attack signal f (t) does not vanish over time and eventually acts as an input to the system in (12). Assume that there exists at least one common marginal eigenvalue between the system dynamics matrix A in (1) and the attacker dynamics matrix Ψ in (9), i.e., EΨ∩Em (cid:44) ∅. Then, the multiplicity of at least one marginally stable pole becomes greater than 1. Therefore, the attacker destabilizes the state of the agent in (12). Moreover, since (22) is not satisfied, then the attack is on root nodes, and root nodes have a path to all other nodes in the network, the state of the all agents become (cid:3) unstable. This completes the proof. A Theorem 3 below now shows that despite IMP-based at- tacks, if uc(t) → 0, the local neighborhood tracking error (4) converges to zero for intact agents that have a path to the compromised agent, while they do not synchronize. Theorem 3. Consider the global dynamics of DMAS (12) under attack f (t). Then, the local neighborhood tracking error (4) converges to zero for all intact agents if uc(t) → 0. More- over, intact agents that are reachable from the compromised agents do not converge to the desired consensus trajectory. Proof. In the presence of attacks, the global dynamics of the DMAS (12) with (13) can be written as x(t) = (IN ⊗ A) x(t) + (IN ⊗ B)((−cL ⊗ K)x(t) + f (t)) (25) 1 (t), . . . , xT xT N(t) f T 1 (t), . . . , f T where x(t) = is the global vector of the state of agents and f (t) = denotes the global vector of attacks. As shown in (14) that if uc(t) → 0, agents reach a steady state. That is, N (t) cKηi → − fi ∀ i ∈ N (26) where ηi denotes the local neighborhood tracking error of agent i defined in (4). For the intact agent, by definition one has fi = 0, and thus (26) implies that the local neighborhood tracking error (4) converges to zero. Now, we show that intact agents which are reachable from the compromised agent do not synchronize to the desired consensus behavior. To do this, j be under attack. Assuming that all intact agents let agent synchronize, one has xk = xi ∀i, k ∈ N−{ j}. Now, consider the intact agent i as an immediate neighbor of the compromised agent j. Then using (13), if uc(t) → 0, for intact agent i, i.e., fi = 0, one has(cid:88) ai j(xk − xi) + (x j − xi) → 0 (27) (cid:105)T (cid:104) (cid:105)T (cid:104) k∈Ni−{ j} where xk denotes the state of the all intact neighbors of agent i. On the other hand, (7) shows that the state of the j, i.e., x j, is deviated from the desired compromised agent consensus value with a value proportional to f j. Therefore, (27) results in deviating the state of the immediate neighbor of the compromised agent j from the desired consensus behavior, which contradicts the assumption. Consequently, intact agents that have a path to the compromised agent do not reach consensus, while their local neighborhood tracking error is (cid:3) zero. This completes the proof. Remark 5. The effects of an attacker on a network of agents depend upon the dynamics of the attack signal. As stated in Theorem 2, to destabilize the entire network, the attack signal requires access to at least one common marginal eigenvalue with the system dynamics. To this end, an attacker can exploit the security of the network by eavesdropping and monitoring the transmitted data to identify at least one of the marginal eigenvalues of the agent dynamics, and then launch a signal with the same frequency to a root node to make the agents state go to infinity. Remark 6. Although, for the sake of simplicity, we consider DMASs with identical dynamics, the presented result can be extended to heterogeneous MASs. This is briefly discussed in the following formulation. The dynamics for a linear heterogeneous MASs is given by (cid:40) xi(t) = Aixi(t) + Biui(t) ∀ i ∈ N yi(t) = Cixi(t) (28) where xi ∈ Rni , ui ∈ Rmi and yi ∈ Rp denote, respectively, the state, the control input and the output of agent i. The matrices Ai ∈ Rni×ni , Bi ∈ Rni×mi and Ci ∈ Rp×ni are, respectively, the drift dynamics, the input matrix and the output matrix. For heterogeneous MASs, the consensus trajectory is usu- ally generated by a virtual exosystem dynamics given by [35]- [36] (cid:40) xc(t) = S xc(t) yc(t) = Rxc(t) (29) where xc ∈ Rq and yc ∈ Rp are, respectively, the state and output of the desired consensus trajectory. For heterogeneous MASs the distributed control protocol ui in (28) is designed such that all agents synchronize to the output of virtual exosys- tem trajectory [35]- [36]. The attacker can design IMP-based attacks by exploiting the knowledge of consensus dynamics S in (29), instead of agents' dynamics and all the analysis results presented in Section IV are valid for the heterogeneous MASs. In this case, to launch an IMP-based attack, the attacker should satisfy EΨ ⊆ ES where ES = {λ1(S ), . . . , λq(S )} with λi(S ) ∀i = 1, . . . , q as the set of eigenvalues of the virtual exosystem drift dynamics matrix S . Up to now, the presented analysis has been under the as- sumption that the communication is noise free. We now briefly discuss what changes if the communication noise is present, and propose attack detection and mitigation in the presence of communication noise. In the presence of Gaussian distributed communication noise, the local neighborhood tracking error in (4) becomes ¯ηi = ηi + ωi, (30) 6 where ωi ∼ N(0, Σωi) denotes the aggregate Gaussian noise affecting the incoming information to agent i and is given as (31) (cid:88) ai jωi j, ωi = j∈Ni with ωi j the incoming communication noise from agent j to agent i. In such situations, the DMAS consensus problem defined in Problem 1 changes to the mean square consensus problem. In the presence of Gaussian noise, based on (30), the control protocol in (3)-(4) becomes ∀ i ∈ N, ai j(x j(t) − xi(t)) + ωi j=1 ui(t) = cK (32) where ωi ∼ N(0, Σωi) is defined in (31). Based on mean square consensus, one has t→∞ E[ui(t)] →0 lim ∀ i ∈ N, (33) N(cid:88) ss = (IN ⊗ A) xm xm ss, and thus, based on (1), the steady state of agents converge to a consensus trajectory in mean square sense and its global form in (14) becomes (34) where xm ss = limt→∞E[x(t)] denotes the global steady state of agents in mean square sense. Then, following the same procedure as Lemmas 3-4 and Theorems 1-3, one can show that an IMP-based attack does not change the statistical properties of the local neighborhood tracking error, while a non-IMP based attack does. Moreover, the local neighborhood tracking error converges to zero in mean for an IMP-based attack, and it does not converges to zero in mean for a non- IMP based attack. In the next section, attack detection and mitigation mech- anisms are proposed for both IMP-based and non-IMP based attacks. To this end, it is assumed that the communication network is noisy. V. An Attack Detection Mechanism In this section, Kullback-Liebler (KL)-based attack detec- tion and mitigation approaches are developed for both IMP- based and non-IMP-based attacks. The KL divergence is a non-negative measure of the relative entropy between two probability distributions [37], [38] which is defined as follows. Definition 5 (KL divergence) [37], [38]. Let X and Z be two random sequences with probability density functions PX and PZ, respectively. The KL divergence measure between PX and PZ is defined as (cid:90) (cid:32) PX(θ) (cid:33) PZ(θ) DKL(XZ) = PX(θ) log dθ (35) with the following properties [37]: 1) DKL(PXPz) (cid:62) 0 2) DKL(PXPz) = 0 if and only if, PX = Pz 3) DKL(PXPz) (cid:44) DKL(PzPX) In the following subsections, KL-divergence is used to detect IMP-based and non-IMP-based attacks on DMASs. A. Attack detection for IMP-based attacks In this subsection, an attack detector is designed to identify IMP-based attacks. To this end, two error sequences τi and ϕi are defined based on only local exchanged information for agent i as (36) (37) and τi = ϕi = ai jdi j (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) (cid:88) (cid:88) (cid:13)(cid:13)(cid:13)ai jdi j j∈Ni (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) (cid:13)(cid:13)(cid:13) j∈Ni where the measured discrepancy di j between agent i(cid:48)s state and its neighbor j(cid:48)s state under attack becomes j − xc i + ωi j ∀ j ∈ Ni di j = xc (38) where ωi j ∼ N(0, Σωi j) denotes the Gaussian incoming com- munication noise from agent j to agent i. Moreover, xc i is the measured state of agent i under attack and xc j is the possibly corrupted information it receives from its jth neighbor. If agent i is not compromised, then xc = xi, and, similarly, if agent j i is not compromised, then xc = x j. In fact, (36) is the norm j of the summation of the measured discrepancy of agent i and all its neighbors, and (37) is the summation of norms of those measured discrepancies. In the absence of attack, these two signals show the same behavior in the sense that their means converge to zero. In the presence of an IMP-based attack and in the absence of noise, based on Theorem 3, τi goes to zero for intact agents, despite attack. However, it is obvious that ϕi does not converge to zero in the presence of an attack. In the presence of noise, the statistical properties of τi converge to the statistical properties of the noise. In contrast, the statistical properties of ϕi depend upon not only the statistical properties of the noise signal, but also of the attack signal. Therefore, the behavior of these two signals significantly diverges in the presence of attacks and can be captured by KL-divergence methods. Note that one can measure τi and ϕi based on the exchanged information among agents, which might be cor- rupted by the attack signal. Existing KL-divergence methods are, nevertheless, developed for Gaussian signals. However, while the communication noise is assumed to be Gaussian, error sequences (36) and (37) are norms of some variable with Gaussian distributions, thus, they have univariate folded Gaussian distributions given by [39] ϕi ∼ F N(µ1i, σ2 1i) and τi ∼ F N(µ2i, σ2 2i) . That is, 1√ 2πσ1i e 1√ 2πσ2i e − (qi−µ1i)2 2σ2 1i + − (qi−µ2i)2 2σ2 2i + Pϕi(qi, µ1i, σ1i) = Pτi(qi, µ2i, σ2i) = − (qi +µ1i)2 2σ2 1i − (qi +µ2i)2 2σ2 2i 1√ 2πσ1i e 1√ 2πσ2i e (39) where µ1i and σ1i are the mean and variance of the error sequences ϕi and µ2i and σ2i are the mean and variance of the 7 Pτi(qi) Pϕi(qi) Pτi(qi) error sequences τi. Using (35), the KL divergence in terms of the local error sequences ϕi and τi can be defined as DKL(ϕiτi) = (cid:32) Pϕi(qi) dqi = E1 Pϕi(qi) log (cid:90) log (cid:33) (cid:32) (cid:33) (40) where E1[.] represents the expectation value with respect to the distribution of the first sequence [39]. A KL divergence formula for the folded Gaussian distribu- tions is now developed in the following lemma. Lemma 5. Consider the error sequences τi and ϕi in (36)- (37) with folded Gaussian distributions Pϕi and Pτi in (39). Then, the KL divergence between error sequences τi and ϕi, i.e., DKL(ϕiτi), becomes σ2 2i σ2 1i − µ2 1i 2σ2 1i DKL(ϕiτi) ≈ 1 2 8µ2 1i σ2 1i 1 2i (µ2i − µ1i)2 + 1 −2 2 σ − 1 + (σ −2 2i σ2 1i) ρ2 4 2σ2 1i ρ2 2 2σ2 1i 4µ2 1i σ2 1i (cid:33) ρ2 3 2σ2 1i + e ρ2 1 2σ2 1i + e + e log (cid:32)  + e 1 − e  − e    1 2 e 1 2 for some ρ1 = (µ1i − 2µ2iσ2 ρ3 = (µ1i − 4µ2iσ2 Proof. See Appendix A. 1iσ−2 1iσ−2 2i ), ρ2 = (µ1i + 2µ2iσ2 2i ) and ρ4 = (µ1i + 4µ2iσ2 1iσ−2 2i ). (41) 1iσ−2 2i ), (cid:3) In the following theorem, we show that the effect of IMP- based attacks can be captured using the KL divergence defined in (41). Theorem 4. Consider the DMAS (1) along with the controller (13), and under the IMP-based attacks. Assume that the communication noise sequences are i.i.d. Then, for a reachable intact agent i, DKL(ϕiτi)dk > γi (42) (cid:90) k+T−1 1 T k where ϕi and τi are defined in (36) and (37), respectively, and T and γi represent the window size and the predesigned threshold parameter. Proof. According to Theorem 3, the local neighborhood track- ing error goes to zero for intact agents in the presence of an IMP-based attack when there is no communication noise. In the presence of communication noise with Gaussian distribution, i.e., ωi j ∼ (0, Σωi j) and IMP-based attack, the expectation value of the local neighborhood tracking error for intact agent i becomes E[ηi] = E[ (43) where the measured discrepancy di j is defined in (38). Using (43), one can write (36) as j∈Ni ai jdi j] → 0 (cid:88) (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) ∼ F N(0, ¯υ2 (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) (cid:88) j∈Ni τi = ai jdi j ωi) (44) which represents a folded Gaussian distribution with mean zero and variance ¯υ2 ωi. Note that the mean and variance of the distribution Pτi in (39) become µ2i = 0 and σ2 2i = ¯υ2 ωi. Since noise signals are independent and identically dis- tributed, from (37), one can infer that the folded Gaussian distribution Pϕi in (39) has the following statistical properties ϕi ∼ F N(µ f d i , ¯υ2 ωi + υ2 ωi + ¯υ2 f d i ) (45) i + υ2 ωi + ¯υ2 f d i and ¯υ2 ωi where µ f d represent the overall mean and covariance due to the communication noise and overall devi- ation from the desired behavior in intact neighbors reachable from the compromised agent. sponding to sequences τi and ϕi become F N(0, ¯υ2 F N(0, ¯υ2 divergence in (41) becomes In the absence of attack, the statistical properties corre- ωi) and ωi) , respectively, and the corresponding KL + υ2 ωi KL(ϕiτi) ≈ 1 Dwa 2 ¯υ2 ωi + υ2 ωi ¯υ2 ωi + ¯υ −2 ωi υ2 ωi)) (46) where υ2 depends on the communication noise. ωi represents additional variance in sequence ϕi, which Note that τi in (36) is the norm of the summation of the measured discrepancy of agent i and all its neighbors whereas ϕi in (37) is the summation of norms of those measured discrepancies. Even in the absence of attack, they represent folded Gaussian distributions with zero means and different covariances due to application of norm on measured discrepancies. Now, in the presence of IMP-based attacks, using the de- rived form of KL divergence for folded Gaussian distributions from Lemma 5, one can simplify (41) using (44)-(45) as log  log (cid:90) k+T−1 1 T k DKL(ϕiτi) ≈ 1 2 ¯υ2 ωi + υ2 ωi ¯υ2 ωi + 1 2 −2 ¯υ ωi (µ f d i )2 + 1 2 e 4(µ f d i +υ2 ωi ¯υ2 ωi )2 +¯υ2 f d i + ¯υ2 f d i 1 − e 8(µ f d i +υ2 ωi ¯υ2 ωi )2 +¯υ2 f d i  + ¯υ −2 ωi (¯υ2 f d i + υ2 ωi) Then, one can design the threshold parameter γi such that DKL(ϕiτi)dk > γi (48) 8 B. Attack detection for non-IMP-based attacks This subsection presents the design of a KL-based attack detector for non-IMP based attacks. It was shown in Theorem 3 that the local neighborhood tracking error goes to zero if agents are under IMP-based attacks. Therefore, for the case of non-IMP-based attacks, one can identify these types of attacks using the changes in the statistical properties of the local neighborhood tracking error. In the absence of attack, since the Gaussian noise, i.e., ωi ∼ N(0, Σωi), is considered in the communication link, the local neighborhood tracking error ηi in (30) has the following statistical properties ηi ∼ N(0, Σωi) (50) and it represents the nominal behavior of the system. In the presence of attacks, using (30), the local neighbor- hood tracking error ηa i can be written as ηa i = ai jdi j (51) (cid:88) j∈Ni where measured discrepancy under attacks di j is defined (38). From (51), one has i ∼ N(µ fi , Σ fi ηa + Σωi) (52) where µ fi and Σ fi are, respectively, mean and covariance of the overall deviation due to corrupted states under attacks as given in (38). Now, since both ηa the KL divergence in the terms of ηa i and ηi have normal Gaussian distri- i and ηi as butions, DKL(ηa i ηi) can be written as [40] log 1 2 1 (µηi − µηa 2 i (cid:12)(cid:12)(cid:12)Σηi (cid:12)(cid:12)(cid:12)Σηa (cid:12)(cid:12)(cid:12) (cid:12)(cid:12)(cid:12) − n + tr(Σ−1 ηi i ) Σηa ηi (µηi − µηa i ) i )T Σ−1  (53) (47) DKL(ηa i ηi) = +  i and Σηa i denote the mean and covariance of ηa where µηi and Σηi denote the mean and covariance of ηi and i . Moreover, µηa n denotes the dimension of the error sequence. Define the average of KL divergence over a window T as i ηi)dk (cid:90) k+T−1 DKL(ηa ¯Di = (54) 1 T k The following theorem says that the effect of non-IMP based attacks can be detected using the KL divergence between the two error sequences ηa Theorem 5. Consider the DMAS (1) along with the controller (13). Then, i and ηi. 1) in the absence of attack, ¯Di defined in (54) tends to zero. 2) in the presence of a non-IMP-based attack, ¯Di defined in (54) is greater than a predefined threshold γi. Proof. In the absence of attacks, the statistical properties of sequences ηi and ηa i are the same as in (50). Therefore, the KL i ηi) in (53) becomes zero and this makes divergence DKL(ηa ¯Di in (54) zero. This completes the proof of part 1. where T denotes the sliding window size. This completes the (cid:3) proof. Based on Theorem 4, one can use the following conditions for attack detection.  1 T 1 T (cid:90) k+T−1 (cid:90) k+T−1 k k DKL(ϕiτi)dk < γi DKL(ϕiτi)dk > γi : H0 : H1 (49) where γi denotes the designed threshold for detection, the null hypotheses H0 represents the intact mode and H1 denotes the compromised mode of an agent. To prove Part 2, using (50)-(52) in (53) and the fact that ωi (Σ fi Σ fi), one can write the KL divergence (Σ−1 between ηa DKL(ηa (cid:12)(cid:12)(cid:12) ωi 1 2 (log +Σωi)−n = tr(Σ−1 i and ηi as i ηi) = k+T−1(cid:90) (cid:12)(cid:12)(cid:12)Σωi (cid:12)(cid:12)(cid:12)Σ fi (cid:12)(cid:12)(cid:12)Σωi (cid:12)(cid:12)(cid:12) (cid:12)(cid:12)(cid:12)Σ fi log 1 2 1 T + Σωi + Σωi k ωi (cid:12)(cid:12)(cid:12) + tr(Σ−1 (cid:12)(cid:12)(cid:12) + tr(Σ−1 ωi Then, using (54), one has ¯Di = Σ fi) + µT fi Σ−1 ωi µ fi) (55) and consequently makes the value of c1 i (t) close to zero. On the other hand, without an attack, DKL(ϕiτi) tends to zero, making i (t) approach 1 and, consequently, c1 χ1 i (t) becomes close to 1. The larger the value of c1 i (t) is, the more confident the agent is about the trustworthiness of its broadcasted information. Similarly, for the non-IMP-based attacks, using the DKL(ηa i ηi) from Theorem 5, we define c2 i (t) as 9 (60) (61) t(cid:90) eκ2(τ−t)χ2 i (τ)dτ 0 ∆i ∆i + DKL(ηa i ηi) Σ fi) + µT fi Σ−1 ωi µ fi) > γi c2 i (t) = κ2 (56) where T and γi denote the sliding window size and the predefined design threshold, respectively. This completes the (cid:3) proof. where 0 (cid:54) c2 i (t) (cid:54) 1 with χ2 i (t) = Based on Theorem 5, one can use the following conditions for attack detection:  ¯Di < γi : H0 ¯Di > γi : H1 (57) where γi denotes the designed threshold for detection, the null hypotheses H0 represents the intact mode of the system and H1 denotes the compromised mode of the system. In the next section, Theorems 4 and 5 are employed to propose an attack mitigation approach which enables us to mitigate both IMP-based attacks and non-IMP-based attacks. VI. An Attack Mitigation Mechanism In this section, both IMP-based and non-IMP-based attacks are mitigated using the presented detection mechanisms in the previous section. A. Self-belief of agents about their outgoing information To determine the level of trustworthiness of each agent about its own information, a self-belief value is presented. If an agent detects an attack, it reduces its level of trustwor- thiness about its own understanding of the environment and communicates it with its neighbors to inform them about the significance of its outgoing information and thus slow down the attack propagation. For the IMP-based attacks, using the DKL(ϕiτi) from The- orem 4, we define c1 i (t) as t(cid:90) c1 i (t) = κ1 eκ1(τ−t)χ1 i (τ)dτ where 0 (cid:54) c1 i (t) (cid:54) 1 with 0 χ1 i (t) = ∆i ∆i + DKL(ϕiτi) (58) (59) where ∆i represents the threshold to account for the channel fading and other uncertainties and κ1 > 0 denotes the discount factor. Equation (58) can be implemented by the following differential equation c1 i (t) + κ1c1 i (t) attacks, DKL(ϕiτi) increases, which makes χ1 According to Theorem 4, in the presence of IMP-based i (t) approach zero i (t) = κ1χ1 where ∆i represents the threshold to account for the channel fading and other uncertainties, and κ2 > 0 denotes the discount factor. Expression (60) can be generated by i (t) c2 i (t) + κ2c2 i (t) = κ2χ2 i (t), one can show that c2 Using Theorem 6 and the same argument as we employed for c1 i (t) is close to 1 in the absence of an attack, and close to zero in the presence of a non-IMP based attack. i (t) and c2 Then, using c1 i (t) defined in (58) and (60), the self- belief of an agent i for both IMP and non-IMP-based attacks is defined as ξi(t) = min{c1 i (t), c2 i (t)} (62) If an agent i is under direct attack or receives corrupted information from its neighbors, then the self-belief of the agent i tends to zero. In such a situation, it transmits the low self-belief value to its neighbor to put less weight on the information they receive from it and this prevents attack propagation in the distributed network. B. Trust of agents about their incoming information The trust value represents the level of confidence of an agent on its neighbors' information. If the self-belief value of an agent is low, it forms beliefs on its neighbors (either intact or compromised) and updates its trust value which depends on the beliefs on each of its neighbors using only local information. Therefore, agents identify the compromised neighbor and discard its information. Using the KL divergence between exchanged information of agent i and its neighbor, one can define ηi j(t) as t(cid:90) ηi j(t) = κ3 eκ3(τ−t)Li j(τ)dτ where 0 (cid:54) ηi j(t) (cid:54) 1 with 0 Li j(t) = 1 − with mi = (cid:80) (cid:18) Λ1 DKL(x jmi) −Λ2 (cid:19) ∀ j ∈ Ni Λ1 + e x j and Λ1, Λ2 > 0 represent the threshold to account for channel fading and other uncertainties, and κ3 > 0 denotes the discount factor. For the compromised neighbor, the j∈Ni (63) (64) KL divergence DKL(x jmi) tends to zero, which makes Li j(t) close to zero. Consequently, this makes the value of ηi j(t) close to zero. On the other hand, if the incoming neighbor is not compromised, then DKL(x jmi) increases and makes ηi j(t) approach 1. Equation (63) can be implemented using the following differential equation ηi j(t) + κ3ηi j(t) = κ3Li j(t) Now, we define the trust value of an agent on its neighbors Ωi j(t) = max(ξi(t), ηi j(t)) (65) as with 0 (cid:54) Ωi j(t) (cid:54) 1. In the absence of attacks, the state of agents converge to the consensus trajectory and the KL divergence DKL(x jmi), ∀ j ∈ Ni tends to zero which results in Ωi j(t) being 1 ∀ j ∈ Ni. In the presence of attacks, ηi j(t) corresponding to the compromised agents tends to zero. C. The mitigation mechanism using trust and self-belief values In this subsection, the trust and self-belief values are utilized to design the mitigation algorithm. To achieve resiliency, both self-belief and trust values are incorporated into the exchange information among agents. Consequently, the resilient form of local neighborhood tracking error (30) is presented as ηi = Ωi j(t)ξ j(t)ai j + ωi (66) (cid:88) j∈Ni (cid:16) (cid:17) x j − xi where Ωi j(t) and ξ j(t) denote, respectively, the trust value and the self-belief of neighboring agents. Using (3) and (66), the resilient control protocol becomes ui = cK ηi, ∀ i ∈ N (67) According to (66), the topology of the graph changes over time due to incorporation of the trust and the self-belief values of agents, thus we denote the time-varying graph as G(t) = (V, E(t)) with E(t) ⊆ V × V representing the set of time- varying edges. Now, based on following definitions and lemma, we for- mally present Theorem 6 to illustrate that the trust and self- belief based proposed resilient control protocol (67) solves Problem 1 and all intact agents, i.e., NInt = N\NComp as defined in Definition 4 achieve the final desired consensus value for DMAS in (1), despite attacks. Definition 6 (r-reachable set) [41]. Given a directed graph G and a nonempty subset Vs ⊂ V, the set Vs is r-reachable if there exists a node i ∈ Vs such that Ni\Vs (cid:62) r, where r ∈ Z(cid:62)0. (cid:3) Definition 7 (r-robust graph) [41]. A directed graph G is called an r-robust graph with r ∈ Z(cid:62)0 if for every pair of nonempty, disjoint subsets of V, at least one of the subsets is (cid:3) r-reachable. Assumption 3. If at most q neighbors of each intact agents is under attack, at least (q + 1) neighbors of each intact agents are intact. Lemma 6. [41] Consider an r-robust time-varying directed graph G(t). Then, the graph has a directed spanning tree, if and only if G(t) is 1-robust. 10 Theorem 6. Consider the DMAS (1) under attack with the proposed resilient control protocol ui in (67). Let the time-varying graph G(t) be such that at each time in- stant t, Assumption 1 and Assumption 3 are satisfied. Then, t→∞x j(t) − xi(t) = 0 ∀i, j ∈ NInt. lim Proof. The DMAS (1) with the proposed resilient control (cid:88) protocol ui in (67) without noise can be written as (cid:16) (cid:17) xi = Axi + cBK ai j(t) x j − xi (68) j∈Ni where ai j(t) = Ψi j(t)C j(t)ai j. The global form of resilient system dynamics in (68) becomes x = (IN ⊗ A − cL(t) ⊗ BK)x (69) where L(t) denotes the time-varying graph Laplacian matrix of the directed graph G(t). Based on Assumption 3, even if q neighbors of an intact agent are attacked and collude to send the corrupted value to misguide it, there still exists q + 1 intact neighbors that communicate values different from least q + 1 of the compromised ones. Moreover, since at the intact agent's neighbors are intact, it can update its trust values to remove the compromised neighbors. Furthermore, since the time varying graph G(t) resulting from isolating the compromised agents is 1-robust, based on Definition 7 and Lemma 6, the entire network is still connected to the intact agents. Therefore, there exists a spanning tree in the graph associated with all intact agents NInt. Hence, it is shown in [42] that the solutions of DMAS in (69) reach consensus on desired behavior if the time-varying graph G(t) jointly contains a spanning tree as the network evolves with time. This t→∞x j(t) − xi(t) = 0 ∀i, j ∈ NInt assymptotically. results in lim This completes the proof. (cid:3) Remark 7. The proposed approach discards the compromised agent only when an attack is detected, in contrast to most of the existing methods that are based on solely the discrepancy among agents. Note that discrepancy can be the result of a legitimate change in the state of one agent. Moreover, in the beginning of synchronization, there could be a huge discrep- ancy between agents' states that should not be discarded. VII. Simulation Results In this section, an example is provided to illustrate the effec- tiveness of the proposed detection and mitigation approaches. Consider a group of 5 homogeneous agents with the dynamics defined as xk = Axk + Buk k = 1, . . . , 5 (70) where A = (cid:35) (cid:34) 0 −1 1 0 , B = (cid:35) . (cid:34) 1 0 The communication graph is shown in Fig. 1. In the absence of an attack, agents reach desired synchronization and there emerges the healthy behavior of the system with noisy com- munication as shown in Fig. 2. 11 Fig. 1: Communication topology. Fig. 3: The state of agents when Agent 1 is under an IMP-based attack. (a) (b) (a) (b) Fig. 2: Desired synchronization in the absence of attack. (a) The state of agents. (b) The local neighborhood tracking error of agents. Fig. 4: Agent 5 is under IMP-based attack. (a) The state of agents. (b) The local neighborhood tracking error of agents. A. IMP-based attacks This subsection analyzes the effects of IMP-based attacks and illustrates our attack detection and mitigation scheme. The attack signal is assumed to be f = 20 sin(t). This is an IMP- based attack and is assumed to be launched on Agent 1 (root node) at time t=20. The results are shown in Fig. 3. It can be seen that the compromised agent destabilizes the entire network. This result is consistent with Theorem 2. It is shown in Fig. 4 that the same IMP-based attack on Agent 5 (noon-root node) cannot destabilize the entire network. However, Agent 4, which is the only agent reachable from Agent 5, does not synchronize to the desired consensus trajectory. Moreover, one can see that the local neighborhood tracking error converges to zero for all intact agents except the compromised Agent 5. These results are in line with Theorem 3. Fig.5 shows the divergence in the presence of non-IMP based attack on Agent 5 based on Theorem 4. Then, the effect of attack is rejected using the presented belief-based detection and mitigation approach in Theorem 4 and Theorem 6. Fig.6 shows that reachable agents follow the desired consensus trajectory, even in the presence of the attack. B. Non-IMP-based attacks This subsection analyzes the effects of non-IMP-based at- tacks and validates our attack detection and mitigation ap- proach. The attack signal is assumed to be f = 10 + 5 sin(2t). Fig. 5: Divergence for state of agents when Agent 5 is under a IMP-based attack. Fig. 6: The state of agents using the proposed attack detection and mitigation approach for IMP-based attack. The effect of this non-IMP-based attack on Agent 5 (non-root node) is shown in Fig.7. It can be seen that this non-IMP-based 010203040Time (s)-2-1012Agent 1Agent 2Agent 3Agent 4Agent 5010203040Time (s)-50510Agent 1Agent 2Agent 3Agent 4Agent 5510152025303540Time (s)-1000-50005001000Agent 1Agent 2Agent 3Agent 4Agent 501020304050Time (s)-505Agent 1Agent 2Agent 3Agent 4Agent 501020304050Time (s)-10-50510Agent 1Agent 2Agent 3Agent 4Agent 501020304050Time (s)0200400600800Agent 1Agent 2Agent 3Agent 4Agent 501020304050Time (s)-10-50510Agent 1Agent 2Agent 3Agent 4Agent 5 attack on Agent 5 only affects the reachable Agent 4. Then, Fig.8 shows the divergence in the presence of non-IMP based attack on Agent 5 based on Theorem 5. It is shown in Fig.9 that the effect of the attack is removed for the intact Agent 4 using belief-based detection and mitigation approaches presented in Theorems 5 and 6. A possible direction for future work is to extend these results to synchronization of DMASs with nonlinear dynam- ics. Since nonlinear systems can exhibit finite-time escape behavior, a problem of interest is to find the conditions under which the attacker can make the trajectories of agents become unbounded in finite time, and to obtain detection and mitigation mechanisms to counteract such attacks fast and thus avoid instability. 12 Appendix A Proof of Lemma 5 Using (41), the KL divergence between error sequences ϕi and τi can be written as DKL(ϕiτi) = E1[log Pϕi − log Pτi] (71) Fig. 7: The state of agents when Agent 5 is under a non-IMP-based attack. Fig. 8: Divergence for state of agents when Agent 5 is under a non-IMP based attack. Fig. 9: The state of agents after attack detection and mitigation for non-IMP based attack. VIII. Conclusion A resilient control framework has been introduced for DMASs. First, the effects of IMP-based and non-IMP-based attacks on DMASs have been analyzed using a graph-theoretic approach. Then, a KL divergence based criterion, using only the observed local information of agents, has been employed to detect attacks. Each agent detects its neighbors' misbehaviors, consequently forming a self-belief about the correctness of its own information, and continuously updates its self-belief and communicates it with its neighbors to inform them about the significance of its outgoing information. Additionally, if the self-belief value of an agent is low, it forms beliefs on the type of its neighbors (intact or compromised) and, consequently, updates its trust of its neighbors. Finally, agents incorporate their neighbors' self-beliefs and their own trust values in their control protocols to slow down and mitigate attacks.  2σ2 1i ] where probability density functions Pϕi and Pτi are defined in (39). Using (39), (71) becomes DKL(ϕiτi) = E1[log   − (qi−µ1i)2 2σ2 1i + 1√ 2πσ1i e 1√ 2πσ1i e − (qi +µ1i)2 (72) − log 1√ 2πσ2i e − (qi−µ2i)2 2σ2 2i + − (qi +µ2i)2 2σ2 2i 1√ 2πσ2i e By the aid of the logarithm property as log(a +b) = log(a) + log(1 + b/a), (72) turns into = E1[log DKL(ϕiτi) =  − (qi−µ1i)2 ] (cid:124)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:123)(cid:122)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:125) 1√ 1√ 2πσ2i e 2πσ1i e (cid:33) (cid:32) (cid:124)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:123)(cid:122)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:125)  − log (cid:33) + E1[log − log  (cid:32) − 2qi µ2i σ2 2i − 2qi µ1i σ2 1i − (qi−µ2i)2 1 + e 1 + e 2σ2 1i 2σ2 2i T1 ] T2 The first (73) term in (73) is a KL divergence formula for statistical sequences with normal Gaussian distribution which is given in [40] as σ2 2i σ2 1i − 1 + (σ −2 2i σ2 1i) 2i (µ2i − µ1i)2 −2 1 2 σ (74) The second term T2 in (73), using power series expansion and ignoring higher order (n + 1) log log(1 + a) = (cid:80) T1 = 1 2 n(cid:62)0 (−1)nan+1(cid:46) (cid:16)  + (cid:17) terms, can be approximated as − 2qi µ1i σ2 1i − (e T2 ≈ E1[e which can be expressed as 2 − 2qi µ1i σ2 1i ) 2 − 2qi µ2i σ2 2i − (e 2 − 2qi µ2i σ2 2i ) 2 ] (75) ∞(cid:90) −∞ T2 ≈ ∞(cid:90) − −∞ ] − E1[e ∞(cid:90) 1i dqi − 1 ∞(cid:90) 2 −∞ 1 2 −∞ − 2qi µ1i σ2 Pϕie − 4qi µ1i σ2 1i dqi Pϕie − 2qi µ2i σ2 2i dqi + Pϕie − 4qi µ2i σ2 2i dqi Pϕie (76) 01020304050Time (s)-505Agent 1Agent 2Agent 3Agent 4Agent 501020304050Time (s)01020304050Agent 1Agent 2Agent 3Agent 4Agent 501020304050Time (s)-50510Agent 1Agent 2Agent 3Agent 4Agent 5 (78) (79) (80) (81) (82) where ρ3 = (µ1i − 4µ2iσ2 2i ) and ρ4 = (µ1i + 4µ2iσ2 Adding (78), (80), (83) and (84), T2 can be written as 1iσ−2 1iσ−2 2i ) .  − e ρ2 3 2σ2 1i + e ρ2 4 2σ2 1i ρ2 1 2σ2 1i + e ρ2 2 2σ2 1i e 1 1 − e 2  8µ2 1i σ2 1i T2 ≈ e − µ2 1i 2σ2 1i +1 + 4µ2 1i σ2 1i e 1 2 13 (85)   Now, using (74)-(75) and (85), one gets (41). This completes the proof. References [1] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and coop- eration in networked multi-agent systems," Proceedings of the IEEE, vol. 95, pp. 215 -- 233, Jan 2007. [2] F. Bullo, J. Cortes, and S. Martinez, Distributed Control of Robotic Net- works: A Mathematical Approach to Motion Coordination Algorithms. Princeton University Press, 2009. [3] A. Khanafer and T. Bas¸ar, "Robust distributed averaging: When are potential-theoretic strategies optimal?," IEEE Transactions on Automatic Control, vol. 61, pp. 1767 -- 1779, July 2016. [4] Q. Zhu and T. Bas¸ar, "Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games prin- ciple for optimal cross-layer resilient control systems," IEEE Control Systems, vol. 35, pp. 46 -- 65, Feb 2015. [5] Y. Mo, R. Chabukswar, and B. Sinopoli, "Detecting integrity attacks on scada systems," IEEE Transactions on Control Systems Technology, vol. 22, pp. 1396 -- 1407, July 2014. [6] Y. Shoukry, P. Martin, P. Tabuada, and M. Srivastava, "Non-invasive spoofing attacks for anti-lock braking systems," in International Work- shop on Cryptographic Hardware and Embedded Systems, pp. 55 -- 72, Springer, 2013. [7] H. Fawzi, P. Tabuada, and S. Diggavi, "Secure estimation and control for cyber-physical systems under adversarial attacks," IEEE Transactions on Automatic Control, vol. 59, pp. 1454 -- 1467, June 2014. [8] M. Pajic, J. Weimer, N. Bezzo, P. Tabuada, O. Sokolsky, I. Lee, and G. J. Pappas, "Robustness of attack-resilient state estimators," in 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 163 -- 174, April 2014. [9] F. Pasqualetti, F. Drfler, and F. Bullo, "Attack detection and identification in cyber-physical systems," IEEE Transactions on Automatic Control, vol. 58, pp. 2715 -- 2729, Nov 2013. [10] Y. Shoukry and P. Tabuada, "Event-triggered state observers for sparse sensor noise/attacks," IEEE Transactions on Automatic Control, vol. 61, pp. 2079 -- 2091, Aug 2016. [11] Y. Mo and B. Sinopoli, "Secure estimation in the presence of integrity attacks," IEEE Transactions on Automatic Control, vol. 60, pp. 1145 -- 1151, April 2015. [12] A. Kanellopoulos and K. G. Vamvoudakis, "Non-equilibrium dynamic games and cyber -- physical security: A cognitive hierarchy approach," Systems & Control Letters, vol. 125, pp. 59 -- 66, 2019. [13] C. De Persis and P. Tesi, "Input-to-state stabilizing control under denial- of-service," IEEE Transactions on Automatic Control, vol. 60, no. 11, pp. 2930 -- 2944, 2015. [14] Y. Yan, P. Antsaklis, and V. Gupta, "A resilient design for cyber physical systems under attack," in 2017 American Control Conference (ACC), pp. 4418 -- 4423, May 2017. [15] F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in unreliable networks: A system theoretic approach," IEEE Transactions on Automatic Control, vol. 57, pp. 90 -- 104, Jan 2012. [16] A. Teixeira, H. Sandberg, and K. H. Johansson, "Networked control systems under cyber attacks with applications to power networks," in Proceedings of the 2010 American Control Conference, pp. 3690 -- 3696, June 2010. [17] S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, "Cyber security of water scada systems-part ii: Attack detection using enhanced hydro- dynamic models," IEEE Transactions on Control Systems Technology, vol. 21, pp. 1679 -- 1693, Sept 2013. [18] S. Weerakkody, X. Liu, S. H. Son, and B. Sinopoli, "A graph-theoretic characterization of perfect attackability for secure design of distributed control systems," IEEE Transactions on Control of Network Systems, vol. 4, pp. 60 -- 70, March 2017. − (qi +5µ1i)2−24µ2 1i 2σ2 1i dqi + e  dqi − (qi +3µ1i)2−8µ2 1i 2σ2 1i e 4µ2 1i σ2 1i + e 12µ2 1i σ2 1i  Pϕie − 4qi µ1i σ2 1i dqi = −1 2 ∞(cid:90) e − (qi−µ1i)2 2σ2 1i e − 2qi µ2i σ2 2i + e − (qi +µ1i)2 2σ2 1i e dqi − 2qi µ2i σ2 2i ∞(cid:90) −1 2 −∞ = − √ 2 − 4qi µ1i σ2 1i dqi Pϕie −∞ e ∞(cid:90) −∞ 1 2πσ1i ∞(cid:90) − 1 2 −∞ which yields The third term of T2 is ∞(cid:90) − −∞ = − − 2qi µ1i σ2 1i dqi Pϕie −∞ 1√ 2πσ1i ∞(cid:90) e − −∞ = − − 2qi µ1i σ2 1i dqi Pϕie ∞(cid:90) 1i−ρ2 − µ2 1 2σ2 1i ∞(cid:90) 1i−ρ2 − µ2 2 2σ2 1i +e −∞ where ρ1 = (µ1i − 2µ2iσ2 which becomes which can be written in the form Now, the first term of T2 can be written as ∞(cid:90) ∞(cid:90) −∞ = −∞ − 2qi µ1i σ2 1i dqi Pϕie 1√ 2πσ1i e ∞(cid:90) − (qi +µ1i)2 2σ2 1i dqi + ∞(cid:90) −∞ − (qi +µ1i)2 +4qi µ1i 2σ2 1i 1√ 2πσ1i e dqi (77) Using the fact that density integrates to 1, (77) becomes − 2qi µ1i σ2 1i dqi = 1 + e 4µ2 1i σ2 1i Pϕie Similarly, second term of T2 can be written as 1√ 2πσ1i e − (qi−ρ1)2 2σ2 1i dqi − (qi−ρ2)2 2σ2 1i dqi −∞ 1√ 2πσ1i e 1iσ−2 2i ) and ρ2 = (µ1i + 2µ2iσ2  ∞(cid:90) − −∞ ∞(cid:90) −∞ 1 2 − 2qi µ1i σ2 1i dqi = − Pϕie 1i−ρ2 − µ2 1 2σ2 1i + e 1i−ρ2 − µ2 2 2σ2 1i Similarly, the last term of T2 can be simplified as − 2qi µ1i σ2 1i dqi = Pϕie 1 2 1i−ρ2 − µ2 3 2σ2 1i + e 1i−ρ2 − µ2 4 2σ2 1i e e 1iσ−2 2i ) (83) (84)   [19] Z. Feng and G. Hu, "Distributed secure average consensus for linear multi-agent systems under dos attacks," in 2017 American Control Conference (ACC), pp. 2261 -- 2266, May 2017. [20] S. Sundaram and C. N. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," IEEE Transactions on Automatic Control, vol. 56, pp. 1495 -- 1508, July 2011. [21] W. Zeng and M. Y. Chow, "Resilient distributed control in the presence of misbehaving agents in networked control systems," IEEE Transac- tions on Cybernetics, vol. 44, pp. 2038 -- 2049, Nov 2014. [22] X. Jin, W. M. Haddad, and T. Yucelen, "An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems," IEEE Transactions on Automatic Control, vol. 62, pp. 6058 -- 6064, Nov 2017. [23] H. J. LeBlanc and X. Koutsoukos, "Resilient first-order consensus and weakly stable, higher order synchronization of continuous-time net- worked multi-agent systems," IEEE Transactions on Control of Network Systems, pp. 1 -- 1, 2017. [24] S. Bolouki, D. G. Dobakhshari, T. Bas¸ar, V. Gupta, and A. Nedi´c, "Applications of group testing to security decision-making in networks," in 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pp. 2929 -- 2934, Dec 2017. [25] E. Akyol, T. Bas¸ar, and C. Langbort, "Signaling games in networked cyber-physical systems with strategic elements," in 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pp. 4576 -- 4581, Dec 2017. [26] M. O. Sayin and T. Bas¸ar, "Secure sensor design for cyber-physical systems against advanced persistent threats," in Decision and Game Theory for Security (S. Rass, B. An, C. Kiekintveld, F. Fang, and S. Schauer, eds.), (Cham), pp. 91 -- 111, Springer International Publishing, 2017. [27] S. M. Dibaji, H. Ishii, and R. Tempo, "Resilient randomized quantized consensus," IEEE Transactions on Automatic Control, pp. 1 -- 1, 2017. [28] S. M. Dibaji, M. Pirani, D. B. Flamholz, A. M. Annaswamy, K. H. Johansson, and A. Chakrabortty, "A systems and control perspective of cps security," 2019. [29] R. Moghadam and H. Modares, "An internal model principle for the attacker in distributed control systems," in 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pp. 6604 -- 6609, Dec 2017. [30] Z. Feng and G. Hu, "Secure cooperative event-triggered control of linear multiagent systems under dos attacks," IEEE Transactions on Control Systems Technology, pp. 1 -- 12, 2019. [31] Z. Li and Z. Duan, Cooperative Control of Multi-Agent Systems: A Consensus Region Approach. Automation and Control Engineering, Taylor & Francis, 2014. [32] F. Lewis, H. Zhang, K. Hengster-Movric, and A. Das, Cooperative Con- trol of Multi-Agent Systems: Optimal and Adaptive Design Approaches. Communications and Control Engineering, Springer London, 2013. [33] Y. Su and J. Huang, "Stability of a class of linear switching systems with applications to two consensus problems," IEEE Transactions on Automatic Control, vol. 57, pp. 1420 -- 1430, June 2012. [34] H. Zhang, F. L. Lewis, and A. Das, "Optimal design for synchronization of cooperative systems: State feedback, observer and output feedback," IEEE Transactions on Automatic Control, vol. 56, pp. 1948 -- 1952, Aug 2011. [35] P. Wieland, R. Sepulchre, and F. Allgower, "An internal model principle is necessary and sufficient for linear output synchronization," Automat- ica, vol. 47, no. 5, pp. 1068 -- 1074, 2011. [36] J. Lunze, "Synchronization of heterogeneous agents," IEEE Transactions on Automatic Control, vol. 57, pp. 2885 -- 2890, Nov 2012. [37] S. Kullback and R. A. Leibler, "On information and sufficiency," The Annals of Mathematical Statistics, vol. 22, no. 1, pp. 79 -- 86, 1951. [38] M. Basseville and I. V. Nikiforov, Detection of Abrupt Changes: Theory and Application, vol. 104. Prentice Hall Englewood Cliffs, 1993. [39] S. Kotz and N. L. Johnson, Process Capability Indices. New York, USA: Chapman & Hall/CRC, 1993. [40] T. M. Cover and J. A. Thomas, Elements of Information Theory. New York, NY, USA: Wiley-Interscience, 2006. [41] H. J. LeBlanc, H. Zhang, X. Koutsoukos, and S. Sundaram, "Resilient asymptotic consensus in robust networks," IEEE Journal on Selected Areas in Communications, vol. 31, pp. 766 -- 781, April 2013. [42] W. Ren and R. W. Beard, "Consensus seeking in multiagent systems under dynamically changing interaction topologies," IEEE Transactions on Automatic Control, vol. 50, pp. 655 -- 661, May 2005. 14 Aquib Mustafa (S17) received the B. Tech. degree from the Aligarh Muslim University, Aligarh, India, in 2013, and the Masters degree from the Indian Institute of Technology Kanpur, Kanpur, India, in 2016. He is currently pursuing the Ph.D. degree in the Department of Mechanical Engineering, Michi- gan State University, East Lansing, USA. His pri- mary research interests include Resilient control, Multi-agent systems, and sensor networks. Rohollah Moghadam (S17) received the M.S. de- gree from the Shahrood University of Technology, Shahrood, Iran, in 2007, in electrical engineering. He was a visiting scholar with the University of Texas at Arlington Research Institute, Fort Worth, TX, USA in 2016. He is currently pursuing the Ph.D. degree in the Department of Electrical and Computer Engineering, Missouri University of Science and Technology, Rolla, USA. His current research inter- ests include cyber-physical systems, reinforcement learning, neural network, network control systems, and distributed control of multi-agent systems. Hamidreza Modares (M15) received the B.Sc. de- gree from Tehran University, Tehran, Iran, in 2004, the M.Sc. degree from the Shahrood University of Technology, Shahrood, Iran, in 2006, and the Ph.D. degree from the University of Texas at Arlington (UTA), Arlington, TX, USA, in 2015. From 2006 to 2009, he was with the Shahrood University of Tech- nology as a Senior Lecturer. From 2015 to 2016, he was a Faculty Research Associate with UTA. From 2016 to 2018, he was an Assistant Professor with the Department of Electrical and Computer Engineering, Missouri University of Science and Technology, Rolla, USA. He is currently an Assistant Professor with the Department of Mechanical Engineering, Michigan State University, East Lansing, USA. He has authored several journal and conference papers on the design of optimal controllers using reinforcement learning. His current research interests include cyber- physical systems, machine learning, distributed control, robotics, and renew- able energy microgrids. Dr. Modares was a recipient of the Best Paper Award from the 2015 IEEE International Symposium on Resilient Control Systems, the Stelmakh Outstanding Student Research Award from the Department of Electrical Engineering, UTA, in 2015, and the Summer Dissertation Fellowship from UTA, in 2015. He is an Associate Editor of the IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS.
1410.6516
2
1410
2018-08-23T11:53:11
Coalition Structure Generation on Graphs
[ "cs.MA" ]
Two fundamental algorithm-design paradigms are Tree Search and Dynamic Programming. The techniques used therein have been shown to complement one another when solving the complete set partitioning problem, also known as the coalition structure generation problem [5]. Inspired by this observation, we develop in this paper an algorithm to solve the coalition structure generation problem on graphs, where the goal is to identifying an optimal partition of a graph into connected subgraphs. More specifically, we develop a new depth-first search algorithm, and combine it with an existing dynamic programming algorithm due to Vinyals et al. [9]. The resulting hybrid algorithm is empirically shown to significantly outperform both its constituent parts when the subset-evaluation function happens to have certain intuitive properties.
cs.MA
cs
Coalition Structure Generation on Graphs Talal Rahwana, Tomasz Michalakb aMasdar Institute of Science and Technology, UAE bUniversity of Oxford, UK, and University of Warsaw, Poland Abstract Two fundamental algorithm-design paradigms are Tree Search and Dynamic Pro- gramming. The techniques used therein have been shown to complement one another when solving the complete set partitioning problem, also known as the coalition structure generation problem [5]. Inspired by this observation, we develop in this paper an algorithm to solve the coalition structure generation problem on graphs, where the goal is to identifying an optimal partition of a graph into connected sub- graphs. More specifically, we develop a new depth-first search algorithm, and com- bine it with an existing dynamic programming algorithm due to Vinyals et al. [10]. The resulting hybrid algorithm is empirically shown to significantly outperform both its constituent parts when the subset-evaluation function happens to have certain intuitive properties. 1. Introduction The coalition structure generation problem is a fundamental problem in multi-agent systems research. It involves partitioning the set of agents into mutually disjoint coalitions so that the total reward from the resulting coalitions is maximized. Most of the literature on this topic assumes that the agents can split into teams (or coalitions) in any way they like [8]. In practice, however, some coalition structures may be inadmissible due to various constraints present in the problem domain. This paper considers one such class of problems, known as graph-restricted games [3]. Here, we are given a graph in which every node represents an agent, and every edge can be interpreted as a communication channel, or a trust relationship, which facilitates the cooperation between its two ends. A coalition is then feasible if and only if it induces a connected subgraph of G. The intuition here is that any two agents cannot belong to the same coalition unless they are able to communicate with one another, either directly through an edge, or indirectly through (some of) the other members of the coalition who collectively form a path between the two agents. Following convention, we will assume that G is connected.1 1If G is not connected, the coalition structure generation problem can be decomposed into smaller Preprint submitted to Artificial Intelligence July 18, 2021 To the best of our knowledge, the two state-of-the-art algorithms for solving the coalition structure generation problem in graph-restricted games are: (i) a tree- search algorithm called CFSS [1], and (ii) a dynamic-programming algorithm called DyPE [10]. Each algorithm has its relative strengths and weakness compared to the other. In particular, • CFSS is superior in that it is an anytime algorithm -- its solution quality im- proves monotonically as computation time increases. As such, it can return a valid solution even if it was unable to run to completion, e.g., due to a fail- ure or due to time constraints. DyPE , on the other hand, is not an anytime algorithm, and so does not return interim solutions. Another advantage of CFSS is that it applies a branch-and-bound technique, which enables it to exploit the specifics of any given problem instance, resulting in (possibly sig- nificant) speedups. This is not possible with DyPE due to the absence of any such a branch-and-bound technique. Finally, CFSS uses very little memory compared to DyPE ; the latter requires storing in memory the solutions of dif- ferent sub-problems, the number of which may be exponential (depending on the density of the graph). • On the other hand, DyPE is superior in terms of the computational complexity. For instance, given a complete graph of n agents, DyPE runs in O(3n), while CFSS runs in O(nn). This is because the latter depends heavily on the branch- and-bound technique which, in the worst case, may fail to prune even a single solution, resulting in a brute-force search. Since DyPE and CFSS have their own strengths and weaknesses relative to each other, it is desirable to develop an algorithm that has the best of both. Perhaps a promising direction is to combine DyPE with CFSS , following the steps of Rahwan et al. [6], who handled the general (not graph-restricted) coalition structure genera- tion problem by combining a dynamic programming algorithm [4] with a depth-first search algorithm [9], thus obtaining the best of both. In our case, however, CFSS and DyPE are built on entirely different search-space representations (see Section 3), which makes it hard to combine the two algorithms elegantly and efficiently. With this in mind, the contribution of this paper are as follows: • We develop TSP -- a new depth-first search algorithm specifically designed to be compatible with DyPE . • We show how to modify both TSP and DyPE such that they complement one another when merged into a single hybrid algorithm, called D-TSP . independent sub-problems, each having a connected graph. 2 • We empirically evaluate D-TSP in randomly-generated super-subadditive set- tings, and show that it significantly outperforms its constituent parts. The remainder of the paper is structured as follows. The main notation is in- troduced in Section 2. The existing dynamic-programming algorithm -- DyPE -- and the existing tree-search algorithm -- CFSS -- are described in Section 3. Our new tree-search algorithm -- TSP -- is introduced in Section 4. The hybrid algorithm -- D-TSP -- is introduced in Section 5. Finally, Section 7 concludes the paper and discusses future directions. 2. Preliminaries A graph-restricted game is a tuple, (A, v, G), where A is the set of agents, v : 2A → R is a characteristic function that evaluates each coalition of agents, and G = (A, E) is a graph whose set of nodes is A, and whose set of edges, E, specifies which agents are connected to each other. The number of agents in A will be denoted by n. For every coalition, C ⊆ A, let P C denote the set of partitions of C, also known as coalition structures over C.2 Given our focus on characteristic function games, the value of a partition is simply the sum of the values of the coalitions therein.3 More formally, for every C ⊆ A, and every P ∈ P C, the value of partition P is: (cid:88) p∈P V (P ) = v(p). We will denote by opt(C) an optimal partition of C, and by v∗(C) the value of such a partition. More formally, opt(C) ∈ arg max P∈P C V (P ) and v∗(C) = max P∈P C V (P ). In a graph-restricted game, (A, v, G), we say that a coalition, C ⊆ A, is connected in G if and only if C induces a connected subgraph of G. Moreover, for every C ⊆ A, we will denote by ConnectedSubsets(C, G) the set of all non-empty subsets of C that are each connected in G. Similarly, we will denote by P C G the set of every partition G = {P ∈ P C : in P C whose coalitions are connected in G. More formally, P C P ∩ ConnectedSubsets(C, G) = P}. Then, given (A, v, G), the coalition structure generation problem is to find an optimal partition of A, defined as follows: CS∗ ∈ arg max P∈P A G V (P ). 2The terms "partition" and "coalition structure" will be used interchangeably throughout the paper, as common practice in the literature. 3The coalition structure generation problem has also been studied in games where partitions are evaluated differently, e.g., due to the presence of externalities [2, 7]. However, these are out of the scope of this paper, and are the focus of future work. 3 Next, we define weakly super-subadditive games. To this end, recall that a game (A, v) is weakly superadditive if: v(C ∪ C(cid:48)) ≥ v(C) + v(C(cid:48)) for any two disjoint coalitions C, C(cid:48) (i.e., merging any two coalitions is never harmful). Conversely, a game (A, v) is weakly subadditive if: v(C ∪ C(cid:48)) ≤ v(C) + v(C(cid:48)) for any two disjoint coalitions C, C(cid:48) (i.e., merging any two coalitions is never beneficial). Finally, recall that a game (A, v) is the sum of two games, (A, v1) and (A, v2), if v(C) = v1(C) + v2(C) for all C ⊆ A. In this case, we write: (A, v) = (A, v2) + (A, v2). Now, we are ready to introduce the following definition. Definition 1. A game (A, v) is (weakly) super-subadditive if it is the sum of two games: a (weakly) superadditive game, denoted by (A, vsup), and a (weakly) subad- ditive game, denoted by (A, vsub). The intuition is that (A, vsup) represents the rewards from cooperation, which is assumed to increase (weakly) with the size of the coalition. On the other hand, (A, vsub) represents the coordination costs, which are also assumed to increase (weakly) with the size of the coalition. 3. Related Work This section is divided into two subsections. The first describes the CFSS algorithm of Bistaffa et al. [1], while the second describes the DyPE algorithm of Vinyals et al. [10]. 3.1. The CFSS Algorithm Bistaffa et al. [1] proposed the CFSS algorithm. It is based on edge contraction -- a basic operation in graph theory which involves: (i) removing an edge from a graph, and (ii) merging the two nodes that were previously joined by that edge. In our context of graph-restricted games, since every node represents an agent (i.e., a sin- gleton coalition), "merging the two nodes" corresponds to merging the two coalitions that were represented by those nodes. An example is illustrated in Figure 1(A). Taking the entire graph into consideration, the contraction of an edge can be interpreted as a transition from one coalition structure to another. For instance, the contraction of the edge ({a1},{a3}) in Figure 1(B) corresponds to the transition from {{a1},{a2},{a3},{a4},{a5}} to {{a1, a3},{a2},{a4},{a5}}. Based on this ob- servation, the algorithm repeats the process of contracting different edges, in order to eventually visit all coalition structures. During this process, to ensure that each coalition structure is visited no more than once, the algorithm marks all previously- contracted edges to avoid contracting them again in the future. In Figure 1, the marked edges are illustrated as dashed lines. Here, it is important to note that the contraction of an edge may result in merging other edges. In Figure 1(B) for example, contracting ({a1},{a3}) results in merging ({a1},{a4}) with ({a3},{a4}), 4 as well as merging ({a1},{a2}) with ({a3},{a2}). Whenever this happens, if one of the merged edges happens to be dashed, the edge that results from the merger must also be dashed, again see Figure 1(B). This ensures that the agents appearing at the two ends of a dashed edge never appear together in the same coalition. Figure 1(C) illustrates the sequence in which the algorithm visits all possible coalition structures given the graph G = (A, E) where A = {a1, a2, a3, a4} and E = {(a1, a2), (a1, a4), (a3, a2), (a3, a4)}. Each coalition structure is represented as a node in the illustrated search tree, and the numbers on the edges represent the order in which the algorithm visits the different coalition structures. Consider the root for example: in its second child we make ({a1},{a2}) dashed, and contract ({a2},{a3}); in its third child we make ({a1},{a2}), ({a2},{a3}) dashed, and contract ({a3},{a4}); finally in its fourth child we make ({a1},{a2}), ({a2},{a3}), ({a3},{a4}) dashed, and contract ({a1},{a4}). in its first child we contract ({a1},{a2}); Figure 1: Illustration of how Bistaffa et al.'s algorithm works. To speed up the search, a branch-and-bound technique is used whenever the algorithm visits a node -- i.e., a partition, P -- in the search tree. The purpose of this technique is to determine whether it is worthwhile to search T P -- the sub-tree rooted at P . The general idea is to compute an upper bound, denoted UB (T P ), on 5 {a1}{a2}{a3}{a1,a3}{a2}{a1}{a2}{a3}{a4}{a5}{a1,a3}{a2}{a4}{a5}contract the edge ({a1},{a3})contract the edge ({a1},{a3}){a2}{a3}{a4}{a1}{a3}{a4}{a1,a2}{a4}{a1}{a2,a3}{a2}{a1}{a3,a4}{a4}{a1,a2,a3,a4}{a1,a2,a3}{a1,a2}{a3,a4}{a3}{a1,a2,a4}{a2}{a1,a3,a4}{a2,a3}{a1}{a1,a4}{a2,a3,a4}(A)(B)(C)1234569111078{a2}{a3}{a1,a4}a previously-contracted edge (it cannot be contracted again).an edge whose contraction is still a possibility. the values of all partitions in T P . Then, if this upper bound was not greater than the value of the best partition found so far, then the algorithm avoids searching T P . Bistaffa et al. proposed a way of computing UB (T P ) for cases where the game under consideration is weakly super-subadditive (see Section 2 for more details). In particular, it is possible to compute an upper bound U B(T P ) based on the following observations: • Every coalition structure in T P is the result of merging some (if not all) of the coalitions in P that are connected via solid edges. Here, the only constraint is that agents appearing at the two ends of a dashed edge must not appear together in the same coalition. • Merging coalitions in P can never improve solution quality in a weakly subad- ditive game. Thus, V sub(P ) = maxP∈T P V sub(P ). • Merging coalitions in P can never reduce solution quality in a weakly superad- ditive game. Thus, no solution in T P can be better than the solution obtained by: (i) removing all dashed edges, and (ii) merging all coalitions in P that are connected via solid edges. Let us denote this solution as P merge. Then, V sup(P merge) ≥ maxP∈T P V sup(P ). Based on the above observations, we can establish the following upper bound on solution quality: U B(T P ) = V sub(P )+V sup(P merge). This concludes our description of Bistaffa et al.'s algorithm. More details can be found in [1]. 3.2. The DyPE Algorithm Vinyals et al. [10] proposed a dynamic-programming algorithm called DyPE . Be- fore explaining how this algorithm works, let us first briefly describe how dynamic programming works for general games, rather than graph-restricted games. Here is the main idea: to compute an optimal partition of the set of agents, A: • First, compute an optimal partition of each strict subset of A. • After that, examine all the possible ways of splitting A into two halves, and replace one of the halves with its optimal partition. More specifically, for every non-empty subset S ⊆ A : S (cid:54)= ∅, split A into two halves, S and A \ S, and replace A\ S with opt(A\ S). Clearly, the union {S}∪ opt(A\ S) is a partition of A, and the value of this union is v(C) + v∗(A \ S). Furthermore, the best such union (i.e., the one with the largest value) is an optimal partition of A. Importantly, the above process can be carried out recursively, as captured by the following formula: (cid:0)v(S) + v∗(C \ S)(cid:1) (1) v∗(C) = max S⊆C:S(cid:54)=∅ 6 Having described a general dynamic programming formula, we now explain how DyPE speeds up this formula when the game is restricted by a graph. The main idea is to use a pseudotree. Basically, given a graph G = (A, E), the pseudotree of G, denoted by PT G, is a rooted tree such that: (i) the set of nodes of PT G is the set of agents, and (ii) any two agents who share an edge in G appear on the same branch in PT G (an example is illustrated in Figure 2). Let us now explain how DyPE uses the pseudotree to speed up the formula. To this end, let bi denote the agent at the ith position of the breadth-first order of nodes in PT G. In Figure 2(B) for example, that order is: (a3, a1, a4, a2, a5), and so b1 = a3 while b4 = a2. Now, the broad idea behind DyPE is to start with the last agent in the breadth-first order, bn, and then move to bn−1, then bn−2 and so on until it reaches b1. Let bDyPE denote the agent at which DyPE has reached in the breadth-first order at any point in time during execution. Then, for each bDyPE , the algorithm solves the following sub-problems: (cid:27) (2) (cid:26) (C, v, G)(cid:12)(cid:12) (C∈ConnectedSubsets({bDyPE ,··· ,bn},G)) ∧(bDyPE∈C) ∧(A\C∈ConnectedSubsets(A,G)) The pseudo code of DyPE is shown in Algorithm 1. For a proof of the correctness of this algorithm, see [10]. Figure 2: A sample graph G and its corresponding pseudotree PT G. 4. Our Tree-Search Algorithm -- TSP As mentioned earlier in the introduction, Rahwan et al. [6] developed an algorithm for general coalition structure generation problems, which combined a tree-search algorithm with a dynamic-programming algorithm, resulting in a combination that is superior to both its constituent parts. So why not develop a similar hybrid algo- rithm for graph-restricted games? Perhaps the most natural starting point would be to try and combine CFSS -- an existing tree-search algorithm -- with DyPE -- an existing dynamic-programming algorithm. Unfortunately, however, as we have seen in the above section, both algorithms are based on very different ideas; one is based on edge contraction, while the other is based on a pseudo tree. As such, the two seem incompatible, or at least hard to combine smoothly. With this in mind, our goal in this section is to develop a tree-search algorithm that can be combined with DyPE . 7 a1a3a2(A)(B)a4a5a5a3a2a1a4graph 𝐺pseudotree 𝑃𝑇𝐺 Algorithm 1: DyPE (A, v, G, PT G). Input: A graph-restricted game (A, v, G), and a pseudotree, PT G. Output: An optimal coalition structure over A. 1 for bDyPE = bn to b2 do // iterate over all sub-problems in (2): foreach C ∈ ConnectedSubsets({bDyPE ,··· , bn}, G) such that (bDyPE ∈ C) ∧ (A \ C ∈ ConnectedSubsets(A, G)) do // Compute v∗(C) and bestSubset(C) (in lines 3 to 8): v∗(C) ← −∞; foreach S ∈ ConnectedSubsets(C, G) : bDyPE ∈ S do // iterate over T∈connectedComponents(C\S) v∗(T ); // Compute the value ← v(S) +(cid:80) all non-empty subsets of C that are each connected in G and contain bDyPE . value of {S} ∪ opt(C \ S), i.e., compute v(S) + v∗(C \ S). if v∗(C) < value then v∗(C) ← value; bestSubset(C) ← S; // Compute v∗(A) and bestSubset(A) (in lines 9 to 14): 9 v∗(A) ← −∞; 10 foreach S ∈ ConnectedSubsets(A, G) : b1 ∈ S do // iterate over all non-empty subsets of A that are each connected in G and contain b1. T∈connectedComponents(A\S) v∗(T ); value ← v(S) +(cid:80) if v∗(A) < value then v∗(A) ← value; bestSubset(A) ← S; 2 3 4 5 6 7 8 11 12 13 14 17 // Compute an optimal coalition structure over A (in lines 15 to 17): 15 opt(A) ← {A}; 16 while ∃C ∈ opt(A) : C (cid:54)= bestSubset(C) do replace every C ∈ opt(A) with bestSubset(C), C \ bestSubset(C); 18 return opt(A); 8 We build our algorithm around the pseudotree representation used by DyPE ; the hypothesis here is that if the two algorithms were built around the same represen- tation, it should be possible to combine the two smoothly and effectively. Based on this, we call our algorithm TSP , where TS stands for Tree-Search, and P stands for Pseudotree. The pseudo code of TSP can be found in Algorithm 2. In more detail, the algorithm takes as input a graph-restricted game, (A, v, G), and a pseudotree PT G. First, in lines 1 to 4, it initializes CS† -- the current best solution -- to either be equal to {A} or {{a1}, . . . ,{an}}, whichever has higher value. After that, in line 5, it uses the parameter bTSP to iterate over the agents in a breadth-first order in PT G, starting with b2, and ending with bn.4 Let us denote by bTSP−1 the agents who is just before bTSP in the breadth-first order. Now, for every bTSP , the algorithm enumerates all the coalitions that are each connected in G, and contain every agent in {b1,··· , bTSP−1} but do not contain bTSP (line 6). For every such coalition, C, the algorithm sets the current partition, P †, to be equal to {C} (line 7). Finally, in † G, P †, CS†) to search through the coalition line 8, it used the function search(PT structures that are supersets of P †, i.e., the coalition structure that contain C. Basically, this recursive function generates different partitions while trying to avoid the unpromising ones using a branch-and-bound technique. Next, we explain how this function works. † G, P †, CS†) is given in Algorithm 3. Here, C† denotes the agents that are not in P † (line 1 of Algorithm 3), while a† denotes the first agent in the breadth-first order who is not in P † (line 2). Then, out of all the connected coalitions that can be added to P †, the algorithm always starts by adding to P † a coalition containing a† (lines 3 and 4). Now if the new P † is a coalition structure over A, then the algorithm updates CS† -- the best solution found so far (lines 5 to 7). Otherwise, it computes an upper bound on the value of every partition of A that is a superset of the new P † (line 9). Based on this upper bound, the algorithm determines whether it is worthwhile to consider adding more coalitions to the new P † (line 10). If so, then it makes a recursive call with the new P † (line 11). The function computeUpperBound(P †) -- which computes the aforementioned upper bound -- can be specified based on any additional domain knowledge. For instance, if the game is known to be super-subadditive, then this function may return: V (P †) + vsup(C†) +(cid:80) The pseudo code of search(PT ai∈C† vsub({ai}). 5. Our Hybrid Algorithm -- D-TSP In this section, we present D-TSP -- a hybrid algorithm that combines DyPE with TSP in a way that obtains the best features of both. First, we introduce the neces- 4See Section 3.2 for more details on the breadth-first order of agents in PT G. 9 Algorithm 2: TSP (A, v, G, PT G). Input: A graph-restricted game (A, v, G), and a pseudotree PT G. Output: An optimal coalition structure over A. // initialize CS†---the current best solution (lines 1 to 4). 1 if V ({A}) > V ({{a1}, . . . ,{an}}) then CS† ← {A}; 2 3 else 4 CS† ← {{a1}, . . .{an}}; // Search through different coalition structures (lines 5 to 8). 5 for bTSP = b2 to bn do // iterate over all non-empty subsets of A that are each connected in G and do not contain bTSP but contain every agent before bTSP in the breadth-first order. foreach C ∈ ConnectedSubsets(A, G) : {b1,··· , bTSP−1} ⊆ C ⊆ A \ {bTSP} do † G, P †, CS†); // updated CS† by searching through the P † ← {C}; // initialize P †---the current partition. CS† ← search(PT partitions of A that are supersets of P †. 6 7 8 9 return CS†; sary modifications of each algorithm (Subsections 5.1 and 5.2), and then show how to combine the modified versions (Subsection 5.3). 5.1. DyPE∗ -- a Modified Version of DyPE In this subsection, we modify DyPE such that it becomes an anytime algorihtm, i.e., it does not only return a solution after termination, but also returns interim solutions during execution. This clearly adds more resilience against failure. For example, if the algorithm runs out of memory during execution, then instead of wasting all the effort that the algorithm has put before the failure, it would at least return a valid solution using all the sub-problems that it has already solved. Before introducing our modifications, let us first revisit DyPE and analyze the way it works. Looking at Algorithm 1, one can see that DyPE ultimately boils down to the following main steps: • Step 1: with bDyPE running from bn to b2, solve the following sub-problems: (C, v, G) such that C ⊆ {bDyPE , . . . , bn} and bDyPE ∈ C and A\ C is connected (lines 1 to 8 of Algorithm 1). • Step 2: for each subset S ∈ ConnectedSubsets(A, G) : b1 ∈ S, compute the value of the best coalition structure containing S (lines 10 and 11 of Algo- rithm 1). 10 Algorithm 3: search(PT G, P †, CS†) -- a function used in TSP . Input: PT G -- the pseudotree, P † -- the current partition (which does not yet Output: The best partition of A that is a superset of P †. 1 C† ← A \(cid:83) P †;// i.e., C† consists of all agents not in P †. contain all agents in A), and CS† -- the current best solution. 2 a† ← bi : (bi ∈ C†) ∧ ({b1,··· , bi−1} ∩ C† = ∅);// i.e., a† is the first agent in 3 foreach C ∈ ConnectedSubsets(C†, G) : a† ∈ C do // iterate over all non-empty the breadth-first order who is not in P †. subsets of C† that are each connected in G and contain a†. P † ← P † ∪ {C}; C† ← A \ C; // add C to P † and remove it from C†. if C† = ∅ then // if P † is a coalition structure over A. if V (CS†) < V (P †) then CS† ← P †; 4 5 6 7 8 9 10 11 12 else UB ← computeUpperBound(P †) // compute an upper bound on the value of every partition of A that is a superset of P † if V (CS†) < UB then // apply the branch-and-bound technique. search(PT † G, P †, CS†); // recursive call. P † ← P † \ {C}; C† ← A ∪ C; // remove C from P † and add it to C†. 13 return CS†; The problem with the above process is that DyPE does not examine a single coalition structure over A until it has finished Step 1 -- a step which involves solving sub-problems the number of which may be exponential (depending on the topology of the graph). Let us now consider a sample subset that the algorithm encounters during Step 2, given a problem of 7 agents. Let this subset be S = {b1, b2, b3, b6}. When the algorithm encounters this particular S, it will compute the value of the best coalition structure containing {b1, b2, b3, b6}, using the already-computed solu- tions to the following sub-problems: (T, v, G) where T is a connected component in the sub-graph induced by {b4, b5, b7} (see line 11 of Algorithm 1). Our critical obser- vation is that the solutions to the aforementioned sub-problems were all computed when DyPE finished dealing with bDyPE = b4 in Step 1. More specifically, at that moment, DyPE has already solved the following sub-problems: • (C, v, G) where A \ C is connected and b7 ∈ C and C ⊆ {b7}; • (C, v, G) where A \ C is connected and b6 ∈ C and C ⊆ {b6, b7}; • (C, v, G) where A \ C is connected and b5 ∈ C and C ⊆ {b5, b6, b7}; 11 Figure 3: The illustration. • (C, v, G) where A \ C is connected and b4 ∈ C and C ⊆ {b4, b5, b6, b7}. The above sub-problems surely include every (T, v, G) where T is a connected com- ponent in the sub-graph induced by {b4, b5, b7}. In other words, after solving the above sub-problems, DyPE had all the information needed to compute the value of the best coalition structure containing {b1, b2, b3, b6}. This suggests that DyPE can be modified such that it examines certain coalition structures during Step 1, not after Step 1. Based on the above observation, we modify DyPE such that, instead of following the above two steps, it follows txhis one: • Step 1: with bDyPE running from bn to b2: 12 (A)(B)𝑃𝑇𝐺𝑎9𝑎1𝑎8𝑎5𝑎10𝑎7𝑎14𝑎6𝑎4𝑎15𝑎2𝑎3𝑎12𝑎13𝑃𝑇𝐺ϯ. Here, 𝑃ϯis still empty𝑎11𝑎9,𝑎10,𝑎11𝑎1𝑎2,𝑎3𝑎12,𝑎13(C)The remaining agents, after adding {𝑎1,𝑎3,𝑎4,𝑎8}to 𝑃ϯ. Now, Nϯ=𝑎2𝑎14𝑎15𝑎2𝑎14𝑎15The remaining agents after adding {𝑎2,𝑎5,𝑎6,𝑎7}to 𝑃ϯ. Now, Nϯ={𝑎9,𝑎10,𝑎11}(D)𝑎8𝑎5𝑎7𝑎14𝑎6𝑎4𝑎15𝑎5𝑎7𝑎6𝑎9,𝑎10,𝑎11𝑎12,𝑎13𝑎12,𝑎13𝑎9,𝑎10,𝑎11after adding {a9,a10}to 𝑃ϯ,we have Nϯ={𝑎10}(E)𝑎14𝑎15𝑎12,𝑎13𝑎10after adding {a10}to 𝑃ϯ, we have Nϯ= {𝑎12,𝑎13}(F)𝑎14𝑎15𝑎12,𝑎13after adding {a12,a15}to 𝑃ϯ,Nϯ={𝑎13}(G)𝑎14𝑎13after adding {a13,a14}to 𝑃ϯ,the function ''search'' would have generated the partition 𝑃(H) -- Step 1.1: solve the following sub-problems: (C, v, G) such that C ⊆ {bDyPE , . . . , bn} and bDyPE ∈ C and A \ C is connected. -- Step 1.2: for each subset S ∈ ConnectedSubsets(A, G) such that bDyPE /∈ S and {b1, . . . , bDyPE−1} ⊆ S, compute the value of the best coalition structure containing S. One can easily see that, with the above steps, the algorithm will never consider the same S more than once. Moreover, whenever a certain S is encountered, all relevant sub-problems of A \ S have already been solved, including every (T, v, G) where T is a connected component in the sub-graph induced by A \ S. We call the modified version DyPE∗. The pseudo code is provided in Algo- rithm 4. As can be seen, this an anytime algorithm, unlike DyPE . 5.2. TSP∗ -- a Modified Version of TSP Our goal in this subsection is to modify TSP such that it can take advantage of any solutions to sub-problems that were already computed by DyPE∗. To this end, let us first analyze how TSP works. Looking at Algorithm 2, one can see that TSP ultimately boils down to the following main steps: • Step 1: with bTSP running from b2 to bn, set the current partition P † to be equal to some {C}, where C is a connected coalition that does not contain bTSP , but contains all of: b1, . . . , bTSP−1 (lines 5 to 7 of Algorithm 2).5 -- Step 1.1: keep adding different coalitions to P †, thus obtaining different coalition structures over A (line 8 of Algorithm 2). Any coalition added to P † must contain a† -- the first agent in the breadth-first order who is not already in P † (see line 2 of Algorithm 3). Every time a new coalition is added to P †, a branch-and-bound technique is used to check whether the coalitions that are in P † are promising (lines 9 to 11 of Algorithm 3). During the above process, for any given P †, the algorithm will try all possible coali- tion structures that are supersets of P †, except those that are deemed unpromising by the branch-and-bound technique. In other words, it will try adding to P † every promising partition of A \(cid:83) P †. Importantly, however, if we were to run DyPE∗ in partition of A \(cid:83) P † easily using the partial results of the former. This is based on • A \(cid:83) P † ⊆ {a†, . . . , bn}. This is simply because a† is by definition the first parallel with TSP , then the latter algorithm may be able to construct an optimal the following two observations: agent in the breadth-first order who is not in P †. 5Recall that bTSP−1 denotes the agent just before bTSP in the breadth-first order of agents in the pseudo tree PT G. 13 Algorithm 4: DyPE∗(A, v, G, PT G). Input: A graph-restricted game (A, v, G), and a pseudotree, PT G. Output: An optimal coalition structure over A. 1 CS† ← {A};// initialize CS†---the current best solution, which is needed in this anytime version of DyPE. 2 for bDyPE = bn to b2 do 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 // iterate over all sub-problems in (2): foreach C ∈ ConnectedSubsets({bDyPE ,··· , bn}, G) such that (bDyPE ∈ C) ∧ (A \ C ∈ ConnectedSubsets(A, G)) do // Compute v∗(C) and bestSubset(C) (in lines 4 to 8): v∗(C) ← −∞; foreach S ∈ ConnectedSubsets(C, G) : bDyPE ∈ S do // iterate over T∈connectedComponents(C\S) v∗(T );// Compute the value ← v(S) +(cid:80) all non-empty subsets of C that are each connected in G and contain bDyPE . value of {S} ∪ opt(C \ S), i.e., compute v(S) + v∗(C \ S). if v∗(C) < value then v∗(C) ← value; bestSubset(C) ← S; // Search every coalition structure containing a connected coalition whose members include b1, · · · , bDyPE−1, but not bDyPE : foreach S ∈ ConnectedSubsets(A, G) : {b1,··· , bDyPE−1} ⊆ S ⊆ A \ {bDyPE} do value ← v(S) +(cid:80) T∈connectedComponents(A\S) v∗(T ); if v∗(A) < value then v∗(A) ← value; bestSubset(A) ← S; CS† ← {S} ∪ connectedComponents(A \ S); while ∃C ∈ CS† : C (cid:54)= bestSubset(C) do replace every C ∈ CS† with bestSubset(C) and C \ bestSubset(C); 18 return CS†; 14 • if the current bDyPE happens to be before a† in the breadth-first order, then DyPE∗ has already computed all relevant sub-problems (C, v, G) such that C ⊆ {a†, . . . , bn} (see Sectino 5.1 for more details). Based on the above observations, we propose a modified version of TSP , called TSP∗, which works as follows. Whenever bDyPE happens to be before a† in the breadth-first order, TSP∗ does not try the different partitions of A \(cid:83) P †, but (cid:88) instead computes the value of an optimal such partition as follows: v∗(T ). P †) = T∈connectedComponents(A\(cid:83) P ) V ∗(A \(cid:91) Now, if V (P ) + V ∗(A \(cid:83) P †) happens to be greater than V (CS†) -- the value of the (cid:83) P †) because it is better than CS†. This computation can be done as follows. First, the algorithm sets CS† to be equal to P †∪ connectedComponents(A\(cid:83) P ), and then current best solution, then TSP∗ needs to compute a coalition structure P †∪opt(A\ iteratively replaces every C ∈ CS† with bestSubset(C) and A \ bestSubset(C). This is done until C = bestSubset(C) for all C ∈ CS†. 5.3. Combining DyPE∗ with TSP∗ In this subsection, we introduce D-TSP , an algorithm that runs both DyPE∗ and TSP∗ in parallel, such that they aid each other during the search. Basically, D-TSP is based on the following observations: • DyPE∗ solves sub-problems in the following sequence (see Sectino 5.1 for more details). With bDyPE running from bn to b2 -- it solves the sub-problems: (C, v, G) such that C ⊆ {bDyPE , . . . , bn} and bDyPE ∈ C and A \ C is connected (see lines 2 and 3 of Algorithm 4). -- it searches all coalition structures containing a connected coalition C where: {b1, . . . , bDyPE−1} ⊆ C ⊆ A \ {bDyPE}. • We deliberately designed TSP∗ such that it searches coalition structures in the following sequence. With bTSP running from b2 to bn, it searches all coalition structures containing a connected coalition C where: {b1,··· , bTSP−1} ⊆ C ⊆ A \ {bTSP} . Note that bDyPE runs from bn to b2, while bTSP runs from b2 to bn. Thus, based on the above observations, when the position of bDyPE becomes smaller than that of bTSP , the algorithms DyPE∗ and TSP∗ would have jointly searched the entire space, at which case D-TSP terminates. 15 Figure 4: Very preliminary simulation results. The number of agents runs from 10 to 22 (x-axis. 6. Performance Evaluation Figure 4 presents very preliminary simulation results. 7. Conclusions and Future Work Our aim was to develop a coalition structure generation problem for graph-restricted games. Our inspiration came from an algorithm for general coalition structure gen- eration problems, which combined a dynamic-programming algorithm with a tree- search algorithm, resulting in a combination that is superior to both its constituent parts [6]. Following these guidelines, we developed a tree-search algorithm, called TSP to be compatible with an existing dynamic-programming algorithm, called DyPE [10]. After that, we showed how to modify the two algorithms such that they are compatible with each other. Specifically, we modified DyPE to make an anytime algorithm that returns interim solutions, and modified TSP such that it solutions to sub-problems that were computed by DyPE at any point in time. Af- ter that, we showed that the modified version of DyPE gradually covers the search space from a certain direction, while the modified version of TSP gradually covers the search space from the opposite direction; the two algorithms terminate when they meet each other somewhere in the middle. This way, the portion searched by each algorithm will naturally reflect its relative strength on the problem instance at hand. Our future work involves evaluating D-TSP empirically on a wider range of graph-restricted games. 16 Acknowledgements This work was supported by the Polish National Science Centre grant number 2014/13/B/ST6/01807. Tomasz P. Michalak was also supported by the European Research Council under Advanced Grant 291528 ("RACE"). References [1] Bistaffa, F., Farinelli, A., Cerquides, J., Rodr´ıguez-Aguilar, J., and Ram- churn, S. D. 2014. Anytime coalition structure generation on synergy graphs. In Pro- ceedings of the 13th International Conference on Autonomous Agents and Multi-agent Systems. AAMAS '14. 13 -- 20. [2] Michalak, T., Rahwan, T., Sroka, J., Dowell, A., Wooldridge, M., McBur- ney, P., and Jennings, N. R. 2009. On representing coalitional games with externali- ties. In ACM EC '09: Tenth ACM Conference on Electronic Commerce. 11 -- 20. [3] Myerson, R. 1977. Graphs and cooperation in games. Mathematics of Operations Research 2, 3, 225 -- 229. [4] Rahwan, T. and Jennings, N. R. 2008. An improved dynamic programming algo- rithm for coalition structure generation. In AAMAS'08: Seventh International Conference on Autonomous Agents and Multi-Agent Systems. 1417 -- 1420. [5] Rahwan, T., Michalak, T., Elkind, E., Wooldridge, M., and Jennings, N. R. 2014. An exact algorithm for coalition structure generation and complete set partitioning. http://www.cs.ox.ac.uk/publications/publication6962-abstract.html . [6] Rahwan, T., Michalak, T., and Jennings, N. R. 2012. A hybrid algorithm for coalition structure generation. In Proceedings of the 26th AAAI Conference on Artificial Intelligence (AAAI-2012). [7] Rahwan, T., Michalak, T., Wooldridge, M., and Jennings, N. R. 2012. Anytime coalition structure generation in multi-agent systems with positive or negative externali- ties. Artificial Intelligence 186, 0, 95 -- 122. [8] Rahwan, T., Michalak, T., Wooldridge, M., and Jennings, N. R. 2015. Coali- tion structure generation: A survey. Artificial Intelligence 229, 0, 139 -- 174. [9] Rahwan, T., Ramchurn, S. D., Giovannucci, A., and Jennings, N. R. 2009. An anytime algorithm for optimal coalition structure generation. Journal of Artificial Intelligence Research (JAIR) 34, 521 -- 567. [10] Vinyals, M., Voice, T., Ramchurn, S., and Jennings, N. R. 2013. A hi- erarchical dynamic programming algorithm for optimal coalition structure generation. http://arxiv.org/abs/1310.6704 . 17
1803.04927
1
1803
2018-03-13T16:36:10
An Agent-Based Simulation of Residential Location Choice of Tenants in Tehran, Iran
[ "cs.MA", "cs.AI", "cs.CY" ]
Residential location choice modeling is one of the substantial components of land use and transportation models. While numerous aggregated mathematical and statistical approaches have been developed to model the residence choice behavior of households, disaggregated approaches such as the agent-based modeling have shown interesting capabilities. In this article, a novel agent-based approach is developed to simulate the residential location choice of tenants in Tehran, the capital of Iran. Tenants are considered as agents who select their desired residential alternatives according to their characteristics and preferences for various criteria such as the rent, accessibility to different services and facilities, environmental pollution, and distance from their workplace and former residence. The choice set of agents is limited to their desired residential alternatives by applying a constrained NSGA-II algorithm. Then, agents compete with each other to select their final residence among their alternatives. Results of the proposed approach are validated by comparing simulated and actual residences of a sample of tenants. Results show that the proposed approach is able to accurately simulate the residence of 59.3% of tenants at the traffic analysis zone level.
cs.MA
cs
An Agent-Based Simulation of Residential Location Choice of Tenants in Tehran, Iran Ali Shirzadi Babakan and Abbas Alimohammadi This is an Author's Original Manuscript (Preprint) of an Article Published by John Wiley & Sons in Transactions in GIS, 2016, Vol. 20, No. 1, 101-125. DOI: 10.1111/tgis.12144 To link to this article: http://onlinelibrary.wiley.com/doi/10.1111/tgis.12144/full Abstract Residential location choice modeling is one of the substantial components of land use and transportation models. While numerous aggregated mathematical and statistical approaches have been developed to model the residence choice behavior of households, disaggregated approaches such as the agent-based modeling have shown interesting capabilities. In this paper, a novel agent- based approach is developed to simulate the residential location choice of tenants in Tehran, the capital of Iran. Tenants are considered as agents who select their desired residential alternatives according to their characteristics and preferences to various criteria such as the housing rent, accessibility to different services and facilities, environmental pollutions, and distance from their workplace and former residence. The choice set of agents is limited to their desired residential alternatives by applying a constrained NSGA-II algorithm. Then, agents compete with each other to select their final residence among their alternatives. Results of the proposed approach are validated by comparing simulated and actual residences of a sample of tenants. Results show that the proposed approach is able to accurately simulate the residence of 59.3% of tenants at the traffic analysis zones level. Keywords Residential location choice, Agent-based modeling, Multi-objective decision making, Tenant household, Tehran. 1 1. Introduction There are strong interactions between land use and transportation. For studying these interactions, numerous land use and transportation models have been developed. These models have been reviewed by many researchers (e.g. (Chang, 2006 ; Iacono et al., 2008)). One of the most important components of land use and transportation models is residential location choice modeling (Sener et al., 2011 ; Chang & Mackett, 2006). Many activities and urban travels of individuals are influenced by their residence. Thereby, residential location choice process of households can directly or indirectly affect various aspects of a city including transportation system, land uses, utilities, and socio-economic structures. Thus, this process has received high attention from many researchers in different fields such as urban planning, transportation, geography, and geosciences. Residential location choice modeling has been initiated by Alonso (1960) and Lowry (1964) who applied economic and spatial interaction principles in their models. A decade later, Lerman (1976) and Mcfadden (1978) pioneered the use of discrete choice models in this area. In discrete choice models, still widely used in recent researches, utilities of a finite number of alternatives are calculated and the one with the maximum utility is selected. Within this class of models, multinomial logit (MNL) and nested logit (NL) are the most commonly used models (Sener et al., 2011 ; Rashidi et al., 2012). However, conventional models generally use zone-based aggregated characteristics of households and are insensitive to inherent heterogeneities among individual households. This issue has been recognized as one of the main sources of error in these models (Arentze et al., 2010 ; Benenson, 2004). Therefore, disaggregated models such as the microsimulation and agent-based models have found wider application. In this paper, a novel agent-based approach has been developed to simulate the residential location choice of tenants in Tehran, Iran. Agent-based modeling have opened new ways to theoretically and experimentally model complex phenomena such as the urban system (Barros, 2004). An Agent-based model is composed of multiple interacting elements (agents) with some level of autonomy which can perceive their environment and act to change the environment according to their desires and objectives. These models almost have no limitations for directly representing and simulating behavior of urban elements including individuals and households (Pagliara & Wilson, 2010). They are "bottom-up" approaches, in which the behavior of system is emerged from the aggregation of agents' behavior. In agent-based residential location choice modeling, households can be represented as agents who decide to move and choose new dwellings and thereby affect behavior of other agents and urban components. In fact, from the perspective of agent-based modeling, regional or urban patterns of residential locations are outcomes of agents' residence choice behavior (Benenson, 2004). There are many agent-based studies to model the housing market and residential location choice of households (e.g. Otter et al., 2001 ; Benenson, 2004 ; Jordan et al., 2012 ; Ettema, 2011 ; Rosenfield et 2 al., 2013 ; Devisch et al., 2009 ; Haase et al., 2010 ; Gaube & Remesch, 2013 ; Jackson et al., 2008). In addition to these studies, a new generation of comprehensive urban models such as ALBATROSS1 (Arentze & Timmermans, 2004), RAMBLAS2 (Veldhuisen et al., 2000), MUSSA3 (Martinez & Donoso, 2010 ; Martinez, 1996), ILUTE4 (Salvini & Miller, 2005 ; Miller & Salvini, 2001), UrbanSim5 (Waddell, 2002 ; Waddell et al., 2003), and ILUMASS6 (Strauch et al., 2005) have been developed using microsimulation, cellular automata, and agent-based models. A detailed review of agent-based residential location choice models can be found in (Huang et al., 2014). In almost all previous agent-based models, residential location choice is based on a utility-measuring or suitability-measuring function (Huang et al., 2014). There are rare studies (e.g. Jackson et al., 2008) which have utilized different heuristic or non-heuristic approaches in this area. Therefore, in this study, a novel two-step agent-based approach is proposed for residential location choice modeling which is the main contribution of this paper. In the first step of the proposed approach, a multi-objective decision making method, non-dominated sorting genetic algorithm II (NSGA-II), is introduced for evaluating residential alternatives by certain criteria and restricting the choice set of agents to a finite number of their desired residential alternatives. As far as the authors know, multi-objective decision making methods have not been used for determining a set of residential alternatives. For this purpose, two general approaches including consideration of all alternatives and random selection of some alternatives have been used by researchers. However, both approaches can raise some concerns. For example, the former unrealistically assumes that households search all alternatives, and the latter may result in inaccurate estimations (Rashidi et al., 2012). In addition to these general approaches, some researchers such as Rashidi et al. (2012) have proposed heuristic approaches to form smaller and more manageable choice sets. But, these approaches also have some limitations, for example, Rashidi et al. (2012) only considered average work distance for choice set formation, while there are several criteria such as property value and neighborhood characteristics that clearly affect the selection of residential alternatives. However, the proposed multi-objective decision making method in this paper allows modelers to use various criteria and objectives for determining a set of residential alternatives which leads to more realistic results. In the second step, a heuristic competition mechanism is suggested in which agents compete with each other to select their final residence among their desired residential alternatives. This means that the residence choice of each agent is influenced by choices of the other agents. This is a critical issue which is not supported by the conventional models due to their inherent aggregated nature. As a result, in this 1 A Learning-Based Transportation Oriented Simulation System 2 Regional planning model based on the microsimulation of daily activity patterns 3 A Land Use Model for Santiago City 4 Integrated Land Use, Transportation, Environment 5 Urban Simulation model 6 Integrated Land-Use Modeling and Transportation System Simulation 3 paper, agents may not reside in their best residential option, because it may be previously occupied by another agent looking for a residence. This is more similar to the actual process of residential choice of households in the real world. The main objective of this paper is the spatially explicit simulation of residential location choice of individual tenants. The proposed approach is a useful tool for simulating the residential location choice behavior of individual households and spatially explicit distribution of different socio-economic categories of population. The approach then can be used by urban planners and policy makers to investigate effects of different plans and policies on these concerns. As a case study, the proposed approach is implemented in Tehran, the capital of Iran. Although more than 50 years have passed since the beginning of residential location choice modeling in the world, there is little research conducted in this area in Tehran. Tehran contains a large number of tenants who change their residence every year, but the residential location choice behavior of this population has been never studied. Awareness of spatial distribution of different socio-economic categories of tenants and their residential choice behavior is a basic requirement for effective urban planning. In order to address this requirement, a practical microsimulation approach is proposed in this paper. The proposed approach can greatly help urban planners and policy makers in Tehran to simulate different land use and transportation scenarios and predict their impacts on residential location choice patterns of different socio-economic groups of population. The rest of the paper is organized as follow. A background of rental residence choice in Tehran is presented in Section 2. Section 3 provides a detailed explanation of the proposed agent-based approach. In section 4, the proposed approach is implemented in Tehran metropolis and results are presented. Section 5 provides validation results of the proposed approach followed by the discussion and conclusion in section 6. 2. Background: Rental residence choice in Tehran, Iran Tehran, the capital of Iran, with an area of about 750 km2 is located at longitude of 51 8(cid:1) to 51 37(cid:1) and latitude of 35 34(cid:1) to 35 50(cid:1). According to the census conducted by the Statistical Center of Iran in 2011, Tehran's population is 7,803,883, composed of 2,245,601 households, of which about 950,000 are tenants (Tehran Municipality, 2013b). Tehran consists of 560 traffic analysis zones (TAZs) of which 532 zones include residential areas (Figure 1). In this paper, these zones are used as the spatial units for simulating residential location choice of tenants. 4 Figure (1): Spatial distribution of 560 traffic analysis zones (TAZs) of Tehran The process of renting a residence in Iran is substantially different from those of the other countries. In Iran, landlords determine the rent of their properties by considering neighborhood characteristics and other attributes of the property. Then, usually the first tenant who affords and likes the property, rents it (Habibi & Ahari, 2005). Study of the process of renting a house in Tehran and consultation with real estate agencies show that landlords usually don't like to rent their properties to singles or households with many members. Therefore, if a number of households simultaneously ask to rent a property, couple households have a greater chance of success. The period of renting a house usually is one year in Iran. After one year, if the landlord and tenant don't reach an agreement for extension of the renting contract for the next year, the tenant has to leave his residence and to look for a new residence (Habibi & Ahari, 2005). According to the available statistics, about 30% of tenants in Tehran change their residence every year (Tehran Municipality, 2013b). This research is an attempt to simulate residential location choice process of these households. Therefore, in this paper, it has been assumed that agents want or have to change their residence and attempt to rent the best possible residence according to their characteristics and preferences. It should be noted that due to some reasons such as having low incomes, low prices of fuel and public transit fares, high housing rents and existence of more employment opportunities in Tehran, some tenants prefer to reside in the surrounding cities of Tehran such as Karaj, Shahriar, Robat Karim, Eslamshahr, and Pardis, while their workplaces are located in Tehran. These cities are located in approximately short distances, less than 40 km, from Tehran. Therefore, these tenants commute between these cities and Tehran every day by their private car or public transit including bus, taxi and train. These tenants are not considered in this study. However, it is assumed that tenants who cannot reside in any residential zone of Tehran may have to move to one of these cities. 5 3. Proposed approach In the proposed agent-based simulation of rental residence choice, tenants are simulated as agents who look for a preferred residence. They search among residential zones and select their appropriate residential alternatives by considering some criteria such as housing rent, environmental pollutions, distance from their workplaces and former residence, and accessibility to various services. Finally, to select their preferred residence, agents compete with each other. General framework of the proposed approach is shown in Figure (2). This framework consists of three basic modules including; I) generation of tenants (agents) using the Monte Carlo simulation, II) determination of desirable residential alternatives of agents using NSGA-II, and III) competition between agents to determine their final residence. These modules are briefly explained below. Agent generation (Monte Carlo Simulation) Number of Members Age of Members Monthly Income Required Residential Area Number of Cars Number and Workplaces of Employees Criteria and Preferences Agents Residential Alternatives selection Accessibility to transportation Environmental pollutions Restrictions of the traffic plans Housing Rent Multi-Objective Decision Making (NSGA II) Preferred Alternatives Accessibility to public facilities Distance from the workplace Distance from the former residence Competition and Residence choice Number of Members Monthly Income Age of the Members Agent-based Modeling Residence Figure (2): General framework of the proposed approach 6 3.1. Agent generation The first module of the proposed approach is generation of tenants (agents) with required attributes for simulating their residential location choice behavior. Demographic and socio-economic attributes of agents are generated using the Monte Carlo simulation such that their aggregated average and standard deviation match with those of the available aggregated data in every zone (Tehran Municipality, 2013b). For this purpose, a sequential approach is used in which some attributes of households are simulated based on the previously determined attributes. This approach has been applied by Miller et al. (2004) in ILUTE model. In this approach, initially the number and age of members and monthly income of agents are generated using the Monte Carlo simulation such that the aggregated average and standard deviation of these attributes in each zone closely match to the available zone-based data of mean income, household size and percentages of different age groups provided by Tehran Municipality (2013b). Then, the number of cars and employees and the required residential area of agents are generated based on their previous attributes using the Monte Carlo simulation. Subsequently, using the available records of employment rate in different zones and general patterns of home-to-work travel distances (Tehran Municipality, 2013a), workplaces of employed members of agents are randomly allocated to zones. The employment capacity (EC) of each zone is computed by Eq. (1): (cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:9)(cid:10)(cid:11) (cid:12)(cid:13)(cid:14)(cid:15) (cid:12)(cid:13)(cid:14) (cid:16)(cid:14)(cid:17)(cid:18) (cid:19)(cid:12)(cid:20) where Nei is the total number of employments in zone i and Na is the total number of agents. Finally, residential criteria and preferences of agents are generated using the Monte Carlo simulation based on their previously simulated attributes. Depending on their demographic and socio-economic characteristics, agents use different criteria and preferences to select their residential zone. In order to simulate these criteria and preferences, stated preferences of 330 sample tenants with different characteristics were surveyed by filling questionnaires. Because of the lack of suitable sample data and limitations of collecting a large data set, a sample data consisting of 330 tenants were surveyed. Although this sample seems relatively small to represent the whole target population, due to surveying from different residential areas of Tehran, it covers tenants with various demographic, socio-economic and cultural characteristics. Statistical distribution of the sample data shows that it properly represents different categories of the target population (Table (1)). Sample tenants stated their preferences in three linguistic levels of importance including 'very important', 'important', and 'not important' in the questionnaires. It should be noted that tenants were quite justified to state 'important' and 'very important' preferences only for criteria which are actually considered by them in their residential location choice process. A summary of characteristics, preferred criteria, and percentage of tenants who stated 'very important' or 'important' preferences for each criterion is presented in Table (1). 7 Table (1): A summary of characteristics and preferred criteria of surveyed households Attribute Category Number Percentage Average Residential Area (m2) Housing Rent Accessibility to Educational Locations Accessibility to shopping Locations Accessibility to Green and Recreational Locations Preferred Criteria (%) Accessibility to Cultural Locations Accessibility to health Locations Accessibility to Highways Accessibility to Subway Stations Accessibility to Bus Stations Air and Noise Pollutions Distance from the Workplace Distance from the Former Residence Without Traffic Restrictions Size Monthly income (million IRR)* Number of Cars Total Single Couple 3-4 > 4 < 7.5 7.5-30 > 30 0 1 > 1 28 97 171 34 69 204 57 34 231 65 330 8.5 29.4 51.8 10.3 20.9 61.8 17.3 10.3 70.0 19.7 100 55 74 86 97 67 81 102 71 82 98 78 100 100 100 100 100 100 100 100 100 100 100 17.9 10.3 71.3 88.2 42.0 58.3 33.3 55.9 55.8 29.2 50.6 * IRR (Iranian Rial); At the time of this study 1USD is about 36000 IRR 14.3 40.2 33.9 29.4 18.8 34.8 47.4 38.2 34.6 27.7 33.6 7.1 50.5 57.3 64.7 34.8 53.9 64.9 44.1 55.8 41.5 51.8 10.7 7.2 8.8 5.9 5.8 8.8 8.8 8.8 8.2 7.7 8.2 3.6 26.8 34.5 44.1 21.7 33.3 31.6 26.5 32.9 24.6 30.6 71.4 83.5 87.1 85.3 65.2 87.7 96.5 26.5 88.7 100 84.5 35.7 43.3 52.0 52.9 53.6 47.1 45.6 91.2 47.2 29.2 48.2 17.9 20.6 22.8 20.6 29.0 21.1 14.0 73.5 18.2 6.2 21.5 32.1 43.3 41.5 41.2 20.3 40.2 70.2 26.5 37.7 61.5 41.2 92.9 90.7 84.2 79.4 92.8 85.8 80.7 97.1 86.1 81.5 86.4 46.4 52.6 62.6 61.8 68.1 56.4 52.6 55.9 58.4 58.5 58.2 46.4 56.7 53.8 52.9 39.1 50.0 86.0 2.9 49.4 96.9 53.9 3.2. Residential alternatives selection In this step, agents freely select their desired residential alternatives using a multi-objective decision making method without considering the choice set of other agents and residential capacity of zones. They may have multiple and conflicting objectives. For example, they may want to reside in a zone with low rent and high accessibility to different services. But these objectives usually conflict with each other, because a high accessibility is generally coincided with a higher rent. Thus, each agent attempts to meet his objectives and accordingly selects the most suitable alternatives. In other words, each agent faces with a multi-objective decision making problem. In the proposed approach, a constrained NSGA-II is developed to determine a finite number of the best possible residential alternatives (up to ten alternatives in this case study) for agents in accordance to their residential criteria and preferences. A number of different evolutionary algorithms such as MOGA7 (Fonseca & Fleming, 1993), NSGA8 (Srinivas & Deb, 1994), NPGA9 (Horn et al., 1994), SPEA10 (Zitzler & Thiele, 1998), PAES11 (Knowles & Corne, 1999) and NSGA-II (Deb et al., 2002) have been developed to solve multi-objective optimization problems. Because of using elitism, SPEA, PAES and NSGA-II have attracted more interest of researchers. Zitzler et al. (2000) showed that elitism results in enhancing the convergence of a multi- objective evolutionary algorithm. NSGA-II is one of the fast and most efficient of elitist algorithms which has been widely used for solving multi-objective optimization problems in various applications (Li et al., 2010 ; Iniestra & Gutierrez, 2009 ; Huang et al., 2010). Deb et al. (2002) compared the convergence and spread of solutions of NSGA-II, PAES and SPEA on difficult test problems and found that NSGA-II is able to find better solutions for most problems. 7 Multi-Objective Genetic Algorithm 8 Non-dominated Sorting Genetic Algorithm 9 Niched Pareto Genetic Algorithm 10 Strength-Pareto Evolutionary Algorithm 11 Pareto-Archived Evolution Strategy 8 In multi-objective optimization problems, there is not a global optimal solution with respect to all objectives. But there is a set of non-dominated solutions, generally known as the Pareto-optimal solutions. Since no one of the non-dominated solutions is better than the other, each of them can be accepted as optimal solution (Luh et al., 2003). NSGA-II uses the concept of non-domination to distinguish optimal solutions. For a multi-objective optimization problem as expressed in Eq. (2), it is said that solution a dominates solution b or b is dominated by a or a is not dominated by b if Eq. (3) is satisfied (Van Veldhuizen & Lamont, 2000): (cid:9)(cid:21)(cid:3)(cid:4)(cid:22)(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:23)(cid:24)(cid:25)(cid:24)(cid:23)(cid:24)(cid:26)(cid:27)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:28)(cid:4)(cid:29)(cid:6)(cid:11)(cid:30)(cid:28)(cid:18)(cid:4)(cid:29)(cid:6)(cid:31)(cid:28) (cid:4)(cid:29)(cid:6)(cid:31)!(cid:31)(cid:28)(cid:16)(cid:4)(cid:29)(cid:6)" (cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)#$%&(cid:27)'((cid:8)()(cid:8)(cid:8)(cid:8)*(cid:4)(cid:29)(cid:6)(cid:11)(cid:30)*(cid:18)(cid:4)(cid:29)(cid:6)(cid:31)* (cid:4)(cid:29)(cid:6)(cid:31)!(cid:31)*(cid:16)(cid:4)(cid:29)(cid:6)" (cid:9)(cid:21)(cid:3)(cid:4)+(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:24)(cid:28)(cid:8),(cid:24)-(cid:30)(cid:5)(cid:31)(cid:22)(cid:31)!(cid:31)(cid:25)"(cid:7)(cid:8)(cid:8)(cid:28)(cid:14)(cid:4).(cid:6)/(cid:28)(cid:14)(cid:4)%(cid:6)(cid:8)(cid:8)(cid:8)(cid:8).(cid:25)0 (cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)1(cid:24)-(cid:30)(cid:5)(cid:31)(cid:22)(cid:31)!(cid:31)(cid:25)"(cid:7)(cid:8)(cid:8)(cid:28)(cid:14)(cid:4).(cid:6)2(cid:28)(cid:14)(cid:4)%(cid:6) where: f(x) is the set of objective functions, g(x) is the set of constraints, a and b are the possible solutions. NSGA-II starts with an initial random generation of parent population, P0 of size N. This population contains possible solutions of the multi-objective optimization problem. In this research, P0 contains possible residential zones for each agent. Afterwards, an offspring population, Q0 of size N, is generated by applying genetic operators including binary tournament selection, crossover and mutation on P0. Since the procedure is repetitive after the initial generation, the tth generation is described at the following. A combined population, Rt of size 2N, is generated by Rt=Pt345(cid:3)(cid:8) The solutions in Rt are ranked and assigned to different fronts according to the non-dominated sorting. In this sorting process, solutions which do not dominate each other and dominate all the other solutions are assigned to the first (best) front. This process is continued until all solutions of Rt are assigned to the non-dominated fronts. Then, the parent population in the next generation, Pt+1 of size N, is generated from the solutions belonging to the first (best) fronts of Rt. The new offspring population, Qt+1 of size N, is generated by applying binary tournament selection, crossover and mutation operators on Pt+1. In the binary tournament selection, the winner (better) solution is selected using the crowded-comparison operator. In this operator, a solution with lower rank is selected as the winner. If two solutions have the same rank, a solution with higher crowding distance is declared as the winner. The crowding distance of a solution is the perimeter of the cuboid formed by its nearest neighboring solutions in the objective space. In fact, this distance estimates the density of solutions surrounding a particular solution. The algorithm is continued until the convergence criterion such as the maximum number of generations is satisfied and Pt is returned as the 9 output (Deb et al., 2002). Pt contains the optimal residential alternative zones of each agent. More details of this algorithm and its implementation procedure can be found in Deb et al. (2002). . In the following of this section, the most important criteria for residential location choice of tenants derived from the survey of stated preferences of sample tenants in Tehran (Table 1) are described in detail. It should be noted that depending on their preferences, agents may use one, some, or all of these criteria for selecting their desired residential alternatives. 3.2.1. Housing rent Housing price is one of the most important factors affecting the residential location choice of households (Hunt, 2010 ; Ettema, 2011 ; Devisch et al., 2009 ; Jackson et al., 2008 ; Wu et al., 2013 ; Lee & Waddell, 2010 ; Waddell et al., 2003 ; Sener et al., 2011). In this research, it is assumed that the average housing rent per square meter in every zone is exogenously known and fixed during the simulation. Tenants only select zones in which the housing rent is compatible with their affordability and required residential area. For this purpose, a condition is considered to limit the search space of agents to zones in which the housing rent of their required residential area is between the specified minimum and maximum percentages of their monthly income. Because of limitations caused by the income level of agents, the maximum limit seems applicable for all agents. But, the minimum limit is considered for some agents, especially for agents with high monthly incomes, because, for cultural and social reasons, they usually prefer to reside in rich neighborhoods (Habibi & Ahari, 2005). As a result, these limits lead to consideration of socio-economic composition of residents in the residential location choice process of agents. Also, by applying this condition, the search space of agents and required computational time are significantly decreased. The following objective function is considered for each agent: (cid:1)(cid:2)(cid:3)(cid:4)6(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8) 789,(cid:8)(cid:20)-:; ,(cid:8)(cid:14)-:<(cid:4)=>(cid:20)(cid:19)=(cid:14)(cid:6)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)?@(cid:27)A(cid:27)(cid:7)(cid:8)(cid:8)B(cid:23)(cid:24)(cid:25)(cid:20)(cid:19)C(cid:20)/(cid:8)=>(cid:20)(cid:19)=(cid:14)/B(cid:23).(cid:29)(cid:20)(cid:19)C(cid:20) where: RAa is the required residential area of agent a; Ri is the average housing rent per square meter in zone i; Ia is the agent's monthly income; Pmina and Pmaxa respectively are the minimum and maximum percentages of monthly income which are considered by agent a for renting a residence. These percentages are defined using the Monte Carlo simulation; Na is the set of agents that the criterion is important for them; and Nz is the set of residential zones. 10 3.2.2. Accessibility to public facilities Households generally prefer to live in zones with high accessibilities to public facilities including educational (Hunt, 2010 ; Jackson et al., 2008 ; Myers & Gearin, 2001 ; Wu et al., 2013 ; Lee & Waddell, 2010), shopping (Hunt, 2010 ; Lee & Waddell, 2010 ; Chen et al., 2008 ; Lee et al., 2010 ; Srour et al., 2002 ; Sener et al., 2011), green and recreational (Wu et al., 2013 ; Chen et al., 2008 ; Srour et al., 2002 ; Sener et al., 2011), cultural (Sener et al., 2011), and health locations (Wu et al., 2013). However their preferences for accessibility to various facilities are different depending on their socio- economic and demographic characteristics. For example, while accessibility to schools may be very important for a tenant with student members, it may not be important for the others. Overall accessibility of zones to public facilities for each agent who this criterion is important for him is calculated by Eq. (5) which is an extension of the accessibility index developed by Tsou et al. (2005). Also, accessibility of zones to each public facility type is calculated using this equation, where value of pka for the public facility type of interest is set to 1 and values of pka for the other public facility types are set to 0. This index is normalized using (x-xmin)/(xmax-xmin). (cid:1)(cid:2)(cid:3)(cid:4)D(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8) 7EF,(cid:8)(cid:20)-:; J ,(cid:8)(cid:14)-:<GHHIJ(cid:20)(cid:19)?K(cid:4)J(cid:6)(cid:19)0(cid:14)KL K(cid:4)J(cid:6) M where: k is the type of public facility including educational, shopping, green and recreational, cultural, and health locations; j(k) is the jth case of the kth type of public facility; pka is the agent's preference to the public facility type k which is determined in the agent generation module, where (cid:1)pka=1; wj(k) is the relative effect of j(k) which is calculated by wj(k)=Aj(k)/max(Aj(k)), where Aj(k) is the area of j(k); dij is the distance between zone i and j(k). 3.2.3. Accessibility to transportation services Like the accessibility to public facilities, households usually prefer to reside in zones with high accessibilities to transportation services including highways and/or public transit (Hunt, 2010 ; Myers & Gearin, 2001 ; Wu et al., 2013 ; Sener et al., 2011). Overall accessibility of zones to transportation services for each agent who this criterion is important for him is measured by Eq. (6) which is derived from the studies of Currie (2010) and Delbosc and Currie (2011). Also, this equation is used to calculate accessibility of zones to each transportation service type, where value of Pka for the transportation service type of interest is set to 1 and values of Pka for the other transportation service types are set to 0. Finally, accessibilities are normalized using (x-xmin)/(xmax-xmin). 11 (cid:1)(cid:2)(cid:3)(cid:4)N(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8) 7EF,(cid:8)(cid:20)-:; J ,(cid:8)(cid:14)-:<GHH>O(cid:4)J(cid:6)>(cid:14) (cid:19)BJ(cid:20) O(cid:4)J(cid:6) M where: k is the type of transportation service including highways, bus stops and subway stations; t(k) is the tth case of the kth type of transportation service; At(k) is the area of service range of t(k) which is inside zone i; Ai is the area of zone i; and Pka is the agent's preference to the transportation service type k which is determined in the agent generation module, where (cid:1)Pka=1; A fundamental component of accessibility to transportation services is the service range or access distance. Researchers have typically used various walking distances ranging from 300 to 800 m for this distance. Validity of these heuristic distances has been investigated using the travel survey data (Mavoa et al., 2012). However, these distances are longer in Tehran, because in addition to walking, people often use local taxis with low fares to access transit services. Therefore, according to the comprehensive transportation and traffic studies of Tehran (Tehran Municipality, 2013a), the access distances to bus stops, subway stations, and highways are defined as 1.5 km, 1.9 km, and 2 km, respectively. 3.2.4. Air and noise pollutions Air and noise pollutions can have important influences on the residential location choice of households (Hunt, 2010). By using the annual mean noise and air pollution records of Tehran (Tehran Municipality, 2013a), residential zones are classified in five categories varying from clean to highly polluted zones. Then, residential alternatives of agents having very important preferences for air and noise pollutions are restricted to medium to clean pollution classes. Also, the following objective functions are applied for agents who these criteria are recognized as their important criteria. (cid:1)(cid:2)(cid:3)(cid:4)P(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8) 789,(cid:8)(cid:20)-:; (cid:1)(cid:2)(cid:3)(cid:4)Q(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8) 789,(cid:8)(cid:20)-:; ,(cid:8)(cid:14)-:<(cid:8)(cid:4)>B(cid:14)(cid:6) ,(cid:8)(cid:14)-:<(cid:8)(cid:4)(cid:12)B(cid:14)(cid:6)(cid:8) where APi and NPi respectively are the annual mean air and noise pollutions of zone i. 3.2.5. Distance from the workplace Distance of residence from the workplace is an important factor for many households (Hunt, 2010 ; Jackson et al., 2008 ; Myers & Gearin, 2001 ; Wu et al., 2013 ; Rashidi et al., 2012 ; Lee & Waddell, 2010 ; Chen et al., 2008 ; Lee et al., 2010 ; Srour et al., 2002 ; Waddell et al., 2003). The following 12 objective function is used for agents who prefer to minimize distance of their residence from the workplace(s) of their members. (cid:1)(cid:2)(cid:3)(cid:4)R(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8) 789,(cid:8)(cid:20)-:; ,(cid:8)(cid:14)(cid:31)S-:<H(cid:8)0(cid:14)S(cid:4)T(cid:6) (cid:16) T(cid:17)(cid:18) where: diw(m) is the distance between zone i and workplace of employed member m of agent a. n is the number of employees in agent a. 3.2.6. Distance from the former residence Another important factor in residential location choice of some households is distance from their former residence (Jackson et al., 2008 ; Chen et al., 2008). Because of familiarity, various dependencies, and meeting their requirements in the former residential area, some agents prefer to live nearby their former residential area. Objective function of these agents is defined as: (cid:1)(cid:2)(cid:3)(cid:4)(cid:5)U(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8) 789,(cid:8)(cid:20)-:; ,(cid:8)(cid:14)(cid:31)VW-:<(cid:8)(cid:4)0(cid:14)VW(cid:4)(cid:20)(cid:6)(cid:6) where diFr(a) is the distance between zone i and the former residence of agent a. 3.2.7. Traffic restrictions Households usually consider type of streets and traffic situations in their residential area (Hunt, 2010 ; Martinez & Viegas, 2008). Because of traffic restrictions such as the odd-even car restrictions and restrictions on private cars in central areas of Tehran, some households prefer to reside outside these areas. For this purpose, agents with very important preferences to traffic restrictions look for their residence in non-restricted areas. Also, the following objective function is used to minimize selection of traffic restricted zones by agents having important preferences to these restrictions: (cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:5)(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8) 789,(cid:8)(cid:20)-:; ,(cid:8)(cid:14)-:<(cid:4)X=(cid:14)(cid:6) where TRi is the traffic restriction code of zone i with the values of 0 for no traffic restriction, 1 for odd- even car restriction, and 2 for restriction on all private cars. 3.3. Competition and residence choice After selection of desired residential alternatives, agents compete with each other to select their final residence. In reality, tenants relocate in different months of the year. A monthly time step is considered in this paper, because rent is usually paid each month and tenants commonly begin to look for a new residence from one month before their lease deadline. In other words, households usually find a new 13 residence during one month. For simulation of this process, the available statistical information of the residential relocation rates in different months of the year in Tehran (Tehran Municipality, 2013a) is used to randomly define the relocation month of each agent. At the other hand, residential capacity of zones is limited in each month and estimated by Eq. (12): (cid:1)(cid:2)(cid:3)(cid:4)(cid:5)(cid:22)(cid:6)(cid:7)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)(cid:8)=(cid:10)(cid:14)O(cid:11) =>(cid:14)(cid:15) =>(cid:14) (cid:14) (cid:19)(cid:4)YO(cid:19)(cid:12)(cid:20)O(cid:6) where: RCit is the residential capacity of zone i at month t; RAi is the total residential area inside zone i; Nat is the number of agents who look for residence at month t; and (cid:2)t is a balancing parameter that presents an equilibrium between the residential supply and demand at month t. For example, value of more than one for this parameter means that the residential supply is more than the demand. This parameter is calibrated using the available statistical information in each month (Tehran Municipality, 2013a). In each month, a number of agents compete with each other for selecting a residence among their residential alternatives. They search among their desired alternative zones according to the distance of these zones from their former residence and reside in the first zone having the enough residential capacity. If demand for a zone is more than its capacity, then agents compete with each other. As mentioned in section 2, study of the process of renting a house and consultation with real estate agencies in Tehran show that landlords commonly prefer to rent their properties to households with few members (except singles), without child, and with high incomes. Therefore, in the proposed residential competition, agents with fewer members (except singles), with higher incomes, and without child have a higher chance of success, respectively. In the case of equity of the above mentioned conditions, winners are randomly selected. Defeated agents try to reside in their next alternatives and the process is repeated until all agents either reside in one of their residential alternatives or evaluation of all alternatives of defeated agents is completed. Agents who cannot reside in any of their alternatives are moved to the next month. It is assumed that these agents can take additional time (up to one month) from the landlords to find a new residence. Landlords usually agree with this request, because the legal process of expelling a tenant from occupying a property generally is too long and expensive. Therefore, these agents would compete again with agents of the next month and if they still cannot reside in any zone, no residence is allocated for them. In fact, they are agents with many members or low incomes who cannot reside in any zone of Tehran and possibly they have to move to the surrounding cities of Tehran. 14 4. Empirical results In an attempt to cover all socio-economic categories of tenants in Tehran, 100,000 agents were simulated using the agent generation module developed in MATLAB 7.9.0 software. These agents were randomly classified to 12 months according to the percentage of residential relocation in different month of the year in Tehran (Tehran Municipality, 2013a). Table (2) shows the number of agents who look for a residence in each month. As shown in this table, due to school holidays, about 65% of the annual residential relocation in Tehran occur in three months of the summer (Tehran Municipality, 2013a). Table (2): Distribution of residential relocation and agents in different months of the year Time Period (Month) April May June July August September October November December January February March 1 Year Percentage Of Relocation 1% 8% 7% 19% 22% 24% 8% 5% 2% 1% 2% 1% 100% Number Of Agents 1000 8000 7000 19000 22000 24000 8000 5000 2000 1000 2000 1000 100000 Agents then selected up to 10 residential alternatives by the developed NSGA-II. For determining the maximum number of residential alternatives of agents, the proposed approach was run with different maximum numbers of alternatives varying from 2 to 15 for sample tenants presented in Table (1). Simulation accuracy of the actual residential zone of these tenants by different maximum numbers of alternatives has been shown in Figure (3). As seen in this Figure, the simulation run with the maximum number of ten residential alternatives shows the best performance. Also, because of using relatively large zones in this case study, it seems incredible that agents be able to search more than ten zones. In order to test the repeatability and stability, the proposed simulation approach was executed 5 times and aggregated results of these runs were compared with each other. Results showed that aggregated residential location choice behaviors of different demographic and socio-economic categories of agents in different simulation runs are very close to each other with differences of less than 2%. This suggests acceptable repeatability and stability of the proposed approach. Therefore, in this paper, empirical results of one simulation run are presented. The average run time of each simulation is about 7.3 hours in a platform with Core i7 2.00 GHz of CPU and 6 GB of RAM. The simulation stops either all agents reside in one of their residential alternatives or evaluation of all alternatives of agents is completed. 15 70 60 50 40 30 20 10 0 ) % ( n o i t a l i u m S f o y c a r u c c A 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Maximum number of residential alternatives Figure (3): Accuracy of simulation of the actual residential zone of 330 sample tenants by the maximum number of residential alternatives selected by them In the following of this section, major patterns derived from simulation of the residential location choice of individual agents are analyzed. For different demographic and socio-economic categories of agents, these aggregated patterns are described by various criteria considered in the simulation design including housing rent, accessibility to transportation services, accessibility to public facilities, distance from the former residence and workplace, air and noise pollutions and traffic restrictions. In fact, this analysis shows that how well the proposed approach can simulate the observed or expected residential location choice behaviors of tenants in Tehran. This highlights the performance of the simulation in generating expected and near-reality results. Spatial distribution of residential alternatives of agents is shown in Figure 4(a). As expected, because of low housing rents and high accessibilities to employment opportunities, public facilities and public transit services, central areas of Tehran are more attractive than the other areas. However, relatively higher air and noise pollutions and traffic restrictions in these areas lead to reducing the residential attractiveness of these areas for some agents, especially for agents with high incomes that is consistent with the observations. Also, spatial distribution of final residence of agents is shown in Figure 4(b). As illustrated in this Figure, the population density is higher in central areas which is consistent with the existing population distribution in Tehran (Tehran Municipality, 2013b). Due to higher residential demand and consequently more intense competition with other agents in central areas, 64.2% of residents of these areas cannot reside in their first three alternatives. On the other hand, because of low residential demands in southern and northwestern areas, 69.5% of residents of these areas have resided in one of their first three alternatives. 16 (a) (b) Figure (4): Distribution of: (a) the residential alternatives; and (b) the final residence of agents in TAZs Distribution of agents by the number of their residential alternatives has been represented in Figure 5(a). As can be seen, 83.3% of agents have selected the maximum possible number of residential alternatives, i.e. ten alternatives. This suggests that the constraints applied in the proposed approach are reasonable so that the choice set of agents is limited to a few residential alternatives. However, the choice set of 1.8% of agents has been limited to less than 4 residential alternatives. These agents generally have low incomes or strict preferences for choosing their residential location. Also, distribution of agents by the rank of their final residence among their residential alternatives has been represented in Figure 5(b). As indicated in this histogram, 19.7% of agents have resided in their first residential alternative. These agents generally have a few members and high incomes or have selected their residence from southern and northwestern areas in which the residential demand is less than those of the other areas. An observable decreasing trend in this histogram is consistent with the expectations. Because, agents attempt to reside in their first alternatives and the number of agents who have resided in their last alternatives has sequentially decreased. Finally, only 0.7% of agents cannot reside in any zone and may have to move to the surrounding cities of Tehran. It seems that low income level and high household size of these agents are the main reasons for this situation. Mean income and household size of these agents are 7,020,000 IRR12 and 4.3, respectively. Distribution of agents by distance of their residence from their workplace(s) is shown in Figure 6(a). Although proximity to the workplace is important for 86.4% of agents, results of the simulation show that 21.2% of agents have resided in distances of more than 10 kilometers from their workplace(s). This unexpected result suggests that though a great number of agents prefer to reside in proximities of their workplace(s), a majority of them cannot practically reside close to their workplace(s) due to other important factors such as their socio-economic characteristics, housing rent, and not meeting the other 12 Iranian Rial. At the time of this study 1 USD is about 36,000 IRR. 17 requirements. In addition, low prices of fuel and transit fares in Tehran may be regarded as the other important reason for residing of a considerable number of agents far from their workplace(s). However, because of reduction of their commuting costs, low-income agents and who have two or more employees with near workplaces have shown higher interests to reside close to their workplace(s) which is consistent with the expectations. As an example, 65.7% of agents who have two or more employees with near workplaces have resided in distances of less than 5 km from their workplaces, whereas only 8.1% of these agents have resided in distances of more than 10 km from their workplaces. Figure 6(b) shows distribution of agents by distance between their current and former residences. As expected, due to some reasons such as forced relocation because of lack of agreement with the landlord for extension of the lease, familiarity and dependency to the former residential area, and high financial and psychological costs of moving to far areas, a great number of agents have preferred to reside in proximities of their former residence. For instance, only 4.7% of agents have moved to distances of more than 10 km from their former residence. ) % ( s t n e g A 90 80 70 60 50 40 30 20 10 0 < 4 4 5 (a) 7 6 9 Number of alternatives 8 21 18 15 ) % 12 ( s t n e g A 9 6 3 0 10 (b) 1 2 3 4 5 6 7 8 9 Rank of alternative 0 1 … o h t i W Figure (5): Distribution of agents by: (a) the number of their residential alternatives; (b) the rank of their final residence among their alternatives ) % ( s t n e g A 25 20 15 10 5 0 ) % ( s t n e g A 25 20 15 10 5 0 (a) Distance from the workplace (km) Distance from the former residence (km) Figure (6): Distribution of agents by: (a) distance from their workplace; (b) distance from their former residence (b) 18 Spatial distribution of the mean income of agents exhibits a clear south-north pattern (Figure (7)). This pattern shows considerable similarities with the existing distribution of mean income of residents in Tehran (Tehran Municipality, 2013b). As hypothesized, agents have resided in zones in which the mean income of residents is compatible with their income level. For example, although high-income agents could easily reside in zones with low housing rents, they have preferred to reside in zones with higher housing rents compatible with their income level. Figure (7): Distribution of the mean income of residing agents in TAZs As expected, heterogeneous distributions of highways and public transit in Tehran lead to high importance of these factors in residential location choice of agents. Simulation results show that agents with cars particularly with more than one car have more resided in proximities of highways. For example, 71.8% of agents having more than one car have resided in zones with accessibilities of more than 70% to highways. On the other hand, as anticipated, agents without car have considerably resided in central zones with higher accessibilities to public transit services. In addition, an unanticipated weak association is observed between residing in zones with high accessibilities to public transit and the number of members and employees of agents. Probably, because of higher demand for public transit use by their members, agents with more than one employee or three members slightly have more resided in proximities of public transit services. As hypothesized, results show the importance of accessibility to various public facilities in residence choice of different socio-economic categories of agents. A majority of agents have selected their residential alternatives from zones with high accessibilities to shopping and recreational locations which is consistent with the expectations. For example, the number of residential alternatives selected by agents in zones with accessibilities of higher than 70% to shopping and recreational locations is 10.2% and 5.9% 19 more than the average number of residential alternatives in all zones, respectively. In addition, as anticipated, agents with student members have tended to reside in proximities of educational locations. For example, 54.1% of agents having more than one student have resided in zones with accessibilities of higher than 70% to educational locations. Finally, results do not show any meaningful relationships between residential location choice and accessibility to cultural and health centers. This suggests the minor role of these criteria in rental residence choice in Tehran. As expected, air pollution and especially noise pollution play an important role in the residence choice of agents.. An anticipated strong relationship between the income level of agents and their preferences for less polluted areas is observed so that high-income agents have mostly resided in zones with low air and noise pollutions. For example, only 13.8% and 7.7% of high-income agents have resided in zones with high levels of air and noise pollutions, respectively. On the other hand, low-income agents have been forced to reside in zones with higher pollutions due to their limited affordability and lower housing rents in these zones. Importance of the noise pollution can be clearly shown in residential areas around the Mehrabad airport. Although these areas have high accessibilities to highways, public transit services and public facilities, the number of residential alternatives selected by agents in these areas is 44.3% less than the average number of residential alternatives in all zones. Also, only 8.7% of residents of these areas have high income levels. As hypothesized, results show the significant influences of traffic restrictions (e.g. restrictions for all and odd-even cars) on the residence choice of agents, especially on car-owning agents. The number of residents having one and more than one car in traffic-restricted areas respectively is 10.6% and 52.2% less than the average number of this class of residents in all zones. On the other hand, due to central location of these areas and high accessibilities to employment opportunities and public transit services, agents without car have shown great interests for residing in these areas which is consistent with the observations. Number of residents without car in these areas is 57.8% more than the average number of this class of residents in all zones. Finally, it should be noted that simulated distribution of the mean car ownership is considerably consistent with the existing mean car ownership distribution in Tehran (Tehran Municipality, 2013b). In general, it can be said that major residential location choice patterns of different demographic and socio-economic categories of agents are considerably consistent with the observations and expectations. A summary of residential location choice and selected residential zones by agents have been presented in Tables (3) and (4). 20 Table (3): A summary of residential location choice of agents Category of Agents Selected all 10 alternatives Selected more than 7 alternatives Selected less than 4 alternatives Resided in the first alternative Resided in one of the first three alternatives Resided in one of the last three alternatives Moved to the next time period unable to reside in any zone Resided in a zone with distance of less than 5 km from the former residence Resided in a zone with distance of more than 10 km from the former residence Resided in a zone with distance of less than 5 km from the workplace Resided in a zone with distance of more than 10 km from the workplace Percentage of Agents (%) 83.3 92.8 1.8 19.7 47.3 15.5 5.7 0.7 69.2 4.7 42.5 21.2 Average Income (million IRR) 14.2 11.4 7.0 15.9 13.7 10.3 7.1 6.7 12.6 13.5 14.1 14.9 Average Number of Members 3.43 3.49 3.86 3.02 3.31 3.78 4.05 4.24 3.48 3.46 3.47 3.50 Table (4): A summary of selected residential zones by agents Average Car Ownership 1.02 0.97 0.82 1.14 1.00 0.88 0.84 0.76 0.97 1.02 0.90 1.05 Category of Residential Zones The most selected zones as residential by agents alternatives The least selected zones as residential by agents alternatives Zones with the most residents Zones with the lowest residents Zones which were occupied earlier than other zones Zone Number Number of Agents *Housing Rent per m2 (%) Air Pollution Noise Pollution 531 311 528 2 16 17 531 560 360 2 14 15 311 508 221 5639 5303 5058 764 809 855 828 814 790 64 71 74 595 237 280 62.7 58.5 68.3 40.6 44.2 43.8 62.7 67.4 38.6 40.6 39.7 41.3 58.5 60.9 30.2 Clean Relatively Clean Clean Clean Clean Clean Highly Polluted Highly Polluted Highly Polluted Highly Polluted Highly Polluted Highly Polluted Clean Clean Medium Clean Clean Relatively Clean Highly Polluted Highly Polluted Highly Polluted Highly Polluted Highly Polluted Highly Polluted Relatively Clean Relatively Clean Clean Medium Medium Medium **Overall Access to Public Facilities (%) 56.4 60.1 43.2 68.3 62.8 65.0 56.4 58.9 41.2 68.3 56.1 59.0 65.1 73.3 58.4 ***Overall Access to Highway Network (%) 70.6 63.8 65.2 28.4 33.5 32.1 70.6 66.4 58.0 28.4 25.6 30.7 63.8 68.9 43.5 ****Overall Access to Public Transit (%) 37.3 46.5 29.6 78.9 81.3 79.5 37.3 41.2 33.4 78.9 84.4 79.7 46.5 61.5 48.7 * The housing rent per m2 has been normalized using (x-xmin)/(xmax-xmin). ** Overall access to public facilities is calculated using Eq. (5) where all public facilities have the same preferences (pka). This index has been normalized using (x-xmin)/(xmax-xmin). *** Overall access to highway network is calculated using Eq. (6) where Pka is equal to 1 and k is highway. This index has been normalized using (x-xmin)/(xmax-xmin). **** Overall access to public transit is calculated using Eq. (6) where Pka is equal to 0.5 and k is the bus and subway. This index has been normalized using (x-xmin)/(xmax-xmin). 5. Validation One of the greatest challenges of utilizing agent-based models is their validation (Crooks & Heppenstall, 2012). In this research, 1350 tenant households with various socio-economic characteristics residing in different zones of Tehran were sampled for validation of the proposed approach. Socio-economic characteristics, residence and workplace(s) of these households were collected, but their residential 21 criteria and preferences were simulated using the proposed approach. For this purpose, households were classified to 12 months according to the month in which they rented their residence. Then, residence of these households was simulated by the proposed approach and results were compared with those of the actual residence. As shown in Figure (8), spatial distribution of simulated and actual residences of these households is significantly compatible. Distribution of households by distance of their simulated residence from their actual residence demonstrates validity of the simulation (Figure 9(a)). As indicated in this diagram, simulated residence of 60.2% of households is located in distance of less than one kilometer from their actual residence. Also, simulated residence of only 5.4% of households is located in more than ten kilometers from their actual residence. In addition, distribution of the actual and simulated residences of households by housing rent, proximity to their workplace(s) and distance from their former residence show high similarities (Figures 9(b), 10(a) and 10(b)). Comparison of the actual and simulated residences of households in different spatial and attribute categories has been presented in Table (5). As shown in this table, the proposed approach has exactly simulated the residential zone of 59.3% of households. Also, simulated residential zone of 67.5% of households has been located in the adjacency of their actual residential zone, composed of the actual residential zone and its neighboring zones. In addition, the actual residence of 72.8% of households has been simulated as one of their residential alternatives. The approach is also able to simulate different attributes of the actual residence of more than 70% of households including the housing rent, air and noise pollutions and accessibilities to public facilities and transportation services with errors of less than 15%. For example, the housing rent of 84.0% of households has been simulated with errors of less than 15%. Therefore, it seems that the proposed approach shows promising performance. (a) (b) Figure (8): Distribution of (a) the actual; and (b) simulated residences of households in TAZs 22 100 95 90 85 80 75 70 65 60 55 50 ) % ( s d l o h e s u o H (a) ) % ( s d l o h e s u o H (b) 1 2 3 4 5 6 7 8 9 10 > 10 Distance (km) 40 35 30 25 20 15 10 5 0 Actual Simulated <5 5-10 10-15 15-20 >20 Housing Rent (million IRR) Figure (9): Distribution of households by: (a) distance between their simulated and actual residences; (b) housing rent of their actual and simulated residences ) % ( s t n e g A Actual Simulated 25 20 15 10 5 0 Actual Simulated 25 20 15 10 5 0 ) % ( s t n e g A (a) Distance from the workplace (km) (b) Distance from the former residence (km) Figure (10): Distribution of households by: (a) distance from their workplace; (b) distance from their former residence Table (5): Comparison of the actual and simulated residences of households Simulated residence is identical to the actual residence The actual residence is one of the simulated residential alternatives Simulated residence is located in the adjacency of the actual residence Simulated residence is located in distance of less than 5 km from the actual residence Simulated residence is located in distance of more than 10 km from the actual residence Rent of simulated residence is in the range of 85% to 115% of the rent of actual residence Accessibility of simulated residence to the public facilities is in the range of 85% to 115% of accessibility of the actual residence Accessibility of simulated residence to the highway network is in the range of 85% to 115% of accessibility of the actual residence Accessibility of simulated residence to the public transit is in the range of 85% to 115% of accessibility of the actual residence Air pollution level of simulated residence is identical to the actual residence Noise pollution level of simulated residence is identical to the actual residence Households % 59.3 72.8 67.5 81.4 5.4 84.0 78.1 84.5 70.6 79.2 76.3 6. Discussion and Conclusion In this paper, a novel two-step agent-based approach has been developed to simulate residential location choice of tenants. Tenants are considered as agents who compete with each other to reside in one of their preferred residential alternatives. They first select their desired residential alternatives according to their residential criteria and preferences using NSGA-II. In this step, they do not consider residential capacity 23 of zones and residential alternatives of the other agents. Then, they select their final residential zone in a competition with other agents who look for the same zone at the same time period. Results show that the proposed approach has considerably simulated major residential patterns of different socio-economic categories of tenants in Tehran. For example, simulated residential choice behavior of agents with respect to accessibility to various public facilities and transportation services, air and noise pollutions and traffic restrictions are significantly consistent with the expectations. Also, validation results of the proposed approach with a sample of tenants shows that the approach has correctly simulated the actual residential zone of 59.3% of tenants. In addition, for more than 70% of sample households, various attributes of their actual residential zone including accessibility to public facilities and transportation services, air and noise pollutions and housing rent has simulated with errors of less than 15%. All of these results suggest the remarkable performance of the proposed approach. The proposed approach has several advantages which lead to more closeness of the simulation of residential location choice of agents to the reality. First, due to using a multi-objective decision making method, NSGA-II, various conflicting objectives can be considered in the residence choice process of agents. There is no limitation on the number and type of objectives used in this method. The method also allows modeler to consider different objectives according to agents' preferences. In addition, the method can be used with a huge number of residential options. Second, In contrast with the conventional residential location choice models, agents do not essentially select the best residential option (the global optimum). They select a finite number of their desired residential alternatives with respect to their criteria and preferences and finally select their residence among these alternatives by competition with other agents. The proposed residential location choice approach can be used in different urban applications. It can be considered as a main component of the land use and transportation models. It remarkably helps urban planners to investigate the residence choice behavior of individual households and consequently the spatial distribution of different socio-economic categories of households. Therefore, effects of various urban policies on these concerns can be investigated. Also, the proposed approach can be used for determining tenants who are unable to reside in any zone and possibly have to move to the surrounding cities of Tehran. Moreover, socio-economic structure of the population resided in different zones can be revealed and used for different purposes such as the housing subsidies to specific groups of population. Although the proposed approach has been implemented in Tehran as a case study, it is a general approach which can be adapted with the residential location choice process in other developing and developed countries. The proposed multi-objective decision making method, NSGA-II, allows modelers to define different preferred criteria and objectives in accordance with the residential location choice in their study area. Also, although the criteria including number of members, income level, and number of children are 24 considered in the proposed residential competition mechanism in Tehran, other criteria such as ethnicity, professional status, age and education level of the head of household can be considered in other areas in conformity with their cultural and socio-economic conditions. Various aspects of the proposed approach need further considerations and developments. In this paper, the approach has been used by relatively large spatial units, TAZs, which may leads to modifiable areal unit problem (MAUP). This means that changes in the size or configuration of zones can affect the results (Openshaw & Taylor, 1979 ; Martinez et al., 2009). Therefore, MAUP effects must be carefully evaluated by using smaller spatial units such as parcels, census blocks or larger units resulting from their aggregations. Also, in this study, Euclidian distance has been used for measuring the proximity to different opportunities. Due to use of relatively large spatial units, TAZs, in this study, the use of Euclidian distance seems to be appropriate. It seems that people perceive proximity as a straight line (Euclidian distance) at the large spatial levels such as regions and TAZs. Also, the Euclidean distance is strongly correlated with the network distance at the census tract level in metropolitan areas (Apparicio et al., 2008). It is recommended that the network distance be used in future studies, especially when smaller spatial units such as census blocks or parcels are used. This measure may more accurately correspond to human perceptions of accessibility to different opportunities at the parcel level, because it measures the road distance between the parcel and the opportunity. However, calculation of the network distance is computationally intensive and requires greater user effort and knowledge for data input and preparation (Sander et al., 2010). The use of network distance in metropolitan areas such as Tehran which is composed of very dense transport networks may significantly reduce the computational performance of the proposed approach. In addition, only residential location choice of tenant households is simulated in this research, but the approach can be developed to include all categories of households. Finally, modules for determination of housing rent in a bid-rent framework and simulation of housing supply can be added to the approach in the future. References Alonso W 1960 A theory of the urban land market Paper and Proceedings of the Regional Science Association 6 149-157 Apparicio P, Abdelmajid M, Riva M and Shearmur R 2008 Comparing alternative approaches to measuring the geographical accessibility of urban health services: Distance types and aggregation-error issues International Journal of Health Geographics 7(7) Arentze T, Timmermans H and Veldhuisen J 2010 The Residential Choice Module in the Albatross and Ramblas Model Systems in Pagliara F, Preston J and Simmonds D eds. Residential Location Choice: Models and Applications, Springer-Verlag, Berlin Heidelberg 209-222 Arentze T and Timmermans HJP 2004 A learning-based transportation-oriented simulation system Transportation Research B 38(7) 613-633 25 Barros JX 2004 Urban Growth in Latin American Cities: Exploring urban dynamics through agent-based simulation in Urban Growth in Latin American Cities: Exploring urban dynamics through agent-based simulation, University College London (UCL), 285 Benenson I 2004 Agent-Based Modeling: From Individual Residential Choice to Urban Residential Dynamics in Goodchild MF and Janelle DG eds. Spatially Integrated Social Science: Examples in Best Practice, Oxford University Press, New York 67-95 Chang JS 2006 Models of the relationship between transport and land-use: a review Transport Reviews 26 (3) 325- 350 Chang JS and Mackett RL 2006 A bi-level model of the relationship between transport and residential location Transportation Research Part B 40 123-146 Chen J, Chen C and Timmermans H 2008 Accessibility trade-offs in household residential location decisions Transportation Research Record 2077 71-79 Crooks AT and Heppenstall AJ 2012 Introduction to Agent-Based Modelling in Heppenstall AJ, Crooks AT, See LM and Batty M eds. Agent-Based Models of Geographical Systems, Springer, Dordrecht 85-105 Currie G 2010 Quantifying spatial gaps in public transport supply based on social needs Journal of Transport Geography 18 31-41 Deb K, Pratap A, Agarwal S and Meyarivan T 2002 A Fast and Elitist Multiobjective Genetic Algorithm: NSGA-II IEEE Transactions on Evolutionary Computation 6 (2) 182-197 Delbosc A and Currie G 2011 Using Lorenz curves to assess public transport equity Journal of Transport Geography 19 1252-1259 Devisch OTJ, Timmermans HJP, Arentze TA and Borgers AWJ 2009 An agent-based model of residential choice dynamics in nonstationary housing markets Environment and Planning A 41(8) 1997-2013 Ettema D 2011 A multi-agent model of urban processes: Modelling relocation processes and price setting in housing markets Computers, Environment and Urban Systems 35 1-11 Fonseca CM and Fleming PJ 1993 Genetic algorithms for multiobjective optimization: Formulation, discussion and generalization in Genetic algorithms for multiobjective optimization: Formulation, discussion and generalization, Morgan Kauffman, 416-423 Gaube V and Remesch A 2013 Impact of urban planning on household's residential decisions: An agent-based simulation model for Vienna Environmental Modelling & Software 45 92-103 Haase D, Lautenbach S and Seppelt R 2010 Modeling and simulating residential mobility in a shrinking city using an agent-based approach Environmental Modelling & Software 25 1225-1240 Habibi M and Ahari Z 2005 Study of qualitative aspects of housing in Iran in Study of qualitative aspects of housing in Iran, Report in Persian, Ministry of Roads & Urban Development, Deputy of Housing & Building City Horn J, Nafploitis N and Goldberg DE 1994 A niched Pareto genetic algorithm for multiobjective optimization in A niched Pareto genetic algorithm for multiobjective optimization, IEEE Press, 82-87 Huang B, Buckley B and Kechadi T-M 2010 Multi-objective feature selection by using NSGA-II for customer churn prediction in telecommunications Expert Systems with Applications 37 3638-3646 Huang Q, Parker DC, Filatova T and Sun S 2014 A review of urban residential choice models using agent-based modeling Environment and Planning B: Planning and Design 41(4) 661-689 Hunt JD 2010 Stated Preference Examination of Factors Influencing Residential Attraction in Pagliara F, Preston J and Simmonds D eds. Residential Location Choice: Models and Applications, Springer, Verlag Berlin Heidelberg Iacono M, Levinson D and El-Geneidy A 2008 Models of transportation and land use change: A guide to the territory Journal of Planning Literature 22 (4) 323-340 26 Iniestra JG and Gutierrez JG 2009 Multicriteria decisions on interdependent infrastructure transportation projects using an evolutionary-based framework Applied Soft Computing 9 512-526 Jackson J, Forest B and Sengupta R 2008 Agent-based simulation of urban residential dynamics and land rent change in a gentrifying area of Boston Transactions in GIS 12 475-491 Jordan R, Birkin M and Evans A 2012 Agent-Based Modelling of Residential Mobility, Housing Choice and Regeneration in Heppenstall AJ, Crooks AT, See LM and Batty M eds. Agent-Based Models of Geographical Systems, Springer, 511-524 Knowles J and Corne D 1999 The Pareto archived evolution strategy: A new baseline algorithm for multiobjective optimization in The Pareto archived evolution strategy: A new baseline algorithm for multiobjective optimization, IEEE Press, 98-105 Lee BHY and Waddell P 2010 Residential mobility and location choice: a nested logit model with sampling of alternatives Transportation 37 587-601 Lee BHY, Waddell P, Wang L and Pendyala RM 2010 Reexamining the influence of work and nonwork accessibility on residential location choices with a microanalytic framework Environment and Planning A 42 913-930 Lerman SR 1976 Location, housing, automobile ownership, and mode to work: a joint choice model Transportation Research Record 610 6-11 Li M, Lin D and Wang S 2010 Solving a type of biobjective bilevel programming problem using NSGA-II Computers and Mathematics with Applications 59 706-715 Lowry IS 1964 A Model of Metropolis in A Model of Metropolis, RAND Corporation Luh GC, Chueh CH and Liu WW 2003 MOIA: Multi-objective immune algorithm Engineering Optimization 35 (2) Martinez F and Donoso P 2010 The MUSSA II Land Use Auction Equilibrium Model in Pagliara F, Preston J and Simmonds D eds. Residential Location Choice: Models and Applications, Springer, Verlag Berlin Heidelberg 99-113 Martinez FJ 1996 MUSSA: Land Use Model for Santiago City Transportation Research Record 1552 126-134 Martinez LM, Viegas JM and Silva EA 2009 A traffic analysis zone definition: a new methodology and algorithm Transportation 36 581–599 Martinez LMG and Viegas JMC 2008 Activities, Transportation Networks and Land Prices as Key Factors of Location Choices: An Agent-Based Model for Lisbon Metropolitan Area (LMA) in Activities, Transportation Networks and Land Prices as Key Factors of Location Choices: An Agent-Based Model for Lisbon Metropolitan Area (LMA), MIT-Portugal Program Mavoa S, Witten K, McCreanor T and O'Sullivan D 2012 GIS based destination accessibility via public transit and walking in Auckland, New Zealand Journal of Transport Geography 20 15-22 Mcfadden D 1978 Modelling the choice of residential location in Karlqvist ALL, Lundqvist L, Snickars F and Weibull J eds. Spatial Interaction Theory and Planning Models, North-Holland, Amsterdam 75-96 Miller EJ, Hunt JD, Abraham JE and Salvini PA 2004 Microsimulating urban systems Computers, Environment and Urban Systems 28 9-44 Miller EJ and Salvini PA 2001 The integrated land use transportation environment (ILUTE) microsimulation modelling system: description and current status in Hensher DA ed. Travel Behaviour Research The Leading Edge, Pergamon Press, Amsterdam 711-724 Myers D and Gearin E 2001 Current preferences and future demand for denser residential environments Housing Policy Debate 12(4) 633-659 Openshaw S and Taylor PJ 1979 A Million or so Correlation Coefficients: Three Experiments on the Modifiable Areal Unit Problem in Wrigley N ed. Statistical Applications in the Spatial Sciences, Pion, London 127- 144 27 Otter HS, van der Veen A and de Vriend HJ 2001 ABLOoM: Location behaviour, spatial patterns, and agent-based modelling Journal of Artificial Societies and Social Simulation 4 (4) Pagliara F and Wilson A 2010 The State-of-the-Art in Building Residential Location Models in Pagliara F, Preston J and Simmonds D eds. Residential Location Choice: Models and Applications, Springer, Verlag Berlin Heidelberg 1-20 Rashidi TH, Auld J and Mohammadian A 2012 A behavioral housing search model: Two-stage hazard-based and multinomial logit approach to choice-set formation and location selection Transportation Research Part A 46 1097–1107 Rosenfield A, Chingcuanco F and Miller EJ 2013 Agent-based housing market microsimulation for integrated land use, transportation, environment model system Procedia Computer Science 19 841-846 Salvini PA and Miller EJ 2005 ILUTE: An Operational Prototype of Comprehensive Microsimulation Model of Urban Systems Network and Spatial Economics 5 217-234 Sander HA, Ghosh D, van Riper D and Manson SM 2010 How do you measure distance in spatial models? An example using open-space valuation Environment and Planning B: Planning and Design 37(5) 874-894 Sener IN, Pendyala RM and Bhat CR 2011 Accommodating spatial correlation across choice alternatives in discrete choice models: an application to modeling residential location choice behavior Journal of Transport Geography 19 294-303 Srinivas N and Deb K 1994 Muiltiobjective Optimization Using Nondominated Sorting in Genetic Algorithms Evolutionary Computation 2 (3) 221-248 Srour IM, Kockelman KM and Dunn TP 2002 Accessibility indices: a connection to residential land prices and location choices Transportation Research Record 1805 25-34 Strauch D, Moeckel R, Wegener M, Grafe J, Muhlhans H and Rindsfuser G 2005 Linking transport and land use planning: the microscopic dynamic simulation model ILUMASS in Atkinson PM, Foody GM, Darby SE and Wu F, et al. eds. Geodynamics, CRC Press, Boca Raton 295-311 Tehran Municipality 2013a Tehran municipality statistical yearbook 2012-2013 ICT Organization of Tehran Municipality Tehran, Iran Tehran Municipality 2013b Tehran statistical yearbook 2012-2013 ICT Organization of Tehran Municipality Tehran, Iran Tsou KW, Hung YT and Chang YL 2005 An accessibility-based integrated measure of relative spatial equity in urban public facilities Cities 22 (6) 424-435 Van Veldhuizen DA and Lamont GB 2000 Multiobjective evolutionary algorithms: analyzing the state-of-the-art Evolutionary Computation 8 (2) 125-147 Veldhuisen KJ, Timmermans HJP and Kapoen LL 2000 RAMBLAS: a regional planning model based on the microsimulation of daily activity travel patterns Environment and Planning A 32 427-443 Waddell P 2002 UrbanSim: Modeling urban development for land use, transportation, and environmental planning Journal of the American Planning Association 68 (3) 297-314 Waddell P, Borning A, Noth M, Freier N, Becke M and Ulfarsson GF 2003 Microsimulation of urban development and location choices: Design and implementation of UrbanSim Networks and Spatial Economics 3(1) 43-67 Wu W, Zhang W and Dong G 2013 Determinant of residential location choice in a transitional housing market: Evidence based on micro survey from Beijing Habitat International 39 16-24 Zitzler E, Deb K and Thiele L 2000 Comparison of multiobjective evolutionary algorithms: Empirical results Evolutionary Computation 8 (2) 173-195 Zitzler E and Thiele L 1998 Multiobjective optimization using evolutionary algorithms-A comparative case study in Eiben AE, Back T, Schoenauer M and Schwefel HP eds. Parallel Problem Solving From Nature, Springer-Verlag, Berlin 292-301 28
1906.11452
1
1906
2019-06-27T06:31:29
Traffic Management Strategies for Multi-Robotic Rigid Payload Transport Systems
[ "cs.MA", "cs.RO" ]
In this work, we address traffic management of multiple payload transport systems comprising of non-holonomic robots. We consider loosely coupled rigid robot formations carrying a payload from one place to another. Each payload transport system (PTS) moves in various kinds of environments with obstacles. We ensure each PTS completes its given task by avoiding collisions with other payload systems and obstacles as well. Each PTS has one leader and multiple followers and the followers maintain a desired distance and angle with respect to the leader using a decentralized leader-follower control architecture while moving in the traffic. We showcase, through simulations the time taken by each PTS to traverse its respective trajectory with and without other PTS and obstacles. We show that our strategies help manage the traffic for a large number of PTS moving from one place to another.
cs.MA
cs
Traffic Management Strategies for Multi-Robotic Rigid Payload Transport Systems Yahnit Sirineni, Pulkit Verma, Kamalakar Karlapalem 9 1 0 2 n u J 7 2 ] A M . s c [ 1 v 2 5 4 1 1 . 6 0 9 1 : v i X r a Abstract -- In this work, we address traffic management of multiple payload transport systems comprising of non- holonomic robots. We consider loosely coupled rigid robot formations carrying a payload from one place to another. Each payload transport system (PTS) moves in various kinds of environments with obstacles. We ensure each PTS completes its given task by avoiding collisions with other payload systems and obstacles as well. Each PTS has one leader and multiple followers and the followers maintain a desired distance and angle with respect to the leader using a decentralized leader- follower control architecture while moving in the traffic. We showcase, through simulations the time taken by each PTS to traverse its respective trajectory with and without other PTS and obstacles. We show that our strategies help manage the traffic for a large number of PTS moving from one place to another. I. INTRODUCTION Multi-robot systems are a well studied problem in robotics where applications like payload transportation [1][2][3], traf- fic management [4][5], and area exploration [6][7] are most commonly used. A system with multiple robots/agents offers several advantages like low power consumption, increased redundancy, and makes the system modular [8][9][10]. Han- dling more number of robots poses different challenges on the functionality of the system. Collision avoidance of a system with other neighbourhood transport systems and other obstacles in the environment is an important challenge. The basic idea of collision avoidance is that a system derives the control inputs based on its surroundings such that it does not collide with any other system or obstacles while performing its task. Work has been carried out on avoiding the obstacles for a single or multiple robots [11], further research is needed on obstacle avoidance for multiple robots moving in a formation(s) of different shapes. For payload carrying tasks in industries, assembly lines, warehouses, etc., where payloads need to be transported from one place to another without affecting the functionality of other systems, is a challenging problem. Such applications require smooth and collision free movement of these systems such that • A PTS does not collide with the other payload systems in the surroundings. • Avoids collisions with static obstacles. Yahnit Sirineni and Pulkit Verma are students of Agents and Applied Robotics Group(AARG), Kohli Center on Intelligent Systems(KCIS), In- ternational Institute of Information Technology, Hyderabad (IIIT-H), India [email protected] Kamalakar Karlapalem is a faculty of Computer Science with India Information Technology, Hyderabad, International Institute of [email protected] • Reaches the destination by following the desired trajec- tory. In our work, we simulate multiple PTS carrying payloads of different shapes (like triangular, square, circle, etc.) from one point to another. Each system comprises of a group of non-holonomic robots moving in a formation using a decentralized leader-follower approach in [12]. One leader and multiple followers are present in each system. The leader uses the trajectory information provided by our control architecture which is derived from source to destination. The followers generate their velocities using the leader information which makes the formation intact all the time. We show, through simulations, the time taken by a PTS to move from one point to another in an environment with (a) Only one payload transport system. (b) Multiple PTS with a possibility of having a collision (c) Multiple PTS and static obstacles in the environment. We propose a modified version of Optimal Reciprocal Collision Avoidance for non-holonomic robots (nh-ORCA) [13] algorithm to identify if a PTS is prone to collide with other formations and obstacles in the environment. Our method provides the command velocities to the robots in the formation such that no collision happens while the transport system is approaching its goal and also ensures least deviation possible to the existing path of the formation. We present the simulation results for different formation shapes with and without obstacles. We discuss the related work done in this domain in Section II. Our contribution in this paper is discussed in Section III. The modeling and control of non-holonomic robots is carried out in Section IV. Traffic Management strategies for multiple PTS are discussed in Section V. To make our solution more concrete, we display simulation results in Section VI. Conclusion is discussed in Section VII II. RELATED WORK Over the years, various methods have been developed for formation control and navigation of formations for payload transportation. [14], [15] propose methods for path planning of a single formation without laying much emphasis on the presence of obstacles. [16], [17], [18], [19] shows navigation of single formation in environments which consists of static obstacles.Path planning for 3D formations is proposed in [20] and [21]. Method for navigating a single formation using the leader-follower approach is shown in [18] and [22]. [23],[24] shows some promising results in aerial vehicle formation control. A slung payload transportation method is demonstrated in [25] where as [26] devised wheeled locomotion for payload carrying with modular robot. [27] proposes path planning of a single formation in environment with dynamic obstacles but is a computationally expensive centralized method. To the best of our knowledge, no work has been done on path planning and collision avoidance of multiple formations of robots in environments with obstacles. We cannot consider other formations as dynamic obstacles and use the approach presented in [27] because the formations have a specific goal of reaching the destination while dynamic obstacles do not have a proper goal and hence show random behaviour. This aspect makes our task even more challenging . III. CONTRIBUTION We propose a Leader-Follower-ORCA-RRT* framework which is a decentralized method for navigation of multi- ple formations of robots carrying payloads to the desired destination while avoiding collisions with other formations and obstacles. Given an environment in which multiple payloads are to be transported from one place to another through formation of robots, we first compute the path of the leader of the formation using RRT* [28] from respective source to destination considering the static obstacles and interpolate the path to get multiple way points. We modify nh-ORCA [13] to compute collision-free linear and angular velocity for the leader of the formation. A leader-follower based decentralized control law is incorporated to compute the corresponding command velocities of the followers in the formation. Finally, We present simulation results of the implemented control architecture to validate our method. IV. BACKGROUND A. Non-holonomic Robot Kinematics Consider a non-holonomic mobile robot positioned at (x, y) and oriented at and angle θ. Assuming the pseudo- command velocities be v, ω, the robot kinematics is given as  x y θ  =  cosθ −dsinθ dcosθ sinθ 0 1 (cid:20) v ω (cid:21) where d is the distance of the robot's center to the center of mass of the robot. B. Leader-Follower Formation Control Each PTS comprises of a number of non-holonomic wheeled mobile robots which move on a trajectory while maintaining a rigid formation. A decentralized leader- follower approach control algorithm [12] is used which include a leader and multiple followers. The followers use the command velocities and odometery information of the leader to derive their velocities such that the followers maintain a specified distance and angle to remain in a formation. Fig. 1 shows different shapes of the formation used in the paper. The formation control law is given by the following equations Fig. 1: Leader follower formation with different shapes vj = (k1αj + vicosθij − ρd ijωisin(ψd ijωicos(ψd ij + θij) + k2βj + k3θje d visinθij + ρd ij − θij) ωj = (1) where αj and βj is the error in longitudinal and vertical direction respectively. Constants k1, k2, k3, k4, k5, k6 > 0, ij and ψd ij are the desired distance and orientation to ρd maintain between the leader and follower robot, vi and ωi are command velocities of the leader, vj and ωj are the generated command velocities of the jth follower, d is distance from the robot's center to the robot's center of mass. θij is the orientation error and xje, yje, θje are the positional tracking errors between the leader and follower. C. Optimal Reciprocal Collision Avoidance holonomic robots (nh-ORCA) for non- nh-ORCA [13] is a collision avoidance algorithm for non-holonomic robots which is an extension to ORCA[11] which deals with only holonomic robots. Using the algorithm presented in [13], each robot independently computes its velocity such that it is collision free for at least τ time assuming that the other robots also compute their velocity using the same method. There is no explicit communication amongst the robots to choose their velocities, hence making this is a robust decentralized system. Each robot i constructs ij ∀ j (cid:54)= i which in turn is computed using velocity ORCAτ obstacles presented in [29]. Let pi, pj be the positions of two robots i and j and ri, ij is the set rj be the radius of the robots respectively, V Oτ of velocities of robot i w.r.t robot j such that: V Oτ ij = {¯v ∃t ∈ [0, τ ] , t · ¯v ∈ D (pj − pi, ri + rj)} (2) where D (p, r) = {q (cid:107) q − p (cid:107)< r} Then ORCAτ ij is computed from Eq (3): ij =(cid:8)vHi (cid:0)vHi −(cid:0)vopt i + 0.5 ∗ u(cid:1)(cid:1) .n ≥ 0(cid:9) (3) ORCAτ V Oij at (vopt where n denotes the outward normal of the boundary of ) + u, u is computed as shown in [11]. Now, the set of collision free velocities for robot i is given -vopt j i ORCAτ ORCAτ ij (4) by Eq (4). i = SAHVi ∩(cid:92) j(cid:54)=i LF1L LF1L : LeaderF : FollowerF2F3F4F5F6F1F2F2F3F3F4 with SAHVi being the set of allowed velocities. The final optimal velocity of the robot is given by equation (5). v∗ Hi = arg min vHi∈ORCAτ i (cid:107) vHi − vpref i (cid:107) (5) We extend this approach to our problem for avoiding collisions among other formations and obstacles. V. TRAFFIC MANAGEMENT Given an environment in which multiple payloads are to be transported from one place to another with multi- robot payload transport systems, we propose an efficient traffic management strategies for path planning and collision avoidance of formations carrying payloads. A bio inspired neurodynamic based leader follower-ORCA-RRT* frame- work is discussed, which computes a path to the respective destination for all the leaders of PTS considering the static obstacles using RRT* [28], then uses a modified version of nh-ORCA [13] for collision avoidance amongst other forma- tions and finally incorporates a bio inspired neurodynamic based leader-follower formation control law for computing the command velocities for the followers in the formation. The architecture diagram has been shown in Fig.2 Algorithm 1: Leader Follower-ORCA-RRT* 1 Input : environment representing space and obstacles, source and destination of the formations, Configuration of each formation ; 2 for i = 1, i ≤ N o. of F ormations, i + + do // Compute path from src to dest for ith formation using RRT* 3 4 5 pathi = RRT*(sourcei, destinationi) ; // Interpolate the path returned pathi = Interpolate(pathi) ; // Initialize nextDesti of formation nextDesti = pathi[1] // Initialize vpref vpref = (nextDesti - pi) i of formation i 6 7 end 8 while All Formations have'nt reached their destinations do for i = 1, i ≤ N o. of F ormations, i + + do timestep ++;; if fi has not yet reached then // Compute command velocities of the leader vi, ωi = Algorithm2(i); // Compute command velocites of the followers using leader-follower control law LeaderFollower(vi, ωi); Apply corresponding controls to the leader and followers of the formation; 9 10 11 12 13 14 end 15 16 end i i , vmax , neighboursi; Algorithm 2: Modified nh-ORCA 1 Input : pathi, pi, vi, ri, vpref 2 for j in neighboursi do 3 4 5 6 end 7 Compute ORCAτ 8 Compute the optimal holonomic velocity of the leader Compute V Oτ Compute u from [11]; Compute ORCAτ ij from Eq 3 i from Eq 2; i from Eq 4; Hi v∗ from Eq(5); leader from v∗ Hi nh-ORCA [13]; 9 Compute the optimal linear and angular velocity of the for non-holonomic robot using 10 if distance(pi, nextDesti) ≤ δ then // If the formation has almost reached its nextDest, then update nextDesti and vpref i 11 Update nextDesti to next point of interpolated path; vpref i 12 13 return non-holonomic command velocities of the = ( nextDesti - pi ); Leader. Fig. 2: Architecture Diagram of the framework Multiple PTS are considered in this work. Each PTS is a set of robots with a leader and its followers working together to perform a particular task. Follower j of each formation (fi) maintains a certain angle and distance relative to its leader. Each formation fi has a current position pi, radius ri, current velocity vi, number of followers f ollowersi, source srci, destination desti, next immedi- ate destination nextDesti, preferred velocity vpref i.e the velocity with which it would traverse had there been no obstacles in its path, maximum velocity vmax , neighbours neighboursi which indicates the formations in its vicinity, neighbourDisti which refers to the formations that are at a distance less than this value. i i We use the RRT* to find the preferred path from srci to desti for each formation fi and interpolate the path returned by RRT* to get multiple way points in the path. The nextDesti for each formation i is set to the first point of the interpolated path indicating that the formation's tentative Formation Control(Formation 1)Refer Section (ⅣB)Formation Control(Formation 2)Refer Section (ⅣB)Formation Control(Formation 3)Refer Section (ⅣB)Modified Version of ORCA (Algorithm 2) Gives collision avoidance Velocity for the leader of the formation(Command Velocities of followers are computed using leader's velocity) RRT* andInterpolationTrajectory Information target is to reach the nextDesti and vpref is set to (nextDesti - pi). i for each formation For each timestep dt, new collision avoiding velocities are computed for each of the leaders of the formations through Algorithm 2. To compute the collision avoidance velocities for each formation fi, consider all the neighbours j in neighboursi for formation fi and compute V Oτ ij and ij from Eq.(2) and Eq(3) for all the neighbours j ORCAτ in neighboursi and compute u from [11]. Now, compute i and v∗ from Eq(4) and Eq(5) to get the holonomic ORCAτ velocity of the leader of the formation fi. Now, map the holonomic velocity to non-holonomic velocities as illustrated in [13]. If the formation fi at a distance less than δ from nextDesti where δ is a parameter to be set based on the environment, then update the nextDesti to the next point of the interpolated path and the preferred velocity of formation vpref to (nextDesti - pi). This modified version of nh- i ORCA is given in Algorithm 2. Hi Once the leader velocities of the formations are computed using Eq.(2), command velocities of all the followers are computed using Eq. (1) which are then applied to all the robots. The complete algorithm is illustrated in Algorithm 1 VI. RESULTS TABLE I: List of parameters for each robot Parameter Name k1 k2 k3 k4 k5 k6 δ τ dt τobstacle maxspeed (m/s) neighbourDist Value 1.5 1.0 0.025 15.0 1.0 1.0 1.3 11 5 4 0.0167 0.03 We showcase the simulation results of the presented al- gorithm and discuss various aspects of the system. In the simulations,we consider a Baseline scenario in which a pay- load transport system is carrying a payload from one place to another while there are no other transport systems and static obstacles in the surroundings. We compare the baseline results with (a) Multiple PTS moving in the environment (b) Multiple PTS and static obstacles in the environment. We compare the time taken, velocity variations and scalability aspect of this approach with the baseline result. A. Multiple Payload Transport Systems In this case, we consider four payload transport systems carrying a payload to their respective destinations. Each PTS has to avoid the traffic as posed by the other transport sys- tems while heading towards the destination simultaneously. Different shapes (circle, square, triangle) are considered for different PTS to make the problem more challenging. Each formation has different number of robots ranging from 3−10. However, the number of formations in an environment and number of robot limited and will in a formation is not Fig. 3: Four PTS are running avoiding collision with the other systems and simultaneously reaching towards the goal discussed in latter part of the section. Fig. 3 shows the initial set of all the Payload transport systems present and their respective goal points (denoted by the same color). The simulation is symmetric and hence all formations travel almost the same distance. Fig. 4: Comparison of time taken by our system with and without any traffic in the environment We compare the time taken by the system in this envi- ronment with a system having no traffic in the environment. Fig. 4 shows that the time taken by the system in presence of traffic is approximately equal to a system moving in no traffic environment. This time is nearly equal, as all the PTS create a symmetric trajectory and hence takes nearly equal time to reach their destination. It is important to note that all the payload transport sys- tems maintain a minimum distance from each other ensuring no collision while in motion. Fig. 5 shows the distance maintained by each PTS to its closest neighbourhood. The figure shows that all the PTS are maintaining a minimum threshold and hence it is clear that the payload systems are not colliding with each other. The change in the velocities of each PTS when coming close to each other is shown in Fig. 6. We can see that whenever the PTS are coming close to each other, the velocities of the followers in the formation experiences a changes such that the collision can be avoided. Points A, B, C, D are marked in Fig. 5 and Fig. 6 which can be used to relate the two graphs. We can observe that at point B, all the formation are close to each other (see Fig. (a)(b)(c)(d)(e)(f) figure shows that the distance of each followers from the leader is approximately equal to 0.35, even when a system avoids any collision with its neighbourhood. B. Multiple Payload Transport Systems with Static Obstacles To make our results more concrete, we consider an en- vironment where there are multiple PTS are moving along with the static obstacles between the start point and the desti- nation. We consider four payload transport systems carrying Fig. 5: Distance of each PTS with its closest neighbourhood. 3(f)) and hence suffers a velocity change in the robots of all the PTS. Similarly, point A, C are the points where the PTS started changing the trajectory to successfully avoid the obstacles. Fig. 8: Four PTS are running avoiding collision with static obstacles and other transport systems a payload. Five static obstacles are considered at random places in the arena. Each payload transport system receives the trajectory information using Algorithm 1 such that there is no collision amongst the PTS and static obstacles. Fig. 8 shows a initial set up of all formations and the obstacles present in the surroundings. We observe that all the systems successfully avoid collision with the obstacles. Fig. 6: Velocities of all the robots in each PTS. Fig. 7: Distance of all the robots in each formation While avoiding traffic in the surroundings, we ensure that each payload transport system maintains the robots formation using the leader-follower based approach. Fig. 7 depicts that the followers in each formation nearly maintains the desired distance and orientation from the leader. For simulation, we have considered this distance constant for all the followers in all the PTS, which is equal to 0.35m. The Fig. 9: Comparison of time taken by our system with and without any traffic and static obstacles in the environment We compare the time taken by the PTS to reach to their respective destinations with and without obstacles. Fig. 9 shows that the time taken by the PTS in presence of obstacles is comparable to the time taken by the PTS in no obstacles scenario. We conclude that an optimal collision avoiding path is provided by our control algorithm. In this case, we plot the minimum distance of a PTS which is to be maintained wrt. neighbourhood PTS (similar to the 0100200300400500Time steps (in seconds)0.02.55.07.510.012.515.0Distance (in meters)ABCD1 meter(a) Formation 1Formation 2Formation 3Formation 4Threshold0100200300400500Time steps (in seconds)0.02.55.07.510.012.515.0Distance (in meters)ABCD1 meter(b) Formation 2Formation 1Formation 3Formation 4Threshold0100200300400500Time steps (in seconds)0.02.55.07.510.012.515.0Distance (in meters)ABCD1 meter(c) Formation 3Formation 1Formation 2Formation 4Threshold0100200300400500Time steps (in seconds)0.02.55.07.510.012.515.0Distance (in meters)ABCD1 meter(d) Formation 4Formation 1Formation 2Formation 3ThresholdDistance of each formation to its closest formation0100200300400500Time steps (in seconds)0.20.10.00.10.2Velocity (m/s)ABCD(a) Formation 1leaderFollower 1Follower 2Follower 3Follower 40100200300400500Time steps (in seconds)0.20.10.00.10.2Velocity (m/s)ABCD(b) Formation 2leaderFollower 1Follower 2Follower 3Follower 40100200300400500Time steps (in seconds)0.20.10.00.10.2Velocity (m/s)ABCD(c) Formation 3leaderFollower 1Follower 2Follower 3Follower 40100200300400500Time steps (in seconds)0.20.10.00.10.2Velocity (m/s)ABCD(d) Formation 4leaderFollower 1Follower 2Follower 3Follower 4Velocities of all the followers in each Formation0100200300400500Time steps(in seconds)0.00.10.20.30.40.5Distance from Leader(a) Formation 1Follower 1Follower 2Follower 3Follower 40100200300400500Time steps(in seconds)0.00.10.20.30.40.5Distance from Leader(b) Formation 2Follower 1Follower 2Follower 3Follower 40100200300400500Time steps(in seconds)0.00.10.20.30.40.5Distance from Leader(c) Formation 3Follower 1Follower 2Follower 3Follower 40100200300400500Time steps(in seconds)0.00.10.20.30.40.5Distance from Leader(d) Formation 4Follower 1Follower 2Follower 3Follower 4Desired Distance to maintain = 0.35m(a)(b)(c)(d)(e)(f) Fig. 10: Distance of each PTS with its closest neighbourhood in presence of static obstacles. Fig. 12: Distance of all the robots in each formation in presence of static obstacles previous case with no static obstacle). This will make sure that the formations do not collide with each other. Fig. 10 shows the minimum distance maintained by each PTS with its closest neighbourhood PTS. We present a change in the velocities of each PTS when coming close to each other Fig. 11. We observe, a PTS changes its velocities (as generated by the nh-ORCA) such that it avoids any collision with other obstacles. As discussed in the above case, we mark points in Fig. 10 and Fig. 11 to relate the change in velocities of the formation in the vicinity of the other formations or static obstacles. For example, formation 2 and formation 4 come close to each other at Point B and the velocity of both the formation also changes at the same to avoid any obstacle (see Fig. 11). through simulations, that our system works well with 30 different payload transport systems with variable number of robots in each of them. But, in general, it can be extended to any number of PTS. Fig. 13 shows that all the PTS reach their destination to complete a given task without colliding with any of the neighbourhood PTS. Thus our system is more robust and reliable to work with large number of PTS in an industrial/warehouse environment. We have added more detailed results and simulations of the scalability in the video uploaded. Fig. 11: Robots velocities of all PTS with static obstacles. It is even more challenging in this case to maintain the formation for each PTS as the static obstacles in the surroundings make it more difficult to maintain the desired distance and angles of the follower with the leader robot. Fig. 12 highlights that the followers in each PTS is maintaining the specified parameters with the leader when avoiding the obstacles. For simulation of this scenario also, we have taken the distance of followers w.r.t to leader to be 0.35m. C. Scalability analysis of the system Our system scales well with the increase in number of PTS, hence making it more efficient and robust. We showcase Fig. 13: Thirty different PTS are moving to carry a payload to their respective destination without any collision. VII. CONCLUSION We simulate the traffic management strategies for multiple loosely coupled payload transport system. Each PTS com- prises of a number of non-holonomic mobile robots which are moving in a formation and carrying a payload from one place to another. The formation control is done using a decentralized leader-follower based algorithm. A modified version of decentralized collision avoidance algorithm nh- ORCA is used to compute the collision-free velocities for the leader of the formation. The followers follow the leader such that a rigid formation is maintained while simultaneously moving towards a goal. Various environments are considered for the simulation which includes (a) Multiple PTS are running with no other obstacles (b) Multiple PTS are running with static obstacles. A comparison is made with a baseline scenario where individual PTS are moving to reach a goal. 0100200300400500600Time steps (in seconds)0.02.55.07.510.012.515.0Distance (in meters)ABCD1 meter(a) Formation 1Formation 2Formation 3Formation 4Threshold0100200300400500600Time steps (in seconds)0.02.55.07.510.012.515.0Distance (in meters)ABC1 meter(b) Formation 2Formation 1Formation 3Formation 4Threshold0100200300400500600Time steps (in seconds)0.02.55.07.510.012.515.0Distance (in meters)ABC1 meter(c) Formation 3Formation 1Formation 2Formation 4Threshold0100200300400500600Time steps (in seconds)0.02.55.07.510.012.515.0Distance (in meters)ABCD1 meter(d) Formation 4Formation 1Formation 2Formation 3ThresholdDistance of each formation to its closest Formation0100200300400500600Time steps (in seconds)0.20.10.00.10.2Velocity (m/s)ABCD(a) Formation 1leaderFollower 1Follower 2Follower 3Follower 4Follower 5Follower 6Follower 70100200300400500600Time steps (in seconds)0.20.10.00.10.2Velocity (m/s)ABC(b) Formation 2leaderFollower 1Follower 2Follower 3Follower 40100200300400500600Time steps (in seconds)0.20.10.00.10.2Velocity (m/s)ABC(c) Formation 3leaderFollower 1Follower 2Follower 3Follower 40100200300400500600Time steps (in seconds)0.20.10.00.10.2Velocity (m/s)ABCD(d) Formation 4leaderFollower 1Follower 2Follower 3Follower 4Follower 5Follower 6Velocities of all the followers in each Formation0100200300400500600Time steps0.00.10.20.30.40.5Distance from Leader(a) Formation 1Follower 1Follower 2Follower 3Follower 4Follower 5Follower 6Follower 70100200300400500600Time steps0.00.10.20.30.40.5Distance from Leader(b) Formation 2Follower 1Follower 2Follower 3Follower 40100200300400500600Time steps0.00.10.20.30.40.5Distance from Leader(c) Formation 3Follower 1Follower 2Follower 3Follower 40100200300400500600Time steps0.00.10.20.30.40.5Distance from Leader(d) Formation 4Follower 1Follower 2Follower 3Follower 4Follower 5Follower 6Desired Distance to maintain = 0.35m(a)(b)(c)(d) REFERENCES [1] P. Verma, R. Tallamraju, A. Rawat, S. Chand, and K. Karlapalem, "Loosely coupled payload transport system with robot replacement," in Autonomous Robots and Multi-Robot Systems (ARMS) with AAMAS, 2019. [2] J. Alonso-Mora, S. Baker, and D. Rus, "Multi-robot formation control and object transport in dynamic environments via constrained opti- mization," The International Journal of Robotics Research, vol. 36, no. 9, pp. 1000 -- 1021, 2017. [3] Z. Wang and M. Schwager, "Multi-robot manipulation without com- munication," in Distributed Autonomous Robotic Systems, pp. 135 -- 149, Springer, 2016. [4] H.-z. Zhuang, S.-x. Du, and T.-j. Wu, "Research on path planning and related algorithms for robots [j]," Bulletin of Science and Technology, vol. 3, 2004. [5] M. Vestal, M. Lafary, and P. Stopera, "Job management system for a fleet of autonomous mobile robots," Dec. 11 2014. US Patent App. 14/370,383. [6] A. Baranzadeh and A. V. Savkin, "A distributed control algorithm for area search by a multi-robot team," Robotica, vol. 35, no. 6, pp. 1452 -- 1472, 2017. [7] S. Sharma, A. Shukla, and R. Tiwari, "Multi robot area exploration using nature inspired algorithm," Biologically Inspired Cognitive Ar- chitectures, vol. 18, pp. 80 -- 94, 2016. [8] Y. U. Cao, A. S. Fukunaga, and A. Kahng, "Cooperative mobile robotics: Antecedents and directions," Autonomous robots, vol. 4, no. 1, pp. 7 -- 27, 1997. [9] L. E. Parker and F. Tang, "Building multirobot coalitions through automated task solution synthesis," Proceedings of the IEEE, vol. 94, no. 7, pp. 1289 -- 1305, 2006. [22] A. N. Asl, M. B. Menhaj, and A. Sajedin, "Control of leader -- follower formation and path planning of mobile robots using asexual reproduction optimization (aro)," Applied Soft Computing, vol. 14, pp. 563 -- 576, 2014. [23] J. Alonso-Mora, E. Montijano, M. Schwager, and D. Rus, "Distributed multi-robot formation control among obstacles: A geometric and optimization approach with consensus," in 2016 IEEE international conference on robotics and automation (ICRA), pp. 5356 -- 5363, IEEE, 2016. [24] D. Zhou, Z. Wang, and M. Schwager, "Agile coordination and assistive collision avoidance for quadrotor swarms using virtual structures," IEEE Transactions on Robotics, vol. 34, no. 4, pp. 916 -- 923, 2018. [25] M. Bernard and K. Kondak, "Generic slung load transportation system using small size helicopters," in 2009 IEEE International Conference on Robotics and Automation, pp. 3258 -- 3264, IEEE, 2009. [26] F. Hou, N. Ranasinghe, B. Salemi, and W.-M. Shen, "Wheeled loco- motion for payload carrying with modular robot," in 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, pp. 1331 -- 1337, IEEE, 2008. [27] J. Alonso-Mora, S. Baker, and D. Rus, "Multi-robot formation control and object transport in dynamic environments via constrained opti- mization," The International Journal of Robotics Research, vol. 36, no. 9, pp. 1000 -- 1021, 2017. [28] S. Karaman and E. Frazzoli, "Sampling-based algorithms for optimal journal of robotics research, motion planning," The international vol. 30, no. 7, pp. 846 -- 894, 2011. [29] P. Fiorini and Z. Shiller, "Motion planning in dynamic environments using velocity obstacles," The International Journal of Robotics Re- search, vol. 17, no. 7, pp. 760 -- 772, 1998. [10] X. Yang, K. Watanabe*, K. Izumi, and K. Kiguchi, "A decentral- ized control system for cooperative transportation by multiple non- holonomic mobile robots," International Journal of Control, vol. 77, no. 10, pp. 949 -- 963, 2004. [11] J. Van Den Berg, S. J. Guy, M. Lin, and D. Manocha, "Reciprocal n-body collision avoidance," in Robotics research, pp. 3 -- 19, Springer, 2011. [12] Z. Peng, G. Wen, A. Rahmani, and Y. Yu, "Leader -- follower formation control of nonholonomic mobile robots based on a bioinspired neuro- dynamic based approach," Robotics and autonomous systems, vol. 61, no. 9, pp. 988 -- 996, 2013. [13] J. Alonso-Mora, A. Breitenmoser, M. Rufli, P. Beardsley, and R. Siegwart, "Optimal reciprocal collision avoidance for multiple non-holonomic robots," in Distributed Autonomous Robotic Systems, pp. 203 -- 216, Springer, 2013. [14] S. Liu, D. Sun, and C. Zhu, "Coordinated motion planning for multiple mobile robots along designed paths with formation requirement," IEEE/ASME transactions on mechatronics, vol. 16, no. 6, pp. 1021 -- 1031, 2011. [15] E. Pereyra, G. Aragu´as, and M. Kulich, "Path planning for a formation of mobile robots with split and merge," in International Conference on Modelling and Simulation for Autonomous Systems, pp. 59 -- 71, Springer, 2017. [16] Y. Shapira and N. Agmon, "Path planning for optimizing survivabil- ity of multi-robot formation in adversarial environments," in 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 4544 -- 4549, IEEE, 2015. [17] L. Polkowski and P. Osmialowski, "Navigation for mobile autonomous robots and their formations: An application of spatial reasoning induced from rough mereological geometry," in Mobile robots nav- igation, InTech, 2010. [18] S. Garrido, L. Moreno, J. V. Gomez, and P. U. Lima, "General path planning methodology for leader-follower robot formations," International Journal of Advanced Robotic Systems, vol. 10, no. 1, p. 64, 2013. [19] R. Gautam, R. Kala, et al., "Motion planning for a chain of mobile robots using a* and potential field," Robotics, vol. 7, no. 2, p. 20, 2018. ´Alvarez, J. V. G´omez, S. Garrido, and L. Moreno, "3d robot formations path planning with fast marching square," Journal of Intelligent & Robotic Systems, vol. 80, no. 3-4, pp. 507 -- 523, 2015. [20] D. [21] Q. Zuo, M. Chu, Y. Ding, L. Ma, and H. Sun, "A new path planning method for multi-robot formation in three-dimensional space," in 2016 4th International Conference on Sensors, Mechatronics and Automation (ICSMA 2016), Atlantis Press, 2016.
1711.07951
1
1711
2017-11-21T18:22:05
Cellular Automata Simulation on FPGA for Training Neural Networks with Virtual World Imagery
[ "cs.MA" ]
We present ongoing work on a tool that consists of two parts: (i) A raw micro-level abstract world simulator with an interface to (ii) a 3D game engine, translator of raw abstract simulator data to photorealistic graphics. Part (i) implements a dedicated cellular automata (CA) on reconfigurable hardware (FPGA) and part (ii) interfaces with a deep learning framework for training neural networks. The bottleneck of such an architecture usually lies in the fact that transferring the state of the whole CA significantly slows down the simulation. We bypass this by sending only a small subset of the general state, which we call a 'locus of visibility', akin to a torchlight in a darkened 3D space, into the simulation. The torchlight concept exists in many games but these games generally only simulate what is in or near the locus. Our chosen architecture will enable us to simulate on a micro level outside the locus. This will give us the advantage of being able to create a larger and more fine-grained simulation which can be used to train neural networks for use in games.
cs.MA
cs
Cellular Automata Simulation on FPGA for Training Neural Networks with Virtual World Imagery Olivier Van Acker and Oded Lachish Department of Computer Science and Information Systems Birkbeck, University of London London, United Kingdom [email protected], [email protected] Graeme Burnett Enhyper Ltd. London, United Kingdom [email protected] 7 1 0 2 v o N 1 2 ] A M . s c [ 1 v 1 5 9 7 0 . 1 1 7 1 : v i X r a Abstract-We present ongoing work on a tool that consists of two parts: (i) A raw micro-level abstract world simulator with an interface to (ii) a 3D game engine, translator of raw abstract simulator data to photorealistic graphics. Part (i) implements a dedicated cellular automata (CA) on reconfigurable hardware (FPGA) and part (ii) interfaces with a deep learning framework for training neural networks. The bottleneck of such an architecture usually lies in the fact that transferring the state of the whole CA significantly slows down the simulation. We bypass this by sending only a small subset of the general state, which we call a 'locus of visibility', akin to a torchlight in a darkened 3D space, into the simulation. The torchlight concept exists in many games but these games generally only simulate what is in or near the locus. Our chosen architecture will enable us to simulate on a micro level outside the locus. This will give us the advantage of being able to create a larger and more fine- grained simulation which can be used to train neural networks for use in games. Index Terms-Cellular Automata; FPGA; Simulation; Ma- chine learning; Neural networks; Unreal Engine; I. BACKGROUND There have been exciting new results of training neural networks with photo realistic imagery from virtual worlds [1]. The training of these neural networks uses rendered images from virtual worlds instead of real world data, the two biggest advantages of this approach being, firstly, fewer limitations in executing potentially difficult or dangerous scenarios, and secondly, the ability to accelerate the speed of the simulation means faster training of the neural network. In recent years, the game industry has spent a lot of effort on creating game engines which can output near-photorealistic imagery in real time, making it possible to train neural networks for real world scenarios using this output. Several projects are being developed to make it easier for neural network frameworks to interface with these engines [2], [3]. Cellular Automata (CA) is an effective technique for simu- lating, on a micro level, complex behavior such as pedestrian traffic, moving agents [4] or, as in our proof of concept, the traffic of narrowboats1 on a system of canals. With a simple set of rules, contained in each cell, describing the behavior of passing agents, it is possible to get an extraordinarily complex macroscopic view of the flow of traffic [4]. 1Narrowboats were the main transportation system for goods at the start of the industrial revolution in the UK CA, because of its inherent massive spatial parallelism, locality and discrete nature, is a perfect candidate for imple- mentation on programmable FPGA (field-programmable gate array) technology [5]. FPGAs are reconfigurable hardware devices, where the set of rules contained in each cell can be described in hardware via lookup tables and flip-flops (for storing state), and with every clock cycle the state of all cells can be updated in parallel. The remainder of this paper describes our current work, in which we are implementing a CA for simulating traffic on an FPGS, to train neural networks. These trained neural networks can be used to create game environments with 'real world'-like behavior. II. IMPLEMENTATION OF CA MICROSIMULATION ON FPGA We are developing a tool which microsimulates traffic in a virtual world and gives a game engine a limited view of certain areas of the world a 'locus of visibility'. By limiting the amount of data made available for rendering and subsequent learning of a neural network, we can increase the size and granularity of the simulation, which will make the macro view more realistic. The data of this locus of view, akin to a torchlight in a darkened 3D space, or a traffic camera used to monitor traffic on a busy crossing in a city, will be passed on to a game engine which will generate a photorealistic video feed of the exposed area. This video feed will be used for training a neural network. The simulation will run several times faster than it would normally do when a game is played, to speed up the training of the neural network. The simulation uses the cellular automata (CA) method and a 'locus of visibility controller' extracts the localized data from the simulation and exposes it over the network to one or more consumers. The CA will be implemented on a FPGA and communicate over PCIe to a network card (NIC), exposing it over the network. The Unreal Engine captures this data and a neural network interfaces with the game engine via UnrealCV [2], an ©2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. DOI: 10.1109/CIG.2017.8080450 A. Proof of concept: Narrowboat Simulator In our first proof of concept we will simulate the traffic of a large number of narrowboats on an intricate canal system, transporting resources (for example, coal or grain) between supply points and delivery points in competing economic areas. The flow and density of traffic can be regulated via locks (chambered gates used to raise or lower water level, allowing boats to move to higher or lower levels of a canal), distributed throughout the canal system. The neural network first trains itself by observing the traffic at several locks. Once trained, the neural network will be used to play a game in which it competes against a (human) opponent, to bring as many resources as possible to its own delivery points, manipulating the traffic by operating the locks. FUTURE WORK The implementation of the narrowboat simulator will be a starting point from which to build more complex simulations of growing cities with different transportation systems, inter- acting with each other. This city transport simulator can then be used to train neural networks to operate different aspects of the simulation, for example, resource management. Both trained neural networks and simulator can be used to create games in which the environments and elements within them exhibit more complex, 'real world'-like behavior. REFERENCES [1] "Artificial intelligence: Why video The [Online]. http://www.economist.com/news/science-and-technology/ games Available: 21721890-games-help-them-understand-reality-why-ai-researchers-video-games researchers May Economist,," AI like 2017. [2] W. Qiu and A. Yuille, "UnrealCV: Connecting Computer Vision to Unreal Engine," arXiv:1609.01326 [cs], Sep. 2016, arXiv: 1609.01326. [Online]. Available: http://arxiv.org/abs/1609.01326 [3] H. Kinsley, "Explorations of Using Python to play Grand Theft Auto 5." 2017. [4] V. J. Blue and J. L. Adler, "Cellular automata microsimulation for modeling bi-directional pedestrian walkways," Transportation Research Part B: Methodological, vol. 35, no. 3, pp. 293–312, Mar. 2001. [Online]. Available: http://www.sciencedirect.com/science/article/ pii/S0191261599000521 [5] M. Halbach and R. Hoffmann, "Implementing cellular automata in FPGA logic," in 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings., Apr. 2004, pp. 258–. [6] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell, "Caffe: Convolutional Architecture for Fast Feature Embedding," in Proceedings of the 22Nd ACM International Conference on Multimedia, ser. MM '14. New York, NY, USA: ACM, 2014, pp. 675–678. [Online]. Available: http: //doi.acm.org/10.1145/2647868.2654889 Fig. 1. Architecture of the tool Unreal Engine plugin for interfacing with deep learning frameworks such as Caffe [6]. The simulated world is split up into hexagons and each in- dividual area has a fixed locality to adjacent hexagons and can hold multiple agents. Each hexagon is represented by a cell in the CA. The movement of agents and the state of the cell is determined by the rule set contained in every individual cell.
1003.0617
1
1003
2010-03-02T15:38:48
Agent Based Approaches to Engineering Autonomous Space Software
[ "cs.MA", "cs.AI" ]
Current approaches to the engineering of space software such as satellite control systems are based around the development of feedback controllers using packages such as MatLab's Simulink toolbox. These provide powerful tools for engineering real time systems that adapt to changes in the environment but are limited when the controller itself needs to be adapted. We are investigating ways in which ideas from temporal logics and agent programming can be integrated with the use of such control systems to provide a more powerful layer of autonomous decision making. This paper will discuss our initial approaches to the engineering of such systems.
cs.MA
cs
Agent Based Approaches to Engineering Autonomous Space Software∗ Louise A. Dennis Department of Computer Science, University of Liverpool, UK [email protected] Michael Fisher Department of Computer Science, University of Liverpool, UK Nicholas Lincoln Department of Engineering, University of Southampton, UK Alexei Lisitsa Department of Computer Science, University of Liverpool, UK Sandor M. Veres Department of Engineering, University of Southampton, UK Current approaches to the engineering of space software such as satellite control systems are based around the development of feedback controllers using packages such as MatLab's Simulink tool- box. These provide powerful tools for engineering real time systems that adapt to changes in the environment but are limited when the controller itself needs to be adapted. We are investigating ways in which ideas from temporal logics and agent programming can be integrated with the use of such control systems to provide a more powerful layer of autonomous decision making. This paper will discuss our initial approaches to the engineering of such systems. 1 Introduction Modern control systems are limited in their ability to react flexibly and autonomously to changing situ- ations. The limiting factor is the complexity inherent in analysing situations where many variables are present. There are many complex, real-world, control systems but we are primarily interested in the (autonomous) control of satellite systems. Consider the problem of a single satellite attempting to maintain a geostationary orbit. Current satellite control systems maintain orbits using feedback controllers. These implicitly assume that any errors in the orbit will be minor and easily corrected. In situations where more significant errors occur, for example caused by a thruster malfunction, it is desirable to modify or change the controller. The complexity of the decision task is a challenge to standard approaches, and has led, for example, to complex, evolutionary control systems. These become very difficult to understand. We approach the problem from the perspective of rational agents [6]. We consider a satellite to be an agent which consists of a discrete (rational decision making) part and a continuous (calculation) part. The discrete part uses the Belief-Desire-Intention (BDI) theory of agency [5] and governs high level decisions about when to generate new feedback controllers. The continuous, calculational part is used to ∗Work funded by EPSRC grants EP/F037201/1 and EP/F037570/1 M. Bujorianu and M. Fisher (Eds.): Workshop on Formal Methods for Aerospace (FMA) EPTCS 20, 2010, pp. 63–67, doi:10.4204/EPTCS.20.6 c(cid:13) L. A. Dennis et al. This work is licensed under the Creative Commons Attribution License. 64 Agent Based Approaches to Engineering Autonomous Space Software derive controllers and to calculate information from continuous data which can be used in the decision making process; this part can be viewed as a hybrid system. 2 Architecture Figure 1: Implemented Hybrid Agent Architecture Our prototype system is shown in Fig. 1. We have implemented a simulated environment and real time satellite control system in MatLab using the Simulink tool kit. The continuous agent part is also implemented in MatLab. MatLab has no easy provision for threaded execution which forces us to use separate instances for the Real Time aspects (i.e. the feedback controller and simulated environment) and for the Continuous Agent part. The agent also contains a discrete agent part which is currently implemented in the Gwendolen agent programming language1. Gwendolen [2] is implemented on top of JAVA. The real time control system sends information (which may be pre-processed) to the agent part of the system. When it acts, the discrete part of the agent may either cause the continuous agent part to perform some calculation (and wait for the results) or it may send an instruction to the real time control system to alter its controller. Since the new controller has been created "on the fly" by the continuous part, some aspects of this controller are stored in the shared file system (accessed by both MatLab processes). The discrete agent part is divided into an abstraction engine which takes continuous data supplied by the satellite simulation and transforms this data into discrete shared beliefs which are accessed by a 1The choice of language was dictated entirely by convenience. It is a subject for further work to examine more widely used BDI-languages and evaluate which is most appropriate for the system. AgentPartMATLABJAVAMODEL OF SYTEMRational Agent PartThin Environment LayerAGENTFile SystemReal Time ControlSend DataActData FlowControl FlowAbstraction EngineShared BeliefsReasoningReasonActSenseContinuous Calculate L. A. Dennis et al. 65 reasoning engine which makes decisions about how to behave. The discrete part is split in two because reasoning is comparatively slow compared to the flow of data coming in from the simulation. It can become "clogged" up with the need to react to changing information if it tries to perform both the abstraction tasks and the reasoning tasks at once. The separation of abstraction and reasoning is both theoretically clean and practical at an implementational level. 3 BDI Programming Aspects The architecture lets us represent the high-level decision making aspects of the program in terms of the beliefs and goals of the agent and the events it observes. So, for instance, when the agent observes the event that the satellite is in a new position (information relayed to it by the real time controller) it can call on the continuous part to calculate whether this position is within acceptable bounds of the desired orbit (i.e. whether the existing real-time controller is capable of maintaining the orbit). If, as a result of this, it gains a belief that the satellite has strayed from the orbit it can request the continuous part to calculate a new path for the satellite to follow using techniques described in [4]. Similarly, if the satellite has strayed from its bounds, the discrete agent part can examine its beliefs about the current status of the thrusters and, if necessary, instruct the continuous part to generate a new feedback controller which takes into account any malfunctions or inefficiencies in the thrusters. Such programs can be expressed compactly in the BDI-programming style without the need for programming large decision trees to consider all possible combinations of thruster status and satellite positions. This should then reduce the probability of error in the decision-making parts of the program and opens the possibility that existing techniques for model checking such programs [1] can be adapted to verify this part. 3.1 Geostationary Orbit Case Study The agent code for the geostationary orbit is shown in code fragments 3.1 and 3.2. Fragment 3.1 shows the code for the abstraction engine. Every time it "perceives" the satellite position (stateinfo) it calls upon MatLab to calculate whether or not this position is within bounds (comp_distance) and then asserts and removes shared beliefs appropriately. The code is shown as a series of plans of the form trigger:{guard} ← deeds where the trigger is some event observed by the agent, the guard is a set of facts that must be true before the plan is activated and the deeds are a stack of deeds to be executed. +b is the addition of a belief, b, and -b is the removal of the belief, b. In a guard B b means that b is believed. Code fragment 3.1 Geostationary Orbit Control (Abstraction Engine) +stateinfo(L1, L2, L3, L4, L5, L6) : {B proximity_to_centre(V1)} ← comp_distance(L1, L2, L3, L4, L5, L6, Val), +proximity_to_centre(Val); +proximity_to_centre(in) : {B proximity_to_centre(out)} ← -proximity_to_center(out), remove_shared(proximity_to_centre(out)), assert_shared(proximity_to_centre(in)); +proximity_to_centre(out) : {B proximity_to_centre(in), 1 2 3 4 5 6 7 8 9 10 11 12 66 Agent Based Approaches to Engineering Autonomous Space Software B stateinfo(L1, L2, L3, L4, L5, L6)} ← -proximity_to_centre(in), remove_shared(stateinfo(A1, A2, A3, A4, A5, A6)), assert_shared(stateinfo(L1, L2, L3, L4, L5, L6)), remove_shared(proximity_to_centre(in)), assert_shared(proximity_to_centre(out)); 13 14 15 16 17 18 Fragment 3.2 reacts to the dynamic information about whether the satellite is within bounds or not. It may call a MatLab function, plan_approach_to_centre which returns the name of a plan to move a satellite back within bounds. apply_controls and maintain_path are actions applied to the simulation of the satellite which apply a named plan, or continue normal operation as appropriate. The syntax +!g indicates the acquisition of a goal. Code fragment 3.2 Geostationary Orbit Control +proximity_to_centre(out) : {(cid:62)} ← -proximity_to_centre(in), +!get_to_centre; +proximity_to_centre(in) : {(cid:62)} ← -proximity_to_centre(out), maintain_path; +!get_to_centre : {B proximity_to_centre(out), B stateinfo(L1, L2, L3, L4, L5, L6)} ← plan_approach_to_centre(P, locn(L1, L2, L3, L4, L5, L6)), +!try_execute(P) ; +!try_execute(P) : {B proximity_to_centre(out)} ← apply_controls(P); 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 3.2 Decision and Control The important aspect of both the above example and the architecture in general is that the (MatLab) con- trol systems take care of the detailed calculation of continuous functions (paths, etc), while the rational agent takes care of high-level decisions about targets and plans. This separation of concerns simplifies both parts and avoids the problems associated with large, opaque, complex, adaptive and evolutionary control systems. 4 Future Work We are currently working on our prototype system and case study which will allow us to make com- parisons of this agent approach to autonomous decision-making in satellite systems to approaches based on finite state machines and standard control. We also are interested in investigating the use of tempo- ral logic and model checking to generate forward planning capabilities for the agent along the lines of those investigated by Kloetzer and Belta [3]. We aim to explore the possibility of using model checking to verify aspects of the agent's behaviour. Given that we already have a formal verification system for Gwendolen agents [1], there is a strong possibility that we can extend this to cope with (abstractions of) the continuous part. As the diagram below shows, we already have model-checking tools for the L. A. Dennis et al. 67 discrete/finite parts. Our interest now is how far such techniques can be extended to account for other aspects of the agent's behaviour. References [1] R. H. Bordini, L. A. Dennis, B. Farwer, and M. Fisher. Automated verification of multi-agent programs. In Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), pages 69–78, L'Aquila, Italy, September 2008. [2] L. A. Dennis and B. Farwer. Gwendolen: A BDI Language for Verifiable Agents. In B. Lowe, editor, Proc. AISB'08 Workshop on Logic and the Simulation of Interaction and Reasoning, Aberdeen, 2008. AISB. [3] M. Kloetzer and C. Belta. A Fully Automated Framework for Control of Linear Systems From Temporal Logic Specifications. IEEE Transactions on Automatic Control, 53(1):287–297, 2008. [4] N. Lincoln and S. Veres. Components of a Vision Assisted Constrained Autonomous Satellite Formation Flying Control System. International Journal of Adaptive Control and Signal Processing, 21(2-3):237–264, October 2006. [5] A. S. Rao and M. Georgeff. BDI Agents: From Theory to Practice. In Proc. 1st International Conference on Multi-Agent Systems (ICMAS), pages 312–319, June 1995. [6] M. Wooldridge and A. Rao, editors. Foundations of Rational Agency. Applied Logic Series. Kluwer Academic Publishers, Mar. 1999. Discrete and FiniteAgentPartMATLAB"RealWorld"JAVARational Agent PartThin Environment LayerAbstraction EngineShared BeliefsReasoningContinuous
0909.3475
1
0909
2009-09-18T15:58:43
Multi-agent Coordination in Directed Moving Neighborhood Random Networks
[ "cs.MA", "cs.IT", "cs.IT" ]
In this paper, we consider the consensus problem of dynamical multiple agents that communicate via a directed moving neighborhood random network. Each agent performs random walk on a weighted directed network. Agents interact with each other through random unidirectional information flow when they coincide in the underlying network at a given instant. For such a framework, we present sufficient conditions for almost sure asymptotic consensus. Some existed consensus schemes are shown to be reduced versions of the current model.
cs.MA
cs
Multi-agent Coordination in Directed Moving Neighborhood Random Networks Yilun Shang1 Abstract In this paper, we consider the consensus problem of dynamical multiple agents that communicate via a directed moving neighborhood random network. Each agent performs random walk on a weighted directed network. Agents interact with each other through random unidirectional information flow when they coincide in the underlying network at a given instant. For such a framework, we present sufficient conditions for almost sure asymptotic consensus. Some existed consensus schemes are shown to be reduced versions of the current model. Keywords: consensus problem; random graph; stochastic stability. 1. Introduction Synchronization and consensus problems in multi-agent systems have a long history [3]. Over the last few years, considerable research attention has been paid to cooperative group coordination, which has broad applications in a variety of areas including vehicle formation, distributed sensor networks, coupled oscillator systems, animal aggregation and epidemics; see the survey papers [10, 14, 19] and references therein. In a consensus problem, a group of autonomous agents seeks to agree on some quantities of interest via a process of distributed decision making based upon local information interactions. A consensus is reached when all agents in the system tend to attain agreement on the quantities of interest as time evolves, that is, they converge to a common value. The ability to achieve coherent behavior (or consensus) of multi-agent system is inti- mately related with the coupling topology of the underlying communication graph associ- ated with the agents' positions. For example, Ali Jadbabaie et al. [6] analyzed a simplified model of flocking by Vicsek et al. [20] showing that all agents will synchronize eventually, provided the communication graph switching deterministically over time is periodically jointly connected. More recently, there has been some interest in stochastic consensus problems. [4] deals with the agreement problem among a group of static agents with the communication graph presented as Erdos-R´enyi random graph. The results are further extended by [12] to include weighted and directed information flows. In [18], the authors reveal this problem can be reduced to weak ergodicity of a sequence of stochastic matrices. However, the agents are static in these works, in other words, the switching of communi- cation graph is merely due to the adjunctive random mechanism rather than the motion of agents. The moving neighborhood network proposed in [16] is meant to treat stochastic con- sensus among dynamical agents (in social interaction and epidemics originally), where each agent carries an oscillator and diffuses in the environment. The computer simula- tion in the aforementioned paper shows that synchronization is possible even when the communication network is spatially disconnected in general at any frozen time instant. This is in sharp contrast with the behavior of Vicsek model mentioned above. Analytical formalizations are provided by authors of [17, 13, 9] with different consensus protocols (continuous-time with dwell time or discrete-time) through fast switching techniques [17] 1Department of Mathematics, Shanghai Jiao Tong University, Shanghai 200240, CHINA. email: [email protected] 1 and stochastic stability theory [7]. In particular, they specify the moving neighborhood network model as a group of n identical agents implementing simple random walks on a fixed finite connected graph. The vertices of the moving neighborhood network are rep- resented by the agents, and the edges are determined by their locations in the underlying graph, i.e. a link between two agents appears if and only if they reside in the same node simultaneously. The time evolution of the moving neighborhood graph governed by the random walk of agents is called network dynamics and the time evolution of the corre- sponding oscillators system is called system dynamics, which is coupled together with the network dynamics. The purpose of this note is to generalize the above results and go a further step in the direction of [9]. Our extension is threefold. Firstly, we consider the underlying fixed graph as a weighted directed graph. In other words, random walks on weighted directed graph is tackled. Secondly, further randomness is involved in the moving neighborhood graph. A probability is associated (not necessarily independent) to the link between two agents when they occupy the same node, which can be interpreted as communication links may be unreliable due to disturbance. We allow different probabilities and unidirectional communications. Therefore the topology of the moving neighborhood graph is no longer strictly separated clique-like. Finally, we study a discrete-time consensus protocol with inhomogeneous weights, which quantify the way the agents influence each other. By these modifications, some pertinent known results can be recovered (see the remarks in Section 2 & 4), and a number of introduced parameters enhance more flexibility. The rest of this paper is organized as follows. In Section 2, we elaborate on our formal model under consideration. Section 3 contains some mathematical preliminaries and the statement of main result. Proofs are given in Section 4. 2. Problem setup Let ¯G = ( ¯V , ¯E, W ) be a weighted digraph with vertex set ¯V = [m], here [m] := {1, 2,··· , m}. The elements in ¯V will be referred to as nodes. ¯E is a set of ordered pair of elements of ¯V called arcs. W = (wij) is the weight matrix, where wij > 0 if (i, j) ∈ ¯E, and wij = 0 otherwise. Notice that we do not exclude loops. We impose the following condition on the graph ¯G. Assumption 1. The underlying graph ¯G is strongly connected and the gcd (greatest common divisor) of all cycle lengths in ¯G is 1. This assumption will be elucidated in the next section. Let t ∈ N∪{0} be the discrete time step. We consider n identical agents signified by {v1, v2,··· , vn} as random walkers meandering on ¯G, moving randomly to a neighbor of their current location in ¯G at each time step. For each agent, the random neighbor that is chosen is not affected by the agent's previous trajectory. The n random walk processes are mutually independent. A time-varying moving neighborhood graph, G = (V, E, P ), is constructed as follows. Let V = V (t) = {v1, v2,··· , vn} be the vertex set. P = (pij) is an n × n matrix with entries 0 < pij ≤ 1 for i 6= j, and pii = 0 for 1 ≤ i ≤ n. P is dubbed as the linkage probability matrix. Given vi and vj meet at the same node simultaneously, an arc (vi, vj) originating from vi and terminating in vj appears with probability pij. The arc set is denoted by E = E(t). We emphasize here that the selections of arcs are independent with the random walk processes, but are not required to be independent with each other. By definition, G = G(t) has no loops with probability 1. Let Xi(t) ∈ R be the state (attitude, heading, opinion etc.) of agent vi at time t. The 2 consensus protocol can be expressed as Xi(t + 1) = Xi(t) + ε Xj∈Ni(t) bij(Xj(t) − Xi(t)) (1) where Ni(t) is the index set of neighbors of agent vi at instant t, i.e. Ni(t) := {j(vi, vj) ∈ E(t)}. Here, weighting factor bij > 0 for i 6= j, and bii = 0 for 1 ≤ i ≤ n. Let A(t) = (aij(t)) be the adjacency matrix of the moving neighborhood graph G(t), whose entries are given by, aij(t) = (cid:26) bij, 0, (vi, vj) ∈ E(t) otherwise for 1 ≤ i, j ≤ n. Moreover, we assume the following Assumption 2. Suppose that aij(t) = n Pj=1 n Pj=1 aji(t), for 1 ≤ i ≤ n. The implication of Assumption 2 is the out-degrees are equal to in-degrees for every v ∈ V (t). A similar definition used in [11] is referred to as "balanced " digraph. Note that in the context of [11], the underlying communication network is static, while in the current case, we dictate each trajectory of G(t) should be "balanced". However, this requirement is not very stringent after all. For example, if we postulate G(t) can only have bidirectional (or undirected) edges, that is, bij = bji and pij = pji for 1 ≤ i, j ≤ n, then Assumption 2 is satisfied automatically. Also, if bij ≡ b for i 6= j and suppose for each v ∈ V (t), the numbers of arcs going out and coming in are equal, then Assumption 2 is filled, too. It is worth noting that since the selections of arcs can be arbitrarily dependent with each other as mentioned before, the latter of the two examples above can actually occur. sumption is natural; see Section 4. Next, let △ := max1≤i≤n(Pn j=1 bij), and we further assume ε ∈ (0, 1/△). This as- As usual, denote the linear subspace M := {x = (x1, x2,··· , xn)T ∈ Rn xi = xj ∀ 1 ≤ i, j ≤ n} as the synchronization manifold. A consensus is said to be reached if the states of agents converge into M as t approaches infinity. We aim to show that the n agents in V reach consensus almost surely. We end this section by two remarks. Remark 1. Suppose that the linkage probabilities pij(t) and the weighting factors bij(t) are time-dependent, then the main result in this paper holds verbatim as long as pij(t) and bij(t) converge. Remark 2. If we take the underlying graph ¯G to be a single node, then our framework somewhat reduces to that of [4, 18, 12]. 3. Preliminaries and main result Let {Yi(t), t ∈ N ∪ 0} denote the random walk process performed by agent vi such that Yi(t) ∈ ¯V designates the position of vi in the underlying graph ¯G at instant t. For 1 ≤ i ≤ n, let πi(t) = (πi1(t),··· , πim(t))T be the probability distribution of Yi(t) at time t, that is, P (Yi(t) = j) = πij(t) for j ∈ ¯V . By the construction, {Yi(t), 1 ≤ i ≤ n} are n independent homogeneous Markov chains with finite state space ¯V , sharing the same transition probability matrix Q = (qij), whose entry is given by qij = wij di for 1 ≤ i, j ≤ m (2) 3 [15] Thm. 4.2). irreducible and aperiodic (see e.g. j=1 wij represents the out-degree of node i. Also recall that qij = P (Y1(t + where di = Pm 1) = j Y1(t) = i). Notice that by Assumption 1 di 6= 0, so (2) is well-defined. As is known, a finite Markov chain converges to a unique stationary distribution if it is ergodic, i.e. It is clear that the transition probability matrix Q is irreducible if and only if ¯G is strongly connected. Also, it's easy to see that the gcd of all cycle lengths in ¯G is 1 if and only if all eigenvalues of Q other than 1 have modules strictly less than 1. Actually, the above assertions may be proven by employing Perron-Frobenius Theorem [15] and some other equivalent conditions in terms of the ergodicity of random walk are given in [2]. Consequently, in view of Assumption 1, Yi(t) converges to a unique stationary distribution π = (π1,··· , πm)T for 1 ≤ i ≤ n, that is, πT = πT Q. For instance, if Pm j=1 wji for 1 ≤ i ≤ m, then we have πi = di/Pm i,j=1 wij for 1 ≤ i ≤ m, see e.g. [8]. As for the rate of convergence, we have the following lemma, (see [1] Thm. 8.9 for a proof). Lemma 1.([1]) For a finite ergodic Markov chain with transition probability matrix P , let p(t) ji be the (j, i) entry of P t, t ∈ N ∪ 0, then there is a unique stationary distribution {pi} and j=1 wij = Pm p(t) ji − pi ≤ λρt, j=1 b1jp1j,··· ,Pn Xj=1 E∗(L) = πT π(cid:16)diag(cid:0) n n b1jp1j,··· , Xj=1 4 where λ ≥ 0, 0 ≤ ρ < 1. moving neighborhood graph G(t). To be precise, dii(t) = Pn Next, let D(t) = diag(d11(t),··· , dnn(t)) be the out-degree diagonal matrix of the j=1 aij(t), for 1 ≤ i ≤ n, where aij(t) are the entries of A(t) defined in Section 2. Notice that A(t) and D(t) are non-negative time-dependent random matrices. Since aij(t) is a two-point distribution, its expectation is shown to be given by E(aij(t)) = bijpij m Xk=1 πik(t)πjk(t), for i 6= j, (3) and aii(t) = 0. The diagonal entries of D(t) can be written as m n dii(t) = bij1[Yi(t)=k, Yj(t)=k, (vi,vj)∈E(t)]. For a sequence of random elements Z(t), the ergodic limit, E∗(Z), Xk=1 Xj=1,j6=i Thereby, E(dii(t)) = Pm k=1Pn j=1 bijpijπik(t)πjk(t), for 1 ≤ i ≤ n. Now let L(t) = D(t) − A(t) denote the Laplacian matrix [2] of G(t), and it's expectation at time t is EL(t) = ED(t) − EA(t). is defined by E∗(Z) = limt→∞ E(Z(t)), whenever the limit exists. E∗(Z) describes the long-run av- erage respect to its stationary distribution [13]. By the above discussion, the ergodic limit of (3) is E∗(aij) = bijpij Pm k for i 6= j and E∗(aii) = 0 for 1 ≤ i ≤ n. Likewise, E∗(dii) = Pm Now we make a reference to Schur product of two real matrices, which is also known as Hadamard product [5]. Let C = (cij), E = (eij) be two n × m real matrices, then the Schur product, C ◦ E = (cijeij), is simply the product of corresponding entries of C and E. Obviously, C ◦ E = E ◦ C. Utilizing this notation, we obtain E∗(A) = πT πB ◦ P and E∗(D) = πT πdiag(Pn j=1 bijpij for 1 ≤ i ≤ n. j=1 bnjpnj). Hereby, we have kPn k=1 π2 k=1 π2 bnjpnj(cid:1) − B ◦ P(cid:17). (4) E∗(L) is positive semi-definite and have an eigenvalue 0 since E∗(L)1 = 0, where 1 is the all-1 column vector. We need the following lemma regarding Schur product. Lemma 2. Suppose C, E are two n× n real matrices and x, y are two n× 1 real vectors, then yT (C ◦ E)x = tr(cid:0)diag(yT )T Cdiag(xT )ET(cid:1). The proof will be given in the next section. An asymptotic stability result in [7] is restated below for convenience, which is an analogy of the deterministic Lyapunov stability theorem. Lemma 3.([7], pp.195) Let {Xn} be a Markov chain on state space S. Suppose that there is a non-negative function ξ(x) satisfying E(ξ(X1)X0 = x) − ξ(x) = −η(x), where η(x) ≥ 0 on the set Qβ := {x : ξ(x) < β}. Then P(cid:0) sup n≥0 ξ(Xn) ≥ βX0 = x(cid:1) ≤ ξ(x)/β, and accordingly, η(Xn) → 0 almost surely for paths which remain in Qβ. It is at this stage, we state our main result as follows. Theorem 1. Under the circumstances and assumptions presented above, the stochastic system expressed by (1) reaches consensus almost surely. 4. Proofs This section includes the proofs of Lemma 2 and Theorem 1. Proof of Lemma 2. Let 1 = (1, 1,··· , 1)T be the n× 1 vector. Note that diag(yT )1 = y. Therefore, we get yT (C ◦ E)x = 1T diag(yT )T (C ◦ E)x = 1T (diag(yT )T C ◦ E)x = tr(cid:0)diag(yT )T Cdiag(xT )ET(cid:1) We have exploited a basic property: (Adiag(xT )BT )(i, i) = ((A ◦ B)x)(i) in the last equality above. Here notation A(i, i) means the (i, i) entry of matrix A, and x(i) the ith element of vector x. ✷ Proof of Theorem 1. We rewrite the protocol (1) in a compact matrix form as X(t + 1) = F (t)X(t), (5) where X(t) = (X1(t),··· , Xn(t))T is the state vector of agents at instant t, and F (t) = In − εL(t). The spectrum of F (t) satisfies 1 = λn(F (t)) ≥ ··· ≥ λ1(F (t)) ≥ 1− 2ε△, since the eigenvalues of Lapacian L(t) are 2△ ≥ λn(L(t)) ≥ ··· ≥ λ1(L(t)) = 0; see [2] for more about Laplacian spectrum. Recall we assume ε ∈ (0, 1/△) in Section 2, which yields λi(F (t)) < 1 for 1 ≤ i < n [10] and causes the state transition matrix F (t) to be stable at each time step, (see e.g. Lemma 3). By the Assumption 2 and iterative equation (5), we obtain 1T X(t + 1) = 1T F (t)X(t) = (F (t)X(t))T 1 = X(t)T F (t)T 1 = (X(t)T 1)T = 1T X(t). 5 From this, it is clear that the projection of the state vector X(t) on synchronization manifold M is a constant. In fact, let α := 1 i=1 Xi(0), then 1T X(t) = nα for all t. Now we may decompose X(t) as n Pn X(t) = X pa(t) + X pe(t), (6) where X pa(t) ∈ M and X pe(t)⊥M. The superscript "pa" stands for "parallel", while "pe" for "perpendicular". We thereby get X pa(t) = 1√n 1T X(t) = √nα. Here and in the sequel, we take · as 2-norm for vectors and induced 2-norm for matrices [5]. The disagreement among the agents now can be described by X pe(t)2 = X(t)2 − nα2. To prove the theorem, it suffices to show X pe(t) → 0 almost surely as t → ∞. We follow [9] to introduce a Lyapunov function ξ(x) = xT x − α2n, and let ξ(t) := ξ(X(t)) = X(t)T X(t) − α2n. Our plan is to use Lemma 3 to show ξ(t) → 0 almost surely, as t → ∞. Note that X(t) is indeed a Markov chain. With this in mind, we evaluate by employing (5), E(ξ(t + 1)X(t)) = X(t)T E(F (t)T F (t))X(t) − α2n. Therefore we get E(ξ(t + 1)X(t)) − ξ(t) = X(t)T EH(t)X(t) (7) where, H(t) := F (t)T F (t) − I = ε2L(t)T L(t) − ε(L(t)T + L(t)). Let Li be the ith possible realization of L(t), with probability pi(t) at instant t, and denote Ω as the collection of all Li. We hereby may write the expectation of L(t) as Ω is the cardinality of Ω. Since L(t) inherited the property of the random walks of the agents, it is also an ergodic Markov chain with state space Ω. Let pi be the ith component of the unique stationary probability distribution. Then we may apply Lemma 1 and interpret the corresponding meaning of notations in the current situation. By doing so, we derive EL(t) = PΩi=1 Lipi(t). pi(t) − pi = (cid:12)(cid:12)(cid:12) p(t) (p(t) Ω Xj=1 Ω Xj=1(cid:12)(cid:12)p(t) Ω = (cid:12)(cid:12)(cid:12) ji − pi)pj(0)(cid:12)(cid:12)(cid:12) ji pj(0) − pi(cid:12)(cid:12)(cid:12) Xj=1 Ω Xj=1 ji − pi(cid:12)(cid:12)pj(0) ≤ λρt pj(0) = λρt. ≤ Now going back to the equation (7), we have X(t)T EH(t)X(t) = Ω Xi=1 pi(t)X(t)T HiX(t) (8) (9) where Hi = ε2LT i + Li) is the ith possible realization of H(t) and is negative semi-definite with eigenvalues 0 = λn(Hi) ≥ ··· ≥ λ1(Hi). Using the decomposition (6), we get i Li − ε(LT X(t)T HiX(t) = X pe(t)T HiX pe(t) + X pa(t)T HiX pe(t) +X pe(t)T HiX pa(t) + X pa(t)T HiX pa(t) 6 There are four terms on the right hand side of the above equation, the last three of which are actually zero. To see why let's take the second term as an example, X pa(t)T HiX pe(t) = ε2X pa(t)T LT i LiX pe(t) − εX pa(t)T LT i X pe(t) − εX pa(t)T LiX pe(t) = ε2(LiX pa(t))T LiX pe(t) − ε(LiX pa(t))T X pe(t) −ε(LT i X pa(t))T X pe(t) = 0 since LiX pa(t) = LT Plugging this equation into (9), we get i X pa(t) = 0. Thereby we have X(t)T HiX(t) = X pe(t)T HiX pe(t). X(t)T EH(t)X(t) = X pe(t)T(cid:16) Ω Xi=1 pi(t)Hi(cid:17)X pe(t) = X pe(t)T EH(t)X pe(t). We have the ergodic limit, defined in Section 3, of H(t) as E∗H = lim t→∞ EH(t) = lim t→∞ E(cid:0)ε2L(t)T L(t) − ε(L(t)T + L(t))(cid:1) = ε2E∗(LT L) − ε(E∗LT + E∗L) (10) since we know L(t) is an ergodic Markov chain. Take R(t) := EH(t) − E∗H as the remainder matrix, then we have X pe(t)T EH(t)X pe(t) = X pe(t)T (E∗H)X pe(t) + X pe(t)T R(t)X pe(t). (11) The second term on the right hand side of (11) can be calculated, by noting (8), as follows X pe(t)T R(t)X pe(t) = (cid:12)(cid:12)(cid:12)(cid:12)X pe(t)T R(t)X pe(t)(cid:12)(cid:12)(cid:12)(cid:12) = (cid:12)(cid:12)(cid:12)(cid:12)X pe(t)T(cid:16) Hi(pi(t) − pi)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 2 ·(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≤ (cid:12)(cid:12)(cid:12)(cid:12)X pe(t)(cid:12)(cid:12)(cid:12)(cid:12) ≤ ξ(t)Ωγλρt, Ω Xi=1 Ω Xi=1 Hi(pi(t) − pi)(cid:17)X pe(t)(cid:12)(cid:12)(cid:12)(cid:12) (12) where γ := max1≤i≤Ω Hi. Wherefore, (12) tends to 0, since 0 ≤ ρ < 1 and ξ(t) is bounded by (1). Next, we turn to the first term on the RHS of (11). In view of (10), X pe(t)T (E∗H)X pe(t) = ε2X pe(t)T (E∗LT )(E∗L)X pe(t) − εX pe(t)T (E∗LT )X pe(t) −εX pe(t)T (E∗L)X pe(t). (13) By using Lemma 2, we have X pe(t)T (BT ◦ P T )X pe(t) = tr(cid:0)diag(X pe(t)T )BT diag(X pe(t)T )P(cid:1) = tr(cid:0)diag(X pe(t)T )Bdiag(X pe(t)T )P T(cid:1) = X pe(t)T (B ◦ P )X pe(t). 7 Then it's easy to see the last two terms on the RHS of (13) is equal, by noting equation (4). Thereby we obtain X pe(t)T (E∗H)X pe(t) = ε2X pe(t)T (E∗L)T (E∗L)X pe(t) − 2εX pe(t)T (E∗L)X pe(t) ≤ (2△ε2 − 2ε)X pe(t)T (E∗L)X pe(t) = 2επT π(ε△ − 1)X pe(t)T b1jp1j,··· , ≤ 2επT π△(ε△ − 1)ξ(t) ·(cid:0)diag(cid:0) Xj=1 n n Xj=1 bnjpnj(cid:1) − B ◦ P(cid:1)X pe(t) (14) The second inequality above holds because there is some N (B) > 0 depends only on B, such that (E∗L)T (E∗L) ≤ 2△(E∗L) + N (B)11T and X pe(t)T N (B)11T X pe(t) = N (B)(1T X pe(t))T (1T X pe(t)) = 0. The fourth inequality holds by noting that ε△ − 1 < 0 and n Xj=1 (cid:0)diag(cid:0) b1jp1j,··· , n Xj=1 bnjpnj(cid:1) − B ◦ P(cid:1) ≥ △I − M (B)11T for some M (B) > 0 depending only on B. The similar argument as above may be applied. Combing (12) and (14), we finally get E(ξ(t + 1)X(t)) − ξ(t) ≤ ξ(t)(cid:0)Ωγλρt + 2επT π(ε△ − 1)△(cid:1) := ξ(t)δ(t) := −η(t) There exists t0 ∈ N such that δ(t) < 0 for t ≥ t0. Furthermore, δ(t) → 2επT π(ε△ − 1)△, as t → ∞. Also, note that ξ(t) is a Markov chain, since X(t) is. By applying Lemma 3, where β can take any positive number, we obtain η(t) → 0 as t → ∞ almost surely, which yields ξ(t) → 0 almost surely, as t → ∞. The proof now is completed. ✷ Remark 3. Theorem 1 shows an average consensus which may be regarded as a kind of stochastic version of Theorem 9 in [11]. References [1] P. Billingsley, Probability and Measure. John Wiley & Sons, New York, 1995 [2] F. R. K. Chung, Spectral Graph Theory. American Mathematical Society, Providence, 1997 [3] M. H. DeGroot, Reaching a consensus, J. Am. Statistical Assoc., 69(1974) pp.118 -- 121 [4] Y. Hatano, M. Mesbahi, Agreement over random networks. IEEE Trans. Autom. Control, 50(2005) pp.1867 -- 1872 8 [5] R. A. Horn, C. R. Johnson, Matrix Analysis. Cambridge University Press, Cambridge, 1985 [6] A. Jadbabaie, J. Lin, A. S. Morse, Coordination of groups of mobile autonomous agents using nearest neighbor rules. IEEE Trans. Autom. Control, 48(2003) pp.988 -- 1001 [7] H. Kushner, Introduction to Stochastic Control. Holt, Rinehart and Winston, New York, 1971 [8] L. Lov´asz, Combinatorics, Paul Erdos is Eighty, vol 2. Bolyai Society Mathematical Studies, 1996 ch. Random walks on graphs: A survey. [9] F. Mudasir, M. Porfiri, V. Kapila, Agreement over networks of mobile agents. Proc. IEEE Conference on Decision and Control, 2007 pp.4239 -- 4244 [10] R. Olfati-Saber, J. A. Fax, R. M. Murray, Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE, 95(2007) pp.215 -- 233 [11] R. Olfati-Saber, R. M. Murray, Consensus problems in networks of agents with switch- ing topology and time-delays. IEEE Trans. Autom. Control, 49(2004) pp.1520 -- 1533 [12] M. Porfiri, D. J. Stilwell, Consensus seeking over random weighed directed graphs. IEEE Trans. Autom. Control, 52(2007) pp.1767 -- 1773 [13] M. Porfiri, D. J. Stilwell, E. M. Bollt, J. D. Skufca, Random talk: Random walk and synchronizability in a moving neighborhood network. Physica D, 224(2006) pp.102 -- 113 [14] W. Ren, R. W. Beard, E. M. Atkins, A survey of consensus problems in multi-agent coordination, Proc. American Control Conference, 2005 pp.1859 -- 1864 [15] E. Seneta, Non-negative Matrices and Markov Chains. Springer, New York, 2006 [16] J. D. Skufca, E. M. Bollt, Communication and synchronization in disconnected net- works with dynamic topology: Moving neighborhood networks. Math. Biosci. Eng., 1(2004) pp.347 -- 359 [17] D. J. Stilwell, E. M. Bollt, D. G. Roberson, Sufficient conditions for fast switching synchronization in time-varying network topologies. SIAM J. Appl. Dynam. Syst., 6(2006) pp.140 -- 156 [18] A. Tahbaz-Salehi, A. Jadbabaie, A necessary and sufficient condition for consensus over random networks. IEEE Trans. Autom. Control, 53(2008) pp.791 -- 795 [19] F.-X. Tan, X.-P. Guan, D.-R. Liu, Consensus protocols for multi-agent continuous systems. Chinese Physics B, 17(2008) pp.3531-3535 [20] T. Vicsek, A. Czir´ok, E. Ben-Jacob, I. Cohen, O. Shochet, Novel type of phase tran- sition in a system of self-driven particles. Phys. Rev. Lett., 75(1995) pp.1226 -- 1229 9
1204.0163
3
1204
2012-10-18T23:33:06
Fashion, Cooperation, and Social Interactions
[ "cs.MA", "cs.SI", "physics.soc-ph" ]
Fashion plays such a crucial rule in the evolution of culture and society that it is regarded as a second nature to the human being. Also, its impact on economy is quite nontrivial. On what is fashionable, interestingly, there are two viewpoints that are both extremely widespread but almost opposite: conformists think that what is popular is fashionable, while rebels believe that being different is the essence. Fashion color is fashionable in the first sense, and Lady Gaga in the second. We investigate a model where the population consists of the afore-mentioned two groups of people that are located on social networks (a spatial cellular automata network and small-world networks). This model captures two fundamental kinds of social interactions (coordination and anti-coordination) simultaneously, and also has its own interest to game theory: it is a hybrid model of pure competition and pure cooperation. This is true because when a conformist meets a rebel, they play the zero sum matching pennies game, which is pure competition. When two conformists (rebels) meet, they play the (anti-) coordination game, which is pure cooperation. Simulation shows that simple social interactions greatly promote cooperation: in most cases people can reach an extraordinarily high level of cooperation, through a selfish, myopic, naive, and local interacting dynamic (the best response dynamic). We find that degree of synchronization also plays a critical role, but mostly on the negative side. Four indices, namely cooperation degree, average satisfaction degree, equilibrium ratio and complete ratio, are defined and applied to measure people's cooperation levels from various angles. Phase transition, as well as emergence of many interesting geographic patterns in the cellular automata network, is also observed.
cs.MA
cs
1 Fashion, Cooperation, and Social Interactions Zhigang Cao1,∗, Haoyu Gao1, Xinglong Qu1, Mingmin Yang1, Xiaoguang Yang1, 1 Key Laboratory of Management, Decision & Information Systems, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China ∗ E-mail: [email protected], [email protected], [email protected], [email protected], [email protected] Abstract Fashion plays such a crucial rule in the evolution of culture and society that it is regarded as a second nature to the human being. Also, its impact on economy is quite nontrivial. On what is fashionable, inter- estingly, there are two viewpoints that are both extremely widespread but almost opposite: conformists think that what is popular is fashionable, while rebels believe that being different is the essence. Fashion color is fashionable in the first sense, and Lady Gaga in the second. We investigate a model where the population consists of the afore-mentioned two groups of people that are located on social networks (a spatial cellular automata network and small-world networks). This model captures two fundamental kinds of social interactions (coordination and anti-coordination) simultaneously, and also has its own interest to game theory: it is a hybrid model of pure competition and pure cooperation. This is true because when a conformist meets a rebel, they play the zero sum matching pennies game, which is pure competition. When two conformists (rebels) meet, they play the (anti-) coordination game, which is pure cooperation. Simulation shows that simple social interactions greatly promote cooperation: in most cases people can reach an extraordinarily high level of cooperation, through a selfish, myopic, naive, and local interacting dynamic (the best response dynamic). We find that degree of synchronization also plays a critical role, but mostly on the negative side. Four indices, namely cooperation degree, average satisfaction degree, equilibrium ratio and complete ratio, are defined and applied to measure people's cooperation levels from various angles. Phase transition, as well as emergence of many interesting geographic patterns in the cellular automata network, is also observed. Introduction Fashion is a very interesting phenomenon that plays a critical role in economy. Firstly, fashion is a huge industry. Despite the complication to give a satisfactory definition of the fashion industry, its global market size is estimated at some two hundred billion US dollars [1, 2]. The importance of the fashion industry can be further justified by the following facts [1]: fashion industry "is one of the few industrial segments that have remained a constant world economy contributor with an annual growth rate of approximately 20 percent. [...] The luxury fashion sector is the fourth largest revenue generator in France; and one of the most prominent sectors in Italy, Spain, the USA and the emerging markets of China and India. The sector is currently one of the highest employers in France and Italy." Secondly, fashion serves as a constant and efficient consumption stimulator. It is well known that the purchases of most consumer durables are replacement ones [3]. For instance, the shoes that we buy are usually not our first ones, the aim that we buy them is to replace our old ones. However, a not so environmentally friendly fact is that a significant percentage of replaced products still function very well [3]. It is becoming more and more popular that people discard their old possessions not because they fail to meet their physical needs, but because they are not fashionable any longer. If all people had purchased new goods only when their old ones were completely broken, then the world economy would have grown much slower. Not only in economy, but also behind many phenomena in society, education, politics, arts and academics, fashion is a factor that cannot be neglected. A recent research shows that even charitable donation is a highly subject of fashion [4]. Lars Svendsen, a famous philosopher, argues that [5] "Fashion 2 has been one of the most influential phenomena in Western civilization since the Renaissance. It has conquered an increasing number of modern man's fields of activity and has become almost 'second nature' to us." He believes that fashion deserves serious studies from philosophers. We are sure that as the post industrial society [6] is coming to reality for more and more countries, the practical functions of commodities and human behaviors are mattering less and less compared with their social functions. Consequently, fashion is playing an increasingly crucial role. On what is fashionable, interestingly, there are two almost opposite viewpoints that are both extremely popular. One point of view thinks that fashion is a distinctive or peculiar manner or way. Lady Gaga is regarded as fashionable in this sense. The other takes fashion as a prevailing custom or style. Fashion color is fashionable in this latter sense. This difference has a very deep root in psychology, and reveals that people have various desiring or enduring levels of to be how different with the others. Following Jackson [7], we call the former type of people rebels, and the latter conformists. The phenomenon of fashion has so far attracted some attention from the academical realm, mostly in economics [1, 8 -- 12]. However, compared with its great importance, this is far from sufficient. We shall study fashion through a game-theoretical model, which is called the fashion game. Formally, each fashion game is represented by a triple I = (N, E, T ), where N = {1, 2, · · · , n} is the set of agents, E ⊆ N × N the set of edges, and T = (τ1, τ2, · · · , τn) ∈ {C, R}N the configuration of types. For each agent i ∈ N , τi ∈ {C, R} is her type: τi = C means that i is a conformist, and τi = R a rebel. For agents i, j ∈ N , they are neighbor to each other if and only if ij ∈ E. If ij ∈ E, then ji ∈ E, i.e. the network is undirected. Ni is the neighbor set of player i, and {0, 1} the identical (pure) action set of all players. We use xi ∈ {0, 1} to denote the action of player i. Given a pure action profile X = (x1, x2, · · · , xn), Li(X) ⊆ Ni is the set of neighboring agents that i likes (w.r.t. X), i.e. Li(X) = (cid:26) {j ∈ Ni : xj = xi} if τi = C {j ∈ Ni : xj 6= xi} if τi = R . Similarly, Hi(X) ⊆ Ni is the set of neighboring agents that i hates, i.e. Hi(X) = Ni \ Li(X). Using · to denote the cardinality of a set, the utility function of player i can be defined naturally as follows: ui(X) = Li(X) − Hi(X). Utilities of mixed action profiles can be extended as usual. If the utility of an agent is nonnegative, we say that she is satisfied. An action profile that all agents are satisfied corresponds clearly to a Nash equilibrium. As far as we know, the above fashion game is proposed by Young ( [13], 2001, p.38) and Jackson ( [7], 2008, p.271), independently. Obviously, this game is an extension of the famous matching pennies game, which is stated below. H T H (1, −1) T (−1, 1) . (−1, 1) (1, −1) In fact, in matching pennies, the row player is a conformist, and the column player a rebel. A special case of the fashion game, a dyad with one conformist and one rebel, is exactly the matching pennies game. Just like matching pennies, the fashion game always has a mixed Nash equilibrium: all agents play half 0 and half 1. The existence of pure Nash equilibrium, however, cannot be guaranteed, and it is NP-hard to check whether a fashion game on a general network has a pure Nash equilibrium or not [14]. Consequently, it is impossible to compute a pure Nash equilibrium efficiently when it does exist, unless P=NP (i.e. the set of problems admitting deterministic polynomial time algorithms equals that of problems admitting non-deterministic polynomial time algorithms, a statement widely conjectured as impossible to be true. Extensive discussion of this conjecture can be found in any textbook about computational complexity). 3 It is valuable to note that the fashion game, though very simple, is a typical heterogeneous model. There are two types of players, and actually three base games played: When a conformist faces a conformist, they play the pure coordination game; When two rebels meet, they play the pure anti- coordination game; And when a conformist confronts a rebel, they are in the exact game of matching pennies. It is widely accepted that competition and cooperation are the two eternal topics in game theory. Zero sum games (or more generally, constant sum games) are polar examples for competition. This is why they are also called strictly competitive games (cf. [15], p.21). Common interest games (a.k.a. team games) are polar examples for cooperation, where the preference rankings of pure action profiles for all players are the same. Among the three base games of the fashion game, the pure coordination game and the pure anti-coordination game are both common interest games, while matching pennies is a zero sum game. For general normal form games, competition and cooperation are both embodied. This is a kind of vertical hybrid, and is the key observation of [16]. The fashion game, on the other hand, is a kind of horizontal hybrid of competition and cooperation. This feature determines that the fashion game has a very special interest to game theory. The fashion game can be safely classified into network games, a typical multi-disciplinary field that rests at the intersection of social economics, social physics, theoretical biology, and algorithmic game theory [7,17 -- 20]. Studying closely related models, it is a pity that researchers from different fields seldom cite each other so far. Although the exact model of the fashion game does not draw much attention today, there has been a lot of related work. In social economics, the coordination game, one side of the fashion game, has been extensively studied [13, 21 -- 29]. The other side of the fashion game, the anti- coordination game, however, attracts very little attention [30 -- 33]. In the field of social physics, for models where agents are homogenously conformists or homogenously rebels, there has been a large number of references, which are impossible to fully survey here. They are called "majority game" (cf. [34, 35]) and "minority game" (cf. [36, 37]), respectively. It is well known that the minority game has been used to study the financial and stock market since very soon after its birth. Marsili [38] noticed early enough that people do not necessarily play the minority game in stock market, because except for a few "market fundamentalists", most people are "trend followers". And thus instead, the minority-majority game is much more appropriate. Following Marsili, there are a dozen of papers [35, 39 -- 46]. Another extensively studied model that is closely related with the anti-coordination game is the snowdrift game (a.k.a. the hawk-dove game, see the excellent survey [18]). Related work in the fields of social learning and opinion dynamics includes [47 -- 51]. In statistical physics, another similar model is the generalization of the Kuramoto model with conformist oscillators and contrarian oscillators ( [52 -- 54]). It is valuable to remark that, in the afore mentioned papers, neither the relation of their models with the phenomenon of fashion nor the relation with the matching pennies game is noticed. For recent work on repeated matching pennies from the perspective of behavioral science, please refer [55]. A brand new perspective on matching pennies is that it can be interpreted as a (symmetric) Predator-Prey game [56, 57]. A quite complete literature review of "Social Influence, Binary Decisions and Collective Dynamics", a classical topic in sociology and also closely related with this paper, can be found in [58]. The main concern of this paper is, in a world where each agent is fashionable (in one of the possible two ways), selfish (cares only about the welfare of her own), extremely naive and myopic (has only one step memory and does not look forward), and has very limited information (that of herself and her neighbors), to what extent can cooperation be reached through social interaction? Will things be even worse? Our finding is, in general, quite encouraging: an extraordinarily high level of cooperation can be reached through a simple updating rule, the best response dynamic. That is, social interactions generally promote cooperation (compared with the initial settings that are uniformly random, i.e. each agent takes action 1 with probability 0.5 and action 0 with probability 0.5). In very rare cases, the discouraging result that social interactions prohibit cooperation can also be observed. Degree of synchronization, captured by 4 updating probability in the best response dynamic that will be introduced in the next section, also plays a critical role, but mostly on the negative side. We remark that the negative effect of synchronization is observed in [58] too, for the anti-coordination game on a complete network. Methods Most of our conclusions are derived through a two dimensional (stochastic) cellular automaton. This spatial structure is simple enough and can serve very well for a first step study. After discussion of this particular case, more extensive analyses are done for the more general and more realistic small-world networks [60], where most of our conclusions are confirmed. Since it is notoriously hard to rigorously analyze a two dimensional cellular automaton (even a deterministic one), and the negative result of [14] tells us that there is no good characterization of the fashion game, simulation is our natural choice. Three things need to be clearly stated: the underlying network, the initial settings, and the updating In this section, we shall only introduce the particular cellular automata network. Small-world rule. networks and the corresponding simulation settings will be introduced in a later section. The updating rule, as well as the four indices that will be introduced soon, is universal. Primary simulation settings The cellular automata network is a special 8-degreed regular graph. It is a sheet of grids, where each grid stands for an agent. For each agent, the eight grids that are touching it are her neighbors (that is, we are taking the Moore neighborhood). The sheet is finite but unbounded: each leftmost agent has three neighbors on the rightmost, and each rightmost agent has three neighbors on the leftmost. Likewise, each uppermost agent has three neighbors on the lowermost, and each lowermost agent has three neighbors on the uppermost. Intuitively, we can imagine this world as a torus. In the next section, all the simulations (except for the ones in Fig. 6) are done on such a torus of size 41 × 41 = 1681. To characterize the initial settings and the updating rule, we need two parameters: the rebel ratio r and the updating probability p. They are the only parameters for simulations on the cellular automata network. For each initialization, each agent has a probability of r to be a rebel, and 1 − r to be a conformist. This is done for all agents independently. r = 0 is the case of all conformists, and r = 1 that of all rebels. Since the network is quite large, r can be roughly taken as the percentage of rebels. It is found that the percentage of rebels matters a lot to the fashion game. For a special instance, the all-conformist case is completely different from the all-rebel one. Actions are initialized uniformly, that is, each agent takes an action of 1 and 0 equally likely (with probability 0.5). Time elapses discretely. At each time step, each agent checks if she is satisfied with the previous action profile. If so, her action keeps unchanged. Otherwise, she switches to the other action with a probability p. Intuitively, p measures the degree of synchronization. p = 1 is exactly the synchronous best response dynamic. When p is infinitely small, we know that at each step there is at most one agent switching her action. To be precise, the probability that two or more agents switch actions is second-order infinitely small (w.r.t. p). This can be roughly taken as the asynchronous best response dynamic. The introduction of parameter p allows us to compare the cases of synchronous updating, asynchronous updating, and all the middle cases. It turns out that p also matters a lot, usually on the negative side. Four indices We use cooperation degree as a main index to measure the level of cooperation between agents. Formally, the cooperation degree for any configuration of actions in a fashion game is defined as the percentage 5 of satisfied agents. Clearly, Nash equilibrium corresponds to an action configuration with cooperation degree of 1. This index can be roughly taken as an approximation of Nash equilibrium. Since Nash equilibrium is not guaranteed, this choice is quite natural. Three other indices are also used, namely average satisfaction degree, equilibrium ratio, and complete ratio. The satisfaction degree of any agent is the percentage of neighbors that she likes. Obviously, satisfac- tion degree is an extension of the concept of satisfaction: an agent is satisfied if and only if her satisfaction is no less than 0.5. The average satisfaction degree for an action configuration is simply defined as the average of all agents' satisfaction degrees. The equilibrium ratio of a group of simulations is defined as the percentage of simulations that pure Nash equilibrium is reached. Recall that pure Nash equilibrium is not guaranteed, and even if it exists, it may not be reached by the best response dynamic. The equilibrium ratio also measures the degree of cooperation, because Nash equilibrium can be treated as stable cooperation. The other advantage of this index is that when we investigate phase transition, it is much sharper than cooperation degree and average satisfaction degree. Given an action configuration, an agent is said to be completely satisfied if and only if her satisfaction degree is 1. The complete ratio of an action configuration is defined as the percentage of completely satisfied agents. Simulation size All results (except for Fig. 4 and Fig. 5) in the next section are based on 420 groups of simulations: the rebel ratio r takes 21 values, 0, 0.05, 0.1, · · · , 1, and the updating ratio p takes 20 values, 0.05, 0.1, · · · , 1. For each of the 420 combination of parameters, 10 simulations are done. For each simulation, it is stopped at the 500-th step. For each combination of parameters, we display the average of the corresponding 10 final values. It may seem at the first sight that stopping at the 500-th step and taking an average of only 10 simulations are not sufficient for such a large network. However, it turns out that this is enough, because the dynamic is surprisingly both fast and robust. Main Results Cooperation degree First of all, let's calculate the expected cooperation degree of the initial configuration. This value is equivalent to the probability that an agent is initially satisfied. Since each agent has 8 neighbors in total, and she is satisfied if and only if the number of agents who take the same action as she does is at least 4 when she is a conformist, and at most 4 when she is a rebel, and each agent takes an action equally likely from {0, 1}, we know that this probability is (1/2)8(C 8 8 ) = (1/2)8(C 0 8 ) = 163/256 . = 0.64. 8 + C 7 8 + C 6 8 + C 5 8 + C 4 8 + C 4 8 + C 1 8 + C 2 8 + C 3 The average of the 420 cooperation degrees in our simulations is calculated to be 0.97. The 420 values are displayed in the color map of Fig. 1, where different colors represent different values, as shown in the right bar. The most prominent observations from Fig. 1 are as follows. (1) For most parameter combinations, stable cooperation, i.e. a pure Nash equilibrium, can be reached. This tells us that although pure Nash equilibrium cannot be guaranteed generally, it does exist for most cases in the cellular automaton world, and it can be reached by simple adaptive dynamics: best response dynamics. We remind the reader that, for general games, even if pure Nash equilibrium exists, there is no general simple adaptive dynamic that always leads to one [61]. The only theoretical result we know is that best response dynamic (in fact, better response dynamic) always leads a potential game to a pure 6 Figure 1. Cooperation degree. The fashion game can reach high degree of cooperation through best response dynamics. Nash equilibrium [62]. However, the fashion game is not a potential game, even in the cellular automaton structure. This is because pure Nash equilibrium is guaranteed in potential games, which is not true in the fashion game. It is also valuable to remark that for the synchronous best response dynamic (i.e. p = 1), it may not lead the fashion game to a pure Nash equilibrium, even if it exists. In fact, this always occurs when all agents are rebels (a case which is a potential game and thus guarantees the existence of a pure Nash equilibrium, cf. [30]) and they take the same action initially. It is obvious that at each step, no agent is satisfied, and thus all agents switch to the other action simultaneously, leading to the other state where no agent is satisfied either. The configuration will oscillate between the two extreme states, and no agent is ever satisfied at all. This illustrates the most terrible situation that no one wants to see. Synchronization, of course, plays a critical role. In fact, asynchronous best response dynamic (i.e. p is infinitely small), as shown in Fig. 1, leads to a pure Nash equilibrium almost surely, and for any p < 1, the corresponding best response dynamic leads to a pure Nash equilibrium with a positive probability. This will be explored more extensively in later subsections. (2) Taking into account the fact that the network size is 1681 and in most cases the best response dynamics converge within 500 steps, the convergence is remarkably fast. (3) Bad cooperation occurs only when the percentage of rebels r and the updating probability p are both high. To investigate this more clearly, we put the upper-right corner of Fig. 1 in another way, as shown in Fig. 2. It can be observed that the cooperation degree is always a decreasing function of the rebel ratio, which means that when the degree of synchronization is high, rebels, in general, are a block for cooperation. This is consistent with the theoretical results that when all agents are conformists, stable cooperation is always possible (i.e. pure Nash equilibrium exists), but when a portion of rebels are added, this may not be true. It can also be observed that higher probability of updating in general (but not always) means worse cooperation. This is also consistent with our argument in (1), i.e. asynchronization is better than synchronization. These observations will be further justified by more extensive simulations of the next 7 Figure 2. Bad cooperation. Cooperation degree is a decreasing function of rebel ratio r when p is large. subsection. (4) For some combinations of parameters (upper-right corner of Fig. 1), the final cooperation degrees can be even worse than the initial ones. This tells us that best response dynamics with high updating probabilities may not be always good for the whole system, even if updating itself is costless (i.e. agents don't pay for switching actions). Average satisfaction degree Since the initializations of all agents are independent, it is obvious that the initial expected average satisfaction degree is 0.5. Fig. 3 is also based on the same 4200 simulations, where each simulation is terminated at the 500-th step. However, only 11 × 21 =231 values are displayed, each as an average satisfaction degree of 10 corresponding simulations. Figure 3. Average satisfaction degree as a function of rebel ratio. Below is the analysis of this figure. (1) In most cases, the average satisfaction degree is rather promising. In fact, the overall average 8 satisfaction degree (i.e. average of the 231 values) is 0.73, much higher than the initial expected value of 0.5. This is consistent with our observations in the last subsection, and justifies our claim once again that, in general, various best response dynamics can promote cooperation. (2) The overall average satisfaction degree, 0.73, is not that high compared with the overall cooperation degree, 0.97. This is not surprising, because even if the cooperation degree is 1, it is very unlikely for the corresponding average satisfaction degree to be 1, in which case it must be that all agents are completely satisfied. If the above perfect situation occurs, we say that perfect cooperation is obtained. Perfect cooperation can only possibly be obtained in one extreme case: the all-conformist case (r = 0). This deepens our observation in the last subsection in a way that in most cases, almost all agents are satisfied, not completely satisfied, but satisfied to some degree. We remark that in the all-rebel case (r = 1), the configuration where every agent gets complete satisfaction in general does not exist, although pure Nash equilibrium is guaranteed. To be precise, in the all-rebel case, the configuration where every agent is completely satisfied exists if and only if the graph is bipartite. Unfortunately, the two dimensional cellular automaton with Moor neighborhood is not bipartite (there are cycles of length three). However, the two dimensional cellular automaton with von Neumann neighborhood, i.e. each agent has exactly four neighbors, is indeed bipartite. (3) In the all-conformist case, perfect cooperation is not attainable through best response dynamics. In this case, there are two focal equilibria, i.e. all agents taking action 1 and all agents taking action 0, and they are both perfectly good. However, it is very unlikely for simple dynamics to lead the system to them. It is imaginable that perfect cooperation is hugely hard, and the main obstacle comes from the underlying network. When the network is a complete graph, it may be not that hard to reach perfect cooperation. (4) Fortunately, in the very case that all agents are conformists, the real equilibria reached through best response dynamics are good enough. The average satisfaction degree is shown to be 0.96. In fact, we will show later that the equilibrium states when all agents are conformists are usually composed of impressively large"continents", and the agents that are not completely satisfied all sit on the coastlines. (5) In most cases, the average satisfaction degree is not sensitive to the updating probability p, unless p and r are both large (p > 0.8, r > 0.5). In fact, the eight curves for r = 0.1, · · · , 0.8 are almost identical. This is consistent with the observations of the last subsection. However, cooperation degrees are monotonic there, always approximately 1. Here, the average satisfaction degree, as a function of rebel ratio, is richer and more interesting. In this sense, the fact that (in most cases) the average satisfaction degree is insensitive to updating probability is much more striking than that (in most cases) the cooperation degree is insensitive to updating probability. (6) In most cases (p < 0.8), average satisfaction degree is a convex function of the rebel ratio r, and reaches its lowest value 0.68 at 0.5. This says that the case where there are equally number of conformists and rebels is the most difficult situation to cooperate. This is intuitively reasonable, because an edge between a conformist and a rebel always contributes 0 to exactly one of the agents. The number of these inter-type edges is expected to reach its maximum when r = 0.5. In fact, the very special case where every agent has four conformist neighbors and four rebel ones has exactly an average satisfaction degree of 0.5. Having this in mind, and considering that the expected initial average satisfaction degree is also 0.5, the final value of 0.68 is really not disappointing at all. The property that average satisfaction degree is decreasing when r < 0.5 and increasing when r > 0.5 is easy to understand. The convexity of this function, however, is not that intuitive. As to why the satisfaction degree of the all-rebel case, 0.71, is much lower than 0.96, the satisfaction degree of the all-conformist case, remember the remark we give in (2). The particular value of 0.71 will be revisited later. (7) For large p and large r, the average satisfaction degree can be rather low, and may be even much lower than the expected initial value, 0.5. This is consistent with our observations in the last subsection. 9 (8) When r > 0.5, the average satisfaction degree is an increasing function of r for small p, and a decreasing function of r for large p. This reflects that there may be some phase transition for p, which will be explored more extensively in the next subsection. Phase transition To explore the possible phase transition, we did more careful simulations. Our main worries are that (i) 500 steps may not be enough for the cases where p and r are both large to reach a relatively stable state, and (ii) 0.05, the difference between any two adjacent ps we take, is too rough for observing phase transition. Based on the above two worries, we change the simulation settings to allow each simulation run 5000 steps, and ps are taken more densely. To be precise, we investigate 41 ps: 0.8, 0.805, · · · , 1, and 5 rs: 0.5, 0.6, · · · , 1. For each of the 41 × 5 = 205 parameter combinations, we take 10 simulations and calculate the average cooperation degree. The results are displayed in Fig. 4. Figure 4. Phase transition of cooperation degree in p. Figure 5. Phase transition of equilibrium ratio in p. r=1. Fig. 4 shows that phase transition does exist, especially for large rs: cooperation degree drops from 1 to a very low level within a small change of p. We put the all-rebel case in another way as in Fig. 5, where the index of cooperation degree is replaced by the equilibrium ratio. Fig. 5 shows that when all agents are rebels, Nash equilibrium can always be reached through best response dynamics if the updating probability p < 0.85. However, once p exceeds 0.9, it can never be reached. Within a 5 percent fluctuation of p, the equilibrium ratio drops down sharply from 1 to 0. This is really striking, and we believe that it can be treated as a significant phase transition. The all-rebel 10 case will be explored more deeply in the next subsection, where we shall see that regular patterns emerge steadily regardless of whether Nash equilibrium can be reached or not. Pattern emergence We show first the all-conformist case and then the all-rebel case. In the figures below, each agent is represented by a small square (for conformists, it is simply a square; for rebels, there is a dark triangle in this square), red means that the corresponding agent chooses an action of 1 and green of 0. Size=41X41 Size=101X101 Size=201X201 Figure 6. Emergence of continents. r=0, p=0.5. The upper three are initial configurations, and the lower three are the corresponding stable ones. We call the set of agents that are connected and share the same action a "continent". A torus with any configuration can be decomposed into continents. Fig. 6 shows that toruses with initial configurations have only relatively small continents. However, continents in the stable configurations arrived through best response dynamics are in general impressively large. When the torus is small, the largest continent can even cover more than a half of it. Obviously, an agent is completely satisfied if and only if it is in the inner part of some continent, and incompletely satisfied, or unsatisfied, if and only if it is on the "coastal line", i.e. the boundary of some continent. It can be proved trivially that complete ratio, i.e. the percentage of completely satisfied agents, for any initialization is expectedly (0.5)8 . = 0.0039. Large continents in the stable configurations imply that the final complete ratio is high. In fact, calculation shows that this value in our simulations (r=0) is in general larger than 0.5. This tells us that if we consider the index of complete ratio as the coordinating ability of best response dynamics, the result is still rather optimistic. "Lakes", i.e. small continents resting in bigger ones, can also be observed. 11 Initialization P=0.2 P=0.4 P=0.6 P=0.8 P=0.85 P=0.86 P=0.87 P=0.88 P=0.89 Figure 7. Emergence of mazes. r=1,size=41×41. Next, let's turn our attention to the all-rebel case, i.e. r = 1. An amazing property of this case is that "mazes" frequently emerge. This is shown clearly in Fig. 7. If an agent is on the "street" of a maze, rather than on the corner, then she has two neighbors taking the same action as she does, and six ones taking the opposite action. Thus, her satisfaction degree is 6/8 = 0.75. Since almost all agents are on streets, and only a few ones on corners, this explains the overall satisfaction degree 0.71 for r = 1 and p ≤ 0.8 in Fig. 3 very well. It should also be noted that every agent in the maze is satisfied, and thus a maze corresponds to a Nash equilibrium. When r = 1, mazes emerge definitely for p ≤ 0.85, and never occur for p > 0.9. This is also implied in Fig. 5. For updating probabilities between 0.85 and 0.9, mazes occur with some positive probability strictly less than 1. It can also be observed that the lengths of streets in mazes generally increase as p increases. The last part of this subsection is devoted to the emergence for the cases that r = 1 and Nash equilibrium is not attainable through best response dynamics, i.e. p > 0.9. As shown in Fig. 8, regular patterns such as strips (straight ones as well as declining ones) and continents can be frequently observed. Since rebels don't like her neighbors to take the same action as she does, this is not a good thing. And this explains also why the cases that rebel ratios and updating probabilities are both high behave so badly in Fig. 1-5. An extremely terrible situation is the one showed at the upper left corner of Fig. 8, where almost all agents, except for very few ones (this number is expectedly equal to (1 − p) × s, where s is the size of the torus), are completely unsatisfied. The patterns we display in Fig. 8 are the only ones. We note that small wheels can also be frequently observed when r = 1 and p = 1. It you check really carefully the lower three pictures in Fig. 8, you will find that there are only two types of rebels, i.e. the ones that keep switching their actions and the ones that never switch. This means that the lengths of limit cycles of synchronous best response dynamics in our model are always 2. To put it another way, synchronous best response dynamics will eventually lead the system to oscillate between 12 Figure 8. Emergence of strips, continents, and wheels. r=1. p=0.98 for the upper three pictures, and p=1 for the lower three. two states. The lower left state and the lower middle one in Fig. 8, in fact, compose such a pair. This is consistent with the theoretical observation of Cannings [35] that synchronous best response dynamic always lead a system with all rebels to a limit cycle of length 1 or 2, regardless of the structure. Limit cycles of length 1, i.e. Nash equilibria, however, are never observed by us. This does not mean that they do not exist at all, but that they are really rare. Initial configurations that will eventually reach a Nash equilibrium, can be easily designed. For the simplest instance, we can let the initial configuration be an equilibrium. Up to now, we have discussed the emergence of regular patterns in the two extreme cases either with all rebels or with all conformists. For the cases in between, similar patterns can be observed too. In a word, there exists a spectrum and the patterns change over r continuously. When the rebel ratio r is close to 0, the patterns are more like those in the all-conformist case, and as r tends to 1, the patterns are more similar to those in the all-rebel case. But when r is near 0.5, the patterns are quite blurred (we can also say that in these cases there is no pattern at all). What's definite is that when r < 0.2 or r > 0.8, the patterns are rather clear and steady. All the results of this subsection are obtained with the assistance of the excellent multi-agent pro- grammable software NetLogo [59], and our program can be mailed at request. 13 Results on Small-World Networks To check that whether the results discussed in the last section, which are derived from a rather special network, are still valid in more realistic networks, we did more simulations on small-world networks proposed by Watts and Strogatz ( [60]). The conclusion is quite promising: to a great extent, our results are rather robust, they are still valid for the more realistic small-world networks. Needless to say, we are unable to discuss the pattern emergence results, because they rely on geographic locations that do not exist in small-world networks. And not surprisingly, we are not able to give convincing explanations to several results as to why they are like that. For instance, we cannot give a similar explanation as to why the average satisfaction degree is 0.71 for the all-rebel case. Small-world networks are widely accepted as excellent mimics of the real social networks. The idea of Watts and Strogatz's algorithm to generate an arbitrary small-world network is to derive it from a regular network through "randomly rewiring" some edges. Roughly speaking, there is a uniform rewiring probability, which is denoted as q in our paper (p in the paper of Watts and Strogatz), for each of the original edge to be severed and replaced by a random edge (however, one endpoint of the new edge must be taken from the two old ones). The advantage of introducing q is that it captures the degree of randomness of the corresponding network: Larger q implies more randomness. When q = 0, the network is regular, as in the last section of our paper, and when q = 1, the network is completely random (an approximation of the classical ER random network). This gives us a new angle to study the fashion game, i.e. how randomness affects the cooperation level of agents. While there are only two parameters in the simulations of the previous section, namely rebel ratio r and updating probability p, there are four in this section. In addition to the two old ones, there are two new ones, network density (i.e. average degree) k and rewiring probability q. In our simulations, the network size is fixed at 200, and (1) the network density k takes six values: 8, 18, 28, 38, 48 and 58, (2) the rewiring probability q takes 11 values evenly from 0 to 1, (3) the rebel ratio r takes 11 values evenly from 0 to 1, (4) the updating probability p takes 10 values evenly from 0.1 to 1. For each combination of parameters, the result is based on the average of 10 simulations, and each simulation is terminated at the 500-th step, as set in the previous section. Calculation shows that the overall cooperation degree is 0.80. This value, though much lower than the corresponding one (0.97) for the cellular automata network, is still promisingly high, confirming our main result that, in fairly general and realistic scenarios, agents in the fashion game can reach high level of cooperation through the simple best response dynamic. It can also be observed from Fig. 9 that, for all the six cases with different network densities, rewiring probability q always plays a negative role at small values (less than 0.1). But once exceeding the threshold of 0.1, increasing q will be good to the cooperation degree, though the increasing speed of the right part is much lower than the decreasing speed of the left part. The maximum values of cooperation degrees are always obtained at q = 0, and the values at q = 1 are only a little bit smaller than the maxima. This tells us that randomness of networks plays some very interesting role. Completely regular networks are the best of all for reaching high degree of cooperation, completely random networks are only a little worse, and networks with a relatively low randomness of about 0.1 are the worst of all. Fig. 9 indicates also that high density is always an obstacle for cooperation degree. Intuitively, this is not hard to understand: the more neighbors you have, the harder for you to cooperate. Since the cellular automata network we study in the previous section is both completely regular and with a low density, no wonder that we observed an amazingly high degree of cooperation. Now let's turn our attention from cooperation degree to another index, the average satisfaction degree. As discussed for the cellular automata network, this index is always much smaller than cooperation degree. Calculation shows that its overall average value is 0.6, still significantly higher than the initially expected value of 0.5, and confirms our claim again that best response dynamic promotes cooperation. As for the index of cooperation degree, high density of networks plays a negative role for average satisfaction. This effect is also quite robust. The effect of rewiring probability q, however, is unclear for low density 14 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 1 0.95 0.9 0.85 0.8 0.75 0.7 0.65 0.6 0.55 0.5 0 Figure 9. Effects of rewiring probability q and network density k on cooperation degree and average satisfaction degree. The horizontal axis is for the rewiring probability, solid blue lines for cooperation degree and dashed red ones for average satisfaction degree. Different densities of k = 8, 18, 28, 38, 48, 58 are represented by ◦, ×, +, ∗, (cid:3), and ♦, respectively. networks (k = 8, 18, 28). For high density networks (k = 38, 48, 58), its effect is steadily negative. An interesting observation from the network with density k = 58 is that, if we let q grow from 0.1 to 1 and compare the index of cooperation degree and that of average satisfaction degree, we can find that the former index increases while the latter one decreases slowly. In this process, more and more agents are satisfied, but their average satisfaction degree becomes worse. This implies that more and more agents must have behaved compromisingly, leading the society to more equality. To put it another way, in the case that the network is highly dense and not so regular, adding randomness (or decreasing regularity) of people's interactions can improve equality of the society. It is valuable to remark that if we abandon the normalization in the definition of average satisfaction degree, i.e. define the absolute satisfaction degree of each agent as the number of neighbors that s/he likes, then we could find that adding density to people's interaction networks would be a good thing in general. This is not surprising, because having more neighbors means that you have more chances to get rewarded from interacting with them (notice that in the above argument the disadvantage from neighbors is not calculated). As to the other two indices, i.e. equilibrium ratio and complete ratio, which are auxiliary in this paper, their overall average values are 0.45 and 0.09, respectively. Considering their definitions, these values are not low at all. The effects of rewiring probability q and network density k, however, are not stable on neither of them. Let's consider next the effects of rebel ratio r and updating probability p. The simulation results, which excellently confirm our claims for the cellular automata network that high updating probability is always bad for cooperation and high rebel ratio is also bad when p is large, are displayed in Fig. 10. When p is small, the effect of r on cooperation level is roughly a pattern of "V". This pattern can also be observed for the cellular automata network in Fig. 3. For small-world networks, however, it is much more significant, especially if we only concentrate on the index of equilibrium ratio. This result is plausible because in the two extreme cases with all conformists or all rebels, Nash equilibrium can always be guaranteed, but not in other cases. And the more balanced the proportion between conformists and rebels, the more difficult it is to reach a Nash equilibrium or a high average degree of satisfaction. It 15 Figure 10. Effects of rebel ratio r and updating probability p on cooperation degree (Top-Left), average satisfaction degree (Top-Right), equilibrium ratio (Bottom-Left), and complete ratio (Bottom-Right). All horizontal axises represent rebel ratio r. is quite remarkable that updating probability p has absolutely no effect at all to the index of complete ratio. This ratio is very high for the case with all conformists. However, once the rebel ratio r increases a little bit, it drops down dramatically, and then, very soon, approximates zero. Phase transition of equilibrium ratio is also confirmed in the more general settings, as displayed in Fig. 11. It should be noted that significance of this phenomenon is negatively correlated with the rewiring probability q. For completely regular networks (q = 0), phase transition is rather significant. However, as randomness of the network grows, this phenomenon becomes less and less significant. In fact, when q is larger than 0.3, it is farfetched to call them phase transitions any more. Since the cellular automata network is completely regular, no wonder that we observed a beautiful phase transition. 16 q=0 q=0.1 q=0.2 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1 Figure 11. Phase transition of equilibrium ratio in updating probability p in small-world networks (k = 8, r = 1).The horizontal axis is for p. Discussion The fashion game is investigated in this paper through simulations. Our focus is on cooperation of agents. To study this, various indices are used, namely the cooperation degree, the average satisfaction degree, the equilibrium ratio, and the complete ratio. Our finding is quite promising: in most cases, agents can cooperate rather well through best response dynamics. It tells us also that the interaction structure matters a lot. Considering that these dynamics are really simple, agents are selfish, myopic, naive, and have very limited information, this finding is fairly surprising. It is valuable to note that small-world networks used in the last section are generated by the original algorithm of Watts and Strogatz. This algorithm, though extremely popular and widely accepted, does not take the cellular automata network but a ring type regular network as the benchmark network (p = 0). As suggested by one anonymous referee, it is natural to take the cellular automata network as the benchmark network. This treatment will bridge the two kinds of networks we study seamlessly. We call networks generated in this way the modified small-world networks. For these modified small- world networks (with density k = 8), we did the same group of simulations as in the previous section. For technical reasons, we didn't take the network size so large as for the cellular automata network (recall that the size there is 1681), but a normal size of 441, about twice the size we used in the previous section for the original small-world networks (200). We made a comparison between the original and the modified small- world networks. It turns out that, as shown in Fig. 12, the two groups of networks make no meaningful difference for three of the four indices. This might indicate that, compared with network density and randomness level, details such as how they are actually connected matter very little. Of course, this broader guess should be confirmed or falsified by more extensive simulations, and related further studies include how degree distribution and clustering coefficient affect agents' behavior and consequently their cooperation level in the fashion game. Network size, though does not affect cooperation degree, average satisfaction degree, or complete ratio significantly, also as shown in Fig. 12, it may well matter a lot to equilibrium ratio. And the effect must be on the negative side. This is intuitive, because the definition of an equilibrium is quite restrictive. As long as there is one agent that is unsatisfied, an action profile cannot be an equilibrium. This possibility increases as the network size grows. In this paper, we mainly focus on the overall cooperation levels, i.e. the macro side. For further 17 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Figure 12. Comparison between original small-world networks (dashed red lines) and modified small-world networks (solid blue lines).The horizontal axis is for rewiring probability p. ◦ is for the index of cooperation degree, ∗ for average satisfaction degree, (cid:3) for equilibrium ratio, and ♦ for complete ratio. research, it is also meaningful to investigate the micro side of the fashion game, i.e. how the payoffs of agents are affected by their status in the networks, measured by various centrality indices, say their degree centralities, their betweenness centralities, their closeness centralities, and their clustering coefficients. To study these problems, the utility function as defined in the introduction part of this paper should be given at least equal attention as the satisfaction degree. Another obvious direction is to study the kind of realistic network, scale-free network [63]. "Ho- mophily", a basic observation from the real world that "birds of a feature flock together", is attracting more and more attention recently (c.f. [64, 65]), and also deserves the discussion of its effect on the fash- ion game. It is natural to conjecture that cooperation level is positively correlated with homophily level. Throughout this paper, we have assumed that the initial settings are uniformly random, that is, each agent takes action 1 with probability 0.5 and action 0 with probability 0.5. It is interesting to consider nonuniform initializations, say action 1 is biased. Another interesting future direction is to take into account the possibility of network formation, where forming a new link (or severing an old one, or both) is an extra strategy of each agent. Assuming that there is a cost to this new strategy, it is very meaningful to study the co-evolution of cooperation level and network structure. Acknowledgements We thank professor Xiang Li for reminding us of the connection between the anti-coordination game and the snowdrift game, and Dr. Yuqing Qiu for technical helps. We are also indebted to two anonymous referees for their helpful suggestions and comments. In particular, more simulations on small-world networks and homophily and network formation as interesting future directions were suggested by one of them, references [28] and [58] were also informed by her or him. References 1. Okonkwo U (2007) Luxury Fashion Branding: Trends, Tactics, Techniques. Palgrave Macmillan. 2. Euromonitor International (2011) Global luxury goods overview, June 2011. 18 3. van Nes N (2010) Understanding replacement behaviour and exploring design solutions. In Longer Lasting Products: Alternatives to the Throwaway Society, edited by T. Cooper. 4. Schweitzer F, Mach R (2008) The epidemics of donations: logistic growth and power-laws. PLoS ONE 3(1): e1458. doi:10.1371/journal.pone.0001458 5. Svendsen L (2006) Fashion: A Philosophy. Reaktion Books. 6. Bell D (1973) The Coming of Post-industrial Society: A venture in Social Forecasting. New York: Basic Books. 7. Jackson M (2008) Social and Economic Networks. Princeton University Press, Princeton, NJ. 8. Banerjee AV (1992) A simple model of herd behavior. The Quarterly Journal of Economics 107: 797-817. 9. Bikhchandani B, Hirshleifer D, Welch I (1992) A theory of fads, fashion, custom, and cultural change as informational cascades. Journal of Political Economy 100(5): 992-1026. 10. Chai A, Earl PE, Potts J (2007) Fashion, growth and welfare: an evolutionary approach. Advances in Austrian Economics 10: 187-207. 11. Pesendorfer W (1995) Design innovation and fashion cycles. American Economic Review 85(4): 771-792. 12. Acerbi A, Ghirlanda S, Enquist M (2012) The logic of fashion cycles. PLoS ONE, 7(3): e32541. doi:10.1371/journal.pone.0032541 13. Young HP (2001) Individual Strategy and Social Structure: An Evolutionary Theory of Institu- tions. Princeton, NJ: Princeton University Press. 14. Cao Z, Yang X (2012) The Fashion Game: Matching Pennies On Social Net- 2012). Available at SSRN: http://ssrn.com/abstract=1767863 or (September 24, works http://dx.doi.org/10.2139/ssrn.1767863 15. Osborne M, Rubinstein A (1994) A Course on Game Theory. MIT Press. 16. Kalai A, Kalai E (2010) Cooperation in strategic games revisited, Games and Economic Behavior. 17. Galeotti A, Goyal S et. al. (2010) Network games. The Review of Economic Studies 77(1): 218-244. 18. Szabo G, Fath G (2007) Evolutionary games on graphs. Physics Reports 446: 97-216. 19. Kearns M, Littman M, Singh S (2001) Graphical models for game theory. In Proc. Conf. on Uncertainty in Artificial Intelligence: 253-260. 20. Jackson MO, Zenou Y (2014) Games on Networks. Handbook of Game Theory, Vol. 4, Peyton Young and Shmuel Zamir, eds., Elsevier Science, 2014. Available at SSRN (August 25, 2012): http://ssrn.com/abstract=2136179 21. Berninghaus SK, Schwalbe U (1996) Conventions, local interaction, and automata networks. Jour- nal of Evolutionary Economics 6: 297-312. 22. Ellison G (1993) Learning, local interaction, and coordination. Econometrica 61(5): 1047-1071. 23. Blume L (1993) The statistical mechanics of strategic interaction. Games and Economic Behavior 5: 387-424. 19 24. Blume L (1995) The statistical mechanics of best-response strategy revision. Games and Economic Behavior 11: 111-145. 25. Morris S (2000) Contagion. The Review of Economic Studies 67(1): 57-78. 26. Brock W, Durlauf S (2001) Discrete choice with social interactions. The Review of Economic Studies 68(2): 235-260. 27. Jackson MO, Watts A (2002) On the formation of interaction networks in social coordination games. Games and Economic Behavior 41: 265-291. 28. Watts DJ (2002) A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences of the United States of America, 99(9): 5766-5771. 29. Goyal S, Vega-Redondo F (2005) Network formation and social coordination. Games and Economic Behavior 50: 178-207. 30. Bramoulle Y (2007) Anti-coordination and social interactions. Games and Economic Behavior 58: 30-49. 31. Bramoulle Y, Lopez-Pintado D, Goyal S, Vega-Redondo F (2004) Network formation and anti- coordination games. International Journal of Game Theory 33(1): 1-19. 32. Lopez-Pintado D (2009) Network formation, cost sharing and anti-coordination. International Game Theory Review 11(1): 53-76. 33. Cao Z, Yang X (2012). A note on anti-coordination and social interactions. Journal of Combinatorial Optimization. online first, DOI: 10.1007/s10878-012-9486-7 34. Anderlini L, Ianni A (1993) Path dependence and learning from neighbours. Mimeo, University of Cambridge. 35. Cannings C (2009) The majority and minority models on regular and random graphs. International Conference on Game Theory for Networks. 36. Challet D, Zhang YC (1997) Emergence of cooperation and organization in an evolutionary game. Physica A 246: 407-418. 37. Challet D, Marsili M, Zhang YC (2004) Minority Games: Interacting Agents in Financial Markets. Oxford Univ. Press: Oxford. 38. Marsili M (2001) Market mechanism and expectations in minority and majority games. Physica A 299: 93-103. 39. de Martino A, Gardino I, Mosetti G (2003) Statistical mechanics of the mixed majority-minority game with random external information. Journal of Physics A: Mathematical and General 36: 3935- 54. 40. Gou C (2006) The simulation of financial markets by an agent-based mix-game model. Journal of Artificial Societies and Social Simulation 9(3): 321-328. 41. Gou C (2006) Agents play mix-game. Econophysics of Stock and other Markets: 123-132. 42. Gou C (2006) Deduction of initial strategy distributions of agents in mix-game models. Physica A: Statistical Mechanics and its Applications 371(2): 633-640. 20 43. Challet D (2008) Inter-pattern speculation: beyond minority, majority and $-games. Journal of Economic Dynamics and Control 32(1): 85-100. 44. Caporale GM, Serguieva A, Wu H (2008) A mixed-game agent-based model for simulating financial contagion. In Proceedings of the 2008 Congress on Evolutionary Computation, IEEE Press: 3420- 3425. 45. Chen F, Gou C, Guo X, Gao J (2008) Prediction of stock markets by the evolutionary mix-game model. Physica A 387(14): 3594-3604. 46. Liu F, Serguieva A, Date P (2010) A mixed-game and co-evolutionary genetic programming agent- based model of financial contagion. in 2010 IEEE Congress on Evolutionary Computation (CEC): 1-7. 47. Acemoglu D, Ozdaglar A (2010) Opinion dynamics and learning in social networks. Dynamic Games and Applications 1(1): 3-49. 48. Golub B, Jackson M (2010) Naive learning in social networks and the wisdom of crowds. American Economic Journal: Microeconomics, 2(1): 112-149. 49. Cao Z, Yang M, Qu X, Yang X (2011) Rebels lead to the doctrine of the mean: opinion dynamic in a heterogeneous DeGroot model. The 6th International Conference on Knowledge, Information and Creativity Support Systems Beijing, China: 29-35. 50. Galam S (2004) Contrarian deterministic effects on opinion dynamics:"the hung elections scenario". Physica A: Statistical and Theoretical Physics 333: 453-460. 51. Galam S (2008) Social physics: a revew of Galam models. International Journal of Modern Physics C 19(3): 409-440. 52. Hong H, Strogatz SH (2011) Kuramoto model of coupled oscillators with positive and negative coupling parameters: An example of conformist and contrarian oscillators. Physical Review Letters 106(5): 054102. 53. Hong H, Strogatz SH (2011) Conformists and contrarians in a Kuramoto model with identical natural frequencies. Physical Review E 84(4): 046202. 54. Hong H, Strogatz SH (2012) Mean-field behavior in coupled oscillators with attractive and repulsive interactions. Physical Review E 85(5): 056210. 55. Eliaza K, Rubinstein A (2011) Edgar Allan Poe's riddle: framing effects in repeated matchingpen- niesgames. Games and Economic Behavior 71(1): 88-99. 56. Chen S, Bao S (2008) A game for Game Theory ter http://www.gtcenter.org/Archive/2010/Conf/Chen956.pdf. Accessed 2012 October 13. in theory based Economics Archive, predation behavior model. Cen- at 2010 Conference, available 57. Jackson M, Shoham Y (2012) Lecture Notes in Game Theory, available at Coursera : https://class.coursera.org/gametheory/lecture/index. Accessed 2012 October 13. 58. L´opez-Pintado D, Watts DJ (2008) Social influence, binary decisions and collective dynamics. Rationality and Society, 20(4): 399-443. 59. Wilensky U (1999) NetLogo. http://ccl.northwestern.edu/netlogo/. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL. 21 60. Watts DJ, Strogatz SH (1998) Collective dynamics of small-world networks. Nature, 393: 440-442. 61. Hart S, Mas-Colell A (2003) Uncoupled dynamics do not lead to Nash equilibrium. American Economic Review 93: 1830-1836. 62. Monderer D, Shapley L (1996) Potential games. Games and Economic Behavior 14: 124-143. 63. Barab´asi A, Albert R (1999) Emergence of scaling in random networks. Science 286: 509-512. 64. McPherson M, Smith-Lovin L, Cook JM (2001) Birds of a feather: homophily in social networks. Annual Review of Sociology 27: 415-444. 65. Aral S, Muchnik L, Sundararajan A (2009) Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences of the United States of America 106(51): 21544-21549.
1011.6127
1
1011
2010-11-29T03:57:51
Visibility maintenance via controlled invariance for leader-follower Dubins-like vehicles
[ "cs.MA" ]
The paper studies the visibility maintenance problem (VMP) for a leader-follower pair of Dubins-like vehicles with input constraints, and proposes an original solution based on the notion of controlled invariance. The nonlinear model describing the relative dynamics of the vehicles is interpreted as linear uncertain system, with the leader robot acting as an external disturbance. The VMP is then reformulated as a linear constrained regulation problem with additive disturbances (DLCRP). Positive D-invariance conditions for linear uncertain systems with parametric disturbance matrix are introduced and used to solve the VMP when box bounds on the state, control input and disturbance are considered. The proposed design procedure is shown to be easily adaptable to more general working scenarios. Extensive simulation results are provided to illustrate the theory and show the effectiveness of our approach
cs.MA
cs
Visibility maintenance via controlled invariance for leader-follower Dubins-like vehicles 0 1 0 2 v o N 9 2 ] A M . s c [ 1 v 7 2 1 6 . 1 1 0 1 : v i X r a Fabio Morbidi⋆ a, Francesco Bullo b, Domenico Prattichizzo c aDept. of Computer Science and Engineering, University of Texas at Arlington, TX, 76019, USA bDept. of Mechanical Engineering and Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, CA, 93106-5070, USA. cDept. of Information Engineering, University of Siena, 53100 Siena, Italy Abstract The paper studies the visibility maintenance problem (VMP) for a leader-follower pair of Dubins-like vehicles with input constraints, and proposes an original solution based on the notion of controlled invariance. The nonlinear model describing the relative dynamics of the vehicles is interpreted as linear uncertain system, with the leader robot acting as an external disturbance. The VMP is then reformulated as a linear constrained regulation problem with additive disturbances (DLCRP). Positive D-invariance conditions for linear uncertain systems with parametric disturbance matrix are introduced and used to solve the VMP when box bounds on the state, control input and disturbance are considered. The proposed design procedure is shown to be easily adaptable to more general working scenarios. Extensive simulation results are provided to illustrate the theory and show the effectiveness of our approach. Key words: Autonomous mobile robots; Visibility maintenance; Leader-follower; Controlled invariance; Input constraints 1 Introduction 1.1 Problem description and motivation This paper considers a number of visibility mainte- nance problems between autonomous vehicles. The sim- plest formulation is a leader-follower setup, in which both leader and follower are nonholonomic vehicles constrained to move along planar paths of bounded curvature, with limited positive forward speed. The follower vehicle's goal is to maintain the leader inside an appropriate sensing region. The theory of controlled invariance for uncertain linear systems is shown to be well suited for this objective as well as for achieving more involved tasks, such as, e.g., simultaneously reject unknown but bounded disturbances or preserve visibi- lity in multi-vehicle chain formations. We have two main motivations for the visibility main- tenance problems studied in this article. First, we are interested in surveillance and patrolling problems with formations of robotic vehicles in aerial and ground environments. We envision scenarios where a robot equipped with sensors with limited sensing footprints (such as, e.g., panoramic cameras, laser range finders, or high resolution radars) moves in such a way as to maintain a second moving target within its field of view. Second, this work is motivated by the need to design network-wide visibility and connectivity maintenance algorithms for groups of robotic vehicles. In the multi- agent network domain, connectivity is indeed a classic requirement necessary to guarantee the correct comple- tion of numerous distributed algorithms. 1.2 Literature review ⋆ Corresponding author. This material is based upon work supported in part by ONR Award N00014-07-1-0721. This paper was not presented at any IFAC meeting. Email addresses: [email protected] (Fabio Morbidi⋆), [email protected] (Francesco Bullo), [email protected] (Domenico Prattichizzo). In the context of visibility maintenance between pairs of vehicles, two distinct literature domains are relevant to this work. First, visibility-based pursuit-evasion prob- lems for robots in complex environments have been in- vestigated in continuous-time in (Guibas et al., 1997; Gerkey et al., 2006; Bhattacharya and Hutchinson, 2010) and in discrete-time in (Isler et al., 2005): in these works the vehicles' dynamic models are elementary and the proposed solutions are not applicable to nonholonomic vehicles with limited positive forward speed. Second, the vast literature on aircraft pursuit-evasion has fo- cused much attention to game theory, optimal control, and numerical algorithms. A hybrid-systems and game- theoretic approach to aircraft conflict resolution is pur- sued in (Tomlin et al., 2000). Differential game problems between aircraft are discussed in (Merz and Hague, 1977; Jarmark and Hillberg, 1984; Shima and Shinar, 2002). In (Glizer, 1999), a planar pursuit-evasion problem in which the target set is defined by a capture radius and constraints on the angular state variables (line-of-sight angle) is analyzed, and a necessary and sufficient con- dition for capture of the evader from any initial state is established using a variational method. However, differ- ently from the problem studied in this paper, the author considers constant positive forward speed for the non- holonomic vehicles and unlimited turning rate for the evader. More recently, in (Mazo Jr et al., 2004), the prob- lem of estimating and tracking the motion of a moving target by a team of unicycles equipped with directional sensors with limited range, is addressed using a hierar- chical control scheme. In the context of connectivity maintenance in multi- agent networks, the literature has experienced a recent spurt of growth (we refer to (Bullo et al., 2009; Mesbahi and Egerstedt, 2010) for recent surveys on this topic): two typical multi-agent tasks requiring network connec- tivity are "consensus" (Moreau, 2005; Olfati-Saber et al., 2007) and "rendezvous" (Cort´es et al., 2006; Lin et al., 2007). In this active research area, robots with li- mited communication capability are often modeled as transmitters with disks of finite radius. As the vehicles move to achieve a goal, it is generally hard to guaran- tee the connectivity among the members of the group is preserved over time. In terms of design, it is then re- quired to constrain robots' control inputs such that the resulting topology is always connected throughout its course of evolution. Potential fields and geometric opti- mization methods are the standard tools used in the lit- erature to address the connectivity maintenance prob- lem: a list of key references, yet far from being complete, is (Ando et al., 1999; Spanos and Murray, 2005; Ji and Egerstedt, 2007; Zavlanos and Pappas, 2007; Dimarog- onas and Kyriakopoulos, 2008; Savla et al., 2009; Yang et al., 2010). These works differ from the setup pro- posed in this paper in at least two important ways: first, the vehicle's dynamics is assumed to be locally con- trollable, and second, connections between two robots are bidirectional. In our problem, instead, we consider nonholonomic vehicles that are not locally controllable (they move forward with positive speed, along paths of bounded curvature) and we deal with sensor foot- prints such that the visibility links are not bidirectional. We finally point out that most of the works cited above do not explicitly account for robots' input constraints. 1.3 Original contributions The basic setup considered in this paper consists of two nonholonomic agents: a leader (or evader) L and a follower (or pursuer) F. The robots can rotate with bounded angular velocity, but similarly to Dubins' vehicles (Dubins, 1957) can only move forward. The follower is equipped with a sensing device characterized by a visibility set S, a compact and convex polyhedral region encoding both the position and angle informa- tion. The leader moves along a given trajectory and the follower aims at maintaining L always inside its visibility set S, while respecting suitable bounds on the control inputs. Inspired by (Tiwari et al., 2004), where the concept of cone invariance is used to solve the multiagent rendezvous problem and by the results in (Blanchini, 1990; Blanchini, 1991), this paper ad- dresses the visibility maintenance problem (VMP) using the notion of controlled invariance. The key idea is to interpret the nonlinear model describing the relative dynamics of the leader and the follower, as a linear sys- tem with model parameter uncertainty, with the control input of the leader playing the role of an external di- sturbance. The VMP can then be easily reformulated as linear constrained regulation problem with additive dis- turbances (DLCRP). Positive D-invariance conditions for general linear uncertain systems with parametric disturbance matrix are introduced and used to solve the VMP when box bounds on the state, control inputs and disturbances are considered. Analytical conditions for the solution of the VMP are obtained by symbolically solving with the Fourier-Motzkin elimination method, the set of linear inequalities defining the polytope of all the feasible state feedback matrices. The proposed de- sign procedure can be easily adapted to provide the con- trol with unknown but bounded (UBB) disturbances re- jection capabilities. Other extensions are also discussed: we present conditions for the solution of the VMP when robots' desired displacement is defined through angular parameters instead of distances, and extend the results valid for a leader-follower pair of robots to chains of n vehicles. Extensive simulation results illustrate the theory in the different working scenarios. The present paper builds upon (Morbidi et al., 2008), compared to which we provide herein a more detailed and extended theory, as well as a more accurate numerical validation. 1.4 Organization The rest of the paper is organized as follows. In Sect. 2 the linear constrained regulation problem is reviewed and new positive D-invariance conditions for linear systems with parameter uncertainty are presented. In Sect. 3 we introduce the VMP and prove the main result of the paper. In Sect. 4 we investigate some exten- sions of the basic setup of Sect. 3. In Sect. 5, simulation results are presented. In Sect. 6 the main contributions of the paper are summarized and possible avenues for future research are highlighted. 2 2 The linear constrained regulation problem to the following condition: for every s0 ∈ ∂S and q ∈ Q, This section presents a series of results that are instrumental in addressing the visibility maintenance problem in Sect. 3. Our exposition will basically fol- low (Blanchini, 1991): Theorem 10, Corollary 11, Theorem 12 and Corollary 13 extend the corre- sponding results in (Blanchini, 1990; Blanchini, 1991) (see also (Blanchini and Miani, 2008, Ch. 4)), to linear uncertain systems with parametric disturbance matrix. Consider the following system, s(t) = A(q(t)) s(t) + B(q(t)) u(t), (1) where s(t) ∈ X ⊂ Rn and u(t) ∈ U ⊂ Rm are respec- tively the state and input vectors, q(t) ∈ Q ⊂ Rp is the model parameter uncertainty vector, while U, X , Q are assigned sets containing the origin, with U and Q com- pact. We assume that A(q) and B(q) are matrices of suit- able dimensions whose entries are continuous functions of q. We will suppose q(t) to be a piecewise continuous function of time. Definition 1 (Positive invariance) The set S ⊂ Rn is positively invariant for system (1), if and only if, for every initial condition s(0) ∈ S and every admissible q(t) ∈ Q, the solution obtained for u(t) ≡ 0, satisfies the condition s(t) ∈ S for t > 0. Definition 2 (Admissible region) A region S ⊂ Rn is said to be admissible for the feedback control law u = Ks, if and only if, for every s ∈ S, the condition u ∈ U holds. If U and S are convex polyhedral sets containing the origin, the admissibility of S is simply equivalent to Kvi ∈ U, vi ∈ vert(S), i ∈ {1, . . . , µ}, (2) where vert(S) denotes the set of vertices of S. We can now introduce the linear constrained regulation problem (LCRP), (Blanchini, 1991). Problem 3 (LCRP) Given a system in the form (1), find a linear feedback control law u(t) = Ks(t) and a set S ⊂ X such that, for every initial condition s(0) ∈ S and every admissible function q(t) ∈ Q, the conditions s(t) ∈ X and u(t) ∈ U are fulfilled for t > 0. Theorem 4 The LCRP has a solution if and only if there exists a feedback matrix K and a set S ⊂ X that is positively invariant and admissible for the closed loop system s(t) = F (q(t)) s(t), (3) where F (q(t)) = A(q(t)) + B(q(t))K. Theorem 5 (Sub-tangentiality condition) Let S ⊂ Rn be a compact and convex set with nonempty in- terior. The positive invariance of S for (1) is equivalent A(q) s0 ∈ TS(s0), (4) where TS(s0) is the tangent cone to S at s0 (see (Blanchini, 1999, Def. 3.1), and (Aubin and Frankowska, 1990, Ch. 4), (Aubin and Cellina, 1984, Ch. 5)) for more details). The main difficulty in exploiting condition (4) to study the positive invariance of an assigned region S is that it has to be checked on the boundary of S. However, if convex polyhedral sets are considered, only their vertices must be taken into account and easy algebraic conditions can be derived. In this respect, let us consider a system of the form (1), with p p A(q(t)) = A0 + Al ql(t), B(q(t)) = B0 + (5) where Al and Bl, l ∈ {1, . . . , p}, are constant matrices of appropriate dimension and q(t) takes values in a com- pact and convex polyhedron Q ⊂ Rp, (ql(t) denotes the l-th component of vector q(t)). Let the set U be compact, convex and polyhedral as well. We consider a candidate compact and convex polyhedral set S containing the ori- gin in its interior and we search for a feedback matrix K that assures the positive invariance of S for the closed loop system (3), (note that the previous assumptions on S will be retained throughout this section). Since S is polyhedral, then condition (4) is fulfilled on ∂S if and only if is fulfilled on every vertex of S. Xl=1 Bl ql(t), Xl=1 Theorem 6 The set S is positively invariant for system (3) with feedback u = Ks, if and only if, for all vi ∈ vert(S) and wj ∈ vert(Q) : F (wj ) vi ∈ TS(vi), i ∈ {1, . . . , µ}, j ∈ {1, . . . , ν}. The LCRP as formulated in Problem 3 does not require the stability. However, a desirable property is the global uniform stability of the closed loop system. The link be- tween the stability property and the existence of pos- itively invariant regions is established by Theorem 5.2 in (Blanchini, 1991). Let us now turn our attention to systems in the form s(t) = A(q(t)) s(t) + B(q(t)) u(t) + E(q(t)) δ(t), (6) where the unknown external disturbance δ(t) is con- strained in a compact and convex polyhedral set D ⊂ Rl containing the origin. Note that with respect to the sys- tems considered in (Blanchini, 1991), the structure in (6) is more general inasmuch as matrix E also depends on the uncertain parameter q. As an immediate extension of the positive invariance property introduced in Defi- nition 1, we may require that the state s remains in S despite the presence of the disturbance δ(t). 3 Definition 7 (Positive D-invariance) The set S ⊂ Rn is positively D-invariant for system (6), if for every initial condition s(0) ∈ S and all admissible q(t) ∈ Q and δ(t) ∈ D, the solution obtained for u(t) ≡ 0, satisfies the condition s(t) ∈ S for t > 0. We can now introduce the linear constrained regulation problem with additive disturbances (DLCRP). Problem 8 (DLCRP) Given a system in the form (6), find a linear feedback control law u(t) = Ks(t) and a set S ⊂ X such that, for every initial condition s(0) ∈ S and every admissible q(t) ∈ Q and δ(t) ∈ D, the conditions s(t) ∈ X and u(t) ∈ U are fulfilled for t > 0. Theorem 9 The DLCRP has a solution if and only if there exists a feedback matrix K and a set S ⊂ X that is positively D-invariant and admissible for the closed loop system s(t) = F (q(t)) s(t) + E(q(t)) δ(t). Similarly to (5), we will henceforth suppose that l=1 El ql(t). We are now ready to state E(q(t)) = E0 +Pp the main theorem of this section. Theorem 10 (Main result) The set S is positive D-invariant for system (6) with feedback u = Ks, if and only if, for all vi ∈ vert(S), ωj ∈ vert(Q) and rk ∈ vert(D), F (wj) vi + E(wj ) rk ∈ TS(vi), i ∈ {1, . . . , µ}, j ∈ {1, . . . , ν}, k ∈ {1, . . . , η}. (7) Proof: The proof is based on the same ideas as those in (Blanchini, 1990, Th. 2.1) and (Blanchini, 1991, Th. 4.1) (see also (Aubin and Cellina, 1984, Ch. 2, Sect. 4)) and the references therein). For the necessity, we have to prove that if S is a positive D-invariant region for system (6), then condition (7) holds. The proof is straightfor- ward, since for the sub-tangentiality condition the posi- tive D-invariance of S for system (6) is equivalent to Let wlj be the l-th entry of wj. We have that F (q) vi + E(q) rk = p p ν p Fl Xl=1 =(cid:0)F0 + =(cid:0)F0 + Xj=1 Xj=1 Xl=1 Fl ql(cid:1)vi +(cid:0)E0 + Xl=1 Xj=1 βj wlj(cid:1)vi +(cid:0)E0 + Xj=1 Xl=1 Fl wlj(cid:1)vi(cid:3)+ βj(cid:2)(cid:0)F0 + βj(cid:2)F (wj ) vi + E(wj) rk(cid:3), = = p ν ν ν p El El ql(cid:1)rk Xl=1 Xj=1 βj wlj(cid:1)rk Xl=1 El wlj(cid:1)rk(cid:3) βj(cid:2)(cid:0)E0 + p ν i ∈ {1, . . . , µ}, k ∈ {1, . . . , η}. From (7) we have thatPν j=1 βj(cid:2)F (wj ) vi + E(wj ) rk(cid:3) ∈ h=1 αh vh, with gT i vh = ξi and Pµi s = Pµi i (F (q)Pµi i (cid:0)F (q)Pµi TS(vi), i ∈ {1, . . . , µ}, k ∈ {1, . . . , η}, therefore (9) is proved. If πi is a delimiting plane of S for s (i.e., such that gT i s = ξi), we may write s as a convex combination of the vertices of S that belong to πi: h=1 αh = 1, 0 ≤ αh ≤ 1, h ∈ {1, . . . , µi}. Then gT i (F (q)s + E(q) δ) = gT k=1 ρk rk). But from (9) and recalling the expression of the tangent cone when S is described in terms of its vertices, we have that gT i (F (q) vh + E(q) rk) ≤ 0, that implies gT sidering all the planes for s, condition (8) follows (cid:4) immediately. The application of Theorem 10 requires the knowledge of all cones TS(vi), i ∈ {1, . . . , µ}. An alternative solu- tion is given by the following corollary (whose proof is analogous to that of (Blanchini, 1991, Corollary 4.1)) in which the Euler auxiliary system associated to (6) is involved (cf. (Blanchini and Miani, 2008, Sect. 12.1)). h=1 αh vh + E(q)Pη h=1 αhvh + E(q)Pη k=1 ρk rk(cid:1) ≤ 0. By con- Corollary 11 The set S is positively D-invariant for system (6), if and only if there exists τ > 0 such that, for all vi ∈ vert(S), ωj ∈ vert(Q) and rk ∈ vert(D), F (q) s + E(q) δ ∈ TS(s), s ∈ ∂S, q ∈ Q, δ ∈ D, (8) vi + τ (F (wj ) vi + E(wj ) rk) ∈ S, (10) that trivially implies condition (7). For sufficiency, let us consider s arbitrary in S, q arbitrary in Q and δ arbitrary in D. Supposing condition (7) holds, inclu- i=1 αi, i=1 αi = 1, k=1 ρk = 1, for some 0 ≤ αi ≤ 1, i ∈ {1, . . . , µ}, 0 ≤ βj ≤ 1, j ∈ {1, . . . , ν} and 0 ≤ ρk ≤ 1, k ∈ {1, . . . , η}. We first prove that sion (8) has to be proved. We have that s = Pµ vi, q =Pν Pν j=1 βj = 1, Pη k=1 ρk rk withPµ j=1 βj wj , δ =Pη F (q) vi + E(q) rk ∈ TS(vi), i ∈ {1, . . . , µ}, q ∈ Q, k ∈ {1, . . . , η}. (9) 4 i ∈ {1, . . . , µ}, j ∈ {1, . . . , ν}, k ∈ {1, . . . , η}. To overcome the problem of the choice of τ , we intro- duce Theorem 12 that provides a condition equivalent to (10). The proof is analogous to that of (Blanchini, 1990, Th. 2.3). Let Ci be the convex cone defined by the delimiting planes of S which contain vi (see (Panik, 1993, Ch. 4)) : Ci = {gT h s ≤ ξh, ξh > 0, for every gT h and ξh : gT h vi = ξh, vi ∈ vert(S)}. Theorem 12 The set S is positively D-invariant for system (6), if and only if, for all τ > 0, vi ∈ vert(S), ωj ∈ vert(Q) and rk ∈ vert(D): vi + τ (F (wj ) vi + E(wj) rk) ∈ Ci, i ∈ {1, . . . , µ}, j ∈ {1, . . . , ν}, k ∈ {1, . . . , η}. PSfrag replacements If the plane description of S is available, the next corollary, whose proof directly follows from that of Theorem 10, holds. Corollary 13 The set S is positively D-invariant for system (6), if and only if, for every τ > 0 and every vi ∈ vert(S), ωj ∈ vert(Q), y0 yL xL θL PL yF PF xF θF x0 P0 Fig. 1. Leader-follower setup. (In + τ F (wj )) vi ∈ C⋆ i , i ∈ {1, . . . , µ}, j ∈ {1, . . . , ν}, (11) i is the cone obtained by shifting the planes of Ci where C⋆ as follows : i = {gT C⋆ h s ≤ ξh − maxjk{τ gT h E(wj ) rk}, ωj ∈ vert(Q), rk ∈ vert(D), for every gT h : gT h vi = ξh}. Remark 14 According to Theorem 9, conditions (11) and (2) provide us with a set of inequalities in the un- known K defining the polytope K of all the state feedback matrices solving the DLCRP. 3 The visibility maintenance problem 3.1 Modeling Let Σ0 ≡ {O0 ; x0, y0} be the fixed reference frame in R2, and ΣF ≡ {OF ; xF, yF} and ΣL ≡ {OL ; xL, yL} the reference frames attached to a follower robot F and a leader robot L (see Fig. 1). The robots are supposed to have single integrator dynamics, p F F = σF F , θ F = ωF , p L L = σL L , θ L = ωL , (12) L[1], σL F[1], σF L = (σL F[2])T , σL F = (xF, yF)T , p L F = (σF where p F L = (xL, yL)T are the posi- tions, σF L[2])T the lin- ear velocities and ωF, ωL the angular velocities of robots F and L in the frames ΣF and ΣL, respectively. We are go- ing to derive a dynamic model describing the relative dy- namics of the robots F and L. Referring (12) to the frame Σ0, we obtain (Siciliano et al., 2008), p0 F(θF) σF F, p0 L = R0 L(θL) σL L, where F = R0 R0 F(θF) ="cos θF − sin θF sin θF cos θF #, R0 sin θL cos θL #. L(θL) ="cos θL − sin θL The position of robot L with respect to ΣF is then given by pF L = RF 0 (θF)(p0 L − p0 F), (13) 0 (θF) = (R0 where RF respect to time, we get F(θF))T . Differentiating (13) with L = RF p F 0 (θF)(p0 L−p0 F)+RF L(θL) σL L−R0 F(θF) σF Since RF 0 (θF) =h 0 we can rewrite (14) as 0 (θF)(cid:0)R0 −ωF 0 iRF ωF 0 (θF), F(cid:1). (14) pF L =" 0 ωF −ωF 0 # pF L + RF L(βF L ) σL L − σF F, (15) where βF , θL−θF. Collecting equation (15) and the rel- L ative angular dynamics of the robots together, we obtain the following system pF L βF L   =    −I2 pF L[2] −pF L[1] 0 0 −1 where pF we will suppose that L = (pF L[1], pF F ωF #+  " σF   RF L(βF L ) 0 0 0 0 1 L  ωL #, " σL  (16) L[2])T . For the sake of simplicity, σF F = (1 + vF , 0)T, σL L = (1 + vL , 0)T, (17) where vF(t) < 1, vL(t) < 1, for all t ≥ 0. F and L will then behave in a way similar to Dubins vehicles since 5 After simple matrix manipulations in (18), we obtain 3.2 Problem statement where they can only move forward (however, differently from the standard Dubins model, vF and vL are not necessarily constant in our case). Substituting (17) in (16), we finally come up with the following system   pF L[1] pF L[2] βF L   =  cos βF L − 1 sin βF L 0   −1 pF L[2] 0 −pF L[1] 0 −1   vF ωF     +      cos βF L 0 sin βF L 0 0 1 +  vL ωL ,   L[1], pF L[2], βF (18) with state vector s = (pF L )T ∈ X ⊂ SE(2), input vector u = (vF, ωF)T ∈ U ⊂ (−1, 1) × R and disturbance vector δ = (vL, ωL)T ∈ D ⊂ (−1, 1) × R. System (18) describes the relative dynamics of the Dubins-like vehicles F and L in the configuration space SE(2). In the forthcoming analysis, we will suppose that robot F is equipped with a sensor (e.g., a panoramic camera, a laser range finder, etc.) with limited sensing range. We will call visibility set of robot F any compact and convex polyhedral set S ⊂ X containing the origin in its interior. Please note that the visibility set generalizes the notion of sensor footprint since it encodes both the position and angle information. Robot L moves along a given trajectory and robot F aims at keeping L always inside its visibility set S, while respecting the control bounds. By referring to system (18), we can formalize this problem as follows: Problem 15 (Visibility maintenance problem: VMP) Let S be the visibility set of robot F and let s(0) ∈ S. Find a control u(t) such that for all δ(t) ∈ D, the conditions s(t) ∈ S and u(t) ∈ U are fulfilled for t > 0. In the following, we will refer to Problem 15 as to the VMP with candidate positively D-invariant set S, con- trol set U and disturbance set D. 3.3 Solution method Next, we will transcribe system (18) into the linear para- metric form (6): in this way, the VMP simply reduces to the DLCRP (Problem 8) introduced in Sect. 2 and suitable solvability conditions can be derived by means of (11) and (2). 0 −d − ∆pF ∆ pF L[1] pF L[2] βF L     =  0 −1 +  A(q) =  L[1] pF L[2] βF L   pF L[2] L L L 0 βF vF L −1 ωF −1 ∆pF L[1] 0 0 0 0 0 0 cos βF βF sin βF      +       , B(q) =     E(q) =   1 + q5 q6 0 0 1 0 , which can be written in the form (6) with q2 0 0 0 0 1 + q1 0 0 0 q4 −1 0 −d − q3 0 −1 cos βF L 0 sin βF L 0 0 1 vL ωL     ,   (19) ,   (20) (21) q1 = sin βF L βF L − 1, q2 = q4 = pF L[2], q5 = cos βF , q3 = ∆pF cosβF L − 1 βF L L − 1, q6 = sin βF L . L[1], We made the following change of variables in (19), (pF L[1], pF L[2], βF L )T → (∆pF L[1], pF L[2], βF L )T , L[1] = pF where ∆pF L[1] − d and d is a strictly positive con- stant. Two main reasons motivated this transformation: first of all, if robot F is able to keep L always inside a vi- sibility set displaced of d with respect to its center (with 1 2 ks1 − s2k2), then this automati- d > max s1,s2 ∈ vert(S) cally guarantees robots' collision avoidance. Second, this choice simplifies the study of the VMP with chains of robots (see Sect. 4.3). Notice that A0, B0 and E0 in (20) (recall the notation used in Sect. 2) correspond to the constant matrices ob- tained by linearizing system (18) around the equilibrium seq = (d, 0, 0)T , ueq = (0, 0)T , δeq = (0, 0)T . For the sake of simplicity, we will henceforth make the following assumption: Assumption 16 Suppose that (see Fig. 2) U =(cid:8)(vF, ωF)T : vF ∈ [−VF, VF], ωF ∈ [−ΩF, ΩF](cid:9), D =(cid:8)(vL, ωL)T : vL ∈ [−VL, VL], ωL ∈ [−ΩL, ΩL](cid:9), (22) 6 2 a xL S L PSfrag replacements yL 2 a 2 b d F Fig. 2. The visibility set S in (23) and the pose of the robots L and F for (∆pF L )T = (0, 0, 0)T , d > a. L[2], βF L[1], pF S =(cid:8)(∆pF L )T : ∆pF L[2], βF L[1], pF pF L[2] ∈ [−a, a], βF L[1] ∈ [−a, a], (23) where VF < 1, VL < 1, ΩF, ΩL, a, b, are strictly positive constants. L ∈ [−b, b](cid:9), The definition (22) of control and disturbance sets is mo- tivated by the presence of saturation bounds on the driv- ing motors of physical robots. The candidate invariant set S is defined as in (23) because it is computationally simple to handle (this will allow us to provide concise solvability conditions for the VMP in Theorem 18), and because its horizontal section represents a reasonable good inner approximation of a disk sensor footprint e.g., due to an omnidirectional camera or a 360◦ laser scanner (the problem of precisely quantify the non-conservatism introduced by this approximation goes beyond the scope of this paper, and it is left as a subject of future research). Finally, it is worth emphasizing that is not unusual in the multi-agent systems literature to encounter rectan- gular footprints, that are typically used, for example, to model "push-broom" or line-scanner sensors (see, e.g., (Finke et al., 2005)). We now complete our transcription of system (18) into the linear parametric form (6), by defining an appropri- ate polyhedral set for the model parameter uncertainty: Q =(cid:8)(q1, . . . , q6)T : q1 ∈(cid:2) sin b b − 1, 0(cid:3), (cid:3) , q3 ∈ [−a, a] , q4 ∈ [−a, a] , b b , 1−cos b q2 ∈(cid:2) cos b−1 q5 ∈(cid:2)cos b − 1, 0(cid:3), q6 ∈ [− sin b, sin b](cid:9). It is easy to show that, if (∆pF definition (21) immediately implies that q ∈ Q. L[2], βF L[1], pF (24) L )T ∈ S, then Remark 17 In the previous passages, the nonlinear system (18) has been absorbed into a linear (controlled) differential inclusion (see (Blanchini and Miani, 2008, Sect. 2.1.2)). This is an approximate transformation: however, no matter how the input u is chosen, we 7 have that any trajectory of the original system (18) is also a trajectory of the corresponding linear uncertain system (the opposite is clearly not true in general). As a consequence, if we are able to determine the qualita- tive behavior of the absorbing system, we can determine (in a conservative way) the behavior of the original sys- tem. Some tools are available in the robust control liter- ature to quantify this conservativeness, such as, e.g., the recent nonlinear extensions of the gap and Vinnicombe's ν-gap metrics (see (Bian and French, 2005; James et al., 2005) and the references therein). However, in the interest of brevity, we will not perform such an analysis in this paper. We are now ready to state the main result of this section. Theorem 18 (Solvability of the VMP) For the robots F and L, consider the VMP with candidate posi- tive D-invariant set S, control set U and disturbance set D satisfying Assumption 16 with d > a, 0 < b ≤ π/2. This VMP has a solution if the following conditions are satisfied VF ≥ VL(cid:18)1 + a sin b d − a(cid:19) + 1 − cos b + a b d − a , (25) ΩL ≤ (1 − VL) sin b d + a , VL sin b + b d − a ≤ ΩF . (26) The state feedback matrix has the form K =  0 k11 0 0 k22 k23 , (27) where k11, k22 and k23 belong to the polytope K ⊂ R3 defined by (30)-(31), (see the proof below). Proof: Let us apply Corollary 13 to system (19). By se- lecting τ = 1 in (11), we obtain  1 − k11 + q4k21 −k12 + q4k22 q2 − k13 + q4k23 −(d + q3)k21 1 − (d + q3)k22 1 + q1 − (d + q3)k23 −k21 −k22 1 − k23   vi ∈ C ⋆ i .  (28) Condition (28) must be evaluated only on the vertices v1 = (a, a, b)T , v2 = (a, a, −b)T , v3 = (a, −a, b)T , v4 = (a, −a, −b)T since the set (23), whose plane representa- tion is   1/a −1/a 0 0 0 1/a 0 −1/a 0 0 0 0 0 0 0 1/b 0 −1/b   s ≤ 1 1 1 1 1 1   ,   s = (∆pF L[2], βF the origin. The cones C⋆ L[1], pF L )T , is symmetric with respect to 1 , . . . , C⋆ 4 are given by C⋆ 1 = {gT 1 s ≤ 1 − VL a , gT 3 s ≤ 1 − VL sin b a C⋆ 2 = {gT 1 s ≤ 1 − VL a , gT 3 s ≤ 1 − VL sin b a C⋆ 3 = {gT 1 s ≤ 1 − VL a , gT 4 s ≤ 1 − VL sin b a C⋆ 4 = {gT 1 s ≤ 1 − VL a , gT 4 s ≤ 1 − VL sin b a , gT 5 s ≤ 1 − ΩL b }, , gT 6 s ≤ 1 − ΩL b }, , gT 5 s ≤ 1 − ΩL b }, , gT 6 s ≤ 1 − ΩL b }. Condition (28) can then be rewritten as:         a(1 − k11 + q4k21 − k12 + q4k22) + b(q2 − k13 + q4k23) a(1 − (k21 + k22)(d + q3)) + b(1 + q1 − k23(d + q3)) −a(k21 + k22) + b(1 − k23) a(1 − k11 + q4k21 − k12 + q4k22) − b(q2 − k13 + q4k23) a(1 − (k21 + k22)(d + q3)) − b(1 + q1 − k23(d + q3)) −a(k21 + k22) − b(1 − k23) a(1 − k11 + q4k21 + k12 − q4k22) + b(q2 − k13 + q4k23) a(−1 + (−k21 + k22)(d + q3)) + b(1 + q1 − k23(d + q3)) −a(k21 − k22) + b(1 − k23) a(1 − k11 + q4k21 + k12 − q4k22) − b(q2 − k13 + q4k23) a(−1 + (−k21 + k22)(d + q3)) − b(1 + q1 − k23(d + q3)) −a(k21 − k22) − b(1 − k23)     ∈ C ⋆ 1 , ∈ C ⋆ 2 ,     ∈ C ⋆ 3 , ∈ C ⋆ 4 . (29) Because of the special structure of B(q) in (20), we can select a simplified state feedback matrix K of the form (27): this allows to the decouple the control inputs vF and ωF and visualize the polytope K ⊂ R3 of all the feasible gain matrices. We can then rewrite (29) in the following simplified form: b a q4 k23 ≤ − (d + q3) k23 ≤ − q2 − VL a , (1 + q1) − b a b a b a q4 k23 ≤ q2 − VL a , − k11 + q4k22 + −(d + q3) k22 − b a −k11 + q4 k22 − −(d + q3) k22 + b a b a b a (d + q3) k23 ≤ (1 + q1) − − a b a b k22 − k23 ≤ − k22 − k23 ≤ − b a b a q4 k23 ≤ − q4 k23 ≤ b a , , ΩL b ΩL b b a q2 − q2 − VL a VL a . −k11 − q4 k22 + −k11 − q4 k22 − VL sin b a , VL sin b a , , (30) 8 The admissibility condition (2) leads to the additional constraints k11 ≤ VF a , k11 ≥ − VF a , k22 + k22 − b a b a k23 ≤ ΩF a , k23 ≥ − ΩF a , k22 − k22 + b a b a k23 ≤ ΩF a , k23 ≥ − ΩF a . (31) The Fourier-Motzkin elimination is a mathematical al- gorithm for eliminating variables from a system of linear inequalities. Elimination of unknown kij from the sys- tem of inequalities, consists in creating another system of the same kind but without kij , such that both systems have the same solutions over the remaining variables. If one removes all variables from a system of inequalities with numerical coefficients, then one obtains a system of constant inequalities, which can be trivially decided to be true or false. This procedure can then be used to easily check whether a given system admits solutions or not (see Appendix A for more details). Applying the Fourier-Motzkin elimination to the in- equalities (30)-(31) with the assumption that d > a (in order to fix the sign of the coefficients of k22 and k23 in the second and fourth inequality of (30)) we end up with the following conditions on the variables a, b, d, VF, VL, ΩF, ΩL and uncertain parameters q1, . . . , q4 (the detailed passages are reported in Appendix B), ΩL ≤ b(1+q1)−VL sin b d+q3 , b(1+q1)+VL sin b d+q3 ≤ ΩF , VF ≥ VL + b q2, VF ≥ VL(cid:0)1 + q4 sin b VF ≥ VL(cid:0)1 + q4 sin b VF ≥ VL(cid:0)1 − q4 sin b VF ≥ VL(cid:0)1 − q4 sin b d+q3 (cid:1)+ b(cid:0)q2 + q4(1+q1) d+q3 (cid:1), d+q3 (cid:1)− b(cid:0)q2 + q4(1+q1) d+q3 (cid:1), d+q3 (cid:1)+ b(cid:0)q2 + q4(1+q1) d+q3 (cid:1), d+q3 (cid:1)− b(cid:0)q2 + q4(1+q1) d+q3 (cid:1), for q4 > 0 , for q4 > 0 , for q4 = 0 , for q4 < 0 , for q4 < 0. An appropriate selection of the parameters q1, . . . , q4 on the extremes of the intervals (24), (i.e., q1 = sin b b − 1, q3 = a, for the first inequality, q1 = 0, q3 = −a, for the second and q1 = 0, q2 = 1−cos b , q3 = −a, q4 = a, for (cid:4) the third), leads to (25) and (26). b Some remarks are in order at this point. The inequalities (25) and (26) (which are linear in VF, VL, ΩF, ΩL and nonlinear in a, b, d), specify the role played by each of the parameters introduced in Assump- tion 16, in the solvability of the VMP. In particular, they show how the bounds on the forward and angular veloc- ity of the follower robot are affected by the size of the visibility set S and the velocity of the leader. Note that conditions (25) and (26) are necessary and sufficient for the linear uncertain system (19). Note also that owing to (26), we have ΩF ≥ ΩL. Once fixed the variables a, b, d, VF, VL, ΩF, ΩL according to (25) and (26), the polytope of all the feasible state feedback matri- ces is given by (30)-(31): by evaluating (30)-(31) on the vertices of the polyhedron Q, we can see that K is defined by a set of 392 inequalities, most of whom are redundant (see, e.g., the external (green) polytope in Fig. 3, below). 3 2 k Remark 19 (Selection of the gain matrix K) Since the polytope K contains infinite gain matrices, one needs an optimal criterion to select K, such as, e.g., minimizing any matrix norm. In the simulation experi- ments reported in Sect. 5, we have chosen the matrix PSfrag replacements 1 0. 9 0. 8 0. 7 0. 6 0. 5 0. 4 4 3 k22 2 1 5 5. 5 6. 5 6 k11 K =  with minimum 2-norm. 0 k11 0 0 k22 k23  , Fig. 3. Polytopes K for a set of given parameters: (blue, internal) with disturbances; (green, external) without disturbances. we can rewrite (32) as 4 Extensions and applications In this section, we propose various extensions of the basic setup considered in Theorem 18, and discuss a few appli- cations. We study the VMP in the presence of unknown but bounded disturbances, and consider the case of the leader moving along a circular path around a stationary target. We also extend our results to chains of robots. 4.1 Rejection of unknown but bounded disturbances Let us consider the following system 0 0 cos βF βF L L −1 0 0 sin βF L βF L 0 0 0 ∆ pF L[1] pF L[2] βF L   =   −1 0 pF L[2] 0 −1−∆pF L[1] − d 0 0 −1 vF hF ωF           ∆pF L[1] pF L[2] βF L +       +  cos βF L − sin βF L 0 sin βF L cos βF L 0 0 0 1 ωL vL hL     .   (32) With respect to (19), two new components, hF and hL, are present in the input and disturbance vectors u and δ. They are unknown but bounded disturbances acting on the robots F and L (e.g., lateral wind in a real setup). Our purpose here is to solve the VMP in the presence of the disturbances hF, hL. Collecting together all the perturbations acting on the nominal system (i.e., vL, ωL, hF and hL), ∆ pF L[1] pF L[2] βF L −1   =  pF L[2] 0 0 cos βF βF L L −1 0 0 0 0 sin βF L βF L 0 ∆pF L[1] pF L[2] βF L     +   0 −∆pF L[1] − d 0 −1     vF ωF cos βF sin βF 0 − sin βF L 0 L L 0 −1 cos βF L 0 1 0 0 +        . vL ωL hF hL (33)       Let U be given in (22), and define D = {(vL, ωL, hF, hL)T : vL ∈ [−VL, VL], ωL ∈ [−ΩL, ΩL], hF ∈ [−HF, HF], hL ∈ [−HL, HL]}, (34) where HF, HL are strictly positive constants. Using the same arguments as those in Theorem 18, we can prove the following corollary (note that the feedback matrix K is again of the form (27)). Corollary 20 (VMP with disturbances) Choose U and S as in Assumption 16, D as in (34), and let d > a, 0 < b ≤ π/2. The VMP for the robots F and L in the presence of the unknown but bounded disturbances hF, hL, has a solution if the following conditions are satisfied a sin b d − a(cid:19) + 1 − cos b a(HF + HL + b) + d − a (35) + HL sin b, VF ≥ VL(cid:18)1 + 9 PSfrag replacements xL L S (cid:16) sin γ ρ , 1−cos γ ρ (cid:17) * yL γ ρ F Fig. 4. VMP on a circle: pose of the robots L and F L )T = (0, 0, 0)T , vL = vF and for (∆pF ωL = ωF = ρ. L[2], ∆βF L[1], ∆pF ΩL ≤ ΩF ≥ (1 − VL) sin b − (HF + HL) d + a , VL sin b + b + (HF + HL) d − a . (36) Remark 21 Note that because of the additional terms HF and HL, conditions (35)-(36) are stricter than (25)- (26) and then the polytope K is smaller in this case. This is evident in Fig. 3, where the polytope K ( blue, internal) obtained for a = 0.15 m, b = π/3 rad, d = 1.6 m, VF = 0.95 m/s, VL = 0.1 m/s, ΩF = π/2 rad/s, ΩL = π/20 rad/s and HF = 0.2 m/s, HL = 0.1 m/s is compared with the polytope ( green, external) corresponding to HL = HF = 0 m/s. 4.2 VMP on a circle In this section, we will suppose that the leader robot moves along a circular path, around a static target. This scenario could be of interest in several real-world ap- plications, such as, e.g., for environmental surveillance, patrolling or terrain and utilities inspection (Casbeer et al., 2006; Susca et al., 2008). Differently from Sect. 3.3, we will assume that the pose of robot L with respect to the frame of F is defined through the angle 0 < γ < π/2 and the angular velocity ρ > 0, instead of the distance parameter d (see Fig. 4). Let us consider the following change of variables in system (18): (pF L[1], pF L[2], βF L )T → (∆pF L[1], ∆pF L[2], ∆βF L )T , (vL, ωL)T → (vL, ωL)T , (vF, ωF)T → (vF, ∆ωF)T , L[1] − sin γ L[2] − 1−cos γ L[1] = pF where ∆pF , ∆βF L = βF L − γ and ∆ωL = ωL − ρ, ∆ωF = ωF − ρ. Following the same procedure detailed in the previous sections, we obtain the system L[2] = pF ρ , ∆pF ρ ∆ pF L[1] ∆ pF L[2] ∆ βF L   =  0 ρ q2 − sin γ −ρ 0 q1 + cos γ 0 0 0 ∆pF L[1] ∆pF L[2] ∆βF L        +     +  −1 q4 + 1−cos γ 0 −q3 − sin γ ρ ρ 0 −1 vF ∆ωF     q5 + cos γ 0 q6 + sin γ 0 0 1     vL ∆ωL  , (37) where q1 = sin(∆βF L +γ)−sin γ ∆βF L q2 = cos(∆βF L +γ)−cos γ ∆βF L − cos γ, + sin γ, q3 = ∆pF L[1], q5 = cos(∆βF L + γ) − cos γ, q4 = ∆pF L[2], q6 = sin(∆βF L + γ) − sin γ. Assumption 22 Let us suppose that U =(cid:8)(vF, ∆ωF)T : vF ∈ [−VF, VF], ∆ωF ∈ [−ΩF, ΩF](cid:9), D =(cid:8)(vL, ∆ωL)T : vL ∈ [−VL, VL], ∆ωL ∈ [−ΩL, ΩL](cid:9), where 0 < VF < 1, 0 < VL < 1 and 0 < ΩF, 0 < ΩL < ρ. Let us also consider the following visibility set (see Fig. 4) S = {(∆pF L[1], ∆pF L[2], ∆βF L )T : ∆pF L[1] ∈ [−a, a], ∆pF L[2] ∈ [−a, a], ∆βF L ∈ [−b, b]}, (38) where a > 0 and b > 0. Since the state of system (37) is constrained in (38), the polyhedron Q ⊂ R6 is defined as follows: q1 ∈(cid:2) sin(b+γ)−sin γ q2 ∈ [ cos(b+γ)−cos γ b b − cos γ, sin(b−γ)+sin γ b + sin γ, − cos(b−γ)+cos γ b − cos γ(cid:3), + sin γ], q3 ∈ [−a, a], q5 ∈ [cos(b + γ) − cos γ, cos(b − γ) − cos γ], q4 ∈ [−a, a], q6 ∈ [−sin(b − γ) − sin γ, sin(b + γ) − sin γ]. The proof of the next theorem is analogous to that of Theorem 18 and it is omitted. The feedback matrix K has also in this case the form (27). Theorem 23 (Solvability of the VMP on a circle) Choose U, D and S as in Assumption 22 and let 1 − cos γ > ρa, 0 ≤ b ± γ ≤ π/2. The VMP on a circle 10 PSfrag replacements 1 2 n − 1 n S2 S3 Sn Fig. 5. Chain of n robots. has a solution if the following conditions are satisfied VF ≥ VL(cid:0)cos(b − γ) + sin(b+γ)(1−cos γ−ρ a) sin γ+ρa (cid:1)+ cos γ + ρa (sin(b + γ) − sin γ + ρa) − cos(b + γ), − 1−cos γ−ρ a sin γ+ρa sin γ + ρa ΩL ≤ ρ(cid:18) (1 − VL) sin(b + γ) ΩF ≥ ρ(cid:18) VL sin(b + γ) + sin(b − γ) + sin γ + ρa − 1(cid:19), sin γ − ρa Ω1 ≤ (1 − V1) sin b2 d2 + a2 , Ωn ≥ Vn−1 sin bn + bn dn − an , (41) and for all k ∈ {2, . . . , n − 1}, Vk−1 sin bk + bk dk − ak ≤ Ωk ≤ (1 − Vk) sin bk+1 dk+1 + ak+1 . (42) It is an easy task to verify that if ak = a, bk = b, dk = d, k ∈ {2, . . . , n} and Vk = V , k ∈ {1, . . . , n}, (a > 0, d > a, 0 < b ≤ π/2, 0 < V < 1), condition (42) (and condition (40) as well) is not satisfied. Nevertheless, it can be proved that if Vk and at least one of the three parameters defining the visibility sets are left free to vary from robot to robot, then (40)-(42) can be always fulfilled. Fig. 6 shows the progression of a feasible set of parameters Vk, Ωk, bk for a chain of n = 15 robots, when ak = a = 0.1 and dk = d = 7, k ∈ {2, . . . , 15}. We conclude this section with the following corollary and a few remarks: (cid:19). (39) Corollary 24 The chain of robots can hold only a finite number of agents and cannot be closed, i.e., robot 1 can- not cyclically pursue robot n. Note that differently from Theorem 18, in this case, owing to (39) is not always true (i.e., for all values of the parameters) that ΩF ≥ ΩL. Proof: Let us study the connection existing between pa- rameters V1 and Vn. After simple algebraic manipula- tions on (40), we obtain the following inequality: 4.3 Chain of robots Next, we consider more complex robotic networks built by concatenating multiple leader-follower units (see Fig. 5). When equipped with wireless sensors, these arrays of robots could be used, for example, to efficiently monitor the temperature and/or salinity of the ocean or measure the average concentration of air pollutants (Lynch et al., 2008). In what follows, the feasibility conditions of Theorem 18 will be extended to such robot chains in order to maintain network-wide visibility between the agents. Because of the leader-follower hierarchy within the chain, vehicle k + 1 (the "follower") will aim at keeping the vehicle ahead (robot k, the "leader"), in its visibility set. Let ak, bk, dk, dk > ak, bk ≤ π/2, k ∈ {2, . . . , n}, n > 2, be the strictly positive parameters defining the visibility set Sk of robot k-th and let 0 < Vk < 1, Ωk > 0, k ∈ {1, . . . , n} be the bounds on k-th robot's linear and angular velocities (recall Assumption 16). By prop- agating conditions (25)-(26) of Theorem 18 starting from robot 1 (that guides the formation), we obtain the following set of inequalities (linear in Vk and Ωk) PSfrag replacements 0.5 V1 ≤ n Yi=1(cid:16)1 + Vn 1 ai sin bi di − ai (cid:17) Xi=2 − n 1 − cos bi + i Yk=2(cid:16)1 + ai sin bi di − ai ak sin bk dk − ak (cid:17) (43) . Vk Ωk bk 2.5 2 1.5 1 Vk+1 ≥ Vk(cid:18)1 + ak+1 sin bk+1 dk+1 − ak+1(cid:19) + 1 − cos bk+1 + ak+1 bk+1 dk+1 − ak+1 , k ∈ {1, . . . , n − 1}, 0 2 4 6 10 12 14 8 k (40) Fig. 6. Progression of a feasible set of parameters Vk, Ωk, bk for a chain of n = 15 robots (ak = 0.1, dk = 7, for all k). Angles are in radians. 11 ] m [ 0 y 9 8 7 6 5 4 3 2 1 0 Leader Follower ] m [ ] 1 [ F L p ∆ ] m [ ] 2 [ F L p ] d a r [ PSfrag replacements F L β 0 2 4 6 x 0 [m] (a) 0.5 0 _ 0.5 0.5 0 _ 0.5 1 0 _ 1 0 1 2 3 4 5 6 7 8 9 10 0 1 2 3 4 5 6 7 8 9 10 ] s / m [ F v ] s / d a r [ F ω PSfrag replacements 5 10 6 7 8 9 0 1 2 3 4 time [s] (b) 1 0.5 0 _ 0.5 _ 1 1 0.5 0 _ 0. 5 _ 1 0 1 2 3 4 5 6 7 8 9 10 0 1 2 3 4 5 6 7 8 9 10 time [s] (c) Fig. 7. Basic scenario: (a) Trajectory of the leader and follower, and visibility set S; (b) ∆pF ±a, ±a, ±b (dash); (c) vF, ωF (solid) and bounds ±VF, ±ΩF (dash). L[1], pF L[2], βF L (solid) and bounds When the number of robots n tends towards infinity, the first term on the right-hand side of (43) converges to zero (for any choice of the parameters ai, bi, di satisfy- ing the previous assumptions) asymptotically leading to the inequality V1 ≤ 0, which contradicts the initial hy- pothesis of a strictly positive V1. On the other hand, if the chain of robots were closed, the following additional inequality should be satisfied V1 ≥ Vn(cid:18)1 + a1 sin b1 d1 − a1(cid:19) + 1 − cos b1 + a1 b1 d1 − a1 , (cid:4) but it is incompatible with condition (43). It is easy to prove from condition (43), that once fixed a rule for the evolution of the parameters defining the visibility sets (i.e., ak = fa(k), bk = fb(k), dk = fd(k), with fa, fb, fd : Z>1 → R given discrete maps), an up- per bound on the maximum number of robots the chain can hold is given by the maximum positive integer N that fulfills the following inequality: N Xi=2(cid:16)1 − cos bi + ai bi di − ai(cid:17) N Yk = i+1(cid:16)1 + ak sin bk dk − ak (cid:17) < 1. Note that once the state feedback matrices Ki, i ∈ {2, . . . , n} of the robots have been established, the im- plementation of the control laws is totally distributed : in fact, each agent only needs to know the relative posi- tion and orientation of the preceding vehicle in the chain, to execute its control action. 5 Simulation results 5.1 Basic scenario The simulation results reported in Fig. 7 refer to the basic scenario studied at the beginning of Sect. 3. The leader robot moves with velocities vL(t) = 0.05 sin(t), ωL(t) = π 20 cos(0.1t). We set VL = 0.1 m/s, ΩL = π/15 rad/s, VF = 0.9 m/s, ΩF = π/3 rad/s, a = 0.4 m, b = π/4 rad and d = 2 m, according to the conditions of Theorem 18 and we chose the gain matrix in K with minimum 2-norm: K =" 1.5173 0 0 0.3707 0.4925#. 0 Note that since K is in the interior of K, the asymptotic stability is assured (cf. Theorem 5.2 in (Blanchini, 1991)). System (19) has been initialized with (∆pF L[1](0), pF L[2](0), βF L (0))T (44) = (0.3285, −0.1626, 0.1071)T. Fig. 7(a) reports the trajectory of robot L and F and the visibility set S, (in order to have a temporal reference the robots are drawn every two seconds). Fig. 7(b) shows that ∆pF L (solid), keep inside the respective bounds ±a, ±a, ±b (dash), as expected. Finally, Fig. 7(c) exposes that the control inputs vF, ωF (solid), respect the corresponding bounds ±VF, ±ΩF (dash). L[2], βF L[1], pF 5.2 Rejection of unknown but bounded disturbances Extensive simulation experiments have been performed to illustrate the theory and assess the soundness of the proposed approach. In the simulation results reported in Fig. 8, the leader robot moves with velocities vL(t) = 0.01, 12 2 0 ] m [ 0 y −2 −4 −6 0 5 x (a) ] m [ ] 1 [ F L p ∆ ] m [ ] 2 [ F L p Leader Follower 10 PSfrag replacements F L β 15 0 [m] ] d a r [ 0.5 0 −0.5 0 0.5 0 −0.5 0 1 0 −1 0 5 5 5 20 20 ] s / m [ F v ] s / d a r [ 10 15 10 15 F ω PSfrag replacements 10 15 20 time [s] (b) 1 0.5 0 −0.5 −1 0 1 0.5 0 −0.5 −1 0 20 5 10 15 5 10 15 20 time [s] (c) Fig. 8. Rejection of unknown but bounded disturbances: (a) Trajectory of the leader and follower, and visibility set S; (b) ∆pF pF L[2], βF L (solid) and bounds ±a, ±a, ±b (dash); (c) vF, ωF (solid) and bounds ±VF, ±ΩF (dash). L[1], ] m [ 0 y 4 3 2 1 0 −1 Leader Follower ] m [ ] 1 [ F L p ∆ ] m [ ] 2 [ F L p ∆ ] d a r [ PSfrag replacements F L β ∆ −3 −2 −1 0 x 0 [m] 1 2 (a) 0.5 0 −0.5 0 0.5 0 −0.5 0 1 0 −1 0 2 4 6 8 10 2 4 6 8 10 12 12 F ω ∆ PSfrag replacements 2 4 6 8 10 12 time [s] (b) 1 0.5 0 −0.5 ] s / m [ F v ] s / d a r [ −1 0 1 0.5 0 −0.5 −1 0 2 4 6 8 10 12 2 4 6 8 10 12 time [s] (c) Fig. 9. VMP on a circle: (a) Trajectory of the leader and follower, and visibility set S; (b) ∆pF bounds ±a, ±a, ±b (dash); (c) vF, ∆ωF (solid) and bounds ±VF, ±ΩF (dash). L[1], ∆pF L[2], ∆βF L (solid) and ωL(t) = − π 20 sin(0.08t). Unknown but bounded dis- turbances hL(t), hF(t) (uniform random noises in the interval (−0.1, 0.1)) act on the leader and the follower (recall Sect. 4.1). Owing to the conditions of Corol- lary 20, we chose VL = 0.03 m/s, ΩL = π/18 rad/s, VF = 0.95 m/s, ΩF = π/4 rad/s, HL = HF = 0.12 m/s, a = 0.4 m, b = π/4 rad and d = 2 m. The initial condi- tion of system (33) is (44) and, again, we selected the gain matrix in K with minimum 2-norm: 5.3 VMP on a circle In Fig. 9, the leader robot moves with velocities vL(t) = 0.05 sin(t), ωL(t) = π/30, and the parame- ters VL = 0.06 m/s, ΩL = π/25 rad/s, VF = 0.8 m/s, ΩF = π/3 rad/s, a = 0.4 m, b = π/4 rad, ρ = 0.3 rad/s and γ = π/6 rad, have been chosen according to the conditions of Theorem 23 (recall Sect. 4.2). The minimum 2-norm gain matrix in K is, in this case 1.6735 0 K =  0 0 0.5896 0.5326 . Fig. 8(a) reports the trajectory of L and F and the visibi- lity set S. From Figs. 8(b) and 8(c), we note that despite the presence of the unknown but bounded disturbances, ∆pF L and vF, ωF respect the relative state and control bounds. L[2], βF L[1], pF K =" 1.3812 0 0 0.6051 0.5508#, 0 L[2](0), ∆βF and the initial condition of system (37) is (∆pF L[1](0), ∆pF L (0))T = (0, 0, 0.5597)T . Fig. 9(a) re- ports the trajectory of L and F and the visibility set S. Figs. 9(b) and 9(c) show the time history of ∆pF L[1], ∆pF L and vF, ∆ωF, and the correspond- ing bounds. L[2], ∆βF 13 14 12 10 8 6 4 2 0 ] m [ 0 y Robot 1 Robot 2 Robot 3 Robot 4 ] m [ 0 y S2 Robot 1 Robot 2 Robot 3 Robot 4 14 12 10 8 6 4 2 0 ] m [ 0 y S3 PSfrag replacements 0 2 4 8 PSfrag replacements 6 x 0 [m] 10 12 0 2 4 PSfrag replacements 10 12 8 6 x 0 [m] 14 12 10 8 6 4 2 0 Robot 1 Robot 2 Robot 3 Robot 4 S4 0 2 4 8 10 12 6 x 0 [m] (a) (b) (c) ] m [ ] 1 [ 2 1 p ∆ ] m [ ] 2 [ 2 1 p PSfrag replacements ] d a r [ 2 1 β 0.5 0 −0.5 0 0.5 0 −0.5 0 0.2 0 −0.2 0 2 4 6 8 2 4 6 8 10 10 ] m [ ] 1 [ 3 2 p ∆ ] m [ ] 2 [ 3 2 p ] d a r [ 3 2 β 0.5 0 −0.5 0 0.5 0 −0.5 0 0.4 0 −0.4 0 PSfrag replacements PSfrag replacements 2 4 6 8 10 time [s] (d) 2 4 6 8 10 time [s] (e) 2 4 6 8 2 4 6 8 10 10 ] m [ ] 1 [ 4 3 p ∆ ] m [ ] 2 [ 4 3 p ] d a r [ 4 3 β 0.5 0 −0.5 0 0.5 0 −0.5 0 1 0 −1 0 2 4 6 8 2 4 6 8 10 10 2 4 6 8 10 time [s] (f) ] s / m [ 2 v 0.1 0.05 0 −0.05 −0.1 0 ] s / d a r [ 0.1 0.05 0 2 4 6 8 10 ] s / m [ 3 v 0.2 0 −0.2 0 ] s / d a r [ 0.2 0.1 0 2 4 6 8 10 2 4 6 8 10 ] s / m [ 4 v 1 0.5 0 −0.5 −1 0 ] s / d a r [ 0.5 0 2 ω PSfrag replacements −0.05 −0.1 0 2 4 3 ω PSfrag replacements 6 8 10 −0.1 −0.2 0 2 4 4 ω PSfrag replacements 6 8 10 −0.5 0 2 4 6 8 10 time [s] (g) time [s] (h) time [s] (i) 1[1], p2 Fig. 10. Chain of robots: Trajectory of the 4 robots and (a) visibility set S2, (b) visibility set S3, (c) visibility set S4; (d) ∆p2 3[2], β 4 3 and bounds ±a4, ±a4, ±b4; (g) v2, ω2 (solid) and bounds ±V2, ±Ω2 (dash); (h) v3, ω3 and bounds ±V3, ±Ω3; (i) v4, ω4 and bounds ±V4, ±Ω4. 1 (solid) and bounds ±a2, ±a2, ±b2 (dash); (e) ∆p3 2 and bounds ±a3, ±a3, ±b3; (f) ∆p4 1[2], β 2 2[2], β 3 2[1], p3 3[1], p4 5.4 Chain of robots In Fig. 10 a chain of 4 robots is considered (recall Sect. 4.3). Robot 1 guides the formation with veloci- ties, v1(t) = 0.01, ω1(t) = π/52. The following set of parameters, satisfying conditions (40)-(42), has been used in the simulation: V1 = 0.02 m/s, V2 = 0.085 m/s, V3 = 0.25 m/s, V4 = 0.8 m/s, Ω1 = π/50 rad/s, Ω2 = π/35 rad/s, Ω3 = π/21 rad/s, Ω4 = π/6 rad/s, and a2 = a3 = a4 = 0.4 m, b2 = π/14 rad, b3 = π/9 rad, 14 b4 = π/4 rad and d2 = d3 = d4 = 3 m. The minimum 2-norm gain matrices in the polytopes K2, K3 and K4 of robots 2, 3 and 4, are respectively presence of visibility constraints. The use of polar coor- dinates to describe conic-like visibility sets S, is also a subject of on-going research. K2 =  0.2066 0 0 0 0.0315 0.3361 0 0 0.0669 0.3400 0 0.5087 , K3 =   0.2678 0.3348#, 0 0 K4 =" 1.7273 0  , Appendix A: The Fourier-Motzkin elimination method The Fourier-Motzkin elimination (FME), a generaliza- tion of Gauss elimination, is a computational method for solving a system 3[2](0), β4 1[1](0), p2 2[2](0), β3 and the initial conditions for the three dynamic systems 1[2](0), β2 in the form (19) are, (∆p2 1(0))T = (0, 0, 0.0374)T , (∆p3 2[1](0), p3 2(0))T = (0, 0, 3[1](0), p4 0.2244)T , (∆p4 3(0))T = (0, 0, 0.2618)T , where pk+1 denotes the position of robot k with re- spect to the reference frame attached to robot k + 1 and βk+1 , θk − θk+1, k ∈ {1, 2, 3}. Figs. 10(a)-(c) report the trajectory of the 4 robots and the visibility sets S2 (green), S3 (cyan) and S4 (gray), respectively. Figs. 10(d)-(f) and 10(g)-(i) show the time history of ∆pk+1 , k ∈ {1, 2, 3} and vk, ωk, k ∈ {2, 3, 4}, and the relative state and control bounds. [2], βk+1 [1], pk+1 k k k k k 6 Conclusions and future work The paper proposes an original solution to the visibi- lity maintenance problem (VMP) for a leader-follower pair of Dubins-like vehicles with input constraints. By interpreting the nonlinear model describing the rel- ative dynamics of the robots as a linear system with parameter uncertainty, the VMP is reformulated as a linear constrained regulation problem with additive disturbances (DLCRP). General conditions for the positive D-invariance of linear uncertain systems with parametric disturbance matrix are derived and used to study the feasibility of the VMP when box bounds on the state, input and disturbance are considered. The proposed design procedure can be easily adapted to provide the control with unknown but bounded dis- turbances rejection capabilities. Conditions for the so- lution of the VMP when robots' desired displacement is defined through angular parameters are also presented, and the extension to chains of n robots is discussed. A drawback of the approach proposed in this paper is that it requires a great amount of computational work off-line, because the feedback matrix K is obtained as a solution of a large set of inequalities. In addition all the vertices of the visibility set S are required. In this re- spect, the solution to the LCRP proposed in (Vassilaki and Bitsoris, 1989) appears to be preferable to the one in (Blanchini, 1990), even though neither distur- bances nor model parametric uncertainty are considered therein. Future research lines include the extension of our re- sults to robotic networks with arbitrary topologies and the application of the proposed approach to the study of consensus, rendezvous and coverage problems in the 15 A x ≤ b, A ∈ Rm×n, b ∈ Rm, of m linear inequalities in n variables (Motzkin, 1951; Schrijver, 1986). The key idea of the FME method is to eliminate one variable of the system A x ≤ b at each iteration and rewrite the resulting equations accord- ingly. Even though the number of variables decreases at each step, the number of inequalities in the remaining variables grows exponentially fast: in fact, at iteration j the number of inequalities to be evaluated is at most 2 ⌋2j ⌊ m . Because of its double-exponential computational complexity, the FME method can be applied efficiently only to problems with a small number of inequalities and it is not competitive with standard LP solvers However, differently from this numerical approach, the method can handle symbolic inequalities. We illustrate this idea with a simple example. Consider the following set of symbolic inequalities a11 x1 + a12 x2 ≤ b1, −a21 x1 − a22 x2 ≤ b2, a32 x2 ≤ b3, (45) (46) (47) where a11, a12, a21, a22, a32, b1, b2, b3 ∈ R>0 are un- known parameters. We wish to determine under which conditions on these parameters, system (45)-(47) admits solutions. The first step is to eliminate the variable x1. To this end, solving (45)-(46) in x1, we get: x1 ≤ b1 − a12 x2 a11 , x1 ≥ −b2 − a22 x2 a21 . Joining the two inequalities, after a few computations, we obtain the following condition on the variable x2 (assuming that a11 a22 − a12 a21 6= 0) x2 ≥ −a11 b2 − a21 b1 a11 a22 − a12 a21 . (48) If we finally combine inequalities (47) and (48), we end up with the sought solvability condition of system (45)- (47), in terms of the symbolic parameters a11, a12, a21, a22, a32, b1, b2, b3: b3 a32 ≥ −a11 b2 − a21 b1 a11 a22 − a12 a21 . Appendix B: Application of the Fourier-Motzkin elimination to the inequalities (30)-(31) Our first step to solve the system of inequalities (30)-(31), is to eliminate variable k11. Solving in k11 (under the assumption of d > a), we obtain the follow- ing set of conditions: Combining conditions (49)-(54) and (55)-(58), we end up with a total set of 35 inequalities, of whom only 4 are non-trivial: ΩL ≤ b (1 + q1) − VL sin b d + q3 , ΩF ≥ b (1 + q1) + VL sin b d + q3 , , , VL a VL a VL a VL a q2 + q2 + VF ≥ VL(cid:16)1 + VF ≥ VL(cid:16)1 + q4 sin b d + q3 (cid:17)+ b(cid:16)q2 + d + q3 (cid:17)− b(cid:16)q2 + q4 sin b q4(1 + q1) d + q3 (cid:17), d + q3 (cid:17). q4(1 + q1) If we now assume that q4 = 0, we obtain the unique con- dition: VF ≥ VL + b q2. Finally, if we assume that q4 < 0, we come up with the following inequalities , , k11 ≥ q4 k22 + k11 ≥ q4 k22 − b a b a q4 k23 + q4 k23 − b a b a q2 + q2 + k11 ≥ −q4 k22 + k11 ≥ −q4 k22 − b a b a q4 k23 + q4 k23 − b a b a k11 ≥ − VF a , k11 ≤ VF a . Combining these inequalities, we get: q4 k22 ≤ q4 k22 ≤ VF a VF a − + b a b a q4 k23 − q4 k23 + b a b a q2 − q2 − VL a VL a , , q4 k22 ≥ − q4 k22 ≥ − VF a VF a + − b a b a q4 k23 + q4 k23 − b a b a q2 + q2 + VL a VL a , . In order to eliminate the second variable, k22, we should consider three cases, according to the sign of q4. If we assume that q4 > 0, we then obtain the following set of inequalities: k22 ≥ − b a k23 + b (1 + q1) + VL sin b a(d + q3) k22 ≥ b a k23 + −b (1 + q1) + VL sin b a(d + q3) , , k22 ≥ − b a k23 + ΩL a , k22 ≥ − b a k23 + k22 ≥ b a k23 + VF + b q2 − VL aq4 , k22 ≥ b a k23 − , ΩF a b a −VF + b q2 + VL k22 ≤ k23 − , aq4 k22 ≥ − k22 ≤ b a k22 ≤ − k22 ≤ − k23 + b a b a k23 + k23 + , −VF − b q2 + VL aq4 k22 ≤ b a ΩF a , k23 + ΩF a , VF − b q2 − VL , aq4 k23 − ΩF a , , b a ΩL a k22 ≥ − b a k23 + b (1 + q1) + VL sin b a(d + q3) k22 ≥ b a k23 + −b (1 + q1) + VL sin b a(d + q3) , , k22 ≥ − k22 ≥ b a k22 ≥ − k22 ≥ k22 ≤ b a b a k22 ≤ − b a k23 + ΩL a , k23 + −VF + b q2 + VL aq4 b a k23 + −VF − b q2 + VL aq4 , k23 − k23 − b a k23 + b a , k22 ≥ − ΩF a ΩL a VF − b q2 − VL , aq4 , , k23 − ΩF a , k22 ≤ b a k23 + VF + b q2 − VL aq4 , k22 ≤ − b a k23 + ΩF a , k22 ≤ b a k23 + ΩF a . from which we deduce the following two new conditions: VF ≥ VL(cid:16)1 − VF ≥ VL(cid:16)1 − References q4 sin b d + q3 (cid:17) + b(cid:16)q2 + d + q3 (cid:17) − b(cid:16)q2 + q4 sin b q4 (1 + q1) d + q3 (cid:17), d + q3 (cid:17). q4 (1 + q1) Ando, H., Y. Oasa, I. Suzuki and M. Yamashita (1999). Distributed Memoryless Point Convergence Algorithm for Mobile Robots with Limited Visibility. IEEE Trans. Robot. Autom. 15(5), 818–828. Aubin, J.-P. and A. Cellina (1984). Differential Inclusions: Set-Valued Maps and Viability Theory. Springer-Verlag, Heidelberg. Aubin, J.-P. and H. Frankowska (1990). Set-Valued Analysis. Birkhauser, Boston. Bhattacharya, S. and S. Hutchinson (2010). On the Existence of Nash Equilibrium for a Two-player Pursuit-Evasion Game with Visibility Constraints. Int. J. Robot. Res. 29(7), 831–839. (49) (50) (51) (52) (53) (54) (55) (56) (57) (58) 16 Bian, W. and M. French (2005). Graph Topologies, Gap Metrics and Robust Stability for Nonlinear Systems. SIAM J. Contr. Optim. 44(2), 418–443. Lynch, K.M., I.B. Schwartz, P. Yang and R.A. Freeman (2008). Decentralized Environmental Modeling by Mobile Sensor Networks. IEEE Trans. Robot. 24(3), 710–724. Blanchini, F. (1990). Feedback Control for Linear Time-Invariant Systems with State and Control Bounds in the Presence of Disturbances. IEEE Trans. Automat. Contr. 35(11), 1231– 1234. Blanchini, F. (1991). Constrained Control for Uncertain Linear Systems. J. Optim. Theory Appl. 71(3), 465–484. Blanchini, F. (1999). Set invariance in control. Automatica 35(11), 1747–1767. Blanchini, F. and S. Miani (2008). Set-Theoretic Methods in Control. Systems & Control: Foundations & Applications. Birkhauser, Boston. Bullo, F., J. Cort´es and S. Mart´ınez (2009). Distributed Control of Robotic Networks. Applied Mathematics Series. Princeton University Press. Available electronically at http://www.coordinationbook.info. Casbeer, D.W., D.B. Kingston, R.W. Beard, T.W. Mclain, S.-M. Li and R. Mehra (2006). Cooperative forest fire surveillance using a team of small unmanned air vehicles. Int. J. Syst. Sci. 37(6), 351–360. Cort´es, J., S. Mart´ınez and F. Bullo (2006). Robust rendezvous for mobile autonomous agents via proximity graphs in arbitrary dimensions. IEEE Trans. Automat. Contr. 51(8), 1289–1298. Dimarogonas, and D.V. K.J. Kyriakopoulos (2008). Connectedness Preserving Distributed Swarm Aggregation for Multiple Kinematic Robots. IEEE Trans. Robot. 24(5), 1213–1223. Dubins, L.E. (1957). On curves of minimal length with a constraint on average curvature and with prescribed initial and terminal positions and tangents. American J. Math. 79(3), 497–516. Finke, J., K.M. Passino, S. Ganapathy and A. Sparks (2005). Modeling and Analysis of Cooperative Control Systems for Uninhabited Autonomous Vehicles. In: Cooperative Control. Vol. 309 of Lecture Notes in Control and Information Sciences. pp. 79–102. Springer. Gerkey, B.P., S. Thrun and G. Gordon (2006). Visibility-based Pursuit-evasion with Limited Field of View. Int. J. Robot. Res. 25(4), 299–315. Glizer, V.Y. (1999). Homicidal Chauffeur Game with Target Set in the Shape of a Circular Angular Sector: Conditions for Existence of a Closed Barrier. J. Optim. Theory Appl. 101(3), 581–598. Guibas, L.J., J.C. Latombe, S.M. LaValle, D. Lin and R. Motwani (1997). Visibility-based pursuit-evasion in a polygonal environment. In: Algorithms and Data Structures. Vol. 1272 of Lecture Notes in Computer Science. pp. 17–30. Springer. Isler, V., S. Kannan and S. Khanna (2005). Randomized pursuit- evasion in a polygonal environment. IEEE Trans. Robot. 5(21), 875–884. James, M.R., M.C. Smith and G. Vinnicombe (2005). Gap Metrics, Representations, and Nonlinear Robust Stability. SIAM J. Contr. Optim. 43(5), 1535–1582. Jarmark, B. and C. Hillberg (1984). Pursuit-evasion between two realistic aircraft. AIAA J. Guid. Contr. Dynam. 7, 690–694. Ji, M. and M. Egerstedt (2007). Distributed Coordination Control of Multiagent Systems while Preserving Connectedness. IEEE Trans. Robot. 23(4), 693–703. Lin, J., A.S. Morse and B.D.O. Anderson (2007). The Multi- Agent Rendezvous Problem. Part 1: The Synchronous Case. SIAM J. Contr. Optim. 46(6), 2096–2119. 17 Mazo Jr, M., A. Speranzon, K.H. Johansson and X. Hu (2004). Multi-Robot Tracking of a Moving Object using Directional Sensors. In: Proc. IEEE Int. Conf. Robot. Automat. pp. 1103– 1108. Merz, A.W. and D. S. Hague (1977). Coplanar Tail-Chase Aerial Combat as a Differential Game. AIAA Journal 15, 1419– 1423. Mesbahi, M. and M. Egerstedt (2010). Graph Theoretic Methods in Multiagent Networks. Princeton University Press. Morbidi, F., F. Bullo and D. Prattichizzo (2008). On Leader- Follower Visibility Maintenance via Controlled Invariance for Dubins-like Vehicles. In: Proc. 47th IEEE Conf. Dec. Contr. pp. 1821–1826. Moreau, L. (2005). Stability of multiagent systems with time- dependent communication links. IEEE Trans. Automat. Contr. 50(2), 169–182. Motzkin, T.S. (1951). Two consequences of the transposition theorem on linear inequalities. Econometrica 19(2), 184–185. Olfati-Saber, R., J.A. Fax and R.M. Murray (2007). Consensus and Cooperation in Networked Multi-Agent Systems. Proc. IEEE 95(1), 215–233. Panik, M.J. (1993). Fundamentals of convex analysis: duality, separation, representation, and resolution. Kluwer Academic Publishers. Savla, K., G. Notarstefano and F. Bullo (2009). Maintaining Limited-Range Connectivity among Second-Order Agents. SIAM J. Contr. Optim. 48(1), 187–205. Schrijver, A. (1986). Theory of Linear and Integer Programming. John Wiley. New York. Shima, T. and J. Shinar (2002). Time-Varying Linear PursuitEvasion Game Models with Bounded Controls. AIAA J. Guid. Contr. Dynam. 25(3), 425–432. Siciliano, B., L. Sciavicco, L. Villani and G. Oriolo (2008). Robotics: Modelling, Planning and Control. Advanced Textbooks in Control and Signal Processing. Springer. Spanos, D.P. and R.M. Murray (2005). Motion planning with wireless network constraints. In: Proc. American Contr. Conf. pp. 87–92. Susca, S., F. Bullo and S. Mart´ınez (2008). Monitoring Environmental Boundaries with a Robotic Sensor Network. IEEE Trans. Contr. Syst. Tech. 16(2), 288–296. Tiwari, A., J. Fung, R. Bhattacharya and R.M. Murray (2004). Polyhedral Cone Invariance Applied to Rendezvous of Multiple Agents. In: Proc. 43rd IEEE Conf. Dec. Contr. pp. 165–170. Tomlin, C.J., J. Lygeros and S.S. Sastry (2000). A game theoretic approach to controller design for hybrid systems. Proc. IEEE 88(7), 949–970. Vassilaki, M. and G. Bitsoris (1989). Constrained Regulation of Linear Continuous-time Dynamical Systems. Syst. Contr. Lett. 13(3), 247–252. Yang, P., R. Freeman, G. Gordon, K. Lynch, S. Srinivasa and R. Sukthankar (2010). Decentralized estimation and control of graph connectivity for mobile sensor networks. Automatica 46(2), 390–396. Zavlanos, M.M. and G.J. Pappas (2007). Potential Fields for Maintaining Connectivity of Mobile Networks. IEEE Trans. Robot. 23(4), 812–816.
1510.09115
1
1510
2015-10-30T15:12:02
Continuous Time Gathering of Agents with Limited Visibility and Bearing-Only Sensing
[ "cs.MA", "eess.SY" ]
A group of mobile agents, identical, anonymous, and oblivious (memoryless), having the capability to sense only the relative direction (bearing) to neighborhing agents within a finite visibility range, are shown to gather to a meeting point in finite time by applying a very simple rule of motion. The agents' rule of motion is : set your velocity vector to be the sum of the two unit vectors in R^2 pointing to your "extremal" neighbours determining the smallest visibility disc sector in which all your visible neighbors reside, provided it spans an angle smaller than pi, otherwise, since you are "surrounded" by visible neighbors, simply stay put (set your velocity to 0). Of course, the initial constellation of agents must have a visibility graph that is connected, and provided this we prove that the agents gather to a common meeting point in finite time, while the distances between agents that initially see each other monotically decreases. We will also prove a geometrical result, a tight lower bound on the sum of cosines of the interior angles of a convex polygon, that we will use to prove the gathering of our dynamical system.
cs.MA
cs
Continuous Time Gathering of Agents with Limited Visibility and Bearing-Only Sensing Levi-Itzhak Bellaiche and Alfred Bruckstein Center for Intelligent Systems - MARS Lab Autonomous Systems Program Technion Israel Institute of Technology 32000 Haifa, Israel Abstract A group of mobile agents, identical, anonymous, and oblivious (memoryless), having the capacity to sense only the relative direction (bearing) to neighborhing agents within a finite visibility range, are shown to gather to a meeting point in finite time by applying a very simple rule of motion. The agents' rule of motion is : set your velocity vector to be the sum of the two unit vectors in R2 pointing to your "extremal" neighbours determining the smallest visibility disc sector in which all your visible neighbors reside, provided it spans an angle smaller than π, otherwise, since you are "surrounded" by visible neighbors, simply stay put (set your velocity to 0). Of course, the initial constellation of agents must have a visibility graph that is connected, and provided this we prove that the agents gather to a common meeting point in finite time, while the distances between agents that initially see each other monotonically decreases. 1 1 Introduction This paper studies the problem of mobile agent convergence, or robot gather- ing under severe limitations on the capabilities of the agent-robots. We assume that the agents move in the environment (the plane R2) according to what they currently "see", or sense in their neighborhood. All agents are identical and indistinguishable (i.e. they are anonimous having no i.d's) and, all of them are performing the same "reactive" rule of motion in response to what they see. Our assumption will be that the agents have a finite visibility range V , a dis- tance beyond which they cannot sense the presence of other agents. The agents within the "visibility disk" of radius V around each agent are defined as his neighbors, and we further assume that the agent can only sense the direction to its neighbors, i.e. it performs a "bearing only" measurement yielding unit vectors pointing toward its neighbor. Therefore, in our setting, each agent senses its neighbors within the visibility disk and sets its motion only according to the distribution of unit vectors point- ing to its current neighbors. Figure 1 shows a constellation of agents in the plane (R2), their "visibility graph" and the visibility disks of some of them, each agent moves based on the set of unit vectors pointing to its neighbors. Figure 1: A constellation of agents in the plane displaying the "visibility disks" of agents Ak, Al, Ai, Aj, Ap and the visibility graph that they define, having edges connecting pairs of agents that can see each other. 2 In this paper we shall prove that continuous time limited visibility sensing of di- rections only and continuous adjustment of agents' velocities according to what they see is enough to ensure the gathering of the agents in finite time to a point of encounter. The literature of robotic gathering is vast and the problem was addressed un- der various assumptions on the sensing and motion capabilities of the agents. Here we shall only mention papers that deal with gathering assuming contin- uous time motion and limited visibility sensing, since these are most relevant to our work reported herein. The paper [1] by Olfati-Saber, Fox, and Murray, nicely surveys the work on the topic of gathering (also called consensus) for networked multi agent systems, where the connections between agents are not necessarily determined by their relative position or distance. This approach to multi-agent systems was indeed the subject of much investigation and some of the results, involving "switching connection topologies" are useful in dealing with constellation-defined visibility-based interaction dynamics too. A lot of work was invested in the analysis of "potential functions" based multi-agent dynamics, where agents are sensing each other through a "distance-based" in- fluence field, a prime example here being the very influential work of Gazi and Passino [2] which analyses beautifully the stability of a clustering process. In- teractions involving hard limits on the "visibility distance" in sensing neighbors were analysed in not too many works. Ji and Eggerstedt in [3] analysed such problems using potential functions that are "visibility-distance based barrier functions" and proved connectedness-preservation properties at the expense of making some agents temporarily "identifiable" and "traceable" via a hystere- sis process. Ando, Oasa, Suzuki and Yamashita in [4] were the first to deal with hard constraints of limited visibility and analysed the "point convergence" or gathering issue in a discrete-time synchronized setting, assuming agents can see and measure both distances and bearing to neighbors withing the visibility range. Subsequently, in a series of papers, Gordon, Wagner, and Bruckstein, in [5], [6], [7], analysed gathering with limited visibility and bearing only sensing con- straints imposed on the agents. Their work proved gathering or clustering results in discrete-time settings, and also proposed dynamics for the continuous-time settings. In the sequel we shall mention the continuous time motion model they analysed and compare it to our dynamic rule of motion. In our work, as well as most of the papers mentioned above one assumed that the agents can directly control their velocity with no acceleration constraints. We note that the literature of multi-agent systems is replete with papers assum- ing more complex and realistic dynamics for the agents, like unicycle motions, second order systems and double integration models relating the location to the controls, and seek sensor based local control-laws that ensure gathering or the achievement of some desired configuration. However we feel that it is still worth- while exploring systems with agents directly controlling their velocity based on very primitive sensing, in order to test the limits on what can be achieved by agents with such simple, reactive behaviours. 3 2 The gathering problem We consider N agents located in the plane (R2) whose positions are given by {Pk = (xk, yk)T}k=1,2,...,N , in some absolute coordinate frame which is unknown to the agents.We define the vectors (cid:40) Pj−Pi (cid:107)Pj−Pi(cid:107) 0 uij = 0 < (cid:107)Pj − Pi(cid:107) ≤ V (cid:107)Pj − Pi(cid:107) = 0 or (cid:107)Pj − Pi(cid:107) > V hence uij are, if not zero, the unit vectors from Pi to all Pj's which are neighbors of Pi in the sense of being at a distance less than V from Pi, i.e. Pj's obeying : (cid:107)Pj − Pi(cid:107) (cid:44) [(Pj − Pi)T (Pj − Pi)]1/2 ≤ V i and u− Note that we have uij = −uji,∀(i, j). For each agent Pi, let us define the special vectors, u+ i (from among the vectors uij defined above). Consider the nonzero vectors from the set {uij}j=1,2,...,N . Anchor a moving unit vector ¯η(θ) at Pi poiting at some arbitrary neighbor, i.e. at uik (cid:54)= 0, ¯η(0) = uik and rotate it clockwise, sweeping a full circle about Pi. As ¯η(θ) goes from η(0) to η(2π) it will encounter all the possible uij's and these encounters define a sequence of angles α1, α2, . . . , αr that add to 2π = α1 + . . . + αr (αk = angle from k-th to (k+1)-th encounter with a uij, αr = angle from last encounter to first one again, see Figure 2). If none of the angles {α1, . . . , αr} is bigger than π, set i = u− u+ i = ui(n) the unit vectors encountered when entering and exiting the angle αb > π bigger than π. i = 0. Otherwise define u+ i = ui(m) and u− 4 Figure 2: Leftmost and rightmost visible agents of agent located at Pi. One might call u− i the pointer to the "leftmost visible agent" from Pi and u+ i the pointer to the "rightmost visible agent" among the neighbors of Pi. If Pi has nonzero right and leftmost visible agents it means that all its visible neighbors belong to a disk sector defined by an angle less than π, and Pi will be movable. Otherwise we call him "surrounded" by neighbors and, in this case, it will stay in place while it remains surrounded (see Appendix 2 for an alternative way of defining the leftmost and rightmost agents). The dynamics of the multi-agent system will be defined as follows. dPi dt = v0(u+ i + u− i ) for i = 1, . . . , N (1) Note that the speed of each agent is in the span of [0, 2v0]. With this we have defined a local, distributed, reactive law of motion based on the information gathered by each agent. Notice that the agents do not commu- nicate directly, are all identical, and have limited sensing capabilities, yet we shall show that, under the defined reactive law of motion, in response to what they can "see" (which is the bearings to their neighboring agents), the agents will all come together while decreasing the distance between all pairs of visible agents. Assume that we are given an initial configuration of N agents placed in the plane in such a way that their visibility graph is connected. This just means 5 that there is a path (or a chain) of mutually visible neighbors from each agent to any other agent. Our first result is that while agents move according to the above described rule of motion, the visibility graph will only be supplemented with new edges and old "visibility connections" will never be lost. 2.1 Connectivity is never lost We shall show that Theorem 2.1.1. A multi agent systems under the dynamics { Pi = v0(u+ i + u− i )}i=1,...,N ) ensures that pairs of neighboring agents at t = 0 (i.e. agents at a distance less than V ) will remain neighbors forever. Proof. To prove this result we shall consider the dynamics of distances between pairs of agents. We have that the distance ∆ij between Pi and Pj is hence or ∆ij = (cid:107)Pj − Pi(cid:107) = [(Pj − Pi)T (Pj − Pi)]1/2 d dt ∆(t) ij = 1 (cid:107)Pj − Pi(cid:107) (Pj − Pi)T ( Pj − Pi) d dt ∆(t) ij = ij( Pj − Pi) uT = −uT Pi + uT Pj ij Pi − uT = −uT Pj ij ji ij But we know that the dynamics (1) is Pi = v0(u+ Pj = v0(u+ i + u− i ) j + u− j ) Therefore d dt ∆ij = −v0uT ij(u+ i + u− ji(u+ j + u− j ) i ) − v0uT i +u− j (cid:44) 0 if agent is surrounded, or is in the direction of the center of the disk sector in which all neighbors However for every agent Pi we have either u+ i + u− u+ (including Pj) reside (see Figure 3). i 6 Figure 3: uT ij(u+ i + u− i ) ≥ 0 i ) =< uij, (u+ Therefore the inner product uT be positive (see Appendix 3 for a formal proof), hence ij(u+ i + u− i + u− i ) > will necessary ij = −(v0 ∗ positive + v0 ∗ positive) ≤ 0 ∆(t) d dt This shows that distances between neighbors can only decrease (or remain the same). Hence agents never lose neighbors under the assumed dynamics. 2.2 Finite-time gathering We have seen that the dynamics of the system (1) ensures that agents that are neighbors at t = 0 will forever remain neighbors. We shall next prove that, as time passes, agents acquire new neighbors and in fact will all converge to a common point of encounter. We prove the following. Theorem 2.2.1. A multi-agent system with dynamics given by (1) gathers all agents to a point in R2, in finite time. Proof. We shall rely on a Lyapunov function L(P1, . . . , PN ), a positive function defined on the geometry of agent constellations which becomes zero if and only if all agents' locations are identical. We shall show that, due to the dynamics 7 of the system, the function L(P1, . . . , PN ) decreases to zero at a rate bounded away from zero, ensuring finite time convergence. The function L will be defined as the perimeter of the convex hull of all agents' locations, CH{Pi(t)}i=1,...,N . Indeed, consider the set of agents that are, at a given time t, the vertices of the convex hull of the set {Pi(t)}i=1,...,N . Let us call these agents { Pk(t)} for k = 1, . . . , K ≤ N . For every agent Pk on the convex hull (i.e. for every agent that is a corner of the convex polygon defining the convex hull), we have that all other agents, are in a region (wedge) determined by the half lines from Pk in the directions Pk Pk−1 and Pk Pk+1, a wedge with an opening angle say θk (see Figure 4). Figure 4: Angle at a vertex of the convex hull k and u− Since clearly θk ≤ π for all k we must have that agent Pk has all its visible neighbors in a wedge of his visibility disk with an angle αk ≤ θk ≤ π hence k vectors will not be zero, causing the motion of Pk towards the his u+ interior of the convex hull. This will ensure the shrinking of the convex hull, while it exists, and the rate of this shrinking will be determined by the evolution of the constellation of agents' locations. Let us formally prove that indeed, the convex hull will shrink to a point in finite time. Consider the perimeter L(t) of CH{Pi(t)}i=1,...,N K(t)(cid:88) K(t)(cid:88) L(t) = ∆k,k+1 = [( Pk+1)(t) − Pk(t))T ( Pk+1(t) − Pk(t))]1/2 k=1 k=1 where the indices are considered modulo K(t). We have, assuming that K remains the same for a while, 8 K(cid:88) K(cid:88) k=1 K(cid:88) K(cid:88) k=1 K(cid:88) k=1 K(cid:88) k=1 d dt ∆k = − K(cid:88) k=1 d dt L(t) = (cid:0)v0 uT k,k+1(u+ k + u− k ) + v0 uT k,k+1(u+ k+1 + u− k+1)(cid:1) but note that uk,k+1 does not necessarily lie between u+ in fact, Pk and Pk+1 might not even be neighbors. k and u− k anymore, since, Now let us consider d dt L(t) and rewrite it as follows L(t) = −v0 d dt k,k+1(u+ uT k + u− k ) − v0 k+1,k(u+ uT k+1 + u− k+1) k=1 k=1 Rewriting the second term above, by moving the indices k by -1 we get L(t) = −v0 d dt k,k+1(u+ uT k + u− k ) − v0 This yields K(cid:88) k=1 L(t) = −v0 d dt < u+ k , uk,k+1 + uk,k−1 > −v0 k,k−1(u+ uT k + u− k ) < u− k , uk,k+1 + uk,k−1 > Note that we have here inner products between unit vectors, yielding the cosines of the angles between them. Therefore, defining θk = the angle between uk,k−1 and uk,k+1 (i.e. the interior angle of the convex hull at the vertex k, see Figure 5), and the angles : α+ k β+ k α− β− k k (cid:44) γ(u+ k , uk,k+1) (cid:44) γ(uk,k−1, u+ k ) (cid:44) γ(uk,k−1, u− k ) (cid:44) γ(u− k , uk,k+1) 9 Figure 5: Angles at a vertex of the convex hull. we have α+ k + β+ k = α− k + β− k = θk and all these angles are between 0 and π. Using these angles we can rewrite L(t) = − K(cid:88) d dt k ) − K(cid:88) v0(cos α+ k + cos β+ k=1 k=1 v0(cos α− k + cos β− k ) Now, using the inequality (proved in Apenedix 1) we obtain that cos α + cos β ≥ 1 + cos(α + β) 0 ≤ α, β, α + β ≤ π − d dt L(t) ≥ 2v0 K(cid:88) i=1 (1 + cos θi) (2) (3) For any convex polygon we have the following result (see the detailed proof in Appendix 1) : Lemma 1. For any convex polygon with K vertices and interior angles θ1, . . . , θK, with (θ1 + . . . + θK) = (K − 2)π we have that K(cid:88) k=1 cos(θi) ≥  1 + (K − 1) cos (cid:16) (K−2)π (cid:16) (K−2)π (cid:17) K cos K−1 K (cid:17) 2 ≤ K ≤ 6 K ≥ 7 (4) 10 Therefore, we obtain from (3) and (4) that L(t) ≥ µ(K) − d dt where µ(K) = 2v0 K + = 2v0K (cid:17)  1 + (K − 1) cos (cid:16) (K−2)π (cid:16) (K−2)π (cid:17) (cid:110) (cid:16) (cid:1) , K−1 cos(cid:0) 2π 1 − max K cos K−1 K (cid:16) π 2 ≤ K ≤ 6 (cid:111)(cid:17) K ≥ 7 (cid:17) − 1 K K K cos K−1 (5)   Note here that, since (1 − max{. . .}) > 0 we have that the rate of decrease in the perimeter of the configuration is srictly positive while the convex hull of the agent location is not a single point. The argument outlined so far assumed that the number of agents determining the convex hull of their constellation is a constant K. Suppose however that in the course of evolution some agents collide and/or some agents become "ex- posed" as vertices of the convex hull, and hence K may jump to some different integer value. At a collision between two agents we assume that they merge and thereafter continue to move as a single agent. Since irrespective of the value of K the perimeter decreases at a rate which is strictly positive and bounded away from zero we have effectively proved that in finite time the perimeter of the convex hull will necessarily reach 0. This concludes the proof of Theorem 2.2.1. Figure 6 shows the bound as a function of K assuming v0 = 1. Note that we always have K ≤ N , and µ(K) is a decreasing function of K, hence for any finite number of agents there will be a strictly positive constant µ(N ) so that L(t) ≥ µ(N ) − d dt ensuring that after a finite time of Tub given by µ(N )Tub = L(0) ⇒ Tub = L(0) µ(N ) we shall have that L(Tub) = 0. Hence we have an upper bound on the time of convergence for any configuration 11 of N agents given by L(0) µ(N ) . Note from (3) that the rate of decrease does not depend on the perimeter of the convex hull but only on the number of agents forming it. This was an expected result, since the dynamics does not rely on Euclidian distances. This bound is decreasing with K, so that the more agents form the convex hull, the smaller will be the rate of decrease. For K = 2 and K = 3 the bound is −8v0, for K = 4, it is −7v0, and then it keeps increasing for higher values of K, slowly converging towards 0 form below. Note the change of curve between K = 6 and K = 7, due to the "interresting" discontinuity in the geometric result exhibited in equation (1). Figure 6: Graph of the bound µ(K) of (3). The graph on the right is a zoom on small values of K. The inequalities of (2) and of (4) become equalities for particular configurations of the agents (for example a regular polygon in which each pair of adjacent neighbors are visible to each other, if K ≥ 7). In this case, the bound in (3) will yield the exact rate of convergence of the convex-hull perimeter as long as K remains the same. 3 Generalizations All the above analysis can be generalized for dynamics of the form dPi dt = f (P (i))(u+ i + u− i ) for i = 1, . . . , N (6) f (P (i)) ≥ 0 is some positive function of the configuration of the neighbours seen by agent i. This generalization also guarantees that the rule of motion is locally defined and reactive, and defined in the same way for all agents. The dynamics (1) correspond to a particular case of (6), with f (P (i)) = v0 = constant 12 for all agents. It is easy to slightly change the proofs above in order to show that Theorem 2.1.1 (ensuring that connectivity is not lost) is still valid as long as f (P (i)) ≥ 0 for all i, and that Theorem 2.2.1 (ensuring finite time gathering) is also valid as long as f (P (i)) ≥  > 0 for all i. Note that in the work of Gordon et al [5], a constant speed for the agents was considered, and this corresponds to setting f (P (i)) = i for a mobile − agent i, rather than v0. Given that in this case f (P (i)) ≥ 1 2 , the conditions for Theorem 2.1.1 and Theorem 2.2.1 are verified, and hence the dynamics with constant speed also ensures convergence to a single point without pairs of initially visible agents losing connectivity. We therefore also have a proof for the convergence of the algorithm that was proposed in the above-mentioned paper. u+ 1 i +u However, it was pointed out in the above-mentioned paper that in the model with constant speed agents of one has to deal with quite unpleasant chattering effects and "Zeno"-ness in order to effectively modulate the speed of motion of some of the agents. In fact, in certain configurations, an agent may "oscillate" infinitely often between a position in which it is "surrounded" to a position in which it is not. This implies alternating its speed infinitely often between zero and a constant value. In contrast, in our model, the speed is defined to vary smoothly in the range [0, 2v0]. Therefore our model presents some clear advantages and natural modulation for the speed of the agents. 4 Simulations Let us consider some simulations of the multi-agent dynamics discussed in this paper. We will start with a randomly generated swarm and then we shall have a look at some interesting particular configurations. 4.1 Some random generated swarm of 15 agents First, we randomly generate a swarm of 15 agents, with a connected visibility graph as initial configuration. We set v0 to 1 and visibility to 200. The config- uration of the swarm at different times during the evolution is given in Figure 7. 13 Figure 7: Configuration of the swarm at different times. The convex hull of the set of agents is also shown. We also plot some properties of the swarm during the time of its evolution. Figure 8 represents the perimeter of the convex hull of the set of agents. Figure 9 plots the count of indistinguishable agents (i.e. collided agents count as one) in the convex hull. Figure 10 represents the time derivative of the convex hull perimeter and the theoretical bound given by equation (5), as function of the number of indistinguishable agents in the convex hull. 14 Figure 8: Perimeter of the convex hull, decreasing until it reaches zero. Figure 9: Number of agents forming the convex hull of the set. Decreases when two or more agents of the hull "merge" and increases when one or more agents are "collected" by the hull and added to it. 15 Figure 10: Derivative of the convex hull perimeter (blue) and theoretical bound (green), function of number of agents forming the convex hull, given by (5). For a fixed number of agents forming the convex hull, one can see in Figure 10 that the derivative of the perimeter goes towards the theoretical bound. This can be intuitively explained by the facts that far away agents evolve towards the inside more rapidly, making the convex hull shape more regular, approaching to the shape that yields the theoretical bound. The discontinuity of the derivative of the perimeter of the convex hull that occurs when there is no change in the number of agents forming the hull, for example around t = 35 in Figure 10, is due to change in the connectivity graph (which has not been printed for clarity). In this particular case, two agents on the top left became visible to each other at this time and their directions and speed changed, slowing down slightly the rate of perimeter decrease. 4.2 Regular polygon of 10 agents The initial configuration is a regular polygon with 10 agents. Again, v0 is set to 1 and visibility is 200. As expected, the decreasing rate of the perimeter of the convex hull is constant, and all the agents contribute to the convex hull all along, until the very end where they collide and merge. Simulations and the converging parameters' plots are seen in Figures 11 and 12. 16 Figure 11: Starting as regular polygon, the swarm keeps its regular shape until the final collision. The leftmost and rightmost agents of each agent are its two neighbors in the polygon. Figure 12: From left to right : the perimeter of the convex hull decreasing at a constant rate, the number of agents forming the convex hull being constant, and the derivative of the perimeter of the convex hull being constant and equaling its theoretical bound all along the evolution. 4.3 Close-to-minimum-configuration with n = 4 We start at a configuration close to the configuration that reaches the minimum of the sum of the cosinuses of the interior angles of the polygon. Results are represented in Figures 13, 14, 15. One can see that this configuration provides a smaller decreasing rate than the configuration of a regular polygon, in confor- mity with our analysis, where the bound is not realized for a regular polygon configuration for small values of n. 17 Figure 13: The cone configuration approaches the theoretical bound configu- ration. In this case, the gathering can be divided in two stages. First, the 3 agents of one side merge, then the resulting composite agent merges with the single agent of the other side. Figure 14: From top to bottom : The perimeter of the convex hull, the number of agents forming it, and the derivative of it. 18 Figure 15: A zoom on the the derivative of the perimeter of the convex hull (in blue) at the beginning of the dynamics. A regular polygon (a square in this case) would give a constant rate of -8, lower than the current rate approaching the theoretical bound of -7 (in green). 5 Concluding remarks We have shown that a very simple local control on the velocity of agents in the plane, based on limited visibility and bearing only sensing of neighbors ensures their finite time gathering. The motion rule is simply to set the agents' velocity to equal the vector sum of unit vector pointers to two external neighbors if all visible neighbors reside inside a halfplane (a half-disk) about the agent, otherwise set the velocity to zero. This very simple rule of behavior is slightly different from the one assumed by Gordon, Wagner, and Bruckstein in [5], where the motion was set to have a constant velocity in the direction bisecting the disk sector where visible neighbors reside, or zero if the agent was "surrounded". As we showed in this paper, that model also ensures gathering. However, it was pointed out there that their proposed model had to deal with some quite unpleasant chattering or zeno-ness effects in order to effectively modulate the speed of motion of agents. In this paper, in conjunction with our model, and some generalizations too, including the model of [5], we provided a very simple geometric proof that finite time gathering is achieved, and provided precise bounds on the rate of decrease of the perimeter of the agent configuration's convex hull. These bounds are based on a geometric lower bound on the sum of cosines of the interior angles of an arbitrary convex planar polygon, that is interesting on its own right (a curious breakpoint occurring in the bound at 7 vertices). Our result may be regarded as a convergence proof for a highly nonlinear autonomous dynamic system, naturally handling dynamic changes in its dimension (the events when two agents meet and merge). 19 References [1] Olfati Saber R., Fox J.A., and Murray R.M. Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE, 95-1:215–233, 2007. [2] Gazi V. and Passimo K.M. Stability analysis of swarms. IEEE Transactions on Automatic Control, 51-6:692–697, 2006. [3] Ji M. and Eggerstedt M. Distributed coordination control of multiagent systems while preserving connectedness. IEEE Transactions on Robotics, 23-4:693–703, 2007. [4] Ando H.and Oasa Y., Suzuki I., and Yamashita. Distributed memoryless point convergence algorithm for mobile robots with limited visibility. IEEE Transactions on Robotics and Automation, 15-5:818–828, 1999. [5] Gordon N., Wagner I.A., and Bruckstein A.M. Gathering multiple robotic a(ge)nts with limited sensing capabilities. Lecture Notes in Computer Sci- ence, 3172:142–153, 2004. [6] Gordon N., Wagner I.A., and Bruckstein A.M. A randomized gathering algorithm for multipe robots with limited sensing capabilities. MARS 2005 Workshop Proceedings (ICINCO 2005), Barcelona, Spain, 2005. [7] Gordon N., Elor Y., and Bruckstein A.M. Gathering multiple robotic agents with crude distance sensing capabilities. Lecture Notes in Computer Science, 5217:72–83, 2008. 20 Appendix 1 : Proof of Lemma 1 We will first prove the following facts : Fact a. Let 0 ≤ a ≤ b ≤ π and 0 ≤ a + b ≤ π. Then we have (cid:112)2(1 + cos(a + b)) = 2 cos (cid:18) a + b (cid:19) 2 ≥ cos(a)+cos(b) ≥ 2 cos2 (cid:18) a + b (cid:19) 2 = 1+cos(a+b) 2 ≥ b−a 2 : Proof. The function cosine is decreasing in [0, π], and given that a+b (cid:18) b − a (cid:19) 2 ≥ cos (cid:18) a + b (cid:19) 1 ≥ cos Multiplying by 2 cos(cid:0) a+b (cid:1) ≥ 0 : 2 cos(cid:0) a+b 2 cos(cid:0) a+b 2 2 (cid:1) ≥ 2 cos(cid:0) a+b (cid:1) cos(cid:0) b−a (cid:1) ≥ cos(a) + cos(b) 2 2 2 2 (cid:1) ≥ 2 cos2(cid:0) a+b (cid:1) ≥ 1 + cos(a + b) 2 A direct consequence is the following lemma. Fact b. Let 0 ≤ a, b ≤ π. Then cos(a) + cos(b) ≥ (cid:26) 1 + cos(a + b) 2 cos(cid:0) a+b (cid:1) 2 : a + b ≤ π : a + b ≥ π Proof. The first line is already part of Lemma a. The second line can be proven by using the left inequality of Lemma a with π − a and π − b, noticing that 0 ≤ π − a ≤ π, 0 ≤ π − b ≤ π, and π − a + π − b ≤ π for a + b ≥ π. Now we can prove Lemma 1. Suppose any given initial configuration of the poly- gon with interior angles 0 ≤ x1, . . . , xn ≤ π. We then have x1+. . .+xn = (n−2)π. Now repeat the following step : Go through all the pairs of non-zero values (xi, xj). As long as there is still a pair verifying xi + xj ≤ π, transform it from (xi, xj) to (0, xi + xj). When there are no such pairs, then among all the non- zero values, take the the minimum value and the maximum value, say xi and xj (they must verify xi + xj ≥ π due to the previously applied process) , and transform the pair from (xi, xj) to (cid:16) xi+xj , xi+xj (cid:17) . 2 2 Repeat the above process until convergence. We prove that the process con- verges and that we can get as close as wanted to a configuration where all non-zero values are equal. Note that after each step, the sum of the values is 21 unchanged, (n − 2)π, and that the values of all xi's remain between 0 and π. The number of values that the above process set to zero must be less or equal to 2 in order to have the sum of the n positive values equal to (n − 2)π. Therefore we can be sure that after a finite number of iterations, there will be no pairs of nonzero values whose sum will be less than π (otherwise this would allow us to add a zero value without changing the sum). (cid:16) xi+xj (cid:17) Once in this situation, all we do is replacing pairs of "farthest" non-zero values . Let us show that all the nonzero values (xi, xj) with the pair will converge to the same value, specifically to their mean. , xi+xj 2 2 Let k be the number of remaining non-zero values after the iteration t0 which sets the "last value" to zero. Denote these values at the i-th iteration by (x(i) 1 , . . . , x(i) k ). Define : m = x(i) 1 + . . . + x(i) k k (n − 2)π k = Ei = (x(i) 1 − m)2 + . . . + (x(i) k − m)2 (cid:18) Suppose, without loss of generality, that at the i-th iteration the extreme values were x1 and x2 and so we transformed (x(i) So we have : 1 , x(i) 2 ) into , x(i+1) x(i+1) 1 = x(i) 1 +x(i) 2 2 2 = x(i) 1 +x(i) 2 2 (cid:19) . Ei+1 − Ei = 2( x(i) 1 +x(i) 2 2 = − m)2 − (x(i) 2 (x(i) 1 − m)2 − (x(i) 1 − x(i) 2 )2 − 1 2 − m)2) But x(i) 1 and x(i) 2 being the extreme values, we have for any 1 ≤ l ≤ k : 1 − x(i) (x(i) 2 )2 ≥ (x(i) l − m)2 and by summing over l we get that : k(x(i) 1 − x(i) 2 )2 ≥ Ei Hence 22 (cid:16) (n−2)π (cid:16) (n−2)π n−2 n−1 (cid:17) (cid:17) = −(n − 4) (case with 2 zeros) (case with 1 zero) (case with no zero) • 2 + (n − 2) cos • 1 + (n − 1) cos • n cos (cid:17) (cid:16) (n−2)π is increasing in (cid:2)0, π n (cid:3) and decreasing in (cid:2) π Now let us compare these values. In order to do so define the function e(x) = cos(x)+x sin(x) for 0 ≤ x ≤ π. Basic calculations give us e e(x) ≥ e(0) = 1 In order to compare the case with 2 zeros to the case with 1 zero, define for n ≥ 2 2 , π(cid:3). Therefore for 0 ≤ x ≤ π (x) = x cos(x) and therefore e 2 , 2 (cid:48) Ei+1 − Ei = − 1 0 ≤ Ei+1 Ei ≤ ≤ 2 (x(i) 2 )2 ≤ − Ei 1 − x(i) (cid:0)1 − 1 (cid:0)1 − 1 (cid:1) Ei (cid:1)i−t0 Et0 2k 2k 2k proving that Ei converges to zero, i.e. all the non-zero values converge to m. At each step of the above described process, according to fact b, the sum of cosines can only decrease. Therefore from any given configuration we can get as close as possible to a configuration in which all non-zero values are equal, without increasing the sum of the cosines. Hence, the minimum value must be reached in a configuration in which all non-zero values are equal. Remebering that there can be at most only two zero values, the minimum value of the sum of the cosines is the minimum of the following : (cid:16) (n−2)π (cid:17) (cid:16) π (cid:17) − π n−1 n−1 sin n−1 + (n − 4) (cid:17) (cid:16) π n−1 (cid:17) f (n) = 1 + (n − 1) cos = n − 3 − (n − 1) cos (cid:48) f (n) = 1 − cos = 1 − e n−1 (cid:16) π (cid:16) π (cid:17) n−1 ≤ π n−1 π 2 Therefore f (cid:48) (n) ≤ 0 for n ≥ 4 because f (2) = 0 ≤ 0 f (3) = 0 ≤ 0 2 ≤ 0 f (4) = − 1 f (n) ≤ f (4) ≤ 0 for n ≥ 4 23 Therefore f (n) ≤ 0 and the case with 2 zeros is never exclusively the optimal so- lution (since the case with 1 zero always has a smaller or an equal value). In order to compare the two remaining values, define for n ≥ 2 (cid:18) 2π (cid:19) n (cid:18) π (cid:19) n − 1 + 1 h(n) = n cos − (n − 1) cos The derivative according to n is (cid:48) h n sin(cid:0) 2π (cid:1) + 2π (n) = cos(cid:0) 2π (cid:17) (cid:16) π = e(cid:0) 2π (cid:1) − e n−1 n ≤ π n−1 ≤ 2π n n n (cid:1) − cos (cid:16) π n−1 (cid:17) − π n−1 sin (cid:17) (cid:16) π n−1 π For n ≥ 4, we have (n) ≥ 0. One can check that h(n) ≤ 0 for 2 ≤ n ≤ 6, and h(7) > 0, therefore h(n) > 0 for n ≥ 7. This allows us to conclude that for 2 ≤ n ≤ 6 the minimal configuration is the one corresponding to 1 zero, whereas for n ≥ 7, it is the one with no zeros. (cid:48) 2 and therefore h 24 Appendix 2 Let us understand the geometric Lemma 1 by some illustrations. Consider a convex polygon of n vertices. The sum of its interior angles is equal to (n− 2)π and each angle is between 0 and π. Denote by Cn the bound given by Lemma 1. First let us notice that sometimes the minimum value of Cn corresponds to a set of interior angles that cannot be realized by a polygon in the plane (for example we can show that in a convex polygon, if one of the interior angles is 0, then there are exactly two interior angles of 0 and (n − 2) interior angles of π, but for example the configuration that realizes the minimum of C4 with n = 4 does not correspond to such a realizable configuration, see figure 19 for an illustration). However, we can get arbitrarily close to this value of Cn with changing the angles with value of 0 by some  and substracting in other angles (that are not 0) the added values (see figures 17 and 20 for examples). Let us explain the intuition behind Lemma 1. If ones tries to minimize the cosi- nus of an angle, he would open it at maximum. But the constraint of forming a convex polygon forces one to close the loop of the polygon. This is what limits how much one can open the angles. It is intuitive that the more agents we have, the more freedom we have to open the angles and use the numerous agents at our disposal to close the loop. The abstract case when there is an infinity of agents corresponds to a circle where all angles can be open at maximum, i.e. with an angle of π. What this Lemma also infers is that the configuration of the polygon that reaches the minimum value is a regular polygon for n ≥ 7, and that for n ≤ 6, the min- imum value of the sum of the cosinuses of the interior angles can be arbitrarily closely approached by a polygon in a shape of a cone. Figures 16, 17, and 18 illustrate this for the case n = 3, while figures 19, 20, and 21 illustrate it for the case n = 4. The cases n = 5 and n = 6 are similar, and for n = 7 and above, the configuration of the minimum is a regular polygon leading the value of Cn = n cos (see examples in figures 22,23,24 ). n (cid:16) (n−2)π (cid:17) 25 Figure 16: Theoretical configuration corresponding the the minimum value of C3 = 1 Figure 17: Practical configuration for n = 3 provinding a value that can get potentially arbitrarily close to the theoretical minimum, with the help of . angles is 3 cos(cid:0) π (cid:1) = 3 Figure 18: Regular polygon with n = 3, the sum of cosinuses of the interior 2 . This value is greater than the minimum possible value. 3 26 Figure 19: Theoretical configuration corresponding the the minimum value of C4 = − 1 2 Figure 20: Practical configuration for n = 4 provinding a value that can get potentially arbitrarily close to the theoretical minimum, with the help of . Figure 21: Regular polygon with n = 4, the sum of cosinuses of the interior (cid:1) = 0. This value is greater than the minimum possible value. angles is 4 cos(cid:0) 2π 4 27 Figure 22: n = 7 is the first value of n for which the configuration of minimum value of the sum of the cosinuses of the interior angles corresponds to a regular polygon. In this case, this value is 7 cos(cid:0) 5π (cid:1) ≈ −4.36. 7 Figure 23: Regular polygon and configuration of minimum value for n = 10, with (cid:1) ≈ −8.09, each angle contributing a value of cos(cid:0) 8π (cid:1) ≈ −0.81. value 10 cos(cid:0) 8π 10 10 Figure 24: Regular polygon and configuration of minimum value for n = 30, with value 30 cos(cid:0) 28π cos(cid:0) 28π (cid:1) ≈ −29.34, each angle contributing a value of (cid:1) ≈ −0.98. This last value gets closer to −1 with higher values of 30 30 n as explained. 28 Appendix 3 The dynamics of the sytem described by (1) can be defined in the following alternative way. We define the two following functions :  1 1 2 0 : x > 0 : x = 0 : x < 0 h+(x) = and h−(x) = h+(−x). Let ez be a unitary vector orthogonal to the plane (in any direction). Then we define : ij = 0 if(cid:80) j p± where w± ij = 0. Finally, we define wij = w+ : ij + w− ij and the equations of movement are given by And the vectors u+ i and u− i of system (1) are given by: sijk = (uij × uik) · ez p± ij = h±(sijk) (cid:89) ij(cid:80) p± j p± ij k w± ij = xi = v0 wijuij u± i = w± ijuij (cid:88) j (cid:88) j 29 Using the fact that u− half-plane of u+ i i and uij are, by the way they are defined, on the same Appendix 4 i × uij) · (u+ (u+ i × u− i ) ≥ 0 where × is the cross product of vectors. In the same way, uij and u+ same half-plane of u− : i i are on the i × uij) · (u− (u− i × u+ i ) ≥ 0 But, using the fact that these vectors are unit vectors, i × uij) · (u+ (u+ i × uij) · (u− (u− i × u− i × u+ i ) = uij · u− i ) = uij · u+ i − (u+ i − (u− i i · u− · u+ i )(uij · u+ i ) i )(uij · u− i ) Therefore i × uij)· (u+ (u+ i × u− i ) + (u− i × uij)· (u− i × u+ i ) = (1− u+ i · u− i ·u− Now u+ In any other case, 1 − u+ positive, we must have i = 1 implies that u+ · u− i i ) (7) i )uij · (u+ i +u− i + u− i )·uij = 2 > 0. i = uij, and in this case (u+ i = u− i > 0, and given that the left hand side of (7) is i + u− i ) · uij ≥ 0 (u+ 30
1311.5108
1
1311
2013-11-20T15:44:26
A Methodology to Engineer and Validate Dynamic Multi-level Multi-agent Based Simulations
[ "cs.MA" ]
This article proposes a methodology to model and simulate complex systems, based on IRM4MLS, a generic agent-based meta-model able to deal with multi-level systems. This methodology permits the engineering of dynamic multi-level agent-based models, to represent complex systems over several scales and domains of interest. Its goal is to simulate a phenomenon using dynamically the lightest representation to save computer resources without loss of information. This methodology is based on two mechanisms: (1) the activation or deactivation of agents representing different domain parts of the same phenomenon and (2) the aggregation or disaggregation of agents representing the same phenomenon at different scales.
cs.MA
cs
A Methodology to Engineer and Validate Dynamic Multi-level Multi-agent Based Simulations Jean-Baptiste Soyez1,2 Gildas Morvan1,3 Daniel Dupont1,4 Rochdi Merzouki1,2 1Univ. Lille Nord de France 2 Polytech Lille, LAGIS F-59655 Villeneuve d'Ascq, France [email protected] [email protected] 3 UArtois, LGI2A, F-62400, Béthune, France [email protected] 4 HEI, UC Lille, F-59046 Lille, France [email protected] Abstract This article proposes a methodology to model and simulate complex systems, based on IRM4MLS, a generic agent-based meta-model able to deal with multi-level systems. This methodology permits the engineering of dynamic multi-level agent-based models, to represent complex systems over several scales and domains of interest. Its goal is to simulate a phenomenon using dynamically the lightest representation to save computer resources without loss of information. This methodology is based on two mechanisms: (1) the activation or deactivation of agents representing different domain parts of the same phenomenon and (2) the aggregation or disaggregation of agents representing the same phenomenon at different scales. Introduction 1 Today, more and more engineering projects try to cope with complex systems. Complexity can come from the number of represented entities, their structure, or the fact that informa- tion is coming from difference sources and is incomplete. Agent-based modeling is a very powerful and intuitive framework to study such systems. However, the limitations of this approach lead to the development of multi-level agent-based modeling (ML-ABM). It is defined by Morvan (2012, p. 1) as: "Integrating heterogenous ABMs, representing complementary points of view, so called levels (of organization, observation, analysis, granularity, ... ), of the same system. Integration means, of course, these ABMs interact but also they can share entities such as environments and agents". From an engineering point of view, ML-ABM reduces the complexity of the problem, so it becomes easier to implement. In complex systems simulations, it is generally necessary to find a compromise between 1 the quality of simulations (amount of information or realism) and their resource consumption (used CPU and memory). A way to deal with this compromise is to use different models, more or less detailed or treating different aspects of the same phenomenon and that are (dis)activated at run-time, according to the context. This article proposes a methodology to engineer and validate such simulations, based on IRM4MLS, a ML-ABM meta-model proposed by Morvan and Jolly (2012); Morvan et al. (2011). The next section presents recent works in the domain of multi-resolution or multi-level modeling. Section 3 introduces a generic agent-based meta-model IRM4MLS. Then, section 4 shows some possibilities offered by IR4MLS to model complex systems in which different domains interact. Section 5 explains how to construct models with dynamic change of level of detail (LOD), i.e., switching scales or domains of interest. Section 6 gives a tool to measure the quality of multi-level models endowed with dynamic changes of resolution. Finally, we expose the conclusions and perspectives of our work in section 7. 2 Related Works In this section, multi-modeling approaches, dealing with models at different scales in an engi- neering context, are presented. Multi-Resolution modeling (Davis and Hillestad, 1993) is the joint execution of different models of the same phenomenon within the same simulation or across several heterogeneous systems. It can inspire our approach if different models can be considered as different lev- els. Consistency represents the amount of essential information lost when crossing different models and it is an adapted tool to test the quality of this approach. The High Level Architecture (Simulation Interoperability Standards Comittee (SISC), 2000) (HLA) is a general purpose architecture for distributed computer simulation systems. Using HLA, computer simulations can interact (communicate data and synchronize actions) with other computer simulations regardless of the computing platforms. The interaction be- tween simulations is managed by a Run-Time Infrastructure (RTI). Scerri et al. (2010) devel- oped HLA-Repast, a unified agent-based simulation framework, in which concurrent modules with their own temporality can use global variables through centralized services. Holonic multi-agent systems (HMAS) can be viewed as a specific case of multi-level multi-agent systems (MAS). The most obvious aspect being the hierarchical organization of levels. However, from a methodological perspective, differences remain. Most of holonic meta-models focus on organizational and methodological aspects while ML-ABM is process- oriented. HMAS meta-models have been proposed in various domains, e.g., ASPECTS (Gaud et al., 2008) or PROSA(Van Brussel et al., 1998). Even if ML-ABM and HMAS structures are close, the latter is too constrained for the target application of this work. Navarro et al. (2011) present a framework to dynamically change the level of detail in agent-based simulation. That is to say, represent only what is needed during simulation, to save CPU resources and keep the consistency of the simulation. But this framework is lim- ited because levels form a merged hierarchy, without the possibility of having two levels at the same scale and communication between levels is not explicitly defined. The possibility for agents to exist in several levels simultaneously is a way to make simu- lations benefit of a higher power of representation. It permits to 1) simulate nested entities, 2) create agents with concurrent psychological trends and 3) model complex systems implying various domains. It is possible to model the coexistence of nested entities at different scales. Agents present in different levels can be seen as "gate" between these levels. For example, Picault and Mathieu (2011), give the example of cell membrane elements that are the "gates" between the inside and the outside of the cell, i.e., between two scales and exposed to the influences of two different environments. 2 0..n 0..n environment agent 0..n 1 1..n 0..n level Figure 1: Central Concepts of IRM4MLS (cardinalities are specifed the UML way) An agent existing at different levels simultaneously can fulfill a global objective while following its own goals. In Stratulat et al. (2009), authors decompose, with the MASQ model, agents into two bodies: a physical one (individual) and a social one (collective) to do this. Levels can have different temporal dynamics, independently of other levels. It allows to optimize the execution of complex agents by (dis)activating their bodies at run-time to use the lightest representation (Soyez et al., 2011). Readers interested in a more comprehensive presentation of ML-ABM should refer to Gil- Quijano et al. (2012); Morvan (2012). IRM4MLS 3 IRM4MLS is a ML-ABM meta-model proposed by Morvan and Jolly (2012); Morvan et al. (2011). It relies on the influence/reaction model (Ferber and Müller, 1996) and its extension to temporal systems, IRM4S (Michel, 2007). An interesting aspect of IRM4MLS is that any valid instance can be simulated by a generic algorithm. The main aspects of this meta-model are presented in this section. A IRM4MLS model is characterized by a set of levels, L, and relations between levels. Two types of relations are considered: influence (agents in a level l are able to produce influences in a level l(cid:48) (cid:54)= l) and perception (agents in a level l are able to perceive the state of a level l(cid:48) (cid:54)= l). These relations are respectively formalized by two digraphs, 〈L, EI 〉 where EI and EP are sets of edges, i.e., ordered pairs of elements of L. The dynamic set of agents at time t is denoted A(t). ∀l ∈ L, the set of agents in l at t is Al (t) ⊆ A(t). An agent acts in a level if a subset of its external state belongs the state of this level. An agent can act in multiple levels at the same time. Environment is also a top-class abstraction. It can be viewed as a tropistic agent with no internal state that produces "natural" influences in the level (Fig. 2). 〉 and 〈L, EP The scheduling of each level is independent: models with different temporalities can be simulated without temporal bias. On an other hand, only the relevant processes are permitted to execute during a time-step. A major application of IRM4MLS is to allow microscopic agents (members) to aggregate and form-up lower granularity agents (organizations). It can be useful to create multiple levels at the same scale to represent different domain parts of the same phenomenon. In the following, we consider that two levels are at the same scale if they have the same spatial and temporal extents. 4 Multi-level, Single Scale Simulation In this section we give a framework to improve the integration of agents located in different levels (not necessary at different scales) simultaneously. Then, we show how to take advantage of this concept to simulate complex systems while optimizing the use of computer resources. "One Mind, Several Bodies" 4.1 In our approach, inspired by Picault and Mathieu (2011), agents can be present in several lev- els at the same time. We propose to decompose agents in a "central" unsituated part and a set of n "peripheral" parts, each situated in a given level. Thus, we call spiritAgent the unsituated 3 conceptualAgent environment 1 spiritAgent 1 1 1 1..n 1..n 0..n bodyAgent 1 1 0..n 0..n 1 level Figure 2: Class diagram of central Concepts of IRM4MLS with separation of situated-or-not agent parts part of the agent which contains its internal state, its decision processes and that cannot act in a level. BodyAgents in levels l ∈ L are the situated part of the agent which contains its external state and the possible actions in its level, like perception of the environment. ConceptualAgents stand for common agents in classical simulation. SpiritAgents only contain the internal state of the agent and its decision module. BodyAgents have to be situated in one and only one level. They contain the external state of the agent specific to a level, and an action module that indicates: 1) what are the available actions at a given time and 2) what are their results in term of produced influences. The perception process must be in this action module. Levels contain inactive objects that support agent actions. The only use of Environments is to produce the natural influences of the level (like the gravity force in a physical level). To obtain valid simulations with such models, a spiritAgent has to be able to access the external state of its conceptualAgent contained in its bodyAgent when it is active (during the execution of its level). Thus, we can consider the several steps of the life cycle of agents. Each time a bodyAgent is active, 1) it perceives its level (and others perceptible from this one), 2) it sends a part of these perceptions and the possible actions to the spiritAgent, 3) the spiritAgent modifies its internal state and 4) indicates the most appropriate action to be accomplished by the bodyAgent, 5) the bodyAgent accomplishes this action which produces influences in di- rection of its levels and others possibly influenced by this one. 4.2 Level Temporality In this section we explain the possibility to attribute a different temporality to each level and how to adapt it to our models. IRM4MLS uses the framework of timed event systems (Zeigler et al., 2000). The scheduling is distributed between levels with no constraint on the scheduling mode (step wise or discrete events). This approach seems more adapted to our problems than the agent one (Weyns and Holvoet, 2003) or the system one (Michel et al., 2003). Our goal to give to agents the longest possible life cycle which stay coherent with the rest of the simulation. This is done to minimize the computer resources allocated to the agents updating process. Morvan et al. (2011) propose an algorithm adapted to IRM4MLS which manage the coupling between levels with different temporal dynamics. This is made to apply easily the proposed methods above. The Figure 3 illustrates different constraints which fix the life cycle of agents in a same level. The frequency of a level is expressed in Hertz, indicating how many times a second, it is necessary to execute the updating process of the dynamic state of a level. Let imagine that all functions of an agent possess a minimal frequency beyond which their simulation is not realistic anymore. If a level permits to its agents to dispose of functions with different frequencies, it adopts the higher one, to keep a correct simulation of the functions with this frequency. Therefore, in the example of Fig. 3, the frequency of the level N1 is equal to 60H z 4 Figure 3: Example of Multi-Level ML-ABM with different temporalities because the diagnostic function of the modeled vehicles needs this minimal frequency. The other constraint comes from the interactions between levels. If we continue with the previous example, let say that N2 level needs a minimal frequency equal to 20H z, this frequency could be allocated to N2. However if the N1 level is influenced by N2 and has to calculate the reaction induced by these influences at a frequency higher than 20H z (logically less or equal to 60 Hz), it can be necessary to allocate a higher frequency to N2. Thus, it is necessary to dynamically modify the frequency of a level N and adapt it to the chang- ing needs of the simulation and return it back to its minimal frequency, defined during the implementation phase. 5 Dynamic Change of Level of Detail (LOD) In this section we give a methodology to apply dynamic changes of LOD in a simulation. First we present the hierarchical level graph, which indicates the links between levels and the dis/aggregation functions attached to change the LOD of simulated entities. Finally, we specify when and in which conditions dis/aggregation functions can be applied. In the next part, we give a method to test the quality of the dis/aggregation mechanisms exposed here by measuring the whole consistency of simulations. 5.1 Hierachical Level Graph 〉 where EH are sets Relations between levels are respectively formalized by a digraph, 〈L, EH of edges, i.e., ordered pairs of elements of L. This digraph whose vertices are levels, is called the hierarchical level graph. This graph indicates how levels are nested and which couple of levels treats different domain of interest of the same phenomenon. ) edge A simple edge represents an inclusion link between two levels. For example, an (l1, l2 signifies that l2 has higher spatial or temporal extents than l1. Then the bodyAgents situated in l1 can be aggregated and the resulting aggregate can be instantiated in l2. We note that ≺ l2. l1 A pair of symmetric edges means there is a complementarity link between two levels. For ) edges mean that l1 and l3 are at the same scale. Thus a spiritA- example, the (l1, l3 gent can control several bodyAgents simultaneously present and activated in l1 and l3. We ≡ l3 note that l1 A loop on a vertex indicates levels whose bodyAgents can adopt a similar behaviour. For example, a (l1, l1 ) edge means that the spiritAgent, of some bodyAgents situated in l1, can be aggregated to form a single spiritAgent which will control these unchanged bodyAgents in l1. These bodyAgents will have the same behaviour when confronted to similar situations, but will keep their autonomy. ) and (l3, l1 The following rules have to be applied if we want to obtain a coherent model. Rule 1 Inclusion and Complementarity links are transitive. ∧ l2 ≺ l2 l1 Rule 2 A level cannot be included in itself by a direct or transitive way. This rule is translated by the fact that if we delete all pairs of symmetric edges, there should not be directed cycles in the ≺ l3, l1 ≡ l3. → l1 ≡ l2 ∧ l2 ≺ l3 → l1 ≡ l3 5 FAg1 l1 FAg2, FAg3 l2 l3 Figure 4: An example of Hierarchical Level Graph ≺ l1 ≡ l2 (cid:54)≺ l2. → l1 (cid:54)≡ l2, l1 ∈ L∧ l1 hierarchical level graph. (cid:64)l1 Rule 3 Two distinct levels cannot share simultaneously an inclusion and a complementarity link, directly or by a transitive way. ≺ l2 → l1 l1 Each edge which is not part of a symmetric pair of edges is labelled with one or more aggregation function names. An aggregation function name can be placed on several edges. The (l1, l1 ) edge, labelled FAg1, indicates that the spiritAgents controlling some bodyA- gents present in l1 can aggregate themselves to form a single spiritAgent controlling all these bodyAgents, through the FAg1 function. The (l1, l2 ) edge, labelled FAg2, FAg3, means that the spiritAgents controlling some bodyAgents present in l1 can aggregate themselves to form a single spriritAgent controlling a single aggregated bodyAgent situated in l2, through the FAg2 or FAg3 function. These two functions concerns different combination of bodies. And the symmetric pair of edges between l1 and l3, with no label, represents the fact that some spiritAgents can control simultaneously bodyAgents situated in these two levels. 5.2 Dis/Aggregation Functions 5.2.1 Content As shown before, there are two types of aggregation. The first one deals with the aggregation of spiritAgents and the second one with the aggregation of spiritAgents and their associated bodyAgents. The first type of aggregation is used to represent a set of agents with the same internal state, that leads to agents which act similarly in the same situation but which can be place in several situations. The aggregation of several bodyAgents without the aggregation of their spiritAgent is impossible because a body cannot be controlled simultaneously by several concurrent spirits. Once the hierarchical level graph is fixed, the modeler has to indicate every class of bodyA- gent that he decides to place in levels and which class of spiritAgent control these bodyAgents. For each aggregation function the modeler has to precise how many agents have to be merged, the class of aggregated and aggregate agents and how to generate internal and/or external state of the aggregate agent. In this article we don't give any indication to set the decision module or the action mod- ule of aggregate agents or not but we focus on how to aggreagte internal and external states of agents, respectively contained in spiritAgents and bodyAgents. Each aggregation function can be divided into several subfunctions. These subfunctions can be of two types. First type: a subfunction takes the same variable in each agents concerned (spiritAgents or bodyAgents) and aggregates them to obtain a single value to place it in the aggregated agent state. For ex- ample, a agent representing a platoon of vehicles has the mean position of all vehicle agents. Second type: a subfunction similar to the first does an aggregation on several variables con- tained in the agents to aggregated but produces only one value. This can be illustrated by the platoon agent described above. It only possesses one variable in its internal state called "pri- ority" whose value is generated with the compound of the "stamina" and "speed" variables of each vehicle agents in the platoon. Some variables of the agents to be aggregated can be 6 ignored to construct an aggregate. 5.2.2 Notation An aggregation function consists in creating a composite agent from several agents. Here is the general form of an aggregation function FAg using for argument n conceptualAgent class, c t a (class to aggregate), endowed of an interval, [mini, maxi ], indicating how many instances of these classes are necessary to accomplish this aggregation. For each conceptualA- gent class it is precised if the aggregation implies bodyAgents in addition of spiritAgent with the indication of a level li where the bodyAgents are situated. The class of the agent produced by the aggregation, AAC (Aggregate Agent Class), is the output of FAg with its level l if the = ∅. aggregation concerns bodyAgents. If the aggregation only concerns spiritAgents l = li ((cid:89) 〈[mini; maxi FAg i∈n ]c t ai, li 〉) = (AAC , l) (1) For example, let consider the FAg2 function described in the hierarchical graph below. Let FAg2 aggregates one bodyAgent of class Leader and at least 4 to 9 bodyAgents of class Follower all situated in l1 level and their linked spiritAgents to create a bodyAgent of class Platoon situated in l2 level and its linked spiritAgent. Then: (〈[1;1], Lead e r, l1 〉,〈[4;9], F ol l owe r, l1 FAg2 (2) Aggregation subfunctions have quite the same notation than aggregation functions. It is not necessary to precise the number of concerned agents anymore. But variables, in con- cerned agents, which will be mixed together have to be known. For example the subfunction described in the previous subsection can be noted like this: 〉) = (P lat oon, l2 ) (Lead e r.s t amina, Lead e r.s peed, l1 ) fAg2,1 (F ol l owe r.s t amina, F ol l owe r.s peed, l1 = (C r owd.p r ior i t y, l2 ), ) (3) 5.2.3 Disaggregation and Memorization Functions Each aggregation function possesses its disaggregation function and eventually a memoriza- tion function. A disaggregation function permits to create several instances of the aggregated agents from the aggregate agent. A memorization function can be used to store some infor- mation. Each memorization function is associated to a disaggregation one to generate several agents representing the initial aggregated agents taking into account the last state of the aggre- gated agents and the system evolution since the aggregation. Here, nbi indicates the number of agents of each class involved in the aggregation. FDi sa g (AAC , l, FM e mor i zat ion 〈nbi, c t ai, li i∈n 〈nbi, c t ai, li 〉) i∈n (4) ((cid:81) 〉)) = ((cid:81) These two functions are divided in subfunctions in a similar way than the aggregation function. Let take a platoon endowed of the two position variables, X and Y , representing the position variable x and y of all the vehicles constituting it. The memorization function store positions of all these vehicles. Memorization is not active during the execution of the platoon agent. After the platoon agent have moved in (X (cid:48),Y (cid:48)) position, it can be disaggregated by recreating the vehicles agents, calculating the value of their x and y variables with X (cid:48) and Y (cid:48) and applying the memorized repartition. 7 High-resolution inputs High-resolution model : M High-resolution outputs Aggregate function Aggregate function Low-resolution inputs Low-resolution model : M' Low-resolution outputs Aggregated high-resolution outputs The models are consistent if these are approximately equal Figure 5: Weak consistency, according to Davis and Hillestad (1993) 5.3 Dis/Aggregation Tests Navarro et al. (2011) explains how to decide when agents should be aggregated. He uses an affinity function which measure the similarity of internal and external states of agents. When the similarity is more important than a given threshold he links the two agents. Linked agents with the higher similarity value are aggregated together. We can use a similar mechanism to decide when to use an aggregation function, but in our case we need one utility function Af f by aggregation function FAg . If there are several aggregation functions which concern the same spiritAgents or bodyAgents in the same levels, it is necessary to decide when apply one instead of another. There are three possibilities. 1) The choice of FAg is done after measuring the affinity of agent groups with all Af f and the aggregate are instantiated each time, choosing the group with the higher affinity, until there is no group. 2) It is also possible to impose an order to test different FAg . All groups with a high affinity for one FAg are aggregated, then the next FAg is tested until there is no more FAg . 3) The choice of FAg can be done by a mix of the two previous methods. An partial order is defined on FAg s space. And if there is no precedence link between different FAg , we apply the first method to aggregate agents considering that the model FAg only contains these FAg after that we continue following the established order. 6 Measuring Consistency Davis and Hillestad (1993) uses the notion of consistency to measure the quality of simula- tions dealing with models of different resolution. "Consistency between a high-resolution model M and a low-resolution model M' is the comparison between the projected state of an aggregate of high-resolution entities which evolved in M, and the projected state of the same aggregate initially controlled by M' ". It is more intuitive to base the comparison on the evolution of the more detailed model instead of the aggregate model because it has a higher resolution and possesses more significant information. Before modeling the system, it is necessary to locate the significant simulation elements. These elements can be in the internal (spiritAgent) or external (bodyAgent) states of agents or in their environment. Once these elements are identified, several simulations are launched 8 detailled state at time t evolution of M detailled state at time t+n Global system is consistent if this differents states are equivalent FAg M e m FAg FDi sa g aggregated state at time t evolution of M' aggregated state at time t+n Figure 6: Strong consistency, according to Davis and Hillestad (1993) with the same parameters (initial state and execution time) using only the most detailed levels, carrying the more information but the most expensive one. At the end of the simulations execution a mean state of the identified elements is recorded. The same process is done with the model using dynamic change of LOD. Then the dissimilarity is measure between these two recording to calculate the consistency. 7 Conclusion and Perspectives This article introduces a methodology and theoretical tools to engineer and validate multi- level agent based simulations with dynamic change of LOD. It is applied in the european project InTrade1. This project deals with logistic in european container ports endowed with Autonomous Intelligent Vehicles (AIV). Partners involved in this project work at different scales and use simulation tools adapted to it (SCANeRstudio or Flexsim Container Terminal 2). The agent-based platform MadKit3 is used to make models coexist in a single simulation. Results are visualized with SCANeRstudio or Flexsim CT. An interesting perspective of this work would be to find better ways (cheaper or more realistic) to decide when simulated entities should be (dis)aggregated. It is closely related to the emergence detection and reification problem (David and Courdier, 2009). Two main approaches have been proposed to tackle this issue: a statistical one (e.g., (Caillou and Gil- Quijano, 2012; Caillou et al., 2013; Moncion et al., 2010; Vo et al., 2012)) and a symbolic one (Chen et al., 2010, 2009). It would be interesting to integrate them. Another perspective is the integration of organizational concepts, such as Systems of Sys- tems (SoS), in our methodology. It would allow to explicitly represent system or group level properties such as goals or missions. References Caillou, P. and Gil-Quijano, J. (2012). Simanalyzer : Automated description of groups dynamics in agent-based simulations. In Proc. of 11th Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS 2012). Caillou, P., Gil-Quijano, J., and Zhou, X. (2013). Automated observation of multi-agent based simulations: a statistical analysis approach. to appear in Studia Informatica Universalis. Chen, C., Clack, C., and Nagl, S. (2010). Identifying multi-level emergent behaviors in agent-directed simulations using complex event type specifications. Simulation, 86(1):41 -- 51. 1http://www.intrade-nwe.eu/ 2http://www.intrade-nwe.eu/ or www.flexsim.com/ 3http://www.madkit.org/ 9 Chen, C., Nagl, S., and Clack, C. (2009). A formalism for multi-level emergent behaviours in designed component- based systems and agent-based simulations. In Aziz-Alaoui, M. and Bertelle, C., editors, From System Complexity to Emergent Properties, volume 12 of Understanding Complex Systems, pages 101 -- 114. Springer. David, D. and Courdier, R. (2009). See emergence as a metaknowledge. a way to reify emergent phenomena in multiagent simulations? In Proceedings of ICAART'09, pages 564 -- 569, Porto, Portugal. Davis, P. and Hillestad, R. (1993). Families of model that cross levels of resolution : Issues for design, calibration and management. In 25th Winter Simulation Conference (WSC'93). Ferber, J. and Müller, J.-P. (1996). Influences and reaction: a model of situated multiagent systems. In 2nd Interna- tional Conference on Multi-agent systems (ICMAS-96), pages 72 -- 79. Gaud, N., Galland, S., Gechter, F., Hilaire, V., and Koukam, A. (2008). Holonic multilevel simulation of complex systems : Application to real-time pedestrians simulation in virtual urban environment. Simulation Modelling Practice and Theory, 16:1659 -- 1676. Gil-Quijano, J., Louail, T., and Hutzler, G. (2012). From biological to urban cells: Lessons from three multilevel agent-based models. In Desai, N., Liu, A., and Winikoff, M., editors, Principles and Practice of Multi-Agent Systems, volume 7057 of Lecture Notes in Computer Science, pages 620 -- 635. Springer. Michel, F. (2007). The irm4s model: the influence/reaction principle for multiagent based simulation. In AAMAS '07: Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems, pages 1 -- 3, New York, NY, USA. ACM. Michel, F., Gouaïch, A., and Ferber, J. (2003). Weak interaction and strong interaction in agent based simulations. Lecture Notes in Computer Science, 2927:43 -- 56. Moncion, T., Amar, P., and Hutzler, G. (2010). Automatic characterization of emergent phenomena in complex systems. Journal of Biological Physics and Chemistry, 10:16 -- 23. Morvan, G. (2012). Multi-level agent-based modeling - bibliography. CoRR, abs/1205.0561. Morvan, G. and Jolly, D. (2012). Multi-level agent-based modeling with the Influence Reaction principle. CoRR, abs/1204.0634. Morvan, G., Veremme, A., and Dupont, D. (2011). IRM4MLS: the influence reaction model for multi-level simu- lation. In Bosse, T., Geller, A., and Jonker, C., editors, Multi-Agent-Based Simulation XI, volume 6532 of Lecture Notes in Artificial Intelligence, pages 16 -- 27. Springer. Navarro, L., Flacher, F., and Corruble, V. (2011). Dynamic level of detail for large scale agent-based urban simu- lations. In Tumer, Yolum, Sonenberg, and Stone, editors, 10th Int. Conf on Autonomous Agents and Multiagent Systems (AAMAS 2011), pages 701 -- 708. Picault, S. and Mathieu, P. (2011). An interaction-oriented model for multi-scale simulation. In the 22nd International Joint Conference on Artificial Intelligence (IJCAI'11). Scerri, D., Hickmott, S., Drogoul, A., and Padgham, L. (2010). An architecture for distributed simulation with agent-based models. In van der Hoek, Kaminka, Lespérance, Luck, and Sen, editors, Proc. of 9th Int. Conf on Autonomous Agents and Multiagent Systems (AAMAS 2010), pages 541 -- 548, Toronto, Canada. Simulation Interoperability Standards Comittee (SISC) (2000). IEEE Standard for Modeling and Simulation (M&S) High Level Architecture (HLA) - Framework and Rules. IEEE Computer Society. Soyez, J.-B., Morvan, G., Merzouki, R., Dupont, D., and Kubiak, P. (2011). Multi-agent multi-level modeling -- a methodology to simulate complex systems. In Proceedings of the 23rd European Modeling & Simulation Symposium. Stratulat, T., Ferber, J., and Tranier, J. (2009). Masq : toward an integral approach to interaction. In Proceedings of the 8t h conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), pages 813 -- 820. Van Brussel, H., Wyns, J., Valckenaers, P., Bongaerts, L., and Peeters, P. (1998). Reference architecture for holonic manufacturing systems: Prosa. Computers in Industry, 37(3):255 -- 274. Vo, D.-A., Drogoul, A., Zucker, J.-D., and Ho, T.-V. (2012). A modelling language to represent and specify emerging structures in agent-based model. In Desai, N., Liu, A., and Winikoff, M., editors, Principles and Practice of Multi- Agent Systems, volume 7057 of Lecture Notes in Computer Science, pages 212 -- 227. Springer. Weyns, D. and Holvoet, T. (2003). Model for simultaneous in situated multi-agent systems. Lectures Notes in Artificial Intelligence, 2831:105 -- 118. Zeigler, B., , Kim, T., and Praehofer, H. (2000). Theory of Modeling and Simulation. Academic Press, 2nd edition. 10
1210.4778
2
1210
2013-02-22T13:16:30
Average Consensus in the Presence of Delays and Dynamically Changing Directed Graph Topologies
[ "cs.MA", "cs.DC" ]
Classical approaches for asymptotic convergence to the global average in a distributed fashion typically assume timely and reliable exchange of information between neighboring components of a given multi-component system. These assumptions are not necessarily valid in practical settings due to varying delays that might affect transmissions at different times, as well as possible changes in the underlying interconnection topology (e.g., due to component mobility). In this work, we propose protocols to overcome these limitations. We first consider a fixed interconnection topology (captured by a - possibly directed - graph) and propose a discrete-time protocol that can reach asymptotic average consensus in a distributed fashion, despite the presence of arbitrary (but bounded) delays in the communication links. The protocol requires that each component has knowledge of the number of its outgoing links (i.e., the number of components to which it sends information). We subsequently extend the protocol to also handle changes in the underlying interconnection topology and describe a variety of rather loose conditions under which the modified protocol allows the components to reach asymptotic average consensus. The proposed algorithms are illustrated via examples.
cs.MA
cs
Average Consensus in the Presence of Delays and Dynamically Changing Directed Graph Topologies Christoforos N. Hadjicostis, Senior Member, IEEE and Themistoklis Charalambous, Member, IEEE Abstract Classical approaches for asymptotic convergence to the global average in a distributed fashion typically assume timely and reliable exchange of information between neighboring components of a given multi-component system. These assumptions are not necessarily valid in practical settings due to varying delays that might affect transmissions at different times, as well as possible changes in the underlying interconnection topology (e.g., due to component mobility). In this work, we propose protocols to overcome these limitations. We first consider a fixed interconnection topology (captured by a possibly directed graph) and propose a discrete-time protocol that can reach asymptotic aver- age consensus in a distributed fashion, despite the presence of arbitrary (but bounded) delays in the communication links. The protocol requires that each component has knowledge of the number of its out-neighbors (i.e., the number of components to which it sends information). We subsequently extend the protocol to also handle changes in the underlying interconnection topology and describe a variety of rather loose conditions under which the modified protocol allows the components to reach asymptotic average consensus. The proposed algorithms are illustrated via examples. Keywords: Average consensus, digraphs, bounded delays, changing interconnection topology, ratio consensus, weak convergence. Preliminary results of the work in this paper have been presented in [1] which only included the discussions on bounded delay and did not provide all details for the proofs. Christoforos N. Hadjicostis is with the Department of Electrical and Computer Engineering at the University of Cyprus, Nicosia, Cyprus and also with the Department of Electrical and Computer Engineering at the University of Illinois, Urbana- Champaign, IL, USA. E-mail: [email protected]. Themistoklis Charalambous was formerly with the Department of Electrical and Computer Engineering at the University of Cyprus, Nicosia, Cyprus. He is currently with the Automatic Control Lab, Electrical Engineering Department and ACCESS Linnaeus Center, Royal Institute of Technology (KTH), Stockholm, Sweden. Corresponding author's address: Osquldas vag 10, 100-44 Stockholm, Sweden. E-mail: [email protected]. I. INTRODUCTION Centralized approaches in multi-component systems require the collection of measurements or other information to a central location (at possibly high communication and computational cost), the computation of quantities of interest at this central location, and then the dissemination of these quantities to (a subset of) the components. This approach is often inefficient or even unrealizable (e.g., in ad-hoc networks that do not posses explicit routing mechanisms). Coopera- tive distributed control/coordination algorithms and protocols have therefore received tremendous attention, especially during the last decade. Several diverse research communities (e.g., biology, physics, control, communication, and computer science) have made important contributions that have resulted in many recent advances in so called consensus-based approaches (see, for example, [2]) and in distributed computation of functions of geographically dispersed data, also known as in-network computation (see, for example, [3] and references therein). A distributed system or network consists of a set of components (nodes) that can share information via connection links (edges), forming a directed interconnection topology (digraph). In general, the objective of a consensus problem is to have all agents agree upon a certain (a priori unknown) quantity of interest that is typically a function of some values that the nodes initially posses. When the agents (asymptotically) reach agreement to the same value, we say that the distributed system (asymptotically) reaches consensus. The problem of convergence of discrete-time consensus algorithms was initially targeted by Tsitsikis et al. [4] and subsequently by many other researchers (see, for example, [5] -- [13]). Typical applications include network coordination problems involving self-organization, formation of patterns, parallel processing, and distributed optimization, such as motion of mobile agents (e.g., coordination of unmanned air vehicles, autonomous underwater vehicles, or satellites) and averaging of measurements in wireless sensor networks. Common challenges in consensus problems include the handling of node failures (e.g., due to the draining of batteries in wireless sensor networks), transmission delays on the transfer of data between agents, packet losses in wireless communication networks, and inaccurate sensor measurements. As a result, agreement problems have been studied in networks of dynamical agents, possibly with directed information flow, under delays and/or changing topologies. It is worth pointing out that convergence of consensus algorithms can usually be established under relatively weak requirements and that consensus protocols have been relatively successful in addressing disturbances due to delays (e.g., [8], [9], [14]), packet drops (e.g., [15], [16]), and changing interconnections (e.g., [6], [7]), or a combination of them (e.g., [5], [17], [18]). What is different in this paper is that we devise a protocol that is able to overcome such limitations while reaching consensus to the exact average of the values that the nodes initially posses. More specifically, by utilizing the suggested protocol, each agent reaches the exact average of the initial values of all the agents, even in the presence of (bounded) transmission delays and changes in the interconnection topology. This is in sharp contrast with the above mentioned works in which consensus is reached to a value that is typically a function of the disturbances involved (and thus cannot be guaranteed a priori). The average consensus problem studied in this paper aims to have the agents reach agreement to the average of their initial values (see, for example, [19], [20]). It has been shown in [5] that, under a fixed interconnection topology, average consensus can be achieved by performing a linear iteration in a distributed fashion if the interconnection topology is both strongly connected and balanced, while convex optimization [21] -- [23] requires update matrices that are doubly stochas- tic. Even though various approaches have been proposed for forming balanced matrices (e.g., [24], [25]) and primitive doubly stochastic matrices (e.g., [11], [26]), which can subsequently be used for reaching average consensus, most existing schemes are not applicable in digraphs and/or fail in the presence of delays and changing interconnection topology. In particular, among the limited existing algorithms that guarantee convergence to the exact average in a digraph (e.g., [27] -- [29]), few of them have addressed delays and topology changes, and it is unclear how/if these techniques can be modified to overcome such disturbances. The methodology developed in this paper is based on an algorithm suggested in [27] that solves the average consensus problem in a static digraph using a linear iteration strategy in which each node vj distributively sets the weights on its self-link and outgoing-links to be (where D+ 1+D+ is the out-degree of node vj). More generally, the set of weights needs to adhere to j 1 j the graph structure (i.e., be positive on each edge -- including self-edges -- and zero otherwise), but is otherwise unrestricted as long as it forms a primitive column stochastic matrix P . More generally, the set of weights needs to adhere to the graph structure (i.e., be positive on each edge -- including self-edges -- and zero otherwise), but is otherwise unrestricted as long as it forms a primitive column stochastic matrix P . Using the weights in matrix P , average consensus is reached in [27] via ratio consensus, i.e., two linear iterations (with appropriately chosen initial conditions) that run simultaneously so that the average can be obtained at each node by taking the ratio of the two values it maintains for each of the two iterations. An equivalent approach for gossiping algorithms was also proposed in [30], which is a generalization of the gossiping algorithm proposed in [31]. The idea of ratio consensus can be traced back much earlier (see the discussion on weak convergence at the "Bibliography and Discussion to §§3.1-3.2", pp. 98, in [32]). In this paper, we investigate the problem of discrete-time average consensus in a multi- component system under a directed interconnection topology in the presence of bounded delays in the communication links and changing interconnections (with communication links being added or removed, as in a mobile network setting). First, we consider a fixed topology and we devise a protocol, based on ratio consensus, where each node updates its information state by linearly combining the available (possibly delayed) information received by its neighbors using constant positive weights. We establish that, unlike other consensus approaches, this robustified version of ratio consensus, henceforth called robustified ratio consensus, converges to the exact average of the nodes initial values, despite the presence of arbitrary but bounded time-delays. Then, we allow the communication links to change (at the same time we also allow communication delays in the network) and enhance the proposed robustified ratio consensus algorithm so that the algorithm is immune to arbitrary changing interconnection topology and delays. We show that it is possible to asymptotically reach consensus to the exact average in a distributed fashion for a network with changing communication links and delays, as long as the delays are bounded and the unions of digraphs over consecutive time intervals form strongly connected digraphs infinitely often. The remainder of the paper is organised as follows. In Section II, the notation used throughout the paper is provided, along with some background on graph theory that is needed for our subsequent development. This section also outlines the algorithm proposed in this paper. In Section III, we describe our model for communication link delays and our model for changing interconnection topology in the multi-agent system. In Section IV we consider a fixed topology and study the behavior of our algorithm in the presence of delays. In Section V we consider a fixed set of nodes and allow changes in the communication links among them in order to study the behavior of our algorithm in the presence of both interconnection topology changes and delays. Finally, Section VI summarizes the results of the paper and draws directions for future research. A. Notation II. NOTATION AND PRELIMINARIES The sets of real, integer and natural numbers are denoted by R, Z and N, respectively; their nonnegative counterparts are denoted by the subscript + (e.g., R+). Vectors are denoted by small letters whereas matrices are denoted by capital letters. The transpose of matrix A is denoted by AT . By 1 we denote the all-ones vector and by I we denote the identity matrix (of appropriate dimensions). A matrix whose elements are nonnegative, called nonnegative matrix, is denoted by A ≥ 0, and a matrix whose elements are positive, called positive matrix, is denoted by A > 0. In multi-component systems with fixed communication links (edges), the exchange of infor- mation between components (nodes) can be conveniently captured by a digraph G(V,E) of order n (n ≥ 2), where V = {v1, v2, . . . , vn} is the set of nodes and E ⊆ V × V is the set of edges. A directed edge from node vi to node vj is denoted by εji (cid:44) (vj, vi) ∈ E and represents a communication link that allows node vj to receive information from node vi. A graph is said to be undirected if and only if εji ∈ E implies εij ∈ E. In this paper, links are not required to be bidirectional, i.e. we deal with digraphs; for this reason, we use the terms "graph" and "digraph" interchangeably. Note that by convention and for notational purposes, we assume that the given graph does not include any self-loops (i.e., εjj /∈ E for all vj ∈ V) although each node vj obviously has a link (access) to its own information. A digraph is called strongly connected if there exists a path from each vertex vi in the graph to each vertex vj (vj (cid:54)= vi). In other words, for any vj, vi ∈ V, vj (cid:54)= vi, one can find a sequence of nodes vi = vl1, vl2, vl3, . . ., vlt = vj (t ≥ 2) such that link (vlk+1, vlk) ∈ E for all k = 1, 2, . . . , t − 1. j =(cid:12)(cid:12)N − j All nodes that can transmit information to node vj directly are said to be in-neighbors of node j , is called the in-degree j = {vi ∈ V εji ∈ E}. The cardinality of N − (cid:12)(cid:12). The nodes that receive information from node vj belong vj and belong to the set N − of vj and is denoted by D− to the set of out-neighbors of node vj, denoted by N + N + j , is called the out-degree of vj and is denoted by D+ In the algorithms we will consider, we will associate a positive weight pji for each (j, i) such j = {vl ∈ V εlj ∈ E}. The cardinality of j =(cid:12)(cid:12)N + (cid:12)(cid:12). j that edge εji ∈ E ∪ {(vj, vj) vj ∈ V}. The nonnegative matrix P = [pji] ∈ Rn×n as the entry at its jth row, ith column position) is a weighted adjacency matrix (also referred (with pji + to as weight matrix) that has zero entries at locations that do not correspond to directed edges (or self-edges) in the digraph. In other words, apart from the main diagonal, the zero/nonzero structure of the adjacency matrix P matches exactly the given set of links in the digraph. We use xj[k] ∈ R to denote the information state of node j at time step k. We first consider a static network where the graph connectivity remains largely invariant (as it is usually the case for distributed resources in applications, such as the power grid [27], [33]). At each time step k, each node vj updates its information state to xj[k + 1] as a weighted linear combination of its own value xj[k] and the available information received by its neighbors {xi[k] vi ∈ N − j }. The positive constant pji captures the weight of the information inflow from agent vi to agent vj. In this work, since we deal with digraphs, we assume that each node vj chooses its self-weight pjj and the weights plj on its out-going links vl ∈ N + j . Hence, in its general form, each node updates its information state xj[k + 1] according to xj[k + 1] = pjjxj[k] + pjixi[k] = pjjxj[k] + xj←i[k], k = 0, 1, 2, . . . (1) (cid:88) vi∈N − j (cid:88) vi∈N − j where xj←i[k] (cid:44) pjixi[k], xi[k] ∈ R, is the value sent to node vj by node vi at time step k. [Note that, since node vi chooses the weight pji, it is more convenient to sent xj←i[k] instead of . . . xn[k])T and P = [pji] ∈ separately sending pji and xi[k].] If we let x[k] = (x1[k] x2[k] Rn×n + , then (1) can be written in matrix form as x[k + 1] = P x[k]. (2) i xi[0] n Note that, with the exception of the diagonal entries, we have pji = 0, j (cid:54)= i, if and only if (vj, vi) /∈ E. We say that the nodes asymptotically reach average consensus if limk→∞ xj[k] = (cid:80) for all vj ∈ V. The necessary and sufficient conditions for (2) to reach average consensus are the following [20]: (a) P has a simple eigenvalue λi(P ) = 1 with left eigenvector 1T and right eigenvector 1, and (b) all other eigenvalues of P (λj(P ), j (cid:54)= i) have magnitude less than 1 (λj(P ) < 1). If P ≥ 0 (as in our case), the necessary and sufficient condition is that P be a primitive doubly stochastic matrix. To capture dynamically changing topologies we will assume that we are given a fixed set of components V = {v1, v2, . . . , vn} but the set of edges among them might change at various points in time. This results in a sequence of digraphs of the form G[k] = (V,E[k]). Given a collection of digraphs G[1], . . . ,G[m] (for some m ≥ 1) of the form G[k] = (V,E[k]), k = 1, 2, . . . , m, the union digraph is defined as G1,2,...,m = (V,∪kE[k]). The collection of digraphs is said to be jointly strongly connected, if its corresponding union graph G1,2,...,m forms a strongly connected graph. A strongly connected graph certainly emerges if at least one of the graphs in the collection is strongly connected, but it could also emerge even if none of the graphs forming the union is strongly connected. B. Ratio Consensus In [27], the average consensus problem in a digraph is solved using ratio consensus. Each node vj distributively sets positive weights on its self-link and out-going links so that the resulting weight matrix P is primitive column stochastic, but not necessarily row stochastic. [Since the graph is strongly connected, it will be sufficient for node vj to choose plj > 0 for vl ∈ N + j ∪{vj} j ∪{vj} plj = 1.] Average consensus is then reached by using (zero otherwise) such that (cid:80) vl∈N + this weight matrix to run two linear iterations with appropriately chosen initial conditions and by having each node take the ratio of the two values it maintains (one for each iteration). The algorithm is stated below for a specific choice of weights, which assumes that each node knows (this has the additional advantage of allowing its out-degree and sets its link weights to broadcasts, since the transmissions xl←j[k] (cid:44) pljxj[k] are identical for all vl ∈ N + j ∪{vj}). Note, however, that the algorithm works for any set of weights that adhere to the graph structure and 1+D+ 1 j form a primitive column stochastic weight matrix. [27] Consider a strongly connected digraph G(V,E). Let yj[k] and zj[k] (for all Lemma 1. vj ∈ V and k = 0, 1, 2, . . .) be the result of the iterations yj[k + 1] = pjjyj[k] + zj[k + 1] = pjjzj[k] + pjiyi[k] , pjizi[k] , (3) (4) (cid:88) (cid:88) j vi∈N − vi∈N − j where P = [pji] forms a primitive column stochastic matrix, and the initial conditions are y0(2) . . . y0(V))T (cid:44) y0 and z[0] = 1. Then, the protocol asymptotically y[0] = (y0(1) converges to where µj[k] = yj[k] zj[k] . lim k→∞ µj[k] = (cid:80) v(cid:96)∈V y0((cid:96)) V , ∀vj ∈ V , Note that the ratio consensus in [27] is actually a simpler version of more general algorithms that have appeared under various names in the literature (e.g., weak ergodicity property in [32] or the push-sum algorithm in [31]). C. Products of SIA Matrices A stochastic matrix P is called in [34] SIA (stochastic, indecomposable, and aperiodic) if the limit Q = limk→∞ P k exists and has all of its columns identical. Specifically, Q = cP 1T for some nonnegative vector cP . It can be shown that this definition of a SIA matrix is equivalent to the standard definitions of indecomposability and aperiodicity for stochastic matrices.1 Let A1, A2, . . . , Am be any square matrices of the same order. By a word (in the A's) of length (cid:96) ∈ N we mean the product of (cid:96) A's (repetitions permitted). A stochastic, indecomposable, and aperiodic (SIA) matrix is a column stochastic matrix B such that limk→∞ Bk exists and has all columns the same, i.e., it is a rank one matrix of the form cB1T for some nonnegative column vector cB. For the derivation of our results we make use of the theorem by Wolfowitz [34] below. Theorem 1. [34] Let P = {P 1, P 2, . . . , P m} be a collection of column stochastic matrices of the same order such that any word in the P 's is stochastic, indecomposable, and aperiodic (SIA). For any  > 0 there exists an integer ν() such that any word B = [bji] ∈ Rn×n P 's) of length (cid:96) ≥ ν() satisfies δ(B) < , where δ(B) = maxj maxi1,i2 bj,i1 − bj,i2. (in the + In words, Theorem 1 states that for large enough (cid:96), the product of (cid:96) matrices from the collection P has all of its columns approximately the same. Note that the result does not mean that all matrix products converge to a single matrix of the form c1T ; however, for large enough (cid:96), each word B will take the form cB1T for some column vector cB. III. MODELING DELAYS AND SWITCHING A. Modeling Delays We first focus on the average consensus problem in the presence of bounded delays when the communication links among components are fixed and captured by an arbitrary strongly connected digraph. More specifically, the transmission on the link from node vi to node vj at time step k undergoes an a priori unknown delay τji[k], where τji[k] is an integer that satisfies 1A stochastic matrix P ∈ Rn×n is said to be decomposable if there exists a nonempty proper subset S ⊂ {1, 2, . . . , n} such that pji = pij = 0 whenever vi ∈ S and vj /∈ S; also, P is indecomposable if it is not decomposable. A stochastic matrix P is aperiodic if the Markov chain it describes is aperiodic, that is for every state i there exists ki such that for all k(cid:48) ≥ ki, the probability of being at state i after k(cid:48) steps is greater than zero (for all k(cid:48)) or zero (for all k(cid:48)). Both indecomposability and aperiodicity are properties that can be checked using the structure of the digraph that is induced by the zero/nonzero structure of matrix P . Specifically, indecomposability follows from having a connected digraph with a single strongly connected component; for an indecomposable matrix, aperiodicity is guaranteed as long as at least one component in the strongly connected component has a self loop. 0 ≤ τji[k] ≤ ¯τji < ∞ (i.e., delays are bounded). The maximum delay is denoted by ¯τ = max(vj ,vi)∈E ¯τji. We also assume that τjj[k] = 0, ∀vj ∈ V, at all time instances k (i.e., the own value of a node is always available without delay). Under this model, the information available to node vj at time step k (and which can be used to update its value to xj[k + 1]) comprises of its own values and all values received by its neighbors j ∪ {vj}} by that time, i.e., it is a subset of the values in the set {xj←i[s] 0 ≤ s ≤ k, vi ∈ N − (recall that, in the digraph setting we consider, node vi selects the weight of the link (vj, vi) and thus sends to node vj the value xj←i[s] (cid:44) pjixi[s]). The protocol we will employ relies on having each node vj update its information state at time step k to xj[k + 1] by combining (in a linear fashion) its own value xj[k] and the possibly delayed information received at that time step by its in-neighbors. In terms of the notation used above, this information is captured by j ∪{vj}} . The exact way in which this information {xj←i[s] 0 ≤ s ≤ k, s + τji[s] = k, vi ∈ N − is used will be discussed later. B. Modeling Switching We consider a setting where the set of components in the multi-component system is fixed to V = {v1, v2, . . . , vn}, but the (possibly directional) communication links between them are allowed to change. A convenient way of capturing this is to assume that we have a sequence of time-varying digraphs of the form G[k] = (V,E[k])). This means that at each time instant k, each node vj has possibly different sets of in- and out-neighbors, denoted respectively by j [k] and N + N − j [k] and D+ j [k] = N + j [k]. The in-degree and out-degree of node vj are defined as D− j [k], respectively. j [k] = N − As in the case when there is no change in the interconnection topology, each node vj is in charge of setting the weights plj[k], vl ∈ N + j [k], on all links to its out-neighbors. Due to the changing topology, the weight matrix will be time-varying and will be denoted by P [k]. What is important is for P [k] to be column stochastic and to have positive weights at all links of the graph including its diagonal elements. As in Lemma 1, nodes can easily set the weights on the links to their out-neighbors to ensure column stochasticity as long as each node vj has knowledge j [k] at each time step (in such case, each node vj ∈ V sets plj = of its out-degree N + for vl ∈ N + j [k] ∪ {vj}). There are various ways in which the out-degree information can become available at each node (in undirected graphs this information is obviously available but even in 1 1+D+ j [k] digraphs it can become available with simple protocols that we describe in more detail later). Even if the out-degree information becomes available with some delay, the protocols we propose can still be modified to reach consensus to the exact average of the nodes' initial values. In our analysis of changing interconnection topology, we consider two cases. (i) Switching without delays: When we have a varying interconnection topology and there exist no delays in the communication links, each node vj updates its information state at time step k to xj[k + 1] by combining its own state xj[k] and the available information received by its neighbors {xj←i[k] vi ∈ N − j [k]} (the latter information also includes the positive weights pji[k] that capture the weight of the information inflow assigned by component vi to the link (vj, vi) at time k). Here, we will consider two subcases: (a) each transmitting node knows its out-degree as soon as the change takes place, and (b) each transmitting node knows its out-degree with some delay. (ii) Switching with delays: In this case, each node vj updates its information state at time step k to xj[k + 1] by combining its own value xj[k] and the available (possibly delayed) information {xj←i[s] 0 ≤ s ≤ k, s + τji[s] = k, vi ∈ N − j [s]} (the latter information also includes the positive weights pji[s], that component vi assigns to link (vj, vi) at time s. We consider again the two cases (a) and (b) mentioned earlier where each node vj discovers its out-degree without or with delay (the out-degree with delay will be made clear in the analysis), and also consider a third case (c) in which a node vj discovers an established link with some delay. IV. HANDLING DELAYS IN A DIGRAPH links to its out-neighbors so that these weights are positive and satisfy(cid:80) We first start with a static digraph, where each link transmission can undergo a bounded delay. j } on We assume that each node vj chooses its self weight pjj and the weights {plj vl ∈ N + j ∪{vj} plj = 1 for as in Lemma 1). all vj ∈ V (a simple choice would be to set all of these weights to vl∈N + 1 1+D+ j We employ a protocol where each node updates its information state according to the following relation: xj[k + 1] = pjjxj[k] + (cid:88) vi∈N − j xj←i[k − r]Ik−r,ji[r] , k = 0, 1, 2, . . . where xj←i[k − r] (cid:44) pjixi[k − r], xj[0] ∈ R is the initial state of node vj, and r=0 ¯τ(cid:88) 1, Ik,ji(τ ) = if τji[k] = τ, 0, otherwise. (5) (6) In the absence of delays, we have τji[k] = 0 and the update relation (5) reduces to (1) with constant weights. We will show that if (5) is employed in place of (1) and is used to run two iterations as in Lemma 1, the resulting ratio consensus approach can still be used to calculate the exact average, despite arbitrary but bounded delays at the communication links. Essentially, we establish that (5) is a ratio consensus protocol tolerant to arbitrary but bounded delays. Assumptions 1. For the analysis below we are given a digraph G(V,E) (that represents the information exchange between agents in a multi-agent system). Each node vj ∈ V has an initial value y0(j) and runs ratio consensus, i.e., two versions of the iteration in (5), one with initial value y0(j) and one with initial value z0(j) = 1. We make the following assumptions: and (vl, vj) ∈ E, and satisfy (cid:80)n (A1) The digraph is strongly connected, and the (nonnegative) weights plj are positive for l = j l=1 plj = 1 for all vj ∈ V (so that they form a column stochastic matrix P ). For simplicity, we will assume that each node sets the weights on the links to its out-neighbors to plj = 1 1+D+ j for vl ∈ N + j ∪ {vj} (zero otherwise). (A2) There exists a finite ¯τ that uniformly bounds the delay terms; i.e. τji[k] ≤ ¯τ < ∞ for all links (vj, vi) ∈ E for all time instants k. In addition, τjj[k] = 0 for all vj ∈ V and all k. Note that Assumption (A1) is necessary for the successful operation of any distributed algo- rithm seeking consensus. The particular choice of weights ensures that the weight matrix P is primitive column stochastic. Assumption (A2) implies that no message is lost in the network and every agent updates its value using values from its in-neighbors at least once every ¯τ consecutive updates. The proof of the theorem below is developed in the remainder of this section. Theorem 2. Consider a strongly connected digraph G(V,E). Let yj[k] and zj[k] (for all vj ∈ V and k = 0, 1, 2, . . .) be the result of the iterations yj[k + 1] = pjjyj[k] + zj[k + 1] = pjjzj[k] + yj←i[k − r]Ik−r,ji[r] , zj←i[k − r]Ik−r,ji[r] , (7) (8) (cid:88) (cid:88) vi∈N − j ¯τ(cid:88) ¯τ(cid:88) r=0 vi∈N − j r=0 under Assumptions (A1) and (A2). The initial conditions are y[0] = (y0(1) y0(2) . . . y0(V))T ≡ y0 and z[0] = 1, and Ik,ji is an indicator function that captures the bounded delay τji[k] on link (vj, vi) at iteration k (as defined in (6), τji[k] ≤ ¯τ). Then, the solution to the average , ∀vj ∈ V , consensus problem can be asymptotically obtained as lim (cid:80) k→∞ µj[k] = v(cid:96)∈V y0((cid:96)) V where µj[k] = yj[k] zj[k] . Notice that the two iterations in the above theorem are coupled via the delays (the indicator functions Ik,ji are the same in both iterations). Our proof is based on an augmented representation (digraph) that allows us to model the distributed system with bounded delays as described in (5), which processes packets as soon as they arrive at the destination node. We then use this augmented representation to establish that (for fixed communication topologies) the distributed ratio consensus algorithm in (7) -- (8) will lead to asymptotic average consensus, regardless of the nature and order of the delays, as long as they are bounded. Note that the nodes are not required to know the delay of any packet or any upper bound of the delay; each node considers all the packets that arrive at that time step, by including their value in the sum. In the augmented digraph representation, we add extra, "virtual" nodes and use them to model the delays. The maximum number of "virtual" nodes for each original node is bounded by the maximum delay ¯τ. In particular, for each node vj ∈ V we introduce ¯τ "virtual" nodes v(1) holds the sum of the values that are j . At each time step k, virtual node v(τ ) , . . . , v(¯τ ) , v(2) j j j destined to arrive to node vj in τ steps. The augmented digraph has (¯τ + 1)V nodes and (1 + 2¯τ )E edges. Before presenting the general case, we illustrate the construction of the augmented digraph via an example. Example 1. Consider the network of two agents exchanging information as shown in Figure 1. Note that that the weights p11, p12, p21, and p22 are all strictly positive, and satisfy p11 + p21 = 1 and p22+p12 = 1; in the simple case presented in the introduction (and mentioned in Theorem 2), we have p12 = p22 = 1/(1 +D+ 1 ) = 1/2. Suppose the agents experience delays that are bounded by 2 (¯τ = 2). Therefore, two extra "virtual" nodes will be 2 ) = 1/2 and p21 = p11 = 1/(1 +D+ added for each node (see Figure 2), depicting the states at which the delayed messages reside before reaching their destination (refer to Figure 2). Fig. 1. A simple example with two nodes when the links do not experience any delays. (a) Graph representation of the network at a time instant k = k1 when there exist no delays. As a result, each node uses the value sent by its neighbor directly, plus the delayed information (sent in previous time instances) that arrives at time instant k = k1. (b) Graph representation of the network at a time instant k = k2 for which node v2 sends information to node v1 with delay τ12(k2) = 1, while node v1 sends information to node v2 with delay τ21(k2) = 2. Fig. 2. A simple example with two nodes to illustrate the modeling of delays using the proposed augmented digraph. The maximum allowable delay (¯τ) is 2. In Figure (a) there exist no delays between communication links at that time instant (k = k1), whereas in Figure (b) both nodes experience delays. Active links are shown by boldface black lines in each case. Taking x[k] = (x1[k] x2[k] x(1) 1 [k] x(1) 2 [k] x(2) 1 [k] x(2) 2 [k])T , the iteration in the augmented v1v2p21p12p11p22v1v2p21p12p11p22v(2)2v(1)2v(1)1v(2)1p2111p21p1211p12v1v2p21p12p11p22v(2)2v(1)2v(1)1v(2)1p2111p21p1211p12 digraph can be written as x[k + 1] = P [k]x[k], where P [k] depends on the nature of delays. For example, when there are no delays in the network, say at time instant k = k1, the network is represented by Figure 2(a) and the weight matrix is given by P [k1] below. Similarly, if at time instant k = k2 there is a delay of 2 at link (v2, v1) and a delay of 1 at link (v1, v2) (the network is shown in Figure 2(b)), the matrix representation is given by P [k2] below.   p11 p12 1 0 0 p21 p22 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0  . p11 0 0 0 0 0 p21 p22 p12 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 P [k1] = , P [k2] =  ··· ··· ... ··· ··· (cid:16) In the general case, in a network of n = V nodes, we introduce ¯τ n nodes (for a total of (¯τ + 1)n nodes) so that x[k + 1] = P [k]x[k], where  P [k] (cid:44) P0[k] P1[k] ... P¯τ−1[k] In×n 0 0 ... 0 In×n ... 0  , 0 0 ... In×n 0 (9) (cid:17) , r = 1, 2, . . . ¯τ. with x[k] = (cid:0)xT [k] x(1)[k] . . . x(¯τ )[k](cid:1)T and x(r)[k] = P¯τ [k] 0 0 x(r) 1 [k] . . . x(r) n [k] Note that P0[k], P1[k], . . . , P¯τ [k] are appropriately defined nonnegative matrices that depend on the link delays that are experienced by messages sent at time k. Specifically, Pr[k] is a matrix associated only with the links of the graph for which the message was delayed by r steps at time step k, and satisfies Pr[k](j, i) = P (j, i), 0, if τji[k] = r, (j, i) ∈ E, otherwise. Note that, for each (j, i) ∈ E, only one of P0[k](j, i), P1[k](j, i), ..., P¯τ [k](j, i) is nonzero and is equal to P (j, i). Thus, we also have ¯τ(cid:88) r=0 P = Pr[k] , k = 0, 1, 2, . . . (10) Matrix P [k] may take at most (¯τ + 1)E matrix values, where (¯τ + 1) is the total number of states ("virtual" and original) for each node vj. Specifically, if there exists an edge (vj, vi) in the original digraph, then that edge also exists in the augmented digraph along with edges (v(1) , vi), j ). However, among the (¯τ + 1) entries of P [k] corresponding to the edge (vj, vi) only one of them could be nonzero , vi), and also edges (vj, v(1) , vi), . . ., (v(¯τ ) j ), . . ., (v(¯τ−1) , v(2) j j ), (v(1) j (v(2) j , v(¯τ ) j j (and equal to pji); the others will be zero. In the sequel we do not require the matrix P [k] to be known at each time step k; what we utilize is that P [k] will be a matrix from a finite set of possible matrices P, which have certain useful properties. Proposition 1. Let P = {P 1, P 2, . . . , P (¯τ +1)E} be the set of all possible P [k] as defined in (9). Then, for integer (cid:96), (cid:96) ≥ ¯τ + 1, any (cid:96)-length word B = P [k + (cid:96)]P [k + (cid:96) − 1] . . . P [k + 1] is SIA. Moreover, for (cid:96) ≥ n(¯τ + 1), the first n rows of matrix B will be positive with minimum entry greater or equal to cmin ≡(cid:16) 1D+ max (cid:17)n(¯τ +1) , where D+ max = maxvj∈V D+ j . Proof of Proposition 1: In order to prove that B = P [k + (cid:96)] . . . P [k + 2]P [k + 1] is SIA, we have to show that it is (i) column stochastic, (ii) indecomposable, and (iii) aperiodic. (i) Column Stochasticity: This is easy to see as it is equivalent to proving that the product of two or more column stochastic matrices of the same order is also a column stochastic matrix (the result follows easily by induction and is standard). (ii) Indecomposability: We argue indecomposability for (cid:96) ≥ ¯τ + 1 (the result also holds for any 0 ≤ (cid:96) < ¯τ + 1 but we do not discuss the proof here due to space limitations). Write matrix B in block form as  B = B0,0 B1,0 ... B0,1 B1,1 ... B0,2 B1,2 ... B¯τ−1,0 B¯τ−1,1 B¯τ−1,2 B¯τ ,0 B¯τ ,1 B¯τ ,2  , B0,¯τ B1,¯τ ... ··· ··· ... ··· B¯τ−1,¯τ ··· B¯τ ,¯τ where all blocks are nonnegative matrices of size n× n. We will argue that (i) the zero/nonzero structure of B0,0 corresponds to a graph that is strongly connected, and (ii) each of B0,0, B0,1, B0,2, ..., B0,¯τ has strictly positive entries on its diagonal. These two facts establish that the graph that corresponds to the zero/nonzero structure of the overall matrix B has the following property: (i) any pair of non-virtual nodes (i.e., the top n nodes) can be connected via a directed path (that can actually involve only non-virtual nodes); (ii) all other (virtual) nodes have an outgoing link to at least one of the non-virtual nodes. Therefore, the set of non-virtual nodes is part of a strongly connected component; this component could potentially involve other (virtual) nodes in the graph, but no other strongly connected component exists. Thus, matrix B is indecomposable. For fact (i), we need to explain why B0,0 corresponds to a graph of n nodes that is strongly connected. It is not hard to see that one can write B0,0 = (Π(cid:96) l=¯τ +2P0[k +l])P¯τ [k +1]+E0,0 l=2P0[k +l])P0[k +1]+(Π(cid:96) l=3P0[k +l])P1[k +1]+...+(Π(cid:96) l=l1 where Πl2 A[l] ≡ A[l2]A[l2 − 1]...A[l1] (Πl2 A[l] ≡ I for l2 = l1 − 1 and zero otherwise) and E0,0 is a nonnegative matrix (that can be expressed as the sum of various products of the nonnegative2 blocks composing the P matrices). Since the diagonal elements in matrix l=l1 Π(cid:96) P0[k + l] (for l = 1, 2, ..., (cid:96) are strictly positive, we know that the diagonals of each product l=mP0[k + l], m = 2, 3, ..., ¯τ + 2, will be strictly positive and thus the elements of each term l=mP0[k + l])Pm−2[k + 1] will be positive at the locations where Pm−2[k] is positive. Thus, from the expression for B0,0 above, the zero/nonzero structure of B0,0 corresponds to a graph of (Π(cid:96) 2The fact that the blocks are nonnegative is important because it means that nonzero entries created by some products cannot be cancelled by nonzero entries of other products. n nodes that includes all the edges in(cid:80)¯τ r=0 Pr[k + 1] = P (recall (10)); thus, all edges in the original graph are included and, since the original graph is strongly connected, B0,0 corresponds to a graph that is strongly connected. For fact (ii), we need to explain why each B0,r, r = 0, 1, ..., ¯τ, has strictly positive diagonal entries. For r = 0, this follows for the discussion above. For r = 1, 2, ..., ¯τ, we can also write B0,r = (Π(cid:96) l=r+2P0[k + l])P0[k + 1 + r] + E0,r , where E0,r is again a nonnegative matrix that can be expressed as the sum of various products of nonnegative matrices. Since the diagonal elements in matrix P0[k + l] (for l = 1, 2, ..., (cid:96)) are strictly positive, we know that the diagonals of each B0,r will be strictly positive. (iii) Aperiodicity: Since the graph corresponding to B is indecomposable, aperiodicity is easily established due to the fact that the diagonal entries that correspond to the original (non-virtual) nodes in the strongly connected component are nonzero (it is sufficient for at least one of them to be nonzero). B will be positive with minimum entry greater or equal to cmin ≡(cid:16) 1D+ To prove the second part of the proposition (i.e., for (cid:96) ≥ n(¯τ + 1), the first n rows of matrix ), notice that for (cid:17)n(¯τ +1) max (cid:96) = n(¯τ + 1) we can write B as B = BinBin−1...Bi2 Bi1 , (cid:125) (cid:124) (cid:123)(cid:122) B(cid:48) where each Bim is the product of ¯τ + 1 consecutive P , i.e., Bim = P [k + m(¯τ + 1)] . . . P [k + (m − 1)(¯τ + 1) + 2]P [k + (m − 1)(¯τ + 1) + 1] . From the discussion on indecomposability, we know that each Bim has blocks B(im) B(im) 0,¯τ 0,1 , ..., corresponds to a graph that includes the such that the zero/nonzero structure of B(im) 0,0 0,0 , B(im) original strongly connected graph of size n and has a positive diagonal. Thus, the product of n − 1 such blocks will result in a strictly positive diagonal block for matrix B(cid:48). An additional multiplication by Bi1 on the right, will ensure that each of the top ¯τ + 1 blocks of matrix B will be strictly positive. Since B involves the product of n(¯τ + 1) nonnegative matrices P (whose minimum nonzero entry is 1D+ max ), the minimum entry in B will be greater or equal to cmin. For (cid:96) = n(¯τ + 1) + 1, we have a matrix product of the form BP [k + 1], where B is the product of n(¯τ + 1) matrices P (thus, its top n rows are strictly positive with minimum entry cmin). Since P [k +1] is a column stochastic matrix, we can easily conclude that matrix BP [k +1] will also have its top n rows positive with minimum entry cmin. The claim in the second part of the proposition (that, for (cid:96) ≥ n(¯τ + 1), the first n rows of matrix B will be positive with minimum entry greater or equal to cmin), then follows easily by induction. Proof of Theorem 2: If we use the augmented graph representation with initial conditions ¯y[0] = [yT 0 0 0 . . . 0]T and ¯z[0] = [1T 0 0 . . . 0]T , we can write ¯y[k] = P [k] . . . P [2]P [1] ¯z[k] = P [k] . . . P [2]P [1] (cid:125) (cid:125) ¯y[0] , ¯z[0] . (cid:124) (cid:124) (cid:123)(cid:122) (cid:123)(cid:122) Bk Bk By Proposition 1 and Wolfowitz's Theorem, we know that for any  > 0, the resulting word Bk satisfies (for k ≥ ν()) Bk = cBk 1T + Ek, where cBk is an appropriate nonnegative vector, and Ek is an error matrix with entries with absolute value smaller than /2 (i.e., Ek(j, i) < /2 for all j, i). Taking k to also satisfy k ≥ n(¯τ + 1), it follows from Proposition 1 that each of the first n entries of cBk (i.e., the entries that correspond to non-virtual nodes) will be greater than cmin. Without loss of generality, we take  < 2cmin in the remainder of this discussion. With the above notation at hand, we have for vj ∈ V µj[k] (cid:44) ¯yj[k] ¯zj[k] = Bk(j, :)¯y[0] Bk(j, :)¯z[0] = cBk(j)(1T + eT cBk(j)(1T + eT k )¯y[0] k )¯z[0] = (1T + eT (1T + eT k )¯y[0] k )¯z[0] , where cBk(j) is the jth element of vector cBk, and eT and satisfies emax(k) ≡ maxi{ek(i)} < /2. k = Ek(j, :) is the jth row of matrix Ek Since ¯z[0] = 1 ≥ 0 (elementwise), the denominator of the above expression can be bounded n(1 − emax(k)) ≤ (1T + eT k )¯z[0] ≤ n(1 + emax(k)) . Similarly, assuming that (cid:80) (cid:80) l ¯yl[0] =(cid:80) l yl[0] > 0 (when (cid:80) l ¯yl[0] =(cid:80) l yl[0] < 0 or (cid:80) l ¯yl[0] = l yl[0] = 0 we can apply a similar analysis), we can bound the numerator of the above expression as where Σy =(cid:80) Σy − emax(k)Σy ≤ (1T + eT l ¯yl[0] =(cid:80) l yl[0] and Σy =(cid:80) l ¯yl[0] =(cid:80) k )¯y[0] ≤ Σy + emax(k)Σy , l yl[0]. Putting the above inequalities together, we obtain Σy − emax(k)Σy n(1 + emax(k)) ≤ µj[k] (cid:44) ¯yj[k] ¯zj[k] ≤ Σy + emax(k)Σy n(1 − emax(k)) , (cid:80) which can be relaxed (after some algebraic manipulations) to µ∗ − Mk ≤ µj[k] ≤ µ∗ + Mk, where µ∗ = . By Wolfowitz theorem, we can take k as large as necessary to make Mk arbitrarily small (by ensuring that  and thus is the exact average and Mk = µ∗ (Σy+Σy)emax(k) Σy(1−emax(k)) l yl[0] n emax(k)) is as small as desired). Example 2. Consider the directed network on the left of Figure 3 where each node vj chooses its self-weight and the weights of its outgoing links to be (1 + D+ j )−1 so that the weight matrix P is primitive column stochastic as shown on the right of the figure. Each node vj updates its information state xj[k] using equation (3), so that the information state for the whole network is given by x[k +1] = P x[k]. We first use the update formula (1) with y[0] = (−1 2 3 4 2)T ≡ y0 and no delays (¯τ = 0). Since the update matrix is column stochastic, iteration (3) for this network converges, but not necessarily to the average (as shown in Figure 4(a) the nodes do not even reach consensus). As suggested in [27], by simultaneously running two iterations y[k] and z[k] (using the weights in matrix P ) with initial conditions y[0] = y0 and z[0] = 1, respectively, then average consensus is asymptotically reached for the ratio yj[k]/zj[k] (see Figure 4(b)). We now consider delays by taking the maximum allowable delay to be ¯τ = 5. At each link at each time instant, the delay is an integer in {0, 1, 2, ..., 5} (in our simulations each possible delay is chosen with probability 1/6). If we run our update formula (as in (5)) for the network in Figure 3 with weights P and x[0] = y0, the algorithm does not converge (see Figure 5(a)). However, if we run ratio consensus in (7) -- (8) with initial conditions y[0] = y0 and z[0] = 1  P =  0 0 1/3 1/3 1/3 0 1/3 1/3 1/2 0 0 0 1/3 1/2 0 0 1/2 0 0 0 1/3 1/2 1/3 0 1/3 Fig. 3. A simple digraph of five nodes when the links do not experience any delays. (a) The iteration of (1) for the network in Figure 3 does not lead to average consensus (not even consensus) for the digraph, since P is not a doubly stochastic matrix. (b) By running ratio consensus in (7) -- (8) with appropriate initial conditions, average consensus is reached (no delays are introduced yet, i.e., ¯τ = 0). Fig. 4. Iteration (3) converges but does not reach consensus (left). By simultaneously running two iterations y[k] and z[k] (using the weights in matrix P ) with initial conditions y[0] = y0 and z[0] = 1, respectively, then average consensus is asymptotically reached for the ratio yj[k]/zj[k] (right). respectively, then average consensus is asymptotically reached for the ratio yj[k]/zj[k] (Figure 5(b)). This demonstrates the validity of our theoretical analysis, both in the sense that each of the individual iterations does not convergence and also in the sense that the ratios converge to the average of the initial values. It is obvious from the simulations that the convergence speed of the algorithm depends on the delays (e.g., longer delays should result in slower convergence of the algorithm). Our discussion did not characterize the worst-case combination of delays but, nevertheless, the final average value is not affected by the particular realization of delays. v1v2v3v4v51/31/31/21/21/31/31/31/31/31/21/21/31/302468101214161820−1−0.500.511.522.533.54Values at each node vs Number of iterationsNumber of iterationsValue at each node02468101214161820−1−0.500.511.522.533.54Ratio at each node vs Number of iterationsNumber of iterationsRatio at each node (a) The update rule (5) does not converge for the digraph, due to the presence of delays. (b) By running ratio consensus in (7) -- (8) with appropriate initial conditions, we can reach average consensus even in the presence of delays. Fig. 5. The update formula in (5) for the network on the left of Figure 3 with weights P and x[0] = y0, does not converge (left); however, if we run ratio consensus in (7) -- (8) with initial conditions y[0] = y0 and z[0] = 1 respectively, then average consensus is asymptotically reached for the ratio yj[k]/zj[k] (right). To gain additional insight into the problem, we also consider the convergence of node 1 under (i) different upper bounds in delays (see left of Figure 6 where delays are equally likely as before), and (ii) varying network size (see right of Figure 6 where random geometric graphs of different sizes are used and ¯τ = 5 with delays being equally likely as before). It is obvious from the simulations that the convergence speed of the algorithm depends on the delays (e.g., longer delays result in slower convergence). Nevertheless, for fixed ¯τ it appears that the size of the network has no effect on the convergence time (at least for geometric graphs). Fig. 6. Convergence of the ratio at node 1 for different upper bound ¯τ on delays (left) and different network sizes (right). 05101520253035404550−1−0.500.511.522.533.54Values at each node vs Number of iterationsNumber of iterationsValue at each node05101520253035404550−1−0.500.511.522.533.54Ratio at each node vs Number of iterationsNumber of iterationsRatio at each node0102030405060708090100−101234(cid:53)(cid:68)(cid:87)(cid:76)(cid:82)s at node 1 vs Number of iterationsNumber of iterationsRatios at node 1 τ = 0τ = 5τ = 10τ = 15τ = 200510152025303540−2−1.5−1−0.500.511.5(cid:53)(cid:68)(cid:87)(cid:76)(cid:82)s at node 1 vs Number of iterationsNumber of iterationsRatio at node 1 n=10n=20n=30n=50n=100 Remark 1. In [14], [35], the following update formula is suggested (cid:88) vi∈N − j xj[k + 1] = p(cid:48) jjxj[k] + jixi[k − dji[k]] , p(cid:48) k = 0, 1, 2, . . . (11) ji form a doubly stochastic weight matrix P (cid:48) = [p(cid:48) where x[0] = y0, the weights p(cid:48) ji] and dji[k] is chosen so that node vj uses in its update the most recently seen value from node vi (i.e., dji[k] = minτji[k−t]=t,0≤t≤¯τ{t}). Since the weight matrix P (cid:48) = [p(cid:48) is doubly stochastic, we know that in the absence of delays the iteration in (11) would reach asymptotic average ji] ∈ Rn×n + consensus. The iteration also reaches consensus in the presence of delays (regardless of the delays introduced, as long as they are bounded [35]), but not necessarily to the exact average of the initial values. The value the nodes converge to depends on the specific delays that are introduced during the execution of the iteration. V. HANDLING CHANGING INTERCONNECTIONS In this section, we extend the previous setting to include time-varying communication links (in addition to bounded delays on each link). We assume that we have a time-varying digraph, in which the set of nodes is fixed but the communication links can change, i.e., at time step k the interconnections between components in the multi-component system are captured by a digraph G[k] = (V,E[k]). For the analysis below, we let ¯G = {G1,G2, . . . ,Gν}, ν ≤ 2n2−n, be the set of all possible digraphs3 defined for a given set of nodes V. We start our analysis by considering the simplest case where we have changing interconnection topology without delays and assuming that each node knows its (instantaneous) out-degree at that particular time instant. We start with the assumptions below (some of these assumptions are relaxed later on). Assumptions 2. For the analysis below, the interconnection topology is described by a sequence of digraphs G[1], G[2], . . ., G[k], . . ., of the form G[k] = (V,E[k]). 3Each of the n nodes may be connected (out-going link) with up to (n − 1) other nodes. As a result, we have n(n − 1) possible links, each of which can be either present or not. Hence, we have 2n(n−1) possible graph combinations. Of course, depending on the underlying application, some of these interconnection topologies may be unrealizable. (B1) At each time instant k, each node vj knows the number of nodes receiving its message (i.e., the number of its out-neighbors D+ j [k]). (B2) There exist no delays in the delivery of messages. (B3) We can find an infinite sequence of times t0, t1, . . . , tm, ..., where t0 = 0, 0 < tm+1 − tm ≤ (cid:96) < ∞, with the property that for any m ∈ Z+ the union of graphs G[tm],G[tm + 1], . . . ,G[tm+1 − 1] is strongly connected. Remark 2. Assumption (B1) requires that the transmitting node knows the number of nodes receiving its messages at each time instant. In an undirected graph setting, this is not too difficult; in a digraph setting, this is not as straightforward but there are many ways in which knowledge of the out-degree might be possible. For example, there can be an acknowledgement signal (ACK) via a distress signal (special tone in a control slot or some separate control channel) sent at higher power than normal so that it is received by transmitters in its vicinity [36]. Knowledge of the out-degree is also possible if the nodes periodically perform checks to determine the number of their out-neighbors (e.g., by periodically transmitting the distress signals mentioned above). As we discuss later, at the cost of little additional complexity, the nodes can also handle situations where they learn their out-degree with some delay. Assumption (B2) is made to keep things simple and is relaxed later. Assumption (B3) stems from the fact that we require that there exists paths between any pair of nodes infinitely often. In its general form, each node updates its information state according to the following relation: (cid:88) vi∈N − j [k] xj[k + 1] = pjj[k]xj[k] + xj←i[k] , k = 0, 1, . . . (12) where xj←i[k] (cid:44) pji[k]xi[k] is the information sent from node vi to node vj at time step k, and xj[0] ∈ R is the initial state of node vj. Since the out-degree is known at the transmitting node, j [k] ∪ {vj} (this each node vj can easily set the (positive) weights plj[k] = l=1 plj[k] = 1 for all vj ∈ V but more generally, as in the case of a fixed topology, each node only needs to ensure that the weights on its out-going links are positive choice satisfies (cid:80)n for vl ∈ N + 1 1+D+ j [k] and sum to unity). Note that unspecified weights in P [k] are set to zero and correspond to pairs of nodes (vl, vj) that are not connected at time step k, i.e., plj[k] = 0, for all (vl, vj) /∈ E[k], l (cid:54)= j. If we let x[k] = (x1[k] x2[k] then (12) can be . . . xn[0])T ≡ xT 0 . written in matrix form as x[k + 1] = P [k]x[k], where x[0] = (x1[0] x2[0] Note that, with the specific choice of matrix P [k] (based on the out-degree of each node as . . . xn[k])T and P [k] = [pji[k]] ∈ Rn×n + described above), the matrices P [k] are column stochastic and have strictly positive elements on their diagonal. This fact will be important in our proof later on which utilizes Theorem 1 on a particular set of matrices. Remark 3. Throughout the operation of the algorithm, communication links can be initiated or terminated by either (a) the receiving node, or (b) the transmitting node. Possible communication protocols to perform these tasks are described briefly below. (a) When node vl wants to receive messages from node vj (e.g., because it is in the neighborhood of vj), it can send a distress signal to pass this request to vj (alternatively, node vl can send the message to node vj using some path in the digraph or using some sort of flooding scheme). When node vj receives the request from vl, it sends an acknowledgement packet (directly to node vl) and the communication link is initiated. In practice, this might not necessarily require node vj to transmit a separate package to node vl (e.g., in a wireless broadcast setting) or to transmit at a higher power (e.g., if vl is already in its range); however, it does imply that node vj will adjust its self-weight and the weights plj, vl ∈ N + j , on the links to its out-neighbors in order to ensure that column stochasticity is preserved. If, on the other hand, node vl wants to terminate the communication link, it sends (or broadcasts if there exists a single communication channel and the message cannot be specifically directed to node vj) a distress signal destined for node vj (alternatively, it can use a flooding-like strategy via the paths in the digraph); as soon as node vl receives an acknowledgement from node vj along with the latest message with values for the last update, then the link can be terminated. If node vl does not receive the acknowledgement message from node vj the link remains active. (b) Note that if the transmitting node vj wants to terminate a communication link to node vl, it is enough to simply initiate such a request to node vl (since a direct link is available). Lemma 2. Consider a sequence of graphs of the form G[k] = (V,E[k])), k = 0, 1, 2, ..., such that there exists an infinite sequence of time instants t0, t1, . . . , tm, . . ., where t0 = 0, 0 < tm+1−tm ≤ (cid:96) < ∞, m ∈ Z+, with the property that for any m ∈ Z+ the union of graphs G[tm],G[tm + 1], . . . ,G[tm+1 − 1] is strongly connected. Let yj[k], ∀vj ∈ V, be the result of iteration (12) with j [k] ∪ {vj} (zeros otherwise) and initial conditions y[0] = y0, and plj[k] = j [k] ∪ {vj} let zj[k], ∀vj ∈ V, be the result of iteration (12) with plj[k] = (zeros otherwise) and with initial condition z[0] = 1. Then, the solution to the average consensus for vl ∈ N + for vl ∈ N + 1 1+D+ j [k] 1 1+D+ j [k] (cid:80) problem in the presence of dynamically changing topologies can be obtained as lim k→∞ µj[k] = v(cid:96)∈V y0((cid:96)) V , ∀vj ∈ V , where µj[k] = yj[k] zj[k] . Proof: Let P tm+1−tm (cid:44) P [tm+1 − 1]P [tm+1 − 2] . . . P [tm]. Since the union of graphs from time instant tm until tm+1− 1, i.e., the set of graphs G[tm],G[tm + 1], . . . ,G[tm+1− 1], is strongly connected and each matrix involved in the product has strictly positive elements on the diagonals, matrix P tm+1−tm is SIA for m ∈ Z+. Furthermore, products of matrices of the form P tm+1−tm are SIA (since each such matrix has positive elements on its diagonal, the product of such matrices will have a positive entry at its (j, i) position if at least one of the matrices has a positive element at its (j, i) position; hence, the zero/nonzero structure of the product will correspond to strongly connected graph). Hence, according to Theorem 1, for any  > 0, there exist a finite integer ν() ∈ N, such that a finite word W given by the product of a collection of ν stochastic matrices of the form P tm+1−tm has all of its columns approximately the same, i.e., 1T + E, where cWν is a nonnegative column vector P tk+ν−tk+ν−1 . . . P tk+2−tk+1P tk+1−tk = cWν and matrix E has entries that are bounded in absolute value by /2. From this point onwards, the proof continues as in the proof of Theorem 2. A. Changing interconnection topology with communication delays Assumptions 3. In the presence of delays, we make the following extra assumption: (C1) There exists a finite ¯τ that uniformly bounds the delay terms, i.e. τji[k] ≤ τ ji ≤ τ; this is the same as in assumption (A2). In this case, each node updates its information state according to the following iteration: xj[k + 1] = pjj[k]xj[k] + xj←i[k − r]Ik−r,ji[r] , k = 0, 1, 2, . . . (13) ¯τ(cid:88) (cid:88) r=0 vi∈N − j [k−r] where xj←i[k − r] (cid:44) pji[k − r]xi[k − r] is the value sent from node vi to node vj at time step k − r that occurs delay r, xj[0] ∈ R is the initial value of node vj, and the values pji[k] ≥ 0 depend on the topology of the graph at time k. To handle delays in a network of n = V nodes, we introduce ¯τ n nodes (for a total of (¯τ +1)n nodes) so that we can write where (as before) with x[k + 1] = P [k]x[k] ,  P [k] (cid:44) P0[k] P1[k] ... P¯τ−1[k] P¯τ [k] In×n 0 0 ... 0 0 In×n ... 0 0 ··· ··· ... ··· ··· x[k] =(cid:0)xT [k] x(1)[k] . . . x(¯τ )[k](cid:1)T (cid:16) (cid:17) x(r)[k] = x(r) 1 [k] . . . x(r) n [k] , r = 1, 2, . . . ¯τ . (14) (15)  , 0 0 ... In×n 0 , As before, P0[k], P1[k], . . . , P¯τ [k] are appropriately defined nonnegative matrices, such that ¯τ(cid:88) P [k] = Pr[k], i.e., the sum P [k] of all the nonnegative matrices Pr[k], r ∈ {0, 1, 2, . . . , ¯τ}, gives the weights of the zero-delay interconnection topology at time instant k. The difference from the case when only r=0 delays are present in the network is that the interconnection topology is dynamically changing and the weights at each time instant might differ (mathematically, this means that the left matrix in the above equation changes with k). The proposed protocol is able to asymptotically reach average consensus, as stated in Lemma 3 below. The proof is similar to the proof for delays with no changes in the interconnection topology and is omitted. Lemma 3. Consider a sequence of graphs of the form G[k] = (V,E[k])), k = 0, 1, 2, ..., such that there exists an infinite sequence of time instants t0, t1, . . . , tm, . . ., where t0 = 0, 0 < tm+1−tm ≤ (cid:96) < ∞, m ∈ Z+, with the property that for any m ∈ Z+ the union of graphs G[tm],G[tm + 1], . . . ,G[tm+1 − 1] is strongly connected. Let yj[k] for all vj ∈ V be the result of iteration (13) j [k] ∪ {vj} (zeros otherwise) and initial conditions y[0] = y0, with plj[k] = j [k]∪{vj} and let zj[k], ∀vj ∈ V, be the result of iteration (12) with plj[k] = (zeros otherwise) and with initial condition z[0] = 1. The indicator function Ik,ji captures the bounded delay τji[k] on link (vj, vi) at iteration k (as defined in (6), τji[k] ≤ ¯τ). Then, the solution to the average consensus problem can be asymptotically obtained as lim k→∞ µj[k] = for vl ∈ N + 1 1+D+ j [k] for vl ∈ N + 1 1+D+ j [k] (cid:80) vl∈V y0(l) V , ∀vj ∈ V , where µj[k] = yj [k] zj [k]. We now discuss the case in which a node, say node vj, receives an indication (e.g., an j [k− 1], no longer receives acknowledgement message) that one of its out-neighbors, say vl ∈ N + its transmissions. In other words, node vl /∈ N + j [k] but node vj finds out about it with some bounded delay that we denote by Tlj[k]. Such bounded delays could arise from communication protocols in a variety of ways, e.g., when using periodic acknowledgement signals like the distress signals discussed in Remark 3. Another way for node vj to discover that its out-degree has changed is by using acknowledgement signals that arrive at node vj through paths in the network that connect the out-neighbors of node vj to node vj (note that a direct link between an out-neighbor of node vj and node vj may not necessarily exist in a digraph). We use Tlj[k] ≤ T < ∞ to denote the time it takes for node vj to realize that node vl is no longer in the set N + j [k]. The problem that node vj has to address at time k + Tlj[k] when it realizes that, at time steps k, k + 1, . . . , k + Tlj[k− 1], it erroneously assumed an out-degree D+ je that (supposing no other changes) was greater than the true out-degree D+ j , is that the weighted message from node vj that was not eventually conveyed to the out-neighbor vl (because the link was terminated) needs to be accounted for. The most straightforward way to reconcile this is to add these values back to node vj. This can be done easily as long as node vj keeps track of the messages it has recently transmitted -- within the last T steps -- to its out-neighbors. Note, however, that node vj has to track these messages for each of its perceived out-neighbors, because if more than one out-neighbors terminate their links with vj (possibly at different time steps), then node vj must know what needs to be added back to its own value for each such former out-neighbor. One way to think about this in terms of the augmented digraph is that node vj adds, for each of its perceived out-neighbors, T "virtual" nodes that loop back to itself. These virtual nodes essentially keep track of the values that have been sent to each out-neighbor in the last T steps. The following example discusses this issue in more detail. Consider, for example, node vj with two out-neighbors (D+ j = 2) shown in Figure 7(a). Suppose that the maximum delay required for an acknowledgement signal from any out-neighbor of node vj is 2 (i.e., T = 2). Then, the model for the part of the network consisting of node vj and its out-neighbors vl1, vl2 is as shown in Figure 7(a). Suppose now that out-neighbor vl2 terminates the link vl2 ← vj and node vj receives an ACK with delay 2. This means that node vj erroneously considered an out-degree of 2 (instead of 1) for the last 2 updates. In this model, the message is passed through the two extra "virtual" nodes (added in a self-loop), allowing us to loop the weighted message back to node vj (see Figure 7(b)). Therefore, node vj is able to recover the lost values (sent to node vl2 that is no longer an out-neighbor). It is worth pointing out at this point that, unlike the previous case of fixed interconnections with bounded delays, the virtual nodes are no longer simply a question of modeling; in fact, in this example, we have to ensure that node vj essentially implements the functionality of the virtual buffers (by remembering the messages that it has sent to its out-neighbors. Example 3. Consider the simple network with 3 nodes in Figure 8 and the following scenario: at instant k1 the network of the three nodes has no delays or interconnection topology changes; (a) A node vj and its two out-neighbors. The maximum delay required for an acknowledgement signal from the out- neighbors of node vj is 2. (b) A model in which node vj directs the weighted messages of the links that no longer exist as delayed information to itself. In this example, node vl2 terminated the link and the ACK arrived at node vj with maximum delay 2. Fig. 7. The weighted messages from node vj that were not conveyed to the out-neighbor vl2 (because the link was terminated) are added back to the value of node vj. at time instant k2, link v3 ← v1 terminates, and an acknowledgement is sent to node v1 via node v2, from which there exists a link to node v1. In addition, any message from v2 to v1 can be delayed by at most 1 iteration. For simplicity, we assume that the delays in all other links Fig. 8. A model in which link v3 ← v1 terminates, and an acknowledgement is send to node v1 via node v2, from which there exists a direct link to node v1. In addition, the message from v2 to v1 is delayed by 1. are zero and the connection with link v2 cannot be lost; hence, no additional loops need to be inserted. Taking x[k] = (x1[k] x2[k] x3[k] x(1) 3 [k])T , the matrix representations 1 [k] x(1) 3 [k] x(2) vl1vl2vjpl1jpl2jpjjv(1)l1v(2)l11pl1jpl1j1v(1)l2v(2)l21pl2jpl2j1vl1vl2vjpl1jpl2jpjjv(1)l1v(2)l11pl1jpl1j1v(1)l2v(2)l21pl2jpl2j1v2v3v1p21p23p31p12p11p22p33v(1)3v(2)31p31p311v(1)11p12 at time instances k1 and k2 are captured by P [k1] =  p11 p12 0 1 1 p21 p22 p23 0 0 p31 0 0 0 0 0 0 0 p33 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0  , P [k2] =  p11 0 0 p21 p22 p23 0 0 0 p31 0 p33 p12 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0  . In the general case, in a network of n = V nodes, we introduce max(τ n, T n) nodes (for a total of (max(τ n, T n) + n) nodes) and we proceed as in (14). Remark 4. There are also cases in which the transmitting node vj may not have knowledge of its out-degree at time instant k. Such situations can also be handled if, at each time instant k, node vj (i) knows the number of nodes with which it has established a communication link in the past and have not been officially terminated yet, and (ii) is able to multicast a table of values to each of these out-neighbors. One way to do this is to employ the communication protocol proposed in [37] where, at each time instant, each node vj broadcasts its own state (as updated via the iterations in equation (12)), as well as the sum of all the values, called the total mass in [37], that have been broadcasted to each neighboring node vl ∈ N + j so far. If, for any reason, some messages are lost (dropped) or the communication link disappears for some time-period, the total mass will enable the receiving out-neighbor to retrieve the information of the lost messages, with some time-delay. Thus, even though the communication links may not be reliable and can even change, the problem boils down to dealing with delayed information (as in Section IV). Note, however, that each node vj needs to keep track of its own current state, the total mass transmitted to each neighboring node vl ∈ N + j [k] (the total mass can be different for each node vl due to, for example, newly established communication links), and the total mass received from each neighboring node vi ∈ N − j [k] that transmits information to node vj. Since different information might need to be transmitted to each node vl at each time instant k, node vj is required to broadcast a table of values with entries for each receiving node. Example 4. We illustrate how the algorithm operates via a small network of six nodes. Each j [k])−1 (such that the sum of all weights plj[k], vl ∈ N + node vj chooses its self-weight and the weight of its outgoing links at each time instant k to be (1 + D+ j [k] ∪ {vj}, assigned by each node vj to links to its out-neighbors at time step k is equal to 1). First, suppose the nodes experience only changes in interconnection topology but no delays. When each node updates its information state xj[k] using equation (12), the information state for the whole network is given by x[k + 1] = P [k]x[k], where P [k] depends on the links present at time instant k. For example, at time instants k = k1 and k = k2, whose interconnection topologies are captured by the graphs in Figures 9(a) and 9(b), matrices P [k1] and P [k2], respectively, are given by  P [k1] = 1/4 1/2 0 1/4 1/2 1/4 1/4 1/4 0 0 0 0 0 0 0 0 0 1/2 0 0 0 0 0 0 1/3 1/4 1/4 1/2 0 0 1/2 1/3 1/4 1/2 0 1/3  , P [k2] =   . 1/3 1/3 0 1/3 1/3 1/5 1/3 0 1/5 0 0 0 1/3 1/5 1/2 1/2 0 0 0 0 0 0 0 0 0 1/5 0 1/2 1/2 1/5 1/2 0 1/2 0 0 0 We use twice the update formula (12) with initial conditions y[0] = (−1 1 2 3 4 3)T and z[0] = 1T respectively. In our simulations, we generate at each iteration a new random graph with six nodes that includes a directed link (vj, vi) from node vi to node vj (vi, vj ∈ V , vi (cid:54)= vj) with some probability p independently between different links. Note that once the graph is chosen at iteration k, the update matrix P [k] will be column stochastic. A realization of the ratios at each node is shown in Figure 10(a); in this case, the average is 2. When delays are present with maximum delay ¯τ = 5 we use the update formula (13) with the same initial conditions and we observe that the system again converges to the exact average (as shown in Figure 10(b)), but with a slower convergence. Remark 5. In many settings, it might be more natural for the communication protocol to allow the receiver to set the weights of the incoming values, since it is easier for each receiving node to know from which (and how many) nodes it has received a message. Indeed, consensus in multi- (a) Connections and weights at instant k1. (b) Connections and weights at instant k2. Fig. 9. A network of six nodes, where each node vj chooses its self-weight and the weight of the links to its out-neighbors to be (1 + D+ j [k])−1. (a) Ratios at each node for changing interconnection topol- ogy and no delays. (b) Ratios at each node for changing interconnection topol- ogy with delays. Fig. 10. We use twice the update formula (12) with initial conditions y[0] = (−1 1 2 3 4 3)T and z[0] = 1T respectively, and plot the ratio yj[k]/zj[k] for each node vj under changing interconnection topology but no delays (left). When delays are present with maximum delay ¯τ = 5 we use the update formula (13) with the same initial conditions and observe that the ratios again converge to the average, but with a slower convergence (right). agent systems in digraphs in the presence of changing interconnection topology and time-varying delays have been studied in [17], which provided sufficient conditions for the multi-agent system to reach consensus when using a protocol that relies on a single iteration and uses weights that v1v2v3v4v5v61/41/41/21/21/31/21/41/21/41/41/41/41/21/21/31/3v1v2v3v4v5v61/31/51/21/21/21/31/31/41/31/31/51/51/51/51/21/21/2051015202530−1−0.500.511.522.533.54Values at each node vs Number of iterationsNumber of iterationsValue at each node051015202530−1−0.500.511.522.533.54Values at each node vs Number of iterationsNumber of iterationsValue at each node form a row stochastic matrix (compared to the two iterations and weights that form column stochastic matrices proposed in this paper). Event though [17] reaches consensus, it does not necessarily reach consensus to the exact average of the initial values of the nodes; in fact, the value to which this approach (and others that rely on a single iteration and weights that form row stochastic matrices) converge depends on the delay magnitude and profile. Technically, our approach relies on weak convergence of the backward product of column stochastic matrices whereas [17] and others rely on strong convergence of the backward product of row stochastic matrices (which is equivalent to a forward product of column stochastic matrices4). This means that in approaches that depend on row stochastic matrices the product of matrices converges to a rank one matrix (which would have to be equal to 1 n 11T if convergence to the average of the initial values is desirable); on the contrary, in the proposed approach we do not have convergence of the product but we have instead weak convergence to rank one matrices. This means that for a large number of iterations, each matrix product gets closer to a rank one matrix but this rank one matrix is not necessarily the same for each iteration step. However, by running two iterations and focusing on the ratio of the two iteration values, we exploit weak convergence and are able to obtain the exact average. VI. CONCLUSIONS In this paper, we studied distributed strategies for a discrete-time networked system to reach asymptotic average consensus in the presence of time-delays and dynamically changing topolo- gies. By assuming that nodes in the multi-agent system have knowledge of their out-degree (i.e., the number of nodes to which they send information to) and by modeling the time-delays using an augmented graphical model, we have shown that our proposed discrete-time strategy reaches asymptotic average consensus in a distributed fashion, in the presence of dynamically changing interconnection topology for whatever the realization of delays, as long as they are bounded and the union graph of the graph topologies over consecutive time intervals forms a strongly 4Note that weak and strong convergence are equivalent for forward products of column stochastic matrices (see Theorem 4.17 in the book of Seneta "Non-negative Matrices and Markov Chains"). connected graph infinitely often. REFERENCES [1] C. N. Hadjicostis and T. Charalambous, "Asynchronous coordination of distributed energy resources for the provisioning of ancillary services," in Proceedings of 47th Annual Allerton Conference on Communication, Control, and Computing, Sep. 2011, pp. 1500 -- 1507. [2] R. Olfati-Saber, J. Fax, and R. Murray, "Consensus and cooperation in networked multi-agent systems," Proceedings of the IEEE, vol. 95, no. 1, pp. 215 -- 233, Jan. 2007. [3] A. Giridhar and P. R. Kumar, "Toward a theory of in-network computation in wireless sensor networks," IEEE Communications Magazine, vol. 44, no. 4, pp. 98 -- 107, April 2006. [4] J. Tsitsiklis, D. Bertsekas, and M. Athans, "Distributed asynchronous deterministic and stochastic gradient optimization algorithms," IEEE Transactions on Automatic Control, vol. 31, no. 9, pp. 803 -- 812, Sep. 1986. [5] R. Olfati-Saber and R. Murray, "Consensus problems in networks of agents with switching topology and time-delays," IEEE Transactions on Automatic Control, vol. 49, no. 9, pp. 1520 -- 1533, Sep. 2004. [6] W. Ren and R. Beard, "Consensus seeking in multiagent systems under dynamically changing interaction topologies," IEEE Transactions on Automatic Control, vol. 50, no. 5, pp. 655 -- 661, May 2005. [7] L. Moreau, "Stability of multiagent systems with time-dependent communication links," IEEE Transactions on Automatic Control, vol. 50, no. 2, pp. 169 -- 182, Feb. 2005. [8] D. Angeli and P. Bliman, "Stability of leaderless discrete-time multi-agent systems," Mathematics of Control, Signals, and Systems, vol. 18, no. 4, pp. 293 -- 322, July 2006. [9] P. Bliman and G. Ferrari-Trecate, "Average consensus problems in networks of agents with delayed communications," Automatica, vol. 44, no. 8, pp. 1985 -- 1995, Aug. 2008. [10] M. Franceschelli, A. Giua, and C. Seatzu, "A gossip-based algorithm for discrete consensus over heterogeneous networks," IEEE Transactions on Automatic Control,, vol. 55, no. 5, pp. 1244 -- 1249, May 2010. [11] A. D. Dom´ınguez-Garc´ıa and C. N. Hadjicostis, "Distributed strategies for average consensus in directed graphs," IEEE Transactions on Automatic Control, 2012 (to appear). [12] K. Cai and H. Ishii, "Average consensus on general digraphs," in Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, Dec. 2011, pp. 1956 -- 1961. [13] D. Varagnolo, G. Pillonetto, and L. Schenato, "Distributed parametric and nonparametric regression with on-line performance bounds computation," Automatica, vol. 48, no. 10, pp. 2468 -- 2481, October 2012. [14] L. Fang and P. Antsaklis, "Information consensus of asynchronous discrete-time multi-agent systems," in Proceedings of American Control Conference, June 2005, pp. 1883 -- 1888. [15] S. Patterson, B. Bamieh, and A. El Abbadi, "Distributed average consensus with stochastic communication failures," in Proceedings of the 46th IEEE Conference on Decision and Control, Dec. 2007, pp. 4215 -- 4220. [16] F. Fagnani and S. Zampieri, "Average consensus with packet drop communication," SIAM J. Control Optim., vol. 48, no. 1, pp. 102 -- 133, Feb. 2009. [17] F. Xiao and L. Wang, "State consensus for multi-agent systems with switching topologies and time-varying delays," International Journal of Control, vol. 79, no. 10, pp. 1277 -- 1284, Oct. 2006. [18] A. Nedic, A. Ozdaglar, and P. Parrilo, "Constrained consensus and optimization in multi-agent networks," IEEE Transactions on Automatic Control, vol. 55, no. 4, pp. 922 -- 938, April 2010. [19] A. Jadbabaie, J. Lin, and A. Morse, "Coordination of groups of mobile autonomous agents using nearest neighbor rules," IEEE Transactions on Automatic Control, vol. 48, no. 6, pp. 988 -- 1001, June 2003. [20] L. Xiao and S. Boyd, "Fast linear iterations for distributed averaging," Systems and Control Letters, vol. 53, no. 1, pp. 65 -- 78, Sep. 2004. [21] B. Johansson, M. Rabi, and M. Johansson, "A randomized incremental subgradient method for distributed optimization in networked systems," SIAM J. on Optimization, vol. 20, no. 3, pp. 1157 -- 1170, Aug. 2009. [22] F. Zanella, D. Varagnolo, A. Cenedese, G. Pillonetto, and L. Schenato, "Newton-Raphson consensus for distributed convex optimization," in Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, Dec. 2011, pp. 5917 -- 5922. [23] -- -- , "Asynchronous Newton-Raphson consensus for distributed convex optimization," in Proceedings of 3rd IFAC Workshop on Distributed Estimation and Control in Networked Systems (NecSys'12), Sep. 2012, pp. 133 -- 138. [24] B. Gharesifard and J. Cort´es, "Distributed strategies for making a digraph weight-balanced," in Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing, Sep. 2009, pp. 771 -- 777. [25] C. N. Hadjicostis and A. Rikos, "Distributed strategies for balancing a weighted digraph," in Proceedings of the Mediterranean Conference on Control and Automation, July 2012, pp. 1141 -- 1146. [26] B. Gharesifard and J. Cort´es, "When does a digraph admit a doubly stochastic adjacency matrix?" in Proceedings of the American Control Conference, July 2010, pp. 2440 -- 2445. [27] A. D. Dom´ınguez-Garc´ıa and C. N. Hadjicostis, "Coordination and control of distributed energy resources for provision of ancillary services," in Proceedings of the First IEEE International Conference on Smart Grid Communications, Oct. 2010, pp. 537 -- 542. [28] M. Franceschelli, A. Giua, and C. Seatzu, "Distributed averaging in sensor networks based on broadcast gossip algorithms," IEEE Sensors Journal, vol. 11, no. 3, pp. 808 -- 817, March 2011. [29] K. Cai and H. Ishii, "Average consensus on general strongly connected digraphs," Automatica, vol. 48, no. 11, pp. 2750 -- 2761, Nov. 2012. [30] F. B´en´ezit, V. Blondel, P. Thiran, J. Tsitsiklis, and M. Vetterli, "Weighted gossip: Distributed averaging using non-doubly stochastic matrices," in Proceedings of the IEEE International Symposium on Information Theory, June 2010, pp. 1753 -- 1757. [31] D. Kempe, A. Dobra, and J. Gehrke, "Gossip-based computation of aggregate information," in Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, ser. FOCS '03, 2003, pp. 482 -- 491. [32] E. Seneta, Non-negative Matrices and Markov Chains, 2nd ed. New York, NY: Springer, 2006. [33] S. M. Amin and B. Wollenberg, "Toward a smart grid: Power delivery for the 21st century," IEEE Power and Energy Magazine, vol. 3, no. 5, pp. 34 -- 41, Sept.-Oct. 2005. [34] J. Wolfowitz, "Products of indecomposable, aperiodic, stochastic matrices," Proceedings of the American Mathematical Society, vol. 15, no. 5, pp. 733 -- 737, October 1963. [35] B. Lubachevsky and D. Mitra, "A chaotic asynchronous algorithm for computing the fixed point of a nonnegative matrix of unit spectral radius," Journal of the ACM, vol. 33, no. 1, pp. 130 -- 150, Jan. 1986. [36] N. Bambos, S. C. Chen, and G. J. Pottie, "Channel access algorithms with active link protection for wireless communication networks with power control," IEEE/ACM Transactions on Networking, vol. 8, no. 5, pp. 583 -- 597, May 2000. [37] N. H. Vaidya, C. N. Hadjicostis, and A. D. Dom´ınguez-Garc´ıa, "Robust average consensus over packet dropping links: Analysis via coefficients of ergodicity," in Proceedings of 51st IEEE Conference on Decision and Control, Dec. 2012, pp. 2761 -- 2766.
1603.00939
2
1603
2016-07-29T18:42:59
Routing Autonomous Vehicles in Congested Transportation Networks: Structural Properties and Coordination Algorithms
[ "cs.MA" ]
This paper considers the problem of routing and rebalancing a shared fleet of autonomous (i.e., self-driving) vehicles providing on-demand mobility within a capacitated transportation network, where congestion might disrupt throughput. We model the problem within a network flow framework and show that under relatively mild assumptions the rebalancing vehicles, if properly coordinated, do not lead to an increase in congestion (in stark contrast to common belief). From an algorithmic standpoint, such theoretical insight suggests that the problem of routing customers and rebalancing vehicles can be decoupled, which leads to a computationally-efficient routing and rebalancing algorithm for the autonomous vehicles. Numerical experiments and case studies corroborate our theoretical insights and show that the proposed algorithm outperforms state-of-the-art point-to-point methods by avoiding excess congestion on the road. Collectively, this paper provides a rigorous approach to the problem of congestion-aware, system-wide coordination of autonomously driving vehicles, and to the characterization of the sustainability of such robotic systems.
cs.MA
cs
Routing Autonomous Vehicles in Congested Transportation Networks: Structural Properties and Coordination Algorithms Rick Zhang,* Federico Rossi,* and Marco Pavone the same). Indeed, it has been argued that the presence of many rebalancing vehicles may contribute to an increase in congestion [6], [7]. These statements, however, do not take into account that in an AMoD system the operator has control over the actions (destination and routes) of the vehicles, and may route vehicles intelligently to avoid increasing congestion or perhaps even decrease it. 6 1 0 2 l u J 9 2 ] A M . s c [ 2 v 9 3 9 0 0 . 3 0 6 1 : v i X r a Abstract-This paper considers the problem of routing and rebalancing a shared fleet of autonomous (i.e., self-driving) vehicles providing on-demand mobility within a capacitated trans- portation network, where congestion might disrupt throughput. We model the problem within a network flow framework and show that under relatively mild assumptions the rebalancing vehicles, if properly coordinated, do not lead to an increase in congestion (in stark contrast to common belief). From an algorithmic standpoint, such theoretical insight suggests that the problem of routing customers and rebalancing vehicles can be decoupled, which leads to a computationally-efficient routing and rebalancing algorithm for the autonomous vehicles. Numerical experiments and case studies corroborate our theoretical insights and show that the proposed algorithm outperforms state-of-the- art point-to-point methods by avoiding excess congestion on the road. Collectively, this paper provides a rigorous approach to the problem of congestion-aware, system-wide coordination of autonomously driving vehicles, and to the characterization of the sustainability of such robotic systems. I. INTRODUCTION Autonomous (i.e., robotic, self-driving) vehicles are rapidly becoming a reality and hold great promise for increasing safety and enhancing mobility for those unable or unwilling to drive [1], [2]. A particularly attractive operational paradigm involves coordinating a fleet of autonomous vehicles to pro- vide on-demand service to customers, also called autonomous mobility-on-demand (AMoD). An AMoD system may reduce the cost of travel [3] as well as provide additional sustainability benefits such as increased overall vehicle utilization, reduced demand for urban parking infrastructure, and reduced pollution (with electric vehicles) [1]. The key benefits of AMoD are realized through vehicle sharing, where each vehicle, after servicing a customer, drives itself to the location of the next customer or rebalances itself throughout the city in anticipation of future customer demand [4]. In terms of traffic congestion, however, there has been no consensus on whether autonomous vehicles in general, and AMoD systems in particular, will ultimately be beneficial or detrimental. It has been argued that by having faster reaction times, autonomous vehicles may be able to drive faster and follow other vehicles at closer distances without compromising safety, thereby effectively increasing the capacity of a road and reducing congestion. They may also be able to interact with traffic lights to reduce full stops at intersections [5]. On the downside, the process of vehicle rebalancing (empty vehicle trips) increases the total number of vehicles on the road (assuming the number of vehicles with customers stays *These authors contributed equally to this work. This research was supported by National Science Foundation under CA- REER Award CMMI-1454737 and by the Dr. Cleve B. Moler Stanford Graduate Fellowship. Rick Zhang, Federico Rossi, and Marco Pavone are with the Department of Aeronautics & Astronautics, Stanford University, Stanford, CA 94305 {rickz, frossi2, pavone}@stanford.edu Accordingly, the goal of this paper is twofold. First, on an engineering level, we aim to devise routing and rebalancing algorithms for an autonomous vehicle fleet that seek to mini- mize congestion. Second, on a socio-economic level, we aim to rigorously address the concern that autonomous cars may lead to increased congestion and thus disrupt currently congested transportation infrastructures. Literature review: In this paper, we investigate the problem of controlling an AMoD system within a road network in the presence of congestion effects. Previous work on AMoD systems have primarily concentrated on the rebalancing prob- lem [4], [3], whereby one strives to allocate empty vehicles throughout a city while minimizing fuel costs or customer wait times. The rebalancing problem has been studied in [4] using a fluidic model and in [8] using a queueing network model. An alternative formulation is the one-to-one pickup and delivery problem [9], where a fleet of vehicles service pickup and delivery requests within a given region. Combinatorial asymptotically optimal algorithms for pickup and delivery problems were presented in [10], [11], and generalized to road networks in [12]. Almost all current approaches assume point-to-point travel between origins and destinations (no road network), and even routing problems on road networks (e.g. [12]) do not take into account vehicle-to-vehicle interactions that would cause congestion and reduce system throughput. On the other hand, traffic congestion has been studied in economics and transportation for nearly a century. The first congestion models [13], [14], [15] sought to formalize the rela- tionship between vehicle speed, density, and flow. Since then, approaches to modeling congestion have included empirical [16], simulation-based [17], [18], [19], queueing-theoretical [20], and optimization [21], [22]. While there have been many high fidelity congestion models that can accurately predict traffic patterns, the primary goal of congestion modeling has been the analysis of traffic behavior. Efforts to control traffic have been limited to the control of intersections [23], [24] and freeway on-ramps [25] because human drivers behave non-cooperatively. The problem of cooperative, system-wide routing (a key benefit of AMoD systems) is similar to the dynamic traffic assignment problem (DTA) [22] and to [26], [27] in the case of online routing. The key difference is that these approaches only optimize routes for passenger vehicles while we seek to optimize the routes of both passenger vehicles and empty rebalancing vehicles. Statement of contributions: The contribution of this paper is threefold. First, we model an AMoD system within a network flow framework, whereby customer-carrying and empty rebal- ancing vehicles are represented as flows over a capacitated road network (in such model, when the flow of vehicles along a road reaches a critical capacity value, congestion effects occur). Within this model, we provide a cut condition for the road graph that needs to be satisfied for congestion-free customer and rebalancing flows to exist. Most importantly, under the assumption of a symmetric road network, we inves- tigate an existential result that leads to two key conclusions: (1) rebalancing does not increase congestion, and (2) for certain cost functions, the problems of finding customer and rebalancing flows can be decoupled. Second, leveraging the theoretical insights, we propose a computationally-efficient algorithm for congestion-aware routing and rebalancing of an AMoD system that is broadly applicable to time-varying, possibly asymmetric road networks. Third, through numerical studies on real-world traffic data, we validate our assumptions and show that the proposed real-time routing and rebalancing algorithm outperforms state-of-the-art point-to-point rebalanc- ing algorithms in terms of lower customer wait times by avoiding excess congestion on the road. Organization: The remainder of this paper is organized as follows: in Section II we present a network flow model of an AMoD system on a capacitated road network and formulate the routing and rebalancing problem. In Section III we present key structural properties of the model including fundamental limitations of performance and conditions for the existence of feasible (in particular, congestion-free) solutions. The insights from Section III are used to develop a practical real-time routing and rebalancing algorithm in Section IV. Numerical studies and simulation results are presented in Section V, and in Section VI we draw conclusions and discuss directions for future work. II. MODEL DESCRIPTION AND PROBLEM FORMULATION In this section we formulate a network flow model for an AMoD system operating over a capacitated road network. The model allows us to derive key structural insights into the vehi- cle routing and rebalancing problem, and motivates the design of real-time, congestion-aware algorithms for coordinating the robotic vehicles. We start in Section II-A with a discussion of our congestion model; then, in Section II-B we provide a detailed description of the overall AMoD system model. A. Congestion Model We use a simplified congestion model consistent with clas- sical traffic flow theory [13]. In classical traffic flow theory, at low vehicle densities on a road link, vehicles travel at the free flow speed of the road (imposed by the speed limit). This is referred to as the free flow phase of traffic. In this phase, the free flow speed is approximately constant [28]. The flow, or flow rate, is the number of vehicles passing through the link per unit time, and is given by the product of the speed and density of vehicles. When the flow of vehicles reaches an empirically observed critical value, the flow reaches its maximum. Beyond the critical flow rate, vehicle speeds are dramatically reduced and the flow decreases, signaling the beginning of traffic congestion. The maximum stationary flow rate is called the capacity of the road link in the literature. In our approach, road capacities are modeled as constraints on the flow of vehicles. In this way, the model captures the behavior of vehicles up to the onset of congestion. is not This simplified congestion model is adequate for our pur- poses because the goal to analyze the behavior of vehicles in congested networks, but to control vehicles in order to avoid the onset of congestion. We also do not explicitly model delays at intersections, spillback behavior due to congestion, or bottleneck behavior due to the reduction of the number of lanes on a road link. An extension to our model that accommodates (limited) congestion on links is presented in Section V-A. B. Network Flow Model of AMoD system We consider a road network modeled as a directed graph G = (V,E), where V denotes the node set and E ⊆ V × V denotes the edge set. Figure 1 shows one such network. The nodes v in V represent intersections and locations for trip origins/destinations, and the edges (u, v) in E represent road links. As discussed in Section II-A, congestion is modeled by imposing capacity constraints on the road links: each constraint represents the capacity of the road upon the onset of congestion. Specifically, for each road link (u, v) ∈ E, we denote by c(u, v) : E (cid:55)→ N>0 the capacity of that link. When the flow rate on a road link is less than the capacity of the link, all vehicles are assumed to travel at the free flow speed, or the speed limit of the link. For each road link (u, v) ∈ E, we denote by t(u, v) : E (cid:55)→ R≥0 the corresponding free flow time required to traverse road link (u, v). Conversely, when the flow rate on a road link is larger than the capacity of the link, the traversal time is assumed equal to ∞ (we reiterate that our focus in this section is on avoiding the onset of congestion). We assume that the road network is capacity-symmetric (or symmetric for short): for any cut1 (S, ¯S) of G(V,E), the overall capacity of the edges connecting nodes in S to nodes in ¯S equals the overall capacity of the edges connecting nodes in ¯S to nodes in S, that is (cid:88) (cid:88) c(u, v) = c(v, u) (u,v)∈E: u∈S, v∈ ¯S (v,u)∈E: u∈S, v∈ ¯S It is easy to verify that a network is capacity-symmetric if and only if the overall capacity entering each node equals the capacity exiting each node., i.e. c(u, v) = (cid:88) (cid:88) c(v, w) u∈V:(u,v)∈E w∈V:(v,w)∈E If all edges have symmetrical capacity, i.e., for all (u, v) ∈ E, c(u, v) = c(v, u), then the network is capacity-symmetric. The converse statement, however, is not true in general. Transportation requests are described by the tuple (s, t, λ), where s ∈ V is the origin of the requests, t ∈ V is the destination, and λ ∈ R>0 is the rate of requests, in customers per unit time. Transportation requests are assumed to be stationary and deterministic, i.e., the rate of requests does not change with time and is a deterministic quantity. The set of 1For any subset of nodes S ⊆ V, we define a cut (S, ¯S) ⊆ E as the set of edges whose origin lies in S and whose destination lies in ¯S = {V \ S}. Formally, (S, ¯S) := {(u, v) ∈ E : u ∈ S, v ∈ ¯S}. with transportation requests, i.e. to ensure that every outbound customer flow is matched by an inbound flow of rebalancing vehicles and vice versa. Finally, constraint (6) enforces the capacity constraint on each link (function 1x denotes the indicator function of the Boolean variable x = {true, false}, that is 1x equals one if x is true, and equals zero if x is false). Note that the CRRP is a linear program and, in particular, a special instance of the fractional multi-commodity flow problem [29]. We denote a customer flow {fm(u, v)}(u,v),m that satisfies Equations (2), (3), (4) and (6) as a feasible customer flow. For a given set of feasible customer flows {fm(u, v)}(u,v),m, we denote a flow {fR(u, v)}(u,v) that satisfies Equation (5) and such that the combined flows {fm(u, v), fR(u, v)}(u,v),m satisfy Equation (6) as a feasible rebalancing flow. We remark that a rebalancing flow that is feasible with respect to a set of customer flows may be infeasible for a different collection of customer flows. For a given set of optimal flows {f∗ m(u, v)}(u,v),m and {f∗ R(u, v)}(u,v), the minimum number of vehicles needed to implement them is given by  (cid:88) (cid:88) m∈M (u,v)∈E (cid:16) Vmin = t(u, v) ∗ m(u, v) + f ∗ R(u, v) f (cid:17) . This follows from a similar analysis done in [4] for point-to- point networks. Hence, the cost function (1) is aligned with the desire of minimizing the number of vehicles needed to operate an AMoD system. D. Discussion A few comments are in order. First, we assume that trans- portation requests are time invariant. This assumption is valid when transportation requests change slowly with respect to the average duration of a customer's trip, which is often the case in dense urban environments [30]. Additionally, in Section IV we will present algorithmic tools that allow one to extend the insights gained from the time-invariant case to the time-varying counterpart. Second, the assumption of single-occupancy for the vehicles models most of the existing (human) one-way vehicle sharing systems (where the driver is considered "part" of the vehicle), and chiefly disallows the provision of ride-sharing or carpooling service (this is an aspect left for future research). Third, as also discussed in Section II-A, our congestion model is simpler and less accurate than typical congestion models used in the transportation community. However, our model lends itself to efficient real- time optimization and thus it is well-suited to the control of fleets of autonomous vehicles. Existing high-fidelity conges- tion models should be regarded as complementary and could be used offline to identify the congestion thresholds used in our model. Fourth, while we have defined the CRRP in terms of fractional flows, an integer-valued counterpart can be defined and (approximately) solved to find optimal routes for each individual customer and vehicle. Algorithmic aspects will be investigated in depth in Section IV, with the goal of devising practical, real-time routing and rebalancing algorithms. Fifth, trip requests are assumed to be known. In practice, trip requests can be reserved in advance, estimated from historical data, or estimated in real time. Finally, the assumption of Fig. 1. A road network modeling Lower Manhattan and the Financial District. Nodes (denoted by small black dots) model intersections; select nodes, denoted by colored circular and square markers, model passenger trips' origins and destinations. Different trip requests are denoted by different colors. Roads are modeled as edges; line thickness is proportional to road capacity. transportation requests is denoted by M = {(sm, tm, λm)}m, and its cardinality is denoted by M. Single-occupancy vehicles travel within the network while servicing the transportation requests. We denote fm(u, v) : E (cid:55)→ R≥0, m = {1, . . . , M}, as the customer flow for requests m on edge (u, v), i.e., the amount of flow from origin sm to destination tm that uses link (u, v). We also denote fR(u, v) : E (cid:55)→ R≥0 as the rebalancing flow on edge (u, v), i.e., the amount of rebalancing flow traversing edge (u, v) needed to realign the vehicles with the asymmetric distribution of transportation requests. C. The Routing Problem The goal is to compute flows for the autonomous vehicles that (i) transfer customers to their desired destinations in minimum time (customer-carrying trips) and (ii) rebalance vehicles throughout the network to realign the vehicle fleet with transportation demand (customer-empty trips). Specifi- cally, the Congestion-free Routing and Rebalancing Problem (CRRP) is formally defined as follows. Given a capacitated, symmetric network G(V,E), a set of transportation requests M = {(sm, tm, λm)}m, and a weight factor ρ > 0, solve (cid:88) (u,v)∈E fm(·,·),fR(·,·) u∈V m∈M minimize (cid:88) subject to (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) u∈V u∈V u∈V = t(u, v)fm(u, v)+ρ t(u, v)fR(u, v) fm(u, sm) + λm = (1) fm(sm, w) ∀m ∈ M (2) fm(u, tm) = λm + fm(tm, w) ∀m ∈ M (3) (cid:88) (cid:88) w∈V w∈V (cid:88) (cid:88) w∈V m∈M (cid:88) m∈M fm(u, v) = fm(v, w) ∀m ∈ M, v ∈ V \ {sm, tm} fR(u, v) + 1v=tm λm w∈V fR(u, v) + fR(v, w) + (cid:88) m∈M 1v=sm λm ∀v ∈ V fm(u, v) ≤ c(u, v) ∀(u, v) ∈ E (4) (5) (6) (cid:88) (u,v)∈E The cost function (1) is a weighted sum (with weight ρ) of the overall duration of all passenger trips and the duration of rebalancing trips. Constraints (2), (3) and (4) enforce continuity of each trip (i.e., flow conservation) across nodes. Constraint (5) ensures that vehicles are rebalanced throughout the road network to re-align vehicle distribution capacity-symmetric road networks indeed appears reasonable for a number of major U.S. metropolitan areas (note that this assumption is much less restrictive than assuming every individual road is capacity-symmetric). In the Supplementary Material, by using OpenStreetMap data [31], we provide a rigorous characterization in terms of capacity symmetry of the road networks of New York City, Chicago, Los Angeles and other major U.S. cities. The results consistently show that urban road networks are usually symmetric to a very high degree. Additionally, several of our theoretical and algorithmic results extend to the case where this assumption is lifted, as it will be highlighted throughout the paper. III. STRUCTURAL PROPERTIES OF THE NETWORK FLOW MODEL In this section we provide two key structural results for the network flow model presented in Section II-B. First, we provide a cut condition that needs to be satisfied for feasible customer and rebalancing flows to exist. In other words, this condition provides a fundamental limitation of performance for congestion-free AMoD service in a given road network. Second, we investigate an existential result (our main theoretical result) that is germane to two key conclusions: (1) rebalancing does not increase congestion in symmetric road networks, and (2) for certain cost functions, the problems of finding customer and rebalancing flows can be decoupled – an insight that will be heavily exploited in subsequent sections. A. Fundamental Limitations (S, ¯S), the overall flow exiting a cut Fout(S, ¯S) :=(cid:80) m∈M(cid:80) i.e., Cout(S, ¯S) = (cid:80) We start with a few definitions. For a given set of feasible customer flows {fm(u, v)}(u,v),m, we denote by Fout(S, ¯S) i.e., u∈S,v∈ ¯S fm(u, v). Similarly, we de- note by Cout(S, ¯S) the capacity of the network exiting S, u∈S,v∈ ¯S c(u, v). Analogously, Fin(S, ¯S) denotes the overall flow entering S from ¯S, i.e., Fin(S, ¯S) := Fout( ¯S,S), and Cin(S, ¯S) denotes the capacity entering S from ¯S, that the arguments leading to the main result of this subsection (Theorem 3.4) do not require the assumption of capacity symmetry; hence, Theorem 3.4 holds for asymmetric road networks as well. i.e., Cin(S, ¯S) := Cout( ¯S,S). We highlight The next technical lemma (whose proof is provided in the Supplementary Material) shows that the net flow leaving set S equals the difference between the flow originating from the origins sm in S and the flow exiting through the destinations tm in S, that is, Lemma 3.1 (Net flow across a cut): Consider a set of fea- sible customer flows {fm(u, v)}(u,v),m. Then, for every cut (S, ¯S), the net flow leaving set S satisfies Fout(S, ¯S) − Fin(S, ¯S) = 1sm∈S λm − (cid:88) (cid:88) 1tm∈S λm. m∈M m∈M We now state two additional lemmas (whose proofs are given in the Supplementary Material) providing, respectively, lower and upper bounds for the outflows Fout(S, ¯S). Lemma 3.2 (Lower bound for outflow): Consider a set of feasible customer flows {fm(u, v)}(u,v),m. Then, for any cut (S, ¯S), the overall flow Fout(S, ¯S) exiting cut (S, ¯S) is lower bounded according to(cid:88) m∈M 1sm∈S,tm∈ ¯S λm ≤ Fout(S, ¯S). Lemma 3.3 (Upper bound for outflow): Assume there ex- feasible customer and rebalancing flows ists a set of {fm(u, v), fR(u, v)}(u,v),m. Then, for every cut (S, ¯S), 1) Fout(S, ¯S) ≤ Cout(S, ¯S), and 2) Fout(S, ¯S) ≤ Cin(S, ¯S). We are now in a position to present a structural (i.e., flow- independent) necessary condition for the existence of feasible customer and rebalancing flows. Theorem 3.4 (Necessary condition for feasible flows): A necessary condition for the existence of a set of feasible customer and rebalancing flows {fm(u, v), fR(u, v)}(u,v),m, is that, for every cut (S, ¯S), m∈M 1sm∈S,tm∈ ¯S λm ≤ Cout(S, ¯S), and m∈M 1sm∈S,tm∈ ¯S λm ≤ Cin(S, ¯S). Proof: The theorem is a trivial consequence of Lemmas 1) (cid:80) 2) (cid:80) 3.2 and 3.3. Theorem 3.4 essentially provides a structural fundamental limitation of performance for a given road network: if the cut conditions in Theorem 3.4 are not met, then there is no hope of finding congestion-free customer and rebalancing flows. We reiterate that Theorem 3.4 holds for both symmetric and asymmetric networks (for a symmetric network, claim 2) in Lemma 3.3 and condition 2) in Theorem 3.4 are redundant). B. Existence of Congestion-Free Flows In this section we address the following question: assuming there exists a feasible customer flow, is it always possible to find a feasible rebalancing flow? As we will see, the answer to this question is affirmative and has both conceptual and algorithmic implications. Theorem 3.5 (Feasible rebalancing): Assume there exists a set of feasible customer flows {fm(u, v)}(u,v),m. Then, it is always possible to find a set of feasible rebalancing flows {fR(u, v)}(u,v). Proof: We prove the theorem for the special case where no node v ∈ V is associated with both an origin and a destination for the transportation requests in M. This is without loss of generality, as the general case where a node v has both an origin and a destination assigned can be reduced to this special case, by associating with node v a "shadow" node so that (i) all destinations are assigned to the shadow node and (ii) node v and its shadow node are mutually connected via an infinite-capacity, zero-travel-time edge. We start the proof by defining the concepts of partial rebal- ancing flows and defective origins and destinations. Specifi- cally, a partial rebalancing flow, denoted as { fR(u, v)}(u,v), is a set of mappings from E to R≥0 obeying the following properties: 1) It satisfies constraint (5) at every node that is not an origin nor a destination, that is ∀ v ∈ {V \{{sm}m ∪{tm}m}}, fR(u, v) = fR(v, w). (cid:88) w∈V (cid:88) u∈V 2) It violates constraint (5) in the "≤ direction" at every node that is an origin, that is ∀ v ∈ V such that ∃m ∈ M : v = sm,(cid:88) fR(u, v) ≤ (cid:88) (cid:88) w∈V fR(u, v) + fR(v, w) + (cid:88) 1v=tm λm ≥ (cid:88) m∈M m∈M w∈V u∈V v = tm,(cid:88) u∈V 3) It violates constraint (5) in the "≥ direction" at every node that is a destination, that is ∀ v ∈ V such that ∃m ∈ M : 1v=sm λm. fR(v, w). 4) The combined customer and partial rebalancing flows {fm(u, v), fR(u, v)}(u,v),m satisfy Equation (6) for every edge (u, v) ∈ E. Note that the trivial zero flow, that is fR(u, v) = 0 for all (u, v) ∈ E, is a partial rebalancing flow (in other words, the set of partial rebalancing flows in not empty). Clearly a feasible rebalancing flow is also a partial rebalancing flow, but the opposite is not necessarily true. For a given partial rebalancing flow, we denote an origin node, that is a node v ∈ V such that v = sm for some m = 1, . . . , M, as a defective origin if Equation (5) is not satisfied at v = sm (in other words, the strict inequality < holds). Analogously, we denote a destination node, that is a node v ∈ V such that v = tm for some m = 1, . . . , M, as a defective destination if Equation (5) is not satisfied at v = tm (in other words, the strict inequality > holds). The next lemma (whose proof is provided in the Supplementary Material) links the concepts of partial rebalancing flows and defective origins/destinations. Lemma 3.6 (Co-existence of defective origins/destinations): For every partial rebalancing flow that is not a feasible rebalancing flow, there exists at least one node u ∈ V that is a defective origin, and one node v ∈ V that is a defective destination. For a given set of customer flows {fm(u, v)}(u,v),m and partial rebalancing flows { fR(u, v)}(u,v), we call an edge (u, v) ∈ E saturated if Equation (6) holds with equality for that edge. We call a path saturated if at least one of the edges along the path is saturated. We now prove the existence of a special partial rebalancing flow where defective destinations and defective origins are separated by a graph cut formed exclusively by saturated edges (this result, and its consequences, are illustrated in Figure 2). Lemma 3.7: Assume there exists a set of feasible customer flows {fm(u, v)}(u,v),m, but there does not exist a set of feasible rebalancing flows {fR(u, v)}(u,v). Then, there exists a partial rebalancing flow { fR(u, v)}(u,v) that induces a graph cut (S, ¯S) with the following properties: (i) all defective destinations are in S, (ii) all defective origins are in ¯S, and (iii) all edges in (S, ¯S) are saturated. We are now in a position to prove Theorem 3.5. The proof is by contradiction. Assume that a set of feasible rebalancing flows {fR(u, v)}(u,v) does not exist. Then Lemma 3.7 shows that there exists a partial rebalancing flow { fR(u, v)}(u,v) and a cut (S, ¯S) such that all defective destinations under { fR(u, v)}(u,v) belong to S and all defective origins belong to ¯S. Let us denote the sum of all partial rebalancing flows in (S, ¯S)−Fout(S, ¯S)− F reb Combining the above equations, one obtains Fin(S, ¯S)+ F reb out (S, ¯S), we follow a procedure in (S, ¯S) − F reb To compute F reb similar to the one used in Lemma 3.1. Summing Equation (5) (cid:88) over all nodes in S, one obtains, out (S, ¯S) ≤ Cin(S, ¯S)−Cout(S, ¯S). (cid:34)(cid:88) (cid:88) v∈S u∈V m∈M 1v=tm λm (cid:35) fR(v, w) + 1v=sm λm . fR(u, v) + (cid:34)(cid:88) w∈V (cid:88) v∈S > (cid:35) (cid:88) m∈M Fig. 2. A graphical representation of Lemma 3.7. If there exists a set of feasible customer flows but there does not exist a set of feasible rebalancing flows, one can find a partial rebalancing flow where all the defective origins, represented as blue circles, are separated from all the defective destinations, represented as blue squares, by a cut of saturated edges (shown in red). Note that not all saturated edges necessarily belong to the cut. In the proof of Theorem 3.5 we show that the capacity of such a cut (S, ¯S) is asymmetric, i.e., Cout < Cin – a contradiction that leads to the claim of Theorem 3.5. across cut (S, ¯S) as out (S, ¯S) := F reb (cid:88) fR(u, v), u∈S,v∈ ¯S in (S, ¯S) := F reb out ( ¯S,S). Since all and, analogously, define F reb edges in the cut (S, ¯S) are saturated under { fR(u, v)}(u,v), one has, due to Equation (6), the equality Cout(S, ¯S) = Fout(S, ¯S) + F reb Fin(S, ¯S) + F reb out (S, ¯S). in (S, ¯S) ≤ Cin(S, ¯S). Additionally, again due to Equation (6), one has the inequality m∈M 1tm∈S λm. out (S, ¯S) > (cid:88) (cid:88) The strict inequality is due to the fact that for a partial rebalancing flow that is not feasible there exists at least one defective destination (Lemma 3.6), which, by construction, must belong to S. Simplifying those flows fR(u, v) for which both u and v are in S (as such flows appear on both sides of the above inequality), one obtains in (S, ¯S) − F reb F reb Also, by Lemma 3.1, Fout(S, ¯S) − Fin(S, ¯S) = m∈M Collecting all the results so far, we conclude that in (S, ¯S) − Fout(S, ¯S) − F reb 1sm∈S λm − (cid:88) 1sm∈S λm − (cid:88) 0 < Fin(S, ¯S) + F reb = Cin(S, ¯S) − Cout(S, ¯S). Hence, we reached the conclusion that Cin(S, ¯S) − Cout(S, ¯S) > 0, or, in other words, the capacity of graph G(V,E) across cut (S, ¯S) is not symmetric. This contradicts the assumption that graph G(V,E) is capacity-symmetric, and the claim follows. out (S, ¯S) 1tm∈S λm. m∈M m∈M The importance of Theorem 3.5 is twofold. First, perhaps surprisingly, it shows that for symmetric road networks it is always possible to rebalance the autonomous vehicles without increasing congestion – in other words, the rebalancing of autonomous vehicles in a symmetric road network does not lead to an increase in congestion. Second, from an algorithmic standpoint, if the cost function in the CRRP only depends on the customer flows (that is, ρ = 0 and the goal is to minimize the customers' travel times), then the CRRP problem can be decoupled and the customers and rebalancing flows can be solved separately without loss of optimality. This insight will be instrumental in Section IV to the design of real-time algorithms for routing and rebalancing. We conclude this section by noticing that the CRRP, from a computational standpoint, can be reduced to an instance of the Minimum-Cost Multi-Commodity Flow problem (Min-MCF), a classic problem in network flow theory [29]. The problem can be efficiently solved either via linear programming (the size of the linear program is E(M + 1)), or via spe- cialized combinatorial algorithms [32], [33], [34]. However, the solution to the CRRP provides static fractional flows, which are not directly implementable for the operation of actual AMoD systems. Practical algorithms (inspired by the theoretical CRRP model) are presented in the next section. IV. REAL-TIME CONGESTION-AWARE ROUTING AND REBALANCING A natural approach to routing and rebalancing would be to periodically resolve the CRRP within a receding-horizon, batch-processing scheme (a common scheme for the control of transportation networks [35], [4], [36]). This approach, however, is not directly implementable as the solution to the CRRP provides fractional flows (as opposed to routes for the individual vehicles). This shortcoming can be addressed by considering an integral version of the CRRP (dubbed integral CRRP), whereby the flows are integer-valued and can be thus easily translated into routes for the individual vehicles, e.g. through a flow decomposition algorithm [37]. The integral CRRP, however, is an instance of the integral Minimum-Cost Multi-Commodity Flow problem, which is known to be NP- hard [38], [39]. Naıve rounding techniques are inapplicable: rounding a solution for the (non-integral) CRRP does not yield, in general, feasible integral flows, and hence feasible routes. For example, continuity of vehicles and customers can not be guaranteed, and vehicles may appear and disappear along a route. In general, to the best of our knowledge, there are no polynomial-time approximation schemes for the integral Minimum-Cost Multi-Commodity Flow problem. On the positive side, the integral CRRP admits a decoupling result akin to Theorem 3.5: given a set of feasible, integral customer flows, one can always find a set of feasible, integral rebalancing flows. (In fact, the proof of Theorem 3.5 does not exploit anywhere the property that the flows are fractional, and thus the proof extends virtually unchanged to the case where the flows are integer-valued). Our approach is to leverage this insight (and more in general the theoretical results from Section III) to design a heuristic, yet efficient approximation to the integral CRRP that (i) scales to large-scale systems, and (ii) is general, in the sense that can be broadly applied to time-varying, asymmetric networks. Specifically, we consider as objective the minimization of times, which, from Section III and the generalization of the customers' travel the aforementioned discussion about Theorem 3.5 to integral flows, suggests that customer routing can be decoupled from vehicle rebalancing (strictly speaking, this statement is only valid for static and symmetric networks – its generalization beyond these assumptions will be addressed numerically in Section V). Accordingly, to emulate the real- world operation of an AMoD system, we divide a given city into geographic regions (also referred to as "stations" in some formulations) [4], [8], and each arriving customer is assigned the closest vehicle within that region (vehicle imbalance across regions is handled separately by the vehicle rebalancing algorithm, discussed below). We apply a greedy, yet computationally-efficient and congestion-aware approach for customer routing where customers are routed to their destinations using the shortest-time path as computed by an A∗ algorithm [40]. The travel time along each edge is computed using a heuristic delay function that is related to the current volume of traffic on each edge. In this work, for each edge (u, v) ∈ E we use the simple Bureau of Public Roads (BPR) delay model [41] (cid:32) (cid:18) f (u, v) c(u, v) (cid:19)β(cid:33) , We assume the residual capacity cR(u, v) of an edge (u, v), defined as the difference between its overall capacity c(u, v) and the current number of vehicles along that edge, is known and remains approximately constant over the rebalancing time horizon. In case the overall rebalancing problem is not feasible (i.e. it is not possible to move all excess vehicles to regions that have a deficit of vehicles while satisfying the congestion constraints), we define slack variables with cost C that allow the optimizer to select a subset of vehicles and rebalancing where f (u, v) :=(cid:80)M td(u, v) := t(u, v) 1 + α m=1 fm(u, v) + fR(u, v) is the total flow on edge (u, v), and α and β are usually set to 0.15 and 4 respectively. Note that customer routing is event-based, i.e, a routing choice is made as soon as a customer arrives. i (t) := vi(t) +(cid:80) Separately from customer routing, vehicle rebalancing from one region to another is performed every thor > 0 time units as a batch process (unlike customer routing, which is an event- based process). Denote by vi(t) the number of vehicles in region i at time t, and by vji(t) the number of vehicles traveling from region j to i that will arrive in the next tvicinity time units. Let vown j vji(t) be the number of vehicles currently "owned" by region i (i.e., in the vicinity of such region). Denote by ve i (t) the number of excess vehicles in region i, or the number of vehicles left after servicing the customers waiting within region i. From its definition, ve i (t) is (t)− ci(t), where ci(t) is the number of given by ve customers within region i. Finally, denote by vd i (t) the desired number of vehicles within region i. For example, for an even distribution of excess vehicles, vd i (t)/N, where i ve N is the number regions. Note that the vd i (t)'s are rounded so they take on integer values. The set of origin regions (i.e., regions that should send out vehicles), SR, and destination regions (i.e., regions that should receive vehicles), TR, for the rebalancing vehicles are then determined by comparing ve i (t) and vd i (t) ∝ (cid:80) i (t) = vown i (t), specifically, i if ve if ve i (t) > vd i (t) < vd i (t), i (t), region i ∈ SR region i ∈ TR. routes of maximum cardinality such that each link does not become congested. The slack variables are denoted as dsi for each i ∈ SR, and dtj for each j ∈ TR. time units, the rebalancing vehicle routes are computed by solving the following integer linear program (cid:88) (cid:88) t(u, v) fR(u, v) + Cdsi + Cdti fR(u, v) + 1v∈SR (ve i∈SR v(t) − vd i∈TR v (t) − dsv) fR(v, w) + 1v∈TR (vd v (t) − ve v(t) − dtv), fR(·,·),{dsi},{dtj} Every thor minimize (cid:88) subject to (cid:88) (cid:88) (u,v)∈E u∈V = w∈V for all v ∈ V fR(u, v) ≤ cR(u, v), fR(u, v) ∈ N, dsi, dtj ∈ N, for all (u, v) ∈ E for all (u, v) ∈ E for all i ∈ SR, j ∈ TR The set of (integral) rebalancing flows {fR(u, v)}(u,v) is then decomposed into a set of rebalancing paths via a flow decom- position algorithm [37]. Each rebalancing path connects one origin region with one destination region: thus, rebalancing paths represent the set of routes that excess vehicles should follow to rebalance to regions with a deficit of vehicles. The rebalancing optimization problem is an instance of the Minimum Cost Flow problem. If all edge capacities are integral, the linear relaxation of the Minimum Cost Flow problem enjoys a totally unimodular constraint matrix [29]. Hence, the linear relaxation will necessarily have an integer optimal solution, which will be a fortiori an optimal solution to the original Minimum Cost Flow problem. It follows that an integer-valued solution to the rebalancing optimization problem can be computed efficiently, namely in polynomial time, e.g., via linear programming. Several efficient combina- torial algorithms [29] are also available, whose computational performance is typically significantly better. The favorable computational properties of the routing and rebalancing algorithm presented in this section enable appli- cation to large-scale systems, as described next. V. NUMERICAL EXPERIMENTS In this section, we characterize the effect of rebalancing on congestion in asymmetric network and explore the perfor- mance of the algorithm presented in Section IV on real-world road topologies with real customer demands. A. Characterization of Congestion due to Rebalancing in Asymmetric Networks The theoretical results in Section III are proven for capacity- symmetric networks, which are in general a reasonable model for typical urban road networks (we refer the reader to the Supplementary Material for a detailed analysis of capacity symmetry for major U.S. cities). Nevertheless, it is of interest to characterize the applicability of our theoretical results (chiefly, the existential result in Theorem 3.5) to road networks that significantly violate the capacity-symmetry property. In other words, we study to what degree rebalancing might lead to an increase in congestion if the network is asymmetric. To this purpose, we compute solutions to the CRRP for road networks with varying degrees of capacity asymmetry and we compare corresponding travel times to those obtained by computing optimal routes in the absence of rebalancing (as it would be the case, e.g., if the vehicles were privately owned). We focus on the road network portrayed in Figure 3(a), which captures all major streets and avenues in Manhattan. Transportation requests are based on actual taxi rides in New York City on March 1, 2012 from 6 to 8 p.m. (courtesy of the New York Taxi and Limousine Commission). We randomly selected about one third of the trips that occurred in that time frame (roughly 17,000 trips) and we adjusted the capacities of the roads such that the flows induced by these trips would approach the threshold of congestion. The roads considered all have similar speed limits and comparable number of lanes and thus we assign to each edge in the network the same capacity, specifically, one vehicle every 23.6 seconds. This capacity is consistent with the observations that (i) the customer flow is only 30% of the real one (so road capacity is reduced accord- ingly) and (ii) taxis only contribute to a fraction of the overall traffic in Manhattan. Nevertheless, we stress that the capacity was selected specifically to ensure that the flow induced by the trips would approach the threshold of congestion before any asymmetry is induced. To investigate the effects of network asymmetry, we introduce an artificial capacity asymmetry into the baseline Manhattan road network by progressively reducing the capacity of all northbound avenues. In order to gain a quantitative understanding of the effect of rebalancing on congestion and travel times, we introduce slack variables δC(u, v), associated with a cost cc(u, v), to each congestion constraint (6). The cost cc(u, v) is selected so that the optimization algorithm will select a congestion- free solution whenever one is available. Once a solution is found, the actual travel time on each (possibly congested) link is computed with the heuristic BPR delay model [41] presented in Section IV. This approach maintains feasibility even in the congested traffic regime, and hence allows us to assess the impact of rebalancing on congestion in asymmetric networks. Figure 3(b) summarizes the results of our simulations. In the baseline case, no artificial capacity asymmetry is introduced, i.e., the fractional capacity reduction of northbound avenues is equal to 0%. In this case, the customer routing problem with no rebalancing (essentially, the CRRP problem with the rebalancing flows constrained to be equal to zero) admits a congestion-free solution. On the other hand, the CRRP requires a (very small) relaxation of the congestion constraints. Overall, the difference between the travel times in the two cases is very small and approximately equal to 2.12%, in line with the fact that New York City's road graph has largely symmetric capacity, as discussed in Section II and shown in the Supplementary Material. Interestingly, even with a massive 50% reduction in northbound capacity, times when rebalancing vehicles are present are within 4.12% of those obtained assuming no rebalancing is performed. Collectively, these results show that in Theorem 3.5, proven under the assumption of a symmetric network, appears to extend (even though approximately) to asymmetric networks. In particular, it appears that vehicle rebalancing does not lead to an appreciable increase in congestion under very general conditions. the existential result travel We conclude this section by noticing that for a 40% reduc- TABLE I RESULTS OF THE REAL-TIME SIMULATIONS Congestion-aware Performance metric # of trips completed mean wait time (all trips) mean travel time (completed trips) mean service time (completed trips) % with wait time > 5 minutes mean # of rebalancing vehicles 49,585 163.57 s 265.13 s 286.96 s 5.4% 204 Baseline 42,219 406.03 s 275.19 s 324 s 20% 1489 Fig. 3. Left: Manhattan road network. One-way roads are represented as dashed lines. Centers of rebalancing regions are represented in red. Right: Customer travel times with and without rebalancing for different levels of network asymmetry. tion in capacity, the travel times with vehicle rebalancing dip slightly lower than those without. This effect is due to our use of the BPR link delay model: while in our theoretical model the time required to traverse a link is constant so long as a link is uncongested, the link delay in the BPR model varies by as much as 15% between free-flow and the onset of congestion. B. Congestion-Aware Real-time Rebalancing In this section we evaluate the performance of the real- time routing and rebalancing algorithm presented in Section IV against a baseline approach that does not explicitly take congestion into account. We simulate 7, 000 vehicles providing service to actual taxi requests on March 1, 2012, for two hours between 6 and 8 p.m., using the same Manhattan road network as in the previous section (see Figure 3(a)). Taxi requests are clustered into 88 regions corresponding to a subset of nodes in the road network. Road capacities are reduced to account for exogenous vehicles on the roads to the point that congestion occurs along some routes during the simulation. The free flow speed of the vehicles is set to 25 mph (11 m/s) and approximately 55,000 trip requests (from the taxi data set discussed before) are simulated using a time step of 6 seconds. The simulated speed of the vehicles on each link depend on the number of vehicles in the link, and is calculated using the BPR model. Other delay factors such as traffic signals, turning times, and pedestrian blocking are not simulated. Three simulations are performed, namely (i) assuming every customer has access to a private vehicle with no rebalanc- ing, (ii) using the congestion-aware routing and rebalancing algorithm presented in Section IV, and (iii) using a baseline rebalancing algorithm. The baseline approach is derived from the real-time rebalancing algorithm presented in [8], which is a point-to-point algorithm that computes rebalancing origins and destinations without considering the underlying road network. In the baseline approach, customer routes are computed in the same way as in Section IV. For rebalancing, the origins and destinations are first solved using the algorithm provided in [8], then the routes are computed using the A∗ algorithm much like the customer routes. In simulations (ii) and (iii), rebalancing is performed every 2 minutes. Table I presents a summary of the performance results for simulations (ii) and (iii). Note that the service time is the total time a customer spends in the system (waiting + traveling). Only data from simulations (ii) and (iii) are presented in Table I because the only applicable performance metric in simulation (i) is the mean travel time which was 264.69 s. Comparing our algorithm with (i), we notice that the additional rebalancing vehicles have no significant impact on the travel time. Comparing our algorithm with (iii), we notice that the congestion-aware algorithm outperforms the baseline algorithm in every metric: low congestion allows the vehicles to service customers faster, resulting in a reduction in wait times as well as travel times. The baseline algorithm will send rebalancing vehicles to stations with a deficit of vehicles regardless of the level of congestion in the road network. This results in many more empty vehicles dispatched to rebalance the system (see Table I), which causes heavy congestion in the network2. Our congestion-aware algorithm drastically reduces this effect, resulting in very few congested road links. VI. CONCLUSIONS AND FUTURE WORK In this paper we presented a network flow model of an autonomous mobility-on-demand system on a capacitated road network. We formulated the routing and rebalancing problem and showed that on symmetric road networks, it is always possible to route rebalancing vehicles in a coordinated way that does not increase traffic congestion. Using a model road network of Manhattan, we showed that rebalancing did not increase congestion even for moderate degrees of network asymmetry. We leveraged the theoretical insights to develop a computationally efficient real-time congestion- aware routing and rebalancing algorithm and demonstrated its performance over state-of-the-art point-to-point rebalancing al- gorithms through simulation. This highlighted the importance of congestion awareness in the design and implementation of control strategies for a fleet of self-driving vehicles. This work opens the field to many future avenues of research. First, note that the solution to the integral CRRP can directly be used as a practical routing algorithm. For large scale systems, high-quality approximate solutions for the integral CRRP may be obtained using randomized algorithms [42], [43]. Second, from a modeling perspective, we would like to study the inclusion of stochastic information (e.g., demand prediction, travel time uncertainty) for the routing and rebal- ancing problem, as well as a richer set of performance metrics and constraints (e.g., time windows to pick up customers). Third, it is worthwhile to study how our results give intuition into business models for autonomous urban mobility (e.g. fleet sizes). Fourth, it is of interest to explore other approaches that may reduce congestion, including ride-sharing, demand staggering, and integration with public transit to create an intermodal transportation network. Fifth, we would like to explore decentralized architectures for cooperative routing and rebalancing. Finally, we would like to demonstrate the real-world performance of the algorithms using high fidelity 2See the Media Extension, available at https://youtu.be/7OivaJi6CHU 0102030405060Capacity reduction on northbound avenues [%]400060008000100001200014000Overall travel time [s]Routing and rebalancingCustomers only (no rebalancing) 2014. microscopic traffic simulators and by implementing them on real fleets of self-driving vehicles. ACKNOWLEDGEMENT The authors would like to thank Zachary Sunberg for his analysis on the road network symmetry of U.S. cities. REFERENCES [1] W. J. Mitchell, C. E. Borroni Bird, and L. D. Burns, Reinventing the Automobile: Personal Urban Mobility for the 21st Century. Cambridge, MA: The MIT Press, 2010. [2] Google, "Just Press Go: Designing a Self-Driving Vehicle." Tech. Rep., [3] K. Spieser, K. Treleaven, R. Zhang, E. Frazzoli, D. Morton, and M. Pavone, "Toward a Systematic Approach to the Design and Eval- uation of Automated Mobility-On-Demand Systems: A Case Study in Singapore," in Lecture Notes in Mobility. Springer, Jun. 2014, pp. 229–245. [4] M. Pavone, S. L. Smith, E. Frazzoli, and D. Rus, "Robotic Load Balancing for Mobility-On-Demand Systems," International Journal of Robotics Research, vol. 31, no. 7, pp. 839–854, Jun. 2012. [5] J. P´erez, F. Seco, V. Milan´es, A. Jim´enez, J. C. D´ıaz, and T. De Pedro, "An RFID-based Intelligent Vehicle Speed Controller Using Active Traffic Signals," Sensors, vol. 10, no. 6, pp. 5872–5887, 2010. [6] B. Templeton, "Traffic Congestion & Capacity," 2015, available at http: //www.templetons.com/brad/robocars/congestion.html. at 2016, [7] M. Barnard, "Autonomous Cars Likely to Increase Congestion," http://cleantechnica.com/2016/01/17/ Jan. autonomous-cars-likely-increase-congestion. available [8] R. Zhang and M. Pavone, "A Queueing Network Approach to the Analysis and Control of Mobility-On-Demand Systems," in American Control Conference, Chicago, IL, Jul. 2015, pp. 4702–4709. [9] G. Berbeglia, J.-F. Cordeau, and G. Laporte, "Dynamic pickup and delivery problems," European Journal of Operational Research, vol. 202, no. 1, pp. 8–15, 2010. [10] K. Treleaven, M. Pavone, and E. Frazzoli, "An Asymptotically Optimal Algorithm for Pickup and Delivery Problems," in Proc. IEEE Conf. on Decision and Control, Orlando, FL, Dec. 2011, pp. 584–590. [11] --, "Asymptotically Optimal Algorithms for One-to-One Pickup and Delivery Problems With Applications to Transportation Systems," IEEE Transactions on Automatic Control, vol. 58, no. 9, pp. 2261–2276, Sep. 2013. [12] --, "Models and Efficient Algorithms for Pickup and Delivery Problems on Roadmaps," in Proc. IEEE Conf. on Decision and Control, Maui, HI, Dec. 2012, pp. 5691–5698. [13] J. G. Wardrop, "Some Theoretical Aspects of Road Traffic Research," Thomas in ICE Proceedings: Engineering Divisions, vol. 1, no. 3. Telford, 1952, pp. 325–362. [14] M. J. Lighthill and G. B. Whitham, "On kinematic waves. I. Flood movement in long rivers," in Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, vol. 229, no. 1178. The Royal Society, 1955, pp. 281–316. [15] C. F. Daganzo, "The cell transmission model: A dynamic representation of highway traffic consistent with the hydrodynamic theory," Transporta- tion Research Part B: Methodological, vol. 28, no. 4, pp. 269–287, 1994. [16] B. S. Kerner, Introduction to modern traffic flow theory and control: the long road to three-phase traffic theory. Springer Science & Business Media, 2009. [17] M. Treiber, A. Hennecke, and D. Helbing, "Microscopic simulation of Springer, 2000, congested traffic," in Traffic and Granular Flow 99. pp. 365–376. [18] Q. Yang and H. N. Koutsopoulos, "A microscopic traffic simulator for evaluation of dynamic traffic management systems," Transportation Research Part C: Emerging Technologies, vol. 4, no. 3, pp. 113–129, 1996. [19] M. Balmer, M. Rieser, K. Meister, D. Charypar, N. Lefebvre, K. Nagel, and K. Axhausen, "MATSim-T: Architecture and simulation times," Multi-agent systems for traffic and transportation engineering, pp. 57– 78, 2009. [20] C. Osorio and M. Bierlaire, "An analytic finite capacity queueing network model capturing the propagation of congestion and blocking," European Journal of Operational Research, vol. 196, no. 3, pp. 996– 1007, 2009. [21] S. Peeta and H. S. Mahmassani, "System optimal and user equilibrium time-dependent traffic assignment in congested networks," Annals of Operations Research, vol. 60, no. 1, pp. 81–113, 1995. [22] B. N. Janson, "Dynamic traffic assignment for urban road networks," Transportation Research Part B: Methodological, vol. 25, no. 2, pp. 143–161, 1991. [23] T. Le, P. Kov´acs, N. Walton, H. L. Vu, L. L. H. Andrew, and S. S. P. Hoogendoorn, "Decentralized signal control for urban road networks," Transportation Research Part C: Emerging Technologies, 2015. [24] N. Xiao, E. Frazzoli, Y. Luo, Y. Li, Y. Wang, and D. Wang, "Throughput optimality of extended back-pressure traffic signal control algorithm," in Control and Automation (MED), 2015 23th Mediterranean Conference on. IEEE, 2015, pp. 1059–1064. [25] M. Papageorgiou, H. Hadj Salem, and J.-M. Blosseville, "ALINEA: A local feedback control law for on-ramp metering," Transportation Research Record, no. 1320, 1991. [26] D. Wilkie, J. P. van den Berg, M. C. Lin, and D. Manocha, "Self-Aware Traffic Route Planning," in AAAI, 2011. [27] D. Wilkie, C. Baykal, and M. C. Lin, "Participatory Route Planning," in Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. ACM, 2014, pp. 213–222. [28] B. S. Kerner, "Traffic Congestion, Modeling Approaches to," in Encyclopedia of Complexity and Systems Science, R. A. Meyers, Ed. Springer New York, 2009, pp. 9302–9355. [29] Ravindra K. Ahuja, Thomas L. Magnanti, and James B. Orlin, Network Flows: Theory, Algorithms and Applications. Upper Saddle River, New Jersey 07458: Prentice Hall, 1993. [30] H. Neuburger, "The economics of heavily congested roads," Transporta- tion Research, vol. 5, no. 4, pp. 283 – 293, 1971. [31] M. Haklay and P. Weber, "OpenStreetMap: User-Generated Street Maps," Pervasive Computing, IEEE, vol. 7, no. 4, pp. 12–18, Oct 2008. [32] Andrew V. Goldberg, Eva Tardos, and Robert E. Tarjan, "Network Flow Algorithms," Cornell University Operations Research and Industrial Engineering, Tech. Rep., 1989. [33] T. Leighton, F. Makedon, S. Plotkin, C. Stein, ´E. Tardos, and S. Tragoudas, "Fast approximation algorithms for multicommodity flow problems," Journal of Computer and System Sciences, vol. 50, no. 2, pp. 228–243, 1995. [34] A. V. Goldberg, J. D. Oldham, S. Plotkin, and C. Stein, "An Implemen- tation of a Combinatorial Approximation Algorithm for Minimum-Cost Multicommodity Flow," in Integer Programming and Combinatorial Op- timization, ser. Lecture Notes in Computer Science, R. Bixby, E. Boyd, and R. Ros-Mercado, Eds. Springer Berlin Heidelberg, 1998, vol. 1412, pp. 338–352. [35] K. T. Seow, N. H. Dang, and D. H. Lee, "A collaborative multiagent taxi-dispatch system," IEEE Transactions on Automation Sciences and Engineering, vol. 7, no. 3, pp. 607–616, 2010. [36] R. Zhang, F. Rossi, and M. Pavone, "Model Predictive Control of Autonomous Mobility-on-Demand Systems (Extended version)," Sep. 2015, available at http://arxiv.org/abs/1509.03985. [37] L. R. Ford and D. R. Fulkerson, Flows in Networks. Princeton University Press, 1962. [38] R. M. Karp, "On the computational complexity of combinatorial prob- lems," in Networks, Networks (USA), (Proceedings of the Symposium on Large-Scale Networks, Evanston, IL, USA, 18-19 April 1974.), vol. 5, no. 1, Jan. 1975, pp. 45–68. [39] S. Even, A. Itai, and A. Shamir, "On the Complexity of Timetable and Multicommodity Flow Problems," SIAM Journal on Computing, vol. 5, no. 4, pp. 691–703, 1976. [40] P. Hart, N. Nilsson, and B. Raphael, "A Formal Basis for the Heuristic Determination of Minimum Cost Paths," Systems Science and Cybernet- ics, IEEE Transactions on, vol. 4, no. 2, pp. 100–107, July 1968. [41] Bureau of Public Roads, "Traffic Assignment Manual," U.S. Department of Commerce, Urban Planning Division, Washington, D.C (1964), Tech. Rep., 1964. [42] P. Raghavan and C. D. Tompson, "Randomized Rounding: A Technique for Provably Good Algorithms and Algorithmic Proofs," Combinatorica, vol. 7, no. 4, pp. 365–374, 1987. [43] A. Srinivasan, "A survey of the role of multicommodity flow and randomization in network design and routing," American Mathematical Society, Series in Discrete Mathematics and Theoretical Computer Science, vol. 43, pp. 271–302, 1999. SUPPLEMENTARY MATERIAL: PROOFS OF TECHNICAL RESULTS  = Proof of Lemma 3.1: We compute the sum over all customer flows m ∈ M and over all nodes v ∈ V of the node balance equation for flow m at node v (Equation (3) if node v is the source of m, Equation (4) if node v is the sink of m, or Equation (2) otherwise). We obtain (cid:33) (cid:88) (cid:88) v∈S m∈M (cid:32)(cid:88) (cid:88) (cid:88) u∈V (cid:32)(cid:88) = (cid:33) fm(v, w) + 1v=tmλm . v∈S m∈M w∈V For any edge (u, v) such that u, v ∈ S, the customer flow fm(u, v) appears on both sides of the equation. Thus the equation above simplifies to fm(u, v) + 1v=sm λm (cid:88) (cid:88) m∈M v∈S u∈ ¯S (cid:88) (cid:88) (cid:88) m∈M m∈M fm(u, v) + 1v=smλm (cid:88) (cid:88) fm(v, w) + 1v=tmλm  , which leads to the claim of the lemma Fin(S, ¯S) + v∈S 1sm∈S λm = Fout(S, ¯S) + w∈ ¯S (cid:88) m∈M 1tm∈S λm. Proof of Lemma 3.2: Adding Equations (2), (3) and (4) over all nodes in S and over all flows whose origin is in S and whose destination is in ¯S, one obtains (cid:88) (cid:32)(cid:88) (cid:88) u∈V (cid:33) = (cid:33) fm(v, w) . fm(u, v) + 1v=sm λm (cid:32)(cid:88) w∈V (cid:88) v∈S m:sm∈S,tm∈ ¯S Flows fm(u, v) such that both u and v are in S appear on both sides of the equation. Simplifying, one obtains m:sm∈S,tm∈ ¯S v∈S (cid:88) (cid:88) (cid:88) m:sm∈S,tm∈ ¯S m:sm∈S,tm∈ ¯S  fm(u, v) v∈S,u∈ ¯S λm = v∈S,w∈ ¯S  (cid:88) fm(v, w) − (cid:88) (cid:88) (cid:88) ≥ (cid:88) (cid:88) v∈S,w∈ ¯S m∈M m:sm∈S,tm∈ ¯S v∈S,w∈ ¯S fm(v, w). The first term on the right-hand side represents a lower bound for Fout(S, ¯S), since Fout(S, ¯S) = fm(v, w) Furthermore, the second term on the right-hand side is upper- bounded by zero. The lemma follows. Proof of Lemma 3.3: The first condition follows trivially from equation (6). As for the second condition, consider a cut (S, ¯S). Analogously as for the definitions of Fin(S, ¯S) and Fout(S, ¯S), let F reb out (S, ¯S) denote, respectively, the overall rebalancing flow entering (exiting) cut (S, ¯S). in (S, ¯S) and F reb (cid:88) 1sm∈S λm − (cid:88) Summing equation (5) over all nodes in S, one easily obtains in (S, ¯S) − F reb F reb 1tm∈S λm. Combining the above equation with Lemma 3.1, one obtains out (S, ¯S) = m∈M m∈M in (S, ¯S) − F reb F reb out (S, ¯S) = Fout(S, ¯S) − Fin(S, ¯S), in other words, rebalancing flows should make up the dif- ference between the customer inflows and outflows across cut (S, ¯S). Accordingly, the total inflow of vehicles across (S, ¯S), in (S, ¯S), satisfies the inequality F tot in (S, ¯S) : = Fin(S, ¯S) + F reb F tot = Fin(S, ¯S) + F reb ≥ Fout(S, ¯S). customer the in (S, ¯S) out (S, ¯S) + Fout(S, ¯S) − Fin(S, ¯S) Since flows {fm(u, v), fR(u, v)}(u,v),m are feasible, then, by equation in (S, ¯S) ≤ Cin(S, ¯S). Collecting the results, one obtains (6), F tot the second condition. Proof of Lemma 3.6: By contradiction. Since the flow { fR(u, v)}(u,v) is not a feasible rebalancing flow, there exists at least one defective origin or a defective destination. Assume that there exists at least one defective destination, say a node tj where Equation (5) is violated: 1tj =tm fR(u, tj) + fR(tj, w), rebalancing (cid:88) (cid:88) (cid:88) λm > and u∈V m∈M w∈V Now, assume that there does not exist any defective origin. By summing Equation (5) over all nodes v ∈ V and simplifying all flows fR(u, v) (as they appear on both sides of the resulting equation), one obtains (cid:88) (cid:88) that is (cid:80) m∈M λm > (cid:80) m∈M v∈V (cid:88) (cid:88) v∈V m∈M m∈M λm, which is a contradiction. Noticing that the symmetric case where we assume that there exists at least one defective destination leads to an analogous contradiction, the lemma follows. Proof of Lemma 3.7: The proof is constructive and constructs the desired partial rebalancing flow by starting with the trivial zero flow fR(u, v) = 0 for all (u, v) ∈ E. Let Vor, def := {s1, . . . , sVor, def} and Vdest, def := {t1, . . . , tVdest, def} be the set of defective origins and destinations, respectively, under such flow. Then, the zero flow is iteratively updated according to the following procedure: 1) Look for a path between a node in Vdest, def and a node in Vor, def that is not saturated (note that for rebalancing flows, paths go from destinations to origins). If no such path exists, quit. Otherwise, go to Step 2. 2) Add the same amount of flow on all edges along the path until either (i) one of the edges becomes saturated or (ii) constraint (5) is fulfilled either at the defective origin or at the defective destination. Note that the resulting flow remains a partial rebalancing flow. 3) Update sets Vor, def and Vdest, def for the new partial rebal- ancing flow and go to Step 1. The algorithm terminates. To show this, we prove the invariant that if a node is no longer defective for the updated partial rebalancing flow (in other words, Step 2 ends due to condition (ii)), it will not become defective at a later stage. Consider a defective destination node v that becomes non- 1v=tm λm > 1v=smλm, the speed limits, and the number of lanes are obtained from OpenStreetMap data [31]. D(S, ¯S) as For a cut (S, ¯S), we define its fractional capacity disparity D(S, ¯S) := 2 (cid:12)(cid:12)Cout(S, ¯S) − Cin(S, ¯S)(cid:12)(cid:12) Cout(S, ¯S) + Cin(S, ¯S) . Table VI shows the average (over 1000 samples) fractional capacity disparity for several US urban centers. As expected, the road networks for such cities appear to posses a very high degree of capacity-symmetry, which validates the symmetry assumption made in Section III. AVERAGE FRACTIONAL CAPACITY DISPARITY FOR SEVERAL MAJOR URBAN CENTERS IN THE UNITED STATES. TABLE II Urban center Chicago, IL New York, NY Colorado Springs, CO Los Angeles, CA Mobile, AL Portland, OR Avg. frac. capacity disparity 1.2972 ·10−4 1.6556 ·10−4 3.1772 ·10−4 0.9233 ·10−4 1.9368 ·10−4 1.0769 ·10−4 Std. dev. 1.003 · 10−4 1.304 · 10−4 2.308 · 10−4 0.676 · 10−4 1.452 · 10−4 0.778 · 10−4 defective under the updated partial rebalancing flow (the proof for defective origins is analogous). Then, at the subsequent stage it cannot be considered as a destination in Step 1 (as it is no longer in set Vdest, def). If a path that does not contain v is selected, then v stays non-defective. Otherwise, if a path that contains v is selected, then, after Step 2, both the inbound flow (that is the flow into v) and the outbound flow (that is the flow out of v) will be increased by the same quantity, and the node will stay non-defective. An induction on the stages then proves the claim. As the number of paths is finite, and sets Vor, def and Vdest, def cannot have any nodes added, the algorithm terminates after a finite number of stages. The output of the algorithm (denoted, with a slight abuse of notation, as { fR(u, v)}(u,v)) is a partial rebalancing flow that is not feasible (as, by assumption, there does not exist a set of feasible rebalancing flows). Therefore, by Lemma 3.6, such partial rebalancing flow has at least one defective origin and at least one defective destination. Let us define Ens := E \ {(u, v) : (u, v) is saturated} as the collection of non-saturated edges under the flows {fm(u, v)}(u,v),m and { fR(u, v)}(u,v). For any defective destination and any defective origin, all paths connecting them contain at least one saturated edge (due to the exit condition in Step 1). Therefore, the graph Gns(V,Ens) has two properties: (i) it is disconnected (that is, it is not possible to find a direct path between every pair of nodes in V by using edges in Ens), and (ii) a defective origin and a defective destination can not be in the same strongly connected component (hence, graph Gns(V,Ens) can be partitioned into at least two strongly connected components). We now find the cut (S, ¯S) as follows. If a strongly connected component of Gns contains defective destinations, we assign its nodes to set S. If a strongly connected component contains defective origins, we assign its nodes to set ¯S. If a strongly connected component contains neither defective origins nor destinations, we assign its nodes to S (one could also assign its nodes to ¯S, but such choice is immaterial for our purposes). By construction, (S, ¯S) is a cut, and its edges are all saturated. Furthermore, set S only contains destination nodes, and set ¯S only contains origin nodes, which concludes the proof. SUPPLEMENTARY MATERIAL: CAPACITY SYMMETRY WITHIN URBAN CENTERS IN THE US The existential result in Section III, Theorem 3.5, relies on the assumption that the road network is capacity-symmetric, i.e., for every cut (S, ¯S), Cout(S, ¯S) = Cin(S, ¯S). One may wonder whether this assumption is (approximately) met in practice. From an intuitive standpoint, one might argue that transportation networks within urban centers are indeed de- signed to be capacity symmetric, so as to avoid accumulation of traffic flow in some directions. We corroborate this intuition by computing the imbalance between the outbound capacity (i.e., Cout) and the inbound capacity (i.e., Cin) for 1000 randomly-selected cuts within several urban centers in the United States. For each edge (u, v) ∈ E, we approximate its capacity as proportional to the product of the speed limit vmax(u, v) on that edge and the number of lanes L(u, v), that is, c(u, v) ∝ vmax(u, v) · L(u, v). The road graph G(V,E),
1711.08225
1
1711
2017-11-22T10:56:31
Micro and Macro Pedestrian Dynamics in Counterflow: the Impact of Social Groups
[ "cs.MA", "cs.CY" ]
Although it is widely recognised that the presence of groups influences microscopic and aggregated pedestrian dynamics, a precise characterisation of the phenomenon still calls for evidences and insights. The present paper describes micro and macro level original analyses on data characterising pedestrian behaviour in presence of counter-flows and grouping, in particular dyads, acquired through controlled experiments. Results suggest that the presence of dyads and their tendency to walk in a line-abreast formation influences the formation of lanes and, in turn, aggregated observables, such as overall specific flow.
cs.MA
cs
Micro and Macro Pedestrian Dynamics in Counterflow: the Impact of Social Groups Luca Crociani, Andrea Gorrini, Claudio Feliciani, Giuseppe Vizzari, Katsuhiro Nishinari, Stefania Bandini Abstract Although it is widely recognised that the presence of groups influences microscopic and aggregated pedestrian dynamics, a precise characterisation of the phenomenon still calls for evidences and insights. The present paper describes mi- cro and macro level original analyses on data characterising pedestrian behaviour in presence of counter-flows and grouping, in particular dyads, acquired through con- trolled experiments. Results suggest that the presence of dyads and their tendency to walk in a line-abreast formation influences the formation of lanes and, in turn, aggregated observables, such as overall specific flow. 1 Introduction Research on pedestrian dynamics has systematically analysed the influence of group behaviour only in the last years (see, e.g., [9, 2, 8]): although observations and exper- iments agree on some aggregated and microscopic effects of the presence of groups (e.g. group members walk slower than individuals), there is still need for additional insights, for instance on the spatial patterns assumed by groups in their movement and in general on the interaction among different factors influencing overall pedes- trian dynamics (e.g. do obstacles still make egress from a room smoother in presence of groups?). Models incorporating mechanisms reproducing the cohesion of group members, in fact, are just partially able to reproduce overall phenomena related to Luca Crociani() · Andrea Gorrini · Giuseppe Vizzari · Stefania Bandini CSAI research center, University of Milano-Bicocca, Milan, Italy. e-mail: {name.surname}@disco.unimib.it Claudio Feliciani · Katsuhiro Nishinari · Stefania Bandini The University of Tokyo, Tokyo, Japan. e-mail: [email protected] Katsuhiro Nishinari e-mail: [email protected] 1 2 Crociani, L., Gorrini, A., Feliciani, C., Vizzari, G., Nishinari, K., Bandini, S. Fig. 1 A screenshot from the video of the experiments and a schematic representation of the set- ting. the presence of groups in the simulated population of pedestrians (see, e.g., [1] in which groups preserve their cohesion and they move slower than individuals) and they would benefit from additional insights on how members manage their move- ments balancing (for instance) goal orientation, tendency to stay close to other mem- bers, opportunities offered by the presence of lanes. In this framework, the present work discusses results of experiments carried out to investigate the potentially combined impact of counter-flow situations [13] and grouping [11]. Experiment 1 [5] tested the impact of four different configu- rations of counter-flow in a corridor setting (from uni-directional to fully balanced bi-directional flow). Experiment 2 [7] replicated the same procedures and about half of participants were paired to compose dyads (the simplest and most frequent type of group), asking them to walk close to their companion. In the following, both the experimental procedures and the achieved results will be presented in details. 2 Description of Experiments The two experiments have been performed on June 13, 2015 at the Research Center for Advanced Science and Technology of The University of Tokyo (Tokyo, JAPAN). Experiments have been executed in a corridor-like setting composed as in Fig. 1. The central area of 10× 3 m2 was recorded for the tracking of participants and it was surrounded by two start areas of 12× 3 m2 and two buffer zones of 2 m length that allowed participants to reach a stable speed at the measurement area. Partici- pants were asked to wear coloured caps so that trajectories could be automatically recorded with the software PeTrack[3]. Each experiment was composed of four procedures, to which 54 male students participated. To achieve a more consistent dataset, every procedure was iterated four times. The aim of the whole investigation has been to test the following hypotheses: (Hp1) the increase of flow ratio negatively impacts the speed of pedestrians; (Hp2) the cohesion of dyad members affects their speed; (Hp3) the cohesion of dyads leads to a lower pedestrian flow at a macroscopic level. Micro and Macro Pedestrian Dynamics in Counterflow 3 Fig. 2 Experiments and procedure tested in this investigation. With flow ratio we denote the rate between the minor flow and the total flow in bidirectional scenarios. Flow ratio was managed as independent variable among four experimental procedures, as graphically exemplified in Fig. 2. At the beginning of each iteration and according to the tested flow ratio, pedes- trians were placed in the marked positions of the start areas. Fig. 2 exemplifies the arrangement in all experimental procedures. In case of Exp. 2, roughly 44% of the participants (24 out of the 54 total) was configured as dyads. These were formed by coupling two random members and asking them to possibly walk close to the other companion during the iteration. As shown in Fig. 2, dyads could be initially disposed either in line abreast or river-like pattern, except in Proc. 2 where only the latter was possible for dyads belonging to the minor flow. In the other cases the choice was purely random. 3 Data Analysis Individual data analysis on each of the two experiments has been already described in [5] and [7]. As expected, both facing a counter-flow and being part of a group was found to influence the walking speed of pedestrians. In addition, there is a difference between the behavior found in balanced and un-balanced configurations of counter-flow in terms of lanes' formation and amount of lateral motion required to avoid conflicts with participants from the opposite direction [5, 6]. In this paper we will compare the results of the two experiments, with the aim of verifying whether their spatial patterns and different speeds affect the dynamics at a more macroscopic level. 4 Crociani, L., Gorrini, A., Feliciani, C., Vizzari, G., Nishinari, K., Bandini, S. (a) (b) Fig. 3 Distribution of pedestrian speeds (a) and local densities (b) among procedures of Exp. 2. Black dots indicate the mean, red lines the median and the box size defines the standard deviation. 3.1 Microscopic Analysis on Dyads A comparison of speeds among dyads and individuals in Exp. 2 shows that dyads are slower in procedures characterised by a counter-flow situation. In presence of a uni-directional flow essentially exempt from collisions (Proc. 1), on the other hand, the difference is rather small (see Fig. 3(a)). This suggests that the bi-directional flow affects more the spatial pattern of the dyad members, that more frequently switch from the desired line-abreast pattern to a river-like one. Moreover, it is also observed that group members have perceived a sensibly higher density during the procedures with counter-flow: Fig. 3(b) shows the distributions of local densities for all procedures of Exp. 2, calculated using the Voronoi method [10] (density values used here are instantaneous and collected from the time the first participant enters the measurement area to the time the last one leaves it). While average density is almost equal in Proc. 1, the difference becomes already noticeable in the second one. Later on we will show that this is due to the fact that dyad members tend to walk close to each other compared to the other individual pedestrians, that instead take more frequently the opportunities offered by unoccupied gaps in front of them. A first analysis on the distributions of relative positions of dyads, with respect to their centroid, has shown a decrease of distance between them with the increase of counter-flow conditions [7]. Moreover, it is observed that conflicts arising from the bi-directional flow frequently lead dyad members to assume a river-like pattern, which is barely visible in the first procedure. As with the analysis on speed and local density distribution, no significant difference arises between Proc. 3 and 4 of the second experiment. The relation between density, speed and relative positions is shown in Fig. 4(a) and (b). While a dependency between density and angular Micro and Macro Pedestrian Dynamics in Counterflow 5 (a) (b) (c) (d) Fig. 4 (a – b) Relative position of dyads according to their centroid. Positions are rotated so that the movement direction is up. Colors indicate the information of local density (a) or instantaneous speed (b). (c – d) Relations between density, distance and speed of dyads. arrangement (i.e. spatial pattern) of dyads was not found to be significant, it is ap- parent how points of high densities are mostly close to the center (the few outliers are probably due to a transient stretched river-like pattern) and they describe a pat- tern with an elliptical shape, whose long side is associated to the walking direction. The same regularity is also visible with the data about the speed: points associated to higher speeds are located in the outer part of the dataset, while close to the center speeds are lower, about 0.6 m/s. The elliptical appearance of diagrams in Fig. 4(a) and (b) is not surprising and it reflects the physics of pedestrian movement already considered with former works on the modelling side (e.g. [4]). According to these data, it is possible to define a 6 Crociani, L., Gorrini, A., Feliciani, C., Vizzari, G., Nishinari, K., Bandini, S. distance metric that applies distortion on the y-axis and helps to analyse the relation between density, speed and elliptical distance: (cid:114) f (x,y) = x2 + (cid:16) y (cid:17)2 2 The outcome of this analysis is shown in Fig. 4 (c) and (d). It is fair to state that the defined elliptical distance between dyad members acts as a mediator between the fundamental characteristics of the dynamics (more logically the local density leads group members to walk closer and not vice-versa). On the other hand, this analysis suggests that there is a positive effect of the density on the cohesion of dyad members, that consequently affects their instantaneous speed. However, the relation between walking speed and elliptical distance is less clear and points in Fig. 4 (d) appear to be in a rather large area which is difficult to describe using a linear function. Considering these observations, we can say that models of dyads should be able to reproduce a growing trend between elliptical distance and speed. An additional analysis carried out on microscopic data about the instantaneous position of pedestrians is focused on evaluating the position of the other nearby pedestrians: this kind of analysis, shown in Fig. 5, highlights a different kind of be- haviour between members of dyads and individuals with regard to the lane formation phenomenon. We focus in particular on Proc. 4 since it is the most interesting one in terms of macroscopic results. It must be said that lane formation is a rather fuzzy concept and several methods are proposed in the literature as attempt for its quantifi- cation: [5], for example, analyse the rotation of the pedestrian directions to achieve a numerical value describing the stability of lanes. We also do not try to provide a definition of lane, but the data describing the proxemic behaviour of individuals and dyads, respectively shown in Fig. 5(a) and (b), show that, on one side, there is a clear following behaviour for the individuals, where the most frequent position of neighbouring pedestrians is in a spot about 1 m ahead. On the other hand, members of dyads mostly try to keep a line-abreast pattern: the most frequent positions for neighbours are in fact on the side instead that ahead the considered pedestrian. In other words, lanes composed of dyad members tended to be wider and this led to a less efficient utilisation of the space available on average. 3.2 Effects of dyads at a macroscopic scale Previous results highlighted the effects of density and counter-flow situations on the behaviour of dyads at a very detailed scale whereas we present here the aggregated effect of these microscopic observations on the overall pedestrian flow at different levels of density. The presence of groups in Proc. 1 did not bring to significant differences, since only a simple free-flow situation emerged from it. In counter-flow situations, in- stead, differences become apparent and the most interesting result is represented by the scenario with a perfectly balanced counter-flow, whose data are reported in Micro and Macro Pedestrian Dynamics in Counterflow 7 (a) (b) Fig. 5 Distribution of relative positions of neighbour pedestrians, according to the position of each individual (a) or dyad member (b). Fig. 6 Comparison of fundamental diagrams in the form density–speed (left) and density–flow (right) of Exp. 1 and 2 - Proc. 4. Fig. 6. The diagram shows very little difference at low densities, but starting from 0.5 peds/m2 the specific pedestrian flow observed in the experiment with dyads grows at a slower rate, compared to the Exp. 1. The range of observed densities does not reach a critical density for any of the experiments, but the trend of the di- agrams supports the conjecture that the situation of Exp. 2 would lead to a lower maximum flow. 8 4 Conclusions and Future Works Crociani, L., Gorrini, A., Feliciani, C., Vizzari, G., Nishinari, K., Bandini, S. The paper has presented original results of analyses of pedestrian dynamics achieved through an experimental observation aimed at characterising the influence of dyads, both at micro and macroscopic level. Micro-level results underline that different counterflow situations affect local density, and that groups walk slower compared to singletons, depending also on their spatial patterns at variable density situations. The introduction of dyads in the pedestrian demand leads to a higher level of measurable density in analogous initial conditions and a more chaotic macro-level dynamics characterized by fragmented lanes, inducing a lower observed specific flow. Future works are aimed, on one hand, to transfer the achieved results to the mod- elling activities in presence of groups (preliminary results are discussed in another paper in this volume [12]), but additional observations and experiments would be needed to further investigate whether previously observed aggregated phenomena are still observed in the presence of groups. References 1. Bandini, S., Crociani, L., Gorrini, A., Vizzari, G.: An agent-based model of pedestrian dy- namics considering groups: A real world case study. In: 17th International IEEE Conference on Intelligent Transportation Systems (ITSC), pp. 572–577 (2014) 2. Bandini, S., Gorrini, A., Vizzari, G.: Towards an integrated approach to crowd analysis and crowd synthesis: A case study and first results. Pattern Recognition Letters 44, 16–29 (2014) 3. Boltes, M., Seyfried, A.: Collecting pedestrian trajectories. Neurocomputing 100, 127–133 (2013) 4. Chraibi, M., Seyfried, A., Schadschneider, A.: Generalized centrifugal-force model for pedes- trian dynamics. Phys. Rev. E 82(4), 46,111 (2010) 5. Feliciani, C., Nishinari, K.: Empirical analysis of the lane formation process in bidirectional pedestrian flow. Physical Review E 94(3), 032,304 (2016) 6. Feliciani, C., Nishinari, K.: Estimation of capacity in bidirectional pedestrian flow by detecting congestion and phase transitions (2017). Submitted, May 2017 7. Gorrini, A., Crociani, L., Feliciani, C., Zhao, P., Nishinari, K., Bandini, S.: Social groups arXiv preprint and pedestrian crowds: Experiment on dyads in a counter flow scenario. arXiv:1610.08325 (2016) 8. von Kruchten, C., Schadschneider, A.: Empirical study on social groups in pedestrian evacu- ation dynamics. Physica A: Statistical Mechanics and its Applications 475, 129–141 (2017) 9. Moussaıd, M., Perozo, N., Garnier, S., Helbing, D., Theraulaz, G.: The walking behaviour of pedestrian social groups and its impact on crowd dynamics. PLoS ONE 5(4), e10,047 (2010) 10. Tordeux, A., Zhang, J., Steffen, B., Seyfried, A.: Quantitative comparison of estimations for the density within pedestrian streams. Journal of statistical mechanics: theory and experiment 2015(6), P06,030 (2015) 11. Zanlungo, F., Ikeda, T., Kanda, T.: Potential for the dynamics of pedestrians in a socially interacting group. Physical Review E 89(1), 012,811 (2014) 12. Zeng, Y., Crociani, L., Gorrini, A., Vizzari, G., Song, W.: Investigating the effect of social groups in uni-directional pedestrian flow. In: in this volume 13. Zhang, J., Klingsch, W., Schadschneider, A., Seyfried, A.: Ordering in bidirectional pedestrian flows and its influence on the fundamental diagram. Journal of Statistical Mechanics (02), 9 (2012)
1801.08159
1
1801
2018-01-24T19:38:00
Adversarial Classification on Social Networks
[ "cs.MA", "cs.SI" ]
The spread of unwanted or malicious content through social media has become a major challenge. Traditional examples of this include social network spam, but an important new concern is the propagation of fake news through social media. A common approach for mitigating this problem is by using standard statistical classification to distinguish malicious (e.g., fake news) instances from benign (e.g., actual news stories). However, such an approach ignores the fact that malicious instances propagate through the network, which is consequential both in quantifying consequences (e.g., fake news diffusing through the network), and capturing detection redundancy (bad content can be detected at different nodes). An additional concern is evasion attacks, whereby the generators of malicious instances modify the nature of these to escape detection. We model this problem as a Stackelberg game between the defender who is choosing parameters of the detection model, and an attacker, who is choosing both the node at which to initiate malicious spread, and the nature of malicious entities. We develop a novel bi-level programming approach for this problem, as well as a novel solution approach based on implicit function gradients, and experimentally demonstrate the advantage of our approach over alternatives which ignore network structure.
cs.MA
cs
Adversarial Classification on Social Networks Sixie Yu Yevgeniy Vorobeychik Scott Alfeld Electrical Engineering and Computer Science, Vanderbilt University Electrical Engineering and Computer Science, Vanderbilt University Computer Science, Amherst College Amherst, MA [email protected] Nashville, TN [email protected] Nashville, TN yevgeniy.vorobeychik@vanderbilt. edu 8 1 0 2 n a J 4 2 ] A M . s c [ 1 v 9 5 1 8 0 . 1 0 8 1 : v i X r a ABSTRACT The spread of unwanted or malicious content through social me- dia has become a major challenge. Traditional examples of this include social network spam, but an important new concern is the propagation of fake news through social media. A common ap- proach for mitigating this problem is by using standard statistical classification to distinguish malicious (e.g., fake news) instances from benign (e.g., actual news stories). However, such an approach ignores the fact that malicious instances propagate through the network, which is consequential both in quantifying consequences (e.g., fake news diffusing through the network), and capturing de- tection redundancy (bad content can be detected at different nodes). An additional concern is evasion attacks, whereby the generators of malicious instances modify the nature of these to escape detection. We model this problem as a Stackelberg game between the defender who is choosing parameters of the detection model, and an attacker, who is choosing both the node at which to initiate malicious spread, and the nature of malicious entities. We develop a novel bi-level programming approach for this problem, as well as a novel solution approach based on implicit function gradients, and experimentally demonstrate the advantage of our approach over alternatives which ignore network structure. 1 INTRODUCTION Consider a large online social network, such as Facebook or Twitter. It enables unprecedented levels of social interaction in the digital space, as well as sharing of valuable information among individuals. It is also a treasure trove of potentially vulnerable individuals to exploit for unscrupulous parties who wish to gain an economic, social, or political advantage. In a perfect world, the social network is an enabler, allowing diffusion of valuable information. We can think of this "benign" information as originating stochastically from some node, and subsequently propagating over the network to its neighbors (e.g., through retweeting a news story), then their neighbors, and so on. But just as the network is a conduit for val- ueable information, so it is for "malicious" content. However, such undesirable content can be targeted: first, by selecting an influential starting point on the network (akin to influence maximization), and second, by tuning the content for maximal impact. For example, an adversary may craft the headline of a fake news story to capture the most attention. Consider the illustration in Figure 1, where an Proc. of the 17th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2018), M. Dastani, G. Sukthankar, E. Andre, S. Koenig (eds.), July 2018, Stockholm, Sweden © 2018 Authors of the paper https://doi.org/doi attacker crafts a fake news story and shares it with Adam. This story is then shared by Adam with his friends, and so on. Figure 1: An example of the propagation of malicious con- tents. These are not abstract concerns. Recently, widespread malicious content (e.g., fake news, antisocial posts) in online social networks has become a major concern. For example, considering that over 50% adults in the U.S. regard social media as their primary sources for news [17], the negative impact of fake news can be substantial. According to Allcott et al. [1] over 37 million news stories that are later proved fake were shared on Facebook in the last three months of 2016 U.S. presidential election. In addition to fake news, anti- social posts in online communities negatively affect other users and damage community dynamics [9], while social network spam and phish can defraud users and spread malicious software [11]. The managers of online social networks are not powerless against these threats, and can deploy detection methods, such as statistical classifiers, to identify and stop the spread of malicious content. However, such traditional mitigations have not as yet proved ad- equate. We focus on two of the reasons for this: first, adversaries can tune content to avoid being detected, and second, traditional learning approaches do not account for network structure. The im- plication of network structure mediating both spread and detection has in turn two consequences: first, we have to account for impact of detection errors in terms of benign or malicious content subse- quently propgatating through the network, and second, the fact that we can potentially detect malicious content at multiple nodes on the network creates a degree of redundancy. Consequently, while traditional detection methods use training data to learn a single "global" classifier of malicious and benign content, we show that specializing such learning to network structure, and using different classifiers at different nodes can dramatically improve performance. To address the problem of malicious content detection on social networks, we propose two significant modeling innovations. First, we explicitly model the diffusion process of content over networks AAMAS'18, July 2018, Stockholm, Sweden Sixie Yu, Yevgeniy Vorobeychik, and Scott Alfeld as a function of content (or, rather, features thereof). This is a gener- alization of typical network influence models which abstract away the nature of information being shared. It is also a crucial general- ization in our setting, as it allows us to directly model the balancing act by the attacker between increasing social influence and avoiding detection. Second, we consider the problem of designing a collection of heterogeneous statistical detectors which explicitly account for net- work structure and diffusion at the level of individual nodes, rather than merely training data of past benign and malicious instances. We formalize the overall problem faced as a Stackelberg game be- tween a defender (manager of the social network) who deploys a collection of heterogeneous detectors, and an attacker who opti- mally chooses both the starting node for malicious content, and the content itself. This results in a complex bi-level optimization prob- lem, and we introduce a novel technical approach for solving it, first considering a naive model in which the defender knows the node being attacked, which allows us to develop a projected gradient descent approach for solving this restricted problem, and subse- quently utilizing this to devise a heuristic algorithm for tackling the original problem. We show that our approach offers a dramatic im- provement over both traditional homogeneous statistical detection and a common adversarial classification approach. Related Work. A number of prior efforts have considered lim- iting adversarial influence on social networks. Most of these pit two influence maximization players against one another, with both choosing a subset of nodes to maximize the spread of their own influence (blocking the influence of the other). For example, Cerenet et al. [7] consider the problem of blocking a "bad" campaign using a "good" campaign that spreads and thereby neutralizes the "bad" influence. Similarly, Tsai et al. [26] study a zero-sum game between two parties with competing interests in a networked environment, with each party choosing a subset of nodes for initial influence. Vorobeychik et al. [28] considered an influence blocking game in which the defender chooses from a small set of security configu- rations for each node, while the attacker chooses an initial set of nodes to start a malicious cascade. The main differences between this prior work and ours is that (a) our diffusion process depends on the malicious content in addition to network topology, (b) detection at each node is explicitly accomplished using machine learning techniques, rather than an abstract small set of configurations, and (c) we consider an attacker who, in addition to choosing the starting point of a malicious cascade, chooses the content in part to evade the machine learning-based detectors. The issue of using hetero- geneous (personalized) filters was previously studied by Laszka et al. [19], but this work did not consider network structure or adversarial evasion. Our paper is also related to prior research in single-agent in- fluence maximization and adversarial learning. Kempe et al. [18] initiated the study of influence maximization, where the goal is to select a set of nodes to maximize the total subset of network affected for discrete-time diffusion processes. Rodriguez et al. [16] and Du et al. [13–15] considered the continuous-time diffusion process to model information diffusion; we extend this model. Prior adver- sarial machine learning work, in turn, focuses on the design of a single detector (classifier) that is robust to evasion attacks [6, 12, 20]. However, this work does not consider malicious content spreading over a social network. 2 MODEL We are interested in protecting a set of agents on a social network from malicious content originating from an external source, while allowing regular (benign) content to diffuse. The social network is represented by a graph G = (V , E), where V is the set of vertices (agents) and E is the set of edges. An edge between a pair of nodes represents communication or influence between them. For example, an edge from i to j may mean that j can see and repost a video or a news article shared by i. For simplicity, we assume that the network is undirected; generalization is direct. We suppose that each message (benign or malicious) originates from a node on the network (which may differ for different mes- sages) and then propagates to others. We utilize a finite set of instances diffusing over the network (of both malicious and benign content) as a training dataset D. Each instance, malicious or benign, is represented by a feature vector x ∈ Rn where n is the dimension of the feature space. The dataset D is partitioned into D+ and D−, where D+ corresponds to malicious and D− to benign instances. To analyze the diffusion of benign and malicious content on social networks in the presence of an adversary, we develop formal models of (a) the diffusion process, (b) the defender who aims to prevent the spread of malicious content while allowing benign content diffuse, (c) the attacker who attempts to maximize the influence of a malicious message, and (d) the game between the attacker and defender. We present these next. 2.1 Continuous-Time Diffusion Given an undirected network with a known topology, we use a continuous-time diffusion process to model the propagation of con- tent (malicious or benign) through the social network, extending Rodriguez et al. [16]. In our model, diffusion will depend not merely on the network structure, but also on the nature of the item propa- gating through the network, which we quantify by a feature vector x as above. Suppose that the diffusion process for a single message originates at a node s. First, x is transmitted from s to its direct neighbors. The time taken by a propagation through an edge e is sampled from a distribution over time, fe(t; we , x), which is a function of the edge itself and the entity x, and parametrized by we. The affected (influenced) neighbors of s then propagate x to their neighbors, and so on. We assume that an affected agent remains affected through the diffusion process. Given a sample of propagation times over all edges, the time ti taken to affect an agent i is the length of the shortest path between s and i, where the weights of edges are propagation times associated with these edges. The continuous-time diffusion process is supplied with a time window T , which is used to simulate time-sensitive natures of propagation, for example, people are generally concerned about a news for several months but not for years. An agent is affected if and only if its shortest path to s is less than or equal to T . The diffusion process terminates when the path from s to every unaffected agent is above T . We define the influence σ(s, x) Adversarial Classification on Social Networks AAMAS'18, July 2018, Stockholm, Sweden of an instance x initially affecting a network node s as the expected number of affected agents over a fixed time window T . Figure 2: Rayleigh distributions with different 1/γ 2. We assume that the distributions associated with edges are Rayleigh distributions (illustrated in Figure 2), which have den- γ 2 e−t 2/(2γ 2), where t ≥ 0 and γ is the scale sity function f (t; γ) = t parameter.1 The Rayleigh distribution is commonly used in epi- demiology and survival analysis [29] and has been recently applied to model information diffusion in social networks [14, 16]. In order to account for heterogeneity among mutual interactions of agents, and to let the influence of a process depend on the content being diffused, we parameterize the Rayleigh distribution of each edge by letting 1/γ 2 = wT x, where w is sampled from the uniform dis- tribution over [0, 1]. This parameterization results in the following density function for an arbitrary edge: T x)e (1) We denote by W = {we∀e ∈ E} the joint parametrization of all edges. Throughout, we assume that the parameters W are given, and known to both the defender and attacker. A number of other re- search studies explore how to learn these parameter vectors from data [14, 15]. fe(t; we , x) = t(we 2 t 2(we − 1 T x) . 2.2 Defender Model To protect the network against the spread of malicious content, the network manager-henceforth, the defender-can deploy statisti- cal detection, which considers a particular instance (e.g., a tweet with an embedded link) and decides whether or not it is safe. The traditional way of deploying such a system is to take the dataset D of labeled malicious and benign examples, train a classifier, and use it to detect new malicious content. However, this approach entirely ignores the fact that a social network mediates the spread of both malicious and benign entities. Moreover, both the nature (as captured in the feature vector) and the origin of malicious in- stances are deliberate decisions by the adversary aiming to maximize impact (and harm, from the defender's perspective). Our key inno- vations are (a) to allow heterogeneous parametrization of classifiers 1It is straightforward to allow for alternative distributions, such as Weibull. deployed at different nodes, and (b) to explicitly consider both diffu- sion and adversarial manipulation during learning. In combination, this enables us to significantly boost detection effectiveness in social network settings. Let Θ = {θ1, θ2, · · · , θV } be a vector of parameters of detection models deployed on the network where each θi ∈ Θ represents the model used for content shared by node i.2 We now extend our definition of expected influence to be a function of detector parameters, denoting it by σ(i, Θ, x), since any content x (malicious or benign) starting at node i which is classified as malicious at a node j (not necessarily the same as i) will be blocked from spreading any further. We define the defender's utility as   σ(i, Θ, x) − (1 − α)  Ud = α x ∈D− i∈V σ(s, Θ, z(x)), (2) x ∈D + where s is the starting node targeted by the adversary, which is subsequently modified by the same adversary into z(x) (in an at- tempt to bypass detection) when the original content used by the adversary is x. The first part of the utility represents the influence of benign content that the defender wishes to maximize, while the second part denotes the influence of malicious content that the defender aims to limit, with α trading off the relative importance of these two considerations. Observe that we assume that benign content originates uniformly over the set of nodes, while malicious origin is selected by the adversary. The defender's action space is the set of all possible parameters Θ of the detectors deployed at all network nodes. Note that, as is typical in machine learning, we are using the finite labeled dataset D as a proxy for expected utility with respect to malicious and benign content generated from the same distribution as the data. 2.3 Attacker Model The attacker's decision is twofold: (1) find a node s ∈ V to start diffusion; and (2) transform malicious content from x (its original, or ideal, form) into another feature vector z(x) with the aim of avoiding detection. The first decision is reminiscent of the influ- ence maximization problem[18]. The second decision is commonly known as the evasion attack on classifiers [20, 23]. In our case, the adversary attempts to balance three considerations: (a) impact, me- diated by the diffusion of malicious content, (b) evasion, or avoiding being detected (a critical consideration for impact as well), and (c) a cost of modifying original "ideal" content into another form, which corresponds to the associated reduced effectiveness of the trans- formed content, or effort involved in the transformation. We impose this last consideration as a hard constraint that z(x)− xp ≤ ϵ for an exogenously specified ϵ, where ∥ · ∥p is the lp norm. Consider the collection of detectors with parameters Θ deployed on the network. We say that a malicious instance is detected at a node i if 1[θi(x) = 1] = 1, where 1(·) is the 0-1 indicator func- tion. The optimization problem of the attacker corresponding to an 2Below, we focus on θi corresponding to detection thresholds as an illustration; generalization is direct. AAMAS'18, July 2018, Stockholm, Sweden Sixie Yu, Yevgeniy Vorobeychik, and Scott Alfeld original malicious instance x ∈ D+ is then: max i,z s.t σ(i, Θ, z) z − xp ≤ ϵ 1[θj(z) = 1] = 0,∀j ∈ V (3) where the first constraint is the attacker's budget limit, while the second constraint requires that the attack instance z remains unde- tected. If Problem (3) does not have a feasible solution, the attacker sends the original malicious instance without any modification. Consequently, the pair (s, z(x)) in the defender's utility function above are the solutions to Problem (3). 2.4 Stackelberg Game Formulation We formally model the interaction between the defender and the attacker as a Stackelberg game in which the defender is the leader (choosing parameters of node-level detectors) and the attacker the follower (choosing a node to start malicious diffusion, as well as the content thereof). We assume that the attacker knows Θ, as well as all relevant parameters (such as W) before constructing its attack. The equilibrium of this game is the joint choice of (Θ, s(Θ), z(x; Θ)), where s(Θ) and z(x; Θ) solve Problem (3), thereby maximizing the attacker's utility, and Θ maximizes the defender's utility given s and z. More precisely, we aim to find a Strong Stackelberg Equilibrium (SSE), where the attacker breaks ties in the defender's favor. We propose finding solutions to this Stackelberg game using the following optimization problem:   σ(i, Θ, x) − (1 − α)  σ(s, Θ, z(x)) max Θ s.t . : α x ∈D− ∀x ∈ D ∀x ∈ D ∀x ∈ D i + : + : + : x ∈D + σ(j, Θ, z) (s, z(x)) ∈ arg max z(x) − xp ≤ ϵ 1[θk(x) = 1] = 0,∀k ∈ V j,z (4) problem by leveraging Karush-Kuhn-Tucker (KKT) [5] conditions. The assumption that the defender knows the node being attacked allows us to solve the resulting single-level optimization problem using projected gradient descent. 3.1 Collapsing the Bilevel Problem A continuous-time diffusion process proceeds in a breadth-first- search fashion. It starts from an agent i trying to influence each of its neighbors. Then its neighbors try to influence their neighbors, and so on. Notice that once an agent becomes affected, it is no longer affected by others. The main consequence of this propagation process is that it results in a propagation tree rooted at i, with its structure intimately connected to the starting node i. This is where we leverage the assumption that the defender knows the starting node of the attack: in this case, the tree structure can be pre-computed, and fixed for the optimization problem. We divide the agents traversed by the tree into several layers in terms of their distances to the source, where each layer is indexed by l. Since the structure of the tree depends on i, l is a function of i, l(i). An example of the influence propagation tree is depicted in Figure 3, where the first layer consists of {j, k, · · · , д}. The number next to each edge represents the weight sampled from the associated distribution. We define a matrix Al ∈ RNl×n where Nl is the number of agents in layer l and n is the feature dimension of x. Each row of Al corresponds to the parametrization vector w of an edge in layer l (an edge is in layer l if one of its endpoint is in layer l − 1 while the other is in layer l; the source is always in layer zero). For example, in Figure 3, A1 = [wT iд]. The product of Al x is a vector in RNl , where each element corresponds to the parameter 1/γ 2 of an edge in layer l. ik; · · · ; wT ij; wT This is a hierarchical optimization problem, where the upper-level optimization corresponds to maximizing the defender's utility. The constraints of the upper-level optimization are called the lower- level optimization, which is the attacker's optimization problem. The optimization problem (4) is generally intractable for several reasons. First, Problem (4) is a bilevel optimization problem [10], which is hard even when the upper- and lower-level problems are both linear [10]. The second difficulty lies in maximizing σ(i, Θ, x) (the attacker's problem), as the objective function does not have an explicit closed-form expression. In what follows, we develop a principled approach to address these technical challenges. 3 SOLUTION APPROACH We start by making a strong assumption that the defender knows the node being attacked. This will allow us to make considerable progress in transforming the problem into a significantly more tractable form. Subsequently, we relax this assumption, develop- ing an effective heuristic algorithm for computing the SSE of the original problem. First, we utilize the tree structure of a continuous-time diffusion process to convert (4) into a tractable bilevel optimization. We then collapse the bilevel optimization into a single-level optimization Figure 3: A example continuous-time diffusion process. Recall that a sample of random variables from Rayleigh distri- butions associated with edges corresponds to a sample of weights associated with these edges. With a fixed time window T , small edge weights result in wider diffusion of the content over the social network. For example, in Figure 3 if the number next to each edge represents a sample of weights, then with T = 1 the propagation starting from i can only reach agents j and k. However, if we assume that in another sample ti, j , ti,k , ti,д all become 0.1, then with the same time window the propagation can reach every agent in the net- work. Consequently, the attacker's goal is to increase 1/γ 2 = wT e x for each edge e. This suggests that in order to increase 1/γ 2 the attacker can modify the malicious instance x such that the inner products between x and the parameter vectors we of edges are Adversarial Classification on Social Networks AAMAS'18, July 2018, Stockholm, Sweden noting again that l and Nl depend on j, the starting node of the diffusion process. From the expression (8), the defender tries to find Θ that minimizes the impact of false positives while maximizing the impact of true negatives. This is because if each benign instance x ∈ D− is correctly identified (false-positive rates are zero and true-negative rates are one), the summation at the second line of expression (8) will attain its maximum possible value. In addition to facilitating the propagation of benign contents, the defender wants to limit the propagation of malicious contents, which is embodied in 2 . The equations in 2 are similar to those in 1 , except that the summation is over malicious contents D+, and 2 is accounting for the false negatives. In this case, cl,s is a function of z(x), the adversarial feature vector which transforms x into another, z. We now re-formulate the problem (4) as a new bilevel optimiza- tion problem (9). The upper-level problem corresponds to the de- fender's strategy (6), and the lower-level problem to the attacker's optimization problem (5). Here, s is again the node chosen by the attacker. (1 − α)  1[θs(x) = 0] 1[θj(x) = 0]   x ∈D + − α l min Θ j x ∈D− s.t : ∀x ∈ D kl cT l,s Al z(x) kl cT l, j Al x l  l + : z(x) ← arg max kl 1T Al z (9) z (6) s.t . ∀x ∈ D ∀x ∈ D ∀x ∈ D + : z(x) − xp ≤ ϵ + : 1[θk(z(x)) = 1] = 0,∀k ∈ V + : z(x) ⪰ 0, where the last constraint ensures that wT z(x) ≥ 0 for all attacks z(x). The final step, inspired by [24, 25], is to convert (9) into a single- level optimization problem via the KKT [5] conditions of the lower- level problem. With appropriate norm constraints (e.g., l2 norm) and a convex relaxation of the indicator functions (i.e., convex surrogates of the indicator functions), the lower-level problem of (9) is convex. A convex optimization problem can be equivalently represented by its KKT conditions[8]. The single-level optimization problem then becomes: (7) (cid:18) Fd min s.t . ∀x : Θ − ∂z large. Consequently, we can formulate the attacker's optimization problem with respect to malicious content z for a given original feature vector x as  max z s.t . l kl 1T Al z z − xp ≤ ϵ 1[θk(z) = 1] = 0,∀k ∈ V . (5) The attacker aims to make 1/γ 2 for each edge as large as possible, which is captured by the objective function 1T Al z, where 1 ∈ RNl is a vector with all elements equal to one. Intuitively, this means the attacker is trying to maximize on average the parameter 1/γ 2 of every edge at layer l. Here, [k1, k2, · · · , kl] is a vector of decreasing coefficients that provides more flexibility to modeling the attacker's behavior: they are used to re-weight the importance of each layer. For example, setting k1 = e0, k2 = e−1, · · · , kl = e−l models the attacker who tries to make malicious instances spread wider at the earlier layers of the diffusion. We now use similar ideas to convert the upper-level optimization problem of (4) into a more tractable form. Suppose that the node being attacked is s (and known to the defender). Then the defender wants the detection model at j to accurately identify both malicious and benign contents. This is achieved by the two indicator func- tions inside 1 and 2 in the reformulated objective function of the defender (6): max Θ α j kl cT x ∈D−   1[θj(x) = 0] (cid:124)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:123)(cid:122)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:125) − (1 − α)  1[θs(z(x)) = 0] (cid:124)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:123)(cid:122)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:125) l,s Al z(x) l, j Al x x ∈D + kl cT 1 l l 2 Notice that this expression includes a vector cl, j ∈ RNl that does not appear in (5). cl, j is a function of Θ and x, for a given node j which triggers diffusion (which we omit below for clarity):  1[θl1(x) = 0] 1[θl2(x) = 0] ... (x) = 0]. 1[θlNl cl, j =  (x) = 0](cid:105) Slightly abusing notation, we let li , i ∈ [1, 2, · · · , Nl] denote the ith agent in layer l. The term kl cT l, j Al x in 1 can be expanded as follows: kl cT l, j Al x (cid:104) (cid:18) = kl = kl 1[θl1(x) = 0], . . . , 1[θlNl 1[θl1(x) = 0]wT l1x + · · · + 1[θlNl  x wT l1 ... wT lNl x (x) = 0]wT lNl (8) (cid:19) x , (cid:19) = 0 (10) l,s Al z + λд(z, x) + µT h(z, Θ) − ηT z l kl cT λд(z, x) = 0, λ ≥ 0 д(z, x) ≤ 0 η ⊙ (−z) = 0, η ⪰ 0 h(z, Θ) = 0 where Fd is the objective function of Problem (9), and λ, µ, η are vectors of lagrangian multipliers. д(z, x) = z − xp − ϵ ≤ 0 is the attacker's budget constraint. h(x, Θ) is the set of equality constraints Sixie Yu, Yevgeniy Vorobeychik, and Scott Alfeld implicitly define z(x) in terms of Θ: l kl cT l,s Al z + λд(z, x) + µT h(z, Θ) − ηT z (14) f(Θ, z, λ, µ, η) = (cid:18) − ∂z  (cid:19)  Θ and the attacked malicious instance z satisfy f(Θ, z, λ, µ, η) = 0. The Implicit Function Theorem[31] states that if f(Θ, z, λ, µ, η) is continuous and differentiable and the Jacobian matrix λд(z, x) µT h(z, Θ) η ⊙ (−z) (cid:20) ∂f ∂z ∂f ∂λ ∂f ∂µ ∂f ∂η (cid:21) AAMAS'18, July 2018, Stockholm, Sweden 1[θj(z) = 1] = 0,∀j ∈ V . η ⊙ (−z) is the Hadamard (elementwise) product between η and (−z) . 3.2 Projected Gradient Descent In this section we demonstrate how to solve the single-level opti- mization obtained above by projected gradient descent. The key technical challenge is that we don't have an explicit representation of the gradients with respect to the defender's decision Θ, as these are indirectly related via the optimal solution to the attacker's opti- mization problem. We derive these gradients based on the implicit function of the defender's utility with respect to Θ. We begin by outlining the overall iterative projected gradient descent procedure. In iteration t we update the parameters of de- tection models by taking a projected gradient step: (t) − βt∇Θ Fd (t +1) = ProjAd Θ Θ (11) where Ad is the feasible domain of Θ and βt is the learning rate. With Θ(t +1) we solve for z(t +1), which is the optimal attack for a fixed Θ(t +1). ∇Θ Fd is the gradient of the upper-level problem. Expanding ∇Θ Fd using the chain rule and still using s as the initially attacked node, we obtain (cid:19) (cid:12)(cid:12)Θ=Θ(t) (cid:18) ∇Θ Fd = (1 − α) 1 − α 2 1 =  x ∈D + 2 =  x ∈D− ∂Θ (cid:21) l l kl cT ∂Θ (cid:20) ∂1[θs(z(x)) = 0]  1[θs(z(x)) = 0] ∂[ l,s Al z(x)+ kl cT l,s Al z(x)] (cid:124)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:123)(cid:122)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:125) (cid:20) ∂1[θj(x) = 0]   (a) 1[θj(x) = 0] ∂[ (cid:21) kl cT l, j Al x] (cid:124)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:123)(cid:122)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:32)(cid:125) l l kl cT ∂Θ l, j Al x+ ∂Θ j (b) In In both 1 and 2 we note that ∂1[θj(x)=0] is dependent on the specific detection models. We will give a concrete example of their derivation in Section 3.5. l,s Al z(x) there are two terms that are functions of Θ: cl,s and z(x). Consequently, (a) can be expanded as: l kl cT ∂Θ (cid:20) ∂z(x) (cid:21)T ∂Θl (cid:21) Al z(x) + AT l cl,s . (13) (a) = kl l (cid:20) ∂cl,s ∂Θl (12) kl Al x . (16) has full rank, there is a unique implicit function I(Θ) = (z, λ, µ, η). Moreover, the derivative of ∂I = −(cid:104) ∂f ∂Θ is: ∂λ ∂f ∂z ∂f ∂µ ∂f ∂η (cid:105)−1(cid:18) ∂f (cid:19) ∂Θ ∂I ∂Θ . (15) ∂z is the Jacobian matrix of f(Θ, z, λ, µ, η) with respect to z, and ∂f ∈ Rn×N is the first n rows of ∂I so on. ∂z can be ∂Θ column-wise indexed by the nodes at layer l. (b) can be similarly expanded as we had done for (a), except that the attacker does not modify benign content, so that x ∈ D− is no longer a function of Θ: ∂Θ, where ∂z ∂Θl (b) =  l j (cid:20) ∂cl, j ∂Θl (cid:21) The full projected gradient descent approach is given by Algo- rithm 1. Algorithm 1 Find Defense Strategy 1: Input: agent j 2: Initialize: Θ(0), λ, µ, η, β0 3: for t = 1 · · · k do Θ(t +1) = ProjAd 4: 5: end for 6: return Θ(k +1) (cid:18) Θ(t) − βt∇Θ Fd (cid:19) (cid:12)(cid:12)Θ=Θ(t) Note that only the detection models of those agents at layer l have contribution to cl,s. Thus, ∂cl,s is a Jacobian matrix with dimension Nl × Nl , where Nl is the number of agents at layer l and Θl denotes ∂Θl the detection models of those Nl agents. Since cl,s is also dependent on the specific detection models of agents, we defer its derivation to Section 3.5. is a n × Nl Jacobian matrix and is the main difficulty because we do not have an explicit function of the attacker's optimal decision z(x) with respect to Θl . Fortunately, the constraints in (10) ∂z(x) ∂Θl 3.3 Optimal Attack So far, we had assumed that the network node being attacked is fixed. However, the ultimate goal is to allow the attacker to choose both the node s, and the modification of the malicious content z. We begin our generalization by first allowing the attacker to optimize these jointly. The full attacker algorithm which results is described in Algo- rithm 2. Adversarial Classification on Social Networks AAMAS'18, July 2018, Stockholm, Sweden Algorithm 2 Optimal Attack Strategy 1: Input: Θ, x 2: Initialize: ret = [] 3: for i = 1 · · · V do x(i) ← Solve (5) 4: Ua(i) ← Optimal objective value of (5) 5: 6: 7: end for 8: z, s ← OptimalTuple(ret) 9: return z, s (cid:0)i, z(i, x), Ua(i)(cid:1) appended to ret Recall that the tree structure of a propagation is dependent on the agent being attacked, which makes the objective function of (5) a function of the agent being attacked. Thus, for a given fixed Θ, the attacker iterates through each agent i and solves the problem (5), assuming the propagation starts from i, resulting in associated util- ity Ua(i) and an attacked instance z(i, x). Then i, z(i, x), and Ua(i) are appended into a list of a 3-tuples (the sixth step in Algorithm 2). When the iteration completes the attacker picks the optimal 3-tuple in terms of utility (eighth step in Algorithm 2, where the function OptimalTuple(ret) finds the optimal 3-tuple from the list ret). The node s and the corresponding attack instance z in this optimal 3-tuple become the optimal attack. 3.4 SSE Heuristic Algorithm Now we take the final step, relaxing the assumption that the at- tacker chooses a fixed node to attack which is known to the de- fender prior to choosing Θ. Our main observation is that fixing s in the defender's algorithm above allows us to find a collection of heterogeneous detector parameters Θ, and we can evaluate the actual utility of the associated defense (i.e., if the attacker optimally chooses both s and z in response) by using Algorithm 2. We use this insight to devise a simple heuristic: iterate over all potential nodes s that can be attacked, compute the associated defense Θ(s) (using the optimistic definition of defender's utility in which s is assumed fixed), then find the actual optimal attack in response for each x ∈ D+. Finally, choose the Θ(s) which has the best actual defender utility. This heuristic algorithm is described in Algorithm 3. The fifth Algorithm 3 Optimal Defense Strategy 1: Input: G = (V , E),W, D 2: for j = 1 · · · V do 3: 4: 5: 6: end for 7: j ← arg maxj Ud(j) 8: return Θj Θj ← Apply Algorithm 1 ∀x ∈ D+ : (s, z(x)) ← Apply Algorithm 2 Ud(j) ← DefenderUtility(Θj ,(s, z(x))) step in the algorithm includes the function DefenderUtility, which evaluates the defender's utility Ud(j). Note that the input argument s of this function is used to determine the tree structure of the propagation started from s. ∂Θ and ∂cl, j ∂Θl Recall that Algorithm 1 solves (10), which depends on the specific detection model to compute the relevant gradients. Therefore, in what follows, we present a concrete example of how to solve (10) where detection models are logistic regressions. Specifically, we illustrate how to derive the two terms, ∂1[θj(z)=0] that depend on particular details of the detection model. 3.5 Illustration: Logistic Regression We consider the logistic regression model used for detection at individual nodes to illustrate the ideas developed above. For a node i, its detection model has two components: the logistic regression 1+e−ϕT x , where ϕ is the weight vector of the logistic regression and x the instance propagated to i, and a detection threshold θi (which is the parameter the defender will optimize). An instance is ≤ θi. Thus (slightly abusing notation classified as benign if as before), θi(x) (cid:44) 0 (x is classified as malicious) if ≥ θi. With the specific forms of the detection models we can derive ∂1[θj(x)=0] (omitting the node index s or j for clarity). A technical challenge is that the indicator function 1(·) is not con- tinuous or differentiable, which means that it's difficult to char- acterize its derivative with respect to Θ. However, observe that and ∂cl ∂Θl 1+e−ϕT x 1+e−ϕT x ∂Θ 1 1 1 1 1−θj 1+e−ϕT x function for 1[·]. Then ∂1[θj(x)=0] the jth element equal to for logistic regression θj(x) = 0(cid:0) log(cid:0) θj  (cid:1) ≥ ϕT x. Therefore we use log(cid:0) θj (cid:1) − ϕT x (cid:1) − ϕT x log(cid:0) θl1 log(cid:0) θl2 1−θl1 1−θl2 ... ∂Θ θj−θ 2 cl = 1−θj 1 j ≤ θj (cid:1) is equivalent to (cid:1)−ϕT x as a surrogate  (17) and ∂cl ∂Θl becomes a Nl × Nl diagonal matrix: is a N -dimension vector with . The cl vector then becomes: 1 θl1−θ 2 l1 . . . ∂cl ∂Θl =   1 θNl −θ 2 Nl (18) and ∂1[θj(x)=0] ∂Θ With equations (12)-(16), ∂cl , we can now calculate ∂Θl ∇Θ Fd. Since the thresholds θi ∈ [0, 1], the defender's action space is [0, 1]N . When updating Θ by (11) we therefore project it back to [0, 1]N in each iteration. 4 EXPERIMENTS In this section we experimentally evaluate our proposed approach. We used the Spam dataset [22] from UCI machine learning reposi- tory as the training dataset for the logistic regression model. The Spam dataset contains 4601 emails, where each email is represented by a 57-dimension feature vector. We divided the dataset into three disjoint subsets: D′ used to learn the logistic regression (tuning the weight vectors with thresholds setting to 0.5) as well as other models to which we compare, Dtrain used in Algorithm 3 to find the optimal defense strategy, and Dtest to test the performance of AAMAS'18, July 2018, Stockholm, Sweden Sixie Yu, Yevgeniy Vorobeychik, and Scott Alfeld the defense strategy. The sizes of D′, Dtrain, and Dtest are 3681, 460, and 460, respectively. They are all randomly sampled from D. Our experiments were conducted on two synthetic networks with 64 nodes: Barabasi-Albert preferential attachment networks (BA) [2] and Watts-Strogatz networks (Small-World) [30]. BA is characterized by its power-law degree distribution, where connec- tivity is heavily skewed towards high-degree nodes. The power-law degree distribution, P(k) ∼ k−r , gives the probability that a ran- domly selected node has k neighbors. The degree distributions of many real-world social networks have previously been shown to be reasonably approximated by the power-law distribution with r ∈ [2.1, 2.4] [3]. Our experiments for BA were conducted across two sets of parameters: r = 2.1 and r = 2.3. The Small-World topology is well-known for balancing short- est path distance between pairs of nodes and local clustering in a way as to qualitatively resemble real networks [27]. In our experi- ments we consider two kinds of Small-World networks. The first has average length of shortest path equal to 5.9 and local clustering coefficient equal to 0.144. In this case the local clustering coeffi- cient is close to what had been observed in large-scale Facebook friendship networks [27]. The second one has average shortest path length of 5 and local clustering coefficient of 0.08, where the local clustering coefficient is close to that for the electric power grid of the western United States [30]. Our node-level detectors use logistic regression, with our algo- rithm producing the threshold for these. The trade-off parameter α was set to 0.5 and the time window T was set to 1. We applied standard pre-processing techniques to transform each feature to lie between zero and one. The attacker's budget is measured by squared l2 norm and the budget limit ϵ is varied from 0.001 to 0.01. We compare our strategy with three others based on traditional approaches: Baseline, Re-training, and Personalized-single-threshold; we describe these next. Baseline: This is the typical approach which simply learns a logistic regression on training data, sets all thresholds to 0.5, and deploys this model at all nodes. Re-training: The idea of re-training, common in adversarial classification, is to iteratively augment the original training data with attacked instances, re-training the logistic regression each time, until convergence [4, 21]. The logistic regressions deployed at the nodes are homogeneous, with all thresholds being 0.5. Personalized-single-threshold: This strategy is only allowed to tune a single agent's threshold. It has access to Dtrain that in- cludes unattacked emails. The strategy iterates throught each node i and finds its optimal threshold. The optimality is measured by the defender's utility as defined in (2), where the expected influence of an instance is estimated by simulating 1000 propagations started from i. Then the strategy picks the node with largest utility and sets its optimal threshold. As stated earlier, network topologies and parameter vectors as- sociated with edges are assumed to be known by both the defender and the attacker. The attacker has full knowledge about the defense strategy, including the weight vectors of logistic regressions as well as their thresholds. As in the definition of Stackelberg game, the evaluation procedure lets the defender first choose its strategy Θ∗, and then the attacker computes its best response, which chooses the initial node for the attack s and transformations of malicious content z aimed at evading the classifier. Finally the defender's util- ity is calculated by (2), where the expected influence is estimated by simulating 1000 propagations originating from s for each malicious instance z. The experimental results for BA (r = 2.1) and Small-World (aver- age length of shortest path=5.9 and local clustering coefficient=0.144) are shown in Figure 4, and the experimental results for BA (r = 2.3) and Small-World (average length of shortest path=5 and local clus- tering coefficient=0.08) are shown in Figure 5. Figure 4: The performance of each defense strategy. Each bar is averaged over 10 random topologies. Left: BA. Right: Small-world) Figure 5: The performance of each defense strategy. Each bar is averaged over 10 random topologies. Left: BA. Right: Small-world) As we can observe from the experiments, our algorithm out- performs all of the alternatives in nearly every instance; the sole exception is when the attacker budget is 0.001, which effectively eliminates the adversarial component from learning. For larger bud- gets, our algorithm remarkably robust even as other algorithms per- form quite poorly, so that when ϵ = 0.01, there is a rather dramatic gap between our approach and all alternatives. Not surprisingly, the most dramatic differences can be observed in the BA topology: with the large variance in the degree distribution of different nodes, our heterogeneous detection is particularly valuable in this setting. In contrast, the degradation of the other methods on Small-World topologies is not quite as dramatic, although the improvement of- fered by the proposed approach is still quite pronounced. Among the alternatives, it is also revealing that personalizing thresholds re- sults in second-best performance: again, takng account of network topology is crucial; somewhat surprisingly, it often outperforms re-training, which explicitly accounts for adversarial evasion, but not network topology. Adversarial Classification on Social Networks AAMAS'18, July 2018, Stockholm, Sweden 5 CONCLUSION We address the problem of adversarial detection of malicious con- tent spreading through social networks. Traditional approaches use with a homogeneous detector or a personalized filtering approach. Both ignore (and thus fail to exploit knowledge of) the network topology, and most filtering approaches in prior literature ignore the presence of an adversary. We present a combination of modeling and algorithmic advances to systematically address this problem. On the modeling side, we extend diffusion modeling to allow for de- pendence on the content propagating through the network, model the attacker as choosing both the malicious content, and initial target on the social network, and allow the defender to choose het- erogeneous detectors over the network to block malicious content while allowing benign diffusion. On the algorithmic side, we solve the resulting Stackelberg game by first representing it as a bilevel program, then collapsing this program into a single-level program by exploiting the problem structure and applying KKT conditions, and finally deriving a projected gradient descent algorithm using explicit and implicit gradient information. Our experiments show that our approach dramatically outperforms, homogeneous classifi- cation, adversarial learning, and heterogeneous but non-adversarial alternatives. 6 ACKNOWLEDGEMENTS This work was supported, in part by the National Science Founda- tion (CNS-1640624, IIS-1649972, and IIS-1526860), Office of Naval Research (N00014-15-1-2621) and Army Research Office (W911NF- 16-1-0069). [16] M. Gomez-Rodriguez and B. Schölkopf. Influence maximization in continuous time diffusion networks. In Proceedings of the 29th International Coference on International Conference on Machine Learning, pages 579–586. Omnipress, 2012. [17] J. Holcomb, J. Gottfried, and A. Mitchell. News use across social media platforms. Pew Research Journalism Project, 2013. [18] D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD, pages 137–146. ACM, 2003. [19] A. Laszka, Y. Vorobeychik, and X. Koutsoukos. Optimal personalized filtering against spear-phishing attacks. In AAAI Conference on Artificial Intelligence, 2015. [20] B. Li and Y. Vorobeychik. Feature cross-substitution in adversarial classification. In Advances in neural information processing systems, pages 2087–2095, 2014. [21] B. Li, Y. Vorobeychik, and X. Chen. A general retraining framework for scalable adversarial classification. arXiv preprint arXiv:1604.02606, 2016. [22] M. Lichman. UCI machine learning repository, 2013. [23] D. Lowd and C. Meek. Adversarial learning. In Proceedings of the eleventh ACM SIGKDD, pages 641–647. ACM, 2005. [24] S. Mei and X. Zhu. The security of latent dirichlet allocation. In Artificial Intelligence and Statistics, pages 681–689, 2015. [25] S. Mei and X. Zhu. Using machine teaching to identify optimal training-set attacks on machine learners. In AAAI Conference on Artificial Intelligence, pages 2871–2877, 2015. [26] J. Tsai, T. H. Nguyen, and M. Tambe. Security games for controlling contagion. In AAAI Conference on Artificial Intelligence, 2012. [27] J. Ugander, B. Karrer, L. Backstrom, and C. Marlow. The anatomy of the facebook social graph. arXiv preprint arXiv:1111.4503, 2011. [28] Y. Vorobeychik and J. Letchford. Securing interdependent assets. Autonomous Agents and Multi-Agent Systems, 29(2):305–333, 2015. [29] J. Wallinga and P. Teunis. Different epidemic curves for severe acute respiratory syndrome reveal similar impacts of control measures. American Journal of Epidemiology, 160(6):509–516, 2004. [30] D. J. Watts and S. H. Strogatz. Collective dynamics of small-world networks. Nature, 393(6684):440–442, 1998. [31] V. A. Zorich and R. Cooke. Mathematical analysis i. 2004. REFERENCES [1] H. Allcott and M. Gentzkow. Social media and fake news in the 2016 election. Technical report, National Bureau of Economic Research, 2017. [2] A.-L. Barabási and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509–512, 1999. [3] A.-L. Barabâsi, H. Jeong, Z. Néda, E. Ravasz, A. Schubert, and T. Vicsek. Evolution of the social network of scientific collaborations. Physica A: Statistical mechanics and its applications, 311(3):590–614, 2002. [4] M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar. Can machine learning be secure? In Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pages 16–25. ACM, 2006. [5] S. Boyd and L. Vandenberghe. Convex optimization. Cambridge university press, 2004. [6] M. Brückner and T. Scheffer. Stackelberg games for adversarial prediction prob- lems. In Proceedings of the 17th ACM SIGKDD, pages 547–555. ACM, 2011. [7] C. Budak, D. Agrawal, and A. El Abbadi. Limiting the spread of misinformation in social networks. In Proceedings of the 20th international conference on World wide web, pages 665–674. ACM, 2011. [8] C. J. Burges. A tutorial on support vector machines for pattern recognition. Data mining and knowledge discovery, 2(2):121–167, 1998. [9] J. Cheng, C. Danescu-Niculescu-Mizil, and J. Leskovec. Antisocial behavior in online discussion communities. In International Conference on Weblogs and Social Media, pages 61–70, 2015. [10] B. Colson, P. Marcotte, and G. Savard. An overview of bilevel optimization. Annals of operations research, 153(1):235–256, 2007. [11] G. V. Cormack et al. Email spam filtering: A systematic review. Foundations and Trends® in Information Retrieval, 1(4):335–455, 2008. [12] N. Dalvi, P. Domingos, S. Sanghai, D. Verma, et al. Adversarial classification. In Proceedings of the tenth ACM SIGKDD, pages 99–108. ACM, 2004. [13] N. Du, L. Song, M. G. Rodriguez, and H. Zha. Scalable influence estimation in continuous-time diffusion networks. In Advances in neural information processing systems, pages 3147–3155, 2013. [14] N. Du, L. Song, H. Woo, and H. Zha. Uncover topic-sensitive information diffusion networks. In Artificial Intelligence and Statistics, pages 229–237, 2013. [15] N. Du, L. Song, M. Yuan, and A. J. Smola. Learning networks of heterogeneous influence. In Advances in Neural Information Processing Systems, pages 2780–2788, 2012.
1001.4419
1
1001
2010-01-25T13:10:54
A Framework to Manage the Complex Organisation of Collaborating: Its Application to Autonomous Systems
[ "cs.MA" ]
In this paper we present an analysis of the complexities of large group collaboration and its application to develop detailed requirements for collaboration schema for Autonomous Systems (AS). These requirements flow from our development of a framework for collaboration that provides a basis for designing, supporting and managing complex collaborative systems that can be applied and tested in various real world settings. We present the concepts of "collaborative flow" and "working as one" as descriptive expressions of what good collaborative teamwork can be in such scenarios. The paper considers the application of the framework within different scenarios and discuses the utility of the framework in modelling and supporting collaboration in complex organisational structures.
cs.MA
cs
A Framework to Manage the Complex Organization of Collaborating: Its Application to Autonomous Systems Peter Johnson Rachid Hourizi Neil Carrigan Nick Forbes Human Computer Systems Group, Department of Computer Science School of Computer Science and Engineering, University of Bath, Bath, UK [email protected] In this paper we present an analysis of the complexities of large group collaboration and its applica- tion to develop detailed requirements for collaboration schema for Autonomous Systems (AS). These requirements flow from our development of a framework for collaboration that provides a basis for designing, supporting and managing complex collaborative systems that can be applied and tested in various real world settings. We present the concepts of "collaborative flow" and "working as one" as descriptive expressions of what good collaborative teamwork can be in such scenarios. The paper considers the application of the framework within different scenarios and discuses the utility of the framework in modelling and supporting collaboration in complex organisational structures. 1 Introduction This paper addresses important conceptual issues concerning collaboration in groups and sets out a de- scription of the nature of the complexities of large group collaboration. It provides a basis for thinking about the structural aspects of collaboration in Virtual Organisations from both a technical and social perspective. It describes succinctly how the findings may be applied to autonomous systems, based upon our past and current research on collaboration [8, 10] and autonomous systems [9]. Why should we be interested in both group and collaborative working for complex human and autonomous systems (AS)? Group working is rather obvious in that many activities will require more resources, capability and effort that a single AS cannot provide. The second is less obvious, why should we be interested in collaborative working? The nature of working in teams and managing groups is often harder than we realize, the costs of working together can at times outstrip the benefits. The question is what does it mean to work to- gether? Simply bringing a collection of people or agents or machines together does not achieve working together. The difference between a group that works together and one that does not shows its effects in many ways including the quality and efficiency of the work, the ease of working in the group, the ease of managing the group and the level of confidence one can have in that unit. A group which works together well achieves a high-level of flow to its work enabling a state of operation in which the individuals and the group as a whole are fully immersed in what they are doing by a feeling of energized focus, full involve- ment, and success in the process of the activity [9]. To have a group (of people or AS) work together requires more than just enabling them to communicate and coordinate well, it requires collaboration. Collaboration requires both good communication and good coordination; it also requires that they work as one with shared goals, shared understanding, with a common ground[5, 14]. It does not necessarily require a leader and can occur in different group structures [4]. Collaborative groups can achieve flow and produce greater quality of product more efficiently [17], with easier group working and with easier management. Moreover collaborative groups can achieve flow and produce greater levels of creativity [3, 2]. The aim of this paper is to understand how large groups can function as collaborative groups and how this needs to be adapted to be applied to particular settings, in this first instance AS. Achieving this Jeremy W. Bryans and John S. Fitzgerald (Eds.): Formal Aspects of Virtual Organisations 2009 (FAVO2009) EPTCS 16, 2010, pp. 51 -- 63, doi:10.4204/EPTCS.16.5 c(cid:13) Peter Johnson, Rachid Hourizi, Neil Carrigan, Nick Forbes This work is licensed under the Creative Commons Attribution License. 52 TheOrganisationofCollaboration aim has required us to develop a conceptual understanding of the nature of large group collaboration, of the ways in which it is achieved and the benefits that accrue when that achievement takes place. In apply- ing this to AS requires us to identify the particular characteristics of large group collaboration involving autonomous systems, the problems and challenges that can arise whilst it is taking place and the ways in which those problems and challenges can be overcome. With respect to its application to deploying multiple AS the potential benefits are well documented [9, 13]. These benefits include the availability of a greater range of resources than are possessed by any single AS (e.g. the ability to search an area that includes both aerial and underwater threats), the enhancement of mission completion (e.g. the speed of completion, parsimony of resource utilization and reliability of outcome) and the achievement of mis- sion objectives that lie beyond the scope of any single system (e.g. the simultaneous screening of many thousands of people inside a crowded street or public space). To take full advantage of these benefits we must develop systems that can do more than co-exist. More specifically, we must design systems that can coordinate their roles, objectives, data, resources and activities in such a way as to achieve smooth, low cost work with minimal disruptions and conflicts. We describe this smooth, efficient multi-actor activity as "collaboration" and draw upon previous work [11] to understand its optimal operation as one involving multiple actors "working as one" and achieving collaborative "flow" [15]. This smooth effi- cient collaboration is difficult to achieve, even when group sizes are small (i.e. in groups of five or less, co-located actors, pursuing clearly defined, well-understood tasks) and the goals, actions, understandings and impact of other actors are easy to identify. Achieving collaborative flow in situations that require the involvement of larger sized and/or multiple-groups of actors is yet more difficult. Each of those actors may have different capabilities, pursue multiple goals and be involved in many different activities. In this context, the designers, managers and participants of large-group collaborations cannot rely upon the existence of shared or common understanding, such as that which exists within smaller groups [4, 12]. In smaller groups, each actor is often able to follow the goals, activity, tasks, resources and capabilities of each other actor (1:1 understanding) [14]. In large groups, by contrast this 1:1 understanding is less prevalent (i.e. an actor may understand the goals, activities, tasks, resources and capabilities of some but not all other actors). In this context actors within large group collaborations may require strate- gies/mechanisms that allow them to develop and use more abstract or group-level understanding of each others goals, actions tasks etc [4], in addition to the more detailed understanding of these attributes that they may have of some subset of actors in the group. (Note: even in a large group there may still be some 1:1 understanding but it will not be developed between every actor in the group and every other actor). Larger-scale collaborations are, as a result, both qualitatively and quantitatively different from the small-group collaboration, in the sense that the possibility for a variations and individual differences in the goals, actions and understandings that exist within the group may not be understood easily or in great detail by the group or its members. Consequently, large-scale collaborations require both the group(s) and its (their) members to manage the understandings of and contributions to the multiple goals and activities. Moreover, in highly dynamic situations in which the goals, resources, group members etc are likely to be changeable or emergent there is even greater complexity to the collaboration structures and processes. 1.1 Collaboration: the application to AS Our research (as part of the SEAS DTC- Systems Engineering for Autonomous Systems Defence Tech- nology Centre) has identified the capabilities required of AS that enable participation in these large-scale collaborations, considers the costs of deploying AS without such capabilities, tests the benefits of deploy- ments involving collaboratively capable AS and demonstrates the effects of such deployment in authentic PeterJohnson,RachidHourizi,NeilCarrigan,NickForbes 53 scenarios of use. The research addresses four questions crucial for effective AS collaboration: 1. What mechanisms or strategies for coping do groups of AS need to achieve/maintain collaboration? 2. When AS have to collaborate with other AS within these large groups, what are the coping strate- gies/mechanisms that they require for this? 3. What coping mechanisms/strategies do AS have to initiate a request for collaboration within large groups? 4. What efforts are required by People to work with AS that either have or do not have those capabil- ities (i.e. what are the savings to the task and collaboration costs imposed upon those humans)? 1.2 Benefits of Collaborative AS The understanding gained by addressing these four questions has enabled the identification of the func- tionality required of next-generation autonomous systems, capable of managing their own contribution to wider system goals and has the potential to deliver the one human to multiple platform vision. This will provide for: • increased "Flow" in the work undertaken by large groups of AS, • improved coordination/reduced coordination problems within those groups, fewer interruptions, • fewer/less severe communication problems, • easier and more efficient management of large groups of AS, • improved quality of performance and product. The research contributes to an understanding of the additional "coping strategies" that AS might adopt in response to the large numbers of actors, goals, activities, understandings and potential conflicts that exist within large scale collaborations and the capabilities that those AS need in order to implement those strategies. It also considers two factors in producing an initial requirement specification: the complexity of the tasks and the complexity of the collaborations. The former includes the nature of the goal relationships and the latter the nature of the collaborative relationships. Both factors are relevant to understanding and managing collaboration in virtual organisation. In this paper we report the capabilities and understandings that AS will require if they are to implement these coping strategies. These strategies include mechanisms that address: 1. Task Structure issues: The large number of and variability in the goals, activities and state- descriptions inherent in large group collaboration must be identified, negotiated, monitored and judged. One possible solution is to have more abstract representations of each one that provide less variability (though loosing all aspects of that variability may not be desirable). 2. Group Structure issues: The large and possible varied structure of the group(s) themselves. The issues of group structure and how that affects group awareness, group communication and group coordination. For example, one possible solution is appropriate division of the collaborative activ- ity into subsections that can then be managed by addressing each subdivision only via a specified middle-manager or gate-keeper (of course, the consequence of this can be lack of awareness in the group and the gate keeper becomes the potential bottleneck). 54 TheOrganisationofCollaboration 2 Large Collaboration Capability Requirements Previous research identified the capabilities needed to take part in small-group collaborations [5, 14, 13, 11] as well as the characteristics of large-groups [9, 4, 16] that mean those capabilities are insufficient for the participation in and management of large collaborations. Previous work does not identify the collaborative structures and processes needed to work as one or achieve a smooth effortless flow when working in large groups. To address this, we have developed a conceptual framework to allow us to develop the detailed structures and processes needed for large collaborations in highly dynamic situations of high emergence. We present an overview of this in this paper for a more detailed expose see [9]. 2.1 A Framework of Large-Group Collaboration In considering the collaboration requirements, we focused upon the need for a collaborative group to be able to manage emergent properties and dynamic changes to: 1. the organization (wider group) within which a collaboration takes place, 2. the internal (sub-) groups that undertake tasks within that collaboration, 3. the tasks themselves, and 4. the resources required to undertake those tasks. As we have already briefly mentioned collaboration and conflict are inseparable, in that potential and actual conflicting situations arise within collaborations. Hence designing collaborations without conflict is impossible, instead we recognise that the collaborative structure has to have conflict mechanisms. We have identified three aspects of conflict: a) the avoidance of conflict before it occurs, b) the identification of conflict that cannot be avoided, c) the resolution of the conflict identified in b, and, in the execution of those three components the need for communication and coordination of the factors identified above. The framework from which particular collaborative capability requirements were identified is summarized in Figure 1, below: 2.1.1 The Need for Small Group Collaboration Mechanisms The starting point for the large group collaboration framework is the vast amount of previous research carried out on small group collaborations (such as [5, 14, 13, 11, 12]). Rather than offer this as an alter- native to those it should be seen as building upon them. Thus the mechanisms required for large group collaboration are additional to the requirements for small group collaboration moreover, small groups can exist within large groups as well independently from them. Consequently, both sets of mechanisms are needed and need to be satisfied to engage in teamwork that has "collaborative flow" and the ability to "work as one". The capabilities we have identified that are required of small group collaboration are reported elsewhere [13, 11, 12] and will not be repeated here. 2.1.2 The Need for Large Group Collaboration Mechanisms As stated earlier, the large numbers of actors, goals, actions and resources that make up a large group collaboration place additional requirements for collaboration mechanisms to enable the achievement of collaborative flow in the context of the highly dynamic and emergent aspects of the required teamwork. Figure 2. Below situates the problem space for large groups collaboration (adapted from [7]). Our focus is in P4, where there are problems of broad extent coupling diverse complex subsystems. In P1, where we have problems of limited scope and limited complexity, simple coordination mechanisms will suffice. In P2, where we have problems of a limited extent but with high complexity, mechanisms for self-coordinating groups will suffice. In P3, where we find problems of low complexity but high extent and diversity, structured collaboration mechanism are needed and will suffice. PeterJohnson,RachidHourizi,NeilCarrigan,NickForbes 55 Figure 1: Framework for large group collaborations. Hence, those involved in large collaborations will need further capabilities and mechanisms in addi- tion to those identified for small group collaboration. More specifically for example, they will require capabilities that will allow them to dynamically re-distribute resources, dynamically share goals within groups of actors etc where the extent and diversity of these are too large to allow 1:1 monitoring of each others action, sub-goal and outcome. Hence in large group collaborations the importance of further mechanisms and capability to address P4 in figure 2. 2.2 The Framework The Framework presented in Figure 1. describes a number of structures and process relationships that come into play and influence large-group collaborations. There are a number of structures (on the left- hand side of the framework and coloured green) covering task, organisation, group and resources, where within each there are many alternative structural relationships. For example, there are many different types of task structures and, and within a given task structure there will be different types of relation- ships between the elements of the task. For example, within a task structure there may be hierarchical goal structuring and a network structure for the various procedures used. Similarly, there are many dif- ferent types of organisation structures and within a given organisational structure there are different types of relations. Hence each of the task, organisation, group and resource, structure cells of the framework represent components that are themselves complex. Moreover, they are dynamically changed by both internal and external factors and interact with each other. Hence the different task group, organisation and resource structures interact with each other to deliver a collaborative mechanism. For further details of the various task, group, organisation and resource structures see [9]. The central cells of the frame- 56 TheOrganisationofCollaboration Figure 2: The problem space for large group collaborations. work (coloured orange in figure 1) capture the different coordination and communication structures and processes that may exist within a large-group collaboration. The coordination structures and processes operate across and within each task, group organisation and resource structures. For example processes and structures for coordinating resources relative to their use in tasks by groups between organisations are detailed here. Similarly, communication structures and processes operate to ensure that appropri- ate information, understanding and awareness is achieved both about and across the tasks, organisations groups and resources. Moreover, particular communication structures and processes may take different forms across the collaboration. For example the communication processes within one sub-group may be strictly hierarchical, while in another it may be possible for anyone to communicate with anyone and everyone directly. (As above, for further detail see [9]). The right hand-side of the framework (coloured pink in figure 1.) addresses the processes and structures that are required in a collaboration to avoid, identify and resolve conflict. This is explicit in the framework because of the importance of conflict to collaboration. The three cells collectively capture the processes and structures managing and offset- ting conflict as it arises and before it arises that enable resource conflicts, task conflicts, group conflicts, and organisational conflicts to be overcome. Moreover, the relationships between the cells on the green (left-hand side) and the pink cells (right-hand side) of figure 1. are "piped through the coordination and communication processes and structures. Hence, the subject matter of the coordination and communi- cation processes relate to the resolution, identification and avoidance of conflict relating to task, group, organisational and resource properties. The need for these may arise as a result of external factors forc- ing change or from internal factors requiring adaption and change in one part resulting from change in another part of the collaborative system. For the purposes of this paper we describe the whole system PeterJohnson,RachidHourizi,NeilCarrigan,NickForbes 57 driven from the perspective of the right-hand (Conflict) side of figure 1, however we could equally well describe the system starting from the left-hand (task, group, organisation, resource) side. 2.3 Avoid Conflict Conflict is an integral part of collaboration [1]; it is the management and reduction of conflict that leads to successful collaborations. Hence to understand collaboration one must consider conflict avoidance, identification and resolution. The first area described is the avoidance of conflict between the members of a large group and their understandings of the ways in which the task at hand would be achieved. Furthermore we also consider the roles, goals and actions to be adopted during the achievement of the task and the allocation of available resources in the course of that adoption. This section describes that first part of the framework. 2.3.1 Task Structures - Goals There are many different models of task structuring (indeed we have ourselves contributed to these, see for example, [6]) however, while they may use different terms and have different intended uses they share a number of properties in common. Of concern here is the properties of collaboration structures and process required to achieve tasks, rather than the modelling or analysis of tasks themselves. The collaborating group must distribute the groups work amongst its various actors and sub-groups. This distribution requires a set of capabilities of group members if it is to be achieved without external inter- vention. Those capabilities include the identification of local goals that will, when correctly scheduled and completed, lead to the achievement of the groups, high-level goals, the mapping of those sub-goals to the achievement of high-level goals (i.e. an understanding of the relationship between the achieve- ment of local goals within smaller sub-groups and the progress of the wider group towards its shared, higher level goals), the allocation of those sub-goals to appropriate actors and/or sub-groups and, where appropriate, the re-negotiation of that allocation with those actors and sub-groups. 2.3.2 Task Structure -- Actions The actors and sub-groups must have and/or negotiate an understanding of the actions needed to achieve their local sub-goals. In some situations, this negotiation will require only an agreement that sub-goals will be achieved, in others that they will be achieved to a specified schedule (in line with the dependencies that exist between sub-groups and their local objectives). In other situations, the trust held by managers and leaders of the group will be so low that individual sub-groups maybe required to provide a detailed description of the way that sub-goals will be achieved, rather than being left to make their own way towards their own objectives, and hence gives rise to the need for further communication and coordination in the collaboration. 2.3.3 Organisational Structure The organisational structure refers to the pattern of relationships that exist both within a group(s) and in the organisation(s) in which the group(s) exists. For example a hierarchical group may exist within a coalition of services (as we find when military allies are created or when different care services work together). In homogeneous groups (i.e. groups with a single structure and in which each participant has an identical understanding of the group structure), certain conflicts would not arise i.e. the structure of the group would, by definition, be known by all group members. With heterogeneous groups participants 58 TheOrganisationofCollaboration would need to avoid conflict between competing understandings of the group structure to be adopted (e.g. what roles were needed and their definition, the process of allocating roles, the responsibilities of those roles etc). Participation in either "homogenous" and "heterogeneous" groups would require a num- ber of key properties (i.e. collaboration requirements) to address external and internally driven dynamic changes: Structuring (and restructuring) of the group for appropriate resources (and resource changes), structuring (and restructuring) of the group to enable effective co-ordination and communications, struc- turing (and restructuring) to enable task (and changes to task) goals, structuring (and restructuring) of group to meet external organisational needs (and organisation changes), - in all cases to avoid/mitigate conflicts arising in the collaboration. 2.3.4 Group Structure - Roles Both hetero- and homogenous groups must agree the specific roles to be played by individual actors in the course of a collaborative activity. In a flat structure (i.e. one, in which each actor is able to interact with and influence the work of each other actor), these collaborative roles will differ very little from each other (i.e. the information, requests and responses passed from one actor to another will follow similar patterns, though the specific part of the collaborative task undertaken may vary from actor to actor). In more structured groups, some actors will be asked to perform management roles (i.e. to direct the activity of other actors and / or to channel the information between the wider group and their sub- ordinates), some will be asked to subordinate themselves to such managers and some to adopt both management and subordinate roles (i.e. to become middle-managers). The specific roles adopted within a particular collaboration will influence and be influenced by both the capabilities of the actors participat- ing in a particular collaborative group and on the organizational structure of that group. Some groups of actors may, for example collaborate without the need for a central manager, some groups may have one or more managers imposed upon them by a higher authority and some may select managers by following a pre-determined algorithm such as voting amongst themselves. If correctly managed, the structuring of a large group through such an allocation of roles will allow large groups to cope with the impossibility of monitoring every actor, action and objective, whilst ensuring that the group goals are achieved, available resources are utilized appropriately, collaborative flow is maintained and the group can adapt to dynamic changes such as the loss of an individual actor the loss of a resource or the alteration of a high level goal by an external authority. 2.3.5 Group Structure - Actors In either context, (i.e., homogeneous or heterogeneous organisational structures), the actors responsible for assembling a large, collaborative group of their peers would need to be able to identify the resources and capabilities needed for the completion of the task at hand (e.g. if the task involves the construction of a wall the need for a certain number of bricks, a quantity of mortar and abilities to both lay bricks and mix mortar). In more sophisticated cases, this capability may extend to the identification of different combinations of resources and capabilities, any one of which could be used to satisfy the requirements of the task (e.g. in the case of the wall-building example, either the bricks, mortar and construction capabilities, or an ability to transport an pre-fabricated wall from a storage location to the construction site). In such cases, the capability requirements demanded of any actor involved in group-assembly would then include the identification of appropriate resource/capability combinations, the mapping of specific combinations into collaborative task completion outcomes plus the identification of resources and capabilities available by potential group members. PeterJohnson,RachidHourizi,NeilCarrigan,NickForbes 59 2.3.6 Resources The resources needed for the completion of tasks may be drawn from either local or global sources. In some cases, specific actors or sub-groups will hold resources. For example, an information resource may be available only to the sub-group, organisation, or location in which it is held. In other cases central resource stores may be appropriate information may be made available to all members of the collaborative group, regardless of their small (sub) group membership. Similarly, a single fuel dump may be managed by a single sub-group and allocated to other group members in case of need. 2.4 Identify Conflict Despite the best attempts of the participants involved in a specific collaboration dynamic changes (e.g. in group composition, group structure, overall or local goals, prevailing activity and available resources) will inevitably present the opportunity for unanticipated conflicts to arise. In order to resolve these unanticipated conflicts, actors will need to both maintain awareness of those different factors (from group composition to resource availability) and, as the next section makes clear, manage or resolve conflicts arising within and between them. 2.4.1 Maintain Awareness. In collaborating groups members must maintain awareness of the complex components of the prevailing collaboration if they are to first identify and subsequently address the potential for conflict. Organisational and Group Structure & Processes They must, for example, maintain awareness of the organisational structure or structures that govern the prevailing collaboration. For example, in homogenous groups of AS that awareness can be relatively easily maintained, since each of the AS involved will, by definition have an identical understanding of group structure (i.e. they will all have an identical understanding of the hierarchical, holarchical or other group structure under which the group is operating). It should be noted that such common understanding cannot be assumed in heterogeneous groups. Even within homogeneous groups actors involved in large group collaborations must maintain some awareness of the composition of the group within which they are working. This does not mean that they must maintain understanding of every individual actor and group within the wider collaboration in which they are involved. They must be able to identify local managers, subordinates and contacts, must understand how communication can be achieved with each one and must also be aware of changes in role allocation that causes a new actors to be their manager, subordinate or contact: Task Structure & Processes In any dynamic environment, a truly collaborative actor must also maintain awareness of the groups goals and sub-goals. Once again, no comprehensive awareness of all such goals either can or must be maintained by a single actor. This limitation notwithstanding each actor in a large-group collaboration must maintain awareness of their own objectives and, depending on their role, those of managers, subordinates and/or contacts in other sub-groups. This understanding is important if actors are to coordinate their activity with others and, ultimately ensure that this activity contributes to the groups shared goals. Each actor must also maintain awareness of their own actions and their effects on the goals of the other group members with which they are in contact (the managers, subordinates and contacts identified above). In large group collaborations, the wider effects of each action may not be understood by every member of the wider group but an effective group structure will ensure that an appropriate understanding will be available to those in key roles and, as a consequence, that collaborative flow is maintained as the group progresses towards its shared goals. 60 TheOrganisationofCollaboration Resources. Finally, actors must maintain awareness of the resources that they need to complete their activities. They must follow the extent to which they hold sufficient reserves of each resource (e.g. knowledge, fuel or payload) themselves, the amount of each resource that can be obtained within the sub-group to which they belong and, in case of need, the nature and amount of the resources that can be obtained from a central store. 2.4.2 Manage Dynamic Changes To exemplify the interactions and interconnectedness of the different components of the framework we consider how when a change occurs to one part it influences and affects everything else in the framework. Though maintaining awareness of a groups initial configuration and of the changes to that collaboration are central to an actors participation in collaborative work, it should be noted that this awareness is not, in itself, sufficient for collaborative flow to be maintained in many collaborations. In addition to understanding a developing large-group collaboration, actor(s) must also be able to adapt to (manage) dynamic changes within that collaboration. They must, for example, be able to manage changes to the composition of the group i.e. to deal with situations in which loss of functionality, changing priorities or instruction from a higher authority cause actor to either join or leave a group involved in collaborative activity. In the homogenous, structured, large groups those joiners and leavers may have no immediate impact upon a particular actor (because the joining or leaving actor affects only a remote subgroup), may change the composition and therefore activity of the local sub-group or may lead to the replacement of an actors immediate superior, subordinate or contact within other sub-groups. This in turn may lead to dynamic changes to the task structure and processes in the light of a new role being adopted by the actor. Those changes to group composition (or indeed other changes e.g. the loss of an important resource, a change in the environment within which the group is acting or fresh instructions from a remote authority) may in turn cause dynamic changes to local goals, high-level goals or both. In response to changes in group goals or composition, the actions of an individual actor may also need to be dynamically altered. The adoption of a new group structure, role or local (sub) goal will each cause a collaborative actor to reconsider their activity, the schedule to which that activity must adhere or both together. Finally, the resources needed by and available to an actor working within a large group are likely to change in the course of collaborative activity of any complexity. A lost communication channel can lead to the loss of information resources (i.e. those resources which were supplied by other actors), a blocked physical pathway may lead to lost fuel supplies and the loss of a superior or contact actors will prevent communication beyond the immediate sub-group within which an actor is operating. Adaptation to such losses may only be possible if actors posses the capabilities to: a) dynamically change goals, group structure and activity in light of changes to resource needs and b) dynamically change goals, group structure and activity in light of changes to resource availability. 2.5 Address & Resolve Conflict When conflicts are identified in the course of a large-scale collaboration actors will also need the capa- bility to address and resolve them. In perhaps the least disruptive case, the actor(s) identifying a conflict may also be able to resolve it. This may require the revision or change of individual tasks (which in-turn may impact upon the wider task of the group). It may also require an alternative or additional resource usage (e.g. the allocation of more time to a transport task in exchange for a lower fuel usage). To the extent that these changes are made they must be done so with communication and coordination to the appropriate other members of the collaboration to ensure that awareness and the potential for further PeterJohnson,RachidHourizi,NeilCarrigan,NickForbes 61 conflict is minimised. Hence we see a further instance of the complex interactions that occur with the collaboration framework 2.6 Communication and Coordination Structures and Processes In describing the framework here we have left largely implicit the detail of the communication and coor- dination structures and processes needed. Briefly, the coordination structures and processes characterise the dependencies and the means for ensuring the required states between those dependencies are main- tained. These exist both in the individual cells of the framework and between the cells of the framework. For example within the task structures there will be coordination processes needed to ensure that the com- pletion of tasks are coordinated within the group. Furthermore, between the resource and task structures there will be coordination process to ensure the availability of resources in timely manner. Similarly, the communication processes and structures are the rules governing the routes and the form of commu- nication within the collaboration. These may be universal (i.e. one set of rules applies to all) or may be diverse (i.e. different rules apply to different parts) and static or dynamic (i.e. they may be allowed to change over-time and/or events or not). These communication rules will again have implications and influences upon the group, task, organisation and resource structures and upon how conflict is avoided, identified and resolved in collaboration. (For a fuller description see [9]). 3 APPLICATION TO AUTONOMOUS SYSTEMS and Beyond We have briefly described the collaboration framework from the perspective of the "Identify conflict", "Avoid conflict" and Resolve Conflict sections of Figure 1 and considered some of the capabilities that collaborative groups of people and/or autonomous systems will need. Future work will develop simu- lations of autonomous systems that implement those capabilities and will then use those simulations as the basis for testing the validity and practicality of those candidate requirements. The research will also apply the collaboration framework to heterogeneous groups of AS to consider: • different communication pathways between AS in different parts of the wider collaboration, • different understandings of the division of labor between different parts of the group, • different allocations of resource both to individual AS and the sub-groups to which they belong, 'item different coping strategies in the case that conflicts arise, such as those described above. 3.1 Further Issues In applying the framework to AS we recognise there maybe collaboration problems arising that cannot be resolved by the AS encountering the problem. This may occur because AS have not been designed to play a full collaborative part in an activity. Alternatively, AS may incur damage, resources run out and group members lose contact with the wider group. In both cases this may affect individual and group ability to; • avoid group structure, group composition, role, goal, activity and resource conflicts, • identify group structure, group composition, role, goal, activity and resource conflicts and • resolve group structure, group composition, role, goal, activity and resource conflicts. Moreover, this may lead to a situation: 62 TheOrganisationofCollaboration • where a partial or complete inability to avoid conflicts will result in an increased need to identify and resolve conflicts, and • a partial or complete inability to identify conflicts will obscure any remaining capability an AS holds to resolve those same conflicts. In such situations, we may use the framework to identify a fallback solutions or "work-around" that can be used to improve large group AS functionality (where a full collaborative capability is not available), and to identify the collaboration costs and limitations associated with each work-around. 3.2 Relevance to Virtual Organisations The framework we have presented here is of a conceptual nature, largely of relevance to those interested in understanding and/or developing collaborative organisations. It provides a basis for developing de- tailed models of the interactions that go on in collaboration and for modelling the structures and processes in a collaborative organisation. An important area is the development of mechanisms and technologies to support such collaborative organisations that can (and must) be developed following this framework. Research we are engaged in beyond our AS work includes work with health organisations and with lo- cal authorities where we are helping them to engage in collaborative decision-making, and collaborative service provision. In many cases these collaborations are creating new virtual organisations (VO) that come together to deliver and develop services, and which involve people from many different individual organisations and groups. To support these applications we need to develop mechanisms and technolo- gies that address: 1. the development of a VO, 2. the functioning of a VO, and 3. the assessment of the collaboration in a VO. We envisage the development of collaborative VOs using the framework to also require tools and languages to allow the proposed structures to be expressed and reasoned about as an aid to design. To support the functioning of the VO we envisage that environments and tools that support easy and efficient sharing of information, formation of policy, decision-making and communication and coordination will be needed. While to support assessment of collaboration we will need to develop met- rics of such aspects as the amount of communication or ease of communication, the amount of consensus, and sharing that exists within the organisation and the ability to avoid, identify and resolve conflict. All of these require language and software technologies that can carry with them a change of culture that allows organisations to work collaboratively to meet the demands of complex dynamic situations. 4 Conclusions In conclusion, therefore, this paper extends our understanding of collaborative structures and processes. It situates large group collaboration within the broader context of social emergence [16]. It has led to a set of requirements for future generations of autonomous systems capable of participating in collaborative activity. We also identify areas in which future research must extend the work presented here. More specifically, those extensions must include: • Investigation of AS reaction to "individually-unsolvable" role, goal, action and resource conflict, • Testing of both the validity and utility of the requirements identified here, • Application to human collaborations in service delivery. Development of technologies to support dynamic collaboration in large-scale groups. These extensions are the subject of our further research. PeterJohnson,RachidHourizi,NeilCarrigan,NickForbes 63 Acknowledgements Some of the work reported in this paper was funded by the Systems Engineering for Autonomous Sys- tems (SEAS) Defence Technology Centre established by the UK Ministry of Defence. References [1] A. L. Cohen, D. Cash & M. J. Muller: Designing to support adversarial collaboration. In: The 2000 ACM Conference on Computer Supported Cooperative Work (CSCW'00). pp. 31 -- 39. DOI= http://doi.acm.org/10.1145/358916.358948. [2] T. Coughlan & P. Johnson (2006): Interaction in creative tasks. In: R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries & G. Olson, editors: TheSIGCHIConferenceonHumanFactorsinComputingSystems(CHI). Montr´eal, Qu´ebec, Canada, pp. 531 -- 540. DOI= http://doi.acm.org/10.1145/1124772.1124854. [3] M. Csikszentmihaly (1991): Flow: The Psychology of Optimal Experience. Harper Collins, New York. [4] E. Hutchins: The technology of team navigation. In: J. Galegher, R. E. Kraut & C. Egido, editors: Intellectual Teamwork: Social andTechnologicalFoundationsofCooperativeWork. L. Erlbaum Associates, Hillsdale, NJ, pp. 191 -- 220. [5] H. Johnson & J. Hyde (2003): Towards modeling individual and collaborative construction of jigsaws using task knowledge structures (TKS). Trans. Comput.-Hum. Interact 10(4), pp. 339 -- 287. DOI= http://doi.acm.org/10.1145/966930.966934. [6] H. Johnson & P. Johnson (1991): Task Knowledge Structures: Psychological Basis and Integration into System Design. ActaPsychologica, pp. 3 -- 26. [7] N. L. Johnson: Science of C.I. Resources for Change. In: Mark Tovey, editor: Collective Intelligence: Creatingaprosperousworldatpeace. [8] P. Johnson (2004): Interactions, collaborations and breakdowns. on Task Models and Diagrams (TAMODIA, http://doi.acm.org/10.1145/1045446.1045448. In: The 3rd Annual Conference 86. ACM, Prague, Czech Republic, pp. 1 -- 3. DOI= [9] P. Johnson & R. Hourizi: Collaborative Mechanism to Manage Large Groups of Autonomous Systems. Tech- nical Report MP018-1, Systems Engineering for Autonomous Systems Defence Technology Centre. [10] P. Johnson, J. May & H. Johnson (2003): Introduction to multiple and collaborative tasks. ACM Trans. Comp.-Hum.Interact.10(4), pp. 277 -- 280. DOI= http://doi.acm.org/10.1145/966930.966931. [11] C. Middup, F. Nemetz & P. Johnson: MP003-8. Technical Report, Systems Engineering for Autonomous Systems Defence Technology Centre. [12] C. Middup, F. Nemetz & P. Johnson: MP003-9. Technical Report, Systems Engineering for Autonomous Systems Defence Technology Centre. [13] C. Middup, F. Nemetz, A. Nossier & P. Johnson: MP003-7. Technical Report, Systems Engineering for Autonomous Systems Defence Technology Centre. [14] D. Pinelle & C. Gutwin (2001): Group Task Analysis for Groupware Usability Evaluations. In: 10thIEEE internationalWorkshopsonEnablingTechnologies:infrastructureForCollaborativeEnterprises(WETICE). IEEE Computer Society, pp. 102 -- 107. [15] R. K. Sawyer (2003): Group Creativity: Music, Theatre, Collaboration. Lawrence Erlbaum. [16] R. K. Sawyer (2005): Social emergence: Societies as complex systems. Cambridge University Press. [17] R. K. Sawyer (2007): Group genius: The creative power of collaboration. BasicBooks, New York.