Intelligent Computational Systems: A Multi-Disciplinary Perspective -  - E-Book

Intelligent Computational Systems: A Multi-Disciplinary Perspective E-Book

0,0
72,24 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

Intelligent Computational Systems presents current and future developments in artificial Intelligence (AI) in a multi-disciplinary context. Readers will learn about the pervasive and ubiquitous roles of artificial intelligence and gain a perspective about the need for intelligent systems to behave rationally when interacting with humans in complex and realistic domains.
This reference covers widespread applications of AI discussed in 11 chapters which cover topics such as AI and behavioral simulations, AI schools, automated negotiation, language analysis and learning, financial prediction, sensor management, Multi-agent systems, and much more.
This reference work will assist researchers, advanced-level students and practitioners in information technology and computer science fields interested in the broad applications of AI.

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB

Seitenzahl: 712

Veröffentlichungsjahr: 2017

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
Welcome
Table of Contents
Title Page
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
FOREWORD
PREFACE
List of Contributors
PART I:
SIMULATION
Simulation, Intelligence and Agents: Exploring the Synergy
Abstract
1. INTRODUCTION
2. SIMULATION: HIGHLIGHTS
2.1. Stand-alone Simulation
2.2. Embedded Simulation
2.3. Other Perspectives
3. INTELLIGENCE, INTELLIGENT ENTITIES, AND AGENTS
3.1. Types of Intelligence
3.1.1. Entities
3.1.2. Context
3.3. Components
3.4. Agents
3.5. Software for Agents
4. SYNERGIES OF SIMULATION AND AGENTS
5. AGENT SIMULATION
5.1. Applications
5.2. Methodology
5.3. Software for Agent Simulation
6. AGENT-SUPPORTED SIMULATION
7. AGENT-MONITORED SIMULATION
8. SOME PROMISING RESEARCH AND DEVELOPMENT AREAS
CONCLUSION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Living with Digital Worlds: A Personal View of Artificial Intelligence
Abstract
1. Introduction
2. ROAD MAP: TERRITORIES
3. MODELS
4. HUMAN INGENUITY
5. MECHANISMS
6. MACHINE LEARNING VARIETY
7. AGENT SHAPES
8. PREDICTING THE FUTURE
9. CHALLENGES
CONCLUSION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
A Baseline for Nonlinear Bilateral Negotiations: The full results of the agents competing in ANAC 2014
Abstract
1. INTRODUCTION
2. ANAC 2014
2.1. ANAC 2014 Rules
2.2. Negotiation Scenarios
2.3. Competition Setup
3. ANAC 2014 AGENTS
3.1. AgentM [41]
3.2. AgentYK [42]
3.3. BraveCat [43]
3.4. DoNA [44]
3.5. E2Agent [45]
3.6. Gangster [46]
3.7. Group2Agent [47]
3.8. k-GAgent [49]
3.9. Sobut
3.10. WhaleAgent [51]
4. RESULTS OF ANAC 2014 COMPETITION
4.1. Qualifying Round
4.2. Final Round
5. IN DEPTH EVALUATION OF ANAC 2014 AGENTS
5.1. Experimental Setup
5.2. Experiment Results
5.3. Effect of Domain Size
5.4. Effect of Constraint Size
5.5. Effect of Constraint-Issue Distribution
CONCLUSION
NOTES
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
A Multi Agent Model for Reverse Perception Effect
Abstract
1. INTRODUCTION
2. EXPLAINING PERCEPTION
3. GOING AROUND THEORIES
3.1. Direct Perception
3.2. Perception in Action
3.3. Evolutionary Psychological And Perception
3.4. Structural Information Theory
3.5. Interface Theory
3.6. Empirical Perception Theory
4. THE GAP BETWEEN PERCEPTION AND REALITY
5. STIMULI AND PERCEPTIBLES
6. THE FILTER OF CULTURE IN PERCEIVING REALITY
7. INSIDE THE PERCEPTION PROCESS OF REALITY
8. AIDS AS A CASE STUDY
9. AIDS PERCEPTION SIMULATOR MODEL
10. EXPLORING OUTPUT RESULTS
11. DISCUSSING RESULTS
CONCLUSION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
PART II:
INTERACTION WITH HUMANS
Lexicon-based Sentiment Analysis in Persian
Abstract
1. INTRODUCTION
2. RELATED WORK
2.1. Sentiment Analysis
2.2. Sentiment Analysis in Persian
2.3. Sentiment Strength Detection
3. PROPOSED SYSTEM
3.1. Normalization
3.1. Example 1:
3.2. Spelling Correction
3.2. Example 2:
3.3. Stemming
3.4. Sentence Splitting
3.5. Strength Detection
3.6. Score Aggregation
3.7. Research Questions
4. EXPERIMENTS
4.1. Datasets and Evaluation Metrics
4.2. Results and Discussions
4.2. Example 3:
CONCLUSION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
The Age of the Connected World of Intelligent Computational Entities: Reliability Issues including Ethics, Autonomy and Cooperation of Agents
Abstract
1. Introduction
1.1. Significance of the Problem
1.2. Motivating Scenarios
1.3. Organization of the Chapter
2. Connected world
2.1. Characteristics of the Connected World
2.2. Some Examples for Connected Entities
3. THE evolution of the Connected world
3.1. Hand Tools
3.2. Power Tools (Industrial Age)
3.3. Knowledge Processing Tools (Information Age/Informatics age)
3.3.1. Advancements in Knowledge Processing Tools
3.3.2. Advancements in Entities with Additional Knowledge Processing Abilities
3.4. Smart Tools and Intelligent Tools (Cybernetic Age)
3.5. Connected Tools (Connected World of Intelligent Computational Entities)
3.6. Superintelligence (Post-human Era?)
4. What might go wrong in the Age of the Connected World
4.1. Approaches for Basic Sources of Failures
4.2. Some Counterintuitive Views of Autonomy and Cooperation
4.2.1. Autonomy
4.2.2. Cooperation
4.3. Ethics and its Limitations (in Uncivilized Environments)
4.3.1. Design Strategies for Ethical Agents
4.3.1.1. Top Down Strategies
Consequentialist Theories
Deontological Theories
Virtue-based Theories
4.3.1.2. Bottom-up Strategies
4.3.1.3. Hybrid Methods
CONCLUSION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
P-UTADIS: A Multi Criteria Classification Method
Abstract
1. INTRODUCTION
2. CLASSIFICATION
2.1. Review of Classification Techniques
2.1.1. Common Techniques in Data Classification Problems
2.1.2. Common Techniques in Data Classification with Ordinal Class
2.2. Multi Criteria Decision Aid Classification Technique
2.2.1. UTilities Additives DIScriminantes (UTADIS)
2.2.1.1. UTADIS I method
2.2.1.2. UTADIS II method
2.2.1.3. UTADIS III method
3. EXTENSION OF THE UTADIS WITH POLYNOMIAL AND GA-PSO ALGORITHM IN CLASSIFICATION
3.1. P-UTADIS vs. UTADIS
3.2. Preliminaries
3.2.1. Genetic Algorithm (GA)
3.2.2. Particle Swarm Optimization Algorithm (PSO)
3.3. P-UTADIS Method
3.3.1. Methodology
3.3.2. Algorithm Steps
3.3.3. P-UTADIS performance on IRIS Data Set
3.3.4. Comparison of P-UTADIS Performance versus UTADIS
3.4. Experimental Study
3.4.1. Test Problems
3.4.2. Algorithms for Comparison
3.4.3. Results and Discussion
3.5. P-UTADIS Time Complexity
CONCLUDING REMARKS
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
PART III: APPLICATIONS
Artificial Intelligence Techniques for Credit Risk Management
Abstract
1. Introduction
2. Support Vector Regression modeling for recovery rates
3. Empirical analysis
3.1. Selection of factors for modeling
3.2. Exploratory data analysis
4. Empirical modelling results
Conclusion
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
A Novel Task-Driven Sensor-Management Method in Multi-Object Filters Using Stochastic Geometry
Abstract
1. INTRODUCTION
1.1. Multi-Sensor Management
1.2. Sensor-Selection and Sensor-Control in Target Tracking Scenarios
2. BACKGROUND
2.1. Sensor Management Solution Framework
• Prediction
• Pre-Estimation
• Pseudo-Measurements
• Pseudo-Update
• Objective Function
• Decision Making
• Update
3. ASSUMPTIONS
3.1. Single-Step Look-Ahead
3.2. Pseudo-Measurement Approximation
4. OBJECTIVE FUNCTION
4.1. Task-driven Approach
4.2. Information-driven Approach
5. COMMON OBJECTIVE FUNCTIONS IN SENSOR MANAGEMENT STUDIES
5.1. Rényi Divergence
5.2. The Posterior Expected Number of Targets
5.3. The Cardinality-Variance Based Objective Function
6. RANDOM FINITE SET BASED MULTI-TARGET FILTER
6.1. Multi-Target System Model
6.2. Stochastic Model for Multi-Target State Evolution
6.3. Stochastic Model for Multi-Target State Measurement
6.4. Multi-Object Bayes Recursion
6.5. Poisson RFS
6.6. IID Cluster RFS
6.7. Bernoulli RFS
6.8. Multi-Bernoulli RFS
7. LABELED MULTI-BERNOULLI FILTER
7.1. Prediction
7.2. Update
7.3. Implementation
8. LABELED MULTI-BERNOULLI
8.1. Sensor-Control
8.2. Cost Function
8.3. Implementation
8.4. Computing the Cost
9. OSPA METRIC
10. NUMERICAL STUDIES
CONCLUSIONS AND FUTURE STUDIES
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Parallel Processing in Holonic Systems
Abstract
1. INTRODUCTION
2. LITERATURE REVIEW
3. FIPA STANDARD AND AGENTS COMMUNICATION LANGUAGE
4. DESIGNING A HOLONIC MODEL
5. MODEL DESIGN AND ANALYSIS
5.1. First Level of the Model
I. First level: Structural Analysis
II. First Level: Behavioral Analysis
III. First Level: Matching the Model to an Airport Control Systems
Agent
Holon
Matching the Model Concepts in the Airport
IV. First Level: Matching the Model to Factory Control Systems
5.2. Second Level of the Model
I. Second Level: Structural Analysis
II. Second Level: Behavioral Analysis
III. Second Level: Matching the Model to an Airport Control System
IV. Second Level: Matching the Model to a Factory Control System
5.3. Third Level of the Model
I. Third Level: Structural Analysis
II. Third Level: Behavioral Analysis
III. Third Level: Matching the Model to Airport Control Systems
IV. Third Level: Matching the Model to Factory Control Systems
6. PREPARING THE MODEL FOR CRITICAL CONDITIONS
7. IMPLEMENTATION AND NUMERIC EVALUATION IN THE FACTORY TEST CASE
8. REVIEW OF PROPOSED MODEL FEATURES
CONCLUSIONS AND FUTURE RESEARCH DIRECTIONS
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Robot-Assisted Language Learning: Artificial Intelligence in Second Language Acquisition
Abstract
1. INTRODUCTION
2. The Beginnings of AI: Computer-Assisted Language Learning
2.1. Phases of CALL
2.1.1. Behavioristic CALL
2.1.2. Communicative CALL
2.1.3. Integrative CALL
2.2. Applications of Technology in Language Classes
2.2.1. Mobile Learning
2.2.2. Audio Files: Podcasts and RAs
2.2.3. Internet & Web 2.0
2.2.4. Internet Communication Tools
2.2.5. Emails
2.2.6. Concordancing
2.2.7. Weblogs
2.2.8. Word Clouds
2.2.9. Video Files: Video clips and Vodcasts
2.2.10. Video Games
2.3. Merits and Barriers of CALL
3. The New Beginning of AI: Robot-Assisted Language Learning
3.1. Characteristics of Robots
3.2. Theoretical Framework of RALL in SLA
3.3. Applications of RALL
Conclusion
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES

Current and Future Developments in Artificial Intelligence

Volume 1

(Intelligent Computational Systems: A Multi-Disciplinary Perspective)

Edited by

Faria Nassiri-Mofakham

University of Isfahan,
Isfahan, P.O.Code 81746-72441,
Iran

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use)

This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the ebook/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.

Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules:

All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it. The following DRM (Digital Rights Management) policy may also be applicable to the Work at Bentham Science Publishers’ election, acting in its sole discretion:25 ‘copy’ commands can be executed every 7 days in respect of the Work. The text selected for copying cannot extend to more than a single page. Each time a text ‘copy’ command is executed, irrespective of whether the text selection is made from within one page or from separate pages, it will be considered as a separate / individual ‘copy’ command.25 pages only from the Work can be printed every 7 days.

3. The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer:

Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability:

In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General:

Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of the U.A.E. as applied in the Emirate of Dubai. Each party agrees that the courts of the Emirate of Dubai shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.

Bentham Science Publishers Ltd. Executive Suite Y - 2 PO Box 7917, Saif Zone Sharjah, U.A.E. Email: [email protected]

FOREWORD

After more than six decades of research, artificial intelligence is now being used for many endeavors, helping people manage their lives, secure their homes and information, perform routine tasks in homes, hospitals, and offices, and automate their travel. The applications are widespread and so are the technologies needed to create them. This book provides a comprehensive treatment of intelligent systems and includes contributions from leading researchers and developers in a range of disciplines.

The need for the book appears obvious: computational systems are fast becoming ubiquitous and pervasive and we would like them to be effective and friendly. They are ubiquitous because computing power and access to the Internet are being made available everywhere; they are pervasive because computing is being embedded in the very fabric of our environment. For example, our houses, our furniture, and our clothes will contain computers that will enable our surroundings to adapt to our preferences and needs. This leads also to unprecedented complexity in our envisioned systems, because commercial, educational, and industrial enterprises will be linked, and human spheres previously untouched by computing and information technology, such as our personal, recreational, and community life, will be affected.

In the midst of the complexity, we need the computational systems with which we interact to behave intelligently, i.e., rationally, and there are many facets to intelligent behavior. These facets do not exist in isolation, although they can be investigated individually. This has been the primary investigative approach so far in computer science research. However, the next major advances will come from more comprehensive approaches, where combinations of the facets will produce intelligent behaviors needed for complex and realistic domains. Creating effective combinations will require that researchers understand the various facets, and this book provides some of the required understanding.

Dr. Faria Nassiri Mofakham has assembled papers that span the fundamental areas of interactions among intelligent software agents, robot languages, ethical behavior of agents, and human language, and the application areas of manufacturing, finance, and education. She leads with a paper by Ghasem-Aghaee, Ören, and Yilmaz that covers both areas, in that it surveys the use of simulation to investigate agent-based behaviors and to control agent-based behaviors in applications. The paper is exceptionally thorough and provides a basis for considering the papers that follow, notably the paper by Coelho that considers simulated worlds of intelligent systems, the paper by Aydogan et al. that considers simulated negotiations, and the paper by Magessi and Antunes that simulates human attitudes using agents.

For computational systems to be considered intelligent, they must be able to interact with humans in ways that seem natural, i.e., as other humans would. This requires the systems to understand human emotions, as Basiri et al. investigate, and to behave ethically, as Ören and Yilmaz analyze. They must also operate efficiently and yield plausible results when processing large amounts of information, as Esmaelian, Shahmoradi, and Nemati show in their paper on classification.

Finally, the fundamental advances must be applied to important problems to demonstrate their utility and capabilities. The paper by Nazemi and Heidenreich uses advances in machine learning to improve the understanding of bond rates in financial markets. The paper by Gostar, Hoseinnezhad, and Bab-Hadiashar addresses sensor management from the perspective of intelligent sequential decision-making in the presence of stochastic uncertainty. Their results have broad applicability, including to the Internet of Things. Basiri and Ghasem-Aghaee consider how complexity can be reduced in large-scale systems using an AI approach based on multi-agent holonic systems that self-organize and behave autonomously. Modern manufacturing can benefit from this approach. The paper by Tafazoli and Parra describes how robots and artificial intelligence can improve education, specifically the learning of natural languages.

In summary, I am excited by the possibilities for new computational systems that are engendered by this book, as well as by the challenges that remain. This book provides a solid foundation for advances in the intelligent behavior of computational systems.

Dr. Michael N. Huhns Distinguished Professor Emeritus of Computer Science and Engineering, University of South Carolina, Columbia, SC, USA

PREFACE

Any knowledge is as old as its date revealed. The idea of editing a book as a planet in the galaxy of AI will make you as old as AI and as young as what has been and is being published today.

What is of concern in this contemporary life, at the intellectual level, where machine -the digital in specific- governs the manner by which the different aspects of human perceptions are applied in a given field is to enhance human’s comprehension. On one to one basis, not even a temporary success will be registered in this realm, unless the problem is analyzed in a multi-dimensional and multi aspect sense. Books like this provide the interested readers in academic world different access channels, found so far, in having a broader perspective on the subjects of the matter(s) in AI. Many literary packages, each one better than the previous ones, are published in order to quench this never ending quest.

The objective of research on the constituent theme here is to promote their advances made towards accomplishments. In this multi-disciplinary package, the authors seek to present their innovative views on their themes of interest in this realm; consequently, pronouncing a general statement would be wrong, and for not committing this wrong I would suffice by bulleting the content of each one of the chapters presented to provide a panorama of what is defined and expected in Simulation, Interaction with humans, and Application categories:

Simulation of intelligent behaviorAn individualized view on schools of artificial intelligenceThe vast span of dealing with incomplete information in automated negotiationReverse perception effect on cognition leading to stimulated behaviorLack of lexicon-based sentiment analysis in Persian languageRegressive retrospect counter-intuitive view of ethics, autonomy and cooperation of agentsMinimizing estimation error through polynomial utility functionPrediction in the world of financeThe role of stochastic geometry in multi-object filtersMulti-agent architecture applied in parallel process Holonic systemsRobot-assisted language learning alternate to CALL and MALL

The authors here challenge the theoretical meta-problems that manipulate the existing practical problems

This book could not have been published without the substantial contribution of many interested and involved in this endeavor. I wish to express my cordial gratitude to the enthusiastic researchers for their significant contribution in the chapters, anonymous reviewers for their valuable comments, and editorial staffs of Bentham Science Publishers, especially Ms. Fariya Zulfiqar, for their kind cooperation.

It is a pride to have the Foreword of this eBook written by Dr. Michael N. Huhns, Distinguished Professor Emeritus of Computer Science and Engineering.

Dr. Faria Nassiri-Mofakham University of Isfahan, Isfahan, P.O.Code 81746-72441, Iran E-mail: [email protected]

List of Contributors

Abdolreza NazemiSchool of Economics and Business Engineering, Karlsruhe Institute of Technology, Karlsruhe, GermanyAhmad Reza Naghsh-NilchiFaculty of Computer Engineering & Information Technology, University of Isfahan, Isfahan, IranAlireza Bab-HadiasharAerospace, Mechanical and Manufacturing Engineering, RMIT University, Melbourne, VIC 3000, AustraliaAmirali K. GostarAerospace, Mechanical and Manufacturing Engineering, RMIT University, Melbourne, VIC 3000, AustraliaCatholijn M. JonkerInteractive Intelligence Group, Delft University of Technology, Delft, The NetherlandsDara TafazoliDepartment of English and German Philologies, University of Córdoba, Córdoba, SpainFaria Nassiri-MofakhamDepartment of Information Technology Engineering, University of Isfahan, Isfahan, IranFateme NematiDepartment of Artificial Intelligence, Faculty of Computer Engineering, University of Isfahan, Isfahan, IranHadi ShahmoradiDepartment of Management, Faculty of Administrative Sciences and Economics, University of Isfahan, Isfahan, IranHelder CoelhoBioISI and Mind-Brain College, Faculty of Science, University of Lisbon, Lisbon, PortugalImane BasiryComputer Engineering Department, Sheikh Bahaei University, Baharestan, IranKatsuhide FujitaFaculty of Engineering, Tokyo University of Agriculture and Technology, Tokyo, JapanKohei HayakawaDepartment of Computer Science and Engineering, Nagoya Institute of Technology, Nagoya, JapanKonstantin HeidenreichSchool of Economics and Business Engineering, Karlsruhe Institute of Technology, Karlsruhe, GermanyLevent YilmazDeptartment of Computer Science and Software Engineering, Auburn University, Auburn, USALuis AntunesBioISI/MAS/Faculdade de Ciências da, Universidade de Lisboa, Lisboa, PortugalMª Elena Gómez-ParraDepartment of English and German Philologies, University of Córdoba, Córdoba, SpainMajid EsmaelianDepartment of Management, Faculty of Administrative Sciences and Economics, University of Isfahan, Isfahan, IranMichael N. HuhnsDepartment of Computer Science and Engineering, University of South Carolina, Columbia, SC 29208, USAMohammad Ehsan BasiriDepartment of Computer Engineering, Faculty of Engineering, Shahrekord University, Shahrekord, IranNasser Ghasem-AghaeeFaculty of Computer Engineering & Information Technology, University of Isfahan, Isfahan, Iran Department of Computer Engineering, Sheikh Bahaei University, Baharestan, IranRafik HadfiDepartment of Computer Science and Engineering, Nagoya Institute of Technology, Nagoya, JapanReyhan AydoğanDepartment of Computer Science, Özyeğin University, Istanbul, Turkey Interactive Intelligence Group, Delft University of Technology, Delft, The NetherlandsReza HoseinnezhadAerospace, Mechanical and Manufacturing Engineering, RMIT University, Melbourne, VIC 3000, AustraliaTakayuki ItoDepartment of Computer Science and Engineering, Nagoya Institute of Technology, Nagoya, JapanTim BaarslagAgents, Interaction and Complexity Group, University of Southampton, Southampton, UKTrindade Nuno MagessiBioISI/ MAS/ Faculdade de Ciências da, Universidade de Lisboa, Lisboa, PortugalTuncer ÖrenSchool of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, Canada

PART I:

SIMULATION

Simulation, Intelligence and Agents: Exploring the Synergy

Nasser Ghasem-Aghaee1,2,*,Tuncer Ören3,Levent Yilmaz4
1 Department of Computer Engineering, Sheikh Bahaei University, Baharestan, Iran
2 Faculty of Computer Engineering & Information Technology, University of Isfahan, Isfahan, Iran
3 School of Electrical Engg. and Computer Science, University of Ottawa, Ottawa, ON, Canada
4 Computer Science and Software Engineering, Samuel Ginn College of Engineering, Auburn University, Auburn, AL, USA

Abstract

Simulation is applied to exhibit the extent of how the offered valuable functionalities of given issues are appreciated. A systematic glossary of about twenty types of intelligence provides a synoptic background for intelligent behavior that can be represented by agents. The three categories of the synergy of simulation and software agents are discussed in the following three sections: agent simulation, agent-supported simulation, and agent-monitored simulation. Extensive bibliographic analysis which is based on about 440 references supports each category of the synergy of simulation and software agents. Discussion of some desirable research directions and a conclusion section terminate the article.

Keywords: Agent-directed simulation, Agent-monitored simulation, Agent simulation, Intelligence, Software agent, Supported simulation.
*Corresponding author Nasser Ghasem-Aghaee: Department of Computer Engineering, Sheikh Bahaei University, Baharestan, Iran; Tel/Fax: 00983136816760; E-mail: [email protected]

1. INTRODUCTION

The synergy of simulation and intelligent software agents is explored here. Many possible applications of simulation are highlighted in Sec. 2 to appreciate the research patterns it offers. A review of intelligence and intelligent entities and the agents is reviewed in Sec. 3. A systematic glossary of about twenty types of intelligence provides a synoptic background for intelligent behavior that can be represented in agents. The possibilities of the synergy of simulation and agents are reviewed in Sec. 4. Three categories of the synergy of simulation and software agents of: agent simulation, agent-supported simulation, and agent-monitored simulation, are discussed in the following three sections. Each of these three

sections is supported by a bibliographic analysis of about 440 references. Discussion on some desirable research directions and drawing a conclusion constitutes the last section.

2. SIMULATION: HIGHLIGHTS

To be able to grasp the full potential of the synergy of simulation and software agents, acquiring knowledge on different types of simulation is essential. Modeling and simulation can be perceived from the following perspectives: (1) Purpose of use, (2) Problem to be solved, (3) Connectivity of operations, (4) Types of knowledge processing, and (5) Philosophy of science. The three purposes of simulation are: (1) Perform experiments, (2) Provide experience and (3) Imitation, pretense [1]. In this article, the focus is on the experimental aspect of simulation. In this context, simulation is a goal-directed experimentation with dynamic models, (i.e., models with time-dependent behavior). One way to distinguish different types of simulations is to consider whether a simulation program runs independent from the real system, two categories of simulation became possible: stand-alone simulation and embedded simulation [2].

2.1. Stand-alone Simulation

Here, the simulation program runs independent of the system of interest; almost all types of conventional simulations are stand-alone simulation. As listed in Table 1, there exist six types of applications of stand-alone simulation: decision making, training to enhance decision skills, training to enhance motor and related decision skills, training to enhance operational skills, understanding and education, and entertainment.

Table 1Applications of stand-alone simulation.Decision making for: -Prediction of behavior and/or performance of the system of interest -Evaluation of alternative models, parameters, experimental or operating conditions on model behavior and/or performance - Sensitivity analysis - Planning - Acquisition - Design - Prototyping - Proof of conceptTraining to enhance decision skills (gaming simulation) (also called constructive simulation)Training to enhance motor skills and related decision skills (simulators) (also called virtual simulation)Training to enhance operational skillsUnderstanding and educationEntertainment (simulation games, animation of dynamic systems)

Simulation for decision making is run for prediction, evaluation, sensitivity analysis, planning, acquisition, design, prototyping, and proof of concept. Gaming simulation is run for training to enhance decision skills. In defense applications, this type of simulation is named constructive simulation and includes war gaming, while, it is applicable for operations other than defense like, conflict management and peace assurance. In business applications, gaming simulations include business games which can be run in zero-sum environments to enhance decision making skills subject to competition or in non-zero-sum environments to enhance decision making skills subject to cooperation [3]. Simulators are often human-in-the-loop simulations where operators use virtual equipment to develop motor skills and the associated decision skills. In defense applications they are named virtual simulation. In complex systems like scientific and social systems, simulation provides the possibility to test the given hypotheses on the nature and behavior of a system and makes them easy to understand. Simulation is an enabling technology applicable in enhancing learning/teaching many topics. In entertainment, simulation is run for simulating games and for the animation of dynamic systems.

2.2. Embedded Simulation

In embedded simulation, simulation program runs together with the system of interest. The embedded simulation is of the two purposes of: enrichment and support of real system operations (Table 2).

Table 2Embedded simulation application.Enrichment of real system operation (The system of interest and the simulation program operate concurrently) Goals: - simulation-based augmented/enhanced reality operation (for training to enhance motor skills and related decision skills) - on-line diagnosticsSupport of real system operation (The system of interest and the simulation program operate alternately to provide predictive displays) - parallel experiments while real system is running

In enrichment of real system operation, the system of interest and simulation program runs concurrently. Depending on the objectives, there exist different possibilities like: simulation-based augmented/enhanced reality and on-line diagnosis. The Simulation-based augmented/enhanced reality is an accepted form of advanced training environments where real operators can operate real equipment at augmented reality mode. The embedded simulation systems are well known especially in training associated with equipment operation [4]; and are applicable in decision systems [5]. In the on-line diagnosis, the output of the simulation program and the real system is compared on-line, where, any deviation in the real system’s behavior from the simulated behavior may indicate a malfunction.

In the second type of embedded simulation application, the objective is to support the real system operation. Here, the system of interest and the simulation program operate alternately to provide predictive displays where, real system data can be applied: 1) to calibrate the simulation model and its parameters and 2) as input to the simulation system in order to evaluate the effects of decisions regarding the real system’s behavior before feeding them to the real system.

2.3. Other Perspectives

In another context, there exists the possibility to discriminate different types of simulation, based on where the computations are carried out. The computation can be run on a single computer or on different computers in a network1. The last possibility leads to distributed simulation [6, 7] and possibly to Web-based simulation (which could rely on agent-directed simulation and can apply mobile agents in simulation.) The advantages of distributed simulation [8] (p.261) are:

- Partitioning the simulation problem between machines with high potential of interest- Interoperability and sharing of resources- Exploiting graphics, ability provided by special machine

Distributed-interactive simulation is run mostly in military applications, where simulators from different types of forces are connected to form a full battle situation [9, 10]. In parallel simulation, simulation program operates on multi-processor machines something true in real world where systems naturally operate in parallel. The advantages are increased speed and/or increased size of the model [8] (p.261). Federated simulation [11] is an example of interoperability of several simulation studies; each named a federate. This simulation is based on the military requirements of the Department of Defense (DoD) of the USA and joint forces of NATO (NATO MP). Current realization relies on High Level Architecture (HLA). For HLA education, refer to Morse (2000). The HLA is applied a methodology-based simulation approach [12]. For other aspects of simulation, there exist some taxonomies available on the following topics: simulation [13], simulation languages [14, 15], simulation models [16], simulation model behavior [17], simulation model processing [18, 19], simulation quality assurance [20], and artificial intelligence (AI) in simulation [21].

3. INTELLIGENCE, INTELLIGENT ENTITIES, AND AGENTS

Intelligence is an important characteristic and is being studied since the ancient times [22]. The same researches state: “Working meaningfully in the field of intelligence requires a broader background than might be the case in another field. Work in this field cross-cuts cognitive psychology, biological psychology, developmental psychology, differential psychology, educational psychology, personality psychology, cultural psychology, industrial-organizational psycho-logy, and possibly other areas of psychology. To keep up with this field and advance it, one must be able to understand and to integrate the contributions from these various aspects of the field.” Intelligence exists in natural systems like in humans, animals, and in engineered systems like robots, in some AI software systems, and agents. In cyberspace, they are named info-habitants [23].

Most of the authors in AI adopted Minsky’s definition: “Artificial intelligence is the science of making machines to perform things that would require intelligence if done by humans” [24]. However, there exist counter examples on this, for example, taking the cubic root of a number on the human part would require, knowledge (of the algorithm) and mental ability (intelligence); while, done by a calculator, this ability is not sufficient to allow the calculator be labeled as intelligent. Some taxonomies of intelligence are given by Schmutter [25] and Sternberg [22]. In an early study where a classification of about 500 types of knowledge and knowledge processing knowledge was presented, Ören [26] wrote:

The advances in studies of the brain and cognitive sciences are very important and would have implications on artificial intelligence. However, it would be very useful to demystify intelligence and to identify its components in terms of knowledge for knowledge representation and knowledge processing (or knowledge-processing knowledge) in order to embed them in different machines having knowledge-processing abilities.

It may take long while, if not ever, before the use of the term ‘intelligence’ would mean ‘artificial intelligence’, ‘machine intelligence’, ‘computational intelligence’, or ‘synthetic intelligence’. Currently, when we use the term ‘satellite’ we no longer think of the moon, the natural satellite of the earth, whereas, in the 1960s, one had to use the term ‘artificial satellite’ to denote any man-made satellite. The objective of building man-made satellites was obviously not to replace the natural one(s) but to create new modalities of them. Similarly, the objective of AI is not to replace natural intelligence but to create new modalities of intelligence or advanced knowledge processing. Davis and Hersh who quoted from Good state that Good (1964, 1965) “observes first of all that there is no point in building a machine with the intelligence of a man since it is easier to construct human brains by the usual method.” One should build an ultra-intelligent machine which may “be defined as a machine that can far surpass all the intellectual activities of any man however clever” [27].

Once the elements of advanced knowledge representation and knowledge-processing knowledge are well defined, they can be expressed in terms of different programming paradigms such as distributed, parallel, real-time, procedural, and functional programming; and data-flow, object, rule-oriented, and agent-based paradigms.

In the Handbook of Human Intelligence, an all-embracing definition of intelligence is offered as follows: “we shall try to define intelligence, as have others before us, as a goal-directed adaptive behavior”. At the end of the chapter, we will argue: that this definition does indeed fit the body of ideas is agreed upon [26, 28].

3.1. Types of Intelligence

The objective here is to realize the engineered systems with advanced cognitive knowledge processing abilities. As a generic definition, the following definition is accepted: “intelligence (human, animal, or machine) is an adaptive and goal-directed knowledge processing ability” [29]. Intelligence has several aspects and types worthy of being discriminated. Taxonomy of intelligence types is illustrated in Fig. (1), where rectangles with continuous lines are the types of intelligence and rectangles with dashed lines being the criteria to distinguish the types of intelligence. In the later sections, a reference to intelligence may point out to any one of these types of intelligence. Intelligence is enhanceable. Any type of intelligence can best be represented in a continuum as the level or the value of the intelligence (wherever metrics and measurement processes are defined), rather than by a binary choice.

With respect to knowledge processing abilities, there exist two types of machines or systems: Systems for knowledge processing and systems with additional knowledge processing abilities. Knowledge processing machines are the computers. For a historic view of knowledge processing machines other than computers, refer to [26]. Machines or systems with additional knowledge processing abilities have knowledge processing abilities to satisfy their main purpose of existence better [26]. Such machines or systems can, perform optimization (like a tracking missile or a vehicle-sensing road). In engineering applications, systems or machines with knowledge processing abilities to support/optimize their functionality are named the smart systems (such as smart bridges); however, intelligence of these types of applications is rather low. In machine intelligence, some of the metrics applicable to humans, such as intelligence quotient (IQ) would be meaningless, since machine intelligence is independent of the machines’ age.

Fig. (1)) Types of intelligence.

A systematic glossary2 of the types of intelligence is presented in Table 3. The taxonomy refers to three aspects of intelligence: the entities where intelligence is applied, the context within which intelligence applied and the components (mechanisms – structures and processes) of intelligence.

Table 3Types of intelligence (a systematic glossary).AspectsTypesDefinitionsgenericIntelligence is an adaptive and goal-directed knowledge processing ability [29].abstractAbstract intelligence is the ability to understand and manipulate with verbal and mathematical symbols [30].entities- linguisticLinguistic intelligence is the capacity to use words effectively orally or in writing [31].- logical- mathematicalLogical-mathematical intelligence is the capacity to use numbers effectively and to reason well [31].- musicalMusical intelligence is the capacity to perceive, discriminate, transform and express musical forms and sensitivity to rhythm, pitch and melody [31].entitiesconcreteConcrete intelligence (mechanistic intelligence) is the ability to understand and manipulate with objects [30].objects- visual- spatialVisual-spatial intelligence is the ability to perceive the visual-spatial world accurately and sensitivity to color, line, shape, form, and space [31].- naturalisticNaturalistic intelligence is the ability to recognize and classify plants, animals, or minerals and cultural artifacts [31].- contextualContextual intelligence is the ability to adapt to, select, and shape the environment [32].people (emotions)Emotional intelligence (EI) involves the ability to monitor one's own and others' emotions, to discriminate among them, and to use the information to guide one's thinking and actions (modified from Mayer and Salovey, 1993; in the original: “EI is a type of social intelligence”.) [33]- othersInterpersonal intelligence is the ability to perceive and make distinctions in the moods, intentions, motivations, and feelings of other people for managing emotions [31].Social intelligence is interpersonal intelligence.- selfIntrapersonal intelligence is self-knowledge and the ability to act adaptively on the basis of that knowledge [31].Body-kinesthetic intelligence is the ability to use one’s whole body to express ideas and feelings or to use one’s hands to produce or transfer things [31].contextExperiential intelligence is the ability to deal with new tasks or situations and the ability to use mental processes automatically [32].unfamiliar- fluidFluid intelligence is one’s ability to reason and solve problems in novel or unfamiliar situations [34].familiar- crystallizedCrystallized intelligence is the extent to which an individual has attained the knowledge of a culture. (Also called learned intelligence) [34].- practicalPractical intelligence is the ability to do well in informal and formal educational settings; adapting to and shaping one's environment [35].componentsComponential intelligence refers to the cognitive components of intelligence. It includes performance components, meta-components for monitoring and control, and knowledge acquisition and performance improvement components [35].- neuralNeural intelligence is rooted in a biological system and determined by neural efficiency –the brain's physical processes [36].- reflexiveReflexive intelligence refers to one’s broad-based strategies for attacking problems, for learning, and for approaching intellectually challenging tasks. It includes attitudes that support persistence, systemization, and imagination. It includes self-monitoring and self-management [36].- learnableLearnable intelligence is the combination of both experiential and reflective intelligence [36].

The objective of studying intelligence in this chapter is to distinguish its types in a sense that they would be useful in representing software agents; hence, some modifications to the definitions are made. To give full credit to the authors from whom the definitions are borrowed, their names are expressed and to clarify that they are not the original definitions, modified definitions are indicated.

3.1.1. Entities

The entities to which intelligence is applied are of three groups: abstract entities, concrete objects, and people. Abstract intelligence is intelligence applied to abstract entities such as ideas, and has the three main sub-types of: linguistic intelligence, logical-mathematical intelligence, and musical intelligence. Concrete intelligence, (named mechanistic intelligence as well) applies to concrete objects and has the three sub-types of: visual-spatial intelligence, naturalistic intelligence, and contextual intelligence.

Emotional intelligence is applied to self (intrapersonal) or to others (interpersonal). Emotional intelligence has an aspect which concerns only others, (i.e., empathy). Empathy is “sensitivity to others’ feelings and concerns and taking their perspective; appreciating the differences in how people feel about things” [37]. Three other aspects of emotional intelligence are: self-awareness, managing emotions, and motivation are applicable to one's self and others as well. Self-awareness of emotions is observing oneself and recognizing feelings as they happen. Emotional awareness is observing others to recognize feelings as they happen. Managing emotions is “handling feelings so that they are appropriate and realizing what is behind a feeling, and finding manners to handle fears and anxieties, anger, and sadness” [37].

Motivation is channeling emotions in the service of an objective; emotional control; delaying gratification and stifling impulses. Hence, emotional intelligence is the ability to monitor one’s own and others’ emotions, to discriminate among them, and to use the information to guide one’s thinking and actions. Social intelligence is emotional intelligence applied to others.

The relations between the emotional intelligence with intrapersonal and interpersonal (social) intelligence are expressed in Fig. (2). In the literature emotional intelligence is defined as to be a type of social intelligence, while, here the view is explicitly different, (Fig. 2).

Fig. (2)) Relation of emotional intelligence with intrapersonal and interpersonal (social) intelligences.

There exists a strong relation between intelligence (especially social intelligence) and personality traits and facets [38]. The basis for fuzzy agents with personality is elaborated in [39, 40].

3.1.2. Context

The context within which intelligence operates can be unfamiliar or familiar. Experiential intelligence is the ability to deal with new tasks or situations and the ability to use mental processes in an automated manner. Fluid intelligence is an intelligence type operating in unfamiliar situations. The intelligence is crystallized intelligence with practical intelligence as a subtype.

3.3. Components

The components of an intelligent knowledge processing entity consist of: performance, monitoring and control, and knowledge acquisition and improvement components. Performance components realize several types of cognitive knowledge processing such as inference, reasoning, anticipation (pro-activeness), decision making, and assessing [26]. Monitoring and control components monitor self and others during knowledge processing (introspection for self, perception for others) or after knowledge processing activities (postmortem analysis). Knowledge acquisition and improvement components are for perception, understanding [41] and learning. The last type leads to learnable intelligence, equally important for natural intelligence and for machine intelligence and software agents’ intelligence. Identification of the components or mechanisms –structures and processes of intelligence– leads to componential intelligence [35]. The two types of componential intelligence are the neural intelligence and reflexive intelligence.

3.4. Agents

Agents are autonomous software modules with perception and social ability to perform goal-directed knowledge processing, over time, on behalf of humans or other agents in software and physical environments. The last part of the definition begins with on behalf of is a truism and if omitted would be implied.

The core knowledge processing abilities of agents include: reasoning, motivation, planning, and decision making. Additional abilities of agents are needed to increase their intelligence and trustworthiness. Abilities to make agents intelligent include anticipation (pro-activeness), understanding, learning, and communication in natural and body language. Abilities to make agents trustworthy and assuring the sustainability of agent societies include being rational, responsible, and accountable, which lead to rationality, skillfulness and morality (e.g., ethical agent, moral agent).

Software agents may have most of the aspects of intelligence as outlined in Table 3. The type and level of needed intelligence depend on the knowledge processing requirement of the task. In the next section, regarding synergies of simulation and agents, it will become apparent how drastically does the intelligence represented by software agents contribute to simulation. There exists a strong relation among intelligence (especially emotional intelligence), personality traits and facets [38]. The basis for fuzzy agents with personality is elaborated in [39, 40].

3.5. Software for Agents

Java Agent DEvelopment framework (JADE) is implemented in Java language and used in developing agent applications [42, 43]. JADE is probably the most widespread agent-oriented middleware applied today. JADE is a completely distributed middleware system with a flexible infrastructure allowing easy extension with add-on modules. JADE offers a rich set of programming abstractions allowing developers to construct JADE multi-agent systems with relatively minimal expertise in agent theory. The JADEX agent framework is presented by [44], which supports reasoning by exploiting the BDI model and is considered as an extension to the widely applied JADE middleware platform.

NetLogo [45, 46] is a multi-agent programming language and modeling environment for simulating complex natural and social phenomena.

The Recursive Porous Agent Simulation Toolkit (Repast) is one of the several agent modeling available toolkits. Repast borrows many concepts from the Swarm agent-based modeling toolkit [47]. The three implementation of the Repast agent modeling toolkit is presented by North, et al. [48].

The evaluation of free Java-libraries for social scientific agent-based simulation is presented by Tobias and Hofmann [49]. A survey of various agent-based modeling platforms is presented by Nikolai and Madey [50]. Railsback et al. apply five software platforms in agent based simulation [51].

4. SYNERGIES OF SIMULATION AND AGENTS

Agent-directed Simulation refers to the synergy of software agents and simulation. As observed in Fig. (3), there are three possibilities that can be considered under two groups: 1) simulation for agents: which consists of agent simulation and, 2) agents for simulation which consists of agent-supported simulation and agent-monitored simulation [11]:

Fig. (3)) Types of agent-directed simulations. Agent simulation is simulation of agent systems. It is also named agent-based simulation.Agent-supported simulation is the use of agents for at least one of the following purposes: To provide computer assistance for front-end interface functions in a computer-aided simulation study;To provide computer assistance for back-end interface functions in a computer-aided simulation study;To process elements of a simulation study symbolically for example, consistency checks; andTo provide cognitive abilities to the elements of a simulation study like learning, understanding and/or hypothesis formulation.Agent-monitored simulation is the use of agents for generation and/or monitoring of agent behavior. (This is similar to the use of AI techniques –like qualitative simulation– in generating model behavior).

The simulation synergy symmetry and artificial intelligence in general [21, 29] and the simulation synergy and agents are tabulated in Table 4.

5. AGENT SIMULATION

Agents provide a natural pattern to represent intelligent entities. Agent simulation is involved in natural or engineered entities with cognitive abilities represented by agents. Here the three constituent parts of this simulation, the: applications, methodology, and software for agent simulation are presented.

Table 4Types of simulation, based on the synergy of simulation with ai and with agents.Synergy of Simulation and:Synergy is in the:Agents(Agent-directed simulation)AI(AI-directed simulation)(Agent simulation) Simulation of agents which represent natural or engineered systems which have cognitive abilities (such as infohabitants)(Cognitive simulation) Simulation of natural or engineered systems, which have cognitive abilitiesModel (and associated machine intelligence)(Agent-supported simulation)(AI-supported simulation)Support functions (and associated machine intelligence)Agents are used to support user interface functions: • Front-end interface functions • Back-end interface functionsAI is used to support user interface functions: • Front-end interface functions • Back-end interface functionsAgents are used to support processing of any specification (for purposes other than model behavior generation or monitoring), e.g.: • Agent supported simulation quality assuranceAI is used to support processing of any specification (for purposes other than model behavior generation or monitoring), e.g.: • AI supported simulation quality assuranceAgent-supported simulation program processing • Agent-supported simulation program generation • Agent-supported simulation program processing, e.g.: • Agent-supported simulation program comprehensionAI-supported simulation program processing • AI-supported simulation program generation • AI-supported simulation program processing, e.g.: • AI-supported simulation program comprehension(Agent-monitored simulation) Agents are used for the generation and/or monitoring of model behavior(AI-based simulation) AI is used for the generation and/or monitoring of model behavior: Knowledge-based simulation Qualitative simulationGeneration and/ormonitoring of modelbehavior (and associated machine intelligence)

5.1. Applications

A synopsis of the application areas of agent simulation is presented in Tables 5a-e. Almost all references are dated after year 2000. The engineering applications of agent simulation used in electrical engineering, irrigation systems, manufacturing systems, mechatronics, network, robotics, software, and transportation / logistics are tabulated in bold in Table 5a. The economy and management applications of agent simulation, references on economy, e-commerce, and management are presented in Table 5b. The agent simulation of social systems and human behavior applications and references that cover social systems, psychology/human behavior, and physiology are presented in Table 5c. The agent simulation of environmental issues is presented in Table 5d. Table 5e is on military applications.

Table 5aAgent simulation – engineering applications.Application AreasYearAuthor(s)ReferenceElectrical engineeringDewi et al. Weinhardt et al.2000 2000[52] [53]Electric powernNorth2000[54]Solar power plantBrucks & Mosler2002[55]SoccerRabiee & Ghasem-Aghaee2004[56]Irrigation systemAbrami et al Barreteau et al. Bertelle et al.2003 2001 2000[57] [58] [59]Manufacturing systemBrennan & William Jahangirian et al. Giret & Botti Leitao Macedo Mönch & Stehli Valckenaers & Brussel2000 2010 2004 2009 2000 2002 2005[60] [61] [62] [63] [64] [65] [66]MechatronicsOberschelp et al.2002[67]NetworkDe Franceschi et al. Eymann et al. Kim, G.J. & Kim, Y.S. Kotenko & Maňkov2000 2003 1998 2003[68] [69] [70] [71]RoboticsBarchanski & Veci Bernhardt et al. Ghasem-Aghaee et al. Kitano et al. Klančar et al. Rolf et al. Shafii et al.2000 2001 2008 1997 2002 2001 2015[72] [73] [74] [75] [76] [73] [77]SoftwareDavid et al. Kindler Minar et al. Osman & Bargiela Rarau et al. Uhrmacher & Kullick2002 2000 1996 2000 2000 2000[78] [79] [80] [81] [82] [83]Transportation /LogisticBriegel Franke et al. Nagel Weyns et al.2002 2002 2003 2007[84] [85] [86] [87]Industrial supply networkParunak et al.1998[88]Scheduling of logistic processesSilva et al.2002[89]TrafficBernocco et al. Bazzan et al. Burmeister et al. Chen Champion et al. Fujioka & Ishibashi Hallé et al. Hertkorn & Wagner Hofmann et al. Huard et al. Pritchett Zhang, et al.2003 2005 1997 2009 2003 2003 2003 2000 2002 2006 2002 2013[90] [91] [92] [93] [94] [95] [96] [97] [98] [99] [100] [101]
Table 5bAgent Simulation Management/Economy Applications.Application AreasAuthor(s)YearReferenceEconomyBauer et al. Brouwers & Verhagen Chaturvedi & Mehta Deguchi et al. Fougères et al. Fukuta et al. Holanda et al. Iba et al. Kurahashi & Terano Macal & North Mizuta & Yamagata Pajot Phan Sinha-Ray et al. Sornette, D. Soulié & Théband Winoto Winoto Winoto & Tang2002 2002 1999 2001 2000 2001 2003 2001 2001 2002 2001b 2003 2003 2003 2014 2003 2002a 2002b 2001[102] [103] [104] [105] [106] [107] [108] [109] [110] [111] [112] [113] [114] [115] [116] [117] [118] [119] [120]E-commerceAlrifai et al. Chiarella et al. Fukumoto & Kita Gallegati et al.2016 2002 2001 2002[121] [122] [123] [122]E-commerceHonarvar & Ghasem-Aghaee Janssen & Verbraeck Kalisz & Florea Kawamura et al. LI-xia Marti Mizuta & Steiglitz Mizuta & Yamagata Moyaux et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Praça et al Roozmand et al. Sallans et al. Shahmoradi et al. Wiedemann Yoo et al.2010 2000 2000 2001 2009 2000 2000 2001a 2003 2006 2007 2008 2009a 2009b 2015 2001 2011 2002 2014 2000 1998[124] [125] [126] [127] [128] [129] [130] [131] [132] [133] [134] [135] [136] [137] [138] [139] [140] [141] [142] [143] [144]ManagementGeneral planningAntona et al. Bousquet et al. Bousquet & Le Page Bruzzone & Revetria Carlson et al. Dorokhov Farolfi et al. Fu et al. Garcia Gilbert et al. Henoch & Ulrich Khouj et al. Lynam et al. Martin & LePage Pahl-Wostl Szymanski et al. Tiffany et al. Tiffany et al. Urban & Sibbel Walsh & Sawhney Zimmermann et al.2002 2001b 2004 2003 2002 2001 2002 2000 2005 2002 2001 2011 2002 2001 2001 2003 2002a 2002b 2000 2003 2001[145] [146] [147] [148] [149] [150] [151] [152] [153] [154] [155] [156] [157] [158] [159] [160] [161] [162] [163] [164] [165]Real time planningAnderson1997[166]Supervisory Control systemsEdala et al.1999[167]
Table 5cAgent simulation social systems and human behavior applications.Application AreasAuthor(s)YearReferenceSocial systemsSocial approachesAxtell Azad-Manjiri & Ghasem-Aghaee Boisot et al. Bourjot & Chevrier Carley Conte et al. David et al. Davidsson Davidsson Davidsson Downing et al. Gilbert Ghasem-Aghaee et al. Grimm & Railsback Hofmann Honarvar & Ghasem-Aghaee Joseph, et al. Kazemifard, et al. Kazemifard et al.1998 2010 2003 2001 2002 1998 2000 2002a 2000b 2000c 2001 2002 2009 2005 2002 2009a 2014 2006 2009[168] [169] [170] [171] [172] [173] [174] [175] [176] [177] [178] [179] [180] [181] [98] [182] [183] [184] [185]Social systemsSocial approachesKazemifard et al. Kazemifard et al. Klinger Kottonau & Pahl-Wostle Martinez-Miranda et al. Martinez-Miranda & Aldea Martínez-Miranda &Pavón Moss PoorMohamadBagher et al. Ören et al. Ray et al. Remondino Reynolds, et al. Rossetti et al. Saam Sansonnet & Valencia Servat et al. Simão & Pereira Sun Thébaud & Locatelli Verhagen2011a 2014 2000 2002 2002 2004 2008 2000 2009 2009 2000 2003 2002 2000 2000 2003 1998 2003 2006 2001 2000[186] [187] [188] [189] [190] [191] [192] [193] [194] [195] [196] [197] [198] [199] [200] [201] [202] [203] [204] [205] [206]Population dynamicsBousquet et al.2001a[207]Simulator for harborJarjoui et al.2001[208]Psychology / human behaviorAdamatti & Bazzan Baillie &Toleman Baillie Brucks Ghasem-Aghaee & Ören Ghasem-Aghaee & Ören Ghasem-Aghaee et al. Ghasem-Aghaee et al Ghasem-Aghaee et al. Kazimifard et al. Kazemifard et al. Kazemifard et al. Mazadi et al. Mosler Mosler & Tobias Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Roozmand et al. Schmidt Shahmoradi et al. Zafari et al. Zafari et al. Zafari et al.2003 2001 2002 2001 2003 2007 2006 2007 2008 2006 2011b 2012 2008 2002 2001 2006 2007 2008 2009a 2009b 2014 2015 2011 2002 2014 2015 2016 2016[209] [210] [211] [212] [40] [213] [214] [215] [74] [184] [216] [217] [218] [219] [220] [133] [134] [135] [136] [137] [221] [138] [140] [222] [142] [223] [298] [244]NegotiationAlrifai et al. Lopes et al. Lopes et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nassiri-Mofakham et al. Praca & Ramos Ramezani et al. Schmelz Shahmoradi et al. Zafari et al. Zafari et al. Zafari et al.2016 2000 2001 2006 2008 2009 2015 2001 2011 2001 2014 2015 2016 2016[121] [225] [226] [133] [135] [136] [138] [139] [227] [228] [142] [223] [298] [224]PhysiologyImmune systemsReilly et al. Meshkin et al. Shafaei & Ghasem-Aghaee2001a 2010 2008[229] [230] [231]Malaria epidemiologyde Vries2001[232]Micro-biologyJonker et al.2002[233]
Table 5dAgent simulation - environmental applications.ApplicationAreasAuthor(s)YearReferenceEnvironmentEcosystemCampos & Hill Castle & Crooks Franchesquin & Espinasse Franchesquin et al.1998b 2006 2000 2003[234] [235] [236] [237]Land useGotts Ligtenberg et al. Rand et al.2001 2002 2003[238] [239] [240]Sand pilesBreton et al. Rand et al.2001 2002[241] [242]
Table 5eAgent simulation – military applications.Application AreasAuthor(s)YearReferenceMilitary(AOS) Baxter & Hepplewhite Bullock et al. (CHSSI) Cil,& Mala Gaston Gaupp & Hill Hill et al. Janssen & De Vries2016 1999 2000 2002 2010 2000 1999 2003 1998[243] [244] [245] [246] [247] [248] [249] [250] [251]MilitaryLucas et al. Lucas & Goss Maamar Ören et al. Rao et al. Schwarz et al. Tolk Yilmaz & Paspuletti1992 1999 2001 2000b 1993 2002 2005 2005[252] [253] [254] [255] [256] [257] [258] [259]
Table 6aAgent simulation methodology in general.Author(s)YearReferenceArtikis et al. Campero et al. Cohen Dugdale et al. Epstein Ferber et al. Ghasem-Aghaee & Ören Greensbey Hare et al. Ivashkin Jávor Jávor Kazemifard et al. Lepperhoff Marietto et al. Miller & Page Nagendra & Chartier Nassiri-Mofakham et al. Nassiri-Mofakham et al. Nesterenko & Parinov Ören et al. Ören Ören Ören & Yilmaz Ören & Yilmaz Ören & Yilmaz Ören et al. Ören & Yilmaz Ören et al. Obaidat et al. Pitts &Chiu Ramanath & Gilbert Reilly et al. Saval et al. Schlungbawn Surdu et al. v & Shimohara Tandayya & Zobel Terán Tokumoto et al Uhrmacher Uhrmacher &Schattenberg Voinea Yilmaz & Ören Zafari et al.2001 2000 2001 2000 2006 2003 2003 2001 2002 2001 1990 1992 2011b