-
Optimisation of Air-Ground Swarm Teaming for Target Search, using Differential Evolution
Authors:
Jiangjun Tang,
George Leu,
Yu-Bin Yang
Abstract:
This paper presents a swarm teaming perspective that enhances the scope of classic investigations on survivable networks. A target searching generic context is considered as test-bed, in which a swarm of ground agents and a swarm of UAVs cooperate so that the ground agents reach as many targets as possible in the field while also remaining connected as much as possible at all times. To optimise th…
▽ More
This paper presents a swarm teaming perspective that enhances the scope of classic investigations on survivable networks. A target searching generic context is considered as test-bed, in which a swarm of ground agents and a swarm of UAVs cooperate so that the ground agents reach as many targets as possible in the field while also remaining connected as much as possible at all times. To optimise the system against both these objectives in the same time, we use an evolutionary computation approach in the form of a differential evolution algorithm. Results are encouraging, showing a good evolution of the fitness function used as part of the differential evolution, and a good performance of the evolved dual-swarm system, which exhibits an optimal trade-off between target reaching and connectivity.
△ Less
Submitted 13 September, 2019;
originally announced September 2019.
-
On educating machines
Authors:
George Leu,
Jiangjun Tang
Abstract:
Machine education is an emerging research field that focuses on the problem which is inverse to machine learning. To date, the literature on educating machines is still in its infancy. A fairly low number of methodology and method papers are scattered throughout various formal and informal publication avenues, mainly because the field is not yet well coalesced (with no well established discussion…
▽ More
Machine education is an emerging research field that focuses on the problem which is inverse to machine learning. To date, the literature on educating machines is still in its infancy. A fairly low number of methodology and method papers are scattered throughout various formal and informal publication avenues, mainly because the field is not yet well coalesced (with no well established discussion forums or investigation pathways), but also due to the breadth of its potential ramifications and research directions. In this study we bring together the existing literature and organise the discussion into a small number of research directions (out of many) which are to date sufficiently explored to form a minimal critical mass that can push the machine education concept further towards a standalone research field status.
△ Less
Submitted 12 September, 2019;
originally announced September 2019.
-
Survivable Networks via UAV Swarms Guided by Decentralized Real-Time Evolutionary Computation
Authors:
George Leu,
Jiangjun Tang
Abstract:
The survivable network concept refers to contexts where the wireless communication between ground agents needs to be maintained as much as possible at all times, regardless of any adverse conditions that may arise. In this paper we propose a nature-inspired approach to survivable networks, in which we bring together swarm intelligence and evolutionary computation. We use an on-line real-time Genet…
▽ More
The survivable network concept refers to contexts where the wireless communication between ground agents needs to be maintained as much as possible at all times, regardless of any adverse conditions that may arise. In this paper we propose a nature-inspired approach to survivable networks, in which we bring together swarm intelligence and evolutionary computation. We use an on-line real-time Genetic Algorithm to optimize the movements of an UAV swarm towards maintaining communication between the ground agents. The proposed approach models the ground agents and the UAVs as boids-based swarms, and optimizes the movement of the UAVs using different instances of the GA running independently on each UAV. The UAV coordination mechanism is an implicit one, embedded in the fitness function of the Genetic Algorithm instances. The behaviors of the individual UAVs emerge into an aggregated optimization of the overall network survivability. The results show that the proposed approach is able to maintain satisfactory network survivability levels regardless of the ground agents' movements, including for cases as complex as random walks.
△ Less
Submitted 20 February, 2019;
originally announced February 2019.
-
Networking the Boids is More Robust Against Adversarial Learning
Authors:
Jiangjun Tang,
George Leu,
Hussein Abbass
Abstract:
Swarm behavior using Boids-like models has been studied primarily using close-proximity spatial sensory information (e.g. vision range). In this study, we propose a novel approach in which the classic definition of boids\textquoteright \ neighborhood that relies on sensory perception and Euclidian space locality is replaced with graph-theoretic network-based proximity mimicking communication and s…
▽ More
Swarm behavior using Boids-like models has been studied primarily using close-proximity spatial sensory information (e.g. vision range). In this study, we propose a novel approach in which the classic definition of boids\textquoteright \ neighborhood that relies on sensory perception and Euclidian space locality is replaced with graph-theoretic network-based proximity mimicking communication and social networks. We demonstrate that networking the boids leads to faster swarming and higher quality of the formation. We further investigate the effect of adversarial learning, whereby an observer attempts to reverse engineer the dynamics of the swarm through observing its behavior. The results show that networking the swarm demonstrated a more robust approach against adversarial learning than a local-proximity neighborhood structure.
△ Less
Submitted 27 February, 2018;
originally announced February 2018.
-
On the role of working memory in trading-off skills and situation awareness in Sudoku
Authors:
George Leu,
Jiangjun Tang,
Hussein Abbass
Abstract:
Working memory accounts for the ability of humans to perform cognitive processing, by handling both the representation of information (the mental picture forming the situation awareness) and the space required for processing these information (skill processing). The more complex the skills are, the more processing space they require, the less space becomes available for storage of information. Thi…
▽ More
Working memory accounts for the ability of humans to perform cognitive processing, by handling both the representation of information (the mental picture forming the situation awareness) and the space required for processing these information (skill processing). The more complex the skills are, the more processing space they require, the less space becomes available for storage of information. This interplay between situation awareness and skills is critical in many applications. Theoretically, it is less understood in cognition and neuroscience. In the meantime, and practically, it is vital when analysing the mental processes involved in safety-critical domains.
In this paper, we use the Sudoku game as a vehicle to study this trade-off. This game combines two features that are present during a user interaction with a software in many safety critical domains: scanning for information and processing of information. We use a society of agents for investigating how this trade-off influences player's proficiency.
△ Less
Submitted 26 February, 2018;
originally announced February 2018.
-
A Multi-Disciplinary Review of Knowledge Acquisition Methods: From Human to Autonomous Eliciting Agents
Authors:
George Leu,
Hussein Abbass
Abstract:
This paper offers a multi-disciplinary review of knowledge acquisition methods in human activity systems. The review captures the degree of involvement of various types of agencies in the knowledge acquisition process, and proposes a classification with three categories of methods: the human agent, the human-inspired agent, and the autonomous machine agent methods. In the first two categories, the…
▽ More
This paper offers a multi-disciplinary review of knowledge acquisition methods in human activity systems. The review captures the degree of involvement of various types of agencies in the knowledge acquisition process, and proposes a classification with three categories of methods: the human agent, the human-inspired agent, and the autonomous machine agent methods. In the first two categories, the acquisition of knowledge is seen as a cognitive task analysis exercise, while in the third category knowledge acquisition is treated as an autonomous knowledge-discovery endeavour. The motivation for this classification stems from the continuous change over time of the structure, meaning and purpose of human activity systems, which are seen as the factor that fuelled researchers' and practitioners' efforts in knowledge acquisition for more than a century.
We show through this review that the KA field is increasingly active due to the higher and higher pace of change in human activity, and conclude by discussing the emergence of a fourth category of knowledge acquisition methods, which are based on red-teaming and co-evolution.
△ Less
Submitted 26 February, 2018;
originally announced February 2018.
-
Computational Red Teaming in a Sudoku Solving Context: Neural Network Based Skill Representation and Acquisition
Authors:
George Leu,
Hussein Abbass
Abstract:
In this paper we provide an insight into the skill representation, where skill representation is seen as an essential part of the skill assessment stage in the Computational Red Teaming process. Skill representation is demonstrated in the context of Sudoku puzzle, for which the real human skills used in Sudoku solving, along with their acquisition, are represented computationally in a cognitively…
▽ More
In this paper we provide an insight into the skill representation, where skill representation is seen as an essential part of the skill assessment stage in the Computational Red Teaming process. Skill representation is demonstrated in the context of Sudoku puzzle, for which the real human skills used in Sudoku solving, along with their acquisition, are represented computationally in a cognitively plausible manner, by using feed-forward neural networks with back-propagation, and supervised learning. The neural network based skills are then coupled with a hard-coded constraint propagation computational Sudoku solver, in which the solving sequence is kept hard-coded, and the skills are represented through neural networks. The paper demonstrates that the modified solver can achieve different levels of proficiency, depending on the amount of skills acquired through the neural networks. Results are encouraging for develo** more complex skill and skill acquisition models usable in general frameworks related to the skill assessment aspect of Computational Red Teaming.
△ Less
Submitted 26 February, 2018;
originally announced February 2018.
-
A Review of Theoretical and Practical Challenges of Trusted Autonomy in Big Data
Authors:
Hussein A. Abbass,
George Leu,
Kathryn Merrick
Abstract:
Despite the advances made in artificial intelligence, software agents, and robotics, there is little we see today that we can truly call a fully autonomous system. We conjecture that the main inhibitor for advancing autonomy is lack of trust. Trusted autonomy is the scientific and engineering field to establish the foundations and ground work for develo** trusted autonomous systems (robotics and…
▽ More
Despite the advances made in artificial intelligence, software agents, and robotics, there is little we see today that we can truly call a fully autonomous system. We conjecture that the main inhibitor for advancing autonomy is lack of trust. Trusted autonomy is the scientific and engineering field to establish the foundations and ground work for develo** trusted autonomous systems (robotics and software agents) that can be used in our daily life, and can be integrated with humans seamlessly, naturally and efficiently.
In this paper, we review this literature to reveal opportunities for researchers and practitioners to work on topics that can create a leap forward in advancing the field of trusted autonomy. We focus the paper on the `trust' component as the uniting technology between humans and machines. Our inquiry into this topic revolves around three sub-topics: (1) reviewing and positioning the trust modelling literature for the purpose of trusted autonomy; (2) reviewing a critical subset of sensor technologies that allow a machine to sense human states; and (3) distilling some critical questions for advancing the field of trusted autonomy. The inquiry is augmented with conceptual models that we propose along the way by recompiling and resha** the literature into forms that enables trusted autonomous systems to become a reality. The paper offers a vision for a Trusted Cyborg Swarm, an extension of our previous Cognitive Cyber Symbiosis concept, whereby humans and machines meld together in a harmonious, seamless, and coordinated manner.
△ Less
Submitted 16 March, 2016;
originally announced April 2016.
-
Numerical Modeling of Complex Porous Media For Borehole Applications
Authors:
Seungoh Ryu,
Weishu Zhao,
Gabriela Leu,
Philip M. Singer,
Hyung Joon Cho,
Youngseuk Keehm
Abstract:
The diffusion/relaxation behavior of polarized spins of pore filling fluid, as often probed by NMR relaxometry, is widely used to extract information on the pore-geometry. Such information is further interpreted as an indicator of the key transport property of the formation in the oil industry. As the importance of reservoirs with complex pore geometry grows, so does the need for deeper understa…
▽ More
The diffusion/relaxation behavior of polarized spins of pore filling fluid, as often probed by NMR relaxometry, is widely used to extract information on the pore-geometry. Such information is further interpreted as an indicator of the key transport property of the formation in the oil industry. As the importance of reservoirs with complex pore geometry grows, so does the need for deeper understanding of how these properties are inter-related. Numerical modeling of relevant physical processes using a known pore geometry promises to be an effective tool in such endeavor. Using a suite of numerical techniques based on random-walk (RW) and Lattice-Boltzmann (LB) algorithms, we compare sandstone and carbonate pore geometries in their impact on NMR and flow properties. For NMR relaxometry, both laboratory measurement and simulation were done on the same source to address some of the long-standing issues in its borehole applications. Through a series of "numerical experiments" in which the interfacial relaxation properties of the pore matrix is varied systematically, we study the effect of a variable surface relaxivity while fully incorporating the complexity of the pore geometry. From combined RW and LB simulations, we also obtain diffusion-convection propagator and compare the result with experimental and network-simulation counterparts.
△ Less
Submitted 13 August, 2009; v1 submitted 13 August, 2009;
originally announced August 2009.