Small & Simple: Application-Specific Multi-Agent Systems

Small & Simple: Application-Specific Multi-Agent Systems

Michael Barlow (University of New South Wales, Australia) and Robert Cox (University of Canberra, Australia)
DOI: 10.4018/978-1-59140-640-2.ch002
OnDemand PDF Download:
$37.50

Abstract

This chapter discusses the use of abstract multi-agent models of conflict — ABDs (Agent-Based Distillation) — for security and defense purposes. The chapter promotes a complex-systems, bottom-up approach to modeling conflict in a highly abstracted manner. Three ABDs drawn from three application areas – Operations Analysis, Wargaming (decision support) and Counter-Terrorist Activity — are used as illustrations. The history, philosophy and design approach of ABDs are discussed, including the key features of abstraction, bottom-up modeling, ease of use and rapid exploration of the parameter space of a problem. Challenges facing the successful design, implementation and deployment of ABDs are discussed, including appropriate level of abstraction, validation, acceptance, parameter setting and understanding of the range of outcomes generated. The Conceptual Research Oriented Combat Agent Distillation Implemented in the Littoral Environment (CROCADILE) ABD is used to illustrate the design of an ABD, highlighting that they are not complex pieces ofsoftware by military simulation standards. A patrol scenario is constructed in which a team of patrolling agents seeks to intercept an infiltrator crossing a border. The relative benefits of increasing sensor and communication capabilities of the patrol are explored in terms of the patrol’s ability to successfully intercept the infiltrator. The Tactical Decision Support System (TDSS) ABD shows a different application of the technology — in this case, wargaming Courses Of Action (COA). An experiment is described utilizing officers from the Australian Royal Military College to wargame COA using both traditional and TDSS approaches. For the TDSS approach, significant improvement in outcomes across a range of criteria was found by both the officers using the system and the evaluating staff. Finally, the System for Life and Intelligence Modeling (SLIM) ABD is used to explore the consequences of a government’s arrest policies in a homeland defense scenario. The model incorporates different geographic regions (homeland, foreign deployment, etc.), borders, terrorists, civilians, police, military, forensic evidence and bomb attacks. The consequences of lowering or raising the arrest threshold in terms of the amount of evidence required against an individual agent are shown in terms of bomb attacks, deaths, terrorists arrested and civilians wrongly arrested.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgments
Hussein A. Abbass, Daryl Essam
Chapter 1
Daryl Essam, Hussein A. Abbass
With the increase in the complexity of terrorism’s networks and activities, the advances in chemical and biological warfare, and the use of... Sample PDF
All Hazards Analysis: A Complexity Perspective
$37.50
Chapter 2
Michael Barlow, Robert Cox
This chapter discusses the use of abstract multi-agent models of conflict — ABDs (Agent-Based Distillation) — for security and defense purposes. The... Sample PDF
Small & Simple: Application-Specific Multi-Agent Systems
$37.50
Chapter 3
Ang Yang, Hussein A. Abbass, Ruhul Sarker
Red teaming is the process of studying a problem by anticipating adversary behaviors. When done in simulations, the behavior space is divided into... Sample PDF
How Hard Is It To Red Team?
$37.50
Chapter 4
Anthony H. Dekker, Bernard Colbert
Events of the past few years have shown how today’s modern technological society is critically dependent on critical infrastructure networks such as... Sample PDF
Network Robustness for Critical Infrastructure Networks
$37.50
Chapter 5
Ajith Abraham, Johnson Thomas
Computer security is defined as the protection of computing systems against threats to confidentiality, integrity and availability. An intrusion is... Sample PDF
Distributed Intrusion Detection Systems: A Computational Intelligence Approach
$37.50
Chapter 6
Michael Barlow
This chapter covers the emerging area of the use of commercial off-the-shelf (COTS) computer games for military, defense and security purposes. A... Sample PDF
The Game of Defense and Security
$37.50
Chapter 7
Katina Michael, Amelia Masters
Spurred by the recent escalation of terrorist attacks and their increasingly devastating outcomes, defense intelligence in the context of homeland... Sample PDF
Realized Applications of Positioning Technologies in Defense Intelligence
$37.50
Chapter 8
Katina Michael, Amelia Masters
The adoption of positioning technologies to supplement, complement and function as defense intelligence applications has become widely accepted... Sample PDF
The Advancement of Positioning Technologies in Defense Intelligence
$37.50
Chapter 9
Cecilia Andrews, Edward Lewis
“Counter-terrorism refers to the practices, tactics and strategies that governments, militaries and other groups adopt in order to fight terrorism.”... Sample PDF
Simulating Complexity-Based Ethics for Crucial Decision Making in Counter Terrorism
$37.50
About the Authors