Concepts, Ontologies, and Knowledge Representation by Grega Jakus Veljko Milutinović Sanida Omerović & Sašo Tomažič
Author:Grega Jakus, Veljko Milutinović, Sanida Omerović & Sašo Tomažič
Language: eng
Format: epub
Publisher: Springer New York, New York, NY
3.3.1 Software Agents
Software agents are computer programs acting on behalf of human users or other programs. A software agent that has the ability to acquire or apply knowledge to accomplish its goals is referred to as an intelligent agent. In this section we give examples of using ontologies to support intelligent agents in pervasive computing environments and Semantic Web services.
3.3.1.1 Intelligent Agents in Pervasive Computing Environments
In pervasive computing environments, agents cooperate with each other and with other devices and services in order to support human activity, goals and needs in an âanywhere, anytime fashionâ (Chen et al. 2003a). For example, the architecture of the pervasive computing environment proposed in Chen et al. (2003b) is focused around an intelligent agent referred to as Intelligent Context Broker (ICB). The task of an ICB is to establish and share a coherent model of the environment it has been put in, including other devices, agents and people. After the ICB acquires information from sensors, devices and other agents in its environment, it integrates the information from various sources into a coherent model which is eventually used for reasoning and shared with other agents.
The proposed architecture is implemented by using a set of ontologies that provide concepts relevant for modeling pervasive computing environments (Chen et al. 2003a). A part of the ontology supporting the task of an ICB is presented in Fig. 3.3. The ontology is used to model a situation in which a speaker gives an invited speech or a presentation at a meeting which takes place in a particular room in a building. Beside the speaker, the room also hosts other participants representing the audience. The ontology also provides classes that represent environmental agents which are, according to the ontology, responsible for providing environmental information, such as whether a particular room is hosting an event, which specific people are participating in the event and what their intentions are.
Fig. 3.3A part of the ontology supporting the intelligent context broker (Chen et al. 2003a)
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Optimizing Microsoft Azure Workloads by Rithin Skaria(5911)
Kubernetes in Production Best Practices by Aly Saleh and Murat Karslioglu(5635)
Cloud Computing Demystified for Aspiring Professionals by David Santana(4730)
Zed Attack Proxy Cookbook by Ryan Soper & Nestor N Torres & Ahmed Almoailu(4178)
Google Cloud for Developers: Write, migrate, and extend your code by leveraging Google Cloud by Hector Parra Martinez(3356)
Mastering Cyber Intelligence by Jean Nestor M. Dahj;(3256)
AWS Observability Handbook by Phani Kumar Lingamallu & Fabio Braga de Oliveira(2979)
The Road to Azure Cost Governance by Paola E. Annis Giuliano Caglio(2794)
Microsoft 365 Fundamentals Guide by Gustavo Moraes and Douglas Romão(2232)
Agile Security Operations: Engineering for Agility in Cyber Defense, Detection, and Response by Hinne Hettema(1575)
Cloud Identity Patterns and Strategies: Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory by Giuseppe Di Federico Fabrizio Barcaroli(1545)
Bootstrapping Service Mesh Implementations with Istio by Anand Rai(1429)
The Road to Azure Cost Governance: Techniques to tame your monthly Azure bill with a continuous optimization journey for your apps by Paola E. Annis Giuliano Caglio(1246)
Agile Security Operations: Engineering for agility in cyber defense, detection, and response by Hinne Hettema(1184)
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs by Ryan Soper Nestor N Torres Ahmed Almoailu(1167)
Linux Administration Best Practices: Practical Solutions to Approaching the Design and Management of Linux Systems by Scott Alan Miller(1119)
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio by Parth Pandit Robert Hardt(1058)
Terraform for Google Cloud Essential Guide by Bernd Nordhausen(866)
Becoming KCNA Certified by Dmitry Galkin(845)
