TY - GEN
T1 - Hunting algorithm visualization and performance evaluation through BDI agent simulation
AU - Prince, Marc
AU - Lin, Fuhua
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/10/26
Y1 - 2018/10/26
N2 - This paper presents an agent-based simulation approach to evaluating hunting algorithm performance using Netlogo and the Belief, Desire, and Intent (BDI) architecture. Netlogo was customized to a number of two-dimensional scenarios with both hunting agents and prey agents interacting with each other and with the obstacles within the scenarios. The agents were developed with the flexibility to instantiate many types of hunters and prey. The differences in both the hunting agent and prey agents are with their skills (communications, perception, speed, etc.) and their cognitive abilities. To evaluate the viability of the approach, it was used to evaluate two hunting algorithms: The Lion Optimization Algorithm (LOA) and the Grey Wolf Optimization (GWO) algorithm. The experimental results show that the LOA was more resilient to obstacles than was the GWO. In the presence of obstacles, the lionesses are more reliable in completing joint convergence onto the prey. While the wolves have a lower convergence rate, they display an ability to recover from the confusion caused by obstacles to finally close in on their prey. The research concludes that the NetLogo programming environment is successfully adapted to the BDI architecture and is very effective in structuring a large agent-based system.
AB - This paper presents an agent-based simulation approach to evaluating hunting algorithm performance using Netlogo and the Belief, Desire, and Intent (BDI) architecture. Netlogo was customized to a number of two-dimensional scenarios with both hunting agents and prey agents interacting with each other and with the obstacles within the scenarios. The agents were developed with the flexibility to instantiate many types of hunters and prey. The differences in both the hunting agent and prey agents are with their skills (communications, perception, speed, etc.) and their cognitive abilities. To evaluate the viability of the approach, it was used to evaluate two hunting algorithms: The Lion Optimization Algorithm (LOA) and the Grey Wolf Optimization (GWO) algorithm. The experimental results show that the LOA was more resilient to obstacles than was the GWO. In the presence of obstacles, the lionesses are more reliable in completing joint convergence onto the prey. While the wolves have a lower convergence rate, they display an ability to recover from the confusion caused by obstacles to finally close in on their prey. The research concludes that the NetLogo programming environment is successfully adapted to the BDI architecture and is very effective in structuring a large agent-based system.
KW - Agent-based modelling
KW - BDI Agents
KW - Hunting algorithms
KW - simulation
UR - http://www.scopus.com/inward/record.url?scp=85056854209&partnerID=8YFLogxK
U2 - 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00053
DO - 10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00053
M3 - Published Conference contribution
AN - SCOPUS:85056854209
T3 - Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018
SP - 230
EP - 235
BT - Proceedings - IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018
T2 - 16th IEEE International Conference on Dependable, Autonomic and Secure Computing, IEEE 16th International Conference on Pervasive Intelligence and Computing, IEEE 4th International Conference on Big Data Intelligence and Computing and IEEE 3rd Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2018
Y2 - 12 August 2018 through 15 August 2018
ER -