Computational Intelligence - August 2014 - 60

execution, it first sends a regare seven types of messages:
istration message to the regisregistration and deregistration
Face Recognition and
tration module. The registramessages for registering and
Marker Detection Program
tion message contains
deregistering corresponding
information of the agent, and
agents to the system, data
that information is stored in
messages for providing comRGB Image
the agent database. On the
putational results of a correother hand, when the agent
sponding agent to other
terminates, it sends a deregisagents, request and response
Camera
tration message, which conmessages for communication
tains its restoration data. The
among agents to share each
(a)
restoration data stores the last
other's functionality, and resinternal state of the agent, and
toration and deactivation
it is stored in the agent datamessages sent by the agent
Face Recognition Program
Marker Detection Program
base by the registration modmanager to support automatic
ule. The corresponding agent
execution and termination of
receives this data when it is
the related agents. In this
RGB Image
RGB Image
executed again.
paper, the messages are impleThe communication modmented using Java Script
ule shares the data and funcObject Notation (JSON)
Camera (1)
Camera (2)
tions of agents through
which has a smaller data size
inter-messaging among agents.
than XML and is simpler than
(b)
It handles three types of mesbinary encoding [34].
sages: data, request, and reThe following is a list of
sponse messages. A data
the seven kinds of imple- Figure 4 Two example structures for most of the existing robot development platforms: (a) an integrated software component of the two
message sends data from one
mented messages:
image processing algorithms and (b) two separate software compoagent to other agents.When an
i) Registration message from nents each for a corresponding algorithm.
agent sends a data message, the
an agent: The registration
communication module transfers the mesmessage, 'input': specifier for the
message from an agent consists of
sage to proper agents according to the derequested data, e.g. pixel position,
several key-values, such as 'message
scriptions of agents in the agent database.
sensor ID, etc., and 'data type': the
type': the type of the message, 'verMoreover, for safe operation of the robot
type of the requested data.
sion': the protocol version of the
system, data flow could be permitted or
v) Response message from an agent: The
agent for judging the compatibility
blocked by the data flow control module.
response message from an agent
of the corresponding agent with the
The communication module transmits
consists of 'message type': the type
agent manager, 'agent name': the
data messages only when the data flow is
of the message, 'input': specifier for
name of the agent, 'input data': the
permitted. Such permission information is
the requested data, e.g. pixel positype of input data, and 'output data':
stored in the data flow database. When an
tion, sensor ID, etc., 'data type': the
the type and class of output data.
agent needs some data, it sends a request
type of the requested data, and
ii) Deregistration message from an agent:
message to the communication module.
'data': the requested data.
The deregistration message from an
The communication module finds the
vi) Deactivation message from the monitoragent consists of 'message type': the
agent that can generate the data by checking module: The deactivation mestype of the message, 'restoration
ing the descriptions of agents in the agent
sage from monitoring module to an
data': the data specifying agent's last
database and then transmits the request
agent consists of 'message type': the
active state, and 'execution filename':
message to the found agent. Such request
type of the message.
the execution filename of the agent.
information including the request time is
vii) Restoration message to an agent: The
iii) Data message from an agent: The
stored in the communication database.The
restoration message to an agent
data message from an agent consists
agent that has received the request message
consists of 'message type': the type
of 'message type': the type of the
sends back a response message that conof the message and 'restoration
message, 'data type': the type of
tains the requested data to the communidata': the data specifying agent's last
the transmitted data, e.g. behavior,
cation module. Then, the communication
active state.
measurement, etc., and 'data': the
module transmits the requested data to
In the agent manager, the registration
data value.
the requesting agent according to the remodule manages the agent database to
iv) Request message to an agent: The
quest information in the communication
store the information about all the
request message to an agent consists
database and then removes the request
agents. When an agent is activated for
of 'message type': the type of the

60

IEEE ComputatIonal IntEllIgEnCE magazInE | august 2014



Table of Contents for the Digital Edition of Computational Intelligence - August 2014

Computational Intelligence - August 2014 - Cover1
Computational Intelligence - August 2014 - Cover2
Computational Intelligence - August 2014 - 1
Computational Intelligence - August 2014 - 2
Computational Intelligence - August 2014 - 3
Computational Intelligence - August 2014 - 4
Computational Intelligence - August 2014 - 5
Computational Intelligence - August 2014 - 6
Computational Intelligence - August 2014 - 7
Computational Intelligence - August 2014 - 8
Computational Intelligence - August 2014 - 9
Computational Intelligence - August 2014 - 10
Computational Intelligence - August 2014 - 11
Computational Intelligence - August 2014 - 12
Computational Intelligence - August 2014 - 13
Computational Intelligence - August 2014 - 14
Computational Intelligence - August 2014 - 15
Computational Intelligence - August 2014 - 16
Computational Intelligence - August 2014 - 17
Computational Intelligence - August 2014 - 18
Computational Intelligence - August 2014 - 19
Computational Intelligence - August 2014 - 20
Computational Intelligence - August 2014 - 21
Computational Intelligence - August 2014 - 22
Computational Intelligence - August 2014 - 23
Computational Intelligence - August 2014 - 24
Computational Intelligence - August 2014 - 25
Computational Intelligence - August 2014 - 26
Computational Intelligence - August 2014 - 27
Computational Intelligence - August 2014 - 28
Computational Intelligence - August 2014 - 29
Computational Intelligence - August 2014 - 30
Computational Intelligence - August 2014 - 31
Computational Intelligence - August 2014 - 32
Computational Intelligence - August 2014 - 33
Computational Intelligence - August 2014 - 34
Computational Intelligence - August 2014 - 35
Computational Intelligence - August 2014 - 36
Computational Intelligence - August 2014 - 37
Computational Intelligence - August 2014 - 38
Computational Intelligence - August 2014 - 39
Computational Intelligence - August 2014 - 40
Computational Intelligence - August 2014 - 41
Computational Intelligence - August 2014 - 42
Computational Intelligence - August 2014 - 43
Computational Intelligence - August 2014 - 44
Computational Intelligence - August 2014 - 45
Computational Intelligence - August 2014 - 46
Computational Intelligence - August 2014 - 47
Computational Intelligence - August 2014 - 48
Computational Intelligence - August 2014 - 49
Computational Intelligence - August 2014 - 50
Computational Intelligence - August 2014 - 51
Computational Intelligence - August 2014 - 52
Computational Intelligence - August 2014 - 53
Computational Intelligence - August 2014 - 54
Computational Intelligence - August 2014 - 55
Computational Intelligence - August 2014 - 56
Computational Intelligence - August 2014 - 57
Computational Intelligence - August 2014 - 58
Computational Intelligence - August 2014 - 59
Computational Intelligence - August 2014 - 60
Computational Intelligence - August 2014 - 61
Computational Intelligence - August 2014 - 62
Computational Intelligence - August 2014 - 63
Computational Intelligence - August 2014 - 64
Computational Intelligence - August 2014 - 65
Computational Intelligence - August 2014 - 66
Computational Intelligence - August 2014 - 67
Computational Intelligence - August 2014 - 68
Computational Intelligence - August 2014 - 69
Computational Intelligence - August 2014 - 70
Computational Intelligence - August 2014 - 71
Computational Intelligence - August 2014 - 72
Computational Intelligence - August 2014 - 73
Computational Intelligence - August 2014 - 74
Computational Intelligence - August 2014 - 75
Computational Intelligence - August 2014 - 76
Computational Intelligence - August 2014 - 77
Computational Intelligence - August 2014 - 78
Computational Intelligence - August 2014 - 79
Computational Intelligence - August 2014 - 80
Computational Intelligence - August 2014 - 81
Computational Intelligence - August 2014 - 82
Computational Intelligence - August 2014 - 83
Computational Intelligence - August 2014 - 84
Computational Intelligence - August 2014 - 85
Computational Intelligence - August 2014 - 86
Computational Intelligence - August 2014 - 87
Computational Intelligence - August 2014 - 88
Computational Intelligence - August 2014 - Cover3
Computational Intelligence - August 2014 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com