Computational Intelligence - November 2013 - 37

trajectory, however fuel line ruptures, total
5DOF spacecraft models were used to test
loss of control thruster(s), loss of sensor
payload and even complete agent loss may
operations complemented by virtual reality simulations
result from major impact events. Hardware
in jBullet.
failure may occur as a result of a collision
instance, it may also occur as a random
hardware "glitch" that the agent must also
be tolerant to.
environment and a representative hardware system. We sought
The complete system is a multi-language software
to explore the system's flexibility in an environment requiring
system: the abstraction processes and agent reasoning are
a high degree of autonomy, and its feasibility for real-time
performed in Java and the spacecraft hardware is modeled
implementation.
in Simulink, which in turn uses skill abstractions developed
Encoding agent abilities through natural language abstracwith sEnglish. The hardware actions are propagated within
tions resulted in an intuitive interface into system operation;
the Java based asteroid environment; a schematic of
this is an innate advantage of the method used. In turn this
this software system and their interactions is given in
abstraction link to hardware and software processes provided a
Figure 8(a).
clear link between reasoned decisions and output actions. This
The simulation was initialized with four spacecraft
resulted in a syntactically clear agent system, where its configuagents distributed throughout a partially known asteroid
ration and subsequent operation is entirely transparent. The
field, with the high level goal of cataloging all the observabstraction method also facilitated expansion and modification
able asteroids. The spacecraft were able to negotiate (and
of agent capabilities without disturbing existing abilities, as was
renegotiate) responsibilities for orbiting asteroids, correct
evidenced with the transferal of the system to hardware; the
for thruster malfunctions, and operate in phased orbits of
several spacecraft around a single asteroid. This is shown in
Figure 9. Dur ing all operations, notification of an
approaching solar storm acted to override all current activities, forcing the spacecraft to seek shelter behind the closest suitable asteroid.
B. Hardware Implementation

For application of the agent system on hardware, true hardware
processes and real dynamics replace the Simulink models and
jBullet simulation used within the complete software application. This integrated (hardware) agent system is shown in Figure 8(b) and the ground based hardware facility used is shown
within Figure 10.
On transferal of the agent system architecture to the hardware system, there is a clear difference between interfacing true
hardware devices and those modeled within Simulink. Bridging this gap relates to enriching the sEnglish database to
include interface for the specific hardware devices being implemented; neither the high level sEnglish performative abstractions, nor the agent reasoning code, were modified for the
hardware application.
The test facility demonstrated the capability of the agent
architecture to perform aspects of the asteroid scenario, namely
motion to 'nominated' points with disturbance compensation
and phased orbiting of a nominated point, through negotiation
with companion agents. Videos of some of these actions are
available to view at http://www.sheffield.ac.uk/

Figure 9 Screen capture of two spacecraft agents entering a phased
orbit about a nominated asteroid.

acse/staff/smv.
VI. Observations

This article has presented the application of a formally verifiable agent architecture, linked to a skill abstraction library formulated in a natural language, within a complex simulation

Figure 10 Image of the ground test facility and model frame "spacecraft" robots.

November 2013 | Ieee ComputatIoNal INtellIgeNCe magazINe

37


http://www.sheffield.ac.uk/

Table of Contents for the Digital Edition of Computational Intelligence - November 2013

Computational Intelligence - November 2013 - Cover1
Computational Intelligence - November 2013 - Cover2
Computational Intelligence - November 2013 - 1
Computational Intelligence - November 2013 - 2
Computational Intelligence - November 2013 - 3
Computational Intelligence - November 2013 - 4
Computational Intelligence - November 2013 - 5
Computational Intelligence - November 2013 - 6
Computational Intelligence - November 2013 - 7
Computational Intelligence - November 2013 - 8
Computational Intelligence - November 2013 - 9
Computational Intelligence - November 2013 - 10
Computational Intelligence - November 2013 - 11
Computational Intelligence - November 2013 - 12
Computational Intelligence - November 2013 - 13
Computational Intelligence - November 2013 - 14
Computational Intelligence - November 2013 - 15
Computational Intelligence - November 2013 - 16
Computational Intelligence - November 2013 - 17
Computational Intelligence - November 2013 - 18
Computational Intelligence - November 2013 - 19
Computational Intelligence - November 2013 - 20
Computational Intelligence - November 2013 - 21
Computational Intelligence - November 2013 - 22
Computational Intelligence - November 2013 - 23
Computational Intelligence - November 2013 - 24
Computational Intelligence - November 2013 - 25
Computational Intelligence - November 2013 - 26
Computational Intelligence - November 2013 - 27
Computational Intelligence - November 2013 - 28
Computational Intelligence - November 2013 - 29
Computational Intelligence - November 2013 - 30
Computational Intelligence - November 2013 - 31
Computational Intelligence - November 2013 - 32
Computational Intelligence - November 2013 - 33
Computational Intelligence - November 2013 - 34
Computational Intelligence - November 2013 - 35
Computational Intelligence - November 2013 - 36
Computational Intelligence - November 2013 - 37
Computational Intelligence - November 2013 - 38
Computational Intelligence - November 2013 - 39
Computational Intelligence - November 2013 - 40
Computational Intelligence - November 2013 - 41
Computational Intelligence - November 2013 - 42
Computational Intelligence - November 2013 - 43
Computational Intelligence - November 2013 - 44
Computational Intelligence - November 2013 - 45
Computational Intelligence - November 2013 - 46
Computational Intelligence - November 2013 - 47
Computational Intelligence - November 2013 - 48
Computational Intelligence - November 2013 - 49
Computational Intelligence - November 2013 - 50
Computational Intelligence - November 2013 - 51
Computational Intelligence - November 2013 - 52
Computational Intelligence - November 2013 - 53
Computational Intelligence - November 2013 - 54
Computational Intelligence - November 2013 - 55
Computational Intelligence - November 2013 - 56
Computational Intelligence - November 2013 - 57
Computational Intelligence - November 2013 - 58
Computational Intelligence - November 2013 - 59
Computational Intelligence - November 2013 - 60
Computational Intelligence - November 2013 - 61
Computational Intelligence - November 2013 - 62
Computational Intelligence - November 2013 - 63
Computational Intelligence - November 2013 - 64
Computational Intelligence - November 2013 - Cover3
Computational Intelligence - November 2013 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com