Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
This paper presents a contribution to research on norms detection by proposing a technique, which is called the Potential Norms Detection Technique (PNDT). The literature proposes that an agent changes or updates its norms based on the variables of the local environment and the amount of thinking ab...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | View Fulltext in Publisher View in Scopus |
LEADER | 02526nam a2200361Ia 4500 | ||
---|---|---|---|
001 | 10.4018-jiit.2013070103 | ||
008 | 220112s2013 CNT 000 0 und d | ||
020 | |a 15483657 (ISSN) | ||
245 | 1 | 0 | |a Building norms-adaptable agents from Potential Norms Detection Technique (PNDT) |
856 | |z View Fulltext in Publisher |u https://doi.org/10.4018/jiit.2013070103 | ||
856 | |z View in Scopus |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-84891457501&doi=10.4018%2fjiit.2013070103&partnerID=40&md5=4e72f3451731a573144fa201016dfdb9 | ||
520 | 3 | |a This paper presents a contribution to research on norms detection by proposing a technique, which is called the Potential Norms Detection Technique (PNDT). The literature proposes that an agent changes or updates its norms based on the variables of the local environment and the amount of thinking about its behaviour. Consequently, any changes on these two variables cause the agent to use the PNDT to update the norms in complying with the domain's normative protocol. This technique enables an agent to update its norms even in the absence of sanctions from a third-party enforcement authority as found in some work, which entail sanctions by a third-party to detect and identify the norms. The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. The authors then demonstrate the operation of the algorithm by testing it on a typical scenario and analyse the results on several issues. Copyright © 2013 IGI Global. | |
650 | 0 | 4 | |a Algorithms |
650 | 0 | 4 | |a Decision support systems |
650 | 0 | 4 | |a Enforcement authorities |
650 | 0 | 4 | |a Information systems |
650 | 0 | 4 | |a Intelligent software agent |
650 | 0 | 4 | |a Local environments |
650 | 0 | 4 | |a Mining algorithms |
650 | 0 | 4 | |a Normative protocol normative system |
650 | 0 | 4 | |a Normative system |
650 | 0 | 4 | |a Norms change |
650 | 0 | 4 | |a Norms detection |
650 | 0 | 4 | |a Norms detections |
650 | 0 | 4 | |a Norms mining |
650 | 0 | 4 | |a Verification process |
700 | 1 | 0 | |a Ahmad, A. |e author |
700 | 1 | 0 | |a Ahmad, M.S. |e author |
700 | 1 | 0 | |a Hamid, N.H.A. |e author |
700 | 1 | 0 | |a Mahmoud, M.A. |e author |
700 | 1 | 0 | |a Mustapha, A. |e author |
700 | 1 | 0 | |a Yusoff, M.Z.M. |e author |
773 | |t International Journal of Intelligent Information Technologies |