Networks of computers can be used to produce a digital virtual environment (DVE) where multiple participants can interact. This technology is extremely attractive to the military to provide training simulations. By the use of mock-up vehicles and high-fidelity visual systems, trainees get a window onto a virtual world populated by simulated vehicles interacting over a realistic terrain surface. Some of these vehicles are controlled by human trainees, others by computers. It is essential that trainees find the behavior of the computer-controlled vehicles realistic. Currently most computer forces are semiautomated using finite state machines or rule bases to govern their behavior, but requiring constant supervision by a human controller [1]. However, the vehicles can become increasingly autonomous as AI and agent techniques develop, thus reducing the number of human controllers as well as the hefty manpower bill associated with running big training simulations [2, 3].
We are concentrating on developing agents to control tanks within ground battle simulations. Here, tactical behavior is governed by two main factorsthe terrain over which the tanks are moving and their beliefs about the enemy. In trying to produce battlefield behavior that mimics a human tactician, it is advantageous to model the command structure used by the army. This helps with the gathering of knowledge from subject matter experts and enables a hierarchical decomposition of the problems. The figure appearing in this sidebar shows the hierarchy of agentshigh-level commanders are given objectives that are used to produce lower-level objectives for their subordinates. Information flows both up and down the command chain and agents need to cooperate with their peers to achieve the overall goal set by their commander. This natural decomposition of the problem allows higher-level agents to work on long-term plans while the individual tank agents carry out orders designed to achieve more immediate objectives.
The Agent Toolkit. To provide the framework within which agents operate, we use the SIM_AGENT toolkit (see the article by Sloman and Logan in this section). It allows multiple agents to be run and controls their communication with each other and with the physical simulation of the battlefield. Internally, these agents run a number of processes which share data held in a central database; as shown in the figure. The processes are scheduled to run for a few steps at a time and each performs a different task, for example, assessing incoming sensor data, monitoring the progress of a plan, or communicating with other agents. This allows agents to pursue many mental tasks simultaneously. Scheduling ensures each agent and process gets a fair share of the available processing power and enforces real-time operation.
Agents need to incorporate fast reactions to their environment to cope with unexpected events while at the same time perform complex reasoning about the terrain. Our agents, therefore, combine the use of anytime planning techniques with reactive plan execution systems designed to operate in a real time environment [2]. These are implemented as separate processes within the agents allowing the combination of reactive and deliberative behavior.
For example, when considering how to place forces to block enemy movement through an area, the squadron commander has to consider a number of factors. Positions must be identified that give protection to the defending forces, but also provide a good view of the potential enemy approach routes and are close enough to other groups to offer mutual support. The squadron defensive planner identifies candidate positions for the defending troops by analyzing the protection afforded by the terrain. Combinations of these positions are ranked in terms of the overall breadth and depth of the engagement area which can be seen (and fired upon) from them. During this optimization process, the best deployment identified so far is cached, so that it can be executed if the time for planning runs out.
The battlefield is so dynamic that detailed individual tank plans are unlikely to remain valid for long, so tanks operate by selecting actions from a recipe book covering general situations. These short-term actions combine the agent's goals with reactions to the enemy and the terrain. Plans are developed as sequences of these actions and are assessed by carrying out an internal simulation of their probable effects to identify how well they would perform in the present situation. The use of an internal simulation also allows assumptions about the future state of the world to be incorporated into the plan. During execution, the agent can identify cases where the assumptions turn out to be false and a new plan is required.
Simulations using these agents have been shown to military experts who have confirmed their terrain-related behavior is more realistic than that produced by simple, finite state machine-based approaches. The agent-based approach to this problem has several advantages, including decomposition of the problem, natural distribution between machines, and permitting clear comparisons with reality by human experts. Future work will focus on the deficiencies in overall group behavior and a need to plan to gather information.
1. Courtemanche, A.J., and Ceranowicz, A. ModSAF development status. In Proceedings of the 5th Conference on Computer Generated Forces and Behavioural Representation. (May 911, Orlando Fla.). Institute for Simulation and Training, 1995, 313.
2. Hepplewhite, R.T., and Baxter, J.W. Broad agents for intelligent simulation. In Proceedings of the 6th Conference on Computer Generated Forces and Behavioural Representation. (July 2325, Orlando, Fla.) Institute of Simulation and Training, 1996, 319327.
3. Hill, R., Chen, J., Gratch, J., Rosenbloom, P., and Tambe, M. Intelligent agents for the synthetic battlefield: A company of rotary wing aircraft. In Proceedings of AAAI97 and IAAI97 (July 2731, Providence, R.I.). AAAI Press, 1997, 10061012.
©1999 ACM 0002-0782/99/0300 $5.00
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.
The Digital Library is published by the Association for Computing Machinery. Copyright © 1999 ACM, Inc.
No entries found