Preprint
Article

This version is not peer-reviewed.

Multiple-Valued Logic, Vocabularies Structure, and Linked List for Data Verification in Dialog Communications of Agents

A peer-reviewed article of this preprint also exists.

Submitted:

26 November 2024

Posted:

27 November 2024

You are already at the latest version

Abstract
Distant verification of autonomous agent`s parameters in dialog mode is a difficult multi-parametric task, if the large-scale scene of action is characterized by a large number of collaborative and rival robots. The possible scheme to realize it for mass robots is to use non-exhaustive and selective data verification, combining the polling of internal subsystems and external data storages in collaborating network agents. Selective extraction of data for such checks is proposed to involve the special ordered set of vocabularies, which contains coded digital words and classifies parameters of agents, tasks, objects, and events. Such structure of vocabularies is to be combined with various versions of the linked list scheme, known in blockchain and actual for protective documenting of critical data. Multiple–valued logic is here the convenient method to provide autonomous navigation in a multi-parametric structure of data and verification variables.
Keywords: 
;  ;  ;  ;  

1. Introduction

Modern research in civil robotics includes at least such fields, see Figure 1, as unmanned logistics and Internet of vehicles (IoV) [1], power grids with smart metering [2], “smart” city [3], autonomous robotic manufacturing [4], Internet of Things (IoT) [5], and medical nursing [6]. The general goal of these investigations, which are based on artificial intellect (AI) concepts of agents and multi-agent systems (MAS), is to imitate human abilities and to design autonomous and self-sustaining large-scale robotic systems, which can operate in wide space-and-time bands without permanent human control. However, the design of autonomous robotic agents is a complicated task, and the development of such systems involves the whole spectrum of conjugated technologies, including the research of modern mathematics [7,8], 5/6 G Internet [9], microprocessors [10], neural networks (NN) [11], fuzzy logic and controllers [12], computer vision [13,14] and speech procession [15], big data procession [16], traditional and post-quantum cryptography [17], quantum key distribution [18], and quantum computing [19]. The design, debugging, and modification of autonomous agents includes autonomous data verification and correction of errors and faults, caused by natural factors or cheaters [18].
The final goal of any type of verification procedures in agents is to exclude possible incidents and crashes caused by faults, attacks and illegal data modifications [20,21,22]. An ideal verification procedure should take into consideration all possible vulnerabilities of agent`s architecture, hardware, and software. It also should take into account current tasks, situation in the scene of action, the trust level of data sources, processed materials, characteristics of objects, and the workload. However, the problem also is to create and support the reliable referent (or template) model for data verification, as attacks can be aimed not only at agents but also at collective resources. Alternative way is to use verification with selective extraction of reference content from the distributed structure of local data storages, using free memory resources in loyal robots and network nodes. Respectively, verification procedure should compare data taken both from internal modules and external data storages, what needs to design the scene description formal model and to use protected from modifications distributed ledgers, partially reproducing the linked list (LL) scheme in blockchain [23,24]. These new options are to complement known data verification methods reviewed further.

1.1. Verification Tasks in Modern Robotics

In the review covering more than 150 papers published in 2008-2018, the analysis was done of formal specification and verification methods for individual and collective robotic systems. The specification was considered as the mathematical description of necessary actions for hardware and software components of the robotic system, which doesn`t determine the method of realization but can verify processes. There were considered many mathematical aspects of the problem, e.g., set–theoretic methods, logic methods of dynamic verification of hybrid systems, temporal logics, timed automata, robots communication languages, agent programming languages, finite state machines, state machines, Petri nets, probabilistic methods, Markov networks, automatic Buhi machines, model verification tools, and ontologies. The review has also covered models of physical environment, certification and trust indicators, external and internal threats. Finally, emphasis was made on the necessity to design integrated formal methods (iFM) for the specification of agent`s tasks, and the enlarging need was accented for the heterogeneous sets of formalisms for complicated systems description, where each one is responsible for its specific component. One more actual problem is the lack of methods to monitor the interrelation between the specification and the executed software code [8]. The authors of review has expressed the hope that the research in this field will help to create Integrated Verification Environment.
The practical realization of heterogeneous sets of formalisms concept and route verification method was demonstrated in for the cosmic robot Curiosity. Other publications has accented the set of actual aspects in formal verification schemes for robotic collectives; among them one should note the peculiarities of constructing both quantitative [26,27] and qualitative [28,29] models. Active research is being held in such fields as predicate systems modelling [26], temporal logic [29,30,31], and epistemological extensions [32]. Also one can see publications devoted to discrete relational models [33], state-based models [31,34], and beliefs-based ones [29]. Good results were obtained with the help of domain-dependent embedded models of Matlab/Simulink [35]. One should note the trend to design dynamic and non-exhaustive verification methods [8].
In the field of verification models for collective robotic systems, the detailed review has also emphasized the following problems:
  • too general estimation parameters and the absence of methods to take into account the specifics of domain knowledge,
  • the absence of realistic schemes to evaluate the applicability of selected criteria,
  • the lack of specialized languages to model domain knowledge,
  • insufficient development of methods for runtime verification.
Among other significant gaps, the authors of also has pointed out the lack of real possibilities for quantitative specification, i.e. of ability of known languages to describe the desired properties of the system. However, due to the inhomogeneity of agent`s structure, the languages for robots behavior description should provide as the discrete modelling of dynamic processes, as the continuous one. They are to model stochastic and epistemological characteristics of agents’ interaction with the environment and users. The gap is too large between quantity indicators for intermediate and final tests results. Some other publications also discussed the need for methods to analyze probabilistic and stochastic processes [36], discrete and continuous dynamic processes in agent systems [38]. In paper the emphasis was placed on the fact that namely system description languages should track combinations of stochastic and continuous processes. Very substantial drawback is the lack of public technologies for checks and tests [27,34,40], and complicated systems with the detailed structure description now has no appropriate tools for the model-based testing [35,41] and the run-time verification [31,38]. Basing on content of [8,42,43] one comes to the conclusion, that there is a very small number of developments for industrial verification and specific knowledge domains.
During 2020 - 2024 the interest to practical applications of drones has increased dramatically, and impressive publications have appeared on delivery systems, routing, navigation and verification of real autonomous devices. For example, a method was proposed in for verifying the operation of a drone during task execution, using the knowledge base and rules. An interesting aspect of data protection and routing in delivery drones was touched upon in referring the use of hybrid coding with blockchain components. In a system was proposed for the capturing of illegal drones using a vision and trajectory prediction system. The article discussed the requirement to apply multi-level architecture in the heterogeneous system of agents.
Also agents need combinations of automatic tests and quick visual checks done by human experts. However, neural networks (NN) and deep learning algorithms [49], which already has become the priority tool for computer vision and speech systems [13,14,15], didn`t propose yet new tools for the imitation of human abilities in verification tasks. Moreover, the known problem of NN to make selective data corrections limits the possibility to use NN in verification procedures. Now computer vision systems based on NN [13,14,49] can slowly enough recognize some components of real scenes of action, and can`t detect illegal physical activity of cheaters and rival robots.
As quantum keys distribution (QKD) schemes were realized not only in fiber optics lines, but also in wireless atmospheric data ones [50], they principally can be used for secured robotic communications at comparatively low keys generation rates and short enough distances. Unfortunately, quantum cryptography is too expensive for low data traffic sessions for data verification in MAS.
In order to design multi-parametric verification models, demonstrating scalable description and navigation in the large-scale structure of parameters of network robotics, one can use multiple–valued logic (MVL) modelling based on discrete Allen-Givone algebra (AGA) taken with a large number of truth levels (k>128) [52,53,54]. Earlier there were attempts to use the version of MVL with several truth levels and to realize Kripke structures [55,56,57] for the model checking and modeling of time processes, however that has produced too complicated for practice models. The intricacy here is that representitative graph analysis for all possible transitions of system states is problematic to be used in AI systems with the large number of parameters, noise factors, probabilistic and approximate patterns for the description of people, technical objects, and their faults. But this problem seems to be partially bypassed by the integration of traditional precise, probabilistic, and approximate calculations being held within MVL, Boolean, and fuzzy logic. That determines the choice of the heterogeneous logic architecture of agent [52], which is the tool to simplify joint use of various logic models in multi-parametric modelling. Now AGA can held template matching for pattern recognition tasks and may describe neural network expressions [22]. Fuzzy logic formalisms can be emulated by AGA, which was shown to model the analog of the fuzzy controller with parametric T-gates (or T-norms and T*-conorms) [59]. Basing on quantum random number generators, flexible AGA schemes can model one-time cipher pad secret coding scheme [18], random oracle scheme [60], combined classic and quantum protocols for position-based cryptography [53], and also they gave a pair of algorithms for distant comparison of parameters without their disclosing [59]. AGA verification model provides components of blockchain and the distributed ledger, aggregated in collaborating network nodes [53,54]. All these designs creates new possibilities for the distant data verification in collaborating agents.

1.2. Verification and AI Algorithms in Agents

Distant verification of autonomous agent imposes selective monitoring of the complicated system, imitating dozens of basic human abilities and providing self-sustaining of autonomous functioning, activity and reactivity to external world, ability to communicate, the presence of own goals, beliefs and etc. That is why verification of agent is somewhat a wider task, than the model checking in computing [55,56,57], and it should use many heuristic and semi-empirical methods where the human experts are the final instance. Typical procedures suppose the approval of agent`s authenticity, checks of data integrity, space coordinates confirmation in position-based cryptography, and the verification of passed routes and received licenses [22]. Besides initial debugging, they should include periodic tests, checks after learning and self-learning sessions, upgrade, and data restoration [6,7,8]. One is preferably to include human biometrics of administrators, and such digital “fingerprints” of robots as parts numbers, random paroles, and the prehistory of earlier done work [22]. However, papers reviewed in sec.1.1 didn`t took enough into consideration AI specifics of agents.
Principally, all mentioned above verification methods are to be integrated into some robotic world model (WM) [62], which can be considered as the set of formal expressions currently describing the interaction of robot with objects, selected in the scene of action by the decision–making system. In the presented paper we don`t discuss in details such a global item as the design of WM [62], but suppose to use for its control the heterogeneous logic model of agent [52], combining AGA with traditional Boolean, and fuzzy logic. One of necessary steps here is the design of the joint ordered structure of robotic terminology and the simple communication logic language of agents, which can describe the logic model of the scene of action for different agents and in prospect to involve natural language processing systems [63].

1.3. Network Verification and the Linked List Scheme

Robotic agents from some allocated MAS are supposed to carry out work in a space scene of action, including various individual partner and rival robots, MASs, people, animals, buildings, vehicles, and other objects. All of them are supposed to be recognized by a computer vision system [13,14], LIDAR [64,65], and other sensors. Here for simplicity we don`t consider dashcam videos, which is a useful tool for verification, but itself needs massive AI-based image procession. In order to simplify the modelling of network verification procedures, one should consider several most typical situations, which can occur for a distant robot and are shown in Figure 2. The agent in the allocated MAS can interact with its distant administrator (bot or a man), which is to support distant work of the agent and to verify some of its parameters in a planned mode or for the urgent correction of robot`s behavior. The agent is supposed to exchange any possible communication messages with the administrator (marked by red arrows) and more limited data sets with other agents of the same MAS (shown by yellow arrows), where messages can mainly include parameters of the scene and tasks. The task of data procession here is to provide the logic control for content access, at the same time excluding the transfer of illegal code or confidential information via data channels.
Also, the scene of action imposes the presence of corporative or state regulators with their mobile or static agents, checking licenses, payments, and technical parameters of robots. Agent of MAS should typically exchange with them by several types of formal messages (marked blue arrows) with the limited volume of data.
Verification method should also take into account possible data exchange between MAS and loyal external agents or network nodes, involved by mutual services or a rent. The data flow between agents and external ones (marked by green arrows in Figure 2) can contain requests to send some necessary data, tools, or to write/read notations into the copies of the linked list (LL) or the distributed ledger [66,67,68], which is the distributed protected data storage. Potentially, people in the scene also can communicate with robots concerning positioning, parking and other common problems, which also need special tools for the translation of robotic messages to people and vice versa. Thus, even minimalistic consideration of the scene of action demonstrates the necessity to describe the branched structure of communicating participants and their language protocol.
Also for the efficient interaction with other robots and people an agent is supposed to support and to approve its own trust level (i.e. reputation coefficient) with the help of network “witnesses”, involved into the verification of credentials and authorities. Besides collective resources, possible variant here is to use network low-capacity data storages written in collaborating agents and loyal network nodes, and the further discussion is concentrated on the design of coded vocabularies structure, containing necessary basic terminology for dialog communications and for easy data documenting and extraction by means of AGA-based version of the LL [53,54].
In traditional blockchain scheme [66,67,68] LL prevents illegal data modifications in a group of highly motivated users by sustaining the distributed set of copies in participating network nodes, which are protected by standard tools and hardly can be quickly modified unnoticed by others. In contrast to blockchain, the AGA-based version of LL [53,54] is intended for the collectives of robots and loyal network nodes possessing limited free memory resources. The task here is to “hide” small volumes of critical data, which can later help to detect data errors and modifications. Such resources in agents are considered as hardly accessible ones, as data procession in them is typically optimized for basic operations and only limited data volumes can be periodically extracted by allowed polling procedures.
The formal logic structure of AGA-based LL can be given [53,54] by the function
h ( m , s ) = F l l m , t , e m , e m s ,   h m , h m s
where the input variables are the number m and the time stamp t , vectors e m   , e m s   describe the last and the previous entries, and vectors h m , h m s are the approving hash values assigned by verifying network nodes. LL has the logic expression structure h ( o u t ) = p . t . 1 + + p . t . m , where e.g., the last written entry can be represented as
p . t . m = h m m , 1 X m m , m X t t m , t m
X e , 1 , m e 1 , m , e 1 , m X e , 1 , p e p , m , e p , m
X h , 1 , m h 1 , m , h 1 , m X h , Q , m h Q , m , h Q , m
X e , 1 , m 1 e 1 , m 1 , e 1 , m 1 X e , p , m 1 e p , m 1 , e p , m 1
X h , 1 , p e 1 , m 1 , e 1 , m 1 X h , Q , m 1 e Q , m 1 , e Q , m 1 .
The simplified scheme of AGA-version LL is shown in Figure 3, where the pre-agreed collective of mutually loyal robots and network nodes is written in the list of participants and creates equal copies of the collectively formed ledger [53,54]. The formal expression structure for AGA-based LL is shown below in Figure 3. Here the first of entries is mixed with the second, and further the second is to be mixed with the third one etc. Thus, LL “mixes” by logic operations random hash values, assigned by external participants, with previous and forthcoming entry vectors e . Respectively, MVL version of LL needs some store of quasi random one-time keys [18], preliminary generated by a high quality quantum random number generator QRNG [69]. Like in the blockchain method [66,67,68], data written in the entry can be approved collectively by the majority voting of participants, whose result is considered as the most reliable one. Certainly, the reliability of such data depends on the number of really involved external participants, and for the small one the task is to introduce additional logic mixing of data taken from various internal sources. Respectively, the advanced version of AGA-based LL can additionally mix parameters of internal subsystems of the agent with external data and assigned hash values.
In order to use AGA–based LL on practice, it is necessary to overcome several obstacles. The first of them is to create the control scheme to support the necessary structure of robotic requests and replies (considered together they are called entries), taking into account the structure of internal modules in various agents. Another challenge is to combine automatic and human checks [63]. One more unsolved problem is to prove that no messages were lost, illegally deleted, or added by cheaters. The last opportunity somewhat intersects with the detection of attacks “man-in-the middle” [70], but in contrast to cryptography now the aim is to prevent data modifications and to imitate human ability to analyze content in the intermittent dialog.
Both version of AGA-based LL [53,54] are oriented at such practical tasks as:
  • approval of requested numbers of licenses and permissions,
  • following to restrictions declared for cargo parameters and route passing,
  • monitoring of visits only to legal zones of the geographical map,
  • loading/uploading in legal terminals,
  • compliance with the standards of ecology and transport.

1.4. The Aim of the Paper

The goal of this paper is to:
  • widen the spectrum of AGA-based data verification algorithms for agents by the holistic vocabulary structure of terminology and its logic coded variables;
  • simplify and unify verification schemes by AGA-based communication language, convenient for dialogs of agents in extendable large-scale robotic system;
  • adapt the LL scheme to local data storages in network agents and to messages integrity checks;
  • provide the clear control of verification schemes in the heterogeneous logic architecture of agent.
Further sec. 2 contains MVL basic mathematical tools, sec.3 proposes AGA representation of the vocabularies structure and the communication language, sec. 4 is devoted to adapted verification schemes based on LL, and sec. 5 presents the fragmentation scheme of AGA functions for human checks. Sec. 6 discusses microassembler modelling and supporting platform. Sec. 7 discusses further research.

2. Method: Basic MVL Model

According to earlier proposed heterogeneous logic model of an agent [52], AGA is considered as a tool to design multi-parametric logic model for the description of the scene of action and verification procedures.

2.1. Multiple-Valued Allen-Givone Algebra

As in earlier publications [52,53,54], we consider basic definitions of MVL according to [51], where the discrete K -valued Allen-Givone algebra (AGA), operating with discrete MVL functions y = f x 1 , , x n , is given for   n input variables x 1 , , x n   and one output variable y . It is very handy for multi-parametrical modelling in AGA, that variables and an arbitrary function y = f x 1 , , x n can have K discrete truth levels from the finite set of natural numbers, i.e. x 1 ,   x 2   , , x n   , y   L = { 0,1 , ,   K 1 } . Here 0 respond to the absolute false value and k 1 indicates the absolutely true one. The complete set of AGA operators given by exp.(1) guarantees the representation of an arbitrary logic function
< 0 ,   1 , ,   K 1 ,   X a , b ,   , + >
y = f x 1 , , x n   by some combination of
  • logic constants 0 ,   1 , ,   K 1 ,
  • operators Min( x i , x j ) or   , marked by   , select the minimal truth level in the pair x i and x j ,
  • operators Max( x i , x j ) or , marked by + , select the maximal truth level in the pair x i and x j ,
  • operators Literal X ( a , b ) given by exp. (2):
    X a , b = 0 ,        i f   b < x < a K 1 ,     i f   a x b
    where always b a , and a , b L = 0,1 , , K 1 .

2.2. Possible Discrete Scales for Mapping of Truth Levels

All truth levels in AGA, see Figure 4 (a), are to be processed and compared according to the scale   0 ,   1 , ,   K 1 ,   [51], which belongs to the class of lattices, where all levels are comparable. But principally, MVL may be given differently, e.g., in [56,57] the 6-level logic was defined with two non-comparable elements “don`t know “ and “don`t care “ for the scale shown in Figure 4 (b). Such model was designed for model checking by means of temporal logic and Kripke diagrams [56], and in fact it included both positive and negative estimations of truth levels. However, in other papers of these authors`s this system has given complicated and non-visual method of checks. In contrast to it, the proposed further method is intended for the heterogeneous logic architecture of agent based on AGA and uses simple scale with the large number K of all comparable truth levels. It can exceed 256 ones and may use the full capacity of standard 8-16-32-64 bitmemory registers for the emulation by microprocessors [72]. Here the axis with truth levels is the scale for mapping of various subsets of physical and model parameters, and we interpret the truth level as the ordered affiliation of different variables and corresponding mapped objects to the holistic agent`s model, as well as the tool to classify parameters. Involved logic parameters may respond to incomparable physical properties (e.g., red and triangle), which should be described by various logic variables mapped of the truth scale given in Figure 4 (b). Principally for wide-band space systems or long-term time control one can use nonlinear mapping onto the scale of truth levels, thus complementing the method of correlated variables discussed in sec. 2.4.

2.3. Formation of AGA Functions

For holistic or fragmented MVL modelling one should use traditional and universal representation of MVL function by the truth table shown in Table 1. MVL function y = f x 1 , , x n has the overall number of raws K n 1 in contrast to Boolean logic with its only 2 n 1 rows. The column for the output variable f x 1 , , x n should be filled in by logic constants C = { 0 ,   1 , ,   K 1 } according to expert choice or some formal model. Every row of such truth table with the nonzero value of the output variable F , ,     has equivalent representation by a product term [51], written via logic constants and operators from exp. (5).
The overall logic expression is given by exp. (5):
y = F ( 0,0 , . . . , 0 ) * X 1 ( 0,0 ) * X 2 ( 0,0 ) * . . .   * X n ( 0,0 ) + + F 0,0 , . . . , 1 * X 1 1,1 * X 2 0,0 * . . .   * X n 0,0 + + F ( K 1 , K 1 , . . . , K 1 ) * X 1 ( K 1 , K 1 ) * X 2 ( K 1 , K 1 ) * . . .   * X n ( K 1 , K 1 ) .
Here indexed Literals X , are written by X j q , q   and filled in by equal parameters a = b = q , where q values are taken from the corresponding row of the truth table. For memory storage and calculations, AGA functions can be equivalently represented by matrixes exp. (6), formed by logic constants C = 0 , 1 , , K 1 and describing values of the output variable F , , and indexed pairs of Literal parameters ( a i , b i ) ,     i = 1 , , n :
A = a 11 a 1 n a K n 1,1 a K n 1 , n , B = b 11 b 1 n b K n 1,1 b K n 1 , n ,   C c 11 c 1 v c K n 1,1 c K n 1 , v
Here always b i j a i j , n - is the number of input variables, K – is the number of truth levels. The switching function in AGA guarantees the reproducing only of data written in its truth table or in equivalent logic expressions, and can output error only if it was illegally or not correctly modified.

2.4. Correlated Variables for the Description of Large-Scale Space and Time Bands

Mobile agent should imitate human ability to estimate time, space, light intensity, and some other parameters in wide bands of values and with various precision (e.g., from micrometers to thousands of kilometers). In order to obtain wide range of measurements, to avoid too large number of truth levels K , and to use more cheap hardware, one can use the method to combine in one AGA logic expression data, describing the same physical parameter with various precision of data in the same function. Then the description of e.g., position   x =2830 m for the space axe [ 0 , x ) can be represented in the digital map as x = 2   k m + 800   m + 30 m and written by an expression like x = x ( 1 ) × 1 + x ( 2 ) × 10 + x p × 10 p . This expression can be represented in the MVL truth table with any necessary precision as a set of p correlated input variables  x ( 1 ) , x ( 2 ) , , x p . Such variables should be processed as ordinary logic variables in the multi-parametric AGA function [52], but only the summation of the whole set of used correlated parameters provides correct restoration of physical distances. This step should be monitored in methods described in sec. 3 and 4 for forward and backward mapping between truth levels representation and natural numbers one.
For description of various systems, one can freely exploit correlated variables together with ordinary ones, and there is no necessity to insert all defined correlated variables t ( k ) = { t ( 1 ) , , t K } into all used functions, as namely the shortened set of correlated variables is convenient for human or quick automatic checks. If necessary, e.g., for monitoring of 2D space maps, one can use input space variables x ( i ) = ( x 1 , , x I 1 ) , y ( j ) = ( y 1 , , y J 1 ) , and time variables t k = ( t ( 1 ) , , t K 1 ) in a separately defined MVL function F x i , y j , t 3   ,   which
may describe time processes ranging from nanoseconds in microcontrollers up to months in a logistic navigation system for the description of visits to cargo terminals.
However, the use of correlated variables has some restriction disclosed by the Figure 5 for the correlated space variable x l . The excessive number of chosen correlated input variables x l   will finally lead to the situation, when the resulting measurements and the statistical error will achieve the given difference between two neighbor truth levels. Then according to the theory of physics measurements [72], both truth levels are possible within the given confidence interval, and AGA model then should add two new product terms C * X x l a , b *       with logic constants C equal to 1 and 2. This contradicts to the principal of AGA modelling of control systems, which needs bijective mapping of physical and logic values for forward and reverse interpretation of data. Such ambiguity can lead to errors and needs to shorten the excessive number of correlated variables in case (b); this restriction should be taken into account at least for space coordinates, time, and laser beam intensity. AGA calculus hasn`t embedded tools to check such data, and the designer should do this himself.

3. Results: AGA Logic Variables for Scene Description and Dialog Communications

Further the method is proposed to describe robotics scene of action and dialogs of agents within the discrete logic calculus AGA, using the large number of discrete truth levels k ≥ 256 [18,52,53,54] and the ordered structure of coded vocabularies containing selected basic terminology. Partially it dates back to ontology methods reviewed in [8].

3.1. Representation of the Scene of Action by Natural Language, Numerical Codes, and Truth Levels

According to sec. 1.3 we consider the agent and its MAS within some scene of action (see Figure 2) containing various partner and rival participants. Necessary definitions are given in Table 2. It considers the set (or the total vocabulary) V L of all different robotiс terms, given by words or their collocations selected by knowledge experts. These vocabularies should describe all input and output variables used in model functions.
One should note, that the code word may mean action, tool, some equation, and subroutine for calculations of robotic work parameters. Total vocabulary can be preliminary selected by library services and processed by experts [73]; here we omit possible problems for the translation from one language to another one. The selected collection of necessary terms V L is to be subdivided into subsets V v L , describing robotic tasks, actions, and tools by various word classes (noun, verb, adjective, cardinal numbers etc.). Then we should represent all these terms by unique natural numbers codes written in vocabularies V v N . This intermediate coding is necessary for convenient grouping of terms and verification procedures. Further one should map these number codes onto the discrete scale of truth levels K defined in AGA. Corresponding structure of mapping is shown in Figure 6.
The specifics of mapping to V v K in Figure 6 (a) is that we can arbitrarily or randomly assign truth levels to words in order to obtain convenient for the classification groups of terms [52], as the simplification (and shortening) of AGA expressions is based on consensus method of minimization [51], which ranks and forms logic product terms according to logic constants. Substantial feature of the used subsets V v L ,   V v N ,   V v K is that the number of elements in them is less or equal K , and unused vacancies in subsets are to receive zero values. Mappings V L V N and   V N V K are bijective, i.e. each element of a subset maps to only one of elements in another subset, what provides simple forward and backward translation by transcoding tables. Chain mapping scheme is disclosed by Figure 6 (b) and responds to sequential clarification of content by the finite chain of conjugated vocabularies V 1 , m L V 2 , m L V 3 , m L V K , m L , where V 1 , m L is a root vocabulary. Such method is to provide the unified protocol both for robots with simplest and advanced hardware platforms, where the first part of the message can contain coded words written closer to root vocabularies and the actuality of information can be quickly estimated by all agents, even capable only to partially interpret the message. Also agents can undertake some actions immediately, before the transfer of all details.
The formation of content root vocabulary V L is given in Table 3, which describes words of natural language. Every term (or word combination) of natural language is included into some vocabulary. Every vocabulary V v , m L contains up to K different words w v , m . L . Numbers N = 1 ÷ M refer to root vocabularies. Values N from K + 1 up to 2 K refer to the second one in the chain mapping of vocabularies.
The first field in Table 3 is the initiation (or welcome) word of dialog, also indicating the type of communication format for messages and the number of parts of the phrase, which may differ for various sectors of robotics. The name description of addressers and senders may use matrix V v , m K with chain vocabularies and several bytes for microprocessor representation of participants, but for brevity only two chain vocabularies V v , 2 K are shown in the Table 3; their common matrix is defined by two parameters   v , m     K . For simplicity, further we avoid (where possible) to use the third index for the description of the number of a word in the specific vocabulary. The order of numbering in vocabularies V i , j L is not substantial. Every tool and identified object in the scene of action can have only one name. Note e.g., that the time of action w 7 K (from V 1,7 K in Table 3) can be taken with symbolic values “immediately” or “urgent”.
AGA modeling of the scene of action is based on three equivalent representations of vocabularies V v , m L V v , m N V v , m K shown in Table 4. The parallel use of natural language, natural numbers code and truth levels naturally occurs when one firstly tries to explain the work of the designed robotic system, and after this turns to numbers codes and AGA models. Such rigid binding of variables representations is convenient for human experts.
Correlated variables can be written to Table 4 as a sequence of w i , g , k K , sequentially raising the precision of space coordinates but following the restriction from sec. 2.4.
The scheme of logic transformations between natural numbers code and truth levels ones is given in Figure 7, which shows the initial mapping of w i , j N     data onto the logic representation w i , j K , and further the reverse mapping to natural numbers, as arithmetic check coefficients calculations are to be done within Boolean logic. For further convenient procession, the maximal logic value K 1 and its natural numbers equivalent are reserved for possible minimization procedures in AGA. By default, zero value indicates the not used word in a vocabulary. Check coefficients C i , j N ,   C i , j K , C i , j N X R ,   C i , j K X R are to be calculated within the mapping of AGA to natural numbers scale (see sec. 3.3).
Verification procedures can involve two data input channels with truth level codes and natural numbers ones shown in Figure 8 (a). It can include procession and comparison of data coded as in truth levels, as in natural numbers codes. Independent coding of these two channels gives the principal possibility to compare separately final and intermediate results and to detect errors or illegal modifications of data, as final results in both representations should be the same or close, if approximate estimations were used. Also equivalent representations are considered as the binding tool for the heterogeneous logic architecture of agent [52], which supposes parallel calculations in various logic models.
At the same time, natural numbers code and AGA truth levels representations have different numbers profiles for comparison. Figure 8 (b) shows the principle of brief verification procedure for used vocabularies in the agent. Besides this, visual representation by histogram shown in Figure 8 (b) is more convenient for human checks. Within the proposed scheme of vocabularies, known types of activity and coded tasks execution should lead to preliminary known set of vocabularies describing controllers and actuators. Independent checks may be held both in vocabularies V v , m N and V v , m L . As AGA truth levels representation w v , m K is compatible with the secret data coding scheme and the scheme for distant comparison of data without their disclosing [53,54], namely it is preferably to be used for the control of data access in agents. Natural numbers codes w v , m N are better to be used for common access content and less confidential data. Full check of the agent will need comparison of all words w v , m K and w v , m N in used matrixes V v , m K   and V v , m N . However, all such procedures need one more critical component.
and further chain ones.

3.2. Communication Phrase

There exist formal theories of language construction like considered in [74], although modern natural language procession systems typically use Chat GPT and NN [75]. However, earlier the simplest AGA-based scheme of the communication protocol was proposed in for secretly coded instructions transfer via the wireless laser data line λ = 0.63 μm with pulse-width-modulation. This scheme has used the fixed position of several specialized vocabularies in the phrase W and was intended for 8-bit microcontrollers platforms. The small number of internal memory registers in them has limited the transfer of short phrases given by the format {Sender of message - Receiver of message - What to do - Where to do - When to do - Commentary for next phrase}, coded by 8–bit numbers. This earlier version of protocol corresponds to the shortened sampling taken from Table 3 for the particular set of vocabularies:
{ V 2 L (Sender of message) V 3 L ( Addresser of message) V 4 L ( Task) V 6 L ( Place of action V 13 L T i m e o f a c t i o n V 1 L F o r m a t o f n e x t m e s s a g e } . However, now the task is to propose the flexible and unified 8-16-32-… phrase format, adaptable to various tasks and the large number of vocabularies. Also, such format should help to find correct parts of phrase and to determine lost ones which are to be repeated. Additional requirement is to use independent microcontroller data channel for dialogs, providing enough content transfer but using rigidly given protocol, excluding uncontrolled intrusion of external code into the software of agent.
The necessary structure of the phrase vector W K , describing the robotic message, is given in Table 5. Every phrase is a fragmented one and contains the addressing header and content parts. Their length is 8-bytes what is accessible for cheap 8-bit platforms, and the overall length of W K principally can be enlarged up to K parts, but is supposed to be typically limited by 2-8 ones. Components of vector W K are the elements of various vocabularies given in Table 3 and Table 4. Principally, alternative representations by words w v , m N also can be used in phrases, but in this paper we don`t use them. Parts of phrase shown in Table 5 can be transmitted separately and afterwards may be assembled into holistic phrases with the help of hash values and total check coefficients. That excludes the possible problem of time delays for multi-channel data aggregation.
The header part includes obligatory fields “Format”, “Fixed parole”, “Addresser”, and ”Sender” with the fixed position in the phrase for the quick and simple procession. Priority of position of root and other vocabularies in the phrase is given by the field “Format”. The value   w 1,1 K = Hi ” may be given by several various numbers, initiating the new dialog and indicating at the same time the number of content parts. The field “Fixed parole” is intended for the initial access of preliminary allowed agents and includes words taken from the vocabulary V 1,2 K , which contain fixed passwords for initial contact only. Further communication modules of Sender and Addresser should assign quasi-random hashes to content parts of the phrase. Respectively, every content part also includes obligatory field “Hash”, describing assigned one-time quasi-random hashes, necessary for correct integration of transferred parts into the holistic phrase. This field should use preliminary stored reserve of random keys, obtained from external QRNG or random oracle scheme [60]. Such one-time access keys e.g., also were envisaged by AGA protocol for confidential distant comparison of parameters without their disclosing [59]. Fields “Arbitrary code word, w v , m ” in сontent parts of the phrase are to be filled in by arbitrarily chosen words, forming some sampling K ` of logic variables, where K ` K . The maximal number of content parts j in the phrase is determined by the expression
j = N u s e d v o c a b . i n p h r a s e     N u s e d i n h e a d e r / N f r e e f i e l d s i n c o n t . p a r t = ( K x M 4 ) / N f r e e f i e l d s i n c o n t . p a r t
Format of messages shown in the Table 5 certainly can be further adapted for a specific knowledge domain, a large number of participants, and for large space and time bands of work. E.g., for extraordinary situations like a fire, any robot should have reserved code word in the field “Format” for the activation of chain vocabularies, describing phrases like {Fire service - Fire department q - Fire robot qq-….} and {City q – Municipal district qq - Street qqq-…}. But for routine tasks the long chain of vocabularies can be excessive.
Total check coefficients     C K and     C N shown in Table 5 need special commentary, as they suppose arithmetic summation of words codes for messages integrity verification. Such verification procedures for a noisy data line can determine, if some parts of the phrase were modified, added, or losted due to noise or intruders. This method suppose summations of codes for all used indexes v , m and parts of phrase. As the summation is not initially defined in AGA and one can`t directly use Boolean calculations for the set of truth levels data, words codes should be preliminary mapped onto the scale of natural numbers N before traditional arithmetic calculations. Results of calculations should coincide for sums obtained by Addresser and Sender. For 8-bit microcontrollers with embedded arithmetic procedures this check unavoidably uses the summation with case overflow, what provides the independence of verification parameter from the number of actually used words and transmitted parts of the phrase. Besides this, in such scheme well-known binary operations XOR used in may be also applied for the detection of permutations of words in a phrase and parts of the phrase. In order to use such verification schemes, one should make several definitions.
Definition 1:
Total check coefficient C i K of mapped truth levels is given for a phrase W i written in AGA logic codes and is the arithmetic summation   C i K =   v K ` w v K , carried out within Boolean logic for truth values of all words w v K , used in the phrase W i and given by arbitrary sampling of vocabularies V K ` ,   K `   K . AGA truth levels before summation are mapped onto the linear scale of natural numbers N.
Application of the def. (3.1) is supposed to be convenient both for independent human checks and for automatic comparison with template data.
Another convenient coefficient for checks is given by Definition 2.
Definition 2:
Total check coefficient C i N / K of arithmetic summation of natural numbers codes is given for a phrase W i written in mixed natural numbers and truth levels codes and is the arithmetic summation   C i N / K =   v N ` w v N / K , carried out for natural number codes and mappings of truth levels codes of words w v N   or   w v K , used in the phrase W i and taken from the sampling set of vocabularies V N ` and   V K ` , N ` , K `     N .
Coefficient C i N / K is necessary for human or automatic checks within the heterogeneous logic architecture of agent, where one can independently visualize natural numbers codes and evaluate the integrity of the dialog data exchange b y the summation of all values w v N in the phrase.
One more useful tool for the logic verification in agent is the well-known Boolean logic operation XOR, used for the set of words in the phrase W i represented by truth levels or natural numbers code. Its destination is to make digital “fingerprints” for phrases and their parts. XOR operation can help to compare identity and to hide real codes used in sessions held even without secret coding.
Definition 3:
Total coefficient C i X R K of check XOR binary logic operation taken for mapped truth levels is the set of Boolean XOR operations C i X R K =   w 1 K ^ w K ` K ^   carried out in the phrase W i for binary representation of AGA truth levels of words w v K ` ^ ,   mapped onto the linear scale of natural numbers N.
Definition 4.
Total coefficient C i X R N of check XOR binary logic operation is the set of Boolean XOR operations C i X R N =   w 1 N w K ` N carried out in the phrase   W i for binary representation of natural numbers codes of words w v K ` .
One should note, that coefficients Def. 1÷4 also can be easily used in phrases W i ,     transmitted by parts, like as it is shown in Table 4. “Sewing” or ordering of parts of the phrase W i in the addresser agent supposes the check of coefficients Def. 1÷ 4 as for whole phrases, as for their separate parts. The only necessary complication here is to insert separately calculated coefficients in the end of every phrase part (see Table 6), and every time to fill in the total sum for all parts from the very beginning of the phrase, including the header. The specifics of coefficients Def. 3÷ 4 is that they are intended for more confidential data or for work in the tense media, when the increased level of caution is to be activated in the MAS.
The detection of lost and mixed content parts during the transfer of phrases in dialog mode can be based on the check for assigned one-time hash values and the comparison of data, obtained by the summations of coefficients C i . j K . The example of such algorithm is given in sec. 3.3. Besides this, for vocabularies V v , m N , where   v 1 , , K ,   m 1 , , M ,   M K , one can apply coefficients   C N   and   C N X R , taken in natural numbers representation .

3.3. Communication Module and the Dialog Protocol

Procession of dialog messages is considered further only within the specialized communication module, but for correct design of verification procedures it is necessary to discuss briefly its interaction with other agent`s components. The very simplified interpretation scheme of agent and its basic work cycle is shown in Figure 9, although its internal modules can include additional internal feedback contours and auxiliary data lines. Any realistic autonomous mobile robot should include:
a) sensors and computer vision system, which are to detect objects and dangers, providing the agent`s reactivity to the external world and space positioning;
b) module for the procession of messages, coming from radiofrequency, acoustic, and optics data lines, complemented by devices for secret coding and data verification;
c) homeostasis supporting system [79], providing autonomous operation of devices for energy supply, time clocking, sensors operability control, and space positioning;
d) modules for decision making and work planning;
e) set of actuators.
Principally, one of main properties of agent is to follow the principle of the so-called homeostasis in biological systems and to support autonomous work of a robot by self-sustaining of appropriate bands of “vital” parameters, like alive systems support concentration of oxygen and glucose in blood using the cyclic principle of work and control contours with feedback. Using internal subsystems, the agent executes received tasks and instructions [79], what somehow changes the external media. Agent sequentially monitors these changes by its sensors and repeats the work cycle, thus realizing closed contours of control with the feedback obtained via the external media. Such cycles can involve time bands varying at least from nanoseconds up to months, what needs to use correlated time variables. That is why the universal communication module of agent and verification procedures should model the detailed structure of parameters, and it can`t be limited by several verification templates.
The receiving messages agent is to take into account instructions transferred by the administrator and requests from other agents, what may quickly change states of the homeostasis contours. Only after this the agent is to activate decision-making procedures, which may cause series of actions and need various run time. As embedded modules of agent suppose somehow optimized mode of work, the realistic way is to run verification procedure after the completing of the next work cycle [59].
If some agent receives the initiating signal in a new phrase, the dialog scheme of two agents can include a vast spectrum of procedures and AI algorithms as follows:
  • to check the received initial parole in the list of fixed and additionally generated ones;
  • to extract potentially danger data to be immediately send to homeostasis module,
  • to check the presence of the declared sender name and its authority in the AGA function, describing allowed classes of actions for the contacting agent,
  • to verify the presence of all declared content parts in the received phrase;
  • to compare the requested by external agent set of vocabularies and the allowed one;
  • either to begin the new dialog, or to continue the already opened one; if necessary, to send denial reply;
  • to send content of the received phrase to the decision-maker and to wait its reply;
  • to work out the reply phrase and to assign to it a one-time random hash value, using the reserve list of hash values preliminary filled in by quasi random numbers;
  • to add new entry into the LL of incoming messages to save the history of joint work;
  • to analyze the reason of errors in the dialog and to choose adequate actions.
The proposed further scheme of dialog communications, combining AGA control of vocabularies and the binary calculation of total check coefficients, bases on Table 3 and Table 5 and is given in Figure 10. During the dialog exchange of messages between agents within the same MAS we don`t make the difference between Administrator and Agent of MAS, although the first one should have additional data channels. All phrases W i j are subdivided into initiating dialog requests and replies to them.
According to Table 5, all phrases in the request and reply messages include the header with obligatory several fields and content parts. Indexed values   w i j define some sampling of words, chosen from the corresponding set of vocabularies by the communication module and the decision maker. External communication module of administrator and agents adds hash value, which can be either fixed initial access password w 1,2 , or further assigned quasi random hash value w 1,3 = h i j , which for better reliability should be obtained from cryptographic hash functions or QRNG [69]. In Figure 10 it is supposed, that the communication session is a new one, and Sender of the phrase initiates the dialog, so that the first field “Format” in the header of phrase should contain initiation word w 1 K =“Hi”. It activates further the input of initial access parole w 1,2 K written in the vocabulary V 1,2 K . This set (or list) of fixed passwords is intended for the new sessions initiation only, as during the current communication session interacting agents should add one-time hash values taken from the preliminary generated list L h a s h . Other components of the header of the phrase W 11 = { w 1,1 K ,   w 1,2 K , ….} are the triples ( w 1,4 K , w 2,4 K , w 3,4 K ) and ( w 1,5 K , w 2,5 K , w 3,5 K ), describing all given Addressers and Senders. Such 8-bit triple can support 16 777 216 agents.
The phrase procession scheme shown in Figure 10 corresponds to Algorithm 1, which is given in Appendix A due to its length. It describes the overall scheme of formal checks of initiating words, passwords, check coefficients, search of the header and content parts, and the waiting of reply in the dialog mode.
Table 6 demonstrates the numerical example of the phrase, disclosing the scheme to find correct content parts in the buffer using the header part. As besides the correct content part the receiving buffer of agent potentially can contain by a mistake some excessive illegally sent parts or ones, taken from someone else’s message. Its analysis is based on simple summation of mapped truth levels and the comparison of total check coefficients, obtained by Addresser and declared by Sender.
The simple scheme to select correct content part of the phrase in the buffer memory, containing several ones, is given in Algorithm 2.
Algorithm 2. The procedure to find correct content part, corresponding to the given header, basing on check coefficients.
Input: {   w 1,1 K ,   w 1,2 K ,   w 1,4 K ,   w 2,4 K , w 3,4 K ,   w 1,5 K ,   w 2,5 K ,   w 3,5 K },
{   w 1,3 K ,   w v , m K ,   w v , m K ,   w v , m K , w v , m K ,   w v , m K ,   w v , m K ,   C N / K },
………..
(up to 30 parts in the buffer)
← Header
← Content parts
Step Procedure Example from Table 6
1. Find header part of phrase in the buffer memory -
2. Calculate with 8 bit overflow C h e a d e r N / K for the header C N / K = 138 (< 255)
3. Find nearest content part -
4. Calculate with 8 bit overflow C c o n t N / K for the content part 209+196+3+12+6+221+147= 794(overflow: >255)== 794-3x255=29;
5. Calculate with 8 bit overflow:   C h e a d e r N / K +   C c o n t N / K 138+29=167 (< 255)
6. Compare, if the calculated result is equal to the declared one in the last field of the content part: C h e a d e r N / K +   C c o n t N / K = C h e a d e r * N / K +   C c o n t * N / K ;If yes, then write header and content part in the buffer;other, then find and process next content part. -167=167yes
Output: → Correct pair of header - content part of phrase is in the buffer
The further procession of the received phrase W i , j should include the check for compatibility of allowed tasks and vocabularies, mentioned in the request. The detailed analysis of this vast topic is out of this paper, only several remarks are to be given. The aim here is to detect incorrect content messages and to limit the access of robots to currently not allowed topics and knowledge. That needs to design special AGA function, which in general case should take into account the current state of the scene of action and the dynamics of its development. Respectively, this procedure needs to additionally estimate such control parameters as e.g., the level of danger d , trust level t l , and level of available resources r . The multi-grade parameter “danger level” may be varied by an administrator, computer vision system, and sensors, what differs it from the “trust level” one, which supposes long enough monitoring of behavior of objects in the scene of action. This variable together with the trust level seems to use the simplified discrete structure of AGA truth levels with 5-10 grades, but the estimation of them may need probabilistic calculations. Resources data (like batteries charge voltage) can be united in one final logic variable, but complex planning algorithms may be needed to estimate the possibility to carry out the task. Thus, the principle of multiparametric AGA logic phrase procession is simple enough, but realistic robotics needs to add many expert data. Some of them are preferably to be written as templates for verification and should be protected from illegal modifications by the adaptation of earlier proposed schemes of AGA-based LL [52,53].

4. Results: LL Adaptation for Dialog and Verification Procedures

If verification and data restoration procedures are not supposed to be often held, massive dubbing of all incoming and sent messages by copying or AGA-based LL [52,53] seems to be appropriate mainly for administrator`s archiving, possessing substantial resources. Respectively, it seems reasonable to use shortened adaptations of AGA version of LL especially designed for messages aggregation and completed work history documenting. Such confidential data structure should contain brief information concerning earlier carried out tasks which may be confidential enough. The task to avoid illegal data modifications undertakes the problem of often repeated values of words w v , m K , necessary for typical robotic tasks, where even the space localization of a robot prompts most probable combinations of used in dialog words. LL schemes can additionally include total check coefficients   C K / N (using summation of mapped truth levels) and ones C K X R (using binary XOR operations). Such total coefficients for parts and whole phrases complicate the external prediction of instructions for frequently repeated tasks. Also one can periodically change the coding for truth levels representation, and for situations with the high risk of illegal activity of cheaters one can exploit standard NIST techniques of secret coding and AGA-based analog of the well-known one-time cipher pad scheme [18].
The problem to be solved here is that AGA versions of LL [52,53] initially suppose equal dimension of all entries. It determines the need to use short enough 8-byte phrase parts, easy for procession by mass platforms with 8-bit microcontrollers with embedded arithmetic summation and logic XOR operations. The scheme for such shortened LL is proposed further for the documenting of tasks, transmitted by phrases composed of g parts and including check coefficients C 1 , m 1 K , h e a d e r , C 2 , m 1 K , c o n t e n t , . ,   C g , m 1 K , t o t a l . The basic version of LL is citated for comparison in Table 7 (a) with more convenient arrangement of indexes, as in AGA the order of succession is not substantial for input variables. Initially defined model corresponds to the truth table where the newcomer entry is e m = e 1 , m , , e n , m , the previous entry is e m 1 = e 1 , m 1 , , e n , m 1 , and approving sets of hash values are h m = h 1 , m , , h Q , m   and h m 1 = h 1 , m 1 , , h Q , m 1 .   Time moments stamps for entries are t m and t m 1 .
Then in order to raise the variability of data traffic one can enlarge the number of total check coefficients C i , j K , used in content parts of phrases. Note that coefficients C i , j K contain randomly assigned hash values besides predictable work parameters. Such version of LL in Table 7 (b) is designated for dialog communications of agents, if intensive replication of instructions or data is undesirable due to unreliable network, weak hardware, financial motives, or commercial and technology secrets. In this case, the mass approving of entries by external network nodes like in blockchain scheme [66,67,68] is problematic, and data approving is to be based on phrase parameters, fixed by the partner agent or by reserve copies in a pair of loyal or trusted agents.
Exp. (8) demonstrates the formal logic notation of truth table given in Table 7 (b).
h ( o u t ) = h 1,1 X m 1,1 X t t 1 , t 1 X C , 1,1 C 1,1 , C 1,1 X C , g , 1 C g , 1 , C g , 1 X h , 1,1 h 1,1 , h 1,1 X C , 1,2 C 1,2 , C 1,2 X C , g , 2 C g , 2 , C g , 2     X h , 1,2 h 1,2 , h 1,2 + + h m 1,1 X m m 1 , m 1 X t t m 1 , t m 1 X C , 1 , m 2 C 1 , m 2 , C e 1 , m 2 X C , g , m 2 C g , m 2 , C g , m 2 X h , 1 , m 2 h 1 , m 2 , h 1 , m 2 X C , 1 , m 1 C 1 , m 1 , C 1 , m 1 X C , g , m 1 C g , m 1 , C g , m 1 X h , 1 , m 1 C 1 , m 1 , C 1 , m 1 +     h ( m , 1 ) X m m , m X t t m , t m X C , 1 , m 1 C 1 , m 1 , C 1 , m 1 X C , g , m 1 C g , m 1 , C g , m 1 X h , m , m 1 h m , m 1 , h m , m 1   X C , 1 , m C 1 , m , C 1 , m X C , g , m C g , m , C g , m X h , m , m h m , m , h m , m
However, for simple robots and IoT with primarily non-confidential data one can further shorten the volume of dialog data and simplify the set of instructions by means of adaptation of L L w r d , providing direct output of requested group of words.
Adapted AGA function L L w r d a d   can be written by exp. (9)
w v , m K = F w r d ( w v , m N , v , m , h v , m m , 0 , h v , m )
which includes the rearranged parameters w v , m K and   h v , m m , 0   and is discussed in sec. 6, Table 10.As in fact w v , m K are also quasi random hash values taken from one QRNG, then one can quite freely permute them instead of quasi random hash values h v , m m , 0 earlier assigned by
Addresser. Parole h v , m or Sender`s approving hash is considered as a randomly chosen key for the access to data in another agent, but in more exhausted schemes one can define various paroles for different groups of agents. Microassembler modelling for the function exp.(9) of the simplified LL is presented in sec.6.
One should note that schemes given above doesn`t exclude other variants. As the structure of a phrase was chosen consisting of equal 8-byte parts, one can e.g., use theversion of LL sequentially mixing entries, formed by the header and the 1st content part, the 1st content part and the 2d content part, etc.. However, the detailed discussion of it needs to discuss possible tasks and efficiency criteria, what is out of this paper.
Proposed above schemes give the formal logic base for autonomous selective documenting of agent`s parameters in local distributed data storages.
However, verification algorithms should be supplemented by human checks.

5. Results: Fragmentation of AGA Function into Diagrams of Logic States for Verification

The most obvious way to held selective verification procedure is to map the set of critical data from the holistic logic model onto low-dimensional 1D, 2D or 3D charts or diagrams of logic parameters, which are convenient for quick visual checks by human experts, who are the final authority. For verification e.g., in the position-based cryptography and route passing tasks [22], one can use time diagrams of visits to check points, 2D space maps of alternatively visited checkpoints or cargo terminals, time diagrams of the execution of the quantum protocol and verification procedures [52,53]. But the design of such procedures for AGA needs to give several definitions.
Definition 5.
Fragmented mapping function (FMF) F x l , , x m taken within AGA is the result of the injective mapping F ( x 1 , , x n )   F ( x l , , x m ) , where:
1)   n , l , m     N = 0,1 , , k 1 ,     m   l, and n 1 m l , (i.e. the mapping shortens the number of initially taken input variables);
2) truth tables of the mapping function F x 1 , , x n and the mapped one F x l , , x m have:
a) identical data in columns for coinciding input variables x l , , x m ;
b) identical logic constants C k in columns for output variables F x l , , x m and F x 1 , , x n .
Consequence.FMF can be defined for any sample of initially given input variables. For its practical formation one should simply strike out further in Table 8 all columns for unused input variables, not included into the necessary set x l , , x m .
Definition 6.
The fragmented map M of the fragmented mapping function F ( x l , , x m )   is the group of points, mapping all given samples of input variables x l , , x m from the truth table onto the arbitrarily chosen set of: 1) logic constants [ C k 1 , . . , C k 2 ]   , where C k 1 , k 2   1 , . . , k 1 ,   or
2) output variables x j , j   l , . . , m .
Note. The fragmented map M shows the location of all objects or events with the chosen class given by the constant C k ; the limiting band for logic constants or input variables corresponds to critical parameters given by the task.
Definition 7.
Fragmented mapping function (FMF) is named the verification function (VF), if it belongs to the list of formal criteria L e , formed and checked by the knowledge expert.
Given above definitions are illustrated further by Table 8, demonstrating the example of formation of FMF F ( x 3 , x 4 ) by striking out unnecessary variables x 1 , x 2 , x 5 from the initially given truth table. We suppose that coordinates x 3 , x 4 correspond to space ot parameters x , y , which can be the correlated ones, if e.g., the FMF F x 3 , x 4 shows the location of visited by robot objects or checkpoints. As correlated space and time variables (see sec.2.3) are considered in AGA model as different logic variables, they also can be selected for checks. Principally, any 2D or 3D mapping diagrams like   F x , t ,     F x , y , or     F ( x , y , t ) , given in the band [ 0 ,   k 1 ] , can be considered as verification functions if adopted by the knowledge expert. 2D logic diagram in fact resembles group point images, known in star navigation systems [81], which can be checked directly on the display or may be additionally processed.
It is necessary to accent the fact, that FMF can be formed arbitrarily for visual checks, but the reverse aggregation into a new AGA functions needs to monitor the values of all the variables, for which FMF was initially defined. The reason is that according to basic definitions of AGA [51], any notation like F x i , x j   = F 0,0 , . . . , 0 * X i a i , b i * X j a j , b j always can be extended to the function expression F x i , x j , x k = F ( 0,0 , . . . , 0 ) * X i a i , b i * X j a j , b j * X k 0 , K 1 , where the band from 0 up to K 1 will exceed the ranks of earlier used model.
Reverse equivalent representation from truth levels codes w v , m   K back into natural numbers ones w v , m   N can help to receive more visual and convenient groups of parameters, and logic diagrams taken with various limitations are expected to be useful for more complicated data analysis during the debugging of mobile agents. Namely the natural numbers coding of words can help to form convenient groups of data for further planned verification procedures. Figure 11 shows the idea of such logic point group images, obtained for 2D logic diagrams taken from Table 8 with restriction C k = 5,6 , which correspond to some vocabularies V v , m K . For visual checks by human experts, it can be useful to connect additionally points of the logic diagram by lines. Even the simplest 1D functions F x i = F 0,0 , . . . , 0 * X i a i , b i ,   i [ 0,1 , ,   k 1 ] also corresponds to the given above definition of FMF and may describe numbers of agents and their licenses, obtained parameters, or passed distances.
Given above Defs. (5÷7) describe FMF via truth tables, but basing on AGA template matching and distributed linked list schemes [53,54] one can directly use equivalent representations of the truth table by logic expressions given in sec.2. For AGA logic diagram truth levels always have fixed values and only the number of involved logic constants and their relative location in the diagram may differ. Consequently, AGA-based logic diagrams are the more simple case of check images in contrast to, e.g., contours in stars navigation systems [81].
Thus, FMF scheme enlarges the spectrum of possibilities for human verification and small-scale local memory storages. Due to the fact, that LL is AGA function, it can be used not only as a holistic data structure, but also as a data source for FMF dubbed in a local distributed memory storage. However, all these variants need to discuss hardware requirements. Here the goal is to demonstrate the possibility to realize proposed methods by means of the simplest 8-bit platform, corresponding to IoT level.

6. Results: Communication Module and Microassembler Software for the Verification

The possibility to process the proposed vocabularies structure and the adapted LL scheme is demonstrated by means of the microassembler code and 8-bit circuit board, which was already used in [53,54,59]. Such choice is determined by three factors, and the first of them is to test new AI procedures for IoT devices level, where one don`t use special complicated AI software shells, NN, and specific microprocessors. The second reason is the design of the communication module, which should unload the decision making module in agent. The third reason is that the communication module of agent should protect as much as possible the system from illegal codes and data, what traditionally infers low-level programming based on detailed understanding of memory resources.
Now proposed programs complement a dozen of microassembler subroutines for LL scheme, which were earlier presented in [53,54] and disclosed basic necessary functions of AGA for agent operation and its interface with PC. Given microassembler software was tested in the so-called dual-chip module [53,54,59], based on two 24 MHz ATMEL microcontrollers MCS-51. Nevertheless, the enlarged set of procedures for dialog communications needs to propose the adequate solution for the communications module, which is shown in Figure 12 and is formed by the pair of sequentially connected microcontroller dual-chip cascades from [53,54,59], modified by digital 8-bit feedback bus. It`s role is to provide flexible forward/backward data exchange berweeh modules, controlled by means of several control pins. The bidirectional transfer of data is supposed to be used as between “upper” and “lower” dual-chip modules, as for other peripheral modules. Like in [53,54] the conjugation with the peripheral devices is to use bus registers, triggered on the leading edge.
The advantage of such device is the pair of conjugated microcontrollers connected to common data and address buses, what provides the possibility to use them in parallel or to exploit the doubled set of operators (500-600 ones per MCS-51) for the joint volume of information written in SRAM and ROM. Such structure simplifies the programming of AGAprocedures and helps to separate data acquisition and procession.
Besides this, it gives more possibilities to combine connections of pins and to add new trigger registers for alternative memory chips connected to the common data bus. Two types of integrated memory SRAM and ROM chips are to separate fixed and optional parameters. Such cascaded scheme with microcontrollers currently had 1 MB SRAM and 512 KB EEPROM external memory chips, which were connected to common data buses and provided free enough data resending and memory planning for laboratory experiments. That is the reason to use dual-chip schemes instead of commercial kits like Arduino [82], although they can use greater work frequencies.
For simplicity we don`t discuss here possible radiofrequency and optoelectronic data channels, and the specifics to connect them to the dual- chip scheme. In any way for such designs one needs to describe transmitters/receivers by some vocabularies and to reserve memory resources and free pins in microcontrollers for control signals. These steps can somewhat enlarge the overall time response due to the increased number of control pins and trigger registers, but for the proposed scheme of vocabularies the only requirement is to use equal 8-byte parts of phrases and to coordinate all equivalent vocabularies. As in [54], trigger registers Rg1, 2, and 3 are intended for SRAM addressing, where pins C E ,   ¯   O E ¯ , W E ¯ control read/write process. Banks P0 in MCI and MCII are used for data exchange with SRAM&ROM. Port P3 in MCII is used for clocking procedures, where direct and inverted signals of pins P3.0-P3.4 control read/write procedures. The first of dual-chip schemes is to interact with data receivers/transmitters and is supposed to transmit received data to SRAM into the second dual-chip module. Respectively, the procession of fixed and assigned paroles together with verification procedures was considered for the second one.
In order to use the same EEPROM in dual-chip circuit boards as in [53,54], parameters v , m for vocabularies V v , m K were taken v = 16 , m=16, the number of root vocabularies q was also taken to be 16, what gives 4096 different words w v , m K ; this responds to multiplexing of 16 root words into 16 subsets and once again multiplexing into 16 next ones. One should especially note, that although every vocabulary contains up to 16 different words, memory allocation tables provides natural number codes and corresponding truth levels codes in the band {1÷255}, where zero means the not used parameter. For advanced systems, Addresser may “demand” additional credentials and ask additional questions to Sender for the full access to the vocabularies structure.However, for simple robots in IoT one can shorten the number of dialog phrases and simplify the set of instructions by means of the adaptation of L L w r d , providing direct output of requested group of words. As various specialized agents may be allowed to use only selected groups of vocabularies, they should keep in memory the preliminary given table of access paroles or fixed hashes h v , m and approval hashes h ( m , 0 ) , which principally may be chosen different for various groups of robots.
In the present paper the main task of modeling was to show the possibility to use the proposed vocabulary structure and adapted LL scheme for the verification of confidential enough data, where one avoids direct full data transfer, and Sender of phrase only checks the correctness of actual for him words by means of correct template hidden in L L w r d . Variant of memory allocation table for the adapted version of the linked list L L w r d is shown in Table 10; it resembles schemes used in [54], but here both SRAM and EEPROM chips were used. This adapted AGA function L L w r d   follows exp.(10) w v , m K = F w r d ( w v , m N , v , m , h v , m m , 0 , h v , m ) taken with rearranged parameters w v , m K and   h v , m m , 0 . Due to the fact, that w v , m K are also quasi random hash values, one can rearrange it with another quasi random hash values h v , m m , 0 assigned by Addresser, what corresponds to definitions of LL [53,54].
Table 10. Memory allocation table used for modelling of L L w r d . .
Table 10. Memory allocation table used for modelling of L L w r d . .
N Word code in natural numbers, w v , m N ={1÷16} Number   of   row   in   vocabulary   matrix ,   v = { 116 } Number of column in vocabulary matrix, m={1÷16} Addresser approving hash , h v , m , ( m , 0 ) ={1÷256} Sender   approving   hash , h v , m = 1256 } Word code in truth levels, w v , m K = {1÷256}
#A18 –A16: #000b #000b #000b #000b #000b #000b
#SB (A15-A8): #109 #108 #107 #106 #105 #104
#LB: #0÷255 #0÷255 #0÷255 #0÷255 #0÷255 #0÷255
Further modelling is demonstrated by the microassembler subroutine LLWRD shown in Algorithm 3. It refers to the the adapted version of the linked list L L w r d proposed above in sec. 4 and described in Table 10. It`s role is to approve correctness of the truth levels code for some of words w v , m K , according to the request sent by an external agent Sender, which should declare several passwords to Addresser and to check the correctness of his version of truth levels code for actual coded words, using template data written in L L w r d in Addresser.
The second presented program fragment of the subroutine CHKPHR is shown in Algorithm 4 and refers to the formal procession of the header part of the phrase by Addresser, as the consideration of content part needs to analyze the vast structure of typical agent`s tasks.
Both procedures are supposed to be carried out in the communication module of agent, which is to carry out preliminary procession of messages, as the full scale AI modeling is the prerogative of the decision-making module.
Microassembler subroutine LLWRD is given in Algorithm 3 and continues earlier designed set of software programs presented in for the dual–chip scheme and the base version of LL. It partially intersects with basic algorithms given as Tables 12-13-14 in [54], but there only SRAM was involved. Here EEPROM was used as the data storage for template (or correct) data, and SRAM was to keep data to be checked, which were received from Sender. EEPROM chip needs separate addressing to compute a set of non-zero product terms { p t 1 , …, p t m } [53,54].The same #SB addresses (## 107÷103) were reserved for the L L w r d in SRAM and EEPROM to shorten the re-switching of pins. Also, instead of calculation of the operator MIN in pairs P T m = M I N ( h m , 1 , p t m ) [54], more short program LLWRD directly assigns logic constant h m , 1 to the non-zero product term p t m with the result saved in #SB=#103. Algorithm 3 demonstrates simple adaptation of vocabularies structure to the LL scheme. If necessary, some more complicated versions can be used for dialog polling and data approving.
Algorithm 3. Subroutine LLWRD is to compute correct truth levels codes for the requested elements of vocabulary V v , m K and V v , m N . Procedure is to be carried out in MCS-III of 2d dual-chip and uses its pins.
INPUT: w v , m , N , v , m , h v , m , h v , m ( m , 0 )   Input variables
1 LLWRD: CLR P1.4; prepare pin 2 MOV P2,#000b; Assign #A18-A16=#000b for SRAM
3 CLR P1.7; enable Rg1 by C E ¯ 4 SETB P1.4; Rg1 writes #A15-A8=#000b
5 CLR P1.4; 6 SETB P1.7 ; lock Rg1
7 CYCNT: MOV R2,#255; Set counter of notations 8 CYCVAR: MOV R3,#5; counter of input vars
9 LOAT:MOV P2,#009b; set #SB at to Rg3/7 ROM 10 CLR P1.5; enable Rg3/7 by C E ¯
11 SETB P1.4; Rg3/7 writes #SB=#009b for a-template 12 CLR P1.4;
13 SETB P1.5; lock Rg3/7 14 MOV P2,R2; set #A7-A0=#255 for at ROM
15 CLR P1.2; enable ROM b y   C E ¯ 16 CLR P3.1; enable ROM output b y   O E ¯
17 REAT:MOV R7,P0; read a t from ROM 18 SETB P3.1; disable ROM output b y   C E ¯
19 LOBT: MOV P2,#109; load #SB of bt in ROM 20 CLR P1.6; enable Rg3/7 by C E ¯
21 SETB P1.4; Rg3/7 writes #SB=#109 of b-template 22 CLR P1.4;
23 SETB P1.6; lock Rg3/7 24 MOV P2,#255; set #LB=#255 for ROM
25 CLR P1.2; enable chip ROM b y   C E ¯ 26 CLR P3.1;   O E ¯ enables ROM output
27 REBT:MOV R6,P0; read b -template from ROM 28 SETB P3.1; disable ROM output
29 SETB P1.2; disable chip ROM 30 CLR P1.1; prepare pin for SRAM
31 LOAE: MOV P2,#0; set #SB=0 in Rg1/5for SRAM 32 CLR P1.6; C E ¯ enables Rg2
33 SETB P1.4; write #SB=#0 to Rg2 34 CLR P1.4
35 SETB P1.6; lock Rg2 36 MOV P2,R3 ; #LB counter of variables
37 CLR P1.3; C E ¯ enables SRAM 38 CLR P1.1; O E ¯ enables output of SRAM
39 REAE:MOV R5,P0; read a -external from SRAM 40 SETB P1.1; disable output of SRAM
41 SETB P1.3; disable SRAM 42 LITERAL: MOV A,R7; load a-template to calc Lit.
43 CLR C; prepare carry bit 44 SUBB A, R5; at-ae=R7-R5
45 JC CAB; jump if carry bit C=1,i.e. a-ext. >a-templ. 46 AJMP PT0;Lit=0 and the whole pt=0
47 CAB: CLR C 48 MOV A,R6; load bt to A to calc Literal
49 CLR C; prepare carry bit 50 SUBB A,R5; bt-ae=R6-R5
51 JC PT0; jump PT0 if bit C=1, i.e. ae> bt 52 DEC R3; counter of input vriables
53 CJNE R3,#0,LOAT; process next variable 54 PT1: AJMP WRRES; write const in #SB=#003
55 PT0: MOV R0, #0; product term=#0 56 AJMP WRR0
57 WRRES: MOV P2,#4 ; set #SB=#004 to read Const 58 SETB P1.4; write #SB=#004 into Rg2/6
59 CLR P1.6; enable Rg2/6 60 CLR P1.4;
61 MOV P2,R3 ; assign #LB to read Const 62 CLR P1.3; C E ¯ enables chip SRAM
63 CLR P1.1; O E ¯ enables output of SRAM 64 RECNST:MOV R0,P0; write Const in R0
65 SETB P1.1; disable output of SRAM 66 SETB P1.6; disable Rg2/6
67 WRR0: MOV P2,#3; set #SB=#003 to write Const 68 CLR P1.6; enable RG2/6
69 SETB P1.4; write #SB=#003 to Rg2 70 CLR P1.4;
71 SETB P1.6; lock Rg2 with #003 72 MOV P2,R2; addressing of #LB for SRAM
73 MOV P0,R0; output next Const 74 CLR P1.3; C E ¯ enables chip SRAM
75 CLR P1.1; O E ¯ enables data of SRAM 76 CLR P1.0; write Const in #SB=003, #LB=R2
77 SETB P1.0; W E ¯ disables write in SRAM 78 SETB P1.1; O E ¯ disables data of SRAM
79 SETB P1.3; O E ¯ disables chip SRAM 80 DJNZ R2,#1,CYCVAR; process next notation
81 MAXPTS:MOV R1,#103; #SB103 for PTs 82 MOV R2,#255; counter of PTs
83 MOV P2,R1; addressing #SB=#103 84 CLR P1.6; enable Rg2by C E ¯
85 SETB P1.4; write #SB=#103 to Rg2 86 CLR P1.4
87 SETB P1.6; lock Rg2 88 MOV P2,R2 ; #LB is the counter of PTs
89 CLR P1.3; enable SRAM by C E ¯ 90 CLR P1.1; O E ¯ enables output of SRAM
91 MOV A,P0; read PT 92 SETB P1.1; disable output of SRAM
93 SETB P1.3; disable SRAM 94 DEC R2
95 NEXTPT:MOV P2,R2 96 CLR P1.3; enable SRAM by C E ¯
97 CLR P1.1; O E ¯ enables output of SRAM 98 MOV R7,P0; read next PT
99 SETB P1.1; disable output of SRAM 100 SETB P1.3; disable SRAM
101 MOV R3,A; save value of Acc 102 CLR C
103 SUBB A,R7; 104 JNC MAX_N1
105 MOV R0,R7 106 MAX_N1:MOV R0,R3
107 DJNZ R2, NEXTPT 108 RETI
OUTPUT: R0 → w v , m K , truth levels code for the requested word from V v , m K is written into the register R0
The fragment of the second microassembler program CHKPHR is to find correct parts in the buffer and for brevity is given fragmented. Input data buffer in SRAM of the 2d dual-chip uses the allocation memory table given in Table 11. Memory reserve fields are necessary to write intermediate calculations and results.
Further Algorithm 4 demonstrates the initial fragment of the microassembler program CHKPHR to process the initiation word, to check input parole, to check addresser, to calculate total check coefficient summation, and to compare it with the declared value, i.e. it can determine correct header in the buffer.
Algorithm 4. The fragment of subroutine CHKPHR is to detect header part of phrase and to calculate its total check coefficient in the buffer data. Register R7 is the counter for 30 parts in the buffer segment, R6 is the counter of parts in the phrase, R5 - counter of #LB, R4 - counter of word values (limited by 16).
I n p u t : W h = w 1,1 K , w 1,2 K ,   w 1,4 K , w 2,4 K , w 3,4 K , w 1,5 K , w 2,5 K , w 3,5 K Header of the received phrase parts
W c * = w 1,1 K , w 1,2 K ,   w 1,4 K , w 2,4 K , w 3,4 K , w 1,5 K , w 2,5 K , w 3,5 K Error 8-byte part
W c = w 1,3 K , w 1,8 K , w 2,8 K , w 33 , s K , w 1,4 K , w 2,4 K , w 3,4 K ,   C t o t a l N / K Correct content part of phrase
w 1,2 K = 7 = H i ,   r e a d   2   p a r t s , Words interpretation in the decoding table
  w 1,2 K = 123 = H i ,   r e a d   3   p a r t s ,
w 1,2 K = 209 = H i ,   r e a d   4   p a r t s
1 FINDHI: CLR P1.4; prepare pin 2 MOV P2,#00000111b; Assign #A18-A16=#000b
3 CLR P1.7; enable Rg1 by C E ¯ 4 SETB P1.4; Rg1 writes #A15-A8=#111b
5 CLR P1.4 6 SETB P1.7 ; lock Rg1
7 CYCPT: MOV R7,#1; counter of 30 parts in buffer 8 MOV P2,#00000111b; Assign #SB=#1 to read header
9 CLR P1.6; enable Rg2 by C E ¯ 10 SETB P1.4; Rg1 writes #SB=A15-A8=#1
11 CLR P1.4; 12 SETB P1.6 ; lock Rg2
13 NXTPRT1:MOV R5,#0; counter of #LB 14 NXTPRT11:MOV P2,R5; set #LB
15 REWRD1: CLR P1.3; enable chip SRAM by C E ¯ 16 CLR P1.1; enable data output from SRAM
17 CHKHI1:MOV R3,P0; read 1st word from SRAM 18 MOV R0,R3; copy # of 1st word for further summation
19 SETB P1.1; disable output of SRAM 20 SETB P1.3; disable chip of SRAM
21 CHKHI11: CJNE R3, #7, CHKHI2; check if  w 1,1 K =7 22 MOV R6,#2; determines number of parts in phrase g=2
23 AJMP CHKPWD; 24 CHKHI2: CJNE R3, #123, CHKHI3; check if  w 1,1 K =123
25 MOV R6,#3; number of parts in phrase g=3 26 AJMP CHKPWD;
27 CHKHI3: CJNE R3, #209, NXTPRT2; check if =#209 28 MOV R6,#4; number of parts in phrase g=4
29 CHKPWD: INC R5; #LB of 2d word - parole 30 MOV P2, R5; # to read password
31 CLR P1.3; enable chip SRAM by C E ¯ 32 CLR P1.1; enable data output from SRAM by O E ¯
33 PWD:MOV R3,P0; output 2d word from SRAM 34 SETB P1.1; disable output of SRAM
35 SETB P1.3; disable chip of SRAM 36 CJNE R3,#131,NXTPRT2; password =131
37 AJMP CHKNAME1; 38 NXTPRT2: DEC R5; return to the 1st word
39 NXTPRT21:MOV A,R5; 40 ADD A,#7; #LB for the 1st word in next part
41 MOV R5,A; #LB 42 MOV R1,A; copy #LB of word for further calc
43 CJNE R5,#240,NXTPRT11; check if buffer passed 44 RETI; buffer is fully processed
45 CHKNAME1: INC R5; #LB+1 46 INC R5; #LB increased by 2 for Addresser name 1
47 MOV P2,R5; #LB to read name1 48 NOP;
49 CLR P1.3; enable chip SRAM by C E ¯ 50 CLR P1.1; enable data output from SRAM
51 RENAME1:MOV R3,P0; read name1 52 SETB P1.1; disable data output from SRAM
53 SETB P1.3; disable chip of SRAM 54 CJNE R3, #0, DEC2LB; name1 is =#0
55 INC R1; #LB for Addresser name2 56 CHKNAME2: MOV P2,R1; read name2
57 CLR P1.3; enable chip SRAM by C E ¯ 58 CLR P1.1; enable data output from SRAM
59 RENAME2:MOV R3,P0; read name2 60 SETB P1.1; disable data output from SRAM
61 SETB P1.3; disable chip of SRAM 62 CJNE R3, #0, DEC2LB; name2 is =#0
63 INC R0; #LB for Addresser name 3 64 CHKNAME3: MOV P2,R3; read name3
65 CLR P1.3; enable chip SRAM by C E ¯ 66 CLR P1.1; enable data output from SRAM
67 RENAME3: MOV R3,P0; read next w o r d 68 SETB P1.1; disable data output from SRAM
69 SETB P1.3; disable chip of SRAM 70 CJNE R3, #3, DEC2LB; name 3 =#3
71 AJMP CHKHSUM1 72 DEC2LB: DEC R5;
73 DEC R5; 74 DEC R5; return #LB to 1st word in phrase
75 AJMP NXTPRT21 76 CHKHSUM1:MOV R1,#0; counter of words
77 DEC R5; 78 DEC R5;
79 DEC R5; return #LB to 1st word in phrase 80 HSUM1: MOV R0, R5; copy #LB of word
81 MOV P2,R5; #LB 1st word of header 82 MOV A,#0; clear A for summation
83 CLR P1.3; enable chip SRAM by C E ¯ 84 CLR P1.1; enable data output from SRAM
85 MOV R3,P0; read w o r d from SRAM 86 MOV R1,#0; counter of words in phrase
87 SETB P1.1; disable output of SRAM 88 SETB P1.3; disable chip of SRAM
89 HSUM2: ADD A,R3; 90 INC R1; counter of words in part
91 INCR5:INC R5; increment #LB +1 92 CJNE R1,#8,HSUM1; check counter of words
93 WRHSUM: MOV R4,A; save header check sum 94 CJNE R5,#240,RETI
95 WRCNTPT: MOV R1,#240; write check coef. to Reserve 1 96 ADD R5,#8; # LB for next part
97 CJNE R5,#240,RETI 98 RECNTWD: P2,R5; #LB to read 1st content word
99 CLR P1.3; C E ¯ enables chip SRAM 100 CLR P1.1; O E ¯ enables output of SRAM
101 CLR P1.0 102 MOV P0,R3; read sender name3
103 SETB P1.0; disable write 104 SETB P1.1; disable chip SRAM
105 SETB P1.3
RETI
Output: buffer Reserve1→ R4 contains total check coefficient for the adequate header W h = w 1,1 K , w 1,2 K ,   w 1,4 K , w 2,4 K , w 3,4 K , w 1,5 K , w 2,5 K , w 3,5 K and is ready to use it further
Carried out microassembler modeling, algorithms, and subroutines complement earlier done designs of AGA operators MINIMUM, MAXIMUM, LITERAL, and C language version of AGA function calculation, published earlier in open access papers [52,53,54]. For brief approximate comparison of time characteristics one can use reference basic data given in [53], where operators need t MIN-MAX
4 µs and t Literal
9 µs; the calculation of AGA function with K = 256 truth levels and n = 12   variables takes     210,000   work cycles and 0,1 s at 24 MHz. Such time response is comparable with human time response in dialog mode. The computing time for other subroutines can be approximately estimated by the comparison of the number of used operators in various programs.
Results of modelling.
  • The proposed structure of coded vocabularies and the conjugated dialog protocol are tested by two microassembler programs, designed for the dual–chip module based on 8-bit microcontrollers MCS-51. They demonstrate principal compatibility of proposed tools with devices of IoT level, provide close complexity level and can be combined together with earlier published algorithms [53,54,59] for the calculations of AGA functions and the base LL scheme.
  • The designed dialog phrase protocol for agents communication, involving 8-bytes header and content parts, is compatible and convenient enough for the procession by 8-bit dual-chip module.
  • Designed vocabularies structure can be used in simple 8-bit platforms with limited free memory resources, and the proposed dialog protocol can selectively transfer various combinations of logic words and verification coefficients.
  • AGA vocabularies structure in 8-bit modelling provides 256 coded words   w v , m K and w v , m N , what gives the possibility to form complicated enough terminology chains and to design tasks descriptions for distant exchange of data.
  • Adapted version of LL with 5 input variables is the minimalistic possible tool for protected local storages of critical data, protected by paroles and hash values. If necessary, intermediate versions of LL can be extended by means of the enlarged number of hash values, approving the LL by other internal and external modules.
  • Proposed subroutine LLWRD is compatible with algorithms published earlier in [52,53] and complements AGA subroutines for XOR calculations in [53]. Also one can use the software from for connection to PC.
  • Designed algorithms are applicable both for truth levels codes w v , m K and natural numbers ones w v , m N , what can be further used for new and more exhausted verification schemes in the heterogeneous logic architecture of agent.
Further research needs to design universal algorithm and microassembler subroutine of template AGA function, which can be flexibly adapted for the procession of all proposed versions of LL scheme, i.e. can be re-switched by the choice of appropriate control parameters. That will help to avoid excessive software in dual-chip module, which is limited by 500-600 operators per one MCS-51. SRAM microscheme in dual-chip module potentially can be enlarged up to 32 MB.
Vocabularies structure and words codes should be further applied to the dual-chip scheme itself and to commercial robotic platforms like Arduino, in order to imitate peripheral AI procedures in decision making module and to involve standard wireless network modules.

7. Discussion

Further research of the proposed vocabularies structure and dialog mode of verification refers to the design of control models for large scale robotic systems, where only administrators and supervising agents possess holistic formal logic model, and separate groups of robots has only fragmentary knowledge and sets of subroutines. In such a system, full-scale modelling in every agent is too expensive and excessive, and the reasonable strategy is to reconfigure the individual agent model for the current task and situation. Then autonomous schemes of missing knowledge search, exchange and verification of reconfigured models become the key element. Another aspect of the problem is to adapt the structure of vocabularies and WM to specialized fragments, appropriate for the design of transformable and self-learning robots with changeable tools. The expected complication here is that verification procedures should be enlarged to monitor the compatibility of robotic hardware platforms, accessible tools, and corresponding software.
Close actual task is the extension of the proposed vocabularies structure to the control of the WM, describing the operation of agent in the scene of action and activating corresponding subroutines and actuators. This goal follows from the review of robotic WMs [62], where the main contribution was to design explicit dimensions of WMs, to determine the underlying principles to make decisions, and to search the trade-offs model for conflict situations. The conclusion of the authors of was that the universal WM does not exist, as it highly depends on the robotic system, the environment in which it operates, and the performed tasks. Even simple robot can use more than one WM, e.g., one for navigation and another one for manipulation. Respectively, the procession of complicated vocabularies structure for V v , m L , N , K is the realistic scheme for WM modeling and can be extended to the selection of activated expressions and software subroutines. However, the choice of vocabularies and words may itself include special calculations and estimations based on expert knowledge. Then WM can be considered as the comprehensive current structure of vocabularies subsets, whose choice is to be done by the decision-maker for the specific current task, basing on rules of work, objects detected in the scene of action, current goals, instructions received from the owner of robots, and behavior of people and robots in the scene. Such research also seems to include complicated AI optimization and AGA metrics, estimating the distance to the formal aim in the multi-parametric space.
Proposed FMF remains here a service tool, which good correlates with the idea of distributed small-scale local memory storages used in the network MAS. The motivated structure of hidden and protected by LL data storages for irregular checks can be preliminary prepared and activated by microcontrollers without special high-level robotic languages. The proposed dialog protocol provides access to data basing on content control, and real addresses for such data storages will be hidden for external agents. Minimalistic versions of LL storages with enough number of passwords should be complemented by confidential digital map of addresses for specific vocabularies sets.
The proposed simple adaptation of basic LL scheme for small scale robotic collective creates the task to select several most actual template versions of LL for enhanced AI modelling, including content analysis and parametrical passwords, adaptable to various external conditions. In small-scale groupes of agents the adaptive structure of LLs is to be attributed to the history of the completed work, can complement one-time quasi random passwords in verification procedures.
As the microcontroller-based communications module and its re-coding tables for w v , m   K and w v , m   N are divorced from the decision-making module and mass Internet tools for data procession, then one receives the opportunity to cut off incorrect external codes from AGA contours. The development of allocated communication module with extended verification procedures gives the potential possibility to control and to exclude the illegal loading of external codes into the decision-making subsystem of agent via the interface with PC and the network card. Then the design of AGA-controlled verification scheme is to be extended from the communication module also to the interface between the decision-maker and standard USB module with wireless network hardware.
One more actual problem is the slow enough progress in robotic computer vision [13,14] and the real success in fake images generation [83], what limits the development of verification methods. In such extensively developing fields as IoV and the positioning of delivery drones, advanced verification procedure should integrate not only space and time parameters of routes, but also to use formal monitoring of images of cargo, terminals, territorial restrictions, and the biometrics of personnel. Further research is to disclose, how useful can be the conjugation of AGA models and NN. At least it is to compensate the known problem of deliberate data correction in NN [22].
In a small-scale MAS without distinctly pronounced statistical characteristics of agents behaviour, the application of quantum computing for verification seems not to be a priority task. However, this situation can be changed greatly for the global robotic system or for the imitation of human creative algorithms, where it will be necessary to generate and compare many alternative AGA expressions. Then simple in essence AGA vocabularies structure logic modelling and verification algorithms can help to unite quantum procedures and collective robotic tasks.

8. Conclusions

Technical faults, attacks and illegal data modification make distant data verification the obligatory component of collective robotic systems. Verification is considered as the set of data integrity and authentication tests, activated for initial debugging of the agent, periodical testing, work correction, and system restoration. Verification procedures can be initiated not only by a distant administrator or partner robots from the same MAS, but also by state regulator`s agents and loyal or conflicting external robots. Verification tasks motivate to use non-exhausted selective check procedures and distributed local data storages for critical data documenting, protected by LL schemes. Verification should combine automatic and human checks.
In the presented paper robotic communications and verification procedures are firstly proposed to be based on AGA logic model, using ordered high capacity vocabularies structure and formal logic dialog language. AGA-based robotic language and dialog phrases protocol are defined by the ordered matrix structure of vocabularies V v , m N and V v , m K   formed by logic words w v , m . Firstly, the scene of actions, robots, objects, tasks, tools, and involved software products are to be described by the preliminary formed structure of natural language words and their collocations, represented by vocabularies V L   given in the natural language. Further vocabularies   V L are to be mapped onto the ones V N , represented by natural numbers codes, which in its turn should be mapped onto vocabularies V K formed by truth levels codes defined in AGA. Such three-levels structure of equivalent coding provides the optional use of not protected natural numbers codes and of quasi-random truth levels codes, preventing from illegal data modification, and providing enhanced data integrity checks and the search of errors.
Phrases in dialogs of robots are to be coded by truth levels codes and transmitted by parts, formed by 8-byte sequences of coded numbers. Proposed protocol provides the possibility to find correct content parts of the phrase, what gives the principal possibility to transfer them in parallel even with time delays, e.g., by different laser wavelengths or various radio frequencies in wireless data lines. The procession of the phrase is proposed to be done by AGA-based functions, realizing high capacity finite automatons for the verification of phrases. AGA template matching or logic filtering of input logic phrases is to be used further for the formal preliminary interpretation of phrases. Such procession procedures don`t disclose real physical values of coded internal parameters of agent.
In order to provide reliable documenting of data in the distributed set of local data storages in network agents, the presented paper proposes adapted versions of AGA-based LL. The firstly proposed scheme of mapping of multi-parametric logic AGA functions onto truth levels scale provides small dimensional (1D, 2D, 3D) fragmented projections (or logic diagrams) convenient both for human and automatic checks, as well as for critical data saving in local storages in network agents. Such diagrams can help to visualize and to find errors in verified data.
Wide bands of time, space and some other parameters can be obtained by means of correlated input logic variables taken in AGA, what provides the chance to extend the proposed communications protocol for large-scale systems.
Algorithms and software modelling are demonstrated for the allocated 8-bit microcontroller module, included into the dual-chip microcontroller scheme, earlier used for MVL-LL design. The cascaded scheme of two dual-chip nodules is considered as a platform for communication module for further verification and AI modelling.
Designed MVL-schemes are based on the heterogeneous logic architecture of agent, what gives the methodology to combine AGA, traditional Boolean and fuzzy logic.

Funding

This research received no external funding.

Conflicts of Interest

Author declares no conflict of interest.

Appendix A

Algorithm 1. Phrase procession for dialogs Administrator-Agent and Agent –Agent from the same MAS. Total check coefficients C K / N   o r   C K X R   are calculated by arithmetic summation or binary XOR operations done for mapped truth levels. Phrase can initiate new dialog or continue the opened one.
Input: K Number of truth levels in AGA;
V v , m K Vocabularies in truth levels representation;
( w 1,4 K , w 2,4 K , w 3,4 K ) Adresser code, given by the triple of coded truth levels in chain vocabularies;
( w 1,5 K , w 2,5 K , w 3,5 K ) Sender codes triple;
( p , q , w p , q K ) ,   , ( r , s , w r , s K )   Set   of   triples ,   representing   content   data   given   by   Decision   maker   for   transfer   to   Adresser ;     p , , q   and   r , , s arbitrarily given enlarging values, p≤r, q≤s ;
w 1,1 K Welcome code {“Hi”} to begin new session;
  w 1,2 K Fixed parole for initial access to Adresser;
  w 1,3 K Assigned hash value;
L a l List of allowed contacters
L s List of addressers with opened sessions;
L h a s h List   of   accumulated   quasi   random   keys   h i j L H A S H   taken from QRNG;
N Subject Operation Commentary
1 Sender ( w 1,5 K , w 2,5 K , w 3,5 K ); Checks   (   w 1,4 K , w 2,4 K , w 3,4 K )   L a l , if yes go to step 2 ; other go to procedure for unknown contacters ;       L a l   of allowed contacts contains Adresser`s name triple:
2 Assigns i=1, for empty Phrase header template W i , j = {   , , , , , , , } ; ; begin new phrase and header
3 Assigns j=1 ; number of content part
4 Assigns   Format   w 1,1 K = H i to Phrase header part
W i , j = {   w 1,1 K , , , , , , , } ;
; initiation of dialog
5 Assigns   Fixed   parole   w 1,2 K   of   Addresser   ( w 1,4 K , w 2,4 K , w 3,4 K )   to   phrase   header   W i , j = { w 1,1 K , w 1,2 K , , , , , } ; ; takes fixed w 1,2 K   from V 1,2 K
6 Assigns   Adresser ` s   triple   name   ( w 1,4 K , w 2,4 K , w 3,4 K ) to the header W i , j = {   w 1,1 K , w 1,2 K ,   w 1,3 K , w 2,3 K , w 3,3 K , , , } ; ; insert triple V 1,3 K , V 2,3 K , V 3,3 K
7 Assigns   own   Sender ` s   triple   name   ( w 1,5 K , w 2,5 K , w 3,5 K )   to   the   header   W i , j = {   w 1,1 K , w 1,2 K ,   w 1,4 K , w 2,4 K , w 3,4 K , w 1,5 K , w 2,5 K , w 3,5 K } ; ; insert triple V 1,4 K , V 2,4 K , V 3,4 K
8 Maps   truth   levels   onto   natural   numbers   scale   and   calculates   total   check   coefficient   C i . j K / N for the header C 1,1 K / N = m = 1 2 w 1 , m K + v = 1 3 m = 3 4 w v , m K / N ;
9 Calculates   number   of   content   parts :     N C   ( r   x   s p   x   q ) / 6 ;     N C N ,     p , q , r ,   s   are   taken   from   the   received   content   data   sequence   { w p , q K ,   , w r , s K }   ; ; number of content parts is determined by 6 free fields in any of them
10 Assigns v=p, m=q ; set counters of chain vocabularies
11 Assigns   j = N C ; begin content parts and set their counter
12 Assigns g=6 ; counter of free fields in a content part
13 Writes   next   hash   w 1,3 K   from   the   list   L h a s h   to   the   first   field   of   phrase   content   part   W i , j = w 1,3 K , , , , , , , , ; ; begin new content part
14 Goes to step 18 ; next content part
15 Checks   if   m = s ,   i f   yes , goes to step 23 other, goes to step 18
16 Checks   if   v = r ,   i f   yes, goes to step 26 other, goes to step 18 ;end of phrase formation
17 Checks   if   j = 0 ,   i f   yes, goes to step 12 other, goes to step 25
18 Write   w p , q K   into   the   next   vacancy   in   the   content   part   W i , j + 1 = w 1,3 K , w p , q K , w p + 1 , q K , w p + 2 , q K , , , , ,
19 g=g-1 ; check for free fields
20 Checks   if   g = 0 ,   i f   yes, goes to step 25 other, goes to step 21 ; m + 1
21 m = m + 1
22 Goes to step 15
23 v=v+1 ; process next v
24 Goes to step 16
25 Maps   truth   levels   onto   the   natural   numbers   scale   and   calculates   total   coefficient   C i . 2 K of the content part C i . j K / N = h i j a d + v = p q m = r s w v , m K / N c o n t e n t   p a r t
26 Calculates total summation
C t o t a l K / N = C 1,1 K + i = 2 N c j = 1 N c C i , j K / N
27 Writes   C t o t a l K / N   into   the   current   content   part   of   phrase       W i , j = w 1,3 K , w v , m K , w v , m K , w v , m K , w v , m K , w v , m K , w v , m K ,   C t o t a l K / N
28 Sends   the   header   W i , j   and   content   parts     W i , j + 1 , W i , j + 2 , t o A d r e s s e r
29 i=i+1 ; counter of phrases for continued dialog
30 Waits reply from addresser
31 Adresser   (   w 1,4 , K w 2,4 K , w 3,4 K ) Writes message parts in the buffer: W i , j = { w 1,1 K , w 1,2 K ,   w 1,4 K , w 2,4 K , w 3,4 K , w 1,5 K , w 2,5 K , w 3,5 K } ; W i , j + 1 = w 1,3 K , w v , m K , w v , m K , w v , m K , w v , m K , w v , m K , w v , m K ,   C t o t a l K / N ; indexes v , m indicate arbitrarily given words
32 Reads   word   w 1,1 K in the Format field of the phrase header W i , j = { w 1,1 K , w 1,2 K ,   w 1,4 K , w 2,4 K , w 3,4 K , w 1,5 K , w 2,5 K , w 3,5 K } ;
33 Assigns   the   number   of   content   part   j =   N C
34 Checks ,   if   list   L s   of opened sessions contains Adresser`s name   (   w 1,4 K , w 2,4 K , w 3,4 K ) ,   declared   in   the   header   W i , j : Checks ,   if     ( w 1,4 K , w 2,4 K , w 3,4 K ) L s ,   i f   yes , goes to step 38, other, goes to step 35
35 Checks ,   if   list   L a l   of   allowed   contacters   contains   Adresser ` s   name   ( w 1,4 K , w 2,4 K , w 3,4 K ): Checks ,   if     ( w 1,4 K , w 2,4 K , w 3,4 K ) L a l ,   i f   yes , goes to step 37, other, goes to step 36
36 Send denial of service message
37 Maps   truth   levels   onto   natural   numbers   scale   and   calculate   total   coefficient   for   the   header   C i , 1 * K = m = 1 2 w 1 , m K + v = 1 3 m = 3 4 w v , m K ; ; check received external coefficients
38 Maps truth levels onto natural numbers scale and calculate total coefficient for content parts C t o t a l * K / N = C i , 1 * K + i N c j = 1 N c C i , j * K / N
39 Compares the received and the declared values : Checks ,   if     C t o t a l * K = C t o t a l K   ,   i f   yes , goes to step 40, other, goes to step 36
40 Sends   received   phrase   content   ( p , q , w p , q K ) ,   , ( r , s , w r , s K ) to Decision maker ; excluding hashes and check coefficients
41 Waits reply from Decision maker
42 Receives   reply   ( p , q , w p , q K ) ,   , ( r , s , w r , s K )   from Decision maker ;for simplicity indexes are the same as in step 32
43 Assigns   next   quasi   random   hash   from   the   list   L h a s h   to   w 1,2 K = h i j
44 Assigns i=1 for empty phrase template W i , j = {   , , , , , , , } ; form reply phrase
45 Assigns j=1
46 Assigns   Format   w 1,1 K = R e c e i v e d to phrase header W i , j = {   w 1,1 K , , , , , , , } ; format differs from request
47 Assigns   Fixed   parole   w 1,2 K   of   Sender   to   phrase   header   W i , j = { w 1,1 K , w 1,2 K , , , , , } ; takes fixed w 1,2 K   from V 1,2 K
48 Assigns   Sender ` s   triple   ( w 1,5 K , w 2,5 K , w 3,5 K )   to Phrase header part
W i , j = {   w 1,1 K , w 1,2 K ,   w 1,5 K , w 2,5 K , w 3,5 K , , , }
49 Assigns   own   code   ( w 1,4 K , w 2,4 K , w 3,4 K ) to Phrase header part
W i , j = {   w 1,1 K , h i j a d ,   w 1,5 K , w 2,5 K , w 3,5 K , w 1,4 K , w 2,4 K , w 3,4 K } ;
50 Assigns j=j+1
51 Maps   truth   levels   onto   natural   numbers   scale   and   calculate   total   check   coefficient   C i . j K / N for the header C 1,1 K / N = m = 1 2 w 1 , m K + v = 1 3 m = 3 4 w v , m K / N ;
52 Calculates   number   of   content   parts :     N C   ( r   x   s p   x   q ) / 6 ;     N C N ,     p , q , r ,   s   are   taken   from   the   received   content   data   sequence   { w p , q K ,   , w r , s K }   ; ; number of content parts is determined by 6 free fields in a content part
53 Assigns v=p, m=q ; set counters of chain vocabularies
54 Assigns   j = N C ; begin content parts and set their counter
55 Assigns g=6 ;counter of free fields in a content part
56 Writes   next   Hash   w 1,3 K   from   the   list   L h a s h   to   the   first   field   of   phrase   content   part   W i , j + 1 = w 1,3 K , , , , , , , , ; ;begin new content part
57 Goes to step 61 ;begin next content part
58 Checks ,   if     m = s   ,   i f   yes, goes to step 66, other, goes to step 61 ; check counter
59 Checks ,   if     v = r   ,   i f   yes, goes to ste other, goes to step 61 ;end of phrase formation
60 Checks ,   if     j = 0   ,   i f   yes, goes to step 55 other, goes to step 68 ; check counter
61 Writes   set   of   w v , m K   into   the   next   vacancy   in   the   content   part   W i , j = w 1,3 K , w v , m K , , , , ,
62 Assigns g=g-1 ; free fields control
63 Checks ,   if     g = 0   ,   i f   yes, goes to step 68, other, goes to step 64 ; m + 1
64 Assigns   m = m + 1
65 Goes to step 58
66 Assigns v=v+1 ; process next v
67 Goes to step 59
68 Maps   truth   levels   onto   natural   numbers   scale   and   calculate   total   coefficient   C i . 2 K of content part C i . j K / N = h i j a d + v = p q m = r s w v , m K / N c o n t e n t   p a r t
69 Calculate total summation
C t o t a l K / N = C 1,1 K + i N c j = 1 N c C i , j K / N
70 Writes   C t o t a l K   into   the   current   content   part   of   phrase       W i , j = w 1,3 K , w v , m K , w v , m K , w v , m K , w v , m K , w v , m K , w v , m K ,   C t o t a l K / N
71 Replies   to   Sender   and   transfer   the   header   W i , j   and   content   part   W i , j + 1
72 i=i+1
73 Waits for the next dialog phrase
Output: → Formation   and   transfer   of   the   request   W 1,1 , W 1,2   to   Adresser ,   and   procession   of   reply   W 2,1 , W 2,2   to   Sender ,   saving   total   check   coefficients   C i , j K / N   in memory for the continuation of the dialog.

References

  1. El Madani, S. , Motahhir, S.; El Ghzizal, A. Internet of vehicles: concept, process, security aspects and solutions. Multimed Tools Appl. 2022, 81, 16563–16587. [Google Scholar] [CrossRef]
  2. Daki, H.; El Hannani, A.; Aqqal, A.; Abdelfattah Haidine, A.; Dahbi, A. Big Data management in smart grid: concepts, requirements and implementation. J Big Data 2017, 4, 13–19 pages. [Google Scholar] [CrossRef]
  3. Patrao, C.; Moura, P.S.; . De Almeida, A.T. Review of Smart City Assessment Tools. 2020, Smart Cities, 3, 4, 1117-1132.
  4. Zhang,K. ; Chermprayong,P.; Xiao, F.; Tzoumanikas, D.; Dams, B.; Kay, S.; Kocer, B.B.; Burns, A.; Orr, L.;Alhinai,T.; Choi, C.; Darekar, D. D.; Li, W.; Hirschmann, S.; Soana, V.; Ngah, S.A.; Grillot, C.; Sareh, S.; Choubey, A.; Margheri, L.; Pawar, V. M.;. Ball, R.J.; Williams, C.; Shepherd, P.; Leutenegger, S.; Stuart-Smith R.; Kovac M. Aerial additive manufacturing with multiple autonomous robots. Nature 2022, 609, 709–717. [Google Scholar] [CrossRef]
  5. Khanna, A. , Kaur, S. Internet of Things (IoT), Applications and Challenges: A Comprehensive Review. Wireless Pers Commun 2020, 114, 1687–1762. [Google Scholar] [CrossRef]
  6. Maalouf,N.; Sidaoui,A.; Elhajj, I.H.; Asmar, D. Robotics in Nursing: A Scoping Review, Journal of Nursing Scholarship 2018, 50, 6, 590-600. [CrossRef]
  7. Luckcuck,M.; Farrell, M.; Dennis, L. A.; Dixon, C.; Fisher, M. Formal Specification and Verification of Autonomous Robotic Systems: A Survey. ACM Comput. Surv. 2019,52, 5, Article 100, 41 pages. [CrossRef]
  8. Araujo,H. ; Mousavi M. R.; Varshosaz, M. 2023. Testing, Validation, and Verification of Robotic and Autonomous Systems: A Systematic Review. ACM Trans. on Software Eng. and Methodol. 2023, 32, 2, Article 51, 1–61. [Google Scholar] [CrossRef]
  9. Kok Yeow You. A Summary on 5G and Future 6G Internet of ThingsMarch 2023 In Book: Opportunities and Challenges of Industrial IoT in 5G and 6G Networks, Ed. by Yu, P., Hu, X., Prakash, A., Misuko, N. W., Haiyue, G.; Ch. 10, 196-243. Hershey, PA: IGI Global, 2023. [Google Scholar] [CrossRef]
  10. Nikolic, G.; Dimitrijević, B.; Nikolic, T.; Stojcev, M. Fifty years of microprocessor evolution: from single CPU to multicore and manycore systems FACTA UNIVERSITATIS Ser. Electronics and Energetics 2021, 35, 35–2. [Google Scholar] [CrossRef]
  11. Shreyas D. K., Srivatsa N. Joshi, Vishwas H. Kumar, Vishaka Venkataramanan, Kaliprasad C. SJoshi, S.N.; Kumar,V.H.; Venkataramanan, V.; Kaliprasad C S A Review on Neural Networks and its Applications September 2023 J. of Comp. Technol. & Applic.2023, 14, 2. [CrossRef]
  12. Strzelecki,R. M.; Demidova, G.; Lukichev,D.; Poliakov, N.; Abdullin, A.; Lovlin, S. Survey on fuzzy logic methods in control systems of electromechanical plants. January 2019 Scientif. and Tech. J. of Inf. Techn. Mech. and Optics 2019, 19, 1–1. [CrossRef]
  13. Shreya Shelke, Indrayani S. Pathak, Aniket P. Sangai, Dipali Lunge, Kalyani Shahale, Harsha R. Vyawahare. A Review Paper on Computer Vision. Int. J. of Adv. Res. in Science Commun. and Techn. 2023, 3, 2–673. [Google Scholar] [CrossRef]
  14. Elyan, E: Vuttipittayamongkol, P.; Johnston, P.; Martin, K.; McPherson, K.; Moreno-García, C.F.; Jayne, C.; Md. Mostafa Kamal Sarker. Computer vision and machine learning for medical image analysis: recent advances, challenges, and way forward. Art. Int. Surg. 2022, 2, 24-45. [CrossRef]
  15. Basak,S. ; Agrawal,H.; Jena, S.; Gite, S.; Bachute, M.; Pradhan, B., Assiri, M.Challenges and Limitations in Speech Recognition Technology: A Critical Review of Speech Signal Processing Algorithms, Tools and Systems. Comp. Modeling in Eng. & Sci. 2022, 135, 2–1. [Google Scholar] [CrossRef]
  16. García, S.; Ramírez-Gallego, S.; Luengo, J; Benítez J. M.; Herrera, F. Big data preprocessing: methods and prospects. Big Data Anal. 2016, 1, 9–22. [Google Scholar] [CrossRef]
  17. Jency Rubia J, Babitha Lincy R, Ezhil E Nithila, Sherin Shibi, Rosi A. A Survey about Post Quantum Cryptography Methods. EAI Endorsed Trans. on Internet of Things, 2024, 10, 9. [Google Scholar] [CrossRef]
  18. Bykovsky, A.Y.; Kompanets, I.N. Quantum cryptography and combined schemes of quantum cryptography communication networks. Quantum Electron. 2018, 48, 777–801. [Google Scholar] [CrossRef]
  19. H Shah, Rashid Ali Laghari, Kamlesh Kumar, A A Waqan, Awais Khan Jumani. A Review on Quantum Computing Trends & Future Perspectives EAI Endorsed Trans. on Cloud Systems 2022, 7, 22–11. [CrossRef]
  20. Thiruthanigesan Kanagasabai, Nagarathnam Thiruchchelvan. Data Verification and Validation Process in the Management System Development. Middle East J. of Scientific Res. 2017, 5, 5–911. [Google Scholar]
  21. Ricardo Caldas ; Juan Antonio Piñera García, Matei Schiopu, Patrizio Pelliccione, Genaína Rodrigues, Thorsten Berger. Runtime Verification and Field Testing for ROS-Based Robotic Systems. arXiv:2404.11498v1 [cs.SE] 17 Apr 2024.
  22. Bykovsky, A.Y. Multiple-Valued Logic and Neural Network in the Position-Based Cryptography Scheme. J.of Russian Laser Res. 2021, 42, 618–630. [Google Scholar] [CrossRef]
  23. Chen, J.; Micali, S. Algorand: A Secure And Efficient Distributed Ledger. Theoretical Computer Science, 2019, 777, 155–183. [Google Scholar] [CrossRef]
  24. Ethan,B.; Jae, K. Cosmos Whitepaper: A Network Of Distributed Ledgers. https://v1.cosmos.network/ resources/whitepaper, 2016.
  25. C. Cardoso,R. C.; Farrell, M.; Luckcuck, M.; Ferrando, A.; Fisher. M. Heterogeneous Verification of an Autonomous Curiosity Rover. arXiv.2007.10045v1 [cs.SE] 20 Jul 2020. ( accessed 12 November 2024).
  26. Aminof, B., Murano, A., Rubin, S., Zuleger, F. (2015). Verification of Asynchronous Mobile-Robots in Partially-Known Environments. Eds. Chen, Q., Torroni, P., Villata, S., Hsu, J., Omicini, A. PRIMA 2015: Principles and Practice of Multi-Agent Systems. PRIMA 2015. Lecture Notes in Computer Science, volume 9387. Springer, Cham. 185–200. 2015. [CrossRef]
  27. Kouvaros, P.; Lomuscio, A. Formal verification of opinion formation in swarms. In Proc. of the 15 International Conference on Autonomous Agents & Multiagent Systems (AAMAS 2016). Singapore, 9-13 May, 2016,1200–1208.
  28. Foughali, M.; Berthomieu, B.; Dal Zilio, S.; Hladik, P.-E.; Ingrand, F.; Mallet, A. Formal verification of complex robotic systems on resource-constrained platforms. In 2018 IEEE/ACM 6th International FME Workshop on Formal Methods in Software Engineering (FormaliSE). IEEE, Gothenburg, Sweden, May 27–3 June 2018. pp. 2–9. [CrossRef]
  29. Kamali, M.; Dennis, L. A.; McAree, O.; Fisher, M.; . Veres, S. M. 2017. Formal verification of autonomous vehicle platooning. Science of comp. programming 2017, 148, 88–106. [Google Scholar] [CrossRef]
  30. Barbot, B.; Bérard, B.; Duplouy, Y.; Haddad, S. Statistical model-checking for autonomous vehicle safety validation. In Conference SIA Simulation Numérique. HAL-Inria, Montigny-le-Bretonneux, France. 16 March 2017.
  31. Luo C.; Wang, R.; Jiang, Y.; Yang, K.; Guan, Y.; Li, X.; Shi. Z. 2018. Runtime verification of robots collision avoidance case study. In IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Vol. 1. IEEE, Tokyo, Japan, 23- 27 July 2018, pp.204–212. [CrossRef]
  32. Lomuscio, A.; Michaliszyn, J. 2015. Verifying Multi-Agent Systems by Model Checking Three-valued Abstractions. In Proc. of the 14th Int. Conf. on Autonom. Agents and Multiagent Systems (AAMAS 2015), Eds. Bordini, E.;, Weiss, Y; May 4–8, 2015, Istanbul, Turkey, vol. 15, 189–198.
  33. Mansoor,N; Saddler, J. A.; Silva, B.; Bagheri, H.; Cohen, M. B. Farritor, S.. Modeling and testing a family of surgical robots: an experience report. In Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ACM, Lake Buena Vista, FL, USA, November 4 - 9, 2018 , 785–790.
  34. Cavalcanti, A.; Miyazawa, A.; Sampaio, A.; Li, W.; Ribeiro, P.; Timmis, J. Modelling and verification for swarm robotics. In Proc. Int. Conf. on Integr. Formal Methods. Springer, Maynooth, Ireland, September5-7, 2018,1–19. 2018.
  35. Betts, K. M.; Petty, M. D. 2016. Automated search-based robustness testing for autonomous vehicle software. Modelling and Simulation in Engineering 2016 , 3, 1-15. [CrossRef]
  36. Brambilla, M.; Brutschy, A.; Dorigo, M.; Birattari, M. Property-driven design for robot swarms: A design method based on prescriptive modeling and model checking. ACM Transactions on Autonomous and Adaptive Systems (TAAS) 2014, 9, 4–1. [Google Scholar] [CrossRef]
  37. O’Kelly, M.; Abbas, H.; Gao, S.; Shiraishi, S.; Kato, S.; Mangharam, R. APEX: Autonomous vehicle plan verification and execution. In Proc. SAE 2016 World Congress and Exhibition. SAE International, April 12-14 2016, Detroit,MI, USA,vol. 1, pp. 1–13.
  38. Desai, A.; Dreossi, T.; Seshia, S. A. 2017. Combining Model Checking and Runtime Verification for Safe Robotics. In Runtime Verification, Eds. Lahiri S., Reger G. Springer Internat. Publishing, Cham, 2017, 172–189.
  39. Lu, Y.; Niu, H.; Savvaris, A.; Tsourdos,A. 2016. Verifying collision avoidance behaviours for unmanned surface vehicles using probabilistic model checking. IFAC-PapersOnLine 2016, 49, 23, 127–132.
  40. Foughali, M.; Berthomieu, B.; Dal Zilio, S.; Ingrand, F.; Mallet, A. Model checking real-time properties on the functional layer of autonomous robots. In Int. Conf. on Formal Engineering Methods ICFEM 2016. Springer, Tokyo, Japan, November 14-18, 2016, 383–399.
  41. Hagerman, S.; Andrews, A.; Oakes, S. Security testing of an unmanned aerial vehicle (UAV). In Proc.2016 Cybersecurity Symposium (CYBERSEC). IEEE, Coeur d’Alene, ID, USA,18-20 April 2016, 26–31. [CrossRef]
  42. Abdelsalam, M.; Khalil, K.; Stickley, J.; Salem, A.; Loye, B. Verification of advanced driver assistance systems (ADAS) and autonomous vehicles with hardware emulation-in-the-loop. Int. J. of automotive eng. 2019, 10, 2–197. [Google Scholar] [CrossRef]
  43. Ben Abdessalem, R.; Panichella, A.; Nejati, S.; Briand, L. C. ; Stifter T. 2018. Testing autonomous cars for feature interaction failures using many-objective search. In 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, Montpellier, France, September 3 - 7, 2018,143–154. [CrossRef]
  44. Sieber, C.; Vieira da Silva, L. M.; Grünhagen, K.; Fay, A. . Rule-Based Verification of Autonomous Unmanned Aerial Vehicles. Drones 2024, 8, 1–26. [Google Scholar] [CrossRef]
  45. Yaacoub E; Abualsaud, K. ; Mahmoudm, M. Hybrid Encryption for Securing and Tracking Goods Delivery by Multipurpose Unmanned Aerial Vehicles in Rural Areas Using Cipher Block Chaining and Physical Layer Security. Drones 2024, 8, 3–111. [Google Scholar] [CrossRef]
  46. Ma, J.; Chen, P.; Xiong, X.; Zhang, L.; Yu, S.; Zhang,D. Research on Vision-Based Servoing and Trajectory Prediction Strategy for Capturing Illegal Drones. Drones 2024, 8, 4–127. [Google Scholar] [CrossRef]
  47. Gao, J.; Liu, Q.; Chen, H.; Deng,H. ; Zhang,L.; Sun, L.; Huang, J. Digital Battle: A Three-Layer Distributed Simulation Architecture for Heterogeneous Robot System Collaboration. Drones 2024, 8, 4–156. [Google Scholar] [CrossRef]
  48. Shrestha, A.; Mahmood, A. Review of Deep Learning Algorithms and Architectures. IEEE Access 2019, Shrestha, A., & Mahmood, A. (). Review of Deep Learning Algorithms and Architectures. IEEE Access, 2019, 7, 53040–53065. [CrossRef]
  49. Sun, T.; Cao, J. Research on Machine Vision System Design Based on Deep Learning Neural Network Wireless Comm. and Mobile Comp. 2022, 4, 1–16. [Google Scholar] [CrossRef]
  50. Chai, G.; . Cao, Z.; Liu, W.; Wang, S.; Huang, P.; Zeng, G. Parameter estimation of atmospheric continuous-variable quantum key distribution. Phys. Rev. A 2019, 3, 3–032326. [Google Scholar] [CrossRef]
  51. Allen, C.M.; Givone, D.D. The Allen-Givone Implementation Oriented Algebra. In Computer Science and Multiple-Valued Logic: Theory and Applications; D.C. Rine, Ed.; North Holland: Amsterdam, The Netherlands, 1984. [Google Scholar]
  52. Bykovsky, A.Yu. Heterogeneous network architecture for integration of AI and quantum optics by means of multiple-valued logic. Quantum Rep. 2020, 2, 126–165. [Google Scholar] [CrossRef]
  53. Bykovsky, A. Multiple-Valued Logic Modelling for Agents Controlled via Optical Networks. Appl. Sci. 2022, 3, 1263. [Google Scholar] [CrossRef]
  54. Bykovsky, A.Y.; Vasiliev, N.A. Data Verification in the Agent, Combining Blockchain and Quantum Keys by Means of Multiple-Valued Logic. Appl. Syst.Innov. 2023, 6, 51. [Google Scholar] [CrossRef]
  55. Bruns, G., Godefroid, P.: Model Checking Partial State Spaces with 3-Valued Temporal Logics. In Proc. Computer Aided Verification, 11th International Conference, CAV ‘99, Trento, Italy, July 6-10, 1999, Eds. Halbwachs, N., Peled, D.A. (eds.) CAV 1999. LNCS, vol. 1633, pp. 274–287. Springer, Heidelberg,1999. [CrossRef]
  56. Gurfinkel, A.; Chechik, M. Multi-Valued Model Checking via Classical Model. Lecture Notes in Computer Science 2003, 2761, 17 pages. [CrossRef]
  57. Gurfinkel, A., Chechik, M. (2003). Multi-valued Model Checking via Classical Model Checking. In Proc. CONCUR 2003 - Concurrency Theory. CONCUR 2003. Lecture Notes in Computer Science, Eds. Amadio, R., Lugiez, D., volume 2761. pp.266-280. Springer, Berlin, Heidelberg. [CrossRef]
  58. Zhu, J.; Li, Y. Hesitant Fuzzy Linguistic Aggregation Operators Based on the Hamacher t-norm and t-conorm. Symmetry 2018, 10, 189. [Google Scholar] [CrossRef]
  59. Bykovsky, A.Y.; Vasiliev, N.A. Parametrical T-Gate for Joint Processing of Quantum and Classic Optoelectronic Signals. J –Multidisc.Sci. J, 2023, 6, 384–410.
  60. Bykovsky, A. A Multiple-Valued Logic for Implementing a Random Oracle and the Position-Based Cryptography. J. of Rus. Laser Res. 2019, 40, 173–183. [Google Scholar] [CrossRef]
  61. Russell, S.; Norvig, P. Artificial Intelligence: A Modern Approach; 4th ed.; Hoboken: Pearson, 2021. [Google Scholar]
  62. Sakagami, R.; Lay, F. S.; Dömel, A.; Schuster, M. J.; Albu-Schäffer, A.; Stulp. F. Robotic world models—conceptualization, review, and engineering best practices. Front. Robot. AI, Sec. Robotic Control Systems. 2023, 10, 1253049–24. [Google Scholar] [CrossRef] [PubMed]
  63. Casey, A.; Davidson E.; Poon, M.; Dong, H., Duma, D.; Grivas, Grover, A.C. Su’arez-Paniagua, V.; Tobin, R.; Whiteley, W.; Wu, H.; Alex, B. A Systematic Review of Natural Language Processing Applied to Radiology Reports. arXiv:2102.09553v1 [cs.CL] 18 Feb 2021 (accessed on 12 November 2024). arXiv:2102.09553v1 [cs.
  64. Sun, C.; Sun, P.; Wang, J.; Guo, Y.; Zhao, X. Understanding LiDAR Performance for Autonomous Vehicles Under Snowfall Conditions,” IEEE Trans. on Intel. Transportation Syst., 2024, 25, 11. [Google Scholar] [CrossRef]
  65. Shahraji, M. H.; Larouche, C. Case Study: Rigorous Boresight Alignment of a Marine Mobile LiDAR System Addressing the Specific Demands of Port Infrastructure Monitoring. Marine Geodesy 2022,.1-18. [CrossRef]
  66. Prabadevi, B.; Deepa, N.; Pham, Q.-V.; Nguyen, D.C.; Praveen Kumar Reddy, M.; Thippa Reddy, G.; Pathirana, P.N.; Dobre, O. Toward Blockchain for Edge-of-Things: A New Paradigm, Opportunities, and Future Directions. IEEE Internet Things Mag. 2021, 4, 102–108. [Google Scholar] [CrossRef]
  67. Zhuang, P.; Zamir, T.; Liang, H. Blockchain for Cybersecurity in Smart Grid: A Comprehensive Survey. IEEE Trans. Ind. Inform. 2021, 17, 1–3. [Google Scholar] [CrossRef]
  68. Ankalkoti, P. A Relative Study on Bitcoin Mining. Imperial J. Interdiscip. Res. 2017, 3, 5–1757. [Google Scholar]
  69. Ma, X.; Yuan, X.; Cao, Z.; Qi, B.; Zhang, Z. Quantum random number generation. npj Quantum Inf. 2016, 2, 16021. [Google Scholar] [CrossRef]
  70. Conti, M.; Dragoni, N.; Lesyk, V. A Survey of Man in the Middle Attacks. IEEE Communications Surveys and Tutorials 2016, 18, 3–2027. [Google Scholar] [CrossRef]
  71. Beebe, N.H. The Mathematical-Function Computation Handbook; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar] [CrossRef]
  72. Cyranski, J.F. Measurement theory for physics. Found. Phys. 1979, 9, 641–671. [Google Scholar] [CrossRef]
  73. Hetmański, M. Expert Knowledge: Its Structure, Functions and Limits. Studia Humana 2018, 3, 3–20. [Google Scholar] [CrossRef]
  74. Gua, H. A Mathematical Theory of Language. Int. J. of Contemporary Educat. 2017, 1, 1–11. [Google Scholar] [CrossRef]
  75. Lund, B. D. , Wang, T. Chatting about ChatGPT: How may AI and GPT impactacademia and libraries? Library Hi Tech News, 2023, 40, 3–26. [Google Scholar] [CrossRef]
  76. Antipov, A.L.; Bykovsky, A.Y.; Vasiliev, N.A.; Egorov, A.A. Multiple-valued logic-protected coding for an optical non-quantum communication line. J. Russ. Laser Res. 2006, 27, 492–505. [Google Scholar] [CrossRef]
  77. MCS 51 Microcontrollers Family User’s Manual. https://web.mit.edu/6.115/www/document/8051. (accessed on 12 November 2024).
  78. Gregersen, C. A complete guide to microcontrollers for IoT (July 23 2020). Available online: https://www.nabto.com/iot-microcontroller-guide/ (accessed on 10 November 2024).
  79. Billman. G.E.; Homeostasis: The Underappreciated and Far Too Often Ignored Central Organizing Principle of Physiology. Front. Physiol. Sec. Integrative Physiology, 2020, 11-2020, 12. [Google Scholar] [CrossRef]
  80. Kumar, C. K. Suyambulingom, C. (2012) “Cryptographic of high Security HashFunctions”. Int. J. of Eng. Res. & Techn. (IJERT), 2012, 1, 3–7. [Google Scholar]
  81. Weiwei, Z.; Baoqiang, L.; Xiuyi, L. A Star Pattern Recognition Algorithm Based on the Radial Companion-Circumferential Feature, Mathematical Problems in Engineering, 2022, 1857481, 10 pages. [CrossRef]
  82. Arduino. Availabe online: https://www.arduino.cc. (accessed on 12 November 2024).
  83. Sha, Z.; Li, Z.; Yu, N.; Zhang, Y. DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models. In CCS ‘23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, ACM SIGSAC Conference on Computer and Communications Security, Copenhagen Denmark, November 26 - 30, 2023.; pp. 3418–3432. [CrossRef]
Figure 1. Basic fields of research for civil robotics.
Figure 1. Basic fields of research for civil robotics.
Preprints 140948 g001
Figure 2. Distant MAS and its agents A 1 , A 2 ,… are considered within some scene of actions, containing other robots and MASs, people, animals and objects.
Figure 2. Distant MAS and its agents A 1 , A 2 ,… are considered within some scene of actions, containing other robots and MASs, people, animals and objects.
Preprints 140948 g002
Figure 3. The simplified scheme of AGA-based LL formation, which includes the twice transfer of messages between the agent and network participants of the protocol. The list of possible participants should be formed beforehand and includes agents of the same MAS and partner network nodes.
Figure 3. The simplified scheme of AGA-based LL formation, which includes the twice transfer of messages between the agent and network participants of the protocol. The list of possible participants should be formed beforehand and includes agents of the same MAS and partner network nodes.
Preprints 140948 g003
Figure 4. (a) Complicated version of MVL proposed in contains 6 truth levels with two non-comparable elements in lattice and was proposed for the design of temporal logic and Kripke structures. (b) Simple version of the linear truth levels scale was used in AGA [51], which is more convenient for the description of large-scale models of intellectual agents.
Figure 4. (a) Complicated version of MVL proposed in contains 6 truth levels with two non-comparable elements in lattice and was proposed for the design of temporal logic and Kripke structures. (b) Simple version of the linear truth levels scale was used in AGA [51], which is more convenient for the description of large-scale models of intellectual agents.
Preprints 140948 g004
Figure 5. Data error limitation for the choice of correlated variable x ( l ) . (a) Correct mapping onto the scale of truth levels. (b) Case (b) differs from (a) by the large error value, where each of two groups of data can be classified both as 1 or 2. Incorrect mapping occurs, if the statistical and measurement error   δ exceeds the difference between two neigbour truth levels, i.e.   δ k j k j 1 ,     j = { 2 , , K 1 } .
Figure 5. Data error limitation for the choice of correlated variable x ( l ) . (a) Correct mapping onto the scale of truth levels. (b) Case (b) differs from (a) by the large error value, where each of two groups of data can be classified both as 1 or 2. Incorrect mapping occurs, if the statistical and measurement error   δ exceeds the difference between two neigbour truth levels, i.e.   δ k j k j 1 ,     j = { 2 , , K 1 } .
Preprints 140948 g005
Figure 6. Description of the scene of action by root and sequential chain vocabularies. (a) Mapping of arbitrarily selected root vocabularies V 1,1 L V 1,1 N V 1,1 K , transferring natural language terminology onto scales of natural numbers and logic truth levels; (b) Chain mapping of vocabularies like   V 1,1 L V 2,1 L V 3,1 L … is convenient for the content clarification and formation of structured word phrases. Respectively, every vocabulary V v , m L further has double index for compact matrix notation.
Figure 6. Description of the scene of action by root and sequential chain vocabularies. (a) Mapping of arbitrarily selected root vocabularies V 1,1 L V 1,1 N V 1,1 K , transferring natural language terminology onto scales of natural numbers and logic truth levels; (b) Chain mapping of vocabularies like   V 1,1 L V 2,1 L V 3,1 L … is convenient for the content clarification and formation of structured word phrases. Respectively, every vocabulary V v , m L further has double index for compact matrix notation.
Preprints 140948 g006
Figure 7. The scheme of transitions from natural numbers code to logic truth levels code is necessary for the heterogeneous logic architecture of agent. Equal scales for natural numbers and truth levels make this transition just a formal step.
Figure 7. The scheme of transitions from natural numbers code to logic truth levels code is necessary for the heterogeneous logic architecture of agent. Equal scales for natural numbers and truth levels make this transition just a formal step.
Preprints 140948 g007
Figure 8. (a) Two channels to provide separate access to internal data by more protected AGA truth levels codes and by more simple natural numbers codes. (b) The principle of brief verification of vector components histogram in possessed and needed profiles for root vocabularies V v N   , V v K
Figure 8. (a) Two channels to provide separate access to internal data by more protected AGA truth levels codes and by more simple natural numbers codes. (b) The principle of brief verification of vector components histogram in possessed and needed profiles for root vocabularies V v N   , V v K
Preprints 140948 g008
Figure 9. A highly simplified scheme of a robotic agent supposes the dialog exchange of messages with the distant administrator or other agent via the specialized communication module.
Figure 9. A highly simplified scheme of a robotic agent supposes the dialog exchange of messages with the distant administrator or other agent via the specialized communication module.
Preprints 140948 g009
Figure 10. Principal scheme of dialog messages exchange between Sender (Administrator or Agent) and Addresser (distant Agent). Format of requests and replies corresponds to Table 4.
Figure 10. Principal scheme of dialog messages exchange between Sender (Administrator or Agent) and Addresser (distant Agent). Format of requests and replies corresponds to Table 4.
Preprints 140948 g010
Figure 11. 2D logic diagram displays only events classified by logic constants 5 and 6 for the AGA function given in Table 2 and limited by the criteria C k = 5,6 . Close constants should be preliminary reserved in the natural numbers code to obtain convenient diagrams for close classes of objects.
Figure 11. 2D logic diagram displays only events classified by logic constants 5 and 6 for the AGA function given in Table 2 and limited by the criteria C k = 5,6 . Close constants should be preliminary reserved in the natural numbers code to obtain convenient diagrams for close classes of objects.
Preprints 140948 g011
Figure 12. Two dual-chip modules are necessary to process full-scale dialog phrases, based on the proposed vocabularies structure.
Figure 12. Two dual-chip modules are necessary to process full-scale dialog phrases, based on the proposed vocabularies structure.
Preprints 140948 g012
Table 1. Basic format of the truth table defined in AGA [51].
Table 1. Basic format of the truth table defined in AGA [51].
N r o w Input Input variables Output variable
x 1 x 2 x 3 x 4 x n F ( x 1 , , x n )
0 0 0 0 0 0 F ( 0 , , 0 )
1 1 0 0 0 0 F ( 1 , , 0 )
K n 1 K-1 K-1 K-1 K-1 K-1 F ( K 1 , , K 1 )
Table 2. Basic formal parameters for the description of the scene of action.
Table 2. Basic formal parameters for the description of the scene of action.
Notation Definition
K Finite   set   of   truth   levels   K   is   defined   in   AGA   [ x ] ,   where   k = { 0 ,   1 ,   2 ,   ,   K 1 } ,   K N , N – is the set of natural numbers. Only finite sets are intended for basic logic AGA modelling and the mapping of words vocabularies.
V N Finite   subset   v N of   the   set   of   natural   numbers ,   v N = { 1,2 , . , K } , V N N .   It is intended for auxilliary representation and mapping of words vocabularies.
V L The finite set (or the vocabulary) of all selected different robotiс terms, given by words and word collocations of natural language. It describes the scene of action, robotic tasks, mathematical and verification procedures.
V v K Modelling of the scene of action uses v subsets of truth levels,   v = 1 , , K , obtained by arbitrarily chosen bijective mapping V N K , i.e. onto the scale of truth levels k = 0,1 , , K defined in AGA.
V v N Subsets   V v N   of   vocabulary   V N are   obtained   by   arbitrarily   chosen   mapping   of   V L V N ,   i . e .   onto   the   scale   of   natural   numbers   n N = { 1,2 , , K } ,   where   the   set   V N consists   of   v subsets   V v N V N , v = 1 , , K ;
V v L Subset   V v L   of   the   vocabulary   V L   determines   one   of   v   given   classes   of   robotic   terms ,   containing   only   different   elements , V v L V L ,   v = 1 ,   , V ,   V K , where K - the maximal number of truth levels. In majority of tasks convenient classes of robotic terms correspond to classes of words (noun, verb, adverbial modifiers of place, time etc.)
w v L Element   of   a   subset   ( or   vocabulary )   V v L   can be given by a word or word collocation, representing in natural language some robotic term.
w v N Mapping   of   w v L onto   the   subset   of   natural   numbers   V N , providing number code representation of a robotic term.
w v K Mapping   of   w v L onto   the   set   K , providing equivalent logic representation of a robotic term.
W z Word   phrase   is   a   vector   W z = ( w 1 ,   w 2 ,   ,   w Z ) with   declared   fixed   position   of   elements   according   to   their   numbers   v = { 1 , . . , Z } ,   Z   V K .   Word   phrase   is   a   sampling   of   only   one   word   from   the   next   vocabulary .   For   various   types   of   procession   it   can   be   written   by   elements   w v L   , w v N ,   w v K   of   subsets   V v L ,   V v N ,   V v K . Note that the list of selected vocabularies and message format can differ for various classes of tasks.
Table 3. The structure of vocabularies V v , m L initially given in natural language is described as a matrix K x M , where K is the initially defined maximal number of truth levels in AGA.
Table 3. The structure of vocabularies V v , m L initially given in natural language is described as a matrix K x M , where K is the initially defined maximal number of truth levels in AGA.
N Name of Vocabulary Content Class of Word In Natural Language Natural Language Representation(Maximal number of words - K)
1 V 1,1 L Initiation of dialog and format of message Cardinal Number { one ,   two ,   ,   K }
2 V 1,2 L Fixed parole Cardinal Number { one ,   two ,   ,   K }
3 V 1,3 L Hash value Cardinal Number { one ,   two ,   ,   K }
4 V 1,4 L Addresser of message Noun {administrator, robot of MAS, external robot, man, vehicle, unidentified object}
5 V 1,5 L Sender of message Noun {administrator, robot of MAS, external robot, man, vehicle, unidentified object}
6 V 1,6 L Relative time of sending Cardinal Number { one ,   two ,   ,   K }
7 V 1,7 L Time of action Adverbial modifier of time {Immediately, now, near future, in an hour, at the specified time…}
8 V 1,8 L Action/ Task Verb {verify, measure, read, write, move to, upload, download, plugs/connectors check, software check, circuit board test, coating check, mechanics check, …}
9 V 1,9 L Object of action Noun {admin, addresser, robot of MAS, external robot, man, house, technical construction, vehicle, road, tree, animal, pit, vocabulary, unidentified object,…}
10 V 1,10 L Number of object of action Cardinal Number { one ,   two ,   ,   K }
11 V 1,11 L Place of action/ objects of action Noun, Adverbial modifier of place { robot, external object, vehicle, internal module, …}
12 V 1,12 L Reference object for relative coordinates Noun {robot of MAS, external robot, man, house, technical construction, vehicle, road, tree, bush, animal, pit, stone, …}
13 V 1,13 L Place of action/ coordinate x Cardinal Number {   GPS   coordinate   x ,   relative   coordinate   one ,   two ,   ,   K }
14 V 1,14 L Place of action/ coordinate y Cardinal Number { one ,   two ,   ,   K }
15 V 1,15 L Linked List Cardinal Number { one ,   two ,   , K }
16 V 1,16 L Natural number code Cardinal Number { one ,   two ,   ,   K }
17 V 1,17 L Truth level code Cardinal Number { one ,   two ,   ,   K }
18
M V 1 , M L
V 2,1 L Format of message Cardinal Number { one ,   two ,   ,   K }
V 2,2 L Fixed parole Cardinal Number { one ,   two ,   ,   K }
V 2,3 L Addresser of message Noun {administrator, robot of MAS, external robot, man, vehicle, unidentified object}
2M V 2 , M L
KxM V K , M L
Table 4. The equivalence of words in vocabularies V v , m L , V v , m N   , and V v , m K   .
Table 4. The equivalence of words in vocabularies V v , m L , V v , m N   , and V v , m K   .
N Natural language Vocabulary Natural numbers code of Vocabulary Truth levels code of Vocabulary Content
1 V 1,1 L V 1,1 N V 1,1 K Format of message
w 1,1 , 1 L w 1,1 , 1 N w 1,1 , 1 K ”SOS”
w 1,1 , 2 L w 1,1 , 2 N w 1,1 , 2 K ”Hi, read 2parts message”; Initiation of the new phrase
w 1,1 , 3 L w 1,1 , 3 N w 1,1 ,   3 K ”Hi, read 3parts message”;
w 1,1 , 7 L w 1,1 , 7 N w 1,1 ,   7 K “ Ready to continue”
2 V 1,2 L V 1,2 N V 1,2 K Fixed parole
... ... ... ... ...
KxM V K , M L V K , M N V K , M K Content given by expert
Table 5. Word phrase W K is to be written by the header and several content parts in the logic code, and formed by words taken from some sampling K ` of all defined K x M vocabularies. Notation w v , m K indicates a word with arbitrarily given indexes v , m , chosen by expert or decision maker from some V v , m K .
Table 5. Word phrase W K is to be written by the header and several content parts in the logic code, and formed by words taken from some sampling K ` of all defined K x M vocabularies. Notation w v , m K indicates a word with arbitrarily given indexes v , m , chosen by expert or decision maker from some V v , m K .
1st 8-byte part- header
Variable x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8
Name Initiation of dialog /Format, w 1,1 Fixed parole, w 1,2 Addres-ser name 1, w 1,4 Addres-ser name 2, w 2,4 Addres-ser name 3, w 3,4 Sender name 1, w 1,5 Sendername 2, w 2,5 Sendername 3, w 3,5
Vocabulary (in Table 3) V 1,1 K V 1,2 K V 1 , 4 K V 2 , 4 K V 3 , 4 K V 1,5 K V 2,5 K V 3,5 K
2d 8-byte part- content
Variable x 9 x 10 x 11 x 12 x 13 x 14 x 15 x 16
Name Assigned hash, w 1,3 Arbitra-ry word, w v , m Arbitra-ry word, w v , m Arbitra-ry word, w v , m Arbitra-ry word,   w v , m Total check coefficient of all previous parts and the current one, C K or C N / K
Vocabulary V 1,3 K     V v , m K V v , m K   V v , m K V v , m K V 1,17 K
(KxM-4)/2 th 8-byte part- content
Variable x K 8 x K 7 x K 2 x K 1 x K
Name Assigned hash, w 1,3 Arbitra-ry word, w v , m Arbitra-ry word, w v , m Arbitra-ry word, w v , m Arbitra-ry word, w v , m Total check coefficient of all previous parts and the current one ,     C K or C N / K
Vocabulary V 1,3 K V v , m K V v , m K V v , m K V v , m K V 1,17 K
Table 6. The example of the model phrase to clarify questionable codes of two words w v , m K in actual vocabulary V v , m K . Correct phrase consists of the header and content.
Table 6. The example of the model phrase to clarify questionable codes of two words w v , m K in actual vocabulary V v , m K . Correct phrase consists of the header and content.
Header: w 1,1 K w 1,2 K w 1,4 K w 2,4 K w 3,4 K w 1,5 K w 2,5 K w 3,5 K
Mapping to natur. numbers code Hi= 2 Fixed parole of adresser=131 Addres-ser name1= 0 Addres-ser name2= 0 Addres-ser name3=3 Sender name1= 0 Sender name2=0 Sender name3= 2
Content part 1: w 1,3 K w 1,8 w 1,9 w 2,9 w 3,9 w 1,15 w 1,3 C N / K =∑ w v , m
Mapping to natur. numbers code Assigned hash value =209 Action=ShowK-Code for word in V v , m N =196 Num-ber of object= v= 3 Num-ber of object= m= 12 Num-ber of object= w v , m N = 6 Questionable code name w v , m K = 221 Hash for access to vocabularies group, including V v , m K =147 138+ 209+196+3+12+6+221+147 =932 (overflow: >255); 932-3x255=167
Table 7. a) The base version of AGA linked list and its truth table is defined by function   h ( m , 1 ) = F l d g ( m , t , e m , e m 1 , h m , h m 1 ) . b) Proposed shortened version of LL for documenting of task parameters, transmitted by phrases, consisting of g parts and containing only check coefficients C 1 , m 1 K , h e a d e r , C 2 , m 1 K , c o n t e n t , . ,   C g , m 1 K , t o t a l . Quasi random hash values h 1 ( 1,1 ) ,   , h 1 ( m , 1 ) approve corresponding entries.
Table 7. a) The base version of AGA linked list and its truth table is defined by function   h ( m , 1 ) = F l d g ( m , t , e m , e m 1 , h m , h m 1 ) . b) Proposed shortened version of LL for documenting of task parameters, transmitted by phrases, consisting of g parts and containing only check coefficients C 1 , m 1 K , h e a d e r , C 2 , m 1 K , c o n t e n t , . ,   C g , m 1 K , t o t a l . Quasi random hash values h 1 ( 1,1 ) ,   , h 1 ( m , 1 ) approve corresponding entries.
a) Number of input variables: 2×(1+p+q), p-number of words in entry, q- maximal number of verifying participants
Input variables Output variable
Common counters Previous Entry (8 bytes) Verifying hash Last Entry (8 bytes) Verifying hash Output hash
m t e 1 , t 1 e p , t 1 h 1 , t 1 h q , t 1 e 1 , t e p , t h 1 , t h q , t h ( m , 1 )
1 t 1 e 1,0 e p , 0 h 1 , 0 h 1 , 0 e 1,1 e p , 1 h 1 , 1 h Q , 1 h 1 ( 1,1 )
m-1 t m 1 e 1 , m 2 e p , m 2 h 1 , m 2 h Q , m 2 e 1 , m 1 e p , m 1 h 1 , m 1 h Q , m 1 h 1 ( m 1,1 )
m t m e 1 , m 1 e p , m 1 h 1 , m 1 h Q , m 1 e 1 , m e p , m h 1 , m h Q , m h 1 ( m , 1 )
b) Number of input variables: 2×(2+g), g-number of parts in the phrase, q- maximal number of verifying participants.
Common counters Previous Entry (8 bytes) Verifying hash Last Entry (8 bytes) Verifying hash Output hash
Input variables Output variable
m t C 1 , m 1 K , h e a d C 2 , m 1 K , c o n t C g , m 1 K , t o t a l h i , m 1 C 1 , m K , h e a d C 2 , m K , c o n t C g , m K , t o t a l h i , m h ( m , 1 )
1 t 1 C 1,1 C 2,1 C g , 1 h 1 , 1 C 1,2 C 2,2 C g , 2 h 1 , 2 h 1 ( 1,1 )
m-1 t m 1 C 1 , m 2 C 1 , m 2 C g , m 2 h m 1 , m 2 C 1 , m 1 C 1 , m 1 C g , m 1 h m 1 , m 1 h 1 ( m 1,1 )
m t m C 1 , m 1 C 2 , m 1 C g , m 1 h m , m 1 C 1 , m C 2 , m C g , m h m , m h 1 ( m , 1 )
Table 8. Example of FMF F x 3 , x 4 , formed by striking out unnecessary variables in the holistic truth table. Mapping function is F x 1 , , x 5 , mapped one is F ( x 3 , x 4 ) , restriction is C k = 5,6 .   .
Table 8. Example of FMF F x 3 , x 4 , formed by striking out unnecessary variables in the holistic truth table. Mapping function is F x 1 , , x 5 , mapped one is F ( x 3 , x 4 ) , restriction is C k = 5,6 .   .
Preprints 140948 i001
Table 11. SRAM buffer structure for received phrases 8-byte parts in the 2d dual-chip module. It can contain 30 written parts, obtained from the receiving module. #LB provides up to 256 possible code numbers for various words in a vocabulary.
Table 11. SRAM buffer structure for received phrases 8-byte parts in the 2d dual-chip module. It can contain 30 written parts, obtained from the receiving module. #LB provides up to 256 possible code numbers for various words in a vocabulary.
Received data buffer Reserve for intermediatecalculations
N Part 1 Part 2 Part 30 Results 1 Results 2
#A18 –A16: #000b 000b 000b 000b 000b
#SB (A15-A8): #111b #111b #111b #111b #111b
#LB: #0-7 #8-15 #233-239 #240-247 #248-255
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated