SlideShare uma empresa Scribd logo
1 de 14
ARCADE - Abstraction and Realization of  Complex Event Scenarios Using Dynamic Rule Creation Ashish A Kulkarni [email_address]
Motivation
The Industry Scenarios Scenario 1: Measurement value from equipment goes beyond the threshold. Scenario 2: Measurement values from multiple equipment exceed their respective thresholds. Scenario 3: At a given instant of time, 'n' out of 'm' equipment in a group are above their respective threshold values for certain period of time. Scenario 4: The case of equipment going down: Absence of data for a certain period of time. Scenario 5: Case of frozen equipment: In a realistic scenario, it is expected to have white noise around mean data points. Non existence of it or in other words a flat curve of values from equipment should raise an alarm. Scenario 6: Case of bad equipment: The data values not meeting the expected quality is an indicator of the equipment going bad. Scenario 7: The rate of rise or fall of data points over a period of time is higher than expected.
Challenge – Bridging the IT-Business Gap IT Developer Business User
Where existing CEP tools lag Require too much work Can’t be used by Business users
What we observed ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Solution
Reusable Complex Event Templates ,[object Object],[object Object]
Industry Scenarios redefined ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dynamic Realization of templates Measurement value M1 from equipment E1 goes beyond the threshold T1 Measurement value ‘ temperature ’ from an equipment ‘ temperatureTransmitter ’ goes beyond the threshold ‘ 100 ’  Measurement value ‘ pH ’ from an equipment ‘ waterAcidity ’ goes beyond the threshold ‘ 6.5 ’
As-is vs Modified The as-is approach to realizing business event had a lot of IT dependence, was time consuming and tedious  The notion of complex event templates and instances significantly limits the IT intervention, simplifies business event realization and allows their dynamic life cycle management
Lifecycle Create Update Delete Read Activate Deactivate
Measurement Publication - Subscription
 

Mais conteúdo relacionado

Destaque

Light Intro to the Gene Ontology
Light Intro to the Gene OntologyLight Intro to the Gene Ontology
Light Intro to the Gene Ontologynniiicc
 
ADM 316 Workshop 4 Slides
ADM 316 Workshop 4 SlidesADM 316 Workshop 4 Slides
ADM 316 Workshop 4 SlidesRuss Ray
 
COM 115 Workshop 3 Slides
COM 115 Workshop 3 SlidesCOM 115 Workshop 3 Slides
COM 115 Workshop 3 SlidesRuss Ray
 
COM 115 Workshop 2 Slides
COM 115 Workshop 2 SlidesCOM 115 Workshop 2 Slides
COM 115 Workshop 2 SlidesRuss Ray
 
Wikipedia - Community Deep Dive
Wikipedia - Community Deep DiveWikipedia - Community Deep Dive
Wikipedia - Community Deep DiveCathy Ma
 
IPC Media - Facebook Developers Garage
IPC Media - Facebook Developers GarageIPC Media - Facebook Developers Garage
IPC Media - Facebook Developers GarageCathy Ma
 
Query recommendation papers
Query recommendation papersQuery recommendation papers
Query recommendation papersAshish Kulkarni
 
COM 115 Workshop 1 Slides
COM 115 Workshop 1 SlidesCOM 115 Workshop 1 Slides
COM 115 Workshop 1 SlidesRuss Ray
 
Product camp
Product campProduct camp
Product campCathy Ma
 
Learning to Link with Wikipedia
Learning to Link with WikipediaLearning to Link with Wikipedia
Learning to Link with WikipediaAshish Kulkarni
 

Destaque (17)

Light Intro to the Gene Ontology
Light Intro to the Gene OntologyLight Intro to the Gene Ontology
Light Intro to the Gene Ontology
 
ADM 316 Workshop 4 Slides
ADM 316 Workshop 4 SlidesADM 316 Workshop 4 Slides
ADM 316 Workshop 4 Slides
 
User experience design
User experience designUser experience design
User experience design
 
COM 115 Workshop 3 Slides
COM 115 Workshop 3 SlidesCOM 115 Workshop 3 Slides
COM 115 Workshop 3 Slides
 
COM 115 Workshop 2 Slides
COM 115 Workshop 2 SlidesCOM 115 Workshop 2 Slides
COM 115 Workshop 2 Slides
 
Wikipedia - Community Deep Dive
Wikipedia - Community Deep DiveWikipedia - Community Deep Dive
Wikipedia - Community Deep Dive
 
tour
tourtour
tour
 
User experience design
User experience designUser experience design
User experience design
 
IPC Media - Facebook Developers Garage
IPC Media - Facebook Developers GarageIPC Media - Facebook Developers Garage
IPC Media - Facebook Developers Garage
 
Query recommendation papers
Query recommendation papersQuery recommendation papers
Query recommendation papers
 
COM 115 Workshop 1 Slides
COM 115 Workshop 1 SlidesCOM 115 Workshop 1 Slides
COM 115 Workshop 1 Slides
 
Product camp
Product campProduct camp
Product camp
 
Learning to Link with Wikipedia
Learning to Link with WikipediaLearning to Link with Wikipedia
Learning to Link with Wikipedia
 
Big data
Big dataBig data
Big data
 
Personal Brand
Personal BrandPersonal Brand
Personal Brand
 
Introduction to Docker
Introduction to DockerIntroduction to Docker
Introduction to Docker
 
Decision tables
Decision tablesDecision tables
Decision tables
 

Semelhante a Debs2011 ARCADE

Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Ronald Bartels
 
Lecture 3 Statistical ProcessControl (SPC).docx
Lecture 3 Statistical ProcessControl (SPC).docxLecture 3 Statistical ProcessControl (SPC).docx
Lecture 3 Statistical ProcessControl (SPC).docxsmile790243
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recoveryJohn Brouillard
 
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxThreat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxherthalearmont
 
DS Crisis Management Foundation - Lifecycle
DS Crisis Management Foundation - LifecycleDS Crisis Management Foundation - Lifecycle
DS Crisis Management Foundation - LifecycleDS
 
Risk Assessment documentation templates are located within this se.docx
Risk Assessment documentation templates are located within this se.docxRisk Assessment documentation templates are located within this se.docx
Risk Assessment documentation templates are located within this se.docxSUBHI7
 
Discrete Event Simulation in Healthcare
Discrete Event Simulation in HealthcareDiscrete Event Simulation in Healthcare
Discrete Event Simulation in HealthcareATALAN
 
Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...oxwocs
 
4 Questions only Question 6. I have answered part of the.docx
4 Questions only Question 6.     I have answered part of the.docx4 Questions only Question 6.     I have answered part of the.docx
4 Questions only Question 6. I have answered part of the.docxtamicawaysmith
 
Business Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docxBusiness Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docxRAHUL126667
 
Digital Transformation and Process Optimization in Manufacturing
Digital Transformation and Process Optimization in ManufacturingDigital Transformation and Process Optimization in Manufacturing
Digital Transformation and Process Optimization in ManufacturingBigML, Inc
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...Splunk
 
A Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software DefectsA Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software DefectsChetan Hireholi
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationISA Boston Section
 
Estimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative StudyEstimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative StudyIJERA Editor
 
Moe wynn caise13 presentation
Moe wynn   caise13 presentationMoe wynn   caise13 presentation
Moe wynn caise13 presentationcaise2013vlc
 

Semelhante a Debs2011 ARCADE (20)

Dcca study guide
Dcca study guideDcca study guide
Dcca study guide
 
Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Problem management foundation - Lifecycle
Problem management foundation - Lifecycle
 
Lecture 3 Statistical ProcessControl (SPC).docx
Lecture 3 Statistical ProcessControl (SPC).docxLecture 3 Statistical ProcessControl (SPC).docx
Lecture 3 Statistical ProcessControl (SPC).docx
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recovery
 
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxThreat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
 
DS Crisis Management Foundation - Lifecycle
DS Crisis Management Foundation - LifecycleDS Crisis Management Foundation - Lifecycle
DS Crisis Management Foundation - Lifecycle
 
Risk Assessment documentation templates are located within this se.docx
Risk Assessment documentation templates are located within this se.docxRisk Assessment documentation templates are located within this se.docx
Risk Assessment documentation templates are located within this se.docx
 
Discrete Event Simulation in Healthcare
Discrete Event Simulation in HealthcareDiscrete Event Simulation in Healthcare
Discrete Event Simulation in Healthcare
 
Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...
 
4 Questions only Question 6. I have answered part of the.docx
4 Questions only Question 6.     I have answered part of the.docx4 Questions only Question 6.     I have answered part of the.docx
4 Questions only Question 6. I have answered part of the.docx
 
Business Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docxBusiness Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docx
 
Digital Transformation and Process Optimization in Manufacturing
Digital Transformation and Process Optimization in ManufacturingDigital Transformation and Process Optimization in Manufacturing
Digital Transformation and Process Optimization in Manufacturing
 
Smart Alarming Management
Smart Alarming ManagementSmart Alarming Management
Smart Alarming Management
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 
A Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software DefectsA Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software Defects
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 
Theories of Accident Causation
Theories of Accident Causation Theories of Accident Causation
Theories of Accident Causation
 
Estimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative StudyEstimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative Study
 
Moe wynn caise13 presentation
Moe wynn   caise13 presentationMoe wynn   caise13 presentation
Moe wynn caise13 presentation
 

Último

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Debs2011 ARCADE

  • 1. ARCADE - Abstraction and Realization of Complex Event Scenarios Using Dynamic Rule Creation Ashish A Kulkarni [email_address]
  • 3. The Industry Scenarios Scenario 1: Measurement value from equipment goes beyond the threshold. Scenario 2: Measurement values from multiple equipment exceed their respective thresholds. Scenario 3: At a given instant of time, 'n' out of 'm' equipment in a group are above their respective threshold values for certain period of time. Scenario 4: The case of equipment going down: Absence of data for a certain period of time. Scenario 5: Case of frozen equipment: In a realistic scenario, it is expected to have white noise around mean data points. Non existence of it or in other words a flat curve of values from equipment should raise an alarm. Scenario 6: Case of bad equipment: The data values not meeting the expected quality is an indicator of the equipment going bad. Scenario 7: The rate of rise or fall of data points over a period of time is higher than expected.
  • 4. Challenge – Bridging the IT-Business Gap IT Developer Business User
  • 5. Where existing CEP tools lag Require too much work Can’t be used by Business users
  • 6.
  • 8.
  • 9.
  • 10. Dynamic Realization of templates Measurement value M1 from equipment E1 goes beyond the threshold T1 Measurement value ‘ temperature ’ from an equipment ‘ temperatureTransmitter ’ goes beyond the threshold ‘ 100 ’ Measurement value ‘ pH ’ from an equipment ‘ waterAcidity ’ goes beyond the threshold ‘ 6.5 ’
  • 11. As-is vs Modified The as-is approach to realizing business event had a lot of IT dependence, was time consuming and tedious The notion of complex event templates and instances significantly limits the IT intervention, simplifies business event realization and allows their dynamic life cycle management
  • 12. Lifecycle Create Update Delete Read Activate Deactivate
  • 14.  

Notas do Editor

  1. The chemical and petroleum industry is facing a lot of challenges that are economical, environmental, and technical or operations related. There is overwhelming amounts of complex data from instrumented equipment. Need for near real time collaborative decision making, production costs, integrated operations, improved asset management are some of the main focus areas in this industry. RFID and sensors help in gathering various data points from the equipment. Continuous monitoring of this equipment for performance, and downtime is critical from operations perspective. This involves continuously monitoring the three phase flow of sediments (water, oil and gas) retrieved from reservoirs, calculation of gas to oil ratio (GOR) and comparing the well potential with actual output, detection of wells that are not performing properly, computing flow rates at multiple choke valves, identifying unacceptable drift during well performance monitoring. Water is increasingly becoming a scarce resource with no substitute. It is ridden with many issues mainly concerning ineffective usage, manual quality and quantity readings and close linkage with energy and carbon management as pumping water consumes power and generates greenhouse gases. In the water treatment facilities of the future, it will be imperative to apply advanced analytics to water quality in real time. Water quality analyzers collect many instrumented parameters like turbidity, conductivity, pH, chlorine residual, pressure, temperature, ammonia, oxidation -reduction potential and total organic carbon. It is desirable to monitor the pH variance for example and detect as it goes beyond acceptable thresholds. The input to such a system can even come from or the output can go to advanced analytics system, or to enterprise asset management systems, or real time control systems.
  2. In the world of integrated operations, there is also a strong driver to bridge the gap between business and IT. The business would like to continuously monitor their business operations, and be able to change what they are looking at with minimal or no intervention from their IT. They want to be able to do this at real time. It is like looking through the kaleidoscope at the different patterns by varying the mirror angle. Of course it is not always a pretty picture that the patterns show. Sometimes the patterns reveal interesting trends that might help the business to cross-sell especially true of product sales, retail, supply-chain and similar businesses. At other times, the event patterns disclose potentially harmful trends, faulty equipment or an equipment about to go down. And at yet other times, they aid in identifying frauds or their likelihood. By observing these events, the business can control its inventory, change its manufacturing process, raise an asset maintenance order, alert key stake holders or take other appropriate action. The ability to control and vary what they are looking at not only saves them IT services cost but lets them take immediate advantage of business opportunities and react to impending breakdowns and failures. In the complex event scenarios that we identified above, we observed that the business was often interested in varying certain facets of the complex event scenario definition. Some wanted to monitor the pH of water against a threshold of 6.8 while others wanted to monitor it for a lesser threshold. Some wanted a level 1 alert on the temperature of a transmitter reaching certain value 1, a level 2 alert on the temperature breaching value 2 and be able to vary these thresholds on temporal and need basis.
  3. A complex event definition is composed of a set of input events and a set of rules. The input event comes from an Event Source . If we look back at the business event scenario 1 that we identified, the measurement M1 from equipment E1 is the input event; equipment being the event source. The rule is to check if the measurement value exceeds the threshold. Similarly we can identify the measurements and rules for the other business event scenarios. Alternately we can also say that the scenario parameters are of two types- Measurement type and Rule type. This distinction is quite useful. This enables us to define a publication – subscription architecture for the measurement type parameters. When a new complex event instance is created and activated, we subscribe to the scenario parameter instances of the measurement type parameters. There is a corresponding publish model around the event source as well. Whenever the event source generates a measurement value, it is published for all the subscribing complex event instances to receive and act on it. There is also an intermediate step of Event Adaptation . Event adaptation involves creation of an event from the measurement value in a format expected by the underlying CEP runtime engine The other important blocks in the figure are the Event Information Management Services that map to the CRUD operations around the complex event templates and instances. The Query Services allow querying for the complex event templates, instances, scenario parameters, parameter instances and other artifacts. Event Orchestration Services map to the CEP tooling for creating complex event templates, and the Notification Services enable notification when a complex event is detected. There is an adaptation before the Event Sink to transform the complex event in a format expected by the sink. Event sink is a consumer of the business event. The Event Repository maps to the persistent store that we discussed. Together with the Event Topic/Channel Registry it helps in maintaining the measurement subscriptions. The subscriptions are live as long as there is at least one complex event instance receiving events through that subscription. When all the instances subscribing to a measurement are deactivated, the subscription is no longer needed and can be removed.