SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
SMART SEMANTIC MIDDLEWARE FOR THE INTERNET OF
                        THINGS


       Artem Katasonov, Olena Kaykova, Oleksiy Khriyenko, Sergiy Nikitin and Vagan Terziyan
                           Agora Center, University of Jyv¨ skyl¨ , P.O.Box 35, 40014, Finland
                                                          a     a
                       akataso@jyu.fi, helen@jyu.fi, olkhriye@jyu.fi, senikiti@jyu.fi, vagan@jyu.fi




Keywords:     Internet of Things, Middleware, Interoperability, Heterogeneous Resources, Software Agents, Semantic Tech-
              nologies, Ontologies

Abstract:     As ubiquitous systems become increasingly complex, traditional solutions to manage and control them reach
              their limits and pose a need for self-manageability. Also, heterogeneity of the ubiquitous components, stan-
              dards, data formats, etc, creates significant obstacles for interoperability in such complex systems. The promis-
              ing technologies to tackle these problems are the Semantic technologies, for interoperability, and the Agent
              technologies for management of complex systems. This paper describes our vision of a middleware for the
              Internet of Things, which will allow creation of self-managed complex systems, in particular industrial ones,
              consisting of distributed and heterogeneous components of different nature. We also present an analysis of
              issues to be resolved to realize such a middleware.



1 Introduction                                                   plexity, and thus to design the system. The IBM
                                                                 vision of autonomic computing (Kephart and Chess,
                                                                 2003) proclaims the need for computing systems ca-
    Recent advances in networking, sensor and RFID               pable of ”running themselves” with minimal human
technologies allow connecting various physical world             management which is mainly limited to definition of
objects to the IT infrastructure, which could, ulti-             some higher-level policies rather than direct admin-
mately, enable realization of the Internet of Things             istration. The computing systems will therefore be
and the Ubiquitous Computing visions. Also, this                 self-managed, which, according to the IBM vision,
opens new horizons for industrial automation, i.e. au-           includes self-configuration, self-optimization, self-
tomated monitoring, control, maintenance planning,               protection, and self-healing. The IBM vision empha-
etc, of industrial resources and processes. A much               sizes that the run-time self-manageability of a com-
larger than in present number of resources (machines,            plex system requires its components to be to a cer-
infrastructure elements, materials, products) can get            tain degree autonomous themselves. Following this,
connected to the IT systems, thus be monitored and               we envision that the software agent technologies will
potentially controlled. Such development will also               play an important part in building such complex sys-
necessarily create demand for a much wider integra-              tems. Agent-based approach to software engineering
tion with various external resources, such as data stor-         is considered to be facilitating the design of complex
ages, information services, and algorithms, which can            systems (Jennings, 2001). A significant attention is
be found in other units of the same organization, in             paid in the field of multi-agent systems to the task of
other organizations, or on the Internet.                         building decentralized systems capable of supporting
    The interconnectivity of computing and physical              spontaneous configuration, tolerating partial failures,
systems could, however, become ”the nightmare of                 or arranging adaptive reorganization of the whole sys-
ubiquitous computing” (Kephart and Chess, 2003)                  tem (Mamei and Zambonelli, 2006).
in which human operators will be unable to manage
the complexity of interactions in the system, neither               A major problem is inherent heterogeneity in
even architects will be able to anticipate that com-             ubiquitous computing systems, with respect to the na-
ture of components, standards, data formats, proto-      of the ARTEMIS European Technology Platform.
cols, etc, which creates significant obstacles for in-    ARTEMIS’ SRA has ”Seamless Connectivity and
teroperability among the components. Semantic tech-      Middleware” as one of its three parts. Some of
nologies are viewed today as a key technology to re-     the relevant research priorities listed are the middle-
solve the problems of interoperability and integration   ware as the key enabler for declarative programming
within heterogeneous world of ubiquitously intercon-     paradigm, where the components and their interac-
nected objects and systems. Semantic technologies        tion are defined and configured declaratively rather
are claimed to be a qualitatively stronger approach to   than programmatically (and we believe that the se-
interoperability than contemporary standards-based       mantic technologies are a natural candidate here), ef-
approaches (Lassila, 2005). The Internet of Things       ficiently bridging information between global, enter-
should become in fact the Semantic Web of Things         prise, and embedded systems, use of ontologies for
(Brock and Schuster, 2006). We subscribe to this         cross-domain systems’ organization and for interop-
view. Moreover, we apply semantic technologies not       erability in heterogeneous environments, dynamic re-
only to facilitate the discovery of heterogeneous com-   configuration capabilities, adaptive resource manage-
ponents and data integration, but also for the behav-    ment, and appropriate security infrastructures.
ioral control and coordination of those components           In this paper, we describe our vision of such a
(i.e. prescriptive specification of the expected be-      middleware for the Internet of Things, which has also
haviour, declarative semantic programming).              formed the basis for our research project UBIWARE.
    It seems to be generally recognized that achiev-     The project aims at a new generation middleware plat-
ing the interoperability by imposing some rigid stan-    form which will allow creation of self-managed com-
dards and making everyone comply could not be a          plex systems, in particular industrial ones, consist-
case in ubiquitous environments. Therefore, the in-      ing of distributed, heterogeneous, shared and reusable
teroperability requires existence of some middleware     components of different nature, e.g. smart machines
to act as the glue joining heterogeneous components      and devices, sensors, RFIDs, web-services, software
together. A consistent set of middleware, offering       applications, humans along with their interfaces, and
application programming interfaces, communications       others. Such middleware will enable various compo-
and other services to applications, will simplify the    nents to automatically discover each other and to con-
creation of applications and help to move from static    figure a system with complex functionality based on
programming approaches towards a configurable and         the atomic functionalities of the components.
dynamic composition capability (Buckley, 2006).              The rest of the paper is structured as follows. Sec-
    There are a couple of EU FP6 research projects       tion 2 describes our general vision. Section 3 presents
that have as one of their goals the develop-             an analysis of how the goals of UBIWARE can be
ment of some middleware for embedded systems.            achieved. The result is a set of sub-problems, which
They are RUNES (Reconfigurable Ubiquitous Net-            we address in corresponding work-packages of the
worked Embedded Systems, 2004-2007) and ongo-            project. Section 4 describes several industrial cases
ing SOCRADES (Service-Oriented Cross-Layer In-           (application areas) that we consider in the project;
frastructure for Distributed Smart Embedded Devices,     those are proposed by the project’s industrial partners.
2006-2009). We believe, however, that the middle-        Finally, Section 5 concludes the paper.
ware needs of the Internet of Things domain go well
beyond interconnectivity of embedded systems them-
selves. There is a more general need for middle-         2 The General Vision
ware to enable something we refer to as Global Enter-
prise Resource Integration (GERI), where all different       This section describes our general vision of the
types of resources get seamlessly integrated: physi-     smart semantic middleware for the Internet of Things.
cal devices with embedded electronics, web services,     We believe that tasks of automatic integration, orches-
software applications, humans along with their inter-    tration and composition of complex systems on the
faces, and other. In the concept of GERI, we also        Internet of Things will be impossible in a central-
stress the need for true global interoperability, not    ized manner due to the scalability and other issues.
just interconnectivity. The components of ubiquitous     Therefore, the components of such systems should
computing systems should be able not only to com-        be to a certain degree autonomous and proactive. In
municate and exchange data, but also to flexibly co-      other words, utilization of the agent technologies is
ordinate with each other, discover and use each other,   needed to enable flexible communication and coordi-
and jointly engage in different business processes.      nation of the components. Agent technologies also al-
    Such more general middleware needs are em-           low mobility of service components between various
phasized in the Strategic Research Agenda (SRA)          platforms, decentralized service discovery, utilization
Figure 1: The conceptual architecture: resources, adapters, agents and ontology

of FIPA communication protocols, and negotiation-              across multiple domains (a well-known advantage).
based integration/composition of services. Interoper-          Second, they are used for behavioural control and co-
ability among the components requires use of meta-             ordination of the agents representing those resources
data and ontologies. As the amount of components               (a novel use). Therefore, semantic technologies are
can grow dramatically, without their ontological clas-         used both for descriptive specification of the services
sification and semantic annotation processes, the au-           delivered by the resources and for prescriptive speci-
tomatic discovery will be impossible.                          fication of the expected behaviour of the resources as
    Figure 1 depicts our vision. In this vision, each          well as the integrated system. Such two-fold applica-
resource to be connected has a representative – an au-         tion of semantics can, in ideal case, lead to a ”global
tonomous software agent (a proactive ”player” within           understanding” between the resources. This means
certain integration scenario). This agent is assumed to        that a resource A can understand all of (1) the prop-
be able to monitor the state of the resource, make de-         erties and the state of a resource B, (2) the potential
cisions on the behalf on the resource, and to discover,        and actual behaviors of B, and (3) the business pro-
request and utilize external help if needed. The con-          cesses in which A and B, and maybe other resources,
nection between the resource itself and its agent is or-       are jointly involved.
ganized through the semantic mediation of an adapter               The UBIWARE is to be, roughly speaking, a set
(or interface). Such an adapter may include (if nec-           of tools providing means for effective development
essary) sensors with digital output, data structuring          of agents and adapters, and a run-time environment
(e.g. XML), semantic adapter components (convert-              for the operation of those. An important central com-
ing to a semantic representation), and actuators. Ac-          ponent of UBIWARE is the agent core (see Section
cording to this vision, each relevant component of a           3.1). Each agent is assumed to be created based on
ubiquitous system is to become a ”smart resource”              this core and specialized through semantic declara-
- proactive and self-managing. The part-of hierarchy           tive programs and a set of Reusable Atomic Behav-
of resources may result in corresponding hierarchy of          iors (RAB). Combination of the run-time environ-
the agents. This can also be recursive. For exam-              ment, the agent core and a set of standard semantic
ple, an adapter of a system component can become a             programs and RABs will make UBIWARE a plat-
smart resource itself, i.e. it can have its own respon-        form providing both (semantic) communication ser-
sible agent, semantically adapted sensors and actua-           vices and collaboration-support (scenario-driven inte-
tors, history, commitments with other resources, and           gration) services for heterogeneous resources.
self-monitoring and self-maintenance activities. This              In a sense, our intention is to apply the con-
could be done to guarantee high level of dynamism              cepts of automatic discovery, composition, orches-
and flexibility of the adapter.                                 tration, integration, execution monitoring, communi-
   The semantic technologies have in our vision a              cation, negotiation, context awareness, etc. (which
two-fold value. First, they are the basis for the discov-      were, so far, mostly related only to the Semantic Web-
ery of heterogeneous resources and data integration            Services domain) to a more general ”Semantic Web
of Things” domain. Also we want to expand this              future activities and resource utilization and to reason
list by adding automatic self-management including          about the actions, plans, and knowledge of each other,
(self-*)organization, diagnostics, forecasting, config-      in real time (Tamma et al., 2005).
uration, tuning, and maintenance.                               Our previous work resulted in a platform (Kata-
                                                            sonov and Terziyan, 2007) (Figure 2) that has done
                                                            some steps into both these directions. It can be seen as
                                                            consisting of three layers: reusable atomic behaviors
3 Analysis                                                  (RAB), behavior models corresponding to different
                                                            roles the agent plays, and the behavior engine (or the
    This section presents our analysis of how the goals     agent core). A RAB is a Java component implement-
of UBIWARE can be achieved. The result is a set             ing a reasonably atomic function (sensing, acting or
of sub-problems, which we address in correspond-            data processing). A behavior model is an RDF-based
ing work-packages of the project. UBIWARE project           document specifying a certain organizational role. A
aims at a relatively complete and self-sufficient mid-       behavior model consists of a set of beliefs represent-
dleware platform. Therefore, it elaborates on our cen-      ing the knowledge needed for playing the role and a
tral ideas (Section 2), and also works towards solu-        set of behavior rules. Roughly speaking, a behavior
tions in supporting but mandatory-to-treat areas such       rule specifies conditions of (and parameters for) exe-
as security, human interfaces and other.                    cution of a RAB. The behavior engine is responsible
                                                            for parsing RDF-based scripts, and it implements the
3.1 Core Agent Platform                                     run-time loop of an agent. In the platform, the agents
                                                            access the behavior models from an external reposi-
Although the flexibility of agent interactions has           tory, which is assumed to be managed by the organi-
many advantages when it comes to engineering com-           zation which ”hires” the agents to enact those roles.
plex systems, the downside is that it leads to unpre-       As can be seen from the picture, the platform allows
dictability in the run time system; as agents are au-       also on-demand access of RABs.
tonomous, the patterns and the effects of their inter-          Such a 3-layer agent architecture with external-
actions are uncertain (Jennings, 2000). It is common        ization of behavior models and on-demand access of
in specific systems to circumvent these difficulties by       atomic code components provides a basis for devel-
using interaction protocols whose properties can be         opment of the UBIWARE core platform. At present,
formally analyzed, by adopting rigid and preset or-         we are working on the following important research
ganizational structures, and/or by limiting the nature      issues: (1) Development of the language for roles’
and the scope of the agent interplay. However, these        scripts towards a full-scale Semantic Agent Program-
restrictions also limit the power of the agent-based ap-    ming Language. (2) Implementation of the separa-
proach; thus, in order to realize its full potential some   tion between a role’s capabilities (individual function-
longer term solutions are required (Jennings, 2000).        ality), and the business processes in which this role
    Realization of the UBIWARE vision requires a            can be involved (complex functionality). (3) Devel-
reliable core platform that would provide means for         opment of mechanisms for flexible treating the poten-
building systems that are flexible and consist of au-        tial (and likely) conflicts among the roles played by
tonomous components, yet predictable in operation.          one agent. (4) Development of mechanisms to en-
Two important research directions, acknowledged in          able agents to flexibly discover each other, based both
the literature, are: social level characterization of       on the roles played and on particular capabilities pos-
agent-based systems, and ontological approaches to          sessed. (5) Analysis of concrete benefits and mecha-
coordination. The former direction presents the need        nisms for accessing and using a role’s script by agents
for a better understanding of the impact of sociality       who are not playing that role but wish to coordinate or
and organizational context on an individuals behavior       interact with an agent that does. (6) Making an agent’s
and of the symbiotic link between the behavior of the       roles to be higher-level commitments of the agent that
individual agents and that of the overall system (Jen-      restrict its behavior, still leaving freedom for learning
nings, 2000). In particular, it requires modeling be-       and adaptation on lower-levels, instead of totally and
havior of an agent as being defined or restricted by the     rigidly prescribing the behavior.
roles the agent plays in one or several organizations
(Vazquez-Salceda et al., 2005). Role-based modelling        3.2 Distributed Resource Histories
also provides the advantage of separation of concerns
and in so design of complex systems (Cabri et al.,          In the UBIWARE vision, every resource is repre-
2004). The latter direction presents the need to enable     sented by an agent. Among the responsibilities of the
agents to communicate their intentions with respect to      agent is monitoring the condition of the resource and
Figure 2: The current core platform.

the resource’s interactions with other components of           source histories. (4) Enabling mining (utilizing intel-
the system and humans. The beliefs storage of the              ligent data mining and machine learning techniques)
agent will, therefore, naturally include the history of        of distributed histories.
the resource, in a sense ”blogged” by the agent. Obvi-
ously, the value of such a history is not limited to that      3.3 Peer-to-Peer Discovery
particular resource. A resource may benefit from the
information collected with respect to other resources          Following the IEEE FIPA agent system model, the
of the same (or similar) type, e.g. in a situation which       UBIWARE platform is to include a system agent
it faces for the first time while other may have faced          called Directory Facilitator (DF). In UBIWARE, the
that situation before. Also, mining the data collected         Directory Facilitator maintains a mapping between
and integrated from many resources may result in dis-          agents and the roles they play. If the behavior model
covery of some knowledge important at the level of             of an agent X (see Section 3.1) prescribes the need of
the whole ubiquitous computing system.                         interaction with another agent Y, the agent Y is always
     A straightforward approach would be maintaining           specified by its role, not the name or another unique
a central repository integrating the histories of all the      identifier of a particular agent. Therefore, the agent X
resources of the system. However, such an approach             must contact the Directory Facilitator in order to dis-
is often impractical in realistic dynamic applications         cover the unique ID (needed for communication) of
because even just keeping one agent informed of all            the agent or agents playing the role needed. Also, be-
the events and actions in the system would swamp               cause every agent plays at least one role, DF naturally
the available bandwidth, and also such agent would             has a list of all the agents on the platform. This can be
become a severe bottleneck and might render the re-            used, e.g., when an agent needs some information and
maining components unusable if it failed (Jennings,            wants to broadcast the request for that information to
1993). A scalable solution requires mechanisms for             all the agents on the platform (see Section 3.2).
inter-agent information sharing and data mining on                  Existence of such a Directory Facilitator is an ef-
integrated information which would allow keeping               fective and efficient solution. However, DF obviously
the resource histories distributed without need to copy        presents a severe bottleneck in the system, and can
those histories to a central repository.                       render the whole system unusable if it failed. To im-
     At present, we are working on the following im-           prove the survivability of UBIWARE-based systems,
portant research issues: (1) Development of mech-              there has to be a complementary mechanism which
anisms for representing the history of a resource in           can be utilized in an exception situation where DF be-
a system making it reusable for other resources and            came for some reason unavailable.
at the system-level. (2) Development of mechanisms                  After the system is deployed and operational for
for effective and efficient sharing of information be-          some time, a significant part of the DF knowledge,
tween the agents representing different resources. (3)         piece by piece, ends up in local knowledge storages
Development of mechanisms for querying and inte-               of different platform agents. The combination of the
gration of responses from distributed, autonomous,             local storages presents thus a kind of distributed direc-
and, hence, inevitably semantically heterogeneous re-          tory. Therefore, a Peer-to-Peer (P2P) mechanism im-
plemented on such a distributed directory can work as       On the level of inter-agent communication, we aim at
the needed mechanism complementary to the central           establishing some protocols for negotiation in differ-
DF. Of course, replicating DF is another and proba-         ent configurability cases. For example, when an agent
bly simpler option. It would not, however, provide the      changes its behavior, a check must be performed for
same level of survivability as P2P. Also, in some busi-     the consequences of this change for other compo-
ness scenarios, it is possible that some of the services    nents, and for who should be informed about this
would prefer not to advertise themselves through the        change. Also, there should be a mechanism for re-
central DF altogether, for security or other reasons.       stricting the range of possible adjustments to certain
Therefore, P2P discovery of such services would not         functionality of certain components in order to main-
be an exception path but the only viable solution.          tain the consistency in critical business processes.
    The objective here is the design of mechanisms              An important issue is configurability of resource
which will extend the scale of semantic resource            adapters. There is a need for a methodology both
discovery in UBIWARE with P2P discovery. Such               for creating such adapters and for their run-time re-
mechanisms have to enable an agent (1) to discover          configuration. It is reasonable to expect, e.g., that
agents playing a certain organizational role, (2) to dis-   when a resource modifies the format of its output, the
cover an agent (or agents) possessing certain needed        existing adapter can be adjusted to this new format
information, and (3) to discover resources (through         without a need to build a new adapter from scratch.
its agents) of certain type or possessing certain prop-         Configuration of business processes poses a sepa-
erties (e.g. a device in state X, a web-resource provid-    rate problem. A business process is an abstract entity
ing some information searched for, or a human with          which mainly consists of a flow of messages between
some specific skills). In all cases, existence of a cen-     agents. There is nothing like a business process exe-
tral DF is not assumed. Rather, the request is sent to      cution engine. There could be a dedicated responsible
all/some of the agents on the contact list of the agent     agent, which would coordinate the involved agents,
in question (ones with who it has a history of commu-       resolve conflicts and exceptions. However, similarly
nication, or at least about whom it heard from others).     to the case of a centralized history storage (see Sec-
Those agents can forward the request to all/some of         tion 3.2), such a controller agent would become a se-
the agents on their lists, and so on.                       vere bottleneck and might render the remaining com-
                                                            ponents unusable if it failed. In a most scalable solu-
3.4 Configurability                                          tion, a business process would be just a set of agents
                                                            with some commitments, i.e. signed Service Level
UBIWARE aims to be a platform that can be applied           Agreements. In such autonomic medium, we will
in different application areas. Therefore, the elements     need a (re-)configuration mechanism for stable error-
of the platform have to be adjustable, could be tuned       tolerant operation of components leading to success-
or configured allowing the platform to run different         fully achieving the business goals.
business scenarios in different environments. Such
flexibility calls for existence of a special configura-       3.5 Security in UBIWARE
tion layer of the platform. All building blocks of the
platform, i.e. software agents, agent behaviors, re-        The security is often seen as an add-on feature of a
source adapters, etc, become subject to configuration.       system. However, in many systems (and UBIWARE
Also, a flexible system should have a long lifespan.         is one of them), the system remains nothing more but
Hence, the platform should allow extensions, compo-         a research prototype, without a real potential of prac-
nent replacements, and component adjustments dur-           tical use, until an adequate security infrastructure is
ing the operation time. In addition, every agent in         embedded into it. UBIWARE will advance existing
UBIWARE is self-aware and self-manageable entity.           technologies to a qualitatively new level and bring
Therefore, it may evolve with time and modify some          to life new complex ubiquitous environments, where
of its functional or non-functional properties. At the      traditional approaches to manage security fall short.
same time, we need a stable and predictable environ-        Also, existing security measures for the technologies
ment for running business scenarios. Thus, the adjust-      on which UBIWARE relies, e.g. multi-agent, are not
ment made to a component must also be propagated to         in a mature stage and still require significant elabora-
higher platform levels such as business processes and       tion to mitigate associated risks.
contracting. Also vice versa, a change in a business            Traditional security goals like confidentiality,
process may require some adjustments to be made to          availability, reliability, integrity, manageability, ac-
several participating components.                           countability, responsibility etc, together with conven-
    On the level of software design, we aim at defining      tional measures and mechanisms that support secu-
patterns for development of configurable elements.           rity, do not cover all the needs and threats of new
emerging computing environments. Ambient intelli-           such an adapter. Instead, external services and appli-
gence and ubiquity of information technologies have         cation should be effectively utilized. Therefore, the
tightened the digital and physical worlds to the ex-        intelligence of a smart interface will be a result of col-
tent when security becomes the ultimate issue. The          laboration of multiple agents: the human’s agent, the
major implication of penetrating ICTs on security is        agents representing resources of interest (those to be
that the risks and negative consequences of security        monitored or/and controlled), and the agents of vari-
threats become higher than ever. On the other hand,         ous visualization services. This approach makes hu-
the security infrastructure itself has to become per-       man interfaces different from other resource adapters
vasive, interoperable and intelligent enough to natu-       and indicates a need for devoted research. There is
rally fit UBIWARE. The security cannot be added to           a need to enable creation of such smart human inter-
the UBIWARE platform later but the design decisions         faces through flexible collaboration of an Intelligent
regarding security have to be thoroughly correlated         GUI Shell, various visualization modules, which we
with the requirements, characteristics and design of        refer to as MetaProvider-services, and the resources
the platform, due to mutual impact on resulting fea-        of interest (Khriyenko, 2007).
tures of UBIWARE.                                                A MetaProvider is responsible for acting as a por-
    The main objective here is the design of an in-         tal so that various relevant resources can register on
frastructure for policy-based optimal collecting, com-      it, for data integration, for context-dependent filter-
posing, configuring and provisioning of security mea-        ing (inclusion of only relevant resources and relevant
sures in multi-agent systems like UBIWARE (Nau-             properties of those resources), and for creating visu-
menko et al., 2007). This work is to follow the gen-        alizations of data. The GUI shell is, in turn, responsi-
eral UBIWARE vision – configuring and adding new             ble for context-dependent selection of MetaProviders,
functionality on-the-fly by changing high level declar-      communication with them, and cross-MetaProvider
ative descriptions. Regarding security, this means that     browsing and integration.
UBIWARE will be able of smoothly including new,                  Based on such an approach, an infrastructure will
and reconfiguring existing, security policies (simi-         be embedded into UBIWARE enabling effective real-
lar to behavior models) and mechanisms (similar to          ization of the following system functions: (1) Visu-
RABs) in response to the dynamically changing en-           alization of data provided by a service in response to
vironment. The optimal state is always a tradeoff be-       a request. (2) Search, retrieving and visualization of
tween security and other qualities like performance,        data required by a human expert. (3) Providing access
functionality, usability, applicability and other.          to contextual information, and visualization of it. (4)
                                                            Visualization of resource registration, configuration,
3.6 Smart Interfaces                                        and security policy establishment processes. (5) Re-
                                                            source discovery via MetaProviders (because they act
In UBIWARE, humans are important resources,                 as thematic portals).
which can play several distinct roles: (1) User – one
getting some information or services from other re-
sources. (2) Resource under care – one under online         4 Industrial cases
care of the integrated system (e.g. monitoring the
health of an employee). (3) Service provider – one
providing services to other resources (e.g. a main-             This section describes several industrial cases (ap-
tenance expert). (4) UBIWARE administrator – one            plication areas) that we consider in our project. These
monitoring and configuring the integrated system.            cases are proposed by UBIWARE industrial part-
                                                            ners and are being analyzed, designed and prototyped
    Obviously, humans need graphical interfaces to
                                                            based on the UBIWARE platform. These cases pro-
interact with the rest of the system. The same person
                                                            vide examples of benefits that a smart semantic mid-
can play several roles, switch between them depend-
                                                            dleware can bring into various industries.
ing on the context, and, in result, require different in-
terfaces at different times. In addition, a UBIWARE-
based system presents a large integration environment       4.1 Power Network Maintenance
with potentially huge amounts of heterogeneous data.
Therefore, there is a need for tools facilitating infor-    One of the project’s partners is a vendor of hardware
mation access and manipulation by humans.                   and software for power networks. With respect to
    From the UBIWARE point of view, a human inter-          UBIWARE, this partner’s main area of interest is in
face is just a special case of a resource adapter. We be-   extending, mainly through integration with external
lieve, however, that it is unreasonable to embed all the    resources, the functionality of its existing software
data acquisition, filtering and visualization logic into     systems. These systems provide a graphical view over
the power network, data acquisition from the substa-       system based on UBIWARE could solve this issue.
tions and remote control over the relays, switches, etc.   The information flow will go through the agents rep-
They also include implementations of various algo-         resenting the sub-networks on the UBIWARE plat-
rithms: for fault localization, for calculation of opti-   form. Utilization of semantic technologies will al-
mal reconfiguration of the network and other.               low such interoperability even if the sub-networks
    The UBIWARE technology could allow connect-            use software systems from different vendors, and thus
ing to the existing products some new system intel-        maybe different data formats and protocols.
ligence tools, for example, statistical and data min-          One more scenario is related to a new business
ing tools. One case that is considered is about possi-     model. At present, all expertise of the company gets
bility of using data mining techniques for automated       embedded into hardware or software systems and sold
interpretation of the situation in the power network.      to the customers as it is. A new business model would
The motivating issue is that a certain condition, e.g.     be to start own Web-service providing implementa-
a fault, in the power network causes a series of alert     tion of certain algorithms, so the customers will uti-
messages to be sent to the operation center. It remains    lize those algorithms online when needed. The com-
a responsibility of a human operator to understand         pany will be always able to update algorithms, add
the reason underlying such a sequence of alert mes-        new, and so on. UBIWARE will ensure interoperabil-
sages. Based on UBIWARE, a system could be cre-            ity and coordination between such Web-service and
ated allowing that: (1) alert data is automatically col-   customers’ software systems, and also a relative ease
lected, (2) the experts are able to annotate sequences     of implementation of such a solution – because it will
of events with their reasons, (3) data mining algo-        not require changes in existing software systems, only
rithms are applied to discover some patterns, and (4)      extension with the UBIWARE platform. Noticeable
the operator is provided with an interface giving a        that, if semantically defined, such Web-service can
more structured view of events (e.g. filtered based on      potentially be utilized across the globe even by the
the source of event) and including the system’s inter-     customers who never purchased any of the company’s
pretation (from the models built) of what is the mean-     hardware or software.
ing of the situation and its reason.                           The next scenario is related to the possibility of in-
    In collaboration with this partner, we analysed        tegrating data, which is currently utilized in the power
further the potential add-value that the company and       network management (network structure and config-
their customers, i.e. electrical companies, could re-      uration, feeder relay readings), with contextual in-
ceive from introducing UBIWARE into their business.        formation from the external sources. Such integra-
Below, we sketch several scenarios when UBIWARE            tion can be used in at least three tasks. The first
can enable new features, or help otherwise.                is risk analysis. Information about weather condi-
    One scenario is related to extending the user inter-   tions, ongoing forest works, or forest fires can be
faces, so that various groups of users could get flexi-     used for evaluating existing threats for the power net-
ble access to data and functionality present in the ex-    work. This may be used to trigger an alert state for
isting products. Traditionally, those software products    the maintenance team, or even to do a precaution-
are only used inside the walls of operation centers by     ary reconfiguration of the network to minimize pos-
the network operators, through proprietary user inter-     sible damage. The second is facilitation of fault lo-
faces. The data and functionality of those systems,        calization. The output of fault localization algorithms
however, has a value beyond that use. A UBIWARE-           is not always certain. The information about threats
based solution will enable a more ubiquitous and flex-      for the power network that existed at the time when
ible information access to data and algorithms and         the fault occurred (which thus may have caused the
will extend the user base to, e.g., maintenance work-      fault) may greatly facilitate the localization. In some
ers, management, etc.                                      situations, contextual information alone may even be
    Another scenario arises from the fact that the         sufficient for localization. The third is operator in-
medium-voltage sub-networks of the integral network        terface enhancement. Contextual information may
are usually owned, controlled and maintained then by       be used also just to extend the operators’ view of
some local companies. It is noticeable that the oper-      the power network. For example, satellite imagery
ation centers of different companies have no connec-       can be used for geographic view (instead of locally
tion to each other, so information exchange among          stored bitmaps as it is in the current systems); also,
them is nearly impossible. In the case of a fault af-      dynamically-changing information can be accessed
fecting two different sub-networks, such information       and represented on the interface.
exchange, though, may be very important, for all of            The last scenario is about the possibility of trans-
fault localization, network reconfiguration, and net-       ferring the knowledge of human experts to automated
work restoration. Introducing an inter-organizational      systems, by means of various data mining tools. In
the power network management case, one scenario             mats and data structures, which were bound to on-
that seems to be highly appropriate for such knowl-         tology, may require re-adaptation (i.e. adapter re-
edge transfer is the following. In present, it is always    configuration) to become consistent with the inte-
a decision of a human expert which of the existing          grated storage and applications. From a life-time
fault localization algorithms will perform the best in      perspective, the complexity of business processes be-
the context of the current configuration of the power        tween the company and the customer may become an-
network and the nature of the fault. Such decisions         other obstacle for updates and renovation of the ser-
made by an expert along with the input data could, be       vice infrastructure. It is because such changes are
forwarded to a learning Web-service. After a suffi-          hard to trace and, therefore, it might be difficult to
cient learning sample, this Web-service could start to      analyze their impact on the overall system.
be used in some situations instead of the human ex-
pert, e.g. in situations when a faster decision is needed
or when the expert is unavailable.                          4.3 Telecom Operator’s Service Desk
4.2 Maintenance of Paper Machines
                                                            One more project’s partner is a provider of telecom-
Another of the project’s partners is a supplier of ma-      munication services, both wireless and fixed-line.
chinery and automation systems for a set of industries      With respect to UBIWARE, this partner’s main area
including the paper industry. With respect to UBI-          of interest is in possibility of constructing, mainly
WARE, this partner’s main areas of interest are in          through integration of existing components, systems
information integration and analytical data process-        that would (partially) automate some traditionally
ing. To support customers with additional informa-          manual processes. Such a manual process to be con-
tion along the product (a paper machine) lifecycle,         sidered is a Service Desk. Among other things, the
the company foresees the need for intelligent prod-         company’s service desk is a point of contact for the
uct history management. Such a history is supposed          customers seeking to report unavailability of service
to integrate alert reports, experts’ diagnoses, mainte-     (mobile or fixed-line phone connection, IDSL Inter-
nance work performed, maintenance costs, and other          net connection, and other) or another problem. If the
types of information.                                       problem is at the customer side, the service desk ex-
    Every paper machine, installed at a customer’s          perts are supposed to provide instructions for trou-
site, is equipped with a set of sensors and embedded        bleshooting it. The whole interaction is performed
intelligence for observing the state of the machine and     over the phone, i.e. the customer calls, explains the
alarming when an exceptional situation occurs. The          problem to a service desk worker, probably gets trans-
alarm information is forwarded to the central hub for       ferred to a relevant expert, tries what the expert rec-
diagnostics and decision making.                            ommends, reports the results, and so on. In result,
    First of all, UBIWARE can provide means for             the waiting times for customers to get through to the
proactive integration of alarm data with different cor-     service desk are long, while the effectiveness of the
porate information systems, such as the engineering         troubleshooting process is quite low.
database, the financial database. This will give a               Equipping the service desk with an UBIWARE-
common basis for product history management and             based solution could enable the following new func-
further intelligent data processing. UBIWARE can            tionality: (1) Customers get possibility to report their
also enable integration with external web services to       problems through a web-service interface. (2) The
provide more powerful analytical processing of data.        system could collect, integrate and present to the ex-
Also, the flexibility and ease of extension via incor-       pert all the available information on the customer
poration of external functionality will enable evolu-       (type of connection, address, etc), removing a need to
tion of the service infrastructure to meet the customer     spend time asking that information during the phone
needs in a sustainable fashion. The UBIWARE plat-           conversation. (3) Automated analysis of related prob-
form will also enable a high level of security in the       lem reports could enable fast responses like: ”it is
collaborative work of the company and its customers.        a network problem, we have received other similar
    Among the central problems to be solved by UBI-         reports from your area, we are already working on
WARE, there are those related to the evolution of the       this problem”. In the case of a non-working Internet
service infrastructure. During the paper machine op-        connection, some relevant data can be acquired, i.e.
eration lifecycle, formats of messages or algorithms        sensed, from the network side. Also, some modems
for issuing alarms may change. Furthermore, some            can be configured remotely by uploading a configura-
changes to the supporting ERP or other automation           tion file from the network. In such a case, a fully au-
systems may take place. In other words, data for-           tomatic troubleshooting could even be implemented.
5 Conclusions                                             considered before. However, the introduction of the
                                                          UBIWARE concept has led to realizing that some au-
     In this paper, we described our vision of a so-      tomation can be possible after all.
lution to meet the middleware needs of the domain
of the Internet of Things. We aim at a new gener-
ation middleware platform which will allow creation       REFERENCES
of self-managed complex systems, in particular indus-
trial ones, consisting of distributed, heterogeneous,     Brock, D. and Schuster, E. (2006). On the semantic web of
shared and reusable components of different nature.            things. In Semantic Days 2006, Stavanger, Norway,
     Self-management of systems is one of the central          April 26-27.
themes in the EU 7-th Framework ICT Programme             Buckley, J. (2006). From RFID to the Internet of Things:
(2007-2013). The Objective ”Service and Software              Pervasive networked systems. In Report on the Con-
Architectures” of the Challenge 1 ”Network and Ser-           ference organized by DG Information Society and Me-
                                                              dia, Networks and Communication Technologies Di-
vice Infrastructures” includes the need for strate-           rectorate, Brussels, March 6-7.
gies and technologies enabling mastery of complex-
                                                          Cabri, G., Ferrari, L., and Zambonelli, F. (2004). Role-
ity, dependability and behavioral stability, and also
                                                               based approaches for engineering interactions in
the need for integrated solutions supporting the net-          large-scale multi-agent systems. In Software Engi-
worked enterprise. Also, the Objective ”The Net-               neering for Multi-Agent Systems II, LNCS v.2940,
work of the Future” of this Challenge includes the             pages 19–25. Springer.
need for re-configurability, self-organization and self-   Jennings, N. (1993). Commitments and conventions: The
management for optimized control, management and               foundation of coordination in multiagent systems.
flexibility of the future network infrastructure. In            Knowledge Engineering Review, 8(3):223–250.
addition, the whole Challenge 2 ”Cognition, Inter-        Jennings, N. (2000). On agent-based software engineering.
action, Robotics” has as its motivation the need for           Artificial Intelligence, 117(2):277–296.
creating ”artificial systems that can achieve general      Jennings, N. (2001). An agent-based approach for building
goals in a largely unsupervised way, and persevere             complex software systems. Communications of the
under adverse or uncertain conditions; adapt, within           ACM, 44(4):35–41.
reasonable constraints, to changing service and per-      Katasonov, A. and Terziyan, V. (2007). SmartResource plat-
formance requirements, without the need for exter-             form and Semantic Agent Programming Language (S-
nal re-programming, re-configuring, or re-adjusting”.           APL). In Proc. 5th Conf. Multi-Agent Technologies,
It is noticeable that the systems (stand-alone or net-         LNAI v.4687, pages 25–36. Springer.
worked) monitoring and controlling material or infor-     Kephart, J. O. and Chess, D. M. (2003). The vision of auto-
mational processes is one of the three focus areas of         nomic computing. IEEE Computer, 36(1):41–50.
this Challenge.                                           Khriyenko, O. (2007). 4i (FOR EYE) technology: Intel-
     According to a more global view to the Internet of        ligent interface for integrated information. In Proc.
Things technology, UBIWARE will classify and reg-              9th Conf. Enterprise Information Systems, Volume 5,
                                                               pages 278–281.
ister various ubiquitous devices and link them with
web resources, services, software and humans as busi-     Lassila, O. (2005). Using the Semantic Web in mobile and
                                                               ubiquitous computing. In Proc. IFIP WG12.5 Conf.
ness processes’ components. UBIWARE will also                  Industrial Applications of Semantic Web, pages 19–
consider sensors, sensor networks, embedded sys-               25. Springer.
tems, alarm detectors, actuators, communication in-
                                                          Mamei, M. and Zambonelli, F. (2006). Field-Based Coor-
frastructure, etc. as ”smart objects” and will provide       dination for Pervasive Multiagent Systems. Springer.
similar care to them as to other resources.
                                                          Naumenko, A., Katasonov, A., and Terziyan, V. (2007). A
     The innovative nature of UBIWARE is demon-               security framework for smart ubiquitous industrial re-
strated well by the very idea of the case in Section          sources. In Proc. 3rd Conf. Interoperability of En-
4.3, the smart service desk. An operator’s service            terprise Software and Applications, pages 183–194.
desk is an important service element which, however,          Springer.
still remains largely non-automated and thus has a        Tamma, V., Aart, C., Moyaux, T., Paurobally, S., Lithgow-
low effectiveness. Any automation of such a process           Smith, B., and Wooldridge, M. (2005). An ontological
would require integration and complex interoperabil-          framework for dynamic coordination. In Proc. 4th In-
ity of highly heterogeneous components, including             ternational Semantic Web Conference’05, LNCS vol.
                                                              3729, pages 638–652. Springer.
hardware (e.g. customer’s equipment), software and
database systems, and humans (the customer, the ser-      Vazquez-Salceda, J., Dignum, V., and Dignum, F. (2005).
                                                              Organizing multiagent systems. Autonomous Agents
vice desk operator, and experts). In result, the possi-
                                                              and Multi-Agent Systems, 11(3):307–360.
bility of automation of the service desk was not really

Mais conteúdo relacionado

Mais procurados

SVHsIEVs for Navigation in Virtual Urban Environment
SVHsIEVs for Navigation in Virtual Urban EnvironmentSVHsIEVs for Navigation in Virtual Urban Environment
SVHsIEVs for Navigation in Virtual Urban Environmentcsandit
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONcscpconf
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoTGanesh Awati
 
A survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologiesA survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologiessharefish
 
Combining cloud and sensors in a smart city environment
Combining cloud and sensors in a smart city environmentCombining cloud and sensors in a smart city environment
Combining cloud and sensors in a smart city environmentNgoc Thanh Dinh
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistancePhD Assistance
 
Semantic MDM systems design concept
Semantic MDM systems design conceptSemantic MDM systems design concept
Semantic MDM systems design conceptAndrey Andrichenko
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
 
22348972.2017.1348890
22348972.2017.134889022348972.2017.1348890
22348972.2017.1348890RaheelAnjum19
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middlewareLeonardo Bruni
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challengesijsptm
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...AIRCC Publishing Corporation
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...Rio Info
 

Mais procurados (20)

Atos wp-cyberrisks
Atos wp-cyberrisksAtos wp-cyberrisks
Atos wp-cyberrisks
 
SVHsIEVs for Navigation in Virtual Urban Environment
SVHsIEVs for Navigation in Virtual Urban EnvironmentSVHsIEVs for Navigation in Virtual Urban Environment
SVHsIEVs for Navigation in Virtual Urban Environment
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTIONDYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
DYNAMIC AND REALTIME MODELLING OF UBIQUITOUS INTERACTION
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
A survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologiesA survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologies
 
Combining cloud and sensors in a smart city environment
Combining cloud and sensors in a smart city environmentCombining cloud and sensors in a smart city environment
Combining cloud and sensors in a smart city environment
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
 
Waldoin ios
Waldoin iosWaldoin ios
Waldoin ios
 
Phd defence presentation
Phd defence presentationPhd defence presentation
Phd defence presentation
 
Semantic MDM systems design concept
Semantic MDM systems design conceptSemantic MDM systems design concept
Semantic MDM systems design concept
 
InSTEDD Mesh4x Platform
InSTEDD Mesh4x PlatformInSTEDD Mesh4x Platform
InSTEDD Mesh4x Platform
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 
22348972.2017.1348890
22348972.2017.134889022348972.2017.1348890
22348972.2017.1348890
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middleware
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challenges
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
 

Destaque

Mpi membership presentation dec 2009 general
Mpi membership presentation dec 2009 generalMpi membership presentation dec 2009 general
Mpi membership presentation dec 2009 generalMPI Poland Club
 
Ch1
Ch1Ch1
Ch1CAG
 
If usp 2011
If usp 2011If usp 2011
If usp 2011USP
 
Carroll Publishing Overview
Carroll Publishing OverviewCarroll Publishing Overview
Carroll Publishing OverviewNaomiBrown
 
Economia part 2
Economia part 2Economia part 2
Economia part 2UNINOVE
 
Ws420 slideshow
Ws420 slideshowWs420 slideshow
Ws420 slideshowPhil
 

Destaque (6)

Mpi membership presentation dec 2009 general
Mpi membership presentation dec 2009 generalMpi membership presentation dec 2009 general
Mpi membership presentation dec 2009 general
 
Ch1
Ch1Ch1
Ch1
 
If usp 2011
If usp 2011If usp 2011
If usp 2011
 
Carroll Publishing Overview
Carroll Publishing OverviewCarroll Publishing Overview
Carroll Publishing Overview
 
Economia part 2
Economia part 2Economia part 2
Economia part 2
 
Ws420 slideshow
Ws420 slideshowWs420 slideshow
Ws420 slideshow
 

Semelhante a Katasonov icinco08

A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf12rno
 
Managing, searching, and accessing iot devices
Managing, searching, and accessing iot devicesManaging, searching, and accessing iot devices
Managing, searching, and accessing iot devicesIJCNCJournal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Embedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital AgeEmbedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital AgeIJCSEA Journal
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
 
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middlewareIAEME Publication
 
eSOA: A Contextual Analysis on Service Oriented Architecture for Embeddded Ne...
eSOA: A Contextual Analysis on Service Oriented Architecture for Embeddded Ne...eSOA: A Contextual Analysis on Service Oriented Architecture for Embeddded Ne...
eSOA: A Contextual Analysis on Service Oriented Architecture for Embeddded Ne...Juan Antonio Martin Checa
 
International journal of engineering issues vol 2015 - no 2 - paper4
International journal of engineering issues   vol 2015 - no 2 - paper4International journal of engineering issues   vol 2015 - no 2 - paper4
International journal of engineering issues vol 2015 - no 2 - paper4sophiabelthome
 
dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152Lenore Mullin
 
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...AlAtfat
 
The Role of Cloud-MANET Framework in the Internet of Things (IoT)
The Role of Cloud-MANET Framework in the Internet of Things (IoT)The Role of Cloud-MANET Framework in the Internet of Things (IoT)
The Role of Cloud-MANET Framework in the Internet of Things (IoT)AlAtfat
 
Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities PayamBarnaghi
 
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALijcsit
 
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALAIRCC Publishing Corporation
 
Cassandra framework a service oriented distributed multimedia
Cassandra framework  a service oriented distributed multimediaCassandra framework  a service oriented distributed multimedia
Cassandra framework a service oriented distributed multimediaJoão Gabriel Lima
 
Multi-Agent Architecture for Distributed IT GRC Platform
 Multi-Agent Architecture for Distributed IT GRC Platform Multi-Agent Architecture for Distributed IT GRC Platform
Multi-Agent Architecture for Distributed IT GRC PlatformIJCSIS Research Publications
 
The soap based mechanism for home environment using web services
The soap based mechanism for home environment using web services  The soap based mechanism for home environment using web services
The soap based mechanism for home environment using web services ecij
 

Semelhante a Katasonov icinco08 (20)

A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf
 
Managing, searching, and accessing iot devices
Managing, searching, and accessing iot devicesManaging, searching, and accessing iot devices
Managing, searching, and accessing iot devices
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Embedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital AgeEmbedded Systems and Software: Enabling Innovation in the Digital Age
Embedded Systems and Software: Enabling Innovation in the Digital Age
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEEMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGE
 
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middleware
 
eSOA: A Contextual Analysis on Service Oriented Architecture for Embeddded Ne...
eSOA: A Contextual Analysis on Service Oriented Architecture for Embeddded Ne...eSOA: A Contextual Analysis on Service Oriented Architecture for Embeddded Ne...
eSOA: A Contextual Analysis on Service Oriented Architecture for Embeddded Ne...
 
International journal of engineering issues vol 2015 - no 2 - paper4
International journal of engineering issues   vol 2015 - no 2 - paper4International journal of engineering issues   vol 2015 - no 2 - paper4
International journal of engineering issues vol 2015 - no 2 - paper4
 
dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152
 
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
Fuzzy Control Based Mobility Framework for Evaluating Mobility Models in MANE...
 
The Role of Cloud-MANET Framework in the Internet of Things (IoT)
The Role of Cloud-MANET Framework in the Internet of Things (IoT)The Role of Cloud-MANET Framework in the Internet of Things (IoT)
The Role of Cloud-MANET Framework in the Internet of Things (IoT)
 
Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities
 
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
 
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
 
Cassandra framework a service oriented distributed multimedia
Cassandra framework  a service oriented distributed multimediaCassandra framework  a service oriented distributed multimedia
Cassandra framework a service oriented distributed multimedia
 
Multi-Agent Architecture for Distributed IT GRC Platform
 Multi-Agent Architecture for Distributed IT GRC Platform Multi-Agent Architecture for Distributed IT GRC Platform
Multi-Agent Architecture for Distributed IT GRC Platform
 
The soap based mechanism for home environment using web services
The soap based mechanism for home environment using web services  The soap based mechanism for home environment using web services
The soap based mechanism for home environment using web services
 

Último

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 

Último (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 

Katasonov icinco08

  • 1. SMART SEMANTIC MIDDLEWARE FOR THE INTERNET OF THINGS Artem Katasonov, Olena Kaykova, Oleksiy Khriyenko, Sergiy Nikitin and Vagan Terziyan Agora Center, University of Jyv¨ skyl¨ , P.O.Box 35, 40014, Finland a a akataso@jyu.fi, helen@jyu.fi, olkhriye@jyu.fi, senikiti@jyu.fi, vagan@jyu.fi Keywords: Internet of Things, Middleware, Interoperability, Heterogeneous Resources, Software Agents, Semantic Tech- nologies, Ontologies Abstract: As ubiquitous systems become increasingly complex, traditional solutions to manage and control them reach their limits and pose a need for self-manageability. Also, heterogeneity of the ubiquitous components, stan- dards, data formats, etc, creates significant obstacles for interoperability in such complex systems. The promis- ing technologies to tackle these problems are the Semantic technologies, for interoperability, and the Agent technologies for management of complex systems. This paper describes our vision of a middleware for the Internet of Things, which will allow creation of self-managed complex systems, in particular industrial ones, consisting of distributed and heterogeneous components of different nature. We also present an analysis of issues to be resolved to realize such a middleware. 1 Introduction plexity, and thus to design the system. The IBM vision of autonomic computing (Kephart and Chess, 2003) proclaims the need for computing systems ca- Recent advances in networking, sensor and RFID pable of ”running themselves” with minimal human technologies allow connecting various physical world management which is mainly limited to definition of objects to the IT infrastructure, which could, ulti- some higher-level policies rather than direct admin- mately, enable realization of the Internet of Things istration. The computing systems will therefore be and the Ubiquitous Computing visions. Also, this self-managed, which, according to the IBM vision, opens new horizons for industrial automation, i.e. au- includes self-configuration, self-optimization, self- tomated monitoring, control, maintenance planning, protection, and self-healing. The IBM vision empha- etc, of industrial resources and processes. A much sizes that the run-time self-manageability of a com- larger than in present number of resources (machines, plex system requires its components to be to a cer- infrastructure elements, materials, products) can get tain degree autonomous themselves. Following this, connected to the IT systems, thus be monitored and we envision that the software agent technologies will potentially controlled. Such development will also play an important part in building such complex sys- necessarily create demand for a much wider integra- tems. Agent-based approach to software engineering tion with various external resources, such as data stor- is considered to be facilitating the design of complex ages, information services, and algorithms, which can systems (Jennings, 2001). A significant attention is be found in other units of the same organization, in paid in the field of multi-agent systems to the task of other organizations, or on the Internet. building decentralized systems capable of supporting The interconnectivity of computing and physical spontaneous configuration, tolerating partial failures, systems could, however, become ”the nightmare of or arranging adaptive reorganization of the whole sys- ubiquitous computing” (Kephart and Chess, 2003) tem (Mamei and Zambonelli, 2006). in which human operators will be unable to manage the complexity of interactions in the system, neither A major problem is inherent heterogeneity in even architects will be able to anticipate that com- ubiquitous computing systems, with respect to the na-
  • 2. ture of components, standards, data formats, proto- of the ARTEMIS European Technology Platform. cols, etc, which creates significant obstacles for in- ARTEMIS’ SRA has ”Seamless Connectivity and teroperability among the components. Semantic tech- Middleware” as one of its three parts. Some of nologies are viewed today as a key technology to re- the relevant research priorities listed are the middle- solve the problems of interoperability and integration ware as the key enabler for declarative programming within heterogeneous world of ubiquitously intercon- paradigm, where the components and their interac- nected objects and systems. Semantic technologies tion are defined and configured declaratively rather are claimed to be a qualitatively stronger approach to than programmatically (and we believe that the se- interoperability than contemporary standards-based mantic technologies are a natural candidate here), ef- approaches (Lassila, 2005). The Internet of Things ficiently bridging information between global, enter- should become in fact the Semantic Web of Things prise, and embedded systems, use of ontologies for (Brock and Schuster, 2006). We subscribe to this cross-domain systems’ organization and for interop- view. Moreover, we apply semantic technologies not erability in heterogeneous environments, dynamic re- only to facilitate the discovery of heterogeneous com- configuration capabilities, adaptive resource manage- ponents and data integration, but also for the behav- ment, and appropriate security infrastructures. ioral control and coordination of those components In this paper, we describe our vision of such a (i.e. prescriptive specification of the expected be- middleware for the Internet of Things, which has also haviour, declarative semantic programming). formed the basis for our research project UBIWARE. It seems to be generally recognized that achiev- The project aims at a new generation middleware plat- ing the interoperability by imposing some rigid stan- form which will allow creation of self-managed com- dards and making everyone comply could not be a plex systems, in particular industrial ones, consist- case in ubiquitous environments. Therefore, the in- ing of distributed, heterogeneous, shared and reusable teroperability requires existence of some middleware components of different nature, e.g. smart machines to act as the glue joining heterogeneous components and devices, sensors, RFIDs, web-services, software together. A consistent set of middleware, offering applications, humans along with their interfaces, and application programming interfaces, communications others. Such middleware will enable various compo- and other services to applications, will simplify the nents to automatically discover each other and to con- creation of applications and help to move from static figure a system with complex functionality based on programming approaches towards a configurable and the atomic functionalities of the components. dynamic composition capability (Buckley, 2006). The rest of the paper is structured as follows. Sec- There are a couple of EU FP6 research projects tion 2 describes our general vision. Section 3 presents that have as one of their goals the develop- an analysis of how the goals of UBIWARE can be ment of some middleware for embedded systems. achieved. The result is a set of sub-problems, which They are RUNES (Reconfigurable Ubiquitous Net- we address in corresponding work-packages of the worked Embedded Systems, 2004-2007) and ongo- project. Section 4 describes several industrial cases ing SOCRADES (Service-Oriented Cross-Layer In- (application areas) that we consider in the project; frastructure for Distributed Smart Embedded Devices, those are proposed by the project’s industrial partners. 2006-2009). We believe, however, that the middle- Finally, Section 5 concludes the paper. ware needs of the Internet of Things domain go well beyond interconnectivity of embedded systems them- selves. There is a more general need for middle- 2 The General Vision ware to enable something we refer to as Global Enter- prise Resource Integration (GERI), where all different This section describes our general vision of the types of resources get seamlessly integrated: physi- smart semantic middleware for the Internet of Things. cal devices with embedded electronics, web services, We believe that tasks of automatic integration, orches- software applications, humans along with their inter- tration and composition of complex systems on the faces, and other. In the concept of GERI, we also Internet of Things will be impossible in a central- stress the need for true global interoperability, not ized manner due to the scalability and other issues. just interconnectivity. The components of ubiquitous Therefore, the components of such systems should computing systems should be able not only to com- be to a certain degree autonomous and proactive. In municate and exchange data, but also to flexibly co- other words, utilization of the agent technologies is ordinate with each other, discover and use each other, needed to enable flexible communication and coordi- and jointly engage in different business processes. nation of the components. Agent technologies also al- Such more general middleware needs are em- low mobility of service components between various phasized in the Strategic Research Agenda (SRA) platforms, decentralized service discovery, utilization
  • 3. Figure 1: The conceptual architecture: resources, adapters, agents and ontology of FIPA communication protocols, and negotiation- across multiple domains (a well-known advantage). based integration/composition of services. Interoper- Second, they are used for behavioural control and co- ability among the components requires use of meta- ordination of the agents representing those resources data and ontologies. As the amount of components (a novel use). Therefore, semantic technologies are can grow dramatically, without their ontological clas- used both for descriptive specification of the services sification and semantic annotation processes, the au- delivered by the resources and for prescriptive speci- tomatic discovery will be impossible. fication of the expected behaviour of the resources as Figure 1 depicts our vision. In this vision, each well as the integrated system. Such two-fold applica- resource to be connected has a representative – an au- tion of semantics can, in ideal case, lead to a ”global tonomous software agent (a proactive ”player” within understanding” between the resources. This means certain integration scenario). This agent is assumed to that a resource A can understand all of (1) the prop- be able to monitor the state of the resource, make de- erties and the state of a resource B, (2) the potential cisions on the behalf on the resource, and to discover, and actual behaviors of B, and (3) the business pro- request and utilize external help if needed. The con- cesses in which A and B, and maybe other resources, nection between the resource itself and its agent is or- are jointly involved. ganized through the semantic mediation of an adapter The UBIWARE is to be, roughly speaking, a set (or interface). Such an adapter may include (if nec- of tools providing means for effective development essary) sensors with digital output, data structuring of agents and adapters, and a run-time environment (e.g. XML), semantic adapter components (convert- for the operation of those. An important central com- ing to a semantic representation), and actuators. Ac- ponent of UBIWARE is the agent core (see Section cording to this vision, each relevant component of a 3.1). Each agent is assumed to be created based on ubiquitous system is to become a ”smart resource” this core and specialized through semantic declara- - proactive and self-managing. The part-of hierarchy tive programs and a set of Reusable Atomic Behav- of resources may result in corresponding hierarchy of iors (RAB). Combination of the run-time environ- the agents. This can also be recursive. For exam- ment, the agent core and a set of standard semantic ple, an adapter of a system component can become a programs and RABs will make UBIWARE a plat- smart resource itself, i.e. it can have its own respon- form providing both (semantic) communication ser- sible agent, semantically adapted sensors and actua- vices and collaboration-support (scenario-driven inte- tors, history, commitments with other resources, and gration) services for heterogeneous resources. self-monitoring and self-maintenance activities. This In a sense, our intention is to apply the con- could be done to guarantee high level of dynamism cepts of automatic discovery, composition, orches- and flexibility of the adapter. tration, integration, execution monitoring, communi- The semantic technologies have in our vision a cation, negotiation, context awareness, etc. (which two-fold value. First, they are the basis for the discov- were, so far, mostly related only to the Semantic Web- ery of heterogeneous resources and data integration Services domain) to a more general ”Semantic Web
  • 4. of Things” domain. Also we want to expand this future activities and resource utilization and to reason list by adding automatic self-management including about the actions, plans, and knowledge of each other, (self-*)organization, diagnostics, forecasting, config- in real time (Tamma et al., 2005). uration, tuning, and maintenance. Our previous work resulted in a platform (Kata- sonov and Terziyan, 2007) (Figure 2) that has done some steps into both these directions. It can be seen as consisting of three layers: reusable atomic behaviors 3 Analysis (RAB), behavior models corresponding to different roles the agent plays, and the behavior engine (or the This section presents our analysis of how the goals agent core). A RAB is a Java component implement- of UBIWARE can be achieved. The result is a set ing a reasonably atomic function (sensing, acting or of sub-problems, which we address in correspond- data processing). A behavior model is an RDF-based ing work-packages of the project. UBIWARE project document specifying a certain organizational role. A aims at a relatively complete and self-sufficient mid- behavior model consists of a set of beliefs represent- dleware platform. Therefore, it elaborates on our cen- ing the knowledge needed for playing the role and a tral ideas (Section 2), and also works towards solu- set of behavior rules. Roughly speaking, a behavior tions in supporting but mandatory-to-treat areas such rule specifies conditions of (and parameters for) exe- as security, human interfaces and other. cution of a RAB. The behavior engine is responsible for parsing RDF-based scripts, and it implements the 3.1 Core Agent Platform run-time loop of an agent. In the platform, the agents access the behavior models from an external reposi- Although the flexibility of agent interactions has tory, which is assumed to be managed by the organi- many advantages when it comes to engineering com- zation which ”hires” the agents to enact those roles. plex systems, the downside is that it leads to unpre- As can be seen from the picture, the platform allows dictability in the run time system; as agents are au- also on-demand access of RABs. tonomous, the patterns and the effects of their inter- Such a 3-layer agent architecture with external- actions are uncertain (Jennings, 2000). It is common ization of behavior models and on-demand access of in specific systems to circumvent these difficulties by atomic code components provides a basis for devel- using interaction protocols whose properties can be opment of the UBIWARE core platform. At present, formally analyzed, by adopting rigid and preset or- we are working on the following important research ganizational structures, and/or by limiting the nature issues: (1) Development of the language for roles’ and the scope of the agent interplay. However, these scripts towards a full-scale Semantic Agent Program- restrictions also limit the power of the agent-based ap- ming Language. (2) Implementation of the separa- proach; thus, in order to realize its full potential some tion between a role’s capabilities (individual function- longer term solutions are required (Jennings, 2000). ality), and the business processes in which this role Realization of the UBIWARE vision requires a can be involved (complex functionality). (3) Devel- reliable core platform that would provide means for opment of mechanisms for flexible treating the poten- building systems that are flexible and consist of au- tial (and likely) conflicts among the roles played by tonomous components, yet predictable in operation. one agent. (4) Development of mechanisms to en- Two important research directions, acknowledged in able agents to flexibly discover each other, based both the literature, are: social level characterization of on the roles played and on particular capabilities pos- agent-based systems, and ontological approaches to sessed. (5) Analysis of concrete benefits and mecha- coordination. The former direction presents the need nisms for accessing and using a role’s script by agents for a better understanding of the impact of sociality who are not playing that role but wish to coordinate or and organizational context on an individuals behavior interact with an agent that does. (6) Making an agent’s and of the symbiotic link between the behavior of the roles to be higher-level commitments of the agent that individual agents and that of the overall system (Jen- restrict its behavior, still leaving freedom for learning nings, 2000). In particular, it requires modeling be- and adaptation on lower-levels, instead of totally and havior of an agent as being defined or restricted by the rigidly prescribing the behavior. roles the agent plays in one or several organizations (Vazquez-Salceda et al., 2005). Role-based modelling 3.2 Distributed Resource Histories also provides the advantage of separation of concerns and in so design of complex systems (Cabri et al., In the UBIWARE vision, every resource is repre- 2004). The latter direction presents the need to enable sented by an agent. Among the responsibilities of the agents to communicate their intentions with respect to agent is monitoring the condition of the resource and
  • 5. Figure 2: The current core platform. the resource’s interactions with other components of source histories. (4) Enabling mining (utilizing intel- the system and humans. The beliefs storage of the ligent data mining and machine learning techniques) agent will, therefore, naturally include the history of of distributed histories. the resource, in a sense ”blogged” by the agent. Obvi- ously, the value of such a history is not limited to that 3.3 Peer-to-Peer Discovery particular resource. A resource may benefit from the information collected with respect to other resources Following the IEEE FIPA agent system model, the of the same (or similar) type, e.g. in a situation which UBIWARE platform is to include a system agent it faces for the first time while other may have faced called Directory Facilitator (DF). In UBIWARE, the that situation before. Also, mining the data collected Directory Facilitator maintains a mapping between and integrated from many resources may result in dis- agents and the roles they play. If the behavior model covery of some knowledge important at the level of of an agent X (see Section 3.1) prescribes the need of the whole ubiquitous computing system. interaction with another agent Y, the agent Y is always A straightforward approach would be maintaining specified by its role, not the name or another unique a central repository integrating the histories of all the identifier of a particular agent. Therefore, the agent X resources of the system. However, such an approach must contact the Directory Facilitator in order to dis- is often impractical in realistic dynamic applications cover the unique ID (needed for communication) of because even just keeping one agent informed of all the agent or agents playing the role needed. Also, be- the events and actions in the system would swamp cause every agent plays at least one role, DF naturally the available bandwidth, and also such agent would has a list of all the agents on the platform. This can be become a severe bottleneck and might render the re- used, e.g., when an agent needs some information and maining components unusable if it failed (Jennings, wants to broadcast the request for that information to 1993). A scalable solution requires mechanisms for all the agents on the platform (see Section 3.2). inter-agent information sharing and data mining on Existence of such a Directory Facilitator is an ef- integrated information which would allow keeping fective and efficient solution. However, DF obviously the resource histories distributed without need to copy presents a severe bottleneck in the system, and can those histories to a central repository. render the whole system unusable if it failed. To im- At present, we are working on the following im- prove the survivability of UBIWARE-based systems, portant research issues: (1) Development of mech- there has to be a complementary mechanism which anisms for representing the history of a resource in can be utilized in an exception situation where DF be- a system making it reusable for other resources and came for some reason unavailable. at the system-level. (2) Development of mechanisms After the system is deployed and operational for for effective and efficient sharing of information be- some time, a significant part of the DF knowledge, tween the agents representing different resources. (3) piece by piece, ends up in local knowledge storages Development of mechanisms for querying and inte- of different platform agents. The combination of the gration of responses from distributed, autonomous, local storages presents thus a kind of distributed direc- and, hence, inevitably semantically heterogeneous re- tory. Therefore, a Peer-to-Peer (P2P) mechanism im-
  • 6. plemented on such a distributed directory can work as On the level of inter-agent communication, we aim at the needed mechanism complementary to the central establishing some protocols for negotiation in differ- DF. Of course, replicating DF is another and proba- ent configurability cases. For example, when an agent bly simpler option. It would not, however, provide the changes its behavior, a check must be performed for same level of survivability as P2P. Also, in some busi- the consequences of this change for other compo- ness scenarios, it is possible that some of the services nents, and for who should be informed about this would prefer not to advertise themselves through the change. Also, there should be a mechanism for re- central DF altogether, for security or other reasons. stricting the range of possible adjustments to certain Therefore, P2P discovery of such services would not functionality of certain components in order to main- be an exception path but the only viable solution. tain the consistency in critical business processes. The objective here is the design of mechanisms An important issue is configurability of resource which will extend the scale of semantic resource adapters. There is a need for a methodology both discovery in UBIWARE with P2P discovery. Such for creating such adapters and for their run-time re- mechanisms have to enable an agent (1) to discover configuration. It is reasonable to expect, e.g., that agents playing a certain organizational role, (2) to dis- when a resource modifies the format of its output, the cover an agent (or agents) possessing certain needed existing adapter can be adjusted to this new format information, and (3) to discover resources (through without a need to build a new adapter from scratch. its agents) of certain type or possessing certain prop- Configuration of business processes poses a sepa- erties (e.g. a device in state X, a web-resource provid- rate problem. A business process is an abstract entity ing some information searched for, or a human with which mainly consists of a flow of messages between some specific skills). In all cases, existence of a cen- agents. There is nothing like a business process exe- tral DF is not assumed. Rather, the request is sent to cution engine. There could be a dedicated responsible all/some of the agents on the contact list of the agent agent, which would coordinate the involved agents, in question (ones with who it has a history of commu- resolve conflicts and exceptions. However, similarly nication, or at least about whom it heard from others). to the case of a centralized history storage (see Sec- Those agents can forward the request to all/some of tion 3.2), such a controller agent would become a se- the agents on their lists, and so on. vere bottleneck and might render the remaining com- ponents unusable if it failed. In a most scalable solu- 3.4 Configurability tion, a business process would be just a set of agents with some commitments, i.e. signed Service Level UBIWARE aims to be a platform that can be applied Agreements. In such autonomic medium, we will in different application areas. Therefore, the elements need a (re-)configuration mechanism for stable error- of the platform have to be adjustable, could be tuned tolerant operation of components leading to success- or configured allowing the platform to run different fully achieving the business goals. business scenarios in different environments. Such flexibility calls for existence of a special configura- 3.5 Security in UBIWARE tion layer of the platform. All building blocks of the platform, i.e. software agents, agent behaviors, re- The security is often seen as an add-on feature of a source adapters, etc, become subject to configuration. system. However, in many systems (and UBIWARE Also, a flexible system should have a long lifespan. is one of them), the system remains nothing more but Hence, the platform should allow extensions, compo- a research prototype, without a real potential of prac- nent replacements, and component adjustments dur- tical use, until an adequate security infrastructure is ing the operation time. In addition, every agent in embedded into it. UBIWARE will advance existing UBIWARE is self-aware and self-manageable entity. technologies to a qualitatively new level and bring Therefore, it may evolve with time and modify some to life new complex ubiquitous environments, where of its functional or non-functional properties. At the traditional approaches to manage security fall short. same time, we need a stable and predictable environ- Also, existing security measures for the technologies ment for running business scenarios. Thus, the adjust- on which UBIWARE relies, e.g. multi-agent, are not ment made to a component must also be propagated to in a mature stage and still require significant elabora- higher platform levels such as business processes and tion to mitigate associated risks. contracting. Also vice versa, a change in a business Traditional security goals like confidentiality, process may require some adjustments to be made to availability, reliability, integrity, manageability, ac- several participating components. countability, responsibility etc, together with conven- On the level of software design, we aim at defining tional measures and mechanisms that support secu- patterns for development of configurable elements. rity, do not cover all the needs and threats of new
  • 7. emerging computing environments. Ambient intelli- such an adapter. Instead, external services and appli- gence and ubiquity of information technologies have cation should be effectively utilized. Therefore, the tightened the digital and physical worlds to the ex- intelligence of a smart interface will be a result of col- tent when security becomes the ultimate issue. The laboration of multiple agents: the human’s agent, the major implication of penetrating ICTs on security is agents representing resources of interest (those to be that the risks and negative consequences of security monitored or/and controlled), and the agents of vari- threats become higher than ever. On the other hand, ous visualization services. This approach makes hu- the security infrastructure itself has to become per- man interfaces different from other resource adapters vasive, interoperable and intelligent enough to natu- and indicates a need for devoted research. There is rally fit UBIWARE. The security cannot be added to a need to enable creation of such smart human inter- the UBIWARE platform later but the design decisions faces through flexible collaboration of an Intelligent regarding security have to be thoroughly correlated GUI Shell, various visualization modules, which we with the requirements, characteristics and design of refer to as MetaProvider-services, and the resources the platform, due to mutual impact on resulting fea- of interest (Khriyenko, 2007). tures of UBIWARE. A MetaProvider is responsible for acting as a por- The main objective here is the design of an in- tal so that various relevant resources can register on frastructure for policy-based optimal collecting, com- it, for data integration, for context-dependent filter- posing, configuring and provisioning of security mea- ing (inclusion of only relevant resources and relevant sures in multi-agent systems like UBIWARE (Nau- properties of those resources), and for creating visu- menko et al., 2007). This work is to follow the gen- alizations of data. The GUI shell is, in turn, responsi- eral UBIWARE vision – configuring and adding new ble for context-dependent selection of MetaProviders, functionality on-the-fly by changing high level declar- communication with them, and cross-MetaProvider ative descriptions. Regarding security, this means that browsing and integration. UBIWARE will be able of smoothly including new, Based on such an approach, an infrastructure will and reconfiguring existing, security policies (simi- be embedded into UBIWARE enabling effective real- lar to behavior models) and mechanisms (similar to ization of the following system functions: (1) Visu- RABs) in response to the dynamically changing en- alization of data provided by a service in response to vironment. The optimal state is always a tradeoff be- a request. (2) Search, retrieving and visualization of tween security and other qualities like performance, data required by a human expert. (3) Providing access functionality, usability, applicability and other. to contextual information, and visualization of it. (4) Visualization of resource registration, configuration, 3.6 Smart Interfaces and security policy establishment processes. (5) Re- source discovery via MetaProviders (because they act In UBIWARE, humans are important resources, as thematic portals). which can play several distinct roles: (1) User – one getting some information or services from other re- sources. (2) Resource under care – one under online 4 Industrial cases care of the integrated system (e.g. monitoring the health of an employee). (3) Service provider – one providing services to other resources (e.g. a main- This section describes several industrial cases (ap- tenance expert). (4) UBIWARE administrator – one plication areas) that we consider in our project. These monitoring and configuring the integrated system. cases are proposed by UBIWARE industrial part- ners and are being analyzed, designed and prototyped Obviously, humans need graphical interfaces to based on the UBIWARE platform. These cases pro- interact with the rest of the system. The same person vide examples of benefits that a smart semantic mid- can play several roles, switch between them depend- dleware can bring into various industries. ing on the context, and, in result, require different in- terfaces at different times. In addition, a UBIWARE- based system presents a large integration environment 4.1 Power Network Maintenance with potentially huge amounts of heterogeneous data. Therefore, there is a need for tools facilitating infor- One of the project’s partners is a vendor of hardware mation access and manipulation by humans. and software for power networks. With respect to From the UBIWARE point of view, a human inter- UBIWARE, this partner’s main area of interest is in face is just a special case of a resource adapter. We be- extending, mainly through integration with external lieve, however, that it is unreasonable to embed all the resources, the functionality of its existing software data acquisition, filtering and visualization logic into systems. These systems provide a graphical view over
  • 8. the power network, data acquisition from the substa- system based on UBIWARE could solve this issue. tions and remote control over the relays, switches, etc. The information flow will go through the agents rep- They also include implementations of various algo- resenting the sub-networks on the UBIWARE plat- rithms: for fault localization, for calculation of opti- form. Utilization of semantic technologies will al- mal reconfiguration of the network and other. low such interoperability even if the sub-networks The UBIWARE technology could allow connect- use software systems from different vendors, and thus ing to the existing products some new system intel- maybe different data formats and protocols. ligence tools, for example, statistical and data min- One more scenario is related to a new business ing tools. One case that is considered is about possi- model. At present, all expertise of the company gets bility of using data mining techniques for automated embedded into hardware or software systems and sold interpretation of the situation in the power network. to the customers as it is. A new business model would The motivating issue is that a certain condition, e.g. be to start own Web-service providing implementa- a fault, in the power network causes a series of alert tion of certain algorithms, so the customers will uti- messages to be sent to the operation center. It remains lize those algorithms online when needed. The com- a responsibility of a human operator to understand pany will be always able to update algorithms, add the reason underlying such a sequence of alert mes- new, and so on. UBIWARE will ensure interoperabil- sages. Based on UBIWARE, a system could be cre- ity and coordination between such Web-service and ated allowing that: (1) alert data is automatically col- customers’ software systems, and also a relative ease lected, (2) the experts are able to annotate sequences of implementation of such a solution – because it will of events with their reasons, (3) data mining algo- not require changes in existing software systems, only rithms are applied to discover some patterns, and (4) extension with the UBIWARE platform. Noticeable the operator is provided with an interface giving a that, if semantically defined, such Web-service can more structured view of events (e.g. filtered based on potentially be utilized across the globe even by the the source of event) and including the system’s inter- customers who never purchased any of the company’s pretation (from the models built) of what is the mean- hardware or software. ing of the situation and its reason. The next scenario is related to the possibility of in- In collaboration with this partner, we analysed tegrating data, which is currently utilized in the power further the potential add-value that the company and network management (network structure and config- their customers, i.e. electrical companies, could re- uration, feeder relay readings), with contextual in- ceive from introducing UBIWARE into their business. formation from the external sources. Such integra- Below, we sketch several scenarios when UBIWARE tion can be used in at least three tasks. The first can enable new features, or help otherwise. is risk analysis. Information about weather condi- One scenario is related to extending the user inter- tions, ongoing forest works, or forest fires can be faces, so that various groups of users could get flexi- used for evaluating existing threats for the power net- ble access to data and functionality present in the ex- work. This may be used to trigger an alert state for isting products. Traditionally, those software products the maintenance team, or even to do a precaution- are only used inside the walls of operation centers by ary reconfiguration of the network to minimize pos- the network operators, through proprietary user inter- sible damage. The second is facilitation of fault lo- faces. The data and functionality of those systems, calization. The output of fault localization algorithms however, has a value beyond that use. A UBIWARE- is not always certain. The information about threats based solution will enable a more ubiquitous and flex- for the power network that existed at the time when ible information access to data and algorithms and the fault occurred (which thus may have caused the will extend the user base to, e.g., maintenance work- fault) may greatly facilitate the localization. In some ers, management, etc. situations, contextual information alone may even be Another scenario arises from the fact that the sufficient for localization. The third is operator in- medium-voltage sub-networks of the integral network terface enhancement. Contextual information may are usually owned, controlled and maintained then by be used also just to extend the operators’ view of some local companies. It is noticeable that the oper- the power network. For example, satellite imagery ation centers of different companies have no connec- can be used for geographic view (instead of locally tion to each other, so information exchange among stored bitmaps as it is in the current systems); also, them is nearly impossible. In the case of a fault af- dynamically-changing information can be accessed fecting two different sub-networks, such information and represented on the interface. exchange, though, may be very important, for all of The last scenario is about the possibility of trans- fault localization, network reconfiguration, and net- ferring the knowledge of human experts to automated work restoration. Introducing an inter-organizational systems, by means of various data mining tools. In
  • 9. the power network management case, one scenario mats and data structures, which were bound to on- that seems to be highly appropriate for such knowl- tology, may require re-adaptation (i.e. adapter re- edge transfer is the following. In present, it is always configuration) to become consistent with the inte- a decision of a human expert which of the existing grated storage and applications. From a life-time fault localization algorithms will perform the best in perspective, the complexity of business processes be- the context of the current configuration of the power tween the company and the customer may become an- network and the nature of the fault. Such decisions other obstacle for updates and renovation of the ser- made by an expert along with the input data could, be vice infrastructure. It is because such changes are forwarded to a learning Web-service. After a suffi- hard to trace and, therefore, it might be difficult to cient learning sample, this Web-service could start to analyze their impact on the overall system. be used in some situations instead of the human ex- pert, e.g. in situations when a faster decision is needed or when the expert is unavailable. 4.3 Telecom Operator’s Service Desk 4.2 Maintenance of Paper Machines One more project’s partner is a provider of telecom- Another of the project’s partners is a supplier of ma- munication services, both wireless and fixed-line. chinery and automation systems for a set of industries With respect to UBIWARE, this partner’s main area including the paper industry. With respect to UBI- of interest is in possibility of constructing, mainly WARE, this partner’s main areas of interest are in through integration of existing components, systems information integration and analytical data process- that would (partially) automate some traditionally ing. To support customers with additional informa- manual processes. Such a manual process to be con- tion along the product (a paper machine) lifecycle, sidered is a Service Desk. Among other things, the the company foresees the need for intelligent prod- company’s service desk is a point of contact for the uct history management. Such a history is supposed customers seeking to report unavailability of service to integrate alert reports, experts’ diagnoses, mainte- (mobile or fixed-line phone connection, IDSL Inter- nance work performed, maintenance costs, and other net connection, and other) or another problem. If the types of information. problem is at the customer side, the service desk ex- Every paper machine, installed at a customer’s perts are supposed to provide instructions for trou- site, is equipped with a set of sensors and embedded bleshooting it. The whole interaction is performed intelligence for observing the state of the machine and over the phone, i.e. the customer calls, explains the alarming when an exceptional situation occurs. The problem to a service desk worker, probably gets trans- alarm information is forwarded to the central hub for ferred to a relevant expert, tries what the expert rec- diagnostics and decision making. ommends, reports the results, and so on. In result, First of all, UBIWARE can provide means for the waiting times for customers to get through to the proactive integration of alarm data with different cor- service desk are long, while the effectiveness of the porate information systems, such as the engineering troubleshooting process is quite low. database, the financial database. This will give a Equipping the service desk with an UBIWARE- common basis for product history management and based solution could enable the following new func- further intelligent data processing. UBIWARE can tionality: (1) Customers get possibility to report their also enable integration with external web services to problems through a web-service interface. (2) The provide more powerful analytical processing of data. system could collect, integrate and present to the ex- Also, the flexibility and ease of extension via incor- pert all the available information on the customer poration of external functionality will enable evolu- (type of connection, address, etc), removing a need to tion of the service infrastructure to meet the customer spend time asking that information during the phone needs in a sustainable fashion. The UBIWARE plat- conversation. (3) Automated analysis of related prob- form will also enable a high level of security in the lem reports could enable fast responses like: ”it is collaborative work of the company and its customers. a network problem, we have received other similar Among the central problems to be solved by UBI- reports from your area, we are already working on WARE, there are those related to the evolution of the this problem”. In the case of a non-working Internet service infrastructure. During the paper machine op- connection, some relevant data can be acquired, i.e. eration lifecycle, formats of messages or algorithms sensed, from the network side. Also, some modems for issuing alarms may change. Furthermore, some can be configured remotely by uploading a configura- changes to the supporting ERP or other automation tion file from the network. In such a case, a fully au- systems may take place. In other words, data for- tomatic troubleshooting could even be implemented.
  • 10. 5 Conclusions considered before. However, the introduction of the UBIWARE concept has led to realizing that some au- In this paper, we described our vision of a so- tomation can be possible after all. lution to meet the middleware needs of the domain of the Internet of Things. We aim at a new gener- ation middleware platform which will allow creation REFERENCES of self-managed complex systems, in particular indus- trial ones, consisting of distributed, heterogeneous, Brock, D. and Schuster, E. (2006). On the semantic web of shared and reusable components of different nature. things. In Semantic Days 2006, Stavanger, Norway, Self-management of systems is one of the central April 26-27. themes in the EU 7-th Framework ICT Programme Buckley, J. (2006). From RFID to the Internet of Things: (2007-2013). The Objective ”Service and Software Pervasive networked systems. In Report on the Con- Architectures” of the Challenge 1 ”Network and Ser- ference organized by DG Information Society and Me- dia, Networks and Communication Technologies Di- vice Infrastructures” includes the need for strate- rectorate, Brussels, March 6-7. gies and technologies enabling mastery of complex- Cabri, G., Ferrari, L., and Zambonelli, F. (2004). Role- ity, dependability and behavioral stability, and also based approaches for engineering interactions in the need for integrated solutions supporting the net- large-scale multi-agent systems. In Software Engi- worked enterprise. Also, the Objective ”The Net- neering for Multi-Agent Systems II, LNCS v.2940, work of the Future” of this Challenge includes the pages 19–25. Springer. need for re-configurability, self-organization and self- Jennings, N. (1993). Commitments and conventions: The management for optimized control, management and foundation of coordination in multiagent systems. flexibility of the future network infrastructure. In Knowledge Engineering Review, 8(3):223–250. addition, the whole Challenge 2 ”Cognition, Inter- Jennings, N. (2000). On agent-based software engineering. action, Robotics” has as its motivation the need for Artificial Intelligence, 117(2):277–296. creating ”artificial systems that can achieve general Jennings, N. (2001). An agent-based approach for building goals in a largely unsupervised way, and persevere complex software systems. Communications of the under adverse or uncertain conditions; adapt, within ACM, 44(4):35–41. reasonable constraints, to changing service and per- Katasonov, A. and Terziyan, V. (2007). SmartResource plat- formance requirements, without the need for exter- form and Semantic Agent Programming Language (S- nal re-programming, re-configuring, or re-adjusting”. APL). In Proc. 5th Conf. Multi-Agent Technologies, It is noticeable that the systems (stand-alone or net- LNAI v.4687, pages 25–36. Springer. worked) monitoring and controlling material or infor- Kephart, J. O. and Chess, D. M. (2003). The vision of auto- mational processes is one of the three focus areas of nomic computing. IEEE Computer, 36(1):41–50. this Challenge. Khriyenko, O. (2007). 4i (FOR EYE) technology: Intel- According to a more global view to the Internet of ligent interface for integrated information. In Proc. Things technology, UBIWARE will classify and reg- 9th Conf. Enterprise Information Systems, Volume 5, pages 278–281. ister various ubiquitous devices and link them with web resources, services, software and humans as busi- Lassila, O. (2005). Using the Semantic Web in mobile and ubiquitous computing. In Proc. IFIP WG12.5 Conf. ness processes’ components. UBIWARE will also Industrial Applications of Semantic Web, pages 19– consider sensors, sensor networks, embedded sys- 25. Springer. tems, alarm detectors, actuators, communication in- Mamei, M. and Zambonelli, F. (2006). Field-Based Coor- frastructure, etc. as ”smart objects” and will provide dination for Pervasive Multiagent Systems. Springer. similar care to them as to other resources. Naumenko, A., Katasonov, A., and Terziyan, V. (2007). A The innovative nature of UBIWARE is demon- security framework for smart ubiquitous industrial re- strated well by the very idea of the case in Section sources. In Proc. 3rd Conf. Interoperability of En- 4.3, the smart service desk. An operator’s service terprise Software and Applications, pages 183–194. desk is an important service element which, however, Springer. still remains largely non-automated and thus has a Tamma, V., Aart, C., Moyaux, T., Paurobally, S., Lithgow- low effectiveness. Any automation of such a process Smith, B., and Wooldridge, M. (2005). An ontological would require integration and complex interoperabil- framework for dynamic coordination. In Proc. 4th In- ity of highly heterogeneous components, including ternational Semantic Web Conference’05, LNCS vol. 3729, pages 638–652. Springer. hardware (e.g. customer’s equipment), software and database systems, and humans (the customer, the ser- Vazquez-Salceda, J., Dignum, V., and Dignum, F. (2005). Organizing multiagent systems. Autonomous Agents vice desk operator, and experts). In result, the possi- and Multi-Agent Systems, 11(3):307–360. bility of automation of the service desk was not really