SlideShare a Scribd company logo
ARCADE - Abstraction and Realization of  Complex Event Scenarios Using Dynamic Rule Creation Ashish A Kulkarni [email_address]
Motivation
The Industry Scenarios Scenario 1: Measurement value from equipment goes beyond the threshold. Scenario 2: Measurement values from multiple equipment exceed their respective thresholds. Scenario 3: At a given instant of time, 'n' out of 'm' equipment in a group are above their respective threshold values for certain period of time. Scenario 4: The case of equipment going down: Absence of data for a certain period of time. Scenario 5: Case of frozen equipment: In a realistic scenario, it is expected to have white noise around mean data points. Non existence of it or in other words a flat curve of values from equipment should raise an alarm. Scenario 6: Case of bad equipment: The data values not meeting the expected quality is an indicator of the equipment going bad. Scenario 7: The rate of rise or fall of data points over a period of time is higher than expected.
Challenge – Bridging the IT-Business Gap IT Developer Business User
Where existing CEP tools lag Require too much work Can’t be used by Business users
What we observed ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Solution
Reusable Complex Event Templates ,[object Object],[object Object]
Industry Scenarios redefined ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dynamic Realization of templates Measurement value M1 from equipment E1 goes beyond the threshold T1 Measurement value ‘ temperature ’ from an equipment ‘ temperatureTransmitter ’ goes beyond the threshold ‘ 100 ’  Measurement value ‘ pH ’ from an equipment ‘ waterAcidity ’ goes beyond the threshold ‘ 6.5 ’
As-is vs Modified The as-is approach to realizing business event had a lot of IT dependence, was time consuming and tedious  The notion of complex event templates and instances significantly limits the IT intervention, simplifies business event realization and allows their dynamic life cycle management
Lifecycle Create Update Delete Read Activate Deactivate
Measurement Publication - Subscription
 

More Related Content

Viewers also liked

Light Intro to the Gene Ontology
Light Intro to the Gene OntologyLight Intro to the Gene Ontology
Light Intro to the Gene Ontology
nniiicc
 
ADM 316 Workshop 4 Slides
ADM 316 Workshop 4 SlidesADM 316 Workshop 4 Slides
ADM 316 Workshop 4 SlidesRuss Ray
 
COM 115 Workshop 3 Slides
COM 115 Workshop 3 SlidesCOM 115 Workshop 3 Slides
COM 115 Workshop 3 SlidesRuss Ray
 
COM 115 Workshop 2 Slides
COM 115 Workshop 2 SlidesCOM 115 Workshop 2 Slides
COM 115 Workshop 2 SlidesRuss Ray
 
Wikipedia - Community Deep Dive
Wikipedia - Community Deep DiveWikipedia - Community Deep Dive
Wikipedia - Community Deep Dive
Cathy Ma
 
User experience design
User experience designUser experience design
User experience design
Nissan Dookeran
 
IPC Media - Facebook Developers Garage
IPC Media - Facebook Developers GarageIPC Media - Facebook Developers Garage
IPC Media - Facebook Developers Garage
Cathy Ma
 
Query recommendation papers
Query recommendation papersQuery recommendation papers
Query recommendation papersAshish Kulkarni
 
COM 115 Workshop 1 Slides
COM 115 Workshop 1 SlidesCOM 115 Workshop 1 Slides
COM 115 Workshop 1 SlidesRuss Ray
 
Product camp
Product campProduct camp
Product camp
Cathy Ma
 
Learning to Link with Wikipedia
Learning to Link with WikipediaLearning to Link with Wikipedia
Learning to Link with WikipediaAshish Kulkarni
 
Introduction to Docker
Introduction to DockerIntroduction to Docker
Introduction to Docker
Nissan Dookeran
 

Viewers also liked (17)

Light Intro to the Gene Ontology
Light Intro to the Gene OntologyLight Intro to the Gene Ontology
Light Intro to the Gene Ontology
 
ADM 316 Workshop 4 Slides
ADM 316 Workshop 4 SlidesADM 316 Workshop 4 Slides
ADM 316 Workshop 4 Slides
 
User experience design
User experience designUser experience design
User experience design
 
COM 115 Workshop 3 Slides
COM 115 Workshop 3 SlidesCOM 115 Workshop 3 Slides
COM 115 Workshop 3 Slides
 
COM 115 Workshop 2 Slides
COM 115 Workshop 2 SlidesCOM 115 Workshop 2 Slides
COM 115 Workshop 2 Slides
 
Wikipedia - Community Deep Dive
Wikipedia - Community Deep DiveWikipedia - Community Deep Dive
Wikipedia - Community Deep Dive
 
tour
tourtour
tour
 
User experience design
User experience designUser experience design
User experience design
 
IPC Media - Facebook Developers Garage
IPC Media - Facebook Developers GarageIPC Media - Facebook Developers Garage
IPC Media - Facebook Developers Garage
 
Query recommendation papers
Query recommendation papersQuery recommendation papers
Query recommendation papers
 
COM 115 Workshop 1 Slides
COM 115 Workshop 1 SlidesCOM 115 Workshop 1 Slides
COM 115 Workshop 1 Slides
 
Product camp
Product campProduct camp
Product camp
 
Learning to Link with Wikipedia
Learning to Link with WikipediaLearning to Link with Wikipedia
Learning to Link with Wikipedia
 
Big data
Big dataBig data
Big data
 
Personal Brand
Personal BrandPersonal Brand
Personal Brand
 
Introduction to Docker
Introduction to DockerIntroduction to Docker
Introduction to Docker
 
Decision tables
Decision tablesDecision tables
Decision tables
 

Similar to Debs2011 ARCADE

Dcca study guide
Dcca study guideDcca study guide
Dcca study guide
Kamal Mouline
 
Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Problem management foundation - Lifecycle
Problem management foundation - Lifecycle
Ronald Bartels
 
Lecture 3 Statistical ProcessControl (SPC).docx
Lecture 3 Statistical ProcessControl (SPC).docxLecture 3 Statistical ProcessControl (SPC).docx
Lecture 3 Statistical ProcessControl (SPC).docx
smile790243
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recoveryJohn Brouillard
 
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxThreat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
herthalearmont
 
DS Crisis Management Foundation - Lifecycle
DS Crisis Management Foundation - LifecycleDS Crisis Management Foundation - Lifecycle
DS Crisis Management Foundation - Lifecycle
DS
 
Risk Assessment documentation templates are located within this se.docx
Risk Assessment documentation templates are located within this se.docxRisk Assessment documentation templates are located within this se.docx
Risk Assessment documentation templates are located within this se.docx
SUBHI7
 
Discrete Event Simulation in Healthcare
Discrete Event Simulation in HealthcareDiscrete Event Simulation in Healthcare
Discrete Event Simulation in Healthcare
ATALAN
 
Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...oxwocs
 
4 Questions only Question 6. I have answered part of the.docx
4 Questions only Question 6.     I have answered part of the.docx4 Questions only Question 6.     I have answered part of the.docx
4 Questions only Question 6. I have answered part of the.docx
tamicawaysmith
 
Business Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docxBusiness Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docx
RAHUL126667
 
Digital Transformation and Process Optimization in Manufacturing
Digital Transformation and Process Optimization in ManufacturingDigital Transformation and Process Optimization in Manufacturing
Digital Transformation and Process Optimization in Manufacturing
BigML, Inc
 
Smart Alarming Management
Smart Alarming ManagementSmart Alarming Management
Smart Alarming Management
Schneider Electric
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
Splunk
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
Digital Transformation EXPO Event Series
 
A Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software DefectsA Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software Defects
Chetan Hireholi
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
ISA Boston Section
 
Estimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative StudyEstimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative Study
IJERA Editor
 
Is this normal?
Is this normal?Is this normal?
Is this normal?
Theo Schlossnagle
 

Similar to Debs2011 ARCADE (20)

Dcca study guide
Dcca study guideDcca study guide
Dcca study guide
 
Problem management foundation - Lifecycle
Problem management foundation - Lifecycle Problem management foundation - Lifecycle
Problem management foundation - Lifecycle
 
Lecture 3 Statistical ProcessControl (SPC).docx
Lecture 3 Statistical ProcessControl (SPC).docxLecture 3 Statistical ProcessControl (SPC).docx
Lecture 3 Statistical ProcessControl (SPC).docx
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recovery
 
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxThreat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
 
DS Crisis Management Foundation - Lifecycle
DS Crisis Management Foundation - LifecycleDS Crisis Management Foundation - Lifecycle
DS Crisis Management Foundation - Lifecycle
 
Risk Assessment documentation templates are located within this se.docx
Risk Assessment documentation templates are located within this se.docxRisk Assessment documentation templates are located within this se.docx
Risk Assessment documentation templates are located within this se.docx
 
Discrete Event Simulation in Healthcare
Discrete Event Simulation in HealthcareDiscrete Event Simulation in Healthcare
Discrete Event Simulation in Healthcare
 
Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...Cigdem gencel persistence in poor estimating in software engineering- whys an...
Cigdem gencel persistence in poor estimating in software engineering- whys an...
 
4 Questions only Question 6. I have answered part of the.docx
4 Questions only Question 6.     I have answered part of the.docx4 Questions only Question 6.     I have answered part of the.docx
4 Questions only Question 6. I have answered part of the.docx
 
Business Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docxBusiness Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docx
 
Digital Transformation and Process Optimization in Manufacturing
Digital Transformation and Process Optimization in ManufacturingDigital Transformation and Process Optimization in Manufacturing
Digital Transformation and Process Optimization in Manufacturing
 
Smart Alarming Management
Smart Alarming ManagementSmart Alarming Management
Smart Alarming Management
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 
A Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software DefectsA Machine Learning approach to predict Software Defects
A Machine Learning approach to predict Software Defects
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 
Theories of Accident Causation
Theories of Accident Causation Theories of Accident Causation
Theories of Accident Causation
 
Estimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative StudyEstimating Reliability of Power Factor Correction Circuits: A Comparative Study
Estimating Reliability of Power Factor Correction Circuits: A Comparative Study
 
Is this normal?
Is this normal?Is this normal?
Is this normal?
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Debs2011 ARCADE

  • 1. ARCADE - Abstraction and Realization of Complex Event Scenarios Using Dynamic Rule Creation Ashish A Kulkarni [email_address]
  • 3. The Industry Scenarios Scenario 1: Measurement value from equipment goes beyond the threshold. Scenario 2: Measurement values from multiple equipment exceed their respective thresholds. Scenario 3: At a given instant of time, 'n' out of 'm' equipment in a group are above their respective threshold values for certain period of time. Scenario 4: The case of equipment going down: Absence of data for a certain period of time. Scenario 5: Case of frozen equipment: In a realistic scenario, it is expected to have white noise around mean data points. Non existence of it or in other words a flat curve of values from equipment should raise an alarm. Scenario 6: Case of bad equipment: The data values not meeting the expected quality is an indicator of the equipment going bad. Scenario 7: The rate of rise or fall of data points over a period of time is higher than expected.
  • 4. Challenge – Bridging the IT-Business Gap IT Developer Business User
  • 5. Where existing CEP tools lag Require too much work Can’t be used by Business users
  • 6.
  • 8.
  • 9.
  • 10. Dynamic Realization of templates Measurement value M1 from equipment E1 goes beyond the threshold T1 Measurement value ‘ temperature ’ from an equipment ‘ temperatureTransmitter ’ goes beyond the threshold ‘ 100 ’ Measurement value ‘ pH ’ from an equipment ‘ waterAcidity ’ goes beyond the threshold ‘ 6.5 ’
  • 11. As-is vs Modified The as-is approach to realizing business event had a lot of IT dependence, was time consuming and tedious The notion of complex event templates and instances significantly limits the IT intervention, simplifies business event realization and allows their dynamic life cycle management
  • 12. Lifecycle Create Update Delete Read Activate Deactivate
  • 14.  

Editor's Notes

  1. The chemical and petroleum industry is facing a lot of challenges that are economical, environmental, and technical or operations related. There is overwhelming amounts of complex data from instrumented equipment. Need for near real time collaborative decision making, production costs, integrated operations, improved asset management are some of the main focus areas in this industry. RFID and sensors help in gathering various data points from the equipment. Continuous monitoring of this equipment for performance, and downtime is critical from operations perspective. This involves continuously monitoring the three phase flow of sediments (water, oil and gas) retrieved from reservoirs, calculation of gas to oil ratio (GOR) and comparing the well potential with actual output, detection of wells that are not performing properly, computing flow rates at multiple choke valves, identifying unacceptable drift during well performance monitoring. Water is increasingly becoming a scarce resource with no substitute. It is ridden with many issues mainly concerning ineffective usage, manual quality and quantity readings and close linkage with energy and carbon management as pumping water consumes power and generates greenhouse gases. In the water treatment facilities of the future, it will be imperative to apply advanced analytics to water quality in real time. Water quality analyzers collect many instrumented parameters like turbidity, conductivity, pH, chlorine residual, pressure, temperature, ammonia, oxidation -reduction potential and total organic carbon. It is desirable to monitor the pH variance for example and detect as it goes beyond acceptable thresholds. The input to such a system can even come from or the output can go to advanced analytics system, or to enterprise asset management systems, or real time control systems.
  2. In the world of integrated operations, there is also a strong driver to bridge the gap between business and IT. The business would like to continuously monitor their business operations, and be able to change what they are looking at with minimal or no intervention from their IT. They want to be able to do this at real time. It is like looking through the kaleidoscope at the different patterns by varying the mirror angle. Of course it is not always a pretty picture that the patterns show. Sometimes the patterns reveal interesting trends that might help the business to cross-sell especially true of product sales, retail, supply-chain and similar businesses. At other times, the event patterns disclose potentially harmful trends, faulty equipment or an equipment about to go down. And at yet other times, they aid in identifying frauds or their likelihood. By observing these events, the business can control its inventory, change its manufacturing process, raise an asset maintenance order, alert key stake holders or take other appropriate action. The ability to control and vary what they are looking at not only saves them IT services cost but lets them take immediate advantage of business opportunities and react to impending breakdowns and failures. In the complex event scenarios that we identified above, we observed that the business was often interested in varying certain facets of the complex event scenario definition. Some wanted to monitor the pH of water against a threshold of 6.8 while others wanted to monitor it for a lesser threshold. Some wanted a level 1 alert on the temperature of a transmitter reaching certain value 1, a level 2 alert on the temperature breaching value 2 and be able to vary these thresholds on temporal and need basis.
  3. A complex event definition is composed of a set of input events and a set of rules. The input event comes from an Event Source . If we look back at the business event scenario 1 that we identified, the measurement M1 from equipment E1 is the input event; equipment being the event source. The rule is to check if the measurement value exceeds the threshold. Similarly we can identify the measurements and rules for the other business event scenarios. Alternately we can also say that the scenario parameters are of two types- Measurement type and Rule type. This distinction is quite useful. This enables us to define a publication – subscription architecture for the measurement type parameters. When a new complex event instance is created and activated, we subscribe to the scenario parameter instances of the measurement type parameters. There is a corresponding publish model around the event source as well. Whenever the event source generates a measurement value, it is published for all the subscribing complex event instances to receive and act on it. There is also an intermediate step of Event Adaptation . Event adaptation involves creation of an event from the measurement value in a format expected by the underlying CEP runtime engine The other important blocks in the figure are the Event Information Management Services that map to the CRUD operations around the complex event templates and instances. The Query Services allow querying for the complex event templates, instances, scenario parameters, parameter instances and other artifacts. Event Orchestration Services map to the CEP tooling for creating complex event templates, and the Notification Services enable notification when a complex event is detected. There is an adaptation before the Event Sink to transform the complex event in a format expected by the sink. Event sink is a consumer of the business event. The Event Repository maps to the persistent store that we discussed. Together with the Event Topic/Channel Registry it helps in maintaining the measurement subscriptions. The subscriptions are live as long as there is at least one complex event instance receiving events through that subscription. When all the instances subscribing to a measurement are deactivated, the subscription is no longer needed and can be removed.