This document provides an executive summary of a whitepaper on engineering complex systems to build smart plants in a smart grid. It discusses the rise of the industrial internet of things (IIoT) and the increased connectivity and complexity it will bring. Successfully developing the IIoT will require new design methodologies for systems of systems, as well as broad technical standards. Key aspects that will be important include requirements-driven engineering, systems engineering practices like collaboration and continuous validation/verification, and strategic reuse of components.
Automation's Perfect Storm! These Changes Aren't Coming, They're Here!Walt Boyes
Process manufacturing is facing a perfect storm of changes: Millenials, Mobile Devices, the Internet of Things, Big Data and Complex Systems Analysis, new, smarter sensors, smarter more agile control systems...the use of apps like Legos...and it is all going to hit at once over the next five years. These are the trends that will change our lives.
Cyber Physical System: Architecture, Applicationsand Research ChallengesSyed Hassan Ahmed
This document discusses cyber physical systems (CPS), including key applications like healthcare, transportation, and infrastructure. It proposes an architecture for CPS with modules for sensing, data management, next generation internet connectivity, service awareness, application functions, and actuation. It also discusses security and privacy challenges for CPS given their integration of physical and computational systems. Open research challenges are presented in areas like QoS-aware communication protocols, resource management, power management, simulation tools, and testbed implementations.
FRIEND: A Cyber-Physical System for Traffic Flow Related Information aggrEgat...samy_tawab
The document proposes FRIEND, a cyber-physical system to aggregate and disseminate traffic flow information using a vehicular ad-hoc network. FRIEND uses smart cat's eyes, roadside units, and vehicles to collect data on traffic speed, position and incidents. It detects incidents using lane changes reported to roadside units. Information on incidents and traffic is propagated to nearby vehicles using two stages - direct notifications, and tracking the head and tail of backups. The system was evaluated in a simulator and can classify applications. FRIEND aggregates real-time traffic data to provide drivers with accurate traffic information using existing infrastructure.
The document contains summaries of several papers related to automation and Internet of Things technologies:
1. Several papers propose systems for vehicle tracking and accident detection using GPS, GPRS and GSM to send location and speed data to emergency services.
2. Other papers discuss intelligent street lighting systems using Zigbee wireless sensors to optimize lighting and detect failures, as well as hybrid wired/wireless networks for greenhouse management.
3. Additional papers cover topics like driving behavior detection using accelerometers and Zigbee networks, remote appliance control using Android phones, and a Zigbee-based intelligent helmet system for coal miners.
Whats new at Internet of Things area? Take a look at the latest IoT news and updates in our fresh IoT digest.
Don't forget to subscribe not to miss next month IoT digest.
Check our blog for more: https://www.eliftech.com/blog
Architectures for Cyber-Physical Systems, or Why Ivan Doesn’t Want to GraduateIvan Ruchkin
A fresh multidisciplinary research and engineering area of Cyber-Physical Systems (CPSs) lies on an intersection of more traditional fields, like mechanical and electrical engineering, and newer approaches from AI, ubiquitous computing, and software engineering. Although modeling is a core method in these areas, the concrete mindsets and methods for it are very diverse, which makes system-level reasoning across models more complicated. For instance, it is difficult to predict how smoothing a control algorithm represented in Simulink would affect schedulability guarantees provided by a rate-monotonic analysis model. Conveniently, software architecture is well-known for reconciling concerns by loosening up model semantics, which makes it a promising tool for model-based design of CPSs. This talk discusses several examples from the automotive and robotics domains to expose the challenges of using heterogeneous models and how software architecture might help alleviate those. All these considerations will be linked to the mysterious second part of the title.
Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
An ambient assisted-living emergency system exploits cloud and fog computing, an outdoor positioning mechanism, and emergency and communication protocols to locate activity-challenged individuals.
Automation's Perfect Storm! These Changes Aren't Coming, They're Here!Walt Boyes
Process manufacturing is facing a perfect storm of changes: Millenials, Mobile Devices, the Internet of Things, Big Data and Complex Systems Analysis, new, smarter sensors, smarter more agile control systems...the use of apps like Legos...and it is all going to hit at once over the next five years. These are the trends that will change our lives.
Cyber Physical System: Architecture, Applicationsand Research ChallengesSyed Hassan Ahmed
This document discusses cyber physical systems (CPS), including key applications like healthcare, transportation, and infrastructure. It proposes an architecture for CPS with modules for sensing, data management, next generation internet connectivity, service awareness, application functions, and actuation. It also discusses security and privacy challenges for CPS given their integration of physical and computational systems. Open research challenges are presented in areas like QoS-aware communication protocols, resource management, power management, simulation tools, and testbed implementations.
FRIEND: A Cyber-Physical System for Traffic Flow Related Information aggrEgat...samy_tawab
The document proposes FRIEND, a cyber-physical system to aggregate and disseminate traffic flow information using a vehicular ad-hoc network. FRIEND uses smart cat's eyes, roadside units, and vehicles to collect data on traffic speed, position and incidents. It detects incidents using lane changes reported to roadside units. Information on incidents and traffic is propagated to nearby vehicles using two stages - direct notifications, and tracking the head and tail of backups. The system was evaluated in a simulator and can classify applications. FRIEND aggregates real-time traffic data to provide drivers with accurate traffic information using existing infrastructure.
The document contains summaries of several papers related to automation and Internet of Things technologies:
1. Several papers propose systems for vehicle tracking and accident detection using GPS, GPRS and GSM to send location and speed data to emergency services.
2. Other papers discuss intelligent street lighting systems using Zigbee wireless sensors to optimize lighting and detect failures, as well as hybrid wired/wireless networks for greenhouse management.
3. Additional papers cover topics like driving behavior detection using accelerometers and Zigbee networks, remote appliance control using Android phones, and a Zigbee-based intelligent helmet system for coal miners.
Whats new at Internet of Things area? Take a look at the latest IoT news and updates in our fresh IoT digest.
Don't forget to subscribe not to miss next month IoT digest.
Check our blog for more: https://www.eliftech.com/blog
Architectures for Cyber-Physical Systems, or Why Ivan Doesn’t Want to GraduateIvan Ruchkin
A fresh multidisciplinary research and engineering area of Cyber-Physical Systems (CPSs) lies on an intersection of more traditional fields, like mechanical and electrical engineering, and newer approaches from AI, ubiquitous computing, and software engineering. Although modeling is a core method in these areas, the concrete mindsets and methods for it are very diverse, which makes system-level reasoning across models more complicated. For instance, it is difficult to predict how smoothing a control algorithm represented in Simulink would affect schedulability guarantees provided by a rate-monotonic analysis model. Conveniently, software architecture is well-known for reconciling concerns by loosening up model semantics, which makes it a promising tool for model-based design of CPSs. This talk discusses several examples from the automotive and robotics domains to expose the challenges of using heterogeneous models and how software architecture might help alleviate those. All these considerations will be linked to the mysterious second part of the title.
Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
An ambient assisted-living emergency system exploits cloud and fog computing, an outdoor positioning mechanism, and emergency and communication protocols to locate activity-challenged individuals.
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...Gilt Tech Talks
Trillion sensors will enable abundance by solving global problems through exponential technologies like networked sensors. The document outlines a roadmap to accelerate sensor development from prototypes to high volumes needed for global impact. This includes collecting visions for new applications, developing common sensing platforms, using crowd-funding and competitions to incentivize development. Trillion sensors by 2023 could create over 100 million new jobs and revolutionize industries like healthcare through personalized monitoring.
Schneider Electric is a digital transformation leader for energy management and automation. ... EcoStruxure™, Schneider Electric's open, interoperable, IoT-enabled system architecture and platform, is the unifying experience among our lines of business and services.
Revue de presse IoT / Data du 28/01/2017Romain Bochet
Bonjour,
Voici la revue de presse IoT/data/energie du 28 janvier 2017.
Cette semaine au programme :
- 3 New Technologies Changing IoT and Remote Power
- 7 Reasons Why IIoT Projects Fail
- Energy is the new new internet
- Street lights will learn from the bigger picture in IBM, Echelon IoT partnership
- We’re Building a World-Size Robot, and We Don’t Even Realize It
- This is the year of the Internet of ‘SOME’ Things - Data Economy
Je suis preneur d'autres artices / sources !
Bonne lecture !
Mike McBride will provide a look at the Industrial IoT (IIoT) landscape and the OT/IT convergence. He will cover several use cases including healthcare, entertainment and smart buildings. He will cover the challenges IIoT networking faces with emerging technologies and how edge computing will provide increased performance, security and reliability. Mike will discuss the various Edge Computing standards & opensource forums along with proposed architectures. And Mike will present new solutions being proposed (ICN, slicing, Blockchain) to support the bandwidth, latency and security requirements within Industrial verticals.
About the speaker: As Sr. Director of Innovation & Strategy, within Huawei's IP Network BU, Mike leads Industrial IoT, Edge Computing and IP/SDN architecture, standardization, and strategy across product lines and industry forums. He leads architecture and standardization activities within the IIc and BBF and has served as an IETF Working Group chair for 15 years. Mike has led emerging technology projects within opensource communities and played a key role in the formation of OPEN-O (Now ONAP). He is an Ericsson alum where he developed and directed SDN/NFV network architectures. And for many years with Cisco, Mike supported customers, worked in development teams and managed mobility, wireless and video projects across BUs. Mike began his career supporting customers at Apple Computer. He resides in Orange County, CA
The document discusses the use of IoT in the energy industry. It describes how IoT can be applied to remotely monitor energy assets, automate processes, integrate renewable energy sources with the grid, and help consumers reduce energy consumption through smart meters and decision making. Some benefits of IoT include improved reliability, reduced costs and labor, and more eco-friendly measures. Potential challenges involve security, connectivity, integration complexity. Edge computing and infrastructure modernization are proposed as solutions.
This document discusses opportunities for the Internet of Things (IoT) and big data. It notes that IoT has huge opportunities across many industries like industrial equipment, oil and gas, automotive, retail, healthcare, smart homes and cities. However, it also faces big challenges around security, infrastructure, privacy and governance. It argues that leveraging data utility, edge processing, and incorporating metadata can help address these challenges and maximize the benefits of IoT. Specific opportunities discussed include supply chain visibility, telehealth services, compliance monitoring, insurance, buildings management, and regional considerations.
From The Guardian to Cisco, big business to small, it seems that everybody is talking about the Internet of Things — but what exactly is IoT and why does it matter?
Taking a deep dive, we explore the many faces of IoT in Healthcare. Technology research and advisory company, Gartner, currently place the Internet of Things at the peak of inflated expectations and there are certainly challenges. But IoT also holds real promise for healthcare and it is already making an impact today.
We demonstrate why the Internet of Things has a far reaching impact across all determinants of health and how it could lead to a broader model of healthcare. We look at some of the technologies that are available to buy or that are already in development today, whilst also exploring some of the very real challenges that integrating such technologies into healthcare presents. Finally, we offer some ideas about how you can get involved, whether you are a healthcare professional or not.
Technology Sector Reshaping In The Downturn 20110818Trond Johannessen
Hewlett Packard announced it would spin off its PC hardware business, fueling speculation about future acquisitions. The document discusses how some technology companies are well-positioned during the economic downturn while others face disadvantages. It provides a table outlining potential acquirers and acquisition targets in the sector.
How Service-Oriented Drive Deployments improve VSD Driveline UptimeSchneider Electric
Variable Speed Drives (VSDs) have proliferated and are now installed in large numbers throughout various industries. However, since these technologies are relatively new, not much thought has been given to the proper integration of these drives, nor have their potential energy savings and business continuity entitlements been fully realized. This paper examines how the intelligence within VSDs can be leveraged to perform predictive maintenance so that plant uptime can improve.
Vinod Khosla: “Smart Grid” or “Smart Hype” — An Analytical Perspective From a...VentureBeat
This document discusses the opportunities and hype around smart grids. It notes that while smart meters and demand response can provide some benefits, their impact may be limited. True transformation of the grid will require more fundamental changes like new power electronics, ubiquitous storage, and an evolvable, resilient architecture designed for open standards and competition. Rather than focus on short-term fixes or existing technologies, we should ask how new devices could make today's wisdom obsolete and dramatically increase certainty on the grid. The needs of the future grid are hard to predict, so it's important to design for flexibility and manageability.
IRJET- Earthquake Early Warning System for AndroidIRJET Journal
This document describes the development of an earthquake early warning system for Android devices. The system uses sensors in smartphones to detect earthquake vibrations and differentiate them from human motion. When an earthquake is detected, a warning is sent to other smartphones via a network. The system aims to enhance current warning systems by leveraging rising mobile and sensor technologies. It discusses developing smartphone software to capture sensor data and perform analytics to identify earthquakes. Evaluation shows smartphones can accurately detect earthquakes and create a new type of seismic network. This would improve safety for communities vulnerable to earthquakes worldwide.
Designing an Application-Centric Network for the $1.9t Internet of ThingsKemp
IoT extends the end node far beyond the
human-centric world to encompass specialized
devices with human-accessible interfaces, such as
smart home thermostats and blood pressure
monitors, and even those which lack human
interfaces altogether, including industrial sensors,
network-connected cameras and traditional
embedded systems.
This document discusses the concept of a "Predictive Enterprise" and Intel's role in enabling it. A Predictive Enterprise uses real-time analytics and automated decision-making to sense emerging trends, predict outcomes, and proactively respond. The document outlines technology barriers like data explosion and security threats. It argues Intel can help overcome these through solutions that optimize resources, improve collaboration and mobility, and make data centers more efficient. Partnering with Intel and its ecosystem can help companies transform IT strategies and gain competitive advantages in the emerging business environment.
1. La gráfica podría dar una interpretación errónea porque no especifica los rangos de calificaciones de cada barra. Esto se podría mejorar agregando los rangos en el eje x para mostrar con precisión la distribución.
2. El pictograma es incorrecto porque usar figuras para representar ingresos puede dar lugar a confusiones. Se debería usar números en su lugar.
3. Las gráficas muestran las ganancias de una empresa en periodos de 5 años. La diferencia es que la Gráfica 1 usa barras apiladas y la Grá
Mobilizing multi-Stakeholder Support through Strategic Communication - A Case...Voices Against Corruption
A presentation by Caby Verzosa, Communication Advisor with the World Bank Institute on the Global Youth Anti-Corruption Forum in Brussels on 26 May 2010.
Este documento describe diferentes formas de producir y modificar el derecho. Explica que la producción originaria crea el orden jurídico fundamental sin apoyarse en normas previas, mientras que la producción derivada crea normas de acuerdo a un orden jurídico existente. También describe dos formas de interrumpir el orden constitucional: el golpe de estado, que cambia el gobierno pero mantiene la estructura, y la revolución, que involucra al pueblo y puede traer mayores beneficios. Finalmente, define el decreto ley como una
The document provides tips for improving communication in 3 steps: 1) Listen actively by focusing 100% on understanding without assuming; 2) Build rapport by being aware of verbal/nonverbal cues like body language, tone, and gestures; 3) Choose words carefully by connecting emotionally and rationally using stories and avoiding ambiguity. Effective communication is crucial and relies heavily on nonverbal cues like body language and voice quality over the actual words used.
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...Gilt Tech Talks
Trillion sensors will enable abundance by solving global problems through exponential technologies like networked sensors. The document outlines a roadmap to accelerate sensor development from prototypes to high volumes needed for global impact. This includes collecting visions for new applications, developing common sensing platforms, using crowd-funding and competitions to incentivize development. Trillion sensors by 2023 could create over 100 million new jobs and revolutionize industries like healthcare through personalized monitoring.
Schneider Electric is a digital transformation leader for energy management and automation. ... EcoStruxure™, Schneider Electric's open, interoperable, IoT-enabled system architecture and platform, is the unifying experience among our lines of business and services.
Revue de presse IoT / Data du 28/01/2017Romain Bochet
Bonjour,
Voici la revue de presse IoT/data/energie du 28 janvier 2017.
Cette semaine au programme :
- 3 New Technologies Changing IoT and Remote Power
- 7 Reasons Why IIoT Projects Fail
- Energy is the new new internet
- Street lights will learn from the bigger picture in IBM, Echelon IoT partnership
- We’re Building a World-Size Robot, and We Don’t Even Realize It
- This is the year of the Internet of ‘SOME’ Things - Data Economy
Je suis preneur d'autres artices / sources !
Bonne lecture !
Mike McBride will provide a look at the Industrial IoT (IIoT) landscape and the OT/IT convergence. He will cover several use cases including healthcare, entertainment and smart buildings. He will cover the challenges IIoT networking faces with emerging technologies and how edge computing will provide increased performance, security and reliability. Mike will discuss the various Edge Computing standards & opensource forums along with proposed architectures. And Mike will present new solutions being proposed (ICN, slicing, Blockchain) to support the bandwidth, latency and security requirements within Industrial verticals.
About the speaker: As Sr. Director of Innovation & Strategy, within Huawei's IP Network BU, Mike leads Industrial IoT, Edge Computing and IP/SDN architecture, standardization, and strategy across product lines and industry forums. He leads architecture and standardization activities within the IIc and BBF and has served as an IETF Working Group chair for 15 years. Mike has led emerging technology projects within opensource communities and played a key role in the formation of OPEN-O (Now ONAP). He is an Ericsson alum where he developed and directed SDN/NFV network architectures. And for many years with Cisco, Mike supported customers, worked in development teams and managed mobility, wireless and video projects across BUs. Mike began his career supporting customers at Apple Computer. He resides in Orange County, CA
The document discusses the use of IoT in the energy industry. It describes how IoT can be applied to remotely monitor energy assets, automate processes, integrate renewable energy sources with the grid, and help consumers reduce energy consumption through smart meters and decision making. Some benefits of IoT include improved reliability, reduced costs and labor, and more eco-friendly measures. Potential challenges involve security, connectivity, integration complexity. Edge computing and infrastructure modernization are proposed as solutions.
This document discusses opportunities for the Internet of Things (IoT) and big data. It notes that IoT has huge opportunities across many industries like industrial equipment, oil and gas, automotive, retail, healthcare, smart homes and cities. However, it also faces big challenges around security, infrastructure, privacy and governance. It argues that leveraging data utility, edge processing, and incorporating metadata can help address these challenges and maximize the benefits of IoT. Specific opportunities discussed include supply chain visibility, telehealth services, compliance monitoring, insurance, buildings management, and regional considerations.
From The Guardian to Cisco, big business to small, it seems that everybody is talking about the Internet of Things — but what exactly is IoT and why does it matter?
Taking a deep dive, we explore the many faces of IoT in Healthcare. Technology research and advisory company, Gartner, currently place the Internet of Things at the peak of inflated expectations and there are certainly challenges. But IoT also holds real promise for healthcare and it is already making an impact today.
We demonstrate why the Internet of Things has a far reaching impact across all determinants of health and how it could lead to a broader model of healthcare. We look at some of the technologies that are available to buy or that are already in development today, whilst also exploring some of the very real challenges that integrating such technologies into healthcare presents. Finally, we offer some ideas about how you can get involved, whether you are a healthcare professional or not.
Technology Sector Reshaping In The Downturn 20110818Trond Johannessen
Hewlett Packard announced it would spin off its PC hardware business, fueling speculation about future acquisitions. The document discusses how some technology companies are well-positioned during the economic downturn while others face disadvantages. It provides a table outlining potential acquirers and acquisition targets in the sector.
How Service-Oriented Drive Deployments improve VSD Driveline UptimeSchneider Electric
Variable Speed Drives (VSDs) have proliferated and are now installed in large numbers throughout various industries. However, since these technologies are relatively new, not much thought has been given to the proper integration of these drives, nor have their potential energy savings and business continuity entitlements been fully realized. This paper examines how the intelligence within VSDs can be leveraged to perform predictive maintenance so that plant uptime can improve.
Vinod Khosla: “Smart Grid” or “Smart Hype” — An Analytical Perspective From a...VentureBeat
This document discusses the opportunities and hype around smart grids. It notes that while smart meters and demand response can provide some benefits, their impact may be limited. True transformation of the grid will require more fundamental changes like new power electronics, ubiquitous storage, and an evolvable, resilient architecture designed for open standards and competition. Rather than focus on short-term fixes or existing technologies, we should ask how new devices could make today's wisdom obsolete and dramatically increase certainty on the grid. The needs of the future grid are hard to predict, so it's important to design for flexibility and manageability.
IRJET- Earthquake Early Warning System for AndroidIRJET Journal
This document describes the development of an earthquake early warning system for Android devices. The system uses sensors in smartphones to detect earthquake vibrations and differentiate them from human motion. When an earthquake is detected, a warning is sent to other smartphones via a network. The system aims to enhance current warning systems by leveraging rising mobile and sensor technologies. It discusses developing smartphone software to capture sensor data and perform analytics to identify earthquakes. Evaluation shows smartphones can accurately detect earthquakes and create a new type of seismic network. This would improve safety for communities vulnerable to earthquakes worldwide.
Designing an Application-Centric Network for the $1.9t Internet of ThingsKemp
IoT extends the end node far beyond the
human-centric world to encompass specialized
devices with human-accessible interfaces, such as
smart home thermostats and blood pressure
monitors, and even those which lack human
interfaces altogether, including industrial sensors,
network-connected cameras and traditional
embedded systems.
This document discusses the concept of a "Predictive Enterprise" and Intel's role in enabling it. A Predictive Enterprise uses real-time analytics and automated decision-making to sense emerging trends, predict outcomes, and proactively respond. The document outlines technology barriers like data explosion and security threats. It argues Intel can help overcome these through solutions that optimize resources, improve collaboration and mobility, and make data centers more efficient. Partnering with Intel and its ecosystem can help companies transform IT strategies and gain competitive advantages in the emerging business environment.
1. La gráfica podría dar una interpretación errónea porque no especifica los rangos de calificaciones de cada barra. Esto se podría mejorar agregando los rangos en el eje x para mostrar con precisión la distribución.
2. El pictograma es incorrecto porque usar figuras para representar ingresos puede dar lugar a confusiones. Se debería usar números en su lugar.
3. Las gráficas muestran las ganancias de una empresa en periodos de 5 años. La diferencia es que la Gráfica 1 usa barras apiladas y la Grá
Mobilizing multi-Stakeholder Support through Strategic Communication - A Case...Voices Against Corruption
A presentation by Caby Verzosa, Communication Advisor with the World Bank Institute on the Global Youth Anti-Corruption Forum in Brussels on 26 May 2010.
Este documento describe diferentes formas de producir y modificar el derecho. Explica que la producción originaria crea el orden jurídico fundamental sin apoyarse en normas previas, mientras que la producción derivada crea normas de acuerdo a un orden jurídico existente. También describe dos formas de interrumpir el orden constitucional: el golpe de estado, que cambia el gobierno pero mantiene la estructura, y la revolución, que involucra al pueblo y puede traer mayores beneficios. Finalmente, define el decreto ley como una
The document provides tips for improving communication in 3 steps: 1) Listen actively by focusing 100% on understanding without assuming; 2) Build rapport by being aware of verbal/nonverbal cues like body language, tone, and gestures; 3) Choose words carefully by connecting emotionally and rationally using stories and avoiding ambiguity. Effective communication is crucial and relies heavily on nonverbal cues like body language and voice quality over the actual words used.
The document discusses the importance of the Heritage Project in connecting communities through shared stories and history. It notes a lack of narrative fit between school curriculum and students' lives, creating disengagement. The Heritage Project aims to address this by developing curriculum centered around a community's purpose and understanding, linking scholarship to the local region and sustaining community through shared narratives.
20120801 orden fom 1882 condiciones generales contratación transporte mercanc...El Choto de Alfafar
La orden aprueba nuevas condiciones generales para contratos de transporte de mercancías por carretera en España. Las condiciones actualizan la normativa para alinearla con la Ley de Contrato de Transporte Terrestre de Mercancías de 2009. Las nuevas condiciones se aplicarán de forma supletoria cuando no exista un acuerdo expreso entre las partes. Algunas condiciones como las relativas a precios y responsabilidades tendrán carácter imperativo.
El documento presenta análisis estadísticos de tiempos de atención de ejecutivos, atención a clientes, cajeros y tiempos de llegada. Se identifican datos atípicos y se determinan las mejores distribuciones de probabilidad para modelar los datos. También incluye diagramas de flujo de procesos como apertura de cuentas, pagos de créditos, depósitos y solicitud de créditos.
El Papa Francisco habló sobre la fuerza de la oración humilde y la debilidad de Dios ante la oración de su pueblo. Dijo que la oración del hombre humilde, como la viuda del Evangelio que pedía justicia tocando el corazón de Dios, es la debilidad de Dios, pues Él escucha la oración de su pueblo. También destacó la importancia de la oración universal de los sacerdotes por las necesidades de la Iglesia y la humanidad.
1) La responsabilidad, la autonomía y la libertad están íntimamente relacionadas, y asumir responsabilidades es parte integral del crecimiento de la conciencia humana.
2) No existe una definición absoluta de la justicia, la verdad o la libertad, sino que dependen del contexto y están sujetas a cambios con el tiempo.
3) Los conceptos de responsabilidad, justicia, verdad y libertad son complejos y han evolucionado a lo largo de la historia, con múltiples teorías sobre su naturaleza.
This webinar discussed how to maximize returns from email campaigns. It provided examples of different types of email campaigns for retail stores, events, and services. It emphasized setting objectives for campaigns and testing content through A/B split testing and resending emails to non-opens. Properly defining campaign goals, adding interactivity, integrating SMS, optimizing content and landing pages, and testing were some ways discussed to improve campaign return on investment. Real examples from various campaigns demonstrated how these techniques increased metrics like click-throughs and conversions.
Este documento es una guía de servicios del Instituto Colombiano de Crédito Educativo y Estudios Técnicos en el Exterior (ICETEX). Presenta la misión, visión y valores de la institución, así como una descripción general de los diferentes tipos de créditos educativos que ofrece ICETEX para estudios de pregrado, posgrado y programas especiales. Incluye información sobre requisitos, tasas de interés, plazos de pago y montos de financiamiento disponibles.
Este documento discute los conceptos clave de la investigación como un método para descubrir y analizar problemas. Explica que la investigación involucra identificar un problema, establecer un marco de referencia teórico, desarrollar una metodología y aspectos administrativos. También cubre los tipos comunes de investigación como la científica, histórica, cualitativa, cuantitativa, económica y social. Finalmente, sugiere que la investigación es relevante para la carrera contable y propone un tema de investigación sobre cre
A 15-20 minute presentation for PGCLTHE students (which I am on a student on, and will be teaching next year) on Twitter, which I have been using since February 2009, and some ideas for using it in the classroom.
El documento describe el proceso administrativo y sus cuatro etapas principales: planificación, organización, dirección y control. Explica que el proceso administrativo consiste en una serie de pasos sucesivos que buscan optimizar la empresa y lograr sus objetivos de manera integral. Además, presenta varios principios clave que rigen el proceso administrativo como la previsibilidad, objetividad, medición y flexibilidad.
Este documento trata sobre los ácidos nucleicos. Explica que los ácidos nucleicos son polímeros formados por nucleótidos unidos mediante enlaces fosfodiéster, y almacenan la información genética de los organismos. Los dos tipos principales de ácidos nucleicos son el ADN y el ARN. El ADN se encuentra en el núcleo celular y contiene la información genética, mientras que el ARN tiene diversas funciones como la síntesis de proteínas.
Realizada al equipo del Gobierno Regional del BíoBío en el marco de compartir experiencias institucionales en la integración del enfoque de genero en la gestión institucional. Realizada el 24.10.07
The document provides best practices for pharmaceutical representatives to make a positive first impression when meeting with doctors. It emphasizes that the first meeting lays the foundation for the long-term relationship, so it is important to make a strong positive impression. Some key tips include dressing professionally, maintaining eye contact, shaking hands firmly with a smile, listening more than talking, being relaxed and genuine. The goal is for the doctor to like, trust, and respect the representative based on their professionalism and care for the doctor's needs, which will help build the relationship and lead to future business opportunities.
A continuous and reliable supply of electricity is necessary for the functioning of today’s modern and advanced society. Since the early to mid1980s, most of the effort in power systems analysis has turned away from the methodology of formal mathematical modelling which came from the areas of operations research, control theory and numerical analysis to the less rigorous and less tedious techniques of artificial intelligence (AI). Power systems keep on increasing on the basis of geographical regions, assets additions, and introduction of new technologies in generation, transmission and distribution of electricity. AI techniques have become popular for solving different problems in power systems like control, planning, scheduling, forecast, etc. These techniques can deal with difficult tasks faced by applications in modern large power systems with even more interconnections installed to meet the increasing load demand. The application of these techniques has been successful in many areas of power system engineering.
The document discusses how fog computing and distributed intelligence platforms can disrupt the energy sector by enabling a more efficient and reliable industrial network. It describes how fog computing involves performing compute, storage, control and networking functions closer to industrial devices and sensors rather than relying solely on remote cloud services. This allows for lower latency responses, better security and a more adaptable system. The document provides examples of how fog computing could improve microgrids, SCADA integration, grid balancing and create a distributed system platform in the energy industry.
The document discusses the concept of smart grids, which represent a revolutionary transition from traditional power grids. Smart grids can accommodate power from multiple distributed renewable sources, flexibly store power, and improve reliability through advanced control algorithms. Several US utility companies and governments are implementing smart grid pilot projects to modernize aging infrastructure, reduce costs and emissions, and better accommodate renewable energy sources and electric vehicles. Smart grids face challenges including high costs, incompatible equipment, regulatory hurdles, and the need for international cooperation to realize their full benefits.
This document discusses the design and implementation of a smart anti-power theft system. It begins with an abstract that outlines the issues of electricity theft, including the economic losses incurred. It then discusses the key components of embedded systems used in power monitoring and describes the objectives, block diagram, and circuit diagram of the proposed smart anti-power theft system. The system is intended to automatically detect theft and restrict unauthorized electricity usage. The document also provides a literature review on previous work in electricity theft detection and monitoring systems. It concludes by discussing the scope for further improvements to the system, including integrating WiFi modules to notify users of theft detection.
Capstone Team Report -The Vicious Circle of Smart Grid Securityreuben_mathew
The document summarizes challenges facing different stakeholders in securing the smart grid:
- Utilities face rapid deployment, funding shortfalls, technical challenges explaining security, and sophisticated attacks exploiting systems.
- Regulators have inconsistent standards and gaps between policies, creating confusion.
- Equipment manufacturers consider security important but frameworks are not always implemented, leaving systems vulnerable.
Coordinated efforts are needed between utilities, regulators, and manufacturers to address gaps and build a secure smart grid.
This document is a seminar report on artificial intelligence in power system protection. It discusses several artificial intelligence techniques used in power systems, including expert systems, artificial neural networks, genetic algorithms, and fuzzy logic. Expert systems use rules and knowledge bases to solve problems. Artificial neural networks are biologically inspired and can perform tasks like pattern recognition. These techniques help address challenges in reliably detecting and isolating faults in power transmission lines. The document provides examples of how these AI methods can be applied, such as using neural networks to determine transmission line parameters.
Low-cost real-time internet of things-based monitoring system for power grid ...IJECEIAES
This system creates a low-cost IoT-based monitoring system for power grid transformers to monitor their status in real-time. Sensors measure temperature, humidity, oil level, voltage, vibration, and pressure and send the data via ESP32 to a cloud interface. This allows maintenance centers to detect abnormalities before failures and improve transformer efficiency in smart grids. The low-cost system was built for under $23 using inexpensive and accessible components like an ESP32 board, DHT22 sensor, and ultrasonic sensor. It demonstrates the feasibility of remotely monitoring transformers to extend their lifetimes.
Revue de presse IoT / Data du 26/03/2017Romain Bochet
Sommaire :
- From the Edge To the Enterprise
- The Internet of Energy: Smart Sockets
- Google's big data calculates US rooftop solar potential
- Energy management: Oracle Utilities launches smart grid and IoT device management solution in the cloud
- Are vehicles the mobile sensor beds of the future?
A SOLUTION FRAMEWORK FOR MANAGING INTERNET OF THINGS (IOT)IJCNCJournal
Internet of Things (IoT) refers to heterogeneous systems and devices (often referred to as smart objects) that connect to the internet, and is an emerging and active area of research with tremendous technological,
social, and economical value for a hyper-connected world. In this paper, we will discuss how billions of these internet connected devices and machines will change the future in which we shall live, communicate and do the business. The devices, which would be connected to the internet, could vary from simple systems on chip (SOC) without any Operating System (OS) to highly powerful processor with intelligent OS with widely varying processing capability and diverse protocol support. Many of these devices can also communicate with each other directly in a dynamic manner. A key challenge is: how to manage such a diverse set of devices of such massive scale in a secured and effective manner without breaching privacy. In this paper, we will discuss various management issues and challenges related to different communication
protocol support and models, device management, security, privacy, scalability, availability and analytic support, etc., in managing IoT. The key contribution of this paper is proposal of a reference management system architecture based on cloud technology in addressing various issues related to anagement of IoThaving billions of smart objects.
In an interview, Dr. S. Massoud Amin discusses the evolution of the smart grid from his original vision conceived over 20 years ago. He envisioned transforming the electric power system into an "integrated, self-healing and electronically-controlled secure and resilient power system." While progress has been steady, the full vision of an anticipatory, self-healing grid with minimal human intervention has yet to be realized. Technological barriers around integration of renewables and distributed energy remain, as do policy challenges. However, microgrids and a focus on security, resilience and customer value are expected to advance the grid over the next five years.
Types Of Service Strategies In Integrated Healthcare SystemsNicole Gomez
The document discusses a high-voltage compliant microelectrode array driver for neural stimulation. It describes how a fundamental component is a high-voltage switch, which can be implemented using an n-type or p-type MOSFET operated in either cutoff or ohmic region. The switch is characterized by a fixed linear transconductance that is strongly signal-dependent and expressed through an equation involving factors like electron/hole mobility, gate oxide capacitance, transistor dimensions, power supply voltage, and input signal.
The definition of the "Smart Grid" is something that is taking shape. Utility professionals concur on some aspects and ideas of what the smart grid should be, but there are still grey areas that, however, promise to become clearer soon.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Embedded Systems and Software: Enabling Innovation in the Digital AgeIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological advancements across various industries. Embedded systems, characterized by their integration into hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer electronics, and industrial automation. This article delves into the fundamental concepts of embedded systems, highlights their importance, discusses the challenges faced in their development, and explores the latest trends and innovations in embedded software. We are committed to using our findings from this exploration to help others in the embedded systems and software community. We believe that by sharing our knowledge, we can help to accelerate innovation in this field.
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological
advancements across various industries. Embedded systems, characterized by their integration into
hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our
daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer
electronics, and industrial automation. This article delves into the fundamental concepts of embedded
systems, highlights their importance, discusses the challenges faced in their development, and explores the
latest trends and innovations in embedded software. We are committed to using our findings from this
exploration to help others in the embedded systems and software community. We believe that by sharing
our knowledge, we can help to accelerate innovation in this field.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
All submissions must describe original research, not published or currently under review for another conference or journal.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
All submissions must describe original research, not published or currently under review for another conference or journal.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services.
EMBEDDED SYSTEMS AND SOFTWARE: ENABLING INNOVATION IN THE DIGITAL AGEIJCSEA Journal
This article explores the pivotal role of embedded systems and software in driving technological
advancements across various industries. Embedded systems, characterized by their integration into
hardware devices and their ability to perform specific tasks with precision, have become ubiquitous in our
daily lives. Their applications span across diverse fields such as automotive, healthcare, consumer
electronics, and industrial automation. This article delves into the fundamental concepts of embedded
systems, highlights their importance, discusses the challenges faced in their development, and explores the
latest trends and innovations in embedded software. We are committed to using our findings from this
exploration to help others in the embedded systems and software community. We believe that by sharing
our knowledge, we can help to accelerate innovation in this field.
The growing trend for protection and control and substation automation is the digital substation. This is generally understood to mean fully implementing process bus. While adopting process bus provides great value, it is only a stepping stone. The long-term goal must be to move away from the current single-purpose, hardware-based protection and automation systems and replace them with a software-defined control system running virtual services: a digitally enabled substation.
A digitally enabled substation is necessary to enable substation systems to adapt to the new realities of changing distributed energy resources impacting feeder power flow, voltage, and protection functions, and the changing operating requirements brought on by widely distributed, inverter-based resources. Wind, solar, battery storage, and EVs maybe be connected anywhere to the grid, and by different owners often concentrated in areas negatively impacting the traditional grid. Operators and control functions must plan for and adapt quickly to changes in available resources and load flows. Utilities, systems owners and a host of new DER stakeholders will need to be able to roll out new applications and access an increasing amount of grid data to optimize their investments. Old schemes will need to be adapted quickly and reliably throughout the entire system.
Jim Brazell presents a prescient view on the future of computing at the Machine to Machine Computing Conference for M2M United in San Antonio, Texas in 2006. If you want a speaker who can show you the future today, there is one guy who has been nailing future trends for the past decade and his name is Jim Brazell. Learn more at www.ventureramp.com. Read his free technology forecast from the Texas State Technical College System on the same topic at: http://forecasting.tstc.edu/forecasts/m2m-the-wireless-revolution/
M2M is an acronym for Machine-to-Machine computing and both fourth generation and M2M involve networking physical, chemical, biological and neurological objects, systems and environments. Applications of M2M and fourth generation computing span virtually every industry and market. “The most compelling discovery of the report is the emergence of a fourth generation of computing defined as a system on a chip with a single platform for power, communications and computing.” says Jim Brazell, principal analyst.
Highlights of the forecast include recommendations to educators who wish to develop curricula and analysis of the global US$100 billion industry in 2005 forecast to grow to US $700 billion by 2010. The report describes M2M technologies, identifies the emerging and promising markets, and identifies the resources Texas can draw upon to play a leading role in this increasingly competitive arena. Based on more than 100 interviews and an M2M industry survey, as well as secondary sources, the report outlines human capital needs of M2M companies over the next three to five years, and how technical and community colleges can best meet those needs through targeted curricula and transdisciplinary learning environments. By anticipating workforce demands, college curriculum offerings can be a constructive force in attracting high-tech companies to the state and ensuring that existing high-tech companies continue to have appropriately skilled employees.
1. 1
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
Contents
1 Summary
3 Requirements-Driven
Engineering
3 Box: A Biological Model for
Complex System Controls?
5 Systems Engineering
6 Standards and Non-
Functional Requirements
7 Box: Why Systems
and Software Fail
10 Professional Software
Engineer
11 Conclusion
12 References
Power and the Industrial
Internet of Things (IIoT)
Engineering complex systems to build
Smart Plants in a Smart Grid
Summary
The Internet of Things (IoT) is coming to the energy and manufac-
turing industries. The world’s energy infrastructure, in particular, is
undergoing a user-centered, software-driven, digital transformation—
a change from the material and mechanical innovations that have
sparked changes in other industries and other times.1
These changes,
moreover, are coming to an American infrastructure that earned
a barely passing grade of D+ from the American Society of Civil
Engineers—“an aging electrical grid and pipeline distribution systems,
some of which originated in the 1880s.”2
The Internet of Things (a.k.a., Cyber-Physical Systems, Industrie 4.0,
The Fourth Industrial Revolution, the Industrial Internet, Big Analog
Data Solutions, Smarter Planet, Intelligent Systems) has captured
the technological world’s imagination. Connecting computers, smart
phones, sensors, appliances, machinery, vehicles, utilities, and a host
of other elements into a reliable, efficient whole could be the biggest
engineering challenge we’ve ever faced.
Though the IoT is in its infancy, by the end of 2013 it already included
about 20 billion connected devices (out of about 187 billion connectable
devices). That number will grow to 30 billion by 2020.3
In 2014, most of those connected things belong to the Consumer IoT
(with smart phones topping the list). But another, less visible Industrial
Internet of Things (IIoT), with its heavy duty infrastructure (e.g.,
power, transportation) and applications (e.g., industrial equipment,
smart plants, smart automobiles, advanced medical devices), will pose
a bigger challenge and offer greater rewards.
2. 2
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
Industrial IoT systems will be bigger, heavier, costlier, far
more complex, operate at far higher energy levels with far
higher reliability than the products of the Consumer Internet
of Things. If a buggy smart-phone operating system or app
is rushed through beta and onto the market, its failure might
cause widespread nuisance and some real harm, but the actual
potential for damage is minuscule compared to failure in an
aircraft, a power plant, or an offshore oil rig.
Power and complexity are what really set the Industrial IoT
apart. High-power industrial systems have always put a
premium on safety, reliability, and stability. And power grid
engineers certainly have experience working with highly
complex systems. The complexity—the extent and intercon-
nectedness on many levels—of these new systems-of-systems,
though, will make them qualitatively different from what
most engineers have worked with in the past.
The elements of the system will change constantly—some-
times second-by-second. Industrial systems, moreover, can
have lifecycles measured in decades, far longer than the
months or years of consumer products. The design can never
be locked down in the familiar sense, and the cumulative
effect of changing composition and long product life can be
extremely daunting. The Industrial Internet of Things will
have to accommodate elements that are unknown—perhaps
even un-thought-of—when the system is first built. It will
include billions of components that are themselves complex,
components manufactured by different (and often competing)
organizations. They may come out of completely different
industries, with different standards, different design assump-
tions, and different business goals.
The joint effort of the automotive and electric power
industries to forge the link between plug-in electric vehicles
(EVs) and the Smart Grid offers a fascinating early example
of the coming convergence of industries in the Internet of
Things. It illustrates the prime factors future systems will
require: “cross-border” collaboration, technical integration,
and harmonization of business goals and methods.4
What
happens when hundreds of millions of electric cars plug in
each evening? Will utilities be able to use the batteries of
connected cars to store energy for peak use, to buffer their
generation demand? Will parked electric vehicles, indeed,
be able to supply their own power to the grid on sunny days?
What happens when the manufacturer of your software-
heavy EV decides to send out a firmware update? Will they
be able to keep track of all of the options and after-market
modifications—serial number by serial number—to push
down the right update? Most important, how well will con-
nected electric vehicles meet safety, reliability, and security
standards? Will outsiders be able to hack into it—or even
hack through it to tamper with the power grid? What happens
when you go out in the morning to start your drive to work?
Will your car start? Will it make it all the way to work? Will
the brakes fail or the motor race because of a software error?
(For insight onto how the two industries are cooperating,
see Thinking Across the Plug: The Coming Integration
of Electric Vehicles and Smart Grids, an IEEE Tech Insider
webinar sponsored by IBM®
Rational®
.)
Complexity
Even simple feedback control systems can produce emergent
behavior, those seemingly coordinated, large-scale patterns
that develop spontaneously, without any central direction:
the apparent structure of rippling desert sand, schools of fish,
and flocks of birds, for example. Designers of complex systems
of systems will routinely encounter emergent behavior, patterns
of variation in performance that, in many cases, can never
be entirely designed out of the system.
Yet even though such systems cannot be tightly controlled,
they can be highly reliable, robust, and safe. They are chaotic
in the mathematical sense. This does not mean disorder.
It is behavior so complex that the smallest variation in initial
conditions produces significantly different outputs. The
moment-by-moment state of a properly performing chaotic
system may be almost impossible to predict—though it will
range seemingly at random within a predictable operating
envelope. The beating of a healthy human heart, for example,
appears to be chaotic, while the heart of a patient with con-
gestive heart failure ticks as regular as a metronome.5
Thus,
as systems-of-systems grow more complex—with more layers
of communications, more checks and balances—they may
well come to resemble biological organisms more than a
steam engines. (See Box, “A Biological Model for Complex
System Controls?”)
3. 3
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
Yet we will expect these systems to be stable, and to share
common objectives. Ultimately, these devices will couple
real-time analyses with machine-to-machine, machine-to-
infrastructure, and user-to-machine communication, so
that they can adapt continually to changing circumstances.
(Consider: a “mere” 20 billion devices yield 400 quintillion—
4x1020
—potential communicating pairs.)
Developing a workable Industrial Internet of Things will
occupy us through at least 2020. It will require mastering
new design methodologies tailored to systems-of-systems.
And it will demand broad, flexible standards on an unprece-
dented scale.
Heavily regulated, high-energy, safety-critical operations—
nuclear power, aerospace, defense—have already realized
significant benefits from the systems engineering. They treat
a power plant or an aircraft as
an integrated collection of multiple sub-systems
made up of mechanical, electrical, chemical, soft-
ware, and human elements. Each of the sub-systems
meets a set of well-defined requirements that not
only define system performance, but also capture
what is necessary to meet regulatory mandates,
safety standards and governmental statutes.6
Soon, this will apply to any application involving high
energies or high hazards (such as power and energy, critical
biomedical devices, hazardous chemicals, large actuators
in public places).
Requirements-Driven Engineering
Systems engineering depends, first and foremost, on complete
and completely understood requirements7
:
Well defined requirements include not only functions and
subsystem dependencies, but all the factors that affect the
project. Requirements-gathering starts, as in any project, with
familiar engineering factors. In complex, intelligent systems
it is especially important to know how information and the
physical inputs and outputs pass from one subsystem to another
—up, down, and sideways.
A Biological Model for Complex
System Controls?
Figure 1: The MAPK/ERK (mitogen-activated protein kinases/extra-
cellular signal-regulated kinases) signaling pathway. It serves as an
example of the hundreds of control loops in a mammalian cell, each
of which can control biochemical processes or trigger switches in the
nucleus to turn on, turn off, or modify the 20,000-odd genes in the
body. (Creative Commons)
The human genome contains about 6 billion nucleic acids
—3 billion on each of the two complementary strands
of DNA. Just 1.2% of these are genes, templates for the
protein building blocks of the body. The lion’s share of
the remaining 98.8% was long considered “junk DNA,”
with no biological function.
In 2012, however, The Encode Project Consortium made
its first report on a comprehensive analysis of the entire
human genome. They found that at least 80% of the
genome seems to be chemically active. These regions bind
molecules that turn genes on and off, or produce short
RNAs that may influence protein production outside
the nucleus, or change the shape of the chromosome
by interacting with the DNA’s molecular bubble wrap.
The discovery surprised biologists around the world.31
4. 4
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
The analysis should go on to include relevant standards,
financing, and social influences (such as the organization’s
assumptions, culture, and processes). Each of these represents
a system that requires engineering.
Complex requirements make it essential to maintain a trace-
ability matrix, a linked list that allows project participants
to quickly and accurately log changes and determine how
a modification of one system will affect the performance of
all the other components in the network. This is particularly
important when the organization plans to strategically re-use
components. These elements will often be modified to accom-
modate new technology or special requirements. It becomes
vital to track changes in hardware, components, requirements,
and dependencies, to know which code version goes with what
hardware version, and how changes affect the inputs required
from upstream modules and outputs passed on to downstream
modules. Modularity can greatly accelerate product/application
development, but only if you can understand how any change
affects the rest of the system.
It’s easy to see that developing a complex system generates
a tremendous volume of work products.a
The best way to cope
with this flood is to adopt tools that automate the process.
Logging requirements and changes manually is error prone
in even modest-size systems. In systems with many thousands
of requirements (which some projects have), keeping up with
development with an Excel spreadsheet is impossible.
Experience shows that successful systems-engineering
programs invest heavily in defining the mission and gathering
requirements at the front end. Poor programs, on the other
hand, skimp on defining the mission, and have to compensate
by investing much more heavily in verification and validation
and system integration down the line.8
In other words, it looks as though 80% of the genome
is logic, and 1% is I/O. The genes, their associated
DNA binding areas for gene promoters and inhibitors,
segments that code for short RNA strands that seem to
modify protein production outside the nucleus, are just
part of the cell’s complex control system. Above them
in the system-of-systems hierarchy are the signaling
pathways inside the cell, which turn the genes on and off
(the illustration shows one pathway just to illustrate the
potential complexity). And the systems that send signals
between cells to trigger the signaling pathways. And
the body-wide controls, like the nervous and endocrine
systems, that can trigger lower-level signals throughout
the body.
Research indicates that these control systems are non-
linear and complex—chaotic in the mathematical sense.
To cite just one example: A healthy heart beats irregu-
larly, what one researcher called “robust beat-to-beat
heart rate variability.” The time between successive beats
changes unpredictably within a narrow range. Some
researchers contend that there is too much noise in the
measurement to confirm conclusively that the beat is
chaotic32
, others see strong empirical5
and theoretical33
evidence that it is. What is clear is that diseased or
stressed hearts—in patients suffering from congestive
heart failure, or under general anesthesia34
, or badly
injured—beat like clockwork. It’s tempting to interpret
this as a failsafe mode for a system in which some compo-
nents are not operating within their proper design limits,
sending out-of-range inputs to other subsystems and
disabling most of the feedback control loops.
Biology and engineering seem to be growing together
at their leading edges, with biology adopting ideas from
systems theory, and systems theory embracing models
from biology. The results are research efforts like the
Institute for Systems Biology in Seattle, and Harvard’s
Wyss Institute for Biologically Inspired Engineering in
Boston. As systems-of-systems get more complex, their
circuitry and software diagrams may come to resemble
cell-signaling pathways more than the linear flowcharts
of years gone by.
a
These can include safety standards, development plans, verification plans,
quality assurance plans, plans for certification, configuration management
plans, project schedules, system requirements, subsystem requirements,
electronic requirements, mechanical requirements, software requirements,
human/organizational requirements, safety analyses, hazard analyses,
environmental impact analyses, a system architectural design, system
interface specifications, electronic designs, mechanical designs, software
designs, software source code, test cases (both manual and automated),
test case results, formal mathematical analyses, results of various reviews,
quality assurance records, configuration management records, quality
assurance audits, and change requests.
5. 5
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
There are additional benefits: A properly governed system-
of-systems generates documentation useful in outside review
by regulators or customers—in, for example, power, defense,
aerospace, medical devices, or pharmaceuticals. And systems
engineering has been shown to reduce budget and schedule
overruns significantly.6 9 10
Requirements V Diagram
Figure 2: Requirements Driven Engineering (RDE) and process
improvement6
Systems Engineering
Successfully engineering Smart Plants in the Smart Grid
demands continuous engineering and innovation, the
same approach required in any complex system-of-systems.
It also demands technical competence in many engineering
disciplines.
According to the National Society of Professional Engineers,
Systems engineering (SE) is a hybrid engineering
and business discipline. Systems engineering seeks to
make the best use of personnel, material, equipment,
and energy; and focused on the characterization of
system properties, such as safety analysis, require-
ments, data integration, process transformation,
organizational dynamics, and architectural design
which can include technical topics such as software,
mechanical, nuclear, structural, chemical, petroleum,
and civil engineering. Systems engineering differs
from downstream engineering disciplines in that the
outcomes for the latter are implementations, while
the outcomes for the former are specifications.11
In addition to solid requirements-gathering, the essential
elements of good systems practice are:7
Engineering collaboration. IIoT products and projects will cross
boundaries that separate discipline from discipline, depart-
ment from department, company from company, industry
from industry, and nation from nation. The companies
building the Industrial Internet of Things will have to follow
suit, collaborating and demolishing organizational silos.
This applies to the whole organization, not just engineers.
The collaboration must also draw talent from the business
side, operations, maintenance, and even the receptionist who
greets everyone every day. Systems engineering happens in
three dimensions: physical (engineering’s traditional domain),
mathematical (the theoretical limits of what information and
algorithms can accomplish), and social (the realm of office
politics, personal communication, and company culture).12
Continuous validation and verification. These are the “VV”
of the now-ubiquitous V-diagrams. Validation confirms that
the designers have selected the right tasks to do and the
right requirements to fulfill. Verification confirms that they
have done the right task correctly. The two go hand in
hand. Too often, they are treated as independent activities:
As a result, the right task may sometimes be implemented
correctly. But uncoordinated, unsynchronized VV also
means that the organization can waste resources by perform-
ing the wrong task correctly, the right task incorrectly, and
even the wrong task incorrectly. Just as the component devices
and networks of the IIoT will communicate and react to one
another constantly, validation and verification will be continu-
ous and interactive. In both cases, constant feedback helps
the system be self-correcting in near-real time.
Strategic re-use (with the emphasis on “strategic”). All engineers
and programmers obviously try to re-use components—
hardware parts and subsystems, code libraries, and so on.
But few are strategic about it—planning, constructing, and
documenting the component for repeated use over the long-
6. 6
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
term. It can take time—up to an order of magnitude more,
in some cases—but the potential gains down the road in
lower costs, shorter time-to-market, and improved safety
and reliability far outweigh the initial investment.
The traditional approach may have been linear and sequential:
gather a list of all the requirements, write all the code, do all
the validation and verification, make all the changes, and then
ship the product. The contemporary systems engineering
process is an iterative, hierarchical, continuous, top-down
decomposition of system requirements.13
Systems Engineering V diagram
Figure 3: Forsberg14
describes the V-model, which links systems
engineering to the project cycle. Design explorations and analyses begin
system development, which ends with a completely integrated and
qualified finished product. On the left side of the V are decomposition
and definition activities; the specification is completed at the bottom
of the V; and the rising right arm outlines quantitative verification steps
to assure that requirements are met.
Automated tools help engineers get a handle on all this
slippery, daunting complexity. IBM®
Rational®
Software was
developed to help gather and organize requirements, trace
changes, and plot out modification paths for multiple projects.
To map subsystem interactions and dependencies, designers
can turn to tools like SysML (Systems Modeling Language,
http://www.omgsysml.org) from the Object Marketing Group
(www.omg.org, a non-profit standards consortium). SysML
is a visual modeling language that helps engineers with
specifying, analyzing, designing, and verifying com-
plex systems which may include hardware, software,
information, personnel, procedures, and facilities.
SysML provides visual semantic representations for
modeling system requirements, behavior, structure,
and parametrics, which is used to integrate with
other engineering analysis models.15
SE teams along
with system designers are responsible for verifying
that the developed systems meet all requirements
defined in the system specification documents.1
Standards and Non-Functional
Requirements
Requirements, of course, include not just the functional
requirements of your design customers. They also include
the standards and fundamental non-functional requirements
—what some in the field call the –ITY words: safety, security,
stability, reliability, maintainability, availability.
Re-Defining Failure, Safety, and Reliability
Standards for the IIoT
It’s hard to see how an Internet of Things can evolve without
an ambitious and widespread standards effort to bridge the
gaps between industries.16
IEEE is actively engaged in making standards for the IIoT.
Already published are standards for security in green commu-
nity networks, the WirelessMAN (Metropolitan Area Net-
work) air interface standard for machine-to-machine commu-
nication, and a protocol for utility industry metering.17
IEEE standards working group P2413 is constructing
a “Standard for an Architectural Framework for the Internet
of Things (IoT).”18
Many organizations, too many to list all of them, are working
on aspects of the IIoT standards challenge. These include
the Industrial Internet Consortium founded in 2014 by ATT,
Cisco, GE, Intel, and IBM®
and now grown to more than 100
member companies, and the Open Interconnect Consortium
(more than 40 members, including Cisco, Intel, Mediatek,
Samsung, ADT, Atmel, Dell, Eyeball Networks, and Hewlett
Packard).
7. 7
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
Other organizations have formed around single protocols.
These include the Thread Group (founded by ARM, Big As
Fans, Freescale, Google’s Nest, Samsung, Silicon Labs, and
Yale Security), and MQTT (the stripped-down MQ Telemetry
Transport protocol designed for reliability in low-bandwidth
or unreliable networks; it is an outgrowth of the SCADA
protocol and MQIsdp). The list goes on.
As they develop methods for ensuring safety, security, and
privacy in the design of electric vehicles and charging stations,
systems engineers might refer to a raft of standards beyond
the obvious standard for functional safety in road vehicles
(ISO 26262): for “functional safety of electrical/ electronic/
programmable electronic safety-related systems” (IEC 61508)
[19]; for programs in airborne systems (DO-178C) for cyber
security in nuclear plants (NEI 08/09), and perhaps even for
medical-device software (IEC 62304). [4]
Safety and Reliability
Like the other aspects of systems engineering, ensuring safety,
stability, and reliability in a system of systems goes beyond
code. It requires transformations of behavior and culture.
The more elaborate a system is, the more ways it can fail.
There are limits to the effectiveness of classical, bottom-up
methods, relying on fault trees, built-in redundancy, and
“Swiss cheese” defense. Yes, the engineer has to build all the
defenses possible into the system. But past a certain point,
redundancy simply guards over and over against the same failure
pathway, adding almost no additional assurance at great
expense.b
At some point, the systems engineer assumes that
a failure—of an algorithm, a circuit, a program, or a person—
is inevitable. The challenge is to figure out how to react then.
The answer is to analyze failure from the top down as well
as from the bottom up (the fault tree approach). In the top-
down approach, the designer focuses on outcomes rather than
causes. What happens if the GPS guided vehicle can’t find a
signal, or control software interprets completely normal noise
as a signal, or water enters the car deck of a ferry? At that point,
it doesn’t matter how it happened. What matters is what you
do now. Even at the highest level of integration, designers
b That point of diminishing returns is actually fairly well defined: two-fold
redundancy can provide significant improvement in reliability; three-fold
redundancy is generally not worth the additional overheads and expense.
Why Systems and Software Fail
Why do ambitious systems and software projects fail so
often, wasting billions of dollars every year? In both cas-
es, the causes are overwhelmingly faults in organizational
culture, processes, or management, and not technical
missteps.
Warning Signs of Physical System Catastrophe
The Center for Chemical Process Safety compiled a
list of 161 symptoms that a system may be in danger of
imminent catastrophic collapse. Though their catalog is,
of course, tailored to the chemical process industries, the
principles can apply to any complex, high-hazard system
of systems. The CCPS list breaks the warning signs into
nine general categories, listed here, along with some
examples and a rationale for some Rational®
solutions.23
Leadership and Culture
Indicators of faulty leadership and culture include: An
organization that tacitly or explicitly accepts operating
outside the envelope of safety. A place where everyone is
too busy to do things right. Employees who don’t know
about or don’t care about standards. The medicine for a
weak culture is a stronger one, inspired by Continuous
Engineering and Lean principles and supported by tools
that can make them work.
Training and Competency
Employees who are not trained or encouraged to recog-
nize building catastrophes. An “organization” in which
relatively minor system disruptions provoke disorganized
responses. These are some of the hallmarks of poor
training. In systems of systems, programs like the Profes-
sional Software Engineer licensure and IBM® Academic
Initiative in software engineering can help keep engineers
fully aware of the implications of their decisions. These
will help ensure that necessary operational and training
information reaches the workforce.
8. 8
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
need to consider possible modes of failure. As Nancy G.
Leveson notes in Engineering a Safer World: Systems Thinking
Applied to Safety, “All inputs should be checked for out-of-range
or unexpected values and a response designed into the control
algorithm. A surprising number of losses still occur due to
software not being programmed to handle unexpected inputs.”20
Post accident root-cause analyses often point to operator
error: a human mistake is almost always involved somewhere
in the chain of events. When one delves into the big engineer-
ing disasters—Chernobyl, Fukushima, Deepwater Horizon,
and Bhopal—one finds that failures of social engineering.
Usually, behind the human mistake, one finds a series organi-
zational and management actions that make that mistake
more and more likely. Cutbacks in staff mean workers who
are rushed and tired. Cutbacks in training leave workers
unprepared to handle emergencies. Deferred maintenance
means that alarms and sensors don’t work reliably. Poorly
placed indicators and controls mean seconds lost in an emer-
gency. Ignoring employees’ warnings about safety destroys
morale and fosters a culture of negligence. Operator error
may be the last straw, but it can only break a system that is
already bending under the burden of invisible organizational
mistakes.20 21 22 23
Cautionary Tales
Southwest U.S. Blackout, 2011:
A Misplaced Check Mark
On September 8, 2011, a phase imbalance took a bank of
capacitors at Arizona Public Service’s North Gila substation
offline. An experienced technician was dispatched to isolate
them from the rest of the system. He reviewed the 16-step
procedure, making a note on his clipboard as each was com-
pleted. Because he was simultaneously trying to direct members
of a work crew, the technician entered the completion time
for Step 6 on the line for Step 8. Because he had skipped two
steps, when he resumed the procedure at Step 9, the switch he
opened was still carrying current at 500 kilovolts. The switch
started to arc. As the FERC report on the incident notes, the
technician “stayed under the arcing 500 kV line, determined
to crank open the switch far enough to break the arc, thereby
preventing additional damage to the equipment.”
Process Safety Information
The indications of a flawed safety culture include system
documentation that does not reflect current changes
and status, safety data that is not readily available, and
the absence of any process for managing system alarms.
Automated tools, such as process plug-ins, patterns and
models for IBM® Rational®, can help organizations keep
process safety and other documentation up-to-date and
readily available.
Procedures
CCPS lists 13 signs that key procedures are not doing
their jobs, including poor documentation and lax adher-
ence that causes too many automatic trips and shutdowns.
(Here again, process plug-ins, patterns and models for
IBM® Rational® can help engineers manage procedures
and responses along with requirements and changes.)
Asset Integrity
Red flags that the physical assets are not being monitored
or maintained properly include deferred inspections and
maintenance, lack of a formal maintenance program, and
bypassing alarms and safety systems. Here, the integra-
tion of life-cycle and asset management tools can help
ease the symptoms on an Open Services for Lifecycle
Collaboration, OSLC, platform.
Analyzing Risk and Managing Change
The 21 signs of faulty risk- and change-management
systems include stand-by systems that are not working,
risk-assessments intended merely to confirm decisions
already made, instruments that are bypassed without a
real change-management process. Reporting and require-
ments gathering tools naturally support risk-assessment
and change-management. Decisions are easier, too, with
SysML tools that link mathematical engineering analyses
to structural and behavioral design models (tools such
as the Parametric Constraints Evaluator). Moreover,
organizations that embrace Continuous Engineering
principles (collaboration, continuous validation and ver-
ification, and strategic-reuse) are institutionally inclined
to find, acknowledge, and fix problems.
9. 9
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
As the switch opened, however, the arcs to both phases of
the disconnect switch lengthened…until they made contact.
This tripped a phase-to-phase fault. The phase angle difference
between the two power segments quickly increased to the
point that the quick reconnection was impossible. Eleven
minutes later, the surge of power had triggered a cascade of
automatic diversions and shutdowns that tripped the separation
switch for the San Onofre Nuclear Generating Station. This
isolated the entire region surrounding San Diego, CA, Yuma,
AZ, and Tijuana, Baja California, Mexico. This “power island”
collapsed almost immediately, leaving some 7 million people
completely without electricity and mostly without cell phone
service for six hours (and some as long as 12 hours).24 25
As one veteran systems engineer observed, “You can’t have
a system set up so that one guy can make a mistake to take
out seven million people’s power. There’s something wrong
with the system if that’s a possibility.”
Northeast Blackout, August 2003:
Secondary Software Errors
Between 3 p.m. and 4 p.m. on August 14, 2003, three 345-
kilovolt transmission lines in Ohio failed when overgrown
trees touched the wires. This triggered a cascade of failures
in an already stressed system, shutting down power to
55 million people in the Northeastern U.S. and Canada.
Though inadequate maintenance of the transmission right-
of-way caused the immediate failure, a series of software
failures earlier in the day had prevented the grid’s operators
from anticipating, recognizing, and correcting the other
problems that pushed the system past its breaking point.
The Midcontinent Independent System Operator (MISO,
Carmel, IN) control center’s listing of operating assets was
out of date: A 230 kV line was out of service, and the local
operator’s update of its status was not passed on to MISO’s
state estimator, software that monitors grid traffic and alerts
operators to impending problems. Unable to reconcile the
data it was receiving with its internal model. The system
started to generate solutions well outside acceptable limits.
MISO took the state estimator offline at 12:15 for trouble-
shooting. The problem was fixed by 1:00 p.m., but the techni-
cian did not reset the state estimator to poll the system and
report every five minutes. The state estimator stayed offline
until after 4 p.m., leaving MISO partially blind.
Audits
The 10 signs that the organization is not making
sufficient effort to identify and remedy its shortcomings
include: problems that come up again and again in audit
after audit; management that doesn’t review audits;
regulatory citations and fines; failure to let all involved
employees share audit results. Tools for managing require-
ments and changes aid greatly in reporting problems
and implementing changes, and the ability to incorporate
modeling allows engineers to analyze tradeoffs and
choose the most cost-effective fixes.
Learning from Experience
Down-bound organizations fail to learn from experience,
making the same mistakes over and over, and downplay-
ing the importance of each of their increasingly frequent
stumbles. Again, a Continuous Engineering culture based
on reusable assets such as object oriented requirements,
design specifics, and architectural work products will pro-
vide visibility and transparency opportunities, so they are
seen as occasions to understand and improve the system,
not as an embarrassments to be swept under the rug.
Physical Warning Signs
Finally, companies racing towards catastrophe simply
refuse to read the writing on the wall, ignoring the phys-
ical warning signs of coming failures: complaints from
workers or the surrounding community, equipment that
is visibly damaged, accumulations of dirt, missing safety
equipment, open flames, open electrical panels, and
loose fasteners on equipment. Yet again, a remedy is a
Continuous Engineering, coupled with regular inspec-
tions and a Lean Six Sigma mind-set intent on eliminating
waste and barriers to productivity.
10. 10
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
About two hours later, the First Energy’s SCADA (supervisory
control and data acquisition) alarm program, part of its key
Energy Management System (EMS), also failed, unnoticed
by anyone in the control room or IT. And about 20 minutes
after that, the server hosting the FE’s EMS also failed, perhaps
because the SCADA alarm had locked up. The system failed
over to a backup server, but it, too, failed after the stalled
SCADA alarm program was transferred to it. The backup
EMS crashed just before 4 p.m.—leaving the grid operators
partially deaf and blind to the condition of their system
as one heavy transmission line after another dropped off
the system.26
Mars Polar Lander, 1999: Blame the System
In December 1999, NASA’s Mars Polar Lander vanished
during decent to the Martian surface. Later reconstructions
indicated that descent braking engines had stopped firing
prematurely. The probe had been designed so that load
sensors in its legs would detect the impact of landing, and
the Lander’s flight control system would then shut down the
descent braking engines. As probe’s fall through the atmo-
sphere, however, apparently produced noise—a signal that
designers called “normal and expected.” The control system
interpreted noise as the signal that the probe had landed,
and shut down the engines in mid-air—an example of how
a system can malfunction even though all of its individual
components are working properly.20
Ariane 501, 1996: The Importance of Tracking Changes
On 4 June 1996, the new European Space Agency rocket
Ariane 5 tore itself apart and exploded 40 seconds after lift-
off, only 3700 meters above its launch site in French Guiana.
According to the Board of Inquiry convened to analyze the
failure, the problem lay in the software of Ariane 5’s inertial
reference system (IRS), a subsystem recycled from the earlier
Ariane 4. The Ariane 4 IRS expected signed 16-bit input;
the Ariane 5 was sending 64-bit floating point data. The
mismatch sent the processor into an error trap, the IRS failed,
and the vehicle lost stability.27
Earmarks of a Software Project
in Trouble
A 2005 IEEE Spectrum article, “Why Software Fails,”
listed the 12 most common causes for project collapse.
They are35
The project-killers include:
• Unrealistic or unarticulated project goals
• Inaccurate estimates of needed resources
• Badly defined system requirements
• Poor reporting of the project’s status
• Unmanaged risks
• Poor communication among customers,
developers, and users
• Use of immature technology
• Inability to handle the project’s complexity
• Sloppy development practices
• Poor project management
• Stakeholder politics
• Commercial pressures
11. 11
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
Security
Right now, security is the most prominent of the non-function-
al requirements that every design must address. The emphasis
changes, however. Today it’s security. Tomorrow it may
be reliability or maintainability. Later it may be availability
or safety. The important task is to balance all of the factors
to stand up over time.
In the power and energy sector particularly, legacy systems
often make up the bulk of the infrastructure. The sensors
and actuators were added later to permit some remote monitor-
ing and control. In many cases, security was an afterthought.
The situation should improve dramatically as systems meth-
odology and newer standards and protocols let engineers
design in security, identity verification, privacy protection,
etc. from the project’s inception.
There is no doubt, though, that Western energy infrastruc-
ture is under near-constant cyber assault. A 2013 survey
commissioned by two U.S. Congressmen included reports
from 69 American electric power utilities (36 independently
owned utilities, 25 municipal or regional suppliers, and 8
federal). They found that about 20% of the respondents
reported “‘daily,’ ‘constant,’ or ‘frequent’ attempted cyber-
attacks ranging from phishing to malware infection to
unfriendly probes. One utility reported that it was the target
of approximately 10,000 attempted cyber-attacks each month.”28
The Ponemon Institute, with sponsorship from Unisys,
conducted a larger security survey of 599 infrastructure
companies world-wide (electric, gas, and water utilities; oil
and gas producers and retailers; alternative energy producers;
chemical and industrial manufacturers). Two thirds of them
reported suffering “at least one security compromise that
led to the loss of confidential information or disruption”
during the preceding 12 months.29
Professional Software Engineer
As safety-critical systems get more complex, manufactur-
ers and customers alike need some way of ensuring that the
software is developed to a high standard, by developers who
understand not only the code, but also the physics or chem-
istry of the system they’re working with and the necessity
of working with organizational social structures to develop
requirements.
Software doesn’t fail of itself. It fails when it’s supplied with
input that’s inappropriate in the context of the physical system.
Though failure analyses may identify software as the root
cause, one too often finds that the program, in fact, did
exactly what it was supposed to do. The real cause was that the
requirements, the full definition of the problem to be solved,
were incomplete. The software engineer did not, in fact, write
the code wrong. He or she was never asked to write the right
code. Developing the real requirements and understanding
the full context in which the programs will operate is the true
foundation of software safety.
In April 2013, NCEES (National Council of Examiners
for Engineering and Surveying) began administering its
first exams for Professional Engineer licensure in Software
Engineering. The 80 questions in the 8-hour test put an
emphasis on requirements gathering, safety and security, and
design methodology. To earn a license, the applicant must
also demonstrate an understanding of the physical systems
with which the code interacts. As a prerequisite to the PE/SE
license, NCEES administers Fundamentals of Engineering
examinations in seven disciplines. The exams include topics
like engineering math, probability, circuit analysis, linear
systems, signal processing, electronics, chemistry, instru-
mentation, ethics, health and safety, engineering economics,
statics, dynamics, strength of materials, materials science,
fluid mechanics, and electricity and magnetism, and the
transfer of heat, mass, and energy.30
Topics on the NCEES Software Engineering Exam
Knowledge Area % of Exam
Requirements 17.5%
Design 13.75%
Construction 11.25%
Testing 12.5%
Maintenance 7.5%
Configuration Management 7.5%
Engineering Processes 7.5%
Quality Assurance 7.5%
Safety, Security, and Privacy 15%
12. 12
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
Conclusion
Whether or not it is consciously designed to the standards of
systems engineering, the coming Industrial Internet of Things
will be a system of systems. Adopting a unified engineering
approach that explicitly recognizes and tracks the interactions
of physical, organizational, and business factors will be the
key to developing these interlocking systems And it offers
the best hope for long-term safe and reliable operation of
constellations of billions of interacting elements that cannot
be fully defined at the design stage…if ever. This white paper
is intended to offer a glimpse of that future, and to help the
people who will build it get a sound start on the task.
By Douglas McCormick
About the Author
Douglas McCormick, principal of Runestone Associates, is a science
and technology writer and editor, an IEEE Spectrum webinar host,
and its test and measurement blogger.
This paper is based on interviews with IBM’s Ben Amaba and
Gavin Arthurs, and on papers written by Dr. Amaba, Paul
Fechtelkotter (also of IBM) and others.
References
1 T. Ahram, W. Karwowski, B. Amaba and P. Fechtelkotter, “A
System-of-Systems Engineering Approach for Power Energy
Management,” in Proceedings of the 2013 Industrial and Systems
Engineering Research Conference, 2013.
2 American Society of Civil Engineers, “2013 Report Card for Amer-
ica’s Infrastructure,” American Society of Civil Engineers, 2014.
[Online]. Available: http://www.infrastructurereportcard.org/.
3 EMC Digital Universe with Research Analysis by IDC, “The
Digital Univers of Opportunities: Rich Data and the Increasing Value
of the Internet of Things,” EMC, April 2014. [Online]. Available:
http://www.emc.com/leadership/digital-universe/2014iview/inter-
net-of-things.htm.
4 IBM®
, “Electric vehicles and the challenges of convergence,” IBM®
Corporation, Software Group, October 2014. [Online]. Avail-
able: http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?sub-
type=WHinfotype=SAappname=SWGE_RA_VF_USENhtml-
fid=RAW14375USENattachment=RAW14375USEN.PDF#loaded.
5 A. L. Goldberger, “Giles F. Filley Lecture. Complex systems,” vol. 3,
no. 6, 2006.
6 P. Fechtelkotter, L. Bishop, D. Davis and B. Amaba, “Systems-of-Sys-
tems Engineering for Safety-Critical Projects,” in Mary Kay
O’Connor Process Safety Center International Symposium: Beyond
Regulatory Compliance, Making Safety Second Nature (October 28-
30, 2014), College Station, TX, 2014.
7 B. Amaba, “Industrial and Business Systems for Smart Cities,” in
EMASC ‘14, Nov 7-14, 2014, Orlando, FL, USA, 2014.
8 P. Fechtelkotter, G. Bleakley, B. P. Douglass and B. Amaba, “Mod-
el-Driven Development for Safety-Critical Projects in Intelligent
Energy,” in SPE Middle East Intelligent Energy Conference and
Exhibition, Dubai, UAE, October 28-30, 2013, 2013.
9 International Council on Systems Engineering, INCOSE Systems
Engineering Handbook, v2a, International Council on Systems Engi-
neering, 2004.
10 E. C. Honour, “Understanding the Value of Systems Engineering,”
2010. [Online]. Available: http://www.incose.org/secoe/0103/Val-
ueSE-INCOSE04.pdf.
11 Licensure and Qualifications for Practice Committee of the Naitonal
Society of Professional Engineers, Body of Knowledge, Licensure
and Qualifications for Practice, Alexandria, VA: National Society of
Professional Engineers, 2013.
12 T. Ahram, W. Karwowski and B. Amaba, “Collaborative systems
engineering and social-networking approach to design and modeling
of smarter products,” vol. 30, no. 1, 2011.
13 D. K. Hitchins, Systems Engineering: A 21st Century Systems Meth-
odology, Chichester, UK: John Wiley Sons, 2007.
14 K. Forsberg, H. Mooz and H. Cotterman, Visualizing Project Man-
agement: A Model for Business and Technical Success, New York,
NY: John Wiley Sons, 2000.
13. 13
IBM Software
Whitepaper Executive Summary
Smart Plants, Smart Grids.
January 2015
15 S. Friedenthal, A. Moore and R. Steiner, A Practical Guide to SysML:
The Systems Modeling Language, Morgan Kaufmann: Elsevier Sci-
ence, 2008.
16 M. Anderson, “Is There Any Way to Avoid Standards Wars in the
Emerging Internet of Things?,” IEEE, 4 August 2014. [Online].
Available: http://spectrum.ieee.org/tech-talk/consumer-electronics/
standards/is-there-any-way-to-avoid-standards-wars-in-the-emerg-
ing-internet-of-things.
17 M. Rozenfeld, “Setting the Stage for the Internet of Things: Cov-
ering a spectrum of applications,” IEEE, 14 March 2014. [Online].
Available: http://theinstitute.ieee.org/benefits/standards/setting-the-
stage-for-the-internet-of-things.
18 IEEE P2413 Working Group, “Standard for an Architectural Frame-
work for the Internet of Things (IoT),” IEEE, [Online]. Available:
http://grouper.ieee.org/groups/2413/.
19 B. Amaba, “Ben Amaba Houston 08052012 v1.pdf,” IBM®
Software
Group, 2012. [Online]. Available: https://www-950.ibm.com/events/
wwe/grp/grp004.nsf/vLookupPDFs/Ben%20Amaba%20-%20
Houston%2008052012%20v1/$file/Ben%20Amaba%20-%20Hous-
ton%2008052012%20v1.pdf.
20 N. G. Leveson, Engineering a Safer World: Systems Thinking Ap-
plied to Safety, Cambridge, MA: MIT Press, 2012, p. 608pp.
21 J. Mahaffey, Atomic Accidents: A History of Nuclear Meltdowns and
Disasters: From the Ozark Mountains to Fukushima, Pegasus, 2014,
p. 460 pp.
22 C. Perrow, Normal Accidents: Living with High-Risk Technologies,
Basic Books, 1984, p. 386 pp.
23 Center for Chemical Process Safety (CCPS), Recognizing Cata-
strophic Incident Warning Signs in the Process Industries, Wiley,
2011, p. 264 pp.
24 Federal Energy Regulatory Commission and the North American
Electric Reliability Corporation, “Arizona-Southern California Out-
ages on September 8, 2011,,” Federal Energy Regulatory Commis-
sion and the North American Electric Reliability Corporation (April
2012). Arizona-Southern California Outages on September 8, 2011,
2012.
25 California Assembly Utilities and Commerce Committee and Joint
Legislative Committee on Emergency Management, “Briefing Paper
on September 8, 2011 Southwest Power Outage,” California Legisla-
ture.
26 U.S.-Canada Power System Outage Task Force, “Final Report on
the August 14, 2003 Blackout in the United States and Canada,”
U.S. Department of Energy, April 2004. [Online]. Available: http://
energy.gov/sites/prod/files/oeprod/DocumentsandMedia/BlackoutFi-
nal-Web.pdf.
27 Ariane 501 Inquiry Board, J.L. Lions, chair, “Ariane 501 - Presen-
tation of Inquiry Board report / Press Releases / For Media / ESA,”
European Space Agency, 23 July 1996. [Online]. Available: http://
esamultimedia.esa.int/docs/esa-x-1819eng.pdf.
28 Staffs of Congressmen Edward J. Markey (D-MA) and Henry A.
Waxman (D-CA), “Electric Grid Vulnerability: Industry Responses
Reveal Security Gaps,” U.S. House of Representatives, 2013.
29 Ponemon Institute LLC, “Critical Infrastructure: Security Prepared-
ness and Maturity,” Unisys Corporation, 2014.
30 NCEES, “NCEES Principles and Practice of Engineering Examina-
tion: Software Engineering Exam Specifications,” National Council
of Examiners for Engineering and Surveying, April 2013. [Online].
Available: http://cdn1.ncees.co/wp-content/uploads/2012/11/SWE-
Apr-2013.pdf.
31 The ENCODE Project Consortium, “An integrated encyclopedia of
DNA elements in the human genome,” vol. 489, pp. 57-74, 6 Septem-
ber 2012.
32 C. O. Tan, “Heart rate variability: are there complex patters?,” Fron-
tiersIn.org, 4 July 2013. [Online]. Available: http://journal.frontiersin.
org/Journal/10.3389/fphys.2013.00165/full.
33 C. C. Peng, A. C. Yang and A. L. Goldberger, “Statistical physics
approach to categorize biologic signals: From heart rate dynamics to
DNA sequences,” vol. 17, 2007.
34 G. Matchett and P. Wood, “General anesthesia suppresses normal
heart rate variability in humans,” vol. 24, no. 2, 2014.
35 R. N. Charette, “Why Software Fails,” IEEE, 2 September 2005.
[Online]. Available: http://spectrum.ieee.org/computing/software/
why-software-fails.