SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
On the 
personalization of 
event-based 
systems 
Speaker: Opher Etzion 
opher.etzion@gmail.com 
Joint work with Fabiana Fournier from IBM
2 
Example: 
Personalized aides for elderly to maintain independent life 
Alerts example: 
Door was not locked within 2 minutes after entrance 
Falling event detected 
Vocal distress detected 
No motion for certain time period detected 
While much technology exists, it is not widely 
used. It needs to be more personalized, more 
affordable, and much simpler… 
Motion 
sensor 
Chair 
Sensor 
Door 
sensor 
Voice 
Sensor 
Alert 
family 
member 
The research required is multi-disciplinary: 
Technology oriented, human oriented, economic oriented and particular 
domain oriented
3 
On Personalization 
The industrial revolution opened the era of 
mass production, variety depends on the 
economy of scale. 
Current technology such as Internet of Things 
provides the opportunity to enable everybody to 
create their own systems. This requires multi-disciplinary 
effort.
4 
The term “Internet of Things” was coined by Kevin 
Ashton in 1999. 
His observation was that all the data on the 
Internet has been created by a human. 
His vision was: “we need to empower computers with 
their own means of gathering information, so they 
can see, hear, and smell the world by themselves”.
5 
The value of sensors 
Kevin Ashton: “track and count everything, and 
greatly reduce waste, loss, and cost. We could 
know when things needs replacing, repairing or 
recalling, and whether they were fresh or past 
their best” 
The value is in the ability to know and react in a 
timely manner to situations that are detected by 
sensors
6 
Differences between the traditional Internet to 
the Internet of Everything 
Topic Traditional Internet Internet of Everything 
Who creates content? Human Machine 
How is the content 
consumed? 
By request By pushing information 
and triggering actions 
How content is 
combined? 
Using explicitly defined 
links 
Through explicitly 
defined operators 
What is the value? Answer questions Action and timely 
knowledge 
What was done so far? Both content creation 
(HTML…) and content 
consumption (search 
engines) 
Mainly content creation
7 
“How does Event Processing get into the 
picture?” 
While the weakest link is now considered the data 
integration issue – looking beyond that we can find 
event processing 
Combining data from multi-sensors to get 
observations, alerts, and actions in real-time gets 
us to the issue of detecting patterns in event 
streams 
However much of the IoT world has not realized it 
yet…
8 
A major difference between traditional Internet 
and the IoE – usability 
The success of the Internet is attributed to its 
relative simplicity: 
to connect 
to create content 
to search 
Imagine that any search in the 
Internet would have been done 
using SQL queries… 
How pervasive do you think the 
Internet would have been?
For situational awareness…. 
Languages are actually more complex than 
SQL 
9 
// Large cash deposit 
insert into LargeCashDeposit 
select * from Cash deposit where amount > 100,000 
// Frequent (At least three) large cash deposits 
create context AccountID partition by accountId on Cash deposit; 
Context AccountID 
Insert into FrequentLargeCashDeposits select count(*) from LargeCashDeposit 
having count(*)>3; 
// Frequent cash deposits followed by transfer abroad 
Context AccountID 
insert into SuspiciousAccount select * from pattern [ 
every f=FrequentCashDeposit -> t=TransferAbroad where timer.within(10 days)]
10 
12 Hurdles Hampering The Internet of Things 
1. Basic Infrastructure Immaturity 
2. Few Standards 
3. Security Immaturity 
4. Physical Security Tampering 
5. Privacy Pitfalls 
6. Data Islands 
7. Information, but Not Insights 
8. Power Consumption and Batteries 
9. New Platforms with New Languages and Technologies 
10.Enterprise Network Incompatibility 
11.Device Overload 
12.New Communications and Data Architectures 
Chris Curran, 
October 30, 2014 
https://www.linkedin.com/ 
pulse/article/20141030181 
835-509139-12-hurdles-hampering- 
the-internet-of-
11 
Democratization of use in Internet of 
Everything 
Challenges: 
Integration of sensors and actuators 
Personalization of situation detection 
Pervasive use
12 
Personalization of situation detection
Eliminating noise from the model 
Current models are close to the 
implementation models – and from pure 
logic view contain “noise”. 
Bringing data from current state 
Query Enrichment 
Inclusion in 
events 
Examples: 
Determine what food-type 
the container carries 
Fetch the temperature 
regulations for a specific 
food type 
Other noise : workarounds 
13 
For simplification we need to clean the noise
14 
The Event Model 
Research project developed by IBM Haifa Research Lab and 
Knowledge Partners International that dealt with simplification of 
event processing using model driven engineering approach 
The Event Model design goals 
Short video can be found in: 
https://www.youtube.com/watch?v 
=9zjy8wngy5Y&feature=youtu.be
TEM Concepts 
Facts 
Glossary Logic 
Actors 
Events 
States 
Event Derivation 
Logic Transitions 
IT elements Goals 
Computation 
Logic
Simple example: 
Top down design of event model for suspicious 
account derivation 
Suspicious Account Compliance officer 
Bank transaction system 
Frequent large cash 
deposits 
Frequent large cash 
deposits 
Large cash deposit 
Large cash deposit 
cash amount 
<Cash deposit> 
customer threshold
Specification for deriving Suspicious 
Account 
Suspicious account Logic 
Row # 
When 
Expression 
When 
Start 
When 
End 
Partition by Filter on event Pattern Filter on pattern 
Account ID Frequent large 
cash deposits 
1 
always same is Detected 
Frequent large cash deposits Logic 
Row # 
When 
Expression 
When 
Start 
When 
End 
Partition by Filter on event Pattern Filter on pattern 
Account ID Count(Large cash 
deposit) 
1 
every 10 
days 
same > 3 
Large cash deposit Logic 
Row # 
When 
Expression 
When 
Start 
When 
End 
Partition by Filter on event Pattern Filter on pattern 
Customer ID cash amount <Cash 
deposit> 
1 
always same >= customer 
threshold
Pattern on events 
Suspicious customer logic 
Row # Context Conditions 
When Partition by Event filter Pattern on events Filter on 
patterned events 
Expressi 
on 
Start End Customer ID Amount <Cash 
deposit> 
Amount <Transfer 
Abroad> 
Cash deposit Account <Cash 
Deposit> 
1 Every 
week 
same >= 150K >= 100K OCCURS 
BEFORE 
Transfer 
Abroad 
IS 
NOT 
Account 
<Transfer 
Abroad> 
A B C D 
Pattern on events designates what the relationship between events is. 
In this case conditions C states that an event should occur before 
another.
19 
My main motivation is to use the experience and 
knowledge I have accumulated over the years to make a 
better world

Weitere ähnliche Inhalte

Was ist angesagt?

Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityPrateek Panda
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 
Cyber security-presentation
Cyber security-presentationCyber security-presentation
Cyber security-presentationMuhammadHossen
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Skills Academy
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYPriyanshu Ratnakar
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on CybersecurityGraham Mann
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeDeepak Kumar (D3)
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYvenkatvajradhar1
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber CrimeDeepak Kumar
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 

Was ist angesagt? (20)

Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Cyber security-presentation
Cyber security-presentationCyber security-presentation
Cyber security-presentation
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
 
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Cyber Security India & Cyber Crime
Cyber Security India & Cyber CrimeCyber Security India & Cyber Crime
Cyber Security India & Cyber Crime
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 

Ähnlich wie On the personalization of event-based systems

On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014Opher Etzion
 
Advantage And Disadvantage Of Cryptocurrency
Advantage And Disadvantage Of CryptocurrencyAdvantage And Disadvantage Of Cryptocurrency
Advantage And Disadvantage Of CryptocurrencySara Rouse
 
Has Internet of Things really happened?
Has Internet of Things really happened? Has Internet of Things really happened?
Has Internet of Things really happened? Opher Etzion
 
Technological Saga In The World Of Online ARPANET
Technological Saga In The World Of Online ARPANETTechnological Saga In The World Of Online ARPANET
Technological Saga In The World Of Online ARPANETLisa Martinez
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
A Brief Note On Internet Wide Scanning And Tracking The...
A Brief Note On Internet Wide Scanning And Tracking The...A Brief Note On Internet Wide Scanning And Tracking The...
A Brief Note On Internet Wide Scanning And Tracking The...Megan Jones
 
DEBS 2014 tutorial on the Internet of Everything.
DEBS 2014 tutorial  on the Internet of Everything. DEBS 2014 tutorial  on the Internet of Everything.
DEBS 2014 tutorial on the Internet of Everything. Opher Etzion
 
Detection Systems For The Network
Detection Systems For The NetworkDetection Systems For The Network
Detection Systems For The NetworkAmy Alexander
 
Selecting Password Based On Computer Scientific And...
Selecting Password Based On Computer Scientific And...Selecting Password Based On Computer Scientific And...
Selecting Password Based On Computer Scientific And...Alexis Naranjo
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsAmy Nelson
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxNune SrinivasRao
 
Computer Forensics Tools And Resources For Hjc Corporation
Computer Forensics Tools And Resources For Hjc CorporationComputer Forensics Tools And Resources For Hjc Corporation
Computer Forensics Tools And Resources For Hjc CorporationLarissa Swenson
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunk
 
Security Techniques Essay
Security Techniques EssaySecurity Techniques Essay
Security Techniques EssayLindsey Rivera
 
Security Of The Internet Of Things
Security Of The Internet Of ThingsSecurity Of The Internet Of Things
Security Of The Internet Of ThingsMonica Cordova
 
Infa 610 Final Exam Solutions
Infa 610 Final Exam SolutionsInfa 610 Final Exam Solutions
Infa 610 Final Exam SolutionsChelsea Porter
 
Koosis on Risk & Innovation
Koosis on Risk & InnovationKoosis on Risk & Innovation
Koosis on Risk & InnovationDavid Koosis
 
Information About A New Pradigm, Cloud Computing
Information About A New Pradigm, Cloud ComputingInformation About A New Pradigm, Cloud Computing
Information About A New Pradigm, Cloud ComputingAsia Grover
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 

Ähnlich wie On the personalization of event-based systems (20)

On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014On Internet of Everything and Personalization. Talk in INTEROP 2014
On Internet of Everything and Personalization. Talk in INTEROP 2014
 
Advantage And Disadvantage Of Cryptocurrency
Advantage And Disadvantage Of CryptocurrencyAdvantage And Disadvantage Of Cryptocurrency
Advantage And Disadvantage Of Cryptocurrency
 
Has Internet of Things really happened?
Has Internet of Things really happened? Has Internet of Things really happened?
Has Internet of Things really happened?
 
Technological Saga In The World Of Online ARPANET
Technological Saga In The World Of Online ARPANETTechnological Saga In The World Of Online ARPANET
Technological Saga In The World Of Online ARPANET
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
A Brief Note On Internet Wide Scanning And Tracking The...
A Brief Note On Internet Wide Scanning And Tracking The...A Brief Note On Internet Wide Scanning And Tracking The...
A Brief Note On Internet Wide Scanning And Tracking The...
 
DEBS 2014 tutorial on the Internet of Everything.
DEBS 2014 tutorial  on the Internet of Everything. DEBS 2014 tutorial  on the Internet of Everything.
DEBS 2014 tutorial on the Internet of Everything.
 
Detection Systems For The Network
Detection Systems For The NetworkDetection Systems For The Network
Detection Systems For The Network
 
Selecting Password Based On Computer Scientific And...
Selecting Password Based On Computer Scientific And...Selecting Password Based On Computer Scientific And...
Selecting Password Based On Computer Scientific And...
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Computer Forensics Tools And Resources For Hjc Corporation
Computer Forensics Tools And Resources For Hjc CorporationComputer Forensics Tools And Resources For Hjc Corporation
Computer Forensics Tools And Resources For Hjc Corporation
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
 
Security Techniques Essay
Security Techniques EssaySecurity Techniques Essay
Security Techniques Essay
 
Security Of The Internet Of Things
Security Of The Internet Of ThingsSecurity Of The Internet Of Things
Security Of The Internet Of Things
 
Infa 610 Final Exam Solutions
Infa 610 Final Exam SolutionsInfa 610 Final Exam Solutions
Infa 610 Final Exam Solutions
 
Koosis on Risk & Innovation
Koosis on Risk & InnovationKoosis on Risk & Innovation
Koosis on Risk & Innovation
 
Information About A New Pradigm, Cloud Computing
Information About A New Pradigm, Cloud ComputingInformation About A New Pradigm, Cloud Computing
Information About A New Pradigm, Cloud Computing
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 

Mehr von Opher Etzion

DEBS 2019 tutorial : correctness and consistency of event-based systems
DEBS 2019 tutorial  : correctness and consistency of event-based systems DEBS 2019 tutorial  : correctness and consistency of event-based systems
DEBS 2019 tutorial : correctness and consistency of event-based systems Opher Etzion
 
Sw architectures 2018 on microservices and eda
Sw architectures 2018    on microservices and edaSw architectures 2018    on microservices and eda
Sw architectures 2018 on microservices and edaOpher Etzion
 
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmasER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmasOpher Etzion
 
Event processing within the human body - Tutorial
Event processing within the human body - Tutorial Event processing within the human body - Tutorial
Event processing within the human body - Tutorial Opher Etzion
 
DEBS 2015 tutorial When Artificial Intelligence meets the Internet of Things
DEBS 2015 tutorial   When Artificial Intelligence meets the Internet of ThingsDEBS 2015 tutorial   When Artificial Intelligence meets the Internet of Things
DEBS 2015 tutorial When Artificial Intelligence meets the Internet of ThingsOpher Etzion
 
Introduction to the institute of technological empowerment
Introduction to the institute of technological empowermentIntroduction to the institute of technological empowerment
Introduction to the institute of technological empowermentOpher Etzion
 
The Internet of Things and some introduction to the Technological Empowerment...
The Internet of Things and some introduction to the Technological Empowerment...The Internet of Things and some introduction to the Technological Empowerment...
The Internet of Things and some introduction to the Technological Empowerment...Opher Etzion
 
ER 2013 tutorial: modeling the event driven world
ER 2013 tutorial:  modeling the event driven world ER 2013 tutorial:  modeling the event driven world
ER 2013 tutorial: modeling the event driven world Opher Etzion
 
Event semantics and model - multimedia events workshop
Event semantics and model -  multimedia events workshopEvent semantics and model -  multimedia events workshop
Event semantics and model - multimedia events workshopOpher Etzion
 
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...Opher Etzion
 
Debs 2012 gong show immortality
Debs 2012 gong show immortalityDebs 2012 gong show immortality
Debs 2012 gong show immortalityOpher Etzion
 
Debs 2012 basic proactive
Debs 2012 basic proactiveDebs 2012 basic proactive
Debs 2012 basic proactiveOpher Etzion
 
Debs 2012 uncertainty tutorial
Debs 2012 uncertainty tutorialDebs 2012 uncertainty tutorial
Debs 2012 uncertainty tutorialOpher Etzion
 
Proactive eth talk
Proactive eth talkProactive eth talk
Proactive eth talkOpher Etzion
 
Aaai 2011 event processing tutorial
Aaai 2011 event processing tutorialAaai 2011 event processing tutorial
Aaai 2011 event processing tutorialOpher Etzion
 
Debs 2011 pattern rewritingforeventprocessingoptimization
Debs 2011  pattern rewritingforeventprocessingoptimizationDebs 2011  pattern rewritingforeventprocessingoptimization
Debs 2011 pattern rewritingforeventprocessingoptimizationOpher Etzion
 
Debs 2011 tutorial on non functional properties of event processing
Debs 2011 tutorial  on non functional properties of event processingDebs 2011 tutorial  on non functional properties of event processing
Debs 2011 tutorial on non functional properties of event processingOpher Etzion
 
Omg co p proactive computing oct 2010
Omg co p   proactive computing oct 2010Omg co p   proactive computing oct 2010
Omg co p proactive computing oct 2010Opher Etzion
 
Vldb 2010 event processing tutorial
Vldb 2010 event processing tutorialVldb 2010 event processing tutorial
Vldb 2010 event processing tutorialOpher Etzion
 

Mehr von Opher Etzion (20)

DEBS 2019 tutorial : correctness and consistency of event-based systems
DEBS 2019 tutorial  : correctness and consistency of event-based systems DEBS 2019 tutorial  : correctness and consistency of event-based systems
DEBS 2019 tutorial : correctness and consistency of event-based systems
 
Sw architectures 2018 on microservices and eda
Sw architectures 2018    on microservices and edaSw architectures 2018    on microservices and eda
Sw architectures 2018 on microservices and eda
 
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmasER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
ER 2017 tutorial - On Paradoxes, Autonomous Systems and dilemmas
 
Event processing within the human body - Tutorial
Event processing within the human body - Tutorial Event processing within the human body - Tutorial
Event processing within the human body - Tutorial
 
DEBS 2015 tutorial When Artificial Intelligence meets the Internet of Things
DEBS 2015 tutorial   When Artificial Intelligence meets the Internet of ThingsDEBS 2015 tutorial   When Artificial Intelligence meets the Internet of Things
DEBS 2015 tutorial When Artificial Intelligence meets the Internet of Things
 
Dynamic stories
Dynamic storiesDynamic stories
Dynamic stories
 
Introduction to the institute of technological empowerment
Introduction to the institute of technological empowermentIntroduction to the institute of technological empowerment
Introduction to the institute of technological empowerment
 
The Internet of Things and some introduction to the Technological Empowerment...
The Internet of Things and some introduction to the Technological Empowerment...The Internet of Things and some introduction to the Technological Empowerment...
The Internet of Things and some introduction to the Technological Empowerment...
 
ER 2013 tutorial: modeling the event driven world
ER 2013 tutorial:  modeling the event driven world ER 2013 tutorial:  modeling the event driven world
ER 2013 tutorial: modeling the event driven world
 
Event semantics and model - multimedia events workshop
Event semantics and model -  multimedia events workshopEvent semantics and model -  multimedia events workshop
Event semantics and model - multimedia events workshop
 
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
Debs 2013 tutorial : Why is event-driven thinking different from traditional ...
 
Debs 2012 gong show immortality
Debs 2012 gong show immortalityDebs 2012 gong show immortality
Debs 2012 gong show immortality
 
Debs 2012 basic proactive
Debs 2012 basic proactiveDebs 2012 basic proactive
Debs 2012 basic proactive
 
Debs 2012 uncertainty tutorial
Debs 2012 uncertainty tutorialDebs 2012 uncertainty tutorial
Debs 2012 uncertainty tutorial
 
Proactive eth talk
Proactive eth talkProactive eth talk
Proactive eth talk
 
Aaai 2011 event processing tutorial
Aaai 2011 event processing tutorialAaai 2011 event processing tutorial
Aaai 2011 event processing tutorial
 
Debs 2011 pattern rewritingforeventprocessingoptimization
Debs 2011  pattern rewritingforeventprocessingoptimizationDebs 2011  pattern rewritingforeventprocessingoptimization
Debs 2011 pattern rewritingforeventprocessingoptimization
 
Debs 2011 tutorial on non functional properties of event processing
Debs 2011 tutorial  on non functional properties of event processingDebs 2011 tutorial  on non functional properties of event processing
Debs 2011 tutorial on non functional properties of event processing
 
Omg co p proactive computing oct 2010
Omg co p   proactive computing oct 2010Omg co p   proactive computing oct 2010
Omg co p proactive computing oct 2010
 
Vldb 2010 event processing tutorial
Vldb 2010 event processing tutorialVldb 2010 event processing tutorial
Vldb 2010 event processing tutorial
 

Kürzlich hochgeladen

The Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayerThe Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayerPavel Šabatka
 
Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Vladislav Solodkiy
 
CCS336-Cloud-Services-Management-Lecture-Notes-1.pptx
CCS336-Cloud-Services-Management-Lecture-Notes-1.pptxCCS336-Cloud-Services-Management-Lecture-Notes-1.pptx
CCS336-Cloud-Services-Management-Lecture-Notes-1.pptxdhiyaneswaranv1
 
Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...PrithaVashisht1
 
Optimal Decision Making - Cost Reduction in Logistics
Optimal Decision Making - Cost Reduction in LogisticsOptimal Decision Making - Cost Reduction in Logistics
Optimal Decision Making - Cost Reduction in LogisticsThinkInnovation
 
ChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics InfrastructureChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics Infrastructuresonikadigital1
 
CI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual interventionCI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual interventionajayrajaganeshkayala
 
Virtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product IntroductionVirtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product Introductionsanjaymuralee1
 
Rock Songs common codes and conventions.pptx
Rock Songs common codes and conventions.pptxRock Songs common codes and conventions.pptx
Rock Songs common codes and conventions.pptxFinatron037
 
Master's Thesis - Data Science - Presentation
Master's Thesis - Data Science - PresentationMaster's Thesis - Data Science - Presentation
Master's Thesis - Data Science - PresentationGiorgio Carbone
 
Mapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptxMapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptxVenkatasubramani13
 
5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best Practices5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best PracticesDataArchiva
 
How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?sonikadigital1
 
Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for ClarityStrategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for ClarityAggregage
 
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptxTINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptxDwiAyuSitiHartinah
 
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024Guido X Jansen
 

Kürzlich hochgeladen (16)

The Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayerThe Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayer
 
Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023
 
CCS336-Cloud-Services-Management-Lecture-Notes-1.pptx
CCS336-Cloud-Services-Management-Lecture-Notes-1.pptxCCS336-Cloud-Services-Management-Lecture-Notes-1.pptx
CCS336-Cloud-Services-Management-Lecture-Notes-1.pptx
 
Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...
 
Optimal Decision Making - Cost Reduction in Logistics
Optimal Decision Making - Cost Reduction in LogisticsOptimal Decision Making - Cost Reduction in Logistics
Optimal Decision Making - Cost Reduction in Logistics
 
ChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics InfrastructureChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics Infrastructure
 
CI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual interventionCI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual intervention
 
Virtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product IntroductionVirtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product Introduction
 
Rock Songs common codes and conventions.pptx
Rock Songs common codes and conventions.pptxRock Songs common codes and conventions.pptx
Rock Songs common codes and conventions.pptx
 
Master's Thesis - Data Science - Presentation
Master's Thesis - Data Science - PresentationMaster's Thesis - Data Science - Presentation
Master's Thesis - Data Science - Presentation
 
Mapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptxMapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptx
 
5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best Practices5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best Practices
 
How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?
 
Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for ClarityStrategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
 
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptxTINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
 
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
 

On the personalization of event-based systems

  • 1. On the personalization of event-based systems Speaker: Opher Etzion opher.etzion@gmail.com Joint work with Fabiana Fournier from IBM
  • 2. 2 Example: Personalized aides for elderly to maintain independent life Alerts example: Door was not locked within 2 minutes after entrance Falling event detected Vocal distress detected No motion for certain time period detected While much technology exists, it is not widely used. It needs to be more personalized, more affordable, and much simpler… Motion sensor Chair Sensor Door sensor Voice Sensor Alert family member The research required is multi-disciplinary: Technology oriented, human oriented, economic oriented and particular domain oriented
  • 3. 3 On Personalization The industrial revolution opened the era of mass production, variety depends on the economy of scale. Current technology such as Internet of Things provides the opportunity to enable everybody to create their own systems. This requires multi-disciplinary effort.
  • 4. 4 The term “Internet of Things” was coined by Kevin Ashton in 1999. His observation was that all the data on the Internet has been created by a human. His vision was: “we need to empower computers with their own means of gathering information, so they can see, hear, and smell the world by themselves”.
  • 5. 5 The value of sensors Kevin Ashton: “track and count everything, and greatly reduce waste, loss, and cost. We could know when things needs replacing, repairing or recalling, and whether they were fresh or past their best” The value is in the ability to know and react in a timely manner to situations that are detected by sensors
  • 6. 6 Differences between the traditional Internet to the Internet of Everything Topic Traditional Internet Internet of Everything Who creates content? Human Machine How is the content consumed? By request By pushing information and triggering actions How content is combined? Using explicitly defined links Through explicitly defined operators What is the value? Answer questions Action and timely knowledge What was done so far? Both content creation (HTML…) and content consumption (search engines) Mainly content creation
  • 7. 7 “How does Event Processing get into the picture?” While the weakest link is now considered the data integration issue – looking beyond that we can find event processing Combining data from multi-sensors to get observations, alerts, and actions in real-time gets us to the issue of detecting patterns in event streams However much of the IoT world has not realized it yet…
  • 8. 8 A major difference between traditional Internet and the IoE – usability The success of the Internet is attributed to its relative simplicity: to connect to create content to search Imagine that any search in the Internet would have been done using SQL queries… How pervasive do you think the Internet would have been?
  • 9. For situational awareness…. Languages are actually more complex than SQL 9 // Large cash deposit insert into LargeCashDeposit select * from Cash deposit where amount > 100,000 // Frequent (At least three) large cash deposits create context AccountID partition by accountId on Cash deposit; Context AccountID Insert into FrequentLargeCashDeposits select count(*) from LargeCashDeposit having count(*)>3; // Frequent cash deposits followed by transfer abroad Context AccountID insert into SuspiciousAccount select * from pattern [ every f=FrequentCashDeposit -> t=TransferAbroad where timer.within(10 days)]
  • 10. 10 12 Hurdles Hampering The Internet of Things 1. Basic Infrastructure Immaturity 2. Few Standards 3. Security Immaturity 4. Physical Security Tampering 5. Privacy Pitfalls 6. Data Islands 7. Information, but Not Insights 8. Power Consumption and Batteries 9. New Platforms with New Languages and Technologies 10.Enterprise Network Incompatibility 11.Device Overload 12.New Communications and Data Architectures Chris Curran, October 30, 2014 https://www.linkedin.com/ pulse/article/20141030181 835-509139-12-hurdles-hampering- the-internet-of-
  • 11. 11 Democratization of use in Internet of Everything Challenges: Integration of sensors and actuators Personalization of situation detection Pervasive use
  • 12. 12 Personalization of situation detection
  • 13. Eliminating noise from the model Current models are close to the implementation models – and from pure logic view contain “noise”. Bringing data from current state Query Enrichment Inclusion in events Examples: Determine what food-type the container carries Fetch the temperature regulations for a specific food type Other noise : workarounds 13 For simplification we need to clean the noise
  • 14. 14 The Event Model Research project developed by IBM Haifa Research Lab and Knowledge Partners International that dealt with simplification of event processing using model driven engineering approach The Event Model design goals Short video can be found in: https://www.youtube.com/watch?v =9zjy8wngy5Y&feature=youtu.be
  • 15. TEM Concepts Facts Glossary Logic Actors Events States Event Derivation Logic Transitions IT elements Goals Computation Logic
  • 16. Simple example: Top down design of event model for suspicious account derivation Suspicious Account Compliance officer Bank transaction system Frequent large cash deposits Frequent large cash deposits Large cash deposit Large cash deposit cash amount <Cash deposit> customer threshold
  • 17. Specification for deriving Suspicious Account Suspicious account Logic Row # When Expression When Start When End Partition by Filter on event Pattern Filter on pattern Account ID Frequent large cash deposits 1 always same is Detected Frequent large cash deposits Logic Row # When Expression When Start When End Partition by Filter on event Pattern Filter on pattern Account ID Count(Large cash deposit) 1 every 10 days same > 3 Large cash deposit Logic Row # When Expression When Start When End Partition by Filter on event Pattern Filter on pattern Customer ID cash amount <Cash deposit> 1 always same >= customer threshold
  • 18. Pattern on events Suspicious customer logic Row # Context Conditions When Partition by Event filter Pattern on events Filter on patterned events Expressi on Start End Customer ID Amount <Cash deposit> Amount <Transfer Abroad> Cash deposit Account <Cash Deposit> 1 Every week same >= 150K >= 100K OCCURS BEFORE Transfer Abroad IS NOT Account <Transfer Abroad> A B C D Pattern on events designates what the relationship between events is. In this case conditions C states that an event should occur before another.
  • 19. 19 My main motivation is to use the experience and knowledge I have accumulated over the years to make a better world