One or More Topologies ? One or More Topologies ? A methodological reflection IRRIIS Project, WP2.1 “Topology Analysis” Rome Meeting, 6,7 April 2006 IST.

Slides:



Advertisements
Similar presentations
Modelling with expert systems. Expert systems Modelling with expert systems Coaching modelling with expert systems Advantages and limitations of modelling.
Advertisements

A-MAZE NEST-IDEA Seminar "Interdisciplinarity in Research" 22nd, June 2004 Applied Mathematics Ability Zone Adam Maria Gadomski (ENEAs contribution ) Towards.
ARCHITECTURES FOR ARTIFICIAL INTELLIGENCE SYSTEMS
Introduction to IRRIIS testing platform IRRIIS MIT Conference ROME 8 February 2007 Claudio Balducelli.
Soft Systems Methodology
ENEA’s Virtual e-Seminar FPN- RADCASS Unit New Research Ideas 2008 Super-Safety Constrains for Nuclear On-Line Monitoring Strategy Adam Maria Gadomski,
Precautionary Principle in Managerial Decision-Making: a Socio-Cognitive Engineering Perspective Precautionary Principle in Managerial Decision-Making:
Modeling of Socio-cognitive Vulnerability of Human Organizations Modeling of Socio-cognitive Vulnerability of Human Organizations TOGA Meta-theory Approach.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
9/6/2001Database Management – Fall 2000 – R. Larson Information Systems Planning and the Database Design Process University of California, Berkeley School.
K.M. Corker, Ph.D.Industrial & Systems Engineering System Engineering ISE 222 Spring 2005 Notes & Course Materials
Adaptive Infrastructures EPRI/DoD Initiative on Complex Interactive Networks/Systems Joint innovative research ·EPRI and ·Office of the Director of Defense.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 8 Slide 1 System models September 29, 2008.
April 15, 2005Department of Computer Science, BYU Agent-Oriented Software Engineering Muhammed Al-Muhammed Brigham Young University Supported in part by.
Modified from Sommerville’s originalsSoftware Engineering, 7th edition. Chapter 8 Slide 1 System models.
Supplement 02 (a)Systems Theory1 Supplement 02 (a) Systems Theory And Franchise Colleges By MANSHA NAWAZ.
Course Instructor: Aisha Azeem
System Design Decomposing the System. Sequence diagram changes UML 2.x specifications tells that Sequence diagrams now support if-conditions, loops and.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Enabling the Organization – Decision Making CHAPTER 09 Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
SCEF International Workshop 30 Sep., 1 Oct. 2003, Rome Socio-Cognitive Engineering Foundations and Applications:
Georgios Tsirigotis, Electrical Engineering Department, Kavala Institute of Technology, Greece Anna Friesel Electronics and Information Technology, Technical.
MIT Requirements for TLC IRRIIS MIT Conference ROME 8 February 2007 Giustino FUMAGALLI Arnaud ANSIAUX.
Emergency Management Games and Test Case Utility: Emergency Management Games and Test Case Utility: a Synthetic Methodological Socio-Cognitive Perspective.
ARTIFICIAL INTELLIGENCE [INTELLIGENT AGENTS PARADIGM]
EXPECTATIONS OF TURKISH ENVIRONMENTAL SECTOR FROM INSPIRE Ministry of Environment and Forestry June, 2010 Özlem ESENGİN Ahmet ÇİVİ Tuncay DEMİR.
Chapter 8 Architecture Analysis. 8 – Architecture Analysis 8.1 Analysis Techniques 8.2 Quantitative Analysis  Performance Views  Performance.
Exploring the dynamics of social networks Aleksandar Tomašević University of Novi Sad, Faculty of Philosophy, Department of Sociology
Global test beds for control, safety, security and dependability in ICT-Enabled Critical Infrastructures From SAFEGUARD Intrusion Detection Test Environment.
Verification of Information Flow Properties in Cyber-Physical Systems Ravi Akella, Bruce McMillin Department of Computer Science Missouri University of.
An Introduction to Software Architecture
Universal Top SYNTEX Functional Architecture Building Working Document Adam Maria Gadomski, Vittorio Rosato ENEA    A Contribution to the SYNTEX Development.
EIDA Project ( Proposal ) Research and Technical Background Emergency Intelligent Decision Assistant: Emergency Intelligent Decision Assistant: Toolkit.
Lecture 9: Chapter 9 Architectural Design
Odyssey A Reuse Environment based on Domain Models Prepared By: Mahmud Gabareen Eliad Cohen.
SOFTWARE DESIGN.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
COMP 6471 Software Design Methodologies Winter 2006 Dr Greg Butler
Design engineering Vilnius The goal of design engineering is to produce a model that exhibits: firmness – a program should not have bugs that inhibit.
Database System Development Lifecycle 1.  Main components of the Infn System  What is Database System Development Life Cycle (DSDLC)  Phases of the.
Chapter 6 Architectural Design.
1 Introduction to Software Engineering Lecture 1.
An Ontological Framework for Web Service Processes By Claus Pahl and Ronan Barrett.
ANALYSIS - II REQUIREMENT ANALYSIS DESIGN IMPLEMENTATION TEST.
Sub-Project III 4: CRESCO-SOC-COG Second Progress Report (15 February June 2007)
Chapter 6 – Architectural Design Lecture 1 1Chapter 6 Architectural design.
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
Self-healing Architectures based on context DEpendent adaptive Software Agents (SADESA) – an extension of EU-IST Project SAFEGUARD DeSIRE Workshop Pisa,
1 Software Design Lecture What’s Design It’s a representation of something that is to be built. i.e. design  implementation.
Introduction to IRRIIS MIT Add-On Components Middleware Improvement Technology for Interdependent Critical Infrastructure 08 February 2007, Rome Giordano.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Mahmut Ali GÖKÇEIndustrial Systems IEU Introduction to System Engineering ISE 102 Spring 2007 Notes & Course Materials Asst. Prof. Dr. Mahmut.
11 Software Design CSCU 411 Software Engineering.
Chapter 4 Motor Control Theories Concept: Theories about how we control coordinated movement differ in terms of the roles of central and environmental.
Paradigms of Knowing in Communication Research. Paradigms in social science provide a viewpoint or set of assumptions that frame the research process.
DOMAIN DRIVEN DESIGN Dave 12 May WHAT IS DDD? Set of principles to aid in building complex systems Enables us to focus on core problem domain NOT.
Applications of Neural Networks Patrick Stalcup. Overview Background Vocabulary The Math Data Structure Design Black Boxing Example Applications.
Overview of the handbook Chapter 5: Levee inspection, assessment and risk attribution.
1 A latent information function to extend domain attributes to improve the accuracy of small-data-set forecasting Reporter : Zhao-Wei Luo Che-Jung Chang,Der-Chiang.
Class Design. Class Design The analysis phase determines what the implementation must do, and the system design.
Ecological Interface Design Overview Park Young Ho Dept. of Nuclear & Quantum Engineering Korea Advanced Institute of Science and Technology May
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Chapter 5:Architectural Design l Establishing the overall structure of a software.
Knowledge Representation Techniques
Crisis management related research at
Abstract descriptions of systems whose requirements are being analysed
System models October 5, 2005.
An Introduction to Software Architecture
John D. McGregor Module 6 Session 1 More Design
Top-Down Incremental Development of Agents' Architecture for Emergency
Presentation transcript:

One or More Topologies ? One or More Topologies ? A methodological reflection IRRIIS Project, WP2.1 “Topology Analysis” Rome Meeting, 6,7 April 2006 IST Project N° Adam Maria Gadomski, ENEA High-Intelligence & Decision research Group

Project Topology (?) Task Topology data collection and modelling Task Improved models of cascade failures Task Taxonomy of interdependencies Task MIT requirements Task Syntex fuctional definition Task SYNTEX framework We are here. IRRIIS Goals The expected results for IRRIIS within the topology analysis Work Package 2.1 are: The identification of appropriate degrees of abstraction from LCCIs into graphs. This leads to a comparable modelling framework for the overall IRRIIS project and is also applicable on a general level. Choice of an appropriate high-level abstraction of the system is essential, and impacts both the quality of the analysis, as well as its computational complexity. A thorough analysis of LCCIs with regard to their topological features such as connectivity, centrality, modularity, 2. Study and selection of a critical set of measures (observables), …Therewith a reduction of the overall complexity for the modelling Development of a set of aggregated high level models… - Granular, as the observables can be studied at different scales/dimensions. We need some Abstraction - generalization levels what but not how – it is impossible to use only one abstraction level …

TWO ESSENTIAL PROBLEMS Problem 1 LCCIs network MODEL IRRIIS Goals … Problem 2 What topology or topologies are necessary ? It refers to the topology and Abstraction interrelation. Necessary requirements How to form them ? The aim of this contribution is to create a methodological reflection on and to suggest some conceptualization framework for the topology problem. Topology Analysis results have to serve for the “identification of vulnerabilities of an abstract/generalized whole LCCI and LCCIs network", from different perspectives.

PROBLEM 1: SYSTEM - GOAL RELATION LCCI System Basic relation (Safety goal) LCCI Goal ProcessesFunctions System Goal Critical definitions: Function, F - is a necessary, goal-oriented property of an artificial system. Process, P - is an identifiable or designed carrier of a function. System, S - is a carrier of processes Goal, G - is a required state/property of the couple (System, Environment) ESSENTIAL ARE RELATIONS BETWEEN THEM. complex Suggested decomposition (SPG Approach, , Gadomski)

Decomposition of System - Goal Relation FP G S carrier relation ( it is opposite to the property relation) cause-consequence relation (necessary for) One function can be realized by different processes. One process can be a carrier of different functions. Every artificial system specification can be presented as 4 graph layers. This paradigm enables a structuring of specific information and knowledge about a human - technological systems and LCCIs. Generalization levels (abstraction/specialization) Every object from one layer can be decomposed in a subsequent lower layer. SPG approach Attention: From users and vulnerability perspectives most essential is availability of functions.

Vulnerability Sources & propagation F P G S carrier relation ( it is opposite to the property relation) cause-consequence relation (necessary for) Attention: From developers perspectives most essential is observability of processes. Abnormal events internal and external Measurements Loss of functions Every process and system are properties described by variables and parameters. (= attributes) They are data. Definition: Data – everything what is/will/can be processed mentally or by a computer.  Owner developers operators managers society  Polit-econ dec. Economy 

Problem 2: TOPOLOGY Topology is a theory focused on the properties of spatial forms and their transformations which maintains invariant some their specific attributes. Graphs are most synthetic/abstract forms which maintain these invariants. An example: Topological equivalence:  Topology does not enable to decompose arcs ( interrelations) Conclusion: Specialization/decomposition requires: Topology A Topology B Here, nodes are arbitrarily distinguished.

TOPOLOGIES: TOP-DOWN IDENTIFICATION Different perspectives, ie different goals of a system, require different topologies strings. General remark: IRRIIS is a research project. Lack of topological equivalence in two topological specifications FP G S Allocation of Vulnerabilities to Network Topologies We need DATA for

Meta-topological Framework [TOGA, 1993] We have 3 subject layers: Physical, Cyber, Organization layers. Here, every box represents a real or abstract topology. Basic rules which define problem- solver perspective: Top-down Object-based Goal-oriented

Methodological Framework Conceptualization layers Specification DirectionIdentification Direction G oal Function P rocess S ystem G F P S Physical Layer Information Layer Intelligence Layer Generalization levels Subject Layers Problem Recognition Specialization Direction Data acquisition (information, knowledge acquisition) Information & Knowledge not ordered or ordered for other purposes.

MULTI-GOAL DOMAIN AND INTRADEPENDENCES Thanks SG SG SG SG LCCI Syntex MIT IRRIIS

Example: DESIGN FRAMEWORK (Abstract Managerial Intelligence) Based on SPG Approach. Process From the ENEA’s Tech. Proposals of the EU Project EIDA,1996 & EMIR 2004

Infrastructure Simulation Game System World Editor World Simulator IntelI. Infrast. Kernel Human Supervisor or Manager “Absolute Observer” (designer) Interface Servicies Units Communication Interface Communication Servicies Functional Units Intelligent Infrastructure Top view of the Infrastructure Simulation Game System Copyright High-Intelligence & Decision Research Group, CAMO, ENEA, Adam M. Gadomski, 23/06/2005http://erg4146.casaccia.enea.it