SlideShare une entreprise Scribd logo
1  sur  43
Specifying the Behaviour of
Building Automation Systems


          João Aguiam

        September 6th, 2011
Agenda

• Motivation
• Problem
• Our Proposal
• Validation
• Conclusions




                 2
Agenda

• Motivation
• Problem
• Our Proposal
• Validation
• Conclusions




                 3
Motivation
The smart office example



                                        Work Desk

Door
                                                     Curtains




                                                      Window

   Support Table                              Luminosity Sensor
                           Luminaries
                                              Motion Sensor

                                                             4
Motivation
The smart office example


• Maximize energy efficiency
• Control the curtains and luminaries automatically to:
   • Reduce the amount of artificial light
   • Allow the maximum amount of natural light inside
   • Avoid the excessive glare in the working place of the user
   • Turn lights off if no one is in the office
   • Adjust light level according to user’s task and place



                                                             5
Agenda

• Motivation
• Problem
• Our Proposal
• Validation
• Conclusions




                 6
Problem
How it is done nowadays?




• Crafting behaviour into hardware devices (embedded C programs)
    • Difficult to develop
    • Lengthy process
    • Too far away from the problem domain of BA

• Hardware modules with pre-packaged applications
    • Difficult to configure
    • Sometimes it is impossible to create the desired behaviour due to
      limited expressivity
Problem
Statement




• How to specify, in an easy way, the logic behind the
  behaviour of a Building Automation System where
  the actuators output vary continuously based on
  sensors input?




                                                     8
Problem
Fuzzy controller




                   • Difficult to specify
                   • Require great expertise
                   • Far from the domain level




                                            9
Agenda

• Motivation
• Problem
• Our Proposal
• Validation
• Conclusions




                 10
Our Proposal




               Logical level


               Execution level




                           11
Our Proposal
Relation with fuzzy controllers



                                               Rule-base




                   Fuzzification   Inference               Defuzzification


                                                                             Logical level


                                                                             Execution level




                                                                                         12
Our Proposal
 Context description language



• Declarative language based on fuzzy logic and
  temporal logic
• The degree of truth of a context is defined recursively
  on the value of sensors and other contexts
• Some operators reason over a path of past values of
  sensor readings and contexts




                                                            13
Our Proposal
Scenario description

• Scenarios are a set of rules which take the form:
  if antecedent then consequent
• The antecedent is is a fuzzy condition defined using fuzzy
  contexts and fuzzy context operators
• The consequent is an assignment to an actuator which
  uses fuzzy consequent operator
• The assignment to an actuator varies with the truth
  value of the fuzzy condition
• The defuzification process is a simple weighted average


                                                         14
Agenda

• Motivation
• Problem
• Our Proposal
• Validation
• Conclusions




                 15
Validation
Ideal setting

                IDE




                IDE


                       Behaviour
                      Specification   Compiler   HW

                                                      User
BA Expert




                IDE




                                                             16
Validation
Strategy


1. Illustrative Case Study
2. Excel Model
3. Interactive Simulator
4. Batch Simulator




                             17
Validation
Results and Discussion




              Curtains along the day       Arriving and leaving




           Passage of a cloud in the sky     Working at desk




                 Working at table            Walking around

                                                                  18
Agenda

• Motivation
• Problem
• Our Proposal
• Validation
• Conclusions




                 19
Conclusions

• We have created an high level declarative language to
  specify the behaviour of building automation systems
   • Adapted the notion of fuzzy context from Ambient Intelligence
   • Created a well defined syntax and semantics that can be
     compiled and interpreted
   • Introduced the notion of time from the temporal logic with a
     new fuzzy Until operator
   • Adapted the deffuzification process to a less computational one


• We have validated the idea through diverse simulators to
  test the functionality in different scenarios
                                                                     20
Conclusions
Future work


• Learning user preferences

• Implementing real world simulation

• Create an interpreted development environment

• Extend the language expressivity




                                                  21
Thank You



  João Aguiam

September 6th, 2011
Reserve Slides
Context-aware Systems

• Adapts to the surrounding environment
• Environment is abstracted through the notion
  of context
• CAS gathers information related to context
  and reasons about it to take a certain action
• Context is any information that characterizes
  the situation and is relevant for the interaction
  between the user and the system

                                                  24
Fuzzy Logic

• Propositions may be partially true or partially false and can
  be seen as fuzzy sets
• Fuzzy Sets are represented by a Membership Function (MF)
• In Fuzzy Logic the operation conjunction and disjunction are
  calculated through the operator min and max respectively

                        1
                                 ColdPlace                                   HotPlace
                       0.8
   Membership Degree




                       0.6                             MildPlace


                       0.4


                       0.2


                        0
                             0          5    10   15               20   25    30        35
                                                  X = Temperature

                                                                                             25
Fuzzy Logic

• Fuzzy logic systems are based on fuzzy rules


• Fuzzy control systems must result in a single
  crisp value to control an object




                                                  26
Temporal Logic

• Propositions are qualified in terms of time
• Allows the reasoning in a sequence of events
  along the time
• Most common operators:
   • Next
   • Eventually
   • Always
   • Until
   • Releases

                                                 27
Expert Systems

• Computer program that simulates the
  reasoning of a human expert to solve
  problems or give advices to the user
• Four topics:
  • Knowledge acquisition
  • Knowledge representation
  • Reasoning control
  • Solution explanation
                                         28
Fuzzy Context Operator

• Defined in the universe of discourse of a context
• Allow a customized evaluation of a context
• The input of a fuzzy context operator is a context
  C and its output a value between 0 and 1
• Defined by a membership function
• Examples are:
  No, Little, Some, Enough, Much, Too Much and
  Full.

                                                       29
Fuzzy Context Operator
Examples




                         30
Fuzzy Consequent Operator

• Defined in the universe of discourse of an
  actuator
• It is specific for a certain type of actuator
• Used in the assignments




                                                  31
Fuzzy Consequent Operator
Examples




                            32
Defuzzification




                  33
Mandani Fuzzy Inference System




                                 34
Sugeno Fuzzy Model




                     35
Tsukamoto Fuzzy Model




                        36
Curtains Along the Day
 Closed
 Opened




                     Hours

                             37
Arriving and Leaving
  On
   Off




                   Time


                          38
Passage of a Cloud in the Sky




                 Time

                                39
Working at Desk




                  Time

                         40
Working at Table




                   Time


                          41
Walking Around




                 Time

                        42
Limitations

•   Single user model
•   Absolute values in the actuator assignments
•   Set actuators to past values
•   Reasoning about time intervals
•   Lack of customization for different users

• Validation
    • Single case study
    • Scalability
    • The lack of validation in a real environment

                                                     43

Contenu connexe

En vedette

Common Alerting Protocol and Procedures
Common Alerting Protocol and ProceduresCommon Alerting Protocol and Procedures
Common Alerting Protocol and ProceduresNuwan Waidyanatha
 
Dawn Nafus's presentation at eComm 2008
Dawn Nafus's presentation at eComm 2008Dawn Nafus's presentation at eComm 2008
Dawn Nafus's presentation at eComm 2008eComm2008
 
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis Response
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis ResponseISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis Response
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis ResponseISCRAM Events
 
Intelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use CaseIntelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use Casecatherine roussey
 
A Context and User Aware Smart Notification System
A Context and User Aware Smart Notification SystemA Context and User Aware Smart Notification System
A Context and User Aware Smart Notification SystemTeodoro Montanaro
 
Location-based Services - Introduction
Location-based Services - IntroductionLocation-based Services - Introduction
Location-based Services - Introductionaxelkuepper
 
Intelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network SimulationIntelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network Simulationcatherine roussey
 
Mobile learning and application-final presentation
Mobile learning and application-final presentationMobile learning and application-final presentation
Mobile learning and application-final presentationVasumathy Vardarajan
 
Sensing mobile phones
Sensing mobile phonesSensing mobile phones
Sensing mobile phonesArpan Pal
 
"Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me..."Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me...3JornadasRFID
 
63104996 ppt-on-bubble-sensing
63104996 ppt-on-bubble-sensing63104996 ppt-on-bubble-sensing
63104996 ppt-on-bubble-sensingSam Ram
 
Alerting in Grafana, Grafanacon 2015
Alerting in Grafana, Grafanacon 2015Alerting in Grafana, Grafanacon 2015
Alerting in Grafana, Grafanacon 2015Dieter Plaetinck
 
Wagner College Forum for Undergraduate Research, Vol 12 No 1
Wagner College Forum for Undergraduate Research, Vol 12 No 1Wagner College Forum for Undergraduate Research, Vol 12 No 1
Wagner College Forum for Undergraduate Research, Vol 12 No 1Wagner College
 
Affordable Care Act Presentation for State Library of Ohio
Affordable Care Act Presentation for State Library of OhioAffordable Care Act Presentation for State Library of Ohio
Affordable Care Act Presentation for State Library of OhioDon Boozer
 

En vedette (20)

Common Alerting Protocol and Procedures
Common Alerting Protocol and ProceduresCommon Alerting Protocol and Procedures
Common Alerting Protocol and Procedures
 
I Cafe Ordering Process
I Cafe Ordering ProcessI Cafe Ordering Process
I Cafe Ordering Process
 
SenSocial
SenSocialSenSocial
SenSocial
 
Dawn Nafus's presentation at eComm 2008
Dawn Nafus's presentation at eComm 2008Dawn Nafus's presentation at eComm 2008
Dawn Nafus's presentation at eComm 2008
 
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis Response
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis ResponseISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis Response
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis Response
 
Intelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use CaseIntelligent Wireless Sensor Network Simulation: Flood Use Case
Intelligent Wireless Sensor Network Simulation: Flood Use Case
 
New
NewNew
New
 
A Context and User Aware Smart Notification System
A Context and User Aware Smart Notification SystemA Context and User Aware Smart Notification System
A Context and User Aware Smart Notification System
 
Location-based Services - Introduction
Location-based Services - IntroductionLocation-based Services - Introduction
Location-based Services - Introduction
 
Intelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network SimulationIntelligent Wireless Sensor Network Simulation
Intelligent Wireless Sensor Network Simulation
 
Mobile learning and application-final presentation
Mobile learning and application-final presentationMobile learning and application-final presentation
Mobile learning and application-final presentation
 
Sensing mobile phones
Sensing mobile phonesSensing mobile phones
Sensing mobile phones
 
"Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me..."Integration of wireless sensor technology, Internet tools y computational me...
"Integration of wireless sensor technology, Internet tools y computational me...
 
Ns2
Ns2Ns2
Ns2
 
63104996 ppt-on-bubble-sensing
63104996 ppt-on-bubble-sensing63104996 ppt-on-bubble-sensing
63104996 ppt-on-bubble-sensing
 
Alerting in Grafana, Grafanacon 2015
Alerting in Grafana, Grafanacon 2015Alerting in Grafana, Grafanacon 2015
Alerting in Grafana, Grafanacon 2015
 
Wagner College Forum for Undergraduate Research, Vol 12 No 1
Wagner College Forum for Undergraduate Research, Vol 12 No 1Wagner College Forum for Undergraduate Research, Vol 12 No 1
Wagner College Forum for Undergraduate Research, Vol 12 No 1
 
Empire marquee catalog
Empire marquee catalogEmpire marquee catalog
Empire marquee catalog
 
Affordable Care Act Presentation for State Library of Ohio
Affordable Care Act Presentation for State Library of OhioAffordable Care Act Presentation for State Library of Ohio
Affordable Care Act Presentation for State Library of Ohio
 
clase 17en curso Fotografia histórica (proximidad)
clase 17en curso Fotografia histórica (proximidad)clase 17en curso Fotografia histórica (proximidad)
clase 17en curso Fotografia histórica (proximidad)
 

Similaire à Specifying the behaviour of building automation systems

Agile Software Development in practice: Experience, Tips and Tools from the T...
Agile Software Development in practice: Experience, Tips and Tools from the T...Agile Software Development in practice: Experience, Tips and Tools from the T...
Agile Software Development in practice: Experience, Tips and Tools from the T...Valerie Puffet-Michel
 
Webinar: How We Evaluated MongoDB as a Relational Database Replacement
Webinar: How We Evaluated MongoDB as a Relational Database ReplacementWebinar: How We Evaluated MongoDB as a Relational Database Replacement
Webinar: How We Evaluated MongoDB as a Relational Database ReplacementMongoDB
 
Distilling dark knowledge from neural networks
Distilling dark knowledge from neural networksDistilling dark knowledge from neural networks
Distilling dark knowledge from neural networksAlexander Korbonits
 
Adressing requirements with agile practices
Adressing requirements with agile practicesAdressing requirements with agile practices
Adressing requirements with agile practicesfboisvert
 
Perception.JS - A Framework for Context Acquisition Processing and Presentation
Perception.JS - A Framework for Context Acquisition Processing and PresentationPerception.JS - A Framework for Context Acquisition Processing and Presentation
Perception.JS - A Framework for Context Acquisition Processing and PresentationSupun Dissanayake
 
Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 201244CON
 
From silex to symfony and viceversa
From silex to symfony and viceversaFrom silex to symfony and viceversa
From silex to symfony and viceversaRonny López
 
Zero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingZero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingplumbee
 
Nodejs Chapter 3 - Design Pattern
Nodejs Chapter 3 - Design PatternNodejs Chapter 3 - Design Pattern
Nodejs Chapter 3 - Design PatternTalentica Software
 
Tooling for the JavaScript Era
Tooling for the JavaScript EraTooling for the JavaScript Era
Tooling for the JavaScript Eramartinlippert
 
Get your Project back in Shape!
Get your Project back in Shape!Get your Project back in Shape!
Get your Project back in Shape!Joachim Tuchel
 
Kafka 0.8.0 Presentation to Atlanta Java User's Group March 2013
Kafka 0.8.0 Presentation to Atlanta Java User's Group March 2013Kafka 0.8.0 Presentation to Atlanta Java User's Group March 2013
Kafka 0.8.0 Presentation to Atlanta Java User's Group March 2013Christopher Curtin
 
Code refactoring
Code refactoringCode refactoring
Code refactoringLalit Kale
 
CS101- Introduction to Computing- Lecture 45
CS101- Introduction to Computing- Lecture 45CS101- Introduction to Computing- Lecture 45
CS101- Introduction to Computing- Lecture 45Bilal Ahmed
 
Mock Objects, Design and Dependency Inversion Principle
Mock Objects, Design and Dependency Inversion PrincipleMock Objects, Design and Dependency Inversion Principle
Mock Objects, Design and Dependency Inversion PrincipleP Heinonen
 
UNIT IV DESIGN PATTERNS.pptx
UNIT IV DESIGN PATTERNS.pptxUNIT IV DESIGN PATTERNS.pptx
UNIT IV DESIGN PATTERNS.pptxanguraju1
 

Similaire à Specifying the behaviour of building automation systems (20)

Agile Software Development in practice: Experience, Tips and Tools from the T...
Agile Software Development in practice: Experience, Tips and Tools from the T...Agile Software Development in practice: Experience, Tips and Tools from the T...
Agile Software Development in practice: Experience, Tips and Tools from the T...
 
Webinar: How We Evaluated MongoDB as a Relational Database Replacement
Webinar: How We Evaluated MongoDB as a Relational Database ReplacementWebinar: How We Evaluated MongoDB as a Relational Database Replacement
Webinar: How We Evaluated MongoDB as a Relational Database Replacement
 
Distilling dark knowledge from neural networks
Distilling dark knowledge from neural networksDistilling dark knowledge from neural networks
Distilling dark knowledge from neural networks
 
Adressing requirements with agile practices
Adressing requirements with agile practicesAdressing requirements with agile practices
Adressing requirements with agile practices
 
Perception.JS - A Framework for Context Acquisition Processing and Presentation
Perception.JS - A Framework for Context Acquisition Processing and PresentationPerception.JS - A Framework for Context Acquisition Processing and Presentation
Perception.JS - A Framework for Context Acquisition Processing and Presentation
 
Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012Modern Post-Exploitation Strategies - 44CON 2012
Modern Post-Exploitation Strategies - 44CON 2012
 
JavaFX 101
JavaFX 101JavaFX 101
JavaFX 101
 
From silex to symfony and viceversa
From silex to symfony and viceversaFrom silex to symfony and viceversa
From silex to symfony and viceversa
 
Solr pattern
Solr patternSolr pattern
Solr pattern
 
Zero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingZero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is king
 
Nodejs Chapter 3 - Design Pattern
Nodejs Chapter 3 - Design PatternNodejs Chapter 3 - Design Pattern
Nodejs Chapter 3 - Design Pattern
 
Tooling for the JavaScript Era
Tooling for the JavaScript EraTooling for the JavaScript Era
Tooling for the JavaScript Era
 
Get your Project back in Shape!
Get your Project back in Shape!Get your Project back in Shape!
Get your Project back in Shape!
 
Kafka 0.8.0 Presentation to Atlanta Java User's Group March 2013
Kafka 0.8.0 Presentation to Atlanta Java User's Group March 2013Kafka 0.8.0 Presentation to Atlanta Java User's Group March 2013
Kafka 0.8.0 Presentation to Atlanta Java User's Group March 2013
 
Code refactoring
Code refactoringCode refactoring
Code refactoring
 
CS101- Introduction to Computing- Lecture 45
CS101- Introduction to Computing- Lecture 45CS101- Introduction to Computing- Lecture 45
CS101- Introduction to Computing- Lecture 45
 
Anti patterns part 2
Anti patterns part 2Anti patterns part 2
Anti patterns part 2
 
Eurosport's Kodakademi #2
Eurosport's Kodakademi #2Eurosport's Kodakademi #2
Eurosport's Kodakademi #2
 
Mock Objects, Design and Dependency Inversion Principle
Mock Objects, Design and Dependency Inversion PrincipleMock Objects, Design and Dependency Inversion Principle
Mock Objects, Design and Dependency Inversion Principle
 
UNIT IV DESIGN PATTERNS.pptx
UNIT IV DESIGN PATTERNS.pptxUNIT IV DESIGN PATTERNS.pptx
UNIT IV DESIGN PATTERNS.pptx
 

Dernier

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Specifying the behaviour of building automation systems

  • 1. Specifying the Behaviour of Building Automation Systems João Aguiam September 6th, 2011
  • 2. Agenda • Motivation • Problem • Our Proposal • Validation • Conclusions 2
  • 3. Agenda • Motivation • Problem • Our Proposal • Validation • Conclusions 3
  • 4. Motivation The smart office example Work Desk Door Curtains Window Support Table Luminosity Sensor Luminaries Motion Sensor 4
  • 5. Motivation The smart office example • Maximize energy efficiency • Control the curtains and luminaries automatically to: • Reduce the amount of artificial light • Allow the maximum amount of natural light inside • Avoid the excessive glare in the working place of the user • Turn lights off if no one is in the office • Adjust light level according to user’s task and place 5
  • 6. Agenda • Motivation • Problem • Our Proposal • Validation • Conclusions 6
  • 7. Problem How it is done nowadays? • Crafting behaviour into hardware devices (embedded C programs) • Difficult to develop • Lengthy process • Too far away from the problem domain of BA • Hardware modules with pre-packaged applications • Difficult to configure • Sometimes it is impossible to create the desired behaviour due to limited expressivity
  • 8. Problem Statement • How to specify, in an easy way, the logic behind the behaviour of a Building Automation System where the actuators output vary continuously based on sensors input? 8
  • 9. Problem Fuzzy controller • Difficult to specify • Require great expertise • Far from the domain level 9
  • 10. Agenda • Motivation • Problem • Our Proposal • Validation • Conclusions 10
  • 11. Our Proposal Logical level Execution level 11
  • 12. Our Proposal Relation with fuzzy controllers Rule-base Fuzzification Inference Defuzzification Logical level Execution level 12
  • 13. Our Proposal Context description language • Declarative language based on fuzzy logic and temporal logic • The degree of truth of a context is defined recursively on the value of sensors and other contexts • Some operators reason over a path of past values of sensor readings and contexts 13
  • 14. Our Proposal Scenario description • Scenarios are a set of rules which take the form: if antecedent then consequent • The antecedent is is a fuzzy condition defined using fuzzy contexts and fuzzy context operators • The consequent is an assignment to an actuator which uses fuzzy consequent operator • The assignment to an actuator varies with the truth value of the fuzzy condition • The defuzification process is a simple weighted average 14
  • 15. Agenda • Motivation • Problem • Our Proposal • Validation • Conclusions 15
  • 16. Validation Ideal setting IDE IDE Behaviour Specification Compiler HW User BA Expert IDE 16
  • 17. Validation Strategy 1. Illustrative Case Study 2. Excel Model 3. Interactive Simulator 4. Batch Simulator 17
  • 18. Validation Results and Discussion Curtains along the day Arriving and leaving Passage of a cloud in the sky Working at desk Working at table Walking around 18
  • 19. Agenda • Motivation • Problem • Our Proposal • Validation • Conclusions 19
  • 20. Conclusions • We have created an high level declarative language to specify the behaviour of building automation systems • Adapted the notion of fuzzy context from Ambient Intelligence • Created a well defined syntax and semantics that can be compiled and interpreted • Introduced the notion of time from the temporal logic with a new fuzzy Until operator • Adapted the deffuzification process to a less computational one • We have validated the idea through diverse simulators to test the functionality in different scenarios 20
  • 21. Conclusions Future work • Learning user preferences • Implementing real world simulation • Create an interpreted development environment • Extend the language expressivity 21
  • 22. Thank You João Aguiam September 6th, 2011
  • 24. Context-aware Systems • Adapts to the surrounding environment • Environment is abstracted through the notion of context • CAS gathers information related to context and reasons about it to take a certain action • Context is any information that characterizes the situation and is relevant for the interaction between the user and the system 24
  • 25. Fuzzy Logic • Propositions may be partially true or partially false and can be seen as fuzzy sets • Fuzzy Sets are represented by a Membership Function (MF) • In Fuzzy Logic the operation conjunction and disjunction are calculated through the operator min and max respectively 1 ColdPlace HotPlace 0.8 Membership Degree 0.6 MildPlace 0.4 0.2 0 0 5 10 15 20 25 30 35 X = Temperature 25
  • 26. Fuzzy Logic • Fuzzy logic systems are based on fuzzy rules • Fuzzy control systems must result in a single crisp value to control an object 26
  • 27. Temporal Logic • Propositions are qualified in terms of time • Allows the reasoning in a sequence of events along the time • Most common operators: • Next • Eventually • Always • Until • Releases 27
  • 28. Expert Systems • Computer program that simulates the reasoning of a human expert to solve problems or give advices to the user • Four topics: • Knowledge acquisition • Knowledge representation • Reasoning control • Solution explanation 28
  • 29. Fuzzy Context Operator • Defined in the universe of discourse of a context • Allow a customized evaluation of a context • The input of a fuzzy context operator is a context C and its output a value between 0 and 1 • Defined by a membership function • Examples are: No, Little, Some, Enough, Much, Too Much and Full. 29
  • 31. Fuzzy Consequent Operator • Defined in the universe of discourse of an actuator • It is specific for a certain type of actuator • Used in the assignments 31
  • 37. Curtains Along the Day Closed Opened Hours 37
  • 38. Arriving and Leaving On Off Time 38
  • 39. Passage of a Cloud in the Sky Time 39
  • 40. Working at Desk Time 40
  • 41. Working at Table Time 41
  • 42. Walking Around Time 42
  • 43. Limitations • Single user model • Absolute values in the actuator assignments • Set actuators to past values • Reasoning about time intervals • Lack of customization for different users • Validation • Single case study • Scalability • The lack of validation in a real environment 43