Download Slide 1 - LogiCoy

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Intelligent Event Processing (IEP)
© Sun Microsystems 2005
Sun Proprietary/Confidential
Information
Architecture: Overview
Admin Tool
(EM, Netbeans, etc)
External Service Consumer/
Provider
JBI Environment
BC
NMR
IEP-SE
Database
(Oracle,Derby,
PostgreSQL,etc)
Intelligence Engine
+
Optional Plugins
(Matlab,SAS,etc)
© Sun Microsystems 2005
Sun Proprietary/Confidential
Information
Architecture: Deployment
Admin Tool
(EM, Netbeans, etc)
External Service Consumer/
Provider
JBI Environment
BC
NMR
IEP-SE
Database
(Oracle,Derby,
PostgreSQL,etc)
Intelligence Engine
+
Optional Plugins
(Matlab,SAS,etc)
© Sun Microsystems 2005
Sun Proprietary/Confidential
Information
Architecture: Runtime
Admin Tool
(EM, Netbeans, etc)
External Service Consumer/
Provider
JBI Environment
BC
NMR
IEP-SE
Database
(Oracle,Derby,
PostgreSQL,etc)
Intelligence Engine
+
Optional Plugins
(Matlab,SAS,etc)
© Sun Microsystems 2005
Sun Proprietary/Confidential
Information
Use Case: RFID Store Theft
Detection
Z-Mart Store Layout
•
•
•
Each product in the store has a RFID emitter
that sends out its product ID P_k every 2
seconds.
16 sensors: S_0, …,S_15. One for each
section. Sensor S_i receives product ID P_k
and reports (S_i, P_k) to the IEP system.
One cannot remove a RFID emitter from its
product without destroying it.
0
1
2
3
4
5
6
7
8
9
10
11
12
(Cashier)
13
14
15
(Exit)
© Sun Microsystems 2005
Sun Proprietary/Confidential
Information
Use Case: RFID Store Theft
Detection
Z-Mart existing database system
ProductType
Product
ProductId
TypeId
TypeId
TypeDesc
P_0
T_0
T_0
HP Printer
P_1
T_0
T_1
Dell Monitor
…
…
…
…
P_100
T_8
T_8
Sony TV
…
…
…
…
© Sun Microsystems 2005
Sun Proprietary/Confidential
Information
Use Case: RFID Store Theft
Detection
Detect: Stolen Product
A product is considered stolen if
• its signal is received by S_15 (sensor at
Exit).
And
• it is not paid yet.
© Sun Microsystems 2005
Sun Proprietary/Confidential
Information
Use Case: RFID Store Theft
Detection
Detect: Dead RFID Emitter
A RFID emitter is considered dead if
• no sensor has received its signal for the
past 10 seconds.
And
• its last reporting sensor is not S_15
(sensor at Exit).
© Sun Microsystems 2005
Sun Proprietary/Confidential
Information
Use Case: RFID Store Theft
Detection
Runtime Data
Flow
Java Application
File System
JBI Environment
HttpSoapBC
FileBC
NMR
IEP-SE
Derby Database
XSLT-SE
Intelligence Engine
© Sun Microsystems 2005
Sun Proprietary/Confidential
Information
Features
• Supports Continuous Query Language
(CQL) operators
• Supports additional operators invented
at Sun.
• Uses SQL for event matching,
abstraction, and transformation.
• Processes events using database
engine minimizing network usage.
© Sun Microsystems 2005
Sun Proprietary/Confidential
Information
Related documents