EMER: Engineering Critical Systems: human scale systems with emergence.

Slides:



Advertisements
Similar presentations
Integra Consult A/S Safety Assessment. Integra Consult A/S SAFETY ASSESSMENT Objective Objective –Demonstrate that an acceptable level of safety will.
Advertisements

Risk Analysis Fundamentals and Application Robert L. Griffin International Plant Protection Convention Food and Agriculture Organization of the UN.
Safety Cases: Purpose, Process and Prospects John McDermid, OBE FREng University of York UK.
Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
ARCHITECTURES FOR ARTIFICIAL INTELLIGENCE SYSTEMS
Business Critical Rules March 2015
Project management Project manager must;
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 24 Slide 1 Critical Systems Validation 2.
The Security Analysis Process University of Sunderland CIT304 Harry R. Erwin, PhD.
Mike Hightower and Anay Luketa-Hanlin Sandia National Laboratories Albuquerque, New Mexico Sandia is a multiprogram laboratory operated by Sandia Corporation,
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
 delivers evidence that a solution developed achieves the purpose for which it was designed.  The purpose of evaluation is to demonstrate the utility,
DECO3008 Design Computing Preparatory Honours Research KCDCC Mike Rosenman Rm 279
Coalition Formation through Motivation and Trust Nathan Griffiths Michael Luck.
University of Southern California Center for Systems and Software Engineering ©USC-CSSE1 3/18/08 (Systems and) Software Process Dynamics Ray Madachy USC.
The Design Philosophy of the DARPA Internet Protocols D. D. Clark.
Agent-Based Acceptability-Oriented Computing International Symposium on Software Reliability Engineering Fast Abstract by Shana Hyvat.
CSC 402, Fall Requirements Analysis for Special Properties Systems Engineering (def?) –why? increasing complexity –ICBM’s (then TMI, Therac, Challenger...)
Equipment Capability Customer DAES Analysis-Experimentation-Simulation 1 DARP Workshop System of Systems Safety Cases Parallel Session 18 th & 19 th April.
Emergent Phenomena & Human Social Systems NIL KILICAY.
Purpose of the Standards
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
Pilot Risk-Ranking Model to Prioritize Manufacturing Sites for GMP Inspections Advisory Committee for Pharmaceutical Science Manufacturing Subcommittee.
Science and Engineering Practices
Non-functional requirements
Presentation on Integrating Management Systems
Protection Against Occupational Exposure
Internal Auditing and Outsourcing
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Enhancing assessment capacity For teachers of Authority and Authority-registered subjects.
Developing Artificial Neural Networks for Safety Critical Systems
Chapter 5CSA 217 Design in Construction Chapter 5 1.
Performance Measurement and Analysis for Health Organizations
Sept - Dec w1d11 Beyond Accuracy: What Data Quality Means to Data Consumers CMPT 455/826 - Week 1, Day 1 (based on R.Y. Wang & D.M. Strong)
VTT-STUK assessment method for safety evaluation of safety-critical computer based systems - application in BE-SECBS project.
Emergency Planning Steps 5 steps in emergency planning Step 1: Establish a team Step 2: Analyze capabilities and hazards Step 3: Conduct vulnerability.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
Effective Requirements Management – an overview Kristian Persson Field Product Manager, Telelogic Asia/Pacific.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Intent Specification Intent Specification is used in SpecTRM
Using Human Component Mapping TO ANALYSE & INTEGRATE HUMAN FACTORS ISSUES & RECORDS WITH RAILWAY HAZARD LOGS 1 Dr. Amanda C. Elliott, Simon Macmull & Harry.
Margin Management. PAGE 2 Margin Management Plant Shutdowns 1.Late 1990’s – numerous “surprise” long-term plant shutdowns 2.Shutdowns resulted when a.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Hazards Identification and Risk Assessment
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
Develop a Safety Assurance approach for Complex Systems (Problem Definition) Supervisors: Tim Kelly, Rob Alexander Chris Leong HISE Group Giving a Presentation.
Open Platform for EvolutioNary Certification Of Safety-critical Systems Large-scale integrating project (IP) Nuanced Term-Matching to Assist in Compositional.
VELS The Arts. VELS (3 STRANDS) Physical, Personal and Social Learning Discipline-based Learning Interdisciplinary Learning.
EMER: Engineering Critical Systems Human-scale systems with emergence.
EMER: Engineering Simulations for scientific research.
Software Safety Case Why, what and how… Jon Arvid Børretzen.
META-ANALYSIS, RESEARCH SYNTHESES AND SYSTEMATIC REVIEWS © LOUIS COHEN, LAWRENCE MANION & KEITH MORRISON.
LEARNER CENTERED APPROACH
Specific Safety Requirements on Safety Assessment and Safety Cases for Predisposal Management of Radioactive Waste – GSR Part 5.
How To Analyze a Reading Presented By: Dr. Akassi Content From The Norton’s Field Guide To Writing.
An Expanded Model of Evidence-based Practice in Special Education Randy Keyworth Jack States Ronnie Detrich Wing Institute.
ISO Registration Common Areas of Nonconformances.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
©Ian Sommerville 2000Dependability Slide 1 Chapter 16 Dependability.
Security Codesign Steve Dawson and Victoria Stavridou Bruno Dutertre, Josh Levy, Bob Riemenschneider, Hassen Saidi, Tomas Uribe System Design Laboratory.
OHSAS Occupational health and safety management system.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
THE risk management in the period of Innovation
Competence Pack Guide to Assessment.
Quality Risk Management
Competence Pack Guide to Assessment.
Transmitted by the expert from ISO
SIMULATION IN THE FINANCE INDUSTRY BY HARESH JANI
Presentation transcript:

EMER: Engineering Critical Systems: human scale systems with emergence

EME : 2 Safety critical systems Safety critical systems engineering has to consider emergent behaviour –Safety is itself emergent –A system is considered safe when its potential for undesired emergent behaviour is sufficiently restricted Recent work considers complex systems where emergent behaviours cannot be controlled – but do need to be understood Command and control Building evacuation and crowd management Transport systems management

EME : 3 Social scale complex systems A systems of systems is a group of interacting systems that interact to achieve some operational goal System of systems (SoS) are a focus of research in HISE and Enterprise Systems groups in the department –Large Scale Complex IT Systems –Social-scale critical systems Systems of interest all include people –Which adds irrationality to the behaviours of the system Start by defining SoS Alexander, Hall-May & Kelly, 2004 onwards –

EME : 4 Human SoS characteristics Goals: –Overall goals, shared by all components –Individual component goals Autonomy: – Multiple heterogeneous components with at least some individual capabilities and independence of action Mobility: –Components are spatially distributed and mobile –Communication is by ad hoc networks Components need to collaborate to achieve overall goals –No (reliable) central command and control

EME : 5 Example: building evacuation Emergency situation in a familiar setting –Individual goal is to get out Typically following established exit route, not emergency route –Overall goal is to clear the building fast and to know it is clear –Emergency disrupts social and communication structures Glasgow evacuation simulations –Use Monte Carlo simulation, not individual behaviours –Not formally engineered, but built using appropriate engineering background –Based on scenario analysis and simulation in realistic settings See eg. papers/9_11.PDF

EME : 6 Engineering and building evacuation Modelling human factors (vs Monte Carlo simulation) –Shown to be impossible on any meaningful scale –Attitudes, prior experience etc of many people Modelling building –Blueprints and site knowledge –Build all human-scale features into the model Environment analysed –Ability to change features of emergency, building, response Simulation is as simple as possible Validation is against evidence –From fire practices in situ –From literature, experience, observation

EME : 7 Example: traffic policies Safety policy: operational rules that guide agent behaviour so that emergent “designed” SoS-level behaviour does not result in accidents The belief that numerous independently designed and constructed autonomous systems can work together synergistically and without accident is naïve unless they operate to a higher and consistent set of rules Focus on identifying objectives of rule set Derive an argument for each showing how a policy (rule set) can mitigate

EME : 8 Safety case arguments: documenting assurance Significant critical systems engineering research into arguing and documenting assurance –Safety analysis and argumentation –Dependability, security also now using assurance techniques –See research by Tim Kelly and others in York’s HISE group World leaders in safety argumentation and safety-critical- systems training Analysis techniques focus on challenging evidence –Safety is established by exposure of an argument over evidence to expert scrutiny –Reveals the extent and limitations to trust in the system –No system is ever absolutely safe Arguments summarised in Goal Structuring Notation

EME : 9 Basic Goal Structuring Notation See T.P.Kelly, PhD thesis, R. Weaver, PhD these, and papers by Kelly’s group, www-users.cs.york.ac.uk/~tpk/pubs.html

EME : 10 Recording a safety argument

EME : 11 Example: command and control Hypothetical study of the safety of various aspects of a combined military operation with UAVs –Identification of emergent hazards Safety problems due to complexity rather than component failure –Agent-based simulation to do combinatoric behaviours R. D. Alexander’s PhD: 7/YCST/21/YCST pdf

EME : 12 Engineering command and control Case study has been used in many safety related analyses –Well-known components, existing models, etc. Careful engineering approach based on conventional simulation design and conventional safety analysis –Systematic derivation and deviation of hazard vignettes Work on how SoS characteristics contribute to hazards –Uses BDI (desires, beliefs intentions) for human components Multi-agent simulation validated against existing models Machine learning used to identify new hazard

EME : 13 Common features of examples Use of existing research and best practice –Ways to model people (BDI) –Ways to model environment –Ways to construct and analyse efficient simulations Validation: –Do models and simulations match the real world? Deviational analysis: –How might something have been overlooked? Arguments –E.g. safety: a risk is as low as reasonably possible within the assumptions of the model or simulation…

Could molecular nanotechnology be assured safe?

EME : 15 Evidence-based engineering (Kelly) When we use any engineering technique, we need to know how it affects our ability to justify quality –Evidence that a design is realistic Proven properties of a specification are irrelevant if we implement on an unproven platform At nano-scale, we’re talking about unproven physical media –Simulation is only useful it we can justify its contents Emergent properties may be artefacts of simulated environment Real environments have many unknown unknowns ALARP rules, ok? … –Doubt (risk…) must be as low as reasonably practicable

EME : 16 Assurance arguments Evidence-based engineering would design arguments of quality, validity etc alongside product design Demonstrable validity, safety, security, dependability … –It must be possible to convince others The need for evidence guides techniques for analysing and quantifying quality attributes –Directs analysis to unexpected behaviour and state –Structured brainstorming –Flaw hypothesis, deviational analysis, What-if, HAZOP.. Use expert insight and experience to challenge assumptions

EME : 17 Modelling Deviational analysis techniques can be applied to any models, assumptions, … –Design models in notations such as UML, CSP etc HAZOP + use cases, mutating CSP … Assurance needs evidence of modelling quality and relevance –MDE (meta)model compliance and consistency –Rigorous extensions to diagram-and-text modelling –Formal refinement … Need to be clear what is being modelled and why Srivatanakul,

EME : 18 Issues for nano-scale SoS: Goals and buy-in to goals Goals in human SoS imply agents with choice Buy-in to system goals by component systems At nano-scale, are there SoS or component goals or intentions? If a property emerges, is an SoS goal is met … ? We could transfer goals to designer, so that development and assurance need to capture: –designer’s intention –ability of SoS and components to achieve intent Also, a key to engineering SoS is goals that reflect dependability attributes Goals to avoid specific sorts of harm …

EME : 19 Issues for nano-scale SoS: Autonomy of component systems Autonomy implies choice –eg individual can revise goals, change communication links Soldiers think before detonating global destruction Nanites are not autonomous but similar effects from –Probabilistic features of elements & environment –Accidental mutation or damage –Spontaneous interaction and variably with environment Nanites have high capacity for getting lost or making an undesirable alliance –Engineering needs to understand and account for these features of nanites

EME : 20 Issues for nano-scale SoS: Environment For human SoS, global environment is “known” –Local operating conditions affect agents’ perception and use of environment Weather, terrain, infrastructure operation etc A broken radio or flooded river is a problem that can be understood and worked around Nano-scale environment is a real problem –We do not understanding nano-scale environment –We do not understand how nanites would interact with their environment –Nanites cannot devise imaginative solutions to unforeseen scenarios –Policies, operational guidance etc irrelevant

EME : 21 Nano-scale systems of systems? Nano-scale complex emergent systems are SoS Despite absence of free-will, many of the issues are the same Many of the consequences of inadequate design are similar –Catastrophic uncontrolled interaction Treating nano-scale complex emergent systems as SoS leads us to look at other critical-systems research for engineering inspiration