43
Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International Conference on Sensor Technologies and Applications WSNSCM 2012 August 19 - 24, 2012 - Rome, Italy

Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Sensor Based Risk Assessment for Dangerous ProductsSupply

Dr. Laurent Gomez, SAP Research

Sixth International Conference on Sensor Technologies and ApplicationsWSNSCM 2012

August 19 - 24, 2012 - Rome, Italy

Page 2: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

RESCUEITsecuREd ServiCe enabled sUpply chain connEctivity fromthe real world up to the world of IT

1st ever German-French research project in Public Security

Leverage German French research funding

German-French Research Project, funded by BMBF / ANRin the context of the “Securing the Supply Chains / “ConceptsSystems and Tools for Global Security” call.

Context

© 2012 SAP AG. All rights reserved. 2

Involves major actors of the supply chain

Page 3: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

RESCUEIT in a Nutshell

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupt ed. Restart your computer, and thenopen the file again. If the red x still appears, you may have to delete the image and then insert it again.The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupt ed. Restart your computer, and thenopen the file again. If the red x still appears, you may have to delete the image and then insert it again.

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may

have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have todelete the image and then insert it again.

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may

have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have todelete the image and then insert it again.

Context

© 2012 SAP AG. All rights reserved. 3

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupt ed. Restart yourcomputer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again .The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupt ed. Restart yourcomputer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again .

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupt ed. Restart your computer, andthen open the file again. If the red x still appears, you may have to delete the image and then insert it again.The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupt ed. Restart your computer, andthen open the file again. If the red x still appears, you may have to delete the image and then insert it again.

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupt ed. Restart your computer, and then open the file again. If the red x stillappears, you may have to delete the image and then insert it again.The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupt ed. Restart your computer, and then open the file again. If the red x stillappears, you may have to delete the image and then insert it again.

Page 4: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

RESCUEIT in a Nutshell

Supply ChainModeling

Context

© 2012 SAP AG. All rights reserved. 4

Page 5: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

ScenarioImportation of dangerous products to Europe

Dangerous products are imported from China;

Products are shipped by boat to Le Havre harbor;

After customs check, products are shipped to a K+N warehouse;

Products are shipped by truck to the retailer storage units

Context

© 2012 SAP AG. All rights reserved. 5

The image cannot be displayed. Yourcomputer may not have enough memory to

open the image, or the image may havebeen corrupted. Restart your computer, andthen open the file again. If the red x stillappears, you may have to delete the imageand then insert it again.

The image cannot be displayed. Yourcomputer may not have enough memory to

open the image, or the image may havebeen corrupted. Restart your computer, andthen open the file again. If the red x stillappears, you may have to delete the imageand then insert it again.

The image cannot be displayed.Your computer may not haveenough memory to open theimage, or the image may havebeen corrupted. Restart yourcomputer, and then open the fileagain. If the red x still appears, youmay have to delete the image andthen insert it again.

The image cannot be displayed.Your computer may not haveenough memory to open theimage, or the image may havebeen corrupted. Restart yourcomputer, and then open the fileagain. If the red x still appears, youmay have to delete the image andthen insert it again.

Page 6: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

RESCUEIT in a Nutshell

Risk of explosionOR

Risk of theft

Context

© 2012 SAP AG. All rights reserved. 6

Page 7: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Products identified as dangerous productsstored in K+N warehouse classified SEVESO II

Detergent - ICPE 1412

Harmful and polluting liquids

Flash point 66 celsius degrees

Must not be mixed with acid, bases or oxidizing

Risk of fire, if exposed to high temperature

© 2012 SAP AG. All rights reserved. 7

Aerosol – ICPE 1432

Restricted quantity in a single location

Flash point 13 celsius degrees

Muts not be in contact with metal and acids

Risk of fire, if exposed to high temperature

Page 8: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Impact on the population and environment

Fire

Merchandises and packaging highly inflammable

Toxic gas emission

Lethal consequence on individuals

Under the effect of heat, emission of hydro-cyanic acid or oxides of sulphur.

Context

© 2012 SAP AG. All rights reserved. 8

Under the effect of heat, emission of hydro-cyanic acid or oxides of sulphur.

Dispersion of extinction waters

Containing water plus chemical, foam, powder

May pollute surface or underground waters.

Food contamination

Page 9: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Compliance with dangerous products regulation

Regulation compliance along the supply chain

Manipulation, shipping, storage of dangerous products

“In order to ensure compliance with the safety regulations, shipped goods have to beidentified together with their classification (e.g. flammable, explosive).”

European Chemicals Regulation

Context

© 2012 SAP AG. All rights reserved. 9

REACH (Regulatory framework for the management of chemicals)

At the French level

ICPE (« Installation Classes pour la Protection de l’Environnement »).

Units classified as SEVESO I/II for the storage of dangerous goods.

Page 10: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Problem

All the supply chain actors are not subject to the sameregulations

Because they are not at the same location

Chinese regulation vs European regulations vs boat shippment regulations

Because they are subject to the same classification

Problem

© 2012 SAP AG. All rights reserved. 10

Because they are subject to the same classification

K+N warehouse has to be classified SEVESO II in order to store chemical

Retailer warehouse has no specific storage constraints

Risk of food contamination with leakage of liquid detergent

There is no overall risk assessment at the execution ofthe supply chain

How to evaluate risk at the execution of the supply chainprocess without any disruption?

Page 11: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

RESCUEIT in a Nutshell

Monitoring

Constraints

Temperature > 66Celsius OR

NOT package opening

ApproachOur approach

© 2012 SAP AG. All rights reserved. 11

In-Node RiskAssessment

Constraints

The image part with relationship ID rId1 was not found in the file.

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image mayhave been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have

to delete the image and then insert it again.

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image mayhave been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have

to delete the image and then insert it again.

Page 12: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Delegation of risk assessment to Sensor

Container

Shipping

Warehouse

Sensor

Sensor

Sensor

ApproachOur approach

© 2012 SAP AG. All rights reserved. 12

Good

Package

Palett

RFID

RFID

RFID

Sensor

•RFID are used for identification ofgoods plus additional informationsuch as goods classification

GTIN and SSCCBatch n#Limite DateUN code

•Sensors are used for monitoring thesupply chain, and risk identification

Page 13: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Identified constraints

Identification of constraints per good classification

ICPE 1172 - squashing, overturn, container opening, liquid leakage

ICPE 1412 – overheating (13ºC), squashing, overturn, container opening

ICPE 1432 - overheating (66ºC), squashing, overturn, container opening

Container opening

ApproachOur approach

© 2012 SAP AG. All rights reserved. 13

Container opening

Light monitoring

Secure lock

Squashing/overturn

Acceleration pattern

Liquid leakage

Detection of packaging opening, or shock on the products

Page 14: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

RESCUEIT in a Nutshell

Alerting

ApproachOur approach

© 2012 SAP AG. All rights reserved. 14

In-Node RiskAssessment

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image mayhave been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have

to delete the image and then insert it again.

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image mayhave been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have

to delete the image and then insert it again.

Page 15: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Terminology

Our approach

© 2012 SAP AG. All rights reserved. 15

Page 16: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Roadmap

Our approach

© 2012 SAP AG. All rights reserved. 16

Page 17: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Constraint Extraction

Based on regulations

Flash point

Stability

Container/packaging opening

Humidity constraints

Our approach

© 2012 SAP AG. All rights reserved. 17

Incompatibility between products

Limited of quantity of product stored at the samelocation

Liquid leakage

Page 18: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Constraint Extraction

Based on activity of the assets

Storage, Manipulation, Shipping

Based on geo localization

EU, Asia

K+N warehouse, retailer warehouse

Our approach

© 2012 SAP AG. All rights reserved. 18

Page 19: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Constraint Distribution on Nodes

Set of Constraint to be uploaded on sensor nodes

node identifier, constraint identifier,

Type of sensor data, Operation, Threshold

“TEMPERATURE on Node 21 > 27 Celsius.”

Byte-code upload

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

Our approach

© 2012 SAP AG. All rights reserved. 19

Byte-code upload

Enablement of combination of constraints

“TEMPERATURE on Node 21 > 27 Celsius.” AND

“LIGHT on Node 21 > 400 Lux.”

Page 20: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Constraint Evaluation on Nodes

Execution of constraint byte-code

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupt ed. Restart your computer, andthen open the file again. If the red x still appears, you may have to delete the image and then insert it again.The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupt ed. Restart your computer, andthen open the file again. If the red x still appears, you may have to delete the image and then insert it again.

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

Our approach

© 2012 SAP AG. All rights reserved. 20

Page 21: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Alerting

Whenever constraint byte-code detects anyconstraint violation, an alert is triggered.

Our approach

© 2012 SAP AG. All rights reserved. 21

Page 22: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Overall Architecture

Prototype

© 2012 SAP AG. All rights reserved. 22

Page 23: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Overall ArchitectureSAP Supply Chain Management System

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

Prototype

© 2012 SAP AG. All rights reserved. 23

Page 24: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Overall ArchitectureWireless Sensor / RFID

Prototype

© 2012 SAP AG. All rights reserved. 24

Page 25: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Overall ArchitectureMediation for Device Integration

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

Prototype

© 2012 SAP AG. All rights reserved. 25

Page 26: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Middleware for Device Integration

Node resource restriction

CPU, memory, battery

Lack of standardization

Proprietary communication protocol,

Proprietary sensor data format

Information flooding

Prototype

© 2012 SAP AG. All rights reserved. 26

Information flooding

Lack of security

Unreliability of sensors

Page 27: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Middleware for Device Integrationa SAP research Prototype

Need for a mediation layer for a seamless integration

between smart items and supply chain management system

Delegation of information processing

for energy saving

Prototype

© 2012 SAP AG. All rights reserved. 27

Security mechanisms

Page 28: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

MDI in a nutshell

Based on OSGi platform organized around agents

Logical Agent for sensor data processing

Adapter Agent for sensor data acquisition

Each agent exposes a Web Service interface, and enable OSGi

Prototype

© 2012 SAP AG. All rights reserved. 28

Each agent exposes a Web Service interface, and enable OSGicommunication locally.

Page 29: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Site Manager

the MDI Cockpit

Site manager provides an overall view on availabledevices.

A device is represented as an Agent.

Site Manager is in charge of

Agent Instantiation

Agent Configuration

Prototype

© 2012 SAP AG. All rights reserved. 29

Agent Configuration

Agent launching

Page 30: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Purchase Order Generation

Prototype

© 2012 SAP AG. All rights reserved. 30

Page 31: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Subscription to good monitoring per classificationPurchaseOrderId, Classification, Subscriber

PurchaseOrderId,Classification,

Prototype

© 2012 SAP AG. All rights reserved. 31

Classification,Subscriber

Page 32: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Subscription to good monitoring per classificationConstraint extraction per classification

Prototype

© 2012 SAP AG. All rights reserved. 32

Monitor temperature every 10 seconds,Trigger alert if temperature above 30C for10 seconds

Page 33: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Subscription to good monitoring per classificationConstraint extraction per classification

Prototype

© 2012 SAP AG. All rights reserved. 33

Program the sensor node

Page 34: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Notification of status change

Prototype

© 2012 SAP AG. All rights reserved. 34

Status Change Notification

Page 35: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Notification of sensor event

Sensor Event Notification

The image part with relationship ID rId1 was not found in the file.

Prototype

© 2012 SAP AG. All rights reserved. 35

Page 36: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

Prototype

© 2012 SAP AG. All rights reserved. 36

The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again.

Page 37: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Hardware Setup:CrossBow sensor node

Hardware

MICAz (MPR2400) processing and programmable unit (TinOS, with NesC)

MTS310CA sensor board equipped with acceleration, light and temperature sensors

Energy:

2 1.2V rechargeable battery with a capacity of 2200mA/h

Evaluation

© 2012 SAP AG. All rights reserved. 37

2 1.2V rechargeable battery with a capacity of 2200mA/h

Page 38: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Four evaluation scenarios

Packet sending every 30 seconds

Monitoring and packet sending every 30 seconds

Monitoring, constraint evaluation and packet sending every 30 seconds

Monitoring, constraint evaluation, and alerting.

Evaluation

© 2012 SAP AG. All rights reserved. 38

Page 39: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Battery overhead

Negligible overhead of evaluation of constraint violation.

Following alerting strategies, we observe a gain in energy consumption ofalmost 60%.

Evaluation

© 2012 SAP AG. All rights reserved. 39

Page 40: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Memory overhead

10% of the loaded code in ROM is dedicated to constraint evaluation

10% of the used RAM is dedicated to constraint evaluation

Bytecode

Set of constraints

Evaluation

© 2012 SAP AG. All rights reserved. 40

Page 41: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Conclusion

Sensor based risk assessment for supply of dangerous products.

Cope with disruption of risk evaluation at the execution of the supply chain.

Prototype developed in the scope of the RESCUEIT project

Future work

Confidentiality of the alerts and monitoring information

© 2012 SAP AG. All rights reserved. 41

Confidentiality of the alerts and monitoring information

Keep a trace of the alerts on the nodes (black box approach)

Page 42: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

Thank you!

Contact Information:Dr. Laurent GomezProject Lead RESCUEIT-FRSAP Research, Sophia Antipolis,[email protected]

Page 43: Sensor Based Risk Assessment for Dangerous Products Supply · 2016-09-11 · Sensor Based Risk Assessment for Dangerous Products Supply Dr. Laurent Gomez, SAP Research Sixth International

No part of this publication may be reproduced or transmitted in any form or for any purposewithout the express permission of SAP AG. The information contained herein may bechanged without prior notice.

Some software products marketed by SAP AG and its distributors contain proprietarysoftware components of other software vendors.

Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of MicrosoftCorporation.

IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x,System z, System z10, System z9, z10, z9, iSeries, pSeries, xSeries, zSeries, eServer,z/VM, z/OS, i5/OS, S/390, OS/390, OS/400, AS/400, S/390 Parallel Enterprise Server,PowerVM, Power Architecture, POWER6+, POWER6, POWER5+, POWER5, POWER,OpenPower, PowerPC, BatchPipes, BladeCenter, System Storage, GPFS, HACMP,RETAIN, DB2 Connect, RACF, Redbooks, OS/2, Parallel Sysplex, MVS/ESA, AIX,Intelligent Miner, WebSphere, Netfinity, Tivoli and Informix are trademarks or registered

© 2011 SAP AG. All rights reserved

Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, CrystalDecisions, Web Intelligence, Xcelsius, and other Business Objects products and servicesmentioned herein as well as their respective logos are trademarks or registered trademarksof Business Objects Software Ltd. Business Objects is an SAP company.

Sybase and Adaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other Sybaseproducts and services mentioned herein as well as their respective logos are trademarks orregistered trademarks of Sybase, Inc. Sybase is an SAP company.

All other product and service names mentioned are the trademarks of their respectivecompanies. Data contained in this document serves informational purposes only. Nationalproduct specifications may vary.

The information in this document is proprietary to SAP. No part of this document may bereproduced, copied, or transmitted in any form or for any purpose without the express priorwritten permission of SAP AG.

This document is a preliminary version and not subject to your license agreement or any

© 2012 SAP AG. All rights reserved. 43

Intelligent Miner, WebSphere, Netfinity, Tivoli and Informix are trademarks or registeredtrademarks of IBM Corporation.

Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks orregistered trademarks of Adobe Systems Incorporated in the United States and/or othercountries.

Oracle is a registered trademark of Oracle Corporation.

UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group.

Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin aretrademarks or registered trademarks of Citrix Systems, Inc.

HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C®, WorldWide Web Consortium, Massachusetts Institute of Technology.

Java is a registered trademark of Sun Microsystems, Inc.

JavaScript is a registered trademark of Sun Microsystems, Inc., used under license fortechnology invented and implemented by Netscape.

SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer,StreamWork, and other SAP products and services mentioned herein as well as theirrespective logos are trademarks or registered trademarks of SAP AG in Germany and othercountries.

This document is a preliminary version and not subject to your license agreement or anyother agreement with SAP. This document contains only intended strategies, developments,and functionalities of the SAP® product and is not intended to be binding upon SAP to anyparticular course of business, product strategy, and/or development. Please note that thisdocument is subject to change and may be changed by SAP at any time without notice.

SAP assumes no responsibility for errors or omissions in this document. SAP does notwarrant the accuracy or completeness of the information, text, graphics, links, or other itemscontained within this material. This document is provided without a warranty of any kind,either express or implied, including but not limited to the implied warranties ofmerchantability, fitness for a particular purpose, or non-infringement.

SAP shall have no liability for damages of any kind including without limitation direct,special, indirect, or consequential damages that may result from the use of these materials.This limitation shall not apply in cases of intent or gross negligence.

The statutory liability for personal injury and defective products is not affected. SAP has nocontrol over the information that you may access through the use of hot links contained inthese materials and does not endorse your use of third-party Web pages nor provide anywarranty whatsoever relating to third-party Web pages.