IMPROVING STABILITY IN DEVELOPING NATIONS THROUGH AUTOMATION 2006 A Proceedings Volume from the IFAC Conference on Supplemental Ways for Improving International Stability through Automation ISA ’06, 15–17 June 2006, Prishtina, Kosovo
Edited by
P. KOPACEK Vienna University of Technology IHRT Favoritenstrasse, 9-11A Vienna A-1040 AUSTRIA
Published for the
International Federation of Automatic Control By
ELSEVIER LTD
Elsevier The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, UK 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
First edition 2006 Copyright © 2006, IFAC. Published by Elsevier 2006. All rights reserved No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone (+44) (0) 1865 843830; fax (+44) (0) 1865 853333; email:
[email protected]. Alternatively you can submit your request online by visiting the Elsevier web site at http://elsevier.com/locate/permissions, and selecting Obtaining permission to use Elsevier material Notice No responsibility is assumed by the publisher for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions or ideas contained in the material herein. Because of rapid advances in the medical sciences, in particular, independent verification of diagnoses and drug dosages should be made British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the Library of Congress
ISBN–13: 978-0-08-045406-1 ISBN–10: 0-08-045406-2 Printed and bound in Great Britain 06 07 08 09 10 10 9 8 7 6 5 4 3 2 1
Preface The idea for this series of conferences originated in the early 1980’s and was stimulated by Hal Chestnut, the first president of IFAC. He founded the Technical Committee on this topic and was very engaged in the organization of the first IFAC Workshop in Laxenburg, Austria (1983), in Cleveland, Ohio, USA (1986), in Budapest, Hungary (1989), in Toronto, Ontario, Canada (1992), Sinaia, Romania (1998) and Ohrid, Macedonia in 2000. The last two regular conferences took place in Vienna, Austria (2001) and in Waterford, Ireland (2003). Technological development has caused profound changes and social stability. Regions which have had stable populations for centuries have experienced enormous population growth leading to the emergence of sometimes unmanageable megaplex cities as well as bringing about macroscopic environmental change. Therefore the scope of this IFAC SWIIS Conference is to offer insights into mitigating unwanted side-effects of rapid development and to share methodologies for appropriate ways of managing the introduction of technologies which will alter social stability. Therefore the contributions included in this volume cover a very broad field of interest for subjects such as social aspects of technology transfer, managing the introduction of technological change, ethical aspects, technology and environmental stability, and anticipating secondary and tertiary effects of technological development. Included in this proceedings volume are 3 survey papers, 17 technical papers and a summary of the panel discussion. On behalf of the International Program Committee (IPC) and the National Organizing Committee (NOC), we would like to thank all the reviewers for their work and all for participating in and contributing to this event and I hope that you enjoyed the familiar atmosphere which stimulated intensive and successful discussions. Vienna, August 2006 Peter Kopacek Editor
iii
Scope Technological Development has caused profound changes in social stability. Regions which had stable populations for centuries have experienced enormous population growth leading to the emergence of sometimes unmanageable megaplex cities as well as bringing about macroscopic environmental change. Computers and communications have brought formerly remote regions into the daily interactions of global politics and commerce. Worldwide there are currently political instable regions. Some of them are small countries with nearly no technological background. One possibility to “stabilize" such countries is the development of a technological infrastructure. Examples from past show that the automation in the broadest sense is an excellent subject for this task. This conference will bring together scientists and engineers working in one or more of these subjects to discuss solutions.
Topics
Social Aspects of Technology
Managing the Introduction of Technological Change
Ethical Aspects of Technological Proliferation
Modelling Social Change Likely to Follow a New Technology
Case Studies of Technology Transfer and Social Change
Technology and Environmental Stability
Anticipating Secondary and Tertiary Effects of Technological Development
Introduction of Technology vs. Demand Pull for Technological Development
Organized by Institute for Handling Devices and Robotics Vienna University of Technology Favoritenstrasse 9-11/318 A-1040 Vienna, AUSTRIA Tel: +43-1-58801 31801 Fax: +43-1-58801 318 99 E-mail:
[email protected] Homepage : http://www.ihrt.tuwien.ac.at/isa06
iv
Sponsored by International Federation of Automatic Control - IFAC IFAC TC 9.5 - Supplemental Ways of Improving International Stability
Co-sponsored by IFAC TC 4.4 - Cost Oriented Automation IFAC TC 5.2 - Manufacturing Modelling for Management and Control IFAC TC 9.1 - Economic and Business Systems IFAC TC 9.2 - Social Impact of Automation IFAC TC 9.3 - Developing Countries IFAC TC 9.4 - Control Education IFIP - International Federation for Information Processing IFORS - International Federation of Operational Research Societies IMEKO - International Measurement Confederation
International Program Committee (IPC) Chairman:
Stapleton, L. (Ireland))
Members: Vice-Chairs from industry: B. Kopacek (AUT) F. Ismaili (UNMIK) Vice-Chairs: D. Brandt (GER) E. Hajrizi (UNMIK) P. Kopacek (AUT) Members: J. Cernetic (SLO) G. Dimirovski (TUR/MAC) T. Dinibütün (TUR) I. Dumitrache (ROM) H. Erbe (GER) P.P. Groumpos (GRE) M. Hersh (GBR)
F. Kile (USA) A. Makarenko (UKR) R. Neck (AUT) J. H. Park (KOR) M. Thoma (GER) T. Vamos (HUN)
National Organizing Committee (NOC) Chairman: Members:
E. Hajrizi (UNMIK) M. W. Han (Austria) P. Kopacek (Austria)
Workshop Editor
P. Kopacek (Austria)
v
This page intentionally left blank
Contents SURVEY PAPERS MECHATRONICS EDUCATION AND INTERNATIONAL STABILITY THE DEVELOPMENT OF UNIVERSITY-LEVEL EDUCATION PROGRAMMES IN ADVANCED ENGINEERING IN KOSOVO ............................................ 1 P. Kopacek , M. Ceccarelli , E. Hajrizi and L. Stapleton TERRORISM, HUMAN RIGHTS AND ETHICS: A MODELLING APPROACH ...................................................................................................................................... 9 M. Hersh ENERGY PROVIDING AND CONSUMPTION CAN CAUSE INSTABILITY ................................................................................................................................... 21 H.-H. Erbe and P. Kopacek MECHATRONICS A ROLE OF MECHANICAL ENGINEERING IN MECHATRONICS .................................... 31 M. Ceccarelli, E. Ottaviano and G. Carbone A MECHATRONICS MANAGEMENT LABORATORY............................................................ 37 P. Kopacek VARIOUS SOCIAL STABILITY IN A STRESSED ECOSYSTEM ............................................................... 43 F. Kile CRITICAL INFRASTRUCTURE.................................................................................................... 49 R. Genser DECISION MAKING IN TOC-PRODUCT-MIX SELECTION VIA FUZZY COST FUNCTION OPTIMIZATION .............................................................................. 55 A. Bhattacharya, P. Vasant, C. Andreeski, N. Barsoum, T. Kolemisevska , A. T. Dinibütün and G. M. Dimirovski LEARNMATHS: A CASE STUDY OF THE DEVELOPMENT OF LEARNING SOFTWARE TO SUPPORT SOCIAL INCLUSION .............................................. 61 M. A. Hersh and L. Stapleton
vii
PRIVACY, SECURITY AND ETHICAL ISSUES CURRENT ETHICAL SCRUPLES CONCERNING INFORMATION ENGINEERING ................................................................................................................................ 67 T. Vamos COMPLEXITY OF SOCIAL SYSTEM CYBERNETICS: RISK AND UNCERTAINTY MANAGEMENT IN NEGOTIATIONS ........................................................... 71 J. Stankovski, T. D. Kolemisevska-Gugulovska, Z. A. Icev , A. T. Dinibütün and G. M. Dimirovsky ENERGY THE ECONOMICS AND POLITICS OF ENERGY GENERATION......................................... 77 M.A. Hersh ECONOMIC, ETHICAL AND CULTURAL ASPECTS OF ICT CHANGE.............................. 83 J. B. Lewoc, A. Izworski and S. Skowronski AUTOMATION, CONTROL AND SUPERVISION OF COMBINED HEAT AND POWER SYSTEMS ..................................................................................................... 89 J. B. Lewoc, A. Kieleczawa, A. Izworski and S. Skowronski ROBOTSOCCER COORDINATION OF THE MULI AGENT SYSTEM AND ITS APPLICATION TO ROBOT SOCCER .......................................................................................... 95 A. Pajaziti, I. Gojani, G. Shala and P. Kopacek HUMANOID ROBOTS FOR HUMAN LIFE SUPPORT ............................................................. 101 E. Schierer STRATEGIES AND PREDICTION IN MULTI-AGENT SYSTEMS ......................................... 107 M.-W. Han PANEL DISCUSSION CONTROL STRATEGIES FOR A SUSTAINABLE FUTURE ................................................... 113 H. Erbe , R. .Genser, M.W. Han , M. Hersh P. Kopacek and, L.Stapleton
AUTHOR’S INDEX ........................................................................................................................... 117
viii
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
MECHATRONICS EDUCATION AND INTERNATIONAL STABILITY THE DEVELOPMENT OF UNIVERSITY-LEVEL EDUCATION PROGRAMMES IN ADVANCED ENGINEERING IN KOSOVO Kopacek, P.1, Ceccharelli, M. 2 , Hajrizi, E.3, Stapleton, L. ln
IHRT", Vienna University of Technology,
[email protected] LARM: Laboratory of Robotics and Mechatronics, University ofCassino, Italy 3 University of Business and Technology, Pristina 4 ISOL Research Centre, Waterford Institute of Technology, Republic of Ireland
2
Abstract: Emerging economies in the midst of fundamental restructuring of higher education can benefit from radical approaches to engineering education programme design. The authors present the case of the development of a Mechatronics Management curriculum in one of the new international universities in Kosovo in order to demonstrate that it is possible to develop higher-education programmes in advanced engineering, which have local economic context in an emerging economy. The authors illustrate how it is possible to use theories of engineering and technology professional competence to develop a coherent higher education programme which has the potential to deliver on aggressive economic and educational objectives. Copyright© IFAC 2006 Keywords: Education, Mechatronics, Economic Development
1. BACKGROUND AND CONTEXT Emerging economies in marginalised territories have particular difficulties in building a sustainable, stable programme of social, economic and political activity over time. Rather than leaving local groups to their own devices, it is self evident that the international community can play a role in directly supporting initiatives in these territories. One of the most important strategic activities in which the international community must engage with people 'on the ground' is the development of educational infrastructures. As the global digital divide widens between the rich and poor, the need to support programmes specifically aimed at developing leading edge, high-technology-oriented educational programmes in disadvantaged regions provides one of the most significant opportunities for increasing socio-political and economic stability long term. This relationship between education and economic development is a subject of great interest to policymakers, economists and educationalists and the linkages are well established (Cheong Cheng, et. al, 2002).
The authors present an international educational project directed to one of the most troubles regions in the European zone, Kosovo. It demonstrates the tremendous and exciting educational work that can be achieved in such marginalised communities, where there is will and determination to do so. It also sets out a theoretical basis for the programme centred around recently developed competency frameworks. The paper then sets out, in broad terms, the design of the programme and finishes with a review of the particular difficulties encountered in launching a technology management course in Kosovo. The key propositions of this paper are as follows: PI: Is it possible to develop an advanced technology programme for higher education in an emerging economy which has, until quite recently, experienced high-levels of instability? This gives rise to two other secondary propositions:
P2: If PI is true, is it possible to develop such a programme so that it has both internationally recognised unique selling points. P2: If PI is true can such a programme provide a basis for knowledge-based economic activities which have local economic context?
2. MECHATRONICS & ENGINEERING MANAGEMENT Mechatronics consists of integration of mechanical engineering with electronics, computer systems, and advanced controls to design, construct, and operate products and processes. Mechatronics is one of the newest branches of engineering with far-reaching applications to any sector of society. Generally, a mechatronic system can be seen as a mechanism, which is driven by actuators that are controlled via microelectronics and software using feedback from one or more sensors. Mechatronics is therefore the title given to the sub-discipline of engineering which studies the integration of mechanical and electronic technologies to create 'intelligent' machines, systems and controllers. High levels of automation in manufacturing environments require designers with skills in mechanical sciences since machinery and robotic equipment is fundamentally of mechanical nature (Ashley, 1997). The actuation, monitoring and control of mechanical devices are, however, achieved by electrical and electronic means. An example of a mechatronic system is the operation of the landing gear of an aircraft. When the system is activated, it is the actuator, driven by hydraulic forces, that moves the landing gear, consisting of struts and wheels, down into the correct position for landing. If the landing gear were under automatic control then various sensors (perhaps of altitude or wing-flap angle) would indicate to the controlling computer that the aircraft was about to land and the computer would activate the mechanical system. Summarizing: Mechatronics is an interdisciplinary field integrating Mechanical Engineering, Electronics, and Computer Science.
2.1 Mechatronics in Kosovo A number of well-educated economicallydisadvantaged so-called "second" and "third" world societies have recognised the potential of developing a knowledge economy from a low level of development. It is readily apparent that similar opportunities exist for Kosovo, once socio-economic and political stability has been achieved. However, social and political stability does not, in itself, deliver prosperity or inculcate hope. Kosovan administration must carefully plan and set in place
structures which will enable sustainable economic activity to emerge and flourish. Consequently, it is evident that there is a need to focus upon higher education as a pre-requisite for sustainable growth and stability, and, in particular, a focus upon emerging disciplines in the field of high technology is very important in developing a skill-based for potential, future inward investment. Mechatronics provides a particularly appropriate discipline given a number of key opportunities and potentials in Kosovo: 1. Given the richness of geology in the region there is real potential for a well-developed mining industry using the latest automation systems, many of which utilise mechatronics systems 2. The principles of mechatronics are readily transferable to advanced manufacturing systems (a limited but none-the-less strong industrial base remains in the territory) 3. Mechatronics is an aspect of the knowledge economy which has received little attention in western universities, in spite of the enormous potential for products, services and entrepreneurial activity in this space. The problem with mechatronics is that it is inherently interdisciplinary, combining both electronics, computing and mechanical engineering. Furthermore, a graduate of a mechatronics programme will require a set of skills and competencies that are more complex than traditional engineering programmes, in order to operate effectively in technology-driven initiatives in this space (Valenti, 1996). Thirdly, the lessons of countries such as the Republic of Ireland indicate that simply educating people in advanced technologies is not enough. An enterprise culture, along with strong management disciplines, is also necessary for emerging economies where existing opportunities may be few. All this suggests a new type of degree programme, requiring a non-traditional approach to curriculum development in engineering and advanced technology. This in turn implies a new approach to the development of higher education interdisciplinary programmes.
3. ENGINEERING MANAGEMENT EDUCATION & MECHATRONICS MANAGEMENT Up to now, conventional engineering education throughout Europe, has been dominated by technical subjects, and has had little to offer in interdisciplinary academic training. Topics relating to economics, business management and jurisprudence have been considered voluntary exercises or professional post-formation needs rather than compulsory subjects. Vice versa, graduates from business schools, for example, have rarely had the chance to extend their knowledge in technical fields.
Fischer (2004) compared 138 Engineering Management Programs worldwide. His results are summarized in Fig. 1. Fig. 1 summarises the key subjects covered across these programmes. Firstly, it is apparent from the figure that the subject domain typically includes a combination of technical and non-technical subjects focussing upon general engineering. Secondly, Fig. 1 implies a high demand for graduates with non-technical skills from these programmes, as compared with the skill profiles of graduates. This further suggests an imbalance in the profiles of the programmes as against the demands of the organisations that employ the graduates of the programmes. Controlling & Accounting Corporate Planning & Strategy Technology & Production Information Systems Human Resource Mgmt Organization & Logistics Marketing & Product Mgmt. Analytics & Systems Eng, Law & Taxes
demand surplus supply surplus
Fig.
1. Summary of Results of Review of Engineering Management Programmes (adapted from Fischer (2004)).
Mechatronic managers possess the core skills of mechanical engineers and electrical engineers as well as management and business. Their knowledge enables them to solve a wide range of mechanical, electrical and software problems, allowing them to participate in and lead multidisciplinary design teams. Mechatronic s managers have particular opportunities in Kosovo. For example, the rich geology of Kosovo means that mining, which makes significant use of mechatronics devices, has particular potential for mechatronics managers.
4. DEVELOPING A KOSOVAN MECHATRONICS MANAGEMENT PROGRAMME Typically, innovation in science, technology and engineering education has been somewhat constrained by well-established faculty structures present within European universities. It was recognised that the educational context provided by a completely new university in Kosovo (i.e. UBT) was ideal for reworking engineering education curricula along more interdisciplinary lines as is proposed by the recent developments in education research in this domain. The establishment of UBT as a completely new higher education institution in 2004 provided an excellent opportunity to work across traditional
faculty boundaries, whilst ensuring the course is well anchored within a particular disciplinary domain. UBT represented a 'green-fields' site with a small but extremely motivated staff and student body. The development team recognised that a programme in mechatronics could therefore be designed and delivered along truly multi-disciplinary lines. This would enable the programme to be more grounded in the reality of mechatronics in its industrial setting.
5. CURRICULUM DESIGN: THEORETICAL APPROACH Although the Kosovan economic situation would seem to be a long way from the western smallknowledge economy model, it was felt that a radical approach should be adopted in curriculum design. This radical approach needed firm foundations in recent education research. This provided an opportunity to develop a greenfields approach to curriculum design. Whilst it is beyond the scope of this paper to unpack fully the various theoretical frameworks which were used to inform the final mechatronics programme, it is important to outline the three primary literatures incorporated into the theoretical approach: 1. Curriculum design (IS, 2002; Computing Curricula, 2001; SWEBOK, 2000; SWECOE, 2000) 2. Professionalisation of knowledge-work (Drohan, 2005; Ilvari, 2002; SWEBOK, 2000; SWECOE, 2000; Iivari & Linger (1997) & (1999)) 3. Professional competence (Devereux, 2004; Carlile, 2001; Down et. al., 1999)
5.1 Curriculum Design Surprisingly, mechatronics has received comparatively little attention from engineering education researchers. Since ten years ago concerns have arisen in the literature about how to best prepare under-graduate engineers to work with such technologies in organisational contexts. Academicians and engineering managers have identified several key areas for engineering educators to focus on, in particular in topics such as mechatronics and information technology. Serious criticisms of engineering curricula, especially in emerging areas such as mechatronics, gathered momentum in the mid-1990s. In 1995 research conducted by members of the American Society for Engineering Education (ASEE) indicated that engineering curricula were generally falling far short in terms of developing the professional competences engineering under-graduates required for the workplace (Masi, 1995). One of Masi (1995)'s key recommendations included 'together with business schools and industry, engineering schools should
develop innovative programs for advanced degrees' (p. 44). This has not proved easy to achieve given historical demarcation between business and engineering faculties (for example). Valenti (1996) argued that mechatronics engineers require significant contextual preparation at undergraduate level. He further argues that many higher education institutes are struggling to meet the curriculum needs in this space, citing a variety of educational and administrative barriers. Similar insights were set out in Vest, Long & Anderson (1996)'s report of a national survey of the professional experiences of electrical engineering graduates conducted in the USA. In this study 'soft-skills' such as interpersonal communications rated very high in importance. What these, and subsequent, research articles clearly demonstrated was the need for a coherent theoretical approach to the development of engineering education curricula which enabled undergraduates develop the necessary professional competences to perform there jobs on graduation. This challenge remains today. The development team assessed the primary sources of guiding frameworks for science, technology and engineering education as follows: Institute of Electrical and Electronic Engineering (IEEE), Association of Computing Machinery (ACM), the British Computer society (BCS) and the International Federation of Automation and Control (IFAC). Also reviewed were the International Standards Organisation (ISO) publications. There was a singular lack of coherent frameworks which are based upon competencies associated with graduates of educational programmes in these fields.
5.2 Professionalisation of knowledge-work Iivari (2002) developed a comprehensive framework for knowledge-work-oriented curricula. The authors adapted this work to provide underlying theory to inform the programme (see Fig. 2). Drohan (2005) noted the need for educationalists in knowledge-work to provide a problem-centred approach in the delivery of these programme. Consequently, the authors focussed a great deal of attention on the design of two mechatronics laboratories. The first laboratory was based upon a 'real-life' manufacturing environment to place mechatronics problem in some real-life context. Problem solving education also benefits from a 'playful' competitive setting which involves both team-oriented activities and multi-disciplinary activities. Consequently, the authors designed a robot-soccer laboratory. In assessing theory of the professionalisation of knowledge-work as it applied to the design of the programme, it became apparent there was a need to include professional competence theory.
Technology knowledge
Application\ domain \ knowledge \
HE Curricula for Knowledge Work
Organizationa knowledge
f ( Process Knowledge
Fig. 2. Higher Education Curricula for Knowledge Work (Adapted from Iivari (2002)).
5.3 Professional competence Professional competence theory provides to be of particular importance to the development of this programme, included Devereux (2004) in which she studies professional competence amongst ICT graduates in industry. In setting out her framework of information technology professional competence Devereux (2004) draws upon several literatures, including education, IT, Management and Engineering. Devereux described the following key dimensions of educational competence for information technology and systems professionals: 1. Technical Competence: the individual has sufficient subject knowledge and can plan and organise so as to achieve maximum results 2. Administrative Competence: the individual has a range of business knowledge, can follow rules, procedures and guidelines set out by the organisation and can perform to the expected standards set out by the organisation 3. Ethical Competence: The individual has moral standards which guide them in their decision making activities in the work environment 4. Productive Competence: The individual is efficient and capable of producing desirable results. Productive competence particularly focuses upon the capability of the professional to continuously develop their knowledge and skills. 5. Personal competence: The individual can manage time, possesses necessary 'people skills', time management, communications and conflict management skills to operate effectively in the working environment: In terms of technical competences, the fundamental courses provide essential knowledge of mechatronics through related disciplines. The main focus is on natural science so that a solid foundation is scheduled for basic knowledge. This includes Mathematics, Physics, Chemistry, Engineering mechanics, Materials, Computer Science, Information Technology, Electrical Engineering and Electronics. From the Business side fundamentals are given on Economics, Accounting and Statistics. This will
address both Administrative and Technical competences. It also demonstrates an attempt to address the broader definition of 'technical competence' set out in the competency framework. What Carlile (2000) calls 'administrative' competence has been demonstrated by Devereux (2004) to be central to professional competence in the work-place. This includes what is commonly referred to as "knowledge of the business" and an ability to follow correct standards and procedures. Standards are critical in professional work, especially in science, engineering and technology fields. Standards here refer to technical specifications, evaluation and approval of documentation (e.g. associated with work practices) (Schmidt, 2000). In Devereux (2004)'s study, business knowledge proved extremely important to professional competence, independent of the level of technical content within the job. Consequently, the programme development team focussed much attention upon developing curricula which would enable a mechatronics graduate to be conversant with business issues, and appreciate these in the context of the implementation of mechatronics technologies. According to Hersh (2000) the ever increasing advance in technologies has required a deeper and deeper consideration of ethics in engineering and the sciences. Professional ethics is receiving increasing attention amongst science and technology researchers, as well as in the education and business literature (c.f. Hersh & Stapleton, 2004; Devereux, 2004; Badiou, 2001; Shaw, 1996). For this programme ethics deals with making decisions and judgements applied in an engineering and technology deployment context and will incorporate both ethical standards and a concern for other stakeholders such as technology users. The programme development team have incorporated ethics as a mandatory subject for the curriculum. Very few engineering and technology undergraduate programmes in the western hemisphere incorporate ethics as a major subject so that this is a relatively new approach. The programme development team have also incorporated a more advanced ethics syllabus into the programme as an elective in the final year. Productive competence refers to the ability to 'learnto-learn' and the thinking skills central to knowledgebased roles. The preparatory course also, uniquely, incorporates 'Creativity and Learning Skills' to provide a basis for developing productive competences as set out in the programme's competency framework. This competence is closely related to the 'knowledge' competence (sic) (in Technical Competence in this framework). Much of the research on higher education learning has focussed upon delivery methods, especially criticising didactic forms of delivery. Consequently, this programme has emphasised practice-based learning and problem-centred learning.
Devereux (2004)'s research indicated that personal competence extremely importance in knowledgework. She particularly noted the importance of conflict management and time-management skills. In addressing the first competency set the mechatronics programme team believed that a focus upon interpersonal communications would be adequate. However, other programmes specifically deal with conflict management and this may prove to be a weakness of the current programme, especially given the position of mechatronics at the intersection of multiple disciplines. As with numerous other programmes the issue of team working is primarily addressed through the delivery modes designed into the programme. The course is also preceded by courses in business communications in order to instil in students, at the earliest possible date, the importance of communication skills. The final year BSc. Thesis proves candidates ability to describe a special but usually very narrow field of interest with deepen study. Through the integration of enterprise studies and related management knowledge in the program, it is envisaged that participating students will have the necessary skills and know-how to operate the work for their thesis into business start-ups, and then directly supporting the economic growth aspirations of their region.
4. SUMMARY The proposed program provides broad-based bachelor-level education in the basic principles of electrical, mechanical and computer engineering as well as business and information systems. It fills a major gap in current mechatronics programmes by focussing, in a balanced way, upon both technical and non-technical aspects of mechatronics management. In particular, the focus upon enterprise, systems engineering and mechatronics, as well as the provision of a broad foundation in science, ensures that graduates will be sought after by a wide variety of prospective recruiters. Furthermore, graduates will have the necessary acumen to start-up their own companies which is a critical issue for the development of the emerging Kosovan economy. This program is consequently one of the first trials worldwide to educate "Mechatronic Managers" and is certainly the first to base such a programme in an emerging, post-communist economy. The essential ingredients set out above are unique for the proposed program of study in a number of ways. Firstly, they are dedicated to the special interests of participants in their real-life work context. Secondly, the foundation program provides a wide range of key competencies from computing and engineering to soft skills and management in a single engineering degree. And reflect the theoretical foundations set out earlier in this paper.
Usually Mechatronics programs are pieced together from a combination of lectures from existing engineering programs and they can be considered therefore as an incomplete mosaic. In this programme the authors had the opportunity (and challenge) of designing an entire mechatronics degree program from the start in a green-fields site in an emerging economy. The program is particularly dedicated to realities of small and medium enterprises in small (developing) countries without ignoring the requirements of large engineering employers. The difficulties involved in balancing all these goals in a single objective, and creating a single coherent programme should not be underestimated. The main goal of this program is to educate engineering managers in the field of mechatronics with specific emphasis upon new companies so that the graduate can start-up, expand and manage effectively a small or medium-sized companies.
6.
CONCLUSION
The bachelor's degree in mechatronics briefly outlined here takes advantage of the university of business and technology as a relatively green-fields site in which inter-disciplinary curricula of this sort are ideally suitable. IT also recognises the unique circumstances in Kosovo, including the aspiration of the Kosovan administration to move towards a knowledge-economy. The programme design has been completed and will be offered to students in September 2006. It is currently being promoted in the region.
inclusion of enterprise studies, creativity, problem centred learning etc. as well as the balancing between the various professional competencies developed in the programme, indicate that this proposition is also likely to be true. At the time of writing it is felt that this proposition is only partially validated. We shall only know if knowledge-based activities are genuinely demonstrated as a result of the programme when the first graduate sets up her mechatronics engineering business in Kosovo.
ACKNOWLEDGEMENTS The authors thank the European Commission Tempus Programme for funding this research.
REFERENCES Ashley, S. (1997). 'Principles of Mechatronics', Mechanical Engineering, May (feature article) http://www.memagazine.org/backissues/may97/ features/mechtron/mechtron.html Badiou, A. (2001). Ethics: An Essay in the Understanding of Evil, Verso: London. Carlile, O. (2000). Incompetent Teachers in Irish Voluntary Secondary Schools: Principles' Asessments, Attitudes and Reactions, Ph.D. Thesis, University of Hull. Cheong Cheng, Yin, Hung Ng, Kwok, Ching Mok, Magdalena Mo (2002). "Economic considerations in education policy making: a simplified framework", Intl. Jour. of Educational Mgt. 16, 1, pp.18-39
Proposition 1 asked if it is possible to develop an advanced technology programme for higher education in an emerging economy where recent instability has been high. The findings suggest that it is possible. Proposition 2 asked if is it possible to develop such a programme so that it has internationally recognised unique selling points. This has also been found to be true. The programme outlined here takes advantage of the unique situation of the University of Business and Technology as well as the unique opportunity to develop the first mechatronics management programme in the Balkan region. However, in order to ensure this uniqueness, a series of tradeoffs were necessary in the curriculum design. In order for these trade-offs to be well reasoned, the design team required a complex theoretical framework by which to inform curriculum design decisions. This proved to be a non-trivial exercise. Proposition 3 asked if this programme can underpin knowledge-based economic activities in a local economic context. This was shown to be probably true. It required a coherent framework by which to inform decisions, particularly in assessing what competencies are needed in knowledge-work. The
Computing Curricula (2001). The Joint Task Force on Computing Curricula, IEEE Comp. Soc/ACM Devereux, N. (2004). Information Technology Professional Competence: An Empirical Study of Irish Higher Education, M.Sc. Thesis, WIT, Ireland. Down, C, Martin, E., Hager, P. and Bricknell, L. (1999). 'Graduate Attributes, key competence and judgements, exploring the links', Proc. Of HERDSA Annual International conference, Melbourne Fischer, G. (2004): Industry and Participant Requirements for Engineering Management. PhD Thesis; VUT, Vienna Stapleton, L. & Hersh, M. (2004). 'Technology Development and Ethical Decision Making: Identity Factors and Social Construction', Proceedings of International Multitrack Conference of Advances in Control Systems, Tech. Univ. of Vienna, Elsevier. Iivari, J. & Linger, H. (1997). 'What is knowledge work?", Burnstein, F, Linger, H. & Smith, H. (eds. ), Proc. Of the International conference of Information Systems Development, Melbourne pp. 131-144.
Iivari, J. and Linger, H. (1999). Knowledge Work as Collaborative Work: A Situated Activity Theory View, Proceedings of the 32nd Hawaii Inter-national Conference on System Sciences. Jones, O. & Tilley, F. (2003). Competitive Advantage in SMEs: Organising for Innovation and Change, J. Wiley: NY. Iivari (2002). Towards A Distinctive Body of Knowledge for Information Systems Experts: A Knowledge Work Perspective, IEEE. IS (2002). Model Curriculum Guidelines for Undergraduate Degree Programmes in Information Systems, AIS. Masi, C.G. (1995). 'Re-engineering Engineering Education', IEEE Spectrum, 32(9), pp. 44-48. Shaw, W. (1996). Business Ethics, Wiley: NY. Schmidt, M. (2000). Implementing the IEEE Software Engineering Standards, SAMS Publishing. SWEBOK (2000). "SWEBOK: Guide for the software engineering body of knowledge", IEEE Computer Society: MA. SWECOE (2000). "SWECOE: Code of ethics and professional practice", IEEE Computer Society: MA. Valenti, M. (1996). Teaching tommorrow's engineers', Mechanical Engineering, 118/7 (July), pp. 64-70. Vest, D., Long, M., Anderson, T. (1996). 'Electrical engineers' perceptions of communication training and their recommendations for curricular change: Results of a national survey', IEEE Trans, on Professional Communication, 39(1) pp. 38-43.
7
This page intentionally left blank
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
TERRORISM, HUMAN RIGHTS AND ETHICS: A MODELLING APPROACH
M.A. Hersh
Electronics and Electrical Engineering, University of Glasgow, Glasgow G12 8LT, Scotland. Tel: +44 141 330 4906. Fax: +44 141 330 6004. Email:
[email protected]
Abstract: This paper applies ethical analysis techniques, including multi-loop adaptive learning and virtue ethics, to the analysis of both state and private terrorism. It also discusses the use of the fear of terrorism as a control mechanism by the state, the ways in which this fear can be encouraged, including by the media, and used to scapegoat minority groups to divert attention from government policies. A number of feedback models are presented to illustrate the relationships between terrorist acts, fear of terrorism, vested interests and scapegoating.
Keywords: Feedback, ethics, terrorism, human rights, modelling.
1. INTRODUCTION: WHAT IS 'TERRORISM'? This paper aims to apply ethical analysis and modelling techniques to improve understanding of the circumstances which encourage or promote terrorism and the ethical issues associated with terrorism and counter-terrorism. It is organised as follows: Section 1.1 and Section 2 provide the framework for the ethical analysis in Sections 3-5 through discussion of the various definitions of terrorism and the context for terrorism, as well as the meaning of individual and collective responsibility. Section 3 presents a number of different approaches to the ethical analysis of terrorism and Section 4 considers some of the ethical issues arising in counter-terrorism. Section 5 continues this discussion with consideration of the extent of the terrorist threat and the nature of the response to terrorism and conclusions are presented in Section 6. 1.1 Definitions of Terrorism The theoretical analysis requires a definition of terrorism, but 'terrorism' is a political concept and
consequently its definition is not uncontroversial. Etymologically terrorism is derived from the Latin verb terrere, to frighten and the term was probably first used in its French form terrorisme to describe the use of the arrest or execution of opponents by the Jacobin club in post-revolutionary France to terrorise the general public into compliance (Anon, undated). Common elements of a number of definitions include (Anon, undated; Corlett, 2003; Meggle, 2005a) the use of violence, intimidation or the threat of violence against one person or group in order to achieve political, ideological, social or religious goals by putting pressure on or intimidating another group of people or another individual to carry out actions they would otherwise be opposed to. Therefore the people to be influenced are generally different from those who experience the violence, though they may be members of the same group. Thus, for instance, violence could be directed against civilians to put pressure on a government or against a particular government minister to put pressure on other government ministers. Some definitions include acts carried out by agents on behalf of other people and
acts which may aim to provoke extreme counter measures to win public support for the terrorists (Corlett, 2003). There is disagreement as to whether terrorism only includes violence (or the threat of it) directed against civilians and/or innocent people with 'innocent' defined with regard to the activity or issue of concern to the 'terrorists', whether the violence may be directed against property and whether or not terrorism includes acts of violence by governments in power or acts of violence in war. It has also been suggested that the aim of terrorism is to publicise and draw attention to issues in the sense of a violent demonstration, rather than to achieve change (Baier, 1991) and that terrorism may include other aims, such as punishment, calling attention to problems or expression of frustration, in addition to coercion (Held, 1991). However, it should be noted that, analogously to non-violent demonstrations, terrorist acts are more likely to achieve change as part of a concerted campaign, rather than as isolated acts.
from those carried out by other (terrorist) individuals and organisations. Terrorism is a type of political violence, which is not a recent phenomenon, but its importance may have increased (Corlett, 2003). The term violence has a number of definitions. For instance Coady (1986) presents three definitions, 'wide' and 'legitimate' definitions generally relating to left and right wing political philosophies and including social injustices and the 'illegal employment of methods of physical coercion for person or group ends' respectively. It should be noted, that these two approaches respectively question and support the status quo. Coady's 'restricted' definition relates mainly to the infliction of physical harm (Coady, 1986), but excludes verbal violence and mental cruelty. Coady also makes a useful distinction between harm to oneself or others caused directly by actions and harm resulting from omissions, which he labels positive and negative violence respectively. This will be touched on later in the discussion in Section 2.1 of collective responsibility resulting from omissions. In the subsequent discussion the expression 'terrorist' will be used as short-hand for people who have committed terrorist acts.
War crimes, government repression or disappearance of civilians and genocide are generally excluded from definitions of terrorism Even when governments are excluded as terrorists, state-sponsored terrorism in which governments support terrorism in another state is recognised. 'Organised crime' is generally excluded from definitions of terrorism, even when it involves violence and intimidation. However there may be arguments for labelling acts of intimidation aimed at extorting 'protection' money and giving a 'crime lord' control of a particular area as terrorist.
2. CONTEXT FOR TERRORISM However it may appear to outsiders, the behaviour of 'terrorists' is generally self-consistent and rational. It is therefore useful to consider the factors which increase the likelihood of the commission of terrorist acts. The following list of factors has been compiled from a combination of analysis of the literature and my own analysis. It is not necessarily exhaustive and not all the factors are necessarily required as a precondition for terrorist acts, but the likelihood of the commission of terrorist acts will generally increase with the presence of an increasing number of these factors. Although it is not being claimed that there is a total symmetry between terrorism and the use of violence in anti-terrorism, many of the following factors also characterize this case. • An issue, problem or cause, which may be political, ideological, religious or other. • Lack of success of other methods or a very slow or insufficient response. • A focus on ends rather than means or the belief that ends justify means. • A culture which accepts or glorifies violence • Marginalisation, discrimination and social exclusion, including from decision making structures and access to decision makers. • The taking away of rights, dehumanization or even demonisation of certain groups, which then justifies any type of abuse or alternatively the instrumentalisation of certain groups, to make their needs and rights subordinate to those of other social groups. This view frequently
It has been suggested that state terrorism is morally worse than terrorism by non-state actors. In particular, the scale of death, injury and general destruction in state terrorism is many times greater in state than non-state terrorism. State terrorism is frequently accompanied by deception of the public, a hypocritical condemnation of terrorism and the commission of acts prohibited by human rights declarations to which most governments, but not non-state bodies, are signatories (Primoratz, 2005). The term state terror is sometimes used to describe the actions of official organisations such as the Gestapo, the KGB and the Stasi against dissidents or ethnic minorities. One of the main differences between terrorism by states and other actors is that states generally use terrorism to oppose changes to the status quo, whereas non-state actors use terrorism to try to change the status quo (Narveson, 1991). Government definitions of terrorism tend to be slanted to include their enemies, but not their irregular allies or friends (Lutz et al, 2004; Kapitan, 2005). In addition it has been suggested that use of the term terrorist is solely about propaganda and prevents examination of the causes and consequences of the political situation which has given rise to terrorist acts (Messelken, 2005). Thus definitions of terrorism have a political and ideological nature, with care being taken to differentiate acts by governments
10
•
•
•
based in inequality and oppression, including poverty, colonialism, ethnic separation and persecution, and theories that terrorism is an unprincipled decision to wage a campaign of violence outside the accepted rules of warfare. It has also been suggested that terrorist activities are carried out by people without power and driven largely by material and financial assistance and propaganda support by government sponsors. Some, but by no means all terrorist organisations receive support from external states and some terrorist organisations would find it difficult to survive without this support. A number of governments of varying political complexions have provided support to 'terrorist' organisations. However, this does not justify the labelling of certain states as 'terrorist' and even less does the use of this label provide a justification for war against these states.
characterises society's attitude to terrorists and at least some terrorists' attitude to their victims. Creation of a narrative i.e. myth making or propaganda about the justification or even the glorious nature of terrorism (or counterterrorism) and the insignificance of any suffering in the greater cause. External or internal vested interests which actively oppose peaceful change which would reduce their own power and influence. In some cases external vested interests may contribute resources and funding to terrorist organisations. Desperation due to the importance of the issue and the repeated experience of the failure to achieve significant change by peaceful means.
The presence of several of these factors will lead to a predisposing context for terrorism. However, terrorist acts do not occur continuously even when there is a strong predisposing context. Therefore it is suggested that a trigger event is required for terrorist act(s) to actually occur. The reaction to these terrorist acts will depend on the political regime and vested interests. This reaction will feed back and could act as a trigger event or moderate the effect of other trigger events. This is illustrated in figure 1. predisposing context
.', .u-.rv..' ,l, ,v .,l
2.1 Individual and Collective Responsibility Definitions of terrorism generally define innocence in terms of a lack of involvement with the issue of concern. However, there are also issues of individual and collective responsibility. In some cases terrorists may hold groups within a state or even all citizens collectively responsible for injustices, though punishment is generally not the motivation for terrorism. However, defence against an oppressive state may require attacks on some of its members, even if they have no responsibility for the state's oppression (Gilbert, 1994). A distinction can also be made between distributive and non-distributive collective responsibility, with distributive responsibility also leading to individual responsibility for the consequences of decisions and nondistributive responsibility not resulting in individual responsibility. For instance, members of a government or a town council share distributive responsibility for the consequences of the decisions it makes, whereas citizens of the country or town have non-distributive responsibility. It is also sometimes claimed that citizens are responsible as a result of omissions rather than participation, for instance by failing to oppose injustices or try to rectify them. There are also issues as to whether or not ordinary citizens benefit from particular injustices (Gilbert, 1994). The issue of individual responsibility through not acting to oppose injustice or at least speaking out against it is particularly interesting. I would suggest that we all share collective responsibility for what happens both locally and in the rest of the world and that this gives us an individual responsibility to oppose injustice and to try to achieve change. How we should implement this responsibility in practice depends on a number of factors, including our own circumstances and the degree of risk. If we do not at least speak out about injustices carried out by our governments in our name and from which we may derive benefit, then it does not seem unreasonable to hold us responsible for these injustices. This leads to
political regime and vested interests
Figure 1 Terrorism and its responses A number of theories of the causes of terrorism have been developed and include the following (Anon, undated): • Sociological explanations, focusing on the societal position of the perpetrators. • Conflict theory explanations based on an examination of the relationship between the perpetrators and those in power. • Ideological explanations based on differences and different goals or ideologies. • Media theory explanations, with terrorism understood as a form of communication. Discussion of the causes of terrorism (Kegley, 1990) often focuses on whether international terrorism results from causes internal or external to the state. Internal factors include personal, societal, cultural and governmental variables, whereas external ones include the foreign policies of other states, trends in the global diffusion of military capabilities, the expansion of telecommunications and the unequal distribution of wealth and influence. In practice both internal and external factors may contribute, but it can be useful to investigate the comparative importance of the different types of factors. There are also further distinctions (Kegley, 1990) between theories that the underlying causes of terrorism are
11
the questions of whether collective responsibility is the same as collective guilt and whether it is morally justifiable to punish people who can be recognised to have collective responsibility due to not having done anything to prevent injustices.
However, it can never be guaranteed that political violence will be successful in achieving its aims. Several different authors have suggested conditions under which the use of political violence or terrorism might be justified. These include (Corlett, 2003) the use of terrorism by a morally innocent individual (however moral innocence is defined) to defend themselves or other morally innocent people against a significant injustice using terrorist activities which are directed proportionately and only against those guilty of committing acts of significant injustice. Further conditions include replicability i.e. moral justification of the use of terrorism by others in similar circumstances, planning for the use of terrorism to achieve the cessation of the injustice and, previous attempts to use non-violent means, if this is feasible. Further suggestions include the justification of the use of political violence (Narveson, 1991) to prevent immediate injury or longer range threats to oneself or others and to prevent or rectify the loss of legitimate liberty by oneself or others, as well as the proposition that the use of political violence is probably not justified to obtain conditions of a minimally acceptable life even when there are no other means available to do this or promote a better life for oneself, a particular group or people in general. I would disagree with the contention expressed by Narveson and others that there is not a fundamental right to an (approximately equal share of the world's natural resources and socially produced goods. The difference is a difference primarily of political philosophy or ideology and only to a lesser extent of ethics. However, this difference in philosophy will affect any analysis of the ethical justification of using terrorism to access basic needs or a fair share of the world's resources, assuming no other means are available to do this.
3. ETHICAL ANALYSIS In this section a number of different approaches are applied to investigate the contexts in which terrorism might be justified, as well as the circumstances which lead to it. Where appropriate, issues relevant to counter-terrorism will be considered in this section, with a more extensive discussion in Section 4. Ethical questions of interest include the following: 1. In what circumstances terrorist acts can be considered ethically justified or at least permissible. It should be noted that, analogously to other moral issues, there may be degrees of moral justification or lack of it (Corlett, 2003). 2. Whether it is justified to suspend human rights in the fight against terrorism and, if so, in which circumstances and which rights. 3. How real the threat of terrorism is. 4. Why more attention is given to terrorism than road deaths, aids, famine and violations of human rights, all of which result in much higher numbers of deaths and injuries Questions 1 and 2 will be discussed in this section and Section 4 respectively and questions 3 and 4 will be considered in Section 5. It has been suggested that 'Terrorist attacks by the groups victimized by the Nazis, for example, would hardly have deserved any negative evaluations.' (Lutz et al., 2004). This indicates the type of extreme situation in which terrorist acts may be ethically justified, but also raises questions. For instance, would it have been justified for these groups to carry out attacks on the children of prominent Nazis, assuming this would have been feasible in practice?
3.1 Consequentialist Approaches The ethical analysis of terrorism has most frequently been in terms of utilarian and, in particular, consequentialist ethics, involving an overall assessment of the likely benefits and harms. Whether or not there are circumstances in which terrorism can be justified is clearly controversial and there are opinions on both sides. Consequentialist arguments have been made both for and against terrorism (Hare, 1984; Corlett, 2003), based on whether on not terrorism results in an increase or decrease of good in society. It has been argued that terrorism is always morally unjustified, as it uses terror, is coercive, infringes rights and harms the innocent (Wellman, 1979). This has been countered by the suggestion that harming or threatening to harm others and producing feelings of terror are insufficient to make it morally unjustified, as punishing wrongdoers includes a degree of harm and, for instance, civil disobedience and non violent direct action against racial segregation in the southern USA
However, the issue is much wider than terrorism on its own and relates to whether it is ever justified to use violence and, if so, in what circumstances. Moral positions should preferably be coherent and consistent. Therefore, the labelling of particular acts as 'terrorist' rather than, for instance, 'warfare' should not affect ethical judgements about them. Discussions about the circumstances in which the use of violence might be justified are part of the wider argument about the relationship between ends and means or consequentialist and deontological ethics. It has been suggested that the use of political violence cannot be justified unless all channels of non-violent protest have been exhausted (Audi, 1971). This argument is problematic, since it is not always clear what channels of non-violent protest are available and the need for change may be urgent due to the existing state of violence and oppression.
12
made many segregationists very afraid, but was morally justified due to the evil inherent in segregation (Corlett, 2003).
other national governments and consequent classification as criminals rather than enemy forces is often based on self-interest. This raises the issue of whether and in what circumstances national governments should recognize more credible representatives of the people than an unpopular and abusive government (Burchael, 1990).
According to consequentialist ethics, terrorist acts are justifiable if they lead to better consequences than the alternatives. The historical evidence is difficult to interpret with opinions both that terrorist violence generally results in violent repression and acts counter to political progress (Laquer, 1987) and that it has often contributed to progressive developments (Coser, 1966). It is generally difficult or impossible to predict the impact of a terrorist act or series of act and whether they will contribute to or impede the achievement of goals. However it is common to undertake acts with uncertain outcomes (Held, 1991). The difference relates to the use of violence which requires a greater certainty of positive outcomes for its justification. However, the existing situation may also be characterized by extreme violence, which will definitely continue unless action is taken to end it. (Held, 1991). A particular issue is raised by the oppression of minority groups by majority groups (Corlett, 2003). Here, in consequentialist terms, the overall balance of benefits and harms will depend on the relative weights given to the evil of oppression and the resulting disadvantage, discrimination and persecution, any advantages accruing to the majority group as a result of this oppression and the psychological and spiritual damage that oppression causes to oppressors. As in the case of definitions of terrorism, an inconsistency in the utilarian evaluation of terrorist acts which injure non-combatants has been noted, with those carried out by one's own or friendly states generally considered acceptable and those carried out by unfriendly states unacceptable (Coady, 1985).
There are two main principles (Coady, 2005) for the conduct of a just war: 1. The principle of discrimination, which restricts the types of weapons and methods that can be used and the targets that can be considered legitimate. Uninvolved outsiders and large scale 'collateral damage' are specifically excluded. 2. The principle of proportionality, which limits the degree of response in terms of the costs of the resulting damage and the benefits of the achievement of the war aims. The principle of double effect can be applied to permit harm to non-combatants in some circumstances in a 'just' war. However, it is not universally accepted and is open to abuse, particularly through ignoring the principle of proportionality (Coady, 2005). This is particularly important, since it has been estimated that the ratio of soldier to civilian casualties has changed from nine to one to one to nine over the twentieth century (Stremlau, 1998) due to a combination of the direct targeting of civilians and 'collateral damage'. The term collateral damage is itself problematical and indicates the treatment of the potential victims as purely a means to an end, contrary to the Kantian requirement that individuals should be treated as an end in themselves (Hill, 1991). Just war theory depends at least in part on the drawing of boundaries, including those between people who can legitimately be killed and those who cannot, circumstances in which this killing is and is not legitimate, and between intended as opposed to merely foreseen killing. This raises the issue of who makes someone a member of a military force rather than a murderer and who gives out licenses to kill. It has been suggested that the 'authorities of a nation state' is an insufficient answer. Analogously to the claims by most armies that their war is a just war, 'terrorists' can equally claim that their violence is justified. The categories of'innocent', 'soldier' and 'declared war' are based on a mutually accepted authority structure from which the organizations and individuals who commit terrorist acts are excluded (Baier, 1991).
3.2 Just War Theory Just war theory (Bauhn, 2005; Thompson, 2005) has two categories, which consider the justification for going to war and the ways in which the war is waged respectively. However, it should be noted that, although just war theory aims to restrict the occurrences of war and eliminate the worst atrocities and provides reasons for forbidding violence, war, terror and counter-terror (Meggle, 2005b), the process of regulating war and giving it rules also legitimates war and makes it acceptable. The problematical features of applying just war theory to terrorism include the requirement for a correct decision authority and an open declaration of war (Thompson, 2005). One of the factors which presents a context likely to lead to terrorism is exclusion from access to decision making and policy formulation and lack of recognition. Therefore terrorist acts will generally not be commanded by a 'correct decision authority'. Terrorist acts are often carried out by groups without national selfdetermination. However, their non-recognition by
The distinction between combatants and noncombatants has been questioned (Held, 1991). In particular, there are about 300,000 child soldiers worldwide and children under 15 participated in armed conflicts in 27 countries in 1997-8. About 20 countries, including the USA and UK, recruit children under 18. The majority of child soldiers are
13
adolescents, though some countries recruit or force children as young as seven into military duty (Salt of Earth, 2000). Many of these children, including in the richer countries, are from poor families with few options. Others are forcibly rounded up. This then raises the issue of the moral distinction between combatants and non-combatants, particularly when the combatants include children and young people who have been forcibly conscripted or joined up due to poverty and the non-combatants are relatively well-off shoppers whose prosperity may be at the expense of these young people. However, this does not necessarily mean that the distinction between combatants and non-combatants should be eliminated (Held, 1991).
be made in a realistic and compassionate way. There may also be a need for this ethics to consider likelihood factors, since the deaths and injuries as a result of actions carried out to save others will be definite, whereas, there is a hypothetical element associated with deaths and injuries that have not yet occurred, though it can generally be assumed that repressive regimes with a high incidence of torture, disappearances and extralegal executions will continue with this behaviour. It should be noted that there may be analogies between hostage takers who risk harming innocent people to bring about political goals in order to reduce the number of lives lost overall and those who are willing to risk killing innocent hostages to avoid negotiating with 'terrorists' for the same reason (Held, 1991).
3.3 Rights Ethics and Intervening Actions 3.4 Virtue Ethics and the Ethics of Care Rights ethics is based on consideration of fundamental moral rights, with actions which violate these rights considered to be wrong. In the context of the analysis of terrorism this leads to an evaluation of the relative importance of different rights and decisions about which rights and whose rights it is least justifiable to violate (Held, 1991). This should include consideration of the rights violations involved in maintaining the existing system, as well as whether it is morally justifiable to violate some rights in order to ensure that other rights are respected. While non-violent methods of ensuring respect for human rights should be the most favoured option, it is preferable to equalize the distribution of rights violations in a transition to end rights violations. In general, violation of important rights should be avoided to bring about respect for less serious rights (Held, 1991). Although there are issues of the comparative importance of different rights, this would imply that terrorism in support of the right to personal security or sufficient access to resources to meet basic needs is likely to be justified.
Virtue ethic supports actions which build good character and involves a feedback relationship between conduct and the development of 'virtuous' character (Oakley, 1998). It is based on the premise that a person with moral virtues is more likely to behave ethically than someone who purely follows rules. Virtue ethics assumes that the main ethical question concerns desirable character and recognises that conduct has an effect on the person. This gives a feedback system, as illustrated in figure 2, in which ethical conduct has an effect on character and the development of virtues and these virtues lead to further ethical behaviour. Virtue ethics is also consistent with spiritually motivated approaches to ethics, since it could be considered to encourage personal and spiritual development through ethical behaviour. However even 'virtuous' people sometimes make mistakes or do things they regret. Virtue ethics is also consistent with an understanding that the means used may shape the ends obtained. Behaviour determined by virtue ethics
Both terrorism and counter-terrorism raise issues of whether it is morally justified to kill, injure or torture one person in order to save a large number of other people. With regards to situations leading to terrorism, the existing situation may be categorized by frequent serious violations of human rights, including massacres, disappearances and torture, and the repeated failure of attempts to achieve change by peaceful means. In the case of anti-terrorism, it may be believed that drastic action is required to avert a potential and serious terrorist threat. However, according to the principle of intervening action a person is not morally required to execute one person in order to save others, as it is the intervening action of another person which leads to these deaths (Bauhn, 2005). A lack of moral requirement is, of course, not the same as an ethical prohibition and an ethical examination of the issues is required. This will require the development of an ethics of extreme circumstances, which confronts the hard choices to
Behaviour Character
Figure 2, Ethical Behaviour and Virtuous Character The application of virtue ethics in the context of terrorism is interesting, as 'terrorists' are often labelled as bad and indeed inhuman people. However, is this always the case? It can probably be accepted that the use of violence for whatever reasons has a psychologically and psychically damaging effect, regardless of the reasons it is used. However, the surrounding circumstances and the motivation for the use of violence are likely to have be important in determining the effects on character.
14
organisational values
societal values organisation
individual values individual
actions decisions
evaluation
A
win - win learning
win - lose learning double loop dialogue learning triple loop dialogue learning quadruple loop dialogue learning
Figure 3 Single, Double, Triple and Quadruple Loop Learning previous section, the context in which terrorism takes place is marked by the following: • An acceptance or even glorification of violence. • Marginalization, discrimination and social exclusion, including from decision making. • The dehumanization or instrumentalisation of particular social groups. • Mythmaking and propaganda. • The belief that ends justify means. • Vested interests.
The ethics of care is a context based approach to preserving relationships. Terrorism clearly has a significant impact on a number of relationships. It is often carried out by people who are powerless to challenge power relationships. This occurs both at the macro level of wider political and economic relationships and at the micro level of, for instance, a particular group of oppressers and oppressed, who are transformed into victims and terrorists. It also has an impact on many other relationships, including within families and communities.
These factors contribute to the ethos of the wider society in which terrorist and counter-terrorist acts take place. Since even groups which are trying to achieve significant change are part of the wider society, both potentially terrorist and counter-terrorist organizations are influenced by this ethos. This then leads to a focus on the desired results rather than the means of achieving them, an instrumentalisation or dehumanization of potential victims and a lowering of the barriers against violence. This results in an organization or a local social context with the potential to commit terrorist acts or acts which violate human rights in the service of counterterrorism. Individuals are influenced by both the wider society and their immediate social context. Due to social sanctions and the need experienced by most people to belong and to be accepted it is often very difficult to espouse values or behave in a way that is counter to the ethos of the organization or local social context.
3.5 Multi-Loop Action Learning Multi-loop action learning can be used to investigate the barriers to ethical action and persuading individuals and organisations of the value of such action. It involves the addition of quadruple loop action learning to existing methods (Nielson, 1996) and is illustrated in figure 3. Single loop action learning is about changing behaviour, rather than learning about ethics and changing values, whereas double loop action learning involves changes in values (generally of individuals) as well as behaviour (Nielson, 1996). Triple and quadruple loop action learning involve changes in the underlying traditions or ethos of the organisation and surrounding society respectively, as well as changes in values and behaviour. As the model illustrates, actions by individuals result from decisions motivated by their values and these values are situated in a context of organizational and societal values. Therefore changing these individual values will generally also require changes in the social context and institutional and wider societal values. As indicated in the
However, pressures of this type do not excuse individuals from moral responsibility for their acts or make it impossible for them to behave in a way that is counter to the ethos of the organization or local social context. It does however make it more difficult to do so and often the price for standing against the organization can be high, as discussed in
15
(Hersh, 2004) in the context of whistleblowing. The forward link from the wider social context to the individual has been discussed. However, as indicated in figure 3, there are also feedback links from the individual to the organization and the wider society. Therefore, through changes in their behaviour and values individuals can influence their organizations, the local context and the wider society. However, this type of action is most effective and the likelihood of victimization is reduced when individuals join together in organizations to affect change.
could lead to assassination on this basis. Torture violates the absolute prohibition of the 1984 Convention Against Torture. It may also violate national law, is unlikely to be effective as a means of obtaining reliable information and may be counterproductive in political terms, (Khatchadourian, 2005) by leading to anger, further terrorist attacks and preventing resolution of the underlying problem. Torture probably seems particularly morally abhorrent because it functions by degrading and humiliating people, violating their bodily integrity and sense of their own humanity and forcing them to betray their cause by providing information which could be used against it.
4. THE ETHICS OF COUNTER TERRORISM Counter-terrorism generally involves a number of activities of questionable ethics, including assassination, torture, data screening, high tech surveillance and the imposition of legislation which restricts civil liberties and human rights. According to both rights ethics and international law people have a number of basic rights, some of which are inalienable and unconditional, whereas others are considered to be conditional. There is some dispute as to whether the right to life is totally inviolable and inalienable or whether it can be lost in some circumstances (Khatchadourian, 2005). A position of total inalienability of the right to life would prohibit physical violence that could lead to death, except possibly in the case of self-defence where the rights to life of the attacker(s) and victim(s) are in conflict. The suggestion that the right to life can be overridden by the claims of criminal justice after due legal process (Khatchadourian, 2005) is problematical for a number of reasons. In particular, a person who has been detained is no longer a threat to other people's rights to life. It is also very rarely possible to force members of state governments that have been responsible for extrajudicial executions, disappearances and other violations of human rights to participate in a due legal process. However, in a number of cases there may be a conflict between the rights to life of these government ministers and other individuals, as in the self-defence case. For instance, in Nazi Germany the policies of the regime posed a severe and absolute threat to the rights to life of members of the Jewish and other minority communities. It should also be noted that, despite the ethical dubiety of the pre-emptive assassination of potential terrorist murderers, it is a lesser evil than either the invasion of countries suspected of harbouring terrorist organisations or the use of the rumoured presence of terrorist organisations as a pretext for invasion.
It is largely utilarian approaches which have been used to justify torture by balancing one person's life and personal integrity against that of large numbers of other people or by permitting lesser evils in emergencies to protect the greater good (Bellamy, 2006). This justification generally refers to the socalled 'ticking bomb' terrorist where the apprehended suspected terrorist is believed to have information about a bomb or other terrorist activity which could lead to the deaths of large numbers of people. However, in the one recorded 'ticking bomb' case permission for torture was not given and the bomb did not explode. In another incident a suspected terrorist was tortured and provided information about a plot to blow up 11 aircraft, but this took 67 days and it was probably the fortuitous discovery of documents that foiled the plot (Bellamy, 2006). Ethical issues aside, the use of torture in this case was clearly too slow for the resulting information to be useful and it could probably have been obtained more rapidly in more ethical ways. The principle of the intervening action is also relevant here, as well as the fact that the discussion is about ethically abhorrent measures to prevent a hypothetical threat about which it is only assumed that the suspected terrorist has knowledge. There is also the question of whether it is appropriate to use utilarianism to consider the ethics of torture and pre-emptive assassination or whether there are important values which this type of ethical approach ignores. It has been suggested that terrorism is a threat to civilization. However, it is rather the destruction of ethical and social values, such as the acceptance of torture, the restriction of civil liberties and human rights and the dehumanization of minority groups, often in reaction to the (fear of) terrorist acts which present such a threat. Profile screening was developed in the early 1970s in West Germany. It involves searching data for interesting relational features, such as passengers who paid with the same credit card, but travelled separately, and searching on indexing features, to locate individuals whose data is in some way similar to that of known potential terrorists. It often involves the use of special software, such as Non-ObviousRelationship Awareness (NORA) (Groetker, 2005).
In the case of the pre-emptive assassination of suspected potential terrorists, there is generally purely a suspicion rather than conclusive evidence that the suspects will kill or injure other people. There is also frequently a political agenda which leads to the labelling of members of particular ethnic or religious groups as potential terrorists and which
16
As well as testing for patterns, NORA has access to data from the FBI and the US department responsible for ordering and controlling sanctions against 'rogue' states. In addition to violation of the rights of privacy and the presumption of innocence, data screening involves searching for people with characteristics which could make them commit terrorist or other criminal acts. It violates the principle of autonomy, since it is carried out without the knowledge of the people being searched, who are therefore not able to object to the violation of privacy. There are also issues of discrimination, with people more likely to be considered suspects due to membership of particular minority groups or as a result of very circumstantial evidence. For instance an Egyptian was detained for more than two months on the grounds he had attended a Florida flight school and worked as a mechanic for an airline in Saint Louis (Groetker, 2005). Modern surveillance is increasingly using high technology, such as global positioning systems and biometric identification (Bewley-Taylor, 2005). Both the use of surveillance technology and data screening give rise to issues about the responsible use of technology as well as invasion of privacy and civil rights.
attacks have resulted in much greater fear and grief than the 150,000 deaths in road accidents that have occurred in the USA since then (Mueller, undated). The existence of global climate change due to anthropogenic emissions of greenhouse gases and the resulting threats to food security, biodiversity and low lying areas are generally accepted by scientific opinion (Houghton et al., 2001). However a US war against climate change analogous to the war on terror has not been instigated and the USA has not even signed the Kyoto Convention on Climate Change. Thus the magnitude and nature of the response to 'terrorism' has been based on perceptions of the extent and nature of the threat rather than the reality. This, of course, does not deny that terrorist acts do occur and that it is reasonable to take some preventative measures. However, there is a need for proportionality. In addition as well as raising human rights and civil liberty concerns, current anti-terrorist measures are several orders of magnitude greater than the protective measures instigated against other much greater threats. Terrorism involves the 'peculiar evil' of terror, but so does state inflicted violence and to an even greater extent and so often does violent crime and death and destruction by soldiers in wartime. It has been suggested that the particular evil of terrorism has the following three components (Narveson, 1991): • A sense of risk and uncertainty. However, modern life is marked by a large number of uncertainties. Compared to other risks the risks of being injured or killed in a terrorist attack are relatively small. • Powerlessness, since terrorist attacks could come at any time or in any circumstances. However so can state violence, natural disasters or violent attacks by 'criminals'. Motor accidents can occur at any time, even if not in any circumstances. • Apparent absurdity, due to the lack of clarity of the aims of terrorist acts in some cases or the relationship between these acts and the intended goals in others. However, the degree of absurdity in being injured or killed as a result of terrorism does not seem significantly greater than that involved in being killed or injured as a result of violence, for instance being mugged in the street when you do not have any money or other valuables with you.
5. HUMAN RIGHTS AND THE FEAR OF TERRORISM 5.1 The Extent of the 'Threat' Terrorism has been presented as a great threat to civilization, leading to a war on terror and restrictive legislation in a number of countries, including the USA and the UK. It has also sometimes been presented as at the summit (or close to it) of moral evils. This poses the questions of whether terrorism is a real threat and how it compares with other moral evils. Although there are problems with the consequentialist approach of balancing numbers of lives lost, an examination of the statistics can at least provide information on the seriousness of different threats with regards to the numbers of resulting deaths and injuries. The total number of deaths world-wide from international terrorist incidents between 1998 and 2002 was about 5500, with well over half these deaths occurring in the September 11 attacks in the USA (Lutz et al., 2004). Although any death as a result of violence is to be deeply deplored, this figure is very low compared to other causes of (violent) death.
It should also be noted that the costs of terrorism may be largely due to the fear response and the resulting overreaction rather than the initial terrorist acts (Mueller, undated). For instance, Russian responses to terrorist acts allegedly committed by the Chechens led to considerably more loss of Russian (and Chechen) lives and property than the original acts. The bombing of a suspect pharmaceutical factory in Sudan by the then US president Clinton in response to the bombing of two American embassies in Africa may have led to the deaths of tens of thousands of Sudanese over time, in comparison to the 200 deaths in the original attacks. The economic costs of
The death and destruction inflicted by soldiers in wartime, private violent 'criminals' or motor accidents is many times greater than that due to 'terrorists'. State inflicted violence, such as the holocaust or that inflicted by Stalin or the Pol Pot regime in Kampuchea is several orders of magnitude greater (Narveson, 1991). Approximately 40,000 people die in road accidents in the USA each year. However the 3,000 deaths in the September 11
17
increased security and to the tourism industry are many times the direct economic costs of the September 11 attack. Even more significantly, the reaction to this attack has led to much greater loss of lives. For instance, the replacement of air by car journeys led to an estimated additional one thousand deaths in car accidents in the three months following September 11 and an estimated one hundred thousand Iraqis died in the first eighteen months of the resulting attack on Iraq (Mueller, undated).
to change things, many people accept the culpability of the scapegoat. In addition, the majority population can boost their self esteem and satisfaction with life by looking down on and despising the chosen scapegoat community. The creation of an external threat can be used to unite people behind the regime, however repressive and otherwise unpopular, and make them accept a range of repressive measures. Opposition to these measures is considered unpatriotic and to play into the hands of the enemy and the measures are presented as benign and necessary to respond to the threat presented by the enemy. Asylum seekers are currently the chosen scapegoat in many of the industrialized countries.
5.2 The Nature of the Response This response is partly, though not solely, determined by perceptions of risks. The factors that affect the perceived extent and acceptability of different risks include the following: • The probability, type and severity of the likely consequences. There is often greater concern about dramatic low probability events, such as terrorist attacks than events with a higher statistical risk. • Whether the risk has been assumed voluntarily and there are associated benefits. The risk of terrorist attacks has not been assumed voluntarily, most people have little control over the risk and any benefits do not accrue to the victims. • Whether the risk is to known or unknown individuals, with risks to known people generally weighted more highly. • Whether the consequences are immediate or delayed. In the case of terrorist attacks, the consequences are either immediate or there is uncertainty about when they will occur.
Terrorism has the advantage of being able to serve in both the roles of enemy and scapegoat. Since terrorism and terrorists are both seen as an allpervasive threat and other and outside society, the threat of terrorism can easily be used to justify a range of repressive control measures. Their acceptability is a consequence of a combination of the very real fear of terrorism by many people and the construction of terrorists as other, often in the sense of a dreaded and inhuman enemy. Therefore, these repressive control measures, can be presented as targeting 'them', the terrorists, rather than 'us', the law-abiding citizens, and opposition as being unpatriotic or even as supporting terrorism. Propaganda is used to deliberately encourage the fear of terrorism and suspicion of minorities, such as asylum seekers. There is the further benefit to governments of being able to control and restrict the civil liberties of a potentially rebellious population in the interests of fighting terrorism. Therefore governments can impose very restrictive legislation while maintaining their image of being liberal and freedom loving. This is illustrated in Figure 4, which shows how some of the factors listed in Section 2 give the context for terrorism and violent counterterrorism. It further illustrates how the threat of terrorist acts is magnified by propaganda and leads to repressive legislation and how this legislation leads to an increase in terrorist acts.
There is also frequently a degree of deliberate inflation of the risk of terrorism by propaganda. It is therefore useful to examine the reasons for this inflation of the risk, which I suggest lie in the underlying political and economic agenda and the vested interests of those with economic or political power in maintaining it. It is these interests that are particularly important in determining the response to terrorism. However, the interests of the majority of the population of most countries are not necessarily served best by maintaining these political and economic interests. In addition a significant proportion of the population in even the wealthiest countries experiences poverty and political and social exclusion.
This use of propaganda and mythmaking to present terrorists as simultaneously both the dreaded enemy against which society needs to protect itself and the scapegoat responsible for all its ills is part of the process of labelling and construction of the other. Both terrorists and their victims are generally constructed as 'other'. This enables terrorism both to be considered as an all-pervasive threat against which any measures are justified and as something out there which has not been engendered by the society we are part of (Dutta, 2004). 'We' are neither perpetrators nor victims. In both foreign and internal policy 'a notion of what "we" are ... intrinsic to an understanding of what "we" fear' (Campbell, 1998). This polarisation into 'us' and 'them' avoids the need to examine the real underlying issues. In addition
Therefore governments and other powers require diversionary tactics to direct attention away from these real and pressing problems. Two commonly used and successful tactics are scapegoating and the creation of an external enemy. A marginalized and vulnerable group is presented as being responsible for all society's ills and pressing social problems. Since it is generally easier to attack this type of marginalized group than to blame the government and industrial military complex and make real efforts
18
J *T J > >
acceptance of violence
social ethos
discrimination & marginatisatirm terrorist aits
context of violence
v
barriers
f
cs » i
problem cause or Issue
ri—ii'litfu)//
r
\ propoganda
economic & political agenda
vested interests
\
/
s
\
restrictive legislation w
belief that ends/ justij v means/ dehutttaitisation of other4
V
Figure 4, Terrorism and Counter-Terrorism any anti-terrorist activity which requires 'terrorists' to be dehumanised or civilian deaths to be reconstructed as collateral damage is automatically unjust (Termes, 2003).
frequently applied to the analysis of terrorism. However a number of other approaches have been used here, including rights ethics, virtue ethics, the ethics of care and multi-loop action learning. Virtue ethics has been used to examine the impact of terrorism on the character of the actors involved and the ethics of care to look at the impact on relationships, including changes in power relationships at both the macro and personal levels.
This then raises the issue of the alternatives, in particular how to move beyond the situation where governments need the threat of terrorism to control their own populations and the social and political context supports acts of terrorism. The simple or even simplistic answer would be a total change of perspective, leading to an examination of the causes of the real social and political problems, such as poverty, unequal access to resources and opportunities, discrimination, violation of human rights and famine in a world that produces more than enough food. However, this would require changes in the political system and reduce the power of existing elites and require a respect for diversity and difference and an avoidance of the temptation to have power over the 'other' (Dutta, 2004). Unfortunately, this is what many governments, multinational companies and other vested interests fear and therefore find it preferable to encourage scapegoating and create enemies in order to justify repressive legislation to try and control the population.
5.
The use of multi-loop action learning has demonstrated that the context that leads to both terrorism and unethical counter-terrorism is situated in the wider society and will require changes at that level. This modelling approach has also shown that individuals can influence this wider social and political context, though this is best attempted as part of an organisation. The use of scapegoating and fear by governments has been discussed and the suggestion made that terrorists can be used both as a scapegoat and to promote fear to support policies and actions by governments and vested interests, which are counter to those of the majority of the population. Feedback models have been presented of the relationships between the predisposing context, trigger events and the reaction to terrorism; and the political and social context, terrorism, counterterrorism and propaganda. The second model has illustrated the way that fear of terrorism has a feedback effect which is used to justify restrictive legislation and this restrictive legislation has a feedback effect which increases terrorist acts.
CONCLUSIONS
The paper has discussed some of the ethical issues associated with terrorism and counter-terrorism. It has presented some of the factors that increase the likelihood of terrorist acts. Consequentialist ethics and just war theory are the approaches most
The paper has raised a number of questions which still remain to be answered. This will require
19
additional analysis using modelling and a number of
different ethical analysis tools. think about terrorism, In: R.G. Frey and C.W. Morris (eds.), Violence, Terrorism and Justice, 59-85, Cambridge University Press. Houghton, J.T. et al. (eds.) (2001). Climate Change 2001: Scientific Basis, Cambridge University Press. Kapitan, T. (2005). 'Terrorism' as a method of terrorism. In: G. Meggle (ed.), Ethics of Terrorism and Counter-Terrorism, 21-38, Ontos Verlag. Kegley, C.W. jr. (ed.) (1990). International Terrorism, Characteristics, Causes, Controls, St Martins Press. Khatchadourian, H. (2005). Counter-terrorism: torture and assassination, In: G. Meggle (ed.), Ethics of Terrorism and Counter-Terrorism, Yll196, Ontos Verlag. Lacquer, W. (1987). The Age of Terrorism, Little, Brown. Lutz, J.M. and B.J. Lutz (2004). Global Terrorism, Routledge. Meggle, G. (2005a). Ethics of Terrorism and Counter-Terrorism, Ontos Verlag. Meggle, G. (2005b). Terror and counter-terror: initial ethical reflections, In: G. Meggle (ed.) Ethics of Terrorism and Counter-Terrorism, 161-176, Ontos Verlag. Messelken, D. (2005). Terrorism and guerrilla warfare - a comparative essay. In: G. Meggle (ed.), Ethics of Terrorism and Counter-Terrorism, 51-68, Ontos Verlag. Mureller, undated, Six rather unusual propositions about terrorism, http//www.metapress.com/media Narveson, J. (1991). Terrorism and morality, In: R.G. Frey and C.W. Morris (eds.), Violence, Terrorism and Justice, 116-169, Cambridge Univ. Press. Nielson, R.P. (1996). The Politics of Ethics, OUP. Oakley, J. (1998). A virtue ethics approach, In: Kuhse, H. and P. Singer (eds.), A Companion to Bioethics, 86-97, Blackwell Publishers. Primoratz, I. (2005). State terrorism and counterterrorism, In: G. Meggle (ed.) Ethics of Terrorism and Counter-Terrorism, 69-82, Ontos Verlag. Salt of Earth (2000). http://salt.claretianpubs.org/ stats/2000/04/sh0004.html. Stremlau, J. (1998). People in Peril: Human rights, Humanitarian Action and Preventing Deadly Conflict, 25, Carnegie Corp. of New York. Termes, P. (2003). The Just War: an American Reflection on the Morality of War in Our Time, 149, 179, Chicago IL, Ivan R Dee. Thompson, J. (2005). Terrorism, morality and right authority, In: G. Meggle (ed.), Ethics of Terrorism and Counter-Terrorism, 151-160, Ontos Verlag. Wellman, C. (1979) On terrorism itself, J. Value Inquiry, 13, 250-258.
REFERENCES Anon (undated). Terrorism, http://en.wikipedia.org/wiki/Terrorism. Audi, R. (1971), On the meaning and justification of violence, In: J. Schaeffer, (ed), Violence, McKay. Baier, A.C. (1991). Violent demonstrations, In: R.G. Frey and C.W. Morris (eds.), Violence, Terrorism and Justice, 33-58, Cambridge University Press. Bauhn, P. (2005). Political terrorism and the rules of just war, Ethics of Terrorism and CounterTerrorism, 123-134, Ontos Verlag. Bellamy, A.J. (2006). No pain, no gain? Torture and ethics in the war on terror, Int. Affairs, 82(1), 121-148. Bewley-Taylor, D.R. (2005). US concept wars, civil liberties and the technologies of fortification, Crime, Law and Social Change, 43, 81-111. Burchael, J.T. (1990). Framing a moral response to terrorism, International Terrorism, Characteristics, Causes, Controls, 213-218, St Martins Press Inc. Campbell, D. (1998). Writing Security: United States Foreign Policy and the Politics of Identity, 3,73, Manchester University Press. Coady, C.A.J. (1985). The Morality of Terrorism, Philosophy, 60, 52. Coady, C.A.J. (1986). The idea of violence, J. Applied Philosophy, 3,3-19. Coady, C.A.J. (2005). Terrorism, just war and right response, In: G. Meggle (ed.), Ethics of Terrorism and Counter-Terrorism, 135-150, Ontos Verlag. Corlett, J.A. (2003). Terrorism, A Philosophical Analysis, Kluwer Academic Publishers. Coser, L.A. (1966). Some social functions of violence, Ann. Am Academy Political and Soc Sci,
364,8-18. Dutta, N. (2004). The face of the other, terror and the return of binarism. Intervent., 6(3), 431-450. Gilbert, P. (1994). Terrorism, Security and Nationality, An Introductory Study in Applied Political Philosophy, Routledge. Groetker, R. (2005). Looking for Mohammed: data screening in search of terrorists, In: G. Meggle (ed.), Ethics of Terrorism and Counter-Terrorism, 301-318, Ontos Verlag. Hare, R.M. (1984), On terrorism. In: J.P. White (ed.), Assent/Dissent, Kendall/Hunt Publishing Company, 247. Held, V. (1991). Terrorism, rights and political goals, In: R.G. Frey and C.W. Morris (eds.), Violence, Terrorism and Justice, 59-85, Cambridge University Press. Hersh, M.A. (2004). Whistleblowers - heroes or traitors?: individual and collective responsibility for ethical behaviour, Annual Reviews in Control, 26, 243-262. Hill, T.E. (1991). Making exceptions without abandoning the principle: or how a Kantian might
Acknowledgements: To Peter McKenna for producing professional graphics from my diagrams.
20
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
ENERGY PROVIDING AND CONSUMPTION CAN CAUSE INSTABILITY
(World Energy Consumption and International Stability) Heinz-Hermann Erbe Peter Kopacek TUBerlin, Center for Human-Machine Systems Berlin, Germany Heinz. erbe@tu-berlin. de Intelligent Handling and Robotics- IHRT, Vienna University of Technology Vienna, Austria kopacek@ihrt. tuwien. ac. at
Abstract: Energy providing and consumption regarding finite resources can cause conflicts between customers and between costumers and suppliers. A simplified model describes gas or oil supply and consumption of several countries. The model is linear time invariant. Control strategies of the supply into different but dependent countries are considered. A strategy in one country can generate instabilities of the supply in another. Copyright © 2006 IF AC Keywords: International Stability, Conflict Resolution, Controlling energy supply, Modelling supply and consumption, LTI-system.
1. INTRODUCTION
theory like optimisation and stability to conflict situations. A conflict was seen as a stability problem of a system of e. g. single persons, groups of persons, countries and blocks of countries. For this purpose more useful models were necessary because simple models were too simple and computer models were to time consuming for applications in real time. Therefore models for multivariable, linear systems were used for the first steps to introduce control engineering methods in SWIIS. For results of these first steps see Chestnut (1990), Kile (1990), Scrimgeour (1990), Kopacek et. al. (1990). From the systems theoretical and engineering viewpoint SWIIS dealt until now mainly with time continuing systems well known from the field of process automation. Meanwhile in the field of production automation or in terms of systems engineering - time discrete, digital processes - new methods comes up in the last years, probably applicable to the tasks of SWIIS.
The initial idea for founding the IF AC Working Group on "Supplemental Ways for Improving International Stability - SWIIS" - or now IF AC Technical Comittee - comes up during the 8.IF AC World Congress in Kyoto, Japan, 1981 initiated by H.Chestnut. The main idea was to bring together scientists and practical oriented people from different disciplines for discussing different system theoretical as well as systems engineering approaches for conflict solution. Until this time this field was mainly dominated by scientists from non technical disciplines like political and social sciences. Only few colleagues with system-theoretical background tried to develop models for the static and dynamic behaviour of conflict parties or systems. There were two main approaches for model building: Either model based on simple linear differential equations very well known from the classical control theory or computer models based on more or less heuristic time discrete equations. Some of the members of the SWIIS group were the first world-wide trying to apply concepts of control
2. CONTROL (SYSTEMS) ENGINEERING AND CONFLICT SOLUTION
21
One of the approaches in SWIIS is modelling a conflict situation as a stability problem in one or between more dynamic systems. For this we have first to define some similarities between control engineering terms and terms of
conflict solution. Therefore in Tab.l an incomplete listing of such corresponding terms is given. Possible disturbance variables or possible conflict sources are listed in Table 2.
Control Engineering
Conflict solution
SISO System MIMO System Controller Command variable w Control deviation xd Controller gain Kp (Xp) Subsystems Disturbance variables z
Organisation (State) with one goal Organisation (State) with more goals Authority or government Goal of the authority (government) Execution organ - Goal from the Org. Power of an Organisation (State) Internal groups or Societies External: Influences from neighbour systems Internal: Influences from subsystems Damping, Stability Aggression, Instability Measure for the "System Intelligence' Critical state of the system
Negative feedback Positive feedback Efficiency Stability margin
Tab.l Corresponding terms in control engineering and conflict solution Geographical: Boarder problems, Invasions Religious: Prosecution, Discrimination, Conflicts, Fights Economic: Price limitations, Embargos Environment: Acid rain, Water pollution Raw materials: Resources, Prices, Monopoles Political: Ideologies, Human rights, Minorities Military: Aggression, Government with no power Various Tab.2 Possible disturbance variables
With these corresponding terms conflict situations can be described by various types of dynamic equations, well known from control engineering. Therefore energy saving is currently a hot topic all over the world. For minimising energy consumption we have the possibilities to improve energy efficiency and to improve process efficiency. Another approach is reducing energy costs. Usual approaches to reach the lowest price per energy unit are tarif management, fuel (energy) switching and a combination of heat and power. Automation can support energy saving by using high efficiency motors, variable speed drives, advanced process control methods, HV DC transmission systems, building management systems.
In the following the influence of the conflict factor "energy" on stability will be studied by a new approach. Therefore the classical methods from control engineering can be applied.
3. ENERGY PRODUCTION AND CONSUMPTION IN THE WORLD The energy prices are currently worldwide near a maximum. The most important driving factors are: Instability in Middle East OPEC Supply Management Shortages of Refining Capacities Strong Demand from China
These facts underline that energy is and will become one of the most important factors in international stability. In this paper the influence of item "Raw materials - resources" will be studied. The new approach consists in modelling the energy problem as the classical "Three tank problem" very well known from control engineering.
The future demand of energy is directly related to the increasing world population e.g. China, India, South East Asia. There is a clear link between development and energy consumption. The reserves of coal, oil and gas are limited.
22
4. MODELLING 4.1. Coupled tanks Figure 1 show a very simple model. Tanks represent the storage of gas or oil in a country. The tanks are connected with one pipeline to the supplier. The tanks have balanced levels with
Hi
H2
H3
Storage
Storage
storage
Cteout m *;
Qiout
Q in
1 0 0\ c= 0 1 0 v0 0 1 Figure 2 shows the calculated hi(t) for Hi0 = 25 [m] withMATLAB.
d
Q i out
3-Tank, H3=0,D=0 SWIIS-3
Fig. 1. Coupled tanks. consumptions Qout. Every country has a certain volume H of their tanks (storage) respecting the contract with the supplier. Assume a finite supply per time. Then an over-consumption in one country causes miner consumption in others. o b
Consider a disturbance of Qin with a step function. To maintain the balance of the levels H it turns out that the configuration of Figure 1 is unstable. Dimensions of the filled tanks: Volume Vi = Ai * Hi [m3] connection tubes crossections: ai [m ] The filling levels are
0.5
500
1000
1500
2000
2500
3000
3500
Time (sec)
Fig. 2. hi(t) [m] for A = 1000 [m 2 ], a1?2 = a2,3 = 1 [m 2 ], a3,0 = 0. 3-Tank, H3=0,D=0 SWIIS-3 0.03
The flow between the tanks is
Therefore we get three non-linear differential equations for dHi/dt. The linearized differential equations around the levels Hi (operation point) hold (for Ai = A and Q m = K u * u , a n d H 1 = H10
Fig. 3. Calculated poles.
dhi/dt = I/A ( K u u(t) - ci hl(t) - c2 h2(t)) dh2/dt = I/A (Cl hi(t) + (c2 - c3) h2(t) - c4 h3(t)) dh3/dt = I/A (c3 h2(t) + (c4 - c5) h3(t))
Figures 2 and 3 show the instability. To solve this situation one could try to control the level of one of the tanks.
-0.03 -0.035
-0.03
-0.025
-0.02
-0.015
-0.01
-0.005
0.005
0.01
0.015
Real Axis
in Matrixform:
h2{t) =
i
h = Ah + bu y = Ch
Figure 4 shows the result if tank 3 is proportional controlled (by negotiation with the supplier). The other tanks are of course affected. The result in Figure 4 was obtained with a gain Kp = 4. Kp > 4 causes instability in all tanks.
Ci are constants depending on Hio, ay, and g. A has the components:
\
0 -c, V
0
C
4
C
5J
23
D=
0 0
v
0\ 0 0 J
0 -l/2c2 0
3-tanque H3 closed, D=0 (SWIIS-1)
1 0 0\ c= 0 1 0 v 0 0 1J
-0.5 0
1000 2000
3000
4000 5000 Time (sec)
6000
7000
8000
With Qin= Qout, Volume V{ = A{ * Hi[m3], A, = 1000 [m2], al = a2 = 2 [m2], a3 = 1 [m2], and Hi0 = 30 [m]the calculation with MATLAB yields hi(t) in Fig. 8.
9000
Fig. 4. hi(t) if tank 3 is P-controlled with Kp = 4. 4.2. Uncoupled tanks Now consider the situation where the storage is physically uncoupled but supplied in a sequence (Fig. 7). It simplifies of course a practical situation.
three uncoupled tanks,Qin=Qout
C 1 O b 0 j
-1 0.5 0)
i
i
i
i
t ° E b
Q in
<
H
j
-0.5 0.4
Hi
L
Storage O 0-2 b
Qi out
_|
H2
0
storage
0.2
i__
0.4
__i
0.6
0.8
I
1
i__
1.2
__i
1.4
Time (sec)
1.6
|_
1.8
2 x10
Fig. 8. Deviation of hi(t) from the operation point. Q2out
To shorten the transition time of the disturbance we try a proportional control of tank 3. As mentioned above
H3 storage
Q 3 out
h3(t) = fi(A, b, Kp) h2(t) = f2(h3(t)) hj(t) = f3(h3(t))
Fig. 7. Uncoupled tanks. The system is described by the following linearized differential equations:
three uncoupled tanks,tank 3 p-controlled
dh^dt = I/A (Ku u(t) - ci hl(t)) - 0.5*d u dh2/dt = I/A (O.5*ci hi(t) - (c2 h2(t)) - 0.5*c2 u dh3/dt = I/A (0.5*c2 h2(t) - c3) h3(t)) Ci are again constants depending on Hio, ai? and g. In Matrix form:
h = Ah + bit y = Ch + Du
5000
10000
15000
Time (sec)
Fig. 9. hi(t) when tank 3 is p-controlled with Kp = 2, a3 = 1.
with the components: —c,
A=
A V
0
0 —c 2
0
l/2c
—c3 7
Figure 9 and 10 show the result. Proportional control does not shorten the transition time, but the system is close to get unstable.
1 bT=-(Ku,0,0)
24
three uncoupled tanks,tank 3 p-controlled
Setpoint w1
Setpoint w,
5000
10000
Fig. 13. Configuration with uncoupled controllers.
15000
Time (sec)
Fig. 10. hi(t) when tank 3 is p-controlled with Kp = 10, a3 = l.
The linearized differential equations around an operation point of the levels H of the tanks are given by
4.3 Interacting tank control
— Zvxux — (ax + d)\ + a2bh2
The tanks are now considered as internally coupled. A reservoir (supplier) fills the tanks. The task is to maintain certain levels in each tank. This configuration may be interpreted as two countries connected to one supplier. To optimize the supply respecting their consumption the countries have agreed to couple their tanks as shown in Figure 11.
h2 = Zv2u2 + a^hx -a2{b + g)h2 22
or in Matrix form
h = Ah + B u
A=
—(^ + J ) ^
^26 -a2 (b-r
\ J
Zvj
0
0
Zv2 7
V
Laplace transformation yields:
j(^) = C(sI-AylBu(s) = G0)^» With the controller matrix
Pump 2
Fig. 11. Configuration of the tanks (Gomez da Silva et al, 2004, modified).
o \
C(s) = V
The configuration can be described as a MIMOsystem as sketched in Figures 12 and 13.
0
CJs)
J
involved (Figure 13) one gets as the compact description of the MIMO system
y(s) = (/ + G(s)CO))-1 G(s)C(s)w(s) =
(Ms) to
W
Gn(.s)
<
i
J
For this 2x2-system it is easy to calculate the components of the transfer-Matrix G(s) in general. Because numerical calculations and simulations will be done later with MATLAB the form tf ([num],[den]) is used:
1
G21W
Goto r k
G22(5)
J Process
Fig. 12. Components of the Process-Transfer Matrix.
25
Gn=tf([Zvl a g) (al
The instability is caused by the coupling. This is well known for diagonal controlled MIMOsystems. To weaken this effect a decoupling of the control could be possible with decoupling gains Ki, K2:
g))])
G12=tf([Zv2a2b], {axa2g) + (da2(b + g))]) G2l=tf([Zvlal], G22 22 =
0 \r
\
g) (axa2g) + (da2(b + g))]) \U2J
ax
1
V
V
0
C2 (s)j \
K2C2(s) CJs) J
V
To calculate the components of the transfer-Matrix Gyw(s) of the closed loop system MATLAB provides the function "feedback":
2 tanks, MIMO, RD-control
s y s l l =f e e d b a c k ( G H # C l ) ; sysl2=feedback(G12,C2); sys21=feedback(G21,Cl); sys22=feedback(G22,C2) ; Cl(s) and C2(s) are the transfer functions of the controllers. The following calculations and simulations are done with respect to the cross-section of the tanks. For simplicity the cross-section of both tanks are equal. Figures 15 and 16 show results for values (see Figure 11): Zpl=l; Zp2=l; al=0.05; a2=0.05; d=0.1; b=0.1; g=0.1; PID-control Cl, C2.
10
20
15
25
Time (sec)
Fig. 16. Influences of the coupling: — ul to hi, ,,,,u2 to hi, ul to h2, ...u2 to h2; b=0 Design of decentralized MIMO-systems control for supplier-costumer networks are known and described in the control engineering textbooks. The task is to avoid instabilities because these can cause severe damages in the network.
2 tanks, MIMO, PID-control
4.4. Full state feedback control of MIMO-systems The variation of the levels of the tanks described by
h = Ah + Bu y = Ch -200
Time (sec)
Fig. 14. PID control: — hi, ... h2 (Kp=Ki=Kd=l),d=0.1
A=
a2b
a
-a2 (b + g) J
v
2 tanks, MIMO, PID-control
\
r —{a + d) x
r
,B =
Zvl v 0
0 Zv2 7
with Zvi=l; Zv 2 =l; a^O.05; a2=0.05; b=0.1; d=0.1; g=0.1; and a step input are shown in Figure 17, and the poles of the characteristic equation in Figure 18.
10
15
20 Time (sec)
25
30
35
40
Fig. 15. PID control: — hi, ... h2 (Kp = Ki=Kd=l), d=0 26
This allows the calculation of the pre-filter matrix V. For steady state conditions (s=0) should y(s) = w(s). V has not been calculated here. The control matrix R can be calculated to influence the systems stability or other performances like settling times. MATLAB allows the numerical calculation with the function "place" for given poles. Figure 20 shows the result for poles pl= -0.15; p2 = -0.1.
2 tanks, MIMO From: ln(1)
From: ln(2)
2 tanks, MIMO, full state feedback control From:ln(1) From: In(2)
200
400
600
0 Time (sec)
400
200
O b
600
0
o TO
Fig. 17. Level variation of the tanks without control
10
"0)
0)
Consider now a full state feedback as sketched in Figure 19. The control law is
O b
4 2
u(t) = -Rh(t) + Vw(t),
0 20
40
60 0 Time (sec)
Fig. 20. Full state feedback, pl=-0.15, p2=-0.1
Root Locus 0.04
The calculated control matrix R decouples, therefore input Ui does not affect output y2, and u2 does not affect yi. This changes if output feedback is used (Fig. 21).
0.03 0.02
0.01
I
o
~
-0.01
I
-©-
V
1/
-0.02
-0.03
-0.04 -0.5
-0.45
-0.4
-0.35
-0.3
-0.25 -0.2 Real Axis
-0.15
-0.1
-0.05
£>•
0
Fig. 18.Poles of the MIMO system without control
Fig. 21. Sketch of output feedback
with a constant control matrix R of constant elements and a pre-filter matrix V also of constant elements.
With the control law
y
—fsn
r
^
x fc
B
X —
'
•
/
1 1
v
u(t) = -Ry{f) + Vw(t) one yields for the state space description
C
-L.
A
M
R
A M
h{t) = (A- BRC)h(t) + BVw(t) lit) = Ch{t) Without calculating the pre-filter matrix V, and choosing
Fig. 19. Sketch of the full state feedback The governing equation is given by
2 1
R= h{t) = (A- BR)h{t) + BVw{t) yit) = Ch(t)
V
1 2J
a simulation with MATLAB using a step function yields Fig. 22, and the poles are shown in Fig.23.
Using Laplace Transformation one calculates
y(s) = C{sl - A + BRyllBVw{s)
27
From: ln(1)
From: ln(2) 2 tanks, MIMO, output feedback
0.8 From: ln(1)
From: ln(2)
0.6 0.4
o b
0.2 0 -0.2 -0.4 c
0.8
•I
0.6 0.4
O b
0.2 0 -0.2 -0.4
0
1
5 0
1
Fig. 22. Tank level variation with output feedback
Time (sec)
Fig. 24. Overflow in tank 1 and 2 caused by the second control matrix R. 2 tanks, MIMO, output feedback
2 tanks, MIMO, output feedback
1 0.8 0.6 0.4 0.2
1 0
x-
I E
-x-
-0.2
-0.4 -0.6 -0.8
Fig. 23. Position of the poles in LHP.
-1
-3.5
With these control parameters the settling time could be reduced. The configuration gets unstable with
-2.5
-2
-1.5 -1 Real Axis
-0.5
0
0.5
1
Fig. 25. Poles in connection to Fig.24.
1 2\
R=
-3
The control matrix
R=
V' With R the original system matrix A changes to
v2 1
generate input vectors
A =A-BRC. with
B=
Zv;
v0
U2 =
0 \ Zv2 7
-
and 7? =
Because C is an identity matrix here, BR influences the new system matrix.
(Vw)
2 1\ respectively. 1 2 V
R can be used to analyze the behavior of the tank configuration.
Fig. 24 shows the overflow in both tanks, and Fig.25 shows one pole located in RHP.
With a negative value of b = - 1 (pumping liquid from tank 1 to tank 2), and with the outlets g = 1, ai = a2 = 1, d = 0.5, the results are shown with Figs. 26 and 27 (without control).
28
From: ln(1)
From: ln(2)
Severe problems occur with getting rid or to avoid contaminated exhaustions or contaminated waste material. It could be of interest to develop mathematical models correlating between separately done decisions with respect to the whole and to avoid singularities.
0.5 0 O -0.5 -1 -1.5 2 1.5
7. REFERENCES
CM
o
1
b 0.5
Chestnut, H. (1990): International Conflict Resolution as Part of a Co-operative Security System; Proceedings of the IF AC SWIIS Workshop "International Conflict Resolution using Systems Engineering", Budapest, 1989, Pergamon Press 1990. pp 5-12. Gomez da Silva, J-M., Silveira, M., Pereira, C. (2004). A Web-based remote multivariable control experiment. In: Proc. IF AC Symposium INCOM 2004, Elsevier Ltd., Oxford. Kile, F. O. (1990): Preparing for Peaceful Ways of Re-solving International Conflicts; Proceedings of the IF AC SWIIS Workshop "International Conflict Resolution using Systems Engineering", Budapest, 1989, Pergamon Press 1990. pp.13-17. Kopacek, P., F. Breitenecker and A. Frotschnig (1990): Control Engineering Methods for International Stability; Proceedings of the IF AC SWIIS Workshop "International Conflict Resolution using Systems Engineering", Budapest, 1989, Pergamon Press 1990. pp. 35-38. Kopacek P., H.Chestnut, J.Scrimgeour and F.Kile (1992): A Review of the Activities of the IF AC SWIIS Working Group 1983-1989. In: Proceedings of the IF AC Workshop " Supplemental Ways for Improving International Stability - SWIIS 92", Toronto, Canada, p. 1 3 - 2 5 . Kopacek, P. (2000): SWIIS - An Important Expression of IF AC Commitment to Social Responsibility. In: Preprints of the IF AC Workshop on Supplemental Ways for Improving International Stability SWIIS^2000", Ohrid, Macedonia, p.13-16. Scrimgeour, J. (1990): International Stability-An Information and Control Systems Study of the Process; Proceedings of the IF AC SWIIS Workshop "International Conflict Resolution using Systems Engineering", Budapest, 1989, Pergamon Press 1990, pp. 79-84.
8 0
Fig. 25. Tank levels variation with modified system matrix A (see Fig. 17). 2 tanks, MIMO, without control
-0.8
-0.7
-0.6
-0.5
-0.4
-0.3
-0.2
-0.1
Fig. 27. Pole location for Fig. 26.
5. DISCUSSION The simple models and calculations given in section 4 do not claim to completely explain the effects of energy supply and consumption. But it could foster an understanding of possible instabilities when trying to control supplies separately and not in the context of the network. The models of sections 4.1, 4.2, and 4.3 are not very realistic for networks of supplying oil or gas. However, these models explain why and when unexpected instabilities occur. The models described in section 4.3 and 4.4 are more realistic because these are based on MIMO systems used for designing networks of electrical energy supply. Last time one could get aware of problems that had caused blackouts in electrical energy supply. Full state feedback control may be sometimes unrealistic for solving practical problems. The introduction of observers can be helpful. Output feedback can explain the influences of the different parameters controlled independent of the supplier. 6. CONCLUSION The intention of this contribution is to present some material for discussions regarding energy supply and consumption between countries providing energy in different forms and the customizing energy. This is of course only one side of a medal. 29
This page intentionally left blank
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
A ROLE OF MECHANICAL ENGINEERING IN MECHATRONICS
Ceccarelli Marco, Ottaviano Erika, Carbone Giuseppe
LARM: Laboratory of Robotics and Mechatronics, University ofCassino, Italy
Abstract: In this short paper we have discussed the role of Mechanical Engineering both in education and practice of Mechatronics. In particular we have outlined main features of the mechatronic systems as strongly related with mechanical engineering when one considers that generally a task of a system is devoted to operation with interaction with environment or human beings. Since the final operation goal of a mechatronic system has a mechanical nature, mechanical characteristics both for design and operation of mechatronic systems should be considered with a careful attention both during design developments and operation management of mechatronic systems. Experiences developed at University of Cassino are reported to show examples of the practical implementation of the above-mentioned issues. Copyright © IF AC 2006 Keywords: Mechatronics, Education, Mechanical Engineering
Engineering multidisciplinary vision for modern integrated systems that are more and more conceived as a combination of parts with different natures both in design and operation.
1. MECHATRONIC SYSTEMS AND MECHATRONICS Mechatronics has been established since 1990's as a multidisciplinary Engineering dealing with the complexity nature of modern systems. As shown in Fig. 1 Mechatronics is understood as a fusion of the disciplines Mechanics, Electronics, Electric Engineering, Control, Measurement, and Computer Science.
In Table 1 illustrative examples are reported on how systems have evolved to mechatronic designs.
design
environment
A mechatronics system is, indeed, composed of mechanical parts, electric devices, electronics components, sensors, hardware and it is operated and controlled under the supervisions and commands that are programmed through suitable software.
MECHATRONICS I Electronics Measurements
Thus, main characteristics of mechatronics systems are the integration and complementarities of the several aspects from the many disciplines that describe the design and operation of the components and overall system. In addition, for a suitable operation of a mechatronic system engineering issues and human-system aspects must be considered as looking at features and constraints from the environment within a system operates, the design by which it has been developed, the operation performance through which it fulfil the task, and the production by which it has been built.
operation
production
Fig.l- A scheme for definition of Mechatronics Table 1- Illustrative examples of evolution of systems to mechatronic designs
Thus, summarizing the Mechatronics is a modern
31
Mechanics % 1960-2000
Electronics & Informatics % 1960-2000
CAR
90 - 50
10 - 50
CALCULATOR
100 - 10
0 - 90
CAMERA
100 - 30
0 - 70
In Fig.2 an actuation system is shown with its basic components: actuator, sensor, control unit, and a regulator device. The operation of the system is controlled through a suitable programming that allows the control unit to receive and elaborate signals from sensors and then to send command signals to regulator for operating the actuator. The task is modelled by a load indicating both a payload and its movement according to the final goal of the system. The components in Fig,.2 correspond to the fields of disciplines that are indicated in Fig. 1 even without any sophistication. This is because today systems are always conceived, designed and regulated to achieve optimal performance by using a mechatronic design.
Cars, whose aim is transportation, were built essentially with mechanical components in the past, but increasing performance and speed has required regulation and control of motors with sophisticated systems. Even inside comfort and safety have improved by using sensored equipment with more and more mechatronic designs so that today a car can be understood as a full mechatronic design, being pure mechanical designs limited to less than 50% of the system. Cameras were conceived and built as pure mechanical design since the photo task did not require any motion of parts. Today regulated operations, like zooming, and even photo creation, are obtained with electronics components and the only mechanical parts are left for interaction with human operators, like command buttons.
In Fig.3 a block diagram is shown to model the operation of the system in Fig.2 both for simulation/design and control purposes. G function models the system behaviour, mainly from mechanical viewpoint by taking into account also sensor signals. H is a control function that is formulated by using the mechatronic design to regulate the system operation at suitable required levels of performance. Although the scheme is directed to certain autonomy of the system, human operators always interact with the system through definition and check of the operation and even through overlooking the system by means of suitable interfaces both for starting and updating system operation.
Calculators have evolved even more deeply and the complicated pure mechanical systems, that were conceived since 18-th century, are completely disappeared and today only informatics and electronic hardware are used for calculators up to 100% of parts. The only mechanical parts with pure mechanical operations are the key buttons in the keyboards for being pushed by fingers of a human user. The above-mentioned aspects are summarized in the schemes in Figs.2 and 3 as concerning with a general layout and model for a mechatronic design as related to a servo-controlled actuator.
control unit
<
As already mentioned, mechanical nature of system goal is of fundamental importance for the system success and must be considered both in terms of load characteristics and operation performance, and by considering the action and supervision of human operators, as synthetically shown in Figs.2 and 3.
1
o
Thus, an optimal operation of mechatronic systems requires both at level of design stages and operation managements that all components are fully understood and their integration is exploited by running the components at similar levels of their capabilities. This requires a suitable knowledge of the different engineering disciplines pertaining to the several fields of technology for the several areas in Fig. 1. Thus, formation and practice for Mechatronics must be thought since the first stages of Engineering curricula in order to have engineers ready in a suitable short time for professional activity and capable to handle successfully mechatronics systems even for innovation.
regulator
Fig.2 A mechatronic design for a manipulator actuator
The multidisciplinary character of Mechatronics requires a differentiation of roles in practicing and experts engineers. Practicing engineers should be able to operate and/or adapt mechatronic systems in given application fields. Expert engineers should have capability to make innovation both in
Fig.3 A block diagram for mechatronic actuation in Fig.2
32
Mechanics of interaction is interesting in evaluating situations with mechanical contacts and force transmissions between the system parts or its extremity and environment or task object. It is fundamental to size the system actions according to the task requirements and specific analysis of the corresponding mechanics is necessary to achieve desired goals and proper working of the overall system.
mechatronic systems and their applications. These two levels of competence refer to different level of formation: a short term with practice capabilities and a long term with design and innovation capabilities.
2. MECHANICAL ISSUES
Dynamics of Multibody systems is a mechanical discipline that is oriented to consider complex systems during complex motions like spatial movement at high acceleration and velocity, with the aim to take into account any inertia effect. Indeed, this discipline has been developed by looking at integrated systems and very often the dynamics of Multibody systems include suitable modelling of components of other nature than pure mechanical one, like for example servo-controlled actuators whose motion and dynamics can strongly affect the system behaviour and operation characteristics, as it is mechatronic systems.
A mechatronic system can be characterized synthetically by versatility and flexibility as two main aspects whose integration gives mechatronic behaviour of modern systems. Versatility is mainly related to operation capability and performance that are needed for mechanical activity of a mechatronic system. Flexibility is mainly related to regulation capability and performance that are needed for controlled actions of a mechatronic system. Thus, mechanical issues in mechatronic systems are related to versatility mainly in terms of Kinematics and Dynamics of a load movement, Mechanics of interactions (like contact and grasp), Dynamics of Multibody Systems. However, the mechanical attention is always linked to aspects of the mechatronic design and indeed, simulation of mechanical actions is usually performed by taking into account also models for the controlled actuation.
Besides the above-mentioned topics, mechanical issues in mechatronic systems can be considered for specific goals and operation tasks, like for example locomotion mobility, object grasping and manipulation, force transmission, and so on. Versatility of a mechatronic system can be seen and understood under different aspects, and the abovementioned considerations can be related to main aspects which make the role of Mechanical Engineering fundamental for the success of the mechatronic systems, but within a frame of multidisciplinary integration yet.
Thus, the role of Mechanical Engineering in Mechatronics can be understood according to two main aspects, namely the mechanical design and operation, and the mechanical interaction with environment in performing system tasks. Those mechanical aspects both for design and operation aims are studied by looking at traditional disciplines for machinery but even at specific novel disciplines.
3. EXPERIENCES AT UNIVERSITY OF CASSINO
At University of Cassino experiences on Mechatronics have been carried out since early 1990's both in educational programs and research activity.
Thus, Kinematics and Dynamics of load movement are studied to analyse and investigate on the motion of mechatronic systems and load body during the operation performing or not a task.
Conventional Engineering education in Universities does not yet use widely the denomination of Mechatronics for those Engineering curricula dealing with specific formation in Mechatronics. Indeed only recently, specific curricula on Mechatronics have been started in European Universities with a teaching plan of multidisciplinary integration since the beginning of formation programs.
Particular attention is usually directed to mechanical aspects of the motion in the system and load as due to the flexibility and control of the operation of the system. In addition the task is studied by looking both at kinematic and dynamic features of the motion and related actions against the environment and within the mechatronic system yet. The particular attention to motion issues is also motivated by the attention to safety and security issues both for the system and human operators that can be in the operation area of the system.
The name of Mechatronics is not often used but since the early 1990's many Universities have adopted specializations of Engineering curricula in last part of
33
the formation program and they have included Mechatronics as an important specialization.
Dynamics of industrial manipulators; Analysis and programming of industrial robotized manipulations; Practice with industrial robots within laboratory activity.
As an illustrative case indicating such a specialization and how it can be planned, we shall report the experiences at University of Cassino. However, this case has common aspects with many other similar teaching programs in Italy and Europe yet.
Mechanics of automatic machines - The objective of this course is to teach modelling, analysis, simulation and design of mechanical systems for automatic machines. Topics: Automatic machines; classification and basic components; Classification and design of law of motions and quality indices for the transmission; Irregularity and transitory of the motion; Planar and spatial cams; Articulated mechanisms for planar and spatial applications; Geneva wheels; Indexing mechanical systems; Analysis and use of a mechanical systems for industrial application; Practice with test-beds within laboratory activity.
In Cassino, within the curriculum for Mechanical Engineering there is a specialization program of 20 credits among the 180 credits. However, even in the core program aspects of Mechatronics are given in courses like Informatics, Control of mechanical systems, and electric Measures. The specialist program that is oriented to Mechatronics is denominated as "Automation and Robotics". It is planned with the possibility for the student to spend a period of 8 credits for a stage in a company for developing professional experiences. The specialization is characterized by the courses that are offered, among which a student can select the credits of the specialization. The courses are of 4 credits each: Fluid Automation, Mechanics of industrial robots, Mechanics of automatic machines, Electrical actuation for automation, Laboratory for electrical actuation in automation, Instrumentation and measures for automation.
Electrical actuation for automation - The objective of this course is to give knowledge for understanding basic aspects and choice of electrical actuation for automation. Topics: Classification of systems for electrical actuation; DC motors; Brushless motors; Stepper motors; Fundamentals of electronics for industrial power supply: components, ca/dc, dc/ca; control schemes for electrical actuation. Laboratory for electrical actuation in automation The objective of this course is to give knowledge and teach the use, programming, and operation for electrical actuation for automatic systems. Topics: Automatic integrated structures (CIM); PLC: hardware and basic components; Basics of Ladder programming; Operation and use of digital and analogic I/O; Synchronization for electrical actuation; Technical specification for civil and industrial applications.
In the following a short summary for each course is reported in order to show the formation plan that is directed to give to students ability of using mechatronic systems, since in each course a practical activity is scheduled in laboratory or at industrial plants. Mechanical aspects are yet emphasized but with an integration with other disciplines according to the scheme in Fig. 1.
Instrumentation and measures for automation - The objective of this course is to give knowledge of theoretical and experimental issues for the use of electrical instrumentation and measuring systems for automation. Topics: Use of electrical basic instrumentation: multimeters, oscilloscopes, frequency measuring systems; interaction between sensor and measuring system; Signal conditioners; Acquisition systems; Classification of systems for automatic measuring systems for industrial applications; Lab view software for operating measures for industrial applications.
Fluid Automation - The objective of this course is to teach fundamental issues for the analysis and use of automatic systems with on/off pneumatic actuation. Topics: Classification of components for pneumatic actuation; FRL systems for providing pneumatic actuation; Pneumatic cylinders and valves, components and on/off sensors; Analysis of grafcet; Basics on PLC: components and programming for industrial applications. Mechanics of industrial robots - The objective of this course is to give fundamental knowledge and basic methodology for the analysis and use of industrial robots. Topics: Classification and comparison of industrial robots as based on their mechanical structure, technical characteristics and components; Denavit-Hartenberg notation for the analysis of industrial robots; Classification and operation of industrial grippers; Fundamentals of Kinematics: transformation matrices and workspace analysis; Trajectory planning; Fundamentals of Statics and
Similar plan is scheduled for the Master program with a specialization in Automation and Robotics with 20 credits among the available 120. The courses are: Modelling and Simulation of robots, ServoSystems, Integrated systems for production, Programmable Systems for electric locomotion, Laboratory of electromechanical systems, Digital Control, and Automatic measuring systems.
34
Teaching activity on the Mechatronics is supported by experimental and research activity that is carried out in several Engineering laboratories with different approaches within main discipline issues. In particular, within the Mechanical Engineering frame main activity is carried out at LARM: Laboratory of Robotics and Mechatronics. Detailed information on LARM can be found in the webpage http://webuser.unicas.it. As an illustrative example of activity on mechatronic systems, the experiences for LARM Hand in Fig.4 are shortly discussed. LARM hand is composed of three fingers whose design is aimed for an anthropomorphic behaviour. In particular, a humanlike grasping is obtained by each finger with 1 d.o.f. (degree of freedom) motion by using a suitable mechanism whose design has been obtained through cross four-bar linkages to be fitted in the finger body. The design compactness is useful to achieve a suitable stiffness at grasp too. The current low-cost solution can be completed with force sensors on phalanx surfaces and palm area that have been designed with a suitable surface configurations. Consequently the grasp can be regulated through a simple control using those force sensor signals and an industrial small PLC for an easy programming. The LARM Hand can be used as a grasping endeffector in robots and automatic systems, and even it has a potential feasibility as biomechanical prosthesis, once suitable adjustments are made.
Fig.4
LARM Hand for student mechatronic aspects
4.
practice
in
CONCLUSION
Two main considerations may summarize the discussion in this paper: - whatever Electronics, Informatics, Telecommunications and so on, will be enhanced and expanded in Mechatronics Technology, Mechanical Design will be always needed since a woman/man will always live and interact with the environment on the basis of mechanical phenomena of the human nature; - enhancements in knowledge and Technology needs for human life and industrial production have changed and evolved over time, also because of the evolution of systems, requiring innovation that have brought to Mechatronic design and operation of modern systems.
As shown in Fig.4 LARM Hand is a mechatronic system which is obtained as integration of mechanical parts (the fingers), measurement equipments (force sensor and monitoring software), control unit (PLC and its programming). Research activity has been carried out to design suitable mechanisms for anthropomorphic operation of the fingers with 1 dof only, to use and program a lowcost PLC, to operate firm grasp through low-cost sensors and suitable control scheme.
REFERENCES (Citation of references are not included in the paper for space limits. References are listed for giving sources of further reading even with different or complementary views with respect to the authors' opinions) Ceccarelli M. (2004), Fundamentals of Mechanics of Robotic Manipulation, Dordrecht, 2004. Ceccarelli M and Acevedo M. (Editors) (2002), Int. Symposium on Multybody Systems and Mechatronics MUSME2002, Mexico City, 2002, CD Proceedings. Ceccarelli M and Carvalho J.C. (Editors) (2004), Int. Symposium on Multybody Systems and Mechatronics MUSME2004, Uberlandia, 2004, CD Proceedings, Bishop, R. H.(editor-in-chief) (2002), The mechatronics handbook 2002. ASME Education (2006), "ASME Mechatronics online course", http://www.asme.org/Education/, 2006.
LARM Hand has been developed also with the help of students through master theses and course practices. It is still used in teaching activity for student practices on grasping experiences and PLC management. Thus, students learn the specific mechatronic design and operation of LARM Hand but they also get practical experience in operating a mechatronic system after classes on different disciplines. At LARM several other systems are available and used for student practices on mechatronic systems with the aim to teach them how to manage Mechatronics in practice.
35
Kelly L , De Silva C.W. (2004), "Mechatronics: An Integrated Approach", CRC Press, 2004. Alciatore D.G., Histand M.B. (2002), "Introduction to Mechatronics & Measurement Systems", McGraw-Hill Professional, 2002. Miu D. K. (1992) "Mechatronics: Electromechanics and Contromechanics" Springer Verlag, 1992. Bradley D.A., Dawson D., Burge S., Seward D (2000), "Mechatronics and the Design of Intelligent Machines and Systems", 2000. Giurgiutiu V., Lyshevski S.E. (2003), "Micromechatronics: Modeling, Analysis, and Design with MATLAB", CRC Press, 2003. Braga N.C. (2001), "Robotics, Mechatronics, and Artificial Intelligence: Experimental Circuit Blocks for Designers", 2001. Necsulescu D (2002)., "Mechatronics", Prentice Hall, 2002. Auslander D.M., Kempf C.J. (1995), "Mechatronics Mechanical System Interfacing" , Prentice Hall, 1995. Conferences and Proceedings: International Conference on Advanced Intelligent Mechatronics (AIM) International Conference on Mechatronics (MECH) International Conferences on Mechatronic Design and Modeling International Workshop on Education in Mechatronics (MDM) Mechatronics Forum International Conference Journals: International Journal on Intelligent Mechatronics Journal of Robotics and Mechatronics Journal of Mechatronics Journal on Micromechatronics Transactions on Mechatronics
36
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
A MECHATRONICS MANAGEMENT LABORATORY
Peter Kopacek Handling Devices and Robotics - IHRT Vienna University of Technology Favoritenstr. 9—11, A-1040 Vienna Tel: +43-1- 58801 31801, FAX: +43-1- 58801 31899 e-mail:
[email protected]
Abstract: Mechatronics consists of integration of mechanical engineering with electronics, computer systems, and advanced controls to design, construct, and operate products and processes. In the industry is currently an increasing demand for technical managers with knowledge in business subjects - so called "Mechatronic Managers". Mechatronic managers possess the core skills of mechanical engineers and electrical engineers as well as management and business. Their knowledge enables them to solve a wide range of mechanical, electrical and software problems, allowing them to participate in and lead multidisciplinary design teams. To ensure a practically oriented education a laboratory is absolutely necessary. In this contribution a basic equipment for such a laboratory will be described and first ideas for an efficient laboratory management will be outlined. Copyright © 2006 IFAC Keywords: Mechatronics, Automation, Laboratory, Robotics, Management.
pneumatic actuators, assorted sensors as well as a flexible manufacturing system and a stationary and mobile, intelligent robots. One of the main goals selecting the lab equipment was a synergy between education and research. Most of the lab equipment is according to industrial standards and can used for industrial oriented education and research in form of project works and BSc. and in the future MSc Theses.
1 INTRODUCTION Mechatronic management students need a focused laboratory environment for the Technology subjects to apply and absorb mechatronic concepts. The emergence of " distance learning" venues may be adequate for lectures, but cannot readily replace the laboratory environment where theory is put into practice. In the lab , classroom topics are reinforced through a sequence of progressively more complex investigations into the components configuration and control of mechatronic systems. The experiments can be partitioned in the following units: Fundamentals of electr(on)ics, pneumatics and hydraulics, Programmable logic control (PLC) experiments, PC applications, Production automation Conventional as well as "advanced" robotics. Therefore experimental setup include breadboards with electr(on)ic and pneumatic components, light stacks, conveyor belts, servo motors, electric and
2 EQUIPMENT In the first stage - basic - the following equipments are currently available in the new mechatronics lab:
2.1. A modular, flexible production system The system consists of stations for: handling, processing, distributing, testing, sorting of different parts and a pallet transfer system. It will be used for training and research in the following fields: handling technology, assembly and disassembly, logistics,
37
PLC programming, electro - pneumatic, sensor technologies, analogue measurements, position control, conveyors, I/O communication, AC motors, frequency converter.
Temperature module with 4 inputs for thermocouple or resistance temperature detector (RTD) A Fieldbus Interface allows the attachment of the CPU module to the AS-interface as a master (according to specification V2.1). Includes all the necessary software for configuration of connected slaves and for read/write operations of data.
The system consists of industrial components and the stations are able to operate independently - e.g. the PLC can be used separately as well as in other systems. Furthermore the stations can be arranged in different configurations.
2.2. Laboratory system for fundamentals pneumatics and electro-pneumatics.
Ethernet Interface for connection to an industrial Ethernet via a RJ45 socket. Communication is based on standard TCP/IP. Facilitates remote programming as well as configuration and diagnostics of the PLC system (program up/download, displaying status information, archiving process data).
of
The system consists of: single and double acting cylinders, 3/2 way and 5/2 way solenoid valves, relais two and three fold, electrical limit switches, proximity switches (electronic and optical), pressure sensors, flow control valves and an user interface. The system will be used for training and research for the following subjects: structure, function and application of single- and double-acting cylinders, application and function of 3/2 and 5/2-way solenoid valves, logic operations: AND/OR/NOT/NOR/NAND/ XOR/ , combinatorial and sequential logic circuits (synthesis and analysis), function and application of limit switches, sensors and sensor technology, pressure measurements, interfaces pneumatic - electric, trouble shooting in simple electro pneumatic circuits. All components are easily attachable - according to the demands - to an aluminium profile plate to ensure an ergonomic working position. This plate is installed in a mounting frame on a mobile trolley for easy moving. All the components are able to operate independently and in the system and can be combined in different configurations.
The module is equipped with a watchdog circuit. Its monitoring time can be set via software. If monitoring time sets in, the module is reset and an error message is reported to the CPU module. Data can be exchanged via a standardized interface with other applications. Simulation Software offers a simulated plant environment for function tests of user blocks and programs independent of the availability of actual target hardware (CPU, analog and digital I/O modules). Access and test functions of the programming tools can be carried out in the same manner as with a real CPU. The system has to support at least the standard programming languages statement list (STL), ladder logic (LAD) and functional block diagram (FBD) and fully integrates in the programming environment of the CPU module mentioned above. During program execution, different process values can be monitored and changed by using a graphical user interface (e.g. simply switching inputs and outputs on or off).
2.4. Data acquisition interface board 2.3. Laboratory system for fundamentals of PLC With 16 ADC channels either 16 x single-ended or 8 x differential with a resolution of 12/14 bit and a sampling frequency of 500 kHz. Because of compatibility the range can be selected between 10V..+10V, -2.5V..+2.5V, 0V..10V, 0V..2.5V. The board has also 4 DAC channels, 12/14 bit with sense, range -10V..+10V, 16 TTL digital I/O ports optoisolated (24V). Each port can be used as input or output specified via software. 2 counters with a resolution of 16 bit - Standard TTL 5V - , frequency 100kHz, 2 timers 10MHz) independent of PCs clock frequency and a PC Bus Interface 32-bit/33 MHz PCI bus (2.1 compatible) are also available. The Software includes drivers for Windows 95, 98, NT, 2000 and XP with documentation. Drivers and function libraries supports Visual C++, Visual Basic, Borland C/C++ und Delphi as well as Agilent VEE and LabVIEW.
The system consists in the first stage of a: CPU Module with 16 digital inputs and 16 digital outputs with status LEDs, 4 counters (> 20kHz), 2 analog inputs, a real time clock, 2 * RS232 or RS485 interface, program memory (> 16kB), data memory (> 8kB), memory backup for more than 100 hours, expandable with additional modules (analog/digital inputs/outputs, field bus interfaces, ...), Windowsbased software used for programming the PLC. It provides tools and utilities required for programming in either statement list (STL), ladder logic (LAD) or functional block diagram (FBD) programming language. Analog Expansion module with 4 inputs and 4 outputs 0-10V / 0-20mA software selectable in ranges between 0-10V, 0-5V, -5V..+5V, 2.5V..+2.5V. The conversion time is less than 40us.
38
According to our experiences in the last 10 years at IHRT/VUT robot soccer attracted a lot of students to attend courses, to finish Diploma- and Doctor theses not only because of the p.r. in newspapers and TV. The system consists of 11 mobile Minirobots "Roby Speed" including acceleration sensors, 2 CCD colour cameras, 2 framegrabbercards, 2 transmission stations, 12 transmission modules (869 MHz), 1 battery charging station and basic software.
2.5. Education robot This robot is one of the largest education robots and can be used for a load capacity of 1.2 kg due to its configuration. Five degrees of freedom are controlled by the drive unit, which includes the CPU and the electronics. The robot is programmed by means of commands of a PC connected by Centronics or RS 232. With the TEACH BOX the robot can be moved point to point. Programs and points are stored in an EPROM.
Table 2 Technical data of the Minirobots
Table 1 Technical data use of space max. range horizontal max. velocity with interpolation accuracy of positioning rated load total weight number of in/outputs
(mm x mm) (mm) (mm/s)
208x180 445 400
(mm) (daN) (kg)
±0.5 1.2 27
Microcontroller Communication Module Software Controller
Dimensions (Length x Width x Height) Motors
8 /8
Sensors Power Max. Speed (m/s) Max. Acceleration (m/s2)
2.6. Robot soccer system (Kopacek, 2001) There is a new term called "edutainment". It consists of two words - education and entertainment. The aim of edutainment is to make "High Tech" easier and more transparent for a broader public. There is an approach to bring students of mechatronics knowledge of the difficult scientific problems in the way of edutainment using soccer playing robots.
XC167 (Infineon) RF frequency : 418,433, 869 or 914 MHz Optional: PID, Neuro PID or advanced algorithms Sampling Time 1 ms 75 mm x 75 mm x 46mm Faulhaber 2224 06 SR, 4.5 W Acceleration sensor NiMH 9.6V 700 mAh 3.9 10
This system will be also used for research in the following subjects: o Communication between agents: At the moment the communication is working in one-direction, i.e. the host computer sends commands to the robots. For the cooperation between agents, bidirectional communication is necessary. When the number of agents is increases, there are problems on the usable number of channels and protocols. o Intelligent local sensor implementation: Increasing the number of the players the size of the pixels which can be detected, is smaller. It is very difficult to calculate the position with a small number of pixels. It is necessary that each robot has the capability to explore the environment and to find objects on the playground by itself. o Intelligent behavior of robots: Implementing intelligence not only in a single robot but also in a group behavior. o Improving vision system: A soccer robot can move with maximum speed approximately 6m/s and the ball faster. Some vision system can loose the position of robots and balls. o Prediction algorithms: Because of time delay it is necessary to have prediction algorithm of future locations of the ball and the robots.
Robot soccer was introduced with the purpose to develop intelligent cooperative multi-robot (agents) systems (MAS). From the scientific point of view a soccer robot is an intelligent, autonomous agent, carrying out tasks together with other agents in a cooperative, coordinated and communicative way. Robot soccer provides a good opportunity to implement and test MAS algorithms. Furthermore it's a good tool to teach people mechatronics by playing. Robot soccer is an excellent example for interdisciplinary research topics, e.g. mechatronics. For the construction and manufacturing of the body, perfect knowledge of (precision) mechanics is required. Electrical as well as control engineering is necessary for the drives and the power source. The control and communication board of the robot is more or less applied electronics. A microprocessor serves as an internal controller. It is also responsible for the wireless communication with the host computer. For these tasks and for the software of the host computer fundamental knowledge in computer science is necessary. The software of the host computer is responsible for image processing, game strategies, control of the own players, communication with these. Another important task is the user interface.
39
2.7. 3-finger Hand (LARM Hand)
2.8. Additional components
The LARM Hand is composed of three fingers whose design is aimed for an anthropomorphic behaviour. In particular, a human-like grasping is obtained by each finger with 1 d.o.f. (degree of freedom) motion by using a suitable mechanism whose design has been obtained through cross four-bar linkages to be fitted in the finger body. The design compactness is useful to achieve a suitable stiffness at grasp too. The current low-cost solution can be completed with force sensors on phalanx surfaces and palm area that have been designed with a suitable surface configurations. Consequently the grasp can be regulated through a simple control using those force sensor signals and an industrial small PLC for an easy programming. The LARM Hand can be used as a grasping end-effector in robots and automatic systems, and even it has a potential feasibility as biomechanical prosthesis, once suitable adjustments are made.
Various sensors for pressure, force, position, proximity, light, acceleration. Software: LAB VIEW, Matlab/Simulink, SPSS.
3. ORGANISATION FOR EFFECTIVE, ACTIVE LEARNING In the following some first ideas (Gohne et al., 2003, Surgenor et al.,2005) about the organization of the lab courses are given. Training material (Teaching material Transparencies, CD or DVD - for students as well as lecturers ) is available in English and Albanian, for all systems as well as the components. Attendance to the tutorials and labs is mandatory Students have a 24 hour access to the laboratory and to the wireless connected PC room. A tight coupling between lecture and laboratory activity. Arranging a preliminary task that is to be completed in the tutorial in order to avoid time wasted in case in cases where basic errors are being made in the at the outset. Solid support during the tutorial and the labs by people who know the problems and how to solve them. Provide component data sheets as hardcopy in the lab and on course website. Provide a clear handout with the tasks to be solved. Have a large flip chart or whiteboard available to discuss "on site" questions of common interest.
General characteristics • Total fingers: 3 • Joints per finger: 3 • Actuator per finger: 1 • Total hand actuators: 3 Range of Motion • Finger input joint: 40 deg • Fingertip link: 140 deg Finger Speed • Finger fully open to fully closed: 2.0 sec Force Sensing • Sensors on palm: 1 • Sensor type: force sensing resistor • Force sensitivity: 1 to 100 N • Force resolution: >0.5% full scale • Lifetime: >10 million actuations
4. SUMMARY AND OUTLOOK In the framework of a curriculum for a BSc degree in "Mechatronics Management" (Ceccarelli et al., 2006) a basic laboratory for the technical subjects was installed. Special emphasis was on industrial components, modularity and training material for the students as well as for the lecturers. Furthermore this equipment should also be used for industrial oriented research. It is a first trial to develop a laboratory for "Mechatronics Managers" to get first experiences in mechatronics related subjects like: electronics, precision mechanics, IT, process and production automation, control engineering, conventional and advanced robotics
Motor Type • 24V permanent magnet DC motors Power Supply • Typical 15V DC power supply • Max required power: 300 W Control System & Software • Mini PLC Logo • Siemens Logosoft Comfort Dimensions • Finger: 1:1 human finger size • Hand: 110x240x120 mm Size of Grasped objects • 10-100 mm
The laboratory equipment will be completed in the next two years during the development of a MSc degree.
Weight • Hand: 15 N • Pay load: 5 N
40
5. ACKNOWLEDGEMENT This laboratory was supported by the European Comission under Tempus Joint European Project JEP 18071-2003 (Kosovo)
6. LITERATURE Ghone,M.; M.Schubert and John R. Wagner (2003). Development of a Mechatronics Laboratory. IEEE Transactions on Industrial Electronics; Vol 50, No 2, April 2003, p.394-397. Surgenor, B; K. Firth and P.Wild (2005): Lessons Learned from a Mobile Robot Based Mechatronics Course. Proceedings of the 2005 American Society for Engineering Education Annual Conference & Exposition. Kopacek, P. (2001): Robots in Entertainment, Leisure and Hobby. In: Proceedings of the 32nd International Symposium on Robots - ISR, Seoul, p.1339-1344, 2001. Ceccarelli, M.; E. Hajrizi; Kopacek, P. and Stapleton, L. (2006): Mechatronics Education and International Stability - The development of university-level education programmes in Advanced Engineering in Kosovo. To be published in: Proceedings of SWIIS 2006.
41
This page intentionally left blank
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
SOCIAL STABILITY IN A STRESSED ECOSYSTEM
Frederick Kile
Microtrend 420 E. Sheffield Lane Appleton, Wisconsin 54913-7181 USA
Abstract: The global ecosystem is changing rapidly with unforeseeable consequences for society. Underemployment, socioeconomic inequality , and population pressure on resources and land could lead to irreversible environmental decline and large-scale conflict. Major social and environmental challenges are delineated. Conditions for future socioeconomic stability are suggested. Copyright © 2006 IF AC Keywords: Coupling Coefficients, Ecology, Environmental Stability, International Stability, Social, Time Delays
As social and political actors deal with socioeconomic issues, it should be noted that the ecosystem does not negotiate. It follows that behaviors affecting the ecosystem must incorporate a wide "margin of safety."
1. INTRODUCTION This paper outlines societal dilemmas to be confronted if global society is to improve international stability while maintaining a stable ecosystem. Global society is squeezed by a confluence of factors: 1. Expanding economic activity to provide work and improved living for a billion people living in poverty; 2. Unabated population growth, especially in impoverished areas; 3. A highly stressed natural environment; 4. Depletion of natural resources;
2. ECOLOGICAL DECLINE The global ecosystem is severely strained. Deforestation continues. Major lakes are at historically low levels, particularly Lake Chad in Africa and the Aral Sea in West Central Asia. Recently, the level of Lake Victoria in East Africa has declined. Water disputes are a source of international tension.
Most people agree that peace is better than war. Nevertheless, during the past century there have been too many wars to enumerate.
The Sahel Region of Africa was a site of great famines during the last third of the 20th Century. Currently, famine in this region appears to have become endemic. Pledged food aid is not necessarily delivered, and even when it does reach stressed regions, distribution is problematic.
Society has not coped with the challenge of feeding a billion hungry people while another billion people are clinically overweight.
43
Accelerating ecological weakness suggests that present consumption levels are not sustainable. At the same time global pressure for increasing consumption is rising.
A representative, but incomplete, list of regions experiencing disruptions during the past two decades suggests that accelerating environmental and socioeconomic changes are rapidly reducing international stability. 1. The transition of the USSR to fifteen new nations; 2. The collapse of authority in Somalia; 3. Intermittent war between Ethiopia and Eritrea; 4. Political and socioeconomic change in Zimbabwe; 5. Emergence of radical governments in South America; 6. The splintering of Yugoslavia; 7. Unstable economies in Eastern Europe; 8. Uncertainty on the Korean Peninsula; 9. Dislocations in the United States following major hurricanes; 10. Tension in the Kashmir with spillover effects in India and Pakistan; 11. Rising sea levels flooding island nations, Bangladesh, and seacoasts: 12. Starvation in Africa.
Soil in some formerly fertile areas was degraded by unsound agricultural and forest management practices. The most notable example is in Haiti, which was a land of great forests a century ago, and is now largely denuded of trees. Even where sustainable practices are understood, pressure for immediate results may foster practices which degrade ecosystems.
3. CHALLENGES TO SOCIAL STABILITY Population growth in stressed regions has led to despair and hopelessness among underserved, underemployed, underfed people. Political and religious radicalism has risen under these conditions. Additionally, in conditions of extreme poverty relative to neighboring areas, drug trafficking and accompanying crime increase. Some mass media programming from affluent regions portrays life as a sea of rich and glamorous people without limits to their consumption. These unreal images aggravate perceptions of imbalance beyond the already stark contrast of living standards.
5. A NEW SOCIAL PARADIGM The global ecosystem functions according to undiscovered laws of very large systems and will support only those activities which operate within these undiscovered, and perhaps unknowable, laws. Ecological weakness suggests that socioeconomic paradigms of the 20th century are not capable of maintaining ecological stability without significant modification.
Fragility of the global social system was revealed by three regional catastrophes in 2005: the tsunami in South and Southeast Asia, major hurricanes along the Gulf Coast of North America, and a major earthquake in Northern Pakistan. In each instance, regional response systems could not forestall major socioeconomic dislocations.
Both free market economies and nation states functioning as businesses flourished under the assumption that the global environment needed no attention. This model of socioeconomic operation undergirded the incredible expansion in production and trade of the 19th and 20th centuries. The perception of limitless frontiers is no longer a viable view of the global ecosystem.
4. UNDEREMPLOYMENT AND STRESS ON EXISTING SOCIAL PARADIGMS Unemployment can be aggregated with underemployment, especially because many underemployed people work at such low pay levels that their situation is equivalent to unemployment.
5.1 Altruism and Education Automation and Machine-Assisted Thinking (AMAT) (Kile, 2003) are part of a spreading tendency to produce more goods and services while simultaneously reducing the participation of human labor. Resulting underemployment exacerbates inequality, undermining social stability.
A workable paradigm may incorporate elements of altruism. Altruistic behavior has been successful in small kinship groups. Can seven billion people behave altruistically? Building toward a global pattern of altruism will require education beyond what has been attempted in the past. Modifying behaviors is important, given environmental stress caused by
44
current behaviors. Educating a broad population for altruism depends on reaching a consensus that current behaviors are not sustainable.
(cf. the Prisoner Dilemma (Kuhn, 2003)). Many of these studies assume that actors have a "next opportunity." Serious instability may reduce the likelihood of a "next opportunity." Cooperative behavior patterns function best in a larger paradigm which assures people that no group "comes out on top" to the detriment of others.
6. VIEWS OF HUMAN SOCIETY Some observers posit a clash between scientific views of the natural world and faith-based views of the natural world. It is paramount to note that both viewpoints agree that the natural world is nonrepeatable. The environment in which society lives (whether God-given, or the result of evolution, or both) is unique and cannot be viewed as an experiment which will be re-run if the experiment fails.
Society is challenged to develop cooperative behavior patterns which adapt to the global ecosystem. The ecosystem, interacting with society, is a passive actor, which can only react to how it is used. Yet, it is ironic that If the ecosystem fails, society will fail. Competing sociopolitical and religious doctrines are linked with relatively inflexible social doctrines. Discussions of human survival should emphasize flexible aspects within competing systems to foster accommodation among doctrines.
The natural capacity of species to adapt operates more slowly than the present rate of environmental change. Similarly, socioeconomic paradigms and social doctrines (secular or religious) could fail under the stress of accelerating environmental change. There is no serious alternative to sustainable behavior.
Can divergent social and religious groups cooperate in navigating through this dilemma? Their cooperation is indispensable in establishing a new social paradigm. A single uncooperative group might bring the world to destruction by suboptimal behaviors. In an era of suicidal behaviors this possibility cannot be overlooked.
7. SOCIAL DETERMINANTS Three social determinants are of special interest in the study of sustainable global stability.
7.3 Recognition as Reward 7.1 Uncertainty People go to unusual lengths to win recognition. Many major awards carry little monetary incentive (Nobel Prizes are an exception). Monetary rewards could become counterproductive if they tended to increase consumption. It is well known that people compete for awards with no meaningful monetary component. Occasionally some competitions draw participants whose large salaries indicate that they are participating simply for recognition by their peers and by the public, whether or not there is an attendant monetary award. The most famous competition of this type was the ancient Olympic Games, which awarded the winner a perishable laurel wreath.
In his trailblazing 1962 paper, A Theory of Catalytic War (Kobe 1), the author asserted that if enough nations possessed nuclear weapons and that if any nation were to use one of these weapons, the probability of a global nuclear war would approach one, even if the retaliation matrix of most nations consisted largely of zeroes. Kobe's underlying assumption can now be viewed as conservative, since current stability is complicated by the possibility of "dirty bombs," which might kill hundreds of thousands, even in the absence of a nuclear explosion, perhaps surpassing the toll taken by a small nuclear weapon. A nuclear war on this scale would effectively end organized human society. Kobe's research underscores the pressing nature of the human search for a dynamically stable society.
Recognition, or any other serious paradigm for international stability, will fail if people who administer the system prosper more than people who sacrifice family size, consumption, or status on behalf of global stability. Thus, the most responsible people cannot be seen as living an "easier or better" life than anyone else. Thus, there would be an egalitarian aspect to many plans for long-term stability. Because egalitarian systems offer little external incentive for active
7.2 Cooperative Behavior Studies of interactive behaviors suggest that many actors gain more through sub-optimal behavior than through cooperative behavior - at least in the short run
45
participation, the human dilemma in realizing a sustainable society is in part a dilemma of motivation.
"neutral" viewpoint from which to evaluate linkages in the diagram. 1
8. REPRESENTATIVE APPROACHES TO GLOBAL STABILITY A limited sample of contemporary organizations seeking to motivate society to live within ecological and socioeconomic constraints includes: 1. The United Nations. 2. The Bulletin of Atomic Scientists. 3. Environmental organizations. 4. Professional societies (including IFAC) 5. A variety of international cooperative groups. Until recently, these and related groups focused primarily on socioeconomic and political affairs. Their focus must now be broadened to include the environment as a major factor in international stability. Figure 1. 1. Population and consumption 2. Resource balance 3. Environmental loading 4. Zero-sum game becomes negative-sum 5. Economic inequality 6. Social participation
9. CONDITIONS FOR SUSTAINABLE STABILITY Based on developments cited above and on global modeling research, presented in more than forty papers by the author, the following list is offered as a set of minimum conditions for sustainable global social stability. 1. Reducing population and consumption to sustainable levels. 2. Balancing demand for resources with the supply of resources. 3. Reaching and maintaining environmental stability. 4. Avoiding evolution of zero-sum societal games to negative-sum games. 5. Reducing economic inequality. 6. Building social participation for underemployed people.
Clearly, these minimum stability conditions will be difficult to achieve. The alternative to a workable modus operandi and a move toward sustainable stability seems to be a spiral toward a contest of all against all, leading to global conflict. Meeting challenges delineated in this paper calls for commitment by all people to work together for socioeconomic and environmental stability as a viable path to a meaningful human future.
It is clear that absolute equality is not realistic, but at some level, perceived inequality tends to destabilize society. Many social interactions have been experienced as zero-sum games. If interactions become too competitive (example: demand outpacing supply), competition can become a negative-sum game and lead to destructive behaviors (crime, terrorism, war).
REFERENCES Kile, F.O, (2003), Cascading Underemployment and its Effects. In: Preprints, IF AC Workshop on "Technology and International Stability" (SWIIS '03), Waterford, Ireland, July, 2003. Kile, F.O. (1984), Cultural Factors and Values as Influences on International Decision Making. In: Preprints, IX Triennial World congress of the International Federation of Automatic Control, Budapest, Hungary, July, 1984, Volume IV, 5055.
Figure 1. diagrams coupling among minimum conditions for social stability. This matrix is tightly coupled. It is not possible to diagram objectively the coupling coefficients or time delays among factors because the viewpoint of each analyst is biased by his/her participation in the system. There is no
46
Kobe, D.H. (1962), A Theory of Catalytic War, In: Journal of Conflict Resolution, Vol. 6, No. 2, June, 1962, 125-142. Kuhn, S. (2003), "Prisoner's Dilemma", The Stanford Encyclopedia of Philosophy (Fall 2003 Edition), Edward N. Zalta (ed.) (2003), URL
. UN Environmental Program (2002), Vital Water Graphic website 27, 2002. USGS - United States Geological Survey Landsat Program (2003), Gallery Detail, Image 37B; Acquisition Date February 4, 2003.
47
This page intentionally left blank
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
CRITICAL INFRASTRUCTURE
Robert Genser
IFAC-Beirat Austria and Austrian Society for Automation and Robotics Malborghetg. 27-29,6/6, A-1100 Vienna, Austria
[email protected]
Abstract: The meaning of security, safety and dependability is pointed out. It is analysed if terrorism on critical infrastructure may endanger the stability of a hyper system more than other causes. Copyright© 2006 IF AC Keywords: Infrastructure, security, safety, dependability, stability
1.
INTRODUCTION
of interest, the stock of fixed capital equipment in a country, including factories, roads, schools, etc., considered as a determinant of economic growth (Collins English Dictionary).
The incident of terrorism in USA in 2001 caused an almost global interest in security and the start of many activities. Security was already recognized as an important fact by switching from trustable human structures to digital data processing and the security aspect got great importance finally by the spread of Internet.
Infrastructure is static by many reasons. Infrastructure fixes others like dwelling, location for production etc. Limitation on land-use, environmental restrictions or lack of financial resources complicates the change of given patterns. Limits on frequency ranges, which can be allocated, are given for wireless networks.
The complexity of possible functions and wide area of application of new technologies increased the risk also for critical infrastructures. The problem becomes aggravated because experience of some actors for adequate development on a global level seems to be missing now, also by the fast introduction of new technologies. Historical facts and the general aspect of infrastructures are not recognized. It is stuck to the catchword Security instead to consider dependability or to understand that security may be a conflict with safety. That experts from the field of computers may not have the experience for electrical power distribution or railways is understandable, but even on EU (European Union) level in the energy sector, security is understood as safety.
The network for distribution of electrical energy is extremely sensitive because of physical reasons. Severe blackouts of large areas have been caused by problems with electrical stability, see for example (Fairley, 2004; Brauner, 2003). Road transportation has high flexibility concerning the selection of routes. In the past rail transportation was designed to fit for war situations. The history shows that impact by war or by attacks of partisans could reduce the performance but the hyper-system did not become unstable. The network of transportation is only one part of the system. The optimization comprises also for example warehouses and logistic strategies.
2. CRITICAL INFRASTRUCTURE Water supply or pipelines in general have the advantage that disturbances can be handled easier as effects may have a time delay on account of storages
Infrastructure means the basic structure of an organization, system etc. in general and, in the case
49
and relatively slow dynamics. Biological indicators like fishes can be used for monitoring the water quality in waterworks, which may be adequate for ensuring safety of drinking water in connection with corresponding storage-system.
UML (Unified Modelling Language), see (OMG, 2003), have extended the application of analytical approaches. The demand to comprehend complex systems as well as to tackle risk analysis for safety related applications has stimulated to develop tools like CORAS (Fredriksen, et al., 2002). Object oriented (Rumbaugh, et al., 1991) formal methods (Jones, 1990) are a prerequisite for designing complex systems in complex environment.
The impact of nature, like flood, avalanche, earthquake etc., and strikes has caused numerous and more severe effects than attacks by terrorists. The change of airport of destination as a result of weather conditions is not unknown even in case of advanced control systems. Good design of infrastructure and hyper- system can deal with such problems. Of course it is a bargaining process between economics, safety, security, reliability, insurance, etc. at infrastructures and hyper-system.
Even though such new approaches are evolving, uncertainty or possibilities are not considered in a suitable manner. Single criteria functions are used according classical Operation Researches also with weighting conflicting objectives. This is not according requirements of reality (Genser, 2004; Makowski, et al., 2003)
The US incident had more psychological effects than to endanger the USA really even if the World Trade Centre was not prepared for such an attack.
But the experience obtained in the field of human organizations is still valid also in the environment of new technologies. For example, separation to some extent in functional or geographical units and diversity are improving performance and stability if the demand on capacity needed for communication, monitoring, and control is taken in account for optimization (Genser, 1979).
The security of communication networks is threatened more at present than in the past because of digital data processing methods and the Internet used up to now. Of course also in the classical telephone network ears dropping was known. But the attacks have been related more or less to secret services. The possibility for access needed more effort and the range of perpetrators did not comprises even pupils. The problem at present consists in using such digital data communication systems for extensive control and data processing in critical infrastructures, like electrical power networks are depending on SCADA (supervisory control and data acquisition). Dangerous solutions spring up because of only tacking in account the background of computer expertise and of economics. Experience on systems in real life has been neglected.
3. SECURITY Secure has the root in the Latin word securus, which means: without care. Security has the meaning of precautions taken to ensure against theft, espionage, etc., among others like the now frequently used sense of protection of data (Collins English Dictionary). At present the term SECURITY is used in the meaning of SAFETY even in English sometimes. But the real mess consists for some languages if a corresponding word is tried to find for translation. Chinese characters are available for safety (Japanese ANZEN) and protection (Japanese BOOGO). But no character is corresponding one to one with the term security. In German it is switched between Sicherheit (safety) and Schutz (protection). The Transportation Group of the Austrian Chamber of Commerce translates security to Sicherung (securing), which would fit to some extent. The term offentliche Sicherheit correspondences to public security.
Usually the technical infrastructure is in the scope of interest. But the human communication network, organizations, educational infrastructure and training as it is also for health systems and technical rescue organizations cannot be neglected in particular in the long range of systems stability. For example a railway branch-line in Silesia was in operation independent of change of authorities with time delay during war and even used own vouches till hand over was arranged finally. It is known that a change of such structures is needed for influencing the performance. The measures may be to forestall dedicated information flow or even to change the school system. The optimization of infrastructures was done mainly step by step as a learning process in real life getting long-range experience about centuries. Because powerful computers had not been available in the past, methods and tools for analysing the impact of infrastructure to hyper-system are just under development (Panzieri, et al., 2005; Johansson, et al., 2006; Masera, et al., 2006). Efficient computer systems and advanced programming languages like
The evolving of data processing by computers and digital data transmission enforced measures, which are covered by the term data security. New regulations have been required because the classical protection of data by kind of media like paper and ink as well as by regulations for privacy and secrecy was not fitting anymore. Data security is covered in German speaking countries by Datenschutz as protection of data against espionage, criminal attack, for privacy and secrecy, etc. Data security says nothing if the data itself can be used in a safetyrelated application. It is only ensured that the data
50
have been protected concerning some kind of their secrecy and that they are as they are intended and produced originally.
Detection of adversaries and interests for attack (for example by traps) Increasing fear for attacker in respect to countermeasures (CA VE CANEM!) Smoothing down hostilities Strong organization with learning feedback and effective training
This ambiguity and also the neglect of the original meaning of data security would not matter if security and safety would not require quite opposite strategies and measures.
The safety approach is outlined in 1998) for example.
(IEC 61508,
3.1 Security and Safety Security and safety have to be considered together for getting optimal solutions. Priorities are developed in a bargaining process as it is given for safety and reliability. The conflict of goals can be resolved in general if the goals of hyper-system are taken into consideration.
The transport of dangerous goods can be an example for pointing out the problem. If security is and should be regarded as a result of protection against hostile attacks in war, or for example by terrorists or protection against crime or unauthorized access in general, the content of transport should be not shown open. The routes should be secret and changed by random as well as it is done for the timetable.
Some groups at EU strive for having a similar approach for security as it is given for quality management according ISO 9000. It is the belief that security can be managed inside an enterprise, which will have also the financial burden, and it can be guaranteed by a certification. This may fit for data security. But security for society would not be improved much, if companies in competition would exercise such tasks in their own manner. About that companies would not have access to knowledge bases at secrete services. Even though the delicacy of public on data security needs not to be mentioned. Security of critical infrastructures has another quality than the task of securities in respect to protection of plants or houses. Authority can order private securities to accomplish some tasks like control at airports. But public security {offentliche Sicherheii) is a governmental duty and many kinds of hostilities can be smoothed down only by governments.
If safety is examined, vehicles with dangerous goods should be well marked according the UN-code. Information should be given and well in advance to traffic management and rescue teams. Strategies considering only the security aspect would quite clearly reduce safety. Security deals with intelligent adversaries. It would be wrong to embrace all kind of threats like earthquakes, avalanches, flood, animal intrusion, etc., under the cover of security measures. Such threats should be investigated and got under control in the safety approach as it is done for non-hostile human behaviour or possible faults of technology. Safety needs clear and understandable documentation in respect to recognition, actions, operation, maintenance, etc., for all affected.
3.2 Risk Management
Measures for data security are outlined for example in (ISO/IEC 17799, 2000). But in general security is a dynamic process with learning. It comprises: Reducing effective radius of access by separation and buffer zones for reducing effects of attacks Dedicated networks, separated and physical different systems for tasks Fall-back, stand-by, diverse, and redundant solutions Robust, decentralized solutions Increasing effort needed for getting access, knowledge, and for causing effects (for example besides protection by barriers of concrete the building itself has a light weight and open construction for reducing the impact of blast) Camouflage Actions and measures partly done by random
If probabilities of events are available the risk can be evaluated, as it is defined mathematically, as the product of probability with the metric of outcome (like financial loss expected). This mathematical approach has the drawback that for example loss of human live has to be combined with loss of equipment in the level of a monetary metric. Also it is sometimes neglected, that the risk can depend on location, time, function, state, context, etc., with dynamics. The risk to get access to a computer system, which is shut down is different to the risk of a system in operation Only to consider the worst case would be irrational in many cases. Meteorites are usually not taken in account. This mathematical function for expectation has the same limits for real life problems as it is for single criteria function as already mentioned, see also (Ladkin, 1998). In general in real life, it is dealt with danger in a flexible, situation oriented way. Possible rockslide cannot be predicted. But a danger sign advise the driver to be on the alert. The driver slows down if
51
rockslide happened otherwise the driver tries to escape as fast as possible the dangerous zone.
for in a hyper-system. Transportations consist of different infrastructures like infrastructure for road and rail transportation as well as the tasks for supply comprise also the infrastructure for logistics and storages. All this possible systems and modes of transportation have to be taken in account for evaluating the dependability of a task for supply. An example is the famous Luftbrucke for Berlin. In this case it was switched from land to air transportation as the dependability of one solution was not available any more.
A high degree of modelling is used for evaluating strategies against threads. Not only analytical models rather hybrid models are applied. Human beings are included in simulators. The sand-table exercise of military of the past is developed further with advanced technology. Pattern recognition and human oriented presentation of results are extending the solution power. Classes or pattern, like the Portfolio analysis, are presented instead of numbers. Such approaches improve also risk acceptance and risk assessment. Just in the field of energy supply, a increased risk is taken in account not only of lack of investment because of severe short range economical competition rather by strategies for enforcing better saving of energy and for switching to alternative energies.
But dependability is only one objective among others in a system especially in the hyper-system. Energy supply shows that not only short-range economical objectives reduce investment needed for an acceptable level of dependability rather environmental objectives have a strong impact at present. The strategy to enforce energy saving and to switch to alternative energies production is hampering wilfully the elimination of dangerous shortage on capacity of power production. A similar situation is given for road traffic.
In complex systems with very long-range of use, not all can be grasped by human being and foreseen. Beside the risk-based management a precautionbased management is considered. The time of precaution-phase is not only needed for learning the use of new technologies and getting the skill rather for adapting social and legislative systems to new demand if stability and human solutions are strived for.
5. CONCLUSION In spite of that terrorists are suicide oriented and well trained the main threads for critical infrastructures are given by nature and physical conditions. A holistic systems approach is a precondition. Smoothing reasons for attacks are more effective than protection against attacks.
Most of the research is done about the present situation. But investigation should be done before layout of system. Effective solutions can be found if a holistic systems approach is chosen. Then measures for reducing thread can improve the gaining of other objectives as well. For example, to provide ramps instead of elevators only for having access to railway platforms allows access for handicapped not only during normal condition but also in case of some energy shut down and reduces panic effects in general in case of overcrowding or evacuations. The use of small power plants instead of a big one may increase the costs. But the effect of attacks is reduced and maintenance as well as adaptation are smoother and more flexibly.
It should be taken care on terminology otherwise irrational solutions are enforced. Critical infrastructures together with hyper-system should achieve dependability as the most important objective. Measures for safety can be quite opposite to measures for security. As it is given for energy supply and road traffic, dependability of an infrastructure given may be reduced wilfully if for example objectives concerning environment seem more essential.
REFERENCES 4. DEPENDABILITY Brauner, G. (2003). Zuverlassigkeit und Sicherheit in der Energieversorgung. e &i, 120, 133-137. Fairley, P. (2004). Unruly Power Grid. IEEE Spectrum Int, 42, 16-21. Fredriksen, R., M. Kristiansen, B. A. Gran, K. Stolen, T. A. Opperud and Th. Dimitrakos (2002). The CORAS Framework for a ModelBased Risk management Process. SAFECOMP 2002 (Anderson S, et al., (Ed)), Springer-Verlag, Berlin, 94 105. Genser, R. (1979). Self organizing Systems for Safety in Railway Operation. RP. , Kyoto University, Dep. of Appl. Mathematics and Physics.
Industry, hospitals, households, etc., are not interested in security of infrastructure as long as for example power supply is dependable. Dependability covers (Laprie, 1992) safety, security, reliability, availability, maintainability, etc. The reliability alone for supply of electricity by 99% during time interval of interest would not be satisfying if in the 1% outside of the supply of energy dangerous voltage peaks can happen. Of course dependability of one infrastructure is only one part of the real dependability, which it is strived
52
Genser, R. (2004). Goals in new complex developments. Vroc.IF AC Conf. on Advanced Control Strategies for Social and Economic Systems, Vienna, 75-80. IEC 61508 (1998). Functional safety of of electrical/electronic/programmable electronic safety-related systems. Int. Electrotechnical Commission, Geneva. ISO/IEC 17799 (2000). Code of practice for information security management. Int. Standardization Organization, Geneva. Johansson, J., H. Jonsson, H. Johansson (2006). Analysing societal vulnerability to perturbations in electric distribution systems. Proc. Int. Workshop on Complex Network and Infrastructure Protection 2006, Rome, 334-345. Jones C. B. (1990). Systematic software Development using VDM. Prentice-Hall International, Englewood Cliffs, New Jersey. Ladkin,P. B. (1998). www.rvs.unibielefeld.de/publications/Reports, Article RVSOcc-98-01. Laprie, J.-C.,(1992). Dependability. Springer-Verlag, Berlin. Makowski, M., A. Wierzbicki (2003). Modeling knowledge. Applied Decision Support with Soft Computing (Yu, X., J. Kacprzyk, Ed.), SpringerVerl., Berlin, 6-60. Masera, M., I. N. Fovino (2006). Models for security assessment and management. Proc. Int. Workshop on Complex Network and Infrastructure Protection, Rome, 403-414. OMG (2003). Unified Modeling Language Specification. Verion 1.5. Object Management Group, http://www.omg.org/uml/. Panzieri, S., R. Setola, G. Ulivi (2005). An approach to model complex interdependent infrastructures. Proc. 16th IFAC World Congress 2005, Praha, p. 02774. Rumbaugh, J., M. Blaha, W. Premerlani, F: Eddy, W. Lorensen (1991). Object Oriented Modelling and Decision. Prentice-Hall Int., Englwood Cliffs, New Jersey.
53
This page intentionally left blank
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELS EVI E R
IFAC PUBLICATIONS
DECISION MAKING IN TOC-PRODUCT-MIX SELECTION VIA FUZZY COST FUNCTION OPTIMIZATION
'"i
"i
*3
'y
A
A. Bhattacharya , P. Vasant, C. Andreeski, N. Barsoum , T. Kolemisevska , A. T. Dinibutun5, and G. M. Dimirovski5 1
The Patent Office Kolkata, Bouddhik Sampada Bhawan CP - 2, Sector - V, Kolkata - 700 020, West Bengal, India E-mail: arijit.
[email protected] Universiti Teknologi Petronas 31750 Tronoh, BSI, PerakDR, Malaysia. E-mail:
[email protected] 3
St Clement Ohridski University, Faculty of Tourism and Hospitality "Kej Marsal Tito " 95, MK-6000 Ohrid, Rep. of Macedonia E-mail: cvetko.andreeskiffiuclo.edu.mk: cipuslj'uffimt.net.mk: Fax: +389-96-262-147 SS Cyril and Methodius University, Faculty of Electrical and Computer Eng. Karpos 2 b.b., MK-1000 Skopje, Rep. ofMacedonia E-mail:
[email protected]. edu. mk Dogus University, Faculty of Engineering, Faculty ofEngineering Acibadem, KadikoyTR-34722 Istanbul, Rep. of Turkey E-mail:
[email protected];
[email protected]
Abstract: This paper presents an innovated fuzzy decision-making under Theory-ofConstraints for the product-mix problem using a smooth logistic membership function for finding out fuzziness patterns in disparate level of satisfaction. Agility of this membership function when applied to real-world product-mix problems has been validated. This contribution is believed to provide a robust, quantified monitoring of the level of satisfaction among decision-makers and to calibrate these levels of satisfaction against decision-makers' expectations, thus providing a computational intelligence procedure. Inefficiency of traditional linear programming in handling multiplebottleneck problem through the traditional Theory-of-Constraints concept is discussed via an illustrative example. Copyright © 2006IFAC Keywords: Degree of fuzziness; fuzzified linear programming, product-mix decision.
1. INTRODUCTION
decisions to reduce performance from the level implied by direct effects alone Anderson (2001). Product-mix and volume are important variables in determining the cost effectiveness of new technologies, and include in the model customer demand projections that reflect market trends (Morgan and Daniels, 2001).
Product-mix flexibility is one of the major types of manufacturing flexibility, referring to the ability to produce a broad range of products or variants with presumed low changeover costs Bengtsson and Olhager (2002). Product-mix acts through capacity management
55
to Saaty (1996) for the selection of product-mix for efficient manufacturing in a semiconductor fabricator. Product-mix and the acquisition of the assets needed for their production are interdependent decisions (Kee, 2004). The work of Kee and Schmidt (2000) developed a general model of the product-mix decision. Bhattacharya et al. (2004) proposed De-novo programming approach as an alternative to LP where multiple constraint resources exist. Vasant et al. (2005) investigated an industrial application of fuzzy linear programming through a modified logistic membership function using a set of real life data collected from a Chocolate Manufacturing Company. Souren et al. [33] discuss some premises, in the form of a checklist, for generating optimal product-mix decisions using a TOCbase approach. The checklist for TOC-based productmix solution appears to be a hypothetical one when it leads to "optimal solution"; in reality product-mix constraints do not appear to be single but multiple constraint resources exist hence invalidate this investigation.
In the early 1990s, Goldratt (1993) improved his concept of Theory-of-Constraints (TOC), which emerged from the theory of constraints Goldratt (1990), by means of management philosophy on improvement attained via identifying the constraints to increasing profits. It was shown, the product-mix decisionproblem under TOC could be mathematically tackled as a linear programming (LP) model. Luebbe and Finch (1992) compared the TOC and LP using the five-step improvement process in TOC. They categorize the TOC as a manufacturing philosophy and LP as a specific mathematical optimization technique. It is stated that the algorithm could optimize the productmix as ILP. Further, it is revealed that the algorithm is inefficient in handling two types of problems. The first type includes problems associated with adding new product alternatives to an existing production line (lee and Plenart, 1993). The second type includes problems concerning more than one bottleneck in which the algorithm could not reach the feasible optimum solution. Later on the concept of the dominant bottleneck is proposed as a remedy for finding our feasible optimum solution.
Further, a conclusive summary criticism of the existing TOC product-mix decision literatures in general is presented as follows: - The TOC heuristic is implicit, and to some extent infeasible, for multiple constrained resource productmix decision problems. Real-world large-scale problems may have several bottlenecks and, therefore, it is not possible to find out optimum feasible solutions in acceptable computational time. - Certain degree of fuzziness in TOC product-mix decisions may present though criteria for TOC productmix problems are crisp. - The decision-makers (DMs) should be aware of their level of satisfaction while performing product-mix decisions through TOC. - Sensitivity of the product-mix decisions should be incorporated in the TOC heuristics in order to get a bottleneck-free, optimal product-mix solution with a certain pre-specified level of satisfaction of the DM. - Tripartite relationship among DM, analyst and implementer for TOC product-mix decision is essential to solve any industrial TOC product-mix problem having multiple constrained resources.
Lee and Plenart (1993) illustrate two examples of product-mix decision problem and conclude that TOC solution is inferior to the optimum solution and may possibly be infeasible when multiple constrained resources in a plant exists. Fredendall and Lea (1997) revise the TOC product-mix heuristic to identify the optimal product-mix under conditions where the original TOC heuristic failed. Methods to identify a product-mix that maximizes profit have been studied extensively. One method, known as integer linear programming (ILP), is often used to optimize the product mix. But it requires a high level of expertise to formulate and may take hours to solve. Researches reveal that TOC heuristic is simpler to use than an ILP. Hsu and Chung (1998) present a dominance rule-based algorithm that classifies non-critically constrained resources into three levels for solving the TOC productmix problem when multiple constrained resources exist. Nonetheless, some researchers identify conditions under which TOC could create a non-optimal productmix (Lee and Plenart, 1993; Plenart, 1993). The study of Lea and Fredendall (2002) provided insights into the product-mix decision considering fluctuations caused by environmental uncertainty. Letmathe and Balakrishnan (2005) presented two mathematical models that can be used by firms to determine their optimal product-mix and production quantities in the presence of several different types of environmental constraints, in addition to typical production constraints. Chung et al. (2005) proposed an application of the analytic network process (ANP) due
2. A FUZZY SYSTEM APPROCH TO TOC PRODUCT-MIX PROBLEM The authors are not aware of literature on humanmachine-interface-fuzzy-logic-programming (HMIFLP) approach being used in making the product-mix decisions under TOC heuristic more explicit. One objective of the present work is to make the conventional TOC product-mix decision heuristics
56
explicit when multiple constrained resources exist. Another objective is to find out fuzziness patterns of TOC product-mix decision heuristic indicating disparate level of satisfaction of the DM.
availability of the variables are represented by degree of fuzziness. A MF is flexible when it has vertical tangency, inflexion point and asymptotes.
2.1. Fuzzy Based Intelligent Product-Mix Decision under TOC Assumption
1
/(*) =
Intelligent computing research aims at in bringing intelligence, reasoning, perception, information gathering and analysis to computer systems. An intelligent decision rule has been used generating the coefficients of the fuzzy constraints in the decision variables. The rule declares a function Cj and assigns the constants in the MF. The aim is to produce a rule that works well on previously unseen data, i.e., the decision rule should "generalize" well.
B Cerx 0
X<XT
(2) J\> T
^N
J\>
^"N J\>J J
X> X,
u
The equation (1) has asymptotes at f(x) = 0 and f(x) = 1 for appropriate values of B and C. Further, the logistic function equation has a vertical tangent at x = x0, x0 is the point where f(x0) = 0.5. The logistic function has a point of inflexion at x = x0, such that f\xQ) = ao, /"(x) being the second derivative of f(x) with respect to x. A MF of S-curve nature, in contrast to linear function, exhibits the real life problem. The generalized logistic MF is defined as in Figure I.
The MATLAB® function "linprog" has been called in this work in the following way while using the designed MF: [X, Z]=linprog(f,A,b,[ ],[ ],0,inf); cj=cjO+((cjl-cjO)/gamma)*(log((l/B)*((A/mucj)-l)));
1.0
The rule supports this work by allowing the call to the function linprog to contain a variable which is automatically set to different values as one may request. The logical way in which FLP acts as an agent in the HMI system includes many if- else rules.
0.999 0.5
0.001 0
2.2. Membership Function Design
Fig. I. The S-shaped membership function used in FLP approach
MATLAB® fuzzy toolbox (Stephen, 2002) contains 11 built-in MFs. Present model utilizes an improved version of No.7 MF. All the built-in MF includes 0 and 1. In the present work 0 and 1 have been excluded and the S-shaped MF has been extensively modified suiting the requirements of product-mix decision problem. In this work, we modify and employ a logistic non-linear MF as given in equation (1).
B /(*)
=
yx
x
The S-curve MF is a particular case of the logistic function defined in equation (2). The S-curve MF gets specific values of B, C and y. The logistic function as defined in equation (1) was indicated as S-curve MF due to Goguen (1969). The modified S-curve MF can be more easily handled, in product-mix decision problem under TOC than other non-linear MF. Besides, the S-curve MF is considered to have more suitability in sensing the degree of fuzziness for complex productmix decision problems under TOC. The modified Scurve MF changes its shape according to the fuzzy crisp values of a DM, and therefore a DM finds it suitable in applying strategy to product-mix decision problem using LP.
(1)
where B and C are scalar constants and y, 0 < y < QO is a fuzzy parameter for measuring degree of vagueness, wherein y = 0 indicates crisp. Fuzziness becomes highest when y —> oo . The logistic function is considered as an appropriate function to represent vague goal level for product-mix decision under TOC. The logistic function (1) is a monotonically non-increasing function. This is very important because, due to uncertain environment the
In order to fit into TOC product-mix decision heuristic in order to sense its degree of fuzziness using the intelligent approach we modify and re-define the equation (2) as follows:
57
x<xc 0.999 B ju(x) = 1 + Cerx 0.001 0
X
= xa
(3) b
xa <x<x b
x == x X
>xb
In Figure I there is shown the improved S-curve considered in here. In equation (1) the MF is re-defined as 0.001 < f(x) < 0.999. This range is selected because in real-world TOC heuristic, the physical capacity requirement cannot be 100% of the plant requirement. At the same time, the capacity requirement cannot be 0%. Therefore there is a range between x0 and xi with 0.001 < ju(x) < 0.999. This
(5)
5R+ 10S + 5T + 15U < 2400,
(6)
10R + 5S + 10T + 10U < 2400,
(7)
OR + 30S + 15T + 5U < 2400,
(8)
5R + 5S + 20T + 5U < 2400,
(9)
5R + 5S + 5T + 15U < 2400,
(10)
20R + 5S + 10T + 0U < 2400,
(11)
and also subject to the following market constraints:
concept of range of JLl(x) is used in this work. Solving equation (3) with the boundary conditions, one obtains C = 0.001001001,£=l,and 7 = 13.8135096.
0 < R < 70,
(12)
0 < S< 60,
(13)
0 < T < 50,
(14)
0 < U < 150.
(15)
Solving the above equations (4) to (15) with MATLAB® fuzzy toolbox and using the modified flexible S-curve MF one gets the optimal feasible product-mix solution as R = 50.667; S = 38.167; T = 50.000 andU = 101.000. The corresponding throughput is found to be US $11873. These values correspond to the values that have been found by Hsu and Chung (1998), hence our approach yields comparable solution. A critical look on Table 2 reveals that the present FLP approach is best suited in reaching at the optimal product-mix maximising throughput under TOC product-mix decision problem.
2.3. Fuzzified Intelligent TOC Product-mix Decision A product-mix problem has been discussed in this research work to show the effectiveness of the proposed model when multiple constrained resources exist. Four different types of products, viz., R, S, T & U, are produced. There are seven different resources, A to G. Each resource has a capacity of 2400 minutes. Table 1 shows the loads required for producing one unit of products of R, S, T and U. The details as well as a schematic illustration of problem are found in Hsu and Chung (1998).
2.4. Level of Satisfaction and Fuzziness Patterns Measurement in TOC
From a detailed computation, using the conventional TOC approach (see Onwubolu and Mutingi, 2001) it is found that only resource G is underutilized and resource E runs in its full capacity, while resources AD and F are overloaded. Resource B is the CCR as it is the most overloaded. The order of production is product R, T, S, and U. The total throughput is (70 x 80 + 60 x 60 + 50 x 50 + 80 x 30) = 14100. The CCR is still there with resources A and D, as these two resources exceeds the available maximum capacity of 2400 minutes. Thus, it appears the TOC solution is infeasible when multiple constraint resources exist.
A relationship among the level of satisfaction of the DM, the degree of vagueness and the Z-value (total throughput) is found, and the respective relationships with the possibility and fuzziness have been established (se Figures II - V). It is observed that the plot behaves as a monotonically increasing function. Figure III illustrates behaviour of Z-values with respect to the level of satisfaction at disparate fussiness. It should always be noted that higher the fuzziness, y, values, the lesser will be the degree of vagueness inherent in the decision. Therefore, it is understood that higher level of outcome of decision variable for a particular level of satisfaction point, results in a lesser degree of fuzziness inherent in the said decision variable. The fuzzified intelligent model calculates product-mix at disparate fuzziness (y) and level of satisfaction (cp). It is to be noted that JLX = (1 - cp), JLL being the degree of possibility.
In the sequel, however, a detailed computational analysis with the fuzzified intelligent model employed for the TOC problem that yields feasible solution is presented. The dual simplex LP formulation for the product-mix decision is as follows: Maximize Z = 80R + 60S + 50T +30U
20R + 10S + 10T +5U < 2400,
(4)
subject to the following technological constraints:
58
Table 1: Load requirements for producing products Products
Weekly market potential (units) 70 60 50 150
R S T U
Unit selling price (US $ / unit) 90 80 70 50
Processing time per unit (min)
B 20 10 10 5
5 10 5 15
G
D 10 5 10 10
— 30 15 5
5 5 20 5
5 5 5 15
20 5 10
Raw material cost per unit (US $ / unit)
Throughput per unit
(US$ /unit)
10 20 20 20
80 60 50 30
Table 2: Throughput comparison Problem
No. of Resources
The standard TOC based solution
LP solution
Dominance rule based solution
GA based solution of Onwubolu and Mutingi (2001)
Fuzzy LP based solution
Hsu and Chung (1998)
7
14100
—
11873
11860
11873
«to*
1 06
01
03
04
06
06
07
06
09
Fig. III. Total number of products and P (also indicating level of satisfaction versus fuzziness y , at disparate fuzziness
Fig. II. Characteristic Z-value curves with respect to total number of products.
.-•'
01
02
03
04
05
OS
07
0.6
0.9
0
1
Fig. IV Relationship between fuzziness y and the degree of possibility JU . Figure IV shows indifference curves at upwardly increasing level of satisfaction for fuzziness versus total number of products. Figure IV shows that at higher degree of fuzziness lesser total number of product-mix is
Fig. V. Total number of products P versus the fuzziness y and the level of satisfaction
59
Chung, S.-H., A.H.I., Lee, and W. L. Pearn (2005), Analytic network process (ANP) approach for product mix planning in semiconductor fabrication. Intl. J. of Production Economics, 96 (1): 15-36. Fredendall L.D, and B. R. Lea (1997), Improving the product mix heuristic in the theory of constraints. Intl. J. of Production Res., 35 (6): 1535-44. Finch, B. J., and R. L. Luebbe (2000), Response to 'Theory of constraints and linear programming: a re-examination'. Intl. J. of Production Research, 38 (6): 1465-66. Goldratt, E. M. (1990), What Is This Thing Called Theory of Constraints. New York: North River Press. Goldratt, E.M. (1993), What is the theory of constraints? APICS-The Performance Advantage, 3 (6): 18-20. Goguen, J. A. (1969), The logic of inexact concepts. Syntheses, 19:325-373. Hsu, T.-C, and Chung, S.-H. (1998), The TOC-based algorithm for solving product mix problems. Production Planning &Control, 9: 36-46. Kee, R. (2004), Evaluating product mix and capital budgeting decisions with an activity-based costing system. Advances in Management Accounting, 13: 77-98. Kee, R., and C. Schmidt (2000), A comparative analysis of utilizing activity-based costing and the theory of constraints for making product-mix decisions. Intl. J. of Production Economics, 63 (1): 1-17. Lea, B.-R., and L. D. Fredendall (2002), The impact of management accounting, product structure, product mix algorithm, and planning horizon on manufacturing performance. Intl. J. of Production Economics, 79 (3): 279-99. Lee, T. N., and G. Plenert (1993), Optimizing theory of constraints when new product alternatives exist. Product. & Invent. Management J., 34 (3): 51-57. Luebbe, R., and B. Finch (1992), Theory of constraints and linear programming: A comparison. Intl. J. of Production Res., 30 (6): 1471-1478. Morgan, L. O., and R. L. Daniels (2001), Integrating product mix and technology adoption decisions: a portfolio approach for evaluating advanced technologies in the automobile industry. J. of Operations Management, 19 (2): 219-38. Onwubolu, G. C , and M. Mutingi (2001), A genetic algorithm approach to the theory of constraints product mix problems. Production Planning & Control, 12 (1): 21-27 Plenart, G. (1993), Optimizing theory of constraints when multiple constrained resources exist. European J. Operat. Research, 70 (1): 126-33. Saaty, T.L. (1996), The Analytic Network Process. Pittsburgh, PA: RWS Publications, 1996. Souren, R., H. Ahn, and C. Schmitz (2005), Optimal product mix decisions based on the Theory of Constraints? Exposing rarely emphasized premises of throughput accounting. Intl. J. of Production Res., 43 (2): 361-74. Stephen, C. J. (2002), MATLAB Programming for Engineers. Australia: Brooks/Cole, 2002. Vasant, R., Nagarajan R., and S. Yaacob (2005). Fuzzy linear programming with vague objective coefficients in an uncertain environment. /. of the Operational Research
of fuzziness lesser total number of product-mix is obtained. Figure V demonstrates an interesting phenomenon also found in the nature: at lower cp the chances of getting involved higher degree of fuzziness (y) increase. Thus a DM's level of satisfaction should be at least moderate in order to avoid higher degree of fuzziness while making product-mix decision under TOC. Figure VI depicts a surface-cum-contour plot illustrating relationships among three prime parameters of product-mix decision. It reveals that the maximum and the minimum number of products to be produced, via utilizing resource capacity between 0% to 100%, are fixed. And the DM can adopt the intelligent decision ranging the said maximum and minimum values at his/her desired level of satisfaction.
3. CONCLUSIONS It was shown above that the fuzzy LP approach proposed for solving product-mix-selection problems outperforms considerably the earlier proposed approaches. The solution by Hsu and Chung via dominance-rule technique yields the optimal throughput as US $ 11,873, which is identical to the solution found by the present FLP methodology. Thus it is believed to be considerably better suited for this class of problems. The flexibility of the model lies in the membership function design. The present approach, in a nutshell, fuses two most important measures for the decision makers as well as implementers, into the existing TOCLP product-mix heuristic. In contrast, the genetic algorithm (GA) approach by Onwubolu and Mutingi (2001) fails to maximise the throughput. Moreover, even a cumbersome dominance rule (Hsu and Chung, 1998) is not required when the present approach is applied. Thus fusion of DM's expectations as well as vagueness of decision into a single model makes the fuzzified intelligent approach robust and more efficient to apply in TOC product-mix decision.
REFERENCES Anderson, S. W. (2001), Direct and indirect effects of product mix characteristics on capacity management decisions and operating performance. Intl. J. of Flexible Manufacturing Systems, 13 (3): 241-65. Bengtsson, J., and J. Olhager (2002), The impact of the product mix on the value of flexibility. Omega 2002; 30 (4): 265-73. Bhattacharya, A., B. Sarkar, and S. K. Mukherjee (2004), Use of DeNovo programming in theory of constraints (TOC). Industrial Engineering J., XXXIII (7): 6-11. Building GUI's with MATLAB version 7.0. The Math Works, Inc, USA.
60
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
LEARNMATHS: A CASE STUDY OF THE DEVELOPMENT OF LEARNING SOFTWARE TO SUPPORT SOCIAL INCLUSION M.A. Hersh1 and L. Stapleton^ Electronics and Electrical Engineering1, University of Glasgow, Glasgow G12 8LT, Scotland. Tel: +44 141 330 4906. Fax: +44 141 330 6004. Email:
[email protected] ISOL Research Centre2' Waterford Institute of Technology, Waterford, Republic of Ireland Tel: +353-(0)51-302059, Fax: +353-(0)51-378292, Email:
[email protected]
Abstract: This paper discusses the role of technology in overcoming existing barriers to education and employment faced by people with specific learning disabilities and illustrates the discussion by the example of the LearnMaths toolbox for people with specific learning disabilities in mathematics. The context of the toolbox is respect for equality and diversity and consequently recognition that different approaches to learning are equally valid and that the cognitive processes of people with specific learning disabilities can lead to creativity and innovation. Copyright© IF AC 2006. Keywords: mathematics, specific learning disability, assistive technology, user involvement, empowerment.
populations (Hersh, 2006), giving a need for an influx of younger people to work. However rather than welcoming asylum seekers, many of whom are of working age and have good qualifications, the richer and less unstable countries, which are a minority destination for asylum seekers (Hersh, 2006), detain and deport them. At the individual level, excluded and marginalised individuals experience poverty and discrimination, as well as diminished feelings of self-respect and self-worth.
1. BACKGROUND AND CONTEXT One of the main prerequisites for social stability is a stable environment in which people can live together in peace. This paper takes the view that social inclusion at the margins is a particularly important aspect of social stability. From the point of view of engineering researchers this means prioritising the needs of people who are marginalised by existing social structures, as well as involving them in the design process.
Diversity contributes to the wealth of society and there is even recognition that having a diverse workforce will contribute to a firm's profitability and competitiveness (Bertuglia, 1994). One aspect of diversity is differences in skills and abilities, learning strategies and cognitive processes, as well as areas of learning disability. There is increasing recognition of the learning disability dyslexia, despite some continuing controversy as to whether or not it really exists, and some progress has been made in developing learning approaches and technologies to support people with dyslexia. However less attention has been given to mathematics learning disabilities. Many everyday activities such as shopping, budgeting and decorating a room require basic
The term "social inclusion" is being increasingly used in European and other policy to express a belonging to and involvement in society and an ability to access goods and services and educational and employment opportunities. It is important because many people experience social exclusion and marginalisation due to a range of factors, including poverty, disability, sexual orientation, gender, ethnic origin and immigration status. This has costs to society as well as the individual, as people are forced into a position of dependency rather than being empowered to obtain education, training and employment and contribute to society. Many industrial societies have falling birthrights and ageing
61
numeracy skills. Adults who experience difficulties in telling the time or knowing what coins and notes they need to pay for something may feel inadequate and isolated, considering the fault to be in themselves rather than society. Numeracy skills also facilitate access to computers and the internet. More advanced mathematical skills are required for many careers and scientific and technical education at all levels. Particular difficulties in acquiring these skills are encountered by people with (specific) learning disabilities, such as dyscalculia and dyslexia, leading to potential disadvantage both with regards to everyday activities and education and career opportunities.
3. THE NEED FOR EDUCATION SUPPORT SOLUTIONS Changes in theories of learning from behaviourism to cognitive psychology and social constructivism have had a limited impact on the approaches used with students with specific learning disabilities. There has been a tendency to focus on behavioural approaches and rote learning of maths facts, rather than problem solving or imparting skills embedded in understanding (Woodward and Montague, 2002). Some curriculum aims may also unintentionally disadvantage people with learning disabilities. This has been discussed in the context of calculator use, where it has been suggested that present approaches, which often prohibit calculator use before arithmetic concepts have been assimilated (Orton-Flynn et al., 2000) should be modified to permit appropriate calculator use in combination with learning to estimate approximate answers. This would reduce short term memory demands, which can be a problem for people with specific learning disabilities, without reducing the need for understanding. Other issues relate to whether the currently used algorithms, which have evolved historically, are the most appropriate for students with learning disabilities or whether they would benefit from having the option to choose between several different algorithms (Woodward and Montague, 2002). Studies have also shown that the media chosen can affect learning outcomes and that there are advantages in a multisensory as well as a multi-media approach. However, multi-media and multi-sensory approaches need to be treated sensitively to avoid sensory overload (Beacham, 2002).
2. LEARNING DISABILITY IN MATHEMATICS An estimated 5-8% of school-age children have specific learning disabilities in one or more areas of mathematics (Geary, 2004). Empirical studies have found that children with specific learning difficulties in mathematics often use strategies which do not require mental retrieval of number facts (Gersten et al., 2005). This supports theories that they have poor short term memory retrieval skills (Dowker, 2005). There is also empirical evidence that one of the main distinguishing features of children with dyscalculia is difficulties with multistep arithmetic (Bryant et al., 2000). Since the term mathematics encompasses diverse topics which make different cognitive demands, specific learning disabilities may impact on some areas of mathematics, but not others (Geary, 2004). However most research in the area has concentrated on arithmetic and number skills. A relatively small number of both computer-based and other tools have been developed to support people with (specific) learning difficulties. However most of the commercially or freely available tools focus on children, rather than adults or the full age range. A study of the literature indicates that coverage of mathematics topics is also relatively limited and generally related to basic numeracy skills rather than more advanced topics and concepts.
There has been some progress in understanding the learning processes of people with (specific) learning difficulties. However, a taxonomy of mathematical learning difficulties has not yet been developed. Neither has a categorisation of the different areas of mathematics, correlated to the different types of mathematical learning difficulties. Consequently, the assistive technologies available to people requiring support in this area tend to be narrowly focussed and relatively inflexible. What is needed is a comprehensive assistive technology solution which provides a coherent set of tools for the user. The author's call this the 'LearnMaths Toolkit'.
There is therefore a need for further research on tools, methodologies and learning approaches to support mathematical and numeracy learning by people with dyscalculia of all ages and stages of education. There are also questions as to the role of (computer) technology in this process, whether and in what circumstances it can be an enabler rather than a further hurdle to be overcome and the appropriate balance between the computer based resources and other types of support. The authors attempt to address the following proposition: Proposition: is it possible to design a support system which can enable people who experience social exclusion as a result of mathematical learning difficulties?
3.1 End- User Involvement The Learnmaths Toolbox and Learning Environment is intended to support students with dyscalculia in acquiring skills and understanding from basic numeracy to advanced mathematical techniques. Since it is only end-users of a system who really understand their own needs and what is likely to work for them, the content of the toolbox will be finalised after consultation with end-users with dyscalculia.
62
End-user involvement will be organised according to the principles of human centred technological systems development and the principles developed in the EU FORTUNE Project (Biihler, 2000). The FORTUNE concept of user participation is based on the following principles: 1. Partnership as a basis. 2. Users as members and/or representatives of organisations. 3. Users should receive payment on the same basis as other participants. 4. Guaranteed accessibility of all relevant materials and premises. 5. All partners guarantee confidentiality, respect and expertise. 6. A detailed project plan, including time and resource planning for user participation. 7. Partnership is implemented from the start of the project.
'better' and increased effectiveness may be the consequence of a social context which privileges some approaches over others. Individuals who have cognitive and learning approaches which are not privileged are likely to experience disadvantage and discrimination. To avoid this educational tools are required which provide different approaches and aim to communicate with users on their terms rather than trying to mould them to meet norms. This will have some effect on changing attitudes so that different is not considered less or socially unacceptable. This is particularly important in avoiding stigma, low self esteem and feelings of alienation, as well as overcoming barriers to students with specific learning (or other) disabilities accessing the resources and teaching support they require. However full discussion of changing attitudes is beyond the scope of this paper. The constructivist approach to learning is based on the premise that learning is a by-product of understanding, which is situated in a personal, social and organisational context, requires frequent feedback from teachers and fellow students and the performance of tasks (Mayes and Fowler, 1999). It has also been suggested that conceptual learning depends on reflection and making information meaningful with regards to existing cognitive structures and with sufficient richness and elaboration (Craik and Tulving, 1975). This pedagogical philosophy confirms the importance of taking account of cognitive diversity and providing a structure which is compatible with the experiences and cognitive approaches of the learner with specific learning disabilities. Rather than being a discrete activity, conceptual learning is probably a cycle involving a process of continuous development and testing of understanding against internally or externally defined criteria (Mayes and Fowler, 1999). It should be noted that this cycle will not necessarily always involve a continuous increase in understanding, but may also comprise misunderstandings and their correction.
This will be combined with a human centred approach based on the H-CAD (Human Centred Assistive Technology systems Development) methodology (Duffy et al., 2004; Stapleton et al., 2004). This methodology has been applied successfully to the design and implementation of assistive systems for adult learners with dyslexia. It has been shown with adult learners with dyslexia in Ireland that the use of a human centred approach reduces the likelihood of the learners having increased feelings of isolation. This can often be a problem in assistive technology projects for people with specific learning difficulties. The H-CAD methodology significantly reduces the likelihood of this problem by careful management of user involvement and contextualisation of the work.
3.2 LearnMaths Difference
Philosophy:
Diversity
and
The philosophy of the LearnMaths Toolbox is based on the social model of disability and respect for equality and diversity. According to the social model of disability it is social barriers and oppression which disable people rather than their impairments. For instance, it is the steps not the wheelchair or the lack of large print books not the visual impairment which are the problem. Therefore it is society rather than disabled people which needs to be 'rehabilitated'. A philosophy based on equality and diversity recognises both the importance of diversity or difference and the entitlement to equal rights and opportunities. However, access to these equal rights and opportunities may be obtained by different groups of people or individuals in different ways.
In the university context, despite increasing commodification of both teaching and research and the tendency to suppress minority opinions and (Hersh and Moss, 2004), there is still recognition of the value of diversity, including of the subjects covered and the academic community. There is a need for this recognition of the value of diversity to be extended to the other levels of education and the wider society. This will enable the full diversity of the population, including disabled people with a variety of cognitive approaches, to participate and contribute to society and society to benefit from their different cognitive approaches. This could have significant benefits in terms of creative and currently unexpected solutions to existing social, political and other problems, as well as the development of technology and social systems which significantly contribute to improving the quality of life for the
In the context of learning and learning disability this implies that there are different approaches to cognition, organising information and learning. Some approaches may seem to be more effective than others, but no approaches are intrinsically
63
whole population. However, this will require educational and pedagogical strategies which enable people with different cognitive approaches, including specific learning disabilities, to obtain a good education and develop their creativity, rather than leading to their failure, as is generally the case at present.
different resources and approaches should be available to all students. For instance a study of the provision of numeracy materials to Open University students found that 93% of them preferred having access to both computer added learning materials and text based materials (Jones et al., 1999). These conclusions can probably be generalised to other groups of students, including those with specific learning disabilities, as long as the number of different types of materials to choose from is not so large that it imposes a cognitive burden. Provision of sufficient resources by the institution, including teaching materials and staff time (academic, technician, secretarial, administrative and other) to prepare the different approaches and resources. This is unfortunately counter to current trends in countries such as the UK, where the staff: student ratio has increased from 1:9 in the mid-1970s to to nearly 1:21 in 2003-4 and is expected to increase to 1:23 by 2010 (AUT, undated, 2002). The use of creative approaches. The involvement of students in course design, and flexibility in taking account of the needs, circumstances and context of all students, rather than a rigid application of principles.
3.3 Pedagogy of Diversity There is, therefore, a need for a pedagogy of diversity, based on appropriate learning methodologies and approaches for the full diversity of students and which enable all students to draw on their strengths. This pedagogy would need to include consideration of the following factors: • The essential learning goals of the particular educational programme. Often an educational programme may have a number of goals which are not really essential and which have developed for historical or other reasons. Removing these goals may make the programme accessible to disabled people. • Learning approaches which encourage students to meet the learning objectives while taking into account different learning styles. This is particularly important for students with specific learning disabilities. • Social aspects of education, including the need for peer acceptance. In some cases this will mean modifying the basic approach to make it accessible to all students. For instance one researcher suggests that the same educational goals could be covered by offering students with mobility impairments a field trip that does not require climbing mountains (Phipps and Kelly, 2006). However, this raises the issue that it would probably be preferable to either offer all the students the same field trip which does not require mountains to be climbed. Alternatively different groups of students could undertake one of a number of field trip options and share their experiences afterwards. • Access to the same types of experience, such as field trips and laboratory work. • Support for student learning by encouraging and providing approaches which enable all students to draw on their strengths and to use these strengths to support the areas in which they have weaknesses (Price, 2006). • Challenging and stretching all students to the optimal extent for the particular student, without making any student feel overwhelmed or stressed. • Provision of assignment measures and methodologies which are fair to all students. • Provision of a number of different learning and teaching approaches and a range of resources, with support to help students to choose the most appropriate approaches and resources. All these
3.4 Accessibility and Usability In the context of technology for disabled people there has been a tendency to focus on accessibility, for instance, of computer system or web pages. Accessibility is about the environmental characteristics of the system input and output which either enable or prevent particular groups of users from using the system, whereas usability is the ability of the system to carry out the intended function(s) when used by particular groups of users (Federici et al., 2005). It has been defined as the extent to which a particular group of users can use a particular system in their particular context to achieve specified goals effectively, efficiently and with satisfaction (ISO, 1998). Accessibility and usability are both essential for all users, since users need to both be able to access the system (input to it and receive outputs from it in a comprehensible form) and use it to carry out the intended functions. However educational software, for instance, may need to challenge the learner to make them think. This could require the software to be designed to avoid too much seamless fluency in use, as this may prevent deep learning (Mayes and Fowler, 1999). On the other hand excessive software complexity and cognitve demand should also be avoided. Approaches to usability include characterising it in terms of the following six components (McLaughlin and Skinner, 2000):
64
•
• •
• • •
4.2 Benefits of the LearnMaths Toolbox
Checkability: allowing checks to ensure that the correct information is entering and leaving the system. Confidence: users are confident in both the system and their ability to use it. Control: users have control over system operations, including input and output information. Ease of use: the system is easy (and intuitive) to use. Speed: the system responds and carries out functions quickly. Understanding: users are able to understand the system and its outputs.
The development of the Toolbox will take place in the context of research on how people with learning disabilities learn with regards to both understanding concepts and the acquisition of skills. This could have a wide range of benefits with regards to improving understanding of cognitive processes and the particular skills of people with dyscalculia. However, the main benefits will be improving the opportunities of people with dyscalculia and dyslexia in education and employment, increasing their autonomy and encouraging their participation in and contribution to society. Improved numeracy skills will lead to independence and autonomy in areas such as budgeting and shopping. People with specific learning difficulties in mathematics, who are an estimated 5-8% of the population will benefit in the following ways:
Both usability and accessibility should be considered as part of good design practice and included from the earliest stages of system specification and design. Consideration of usability and accessibility also require involvement of end users in all stages of research and development, as discussed in section 3.1.
• • •
4. THE LEARNMATHS ASSITIVE TECHNOLOGY SOLUTION 4.1 The LearnMaths Toolkit The initial version of the Toolbox will focus on tools for the 16+ age range, with further work to develop and extend the tools to younger people. The Toolbox will cover a wide range of different mathematical and numeracy skills. Some of the tools will be specific to particular areas of mathematics, whereas others will be more general. The Toolbox will also provide a multimodal, multi-sensory and multi-media capability, including a choice of output modes and the option to configure the system to meet user preferences. This is in-line with research evidence that people with specific learning disabilities can benefit from multi-sensory and multi-media capacity, but that care is required to avoid sensory overload.
•
•
Improved educational outcomes and qualifications. An increased ability to participate in the Information Society. An increased ability to participate in policy debates about technology. As the role of technology increases, the general public will require a better scientific education in order to understand the issues. It is important that people with learning difficulties are not left behind. An increase in self-esteem and more enjoyable educational experiences as a result of appropriate strategies being used to avoid (repeated) failure. Access to a wider range of (professional) careers, including in the sciences and engineering (for people with milder mathematical learning difficulties.
There will also be benefits to the following groups of people: • Teachers of numeracy skills, who will benefit from additional tools to support their work. • Learning support tutors, particularly those supporting students with dyscalculia and dyslexia. • Schools, colleges and universities, which will benefit from increased success rates in mathematics and subjects dependent on it. • Society as a whole, which will benefit from the increased contribution made by people with dyscalculia and dyslexia.
The customisation facility will enable users to choose the optimum learning environment to meet their needs, including when they are fresh and when they are tired. Attention will be given to making all the LearnMaths tools fully accessible, so that they can be used by students with additional impairments as well as dyscalculia. The Toolbox may also be of interest to a number of students who do not have any recognized learning disabilities, but who encounter difficulties with current learning and teaching approaches or who find them uninteresting. Unlike many existing assistive systems, the Toolbox will be designed to support both the acquisition of practical skills and the development of understanding of basic concepts.
Although the main aim of the LearnMaths Toolbox is to support people with dyscalculia and dyslexia, the multi-sensory and accessible nature of the tools in the Toolbox will mean that many of the tools will also be useful to blind and visually impaired people. Therefore there will also be subsidiary benefits in terms of improving the opportunities of blind and visually impaired people in the areas of education
65
and employment, increasing their autonomy and encouraging their participation in and contribution to society.
5.
Craik, F.I.M. and E. Tulving (1975). Depth of processing and the retention of words in episodic memory, J. of Experimental Psychology, 104, 268-294. Dowker, A. (2005). Early identification and intervention for students with mathematics difficulties, J. Learning Disabilities, 38(4), 324332. Duffy, D., L. Stapleton, M. Jordanova, D. Lakov and M. Lyng (2004). From assistive technologies to assistive systems: total solutions for the learning disabled, Proc. MEDeTEL Int. Conf Luxembourg. Federici, S. et al. (2005). Checking an integrated model of web accessibility and usability evaluation for disabled people, Disability and Rehabilitation, 27(13), 781-790. Geary, D.C. (2004). Mathematics and learning disabilities. J. Learning Disabilities, 37(1), 4-15. Gersten, R., N.C. Jordan and Flojo (2005). Early identification and intervention for students with mathematics difficulties, J. of Learning Disabilities, vol. 38(4), 293-204. Hersh, M.A. and G. Moss (2004). Heresy and , Int. J. of Gender Studies. Hersh, M.A. (2006). Mathematical Modelling for Sustainable Development, Springer Verlag. ISO (1998). Ergonomic Requirements for Office Work with Visual Display Terminals (VDTs)— Part 11: Guidance on Usability 9241-11, International Organization for Standardization. Jones, A et al. (1999). Contexts for evaluating educational software, Interacting with Computers, 11,499-516. McLaughlin, J. and D. Skinner (2000). Developing usability and utility: a comparative study of the users of new IT, Technology Analysis and Strategic Management, 12(3), 413-423. Mayes, J.T. and C.J. Fowler (1999). Learning technology and usability: a framework for understanding courseware, Interacting with Computers, 11,485-497. Orton-Flynn, S and C.J. Richards (2000). The design and evaluation of an interactive calculator for children, Digital Creativity, 11(4), 205-217. Phipps, L. and B. Kelly (2006). Holistic approaches to e-learning accessibility, ALT-J, Research in Learning Technology, 14(1), 69-78. Price, G.A. (2006). Creative solutions to making the technology work: three case studies of dyslexic writers in higher education, Research in Learning Technology, 14(1), 21-38. Stapleton, L., D. Duffy, M. Jordanova, D. Lakov and M. Lyng (2004). From assistive technologies to assistive systems: human centred support for the learning disabled, Int. Multitrack Conf. of Advances in Control Systems, TU Wien. Woodward, J. and M. Montague (2002). Meeting the challenge of mathematics reform for students withLD. J. of Special Education, 36(2), 89-101
CONCLUSIONS
The paper has discussed the role of technology in overcoming the existing barriers to education and employment faced by people with learning disabilities and presented the LearnMaths Toolbox as an example of a technological assistive system that can be used to provide support in overcoming these barriers. The discussion has been in the context of equality and diversity, with equal value given to different cognitive styles and learning approaches. This is particularly important for people with specific learning disabilities in preventing the disadvantages, discrimination and exclusion they are otherwise likely to experience. The discussion of equality and diversity has led to the presentation of some of the underlying principles of a pedagogy of diversity. The LearnMaths Toolbox has also been used to illustrate the importance of involving end-users in all stages of the development of technology and to give examples of some of the approaches to doing this. This has led to a clarification of the differences between accessibility and usability and a discussion of the complementary importance of both properties in educational software. Finally the paper demonstrates a technical solution to social stability by providing an assistive system for people marginalised by society's lack of flexibility with regards to different approaches to learning and different learning needs.
REFERENCES AUT (undated), Staff-Student Ratios, http://www.aut.org.Uk/index.cfm/media/pdf/c/3/m edia/pdf/index.cfm?articleid=l 33. AUT (2002), Nation's Universities in Crisis, says AUT, http://www.aut.org.uk/index.cfm/media/ pdf/c/3/media/pdf/index.cfm?articleid=290. Beacham, N., (2002). Dyslexia-friendly computerbased learning materials. In: Access All Areas: Disability, Technology and Learning, Phipps, L., Sutherland, A. and Seale J. (eds.), JISC TechDis Service and Alt. Bertuglia, L.E. (1994). An exploration of the glass ceiling, Women Eng., May/June, 27-29. Biihler, C. (2000). FORTUNE Guide Empowered Participation of Users with Disabilities in Projects, Evangelische Stiftun Volmarstein. Bryant, D., B.R. Bryant and D.D. Hammill (2000). Characteristic behaviors of students with learning disabilities who have teacher-defined math weakness. J. Learning Disabilities, 33, 168-179.
66
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
CURRENT ETHICAL SCRUPLES CONCERNING INFORMATION ENGINEERING
Tibor Vamos
Computer and Automation Research Institute, Hungarian Academy of Sciences H-llll Budapest, Ldgymdnyosi u. 11., Hungary vamos(q)sztaki.hu
Abstract: In the irresistible emergence of e-society the individual is represented by his/her electronic identity. The theoretical and practical pros and cons of electronic identity are treated, the harmonization and contradictions of privacy and security interests, and their relationship to the principles of liberty and solidarity, individual and society. The issues of democratic control and influence to further developments of democracy are discussed with a special focus on the ethical duties and possible actions of the engineering community, with some references to the dramatic events of global terrorism, extreme fundamentalism and to the local efforts of Hungarian Information technology. Copyright@2006 IF AC Keywords: Social and behavioural sciences, social impact, linguistic support
wisdom. The second has been a dispute for two and a half millennia, nevertheless in a very new context, the first is brand new and did not really dominate relations before the Age of Reason, i.e. about a quarter of century ago, though its' emergence in everyday life of everyday people started no earlier than in the present times of the information society.
1. INTRODUCTION Through out the ages, no responsible professional activity has existed without scruples. Though, in our age unscrupulous behaviour is, in technologically advanced countries, less of a danger than it used to be earlier, even in the 20th century. The other addendum is the requisite of the concept of professional responsibility; the quality of being scrupulous, scrupulous in his/her science, personal competence and especially in considering the consequences of his/her results. The characteristic difference in our age is the ubiquity of science and science-originated technology in every relation of human life and the special role of information, disseminated and transmitted globally, as the fundamental vehicle in human action and society organization. This entails a global responsibility, requiring the deepest insight, foresight in distance and time in a world of minimal access distances and time delays with a maximum effectiveness of action.
2. PRIVACY AND SECURITY, TWO DRAMAS OF OUR DAYS Even the concept of privacy is new and so, therefore, is its close relation with security. The emergence of the modern definition started with information technology and democracy development in the US with the sentence of Associate Justice Brandeis: the right to be let alone. The change can be estimated after the relatively recent British imperial rule for the queen: she had to give birth to a child in the presence of state dignitaries. The Brandeis-idea was the result of the proliferation of newspapers and photoportraits.
In this paper two crucial problems will be outlined. The first is the combined issue of privacy and security; the other is even more bound to the contradictions of democracy and governance
The present, acute problem is due to the global menace of terrorism, the milestone: September 11. The other side of the recent picture is mirrored in the
67
global hysteria surrounding a caricature in a minor Danish satire magazine. The related problems are: What are the special messages to be issued for professionals working in information technology? Can a global, general and durable set of principles be recommended for the freedom of the individual doing what she/he considers to be un-harmful to others?
methods for codes and the various legal-procedural ways of security system control. This message is an extremely important one; it is the first answer to our question about our special message. This security system could have been a safety measure against terrorism and is now an efficient way of security control for private business and for sensitive information about planned malevolent actions. The privacy side of the system is a firewall of private information within the framework of legal action. The system can also work in defence of group privacy if it is agreed within the group and among the groups concerned. A rather welcomed but pragmatic agreement was compromised between Google and China. Some similar ways of negotiations can save the fundamental principles of our freedom of opinion and that of the Muslim faith.
What can, and what cannot, these people do for a more human mankind? Can they sketch a unique and realistic picture of that ideal, or, to express themselves in a more modest manner, a somehow better world? What does it mean to be better or ideal, or even realistically ideal? Can that realistic approach be exemplified by alternative scripts in discussing the two dramas of the introduction?
If this message is distributed well, i.e. in appropriate ways for understanding by people educated in the schools of our civilization, people can be prepared for the next, even more complex problems.
How can a balance of compromises be suggested by using our ethical principles?
4. WHO GUARDS THE GUARDS? — FEEDBACK OF ENLIGHTENED DEMOCRACY
3. PRIVACY AND SECURITY MEANS LIBERTY AND SOLIDARITY WITH ALL THEIR COHERENCE AND CONTRADICTIONS
The first is the supervision of these systems, the Latin question: quis custodiat ipsos custodies, who guards the guards? The second is fundamental problem of all human interactions: cases of conflict of interest.
The key problem related to our profession is the privacy, and/or security, issue that can be converted into liberty and common interest or into a liberty and solidarity problem. In this view, to be explained, the fundamental questions are raised by the quoted examples. For discussion, another extension of the usual definitions can be used: privacy should be understood in the usual frame of the basic individual right but also in the right of any cultural entity, e.g. religion, other beliefs, national and group way of life.
old i.e. the the
The answers for the first are also old, but insufficient. The division of power, the methods of escrow of keys are well practiced in traditional democracies and have no real effect in weak democracies and dictatorships, even if they are deceptive as was the case in several paragraphs of the Soviet Constitution. The only final answer can be the democracy of self conscious, rational thinking, enlightened people. This is the other message and in this attributed form. The last period's experience demonstrated the dangers of virtual democracy when introduced in an environment with no democratic traditions. Even in periods and countries infected by irrational emotional influences democracy can be misleading. According to the other aspect, and this is more close to my one, democracy is a historical process of mass practice and this practice must be a real exercise, however painful.
Security is understood in this view in the same individual and extended social community related context. The extension of the privacy concept towards a community cultural identity is much older than the privacy idea itself. The two meanings were mostly fighting against each other, the modern libertarian view declared the priority of the individual, and all ideologies claimed the contrary. In our view, now, it should be the continuous task of rational conflict resolution. This will be discussed a little bit more in details, later. In this view liberty is the security against any kind of physical and mental intrusion into the sphere of privacy, the act of being left alone by any other person or group. It looks to be harmonious if there is no conflict of interest.
The special message in the role of information technology is the practice of feedback. Feedback control is not only a basic quality of physical systems but generally valid for all kinds of system control in stable and optimal conditions. The instant possibility of direct, individual feedback can be the best warrant for maintaining individual security against all kinds of intrusion efforts from the very start. Principiis obsta, sero medicina paratur, resist at the beginning, late medicament does not work, this wisdom of Ovid
The harmony of privacy and security is, for the first time in history, given in exchange of information by the last two decade's progress in cryptography and algorithmic theory, by the asymmetric coding idea of the public key, by the random number generating
68
is not only valid for love but for every more harmful emotion, like nationalism, fundamentalist beliefs, racism, and adoration of political idols.
Let us return to the essential subject: ethics. The relativity of ethics and the ideal human conduct can be followed throughout the course of history. This should be an argument for teaching history and humanistic knowledge in the school, learning from our own, multi-generation experiences. Even for those who preach the Bible as being the eternal stone tablet with its ten commandments have scope for interpretation and reinterpretation in respect of more peaceful timer.
The best example of continuous control by electronic feedback information is widely given by the bank account systems with possibilities for instant checking of any agreed kind and limit of personal and alien operations. The same practice should be regular related to any intervention in personal data, in operations of the community. The freedom of public information, its control and the privacy of individual data are on line controllable and any deviation can be identified at the very start. No democratic control in history has had such a power and it can now be introduced into a conscious, democratically, trained population. Switzerland, the most libertarian country in Europe now introduces broadband access for each citizen as a human right. Education, in how it can be appropriately used, would advisably be taught firstly in the primary school.
Unfortunately, even computer scientists are not empowered by our knowledge to speak on the subject of final truth and long lasting milestones. Nevertheless, some advice and principles can be suggested: With the conviction gained from complexity and computability theory it can be said that no deep and broadly manifest social problem can be solved in an ideal way. Each situation should be analysed in an unbiased fashion regarding all pros and cons and our duty is to proclaim, teach and, if possible, apply the least harmful, most effective solution. This should always be free for revision if the reality speaks against the hypotheses. This also means a determined attitude and work ethic in research, design and experimentation.
5. ADVANCES IN CONFLICT RESOLUTION The next message of our science is the progress in conflict resolution. Philosophy concerning human nature, coexistence and organizational, ruling methods are rooted in ancient Greek wisdom, much deeper than in any earlier or subsequent beliefs. Modelling and the analysis of alternatives continued in the Age of Reason, but mathematical, computational treatment is plausible only with our current technology. Game theory combined with statistics and the statistical observations of psychologists are all achievements of the last halfcentury and honoured highly with a sequence of Nobel Prize Awards. The methods of iterative, nonzero, multiagent games, negotiations with quasioptimal, multivariate equilibrium and calculations with uncertain information about the state, and the intentions of the participants, have grown to a powerful weapon in delicate international affairs, e.g. in the Cuban rocket crisis or later in several reported, and unreported, conflicts endangering mankind. It cannot be said that the principle of rational choice has become a general tool in the conduct of life, not even that these scientific, computational methods were applied or could be applied and applied successfully in every great decision process but, as it was emphasized about the practice of democracy, the methodology and practice is a long and necessary avenue of international relations; The trend is encouraging and this promising issue has to be followed and promulgated as a special role in information and control of scientists.
This is what our world wide does community currently in search of an optimal design of information societies. The information society is mostly an artefact, much more than any previous society formations. An artefact, which is a result of science. Our special responsibility in shaping that society is therefore exceptional. The preservation of privacy and security is the key social and information science related task. The ethics of this sceptic view is a strong one. It cannot rely on ready-made principles given by any higher authorities, on an ongoing basis our knowledge, views, feedback and mental strength have to be investigated in a persistent but modest way.
7. HUNGARIAN SITUATION AND SOME ABOUT OUR GROUP'S ACTIVITY Our group is active in the field, too. The speciality of the Hungarian situation is characterized by, a historically imprinted suspicion against any state power, a direct result of the state being subject to foreign intervention for long periods in its history. However, Hungary was rarely subjected in such crude ways that could generate a firm revolutionism. Cohesion was created in rather short periods in 1703, 1848 and 1956 as these semi-independency situations looked to be changeable after the intervention years. This semi-independence status at first created an advantage but, subsequently, something of
6. STRONG ETHICS OF A SCEPTIC VIEW
69
reluctance. This is the reason why Hungary is now in the middle range of the new ten EU members and is not as pioneering as it was during the last quarter of a century before the changes.
All measures which are planned, and in progress in the EU and within, Hungary are controlled by the principles of maximum possible voluntary introduction. The general application of electronics in our social-individual activity depends on its attractiveness, economy and safely. On the other hand, the task is urgent in the framework of global competition and in view of emerging malevolent forces. Science and engineering wisdom should balance and support the right measures.
The major task of our academic group now is to help the introduction of an EU standard system for the above objectives, taking into account several local peculiarities, slow standardization and the fact that the EU that was unable to reach a consensus on the Constitution and incorporating all this into the framework of a rather radical innovation of public service systems and operations. The latter is, according to our views, an integral condition of a working information society.
8. CONCLUSION AND WARNING The progress of technology creates both progress and problematic side effects in society. The relevance and meaning of the individual and her/his rights has never been as clear and emphasized as in the information age. Science and technology offer splendid vehicles for this social progress; these are briefly discussed in the paper with references to the harmony and contradictions of privacy, security, freedom and solidarity, all of which, in a broad, modern sense, are the main values of our civilization. Nevertheless, a warning should be added. Malevolence is always at the edge of goodwill with its evil absence of scruples and ethical constraints and, that is also valid to our subject.
Education, and enlightening information via the mass media and other methods, is a necessary part of this. A further consideration in the longer term is that a modern information society administration should create a man-machine dialogue with the citizen, supporting the focus on those problems that need special human care and judgment. All other communication is planned to be perfected in natural language, i. e. natural language understanding is one of the ongoing researches, with a special emphasis on understanding low quality texts for relatively uneducated citizens, understanding of vocal communication and automation of administrative reasoning to the frontiers of the above limitations. These limitations are never fixed, they depend on the state of art of cognitive, computer, social and legal science. Recognizing the current limits is a major research goal of the group consisting of specialists in these fields, with linguists and enthusiasts of administrative practice. A report on the status of this project is planned for the current year's European Artificial Intelligence Conference.
For progress there is no cure as was said by Neumann, half a century ago and, he added, all menaces also present in our current times. Anybody should be aware of the fact that no final panacea exists against ingenuity and unrestraint of evil forces and that obliges our engineering society to serve progress in a positive, enlightening way.
70
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
COMPLEXITY OF SOCIAL SYSTEM CYBERNETICS: RISK AND UNCERTAINTY MANAGEMENT IN NEGOTIATIONS M. J. Stankovski1, T. D. Kolemisevska-Gugulovska1, Z. A. Icev1, A. T. Dinibtitun2, and G. M. Dimirovski1'2 1
SS Cyril and Methodius University, Faculty of Electrical Engineering - IASE Karpos 2 bb, MK-1000 Skopje, Rep. of Macedonia
[email protected]; {milestk; tanjakg; z_icev} @etfukim.edu.mk Dogus University, Faculty of Engineering - DCE Acibadem-Kadikoy, Zeamet Sk21, TR-3 4722 Istanbul, Rep. of Turkey {tlahad;
[email protected]. tr
Abstract: The globalization era world-wide involve mass communications and competition of conflicting interests, social and society interactions as well as various confrontations intrinsic to which are the negotiation processes based on information and decision analyses. This social system cybernetics emphasises for the mankind society at large the improvement society's ability to manage uncertainty has become vitally important. Probability theory and information theory as well as fuzzy-set theory, and thereafter info-gap and risk-management models have contributed considerably to understanding social system cybernetics as well as an managing international conflicts and risks. By adopting the information as the third fundamental category next to those of energy and matter, and taking theories of complexity and complex systems as point of departure, it can be argued in favour of composite linguistic and probabilistic information as categorical concept in negotiations along with uncertainty management within organizational human-centred and social systems. Copyright © 2006 IF AC Keywords: Decision making, human centred systems, information, negotiation, uncertainty.
1. INTRODUCTION The social impact of automation on the modern civilization of mankind has been enormous during the past decades along with certain unexpected developments. Wherever world-wide political forums have taken place, there is widespread anti-globalization protest with sometimes dramatic international participation. This is internationalised negative civic reaction is getting more organised and rumours about a kind of world-wide anti-globalisation movement spread. Yet, it may be argued the current process of world-wide interaction and integration of economies as well as the other life-sustaining activities of contemporary societies (Glenn and Hannan, 2000; Pete et al, 1998, Petit, 1990) actually is the inevitable stage of mankind's historical development (Dimirovski et al, 2006).
Also it may be argued that, 15 years after the end of the so-called bipolar world (Brams, 1994; Howard, 1971) during the Cold War era, the world-wide general public awareness is shifting towards a critical perception and re-assessment of modern civilization as a unipolar world (Eeckhout, 2000; Haime, 1998; Royal Society, 1992; Wagner, 1994). For, apparently endangered by certain negative global consequences such as environmental pollution, global warming, the so-called "north-south gap", and terrorism warfare, the mankind societies cannot move forward safely (Kile, 2005; Dinibutun and Dimirovski, 2001; Kopacek and Stapleton, 2004). Mansour, 2001). Moreover even some kind of global dictatorship, the systemic structure of which remarkably resembles the known such events in developed countries not so long ago, cannot be excluded.
71
The famous mathematician, philosopher, and humanist Bertrand Russell (1975) has pointed out, on the other hand, a fundamental concept in human societies as well as in human-centred and social systems is power with its many forms: civil authority, clergy, public propaganda, secret service, and the military, and - above all - the wealth. This fact and the need for competition in human societies as well as other factors of western social philosophies, largely adopted world-wide, have been inducing potential for conflict. Thus these have been producing and re-producing social system behaviour resembling the non-cooperative games (Basar and Olsder, 1999; Kreps, 1995), and often the conflict noncooperative games (Osborne and Rubinstein, 1994). In addition, generally science and technology, hence computing and control in particular, have a crucial impact on all these forms of power. On the other hand, all the forms of power have been and are being generated via some kind of organizational system (Gibson et al., 1997; Glenn and Hannan, 2000; Pete, 1998) which may imply further consequences both positive as well as negative. In this work, it is argued that such a growing internationalised and negative civic reaction, already taking place, to a great extent is due to the inappropriate uncertainty management accompanying all decision and negotiation processes. Crucially, the limitations of the existing approaches, either probabilistic (Ayers, 1994; Haimes, 1998; Funtovicz and Ravetz, 1990) or fuzzy-set possibilistic (Klir, 1997; Kosko, 1993; Zimmerman, 1997), still prevent these to cope with uncertainly management in social system negotiation processes. Despite the largely non-cooperative and/or conflicting cybernetics of social systems, in order the philosophy of Nash equilibrium (Nash, 1951) to prevail within the cybernetics of contemporary community of mankind societies, the societies at large must improve the ability to manage uncertainty in negations taking place among and within social systems. An innovated understanding of the information and the accompanying uncertainly, along with proper understanding of their composition facets as well as various computer processing techniques and application tools are urgently needed.
2. NEGOTIATION STRUCTURE: ISSUES AND VIEWS ON INFORMATION AND UNCERTAINTY
supervision applications which underlie the policy making in all human centred systems. Notice the statement by Funtowicz and Ravetz (1990): "Policies can no longer be assumed to be based on scientific information that is endowed with a high degree of certainty". For, the existing definitions of uncertainty in scientific information are typically very specific and very operation oriented as well as befitted to practically implementable tools for processing. Economics and financial engineering, risk assessment and postoptimization sensitivity analysis, political and postnormal sciences, and let alone applied mathematics and systems science; they all devote a great deal of attention to uncertainty. It appears, this concept is still not deeply understood hence defined poorly. True, despite this lack of common standpoint, a number of well-developed bodies of theory claiming to deal efficiently with the management of uncertainty exist: probability theory (Haimes, 1998) in the first place; then information theory (Krippendorf, 1986; Mansour, 2001); fuzzy sets (Klir, 1997; Zadeh, 1973; Zimmermann, 1997); and info-gap modelling (Ben-Haim, 1997). However, each of the techniques based on these concepts do explain only the kind of uncertainty which it deals with. Therefore the quest for common theoretical grounds continues and, as pointed out in Natke and Ben-Haim (1997), Klir as well as BenHaim argue that probability theory is synonymous with uncertainty theory to the majority of decision-making practitioners in various fields. Fairly recently Hatfield and Hipel (1999) revisited the issue of concern and proposed, via placing knowledge, uncertainty, and information into a comparative framework, to take the information as the fundamental concept and one these grounds redefine the other concepts involved. However, this viewpoint on the information as the fundamental category concept has been put forward quite some time ago in (Dimirovski et al, 1977; Gitt, 1987; MacFarlane, 1993) and also related to knowledge hence uncertainly too. Now it is re-examined in the light of the arguments presented in (Hatfield and Hipel, 1999) and in (Dimirovski et al, 2006). Still, the cybernetic structure of negotiation processes does emphasise a comparative framework of knowledge, information, wisdom and uncertainty to be of primary importance. Let for a moment the focus be placed on cases of business negotiation processes, and leave aside more complex policy making negotiations. The information based but qualitative overall structural model is depicted in Figure I. Clearly, other cases of negotiation processes (e.g. socio-political ones) may well have much more complicated models but still follow the same pattern structure as in Figure I.
Apparently, because of its omnipresence in all sorts of decision-making and human social behaviour and let alone in negotiations, the management of uncertainty has become one of the major challenges of our time (Fntowicz and Ravetz, 1993; Klir, 1997; Natke BenHaim, 1997; Dimirovski et al, 2006). In the first place, this is due to decision, control, and monitoring/
72
Buyer
paths usually pass through multiple dilemmas and risks (Dimirovski et al, 2006).
Develop Sourcing Strategy: Identify Sourcing Groups, Evaluate Sourcing Trends
6" '5
I
Supplier
Generate and Distribute RFQs
Analyze RFQs
Analyze Supplier Responses: Scare ft Rank Offers, Identify Optimal Offer Combinations
Formulate Offers
I o
:p
n x: o
Counter Offers, Additional Info
Counter Offers, Additional Info
Negotiation Process
Agree Upon Arrangements
Yes
T Acceptable Deal
No
Reject Noncompetitive Offers
Fig. I. Overall information-flow based model of the negotiation systemic structure and the associated information processing. Furthermore, it should be noted globally the typical behaviour pattern of opponent participants into negotiation processes is structured as shown in Figures II and III; clearly, opponent negotiation participants possessing different skills will have richer structures inside the blocks of thinking, acting, and game engines. For, in practice, decisions during a negotiation process must be made under risk, uncertainty, incomplete, and often even vague information. Thus uncertainly management within negotiation processes has to be kept open to employ fuzzy-set based qualitative information (e.g. see Pete et al, 1998, for instance).
Fig. II. A general two-person game-theoretic model of human behaviour of participants in negotiation processes; solely the thinking sub-process separates us from the animal world. Habitually, scientific societies do have the proper understanding and observe differences among concepts signal, data, information, knowledge, and intelligence following intuition of meaningfulness, measurement evidence, truth, and uncertainty. Yet, negotiation cybernetics involves categories such as fairness, justice, visions of good and evil, and wisdom, and these thinking
Fig. III. Non-cooperative negotiations resemble closely to a combat game model in this illustration based on using finite-state machines with fuzzy attributes. The overall picture of the nature of information that emerges negotiation cybernetics is analogous to the structure and nature of complex systems, as described by complex systems theory. First, it should be noted that the structural model of human behaviour is a feedbackfeedforward one involving both mind and emotions (Mansour, 2001), and this reflects upon social groups and entire societies (Dimirovski, 2001). Hence human centred systems are rather complex systems with a diversity of event driven dynamical phenomena as the main consequence. Secondly, it should be noted that the world is about systemic structure that are inherently non-causal systems, and also only partially identifiable and only partially observable (Mansour, 2001). Should the previous fact on the sole availability of structural models is observed then one may infer (Dimirovski, 2001) they are likely to be only partially controllable too. Furthermore, it should be noted the contemporary mankind's world actually encompasses a network of such interacting systems, typically neither well-defined nor well-structured, constituting the background body of relevance as basis for major conclusions in all areas of socio-economic and socio-politic systems. This is further emphasised by the omnipresence of information category within the framework of negotiation systemic
73
structures, which is a paradigm gaining yet higher importance as the mankind faces the contemporary challenges and risks as demonstrated in the next section.
information, although not both from the same point of departure and not both at the same time. While they established that there exists some overlap in the applicability of the various theories, for the most part each theory appeared oriented towards dealing with a different and specific information deficiency in both theoretical terms and in applications. Their investigations have put a parallel between the nature of information and the nature of complex systems in the sense that both can be placed on scales of complexity, and that both acquire similar attributes as complexity increases. The introduction of systems theory into the field of information management, prompted by the obvious analogies in Shannon information theory, provided a useful guidance to discuss five levels of systems complexity and propose an analogous level of information complexity.
Finally, at this point the basic theoretic techniques of information management hence of uncertainly management too, ought to be recalled. The word is about the theories of probability, fuzzy sets, info-gap models, and Shannon information from the perspective of information management (Natke and Ben-Haim, 1997), of course. Since this investigation study is set within the context of human centred systems, it should be noted, this list of techniques is by no means exhaustive because, in addition to mathematicians and systems engineers, economists, computer scientists and others have 'developed' information-management techniques for their own purposes (Krippendorff, 1986; Haimes, 1993). As a rule, all of these theories do bear a label "uncertainty management technique"; nonetheless, such a label holds true indirectly only. As a matter of fact, each of these theories manipulates data or information, from which the problem solver makes inferences about uncertainly. None of the theories directly addresses the internal perceptions of the decision-maker, i.e. their uncertainly, with regard to the situation at hand, yet these make a core of the negotiation systems.
The simplest complex systems appear to be purely thermodynamic: a system performs in order to remove a thermodynamic gradient from the environment. Such a gradient is essentially a distinction, an indication that one region of the environment can be distinguished from another. To a thermodynamic system, the only information required is the presence and magnitude of this gradient. This was exactly the information being discussed by Shannon information theory: the observable degree of distinguishability. Their next short step was to conclude Shannon information theory is a measure of the simplest type of information.
3. THE NATURE OF INFORMATION: HATFIELDHIPEL THEORY REVISITED Complex systems theory (Kosko, 1993) presents a scale of complexity along which various systems can be placed, from the simplest thermodynamic systems seen in laboratories to intricately complex emergent systems in nature and society. A link between information and systems theory has appeared in the current context as it is possible to note that the simplest kinds of organized systems are completely thermodynamic-like, hence nonseparable fundamental categories of energy and matter along with information, while the simplest kind of information is in the sense of Shannon.
It should be noted, this makes logical sense when considering the complexity increases that have come later in the course of system science developments (Hatfield and Hipel, 1999). Indeed, the first step is to distinguish between simple noise (the environment) and actual information (the gradient). Further, the second evolutionary step in complex systems appeared to be the presence of multiple domains of attraction (or attractors), pertinent to the non-linear nature of real-world processes. Domains refer to the steady states in which the given system can survive, and possessing multiplicity of such domains is the basic indication of the increased complexity. This suggested that the next step in the complexity of information is the concept of relevance implying that certain information is only useful in certain circumstances. The idea emerged from the measure provided by info-gap theory (BenHaim, 1997) of usefulness or efficacy of information for different problems. It may well be noted that a system switching from one domain to another often entails a complete switch in the rules governing the system and its behaviour. This means that the observed system may become dependent on other gradients or other information sources. It would be surprising if this were
In their recent work Hatfield and Hipel (1999) argued that it is the information that should be adopted as the fundamental category, and only then all the facets of uncertainly can be explained while relating the information to truth and meaningfulness. In their exploration, they have found sound observation grounds for the following concluding findings. There are indications affirming the quantity of information available can measured following the information theory (in the sense of Shannon) whereas the novel info-gap models (Ben-Haim, 1997) provide means to measure the quality of the information being examined. Furthermore, traditional probabilistic as well as fuzzy methods are available for modelling the imprecision or error of
74
not so, for the ability to judge the importance or relevance of a piece of data cannot be imparted by method or theory; such know-how is the product of wisdom and is obtained through experience (Kosko, 1993), which is most relevant in the human centred negotiation processes. The third logical step forward into complexity of human centred systems is found when considering the exactness of the data, which is to say vague or precise, indeterminate or not. This was indicated by the very fact that imprecision is set the primary focus of interests in both theories of probability and of fuzzy sets, albeit from different points of departure. For, both theories adopt the distinguishability and relevance in the data being utilized. It should be noted, the sensitivity to precision or spread of data is analogous to a complex system possessing more sophisticated feedback loops and dynamics and being able to modify its behaviour based on the quality of information available (Dimirovski, 2001; Hatfield and Hipel, 1999; Mansour, 2001; Zadeh, 2002). This is precisely the case in the structure of human and society centred systems that are dealt with in social cybernetics. Hatfield and Hipel (1999) rightly noted the essential crucial concepts of information that have been not frequently addressed are those of accuracy, or in qualitative information of correctness. They noticed that all of the existing theories assume the underlying information is inherently true hence all the subsequent findings remain based on that assumption. As a given system grows increasingly sophisticated, however, the question of information correctness must arise. Many human-constructed systems demonstrate awareness of this issue, but also it can be seen in natural systems in the form of genetic reproduction processes. The obvious complexity of any DNA-based organism indicates just how sophisticated a system must be in order to be aware of accuracy issues: indeed, genetic reproduction demonstrates how one can be very precise and very certain yet still be very wrong. This aspect appears rather crucial in a negotiation cybernetic process, which is a human centred system regardless the field and aim of the negotiation (Dimirovski et al, 2006). However, this aspect is already well exemplified in the previous section in the case of business negotiation process (see Figures I and II). How it may appear in socio-political or macro-economic based negotiations it may only involve cybernetic structure of higher complexity. Hatfield and Hipel (1999) have pointed out just as the description of a system is dependent on the perspective equally so is the information observer-dependent, i.e. dependent on the observer who detects and extracts that information, be it
device or human. This also implies that information itself is a subjective concept in general, and let alone in social cybernetic systems and negotiation structures (Dimirovski et al, 2006). The fifth and last step Hatfield and Hipel (1999) have found in questioning the accuracy of one's information, which is a very short yet profound step away from questioning the accuracy of one's analysis of that same information. This commonly leads to the final level of information complexity where information itself begins to re-curse or nest. Just as the most complex systems exhibit emergent patterns of new and unprecedented behaviour, so can questioning existing information lead to infinite levels of new information; this refers to the "recursive" problem explored by Funtowicz and Ravetz (1990) who pointed out how trying to "completely" quantify an uncertainty or imprecision using any tool or approach leads to an infinite series of 'probability distributions of probability distributions' or 'fuzzy sets of fuzzy sets'. This nesting phenomenon appears as much an issue in information management as in complex systems analysis. Hence the only way out is to recognize that the techniques themselves do not provide guidance about when to stop scientific analyzing process. However, as human perception and comprehension gets deeply involved (Zadeh, 2002), the system capacity for indefinite information nesting phenomenon is a tangible danger that may destroy the system. At its best, it can set the system into a cycle of information nesting phenomenon that may launch the system lost which may well happen in negotiation cybernetic social systems (Dimirovski et al, 2006).
4. CONCLUSION The issues of information and uncertainly management within negotiation cybernetic systems have been explored via re-visiting the various concepts related to uncertainty, and by placing them into a comparative framework, including some of the traditional underlying definitions. Such an approach is important not only for the understanding these concepts provide, but also for the purpose to serve as well-defined foundations for further study of decision processes in human-centred systems. Hatfield-Hipel theory on information and uncertainly management was re-visited in a way as to place it within the dynamic phenomenology of centred negotiation processes in human society centred systems. From a social cybernetic perspective, both certainty and uncertainty are not measurable properties of data, but rather they are a part of the decision-makers' perceptions hence prone to subjective handling. Hence it is the composite fuzzy-linguistic and probabilistic view on
75
Howrad, N. (1971). Paradoxes of Rationality: Theory of Metagames and Political Behaviour. MIT Press, Cambridge, MA. Kile, F. (2005). "Investigation into control of the global social system." In: Preprints of the 16th World Congress of the IFAC (P. Horacek, M. Simandl, P. Zitek (Eds)), Prague, Fr-M21-TO/3.(l-6). IFAC and Czech Technical University, Prague, CZ. Klir, G. J. (1997). "Uncertainty theories, measures, and principles: an overview of personal views and contributions." In: Uncertainty: Models and Measures. (H. G. Natke and Y. Ben-Haim (Eds)), pp. 27-43. Akademie-Verlag, Berlin, DE. Kopacek, P., and L. Stapleton, Editors (2004). Technology and International Stability - Proceedings of SWIIS 2003. Elsevier Science, Oxford, UK. Kosko, B. (1993). Fuzzy Thinking. Hyperion, New York. Krippendorff, K. (1986). Information Theory: Structural Models for Qualitative Data. Sage University Paper on Quantitative Applications in the Social Sciences, Series no. 07-062. Sage Publications, Beverly Hills, CA. Kreps, D. V. (1995). Game Theory and Economic Modelling. Clarendon Press, London, UK. MacFarlane, A. G. (1993). Information, Knowledge, and Control. In: Essays in Control - Perspsctives in the Theory and Its Applications (H. L. Trentelmann and J. C Willems (Eds)), pp. 1-28. Birkhauser, Boston, MA. Mansour, M. (2001). "Systems theory and human science" (Plenary paper). In: Conflict Management and Resolution in Regions of Long Confronted Nations (G. M. Dimirovski (Ed)), pp. 1-10. Elsevier Science, Oxford,UK. Natke, H. G., and Y. Ben-Haim (1997). Uncertainty: Models and Measures (H. G. Natke and Y. Ben-Haim (Eds)). Akademie-Verlag, Berlin, DE. Nash, J. F. (1951), "Non-cooperative games." Ann. of Mathematics, 54, 286-259. Osborne, M. J., and A. Rubinstein (1994). A Course in Game Theory. MIT Press, Cambridge, MA. Pete, A., K. R. Pattipati, D. L. Kleinman and Y. N. Levchuk (1998). An overview of decision networks and organizations. IEEE Trans, on Syst., Man & CyberneticsPt.C: Applications & Reviews, 28 (2), 173-193. Petit, M. L. (1990). Control Theory and Dynamic Games in Economic Policy Analysis. Cambridge Univ. Press, Cambridge, UK. Royal Society (1992). Risk: Analysis, Perception, and Management. Report of a Royal Society Study Group, The Royal Society, London, UK. Russell, B. (1975). Power. Unwin Books, London, UK. Wagner, R. H. (1994). "Peace, war, and the balance of power." American Political Science Review, 88 (3), 593-607. Zadeh, L. A. (1973), "Outline of a new approach to the analysis of complex systems and decision processes." IEEE Trans. Systems, Man & Cybernetics, 3 (1), 28-43. Zadeh, L. A. (2002). "Toward a perception based theory of probabilistic reasoning with imprecise probabilities." J. of Statistical Planning & Inference, 105, 233-264. Zimmermann, H.-J. (1997). "Uncertainty modelling and fuzzy sets". In: Uncertainty: Models and Measures (H. G. Natke and Y. Ben-Haim (Eds)), pp. 84-100. AkademieVerlag, Berlin, DE.
information that is the crucial category in social systems cybernetics, in general, and in negotiation systems, in particular. REFERENCES Ayres, R. U. (1994). Information, Entropy, and Progress: A New Evolutionary Paradigm. American Institute of Physics, New York, US. Basar, T., and G. J. Oslder (1999). Dynamic Non-cooperative Game Theory (2nd ed). The SIAM, Philadelphia, PA. Ben-Haim, Y. (1997). "Beyond maximum entropy: exploring the structure of uncertainty." In: Uncertainty: Models and Measures (H. G. Natke and Y. Ben-Haim (Eds)), pp. 1126. Akademie-Verlag, Berlin, DE. Brams, S. J. (1994). Theory of Moves. Cambridge University Press, Cambridge, UK. Dimirovski, G. M., N. E. Gough, and S. Barnett (1977). "Categories in system and control theory." Intl. J. Sys. Science, 8(9), 1081-1090. Dimirovski, G. M. (2001). "Applied system analysis to transition crisis of Southeast Europe and new national goals formation". In: Conflict Management and Resolution in Regions of Long Confronted Nations (G. M. Dimirovski (Ed)), pp. 85-93. Pergamon Elsevier, Oxford, UK. Dimirovski, G. M., A. T. Dinibiitun, F. Kile, R. Neck, J. Stahre, and L. B. Vlacic (2006). "Control system approaches for sustainable development and instability management in the globalization age." Annual Reviews in Control, 30 (to appear). Dinibutiin, A. T., and G. M. Dimirovski (2001). "Technology transfer to developing countries and technological development for social stability - Part 1." In: Proceedings the 8th IF AC Workshop on Supplemental Ways for Improving International Stability (P. Kopacek and M. W. Han (Eds)), pp. 25-26. Elsevier Science, Oxford, UK. Eeckhout, J. (2000). Competing Norms of Co-operation. Department of Economics, University of Pennsylvania, Philadelphia, PA. Funtowicz, S. O., and J. R. Ravetz (1990). Uncertainty and Quality in Science for Policy. Kluwer Academic Publishers, Dordrecht, NL. Funtowicz, S. O., and J. R. Ravetz (1993). "Science for the post-normal age." Futures, 25 (7), 739-755. Gibson, J. L., J. M. Ivancevich and J. H. Donnelly Jr (1997). Organizations: Behaviour, Structure, Processes. Irwin, Homewood, IL - Boston, MA. Gitt, W. (1987). "Information: the third fundamental quantity." Siemens Review, 56, 36-41. Glenn, C. and M. Hannan (2000). Demography of Corporations and Industries. Princeton Univ. Press, Princeton, NJ. Haimes, Y. Y. (1998). Risk Modelling, Assessment, and Management. J. Wiley, New York, US. Hatfield, A. J., and K. W. Hipel (1999). "Understanding and managing uncertainty and information," In: Proceedings of the 1999 IEEE Conf. on Systems, Man, and Cybernetics, 12-15 October, Tokyo, vol. 2, pp. V-1007 V-1012. The IEEE and Tokyo Institute of Technology, Tokyo, JP.
76
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
THE ECONOMICS AND POLITICS OF ENERGY GENERATION
M.A. Hersh Electronics and Electrical Engineering, University of Glasgow, Glasgow G12 8LT, Scotland. Tel: +44 141 330 4906. Fax: +44 141 330 6004. Email:
[email protected]
Abstract: This paper uses the example of the UK to discuss the political and economic context in which energy is provided and the effects of this context on energy policy. It evaluates the advantages and disadvantages of renewable energy sources and their role in a sustainable and socially just energy policy. It shows that the relative economics of different energy sources depends on the how their costs are calculated, with discounting and market forces posing a barrier to renewables. Copyright © IF AC 2006. Keywords: Energy, economic, political context, renewables
1.
INTRODUCTION: ENERGY SUPPLY AND DEMAND
•
There is increasing concern about energy supplies, arising from a mixture of factors, including political instability and political changes which may affect the availability of oil and concerns about global climate change associated with anthropogenic (human generated) emissions of carbon dioxide and diminishing supplies of fossil fuels (Hersh, 2006). Consequently there is a need for appropriate alternative strategies to ensure energy supply. This paper will present a case study of energy issues in the UK as a mechanism for introducing discussion of the wider issues.
Heat, to only a limited extent, distributed as hot water or steam. There are a few district or community heating schemes, which provide hot water or steam to buildings from centralised boilers. A small amount of heat is obtained from geothermal sources.
Machinery and information technology are most conveniently powered by electricity, whereas applications involving heating should use other forms of energy than electricity to avoid the energy losses associated with conversion and transmission. The electricity supply needs to meet the following two specifications: • Sufficient capacity to meet overall energy requirements • Electricity provision when and where it is needed.
In the UK energy is delivered in the following five main forms (Boyle, 2004): • Liquid fuels, largely oil and its derivatives (petroleum, diesel, kerosene). • Gaseous fuels, mainly methane (natural gas), plus bottled propane and butane. • Solid fuels, mainly coal and its derivatives, with small amounts of fuel wood, refuse incineration and straw burning. • Electricity, mainly from fossil fuels and nuclear power stations. Hydroelectricity and other renewable sources make a small contribution.
There is a need both to reduce overall energy demand and to manage it to reduce the variation in demand over the base load. There are a number of approaches to reducing energy consumption, including the following: • Energy efficient buildings, appliances and lighting which are designed to minimise energy use. This will probably require financial support to upgrade existing buildings and stricter
77
•
•
•
•
building regulations for new buildings, as well as financial support or loans for the purchase of energy efficient appliances which save money overall, but may have higher capital costs. Energy efficient heating systems, as well as heating buildings to slightly lower temperatures. Financial support may be required for upgrading existing heating systems and there may also be a need for new regulations and/or legislation on energy and emissions specifications. Heating buildings to slightly lower temperatures will require people to wear more clothes and to be more active and may be inappropriate for some elderly people or young children. The use of adaptive and other advanced control schemes in industry to reduce energy and material consumption (which has associated energy costs). Reduced consumption, improved waste management and design for waste minimisation, refurbishment and repair, reuse and recycling. The resulting reduction in waste, resource use and the differences between the energy requirements of refurbishment and repair and manufacture of new products will result in energy and carbon dioxide emissions savings. A reduction in transport energy consumption. This will require measures to promote a modal shift from private car use to cycling, walking (or wheelchair use) and public transport, an encouragement of facility accessibility rather than mobility and reductions in air travel. Moves to accessibility rather than mobility would require an end to the resiting of facilities, such as shopping and sports centres, away from the population centres they serve and moves to resite out-of-town facilities close to centres of population, though this would have to be implemented over a period of time. Reductions in air travel will require rail travel to become more competitive with air travel (including by changes in their relative prices, infrastructure development to allow the widespread use of very high speed trains and further technical developments to increase the speed and reduce the environmental impacts of train travel), an increased use of video conferencing to replace business travel and possibly the introduction of tradable air travel permits.
behaviour, for instance an increase in demand of over 2 GW in a few minutes as large numbers of people switch on the electric kettle at the end of a popular television programme, as television power consumption is relatively low compared to that of an electric kettle (Boyle, 2004). Existing large coal and nuclear power plants do not respond well to a fluctuating demand, as they may take 24-36 hours to reach their full output from cold. A changing demand could be followed by running some stations at part load, but this would reduce their overall efficiency and increase carbon dioxide emissions per kilowatt of electricity generated. A smaller combined cycle gas turbine station can produce some power within an hour, but will take about 8 hours to reach full output. Therefore pumped storage stations are generally used to respond to variations in power demand. There are currently three pumped storage plants in the UK, two in Wales and one in Scotland. The combined peak output is over 2 GW or about 5% of the typical winter electricity demand, but they are only designed to operate for short periods until conventional plant is brought on line (Boyle, 2004).
2. RENEWABLE ENERGY Renewable energy can be defined as energy flows which are continuously replenished by natural processes. This is in distinction to fossil and nuclear fuels and oil, which consist of energy stocks, of which only finite quantities are available, rather than flows. Renewable energy contributed about 10.9% of global energy requirements in 2002 and this figure is growing at 1.5% per annum (World Bank, 2004). Renewable energy sources can be divided into the following three main categories: • Direct uses of solar energy i.e. solar thermal energy conversion and solar photovoltaics • Indirect uses of solar energy i.e. hydropower, wind power, wave power and bioenergy or biofuels. • Sources of renewable energy which do not depend on solar radiation i.e. tidal and geothermal energy. Since they are energy stocks, fossil and nuclear fuels and oil will be exhausted at some point. The quantity of fuel that can be extracted and therefore the length of time until exhaustion depend on the availability of technology that can extract the fuel and do so at a price that is considered economically acceptable. Advances in technology will increase the amount of fuel that can be extracted and improve the economics of this process. However attention should be paid to the environmental and social impacts of this technology and the extraction process. In addition increasing scarcity may change the economics of fuel extraction and significantly increase the price at which fuel extraction is
Demand management should include measures to encourage the transfer of energy consuming activities to times of low demand to reduce the variation in total demand. However, it will probably still be necessary to have some additional capacity to cope with demand variations. Currently demand varies both seasonally and over the day, with an average load of slightly less than 40 GW, which can drop to under 20 GW on a summer night and rise to over 50 GW on a cold winter evening. This gives a base load of about 20 GW plus a varying additional load. Localised peaks also occur due to synchronised
78
considered economically viable. However, the extent to which technology can increase the availability of fossil and nuclear fuels and oil is limited and therefore a technological 'fix' is not the answer.
of green house gases, mainly carbon dioxide and the acid rain gases, sulphur dioxide and nitrogen oxides than fossil fuels and have no or minimal emissions of these gases when operating to generate heat or electricity. There is now a consensus of scientific opinion, as expressed by the International Panel of Climate Change (Houghton et al., 2001) that anthropogenic (human generated) emissions of greenhouse gases are causing global warming and will lead to an average temperature rise of 1.4 to 5.8 °C by the end of the century. The consequences of global warning will include rises in sea levels and the drowning of low lying areas, more frequent climatic extremes, the disruption of agriculture and ecosystems and possible insecurity of food supplies (Hersh, 2006; McCarthy et al., 2001). The use of renewable energy sources has already reduced emissions by 1,500 million tons of carbon dioxide each year or 7% of current energy related emissions. Between 6000 and 9000 Mt of emissions (corresponding to 40% of energy related emissions) could be avoided by 2020 (OECD, 1998). Policy measures to reduce or at least stabilise energy consumption in combination with a staged increase in the percentage of energy generated by renewable sources to 100% would lead to further significant reductions in the emissions of greenhouse gases.
Since renewable energy sources are flows, a given amount is available each and every year and therefore it is not possible to overconsume, as the amount of energy extracted from the flow in a given period does not affect the volume of flow in subsequent periods. For instance using a flow of water down a gradient to generate electricity in a given period will not reduce the flow of water and its potential energy generating capacity in subsequent periods, though this may be reduced by climatic changes such as reduced rainfall or increased temperatures leading to a (partial) drying up of the watercourse. The one exception, where renewability depends on renewable rates of consumption is geothermal energy. Although geothermal resources are a natural energy flow rather than an energy store, they can be and frequently are mined in a nonrenewable way. Heat is generally extracted faster than it can be replaced, leading to declining temperatures in producing steam fields. This then reduces the temperature at which water and other fluids are stored in interconnected rock cavities and constantly the quantity of heat energy that can be extracted.
Renewable energy sources have the further benefits of not generating radiation, including radioactive waste products, and avoiding danger to workers in the mining and milling stages. The production of nuclear power produces radiation and radioactive waste at all stages of the life cycle. The problem of the safe disposal of radioactive waste has not yet been solved and seems unlikely to be in the foreseeable future. Coal mining also produces a limited amount of radiation. The dangers to workers associated with coal mining are well known, but the fact that uranium mining and milling is the most hazardous life cycle stage of nuclear power production is generally ignored. The risks to workers and their families include cancers of various types, sterility, stillbirth and genetic damage to children. At the time of highest mine activity the lifetime risk of fatal cancer to workers was sometimes as high as one in nine (Dropkin et al., 1992).
At least in theory, renewable energy sources provide potentially unlimited sources of energy. In practice, there are technical and economic limits on the energy that can be currently extracted. However, these limits are the result of a particular political context in which research funding has been allocated preferentially to nuclear power and the way in which energy sources are costed actively disadvantages renewable energy, as will be discussed in more detail in Section 3. Currently the richest fifth of the world's population is responsible for 58% of global energy consumption, whereas the poorest fifth only uses 4% of global energy (Michaelis, 2002). The limited supplies and distribution patterns of fossil fuels mean that the current heavy energy consumption by the richer countries reduces its availability to the poorer countries. This is not the case with renewable energy sources, due to the (potentially) unlimited availability of renewable energy and therefore renewable energy sources have the potential to remove the current inequalities in access to energy. Currently over half of energy in sub-Saharan Africa and nearly two fifths in South Asia is generated from renewables and waste (World Bank, 2004), further showing the potential of these sources in the low income countries. Renewables could also accelerate the electrification or energisation of rural communities in these countries.
The degree of risk will depend on the measures taken to protect workers and their living conditions, which will largely be determined by the social, political and economic context in which uranium mining and milling take place. For instance there were considerable differences in the housing provided for black and white workers at the open cast Rossing uranium mine in Namibia under South African occupation (Moody, 1992). The fact that there has been less interest in and less information published about health, safety and environmental issues at the Rossing mine in the period since Namibian independence illustrates another aspect of the
Renewable energy sources have a number of other benefits in addition to being inexhaustible. In particular they have much lower life cycle emissions
79
political context in which the energy debate takes place. The numbers of injuries per year has reduced by a factor of 6 between 1988 and 2004 (Rossing, 2004), indicating that the changed political context seems to have had a major impact on health and safety.
sensitivity in site selection, use of the best available technology and including the public and appropriate organisations in the early planning stages, need to be given serious consideration in decisions about the most appropriate renewable energy systems for a given area.
Further socioeconomic and environmental benefits of renewables include the following (OECD, 1998): • Reducing dependence on fuel imports and diversifying and securing indigenous energy supplies. • Promoting the decentralisation of energy by providing small, modular, rapidly deployable schemes. • Providing job opportunities in rural areas. • A reduced need for upgrading electricity distribution systems or building new line capacity due to the modular and distributed nature of renewable energy systems, resulting in a reduction in construction and transmission emissions and energy consumption or losses and reduced visual intrusion.
3. THE ECONOMICS OF RENEWABLES The viability of any energy generation scheme depends on the following factors: 1. Technical factors 2. Social and environmental impacts 3. Economic factors In the past the main focus was on technical and economic factors. However there is an increasing recognition of the importance of environmental factors and, in particular, the importance of avoiding emissions of greenhouse gases and long term security of supply when fossil fuels run out. This is leading to increasing interest in renewable energy. Energy supply takes places in a political and economic context which may promote particular sources of energy and disadvantage others. It should be noted that there may be discrepancies between avowed policy and practical measures and that there may be political or economic vested interests in promoting a particular type of energy generation. For instance, the UK government has come out in favour of building more nuclear power stations, whereas their independent advisory body on sustainable development, the Sustainable Development Commission (SDC) has concluded that nuclear power will not solve the problem of global warming and only lead to limited reductions in carbon dioxide emissions. The SDC is also concerned about the lack of long term solutions for the disposal of nuclear waste, the uncertain economics of nuclear power, the UK being locked into a centralised distribution system for 50 years, energy efficiency being undermined and issues of international security (SDC, 2006). For many years several times as much research funding has been available for nuclear power as for renewable energy (Ahern, 2001). This lack of funding has meant that renewable energy technology is not as advanced as it could have been. In effect the disparity in funding has promoted nuclear power at the expense of renewables.
There are also environmental benefits associated with specific renewable energy systems. For instance, hydroelectric schemes can improve water supplies and over one million small wind turbines already pump water from underground reservoirs. Growing energy crops can reduce soil erosion and, when grown on land degraded by inappropriate agricultural practices, improve soil conditions and enhance wild life diversity. Some renewable energy technologies can reduce urban pollution by providing power for electric vehicles, though this should not replace moves to reduce transportation energy, particularly the high energy consumption associated with private car use. Several renewable energy technologies could be used to produce water by desalination. Although, as discussed above, most renewable energy systems have numerous environmental and socioeconomic benefits, they also have a range of negative environmental impacts, many of which are small, localised and site specific (OECD, 1998). If appropriately designed and sited and using renewables to provide any energy inputs, many renewable energy systems have low or very low environmental impacts in the operation life cycle stage. However there may be significant environmental impacts in the construction life cycle stage, with these impacts similar to those of other engineering projects of a similar scale. Exceptions are large scale hydro and tidal schemes, which can also have very significant negative environmental impacts in operation. The construction and, for some renewable energy systems, also the operation phase involve inputs of energy, which should preferably be generated by renewable sources. The likely environmental impacts, as well as the likely effectiveness of mitigation measures, such as
There has been considerable pressure in the European Union to treat electricity as a totally free market commodity. Prior to 1989 the UK electricity system was under national ownership and had three main components (Boyle, 2004): • The Central Electricity Generating Board (CEGB) power stations which supplied the electricity. • The National Grid, also part of the CEGB, which distributed electricity at high voltage.
80
•
required to promote a combination of energy efficiency and conservation with a supply based totally on renewables, as the only way to achieve long term security of supply in an environmentally and socially sustainable way that does not contribute to global warming or inequalities in access to energy. (The potentially unlimited availability of renewables was discussed in Section 3.) This policy should involve supply diversity in terms of a mix of different types of renewable energy sources located in a variety of different areas. This would have the advantage of smoothing out variations in supply and improving supply security, as problems with or threats to one type of supply are unlikely to affect others. The costs of more expense renewable resources could be balanced against those of cheaper ones to give an acceptable average cost.
The local Area Boards which distributed low voltage electricity to customers.
In 1989 the UK electricity industry was privatised and these parts were split up and sold to a large number of private companies. This did not include the older nuclear power stations, which were recognised not to be economically viable. Since privatisation a number of mergers and take-overs have taken place and some companies have invested in the US and/or have been taken over by overseas companies. For instance the state-owned Electricite de France bought London Electricity. Currently decisions about which stations run at a given time are made by computer and based on a continuous process of competitive bidding. A computer model run by the private National Grid Company (which took over the national grid) estimates demand for the next few hours and invites bids to supply electricity. The different power station owners supply bids through computer programs, the cheapest offers are accepted and the appropriate stations are brought on line by remote control. Scotland and Northern Ireland were originally outside this competitive bidding pool, but the British Electricity Trading and Transmission Arrangements (BETTA) brought Scotland into the pool in April 2005.
Only governments are in a position to develop and implement this type of strategy. However they will require pressure from concerned individuals and organisations to do so. Market mechanisms will only promote the energy technologies that are most profitable under existing pricing structures. Government subsidies, legislation and regulation can have a limited influence on pricing and be used to require private firms to supply a certain proportion of renewables, but not to do so in a coordinated way or to the extent required. Market economics based on discounting of the future value, social, environmental and other costs of energy often act as a disincentive to the introduction of renewables. Therefore the introduction of a coordinated energy policy to increase the proportion of energy generated by renewables and promote energy efficiency, as well as a pricing structure to implement social and environmental objectives will only be possible under pubic ownership. This type of pricing structure could be used to encourage low energy consumption, while penalising high energy consumption, and could even provide a certain amount of energy free of charge to some or all domestic consumers. This would avoid the current tragic and avoidable situation of a number of elderly people dying of hyperthermia each winter.
Like many other countries, the UK has financial incentives for renewables, including the following: • Capital grants, which are available on a competitive basis for planting energy crops and offshore wind, solar thermal and PV systems. • The Renewables Obligation, which replaced the Non-Fossil Fuel Obligation (NFFO) in 2002. It puts a statutory duty on electricity supply companies to obtain a certain proportion of their electricity, which will be increased to 10% by 2010, from renewable sources. Additional costs of up to 3p/kWh can be passed on to users, but are unlikely to add more than 4% to bills. • Exemption from energy taxes. • Renewable Energy Feed-In Tariffs (REFIT) fixed premium prices for electricity from renewable sources. • The Climate Change Levy (CCL), which was introduced in 2001 for energy supplies to business, but not domestic consumers. New renewable sources and 'high quality' combined heat and power systems, but not nuclear power, are exempt.
The direct costs of any energy generating system are based on the following four components: the capital costs of constructing the system (including any interest on loans), fuel costs, operation and maintenance costs and decommissioning costs. For most renewable energy systems, the fuel costs are zero and the capital costs are relatively high and the most significant cost element. Many renewable energy systems have long lifespans. Unfortunately discounting, based on the idea that a sum of money today is more valuable than the same amount in the future, is used in financial calculations and often applied to the value of the electricity generated, reducing it to zero after a number of years which depends on the discount rate used.
However, despite these incentives, the basic context of energy policy and infrastructure development in the UK is competitive bidding by a number of private companies. This context does not support the development and implementation of a coordinated energy policy based on long term social and environmental needs rather than short term economic advantage and including an appropriate energy infrastructure. This type of energy policy will be
81
Most renewable energy systems have high capital costs, relatively low running costs, no fuel costs and long life times. For schemes with long life times, such as over 100 years for hydroelectric plants, the capital repayment period (rarely more than 25 years) is much shorter than the plant life time. Therefore, if the running costs were ignored, the plant could be considered to provide free electricity after 25 years, but the value of this electricity is often discounted to zero. Therefore the existing market approach to evaluating the costs of renewable energy systems generally disadvantages them due to the high initial costs and the use of discounting. This means that the relative economics of renewable and fossil fuel or nuclear systems would change under a different approach to costing.
systems. Diversity of supply has a number of benefits including smoothing variations in supply, making it easier to follow variations in demand and increasing security of supply. Accounting procedures which take account of the full environmental costs of fossil fuels and nuclear power, including the future costs of decommissioning nuclear power stations and storing the radioactive waste for very extended periods. Significant financial support, possibly in the form of low or zero interest rate loans, for the construction of renewable energy systems.
Therefore the economics of a particular type of energy depend on the following factors: • The costs: capital, fuel, operation and maintenance, and decommissioning. • Whether energy generation is privatised or nationalised. Private firms generally have to make a profit in the short term (while operating within the law), whereas nationalised systems are able to take into account environmental and social issues, such as the imperative to reduce carbon dioxide emissions. • Whether discounting is applied to the value of the electricity generated and the discount rate used. • How the environmental and social costs of generation are taken into account, as this will affect the relative costs and economics of the different systems. • The availability of subsidies, tax discounts and other financial or policy support for renewable energy. • Whether the source of energy is required to be competitive with other sources of energy, make a profit or cover costs.
This paper has discussed the economic and political context in which decisions on energy policy are taken in the context of a UK case study. It has demonstrated that this context has a determinative effect on the resulting energy system. In particular it has been shown that a sustainable energy policy based on renewables, energy efficiency and energy conservation will only be possible under national ownership and that current techniques for calculating the costs of energy, including the use of discounting, act as a barrier to renewables.
4. CONCLUSIONS
REFERENCES Ahern, N. (2003). The European Union's support for renewable energy. In: R. Douthwaite (ed.), Before the Wells Run Dry, Green Books. Boyle, G. (ed.) (2004). Renewable Energy: Power for a Sustainable Future, 2 nd ed., Oxford University Press and Open University. Dropkin, G. and D. Clark (1992). Past Exposure: Revealing health and Environmental Risks of Rossing Uranium, Namibia Support Committee and Partizans, London. Hersh, M.A. (2006). Mathematical Modelling for Sustainable Development, Springer Verlag. Houghton, J.T. et al. (eds.) (2001). Climate Change 2001: Scientific Basis, Cambridge Univ. Press. McCarthy, J.J. et al. (eds.) (2001). Climate Change 2001: Impacts, Adaptation and Vulnerability, Cambridge University Press. Michaelis, L. (2002). Sustainable consumption and production. In: Dodds, F. (ed) Earth Summit 2002 a New Deal, Earthscan, 75-100. Moody R. (1992). The Gulliver File. Minewatch. OECD (1998). Benign Energy? The Environmental Implications of Renewables, OECD/IEA. Rossing (2004). Rossing Working for Namibia Report to Stakeholders, www.rossing.com. SDC (2006). The role of nuclear power in a low carbon economy, Sustainable Development Commission, http://www.sd-commission.org.uk. World Bank (2004). World Development Indicators, The World Bank.
For renewable energy sources to provide a majority and eventually almost all the world's energy requirements a change in the relative economics of renewable and other energy sources will be required. This will involve one or more of the following: • A move away from current approaches based on discounting, so that the full life time value of the energy generated can be considered. This will probably require nationalisation of energy provision, as the main concern of most commercial firms is relatively short term profitability. • Balancing the costs of more expensive renewable energy sources against those of cheaper ones, so that the average cost of the power generated is acceptable, though the costs of some units may be high. This would again require either nationalisation or significant subsidies or guaranteed prices for the more expensive energy
82
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
ECONOMIC, ETHICAL AND CULTURAL ASPECTS OF ICT CHANGE Jozef B. Lewoc1, Antoni Izworski2 and Slawomir Skowronski2 Leader (Leading Designer), ul. Powst. SI. 193/28, 53-138 Wroclaw, Poland Wroclaw University of Technology, Wybrzeze Wyspianskiego 27, 50-370 Wroclaw, Poland Corresponding author: Jozef B. Lewoc, ul. Powst. SI. 193/28, 53-138 Wroclaw, Poland Tel: +48-71 361 4436, Fax: +48-71- 783 7897, e-mail:
[email protected]
Abstract: The economic, ethical and cultural aspects are most clearly seen during the technology transfer and change processes. The paper presents a case study of such processes, developed in a high degree a case study country of Poland, after the political transformation in 1989. The paper describes several pitfalls that may be fallen in by both the technology providers and recipients. The pitfalls are illustrated by actual events occurring during the ICT technology transfer in power systems in the case study country. Copyright © 2006 IF AC. Keywords: electric power systems, energy distribution, computer control system design, technology transfer, methodology
a dozen or so percent. Assuming ca 10% benefits, we obtain the value of the benefits equal to some 40,000,000,000 dollars.
1. INTRODUCTION The problems of ICT implementation in automation, raised by the SWISS Conference Prishtina 2006 are both economically and socially important. On one hand,, understanding of them may help for the systems designers to think over what they actually work for, what can be the impacts of their work and what to do that their work is accepted and included. On the other hand, understanding the problems may help many ICT recipients may defend themselves against inappropriate methods employed sometimes by big corporations delivering ICT systems.
Therefore, the paper is a case study of the economic, ethical and cultural effects of the ICT transfer process in the power system automation in the case study country. The economic, cultural and ethical; aspects of technology change and transfer are discussed by many authors, especially of the SWIIS (Supplemental Ways for Improving International Stability) circles (Hersh, 2001a; Jancev, 2001). The authors of the present submission believe it to be appropriate to support these generalisations with some detailed data acquired during the on-going process of the technological change for ICT in computer automation for the power industry in the case study country.
Applications of ICT in computerised automation systems in the power industry is a very important domain from the social point of view. This is implied by very big economic and financial effects of implementation of ICT in the domain. For instance, in the case study country of Poland, regional power distribution board computer monitors (Monitors) implemented in the late seventies had under their control more than a half of electrical power in the country for close to 20 years (Lewoc, 1992). In the power industry, economical benefits are evaluated as
The intention of the authors is to blow the whistle (Hersh, 2001b), i.e. to warn of the pitfalls that may be found on the way towards the ICT change that, at least in theory, should lead the society to some
83
magnificent future. In other words, the authors do believe that warning of such pitfalls may help in realisation of the expectations (and, perhaps, dreams) of the future social stability (Kile, 2001).
hard conditions then their counterparts in the Western countries. This approach was forced by the general situation of the case study country but was somewhat similar to that in the University of Cambridge Cavendish Laboratory, where the lowcost approach to science was their tradition. For instance, Sir Marin Ryle (diseased) was proud to say about the minimum financing for their work. So they could have a chance to develop themselves well: more then half of sky objects were identified by C for Cambridge and they got the Nobel prize for pulsars and super-synthesis of aperture. And the case study country got the Monitor benefits. Without a serious approach to performance evaluation, it would not be possible
The technological change process under discussion began, definitely, in Poland in the seventies though some work was done earlier, trying to develop a power generating unit monitor on some obsolete computer with drums as the basic operating memory. The task was, obviously, infeasible.
1.1 Pitfall 1 If you develop a novel computer system (novel means here a pioneering system at least in your country) and you forget the slogan: "Think computers, think performance ", your efforts may be useless.
1.2 Pitfall 2 Jumping into a conclusion that an ICT large-scale system, even the one manufactured by some world leader in the area, must be better that the system developed in your country, directly for your fellowcitizens, results often in high losses.
Poor performance characteristics were the reason of rejection (refused acceptance) of many ICT implementation projects, especially in power system automation. A good example may be numerous problems with application of PC compatibles in the case study country and elsewhere. However, the computer, Odra 1325, available in the seventies in the case study country (ICL 1902a compatible), though intended primarily for numerical computations and of much less computing power, enabled to initiate, actually, the very successful technological change. But this required rather a lot of work. First of all, a system of industrial peripherals (SMA) was to be developed with a special consideration paid to adequate field data transfer throughput. Secondly, a special-purpose operating system was designed, also considering performance an significant characteristic of the system. The whole configuration (hardware and software) was investigated by simulation and ad hoc measurements to verify that the performance constraints are not violated.
The early eighties were the years when the technological change was stopped in a considerable degree due to political reasons (the marshal law). However, the local staff educated in the seventies developed successful systems (training simulators, microprocessor-based monitoring tools for power distribution and generation centres, etc.). The training simulators, developed on the on the same hardware and software solutions, though, of course, adopted to the needs of e-training, deserve some special notice. Though it is commonly assumed that effective training simulators need computing power of several MIPS, the systems developed in the case study country on the Odra 1325 computer that was some three orders of magnitude slower, proved very useful (more than 90% of Polish power network engineers were successfully trained on the simulators). This was possible due to the fact that instead of solving complicated differential equations, pre-prepared answers defined by experienced trainers were used in e-training sessions and the problem of inadequate computing power was successfully by-passed.
It should be mentioned here about some hardware and software tricks that must have de devised by the designers to overcome the problems created by the rather obsolete hardware and software they had at their disposal. For instance, poorly designed core memory drivers in Odra 1325 resulted in frequent trip-offs of the computer in operation. Considering such problems, the design team developed the software in a way enabling high-speed restart and a simple restart PC board plus a piece of software enabled to by-pass the problem effectively: the overall availability factor of the systems in regional power distribution board exceeded 90% during some eighteen years (maintenance breaks included).
Another case exemplifying this pitfall may be that of o computer integrated manufacturing and management (CIMM) system for a new power plant, that was designed in late seventies. However, the power plant constructions was delayed severely. Some five years later the contract for of automation of the power plant was granted to a big Western corporation. However, they could offer the low level monitoring system only, roughly a dozen or so percent of the complete CIMM hardware and software architecture.
When the problems connected with Odra 1325 reliability are added, one can easily see that the designers of Monitors were to work in much more
84
Development of the "managerial" part of the system later and attempts to integrate it with the monitoring part of the system at a later date, proved to be rather costly and hardly feasible.
In a part, it was due to a down economy period. However, as in the case of the institute, that had been earlier in a convenient position of the monopolist in development of ICT systems in the power industry, a major reason was that the institute could not and even did not try to fight for its leading role in implementation of ICT systems in power system automation.
As a matter of fact, the offer of CIMM systems, severely needed by the power industry and other enterprises is still empty even now (2006).
The institute suffered a lot: they employed some 700 hundred people in the most successful period of their activity. Now they employ a hundred or so people and perform rather minor tasks for the power industry.
1.3 Pitfall 3 If you do not use your best people to solve difficult design and implementation tasks, you may suffer severe losses. In the late eighties, some new work on large-scale technological changes was done with various results. The leading positive role was played there by a local institute involved in power system control that had successfully designed and implemented the ICT systems mentioned above. The institute possessed a staff of the most successful experience in design and implementation of ICTs in power system automation in the case study country. The experience included a power generating unit monitor for a power plant.
1.5 Pitfall 5 When you try to transfer ICT systems and do not make use the best local staff, you may lose. Considering the negative effects connected with the ICT change in the power system automation in the case study country, mentioned above, people involved in the processes, especially the leading designers who had been the actual parents of the successes, waited hopefully for possible big corporation to enter the case study country to carry out the ICT transfer job. The assumption was that they had been successful with similar their own systems so they should be useful for the new ICT system transfer work. This assumption was reasonable since the leading designers were the ones who knew the best the actual problems connected with acceptance of ICT systems in the case study country, and the system acceptance is ranked by many experts as the most important feature of any ICT system.
However, when an order was received to design and implement a monitor, on a new minicomputer, for the biggest power plant in the country, the task was allocated to a team of no actual earlier experience in the problems. The results were pitiful. The system development period was about 8 years. During the period, the leading designers changed several times. The design documentations looked as a collection of mutually independent and often inconsistent parts. And the work was completely unsuccessful. In addition to the loss of money, the institute lost a lot of their prestige as the leading institution in design and development of ICT systems for the power industry in the case study country.
Unfortunately, that was not the actual case. In the nineties, four big corporations operating in the power system automation established their branches in the Lower Silesia (Wroclaw province. However they were not interested in employing the leading designers. Instead, they were interested in buildings and equipment, managerial staff (tested with a negative result) and lay labour.
Another example may be here that of the power system computer automation centre established in Wroclaw wherein the institute had its seat. Some staff was taken from the institute but from the department possessing no earlier actual experience in design of ICT implementations in power system automation. The effect was that for many years they were only capable to develop cabling for ICT systems developed by other companies.
Corporation 1 took over the Polish biggest manufacturer of computers, declaring to help them to remain in the computer market. The corporation never tried to find the successful leading designers of ICTs, the actual pioneers of the computer science in the case study country. Consequently, the corporation was not successful to find any job for the enterprise in the domain of ICT or domains near to it.
1.4 Pitfall 4 If you win in your technology change activities and you rest on your laurel, you will loose. In early nineties, due to the down economy period in the case study country after the political transformation and due to the naive liberalism, the growth of the power system was stopped and even reversed.
Corporation 2 took over the power industry automation centre mentioned above. Obviously, they looked for buildings and equipment, and not for the
85
best experienced staff in ICT systems for the power industry.
The Conference program may be considered as asking the question: Who is a winner and who is a loser in implementation of ICT systems in automation? If the parties of such question are limited to the ICT pioneers in power system automation and the Corporations, the answer is: both. The pioneers lost a chance for continuation of their work and had to find other jobs. And the Corporations:
Corporation 3 established a branch in Wroclaw, employing people of zero experience in power industry automatic control. The same was with Corporation 4 that established a branch near Wroclaw (in Klodzko, Lower Silesia). Though the Corporations tried to operate in the Lower Silesia, the forging shop the computers and ICT applications of the case study country, they employed no one of the local leading designers, the actual pioneers of ICT in the country.
Corporation 1 could not find any work for the exbiggest Manufacturer of ICT systems in the case study country. In a year or so they started a program of voluntary quitting the job by the employees and soon decreased the employment from some fifteen hundred to two and half hundred and, after a few years, completely sold the enterprise.
The methods used by the Corporations may be presented on the basis of experience of the most successful leading designer of ICT implementation of the power industry
Corporation 1 lost quite a lot of money and prestige, at least in the Lower Silesia and the case study country.
The designer submitted a proposal of work for Corporation 1. In two days, he received a rather long e-mail from the Corporation director for staff, explaining that they had studied his website very carefully and that he will never get any job from them. So he was on their black list. He looked at his website once again; everything was normal: projects, hardware, software. Only one thing was rather odd: he had led the project of Tv Solidarity in the middle eighties. Is it possible that he has been put on the black list for the anti-communist activity in contrast to the people put on such lists by McCarthy because of their communist activities?
Corporation 2 did not get a technical nor economic success and, after a few years, had to wind up the power industry automation centre in Wroclaw and to move, almost completely, from the Lower Silesia. A loss of money and prestige was the overall result. Corporation 3 also did not get a success in the Lower Silesia. So they decided to close their Wroclaw branch in an illegal way, however. They simply declared closure without any negotiations with creditors, required by the valid law. A loss of money, lost prestige and an opinion of a plain thief were the results.
Corporation 2, though operating in the same domain he had been the definite Polish pioneer in before, never proposed him any employment in ICTs in the power industry, for instance as a consultant. On the contrary, as he was also a professional translator, the Corporation that ordered translations for their localisation purposes, requested from the translation offices that the designer might not be a subcontractor. This looks rather ridiculous especially when it is remembered that he has been the pioneer in ICT applications in power system automation and he and the teams he has led have been responsible for devising of local terminology in that domain.
Corporation 4 suffered the lowest losses. However, for a long time period they could even pay wages for their employees in due time and had to move out, partially, from the Lower Silesia. Considering the results of both parties, a question may be asked: is there any sense in loose-and-loose games, when everybody looses? 1.6 Pitfall 6 Insufficient ICT transfer control by the authorities results in rather poor effects.
Corporation 3 commissioned quite a lot of translations to him till they learned his professional carrier. Then they stopped to do so and even did not pay quite a serious amount for his earlier translation work. Corporation 4 behaved similarly, though they were honest enough to pay all their dues.
State
During the period of vast ICT transfer to the case study country, local enterprises had to compete alone, without almost none support from the government, with big Corporations of well developed countries. And they lost. The biggest manufacturer of computers, a big automation enterprise and the power industry automation centre mentioned above, etc. were closed down. The State did nothing to protect them. Such naive liberalism may lead to the situation similar to that of the case study country, where the government permitted for that, at the end of the
The methods used by Corporations 1-4, i.e. negative mobbing, black lists, direct stealing, are commonly recognised unethical, immoral, non cultural and socially harmful. And, from the point of view of the Corporations, the methods proved to be ineffective, since the all four Corporations lost and had to move out from the Lower Silesia.
86
XX-th century, the biggest manufacturer of computers in the case study country was liquidated.
ICT and automation transfer in the case study country. The authors dedicate the papers to the actual pioneers of ICT and automation in the country.
1.7 Pitfall 7
The authors are not magi and can not improve the fate of the pioneers. But there is small chance that somebody reads the papers and protects himself or herself against inappropriate technology transfer ways. People, especially young ones, usually look at big corporations and their management through the perspective of their technical and financial success, and think they are wise. That is wrong: they are educated only, and education is not a synonym of wisdom. To be recognised wise, they must actually understand and accept the basic human notions of ethics, morality and culture, and not to try to make any harm to other people, especially weaker ones.
The interrupted experience continuation is a severe inhibitor of the ICT change. The very basic reason of the failure of the case study country enterprises involved in the ICT change and the Corporations 1-4 was that the actual local experience in the domain was not continued nor enlarged. This would require, to make use of the knowledge and experience of the successful leading designers of ICT projects. They knew the local conditions in the highest degree and proved that they could cope with them.
In some aspects, the papers touch dirty things and people usually are ashamed of writing on such things, especially for technical and research events. However, the authors do think that that it is beneficial for people doing dirty tricks. If so, the experiences of the pioneers will not be lost uselessly.
Changing them by other people, even those of knowledge and experience for other countries, proved to lead to rather unnecessary losses. Some corporations claim that they do continue the experience of the acquired enterprises: the managerial experience. Indeed, the Corporation 1 maintained the ex-director of Elwro on his position and did nod do any bigger changes in the lower level management.
ACKNOWLEDGEMENTS The authors gratefully acknowledge the support of Marion Hersh, Larry Stappleton, Frederick Kile and Peter Kopacek in publication of the three papers.
This seams rather ridiculous. The design staff, especially the leading designers, were the people who successfully implemented the pioneering ICT systems in the case study country, often against rather severe resistance of the managerial staff. And no of the corporations mentioned above even tried to find them. On the other hand, the managerial staff were directly responsible for the difficulties of ICT and automation enterprises; in general, they were poorly educated and experienced to fight effectively for their enterprises in the times of international markets, free competition, PC, etc. But may be it was a reward for them: for destroying their enterprises, they were offered to keep their positions.
REFERENCES Hersh M.A., Technology Change, Technology Transfer and Ethics: Part I, In: Kopacek P. (Editor), The 8f IF AC Conference on Social Stability: The Challenge of Technology Developments, Vienna, 2001a. Hersh M.A., Whistleblowers - Heroes or Traitors?: Individual and Collective Responsibility for Ethical Behaviour, In: Kopacek P. (Editor), The 8f IF AC Conference on Social Stability: The Challenge of Technology Developments, Vienna, 2001b. Jancev M. and Cernetic J., A Socially Appropriate Approach for Managing Technological Change, In: Kopacek P. (Editor), The 8th IFAC Conference on Social Stability: The Challenge of Technology Developments,, Vienna, 2001. Kile F., Insights into International Social Stability, In: Kopacek P. (Editor), The 8th IFAC Conference on Social Stability: The Challenge of Technology Developments, Vienna, 2001. Lewoc J.B., Rozent M., Saczuk I.., The Computing Power and the Computer Systems for the Power Industry in Poland, In: MICC (IFAC), Praha, 1992.
2. FINAL REMARKS The purpose of this paper is not to fight for improving the situation in the case study country. This milk has been spoiled already, the pioneers of ICT implementation in power system automation in the Lower Silesia found new jobs, the leading enterprises were closed. The actual purpose is to present the problems to some other people; perhaps they can protect against the adverse effects described. Since the national poet of the case study country wrote some time ago: The one whose dead corps may create a step to the town of glory for other people is also happy. The paper is the third and final of a series of papers devoted to the ethical, moral and cultural aspects of
87
This page intentionally left blank
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
AUTOMATION, CONTROL AND SUPERVISION OF COMBINED HEAT AND POWER SYSTEMS Jozef B. Lewoc1, Antonina Kieleczawa2, Antoni Izworski3 and Slawomir Skowronski.3 Leader (Leading Designer), ul. Powst. SI. 193/28, 53-138 Wroclaw, Poland IASE (Institute of Power System Automation), ul. Wystawowa 1, 51-618 Wroclaw, Poland 3 Wroclaw University of Technology, Wyb. Wyspianskiego 27, 50-370 Wroclaw, Poland Corresponding author: Jozef B. Lewoc, ul. Powst. SI. 193/28, 53-138 Wroclaw, Poland; tel: +48-71-361-4436; fax: +48-71-783-789-7; e-mail:
[email protected] Abstract: The paper presents some technical aspects of the automation, control and supervision of combined thermal and electric power in Poland, on the example of major products and implementations developed by the Institute of Power System Automation during several previous years. The general diagram of the hardware system Powerster designed and developed for combined heat and power plants is discussed, together with the individual solutions on the three hierarchy levels employed. The system software (applications and middleware) developed earlier is also depicted. On the example of the system Powerster, some positive aspects of the technology transfer process based on transfer of hardware to the developing countries and the use of local experience are specified. Copyright © 2006 IF AC. Keywords: heat and power systems, monitoring, supervision, computer networks, technology transfer.
1.
However, some of them, who stayed with IASE or co-operated with BPBiT Leader (a small company continuing the Polish pioneering design and research work in ICT and automation), could undertake the challenge released by the Polish thermal power industry in the late nineties and design and develop the most severely needed systems.
INTRODUCTION
The Institute of Power System Automation (IASE), Wroclaw, Poland, have been a definite leader in design, development and implementation of Polish pioneering monitoring and control systems for the power industry (Lewoc, 1992). Since the seventies, IASE have educated a wide experienced staff for design of the system functionality, selection of the hardware and software structures, design and development of specialised hardware and software modules (including single-board microcomputers), design, development and implementation of complete systems, training, etc.
This challenge is particularly sever in the times of the energy crisis endangering the political and environmental stability. It needs to look for new renewable energy resources. But a lot can and should be done in the area of energy conservation and the paper is devoted to this domain.
Due to the reasons described by Izworski, 2001, IASE suffered severe financial problems and most of the experienced staff left the Institute during the very low economy period in Poland in early nineties.
It should be emphasised that after the political transformation of 1989 and after the earlier Polish down economy period, the demand for electric power decreased considerably in Poland instead of pre-
89
planned continuous increase. Therefore, IASE, the biggest organisation in Poland developing computer systems for the power industry, had to look for a market for themselves in the thermal and electric power industry.
2.3. The Operator's Level The hardware basis of the Operator's Level consists of the Processing/Graphic Station (PGS) PC's (preferably in the industrial version) co-operating with colour visual displays (including so called graphic walls (Synelec, 2003)), printers, standard and and/or specialised keyboards and manipulators. The PC's are synchronised with the satellite Global Positioning System (GPS) and interconnected one to another and with so home-made gateways.
The paper will describe the basic product for the application range, the Powerster system, based on the earlier IASE product, the Master System. A typical structure of the Powerster system for a combined heat and power generating plant, EC Wroclaw, will be discussed. Some issues connected with the technology transfer process will also be addressed.
The complete structure operates on the QNX platform, under control with the home-made middleware and software. The middleware controls the basic system functionality covering communications, processing, archiving, presentation and man-machine dialogue.
2. THE POWERSTER SYSTEM 2.1. General A basic problem needing solution in combined heat and power generating stations (HPGS) is connected with monitoring and control of the Heat and Power Generating Units (HPGU) operation. Due to the huge number of analogue and digital variables (both primary and secondary (calculated variables)), this requires application of advanced computer systems/networks.
Supervision and Management Level
The first Polish first system intended specifically for monitoring of HPGU's was developed on the turn of the eight decade. The schematic diagram of the system which was improved in compliance with the technology transfer process in Poland is shown in Fig, 1.
Gateways (GATE)
Operator's level
2.2. The Process Level
Operator's stations
The Process Level (PL) is constituted of the Intelbased microprocessors (designed and developed by IASE and called the cells), the analogue and twostate Input/Output modules, the communication module (MasterNet) being a redundant version of CSMA-CD (Ethernet) LAN) and the power supply circuits required (grouped in so called automation hubs). The LAN MasterNet interconnects the process stations with PL and the Operator's Level (OL) as well as the Engineering Subsystem Level (ESL).
x1 Si
"S \S
Communication / processing stations
Engineering subsystems Configuring / diagnostic st.
Process level
The PL functionality, realised under control of the software platform (home-made operating system) and of the applications software written under the specialised, object-oriented programming language REGIN-H, and with use of another home-made program, the graphic editor, covers the following basic tasks:
Process station
Field Ins/Outs Sensors & actuators
the user algorithm executed in a cell, transmissions between the cells, exchange of data with OL, buffering of event messages at the level of the cell and hub.
Fig. 1. Schematic diagram of Powerster
90
The application software covers a set of customisation parameters (process variable catalogues, definitions of screens, reports, calculating algorithms for secondary variables, etc.), prepared in the Configuring/Diagnostic Stations (CDS) and controlling the computational and presentation tasks on the OL.
Visualisation, automatic and direct control, realised with specialised screens (Scheme, Events, Alarms, Catalogue, Plot) and windows: Automatic Control, Direct Control, dialogue and information boxes, Data-logging and reporting (many report templates and home-made report writer, uninterrupted logging on magneto-optic compact disks, colour screen hard copies, etc.), Operator-machine dialogue (via standard and/or specialised keyboards, visual displays (including the Graphic Walls) and manipulators).
The OL functionality covers, among other things: Communication with PL (standards available: Ethernet, RS-232, RS-485), Automatic archiving of all variables defined in the system, Event archival (normally, ca. one million events), Secondary variable processing (performed with use of more than 30 standard computational functional modules),
A typical plant scheme is shown in Fig. 2.
150
TUM Fig. 2. Scheme screen Secondary (functional) processing editor (more than 30 standard algebraic and logical functions, expandable of special functions developed on the Customer's demand), Screen editor (to create screens with plant synoptic schemes, bar-graphs, plots, colours under control, tables, digital values, logic data, etc.), Report writer to create report templates for the field and secondary variable data, Field signal and automatic and digital control structure processing editor (to create the algorithms with a graphic environment.
2.4. Engineering subsystems The Engineering Subsystems (ES) enable to develop Powerster software on the basis of customisation, thus facilitating the task and avoiding many possible programming errors. The customising functionality is realised by the following editors of ES: Catalogue editor (used to create the sets (called catalogues) of the field variables, secondary variables, operator's variables, automatic control systems and direct control systems),
91
2.5. Supervision and Management Level
the total plant. For this purpose, the HTTP processes in the gateways may transfer data to the WWW servers (basically) and to the other SML level subsystems. In addition, it is being investigated if it is feasible to employ at SML some specialised expert systems, e.g. G2 (Gensym, 2003), intended towards improvement of the working media production profitability.
It is planned that the Supervision and Management Level (SML) will enable to develop the Computer Integrated Manufacturing and Management (CIMM) systems considered (by the engineering and managerial staff of heat and power generating plants and other works (Franasik, 2001, Izworski, 2006)) as the necessary component for optimum operation of
Supervisory &]Vknagpment Network
HPGS Control
Boiler 1 operator's computer
Turbine 1 operator's computer
Turbine 2 operator's computer
Boiler 2 operator's computer
Water boiler operators' computers
Operator's Level (CL)
Process Level (PL) Process Station 1
Process Station k
1 Heat and power generating [dant under monitoring and control
Fig. 3 Schematic diagram of exemplary solution
92
The basic aspects of the technology transfer in the domain of the power industry computer automation systems are discussed by Lewoc (2005).
3. EXEMPLARY PROBLEM SOLUTION An exemplary solution of the monitoring and supervision problem will be described hereinafter for the case of a combined thermal and electric power generating plant, supplying a several hundred thousand inhabitant town in Poland. The solution is presented in Fig. 3.
The successful solution described hereinabove and the other ones were implemented in spite of that, in the nineties, during the time of the naive liberalism in Poland, IASE had severe troubles connected with their existence. However, the staff educated by the Institute was so numerous that the rest that stayed with IASE were enough to undertake the new challenge of the power industry and, even more, of the overall economy of the country. It worked even though, because of the financial problems, the financing necessary for novel solutions was severely limited and, even more, many possible customers accepted the idea of numerous High-Tech providers that in the technology transfer process, Polish engineers should be treated as lay ones only.
The plant under control consists of two HPGU's (100 MW each) and two old water boilers which are in operation in order to enable fast changeovers of the working HPGU's. In total, the plant under monitoring and supervision is described by several thousand two-state and analogue variables (primary or secondary ones). The process stations (automation hubs) intercommunicate with the OL computers via the LANs at the levels under discussion (and relevant gateways).
And even the Western investigators promote other ways of the technology transfer (Hersh, 2001; Kile, 2001). This paper presents a success of the IASE approach to the technology change/transfer process.
At the Operator's Level, there are two computers per a HPGU (one for the boiler operator and the other for the turbine operator). In additions, there have been provided two computers for the water boilers and one for the overall plant Control Engineer.
The basic reasons for this success were as follows: • Prospective employers in Poland (and in other developing countries) are stopping to believe in honest intentions of the big HighTech providers, • Experienced Polish designers understand better the needs of the Polish heat and electric power industry, • The problems occurring in the developing countries are often too difficult for designers of the developed, "well-ordered" countries, • The presentation layer is of high importance in the monitoring systems; therefore the thoughtless localisation may result in rather inefficient systems, • A heresy may be repeated here: a successful designer in a poorly developed country is better than his or her High-Tech country counterpart, since he or she has had to work in much more difficult conditions for the success.
The graphic wall shared by the authorised operators/engineers enables large-scale graphical display of the data acquired and control of process actuating members. It is very useful for displaying of important plant schemes, especially in emergency conditions when the operators and control engineers should have at their disposal some scheme and other display forms of high readability, reliability and robustness. The OL computers intercommunicate with the Supervisory and Management Network (SMN) ones. However, it should be noticed here, that the staff operating at this level are not allowed to perform direct control on the plant (for such actions, only the Control Engineers and Operators are authorised); the customers at this level may only select the data they need for their work. The solution was implemented in 2002. Usually, the benefits generated by similar monitoring and supervisory systems in the heat and power industry are assessed as some dozen or so percent of the thermal and electric energy sold by the plant. At this assumption, the system paid back many times during the first half year after being commissioned.
4.2. Negative examples The above theses may be also supported by the following negative examples. Examples of Elwro. The problems experienced by a big Western corporation and Poland after acquisition of the ex-Polish biggest manufacturer of computers, Elwro, are described by Izworski, (2001). Let us describe here in some more detail another project.
4. SOME TECHNOLOGY TRANSFER ISSUES
The same corporation was granted a contract for design and development of the operator's systems for a 360 MW Power Generating Unit (PGU). They
4.1. General issues
93
subcontracted the order to a local power industry automation company, established on the basis of the team educated in late eighties on the project intended for the same power plant (and abandoned due to the down-economy period in Poland). However, this company did not employ the most experienced designers of the team. Moreover, they enlisted the most experienced leading designer on their (political) black list. The result was that the task was not executed in a proper way. The basic mistake of the corporation was that they did not look for the best designers available but for the managerial staff, buildings, equipment and so on. Perhaps the things are of some importance, but not in the case of the technology transfer where they should be substituted by the High-Tech ones.
recognise the technology receivers as lay people sets only. They should seek for the most experienced designers available in relevant countries and employ them to develop the best solutions for the countries under consideration. They should not base the technology transfer process on the thoughtless localisation only. In the other case, they will loose sooner or later. In addition, such approach is simply unethical and cultureless, especially in the third Millennium. And, paradoxically, in a longer perm, such companies loose (their image and money). REFERENCES Franasik L. et al. (2001), System Media - A Step towards Computer Integrated Manufacturing and Management Systems, AMSE Press, pp. 37-46. Gensym (2006), G2 Expert System, Available at: www.gensymcom/index.html. Hersh M.A., Technology Change, Technology Transfer and Ethics, In: Kopacek P. (Editor), Social Stability: The Challenge of Technology Development (SWIIS '01, IF AC), Vienna, pp. 6368. Izworski A and Lewoc, J.B. and Piwowar B. (2001), Some Aspects of Technology Transfer - A Case Study, In: Kopacek P. (Editor), The Challenge of Technology Development (SWIIS, IFAQt, Vienna, pp. 55-60. Izworski A. and Lewoc J.B. (2003a), Robustness Comparison of Enterprise Energu Distributions Systems of Various Topologies, In: Robust Control Systems (IFAC), Milan. Izworski A., Lewoc J.B. and Skowronski S. (2003b), Robust Performance Case Study: Topology of System Media, In: Control Applications of Automation (IFAC), Visegrad. Izworski A., Lewoc J.B. and Skowronski S., (2006), Development of computer integrated manufacturing and management systems, In. Information Control Problems in Manufacturing (INCOM2006, IFAC), Kile F. (2001), Insights into Future International Social Stability, In: Kopacek P. (Editor), Social Stability: The Challenge of Technology Development (SWIIS '01, IFAC), Vienna, pp.4548. Lewoc J.B., Rozent M. and Saczuk I., The computing power and the computer systems for the power industry in Poland, MICC (IFAC), Prague 1992. Lewoc J.B., (2005), Practical Ethical Aspects for Technology Transfer and Change in Computer Control System Development, In: The 16-th IFAC Congress, Prague. Synelec MT (2006), Graphic Wall, Available at: www.synelec.com/corporate.html#.
Another example. A big Western corporation acquired the Power Industry Automation Centre that was the entity that had developed, in co-operation with IASE, the system MASTER that had been an predecessor of the system Powerster described in the present paper. However, they did not take care for co-operation of the most experienced staff available in Wroclaw. Even more, they put the name of the most experienced leading designer on the (political) black list, like the first corporation did. In addition, they forced the local staff to localise thoughtlessly their systems. They lost and had to liquidate the Power Industry Automation Centre in Wroclaw. Still another example. A big Western corporation established their branch in Klodzko, Lower Silesia, Poland and treated their employers as lay ones only. They never looked for experienced Polish designers for the power industry automation. They lost and had severe economic troubles. Some people present opinions defending the big Tigh-Tech providers: the recession. However, the authors believe that the more severe is the recession, the smaller mistakes can be tolerable. And the big providers mentioned above (in practice, all operating in the Lower Silesia region, the ex-kingdom of the Polish heat and power industry automation and computers, in general) made the biggest, philosophical, the very basic mistakes The negative examples presented hereinabove do confirm the thesis specified at the end of the previous Subsection 6.1 and the more general ones defined by Hersh (2001) and Kile (2001). 5. CONCLUSIONS In the technology change and transfer process, the developing countries have to take care on development of their own experienced staff. The High-Tech companies working for the heat and electric power automation industry must not
94
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
COORDINATION OF THE MULTI AGENT SYSTEM AND ITS APPLICATION TO ROBOT SOCCER Arbnor Pajaziti1^ Ismajl Gojani1^ Gazmend Shala1^ Peter Kopacek2) ^Mechanical Engineering Faculty, University of Prishtina, KOSOVA
[email protected],
[email protected] ,
[email protected] 'Institute for Handling Devices and Robotics, Vienna University of Technology, Austria kopacek@ihrt. tuwien. ac. at
Abstract: Multi-Agent-System (MAS) consists of a group of agents that can take a specific role within an organizational structure. The coordination of the multi agents is associated with a lot of supplementary work in advance. The robot soccer system is a good technique for multi-robot cooperative autonomous systems, with highly coordinated operations and movements as to fulfil specific objectives, even under adverse situations. Robot soccer system helps to understand and provide with theory and principles for constructing complex systems with multiple agents and their coordination or competition in dynamical environments. On the other side robot soccer is a good tool for the edutainment of technical fields such as mechanical, electrical, software engineering etc. In this article, we introduced the development of the robot soccer system at Mechanical Engineering Faculty. According to the experience with the students the robot soccer is very good tool for the education of different engineering as well as technical subjects. They can study and perfect their knowledge on simulator application and its real time application to robot soccer that can enable to implement their own ideas, in particularly. Key words: Multi Agent System, Robot Soccer, MIROSOT, Image processing, Control
robot it is allowed only wireless communication. Mobile robots should act under the unknown environment with static and dynamic obstacles.
1. INTRODUCTION Robots mainly in industry are used. Today there are new fields of robot applications, for instance: robots for service works, in house, restaurant etc. In future, personal robots will have several advantages, as is decrease of the service costs, which reduces the needs for the workers capable for simple and dangerous work routines (Kim et al, 1998a, 1998b; De Almeida, et al., 1998).
2. ROBOT SOCCER SYSTEM Beside the severity of hardware as is CPU (Central Processing Unit), actuator, other sensors, the robot soccer system is distinct in control algorithm, strategy and complete integrated system. The hardware and software selection among different methods is a challenge for robot designers. Robots supplied with visual system, main computer as well as communication system, are a need to perform the robot soccer game (Figure 1).
We have chosen two methods of robot movement in coordinated manner, first method is the simulator, while the second one is that through computer to realize the movement up to real robot (Han, et al., 2000; Kopacek, 2000). Illustration of mobile robots that play football game was supplied with motors and drives, at two wheels and commanded by computer has been given in this paper [6]. Each robot should be fully autonomous, supplied by motors and power transmission. At each robot is installed the processor. For each interaction between main computer and
There are two operation methods of robot soccer in use: • Robot soccer system based on vision, Robot soccer system based on mobile platform.
95
The first is robot soccer system without memory in robot and the second is robot soccer system with memory in robot.
relatively complicated. Robots can use double RF digital communication with FM module. The architecture of robot soccer is a fully autonomous system that consists of determined cycle and processed with high requests that can be involved as following: • CCD camera installed above the football playground receives two dimensional (2D) pictures and sends those as unprocessed data to the picture's receiver, Picture's receiver installed on PCI or on the AGP angle of computer digitalizes twodimensional (2D) pictures received from camera, The software that processes the picture works directly with picture's receiver and its task is to analyze the digitalized image, to explore and detect the position and orientation of objects. For this task, there is a group of algorithms of detecting and filtering, because there is a need for processing speed and detection control for the robot soccer games. The detected objects are ball, robots of home and opponent team, their positions and orientations sent to judged module, Judged module is place where the strategies took place and the commands are spreader to each robot. When the commands are settled, they are sent to the communication module, Communication module transforms to desired position for each robot, to transmitted commands to robots. Transmitted information is velocity and angle that move the robot, but not the commands for each wheel, Robot hardware receives the motor commands, decodes information and commands wheels to execute the movement.
Figure 1. Robot soccer system with visual system, main computer and RF communication system The useful method but not right one, is the usage of visual camera, (Figure 2). Each robot could have personal encoders enabling the calculation of its instant position. The lateral infrared sensors (IR) are useful for detection of obstacles. Differently, from the traditional method of light quantity measurements, in order to make it desensitize under the environment light conditions, the module transmission signal are used.
Figure 2. Analogue colour CCD camera
3. MICROROBOT ARCHITECTURE OF ROBOT SOCCER The design philosophy is to realize the autonomous micro robots with different functions; so they could be used only to soccer games, but also to other applications. Robot soccer used in MiroSot mainly consists of PCB card with equipment installed on surface, one body coverage for actuator security purposes for movement and battery for power. Central Processing Unit (CPU), lateral infrared sensors (IR), contact sensors and moving mechanism enable the robot movement control during the obstacle avoidance and other intelligent operations. Robots should carry the energy source and rechargeable batteries. Energy characteristics, competition time duration, size and weight are main factors in battery selection.
3.1. Main computer The main computer task is to: ft Execute algorithm for visual system (by finding position of ball and robots, sending coordinates and others) ft Generate command of movement based on strategy and ft Communicate with players.
3.2. Communication module
According to MiroSot regulation robots should not be connected with wire, therefore the separate IR or RF digital communicated control system is needed. At control method through IR (wireless) the circuit is relatively simple when the number of channels is less, but when this number is increased, it becomes
RF semi-duplex modules (frequency: 418, 433, 869 or 914 MHz) are used for wireless communication between robots and main computer. Currently there is in use the 9600 baud velocity, which can be 3 times greater, but with risk of error transmission.
96
With baud velocity of 9600 each command consists of 9 bytes each takes 9 (ms). Communication velocity is very important for robot soccer, therefore the Bluetooth model that is commonly used at mobile phones could not be used, because communication velocity is relatively slow - it takes more than 20 (ms).
Coordination of mobile robots in several manners are performed.
A new robot for football at the Institute for Handling Devices and Robotics (IHRT), Vienna University of Technology has been developed later (Kopacek, et al, 2001).
In this paper are mentioned two of them, the first is the simulation software "3D Robot Soccer Simulator", while the second one with software called "Visio". With the programs, "3D Robot Soccer Simulator" movement coordinated of mobile robots is performed through tables prepared in software Microsoft Excel. Regarding the second method of robot coordination, all through programming language C++, when after this coordination connected to "Visio" software where the executed movement, are performed.
ROBY-GO (Figure 3) is a robot that moves with two wheels and is characterised with simple structure, compatibility and modular construction.
4.1. Software for simulation of mobile robots "3D Robot Soccer Simulator "
3.3. Main mobile robot - ROBY-GO
Is a program for simulation of robot soccer that was developed by a group of students from Australia, (Griffith University, Australia). According to MiroSot league categories, game that in this program of the middle league has been played (5 against 5), (Figure 5).
Figure 3. Mobile robot ROBY-GO Robot shape is defined with the following dimensions 7.5 [cm] x 7.5 [cm] x 7.5 [cm] and hose the velocity equal to 3 m/s. The RF Antenna height for communication in the robot size is not calculated. It has two DC motors with PWM (Figure 4).
Figure 5. Working window of the"3D Robot Soccer Simulator" There were two teams, blue and yellow team, that used strategies created before through simple text (Lingo) and C++ programming language. Game rules are the same as in real game of this category. This program was very important, since the strategy before it has employed to real game was tested. Minimal requests for properly work of "3D Robot Soccer Simulator" are: Pentium III 600 MHz 256 Megabyte RAM TNT2 3d Graphics accelerator with 32 Megabyte RAM 24x CD-ROM Screen resolution 800 x 600 16 bit Sound Card
Figure 4. Mechanical structure of mobile robot ROBY-GO ROBY-GO as a robot that plays in MiroSot category, but also for other tests of multi agent systems is not only used (Han, et ah, 2003).
4. MOBILE ROBOT MOVEMENT COORDINATION
97
*
Microsoft Windows 98 DirectX 8.0 10 Megabyte free space in the disk.
^"*
""" (VfririiTil
/^~ 1
ft
-|
" fH 1
FTMTEE15
hm
-
PfKtUck FMHty FnaDd Eld IIEL
1i '
4.2. Robot dancing (Parade) In order to realize the robot dancing (parade), another method (strategy) is used. This method of dancing robots at the IHRT in Austria is developed (Han, 2003). The robot movements are not common, but coordinated. This means when one robot is moving another robot is waiting for the order. Programming also from the students that do not possess the knowledge of C++ can developed. This by the usage of sheet in Microsoft Excel is realized (Figure 6).
mmiaii EJUEIH _.
i
j
-—*
' mM
ft
IBE
Ml
SC4RE
l
IIPLISCOI[
&DF1TUM &H1I
Figure 7. Initial trajectories of robots
There are five different functions: 1. ParadeWait - Robot waits for a proper time (time in milliseconds is measured). 2. Parade Position - Robot moves to certain position. 3. ParadeRotate - Robot rotates to certain angle (in absolute coordinates). 4. ParadeCircle - Robot moves along a certain circle. 5. ParadeTimeRotate - Robot rotates within a certain time.
4.3. Program that enables real movement of "Visio " robots By usage of the program "Visio", one can configure the colours of robots and ball, modification of picture (view), determination of robot size, determination of playground size, robot testing (velocity of each wheel is given particularly), etc. The view of this program is shown in the following picture:
•
H8SH
•: tnii • cat
i,r | MHMIki u M1
Ui
•i.
. . . r r
1
F
r r r r
kali«
IBEJ
* |
• N""*l| ••flj- |
i u ru
HpJ
rjs: rare1^•n
- • ( — :•:-
f1
_ l _ .-II
*•?
r •
r •>
•
>B •
••Ml U *
-
n ••
Figure 6. Excel sheet with strategy for parade Figure 8. Window of the program " Visio' In addition some examples of robot programming coordinated movements are given. Movements of three robots fora short parade are programmed. This kind of programming, in the beginning the first function (ParadeWait) should be written. Then, the function 2 (ParadePosition) has been used, where the initial position coordinates of robots have been given. E-Nr.
R±oti1 F
1 1 2
P1 0
Robcti2
P2 P3 P4 P5 S1 S2 S3 S4 S5 F 0
0
P1
Robcti3
P2 P3 P4 P5 S1 S2 S3 S4 S5 F
0
0
0
0
0
0
0 1
0
0
125 105 0 150
0
0
0
0
0
0 2
125
80
0
4.4. Robot programming in C++
0
0
0
0
0
0
0 1
0 150
0
0
0
0
0
0 2
P1 0
P2 P3 P4 P5 S1 S2 S3 S4 S5 0
125 160
0
0
0
0
0
0
0
0 150 0
0
0
0
0
0
0
According the given coordinates in the previous table, of the software "3D Robot Soccer Simulator", the position of robots is as following:
98
In order to realize the movements of robot soccer game, program that enables movements with program "Visio" has to be connected. Implementation of C++ to connection and compiled modules is used. These modules deals with camera recognition from program, framegraber recognition (module installed in computer that processes the picture), antenna recognition that enables communication between computer and robots, etc. Those modules in program "Vision.dsw" and shown below are placed:
////////////////
ROBOT
SOCCER
5. CONCLUSIONS
PROGRAM
// VisionView.cpp : implementation CVisionView class #include "stdafx.h" #include "Vision.h" #include "VisionDoc.h" #include "VisionView.h" #include <math.h> #include <mmsystem.h> #include "SettingColor.h" #include "SetBoundary.h" #include "SetPixelSize.h" #include <winsvc.h> #include "ddraw.h" #include "Comm.h" #include "Robot.h" #include "Miro03.h" #include "TunningDlg.h" #include "ColorTunning.h" #include "Robot test.h"
Robot soccer is a Multi Agent System (MAS), with highly coordinated operation and movements so to fulfil specific objectives, even under adverse situation. From the scientific point of view, soccer robot is an intelligent, autonomous agent, carrying out tasks with other agents in a cooperative, coordinated and communicative way. On the other side one of the newest trends in robotics is the application of robots in entertainment, leisure, and hobby.
of the
Vision system is the only sensor available to determine the position and orientation of the robots. Without it, the robots would be blind and lost, making their ability to move or play virtually impossible. The entire system is dependent upon the vision system and the information it provides. Besides direct programming with robot soccer, it is possible that through the simulation programming to developed the strategy of robot soccer. Simulation programs that save the time of design of different strategies are developed.
Program "Vision.dsw" with all modules is shown in the following figure.
With simulation is it also possible to design other movements and trajectories coordinated among the mobile robots as is dancing. The determination of proper position of mobile robots as well as the ball is the necessity of the game and strategy. Without this elementary information system will not function and the game will not be realized.
Z* m •
:
•
m
•
!
•
-Ji
•, . 1 . .
_l
•jr> Z>utoiv,KV«| • 0 •jr>
I
•
•
-
.
, iiti:-K4ii
I . •Ji
Comparing with direct programming of mobile robots, the simulation program behaved with small difference, so one can conclude what has to take measure in order to minimize the position error.
• '-' 'jpl - I — r . . . lii - I
-irwa-
y.iiv.-- i;,i!-tJi-i
6. REFERENCES De Almeida A.T. and O. Khatib (1998). Lecture Notes in Control and Information Sciences Autonomic Robotic Systems, Springer London. Fischer G. (2000). Robots in Entertainment leisure and hobby, Diploma work, Vienna University of Technology, Austria. Han, M.W, P. Kopacek, G. Novak and A. Rojko (2000). Adaptive Velocity Control of Soccer Mobile Robots, Proceedings of the 10th Workshop on "Robotics Alpe-Adria-Danube Region - RAAD '00", Maribor, Slovenia, p. 4146. Han M.-W. (2003). Robot Soccer and Edutainment In: Proceedings of the 2nd FIRA Robot Soccer World Congress, Vienna, Austria, 1-3, p. 45-49. Han, M.-W. et al. (2003). Robot Soccer. In: Proceedings of the 12th Int. Workshop on Robotics in Alpe-Adria-Danube-Region RAAD'03, Cassino, Italy.
Figure 9. Program "Vision.dsw" with all modules
Figure 10. Robot soccer team Figure 10 shows the robot soccer team developed at the Laboratory of Robotics of the Faculty of Mechanical Engineering Faculty, University of Prishtina.
99
Kim J.-H.; Vadakkepat P.; Verner, I (1998a). The FIRA Robot World Cup Initiative and Research Directions, Communicated to the Int. Journal of Robotics and Autonomous Systems,. Kim J.-H. et.al. (1998b). A Cooperative Multi-Agent System and Its Real Time Application to Robot Soccer, Accessible from http://www.mirosot.org/. Kopacek P. (2000). Robots in entertainment, leisure and hobby, Preprints of the IFAC Symposium on "Robot Control 2000, SYROCO '00", Vienna, Austria. Vol. 1, p. 319-323. Kopacek, P.; Han, M.-W.; Novak, G. (2001). Control Tasks in Robot Soccer. In: Proceedings of the 32nd International Symposium on Robots - ISR, Seoul, Korea, 19.-21. p. 756-759.
100
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
HUMANOID ROBOTS FOR HUMAN LIFE SUPPORT Edmund Schierer Vienna University of Technology Favoritenstrasse 9-11 (E325/A6) A-1040 Vienna, Austria
Abstract: Spoken in technical terms a robot may be defined as a machine which includes almost all classical engineering sciences like mechanical engineering and electronics and electrical engineering as well as "modern" fields of engineering like computer science and material sciences. Non-engineering disciplines like psychology and biology become more and more important in designing a robot that will not only look like a human being but also behave natural in its movements and emotional way of acting. Copyright © 2006 IF AC Keywords: robotics, humanoid robots, household robots, human life support
1. WHY SHOULD WE USE ROBOTS? It is obvious that we as human beings has some awkward physical limitations regarding environmental factors like weather conditions, including temperature, pressure, humidity and so forth. In situations where work has to be done out of these limitations robots can do and should do the job for us. There is no need to think about robots only in outer space, there are many places on earth where it is too dangerous for man to work at like in the deep sea, nuclear plants or waste dumps. But there is also a growing need for robots in supporting human beings in their daily life at home or at work. As we all know domestic duties like cleaning, wiping and ironing are extremely boring and cumbersome. At the beginning of the 21st century a new generation of domestic robots relieves us from such unwelcome responsibilities. They render good services precisely, discreet and, above all, 24 hours a day without getting tiered, hungry or spiritless. Besides these manifold household robots are others which act like domestic animals and try to become a member of the family. Since this is a fast growing and evolving part of robotics this paper has its focus on household robots. Assistant robots are the last step in an evolution from the very first electric household appliances of the
1950s. Though more and more powerful, even the most modern types are basically the same as ancestors. Intelligent robots can give people the freedom to use their spare time in a more satisfying way. Such robots are typically mobile and autonomous devices. Unlike the standard appliances in our households robots differ in a way that they may operate independently and without influence from human beings. In this connexion a problem arises: the robot has to move and operate in a changing environment which is made from and for man. Objects normally are not always on the same place (chairs) what makes it very hard and complex for a robot to navigate. To solve all these problems a modern household robot incorporates numerous sensors which introduce a new problem: the balance between cost of production and selling-price.
2. TYPICAL HOUSEHOLD ACTIVITIES 1.1 Vacuum Cleaning. Vacuum cleaning robots were the first ones especially designed and constructed for household applications. Modern types are small and faint enough to work even at night.
101
The very first vacuum cleaning robot was introduced by iRobot, a US company. One of the founders is the well-known roboticist Rodney Brooks and two other experts from the Massachusetts Institute of Technology in Boston.
Fig. 3. Automower in action (Electrolux) Slugbot, a slug seeking and digesting robot is a development of the Intelligent Autonomous Systems Laboratory in Bristol. In its artificial stomach the slugs are transformed into methane and hydrogen. By means of an electrolytic reaction the robot generates electricity to drive its motors and electronic devices. Automatically adjusts for floor type as Ft moves between surfaces
Fig. 1. Roomba has no problems with different surfaces (iRobot). Roomba, looking like a rolling frisbee, moves on a helical line through a room. It takes less than 20 minutes to clean an average sized room. Obstacle avoidance is done by sensors which was actually developed for military demining robots. eVac as a competitor of Roomba costs only 300 US Dollar and has a much better absorptive strength and has the ability to free itself in case it is blocked. A european vacuum cleaner is the RC 3000 from Karcher. It is faint enough to hear music without being disturbed and flat-bottomed to go under almost any furnitures. Sensors detects steps and landings to prevent it from crashes. A special feature is the ability to find its charging station autonomously.
Fig. 4. Very first prototype of SlugBot
1.3 Surveillance and Control Another field of application is surveillance and control. Modern robots are able to recognize unauthorized persons and release appropriate alarm conditions. Other modes of control include detection of gas, water, fire, temperature or other dangerous materials or compounds.
KARCHER
Fig. 2. RC3000 technical specifications (Karcher)
1.2 Gardening Gardening, especially lawn-mowing is a very time consuming job. A problem of the current generation is that the robots move not systematically but randomly what leads to a relatively high energy consumption until the job is finished. A typical lawn-mower robot is Automower from Husqvarna. It moves completely independently and separates the lawn into sub-divisions. The area has to be initially defined by the gardener by mounting a cable.
Fig. 5. Spy-Cye, home-surveillance tool (Probotics)
1.4 Entertainment, Leisure, and Hobby The most interesting area is where robots can care for the aged and young children. Toshiba Corporation introduced the concept of a ,,life support partner" - a sophisticated robot able to deliver human-centric technologies that provide assistance and support the
102
elderly and young children at home and in such public places as shopping malls or offices There are currently two robots available, ApriAlpha™ V3 and ApriAttenda. While ApriAlpha™ V3can distinguish and recognize voices from any direction, ApriAttenda first of all identifies an individual with its visual sensor and highspeed image processing system by instantaneously recognizing the registered color and texture of the person's clothes. Fig. 8. PaPeRo (NEC). Front
Side
"TV remote control 4 signal transmitter Head patting sensor + Sound recognition microphone 2 CCD cameras + LED* In mouth, head, ears and eyes Head stroking sensor • ifcropnoneE for sound direction detection Ultrasonic sensors +
385mnn
rower switch Speakers • Floor sensor UfI sensor
Internet Wire less modem
Fig. 9. PaPeRo's technical specifications (NEC).
TOSHIBA
(Front) ApriAlpha_v3, Apri sharp ear (Back) ApriAttenda
Ifbot is another example of a communicative robot. He is 45 cm tall and weighs 7 kg. He is able to walk and avoids obstacles by means of powerful sensors.
Fig. 6. Toshiba's robots designed as life-support partners for humans. Especially in Japan robotic domestic animals are very popular. Due to the fact that housing space in cities like Tokyo is expensive and flats are very small animals normally are not allowed.
Fig. 10. ifbot is a very smart toy, with advanced communication features (University of Nagoya, Japan). Fig. 7. BN-1 robot cat (Bandai). Yoshihiro Fujita from NEC's Personal Robot Center designed a communicative housemate named PaPeRo (Partner-type Personal Robot). He follows some basic and simple social rules. If he is fondled he gets nice, attentive and co-operative. Otherwise he gets ill-humored and starts grumbling.
3. HUMANOID ROBOTS FOR DAILY LIFE SUPPORT All the robots mentioned above have some advantages in their special field of application. But the world we live in is made from humans for humans. All the processes necessary to keep our daily life at work are designed for human beings with human proportions and human "gripper devices". It is
103
obvious that a robot which was designed for laundryman is not good at washing the dishes. But we are. It seems that our "design" is suitable for almost all tasks. So why not design a robot that looks like a human and behave like a human? There are actually two sets of reasons one might build a robot with humanoid form. Following the arguments of Johnson and Lakoff, then the physical representation of our bodies is critical and fundamental to the representations that we develop and use for both our internal thought and our language. The second reason is that an important aspect of being human is interaction with other humans. For a human-like intelligent robot to gain experience in interacting with humans it needs a large number of interactions. It will be much more easy and natural for humans to interact with the robot in a human like way if it has a humanoid form.
Fig. 12. Hip joint design of LISA (University of Hannover) For our humanoid Archie we developed a joint module which can be used as a standard for all joints on the robot. One design goal was to mimic as close as possible the physical appearance of a human. This requires a high volume to power ratio, that is, high torque in a small volume. This can only be achieved with harmonic drives, as can be seen in Fig. 13.
There are some basic requirements a robot must fulfill to be designated as human-like. Besides a minimal size he has to have a human shape, that is, one head with eyes, ears and mouth as well as two arms and two legs (with an appropriate number of degree of freedom).
Fig. 13. Standard joint module for Archie (IHRT, Vienna University of Technology). On the other hand, a robot needs the possibility to communicate with his human partners in their most natural interface, a spoken language. Commanding a robot via speech is the most intuitive and most easy way. Controlling it by means of a remote control or some sort of menu system is under no circumstances appropriate. Another essential feature in this connexion is speech, gesture and face recognition. The latter is necessary due to the fact that part of our non-verbal communication is done by gestures and mimics.
Fig. 11. left) A typical European human right) "Complexity" of human skeleton A natural walking and arm movements are unalterable requirements for a humanoid robot if it shall be accepted by its users. Since bipeds are inherently unstable systems (Albert, A., 2002), the control of the drive system is a much more complex task than that in a wheeled robot (Putz, B, 2004; Wiirzl, M., 2005).
For Archie we introduced a distributed controller architecture (Fig. 14) with one node for every degree of freedom interconnected by a fast network. To increase the processing power of the entire network additional nodes can be easily added to the network. Special nodes are reserved for vision processing, sound synthesis and speech recognition as well as for sensor processing.
104
4. SUMMARY To be accepted by the public robots have to be human-like in their physical appearance and social behaviour. Future robots will also differ in a few remarkable points from technologies available today. This paper discusses some of the keypoints important for household robotics and describes features a humanoid should have to be able to do the same jobs as his specialized unintelligent ancestors. MCP
VCP
ACP
RCP
SCP
LCP1
LCP2
LAP2
LAP1
o
ooo ooo
o
ICP
OOO
OOO
Fig. 14. Brief overview of Archie's controller network
REFERENCES Putz,
B., (2004). Navigation of mobile and cooperative robots (in German), Intelligent Handling and Robotics, Vienna University of Technology. Wtirzl, M., (2005). A contribution to robotics especially in the field of expert- and multi agent systems (in German), PhD thesis, Intelligent Handling and Robotics, Vienna University of Technology, June 2005. Albert, A., (2002). Dynamisch stabiles Gehen fur eine autonome, zweibeinige Laufmaschine. 36. Regelungstechnisches Kolloquium Kurzfassung der Beitrage, 20.02-22.02.2002, Boppard, S. 40-41.
105
This page intentionally left blank
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
ELSEVIER
IF AC PUBLICATIONS
STRATEGIES AND PREDICTION IN MULTI-AGENT SYSTEMS
Man-Wook Han
Intelligent Handling and Robotics (IHRT), Vienna University of Technology Favoritenstr 9-11, A-1040 Vienna, Austria Email: han(a)ihrt. tuwien. ac. at
Abstract: The main features of Multi-Agent System (MAS) are the cooperation, coordination and communication between agents. One good test-bed for MAS is the robot soccer. The game of robot soccer provides a good opportunity to implement and test the coordination of group behaviour of mobile robots. For the organization of the group behaviour in MAS the strategies of the group behaviour of each agent as well as the prediction of the future behaviour of agents play important roles. In this contribution strategies for a robot soccer system and the prediction algorithm which is applied in the robot soccer will be introduced. In robot soccer the behaviour of each player in own team can be calculated. But the behaviour of opponent robots and the ball can not be exactly estimated. It is necessary to predict the future position of the opponent robots and the ball. This paper will present the strategies for MultiAgent-System (MAS) which is developed by IHRT and an algorithm for the prediction of position of robots and ball. Copyright © 2006 IF AC Keywords: multi-agent system, organization, robot soccer.
1. INTRODUCTION Approximately 15 years ago the keyword "MultiAgent-Systems (MAS)" was introduced. Multi-agentsystems have emerged as a sub-field of AI that attempts to implement both an unified theory and design principles for constructing complex systems with multiple agents and their coordination in dynamical environments. At that time, computer scientists used MAS as an application example of distributed artificial intelligence. Nowadays MAS are closely related to the design of distributed systems for autonomous agents to be used in manufacturing and robotics applications. MAS deal with interaction and cooperation, organization of agents, action and behaviour of each agent. Several years ago robot soccer was introduced with the purpose to develop the intelligent, cooperative multi-robot (agent) systems and as one of
the first examples for robots in entertainment, leisure and hobby. Robot soccer offers a good opportunity to implement and test control and cooperation algorithms of Multi-Agent-Systems (MAS). From this viewpoint each soccer robot is an intelligent autonomous agent. The robot should be in the position of being able to autonomously carry out the given task based on the available information in such environment. To reach this goal the work on the motion planning and control in a fast changing environment including static and dynamic obstacles is necessary. In more complex environment the position detection and calculation using a global vision system take time. It will be very helpful to manage the behavior of agents by predicting future position based on the previous positions.
107
Centralized control does not necessarily imply that each robot is lacking in intelligence. The on-board software of each robot deals with navigation and control. The centralized controller provides only strategy for cooperation and does not attempt to solve the problem in its entirety.
2. STRATEGIES A multi-agent (robot) cooperation system requires complex coordination strategies to gain the full benefit of applying more than one agent to a problem. With mobile robotic environments, this has added difficulties due to the approximated results of both the hardware and extra software required to run the hardware. In a multi agent system environment, it includes communication delays, vision system integrity, inconsistent field conditions, and other robots. Since it has to be accepted that many of these problems are beyond control, a robust multi-robot control system needs to be developed.
3.
MICRO MOBILE ROBOT
Intelligent Handling and Robotics, Vienna University of Technology developed micro mobile robots, like Roby-Go, Roby-Run, Roby-Speed and Roby-Naro.
There are many problems to be addressed when designing a multi-robot strategy for teamwork. By having more than one moving object in the environment adds dimensions of complexity to path planning. The robots can't learn where the obstacles will be and must contend with them reactively while maintaining a longer term strategic plan. As more robots are in the environment, as more difficult it is to develop team strategies. This is contradictory to how a multi-agent system should benefit from added agents. Each agent has a responsibility to carry out its task to benefit the team. When the team doesn't perform well, it can be difficult analysing where the problem is. The agents may have incorrect strategies or the overlying team strategy could be at fault. As a result of this credit assignment problem, many multiagent designs are environment or problem specific and the technique adopted in one environment may not be transportable to another. Therefore, the environment requires careful consideration when designing multi-agent cooperation. Each agent on the field can obtain enough information about the state of the game not to require any extra information from other agents. Adding communication can add delays in agent reaction as they may wait on incoming information before deciding their next move. The subsequent section looks at our approach to cooperation within the multi agent system domain
Fig. 1 . Micro mobile robot - Roby-Speed A soccer robot is basically not more than a mobile platform, which is connected via a radio module to its superior control unit. The electronic is built up in an open architecture. In theory a robot consists of different units fulfilling special tasks. One important unit is the motion unit. The motion unit controls the motors by a desired trajectory. This desired trajectory (as well as other demand behaviours like acceleration and etc.) has to be transferred to the motion unit. For the design of a soccer robot the considerations above mean that it consists of a motion unit and a connection via radio to its superior control unit. Remaining to the described system the radio module should be connected to a microcontroller, which selects and processes the incoming information. Afterwards a bus provides the processed information to the motion unit. The electronic part of the mini robot has a modular and open architecture and consists of a single board for power electronic, communication and a microcontroller (Hager 2003).
The planner exists on the computer as a form of centralised control for the robots. It examines the state of the game from the robot's perspective and makes decisions as to that robot's next action and uses one motion planning techniques to determine locations for the robots to carry out those actions. In this manner, it abstracts away from the normal multiagent approach of having independent agent control. The credit assignment problem are reduced and moved to one entity rather than several. By having one decision-maker, each robot acts as a remote mobile unit that takes commands. By this method, there is no requirement for communication or independent strategic robot control. Each robot is unaware of the other's intentions, but still contributes towards the goal of team.
The task of the microcontroller is to control both DC motors and analyze the radio data. This board is universally useable and in circuit programmable by the serial port. Furthermore it contains a high speed synchronous serial interface, which gives the possibility to connect several microcontroller boards for different tasks. Sensors can be easily implemented in future.
108
The hardware control unit is intended for both robot constructions. With an area of just 36 x 36 mm the board fills only 1/8 of the reference volume and consists of the following components: • XC167 microcontroller from Infineon with internal RAM (8 kByte) and Flash (128 kByte) • Voltage supply by switching regulators with high efficiency • High speed dual full bridge motor driver • Infrared transmission module • Bi-directional radio module for the frequencies 433, 869 or 914 MHz • Status indication by six bright LED's in different colors • Serial synchronous interface for communication • with further modules, e.g. XScale board. (Putz, 2004)
4. PREDICTION ALGORITHMS FOR MULTIAGENT SYSTEM (Kopacek, et al. 2001) Usually a soccer robot is a two-wheel driven mobile robot, whose size may not exceed 75mm in each side of a cube. It consists of two wheels, two DC motors, a micro controller, a communication module and a power supply and others. It is a very good example for a mechatronic system. The behaviour and efficiency of such a robot depends on the mechanical construction, control algorithm, and the performance and accuracy of the vision system. The vision system is responsible for the calculation of exact object's positions based on the pictures from CCD-Camera above playground. The accuracy of the measurement is not exact enough. The measurement error is maximum up to 5 cm. Also the speed of vision system plays an important role. There is time delay between taking picture with camera, image processing, generation motion commands, sending command via radio frequency, reaching the motion commands and moving robot. In the time between taking visual information and carrying out the command the robot is moving. Assume that the robot moves maximum speed 2.54 m/s and the time delay is 30 milliseconds long the difference between robot's position when the camera takes a picture and robot's position when the robot start moving is almost 8 cm. Furthermore the time between new data provided by vision system is not constant. Therefore it is necessary to predict as well as estimate the future position of the ball and robots based on the previous position information. Several prediction algorithms are already reported, like Kalman-Filter, Least mean square algorithms etc.
This means that if there is an estimate 9(t — 1) based on data up to time t-1, then 9(t) is computed by some 'simple modification' of 9(t — 1) . The counterparts to on-line methods are the so called offline or bath methods, in which all the record data are used simultaneously to find parameter estimates. The least squares method can be applied to a large variety of problems. It is particularly simple for a mathematical model that can be written in the form;
y (t) =
where y is the observed variable, 61,62,, , Qn are unknown parameters, and cpi? (p2,.--->(Pn are known functions that may depend on other known variables. The model is indexed by the variable t, which often denotes time. The elements of the vector cp(t) are often called regression variables or regressors while y(t) is called the regressed variable. The problem is to find an estimate 9 of the parameter vector 6 from measurements y(l), ...,y(N), cp(l),..., cp(N). Given these measurements, a system of linear equations is obtained, namely:
=
=
This can be written in matrix notation as:
Now introduce the equation errors as:
s(t) = y(t) -
i=\
where
denotes the Euclidean vector norm. The
V(0) has unique minimum point given by:
6=
(1)
4.1 Recursive least square estimation In recursive (also called on-line) methods, the parameter estimates are computed recursively in time.
This form of the least squares estimate can be rewritten in the equivalent form:
109
e=
N
4.2 Estimation of the ball and robot
N
(2)
The position information detected by the vision system are inaccurate and old therefore the transmitted position information have to be filtered and the current position estimated. In order to filter the transmitted position information and estimate the current position there is used the recursive least squares algorithm for each coordinates values by using a polynomial of first order for the ball and of second order for robot. For the x values:
i=\
In many cases cp(t) is known as a function of t. Then (2) might be easier to implement than (1) since the matrix O of large dimension is not needed in (2). Also the form (2) is the starting point in deriving recursive estimates. The solution in (2) will now be rewritten into a recursive form. Introduce the notation
x(t) = a
ct
-i-l r
the system is described by the following equation: s=\
s=\
Since trivially
1 to
tl
1 U 1 t
t\
a
tl * b \ c tl
n
it follows that the least squares estimate is given by:
x0 —
_xn_
whereas: t-\
6{t) = Pit)
to=O S=\
tx =
T
eit -1)+P(t)
U = At, + At1 /v
t3 = At3 + At2 + Atx
where 9(t — 1) denote the least squares estimate based on t-1 measurements. The results are quite appealing. The estimate of 6 at time t is equal to the previous estimate (at t-1) plus correction term. The correction term is proportional to the deviation of the
i=\
/v
'predicted'' value 6(t — 1) from what is actually observed at time t, namely y(t).Then the recursive least square algorithm for estimation is given by:
=Tn~ Tn_ n x by this all coefficients Atn are negative. In each step the lines are shifted down with adding Atj to the time values. The last measured x-value is x(0). The same value one second later is x(l). That means the algorithm is independent from the global time. The same applies to the other coordinate values. To solve the equation (4) the recursive-least squares algorithm (3) is applied. In order to obtain the initial values for
0{t) = Bit -1) + K(t)s(t) K(t) = P(t)cp(t) =
(3)
T
y(t)-(p (t)e(t-\)
Here the term s(t) should be interpreted as a prediction error. It is the difference between the measured output y(t) and the one-step-ahead
prediction y(t 11-\\6{t-1)) = (pT {t)9(t-1)
(4)
9, P and R the least squares algorithm is used and after that recursive least squares algorithm.
of
y(t) made at time t-1 based on the model
5. CONCLUSIONS AND FUTURE PERSPECTIVES
corresponding to the estimate 9(t — 1) . If s(t) is small, the estimate s(t) is 'good' and should not be modified very much. The vector K(t) in (3) should be interpreted as weighting or gain factor showing how much the value of s(t) will modify the different elements of the parameter vector.
In this paper the strategies for the Multi-Agent System and the prediction algorithm are presented. The estimation could be more exact when the accuracy of vision system is increasing.
110
To increase the computing power a small microprocessor (DSP) will be added to the minirobot. By the use of the computing power and the multimedia functions of such a small module, there is no problem to integrate the strategy or more sensors like a small camera, a compass, etc. This effort is useful to make the robot autonomous and increase its "intelligence". It is our opinion that this is the right step into the future, because the problem of vision based Hardware-MAS is actually solved.
REFERENCES Ferber, Jaques (1999). Multi-Agent Systems: An Introduction to Distributed Artificial Intelligence, Addison-Weseley, Longman Hager, A. (2003). "Improvement of the mechanical design of mobile mini robots" (in German), Diploma Thesis, IHRT, Vienna University of Technology Kopacek, P.; Aleksic, K.; Han, M.-W. (2001): Prediction Algorithms for Multi-Agent Systems. In: Proceedings of the 10th IFAC Symposium on Information Control Problems in Manufacturing -INCOM2001, 20.-22. September 2001, Wien, p. 153-157. Putz, B. (2004). Development of the new Soccer Robots "Roby-Speed" and "Roby-Naro, "CLAWAR /EURON/IARP Workshop on Robots in Entertainment, Leisure and Hobby - ELH'04 Proceedings", Intelligent Handling and obotics, Vienna University of Technology, Austria, ISBN 3-902161-04-3. Wiirzl M. and E. Schierer (2004): Strategies for Mirosot; Preprints volume of "2004 KoreaAustria Joint Seminar on Intelligent Robotics", 44 - 49 Busan, Korea; 10-28-2004
111
This page intentionally left blank
Copyright © Improving Stability in Developing Nations through Automation Prishtina, Kosovo, 2006
E L S EVI E R
IF AC PUBLICATIONS
Panel Discussion
Control Strategies for a Sustainable Future H. Erbe l\ R.Genser 2), M.W. Han 2), M. Hersh 3) , P. Kopacek 2), L.Stapleton 4)
^ Technical University of Berlin, Germany Intelligent Handling and Robotics, Vienna University of Technology, Austria 3) University of Glasgow, Scotland 4 ^ Waterford Institute of Technology, Ireland
The session commenced with a review of the broad range of serious problems facing humanity. Many of these problems can be addressed using control theory and are affected by a range of different automated and semi-automated systems. Systems approaches can help us to understand both the processes and underlying problems, as well as the interrelationships between different problems in the complex underlying systems. Modelling can be used to understand regulation and control issues and consequently to describe a possible approach to system stabilisation. The types of control strategies required for an analysis of human systems are in many cases different from those used in industrial engineering. Open systems approaches which have been used to illuminate, for example, technology-driven innovation, were discussed. Typically open system models can cope with both the quantitative and qualitative data needed to describe and understand human activity systems. They can then be used to derive control strategies for human activity systems. The world is currently facing a number of very serious crises which could lead to potentially catastrophic instability. These crises include the following: • Environmental crises, including global warming, destruction of the ozone layer, acid rain and atmospheric and water pollution. • Social crises, including serious poverty with half the world's population living on less than the United Nation minimum to meet basic needs of $2 a day, widespread human rights violations, discrimination, injustice and unequal access to the world's resources. • Resource crises, including energy and water shortages and an imbalance between population, consumption and resources, so that human activity has outstripped the planet's source capacity to provide resources and sink capacity to absorb wastes. • Political crises, with excessive influence by the industrial-military complex and the one remaining superpower, which seems to have embarked on a policy of invading other states for reasons other than the officially stated ones. This list is by no means exhaustive. One of the important questions for the control community is the role of control and systems approaches and trying to resolve these and other potentially catastrophic problems in order to stabilise the system. One way to approach this problem is to use multi-loop action learning, a model of which presented below. This model involves the addition of quadruple loop action learning to existing methods. It therefore considers the levels of the individual, the organisation and the wider society. However, further levels could be added to give greater specificity about the wider society by representing, for instance, the local, national and global contexts.
113
wider society
c>rgani!national
societal values
individual values
val ues
organisation
J
s
individual
J
actions '
decisions
evaluation
\
win - win learning
win - lose learning double loop dialogue learning triple loop dialogue learning quadruple loop dialogue learning
Fig. 1 Multi-Loop Action Learning One of the important features of multi-loop action learning is that it has both forward and feedback paths. The forward path shows that actions at the individual level are sited in and influenced by the organisational and wider (local, national and global) contexts. In addition, actions by individuals have a feedback effect and can therefore influence their organisations and the wider (local, national and global) contexts. Similarly actions by organisations have a feedback effect on the local, national and global contexts. This means that change is possible, but not that it is easy, due to pressures to conform on the forward path. The model also shows the value of individuals wishing to achieve change and social stability joining together to form organisations. In this case the organisational context is supportive of change towards social and environmental and social stability and this has a positive effect on the individuals. Similarly the feedback path from the individual to the organisation has a reinforcing effect. These effects have some impact on countering the ethos of the wider social context and supporting the individuals and organisation in working for change. Thus one of the important roles of systems and control techniques is in analysing and modelling complex problems and showing that individuals, actions and consequences are situated in a wider context which has an impact along the forward path, at the same time as the individuals, actions and consequences are able to influence this wider context along the feedback path. The work of the Supplemental Ways for Implementing International Stability (SWIIS) Technical Committee involves the application of control strategies to non-technical problems, including conflict resolution. Conflict resolution issues are particularly important in Kosovo: a situation of significant ethnic conflict has existed for a considerable period of time and talks have recently started to try and resolve the status of the territory in such a way as to reduce the likelihood of further conflicts. Control theory can help model, and identify pathways through and beyond interethnic conflict. For example, at the most basic level, positive feedback loops indicate the potential for an exacerbation of problems and negative feedback mechanisms (calming) may be required in order to ensure a controlled and stable path through difficult negotiation periods. In Northern Ireland, another conflict zone, this was the case in the late 1990s. During this period, while important negotiations were underway, extremist nationalist elements in society planted a massive bomb in Omagh which killed and maimed scores of people and potentially destabilised a delicate negotiations process. Kosovan delegates at the panel session noted that in the current Kosovan negotiations there is a distinct lack of conflict management and control strategies which could be used to help to calm the situation in the context of an atrocity committed by extremist elements. It
114
was recognised that control strategies could be crucial in identifying solutions and potential problems before they appeared. Control strategies for a sustainable future need considerable attention and this should include consideration of open systems models and the identification of feedforward paths. The systems models will need to be highly dynamic and focus upon navigation paths rather than solely predictive and deterministic mechanisms. The systems involved are emergent and holistic in nature and futures methods might be useful. From the point of view of theoretical and engineering systems, SWIIS has focussed on the application of continuous time approaches which are well known from the field of process automation. These approaches have been particularly important in SWIIS work on sustainable futures. However, the fields of production automation and systems engineering have advanced over the past few years, giving rise to new methods which SWIIS could usefully apply. These new approaches include "Multi Agent Systems" (MAS). These systems have been very well known in software engineering for more than 20 years. More recently, a number of publications have been produced about their application in production automation. A multi agent system consists of a number of intelligent, co-operative and communicative hardware agents, such as robots, which are working on a common task. They can use their intelligence to divide the whole task into subtasks, as long as each subtask can be carried out by at least one of the agents. This procedure can be repeated to solve the common task. The most recent research is focussing on MMAS Multiple Multi Agent Systems, in which different multi agent systems are used to solve different aspects of a complex task. SWIIS has a number of similarities to a multi agent system. The actors are people with a distinct degree of intelligence and the ability to communicate and cooperate with others. A conflict could be defined as a competition between two or more multi agent systems, or as a multi multi agent system without co-operation between the different multi agent systems. This is very different from the case of production engineering, where the different multi agent systems co-operate with each other rather than acting counterproductively. Thus, the new approach of MMAS could provide a useful additional tool for the work of SWIIS.
115
This page intentionally left blank
AUTHOR’S INDEX Andreeski, C. ............................................... 55 Barsoum, N.................................................. 55 Bhattacharya, A. ......................................... 55 Carbone, G. ................................................ 31 Ceccarelli, M.......................................... 1, 31 Dimirovski, G.M.................................... 55, 71 Dinibütün , A.T. ...................................... 55,71 Erbe, H.H. ........................................... 21,113 Genser, R. ............................................ 49,113 Gojani, I. .................................................... 95 Hajrizi, E. ..................................................... 1 Han, M.W. .......................................... 107,113 Hersh , M.................................... 9, 61, 77,113 Icev, Z.A ...................................................... 71 Izworski , A............................................ 83, 89 Kieleczawa, A.. ............................................ 89 Kile, F.......................................................... 43 Kolemisevska, T. ................................... 55, 71 Kopacek, P. .......................... 1,21, 37, 95,113 Lewoc , J. B. .......................................... 83, 89 Ottaviano, E. .............................................. 31 Pajaziti, A. ................................................... 95 Schierer , E. .............................................. 101 Shala, G....................................................... 95 Skowronski , S ....................................... 83, 89 Stankovski, J. .............................................. 71 Stapleton, L........................................ 1,61,113 Vamos, T...................................................... 67 Vasant, P. ................................................... 55
117
This page intentionally left blank