• Title/Summary/Keyword: 에이전트 기반 시뮬레이션

Search Result 190, Processing Time 0.024 seconds

An Agent based Emergency Warning System for Dealing With Defensive Information Warfare in Strategic Simulation Exercises (전략시뮬레이션 훈련에서의 방어적 정보전을 위한 에이전트 기반 위기경보시스템의 개발)

  • Lee Yong-Han;Kumara Soundar R.T.
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.11-26
    • /
    • 2004
  • Software for analyzing documents on the net to detect specific categories of occurrences is in great demand. In the current world where detecting terrorist threats is critical there is a great need for such systems. One of the critical application areas of such software is the automatic detection of a national infrastructure emergency. In this research an agent-based generic architecture for emergency warning systems is proposed and implemented. This system, called the National Infrastructure Emergency Warning System (NIEWS), is designed to analyze given documents, to detect threats, and to report possible threats with the necessary information to the appropriate users autonomously. In addition, a systematic analysis framework to detect emergencies on the subject of defensive information warfare is designated and implemented through a knowledge base. The developed system along with the knowledge base is implemented and successfully deployed to Strategic Crisis Exercise (SCE) at the United State Army War College (USAWC), saving a good amount of money by replacing human SMEs (subject matter experts) in the SCE.

  • PDF

Study on the Development of an Expressway Hard Shoulder Running Algorithm Using Reinforcement Learning (강화학습 기반 고속도로 갓길차로제 운영 알고리즘 개발 연구)

  • Harim Jeong;Sangmin Park;Sungkwan Kang;Ilsoo Yun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.4
    • /
    • pp.63-77
    • /
    • 2023
  • This study applies reinforcement learning to effectively operate expressway hard shoulder running (HSR). An HSR algorithm was developed, and its effectiveness was evaluated using the VISSIM microscopic simulation program. The simulation evaluated two aspects: mobility and safety. The DQN-based HSR algorithm found speed improvement of up to 26 km/h. Compared to the current method, the difference in the number of conflicts was not significant. Considering the results, a DQN-based HSR operation has a clear effect, and it is necessary to consider adjusting the current operational criteria.

Design of the Agent-based Network-Centric Warfare Modeling System (에이전트 기반의 NCW 전투모델링 시스템 설계)

  • Park, Se-Youn;Shin, Ha-Yong;Lee, Tae-Sik;Choi, Bong-Wan
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.271-280
    • /
    • 2010
  • While the future warfare is expected to be appeared as network-centric, effect-based, and coordinated cooperative, most current M&S systems reflect only the unit behaviors and interactions of each weapon system. There are limitations to analyze the behaviors of managing weapons cooperatively and sharing the situational awareness over the networks of distributed sensors, C2, and shooters using them. Therefore, we introduce the new design of the networkcentric warfare modeling system using the agent-based modeling and simulation approach. We have developed a system for engagement-level warfare models and tested with multi-platform battleship warfare. In this paper, we propose the method to design battle agents, environments, and networks for network centric warfare modeling.

A Study of Security Rule Management for Misuse Intrusion Detection Systems using Mobile Agent (오용 침입탐지 시스템에서 모바일 에이전트를 이용한 보안규칙 관리에 관한 연구)

  • Kim, Tae-Kyung;Lee, Dong-Young;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.525-532
    • /
    • 2003
  • This paper describes intrusion detection rule management using mobile agents. Intrusion detection can be divided into anomaly detection and misuse detection. Misuse detection is best suited for reliably detecting known use patterns. Misuse detection systems can detect many or all known attack patterns, but they are of little use for as yet unknown attack methods. Therefore, the introduction of mobile agents to provide computational security by constantly moving around the Internet and propagating rules is presented as a solution to misuse detection. This work presents a new approach for detecting intrusions, in which mobile agent mechanisms are used for security rules propagation. To evaluate the proposed approach, we compared the workload data between a rules propagation method using a mobile agent and a conventional method. Also, we simulated a rules management using NS-2 (Network Simulator) with respect to time.

Basic Research on the Elements of Maritime Traffic Characteristic Model (해상교통 특성 모델의 요소 식별에 관한 기초 연구)

  • Oh, Jae-Yong;Kim, Hye-Jin
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.1-2
    • /
    • 2019
  • 일반적인 해상교통 분석 방법은 대상 항만의 항적 데이터를 기반으로 데이터를 추출한 후 모델을 구축하며, 구축된 모델을 바탕으로 해상교통 현상을 재현하고 있지만, 이러한 방법은 항로 혹은 통항량 변동 등의 변화에 따른 교통류를 예측할 수 없어 그 활용에 제약이 많다. 본 논문에서는 기존의 해상교통 분석 사례를 통해 교통 특성 모델의 요소를 식별하고, 이를 동적인 해상교통 환경을 시뮬레이션 할 수 있는 에이전트 기반의 교통류 생성 기술 개발의 기초 자료로 활용하고자 한다.

  • PDF

Agent-based Modeling and Analysis of Tactical Reconnaissance Behavior with Manned and Unmanned Vehicles (에이전트 기반 유·무인 수색정찰 전술행위 모델링 및 분석)

  • Kim, Ju Youn;Han, Sang Woo;Pyun, Jai Jeong
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.4
    • /
    • pp.47-60
    • /
    • 2018
  • Today's unmanned technology, which is being used in various industries, is expected to be able to make autonomous judgements as autonomous technology matures, in the long run aspects. In order to improve the usability of unmanned system in the military field, it is necessary to develop a technique for systematically and quantitatively analyzing the efficiency and effectiveness of the unmanned system by means of a substitute for the tasks performed by humans. In this paper, we propose the method of representing rule-based tactical behavior and modeling manned and unmanned reconnaissance agents that can effectively analyze the path alternatives which is required for the future armored cavalry to establish a reconnaissance mission plan. First, we model the unmanned ground vehicle, small tactical vehicle, and combatant as an agent concept. Next, we implement the proposed agent behavior rules, e.g., maneuver, detection, route determination, and combatant's dismount point selection, by NetLogo. Considering the conditions of maneuver, enemy threat elements, reconnaissance assets, appropriate routes are automatically selected on the operation area. It is expected that it will be useful in analyzing unmanned ground system effects by calculating reconnaissance conducted area, time, and combat contribution ratio on the route.

An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture (연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용)

  • 서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.965-974
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the knowledge-based network security model, each model of simulation environment is hierarchically designed by DEVS (Discrete Event system Specification) formalism. The purpose of this simulation is the application of rete pattern-matching algorithm speeding up the inference cycle phases of the intrusion detection expert system. we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Intelligent Distributed Platform using Mobile Agent based on Dynamic Group Binding (동적 그룹 바인딩 기반의 모바일 에이전트를 이용한 인텔리전트 분산 플랫폼)

  • Mateo, Romeo Mark A.;Lee, Jae-Wan
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.131-143
    • /
    • 2007
  • The current trends in information technology and intelligent systems use data mining techniques to discover patterns and extract rules from distributed databases. In distributed environment, the extracted rules from data mining techniques can be used in dynamic replications, adaptive load balancing and other schemes. However, transmission of large data through the system can cause errors and unreliable results. This paper proposes the intelligent distributed platform based on dynamic group binding using mobile agents which addresses the use of intelligence in distributed environment. The proposed grouping service implements classification scheme of objects. Data compressor agent and data miner agent extracts rules and compresses data, respectively, from the service node databases. The proposed algorithm performs preprocessing where it merges the less frequent dataset using neuro-fuzzy classifier before sending the data. Object group classification, data mining the service node database, data compression method, and rule extraction were simulated. Result of experiments in efficient data compression and reliable rule extraction shows that the proposed algorithm has better performance compared to other methods.

  • PDF

Transport Layer Mobility Support Approach based on WLAN in IPv6 Networks (IPv6 네트워크에서의 WLAN 기발 트랜스포트 계층 이동성 지원 방안)

  • 장문정;이미정;홍용근;박정수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.211-213
    • /
    • 2004
  • 차세대 인터넷 사용자들을 위해서는 이동하면서 연속적으로 인터넷에 접속하고 통신할 수 있도록 지원하는 것이 필수적이다. 현재까지 Mobile IT를 기점으로 다양한 네트워크 계층에서의 이동성 지원 프로토콜들이 제안되어 왔다. 그런데 최근에는 네트워크 계층에서의 이동성 지원과는 전혀 다른 접근 방식으로서, 트랜스포트 계층에서 이동성을 지원하는 방안이 언급되고 있다. 트랜스포트 계층에서의 이동성 지원은 기존 네트워크 계층에서의 이동성 지원 방안처럼 코어 네트워크에 홈 에이전트나 외부 에이전트와 같은 특별한 엔터티들의 추가를 요구하지 않기 때문에 디플로이가 상대적으로 용이하며, 종단 간 이동성을 지원할 수 있기 때문에 네트워크 계층에서의 이동성 지원 방안에서 발생하는 터널링 오버헤드나 비효율적인 라우팅 문제를 피할 수 있다. 이에 본 논문에서는 차세대 인터넷 환경인 IPv6 네트워크에서 WLAN 기반의 트랜스포트 계층 이동성 지원 방안을 제안한다 시뮬레이션을 통하여 제안하는 방안이 네트워크 계층에서의 이동성 지원과 대등한 성능을 보임을 확인하였고, 특히 이동 노드의 속도가 빠를 때 새로운 네트워크에서의 IT 주소 획득 시간이 길 때, 네트워크 계층에서의 이동성 지원 방안보다 더 좋은 성능을 제공함을 볼 수 있었다.

  • PDF

에이전트 모형 및 메타 휴리스틱을 이용한 인터넷 상점 사용자 편의 기능 평가

  • An, Hyeong-Jun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2008.10a
    • /
    • pp.247-259
    • /
    • 2008
  • 많은 인터넷 상점들이 다양한 사용자 편의 기능을 제공하고 있다. 이 논문에서는 그러한 편의 기능을 평가하기 위한 새로운 분석 기법을 제시하다. 제시된 기법은 에이전트 기반 모형과 메타 휴리스틱인 evolution strategy를 이용하여 고개들의 행태를 모형화하고 최적화한 후 여러가지 다양한 사용자 편의 기능을 평가해 본다. 이때 평가의 초점은 개인화된 추천 페이지에 두고 이를 인기상품 추천, 카테고리 정렬 등 여러 가지 다른 기능들과 비교해 본다. 이를 위해 가상 인터넷 상점이 구현 되며 데이터셋을 활용하여 시뮬레이션 실험 및 분석이 수행된다. 분석 결과 개인화된 서비스 기능들이 항상 고객들의 쇼핑 효율 및 효과를 항상 높여주지는 않는 것으로 나타났다.

  • PDF