• Title/Summary/Keyword: Agent based simulation

Search Result 363, Processing Time 0.02 seconds

Agent-based Shipment Algorithm for Capacitated Vehicle Routing Problem with Load Balancing (CVRP를 위한 에이전트 기반 Shipment 알고리듬 개발)

  • Oh, Seog-Chan;Yee, Shang-Tae;Kim, Taioun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.32 no.3
    • /
    • pp.200-209
    • /
    • 2006
  • Load building is an important step to make the delivery supply chain efficient. We present a family of load makeup algorithms using market based control strategy, named LoadMarket, in order to build efficient loads where each load consists of a certain number of finished products having destinations. LoadMarket adopts Clark-Wright algorithm for generating initial endowment for Load Traders who cooperate to minimize either total travel distance or the variance with respect to the travel distances of loads by means of the spot market or double-sided auction market mechanism. The efficiency of the LoadMarket algorithms is illustrated using simulation based experiments.

Analysis of UGV Effectiveness Based on ABM(Agent Based Modeling) and Communication Network Environments (에이전트 기반 모델링 및 네트워크 통신 환경을 고려한 UGV 효과분석)

  • Lee, Jaeyeong;Shin, Sunwoo;Kim, Chongman
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.89-97
    • /
    • 2018
  • In future warfare, most part of resources and their platforms would be replaced by unmanned system like UGV(Unmanned Ground Vehicle). They are also connected each other with communication network and it is called NCW(Network Centric Warfare) environment. Hence how to measure the effectiveness of UGV operated in NCW circumstance become an important issue. However, there are few research paper to deal with this kind of UGV effectiveness issue coupled with communication failure. In this paper, we proposed a new ABM process to measure the UGV effectiveness combined with communication success ratio based on terrain condition of the ground engagement. Additionally, we also provide the effectiveness analysis result when communication repeater is applied in case of communication failure.

Coordination among the Security Systems using the Blackboard Architecture (블랙보드구조를 활용한 보안 모델의 연동)

  • 서희석;조대호
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.4
    • /
    • pp.310-319
    • /
    • 2003
  • As the importance and the need for network security are increased, many organizations use the various security systems. They enable to construct the consistent integrated security environment by sharing the network vulnerable information among IDS (Intrusion Detection System), firewall and vulnerable scanner. The multiple IDSes coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (Blackboard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (Blackboard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete Event system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses to these detection information.

Design of Fuzzy-Controller for Agent Selection in CNP-applied Security Models (계약망 프로토콜을 적용한 보안 모델에서 에이전트 선택을 위한 퍼지 컨트롤러의 설계)

  • 이진아;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.20-24
    • /
    • 2004
  • 광범위한 네트워크의 연결과 이를 이용하는 조직이나 개인의 증가로 인터넷은 정보를 교환하고 거래를 수행하는 주요한 수단이 된 반면에 해커나 바이러스의 침입 또한 증가하여 공격에 쉽게 노출되어있다. 이러한 보안상의 문제점을 해결하기 위하여 컴퓨터나 네트워크 시스템의 활동을 감시할 수 있는 침입 탐지 시스템(IDS)과 같은 보안 요소를 도입하였으며, 탐지에 대한 성능을 향상시키기 위하여 네트워크를 기반으로 하는 다중 침입 탐지 시스템을 응용하여 네트워크에 분산된 에이전트들 중에서 발생된 침입에 알맞은 에이전트를 선택하도록 하여 침입 탐지를 효과적으로 할 수 있게 하였다. 본 연구에서는 보안 시스템의 연동을 위하여 계약망 프로토콜을 적용하였다. 계약망 프로토콜은 분산된 에이전트들 중에서 입찰과정을 통하여 최상의 에이전트를 선택하는데 이때, 에이전트를 선택하는 과정에 있어서 퍼지 규칙 기반 시스템을 적용한 퍼지 컨트롤러를 설계하여 시뮬레이션 한다.

  • PDF

A Study on Applying EINSTein Model to guerrilla warfare (EINSTein모형의 비정규전 적용에 관한 연구)

  • 이기택;강성진
    • Journal of the military operations research society of Korea
    • /
    • v.26 no.2
    • /
    • pp.75-89
    • /
    • 2000
  • This paper deals with complex system theory to describe guerrilla warfare situation using EINSTein (Enhanced ISAAC Neural Simulation Tool) simulation model. EINSTein model is an agent-based artificial "laboratory" for exploring self-organized emergent behavior in land combat. Many studies have shown that existing Lanchester equations used in most guerrilla warfare models do not describe changes of combat units, real guerrilla warfare situation and qualitative factors in combat. Future warfare will be information warfare with various weapon system and complex combat units. We have compared and tested results with Lanchester models and EINSTein model. And the EINSTein model has been applied and analyzed to guerrilla warfare model (C4I facilities, coastal, urbanized terrain critical facilities defense). The results show that the EINSTein model has a possibility to apply and analyze guerrilla warfare more properly than Lanchester models.

  • PDF

Autonomous Agents and Event Programming (자율개체와 이벤트 프로그래밍)

  • 조은상
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1998.10a
    • /
    • pp.124-127
    • /
    • 1998
  • One of the eventual goals of VR research is to provide valuable experiences to the participants. In this work, we view that the content of experience is composed of a sequence of events, and develop algorithms authoring those events. Event authoring can be realized by controlling agents in VE in two different modes: (1) the autonomous mode, in which the agent exhibit autonomous behaviors based on the current world status and its own personality, and (2) the event mode, in which the behaviors generated form the autonomous mode is further controlled to meet the needs of the experiment. We define the event authoring language, so that the authors can design experiments by writing event-programs. Then the architecture of event execution manager is described, which is the heart of event-program execution. prove the effectiveness of our approach by showing results of several experiments.

  • PDF

A Mobile Multicasting Mechanism Based on Mobility Information of Mobile Hosts (호스트의 이동 정보에 근거한 모바일 멀티캐스팅 기법)

  • Baek DeukHwa;Kim Jaesoo
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.258-268
    • /
    • 2005
  • The efficient provision of multicast service to moving hosts in mobile computing environments is not so easy task. Bi-directional tunneling scheme causes overhead about encapsulation and triangular routing. On the other hand, remote subscription scheme need freDuent tree reconstruction, which is inefficient for rapid moving hosts. In this paper we propose Mobility Based Mobile Multicast(MBMOM) scheme which is based on host's mobility information. Ultimately MBMOM try to find the strong points of remote subscription scheme and hi-directional tunneling scheme. If host's mobility speed is considered to be high, multicast packets are forwarded using hi-directional tunneling scheme from home agent continuously. If host's mobility speed is considered to be slow, remote subscription scheme is applied for foreign agent and it try to join multicast tree. We developed analytical models to analyze the performance of proposed scheme and simulated our scheme compared with MOM(Mobile Multicast), RBMOM(Range Based MOM), and TBMOM(Timer Based MOM) schemes. Simulation results show that our scheme has shorter transmission delay than above 3 schemes in the aspect of host's mobility speed and multicast group size.

  • PDF

Design of Mobile Agent-based Software Module For Reducing Load of RFID Middleware (RFID 미들웨어 부하를 줄이기 위한 이동 에이전트 기반 소프트웨어 모듈의 설계)

  • Ahn, Yong-Sun;Ahn, Jin-Ho
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.95-101
    • /
    • 2009
  • As RFID technology has been developed rapidly, its technical potential has it be widely used in many industrial fields. Particularly, in the physical distribution industry, the introduction of RFID has enormously contributed to effectively monitoring locations and information of products in real-time. Also, a significant decline in tag prices and RFID related technical competitiveness enabled each tag to be managed much more minutely by attaching it to an item, not a pallet nor a container. However, if a very large volume of tag data are continuously flowed into a RFID middleware with limited hardware resources, its entire data processing time may become considerably longer. Therefore, specific technologies are in great demand to handle and further to reduce the load of the middleware. In this paper, we proposed a mobile agent-based software module to efficiently reduce the load of the middleware by pre-processing a lot of tag data while items are in transit. Simulation results show that using the proposed software module considerably enhances the speed of processing tag data than otherwise. This behavior increases the tag recognition rate in a certain time limit and improves reliability of RFID middlewares.

  • PDF

Bayesian Inference driven Behavior-Network Architecture for Intelligent Agent to Avoid Collision with Moving Obstacles (지능형 에이전트의 움직이는 장애물 충돌 회피를 위한 베이지안 추론 주도형 행동 네트워크 구조)

  • 민현정;조성배
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.8
    • /
    • pp.1073-1082
    • /
    • 2004
  • This paper presents a technique for an agent to adaptively behave to unforeseen and dynamic circumstances. Since the traditional methods utilized the information about an environment to control intelligent agents, they were robust but could not behave adaptively in a complex and dynamic world. A behavior-based method is suitable for generating adaptive behaviors within environments, but it is necessary to devise a hybrid control architecture that incorporates the capabilities of inference, learning and planning for high-level abstract behaviors. This Paper proposes a 2-level control architecture for generating adaptive behaviors to perceive and avoid dynamic moving obstacles as well as static obstacles. The first level is behavior-network for generating reflexive and autonomous behaviors, and the second level is to infer dynamic situation of agents. Through simulation, it has been confirmed that the agent reaches a goal point while avoiding static and moving obstacles with the proposed method.

Information Mediating in Social Network Sites : A Simulation Study (소셜 네트워크 사이트의 정보 매개하기 : 시뮬레이션 연구)

  • Rho, Sangkyu;Kim, Taekyung;Park, Jinsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.33-55
    • /
    • 2013
  • Information sharing behavior in the Internet has raised much interest. Recently, social network sites provide a new information sharing channel for the users who want to connect with others based on common social background or tastes. Especially, we focus that a social network site becomes one of major routes for information sharing about socially influential issues. Therefore, studying how information is diffused via a social network site may give theoretically, practically significant implication. Based on the assertion, we investigated user's behavior to mediate other user's information messages. We define information mediating behavior as concurrent actions of filtering and distributing behavior of the digital content that is originated from one of the connected users. In this study, we intended to understand the effects of information mediating behavior, and tried to understand characteristics of re-mediating of previously mediated information. Using an agent-based simulation model, we found that information mediating behavior increased the extent of information diffusion significantly. In addition, even a small degree of mediating probability could boost up the level of information diffusion in the case of a re-mediating condition. We believe that those findings provide remarkable insight of research and business application on both of information sharing and diffusion in a social network site.