• 제목/요약/키워드: DEVS (Discrete EVent System Specification)

검색결과 121건 처리시간 0.027초

Algorithm for Partitioning the Simulation Models Based on DEVS-features for Distributed Simulation Environment (분산 시뮬레이션을 위한 DEVS 특성 기반 시뮬레이션 모델 분배 방법)

  • Kang, Won-Seok;Kim, Ki-Hyung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2007년도 한국컴퓨터종합학술대회논문집 Vol.34 No.1 (B)
    • /
    • pp.513-518
    • /
    • 2007
  • 시뮬레이션 방법론에 있어서 모델기반 시뮬레이션과 프로세스기반 시뮬레이션으로 나눌 수 있는데, 재사용성, 확장성, 시뮬레이터 기술 용이성 등의 장점으로 모델기반 시뮬레이션이 많이 사용되고 있다. 이러한 이유로 근래에는 컴퓨터 시스템, 항공, 자동차 등에서 모델 기반 시뮬레이션 방법이 사용되고 있다. 모델기반 시뮬레이션 방법으로 수학적 이론을 기반으로 모델을 정의하는 DEVS(Discrete Event System Specification) 형식론은 계층적이고 모듈화 된 형태로 이산사건 시스템을 기술한다. 대규모의 복잡한 시뮬레이션 모델을 검증 할 목적으로 분산 시뮬레이션 방법론이 있는데, 이들은 크게 동기적인 방법과 비동기적인 방법이 있다. 동기적 방식보다 빠른 수행을 위해 비동기적 방법은 전체 Time-order 순이 아닌 로컬 Time-order를 가진다. 그러나 비동기적 방식에는 분산된 시뮬레이터들 간의 전체 Time-order를 유지하기 위해 전 처리된 시뮬레이터 결과들을 저장하는데, Time-order 상으로 현재의 시뮬레이션 시간보다 과거의 사건이 왔을 때 그 이벤트를 처리해주어야 되기 때문이다. 이러한 비동기적 분산 시뮬레이션 방법론에서는 전체 Time-order를 유지하기 위해 과거의 Time-order를 가지는 이벤트가 왔을 때 rollback operation을 수행한다. 그러나 rollback operation은 분산 시뮬레이션 방법론에서 성능 장애요소 중 하나이다. 본 논문에서는 rollback operation을 최소할 할 수 있는 DEVS 모델 분배 방법을 제안한다.

  • PDF

Development of a DEVS Simulator for Electronic Warfare Effectiveness Analysis of SEAD Mission under Jamming Attacks (대공제압(SEAD) 임무에서의 전자전 효과도 분석을 위한 DEVS기반 시뮬레이터 개발)

  • Song, Hae Sang;Koo, Jung;Kim, Tag Gon;Choi, Young Hoon;Park, Kyung Tae;Shin, Dong Cho
    • Journal of the Korea Society for Simulation
    • /
    • 제29권4호
    • /
    • pp.33-46
    • /
    • 2020
  • The purpose of Electronic warfare is to disturbe, neutralize, attack, and destroy the opponent's electronic warfare weapon system or equipment. Suppression of Enemy Air Defense (SEAD) mission is aimed at incapacitating, destroying, or temporarily deteriorating air defense networks such as enemy surface-to-air missiles (SAMs), which is a representative mission supported by electronic warfare. This paper develops a simulator for analyzing the effectiveness of SEAD missions under electronic warfare support using C++ language based on the DEVS (Discrete Event Systems Specification) model, the usefulness of which has been proved through case analysis with examples. The SEAD mission of the friendly forces is carried out in parallel with SSJ (Self Screening Jamming) electronic warfare under the support of SOJ (Stand Off Jamming) electronic warfare. The mission is assumed to be done after penetrating into the enemy area and firing HARM (High Speed Anti Radiation Missile). SAM response is assumed to comply mission under the degraded performance due to the electronic interference of the friendly SSJ and SOJ. The developed simulator allows various combinations of electronic warfare equipment specifications (parameters) and operational tactics (parameters or algorithms) to be input for the purpose of analysis of the effect of these combinations on the mission effectiveness.

Vessel and Navigation Modeling and Simulation based on DEVS Formalism : Case Studies in Collision Avoidance Simulation of Vessels by COLREG (DEVS 형식론 기반의 선박 항해 모델링 및 시뮬레이션 (II) : COLREG 기반 선박 충돌회피 시뮬레이션을 통한 사례연구)

  • Hwang, Hun-Gyu;Woo, Sang-Min;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제23권12호
    • /
    • pp.1700-1709
    • /
    • 2019
  • Recently, many researches have been under way to develop systems (services) to support the safety navigation of ships, and in these studies, common difficulties have been encountered in assessing the usefulness and effectiveness of the developed system. To solve these problems, we propose the DEVS-based ship navigation modeling and simulation technique. Following the preceding study, we analyze the COLREG rules and reflected to officer and helmsman agent models for decision making. Also we propose estimation and interpolation techniques to adopt the motion characteristics of the actual vessel to simulation. In addition, we implement the navigation simulation system to reflect the designed proposed methods, and we present five-scenarios to verify the developed simulation system. And we conduct simulations according to each scenario and the results were reconstructed. The simulation results confirm that the components modelled in each scenario enable to operate according to the navigation relationships.

Macroscopic and Microscopic Traffic Simulation Using the Discrete Event system Formalism (이산 사건 형식론을 이용한 거시적 및 미시적 교통류 시뮬레이션)

  • 이종근
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 한국시뮬레이션학회 1999년도 춘계학술대회 논문집
    • /
    • pp.110-114
    • /
    • 1999
  • 본 연구는 Zeigler가 제안한 이산 사건 시스템 형식론(DEVS: Discrete Event System Specification)을 이용한 거시적 및 미시적 교통류 시뮬레이션 방법론의 개발을 주 목적으로 한다. 도로 교통망의 모델링 방법은 미시적(microscopic)방법과 거시적(macroscopic)방법으로 분류된다. 이러한 모델링 방법들은 그 목적에 따라 각기 표현되어 제각기 사용되어 왔으나, 시스템 이론적으로 이들은 독립적 모델이 아니며 오히려 이들은 서로 동질적 추상화 관계에 있어서, 통합 모델링 환경의 구축시 미시적 모델들로부터 추상화에 의한 거시적 모델의 자동생성 등 설계상의 효율뿐 아니라 모델간의 일관성을 통한 모델 유효성을 보장할 수 있는 장점이 제공될 수 있다. 따라서, 본 논문에서는 서로 다른 표현 방법(즉, 이산시간 형식론과 이산사건 형식론)간의 통합 표현을 기반으로 양자간의 추상화 관계를 도출하고, 이를 이용한 모델 추상화를 통해 거시적 및 미시적 교통류 시뮬레이션 방법론을 제안한다. 시스템 이론적 접근을 토대로 접근한 통합 교통류 시뮬레이션 환경은 미국 Berkeley 대학 교통 연구소에서 개발한 SHIFT 등과 같은 최첨단 교통류 시뮬레이션 도구에 비하여 SES/MB를 기반을 시스템 이론적이며 소프트웨어공학적인 접근을 통하여, 1) 기존 제어 방식의 검증 및 신뢰도 분석, 2) 각종 사건, 사고의 시간별 파급효과 분석, 3) 도로건설 계획안에 대한 타당성 검토, 4) 운전자 및 관리자를 위한 예측된 교통정보 등을 제공할 수 있을 것으로 기대된다.

  • PDF

Method for Analysis of C3 System of Systems Using Transformation of Federation Based on an Extended DEVS Formalism (확장된 DEVS 형식론 기반 페더레이션의 변환을 통한 C3 복합 체계의 분석 방법)

  • Kang, Bong Gu;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • 제27권3호
    • /
    • pp.13-21
    • /
    • 2018
  • The system of systems (SoS) based analysis method for the C3 system consisting of the communication system and the command and control (C2) system has the advantage that detailed analysis is possible, but it requires long execution time per one trial, which makes the analysis of various scenarios difficult. To solve this problem, this paper proposes a method for analysis of C3 SoS using a transformation of a federation into an integrated simulation. This transformation technique reduces the execution time while maintaining accuracy by abstracting the system other than the one to be analyzed, consisting of model hypothesis and function identification. The former can construct an abstracted model for the simulation through the proposed extended Discrete Event Systems Specification (DEVS) formalism and the latter can express the characteristics of the model influenced by other systems. From the case study on C and C2 analysis, the experimental results show that this method shortened the time considerably while maintaining the accuracy within an acceptable error range and we expect that this method will enable the exploratory analysis of the complex systems other than C3.

Security Simulation with Collaboration of Intrusion Detection System and Firewall (침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • 제10권1호
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • 제12권4호
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Web-based Distributed Experimental Frame for Discrete Event Simulation System (이산사건 시뮬레이션 시스템을 위한 웹 기반 분산 실험 틀)

  • Jung, Inho;Choi, Jaewoong;Choi, Changbeom
    • Journal of the Korea Society for Simulation
    • /
    • 제26권2호
    • /
    • pp.9-17
    • /
    • 2017
  • The problem of social phenomenon is getting more complicated than past decades, and the simulation engineers need more computation power to solve the problem. Therefore, the needs of the computational resources of the modeling and simulation environment are increasing. In the perspective of the simulation, it is necessary to allocate computational resources flexibly so that the simulation can be performed per the available budget range. As an alternative to the simulation environment to accommodate these requirements, cloud service has emerged as an environment in which computing resources can be used flexibly. This paper proposes a web-based simulation framework which consists of a front-end that reconstructs the simulation model using the web, and a back-end that executes the discrete event simulation. This paper also carried out a case study which shows web-based simulation framework has better overall runtime than standalone simulation framework.

A Digital Twin Simulation Model for Reducing Congestion of Urban Railways in Busan (부산광역시 도시철도 혼잡도 완화를 위한 디지털 트윈 시뮬레이션 모델 개발)

  • Choi, Seon Han;Choi, Piljoo;Chang, Won-Du;Lee, Jihwan
    • Journal of Korea Multimedia Society
    • /
    • 제23권10호
    • /
    • pp.1270-1285
    • /
    • 2020
  • As a representative concept of the fourth industrial revolution era where everything is digitized, digital twin means analyzing and optimizing a complex system using a simulation model synchronized with the system. In this paper, we propose a digital twin simulation model for the efficient operation of urban railways in Busan. Due to the geopolitical nature of Busan, where there are many mountains and narrow roads, the railways are more useful than other public transportation. However, this inversely results in a high level of congestion, which is an inconvenience to citizens and may be fatal to the spread of the virus, such as COVID19. Considering these characteristics, the proposed model analyzes the congestion level of the railways in Busan. The model is developed based on a mathematical formalism called discrete-event system specification and deduces the congestion level and the average waiting time of passengers depending on the train schedule. In addition, a new schedule to reduce the congestion level is derived through particle swarm optimization, which helps the efficient operation of the railways. Although the model is developed for the railways in Busan, it can also be used for railways in other cities where a high level of congestion is a problem.