• Title/Summary/Keyword: DEVS formalism

Search Result 118, Processing Time 0.027 seconds

DEVS Modeling and Simulation for spectral characteristic on the strip of urin examination (뇨 분석용 strip의 분광학적 특성분석을 위한 DEVS 모델링 및 시뮬레이션)

  • Cho, Y.J.;Kim, J.H.;Nam, K.G.;Kim, J.H.;Jun, K.R.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1997 no.05
    • /
    • pp.145-149
    • /
    • 1997
  • This paper describes a methodology for the development of models of discrete event system. The methodology is based on transformation of continuous state space into discrete one to homomorphically represent dynamics of continuous processes in discrete events. This paper proposes a formal structure which can coupled discrete event system models within a framework. The structure employs the discrete event specification formalism for the discrete event system models. The proposed formal structure has been applied to develop a discrete event specification model for the complex spectral density analysis of strip for urin analyzer system. For this, spectral density data of strip is partitioned into a set of Phases based on events identified through urine spectrophotometry. For each phase, a continuous system of the continuous model for the urine spectral density analysis has been simulated by programmed C++. To validate this model, first develop the discrets event specification model, then simulate the model in the DEVSIM++ environment. It has the similar simulation results for the data obtained from the continuous system simulation. The comparison shows that the discrete event specification model represents dynamics of the urine spectral density at each phase.

  • PDF

Simulation Reconfiguration using Entity Plug-in approach for Weapon System Effectiveness Analysis (무기체계 효과도 분석을 위한 개체 플러그인 방식의 모의 재구성 연구)

  • Kim, Taeyoung
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.49-59
    • /
    • 2018
  • The simulation-based weapon system effectiveness analysis is to support the decision making in the acquisition process of the defense domain. The effectiveness of the weapon system is a complexly influenced indicator from various factors such as environment, doctrine and so on. And the measurement of effectiveness can be defined differently in compliance with major issues in the weapon system. Because of this, the weapon system effectiveness analysis requires the comparative experiment of various alternatives based on the underlying assumption. This paper presents the efficient approach to reconfigure the simulation using the reflection technique. The proposed method contains the recoupling and resetting the simulation entity using DEVS(Discrete EVent System specification) formalism-based dynamic plug-in method. With the proposed method, this paper designs the effectiveness analysis environment that can efficiently handle the various alternatives of the weapon system.

Modeling and Simulation of Fuzzy based Propagation Limiting Method for message routing in Wireless Sensor Networks (무선 센서 네트워크에서 메시지 라우팅을 위한 퍼지 기반 전달 영역 제한 기법의 모델링 및 시뮬레이션)

  • Chi, Sang-Hoon;Lee, Hae-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.29-39
    • /
    • 2006
  • Sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. A number of routing protocols to transmit the data between the base station and sensor nodes have been proposed. Intanagonwiwat et al. proposed the directed diffusion in which the base station sends interest messages and waits for data from the nodes in the specific regions. Since the directed diffusion propagates every interest message to whole nodes in the network, it causes energy dissipation of nodes. In this paper, we propose a novel data propagation method, which limits the data transmission area according to a threshold value for reducing the energy consumption in the network. A fuzzy logic is exploited to determine the threshold value by considering the energy and density of all the deployed nodes. The simulation models are designed and implemented based on DEVS formalism which is theoretically well grounded means of expressing discrete event simulation models.

  • PDF

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF

Fuzzy logic-based Priority Live Migration Model for Efficiency (이주 효율성 향상을 위한 퍼지로직 기반 우선순위 이주 모델)

  • Park, Min-Oh;Kim, Jae-Kwon;Choi, Jeong-seok;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.11-21
    • /
    • 2015
  • If the cloud computing environment is not sufficiently provide the required resources due to the number of virtual server to process the request, may cause a problem that the load applied to the specific server. Migration administrator receive the resources of each physical server for improving the efficiency of the virtual server that exists in the physical servers, and determines the migration destination based on the simulation results. But, there is more overhead predicting the future resource consumption of all the physical server to decide the migration destination through the simulation process in large and complex cloud computing environments. To solve this problem, we propose an improved prediction method with the simulation-based approach. The proposed method is a fuzzy-logic based priority model for VM migration. We design a proposed model with the DEVS formalism. And we also measure and compare a performance and migration count with existing simulation-based migration method. FPLM shows high utilization.

Modeling and Simulation for Effectiveness Analysis of Anti-Ballistic Warfare in Naval Vessels (함정의 대탄도탄전 효과도 분석을 위한 모델링 및 시뮬레이션)

  • Jang Won Bae;GuenHo Lee ;Hyungho Na ;Il-Chul Moon
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.3
    • /
    • pp.55-66
    • /
    • 2023
  • In recent years, naval vessels have been developed to fulfill a variety of missions by being equipped with various cutting-edge equipment and ICT technologies. One of the main missions of Korean naval vessels is anti-ballistic missile warfare to defend key units and areas against the growing threat of ballistic missiles. Because the process of detection and interception is too complex and the cost of failure is much high, a lot of preparation is required to effectively conduct anti-ballistic missile warfare. This paper describes the development of a simulation model of anti-ballistic missile warfare with combat systems and equipment to be installed on future naval vessels. In particular, the DEVS formalism providing a modular and hierarchical modeling manner was applied to the simulation model, which can be utilized to efficiently represent various anti-ballistic missile warfare situations. In the simulation results presented, experiments were conducted to analyze the effectiveness of the model for effective detection resource management in anti-ballistic missile warfare. This study is expected to be utilized as a variety of analysis tools necessary to determine the optimal deployment and configuration of combat resources and operational tactics required for effective anti-ballistic missile warfare of ships in the future.

Extending the Read Range of UHF Mobile RFID Readers: Arbitration Methods Based on Interference Estimation

  • Ahn, Si-Young;Park, Jun-Seok;Seong, Yeong Rak;Oh, Ha-Ryoung
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.6
    • /
    • pp.2025-2035
    • /
    • 2014
  • The read range of UHF mobile readers can be extended by a booster for mobile RFID readers (BoMR). But in an environment where multiple BoMRs are installed, the read success rate may be decreased due to signal interference. This paper proposes three arbitration methods based on interference estimation with the purpose of enhancing the read success rate. A central arbitration server manages global information in centralized arbitration method (CAM) without broadcast/multicast communication facility. In fully distributed arbitration method (FDAM), all the arbitration messages are broadcasted from a BoMR to every BoMR, and each BoMR decides with broadcasted global information. Events in FDAM are serialized naturally with broadcasted messages. Cluster Distributed Arbitration Method (CDAM) forms clusters with multicasted BoMRs and a selected BoMR acts as an arbiter in the cluster. Such effects as lengthened read range, improved the read success rates of readers can be obtained by the proposed methods without any hardware modification. In order to evaluate the arbitration methods, the RFID system is modeled by using the DEVS formalism and simulated by using the DEVSim++.

Attacker and Host Modeling for Cyber-Attack Simulation (사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링)

  • 정정례;이장세;박종서;지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.2
    • /
    • pp.63-73
    • /
    • 2003
  • The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

  • PDF

Implementation of a tactic manager for the target motion analysis simulation of a submarine (잠수함의 표적기동분석 시뮬레이션을 위한 전술처리기의 구현)

  • Cho, Doo-Yeoun;Son, Myeong-Jo;Cha, Ju-Hwan;Lee, Kyu-Yeul;Kim, Tae-Wan;Ko, Yong-Seog
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.65-74
    • /
    • 2007
  • A tactic manager which can change the behavior of a simulation model according to the tactic definition file has been studied and implemented. Based on the DEVS(discrete event system specification) formalism, we generated a simulation model which is equipped with the inter ace to the tactic manager. To demonstrate the effectiveness of the tactic manager, a target motion analysis simulation of the warfare between a submarine and a surface ship is simulated.

  • PDF

Macroscopic and Microscopic Traffic Simulation Using the Discrete Event system Formalism (이산 사건 형식론을 이용한 거시적 및 미시적 교통류 시뮬레이션)

  • 이종근
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1999.04a
    • /
    • pp.110-114
    • /
    • 1999
  • 본 연구는 Zeigler가 제안한 이산 사건 시스템 형식론(DEVS: Discrete Event System Specification)을 이용한 거시적 및 미시적 교통류 시뮬레이션 방법론의 개발을 주 목적으로 한다. 도로 교통망의 모델링 방법은 미시적(microscopic)방법과 거시적(macroscopic)방법으로 분류된다. 이러한 모델링 방법들은 그 목적에 따라 각기 표현되어 제각기 사용되어 왔으나, 시스템 이론적으로 이들은 독립적 모델이 아니며 오히려 이들은 서로 동질적 추상화 관계에 있어서, 통합 모델링 환경의 구축시 미시적 모델들로부터 추상화에 의한 거시적 모델의 자동생성 등 설계상의 효율뿐 아니라 모델간의 일관성을 통한 모델 유효성을 보장할 수 있는 장점이 제공될 수 있다. 따라서, 본 논문에서는 서로 다른 표현 방법(즉, 이산시간 형식론과 이산사건 형식론)간의 통합 표현을 기반으로 양자간의 추상화 관계를 도출하고, 이를 이용한 모델 추상화를 통해 거시적 및 미시적 교통류 시뮬레이션 방법론을 제안한다. 시스템 이론적 접근을 토대로 접근한 통합 교통류 시뮬레이션 환경은 미국 Berkeley 대학 교통 연구소에서 개발한 SHIFT 등과 같은 최첨단 교통류 시뮬레이션 도구에 비하여 SES/MB를 기반을 시스템 이론적이며 소프트웨어공학적인 접근을 통하여, 1) 기존 제어 방식의 검증 및 신뢰도 분석, 2) 각종 사건, 사고의 시간별 파급효과 분석, 3) 도로건설 계획안에 대한 타당성 검토, 4) 운전자 및 관리자를 위한 예측된 교통정보 등을 제공할 수 있을 것으로 기대된다.

  • PDF