• Title/Summary/Keyword: and Discrete Event Simulation(DEVS)

Search Result 146, Processing Time 0.023 seconds

A Whiteboard for Multimedia Collaboration Work Space based on Home Network (홈 네트워크 기반에서 멀티미디어 공동 작업 공간을 위한 화이트보드)

  • Ko, Eung-Nam
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.39-43
    • /
    • 2014
  • This paper suggested a whiteboard for multimedia collaboration work. We implemented the whiteboard so that the users participated in collaborative work may refer shared media objects as the same view to others. In this paper, we discuss a method for increasing reliability of media data through whiteboard. This paper explains a performance analysis of a media data system running on distributed multimedia environment using the rule-based DEVS modeling and simulation techniques.

Web-based Distributed Experimental Frame for Discrete Event Simulation System (이산사건 시뮬레이션 시스템을 위한 웹 기반 분산 실험 틀)

  • Jung, Inho;Choi, Jaewoong;Choi, Changbeom
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.9-17
    • /
    • 2017
  • The problem of social phenomenon is getting more complicated than past decades, and the simulation engineers need more computation power to solve the problem. Therefore, the needs of the computational resources of the modeling and simulation environment are increasing. In the perspective of the simulation, it is necessary to allocate computational resources flexibly so that the simulation can be performed per the available budget range. As an alternative to the simulation environment to accommodate these requirements, cloud service has emerged as an environment in which computing resources can be used flexibly. This paper proposes a web-based simulation framework which consists of a front-end that reconstructs the simulation model using the web, and a back-end that executes the discrete event simulation. This paper also carried out a case study which shows web-based simulation framework has better overall runtime than standalone simulation framework.

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • 이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.06a
    • /
    • pp.191-198
    • /
    • 2003
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (ⅰ) it is able to analyze behaviors of system emerged by interaction with functional elements of components composing network and each other, (ⅱ) it is able to analyze vulnerability in quantitative manner, and (ⅲ) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • Lee Jang-Se;Chi Sung-Do;Choi Gyoo-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (i) it is able to analyze behaviors of systems being emerged by interaction between functional elements of network components, (ii) it is able to analyze vulnerability in quantitative manner, and (iii) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

Coordination among the Security Systems using the Blackboard Architecture (블랙보드구조를 활용한 보안 모델의 연동)

  • 서희석;조대호
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.4
    • /
    • pp.310-319
    • /
    • 2003
  • As the importance and the need for network security are increased, many organizations use the various security systems. They enable to construct the consistent integrated security environment by sharing the network vulnerable information among IDS (Intrusion Detection System), firewall and vulnerable scanner. The multiple IDSes coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (Blackboard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (Blackboard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete Event system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses to these detection information.

The DEVS Integrated Development Environment for Simulation-based Battle experimentation (시뮬레이션 기반 전투실험을 위한 DEVS 통합 개발 환경)

  • Hwang, Kun-Chul;Lee, Min-Gyu;Han, Seung-Jin;Yoon, Jae-Moon;You, Yong-Jun;Kim, Sun-Bum;Kim, Jung-Hoon;Nah, Young-In;Lee, Dong-Hoon
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.39-47
    • /
    • 2013
  • Simulation based Battle Experimentation is to examine the readiness for a battle using simulation technology. It heavily relies on the weapon systems modeling and simulation. To analyze the characteristics and complexity of the weapon systems in the experiment, the modeling & simulation environment has to be able to break down the system of systems into components and make the use of high fidelity components such as real hardware in simulation. In that sense, the modular and hierarchical structure of DEVS (Discrete EVent System Specification) framework provides potentials to meet the requirements of the battle experimentation environment. This paper describes the development of the DEVS integrated development environment for Simulation based Battle Experimentation. With the design principles of easy, flexible, and fast battle simulation, the newly developed battle experimentation tool mainly consists of 3 parts - model based graphical design tool for making DEVS models and linking them with external simulators easily through diagrams, the experiment plan tool for speeding up a statistic analysis, the standard components model libraries for lego-like building up a weapon system. This noble simulation environment is to provide a means to analyze complex simulation based experiments with different levels of models mixed in a simpler and more efficient way.

A study on the modeling between Discrete event system and continuous-time system (UAV를 위한 이산사건 및 연속시간 시스템간의 연동 모델링에 대한 연구)

  • Kang, Kwang-Chun;Chi, Sung-Do
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.159-164
    • /
    • 2005
  • UAV(Unmanned Air Vehicle) 시스템은 새로운 알고리즘과 소프트웨어 디자인에 바탕을 두고 빠르게 발전하고 있다. 그러나, 일반적으로 쓰이고 있는 전자공학적인 제어 시스템은 개발의 복잡성과 그에 따른 이용증대에 대한 문제점을 가지고 있다. 이에 본 논문에서는 연속시간 시스템으로 표현되는 비행기 모델과 이의 효과적인 제어를 위해 이산사건 시스템으로 표현되는 조종사 모델간의 연동을 제안한다. 전자공학적 모델인 연속시스템은 자세한 표현력을 바탕으로 정량적이고 정확한 비행기 모델을 표현할 수 있으며 제어 모델인 이산사건 시스템은 각 사건과 시스템의 상태에 따른 정성적인 행동제어를 가능하게 한다. 본 연구는 한국항공대학교에서 개발한 이산사건 시뮬레이터인 DEJAVA(DEVS Java)와 연속시간시뮬레이터인 MATLAB 시뮬레이터 환경을 바탕으로, NASA에서 개발된 HL2O 비행시뮬레이터와 조종사 모델을 위한 지능제어시스템 개념을 사용하여 구현되었다.

  • PDF

A Methodology for Creating a Simulation Model for a Agent Based and Object-oriented Logistics Support System (군수지원시스템을 위한 에이전트 기반의 객체 지향 시뮬레이션 모델 아키텍처 설계 방법론)

  • Chung, Yong-H.;Hwam, Won-K.;Park, Sang-C.
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.27-34
    • /
    • 2012
  • Proposed in the paper is an agent based and object-oriented methodology to create a virtual logistics support system model. The proposed virtual logistics support system model consists of three types of objects: the logistics force agent model(static model), the military supplies transport manager model(function model), the military supplies state manager model(dynamic model). A logistic force agent model consists of two agent: main function agent and function agent. To improve the reusability and composability of a logistics force agent model, the function agent is designed to adapt to different logistics force agent configuration. A military supplies transport manager is agent that get information about supply route, make decisions based on decision variables, which are maintained by the military supplies state manager, and transport military supplies. A military supplies state manager is requested military supplies from logistics force agent, provide decision variables such as the capacity, order of priority. For the implementation of the proposed virtual logistics force agent model, this paper employs Discrete Event Systems Specification(DEVS) formalism.

Dynamic Incidence Matrix Representation of Timed Petri Nets and Its Applications for Performance Analysis

  • Shon, J.G.;Hwang, C.S.;Baik, D.K.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.16 no.2
    • /
    • pp.128-147
    • /
    • 1991
  • We propose a dynamic incidence matrix (DIM) for reflecting states and time conditions of a timed Petri net (TPN) explicitly. Since a DIM consists of a conventional incidence matrix, two time-related vectors and two state-related vectors, we can get the advantages inherent in the conventional incidence matrix of describing a static structure of a system as well as another advantage of expressing time dependent state transitions. We introduce an algorithm providing the DIM with a state transition mechanism. Because the algorithm is, in fact, an algorithmic model for discrete event simulation of TPN models, we provide a theoretical basis of model transformation of a TPN model into a DEVS(Discrete Event system Specification) model. By executing the algorithm we can carry out performance analysis of computer communication protocols which are represented TPN models.

  • PDF

Modeling and Simulation of the Efficient Certificate Status Validation System on Public Key Infrastructure (공개키 기반 구조에서의 효율적인 인증서 상태 검증 방법의 모델링 및 시뮬레이션)

  • Seo, Hee-Suk;Kim, Tae-Kyoung;Kim, Hee-Wan
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.5
    • /
    • pp.721-728
    • /
    • 2004
  • OCSP (Online Certificate Status Protocol) server which checks the certificate status provides the real time status verification in the PKI (Public Key Infrastructure) system which is the essential system of certificate. However, OCSP server need the message authentication with the server and client, so it has some shortcomings that has slow response time for the demands of many clients concurrently and has complexity of the mathematical process in the public encryption system. In this research, simulation model of the certificate status vertification server is constructed of the DEVS (Discrete EVent system Specification) formalism. This sever model is constructed to practice the authentication with hash function when certificate is checked. Simulation results shows the results of increase of the certificate status verification speed and decrease of the response time to the client.

  • PDF