• 제목/요약/키워드: discrete event model

검색결과 279건 처리시간 0.021초

제어시뮬레이션을 위한 생산시스템 로그데이터 기반 플랜트 모델 생성 방법 (A Method for Generating a Plant Model Based on Log Data for Control Level Simulation)

  • 고민석;천상욱;박상철
    • 한국CDE학회논문집
    • /
    • 제18권1호
    • /
    • pp.21-27
    • /
    • 2013
  • Presented in the paper is a log data based modeling method for effective construction of a virtual plant model which can be used for the virtual PLC (Programmable Logic Controller) simulation. For the PLC simulation, the corresponding virtual plant, consisting of virtual devices, is required to interact with the input and output symbols of a PLC. In other words, the behavior of a virtual device should be the same as that of the real device. Conventionally, the DEVS (Discrete Event Systems Specifications) formalism has been used to represent the behavior a virtual device. The modeling using DEVS formalism, however, requires in-depth knowledge in the simulation area, as well as the significant amount of time and efforts. One of the key ideas of the proposed method is to generate a plant model based on the log data obtained from the production system. The proposed method is very intuitive, and it can be used to generate the full behavior model of a virtual device. The proposed approach was applied to an AGV (Automated Guided Vehicle).

콜드체인 시스템의 센서태그 운영 최적화를 위한 DEVS 기반 시뮬레이션 모델 (DEVS-Based Simulation Model for Optimization of Sensor-Tag Operations in Cold Chain Systems)

  • 류옥현;강용신;진희주;이용한
    • 대한산업공학회지
    • /
    • 제41권2호
    • /
    • pp.173-184
    • /
    • 2015
  • The application of radio frequency identification (RFID) sensor-tags in cold chain systems has recently received a great deal of attention. To design cold chain systems with RFID sensor-tags that minimize the initial investment and operational cost while fulfilling the functional and operational requirements, simulation study is one of the preferable and effective approaches. To simulate the possible design configurations, the individual components in a cold chain system can be extracted and implemented as a DEVS (Discrete Event System Specification) model. Based on the proposed DEVS model, a new cold chain simulation model can be efficiently created by simply connecting each DEVS model around the RFID sensor-tag of interest in sequence according to the structure of the cold chain system, and then executed (or simulated) on Java programming environments by the DEVSJAVA simulator. As a result of simulation, some key performance indexes such as reliability, accuracy or timeliness can be calculated and used to choose better components or to compare different system configurations of cold chain systems.

다중처리기 시스템의 시뮬레이션에 관한 연구 (A Study on Simulation of A Multiprocessor System)

  • 박찬정;신인철;이상범
    • 대한전자공학회논문지
    • /
    • 제27권10호
    • /
    • pp.78-88
    • /
    • 1990
  • 본 논문은 다중 버스 상호 적속망을 갖는 다중처리기 시스템에서, 기억장치 접근 요구의 경쟁에 의하여 영향을 받는 시스템의 성능을 평가하기 위하여 이산 사건 모델을 구성하였다. 또한 시스템의 해석적 모델과 시뮬레이터 모델을 구성하여 해석적 모델의 결과와 시뮬레이터 모델의결과를 상호 검증하였다. 검증 방법으로는 프로세서의 수, 기억장치 모듈의 수, 버스의 수와 국부 기억장치 실패율을 입력인수로 하여 기억장치 밴드폭, 프로세서, 기억장치 모듈 및 버스의 이용율, 버스 상호 충돌의 정도를 결정할 수 있었다. 따라서 시스템을 설RP할 때 시뮬레이션을 통하여 입력인수의 상호작용을 해석함으로써 시스템의 성능을 평가할 수 있게 된다.

  • PDF

계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션 (Application of Contract Net Protocol to the Design and Simulation of Network Security Model)

  • 서경진;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제12권4호
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Mobile Resource Reliability-based Job Scheduling for Mobile Grid

  • Jang, Sung-Ho;Lee, Jong-Sik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권1호
    • /
    • pp.83-104
    • /
    • 2011
  • Mobile grid is a combination of grid computing and mobile computing to build grid systems in a wireless mobile environment. The development of network technology is assisting in realizing mobile grid. Mobile grid based on established grid infrastructures needs effective resource management and reliable job scheduling because mobile grid utilizes not only static grid resources but also dynamic grid resources with mobility. However, mobile devices are considered as unavailable resources in traditional grids. Mobile resources should be integrated into existing grid sites. Therefore, this paper presents a mobile grid middleware interconnecting existing grid infrastructures with mobile resources and a mobile service agent installed on the mobile resources. This paper also proposes a mobile resource reliability-based job scheduling model in order to overcome the unreliability of wireless mobile devices and guarantee stable and reliable job processing. In the proposed job scheduling model, the mobile service agent calculates the mobile resource reliability of each resource by using diverse reliability metrics and predicts it. The mobile grid middleware allocated jobs to mobile resources by predicted mobile resource reliability. We implemented a simulation model that simplifies various functions of the proposed job scheduling model by using the DEVS (Discrete Event System Specification) which is the formalism for modeling and analyzing a general system. We also conducted diverse experiments for performance evaluation. Experimental results demonstrate that the proposed model can assist in improving the performance of mobile grid in comparison with existing job scheduling models.

주파수 영역에서의 성능 신뢰도 향상을 위한 메타 모델을 이용한 설계 방법 (Meta-model-based Design Method for Frequency-domain Performance Reliability Improvement)

  • 손영갑
    • 대한기계학회논문집A
    • /
    • 제39권1호
    • /
    • pp.19-26
    • /
    • 2015
  • 본 논문은 변량 및 열화를 가지는 부품들로 구성된 동적 시스템에 대하여 주파수 영역에서 성능 신뢰도를 향상시키기 위한 설계방법을 제안한다. 제안하는 설계방법은 이산화한 주파수로 주파수 범위를 표현하고 각 주파수에서 응답의 규격 대비 순응도를 이용하여 주파수 영역에서의 성능 신뢰도를 모델링한다. 성능 신뢰도 추정시 계산 시간의 효율성을 높이기 위하여 주파수 응답에 대한 메타 모델과 극치값, 그리고 Set-theory를 적용한다. 또한 표본추출기법을 이용하여 추정한 성능 신뢰도를 평가하고 최적화할 수 있는 방법을 제시하였다. 진동저감 시스템의 설계에 적용하여 제안한 설계방법의 응용성을 나타낸다.

웹사이클론을 이용한 조닝모듈 개발에 관한 연구 (A Study on Zoning Model Using Web-Cyclone)

  • 곽한성;손창백;이동은
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2012년도 추계 학술논문 발표대회
    • /
    • pp.115-117
    • /
    • 2012
  • Task based modeling is essential in a construction operation simulation modeling. It allows dealing with local variables or delay factors that affect productivity and improves the reusability of existing operation models. An operation model can secure reality only if it reflects the real construction processes by effectively dealing with zoning issue. However, system users have some difficulties in modeling a construction operation that is consisted of several processes having different production units. Zoning is a major modeling issue when the task based modeling method is implemented using the existing discrete event simulation systems. This paper highlights the difficulty and presents a new method that complements the zoning issues attributed to different production units. The method is described in detail by presenting the flow of entities. It is confirmed that the zoning method effectively deals with the unbalance of production units between processes and facilitates to model an operation model having processes with different production units. The "Zoning module" contributes to increasing accuracy of simulation result.

  • PDF

공정 중심 시뮬레이션 모델링 방법론을 이용한 조선소 생산 시뮬레이션 시스템: 중일정계획 검증 시뮬레이션 모델 구축 사례를 중심으로 (A Shipyard Simulation System using the Process-centric Simulation Modeling Methodology: Case Study of the Simulation Model for the Shipyard Master Plan Validation)

  • 정용국;우종훈;오대균;신종계
    • 한국CDE학회논문집
    • /
    • 제21권2호
    • /
    • pp.204-214
    • /
    • 2016
  • Shipbuilding process takes a long time for producing final products, and needs many different resources. Because of these characteristics, it has been studied about shipyard simulation and virtual manufacturing that is able to implement the virtual manufacturing process. However, among the previous researches, it requires considerable time and effort to construct simulation model since the systematic methodology has not been used for simulation modeling. Also, reusability of constructed simulation model was low. Therefore, this research defines the method to construct shipyard simulation system using the process-centric simulation modeling methodology and shipyard simulation framework. This paper also validates the utility of this methodology through applying to construct simulation model for the shipyard master plan validation.

이산사건 워게임 시뮬레이션을 위한 실시간 병렬 엔진의 설계 및 구현 (Design and Implementation of Real-Time Parallel Engine for Discrete Event Wargame Simulation)

  • 김진수;김대석;김정국;류근호
    • 정보처리학회논문지A
    • /
    • 제10A권2호
    • /
    • pp.111-122
    • /
    • 2003
  • 군사용 워게임 시뮬레이션 모델들의 상호연동을 위해서는 국제표준연동(HLA : High Level Architecture)구조를 반드시 갖추어야하며 타 모델과 연동시 발생되는 시스템 오버헤드를 줄이기 위해서는 병렬 시뮬레이션 엔진 도입이 효과적이다. 그러나 기존 군사용 워게임 시뮬레이션 모델엔진의 이벤트 처리는 순차적 이벤트-드리븐 방식으로 처리하고 있다. 이는 병렬로 처리 시 글로벌 자료영역에 대한 동시참조등의 문제점들이 발생하기 때문이다. 아울러 기존 시뮬레이션 플랫폼으로 다중 CPU 시스템을 사용하여도 여러 개의 CPU를 다 활용하지 못하는 결과를 초래하고 있다. 따라서 이 논문에서는 군사용 워 게임 모델의 시스템 처리능력 향상과 글로벌 자료 영역에 대한 동시참조, 대외적인 시뮬레이션 시간처리, 장애 회복(Crash Recovery)시 병행 처리된 이벤트들의 순서를 보장 할 수 있는 객체모델에 기반한 병렬 시뮬레이션 엔진으로의 전환을 제안한다 이 전환된 병렬 시뮬레이션 엔진은 다중 CPU 시스템(SMP)상에서도 병렬 실행이 가능하도록 설계하고 구현하였다.