• Title/Summary/Keyword: formalism

Search Result 404, Processing Time 0.017 seconds

DEVS/CS Combined Model Approach for the Cardiovascular System (심혈관 시스템의 DEVS/CS 혼합 모델링)

  • Cho, Yong-Jae;Jeon, Gye-Rok;Lee, Kwon-Soon;Chang, Yong-Hoon;Lee, Sang-Yeol
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1995 no.05
    • /
    • pp.87-91
    • /
    • 1995
  • Combined models, specified by two or more modeling formalisms, can represent a wide variety of complex systems. This paper describes a methodology for the development of combined models in two model types of discrete events and continuous process. The methodology is based on transformation of continuous state space into discrete one to homomorphically represent dynamics of continuous processes in discrete events. As an example, a combined model of human heart is developed which Incorporates conventional differential equation formalism with Zeigler's DEVS(Discrete Event Specification System) [4]formalism.

  • PDF

Modeling and Simulation of a RAID System (RAID 시스템의 모델링 및 시뮬레이션)

  • 이찬수;성영락;오하령
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.05a
    • /
    • pp.77-81
    • /
    • 2001
  • In this paper, a RAID system is modeled and simulated by using the DEVS formalism. The RA[D system interacts with a host system by using the high-speed Fibre channel protocol and stores input data in an array of IDE disks. The DEVS formalism specifies discrete event systems in a hierarchical, modular manner. The RAID system model is composed of three units: primary-PCI unit, secondary-PCI unit and CPU unit. The primary-PCI unit interfaces with the host system and caches I/O data. The secondary-PCI unit includes disks. The CPU unit controls overall system. The control algorithm of CPU and PCI transactions are analyzed and modeled. From an analysis of simulation events, we can conclude that the proposed model satisfies given requirements.

  • PDF

병렬분산 환경에서의 DEVS형식론의 시뮬레이션

  • Seong, Yeong-Rak;Jung, Sung-Hun;Kon, Tag-Gon;Park, Kyu-Ho-
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1992.10a
    • /
    • pp.5-5
    • /
    • 1992
  • The DEVS(discrete event system specification) formalism describes a discrete event system in a hierarchical, modular form. DEVSIM++ is C++ based general purpose DEVS abstract simulator which can simulate systems to be modeled by the DEVS formalism in a sequential environment. We implement P-DEVSIM++ which is a parallel version of DEVSIM++. In P-DEVSIM++, the external and internal event of models can be processed in parallel. To process in parallel, we introduce a hierarchical distributed simulation technique and some optimistic distributed simulation techniques. But in our algorithm, the rollback of a model is localized itself in contrast to the Time Warp approach. To evaluate its performance, we simulate a single bus multiprocessor architecture system with an external common memory. Simulation result shows that significant speedup is made possible with our algorithm in a parallel environment.

  • PDF

Modeling and Simulation of a RAID System (RAID 시스템의 모델링 및 시뮬레이션)

  • 이찬수;성영락;오하령
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.1
    • /
    • pp.11-22
    • /
    • 2002
  • In this paper, a RAID system is modeled and simulated by using the DEVS formalism. The RAID system interacts with a host system by using the high-speed Fibre channel protocol and stores data in an array of IDE disks. The DAVS formalism specifies discrete event systems in a hierarchical, modular manner. The RAID system model is composed of three units: primary-PCI unit, secondary-PCI unit and MCU unit. The primary-PCI unit interfaces with the host system and I/O data caches. The secondary-PCI unit includes disks. The MCU unit controls overall system. The control algorithm of MCU and PCI transactions are analyzed and modeled, From the analysis of simulation events, we can conclude that the proposed model satisfies given requirements.

  • PDF

An Application of Blackboard Architecture for the Coordination among the Security Systems (보안 모델의 연동을 위한 블랙보드구조의 적용)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.4
    • /
    • pp.91-105
    • /
    • 2002
  • The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of amy one system to deal with the intrusions. That the multiple IDSes (Intrusion Detection System) coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (BlackBoard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (BlackBoard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete EVent system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses these detection information.

  • PDF

Symbolic Simulation of Discrete Event Systems (이산 사건 시스템의 기호적 시뮬레이션)

  • 지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1992.10a
    • /
    • pp.7-7
    • /
    • 1992
  • Extending discrete event modelling formalisms to facilitate greater symbol manipulation capabilities is important to further their use in intelligent control and design of high autonomy systems. This paper defines an extension to the DEVS formalism that facilitates symbolic expression of discrete event times by extending the time base from the real numbers to the field of linear polynomials over the reals. A simulation algorithm is developed to generate the branching trajectories resulting from the underlying non-determinism. To efficiently manage linear polynomial constraints based on feasibility checking algorithm borrowed from linear programming. The extended formalism offers a convenient means to conduct multiple, simultaneous explorations of model behaviors. Examples of application are given with consideration on fault model analysis.

  • PDF

Development and Performance Evaluation of a Car Assignment and Routing Algorithm for Reducing Transportation Cost in a Logistics System (물류시스템에서 운송비를 줄이기 위한 차량 할당 및 경로 설정 알고리즘 개발 및 성능평가)

  • 조병헌
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.3
    • /
    • pp.91-103
    • /
    • 1999
  • This paper proposes an algorithm which reduces transportation cost while goods are delivered in time in a logistics system. The logistics system assumed in this paper is the system in which multiple cars moves various goods from spatially distributed warehouses to stores. For reducing transportation cost, the car assignment algorithm which allocates goods to minimal cars employs the BF method; routing of each car is modelled as the TSP and is solved by using the genetic algorithm. For evaluating the proposed algorithm, the logistics system is modelled and simulated by using the DEVS formalism. The DEVS formalism specifies discrete event systems in a hierarchical, modular manner. During simulation, each car is modelled as a message and traverses warehouse and stores. When a car arrives at a warehouse or a store, predetermined amount of goods are loaded or unloaded. The arrival time and departure time of cars are analyzed and eventually whether goods are delivered in the desired time bound is verified.

  • PDF

Security Analysis of Cryptographic Protocols Based on Trusted Freshness

  • Chen, Kefei;Dong, Ling;Lai, Xuejia
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.219-232
    • /
    • 2008
  • A novel idea of protocol security analysis is presented based on trusted freshness. The idea has been implemented not only by hand but also by a belief muitisets formalism for automation. The key of the security analysis based on trusted freshness is a freshness principle: for each participant of a cryptographic protocol, the security of the protocol depends only on the sent or received one-way transformation of a message, which includes a trusted freshness. The manual security analysis method and the belief multisets formalism are all established on the basis of the freshness principle. Security analysis based on trusted freshness can efficiently distinguish whether a message is fresh or not, and the analysis results suggest the correctness of a protocol convincingly or the way to construct attacks intuitively from the absence of security properties. Furthermore, the security analysis based on trusted freshness is independent of the idealization of a protocol, the concrete formalization of attackers' possible behaviors, and the formalization of concurrent runs of protocols.

Simulation of a Mobile IoT System Using the DEVS Formalism

  • Im, Jung Hyun;Oh, Ha-Ryoung;Seong, Yeong Rak
    • Journal of Information Processing Systems
    • /
    • v.17 no.1
    • /
    • pp.28-36
    • /
    • 2021
  • This paper proposes two novel methods to model and simulate a mobile Internet of Things (IoT) system using the discrete event system specification (DEVS) formalism. In traditional simulation methods, it is advantageous to partition the simulation area hierarchically to reduce simulation time; however, in this case, the structure of the model may change as the IoT nodes to be modeled move. The proposed methods reduce the simulation time while maintaining the model structure, even when the IoT nodes move. To evaluate the performance of the proposed methods, a prototype mobile IoT system was modeled and simulated. The simulation results show that the proposed methods achieve good performance, even if the number of IoT nodes or the movement of IoT nodes increases.

GENERATION OF GRAVITATIONAL WAVE IN THE SOURCE THEORY

  • Kim, Yong-Duk
    • Journal of The Korean Astronomical Society
    • /
    • v.12 no.1
    • /
    • pp.7-9
    • /
    • 1979
  • The rate of gravitational quadrupole radiation is derived in the formalism of source theory. It is also shown that gravitational superradiance is theoretically possible.

  • PDF