• 제목/요약/키워드: formalism

검색결과 403건 처리시간 0.023초

심혈관 시스템의 DEVS/CS 혼합 모델링 (DEVS/CS Combined Model Approach for the Cardiovascular System)

  • 조용재;전계록;이권순;장용훈;이상렬
    • 대한의용생체공학회:학술대회논문집
    • /
    • 대한의용생체공학회 1995년도 춘계학술대회
    • /
    • pp.87-91
    • /
    • 1995
  • Combined models, specified by two or more modeling formalisms, can represent a wide variety of complex systems. This paper describes a methodology for the development of combined models in two model types of discrete events and continuous process. The methodology is based on transformation of continuous state space into discrete one to homomorphically represent dynamics of continuous processes in discrete events. As an example, a combined model of human heart is developed which Incorporates conventional differential equation formalism with Zeigler's DEVS(Discrete Event Specification System) [4]formalism.

  • PDF

RAID 시스템의 모델링 및 시뮬레이션 (Modeling and Simulation of a RAID System)

  • 이찬수;성영락;오하령
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2001년도 춘계 학술대회 논문집
    • /
    • pp.77-81
    • /
    • 2001
  • In this paper, a RAID system is modeled and simulated by using the DEVS formalism. The RA[D system interacts with a host system by using the high-speed Fibre channel protocol and stores input data in an array of IDE disks. The DEVS formalism specifies discrete event systems in a hierarchical, modular manner. The RAID system model is composed of three units: primary-PCI unit, secondary-PCI unit and CPU unit. The primary-PCI unit interfaces with the host system and caches I/O data. The secondary-PCI unit includes disks. The CPU unit controls overall system. The control algorithm of CPU and PCI transactions are analyzed and modeled. From an analysis of simulation events, we can conclude that the proposed model satisfies given requirements.

  • PDF

병렬분산 환경에서의 DEVS형식론의 시뮬레이션

  • Seong, Yeong-Rak;Jung, Sung-Hun;Kon, Tag-Gon;Park, Kyu-Ho-
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 1992년도 제2회 정기총회 및 추계학술 발표회 발표논문 초록
    • /
    • pp.5-5
    • /
    • 1992
  • The DEVS(discrete event system specification) formalism describes a discrete event system in a hierarchical, modular form. DEVSIM++ is C++ based general purpose DEVS abstract simulator which can simulate systems to be modeled by the DEVS formalism in a sequential environment. We implement P-DEVSIM++ which is a parallel version of DEVSIM++. In P-DEVSIM++, the external and internal event of models can be processed in parallel. To process in parallel, we introduce a hierarchical distributed simulation technique and some optimistic distributed simulation techniques. But in our algorithm, the rollback of a model is localized itself in contrast to the Time Warp approach. To evaluate its performance, we simulate a single bus multiprocessor architecture system with an external common memory. Simulation result shows that significant speedup is made possible with our algorithm in a parallel environment.

  • PDF

RAID 시스템의 모델링 및 시뮬레이션 (Modeling and Simulation of a RAID System)

  • 이찬수;성영락;오하령
    • 한국시뮬레이션학회논문지
    • /
    • 제11권1호
    • /
    • pp.11-22
    • /
    • 2002
  • In this paper, a RAID system is modeled and simulated by using the DEVS formalism. The RAID system interacts with a host system by using the high-speed Fibre channel protocol and stores data in an array of IDE disks. The DAVS formalism specifies discrete event systems in a hierarchical, modular manner. The RAID system model is composed of three units: primary-PCI unit, secondary-PCI unit and MCU unit. The primary-PCI unit interfaces with the host system and I/O data caches. The secondary-PCI unit includes disks. The MCU unit controls overall system. The control algorithm of MCU and PCI transactions are analyzed and modeled, From the analysis of simulation events, we can conclude that the proposed model satisfies given requirements.

  • PDF

보안 모델의 연동을 위한 블랙보드구조의 적용 (An Application of Blackboard Architecture for the Coordination among the Security Systems)

  • 서희석;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제11권4호
    • /
    • pp.91-105
    • /
    • 2002
  • The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of amy one system to deal with the intrusions. That the multiple IDSes (Intrusion Detection System) coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (BlackBoard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (BlackBoard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete EVent system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses these detection information.

  • PDF

이산 사건 시스템의 기호적 시뮬레이션 (Symbolic Simulation of Discrete Event Systems)

  • 지승도
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 1992년도 제2회 정기총회 및 추계학술 발표회 발표논문 초록
    • /
    • pp.7-7
    • /
    • 1992
  • Extending discrete event modelling formalisms to facilitate greater symbol manipulation capabilities is important to further their use in intelligent control and design of high autonomy systems. This paper defines an extension to the DEVS formalism that facilitates symbolic expression of discrete event times by extending the time base from the real numbers to the field of linear polynomials over the reals. A simulation algorithm is developed to generate the branching trajectories resulting from the underlying non-determinism. To efficiently manage linear polynomial constraints based on feasibility checking algorithm borrowed from linear programming. The extended formalism offers a convenient means to conduct multiple, simultaneous explorations of model behaviors. Examples of application are given with consideration on fault model analysis.

  • PDF

물류시스템에서 운송비를 줄이기 위한 차량 할당 및 경로 설정 알고리즘 개발 및 성능평가 (Development and Performance Evaluation of a Car Assignment and Routing Algorithm for Reducing Transportation Cost in a Logistics System)

  • 조병헌
    • 한국시뮬레이션학회논문지
    • /
    • 제8권3호
    • /
    • pp.91-103
    • /
    • 1999
  • This paper proposes an algorithm which reduces transportation cost while goods are delivered in time in a logistics system. The logistics system assumed in this paper is the system in which multiple cars moves various goods from spatially distributed warehouses to stores. For reducing transportation cost, the car assignment algorithm which allocates goods to minimal cars employs the BF method; routing of each car is modelled as the TSP and is solved by using the genetic algorithm. For evaluating the proposed algorithm, the logistics system is modelled and simulated by using the DEVS formalism. The DEVS formalism specifies discrete event systems in a hierarchical, modular manner. During simulation, each car is modelled as a message and traverses warehouse and stores. When a car arrives at a warehouse or a store, predetermined amount of goods are loaded or unloaded. The arrival time and departure time of cars are analyzed and eventually whether goods are delivered in the desired time bound is verified.

  • PDF

Security Analysis of Cryptographic Protocols Based on Trusted Freshness

  • Chen, Kefei;Dong, Ling;Lai, Xuejia
    • 정보보호학회논문지
    • /
    • 제18권6B호
    • /
    • pp.219-232
    • /
    • 2008
  • A novel idea of protocol security analysis is presented based on trusted freshness. The idea has been implemented not only by hand but also by a belief muitisets formalism for automation. The key of the security analysis based on trusted freshness is a freshness principle: for each participant of a cryptographic protocol, the security of the protocol depends only on the sent or received one-way transformation of a message, which includes a trusted freshness. The manual security analysis method and the belief multisets formalism are all established on the basis of the freshness principle. Security analysis based on trusted freshness can efficiently distinguish whether a message is fresh or not, and the analysis results suggest the correctness of a protocol convincingly or the way to construct attacks intuitively from the absence of security properties. Furthermore, the security analysis based on trusted freshness is independent of the idealization of a protocol, the concrete formalization of attackers' possible behaviors, and the formalization of concurrent runs of protocols.

Simulation of a Mobile IoT System Using the DEVS Formalism

  • Im, Jung Hyun;Oh, Ha-Ryoung;Seong, Yeong Rak
    • Journal of Information Processing Systems
    • /
    • 제17권1호
    • /
    • pp.28-36
    • /
    • 2021
  • This paper proposes two novel methods to model and simulate a mobile Internet of Things (IoT) system using the discrete event system specification (DEVS) formalism. In traditional simulation methods, it is advantageous to partition the simulation area hierarchically to reduce simulation time; however, in this case, the structure of the model may change as the IoT nodes to be modeled move. The proposed methods reduce the simulation time while maintaining the model structure, even when the IoT nodes move. To evaluate the performance of the proposed methods, a prototype mobile IoT system was modeled and simulated. The simulation results show that the proposed methods achieve good performance, even if the number of IoT nodes or the movement of IoT nodes increases.

GENERATION OF GRAVITATIONAL WAVE IN THE SOURCE THEORY

  • Kim, Yong-Duk
    • 천문학회지
    • /
    • 제12권1호
    • /
    • pp.7-9
    • /
    • 1979
  • The rate of gravitational quadrupole radiation is derived in the formalism of source theory. It is also shown that gravitational superradiance is theoretically possible.

  • PDF