• Title/Summary/Keyword: rule-based DEVS

Search Result 16, Processing Time 0.028 seconds

An Error Control for Media Multi-channel running on Machine to Machine Environment (사물 지능 통신 환경에서 미디어 다중 채널을 위한 오류 제어)

  • Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.74-77
    • /
    • 2014
  • This paper suggested an error control for multi-channel running on machine to machine environment. This system is suitable for recovering software fault for multimedia CSCW(Computer Supported Cooperative Works) based on machine to machine environment. It is necessary for the system to be protected by reactivity of media service instance instead of breaking process of session. This paper explains a performance analysis of an error recovery system of M2M based computing collaboration environment using rule-based DEVS modeling and simulation techniques.

Performance Analysis of Fault Tolerance System on Distributed Multimedia Environment (분산 멀티미디어 환경에서 실행되는 결함 허용 시스템의 성능 분석)

  • Ko Eung-Nam
    • Journal of Digital Contents Society
    • /
    • v.3 no.2
    • /
    • pp.255-264
    • /
    • 2002
  • Multimedia is now applied to various real worlds. In particular, the focus of CSCW(Computer Supported Cooperated Work) for multimedia education system has increased. DOORAE is a framework for supporting development of applications running on distributed multimedia environment and multimedia distance education system. EDA is a system is able to detect automatically a software error based on distributed multimedia. It has been designed and implemented for construction and experiment of effective DOORAE environment. It detects an error by polling periodically the process with relation to session. Conventional method detects an error by polling periodically all the process. This papaer explains a performance analysis of an error detection system running on distributed multimedia environment using the rule-based SES and DEVS modeling and simulation techniques. In DEVS, a system has a time base, inputs, states, outputs, and functions.

  • PDF

Modeling and simulation of CNP-applied network security models with application of fuzzy rule-based system (퍼지를 적용한 계약망 프로토콜 기반의 네트워크 보안 모델의 설계 및 시뮬레이션)

  • Lee Jin-ah;Cho Tae-ho
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.1
    • /
    • pp.9-18
    • /
    • 2005
  • Attempts to attack hosts in the network have become diverse, due to crackers developments of new creative attacking methods. Under these circumstances the role of intrusion detection system as a security system component gets considerably importance. Therefore, in this paper, we have suggested multiple intrusion detection system based on the contract net protocol which provides the communication among multiple agents. In this architecture, fuzzy rule based system has been applied for agent selection among agents competing for being activated. The simulation models are designed and implemented based on DEVS formalism which is theoretically well grounded means of expressing discrete event simulation models.

  • PDF

Attacker and Host Modeling for Cyber-Attack Simulation (사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링)

  • 정정례;이장세;박종서;지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.2
    • /
    • pp.63-73
    • /
    • 2003
  • The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

  • PDF

A Design of Intelligent Patient Monitoring System using Model Base (모델 베이스를 이용한 지능적 환자 감시 시스템의 설계)

  • Kim, Jung-Ook;Lee, Seok-Pil;Chi, Sung-Do;Park, Sang-Hui
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1995 no.05
    • /
    • pp.155-159
    • /
    • 1995
  • A design method that can easily construct intelligent patient monitoring systems is proposed. To achieve the design method, the SES/MB concept and a discrete event-based logic control formalism based on a set theory is introduced. In this control paradigm the controller expects to receive confirming sensor responses to its control commands within definite time windows determined by DEVS model of the system under control. Because data to be used for rule-based symbolic reasoning are to be abstracted, several AI methods are applied the processes. These methods are applied to intelligent patient monitoring systems so that they facilitate transformation from low level raw data to high level linguistic data. Model-based system representations have advantages of reusability, extensibility, flexsibility, independent testability and encapsulation.

  • PDF

Automated Methodology for Campus Network Design and Performance Analysis (캠퍼스 네트워크의 구성 및 성능분석 자동화 방법론)

  • 지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.7 no.2
    • /
    • pp.1-16
    • /
    • 1998
  • This paper presents an automated methodology for campus network design and performance analysis using the rule-based SES and DEVS modeling & simulation techniques. Proposed methodology for structural design and performance analysis can be utilized not only in the early stage of network design for selecting configurable candidate from all possible design alternatives, but also in simulation verification for generating performance data. Our approach supercedes conventional methodologies in that, first, it can support the configuration automation by utilizing the knowledge of design expert ; second, it can provide the simulation-based performance evaluation ; third, it is established on the basis of the well-formalized framework so that it can support a hierarchical and modular system design. Several simulation tests performed on a campus network example will illustrate our technique.

  • PDF