• Title/Summary/Keyword: DEVS(Discrete Event System Specification) Formalism

Search Result 64, Processing Time 0.027 seconds

Vessel and Navigation Modeling and Simulation based on DEVS Formalism : Design for Navigation Simulation Architecture with Modeling for Critical Systems and Agents of Vessel (DEVS 형식론 기반의 선박 항해 모델링 및 시뮬레이션 (I) : 항해 시뮬레이션 아키텍처 설계와 선박 핵심 장비 및 에이전트 모델링)

  • Woo, Sang-Min;Lee, Jang-Se;Hwang, Hun-Gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1038-1048
    • /
    • 2019
  • Recently, various systems have been developed to support ship navigation safety. In order to verify the usefulness of such a system, it is most ideal to try it on a real vessel, but there are many difficulties. As an alternative, usability verification methods applied with modelling and simulation (M&S) techniques are required such as FMSS, which is closest to reality, is very expansive to construct, and there needs the specialized operator. For this reason, this paper proposes a method to verify the navigation safety support system by modeling and simulation techniques based on the Discrete Event System Specification (DEVS) formalism. As a first step, we designed the navigation simulation architecture based on the SES/MB framework, and details on modelling ship core equipment and navigator agents based on the DEVS. Through this, we are able to implement the navigation simulation system for vessels, and evaluate the effectiveness of navigation safety support elements such as collision avoidance, etc. using developed scenarios.

Simulation Reconfiguration using Entity Plug-in approach for Weapon System Effectiveness Analysis (무기체계 효과도 분석을 위한 개체 플러그인 방식의 모의 재구성 연구)

  • Kim, Taeyoung
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.49-59
    • /
    • 2018
  • The simulation-based weapon system effectiveness analysis is to support the decision making in the acquisition process of the defense domain. The effectiveness of the weapon system is a complexly influenced indicator from various factors such as environment, doctrine and so on. And the measurement of effectiveness can be defined differently in compliance with major issues in the weapon system. Because of this, the weapon system effectiveness analysis requires the comparative experiment of various alternatives based on the underlying assumption. This paper presents the efficient approach to reconfigure the simulation using the reflection technique. The proposed method contains the recoupling and resetting the simulation entity using DEVS(Discrete EVent System specification) formalism-based dynamic plug-in method. With the proposed method, this paper designs the effectiveness analysis environment that can efficiently handle the various alternatives of the weapon system.

A Methodology for Creating a Simulation Model for a Agent Based and Object-oriented Logistics Support System (군수지원시스템을 위한 에이전트 기반의 객체 지향 시뮬레이션 모델 아키텍처 설계 방법론)

  • Chung, Yong-H.;Hwam, Won-K.;Park, Sang-C.
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.27-34
    • /
    • 2012
  • Proposed in the paper is an agent based and object-oriented methodology to create a virtual logistics support system model. The proposed virtual logistics support system model consists of three types of objects: the logistics force agent model(static model), the military supplies transport manager model(function model), the military supplies state manager model(dynamic model). A logistic force agent model consists of two agent: main function agent and function agent. To improve the reusability and composability of a logistics force agent model, the function agent is designed to adapt to different logistics force agent configuration. A military supplies transport manager is agent that get information about supply route, make decisions based on decision variables, which are maintained by the military supplies state manager, and transport military supplies. A military supplies state manager is requested military supplies from logistics force agent, provide decision variables such as the capacity, order of priority. For the implementation of the proposed virtual logistics force agent model, this paper employs Discrete Event Systems Specification(DEVS) formalism.

The Normal Diving Simulation of the Underwater Vehicle Using the Standard Model Architecture for the Combined Simulation of Discrete Event System and Discrete Time System (이산사건 및 이산시간 혼합 표준모델구조를 활용한 수중운동체 정상잠항 시뮬레이션)

  • Son, Myeong-Jo;Lee, Hyun-Jin;Ham, Seung-Ho;Lee, Hyo-Kwang;Kim, Tae-Wan;Lee, Kyu-Yeul;Han, Soon-Hung;Nah, Young-In
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.45 no.6
    • /
    • pp.656-668
    • /
    • 2008
  • When it comes to design and acquire underwater vehicles such as a submarine and a torpedo according to the process of SBA(Simulation Based Acquisition)/SBD(Simulation Based Design), it is necessary to predict the performance of interest precisely and to perform the test over and over again using the M&S(Modeling and Simulation) of the engineering and the engagement level. In this paper, we research the DEVS(Discrete Event System Specification) and DTSS(Discrete Time System Specification) formalism based standard model architecture for the underwater vehicle which can support both the heterogeneous level of the M&S(Engineering/Engagement) and the different system of the M&S(Discrete Event System and Discrete Time System). To validate this standard modeling architecture, we apply it to the submarine normal diving simulation.

Hierarchical Animation for Simulation (시뮬레이션의 계층적 애니메이션)

  • 이미라;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.4
    • /
    • pp.89-107
    • /
    • 1999
  • There are many issues in computer simulation such as verifying model code, validating models, understanding the dynamics of systems and training the personnel. The developers of simulation tool have been interested in the animation since it can help solve the problems related to the above listed issues. In practice, animation is one of the popular method for displaying the simulation output for solving these problems. Trying to display all the graphic objects representing the dynamics of the models being simulated, however, causes the distraction of focus, which results in solving the above listed problems difficult. The redundant graphic objects also Increase the computer computation overhead. This paper presents a hierarchical animation environment in which the users can have better focus on the dynamics of system components. In hierarchical animation environment the users can observe the dynamics of system by selectively choosing the hierarchical level and components with in a level of the hierarchically structured model. Especially when the model is large and complex the selection of observation level is needed. The design approach of the hierarchical animator is based on the DEVS(Discrete Event system Specification) formalism which is theoretically well grounded means of expressing modular and hierarchical models.

  • PDF

Modeling and Simulation of the Efficient Certificate Status Validation System on Public Key Infrastructure (공개키 기반 구조에서의 효율적인 인증서 상태 검증 방법에 관한 모델링 및 시뮬레이션)

  • 최지혜;조대호
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.7-12
    • /
    • 2004
  • 공개키 기반 구조(PKI; Public Key Infrastructure)에 필수적인 요소인 인증서의 상태 검증에 있어서 인증서 상태 검증 서버인 OCSP (Online Certificate Status Protocol) 서버는 실시간 상태 검증을 제공한다. 그러나, 서버와 클라이언트의 메시지 인증을 위해 전자 서명을 수행해야 하며, 이 때 사용되는 공개 암호 연산 과정의 복잡성은 동시에 많은 클라이언트의 요청이 발생할 경우에 응답 시간을 크게 지연시킨다는 단점을 가지고 있다. 본 논문에서는 이러한 문제를 해결하기 위한 인증서 상태 검증 서버의 시뮬레이션 모델을 DEVS (Discrete Event system Specification) 방법론을 이용하여 설계하였다. 이 모델은 인증서의 상태 검증을 요청하는 영역에 위치하여 해쉬 함수를 적용한 인증을 수행하도록 구성되었으며, 시뮬레이션 결과는 제시한 방법이 인증서 상태 검증 속도를 증대시켜 결과적으로 사용자의 응답 시간이 감소되는 것을 보여준다.

  • PDF

Simulation-based Network Vulnerability Analysis Using the SIMVA (SIMVA를 이용한 시뮬레이션 기반의 네트워크 취약성 분석)

  • You Yong-Jun;Lee Jang-Se;Chi Sung-Do
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.21-29
    • /
    • 2004
  • The major objective of this paper is to analyze network vulnerabilities using the SIMVA (SIMualtion-based Vulnerability Analyzer). SIMVA is capable of monitor network status and analyze vulnerabilities automatically. To do this, we have employed the advanced modeling and simulation concepts such as SES/MB (System Entity Structure / Model Base) framework, DEVS (Discrete Event System Specification) formalism, and experimental frame for developing network security models and simulation-based analysis of vulnerability. SIMVA can analyze static vulnerability as well as dynamic vulnerability consistently and quantitatively. In this paper, we verified and tested the capability of application of SIMVA by slammer worm attack scenario.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

A Synthetic Enviornment Based Engagement Simulation Model (합성환경 기반 교전모의)

  • Park, Sang-Chul;Seong, Kil-Young
    • Korean Journal of Computational Design and Engineering
    • /
    • v.15 no.4
    • /
    • pp.271-278
    • /
    • 2010
  • Weapon systems for future war require operating various war scenarios that are getting complex. Similarly, modeling and simulation technique is getting attention to acquire more effective weapon systems. Several S/W tools exist for simulating small scale engagements which depict a kind of war. However, it is very hard to model combat objects more systematic, and reuse them. To overcome these difficulties, this paper presents a modeling methodology for simulating small scale engagement using the DEVS-formalism. In this paper, we systematically classified and defined combat objects, likewise, explain a framework for a small scale combat simulation.