• Title/Summary/Keyword: Event graph modeling

Search Result 17, Processing Time 0.021 seconds

Method and Implementation (or Consistency Verification of DEVS Model against User Requirement (DEVS 모델과 사용자 요구사항의 일관성 검증 방법론 및 환경 구현)

  • Kim Do-Hyung;Kim Tag-Gon
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.100-105
    • /
    • 2005
  • Development of complex discrete event simulators requires cooperation between domain experts and modeling experts who involve the development. With the cooperation the domain experts derive user requirement and modeling experts transform the requirement to a simulation model. This paper proposes a method for consistency verification of simulation model in DEVS formalism against the user requirement in UML diagrams. It also presents an automated tool, called VeriDEVS, which implements the proposed method. Inputs of VeriDEVS are three UML diagrams, namely use case, class and sequence diagrams, and DEVS Graph, all in Visio; outputs of a verification result is represented in PowerPoint files.

  • PDF

The DEVS-based Detailed Implementation Method of the Command and Fire Control System for the Underwater Vehicle DEVS-HLA Simulation in the Engagement Level (교전급 수중운동체 DEVS-HLA 시뮬레이션을 위한 전술통제체계의 DEVS 기반 상세 구현 방법)

  • Son, Myeong-Jo;Cha, Ju-Hwan;Kim, Tae-Wan;Lee, Kyu-Yeul;Nah, Young-In
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.4
    • /
    • pp.628-645
    • /
    • 2010
  • To perform the engagement level simulation between the underwater vehicle model and the surface model those are constituted with various systems/ sub-systems, we implemented four different federates as a federation according to the IEEE 1516 HLA (High Level Architecture) protocol that is the international standard in the distributed simulation. Those are CFCS (Command and Fire Control System) federate, motion federate, external entities (torpedos, countermeasure and surfaceship) federate, and visualization federate that interacts with OSG (Open Scene Graph)-based visualization rendering module. In this paper, we present the detailed method about the model constitution for discrete event simulation in the distributed environment. For the sake of this purpose, we introduce the DEVS (Discrete Event System Specification)-HLA-based modeling method of the CFCS federate that reflects not only the interations between models, but also commands from user and tactics manager that is separated from the model. The CFCS federate makes decisions in various missions such as the normal diving, the barrier misision, the target motion analysis, the torpedo launch, and the torpedo evasion. In the perspective of DEVS modeling, the CFCS federate is the coupled model that has the tactical data process model, command model and fire control model as an atomic model. The message passing and time synchronization with other three federates are settled by the $m\ddot{a}k$ RTI (Runtime Infrastructure) that supports IEEE 1516. In this paper, we provides the detailed modeling method of the complicated model that has hierarchical relationship such as the CFCS system in the submarine and that satisfies both of DEVS modeling method for the discrete event simulation and HLA modeling method for the distributed simulation.

Research for Modeling Method of DES Using Petri Nets (패트리 넷을 이용한 DES 모델링에 관한 연구)

  • Kim, Sam-Taek;Lee, Eun-Joo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.101-106
    • /
    • 2011
  • In this paper, our goal is to design the controller which operates a manufacturing system, discrete event system, guaranteeing user specification. In specially, based on supervisory control theory W. M. Wonham, our work consists in performing the controller using Petri nets possible parallelism. In addition, we consider the problem of allocation for resources sharing of the issues to consider when designing using Petri net. The controller can be generated by synthesis of user specification model and plant model after giving the management for the resource sharing. This created controller can control the deadlock and starvation which can occur in the case with resource sharing. Previous studies proposed the Constrained Synchronous Reachability graph to synthesis of the two Petri nets models. Therefore, we provide the controlled system which forbids a deadlock and starvation using the result of previous studies.

A Study on the Implement of AI-based Integrated Smart Fire Safety (ISFS) System in Public Facility

  • Myung Sik Lee;Pill Sun Seo
    • International Journal of High-Rise Buildings
    • /
    • v.12 no.3
    • /
    • pp.225-234
    • /
    • 2023
  • Even at this point in the era of digital transformation, we are still facing many problems in the safety sector that cannot prevent the occurrence or spread of human casualties. When you are in an unexpected emergency, it is often difficult to respond only with human physical ability. Human casualties continue to occur at construction sites, manufacturing plants, and multi-use facilities used by many people in everyday life. If you encounter a situation where normal judgment is impossible in the event of an emergency at a life site where there are still many safety blind spots, it is difficult to cope with the existing manual guidance method. New variable guidance technology, which combines artificial intelligence and digital twin, can make it possible to prevent casualties by processing large amounts of data needed to derive appropriate countermeasures in real time beyond identifying what safety accidents occurred in unexpected crisis situations. When a simple control method that divides and monitors several CCTVs is digitally converted and combined with artificial intelligence and 3D digital twin control technology, intelligence augmentation (IA) effect can be achieved that strengthens the safety decision-making ability required in real time. With the enforcement of the Serious Disaster Enterprise Punishment Act, the importance of distributing a smart location guidance system that urgently solves the decision-making delay that occurs in safety accidents at various industrial sites and strengthens the real-time decision-making ability of field workers and managers is highlighted. The smart location guidance system that combines artificial intelligence and digital twin consists of AIoT HW equipment, wireless communication NW equipment, and intelligent SW platform. The intelligent SW platform consists of Builder that supports digital twin modeling, Watch that meets real-time control based on synchronization between real objects and digital twin models, and Simulator that supports the development and verification of various safety management scenarios using intelligent agents. The smart location guidance system provides on-site monitoring using IoT equipment, CCTV-linked intelligent image analysis, intelligent operating procedures that support workflow modeling to immediately reflect the needs of the site, situational location guidance, and digital twin virtual fencing access control technology. This paper examines the limitations of traditional fixed passive guidance methods, analyzes global technology development trends to overcome them, identifies the digital transformation properties required to switch to intelligent variable smart location guidance methods, explains the characteristics and components of AI-based public facility smart fire safety integrated system (ISFS).

A study on Wikidata linkage methods for utilization of digital archive records of the National Debt Redemption Movement (국채보상운동 디지털 아카이브 기록물의 활용을 위한 위키데이터 연계 방안에 대한 연구)

  • Seulki Do;Heejin Park
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.2
    • /
    • pp.95-115
    • /
    • 2023
  • This study designed a data model linked to Wikidata and examined its applicability to increase the utilization of the digital archive records of the National Debt Redemption Movement, registered as World Memory Heritage, and implications were derived by analyzing the existing metadata, thesaurus, and semantic network graph. Through analysis of the original text of the National Debt Redemption Movement records, key data model classes for linking with Wikidata, such as record item, agent, time, place, and event, were derived. In addition, by identifying core properties for linking between classes and applying the designed data model to actual records, the possibility of acquiring abundant related information was confirmed through movement between classes centered on properties. Thus, this study's result showed that Wikidata's strengths could be utilized to increase data usage in local archives where the scale and management of data are relatively small. Therefore, it can be considered for application in a small-scale archive similar to the National Debt Redemption Movement digital archive.

Stochastic Self-similarity Analysis and Visualization of Earthquakes on the Korean Peninsula (한반도에서 발생한 지진의 통계적 자기 유사성 분석 및 시각화)

  • JaeMin Hwang;Jiyoung Lim;Hae-Duck J. Jeong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.11
    • /
    • pp.493-504
    • /
    • 2023
  • The Republic of Korea is located far from the boundary of the earthquake plate, and the intra-plate earthquake occurring in these areas is generally small in size and less frequent than the interplate earthquake. Nevertheless, as a result of investigating and analyzing earthquakes that occurred on the Korean Peninsula between the past two years and 1904 and earthquakes that occurred after observing recent earthquakes on the Korean Peninsula, it was found that of a magnitude of 9. In this paper, the Korean Peninsula Historical Earthquake Record (2 years to 1904) published by the National Meteorological Research Institute is used to analyze the relationship between earthquakes on the Korean Peninsula and statistical self-similarity. In addition, the problem solved through this paper was the first to investigate the relationship between earthquake data occurring on the Korean Peninsula and statistical self-similarity. As a result of measuring the degree of self-similarity of earthquakes on the Korean Peninsula using three quantitative estimation methods, the self-similarity parameter H value (0.5 < H < 1) was found to be above 0.8 on average, indicating a high degree of self-similarity. And through graph visualization, it can be easily figured out in which region earthquakes occur most often, and it is expected that it can be used in the development of a prediction system that can predict damage in the event of an earthquake in the future and minimize damage to property and people, as well as in earthquake data analysis and modeling research. Based on the findings of this study, the self-similar process is expected to help understand the patterns and statistical characteristics of seismic activities, group and classify similar seismic events, and be used for prediction of seismic activities, seismic risk assessments, and seismic engineering.

A study on detective story authors' style differentiation and style structure based on Text Mining (텍스트 마이닝 기법을 활용한 고전 추리 소설 작가 간 문체적 차이와 문체 구조에 대한 연구)

  • Moon, Seok Hyung;Kang, Juyoung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.89-115
    • /
    • 2019
  • This study was conducted to present the stylistic differences between Arthur Conan Doyle and Agatha Christie, famous as writers of classical mystery novels, through data analysis, and further to present the analytical methodology of the study of style based on text mining. The reason why we chose mystery novels for our research is because the unique devices that exist in classical mystery novels have strong stylistic characteristics, and furthermore, by choosing Arthur Conan Doyle and Agatha Christie, who are also famous to the general reader, as subjects of analysis, so that people who are unfamiliar with the research can be familiar with them. The primary objective of this study is to identify how the differences exist within the text and to interpret the effects of these differences on the reader. Accordingly, in addition to events and characters, which are key elements of mystery novels, the writer's grammatical style of writing was defined in style and attempted to analyze it. Two series and four books were selected by each writer, and the text was divided into sentences to secure data. After measuring and granting the emotional score according to each sentence, the emotions of the page progress were visualized as a graph, and the trend of the event progress in the novel was identified under eight themes by applying Topic modeling according to the page. By organizing co-occurrence matrices and performing network analysis, we were able to visually see changes in relationships between people as events progressed. In addition, the entire sentence was divided into a grammatical system based on a total of six types of writing style to identify differences between writers and between works. This enabled us to identify not only the general grammatical writing style of the author, but also the inherent stylistic characteristics in their unconsciousness, and to interpret the effects of these characteristics on the reader. This series of research processes can help to understand the context of the entire text based on a defined understanding of the style, and furthermore, by integrating previously individually conducted stylistic studies. This prior understanding can also contribute to discovering and clarifying the existence of text in unstructured data, including online text. This could help enable more accurate recognition of emotions and delivery of commands on an interactive artificial intelligence platform that currently converts voice into natural language. In the face of increasing attempts to analyze online texts, including New Media, in many ways and discover social phenomena and managerial values, it is expected to contribute to more meaningful online text analysis and semantic interpretation through the links to these studies. However, the fact that the analysis data used in this study are two or four books by author can be considered as a limitation in that the data analysis was not attempted in sufficient quantities. The application of the writing characteristics applied to the Korean text even though it was an English text also could be limitation. The more diverse stylistic characteristics were limited to six, and the less likely interpretation was also considered as a limitation. In addition, it is also regrettable that the research was conducted by analyzing classical mystery novels rather than text that is commonly used today, and that various classical mystery novel writers were not compared. Subsequent research will attempt to increase the diversity of interpretations by taking into account a wider variety of grammatical systems and stylistic structures and will also be applied to the current frequently used online text analysis to assess the potential for interpretation. It is expected that this will enable the interpretation and definition of the specific structure of the style and that various usability can be considered.