• Title/Summary/Keyword: Modeling Approach

검색결과 3,482건 처리시간 0.043초

취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링 (Cyber Attack and Defense Modeling Using Vulnerability Metrics)

  • 이장세;지승도
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 2003년도 춘계학술대회논문집
    • /
    • pp.191-198
    • /
    • 2003
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (ⅰ) it is able to analyze behaviors of system emerged by interaction with functional elements of components composing network and each other, (ⅱ) it is able to analyze vulnerability in quantitative manner, and (ⅲ) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

자동화 생산시스템의 통합 객체지향 Modular 설계 접근 (Integrated Object-oriented Modular Design of AMS)

  • 김만균;함효준
    • 산업경영시스템학회지
    • /
    • 제20권43호
    • /
    • pp.163-174
    • /
    • 1997
  • Development of control model and system for AMS (Automated Manufacturing Systems) has long been interested by researchers. Presented in the paper is a systematic approach to constructing a Petri-nets(PNs) model of AMS and method for design a graphical model of a AMS by using a new modeling tool which is called PNs. So, the procedure of modeling in the AMS is the same as current practice of AMS design and is based on the IOM (Integrated Object-oriented Modeling) paradigm. An AMS, which consists of various machine groups, can produce machine parts in different physical dimensions and lot size. To model such a system, the method which utilizes Sub-PNs are proposed. This enables the models according to part routings. The machine group which causes bottleneck is obtained and modified to relieve the problem. By iterating these steps which consist of modelling, simulation, and performance evaluation, an AMS can e obtained which satisfies the required manufacturing conditions. Finally, the implementation issues of PN modeling are addressed. The approach is the IOM from PN modeling by Sub-PNs and the other is a development of IOM tool for the performance evaluation of AMS.

  • PDF

컴퓨터에 의해 수행되어지는 시뮬레이션 모델링을 위한 지식베이스 접근방법 (Knowledge-Based Approach for Computer-Aided Simulation Modeling)

  • 이영해;김남영
    • 산업공학
    • /
    • 제2권2호
    • /
    • pp.51-62
    • /
    • 1989
  • A computer-aided simulation modeling system has been developed to allow the automatic construction of complete discrete simulation models for queueing systems. Three types of knowledge are used in the specification and construction of a simulation modeling: Knowledge of queueing system, simulation modeling, and a target simulation language. This knowledge has been incorporated into the underlying rule base in the form of extraction and construction rule, and implemented via the expert system building tool, OPS5. This paper suggested a knowledge based approach for automatic programming to enable a user who lacks modeling knowledge and simulation language expertize to quickly build executable models.

  • PDF

Developing A Document-based Work-flow Modeling Support System A Case-based Reasoning Approach

  • Kim, Jaeho;Woojong Suh;Lee, Heeseok
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2001년도 춘계정기학술대회
    • /
    • pp.445-454
    • /
    • 2001
  • A workflow model is useful fur business process analysis and has often been implemented for office automation through information technology. Accordingly, the results of workflow modeling need to be systematically managed as information assets. In order to manage the modeling process effectively, it is necessary to enhance the efficiency of their reuse. Therefore, this paper creates a Document-barred Workflow Modeling Support System (DWMSS) using a case-based reasoning (CBR) approach. It proposes a system architecture, and the corresponding modeling process is developed. Furthermore, a repository, which consists of a case base and vocabulary base, is built. A carte study is illustrated to demonstrate the usefulness of th is system.

  • PDF

Wavelet operator for multiscale modeling of a nuclear reactor

  • Vajpayee, Vineet;Mukhopadhyay, Siddhartha;Tiwari, Akhilanand Pati
    • Nuclear Engineering and Technology
    • /
    • 제50권5호
    • /
    • pp.698-708
    • /
    • 2018
  • This article introduces a methodology of designing a wavelet operator suitable for multiscale modeling. The operator matrix transforms states of a multivariable system onto projection space. In addition, it imposes a specific structure on the system matrix in a multiscale environment. To be specific, the article deals with a diagonalizing transform that is useful for decoupled control of a system. It establishes that there exists a definite relationship between the model in the measurement space and that in the projection space. Methodology for deriving the multirate perfect reconstruction filter bank, associated with the wavelet operator, is presented. The efficacy of the proposed technique is demonstrated by modeling the point kinetics nuclear reactor. The outcome of the multiscale modeling approach is compared with that in the single-scale approach to bring out the advantage of the proposed method.

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm

  • Houari, Nawal Sad;Taghezout, Noria
    • Journal of Information Processing Systems
    • /
    • 제12권4호
    • /
    • pp.688-710
    • /
    • 2016
  • Our approach permits to capitalize the expert's knowledge as business rules by using an agent-based platform. The objective of our approach is to allow experts to manage the daily evolutions of business domains without having to use a technician, and to allow them to be implied, and to participate in the development of the application to accomplish the daily tasks of their work. Therefore, the manipulation of an expert's knowledge generates the need for information security and other associated technologies. The notion of cryptography has emerged as a basic concept in business rules modeling. The purpose of this paper is to present a cryptographic algorithm based approach to integrate the security aspect in business rules modeling. We propose integrating an agent-based approach in the framework. This solution utilizes a security agent with domain ontology. This agent applies an encryption/decryption algorithm to allow for the confidentiality, authenticity, and integrity of the most important rules. To increase the security of these rules, we used hybrid cryptography in order to take advantage of symmetric and asymmetric algorithms. We performed some experiments to find the best encryption algorithm, which provides improvement in terms of response time, space memory, and security.

Applying Topic Modeling and Similarity for Predicting Bug Severity in Cross Projects

  • Yang, Geunseok;Min, Kyeongsic;Lee, Jung-Won;Lee, Byungjeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1583-1598
    • /
    • 2019
  • Recently, software has increased in complexity and been applied in various industrial fields. As a result, the presence of software bugs cannot be avoided. Various bug severity prediction methodologies have been proposed, but their performance needs to be further improved. In this study, we propose a novel technique for bug severity prediction in cross projects such as Eclipse, Mozilla, WireShark, and Xamarin by using topic modeling and similarity (i.e., KL-divergence). First, we construct topic models from bug repositories in cross projects using Latent Dirichlet Allocation (LDA). Then, we find topics in each project that contain the most numerous similar bug reports by using a new bug report. Next, we extract the bug reports belonging to the selected topics and input them to a Naïve Bayes Multinomial (NBM) algorithm. Finally, we predict the bug severity in the new bug report. In order to evaluate the performance of our approach and to verify the difference between cross projects and single project, we compare it with the Naïve Bayes Multinomial approach; the Lamkanfi methodology, which is a well-known bug severity prediction approach; and an emotional similarity-based bug severity prediction approach. Our approach exhibits a better performance than the compared methods.

Extreme value modeling of structural load effects with non-identical distribution using clustering

  • Zhou, Junyong;Ruan, Xin;Shi, Xuefei;Pan, Chudong
    • Structural Engineering and Mechanics
    • /
    • 제74권1호
    • /
    • pp.55-67
    • /
    • 2020
  • The common practice to predict the characteristic structural load effects (LEs) in long reference periods is to employ the extreme value theory (EVT) for building limit distributions. However, most applications ignore that LEs are driven by multiple loading events and thus do not have the identical distribution, a prerequisite for EVT. In this study, we propose the composite extreme value modeling approach using clustering to (a) cluster initial blended samples into finite identical distributed subsamples using the finite mixture model, expectation-maximization algorithm, and the Akaike information criterion; (b) combine limit distributions of subsamples into a composite prediction equation using the generalized Pareto distribution based on a joint threshold. The proposed approach was validated both through numerical examples with known solutions and engineering applications of bridge traffic LEs on a long-span bridge. The results indicate that a joint threshold largely benefits the composite extreme value modeling, many appropriate tail approaching models can be used, and the equation form is simply the sum of the weighted models. In numerical examples, the proposed approach using clustering generated accurate extrema prediction of any reference period compared with the known solutions, whereas the common practice of employing EVT without clustering on the mixture data showed large deviations. Real-world bridge traffic LEs are driven by multi-events and present multipeak distributions, and the proposed approach is more capable of capturing the tendency of tailed LEs than the conventional approach. The proposed approach is expected to have wide applications to general problems such as samples that are driven by multiple events and that do not have the identical distribution.

A New Concept of Manipulator Modeling

  • Roh, Ho-Sik;Kim, Jin-Oh
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2546-2550
    • /
    • 2003
  • We propose a new method of robot manipulator modeling. Different from existing modelers, our modeler provides a convenient robot modeling configured from modules from module library or module modeling. In addition, a way of using D-H parameters to configure a robot is proposed. These additional functions of robot modeling can be a powerful and flexible tool for various needs of robot modeling. We show an example of modeling with our approach.

  • PDF

하이브리드 연소의 수치 모델링 전략에 관한 연구 (Study on the Strategy of Numerical Modeling for Hybrid Combustion)

  • 윤창진;김진곤;문희장
    • 항공우주시스템공학회지
    • /
    • 제1권2호
    • /
    • pp.37-42
    • /
    • 2007
  • This paper proposes a numerical modeling approach to simulate the hybrid combustion phenomena. From the physical understandings of hybrid combustion, the computational domain was separated into three regions: the solid fuel, gas phase reactive flow, and the interface between solid and fluid. Moreover, for the accurate calculation, computational grids for these regions was generated at every time step considering the instantaneous moving interface which are governed by the balance equations using thermal pyrolysis. In the domain of reactive flow, by virtue of diffusion flame structure, turbulent combustion modeling was introduced using either mixture fraction approach or mean reaction rate approach.

  • PDF