Distributed System Model Using SysML and Event-B

Author(s):  
Qi Zhang ◽  
Zhiqiu Huang ◽  
Jian Xie
2006 ◽  
Vol 6 (1) ◽  
Author(s):  
Victor Dorofeenko ◽  
Jamsheed Shorish

A distributed system model is studied, where individual agents play repeatedly against each other and change their strategies based upon previous play. It is shown how to model this environment in terms of continuous population densities of agent types. A complication arises because the population densities of different strategies depend upon each other not only through game payoffs, but also through the strategy distributions themselves. In spite of this, it is shown that when an agent imitates the strategy of his previous opponent at a sufficiently high rate, the system of equations which governs the dynamical evolution of agent populations can be reduced to one equation for the total population. In a sense, the dynamics 'collapse' to the dynamics of the entire system taken as a whole, which describes the behavior of all types of agents. We explore the implications of this model, and present both analytical and simulation results.


Author(s):  
Alexander E. Ekimov

Abstract The present paper gives the methods, schemes and results of experiments based on direct and reciprocal methods of measurements. The use of the reciprocity method made it possible to solve the problem of determining the acoustic characteristics of the distributed system model where vibroactive sources are represented in the form of passive models. It has been shown that the normalized transfer coefficient characterizing a link between force and acoustic fields has the same value both for the model and in nature (in case of their full similarity) that can be used: - to improve the methods of designing and technological manufacturing of models based on the comparison of normalized transfer coefficients obtained for full-scale and physical models; - to forecast the acoustic radiation of some vibroactive mechanisms using the assigned force characteristics and normalized transfer coefficients obtained for a model with the modelling scale taken into account.


2013 ◽  
Vol 427-429 ◽  
pp. 2110-2113
Author(s):  
Jian Ping Li

This paper analyzed on real-time database system, and applied the cloud manufacturing technology and distributed system technology to the database system model. Through the analysis on the real time database, we can got the distributed real-time data system types and data storage model, establish two kinds of memory T-mode and S-mode, database storage model and make the production of block. Finally establish the work flow of distributed real-time database system, get relevant application program. A large number of real-time data collection and administration can be realized, which can improve the real-time information data processing efficiency and system model performance. Through the establishment of model and analysis of its working process in the real-time distributed system real time database application path, it can provide guidance for the establishment of distributed real-time database system model.


Author(s):  
Danco Davcev ◽  
Dusan Cakmakov ◽  
Vanco Cabukovski

1980 ◽  
Vol 102 (2) ◽  
pp. 94-100 ◽  
Author(s):  
D. L. Margolis

Bond graphs are used for finite mode representations of distributed system dynamics. As long as all inputs to the system are “efforts” in a causal sense, then no formulation problems exist. However, if some of the system inputs are causal “flows”, then differential causality will exist and extremely tedious, often impossible, algebraic loops must be solved to formulate system equations. A procedure is developed which avoids these algebraic problems by including additional modal compliance in the system model without its associated modal inertia. The result of this approach is a finite mode distributed system model, devoid of artificially induced high frequencies, extremely accurate in a chosen frequency range, and capable of interacting with other distributed system models. The procedure is demonstrated through example.


Key management plays a crucial role in cryptography, as the basis for secure information exchange, data identification and integrity. There are software and hardware key management tools that support Crypto APIs and Cryptography Next Generation APIs(CNG API), Public Key Cryptography Standards (PKCS). These tools store cryptographic keys on hard disks, smart cards, tokens, and in other storage media. To use the cryptographic keys stored on these smart cards and tokens, you need to connect them to the appropriate hardware. The cryptographic keys stored on the hard drives of a computer or a laptop are used by the programs of these devices. If it becomes necessary to use a single key in different systems, then you will have to create copies of the key on all these devices. This complicates the process of key management, raises tasks of securely store keys, keys access control. This paper proposes a distributed system model for key management and a protocol of interaction of the distributed system modules. The proposed model provides the ability to store keys in a smartphone, and access to keys from other devices. The system described in the model consists of 3 modules. The module 1 has computer version and smartphone version, and serves to send a request for signing, signature verification, hashing. The module 2, a smartphone software, provides key pair generation, storing, encrypting and decrypting, archiving keys, export/import keys, keys access control, and destroying keys. The module 3, web service, provides communication of the first and second modules. In addition, the system, which was created based on the current model, provides the ability to use digital signatures in web applications. The Module 1 operates as a local web service that accepts requests from a web page running in a browser. A special script in a web page sends http requests that include cryptographic operations to the specified localhost port and accepts responses.


Sign in / Sign up

Export Citation Format

Share Document