Design the Network Attack and Defense Training Simulation System Based on HLA

2013 ◽  
Vol 816-817 ◽  
pp. 638-643
Author(s):  
Yu Song ◽  
Hai Jun Zhou ◽  
Guo Lei Ren

We propose an integrated design method to Network attack and defense Simulation training system. Firstly, taking the actual network attack and defense subjects as materials, establishes the system-related military scenario and models several use cases from the perspective of system resources and user needs. Then, using these use cases plans every system components (federate members) in terms of the distributed framework of HLA. More importantly, the workflow of a typical use case according to the publish/subscribe relationship among federate members is described. Associated with this use case, the structure (and behavior) model, internal/external class and program points of the system are modeled, defined and designed respectively. Finally, the expansibility of the system is described in detail. This method can accurately grasp the properties, functions, behaviors and other characteristics of system members (objects) and improve the rationality and consistency of the simulation system modeling.

2021 ◽  
Vol 2083 (3) ◽  
pp. 032057
Author(s):  
Shicong Lin ◽  
Xin Tang ◽  
Wanlin Lu ◽  
Zehui Liu

Abstract UAV-borne missile is effective weapon to attack enemy ground targets. It is expensive, costly and difficult to live-fire drill. Using virtual training instead of actual training can greatly improve the training efficiency and the combat effectiveness. The article regards the operation training of a certain type of UAV-borne missile shooting training as the research object, based on the development of a visual simulation system for UAV-borne missile, uses the object-oriented design method to design a virtual training system based on LabVIEW. The system can realize the shooting operation training of trainees in a virtual environment, and achieve the goals of reduce training costs; improve training efficiency and shorten training period.


2012 ◽  
Vol 3 ◽  
pp. 335-340
Author(s):  
Wang Fangnian ◽  
Peng Gang ◽  
Che Wanfang ◽  
Niu Cong ◽  
Bai Yun ◽  
...  

Author(s):  
Caike Zhang ◽  
Ye Teng ◽  
Shaojie Ding ◽  
Yinggang Jing ◽  
Minmin Cheng ◽  
...  

In this paper, taking a renovation project as an example, a training system combined of “Simulation” and “Stimulate Simulation” pattern is described. The renovated system is originally composed of a HOLLIAS MACS V6 control cabinet and several HMI workstations. The simple configuration without process equipment signals can not achieve the dynamic operation of the interface, which greatly limits the scope of the training applications. In this renovation project the RINSIM simulation platform is used to develop the process system modeling software and DCS Level 1 modeling software, which is called as the “Simulation” method. Meanwhile, a simulation DCS Level 2 is developed through the DCS HMI simulating configuration software. These two portions form a complete Simulation system. In addition, through the OPC and TCP protocol, the simulation process system modeling software and DCS Level 1 control modeling software can communicate with DCS control cabinet, which forms a Stimulating Simulation system. The two systems which can be switched to one another has a high value in use both for configuration training of I&C and maintenance staff, and also for the system process operation training of operators. This paper gives a basic description of simulation system. It also analyzes the simulation system for multiple operating modes and a variety of DCS simulating solutions, focusing on several key technical difficulties in the simulation system.


Electronics ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 592
Author(s):  
Radek Silhavy ◽  
Petr Silhavy ◽  
Zdenka Prokopova

Software size estimation represents a complex task, which is based on data analysis or on an algorithmic estimation approach. Software size estimation is a nontrivial task, which is important for software project planning and management. In this paper, a new method called Actors and Use Cases Size Estimation is proposed. The new method is based on the number of actors and use cases only. The method is based on stepwise regression and led to a very significant reduction in errors when estimating the size of software systems compared to Use Case Points-based methods. The proposed method is independent of Use Case Points, which allows the elimination of the effect of the inaccurate determination of Use Case Points components, because such components are not used in the proposed method.


Author(s):  
Wang Yang ◽  
Liu Dong ◽  
Wang Dong ◽  
Xu Chun

Aiming at the problem that the current generation method of power network security defense strategy ignores the dependency relationship between nodes, resulting in closed-loop attack graph, which makes the defense strategy not generate attack path, resulting in poor defense effect and long generation response time of power network security defense strategy, a generation method of power network security defense strategy based on Markov decision process is proposed. Based on the generation of network attack and defense diagram, the paper describes the state change of attack network by using Markov decision-making process correlation principle, introduces discount factor, calculates the income value of attack and defense game process, constructs the evolutionary game model of attack and defense, solves the objective function according to the dynamic programming theory, obtains the optimal strategy set and outputs the final results, and generates the power network security defense strategy. The experimental results show that the proposed method has good defense effect and can effectively shorten the generation response time of power network security defense strategy.


2014 ◽  
Vol 23 (01) ◽  
pp. 27-35 ◽  
Author(s):  
S. de Lusignan ◽  
S-T. Liaw ◽  
C. Kuziemsky ◽  
F. Mold ◽  
P. Krause ◽  
...  

Summary Background: Generally benefits and risks of vaccines can be determined from studies carried out as part of regulatory compliance, followed by surveillance of routine data; however there are some rarer and more long term events that require new methods. Big data generated by increasingly affordable personalised computing, and from pervasive computing devices is rapidly growing and low cost, high volume, cloud computing makes the processing of these data inexpensive. Objective: To describe how big data and related analytical methods might be applied to assess the benefits and risks of vaccines. Method: We reviewed the literature on the use of big data to improve health, applied to generic vaccine use cases, that illustrate benefits and risks of vaccination. We defined a use case as the interaction between a user and an information system to achieve a goal. We used flu vaccination and pre-school childhood immunisation as exemplars. Results: We reviewed three big data use cases relevant to assessing vaccine benefits and risks: (i) Big data processing using crowd-sourcing, distributed big data processing, and predictive analytics, (ii) Data integration from heterogeneous big data sources, e.g. the increasing range of devices in the “internet of things”, and (iii) Real-time monitoring for the direct monitoring of epidemics as well as vaccine effects via social media and other data sources. Conclusions: Big data raises new ethical dilemmas, though its analysis methods can bring complementary real-time capabilities for monitoring epidemics and assessing vaccine benefit-risk balance.


1998 ◽  
Vol 41 (3) ◽  
pp. 476-484 ◽  
Author(s):  
Shinji NISHIWAKI ◽  
MIN Seungjae ◽  
Susumu EJIMA ◽  
Noboru KIKUCHI

Sign in / Sign up

Export Citation Format

Share Document