discrete event system
Recently Published Documents


TOTAL DOCUMENTS

290
(FIVE YEARS 14)

H-INDEX

17
(FIVE YEARS 0)

2022 ◽  
Vol 32 (1) ◽  
pp. 1-27
Author(s):  
Damian Vicino ◽  
Gabriel A. Wainer ◽  
Olivier Dalle

Uncertainty Propagation methods are well-established when used in modeling and simulation formalisms like differential equations. Nevertheless, until now there are no methods for Discrete-Dynamic Systems. Uncertainty-Aware Discrete-Event System Specification (UA-DEVS) is a formalism for modeling Discrete-Event Dynamic Systems that include uncertainty quantification in messages, states, and event times. UA-DEVS models provide a theoretical framework to describe the models’ uncertainty and their properties. As UA-DEVS models can include continuous variables and non-computable functions, their simulation could be non-computable. For this reason, we also introduce Interval-Approximated Discrete-Event System Specification (IA-DEVS), a formalism that approximates UA-DEVS models using a set of order and bounding functions to obtain a computable model. The computable model approximation produces a tree of all trajectories that can be traversed from the original model and some erroneous ones introduced by the approximation process. We also introduce abstract simulation algorithms for IA-DEVS, present a case study of UA-DEVS, its IA-DEVS approximation and, its simulation results using the algorithms defined.



2021 ◽  
Vol 53 (4) ◽  
pp. 951-980
Author(s):  
Youssef Rahme ◽  
Pascal Moyal

AbstractMotivated by applications to a wide range of areas, including assemble-to-order systems, operations scheduling, healthcare systems, and the collaborative economy, we study a stochastic matching model on hypergraphs, extending the model of Mairesse and Moyal (J. Appl. Prob.53, 2016) to the case of hypergraphical (rather than graphical) matching structures. We address a discrete-event system under a random input of single items, simply using the system as an interface to be matched in groups of two or more. We primarily study the stability of this model, for various hypergraph geometries.



2021 ◽  
Author(s):  
Abhay Deep Seth ◽  
Santosh Biswas ◽  
Amit Kumar Dhar

Abstract The Internet Engineering Task Force (IETF) has defined routing protocols for Low Power and Lossy Networks (RPL) for constrained devices. RPL constructs DODAGs (Destination Oriented Directed Acyclic Graphs), to optimize routing. RPL ensures acyclic topology with the DODAG version number. However, the control message's DODAG version number is not authenticated. So, RPL is vulnerable to topological inconsistency attack known as DODAG Version Number (DVN) attack. DVN attack creates a packet delay, packet loss, cyclic topology, etc., in the network. This paper proposes a method for detecting DODAG version number attacks. Several existing schemes to defend against the DVN, such as cryptographic techniques, trust-based, threshold-based and mitigation are computationally intensive or require protocol modification. DVN does not change the packet format or sequence of packets, but can still perform attacks and hence fall under the category of stealthy attacks, which are difficult to detect using traditional Intrusion Detection System$'$s (IDS). Discrete-Event System (DES) based IDS have been applied in the literature for stealthy attacks that achieve low overhead, low false alarm rate, etc. However, the construction of DES-based IDS for network protocol may lead to errors, as modelling is manual. The resulting IDS, therefore, is unable to guarantee its correctness. This paper proposes Linear Temporal Logic (LTL) based DES paradigm to detect DVN. LTL-based paradigm facilitates formal verification of the DES-based IDS, and hence the correctness of the scheme is ascertained. The proposed technique is simulated using the Contiki cooja simulator. When the percentage of spiteful nodes in the network increases, the true positive rate, and packet delivery rate drops, while the false positive rate and control message overhead increase. The memory requirement for sending the packets and verifying the nodes is minimal. The LTL-based IDS has been formally verified using NuSMV to ensure the correctness of the framework.



2021 ◽  
Vol 2032 (1) ◽  
pp. 012080
Author(s):  
S P Cherny ◽  
D O Savelyev ◽  
A S Savelyeva ◽  
R I Bazhenov ◽  
I V Povkh


2021 ◽  
Vol 8 (2) ◽  
pp. 205395172110378
Author(s):  
Albert Doja ◽  
Laurent Capocchi ◽  
Jean-François Santucci

The ambition and proposal for data modeling of myths presented in this paper is to link contemporary technical affordances to some canonical projects developed in structural anthropology. To articulate the theoretical promise and innovation of this proposal, we present a discrete-event system specification modeling and simulation approach in order to perform a generative analysis and a dynamic visualization of selected narratives, aimed at validating and revitalizing the transformational and morphodynamic theory and methodology proposed by Claude Lévi-Strauss in his structural analysis of myth. After an analysis of Lévi-Strauss’s transformational methodology, we describe in detail how discrete-event system specification models are implemented and developed in the framework of a DEVSimPy software environment. The validation of the method involves a discrete-event system specification simulation based on the extension of discrete-event system specification models dedicated to provide a dynamic Google Earth visualization of the selected myth. Future work around the discrete-event system specification formalism in anthropology is described as well as future applications regarding the impact of computational models (discrete-event system specification formalism, Bayesian inferences, and object-oriented features) to new contemporary anthropological domains.



2021 ◽  
Vol 11 (11) ◽  
pp. 4769
Author(s):  
Ja-Hee Kim

Designing a discrete event system converging to steady temporal patterns is an essential issue of a system with time window constraints. Until now, to analyze asymptotic stability, we have modeled a timed event graph’s dynamic behavior, transformed it into the matrix form of (max,+) algebra, and then constructed a precedence graph. This article’s aim is to provide a theoretical basis for analyzing the stability and cyclicity of timed event graphs without using (max,+) algebra. In this article, we propose converting one timed event graph to another with a dynamic behavior equivalent to that of the original without going through the conversion process. This paper also guarantees that the derived final timed event graph has the properties of a precedence graph. It then investigates the relationship between the properties of the derived precedence graph and that of the original timed event graph. Finally, we propose a method to analyze asymptotic cyclicity and stability for a given timed event graph by itself. The analysis this article provides makes it easy to analyze and improve asymptotic time patterns of tasks in a given discrete event system modeled with a live autonomous timed event graph such as repetitive production scheduling.



2021 ◽  
Vol 9 (2) ◽  
pp. 81-92
Author(s):  
A. A. Aminu ◽  
S. E. Olowo ◽  
I. M. Sulaiman ◽  
N. Abu Bakar ◽  
M. Mamat




Sign in / Sign up

Export Citation Format

Share Document