With the development of cyber-physical systems,system security faces more risks from cyber-attacks.In this work,we study the problem that an external attacker implements covert sensor and actuator attacks with resourc...With the development of cyber-physical systems,system security faces more risks from cyber-attacks.In this work,we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints(the total resource consumption of the attacks is not greater than a given initial resource of the attacker)to mislead a discrete event system under supervisory control to reach unsafe states.We consider that the attacker can implement two types of attacks:One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor.Each attack has its corresponding resource consumption and remains covert.To solve this problem,we first introduce a notion of combined-attackability to determine whether a closedloop system may reach an unsafe state after receiving attacks with resource constraints.We develop an algorithm to construct a corrupted supervisor under attacks,provide a verification method for combined-attackability in polynomial time based on a plant,a corrupted supervisor,and an attacker's initial resource,and propose a corresponding attack synthesis algorithm.The effectiveness of the proposed method is illustrated by an example.展开更多
Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to prese...Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to preserve energy without any frame losses. After the STA wakes up, it sends a null data or PS-Poll frame to retrieve frame(s) buffered by the access point(AP), if any during its sleep period. An attacker can launch a power save denial of service(PS-DoS) attack on the sleeping STA(s) by transmitting a spoofed null data or PS-Poll frame(s) to retrieve the buffered frame(s) of the sleeping STA(s) from the AP causing frame losses for the targeted STA(s). Current approaches to prevent or detect the PS-DoS attack require encryption,change in protocol or installation of proprietary hardware. These solutions suffer from expensive setup, maintenance, scalability and deployment issues. The PS-DoS attack does not differ in semantics or statistics under normal and attack circumstances.So signature and anomaly based intrusion detection system(IDS) are unfit to detect the PS-DoS attack. In this paper we propose a timed IDS based on real time discrete event system(RTDES) for detecting PS-DoS attack. The proposed DES based IDS overcomes the drawbacks of existing systems and detects the PS-DoS attack with high accuracy and detection rate. The correctness of the RTDES based IDS is proved by experimenting all possible attack scenarios.展开更多
Almost all work on model-based diagnosis (MBD) potentially presumes faults are per- sistent and does not take intermittent faults (IFs) into account. Therefore, it is common for diag- nosis systems to misjudge IFs...Almost all work on model-based diagnosis (MBD) potentially presumes faults are per- sistent and does not take intermittent faults (IFs) into account. Therefore, it is common for diag- nosis systems to misjudge IFs as permanent faults (PFs), which are the major cause of the problems of false alarms, cannot duplication and no fault found in aircraft avionics. To address this problem, a new fault model which includes PFs and IFs is presented based on discrete event systems (DESs). Thereafter, an approach is given to discriminate between PFs and IFs by diagnosing the current fault. In this paper, the regulations of (PFs and IFs) fault evolution through fault and reset events along the traces of system are studied, and then label propagation function is modified to account for PFs and the dynamic behavior of IFs and diagnosability of PFs and IFs are defined. Finally, illustrative examples are presented to demonstrate the proposed approach, and the analysis results show the fault types can be discriminated within bounded delay if the system is diagnosable.展开更多
The responses of vehicles to the changes in traffic situations inevitably have delays in observing an event and implementing a control command,which often causes fatal accidents.So far,the methods for handling delays ...The responses of vehicles to the changes in traffic situations inevitably have delays in observing an event and implementing a control command,which often causes fatal accidents.So far,the methods for handling delays are empirical and cannot be mathematically proven.To eliminate the accidents caused by such delays,in this paper,we develop mathematically provable methods to handle these delays.Specifically,we use networked discrete event systems to model the process of driving vehicles and present a supervisory controller for handling delay situations.The method developed in this paper could serve as a new start for modeling and controlling the responsive behaviors of self-driving vehicles in the future.展开更多
In this paper,we presented the decentralized supervisory control problem of discrete event system with continuous-time variable.By presenting the definition of coobservability for the timed specification,a necessary a...In this paper,we presented the decentralized supervisory control problem of discrete event system with continuous-time variable.By presenting the definition of coobservability for the timed specification,a necessary and sufficient condition for the existence of decentralized supervisors is obtained.Finally,a numerical example is given.展开更多
The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of cyber-security.The authors model the system using an automaton and study the general not...The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of cyber-security.The authors model the system using an automaton and study the general notion of detectability where a given set of state pairs needs to be(eventually or periodically)distinguished in any estimate of the state of the system.The authors adopt the ALTER sensor attack model from previous work and formulate four notions of CA-detectability in the context of this attack model based on the following attributes:strong or weak;eventual or periodic.The authors present verification methods for strong CA-detectability and weak CA-detectability.The authors present definitions of strong and weak periodic CA-detectability that are based on the construction of a verifier automaton called the augmented CA-observer.The development also resulted in relaxing assumptions in prior results on D-detectability,which is a special case of CA-detectability.展开更多
We develop and implement a Stochastic Discrete Event Simulation(SDES)algorithm to model the housing re-covery trajectory after an extreme event.The algorithm models discrete events and their underlying uncertainties i...We develop and implement a Stochastic Discrete Event Simulation(SDES)algorithm to model the housing re-covery trajectory after an extreme event.The algorithm models discrete events and their underlying uncertainties in each construction phase.Specifically,the algorithm is developed for the Government Assisted Owner Driven(GAOD)reconstruction system to simulate long-term recovery trajectory.SDES,as a flexible modeling approach,can simulate any housing recovery scenario that follows phased reconstruction.The 2015 M 7.8 Gorkha earthquake sequence in Nepal is considered the extreme event,with 796,245 buildings requiring reconstruction.We present some recovery trajectories from severely hit,crisis hit,and earthquake hit parishes,comparing them with the actual reconstruction progress.We also assess quality and improvement of reconstructed buildings using seismic fragility functions,compared to pre-earthquake constructions.Housing recovery uncertainties are dissected in relation to reconstruction pace.We conclude that the vast majority of the reconstructed buildings followed the Build Back Better(BBB)approach and missed the opportunity to pursue the Build Back Resilient(BBR)approach due to multifaceted challenges ranging from unclear policies to economic constraints.We critically assess the GAOD vs Owner Driven(OD)recovery framework and conclude that insurance-supported and technically assisted OD approach could be the most suitable model for post extreme event housing recovery.展开更多
To solve the difficulties in allocating buffers for unreliable large production lines, this paper inves-tigated a model combining the genetic algorithm with the discrete event system simulation method. In the simulati...To solve the difficulties in allocating buffers for unreliable large production lines, this paper inves-tigated a model combining the genetic algorithm with the discrete event system simulation method. In the simulation method, times-to-failure of an unreliable large production line is assumed to follow exponential distribution, whereas times-to-repair and times-to-processing are set to follow an Erlang-k distribution. Using a genetic algorithm based on special position-based mapping means and elitist protection strategy, the buffer configuration of an auto-body welding line is optimized. The simulation of the optimized configuration shows that the performance of the production line, such as productivity and the main average utilization of the workstations, is much improved. This model can optimize the allocation of buffers for unreliable large production lines effectively.展开更多
This paper is a sequel to a previous publication by the same authors, in which an efficient modular solution to a robust supervisory control problem for discrete event systems modeled by finite automata with prefix-cl...This paper is a sequel to a previous publication by the same authors, in which an efficient modular solution to a robust supervisory control problem for discrete event systems modeled by finite automata with prefix-closed specification languages has been presented. This solution is based on a general recursive robust control scheme, which has been successfully applied to a number of problems. The additional contributions of the present paper are: (a) a slight generalization of the problem assumptions; (b) an alternative derivation of some of the results and an alternative formulation of the controller; (c) a detailed description of a very efficient on-line implementation algorithm; and (d) an illustrative practical example.展开更多
In Discrete Event System Specification(DEVS),the dynamics of a network is constituted only by the dynamics of its basic components.The state of each component is fully encapsulated.Control in the network is fully dece...In Discrete Event System Specification(DEVS),the dynamics of a network is constituted only by the dynamics of its basic components.The state of each component is fully encapsulated.Control in the network is fully decentralized to each component.At dynamic structure level,DEVS should permit the same level of decentralization.However,it is hard to ensure structure consistency while letting all components achieve structure changes.Besides,this solution can be complex to implement.To avoid these difficulties,usual dynamic structure approaches ensure structure consistency allowing structure changes to be done only by the network having newly added dynamics change capabilities.This is a safe and simple way to achieve dynamic structure.However,it should be possible to simply allow components of a network to modify the structure of their network,other components and/or their own structure—without having to modify the usual definition a DEVS network.In this manuscript,it is shown that a simple fully decentralized approach is possible while ensuring full modularity and structure consistency.展开更多
A simulation model for cyber-physical systems(CPSs)was presented.The model was developed by the method of combination of topology-based and event-oriented that could be used to simulate systems with routing flexibilit...A simulation model for cyber-physical systems(CPSs)was presented.The model was developed by the method of combination of topology-based and event-oriented that could be used to simulate systems with routing flexibility,service-selection flexibility and service-mode flexibility overall by integrating the strategies related.The validity of the model has been verified by two extensive experiments.展开更多
Data-flow errors are prevalent in cyber-physical systems(CPS).Although various approaches based on business process modeling notation(BPMN)have been devised for CPS modeling,the absence of formal specifications compli...Data-flow errors are prevalent in cyber-physical systems(CPS).Although various approaches based on business process modeling notation(BPMN)have been devised for CPS modeling,the absence of formal specifications complicates the verification of data-flow.Formal techniques such as Petri nets are popularly used for identifying data-flow errors.However,due to their interleaving semantics,they suffer from the state-space explosion problem.As an unfolding method for Petri nets,the merged process(MP)technique can well represent concurrency relationships and thus be used to address this issue.Yet generating MP is complex and incurs substantial overhead.By designing and applyingα-deletion rules for Petri nets with data(PNDs),this work simplifies MP,thus resulting in simplified MP(SMP)that is then used to identify data-flow errors.Our approach involves converting a BPMN into a PND and then constructing its SMP.The algorithms are developed to identify data-flow errors,e.g.,redundantdata and lost-data ones.The proposed method enhances the efficiency and effectiveness of identifying data-flow errors in CPS.It is expected to prevent the problems caused by data-flow errors,e.g.,medical malpractice and economic loss in some practical CPS.Its practicality and efficiency of the proposed method through several CPS.Its significant advantages over the state of the art are demonstrated.展开更多
The aim of this paper is to present a discrete event model-based approach to simulate train movement with the con- sidered energy-saving factor. We conduct extensive case studies to show the dynamic characteristics of...The aim of this paper is to present a discrete event model-based approach to simulate train movement with the con- sidered energy-saving factor. We conduct extensive case studies to show the dynamic characteristics of the traffic flow and demonstrate the effectiveness of the proposed approach. The simulation results indicate that the proposed discrete event model-based simulation approach is suitable for characterizing the movements of a group of trains on a single railway line with less iterations and CPU time. Additionally, some other qualitative and quantitative characteristics are investigated. In particular, because of the cumulative influence from the previous trains, the following trains should be accelerated or braked frequently to control the headway distance, leading to more energy consumption.展开更多
The NHS is right now confronting huge pressures relating to demand and capacity in radiology. The purpose of this research has been to provide information about MRI usage, details of operational aspects of MRI service...The NHS is right now confronting huge pressures relating to demand and capacity in radiology. The purpose of this research has been to provide information about MRI usage, details of operational aspects of MRI services, and to ascertain the planning intentions of NHS radiology services to keep up and create MRI capacity. The report expands on using Discrete Event Simulation (DES) to inspect and plan the utilisation of NHS hospital resources for the radiology department to help a 24 hr service that is available to outpatients which will help with diminishing patient waiting time, better resource usage, understanding the capacity and demand. Consequently, this research examines to adjust staff and resources with the demand of the MRI. The research was investigated using DES in various scenarios to find which resources are inactive;patients are treated slowly. DES helped in discovering resource utilisation and outpatient throughout the system. It additionally helped in distinguishing the bottlenecks in patient flow. The DES simulation results demonstrated that time for the outpatient in the system is less and more outpatients have been treated too. There is a higher level of outpatient patients leaving the system under 120 minutes. The report uncovered an MRI report interpretation time. Reception room time and MRI waiting room time are decreased significantly. It additionally exhibited with an expanded outflow of outpatients, resources, for example, MRI capacity and radiographer utilisation expanded.展开更多
The Riyadh metro project is one of the current megaprojects that aim to improve the transit systems in Saudi Arabia.It consists of several metro lines with a total length of 176 km and 85 stations.The viaducts are con...The Riyadh metro project is one of the current megaprojects that aim to improve the transit systems in Saudi Arabia.It consists of several metro lines with a total length of 176 km and 85 stations.The viaducts are considered as one of the main construction elements in the metro lines.Four methods for viaducts construction have been used in the Riyadh metro project:precast beam,full span launching method,cast on-site,and segment method(precast segment method and BCM(balanced cantilever method)).The viaducts work consumes a large portion of a project’s time and cost.Furthermore,the competitive nature of the construction industry increases the need to improve the efficiency of construction performance.Accordingly,this paper takes the initial steps toward increasing the efficiency of viaduct construction methods through simulation.Simulation of construction processes provides a systematic tool that can be used for determining the resources,time,and cost of these processes.The simulation processes should focus on the main activities affecting this element’s execution for viaducts construction,such as segment storage,handling,transporting,and installation.This study highlights the viaducts construction methods and develops general discrete-event simulation models for the most commonly used viaducts construction methods in the Riyadh metro using AnyLogic simulation software.The simulation models visualize and capture the interaction between the different activities and resources in a viaduct construction.Consequently,the construction drawbacks can be identified.Furthermore,the simulation model can be manipulated by adding assumptions to develop more efficient construction methods in terms of time and cost in such projects.展开更多
This research involved an exploratory evaluation of the dynamics of vehicular traffic on a road network across two traffic light-controlled junctions. The study uses the case study of a one-kilometer road system model...This research involved an exploratory evaluation of the dynamics of vehicular traffic on a road network across two traffic light-controlled junctions. The study uses the case study of a one-kilometer road system modelled on Anylogic version 8.8.4. Anylogic is a multi-paradigm simulation tool that supports three main simulation methodologies: discrete event simulation, agent-based modeling, and system dynamics modeling. The system is used to evaluate the implication of stochastic time-based vehicle variables on the general efficiency of road use. Road use efficiency as reflected in this model is based on the percentage of entry vehicles to exit the model within a one-hour simulation period. The study deduced that for the model under review, an increase in entry point time delay has a domineering influence on the efficiency of road use far beyond any other consideration. This study therefore presents a novel approach that leverages Discrete Events Simulation to facilitate efficient road management with a focus on optimum road use efficiency. The study also determined that the inclusion of appropriate random parameters to reflect road use activities at critical event points in a simulation can help in the effective representation of authentic traffic models. The Anylogic simulation software leverages the Classic DEVS and Parallel DEVS formalisms to achieve these objectives.展开更多
Modeling approach using discrete event simulation has been proven to work well in modeling in health care. The aim of our paper is to propose a simulation approach which shows realistic models presenting different pos...Modeling approach using discrete event simulation has been proven to work well in modeling in health care. The aim of our paper is to propose a simulation approach which shows realistic models presenting different possible treatments in different stages of diabetic retinopathy. We have presented three models in order to choose the best treatment for diabetic retinopathy patients. The first model describes the flow of a patient through stages without any medical treatments. It takes 13 years to reach blindness. The second model which includes the laser photocoagulation treatments leads to blindness after 46 years. Then, the third model illustrates the involvement of vitrectomy operation and delays blindness by 23 years. To construct the models, data were taken from experienced doctors and professors of the ophthalmology department in the University hospital Habib Bourguiba and the endocrinology department in the University hospital Hedi Chaker in Sfax, Tunisia. Our objective is to delay reaching the blindness stage as late as possible. Three models were developed, verified and validated through many iterative implementations with ARENA simulation software.展开更多
In the analysis of power electronics system,it is necessary to simulate ordinary differential equations(ODEs)with discontinuities and stiffness.However,there are many difficulties in using traditional discrete-time al...In the analysis of power electronics system,it is necessary to simulate ordinary differential equations(ODEs)with discontinuities and stiffness.However,there are many difficulties in using traditional discrete-time algorithms to solve such equations.Kofman and others presented the quantized state systems(QSS)algorithm in the discrete event system specification(DEVS)formalism.The discretization is applied to the state variables instead of time range in QSS.QSS is efficient to solve ODEs,but it is difficulty to be used when simulating actual power electronics systems with controller’s and other events.Based on the idea of this numerical algorithm and discrete event,a Discrete State Event Driven(DSED)simulation method is presented in this paper,which is fit for simulation of power electronics system.The method is developed to deal with non-linearity,stiffness and multi-time scale of power electronics systems.The DSED simulation method includes event definition,module seperation and modeling,event-driven mechanisms,numerical computation based on QSS,and some other operations.Simulation results verified the effectiveness and validity of the proposed method.展开更多
Discrete event system(DES)models promote system engineering,including system design,verification,and assessment.The advancement in manufacturing technology has endowed us to fabricate complex industrial systems.Conseq...Discrete event system(DES)models promote system engineering,including system design,verification,and assessment.The advancement in manufacturing technology has endowed us to fabricate complex industrial systems.Consequently,the adoption of advanced modeling methodologies adept at handling complexity and scalability is imperative.Moreover,industrial systems are no longer quiescent,thus the intelligent operations of the systems should be dynamically specified in the model.In this paper,the composition of the subsystem behaviors is studied to generate the complexity and scalability of the global system model,and a Boolean semantic specifying algorithm is proposed for generating dynamic intelligent operations in the model.In traditional modeling approaches,the change or addition of specifications always necessitates the complete resubmission of the system model,a resource-consuming and error-prone process.Compared with traditional approaches,our approach has three remarkable advantages:(i)an established Boolean semantic can be fitful for all kinds of systems;(ii)there is no need to resubmit the system model whenever there is a change or addition of the operations;(iii)multiple specifying tasks can be easily achieved by continuously adding a new semantic.Thus,this general modeling approach has wide potential for future complex and intelligent industrial systems.展开更多
The supervisory control problem for discrete event system(DES) under control involves identifying the supervisor, if one exists, which, when synchronously composed with the DES,results in a system that conforms to the...The supervisory control problem for discrete event system(DES) under control involves identifying the supervisor, if one exists, which, when synchronously composed with the DES,results in a system that conforms to the control specification. In this context, we consider a non-deterministic DES under complete observation and control specification expressed in action-based propositional μ-calculus. The key to our solution is the process of quotienting the control specification against the plan resulting in a new μ-calculus formula such that a model for the formula is the supervisor. Thus the task of control synthesis is reduced a problem of μ-calculus satisfiability. In contrast to the existing μ-calculus quotienting-based techniques that are developed in deterministic setting, our quotienting rules can handle nondeterminism in the plant models. Another distinguishing feature of our technique is that while existing techniques use a separate μ-calculus formula to describe the controllability constraint(that uncontrollable events of plants are never disabled by a supervisor), we absorb this constraint as part of quotienting which allows us to directly capture more general state-dependent controllability constraints. Finally, we develop a tableau-based technique for verifying satisfiability of quotiented formula and model generation. The runtime for the technique is exponential in terms of the size of the plan and the control specification. A better complexity result that is polynomial to plant size and exponential to specification size is obtained when the controllability property is state-independent. A prototype implementation in a tabled logic programming language as well as some experimental results are presented.展开更多
基金partially supported by the Science Technology Development Fund,Macao Special Administrative Region(0029/2023/RIA1)the National Research Foundation Singapore under its AI Singapore Programme(AISG2-GC-2023-007)
文摘With the development of cyber-physical systems,system security faces more risks from cyber-attacks.In this work,we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints(the total resource consumption of the attacks is not greater than a given initial resource of the attacker)to mislead a discrete event system under supervisory control to reach unsafe states.We consider that the attacker can implement two types of attacks:One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor.Each attack has its corresponding resource consumption and remains covert.To solve this problem,we first introduce a notion of combined-attackability to determine whether a closedloop system may reach an unsafe state after receiving attacks with resource constraints.We develop an algorithm to construct a corrupted supervisor under attacks,provide a verification method for combined-attackability in polynomial time based on a plant,a corrupted supervisor,and an attacker's initial resource,and propose a corresponding attack synthesis algorithm.The effectiveness of the proposed method is illustrated by an example.
基金supported by TATA Consultancy Servies(TCS)Research Fellowship Program,India
文摘Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to preserve energy without any frame losses. After the STA wakes up, it sends a null data or PS-Poll frame to retrieve frame(s) buffered by the access point(AP), if any during its sleep period. An attacker can launch a power save denial of service(PS-DoS) attack on the sleeping STA(s) by transmitting a spoofed null data or PS-Poll frame(s) to retrieve the buffered frame(s) of the sleeping STA(s) from the AP causing frame losses for the targeted STA(s). Current approaches to prevent or detect the PS-DoS attack require encryption,change in protocol or installation of proprietary hardware. These solutions suffer from expensive setup, maintenance, scalability and deployment issues. The PS-DoS attack does not differ in semantics or statistics under normal and attack circumstances.So signature and anomaly based intrusion detection system(IDS) are unfit to detect the PS-DoS attack. In this paper we propose a timed IDS based on real time discrete event system(RTDES) for detecting PS-DoS attack. The proposed DES based IDS overcomes the drawbacks of existing systems and detects the PS-DoS attack with high accuracy and detection rate. The correctness of the RTDES based IDS is proved by experimenting all possible attack scenarios.
基金co-supported by National Natural Science Foundation of China (No. 51175502)National Defence Pre-research Foundation of China (No. 9140A17060411KG01)
文摘Almost all work on model-based diagnosis (MBD) potentially presumes faults are per- sistent and does not take intermittent faults (IFs) into account. Therefore, it is common for diag- nosis systems to misjudge IFs as permanent faults (PFs), which are the major cause of the problems of false alarms, cannot duplication and no fault found in aircraft avionics. To address this problem, a new fault model which includes PFs and IFs is presented based on discrete event systems (DESs). Thereafter, an approach is given to discriminate between PFs and IFs by diagnosing the current fault. In this paper, the regulations of (PFs and IFs) fault evolution through fault and reset events along the traces of system are studied, and then label propagation function is modified to account for PFs and the dynamic behavior of IFs and diagnosability of PFs and IFs are defined. Finally, illustrative examples are presented to demonstrate the proposed approach, and the analysis results show the fault types can be discriminated within bounded delay if the system is diagnosable.
文摘The responses of vehicles to the changes in traffic situations inevitably have delays in observing an event and implementing a control command,which often causes fatal accidents.So far,the methods for handling delays are empirical and cannot be mathematically proven.To eliminate the accidents caused by such delays,in this paper,we develop mathematically provable methods to handle these delays.Specifically,we use networked discrete event systems to model the process of driving vehicles and present a supervisory controller for handling delay situations.The method developed in this paper could serve as a new start for modeling and controlling the responsive behaviors of self-driving vehicles in the future.
基金Supported by National Natural Science Foundation of China(No.60904018)Natural Science Foundation of Fujian Province(No.2010J01339)Science Research Foundation of Huaqiao University(No.09BS509)
文摘In this paper,we presented the decentralized supervisory control problem of discrete event system with continuous-time variable.By presenting the definition of coobservability for the timed specification,a necessary and sufficient condition for the existence of decentralized supervisors is obtained.Finally,a numerical example is given.
基金supported in part by the US National Science Foundation under Grant Nos.ECCS-2146615 and ECCS-2144416.
文摘The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of cyber-security.The authors model the system using an automaton and study the general notion of detectability where a given set of state pairs needs to be(eventually or periodically)distinguished in any estimate of the state of the system.The authors adopt the ALTER sensor attack model from previous work and formulate four notions of CA-detectability in the context of this attack model based on the following attributes:strong or weak;eventual or periodic.The authors present verification methods for strong CA-detectability and weak CA-detectability.The authors present definitions of strong and weak periodic CA-detectability that are based on the construction of a verifier automaton called the augmented CA-observer.The development also resulted in relaxing assumptions in prior results on D-detectability,which is a special case of CA-detectability.
文摘We develop and implement a Stochastic Discrete Event Simulation(SDES)algorithm to model the housing re-covery trajectory after an extreme event.The algorithm models discrete events and their underlying uncertainties in each construction phase.Specifically,the algorithm is developed for the Government Assisted Owner Driven(GAOD)reconstruction system to simulate long-term recovery trajectory.SDES,as a flexible modeling approach,can simulate any housing recovery scenario that follows phased reconstruction.The 2015 M 7.8 Gorkha earthquake sequence in Nepal is considered the extreme event,with 796,245 buildings requiring reconstruction.We present some recovery trajectories from severely hit,crisis hit,and earthquake hit parishes,comparing them with the actual reconstruction progress.We also assess quality and improvement of reconstructed buildings using seismic fragility functions,compared to pre-earthquake constructions.Housing recovery uncertainties are dissected in relation to reconstruction pace.We conclude that the vast majority of the reconstructed buildings followed the Build Back Better(BBB)approach and missed the opportunity to pursue the Build Back Resilient(BBR)approach due to multifaceted challenges ranging from unclear policies to economic constraints.We critically assess the GAOD vs Owner Driven(OD)recovery framework and conclude that insurance-supported and technically assisted OD approach could be the most suitable model for post extreme event housing recovery.
基金Supported by the Teaching and Research Award Program for Outstanding Young Teachers in Higher Education Institutions of the Ministry of Education China the National High-Tech Research and Development (863) Program of China (No. 2001AA411140)
文摘To solve the difficulties in allocating buffers for unreliable large production lines, this paper inves-tigated a model combining the genetic algorithm with the discrete event system simulation method. In the simulation method, times-to-failure of an unreliable large production line is assumed to follow exponential distribution, whereas times-to-repair and times-to-processing are set to follow an Erlang-k distribution. Using a genetic algorithm based on special position-based mapping means and elitist protection strategy, the buffer configuration of an auto-body welding line is optimized. The simulation of the optimized configuration shows that the performance of the production line, such as productivity and the main average utilization of the workstations, is much improved. This model can optimize the allocation of buffers for unreliable large production lines effectively.
基金Supported by the General Secretariat for Research and Technology, International Cooperation, Eureka Project (Grant No. E!3219-AADSS, EU)
文摘This paper is a sequel to a previous publication by the same authors, in which an efficient modular solution to a robust supervisory control problem for discrete event systems modeled by finite automata with prefix-closed specification languages has been presented. This solution is based on a general recursive robust control scheme, which has been successfully applied to a number of problems. The additional contributions of the present paper are: (a) a slight generalization of the problem assumptions; (b) an alternative derivation of some of the results and an alternative formulation of the controller; (c) a detailed description of a very efficient on-line implementation algorithm; and (d) an illustrative practical example.
文摘In Discrete Event System Specification(DEVS),the dynamics of a network is constituted only by the dynamics of its basic components.The state of each component is fully encapsulated.Control in the network is fully decentralized to each component.At dynamic structure level,DEVS should permit the same level of decentralization.However,it is hard to ensure structure consistency while letting all components achieve structure changes.Besides,this solution can be complex to implement.To avoid these difficulties,usual dynamic structure approaches ensure structure consistency allowing structure changes to be done only by the network having newly added dynamics change capabilities.This is a safe and simple way to achieve dynamic structure.However,it should be possible to simply allow components of a network to modify the structure of their network,other components and/or their own structure—without having to modify the usual definition a DEVS network.In this manuscript,it is shown that a simple fully decentralized approach is possible while ensuring full modularity and structure consistency.
基金Science and Technology Plan Projects of Guangdong Province,China(No.2014B090921007)Science and Technology Plan Projects of Guangzhou city,China(No.20150810068)Science and Technology Plan Projects of Haizhu District of Guangzhou,China(No.2014-cg-02)
文摘A simulation model for cyber-physical systems(CPSs)was presented.The model was developed by the method of combination of topology-based and event-oriented that could be used to simulate systems with routing flexibility,service-selection flexibility and service-mode flexibility overall by integrating the strategies related.The validity of the model has been verified by two extensive experiments.
基金supported by the National Natural Science Foundation of China(62402415)in part by the Natural Science Foundation of Shandong Province of China(ZR2024MF129)in part by State Key Laboratory of Massive Personalized Customization System and Technology(No.H&C-MPC-2023-02-03).
文摘Data-flow errors are prevalent in cyber-physical systems(CPS).Although various approaches based on business process modeling notation(BPMN)have been devised for CPS modeling,the absence of formal specifications complicates the verification of data-flow.Formal techniques such as Petri nets are popularly used for identifying data-flow errors.However,due to their interleaving semantics,they suffer from the state-space explosion problem.As an unfolding method for Petri nets,the merged process(MP)technique can well represent concurrency relationships and thus be used to address this issue.Yet generating MP is complex and incurs substantial overhead.By designing and applyingα-deletion rules for Petri nets with data(PNDs),this work simplifies MP,thus resulting in simplified MP(SMP)that is then used to identify data-flow errors.Our approach involves converting a BPMN into a PND and then constructing its SMP.The algorithms are developed to identify data-flow errors,e.g.,redundantdata and lost-data ones.The proposed method enhances the efficiency and effectiveness of identifying data-flow errors in CPS.It is expected to prevent the problems caused by data-flow errors,e.g.,medical malpractice and economic loss in some practical CPS.Its practicality and efficiency of the proposed method through several CPS.Its significant advantages over the state of the art are demonstrated.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.71271020 and 71271022)the Program for New Century Excellent Talents in University(Grant No.NCET-10-0218)
文摘The aim of this paper is to present a discrete event model-based approach to simulate train movement with the con- sidered energy-saving factor. We conduct extensive case studies to show the dynamic characteristics of the traffic flow and demonstrate the effectiveness of the proposed approach. The simulation results indicate that the proposed discrete event model-based simulation approach is suitable for characterizing the movements of a group of trains on a single railway line with less iterations and CPU time. Additionally, some other qualitative and quantitative characteristics are investigated. In particular, because of the cumulative influence from the previous trains, the following trains should be accelerated or braked frequently to control the headway distance, leading to more energy consumption.
文摘The NHS is right now confronting huge pressures relating to demand and capacity in radiology. The purpose of this research has been to provide information about MRI usage, details of operational aspects of MRI services, and to ascertain the planning intentions of NHS radiology services to keep up and create MRI capacity. The report expands on using Discrete Event Simulation (DES) to inspect and plan the utilisation of NHS hospital resources for the radiology department to help a 24 hr service that is available to outpatients which will help with diminishing patient waiting time, better resource usage, understanding the capacity and demand. Consequently, this research examines to adjust staff and resources with the demand of the MRI. The research was investigated using DES in various scenarios to find which resources are inactive;patients are treated slowly. DES helped in discovering resource utilisation and outpatient throughout the system. It additionally helped in distinguishing the bottlenecks in patient flow. The DES simulation results demonstrated that time for the outpatient in the system is less and more outpatients have been treated too. There is a higher level of outpatient patients leaving the system under 120 minutes. The report uncovered an MRI report interpretation time. Reception room time and MRI waiting room time are decreased significantly. It additionally exhibited with an expanded outflow of outpatients, resources, for example, MRI capacity and radiographer utilisation expanded.
文摘The Riyadh metro project is one of the current megaprojects that aim to improve the transit systems in Saudi Arabia.It consists of several metro lines with a total length of 176 km and 85 stations.The viaducts are considered as one of the main construction elements in the metro lines.Four methods for viaducts construction have been used in the Riyadh metro project:precast beam,full span launching method,cast on-site,and segment method(precast segment method and BCM(balanced cantilever method)).The viaducts work consumes a large portion of a project’s time and cost.Furthermore,the competitive nature of the construction industry increases the need to improve the efficiency of construction performance.Accordingly,this paper takes the initial steps toward increasing the efficiency of viaduct construction methods through simulation.Simulation of construction processes provides a systematic tool that can be used for determining the resources,time,and cost of these processes.The simulation processes should focus on the main activities affecting this element’s execution for viaducts construction,such as segment storage,handling,transporting,and installation.This study highlights the viaducts construction methods and develops general discrete-event simulation models for the most commonly used viaducts construction methods in the Riyadh metro using AnyLogic simulation software.The simulation models visualize and capture the interaction between the different activities and resources in a viaduct construction.Consequently,the construction drawbacks can be identified.Furthermore,the simulation model can be manipulated by adding assumptions to develop more efficient construction methods in terms of time and cost in such projects.
文摘This research involved an exploratory evaluation of the dynamics of vehicular traffic on a road network across two traffic light-controlled junctions. The study uses the case study of a one-kilometer road system modelled on Anylogic version 8.8.4. Anylogic is a multi-paradigm simulation tool that supports three main simulation methodologies: discrete event simulation, agent-based modeling, and system dynamics modeling. The system is used to evaluate the implication of stochastic time-based vehicle variables on the general efficiency of road use. Road use efficiency as reflected in this model is based on the percentage of entry vehicles to exit the model within a one-hour simulation period. The study deduced that for the model under review, an increase in entry point time delay has a domineering influence on the efficiency of road use far beyond any other consideration. This study therefore presents a novel approach that leverages Discrete Events Simulation to facilitate efficient road management with a focus on optimum road use efficiency. The study also determined that the inclusion of appropriate random parameters to reflect road use activities at critical event points in a simulation can help in the effective representation of authentic traffic models. The Anylogic simulation software leverages the Classic DEVS and Parallel DEVS formalisms to achieve these objectives.
文摘Modeling approach using discrete event simulation has been proven to work well in modeling in health care. The aim of our paper is to propose a simulation approach which shows realistic models presenting different possible treatments in different stages of diabetic retinopathy. We have presented three models in order to choose the best treatment for diabetic retinopathy patients. The first model describes the flow of a patient through stages without any medical treatments. It takes 13 years to reach blindness. The second model which includes the laser photocoagulation treatments leads to blindness after 46 years. Then, the third model illustrates the involvement of vitrectomy operation and delays blindness by 23 years. To construct the models, data were taken from experienced doctors and professors of the ophthalmology department in the University hospital Habib Bourguiba and the endocrinology department in the University hospital Hedi Chaker in Sfax, Tunisia. Our objective is to delay reaching the blindness stage as late as possible. Three models were developed, verified and validated through many iterative implementations with ARENA simulation software.
基金This work was supported by a grant from the National Nature Science Foundation of China(No 51490680,No 51490683)。
文摘In the analysis of power electronics system,it is necessary to simulate ordinary differential equations(ODEs)with discontinuities and stiffness.However,there are many difficulties in using traditional discrete-time algorithms to solve such equations.Kofman and others presented the quantized state systems(QSS)algorithm in the discrete event system specification(DEVS)formalism.The discretization is applied to the state variables instead of time range in QSS.QSS is efficient to solve ODEs,but it is difficulty to be used when simulating actual power electronics systems with controller’s and other events.Based on the idea of this numerical algorithm and discrete event,a Discrete State Event Driven(DSED)simulation method is presented in this paper,which is fit for simulation of power electronics system.The method is developed to deal with non-linearity,stiffness and multi-time scale of power electronics systems.The DSED simulation method includes event definition,module seperation and modeling,event-driven mechanisms,numerical computation based on QSS,and some other operations.Simulation results verified the effectiveness and validity of the proposed method.
基金supported by the National Natural Science Foundation of China(U21B2074,52105070).
文摘Discrete event system(DES)models promote system engineering,including system design,verification,and assessment.The advancement in manufacturing technology has endowed us to fabricate complex industrial systems.Consequently,the adoption of advanced modeling methodologies adept at handling complexity and scalability is imperative.Moreover,industrial systems are no longer quiescent,thus the intelligent operations of the systems should be dynamically specified in the model.In this paper,the composition of the subsystem behaviors is studied to generate the complexity and scalability of the global system model,and a Boolean semantic specifying algorithm is proposed for generating dynamic intelligent operations in the model.In traditional modeling approaches,the change or addition of specifications always necessitates the complete resubmission of the system model,a resource-consuming and error-prone process.Compared with traditional approaches,our approach has three remarkable advantages:(i)an established Boolean semantic can be fitful for all kinds of systems;(ii)there is no need to resubmit the system model whenever there is a change or addition of the operations;(iii)multiple specifying tasks can be easily achieved by continuously adding a new semantic.Thus,this general modeling approach has wide potential for future complex and intelligent industrial systems.
基金supported in part by the National Sci-ence Foundation (NSF-ECCS-1509420, NSF-CSSI-2004766)。
文摘The supervisory control problem for discrete event system(DES) under control involves identifying the supervisor, if one exists, which, when synchronously composed with the DES,results in a system that conforms to the control specification. In this context, we consider a non-deterministic DES under complete observation and control specification expressed in action-based propositional μ-calculus. The key to our solution is the process of quotienting the control specification against the plan resulting in a new μ-calculus formula such that a model for the formula is the supervisor. Thus the task of control synthesis is reduced a problem of μ-calculus satisfiability. In contrast to the existing μ-calculus quotienting-based techniques that are developed in deterministic setting, our quotienting rules can handle nondeterminism in the plant models. Another distinguishing feature of our technique is that while existing techniques use a separate μ-calculus formula to describe the controllability constraint(that uncontrollable events of plants are never disabled by a supervisor), we absorb this constraint as part of quotienting which allows us to directly capture more general state-dependent controllability constraints. Finally, we develop a tableau-based technique for verifying satisfiability of quotiented formula and model generation. The runtime for the technique is exponential in terms of the size of the plan and the control specification. A better complexity result that is polynomial to plant size and exponential to specification size is obtained when the controllability property is state-independent. A prototype implementation in a tabled logic programming language as well as some experimental results are presented.