建模仿真即服务(Modeling&Simulation as a Service,MSaaS)具有快速部署、可互操作、高安全性和应用面广等特点,而其可信度直接关系到仿真应用的成败。对此,文章提出一种MSaaS仿真可信度计算方法。根据MSaaS不同层面从数据的完备性...建模仿真即服务(Modeling&Simulation as a Service,MSaaS)具有快速部署、可互操作、高安全性和应用面广等特点,而其可信度直接关系到仿真应用的成败。对此,文章提出一种MSaaS仿真可信度计算方法。根据MSaaS不同层面从数据的完备性、仿真模型精度和正确性等影响因素建立可信度指标体系;采用层次分析法(AHP)得到各级评价指标权重,通过模糊综合评价引入主因素突出型算子得到评估结果;实例验证了方法有效。展开更多
建模仿真即服务(Modelling Simulation as a service, MSaaS)是将云计算、面向服务的架构等技术引入建模与仿真领域的新思想,其建立的仿真系统的可信度是完成高性能仿真的基础问题与重要指标。分析了建模仿真即服务的分层体系架构,根据...建模仿真即服务(Modelling Simulation as a service, MSaaS)是将云计算、面向服务的架构等技术引入建模与仿真领域的新思想,其建立的仿真系统的可信度是完成高性能仿真的基础问题与重要指标。分析了建模仿真即服务的分层体系架构,根据其架构各层之间的功能不同,运行环境异构等特点建立了可信度评估指标体系,提出了一种定量计算和定性分析相结合的评估方法——熵权-灰色层次分析法,最后给出了基于MSaaS的战场环境仿真可信度评估实例,结果表明上述方法有效。展开更多
In this paper,a generic retailer-oriented portfolio simulation system linking manufacturer,retailer,and customer in apparel supply chain is presented.The purpose of the simulator is to generate a portfolio consisting ...In this paper,a generic retailer-oriented portfolio simulation system linking manufacturer,retailer,and customer in apparel supply chain is presented.The purpose of the simulator is to generate a portfolio consisting of replenishment strategy and performance index under different sales forecasting errors to satisfy the retailer-defined customer service level in apparel industry.After analyzing the main parameters in the portfolio simulator,the procedure and detailed structure of the simulator are then described.With the use of data from the industry,one case study of the portfolio simulator is achieved and the process of the simulation is validated.展开更多
In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most...In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance.展开更多
The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using a...The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference.展开更多
In this letter,we propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible f...In this letter,we propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible future directions of the current simulation frameworks. In particular, the model inspects the crossover between the disciplines of modeling and simulation, service-orientation,and software/systems engineering. Finally, two specific simulation frameworks are studied as examples.展开更多
文摘建模仿真即服务(Modeling&Simulation as a Service,MSaaS)具有快速部署、可互操作、高安全性和应用面广等特点,而其可信度直接关系到仿真应用的成败。对此,文章提出一种MSaaS仿真可信度计算方法。根据MSaaS不同层面从数据的完备性、仿真模型精度和正确性等影响因素建立可信度指标体系;采用层次分析法(AHP)得到各级评价指标权重,通过模糊综合评价引入主因素突出型算子得到评估结果;实例验证了方法有效。
文摘建模仿真即服务(Modelling Simulation as a service, MSaaS)是将云计算、面向服务的架构等技术引入建模与仿真领域的新思想,其建立的仿真系统的可信度是完成高性能仿真的基础问题与重要指标。分析了建模仿真即服务的分层体系架构,根据其架构各层之间的功能不同,运行环境异构等特点建立了可信度评估指标体系,提出了一种定量计算和定性分析相结合的评估方法——熵权-灰色层次分析法,最后给出了基于MSaaS的战场环境仿真可信度评估实例,结果表明上述方法有效。
文摘In this paper,a generic retailer-oriented portfolio simulation system linking manufacturer,retailer,and customer in apparel supply chain is presented.The purpose of the simulator is to generate a portfolio consisting of replenishment strategy and performance index under different sales forecasting errors to satisfy the retailer-defined customer service level in apparel industry.After analyzing the main parameters in the portfolio simulator,the procedure and detailed structure of the simulator are then described.With the use of data from the industry,one case study of the portfolio simulator is achieved and the process of the simulation is validated.
基金supported in part by the Key Program of National Natural Science Foundation of China(Grant No.60873244,60973110,61003307)the Beijing Municipal Natural Science Foundation(Grant No.4102059)
文摘In wireless sensor networks,node localization is a fundamental middleware service.In this paper,a robust and accurate localization algorithm is proposed,which uses a novel iterative clustering model to obtain the most representative intersection points between every two circles and use them to estimate the position of unknown nodes.Simulation results demonstrate that the proposed algorithm outperforms other localization schemes (such as Min-Max,etc.) in accuracy,scalability and gross error tolerance.
文摘The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference.
基金Project (Nos.60574056 and 60674069) supported by the National Natural Science Foundation of China
文摘In this letter,we propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible future directions of the current simulation frameworks. In particular, the model inspects the crossover between the disciplines of modeling and simulation, service-orientation,and software/systems engineering. Finally, two specific simulation frameworks are studied as examples.