|
A multi-paradigm decision modeling framework for combat system effectiveness measurement based on domain-specific modeling
Xiao-bo Li, Yong-lin Lei, Hans Vangheluwe, Wei-ping Wang, Qun Li
Front. Inform. Technol. Electron. Eng., 2013, 14(5): 311-331.
https://doi.org/10.1631/jzus.C1200374
Decision modeling is an essential part of the combat system effectiveness simulation (CoSES), which needs to cope with the cognitive quality, diversity, flexibility, and higher abstraction of decision making. In this paper, a multi-paradigm decision modeling framework is proposed to support decision modeling at three levels of abstraction based on domain-specific modeling (DSM). This framework designs a domain-specific modeling language (DSML) for decision modeling to raise the abstraction level of modeling, transforms the domain-specific models to formalism-based models to enable formal analysis and early verification and validation, and implements the semantics of the DSML based on a Python scripts framework which incorporates the decision model into the whole simulation system. The case study shows that the proposed approach incorporates domain expertise and facilitates domain modeler’s participation in CoSES to formulate the problem using DSML in the problem domain, and enables formal analysis and automatic implementation of the decision model in the solution domain.
|
|
Validation of static properties in unified modeling language models for cyber physical systems
Gabriela Magureanu, Madalin Gavrilescu, Dan Pescaru
Front. Inform. Technol. Electron. Eng., 2013, 14(5): 332-346.
https://doi.org/10.1631/jzus.C1200263
Cyber physical systems (CPSs) can be found nowadays in various fields of activity. The increased interest for these systems as evidenced by the large number of applications led to complex research regarding the most suitable methods for design and development. A promising solution for specification, visualization, and documentation of CPSs uses the Object Management Group (OMG) unified modeling language (UML). UML models allow an intuitive approach for embedded systems design, helping end-users to specify the requirements. However, the UML models are represented in an informal language. Therefore, it is difficult to verify the correctness and completeness of a system design. The object constraint language (OCL) was defined to add constraints to UML, but it is deficient in strict notations of mathematics and logic that permits rigorous analysis and reasoning about the specifications. In this paper, we investigated how CPS applications modeled using UML deployment diagrams could be formally expressed and verified. We used Z language constructs and prototype verification system (PVS) as formal verification tools. Considering some relevant case studies presented in the literature, we investigated the opportunity of using this approach for validation of static properties in CPS UML models.
|
|
EDA: an enhanced dual-active algorithm for location privacy preservation in mobile P2P networks
Yan-zhe Che, Kevin Chiew, Xiao-yan Hong, Qiang Yang, Qin-ming He
Front. Inform. Technol. Electron. Eng., 2013, 14(5): 356-373.
https://doi.org/10.1631/jzus.C1200267
Various solutions have been proposed to enable mobile users to access location-based services while preserving their location privacy. Some of these solutions are based on a centralized architecture with the participation of a trustworthy third party, whereas some other approaches are based on a mobile peer-to-peer (P2P) architecture. The former approaches suffer from the scalability problem when networks grow large, while the latter have to endure either low anonymization success rates or high communication overheads. To address these issues, this paper deals with an enhanced dual-active spatial cloaking algorithm (EDA) for preserving location privacy in mobile P2P networks. The proposed EDA allows mobile users to collect and actively disseminate their location information to other users. Moreover, to deal with the challenging characteristics of mobile P2P networks, e.g., constrained network resources and user mobility, EDA enables users (1) to perform a negotiation process to minimize the number of duplicate locations to be shared so as to significantly reduce the communication overhead among users, (2) to predict user locations based on the latest available information so as to eliminate the inaccuracy problem introduced by using some out-of-date locations, and (3) to use a latest-record-highest-priority (LRHP) strategy to reduce the probability of broadcasting fewer useful locations. Extensive simulations are conducted for a range of P2P network scenarios to evaluate the performance of EDA in comparison with the existing solutions. Experimental results demonstrate that the proposed EDA can improve the performance in terms of anonymity and service time with minimized communication overhead.
|
6 articles
|