• Title/Summary/Keyword: simulation-based method

Search Result 9,916, Processing Time 0.039 seconds

High-level Discrete-event Modeling-based Business Process Simulation for the Scheduling of the Ship Hull Production Design (조선 선체 생산설계 일정 계획을 위한 상세 이산사건 모델링기반 비즈니스 프로세스 시뮬레이션)

  • Son, Myeong-Jo;Kim, Tae-Wan
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.3
    • /
    • pp.224-233
    • /
    • 2013
  • For the scheduling and the job assignment of the ship hull production design which is a process-based work, we suggest the simulation-based scheduling using the discrete-event-based business process simulation. First, we analyze the ship hull production design process from the perspective of a job assignment to make it into the simulation model using DEVS (Discrete Event System Specification) which is the representative modeling method for a discrete-event simulation. Based on the APIs of the open-source discrete-event simulation engine, we implement the simulation using the Groovy script. We develop the scenario generator in which the user defines detail information of the construction drawing and its member blocks, and design engineers information, and the various setting for the simulation including the job assignment strategy. We use the XML files from this scenario generator as inputs of simulation so that we can get simulation result in forms of Gantt chart without changes of the simulation model.

Agent-based Automatic Camera Placement for Video Surveillance Systems (영상 감시 시스템을 위한 에이전트 기반의 자동화된 카메라 배치)

  • Burn, U-In;Nam, Yun-Young;Cho, We-Duke
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.103-116
    • /
    • 2010
  • In this paper, we propose an optimal camera placement using agent-based simulation. To derive importance of space and to cover the space efficiently, we accomplished an agent-based simulation based on classification of space and pattern analysis of moving people. We developed an agent-based camera placement method considering camera performance as well as space priority extracted from path finding algorithms. We demonstrate that the method not only determinates the optimal number of cameras, but also coordinates the position and orientation of the cameras with considering the installation costs. To validate the method, we compare simulation results with videos of real materials and show experimental results simulated in a specific space.

Computer Simulation of Complex Hot Forging Processes by a Forging Simulator Based on Finite Volume Method (유한체적법에 근거한 단조공정 시뮬레이터를 이용한 난형상 열간단조 공정의 컴퓨터 시뮬레이션)

  • Kim, B.T.;Eom, J.G.;Choi, I.S.;Lee, M.C.;Park, S.Y.;Joun, M.S.
    • Transactions of Materials Processing
    • /
    • v.16 no.3 s.93
    • /
    • pp.187-192
    • /
    • 2007
  • The finite volume method for forging simulation is examined to reveal its possibility as well as its problem in this paper. For this study, the finite volume method based MSC/SuperForge and the finite element method based AFDEX are employed. The simulated results of the homogeneous compression obtained by the two softwares are compared to indicate the problems of the finite volume method while several application examples are given to show the possibility of the finite volume method fur simulation of complex hot forging processes. It is shown that the finite volume method can not predict the exact solution of the homogeneous compression especially in terms of forming load and deformed shape but that it is helpful to simulate very complex forging processes which can hardly be simulated by the conventional finite element method.

Attacker and Host Modeling for Cyber-Attack Simulation (사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링)

  • 정정례;이장세;박종서;지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.2
    • /
    • pp.63-73
    • /
    • 2003
  • The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

  • PDF

Simulation Optimization Methods with Application to Machining Process (시뮬레이션 최적화 기법과 절삭공정에의 응용)

  • 양병희
    • Journal of the Korea Society for Simulation
    • /
    • v.3 no.2
    • /
    • pp.57-67
    • /
    • 1994
  • For many practical and industrial optimization problems where some or all of the system components are stochastic, the objective functions cannot be represented analytically. Therefore, modeling by computer simulation is one of the most effective means of studying such complex systems. In this paper, with discussion of simulation optimization techniques, a case study in machining process for application of simulation optimization is presented. Most of optimization techniques can be classified as single-or multiple-response techniques. The optimization of single-response category, these strategies are gradient based search methods, stochastic approximate method, response surface method, and heuristic search methods. In the multiple-response category, there are basically five distinct strategies for treating the responses and finding the optimum solution. These strategies are graphical method, direct search method, constrained optimization, unconstrained optimization, and goal programming methods. The choice of the procedure to employ in simulation optimization depends on the analyst and the problem to be solved.

  • PDF

Integrated Dynamic Simulation of a Magnetic Bearing Stage and Control Design (자기베어링 스테이지의 동적 거동 통합 시뮬레이션을 통한 제어 설계)

  • Kim, Byung-Sub
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.22 no.4
    • /
    • pp.730-734
    • /
    • 2013
  • The dynamic simulation of machine tools and motion control systems has been widely used for optimization, design verification, control design, etc. There are three main streams in dynamic simulation: structural dynamic analysis based onthe finite element method, dynamic motion analysis based on equations of motion, and control system analysis based on transfer functions. Generally, one of these dynamic simulation methods is chosen and employed for specific purposes. In this study, an integrated dynamic simulation is introduced, in which the structure, motion, and control dynamics are combined together. Commercially well-known software is used in the integrated dynamic simulation: ANSYS, ADAMS, and Matlab/Simulink. Using the integrated dynamic simulation, the dynamics of a magnetic bearing stage is analyzed and the causes of oscillation and noise are identified. A controller design for suppressing a flexible dynamic mode is carried out and verified through the integrated dynamic simulation.

Numerical Simulation for an Air-Solid Two-Phase Flow in a Vertical Pipe (기체 흐름에 고체입자가 섞인 파이프 내의 이상유동에 대한 수치 해석)

  • Pak S. I.;Chang K. S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.41-46
    • /
    • 2002
  • A numerical simulation was made to determine the motion of particles in the fluid. The simulation is based on the Eulerian-Lagrangian method. The fluid motion was solved using a PISO-based finite-element method and a $\kappa-\epsilon$ model of turbulence. In the Lagrangian method for the solid phase, the trajectories of particles are calculated by integrating the equations of motion of a single Particle, and the collision between particles are taken into account. The influence of particles on the fluid phase is taken into account by introducing source terms in the Eulerian equations govering the fluid flow. It is known as the particle-source-in-cell (PSIC) method. Also, the turbulent effect in the particles and fluid notion is considered. The numerical results were compared with the experiment for a two-phase flow in a vertical pipe.

  • PDF

Simulation Reconfiguration using Entity Plug-in approach for Weapon System Effectiveness Analysis (무기체계 효과도 분석을 위한 개체 플러그인 방식의 모의 재구성 연구)

  • Kim, Taeyoung
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.49-59
    • /
    • 2018
  • The simulation-based weapon system effectiveness analysis is to support the decision making in the acquisition process of the defense domain. The effectiveness of the weapon system is a complexly influenced indicator from various factors such as environment, doctrine and so on. And the measurement of effectiveness can be defined differently in compliance with major issues in the weapon system. Because of this, the weapon system effectiveness analysis requires the comparative experiment of various alternatives based on the underlying assumption. This paper presents the efficient approach to reconfigure the simulation using the reflection technique. The proposed method contains the recoupling and resetting the simulation entity using DEVS(Discrete EVent System specification) formalism-based dynamic plug-in method. With the proposed method, this paper designs the effectiveness analysis environment that can efficiently handle the various alternatives of the weapon system.

A simulation/analytic approach for queueing network analysis

  • Yoon, Bok-Sik
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.10a
    • /
    • pp.359-364
    • /
    • 2001
  • In this study, we try to improve the accuracy of QN-GPH by the help of simulation approach. We first establish an estimation method for GPH distributions with sufficient accuracy based on empirical distribution, and then perform a brief trial run to find appropriate empirical distributions. After getting GPH form of distributions, we continue the QN-GPH analytic steps and compute necessary performance measures. We apply the method to find sojourn time distributions in a 8-node queueing system and compare the results with the whole simulation and the original two-parametric approximation.

  • PDF

Simulation based improved seismic fragility analysis of structures

  • Ghosh, Shyamal;Chakraborty, Subrata
    • Earthquakes and Structures
    • /
    • v.12 no.5
    • /
    • pp.569-581
    • /
    • 2017
  • The Monte Carlo Simulation (MCS) based seismic fragility analysis (SFA) approach allows defining more realistic relationship between failure probability and seismic intensity. However, the approach requires simulating large number of nonlinear dynamic analyses of structure for reliable estimate of fragility. It makes the approach computationally challenging. The response surface method (RSM) based metamodeling approach which replaces computationally involve complex mechanical model of a structure is found to be a viable alternative in this regard. An adaptive moving least squares method (MLSM) based RSM in the MCS framework is explored in the present study for efficient SFA of existing structures. In doing so, the repetition of seismic intensity for complete generation of fragility curve is avoided by including this as one of the predictors in the response estimate model. The proposed procedure is elucidated by considering a non-linear SDOF system and an existing reinforced concrete frame considered to be located in the Guwahati City of the Northeast region of India. The fragility results are obtained by the usual least squares based and the proposed MLSM based RSM and compared with that of obtained by the direct MCS technique to study the effectiveness of the proposed approach.