• Title/Summary/Keyword: Discrete Event System

Search Result 383, Processing Time 0.026 seconds

A Shipyard Simulation System using the Process-centric Simulation Modeling Methodology: Case Study of the Simulation Model for the Shipyard Master Plan Validation (공정 중심 시뮬레이션 모델링 방법론을 이용한 조선소 생산 시뮬레이션 시스템: 중일정계획 검증 시뮬레이션 모델 구축 사례를 중심으로)

  • Jeong, Yong-Kuk;Woo, Jong-Hun;Oh, Dae-Kyun;Shin, Jong-Gye
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.2
    • /
    • pp.204-214
    • /
    • 2016
  • Shipbuilding process takes a long time for producing final products, and needs many different resources. Because of these characteristics, it has been studied about shipyard simulation and virtual manufacturing that is able to implement the virtual manufacturing process. However, among the previous researches, it requires considerable time and effort to construct simulation model since the systematic methodology has not been used for simulation modeling. Also, reusability of constructed simulation model was low. Therefore, this research defines the method to construct shipyard simulation system using the process-centric simulation modeling methodology and shipyard simulation framework. This paper also validates the utility of this methodology through applying to construct simulation model for the shipyard master plan validation.

Initial requirements to the optimal performance of systems modeled by timed place Petri nets using the synchronic time ratio (Synchronic time ratio를 이용 시간 페트리 네트로 모델링된 시스템의 최적 성능에 필요한 초기 조건 결정)

  • Go, In-Seon;Choi, Juang-Hwan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.3 no.1
    • /
    • pp.101-108
    • /
    • 1997
  • The initial token value required to the optimal performance of discrete event systems can be decided by Sum of Delay Time and Synchronic Time ratio, which are new synchronic variables in Timed Place Petri Nets. For the system consisting of two Live-and-Bounded circuits(LB-circuits) fused in common Transition-Transition-Path or common Place-Place-Path, we prove that the Synchronic Time Ratio is the initial token ratio between two LB-circuits to optimally perform system functions. These results are generalized and formulated as a theorem. The initial tokens of a specific place can imply shared resources. Using the theorem, we can decide the minimum number of the shared resources to obtain the optimal performance, and minimize the idling time of resources. As an example, an automated assembly system is modeled by Timed Place Petri Net, and the initial tokens to achieve the optimal system performance are identified. All the values are verified by simulation.

  • PDF

Performance Analysis of Error Recovery System on Distributed Multimedia Environment (분산 멀티미디어 환경에서 실행되는 오류 복구 시스템의 성능 분석)

  • Ko Eung-Nam
    • Journal of Digital Contents Society
    • /
    • v.6 no.1
    • /
    • pp.85-88
    • /
    • 2005
  • The requirement of distributed multimedia applications is the need for sophisticated QoS(quality of service) management. In terms of distributed multimedia systems, the most important catagories for quality of service are a timeless, volume, and reliability. In this paper, we discuss a method for increasing reliability through fault tolerance. We describe the desist and implementation of the ERA running on distributed multimedia environment ERA is a system is able to recover automatically a software error based on distributed multimedia. This paper explains a performance analysis of an error recovery system running on distributed multimedia environment using the rule-based DEVS modeling and simulation techniques. In DEVS, a system has a time base, inputs, states, outputs, and functions.

  • PDF

Task Rescheduling Using a Coordinator in a Structural Decentralized Control of Supervisory Control Systems

  • Lee, Sang-Heon;Kim, Ill-Soo;Kai C. Wong
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.5 no.2
    • /
    • pp.22-31
    • /
    • 2004
  • A problem of task rescheduling using a coordinator in a structural decentralized control of supervisory control theory is formulated. we consider that the overall system is divided into a number of local systems. Using an example of a chemical batch reaction process, it has shown that after local supervisors have been established for a given task, a coordinator can be used to solve some rescheduling problems among local plants for new or modified tasks. The coordination system models the interactions of local plants, and is consisting of only the shared events of local plants, so simpler to synthesize. A coordinator is designed based on the specifications given for the coordination system. Under the 'structural' conditions developed in this paper, the combined concurrent actions of the coordinator with the existing local supervisors will achieve the rescheduling requirements. Again since the conditions are structural (not specification-dependent), once the coordination architecture has been established, it can be used for a number of different tasks without further verifications.

PC-Camera based Monitoring for Unattended NC Machining (무인가공을 위한 PC 카메라 기반의 모니터링)

  • Song, Shi-Yong;Ko, Key-Hoon;Choi, Byoung-Kyu
    • IE interfaces
    • /
    • v.19 no.1
    • /
    • pp.43-52
    • /
    • 2006
  • In order to make best use of NC machine tools with minimal labor costs, they need to be in operation 24 hours a day without being attended by human operators except for setup and tool changes. Thus, unattended machining is becoming a dream of every modern machine shop. However, without a proper mechanism for real-time monitoring of the machining processes, unattended machine could lead to a disaster. Investigated in this paper are ways to using PC camera as a real-time monitoring system for unattended NC milling operations. This study defined five machining states READY, NORMAL MACHINING, ABNORMAL MACHINING, COLLISION and END-OF-MACHINING and modeled them with DEVS (discrete event system) formalism. An image change detection algorithm has been developed to detect the table movements and a flame and smoke detection algorithm to detect unstable cutting process. Spindle on/off and cutting status could be successfully detected from the sound signals. Initial experimentation shows that the PC camera could be used as a reliable monitoring system for unattended NC machining.

Using Artificial Neural Networks for Forecasting Algae Counts in a Surface Water System

  • Coppola, Emery A. Jr.;Jacinto, Adorable B.;Atherholt, Tom;Poulton, Mary;Pasquarello, Linda;Szidarvoszky, Ferenc;Lohbauer, Scott
    • Korean Journal of Ecology and Environment
    • /
    • v.46 no.1
    • /
    • pp.1-9
    • /
    • 2013
  • Algal blooms in potable water supplies are becoming an increasingly prevalent and serious water quality problem around the world. In addition to precipitating taste and odor problems, blooms damage the environment, and some classes like cyanobacteria (blue-green algae) release toxins that can threaten human health, even causing death. There is a recognized need in the water industry for models that can accurately forecast in real-time algal bloom events for planning and mitigation purposes. In this study, using data for an interconnected system of rivers and reservoirs operated by a New Jersey water utility, various ANN models, including both discrete prediction and classification models, were developed and tested for forecasting counts of three different algal classes for one-week and two-weeks ahead periods. Predictor model inputs included physical, meteorological, chemical, and biological variables, and two different temporal schemes for processing inputs relative to the prediction event were used. Despite relatively limited historical data, the discrete prediction ANN models generally performed well during validation, achieving relatively high correlation coefficients, and often predicting the formation and dissipation of high algae count periods. The ANN classification models also performed well, with average classification percentages averaging 94 percent accuracy. Despite relatively limited data events, this study demonstrates that with adequate data collection, both in terms of the number of historical events and availability of important predictor variables, ANNs can provide accurate real-time forecasts of algal population counts, as well as foster increased understanding of important cause and effect relationships, which can be used to both improve monitoring programs and forecasting efforts.

Development of a Synthetic Multi-Agent System;The KMITL Cadence 2003 Robotic Soccer Simulation Team, Intelligent and AI Based Control

  • Chitipalungsri, Thunyawat;Jirawatsiwaporn, Chawit;Tangchupong, Thanapon;Kittitornkun, Surin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.879-884
    • /
    • 2004
  • This paper describes the development of a synthetic multi-agent called KMITL Cadence 2003. KMITL Cadence 2003 is a robotic soccer simulation team consisting of eleven autonomous software agents. Each agent operates in a physical soccer simulation model called Robocup Soccer Server which provides fully distributed and real-time multi-agent system environment. All teammates have to cooperate to achieve the common goal of winning the game. The simulation models many aspects of the football field such as noise in ball movements, noisy sensors, unreliable communication channel between teammates and actuators, limited physical abilities and restricted communication. This paper addresses the algorithm to develop the soccer agents to perform basic actions which are scoring, passing ball and blocking the opponents effectively. The result of this development is satisfactory because the successful scoring attempts is increased from 11.1% to 33.3%, successful passing ball attempts is increased from 22.08% to 63.64%, and also, successful intercepting attempts is increased from 88% to 97.73%.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

Mobile Resource Reliability-based Job Scheduling for Mobile Grid

  • Jang, Sung-Ho;Lee, Jong-Sik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.83-104
    • /
    • 2011
  • Mobile grid is a combination of grid computing and mobile computing to build grid systems in a wireless mobile environment. The development of network technology is assisting in realizing mobile grid. Mobile grid based on established grid infrastructures needs effective resource management and reliable job scheduling because mobile grid utilizes not only static grid resources but also dynamic grid resources with mobility. However, mobile devices are considered as unavailable resources in traditional grids. Mobile resources should be integrated into existing grid sites. Therefore, this paper presents a mobile grid middleware interconnecting existing grid infrastructures with mobile resources and a mobile service agent installed on the mobile resources. This paper also proposes a mobile resource reliability-based job scheduling model in order to overcome the unreliability of wireless mobile devices and guarantee stable and reliable job processing. In the proposed job scheduling model, the mobile service agent calculates the mobile resource reliability of each resource by using diverse reliability metrics and predicts it. The mobile grid middleware allocated jobs to mobile resources by predicted mobile resource reliability. We implemented a simulation model that simplifies various functions of the proposed job scheduling model by using the DEVS (Discrete Event System Specification) which is the formalism for modeling and analyzing a general system. We also conducted diverse experiments for performance evaluation. Experimental results demonstrate that the proposed model can assist in improving the performance of mobile grid in comparison with existing job scheduling models.