• Title/Summary/Keyword: Discrete-event simulation

Search Result 392, Processing Time 0.029 seconds

A Hybrid Simulation Technique for Cell Loss Probability Estimation of ATM Switch (ATM스위치의 쎌 손실율 추정을 위한 Hybrid 시뮬레이션 기법)

  • 김지수;최우용;전치혁
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.21 no.3
    • /
    • pp.47-61
    • /
    • 1996
  • An ATM switch must deal with various kinds of input sources having different traffic characteristics and it must guarantee very small value of cel loss probability, about 10$^{8}$ -10$^{12}$ , to deal with loss-sensitive traffics. In order to estimate such a rate event probability with simulation procedure, a variance reduction technique is essential for obtaining an appropriate level of precision with reduced cost. In this paper, we propose a hybrid simulation technique to achieve reduction of variance of cell loss probability estimator, where hybrid means the combination of analytical method and simulation procedure. A discrete time queueing model with multiple input sources and a finite shared buffer is considered, where the arrival process at an input source and a finite shared buffer is considered, where the arrival process at an input source is governed by an Interrupted Bernoulli Process and the service rate is constant. We deal with heterogeneous input sources as well as homogeneous case. The performance of the proposed hybrid simulation estimator is compared with those of the raw simulation estimator and the importance sampling estimator in terms of variance reduction ratios.

  • PDF

A Study on GIS Information System for Shipbuilding Yard Block Logistics Simulation (조선소 야드 블록 물류 시뮬레이션을 위한 GIS 정보 체계 연구)

  • Kim, Sanghun;Lee, Yonggil;Woo, Jonghun;Lim, Hyunkyu
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.2
    • /
    • pp.116-123
    • /
    • 2018
  • These days, geographic information system has released in everyday life and industries. However, the shipyard only uses it to manage the layout of the yard. In this study, we apply the Geographic Information System to shipbuilding block logistics simulation to analyse the behavior of bogies and forklifts carrying blocks and materials in the shipyard. The shipyard manages daily block logistics plans at the execution planning stage. However, since it is a daily plan, it is difficult to respond to an unexpected situation immediately, and application to judge a certain value or higher value is insufficient. Therefore, a simulation model was created using the shape and attribute information inherent in the geographic information system to verify and improve the block logistics of the mid-and long-term yards. Through this simulation model, we will analyse loads on the workplace, stockyard, and road, and contribute to overall logistics improvement from the point of view of resource planning. In addition, the results of the simulation are reflected in the planning, to help support various decisions.

Model Composition Methodology for High Speed Simulation (고속 시뮬레이션을 위한 모델합성 방법)

  • Lee, Wan-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.11
    • /
    • pp.258-265
    • /
    • 2006
  • DEVS formalism is advantageous in modeling large-scale complex systems and it reveals good readability, because it can specify discrete event systems in a hierarchical manner. In contrast, it has drawback in that the simulation speed of DEVS models is comparably slow since it requires frequent message passing between the component models in run-time. This paper proposes a method, called model composition, for simulation speedup of DEVS models. The method is viewed as a compiled simulation technique which eliminates run-time interpretation of communication paths between component models. Experimental results show that the simulation speed of transformed DEVS models is about 18 times faster than original ones.

  • PDF

Implementation of a tactic manager for the target motion analysis simulation of a submarine (잠수함의 표적기동분석 시뮬레이션을 위한 전술처리기의 구현)

  • Cho, Doo-Yeoun;Son, Myeong-Jo;Cha, Ju-Hwan;Lee, Kyu-Yeul;Kim, Tae-Wan;Ko, Yong-Seog
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.65-74
    • /
    • 2007
  • A tactic manager which can change the behavior of a simulation model according to the tactic definition file has been studied and implemented. Based on the DEVS(discrete event system specification) formalism, we generated a simulation model which is equipped with the inter ace to the tactic manager. To demonstrate the effectiveness of the tactic manager, a target motion analysis simulation of the warfare between a submarine and a surface ship is simulated.

  • PDF

Coordination among the Security Systems using the Blackboard Architecture (블랙보드구조를 활용한 보안 모델의 연동)

  • 서희석;조대호
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.4
    • /
    • pp.310-319
    • /
    • 2003
  • As the importance and the need for network security are increased, many organizations use the various security systems. They enable to construct the consistent integrated security environment by sharing the network vulnerable information among IDS (Intrusion Detection System), firewall and vulnerable scanner. The multiple IDSes coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (Blackboard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (Blackboard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete Event system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses to these detection information.

An Evaluation of Flowshop Scheduling Heuristics in a Dynamic Environment (동적(動的)환경에서의 flowshop 작업순서 결정(決定)을 위한 발견적(発見的) 기법(技法)들의 유효성(有效性)에 관한 연구)

  • Park, Yang-Byeong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.12 no.1
    • /
    • pp.19-30
    • /
    • 1986
  • This paper provides an evaluation of static flowshop scheduling heuristics for minimizing makespan as an objective function in the dynamic flowshop model, in which new jobs with stochastic processing times arrive at the shop randomly over time and are added into the waiting jobs for processing. A total of sixteen scheduling heuristics, including several revisions and combinations of previously reported me-sixteen scheduling heuristics, including several revisions and combinations of previously reported methods, are surmmarized. These scheduling rules are evaluated via computer using a SLAM discrete event simulation model. The results for the simulation are analyzed using both statistical and nonstatistical methods. The results from the study suggest which of the popular scheduling rules hold promise for application to practical dynamic flowshop problems.

  • PDF

The Impact of Introducing Information Technology to the Service Part Logistics (서비스부품 로지스틱스의 정보기술 도입 효과)

  • Seo, Sang-Beom;Park, Myung-Sub
    • Korean Management Science Review
    • /
    • v.23 no.3
    • /
    • pp.209-224
    • /
    • 2006
  • The mobile communication technology would be one of the most appropriate means for achieving process innovation in the actual business area. This article performs a simulation study to examine the effect of introducing a mobile technology to the after-sales service and its logistics process. The performances of the two different systems, before and after introducing a mobile technology, are examined based on operational cost, operational efficiency, and customer service level using a discrete event simulation. The real-world data, extracted from a leading Korean electronics firm, was collected for this study. The results show that the TO-BE(after) model outperforms the AS-IS(before) model over all the performance indices. And the effects of introducing the mobile technology are more significant on the more tightly controlled inventory policy.

A Study on the Performance Analysis of Inter-Processor Communication Network for Digital Switching System (대용량 전자교환기 내부통신망 성능 분석에 관한 연구)

  • 최진규;이충근;이태원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.7
    • /
    • pp.1335-1345
    • /
    • 1994
  • In this paper, the performance analysis of Inter-Processor Communication Network(IPCN) in a large-capacity digital switching system, TDX-10, is presented. The simulation model of IPCN is developed using discrete event model of SLAM II. The simulation results of maximum buffer length and mean waiting times at each node, and utilization of D-bus are derived. Finally, the maximum call handling capacity of IPCN is obtained by taking link speed into consideration.

  • PDF

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • Lee Jang-Se;Chi Sung-Do;Choi Gyoo-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (i) it is able to analyze behaviors of systems being emerged by interaction between functional elements of network components, (ii) it is able to analyze vulnerability in quantitative manner, and (iii) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • 이장세;지승도
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.06a
    • /
    • pp.191-198
    • /
    • 2003
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (ⅰ) it is able to analyze behaviors of system emerged by interaction with functional elements of components composing network and each other, (ⅱ) it is able to analyze vulnerability in quantitative manner, and (ⅲ) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF