• Title/Summary/Keyword: agent-based modelling

Search Result 18, Processing Time 0.026 seconds

Analysis of Land Use Change using Agent based Modelling Approach (행위자기반모형을 이용한 토지이용 변화 분석)

  • Ko, Jin-Seok;Jee, Hong-Kee;Lee, Soon-Tak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.1361-1364
    • /
    • 2009
  • 최근 몇 년동안 지속가능하고 효과적인 수자원 관리는 전체적인 접근방법이 요구되고 있으며, 사회와 경제발전과 생태계 보호 및 토지이용과 수자원 이용의 적절한 관리와 연결된 개념이 필요하다. 이러한 관점에서 유역을 간단한 고정된 지역적인 문제라고 생각하는 것보다 전체로서의 유역 기능을 개선하는데 노력이 필요하다. 또한 사회와 경제발전으로 인해 도시화, 여가 관광지역 및 사회기반시설의 확장 그리고 자연환경의 변화가 발행하고 있다. 효과적인 토지이용 배분과 자연지역의 보호도 중요하지만 잠재적인 홍수피해 저감도 중요한 문제이다. 토지이용의 변화는 많은 이해관계자들로부터 유발되는 문제이기 때문에 거시적인 관점에서 고려되어야 한다. 본 논문은 다양한 관계자와 자연환경과의 연결과 상호작용 유형을 이해하고 다양한 정책선택과 자연환경 상태가 토지이용 변화에 미치는 영향을 이해하고자 한다. 인간의 활동으로 인해 발생하는 토지이용의 변화를 모의하기 위해서 행위자기반모형(Agent based Model, ABM)으로 접근하고자 한다. ABM은 유역관리의 이해당사자간의 정책과정을 도출하고 다양한 유역관리 대안을 평가하기 위해서 홍수위험, 자연개발 및 비용과 같은 유역관리의 영향을 설명하는 통합된 유역모델이다. 여기서 토지이용은 경제적, 지형학적 상황, 공간계획 및 홍수방어정책에 좌우되며, 토지의 속성과 규칙을 통해 토지이용이 선택되게 된다. 본 모형을 통해 공간적으로 분포된 행위자의 운영을 기반으로 종합적인 토지이용 패턴을 분석하였다, 이를 통해 토지이용 결정에 영향을 주는 인자를 추정하여 통합홍수관리 목적에 맞는 관리 대책의 결정 및 설계를 가능토록 하였다.

  • PDF

Which Node of Supply Chain Suffers Mostly to Disruption in the Pandemic?

  • NGUYEN, Tram Thi Bich
    • Journal of Distribution Science
    • /
    • v.19 no.11
    • /
    • pp.59-68
    • /
    • 2021
  • Purpose: The Covid-19 pandemic has had excessively severe impacts on all the nodes and edges of any supply chain due to changes in consumer behaviours and lockdown restrictions from governments among countries. This article aims to provide a simulating experiment on how a supply chain deals with supply disruption risks by flexibility in the inventory level of each sector as a buffer considering the overall cost to fulfil demand in the market. Research design, data and methodology: Agent-based simulation techniques are used to determine the cost-efficiency and customer waiting time related to varying inventory levels of each member in the supply chain when using inventory buffers. Findings: This study has shown that any sudden changes in the inventory level of each sector are likely to impact the rest of the supply chain. Among all sectors, the wholesaler will be impacted more severely than others. Also, the manufacturing sector is the most suitable node to adjust inventory depending on its manufacturing ability. Conclusion: The findings of the study provide insightful implications for decision-makers to adjust inventory levels and policymakers to maintain manufacturing activities in the context of the pandemic restrictions to deal with the excessive demand and potential supply disruption risks.

A Numerical Study on the Effects of Drug Ejection Velocity on Endovascular Thrombolysis

  • Jeong Woo Won;Rhee Kyehan
    • Journal of Biomedical Engineering Research
    • /
    • v.26 no.3
    • /
    • pp.157-161
    • /
    • 2005
  • Direct injection of a fibrinolytic agent to the intraarterial thrombosis may increase the effectiveness of thrombolysis by enhancing the permeation of thrombolytic agents into the blood clot. Permeation of fibrinolytic agents into a clot is influenced by the surface pressure, which is determined by the injection velocity of fibrinolytic agents. In order to calculate the pressure distribution on the clot surface for different jet velocities (1, 3, 5 m/sec) and nozzle arrangements (1, 9, 17 nozzles), computational fluid dynamic methods were used. Thrombolysis of a clot was mathematically modeled based on the pressure and lysis front velocity relationship. Direct injection of a thrombolytic agent increased the speed of thrombolysis significantly and the effectiveness was increased as the ejecting velocity increased. The nine nozzles model showed about $20\%$ increase of the lysed volume, and the one and seventeen nozzles models did not show significant differences. The wall shear stress decreased as the number of nozzles increased, and the wall shear stress in most vessel wall was lower than 25 Pa. The results implied that thrombolysis could be accelerated by direct injection of a drug with the moderate velocity without damaging the blood vessel wall.

A Study on the Chemical Warfare Agents Dispersion Modelling in a Naturally Ventilated Indoor System (자연환기상태 실내공간에서의 화학작용제 확산 모델링 연구)

  • Kye, Young-Sik;Chung, Woo-Young;Kim, Yong-Joon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.4
    • /
    • pp.133-140
    • /
    • 2008
  • The purpose of this study is to provide response methods to minimize the damage from chemical terrorism in a naturally ventilated indoor system using several types of dispersion simulations. Three chemical warfare agents such as sarin(GB), phosgene and chlorine gas which have high potential to be used in terror or to be involved with accidents were selected in this simulation. Fire dynamic simulation based on Large Eddy Simulation which is effective because of less computational effort and detailed expression of the dispersion flow was adopted to describe the dispersion behavior of these agents. When the vent speed is 0.005m/s, the heights of 0.1 agent mass fraction are 0.9m for sarin, 1.0m for phosgene and 1.1m for chlorine gas, and the maximum mass fraction are 0.27 for all three agents. However, when the vent speed is increased to 0.05m/s, the heights of 0.1 agent mass fraction become 1.6m for all three agents and maximum mass fraction inside the room increase to 0.70 for sarin, 0.58 for phosgene and 0.53 for chlorine gas. It is shown that molecular weight of the agents has an important role for dispersion, and it is important to install ventilation system with height less than 1.6m to minimize the damage from chemical toxicity.

Development of Heterarchical SFCS Execution Module using E-Net (E-Net을 이용한 Heterarchical SFCS 실행 모듈 개발)

  • Hong, Soon-Do;Cho, Hyun-Bo;Jung, Moo-Young
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.25 no.1
    • /
    • pp.87-99
    • /
    • 1999
  • A shop floor control system(SFCS) performs the production activities required to fill orders. In order to effectively control these activities, the autonomous agent-based heterarchical shop floor control architecture is adopted where a supervisor does not exist. In this paper, we define functional perspective of the heterarchical shop floor control using planning, scheduling, and execution modules. In particular, we focus on an execution module that can coordinate the planning and scheduling modules and a general execution module that easily can be modified to execute the other equipment. The execution module can be defined informally as a module that downloads and performs a set of scheduled tasks. The execution module is also responsible for identifying and resolving various errors whether they come from hardware or software. The purpose of this research is to identify all the execution activities and solving techniques under the assumptions of the heterarchical control architecture. And we model the execution module in object-oriented modelling technique for generalization. The execution module modeled in object-oriented concept can be adopted to the other execution module easily. This paper also proposes a classification scheme for execution activities of the heterarchical control architecture. Petri-nets are used as a unified framework for modeling and controlling execution activities. For solving the nonexistence of a supervisor, a negotiation-based solution technique is utilized.

  • PDF

Vessel and Navigation Modeling and Simulation based on DEVS Formalism : Design for Navigation Simulation Architecture with Modeling for Critical Systems and Agents of Vessel (DEVS 형식론 기반의 선박 항해 모델링 및 시뮬레이션 (I) : 항해 시뮬레이션 아키텍처 설계와 선박 핵심 장비 및 에이전트 모델링)

  • Woo, Sang-Min;Lee, Jang-Se;Hwang, Hun-Gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1038-1048
    • /
    • 2019
  • Recently, various systems have been developed to support ship navigation safety. In order to verify the usefulness of such a system, it is most ideal to try it on a real vessel, but there are many difficulties. As an alternative, usability verification methods applied with modelling and simulation (M&S) techniques are required such as FMSS, which is closest to reality, is very expansive to construct, and there needs the specialized operator. For this reason, this paper proposes a method to verify the navigation safety support system by modeling and simulation techniques based on the Discrete Event System Specification (DEVS) formalism. As a first step, we designed the navigation simulation architecture based on the SES/MB framework, and details on modelling ship core equipment and navigator agents based on the DEVS. Through this, we are able to implement the navigation simulation system for vessels, and evaluate the effectiveness of navigation safety support elements such as collision avoidance, etc. using developed scenarios.

Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems

  • Idriss, Rim;Loukil, Adlen;Khalgui, Mohamed;Li, Zhiwu;Al-Ahmari, Abdulrahman
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.5
    • /
    • pp.2051-2066
    • /
    • 2017
  • This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper's contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.

Dynamic Limit and Predatory Pricing Under Uncertainty (불확실성하(不確實性下)의 동태적(動態的) 진입제한(進入制限) 및 약탈가격(掠奪價格) 책정(策定))

  • Yoo, Yoon-ha
    • KDI Journal of Economic Policy
    • /
    • v.13 no.1
    • /
    • pp.151-166
    • /
    • 1991
  • In this paper, a simple game-theoretic entry deterrence model is developed that integrates both limit pricing and predatory pricing. While there have been extensive studies which have dealt with predation and limit pricing separately, no study so far has analyzed these closely related practices in a unified framework. Treating each practice as if it were an independent phenomenon is, of course, an analytical necessity to abstract from complex realities. However, welfare analysis based on such a model may give misleading policy implications. By analyzing limit and predatory pricing within a single framework, this paper attempts to shed some light on the effects of interactions between these two frequently cited tactics of entry deterrence. Another distinctive feature of the paper is that limit and predatory pricing emerge, in equilibrium, as rational, profit maximizing strategies in the model. Until recently, the only conclusion from formal analyses of predatory pricing was that predation is unlikely to take place if every economic agent is assumed to be rational. This conclusion rests upon the argument that predation is costly; that is, it inflicts more losses upon the predator than upon the rival producer, and, therefore, is unlikely to succeed in driving out the rival, who understands that the price cutting, if it ever takes place, must be temporary. Recently several attempts have been made to overcome this modelling difficulty by Kreps and Wilson, Milgram and Roberts, Benoit, Fudenberg and Tirole, and Roberts. With the exception of Roberts, however, these studies, though successful in preserving the rationality of players, still share one serious weakness in that they resort to ad hoc, external constraints in order to generate profit maximizing predation. The present paper uses a highly stylized model of Cournot duopoly and derives the equilibrium predatory strategy without invoking external constraints except the assumption of asymmetrically distributed information. The underlying intuition behind the model can be summarized as follows. Imagine a firm that is considering entry into a monopolist's market but is uncertain about the incumbent firm's cost structure. If the monopolist has low cost, the rival would rather not enter because it would be difficult to compete with an efficient, low-cost firm. If the monopolist has high costs, however, the rival will definitely enter the market because it can make positive profits. In this situation, if the incumbent firm unwittingly produces its monopoly output, the entrant can infer the nature of the monopolist's cost by observing the monopolist's price. Knowing this, the high cost monopolist increases its output level up to what would have been produced by a low cost firm in an effort to conceal its cost condition. This constitutes limit pricing. The same logic applies when there is a rival competitor in the market. Producing a high cost duopoly output is self-revealing and thus to be avoided. Therefore, the firm chooses to produce the low cost duopoly output, consequently inflicting losses to the entrant or rival producer, thus acting in a predatory manner. The policy implications of the analysis are rather mixed. Contrary to the widely accepted hypothesis that predation is, at best, a negative sum game, and thus, a strategy that is unlikely to be played from the outset, this paper concludes that predation can be real occurence by showing that it can arise as an effective profit maximizing strategy. This conclusion alone may imply that the government can play a role in increasing the consumer welfare, say, by banning predation or limit pricing. However, the problem is that it is rather difficult to ascribe any welfare losses to these kinds of entry deterring practices. This difficulty arises from the fact that if the same practices have been adopted by a low cost firm, they could not be called entry-deterring. Moreover, the high cost incumbent in the model is doing exactly what the low cost firm would have done to keep the market to itself. All in all, this paper suggests that a government injunction of limit and predatory pricing should be applied with great care, evaluating each case on its own basis. Hasty generalization may work to the detriment, rather than the enhancement of consumer welfare.

  • PDF