• Title/Summary/Keyword: simulation correctness

Search Result 144, Processing Time 0.024 seconds

Model development of electrified railroad supply system for Electromagnetic Transient Analysis (순시치 해석용 전철급전계통 모델개발)

  • 윤재영;최흥관;김종율;위상봉
    • Journal of the Korean Society for Railway
    • /
    • v.5 no.4
    • /
    • pp.253-259
    • /
    • 2002
  • This paper presents the first simulation model using EMTDC program to analyze the electrified train voltage distribution characteristics in ac auto-transformer fed railroads. In general, all of the electrified train supply system has the characteristics that the train supply line is a naturally non-symmetrical and unbalanced system. Also, it is needed to model the Scott transformer which invert the balanced 3-phase quantity into 2-phase. Therefore, the general simulation methodology using previous simplified equivalent circuit or RMS based program can't obtain the accurate results to reflect the real-time operation because these methodology is basically assumed on completely 3-phase balanced system. To overcome these defects, in this paper, the EMTDC simulation model to analysis the completely electrified railroad system with Scott transformer and AC auto-transformer is presented. Also, the correctness of EMTDC modeling is confirmed by the old basic concepts and we think that this EMTDC model has the future powerful capability for application of railroad system analysis.

The Application of welding numerical simulation on two typical welded structures in railway vehicles

  • Ya-na, Li;Cheng-tao, Li;Bin, Yuan;Su-ming, Xie
    • Interaction and multiscale mechanics
    • /
    • v.5 no.2
    • /
    • pp.145-155
    • /
    • 2012
  • The thin-plate structure and the box-beam structure are two typical welded structures in railway vehicles. Because of their structure complexity, bigger size and multi-seams, welding residual distortion which occur in welding process bring unfavorable effect on the quality of welding products manufacturing and service. As a result, welding distortion forecasting and control become an important and urgent research topic in railway vehicles. In this paper, three different numerical methods are presented corresponding to three typical types of welded structures of railway vehicles and welding deformation are simulated. Consistence of numerical results and experimental data proves the correctness of models and feasibility of simulation methods.

A Test Framework for Dynamically Supporting the Simulation Works of the Global Navigation Satellite Systems (위성항법 시뮬레이션 작업을 동적으로 지원하는 테스트 프레임워크)

  • Kuk, Seung-Hak;Kim, Hyeon-Soo;Lee, Sang-Uk
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.191-203
    • /
    • 2009
  • Simulation is the work that identifies the characteristics of some problem through the simulated experiments. During the experiments it is frequently required to change or replace the simulation models, algorithms, or input/output data. Especially, in the case of the simulation works performed by replacing algorithms, if a replaceable component that implements a specific algorithm is not correct with respect to its functionality it is very difficult to carry out the simulation works successfully. In this paper, we suggest a test framework that verifies functional correctness of the replaceable component in the software-based GNSS (Global Navigation Satellite System) simulation environments. When a component is replaced, this framework enables us to properly execute the functional test for the component according to its context.

  • PDF

qPALS: Quality-Aware Synchrony Protocol for Distributed Real-Time Systems

  • Kang, Woochul;Sha, Lui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3361-3377
    • /
    • 2014
  • Synchronous computing models provided by real-time synchrony protocols, such as TTA [1] and PALS [2], greatly simplify the design, implementation, and verification of real-time distributed systems. However, their application to real systems has been limited since their assumptions on underlying systems are hard to satisfy. In particular, most previous real-time synchrony protocols hypothesize the existence of underlying fault tolerant real-time networks. This, however, might not be true in most soft real-time applications. In this paper, we propose a practical approach to a synchrony protocol, called Quality-Aware PALS (qPALS), which provides the benefits of a synchronous computing model in environments where no fault-tolerant real-time network is available. qPALS supports two flexible global synchronization protocols: one tailored for the performance and the other for the correctness of synchronization. Hence, applications can make a negotiation flexibly between performance and correctness. In qPALS, the Quality-of-Service (QoS) on synchronization and consistency is specified in a probabilistic manner, and the specified QoS is supported under dynamic and unpredictable network environments via a control-theoretic approach. Our simulation results show that qPALS supports highly reliable synchronization for critical events while still supporting the efficiency and performance even when the underlying network is not stable.

DEVSim++ - NS2 Interoperating Environment for Protocol Evaluation (프로토콜 평가를 위한 DEVSim++ 와 NS2 의 연동 환경)

  • 김회준;김탁곤
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2002.05a
    • /
    • pp.253-258
    • /
    • 2002
  • This paper proposes a methodology for development of protocol models. The methodology attempts to employ two modeling environments in models development, NS2 and DEVSim++, which will interoperate during simulation. NS2 is a widely used network simulator in protocol research, which employs an informal modeling approach. Within the approach time and state information of protocol models are not explicitly described, thus being hard to validate model. On the other hand the DEVS formalism is a mathematical framework for modeling a discrete event system in a hierarchical, modular manner. In DEVS, model's time and state information is described explicitly, By using DEVS formalism, models can easily be validated and errors in the modeling stage can be reduced. However, the DEVS simulator, DEVSim++, supports a small amount of models library which are required to build simulation models of general communication network. Although NS2 employs an informal modeling approach and models validation is difficult, it supports abundant models library validated by experimental users. Thus, combination of DEVS models and NS2 models may be an effective solution for network modeling. Such combination requires interoperation between DEVSim++ simulator and NS2 simulator. This paper develops an environment for such interoperation. Correctness and effectiveness of the implemented interoperation environment have been validated by simulation of UDP and TCP models.

  • PDF

Half Load-Cycle Worked Dual Input Single Output DC/AC Inverter

  • Chen, Rong;Zhang, Jia-Sheng
    • Journal of Power Electronics
    • /
    • v.14 no.6
    • /
    • pp.1217-1223
    • /
    • 2014
  • A novel half load-cycle worked dual input single output (DISO) DC/AC inverter is presented. The basic circuit consists of a dual buck regulator, which works in continuous current mode. The working principle of DISO DC/AC inverter has been used. The control method applied for half load-cycle worked DISO DC/AC inverter has been studied. The control effects of the open-loop proportional control and closed-loop proportional-integral control are compared by using PSIM software. The parameters are adopted in the realistic simulation and experiment test. Moreover, the waveforms, such as voltage of modulation reference signal and output voltage, were given. The simulation and experiment results proved that the half load-cycle worked DISO DC/AC inverter could achieve good performance, gain a line frequency of 50 Hz, and verify the correctness of theoretical analysis.

Analysis of Coarse Acquisition Code Generation Algorithm in GPS System (GPS 시스템의 C/A 부호 생성 알고리듬의 분석)

  • Zhang, Wei;Suh, Hee-Jong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.61-68
    • /
    • 2017
  • In this paper, the coarse acquisition code (C/A code), for civil navigation, of the ranging codes for Global Positioning System (GPS) is studied, simulated and analyzed by using Matlab. We can see with the simulation results that the correctness of the method and feasibility, which is at simulation platform to further study on the real environment of GPS signal, can be confirmed. With using this results, we think, the complexity of tracking the satellite signal environment can be captured, and the performance of satellite receiver will be improved.

Numerical Analysis on Pressure Characteristics of the Pipe system of Train

  • Nam Seong-Won;Zhang Bo
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.503-509
    • /
    • 2004
  • With modem computational fluid dynamics method (CFD), air-charging models of the air brake pipe system and auxiliary reservoir are built. Compared with one-dimension model, no empirical formula is introduced to solve branch pipe fields for two-dimension model. A modified operator-splitting method is presented to solve the coupled equations of pressure and velocity, and numerical simulation shows that it is very stable. Compare the numerical results with empirical data of heavy haul trains in home and abroad so as to prove the correctness of the theory and algorithm presented. This paper gives theoretic reference to the experiments of braking effects of heavy haul trains, and forms a basis for development of complete freight train air brake system simulation.

  • PDF

Design and Implementation of Network Defense Simulator (네트워크 방어 시뮬레이터 설계 및 구현)

  • 이철원;윤주범;임을규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.441-447
    • /
    • 2004
  • Information security simulator is required for the study on the cyber intrusion and defense as information security has been increasingly popular Until now, the main purposes of information security simulation are security estimation of small network as well as performance analysis of information protection systems. However, network simulators that can simulate attacks in a huge network are in needs since large scale internet attacks are very common in these days. In this paper we proposed a simulator design and its implementation details. Our simulator is implemented by expanding the SSFNet program to the client-sewer architecture. A cyber attack scenario used in our simulator is composed by the advanced attack tree model. We analyzed the simulation results to show the correctness of our network defense simulator.

An Automatic Simulation Technique for UML State Machine Diagrams based on Abstract Scenarios in Sequence Diagrams (순차도의 추상 시나리오 기반의 UML 상태 머신 다이어그램 시뮬레이션 기법)

  • Guo, Hui;Lee, Woo-Jin
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.6
    • /
    • pp.443-450
    • /
    • 2009
  • In an earlier development phase, the simulation technique is one of the key analysis methods for checking the correctness of system's functional requirements. In general, simulation is manually or randomly performed by executing state machine diagrams according to the requirement scenarios. Therefore, simulation is one of the most effort-consuming tasks. In this paper, an automatic simulation technique of state machine diagrams is provided according to the scenarios of the sequence diagrams. It is not easy to generate detailed simulation traces from sequence diagrams due to different abstraction levels between sequence diagrams and state machine diagrams. In order to adjust for different abstraction levels, state machine diagrams and sequence diagrams are transformed into LTS models and compositional analysis and transition reduction are performed. After checking behavior conformance between them, detailed simulation traces for the state machine diagrams are generated. These simulation traces are used not only for performing automatic simulation but also for assisting analyzers to reach a specific system state in order to guide further efficient simulation.