By Topic

Advances in System Simulation, 2009. SIMUL '09. First International Conference on

Date 20-25 Sept. 2009

Filter Results

Displaying Results 1 - 25 of 36
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (316 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • An Index Based Threat Modeling Method for Path Planning

    Publication Year: 2009, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1511 KB) | HTML iconHTML

    Path planning is an effective means to improve the operational effectiveness of aircrafts. A reasonable estimation and description of threats existing in operation space are significant before generating a specific path for an aircraft. To avoid depending on experts' experience excessively when we evaluate the threat situations, an index based threat modeling method named IBTMM is proposed. IBTMM ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Monte Carlo Based Procedure for Analyzing Discrete-Time, Nonstationary Simulation Responses Using Classical Time Series Models

    Publication Year: 2009, Page(s):6 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (727 KB) | HTML iconHTML

    In this paper, we propose a procedure for analyzing discrete-time; nonstationary discrete-event simulation responses based on Monte Carlo integration and the use of classical ARIMA (or SARIMA) time-series models. The procedure is illustrated with an exploding single-server queue and a bounded cyclical traffic situation. Some conclusions and recommendations for further work are stated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of Monte Carlo and Quasi Monte Carlo Sampling Methods in High Dimensional Model Representation

    Publication Year: 2009, Page(s):12 - 17
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    A number of new techniques which improve the efficiency of random sampling-high dimensional model representation (RS-HDMR) is presented. Comparison shows that quasi Monte Carlo based HDMR (QRS-HDRM) significantly outperforms RS-HDMR. RS/QRS-HDRM based methods also show faster convergence than the Sobol method for sensitivity indices calculation. Numerical tests prove that the developed methods for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Level Approach for Validation of Microscopic Simulation Models

    Publication Year: 2009, Page(s):18 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    New driver assistance systems can have consequential effects on traffic flow. Investigative simulations are necessary for the design, optimization and evaluation of these assistance systems. Previous calibration and validation methods utilized either microscopic or macroscopic measurement data.This paper's purpose is to argue that the formerly held calibration and validation perspectives with rega... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation Model of a Single-Server Order Picking Workstation Using Aggregate Process Times

    Publication Year: 2009, Page(s):23 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1292 KB) | HTML iconHTML

    In this paper we propose a simulation modeling approach based on aggregate process times for the performance analysis of order picking workstations in automated warehouses with first-in-first-out processing of orders. The aggregate process time distribution is calculated from tote arrival and departure times. We refer to the aggregate process time as the effective process time. We distinguish betw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling for Web Services Composition System with Restricted Resources

    Publication Year: 2009, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4740 KB) | HTML iconHTML

    The Web services composition system usually has restricted resources in many practical applications. The system performance is closely related to the system resource. Firstly, a basic generalized stochastic Petri net model, constructed via service composition plan or language mapping for the purpose of performance presented. Nevertheless, the basic model can not reflect the characteristics of syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority Cycle Time Behavior Modeling for Semiconductor Fabs

    Publication Year: 2009, Page(s):38 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    Semiconductor wafer fabrication factories (fabs)often offer wafer manufacturing services of multiple priorities in terms of differentiated cycle time-based targets and fab production must be planned accordingly. This paper aims to develop modeling methods and fab behavior models to capture cycle times of differentiated manufacturing services for semiconductor supply chain management. A novel, hybr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simulation of the Pharmaceutical Supply Chain to Provide Realistic Test Data

    Publication Year: 2009, Page(s):44 - 49
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (161 KB) | HTML iconHTML

    The amount of counterfeit pharmaceuticals in the European-pharmaceutical supply chain increased enormously in the past years. Thus, the European Commission introduced an amendment which will lead to new information systems. No realistic test data for these information systems is available yet which hinders the progress in designing and implementing appropriate information systems. We make a first ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling of the Uncertainty of Nuclear Fuel Thermal Behaviour Using the URANIE Framework

    Publication Year: 2009, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    In the global framework of nuclear fuel behaviour simulation, the response of the models describing the physical phenomena occurring during the irradiation in reactor is mainly conditioned by the confidence in the calculated temperature of the fuel. Amongst all parameters influencing the temperature calculation in our fuel rod simulation code (METEOR V2), three sources of uncertainty have been ide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a Collection of Principles, Techniques, and Elements of Modeling and Simulation Software

    Publication Year: 2009, Page(s):56 - 61
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Numerous modeling and simulation software products have been developed in the last decades. Most of them have been created from scratch, often dedicated to single formalisms, single simulation algorithms, hardware platforms, or applications. But nevertheless each of these software products has to follow principles, and it has to contain techniques and elements to be usable for modeling and simulat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiments with Single Core, Multi-core, and GPU Based Computation of Cellular Automata

    Publication Year: 2009, Page(s):62 - 67
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    Cellular automata are a well-known modeling formalism exploited in a wide range of application areas. In many of those, the complexity of models hampers a thorough analysis of the system under study. Therefore, efficient simulation algorithms are required. We present here a comparison of seven different simulation algorithms for cellular automata: the classical ldquofullrdquo simulator, the classi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Ontology for Aircraft Route Planning

    Publication Year: 2009, Page(s):68 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB) | HTML iconHTML

    An amount of methods used in route planning (RP) for aircraft have emerged during the last few years. It is difficult to master these methods and make a fast choice to use among them, which results from the lack of domain knowledge representation and reuse of RP. To achieve the domain knowledge reuse and efficient planning process, an ontology defined by Web ontology language (OWL) for RP dubbed O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Design of Network Simulation Environment Using SSFNet

    Publication Year: 2009, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Network simulation tool is needed to verify the functionalities and performance of networks. The SSFNet (scalable simulation framework network models) is a network simulation tool using open source software with various network simulation applications. It has been designed for the expansion of network including topology, protocols, traffic, and etc, and is able to support simulation for the large-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Review of Available Software for the Creation of Testbeds for Internet Security Research

    Publication Year: 2009, Page(s):79 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    The increasing use of experimental platforms for networking research is due to their ability to support experimentation with complex systems, like the Internet, that simplistic simulators and small scale testbeds fail to reproduce. Therefore many projects and research initiatives have spawned - mainly in the field of Future Internet architectures. Although numerous publications can be found, most ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • G-Sense - A Graphical Interface for SENSE Simulator

    Publication Year: 2009, Page(s):88 - 93
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    Wireless sensor networks greatly benefit from simulation before deployment, since some of these networks may contain thousands of nodes. The new challenges compared to traditional computer networks led to several approaches for network simulation, namely SENSE - Sensor Network Emulator and Simulator. However this approach presents a limited user interface, namely based on text, forcing users to ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uncertainty Assessments in Severe Nuclear Accident Scenarios

    Publication Year: 2009, Page(s):94 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    Managing uncertainties in industrial systems is a daily challenge to ensure improved design, robust operation, accountable performance and responsive risk control. This paper aims to illustrate the different depth analyses that the uncertainty software LEONAR, devoted to a specific application, can propose. The physical model of LEONAR describes some of the phenomena, related to the molten core be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Numerical Study of the Metamodel Validation Process

    Publication Year: 2009, Page(s):100 - 105
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Complex computer codes are often too time expensive to be directly used to perform uncertainty, sensitivity, optimization and robustness analyses. A widely accepted method to circumvent this problem consists in replacing cpu time expensive computer models by cpu inexpensive mathematical functions, called metamodels. In this paper, we focus on the essential step of the metamodel validation phase wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.