The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an architecture to support the modeling of different high level architecture (HLA) compliant emergency management training simulations. Different ontologies are created to support complex simulation instantiation. Simulations can be accessed through any device that can run an X3D browser. A context database is created, which provides real life events, collected via wireless sensor...
This paper presents a real time digital simulator based test system as a new method for testing microgrid management system (MMS). This system is composed of a real time digital simulator and a developed communication emulator. Real time digital simulator runs a simulation case for microgrid model and distributed generation source model. Communication module emulates communication functions of micro-sources...
TinyOS is an open source operating system for wireless sensor networks developed by the University of California at Berkeley, aimed at the character of sensor network. In TinyOS environment, the system not only provides a powerful simulation tool to ensure the accuracy of the system, the system also provides a series of tools to simplify the development of the system, using these tools can greatly...
Tag identification and collision removal is the most critical issue which is limiting the performance of RFID systems. In this paper we test the performance of two classes of anti-collision protocols that is collision detection (pure Aloha and slotted Aloha) and collision avoidance (non-persistent CSMA and slotted non-persistent ISMA). To evaluate the performance of these classes of protocols we implement...
This paper introduces the multi-product multi-stage production system's characteristics and the basic application of the witness, and then takes a precision instrument manufacturer as an example to detail the simulation process of a multi-product multi-stage production system. Through analyzing the results of the model to identify the bottlenecks of production system and the causes of the problems,...
This project involves asking three sets of engineering management students to develop group projects integrating simulation and optimization in different ways and assessing their absolute and relative educational effectiveness. These approaches are: a) Ask students to repeatedly simulate, using a conventional simulation tool, Witness?? in this case, a system whose design criteria are modified according...
This research aims at the bus holding strategies for the simulation of mass rapid transit (MRT) transferring system in a terminal station with platform constraints for bus in the metropolitan area. We developed and evaluated the transfer system through computer simulation models for MRT with bus system that the goals of bus holding strategies in the model were: reduce bus waiting time, reduce passengers...
This paper discusses teaching reform ideas in the ldquoscientific computingrdquo education by means of modeling and simulation, that can make students get a better understanding of the background, concept and design of each numerical algorithm in ldquoscientific computingrdquo education, and it will help them enhance their self-learning ability and exploration ability.
This paper deals with the problem of automatic software detection of the heat-affected area on the surface of the material sample modified by the laser beam. This detection is necessary for simulation purposes. At the beginning, the paper gives a short overview about the laser burning process that is planned to be simulated and for which the real data has to be processed. The main part of the paper...
This paper informs about simulation used in education and training process. The focus is on infantry and crowd behaviors on constructive simulation centers that are established on Simulation centers in Slovak Armed Forces. Training audiences taking participation on this simulation type are military staffs and civilian crisis management staffs. Simulation system is based on the software named OTB (OneSAF...
Numerous modeling and simulation software products have been developed in the last decades. Most of them have been created from scratch, often dedicated to single formalisms, single simulation algorithms, hardware platforms, or applications. But nevertheless each of these software products has to follow principles, and it has to contain techniques and elements to be usable for modeling and simulation...
Wireless sensor networks greatly benefit from simulation before deployment, since some of these networks may contain thousands of nodes. The new challenges compared to traditional computer networks led to several approaches for network simulation, namely SENSE - Sensor Network Emulator and Simulator. However this approach presents a limited user interface, namely based on text, forcing users to have...
According to Aebli's operative method (1963) and Bruner's (1974) theory of representation the development of the process of thinking in teaching has the following phases - levels of abstraction: manipulation with specific things (specific phase), iconic representation (figural phase), symbolic representation (symbolic phase). Modern information technology has contributed to the enrichment of teaching...
There are many difficulties in top-down earthwork construction, such as great difficulty in excavation, long time in construction and the diversity and complexity in arranging machine, etc. Cyclic operation network (CYCLONE) apply queueing theory and simulation technique to network planning technique, through the simulation of cyclic construction process and stochastic process, provide complete decision-making...
The basic principle for static synchronous compensator is analyzed in this paper, a new mode controller for STATCOM is proposed, which is based on RBF neural network and fuzzy control theory. The controller can improve the power angle stability for the power system and the local voltage characteristics. The power system transient simulation results on a single-machine infinite-bus system which is...
Mobile communication networks in rural areas were not given enough importance and emphasis unlike their urban counter parts due to the unattractive revenues and economic considerations for the cellular operators. But with the development of the national economy, it is necessary to construct communication networks in rural areas to realize covering the whole country. For better planning the base station...
When transient performance requirement is higher in the control system and single-loop control system can not meet the requirements, we implement the multi-loop control and parameter optimization in line with the inner loop to outer loop of the order. This article takes double-loop DC motor speed control system as an example, and uses simulation optimization methodology to design of two PI regulator...
To solve problems of collaborative modeling & simulation for propulsion device of special ship, a kind of multi-disciplinary simulation platform of virtual prototype based on interface was developed. ADAMS software was as core simulation tool. The analysis flow of collaborative modeling & simulation of virtual prototype was presented for hovercraft. Applied the simulation platform, design...
The interaction between an information system, its users, and a variable population of attackers is simulated. The attacker population grows according to one or more growth processes reflecting different attacker motivations. Passive defense proves efficacious against only some attacker types.
In this project, we transferred Problem-Based Learning (PBL), a well-known pedagogy for medical education, to an online environment by transforming it into a simulation where students could practice their skills collaboratively in a risk-free setting. This paper describes the design of a conceptual model and development of a software platform to allow learners to collaborate online in discussing PBL...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.