Academia.eduAcademia.edu

System Simulation Modeling and Analysis

description82 papers
group33 followers
lightbulbAbout this topic
System Simulation Modeling and Analysis is the process of creating abstract models of complex systems to study their behavior under various conditions. It involves the use of mathematical and computational techniques to simulate real-world processes, enabling researchers to analyze system performance, optimize operations, and predict outcomes without physical experimentation.
lightbulbAbout this topic
System Simulation Modeling and Analysis is the process of creating abstract models of complex systems to study their behavior under various conditions. It involves the use of mathematical and computational techniques to simulate real-world processes, enabling researchers to analyze system performance, optimize operations, and predict outcomes without physical experimentation.

Key research themes

1. How can Model-Based Systems Engineering (MBSE) methods enhance the integration and simulation of complex system models?

MBSE approaches aim to manage the increasing complexity of multidisciplinary systems by creating unified, hierarchical architectures that integrate domain-specific simulation models with abstract system models. This research area investigates methods to systematically link simulation models with system models, addressing challenges of consistency, parameter exchange, and modularity to enable coherent virtual development, validation, and analysis across system lifecycles.

Key finding: This paper identifies the gap between domain-specific simulation models and SysML-based system models and proposes model signatures—standardized and modular interfaces for simulation models—to enable seamless parameter... Read more
Key finding: The authors develop a holistic system modeling approach that links descriptive SysML system architecture models with detailed domain-specific simulation models, maintaining data consistency through a central database and... Read more
Key finding: This work demonstrates the application of MBSE with SysML and collaborative tools to create a shared system architecture of a complex lunar habitat system, integrating models with coupled software-based simulations to predict... Read more

2. What methodologies improve simulation model accuracy and computational efficiency through mathematical transformation and abstraction techniques?

This research theme focuses on developing and applying mathematical and computational techniques—such as transforming simulation models to frequency domain representations, model abstraction, and parameter perturbation—to enhance the fidelity, analytic tractability, and computational efficiency of system simulations, especially under practical constraints such as multipath environments and off-grid parameter estimation.

Key finding: Proposes a methodology transforming system dynamics simulation models, originally expressed as differential equations, into mathematical models in the frequency domain via Laplace transforms, enabling the derivation of system... Read more
Key finding: Outlines techniques for identifying key system parameters and applying model abstraction to reduce simulation complexity without significantly compromising accuracy, particularly in engineering-level simulations where... Read more
Key finding: Introduces a novel Orthogonal Matching Pursuit (OMP) based sparse reconstruction technique with parameter perturbation (PPOMP) to alleviate off-grid effects in radar delay-Doppler imaging, providing improved target detection... Read more
Key finding: Presents ColSim, a modular, Unix-based simulation environment that integrates a modified Euler solver with plug flow techniques allowing accurate, small-step simulations of dynamic control systems, particularly HVAC and solar... Read more

3. How do advanced simulation methods enable detection and analysis of complex phenomena in sensor and communication systems?

This theme covers simulation methodologies applied in sensor networks, radar, and communication systems, focusing on modeling the detection of correlated Gaussian processes, interference, multipath effects, and system integrity through probabilistic models, sequential detection algorithms, and system of systems approaches that effectively handle energy, bandwidth, and interoperability constraints.

Key finding: Analyzes the asymptotic performance of a distributed analog scheme in wireless sensor networks over MAC channels for detecting correlated zero-mean circularly-symmetric complex Gaussian processes under energy constraints,... Read more
Key finding: Develops CUSUM-based quickest detection algorithms exploiting eigenvalue ratio statistics and deviation of steering vectors to promptly detect interference and multipath threats in multi-antenna GNSS receivers, validated... Read more
Key finding: Proposes a passive array processing preprocessing algorithm that estimates the line-of-sight signal subspace by temporal information extraction and applies projection operations to suppress non-line-of-sight multipath... Read more
Key finding: Derives a linear minimum mean square error estimator for the conditional variance of a GARCH-modeled radar clutter process, providing an adaptive filtering method analogous to the Kalman filter with random system matrices to... Read more

All papers in System Simulation Modeling and Analysis

The User Requirements Notation (URN) combines the Goaloriented Requirement Language (GRL) with the Use Case Map (UCM) scenario notation. Although tools exist in isolation for both views, they are currently not meant to work together,... more
Creating and maintaining tools for domain-specific modeling languages (DSML) demands time and efforts that often discourage potential developers. However, several tools are now available that promise to accelerate the development of DSML... more
Message sequence charts are hecoming a popular low-level design tool for communication systems. When applied to systems of nontrivial size, organizing and manipulating them become a challenge. We present a methodology for specifying and... more
Several methods have been developed which allow the estimation of the location of an existing source with considerable accuracy in the absence of multipaths. However, if, in addition to the Line-of-Sight (LOS) path, non-LOS (NLOS) paths... more
The Specification and Description Language (SDL) and Message SequenceCharts (MSC) are formal description techniques which gain moreand more importance in the development and specification of complexreal-time systems, especially in the... more
I ØKOKYST-delprogram Nordsjøen Nord ble deler av grunnprogrammet gjennomført i 2018. Prøvetakningen inkluderte 8 pelagiske stasjoner, 6 hardbunnstasjoner og 5 bløtbunnstasjoner, hvorav 2 pelagiske, 2 hardbunns og 1 bløtbunnstasjon var... more
Mobile phones are becoming a new popular platform for business applications. The number of mobile users increases daily and so does the need for efficient mobile data access and management. However, a traditional approach to business... more
Rapporten tar for seg Avinors egne måleserier av kjemiske parametere i elver og vann ved Bergen Lufthavn Flesland fra perioden mars 2010 til januar 2016. Målingene legger grunnlaget for vurdering av kjemisk tilstand. Det fokuseres på... more
Denne rapporten presenterer resultater fra en oppfølgende marinbiologisk undersøkelse i sjøområdet omkring produksjonsanlegget på Mongstad (oljeterminal, raffineri og gassbehandlingsanlegg) i 2013. Anlegget drives av Statoil Petroleum AS.... more
Protocol testing is a very important field nowadays, because it provides a way to detect different kinds of errors in a communicating environment. Communicating Sequential Processes (CSP) could be efficiently applied for creating a... more
Protocol testing is a very important field nowadays, because it provides a way to detect different kinds of errors in a communicating environment. Communicating Sequential Processes (CSP) could be efficiently applied for creating a... more
Rapporten presenterer resultatene fra en marinbiologisk miljøundersøkelse fra oppdrettslokaliteten Sveholmane i Høydalsfjorden, Flora kommune. Innsamlingene ble gjennomført 11. og 25. september 2013. Formålet med denne... more
Pulse-Doppler radar has been successfully applied to surveillance and tracking of both moving and stationary targets. For efficient processing of radar returns, delay-Doppler plane is discretized and FFT techniques are employed to compute... more
Fjordsystemene rundt Bergen er delt inn i områder basert på tidligere Byfjordsundersøkelser (Område 1-5), med en betydelig utvidelse for å dekke resipienten i kommunene som er en del av samarbeidet i overvåkingsprogrammet 2011-2015
Preface (First Edition) ix Organisation of this Book This book is organised into three parts. The first and shortest part gives an overview of challenges facing the system development industry and proposes Language-Driven Development as a... more
A radar detection scheme based on a GARCH clutter model has been proposed recently. This adaptive detector depends on the conditional variance of the GARCH process. We present a linear minimum mean square error (LMMSE) estimator for the... more
Today, reuse in software engineering is usually supported by component libraries, such as Java packages. Components are self-contained, ready-to-use building blocks, which are selected and composed. They are usually associated with the... more
Several methods have been developed which allow the estimation of the location of an existing source with considerable accuracy in the absence of multipaths. However, if, in addition to the Line-of-Sight (LOS) path, non-LOS (NLOS) paths... more
Creating models and analyzing simulation results can be a difficult and time-consuming task, especially for non-experienced users. Although several DEVS simulators have been developed, the software that aids in the modeling and simulation... more
We analyze a binary hypothesis testing problem built on a wireless sensor network (WSN). Using Large Deviation Theory (LDT), we compute the probability error exponents of a distributed scheme for detecting a correlated circularlysymmetric... more
This paper addresses the problem of detecting external threats such as multipath and interference signals, which may compromise the integrity of Global Navigation Satellite System (GNSS) receivers. We will focus herein on multi-antenna... more
Since the i* (i-star) framework was adopted by the requirements engineering community, different groups have formulated variations of the language proposed therein with the purpose of adapting the framework to the specific needs of its... more
Today, reuse in software engineering is usually supported by component libraries, such as Java packages. Components are self-contained, ready-to-use building blocks, which are selected and composed. They are usually associated with the... more
På oppdrag fra Nordhordland Utviklingsselskap IKS har Uni Research Miljø, SAM-Marin utført prøveinnsamling i området ved Fonnesflaket og Drogeflua våren 2016, i den hensikt å få en preliminær vurdering av forurensningssituasjonen. Området... more
A model family regroups related models that vary along some dimension such as time or product in (software) product lines. A model family can be captured as a “150% model” that merges the family members, while enabling the extraction of... more
Most goal-oriented modeling languages, including i*, Tropos, KAOS and the Goal-oriented Requirement Language (GRL), offer a graphical syntax, sometimes accompanied by a textual interchange format (e.g., in XML). Graph- ical... more
This paper introduces an approach for the modeling of mobile-agent applications. It aims to deal with the lack of appropriate concepts and notations, in the standard UML, to capture relevant abstractions for the modeling of mobile-agent... more
Cognitive method is used in this research to create portfilo of movement robot manipulator. Gradient descent (GD) fuzzy controller was used and robot's postures and trajectory were expected in MATLAB/SIMULINK environment. Fuzzy logic... more
Work in this paper identifies specific problems when TTCN is used for real-time testing together with ways these problems can be av oided or their effect at least minimised. This contribution proposes the main real-time extensions that... more
/ ******************************************************************************** NOTES: This paper has been superseded. Its main results are covered in paper "Exploring properties of a bounded retransmission protocol with... more
Scenarios are powerful tools to model and analyze software systems. However, since they do not provide a complete description of the system, but just some possible execution paths, they are usually integrated with state machines. State... more
Self-stabilizing systems have the ability to converge to a correct behavior when started in any configuration. Most of the work done so far in the self-stabilization area assumed either communication via shared memory or via FIFO... more
Creating and maintaining tools for domain-specific modeling languages (DSML) demands time and efforts that often discourage potential developers. However, several tools are now available that promise to accelerate the development of DSML... more
A radar detection scheme based on a GARCH clutter model has been proposed recently. This adaptive detector depends on the conditional variance of the GARCH process. We present a linear minimum mean square error (LMMSE) estimator for the... more
The importance and usefulness of requirements engineering (RE) techniques (elicitation, analysis, modeling, change management, etc.) have been proven oftentimes in domains such as telecommunications and cybersystems. However, in... more
Queuing theory strives to provide analytical solutions to a number of queuing problems. Unfortunately, closed analytical expressions can not be derived for every type of queuing system. Discrete event simulation on the other hand can find... more
Queuing theory strives to provide analytical solutions to a number of queuing problems. Unfortunately, closed analytical expressions can not be derived for every type of queuing system. Discrete event simulation on the other hand can find... more
There are several tools currently available in the i* community with different purposes. This situation poses both benefits and difficulties. Benefits, because different groups may be able to share their models and results among their... more
Today we are able to use the Internet successfully all over the world because of Congestion Control Techniques working properly. There are various types ofTCP Congestion Control Techniques including Tahoe, Reno, New Reno, SACK, Vegas and... more
WebGIS applications have become popular due to technological advances in location and sensor technology, with diverse examples with different objectives becoming available. However, there is a lack of requirements elicitation approaches... more
This paper presents the comparative analysis of TCP Congestion Control Techniques including Tahoe, Reno, New Reno, SACK, Vegas and how these techniques different from each other. When any packet is being lost or timeout occurs, these... more
Science, and has been an associate editor for the IEEE Transactions on Parallel and Distributed Systems (TPDS). He was elected as chair of the IEEE Computer Society Technical Committee on Parallel Processing (TCPP) and as chair of the... more
A methodology for feature design, specification, and validation is presented. The methodology is based on Use Case Maps for the description of features and on LOTOS with its tools for animation of the features, for feature validation, and... more
This paper presents a proposal for modeling agent mobility using UML Sequence Diagram. Our notation is focused on representing agent migration path and includes modeling of three basic mobility elements: agent creation, mobility path and... more
Download research papers for free!