Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • SAGE Publications  (6)
  • Mathematics  (6)
Type of Medium
Publisher
  • SAGE Publications  (6)
Language
Years
Subjects(RVK)
  • Mathematics  (6)
RVK
  • 1
    In: SIMULATION, SAGE Publications, Vol. 97, No. 9 ( 2021-09), p. 589-599
    Abstract: This paper aims to explore the impact of government subsidy policies on strengthening the shared-bikes industry in China by simulating the operation mode of Mobike using system dynamics methodology. First, we introduce four subsidy policies: equalization subsidy, stage subsidy, growth subsidy, and back-slope subsidy, and establish a system dynamics model to characterize the bike-sharing operation dynamics system considering these four government subsidies. Subsequently, we analyze the impact of the four subsidy policies on enterprise-operating activities. The simulation results indicate that different subsidy policies have different incentive objectives and characteristics. The back-slope subsidy has more positive effects on enterprise operations in the short term but requires higher cost. The influence of growth subsidy and stage subsidy on enterprises can last longer, which requires the government to timely adjust the subsidy amount. The impact of equalization subsidy on enterprises is more stable, reducing government subsidy while ensuring enterprises’ regular operation.
    Type of Medium: Online Resource
    ISSN: 0037-5497 , 1741-3133
    RVK:
    Language: English
    Publisher: SAGE Publications
    Publication Date: 2021
    detail.hit.zdb_id: 2072208-4
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    SAGE Publications ; 2006
    In:  SIMULATION Vol. 82, No. 8 ( 2006-08), p. 523-541
    In: SIMULATION, SAGE Publications, Vol. 82, No. 8 ( 2006-08), p. 523-541
    Abstract: In this article, a modeling process is defined to address challenges in analyzing attack scenarios and mitigating vulnerabilities in networked environments. Known system vulnerability data, system configuration data, and vulnerability scanner results are considered to create exploitation graphs ( e-graphs) that are used to represent attack scenarios. Experiments carried out in a cluster computing environment showed the usefulness of proposed techniques in providing in-depth attack scenario analyses for security engineering. Critical vulnerabilities can be identified by employing graph algorithms. Several factors were used to measure the difficulty in executing an attack. A cost/benefit analysis was used for more accurate quantitative analysis of attack scenarios. The authors also show how the attack scenario analyses better help deployment of security products and design of network topologies.
    Type of Medium: Online Resource
    ISSN: 0037-5497 , 1741-3133
    RVK:
    Language: English
    Publisher: SAGE Publications
    Publication Date: 2006
    detail.hit.zdb_id: 2072208-4
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    In: SIMULATION, SAGE Publications
    Abstract: The impact of large passenger flow during peak hours causes serious congestion in subway stations, and passenger flow bottlenecks appear in many places, which affects travel efficiency and safety. How to eliminate the bottlenecks is an urgent problem to be solved. In this paper, we first analyze the causes and regions of bottlenecks, and we propose three decongestion solutions: (a) moving the security check machines from the station hall to the entrance channel; (b) adding isolation belts in front of the area of escalators; and (c) separating opposite passengers flow by using isolation belts. We conduct a case study on Guomao Station, Beijing, China to verify the effectiveness of the solutions. Specifically, we establish a microscopic model to simulate the passenger flow in a subway station, and the simulation results show that decongestion solutions can reduce the queueing length of security bottleneck by more than 30%, while decreasing the passenger density in non-paying areas of the station hall by more than 50%. The decongestion solutions proposed in this paper can eliminate the bottlenecks in subway stations effectively and practicably.
    Type of Medium: Online Resource
    ISSN: 0037-5497 , 1741-3133
    RVK:
    Language: English
    Publisher: SAGE Publications
    Publication Date: 2024
    detail.hit.zdb_id: 2072208-4
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    SAGE Publications ; 2021
    In:  SIMULATION Vol. 97, No. 12 ( 2021-12), p. 821-834
    In: SIMULATION, SAGE Publications, Vol. 97, No. 12 ( 2021-12), p. 821-834
    Abstract: Researchers usually rely on simulations to predict the response of complex systems, we recognize that the models that underlie these simulations are never perfect. Model validation is a crucial ingredient in simulation credibility assessment. Multivariate responses under uncertainty often exist in complex simulation model, and the corresponding validation problem is not be solved effectively based on the existing validation methods. Hence, this paper presents a new validation method based on evidence theory for simulation model under uncertainty. For analyzing the extent of agreement between simulation outputs and experimental observations under uncertainty, the data features of system responses under uncertainty are extracted primarily. Next, the validation data such as large sample, small sample, data features, and expert opinions are represented as evidence theory. Then the traditional evidence distance method is improved to measure the agreement extent of simulation outputs and experimental observations. The proposed method is verified through an application example on validation of a simulation model about the terminal guidance stage of flight vehicle to illustrate their validity and potential benefits.
    Type of Medium: Online Resource
    ISSN: 0037-5497 , 1741-3133
    RVK:
    Language: English
    Publisher: SAGE Publications
    Publication Date: 2021
    detail.hit.zdb_id: 2072208-4
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    SAGE Publications ; 1989
    In:  SIMULATION Vol. 52, No. 6 ( 1989-06), p. 241-254
    In: SIMULATION, SAGE Publications, Vol. 52, No. 6 ( 1989-06), p. 241-254
    Abstract: This paper presents a methodol ogy for performing database system simulations which is based on the Wisconsin Bench- marks. Use of this approach provides very realistic represen tations for transactions, hard ware, and software aspects of a target database environment. The flexibility built into the approach also facilitates exami nation of many different database environments with few changes to the basic model. The method described equips researchers with the first standard simulation approach which can be used on any database system. We describe the approach, its implementation using SLAM II, and then provide an overview of its use.
    Type of Medium: Online Resource
    ISSN: 0037-5497 , 1741-3133
    RVK:
    Language: English
    Publisher: SAGE Publications
    Publication Date: 1989
    detail.hit.zdb_id: 2072208-4
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    SAGE Publications ; 2023
    In:  SIMULATION Vol. 99, No. 1 ( 2023-01), p. 69-87
    In: SIMULATION, SAGE Publications, Vol. 99, No. 1 ( 2023-01), p. 69-87
    Abstract: This paper is concerned with the first work on the integration of digital twin (DT), 5G, cloud platform, and virtual reality (VR) technologies for unmanned aerial vehicles (UAVs) autonomy development. DT focuses on connecting the virtual and physical world as an emerging strategic technology. Initially, it was implemented through mirror models of physical objects to realize the monitoring of their whole life cycle in the manufacturing area. In recent years, DT technologies have been applied in different fields, and some typical DT solutions have been proposed to solve complex system problems. In this paper, we study the problem of how to combine the DT and other emerging technologies for UAV autonomy development and supervision, aiming to propose a basic DT framework to integrate DT and UAVs as reference rules for building DT systems, which includes four parts, that is, Virtual Space, Real Space, Service Center, and Data and Model Processing Center. Based on the proposed basic DT framework, a cloud-based DT system is then further constructed in which cloud platform, 5G, and VR are integrated seamlessly. The running and implementation processes of each subsystem are introduced in detail. Multiple experiments are conducted to verify the usefulness of proposed DT system, that is, real-time system monitoring and cloud processing, VR connection, human–robot interaction through VR technology, and so on. The experimental results show that the proposed DTUAV system can be used in the interaction of virtual and physical systems, remote supervision, intelligence integration of swarm of unmanned vehicles, and so on. The development in our work introduces the DT into unmanned system applications and can promote relevant research in this direction. All implementation codes of the system will be shared in https://github.com/DTUAV .
    Type of Medium: Online Resource
    ISSN: 0037-5497 , 1741-3133
    RVK:
    Language: English
    Publisher: SAGE Publications
    Publication Date: 2023
    detail.hit.zdb_id: 2072208-4
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages