This chapter introduces discrete-event simulation and outlines the key steps in a simulation study. It defines simulation as imitating the operation of a real-world process over time through a conceptual model. Simulation allows experimenting with "what if" scenarios to analyze the potential effects of changes. The chapter describes when simulation is an appropriate tool, its advantages and disadvantages, common application areas, and components of systems and models. It distinguishes between discrete and continuous systems and events, and outlines the development process for discrete-event simulation models.
Modeling and simulation is the use of models as a basis for simulations to develop data utilized for managerial or technical decision making. In the computer application of modeling and simulation a computer is used to build a mathematical model which contains key parameters of the physical model.
Modeling and simulation is the use of models as a basis for simulations to develop data utilized for managerial or technical decision making. In the computer application of modeling and simulation a computer is used to build a mathematical model which contains key parameters of the physical model.
Introduction to simulation and modeling will describe what is simulation, what is system and what is model. It will give a brief overview of simulation and modeling in computer science.
Overview of Performance Evaluation
Intro & Objective
The Art of Performance Evaluation
Professional Organizations, Journals, and conferences.
Performance Projects
Common Mistakes and How to Avoid Them
Selection of Techniques and Metrics
From Model-based to Model and Simulation-based Systems ArchitecturesObeo
Achieving quality engineering through descriptive and analytical models
Systems architecture design is a key activity that affect the
overall systems engineering cost. It is hence fundamental
to ensure that the system architecture reaches a proper quality.
In this paper, we leverage on MBSE approaches and complement them
with simulation techniques, as a prom-ising way to improve the quality of the system architecture definition, and to come up with inno-vative solutions while securing the systems engineering process.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Introduction to simulation and modeling will describe what is simulation, what is system and what is model. It will give a brief overview of simulation and modeling in computer science.
Overview of Performance Evaluation
Intro & Objective
The Art of Performance Evaluation
Professional Organizations, Journals, and conferences.
Performance Projects
Common Mistakes and How to Avoid Them
Selection of Techniques and Metrics
From Model-based to Model and Simulation-based Systems ArchitecturesObeo
Achieving quality engineering through descriptive and analytical models
Systems architecture design is a key activity that affect the
overall systems engineering cost. It is hence fundamental
to ensure that the system architecture reaches a proper quality.
In this paper, we leverage on MBSE approaches and complement them
with simulation techniques, as a prom-ising way to improve the quality of the system architecture definition, and to come up with inno-vative solutions while securing the systems engineering process.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
SIMULATION.pdf
1. Chapter 1 Introduction to
Simulation
Banks, Carson, Nelson & Nicol
Discrete-Event System Simulation
2. 2
Outline
„ When Simulation Is the Appropriate Tool
„ When Simulation Is Not Appropriate
„ Advantages and Disadvantages of Simulation
„ Areas of Application
„ Systems and System Environment
„ Components of a System
„ Discrete and Continuous Systems
„ Model of a System
„ Types of Models
„ Discrete-Event System Simulation
„ Steps in a Simulation Study
3. 3
Definition
„ A simulation is the imitation of the operation of real-world
process or system over time.
Generation of artificial history and observation of that
observation history
„ A model construct a conceptual framework that
describes a system
„ The behavior of a system that evolves over time is
studied by developing a simulation model.
„ The model takes a set of expressed assumptions:
Mathematical, logical
Symbolic relationship between the entities
4. 4
Goal of modeling and simulation
„ A model can be used to investigate a wide verity of “what
if” questions about real-world system.
Potential changes to the system can be simulated and predicate
their impact on the system.
Find adequate parameters before implementation
„ So simulation can be used as
Analysis tool for predicating the effect of changes
Design tool to predicate the performance of new system
„ It is better to do simulation before Implementation.
5. 5
How a model can be developed?
„ Mathematical Methods
Probability theory, algebraic method ,…
Their results are accurate
They have a few Number of parameters
It is impossible for complex systems
„ Numerical computer-based simulation
It is simple
It is useful for complex system
6. 6
When Simulation Is the Appropriate Tool
„ Simulation enable the study of internal interaction of a subsystem
with complex system
„ Informational, organizational and environmental changes can be
simulated and find their effects
„ A simulation model help us to gain knowledge about improvement of
system
„ Finding important input parameters with changing simulation inputs
„ Simulation can be used with new design and policies before
implementation
„ Simulating different capabilities for a machine can help determine
the requirement
„ Simulation models designed for training make learning possible
without the cost disruption
„ A plan can be visualized with animated simulation
„ The modern system (factory, wafer fabrication plant, service
organization) is too complex that its internal interaction can be
treated only by simulation
7. 7
When Simulation Is Not Appropriate
„ When the problem can be solved by common
sense.
„ When the problem can be solved analytically.
„ If it is easier to perform direct experiments.
„ If cost exceed savings.
„ If resource or time are not available.
„ If system behavior is too complex.
Like human behavior
8. 8
Advantages and disadvantages of simulation
„ In contrast to optimization models, simulation
models are “run” rather than solved.
Given as a set of inputs and model characteristics the
model is run and the simulated behavior is observed
9. 9
Advantages of simulation
„ New policies, operating procedures, information flows and son on
can be explored without disrupting ongoing operation of the real
system.
„ New hardware designs, physical layouts, transportation systems
and … can be tested without committing resources for their
acquisition.
„ Time can be compressed or expanded to allow for a speed-up or
slow-down of the phenomenon( clock is self-control).
„ Insight can be obtained about interaction of variables and important
variables to the performance.
„ Bottleneck analysis can be performed to discover where work in
process, the system is delayed.
„ A simulation study can help in understanding how the system
operates.
„ “What if” questions can be answered.
10. 10
Disadvantages of simulation
„ Model building requires special training.
Vendors of simulation software have been actively
developing packages that contain models that only
need input (templates).
„ Simulation results can be difficult to interpret.
„ Simulation modeling and analysis can be time
consuming and expensive.
Many simulation software have output-analysis.
11. 11
Areas of application
„ Manufacturing Applications
„ Semiconductor Manufacturing
„ Construction Engineering and project management
„ Military application
„ Logistics, Supply chain and distribution application
„ Transportation modes and Traffic
„ Business Process Simulation
„ Health Care
„ Automated Material Handling System (AMHS)
Test beds for functional testing of control-system software
„ Risk analysis
Insurance, portfolio,...
„ Computer Simulation
CPU, Memory,…
„ Network simulation
Internet backbone, LAN (Switch/Router), Wireless, PSTN (call center),...
12. 12
Systems and System Environment
„ A system is defined as a groups of objects that
are joined together in some regular interaction
toward the accomplishment of some purpose.
An automobile factory: Machines, components parts
and workers operate jointly along assembly line
„ A system is often affected by changes occurring
outside the system: system environment.
Factory : Arrival orders
„ Effect of supply on demand : relationship between factory
output and arrival (activity of system)
Banks : arrival of customers
13. 13
Components of system
„ Entity
An object of interest in the system : Machines in factory
„ Attribute
The property of an entity : speed, capacity
„ Activity
A time period of specified length :welding, stamping
„ State
A collection of variables that describe the system in any time : status of machine
(busy, idle, down,…)
„ Event
A instantaneous occurrence that might change the state of the system:
breakdown
„ Endogenous
Activities and events occurring with the system
„ Exogenous
Activities and events occurring with the environment
14. 14
Discrete and Continues Systems
„ A discrete system is one in which the state variables
change only at a discrete set of points in time : Bank
example
15. 15
Discrete and Continues Systems (cont.)
„ A continues system is one in which the state variables
change continuously over time: Head of water behind the
dam
16. 16
Model of a System
„ To study the system
it is sometimes possible to experiments with system
„ This is not always possible (bank, factory,…)
„ A new system may not yet exist
„ Model: construct a conceptual framework that
describes a system
It is necessary to consider those accepts of systems
that affect the problem under investigation
(unnecessary details must remove)
18. 18
Characterizing a Simulation Model
Characterizing a Simulation Model
„ Deterministic or Stochastic
Does the model contain stochastic components?
Randomness is easy to add to a DES
„ Static or Dynamic
Is time a significant variable?
„ Continuous or Discrete
Does the system state evolve continuously or only at
discrete points in time?
Continuous: classical mechanics
Discrete: queuing, inventory, machine shop models
19. 19
Discrete-Event Simulation Model
„ Stochastic: some state variables are random
„ Dynamic: time evolution is important
„ Discrete-Event: significant changes occur at
discrete time instances
21. 21
DES Model Development
DES Model Development
How to develop a model:
1) Determine the goals and objectives
2) Build a conceptual model
3) Convert into a specification model
4) Convert into a computational model
5) Verify
6) Validate
Typically an iterative process
22. 22
Three Model Levels
Three Model Levels
„ Conceptual
Very high level
How comprehensive should the model be?
What are the state variables, which are dynamic, and which are
important?
„ Specification
On paper
May involve equations, pseudocode, etc.
How will the model receive input?
„ Computational
A computer program
General-purpose PL or simulation language?
23. 23
Verification vs. Validation
Verification vs. Validation
„ Verification
Computational model should be consistent with
specification model
Did we build the model right?
„ Validation
Computational model should be consistent with the
system being analyzed
Did we build the right model?
Can an expert distinguish simulation output from
system output?
„ Interactive graphics can prove valuable