Systems Modeling and Simulation: Theory and Applications: Third Asian Simulation Conference, AsiaSim 2004, Jeju Island, Korea, October 4-6, 2004,

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed post-proceedings of the third Asian Simulation Conference, AsiaSim 2004, held in Jeju Island, Korea in October 2004.

The 78 revised full papers presented together with 2 invited keynote papers were carefully reviewed and selected from 178 submissions; after the conference, the papers went through another round of revision. The papers are organized in topical sections on modeling and simulation methodology, manufacturing, aerospace simulation, military simulation, medical simulation, general applications, network simulation and modeling, e-business simulation, numerical simulation, traffic simulation, transportation, virtual reality, engineering applications, and DEVS modeling and simulation.

Author(s): Doo-Kwon Baik
Series: Lecture Notes in Artificial Intelligence 3398
Edition: 1
Publisher: Springer
Year: 2005

Language: English
Pages: 747

Front matter......Page 1
1 Introduction [1, 2]......Page 15
2.1 Discrete Huygens’ Model......Page 16
2.4 Inhomogeneous, Lossy and Flowing Media [9]......Page 19
3.1 Process in Time Reversal......Page 20
3.2 Examples......Page 22
References......Page 24
1 Introduction......Page 26
3.1 Networkitized Modeling and Simulation Technology......Page 27
3.2 The Prospects of Modeling and Simulation Technology on Synthesized Nature Environment [1]......Page 30
3.3 The Intelligent System Modeling and Intelligent Simulation System [1]......Page 31
3.5 Virtual Prototyping Engineering Technology......Page 32
3.6 High Performance Computing (HPC) [17-19]......Page 33
3.7 Pervasive Simulation Technology Based on Pervasive Computing Technology......Page 34
References......Page 35
1 Introduction......Page 37
3 Simulation Grid Services and Grid-Enabling Simulation Resources......Page 39
3.2 Grid-Enabling Database System......Page 41
3.4 Grid-Enabling System Function Modules......Page 42
4 Simulation Grid Services Management......Page 43
References......Page 44
1 Introduction......Page 45
2.1 Overview......Page 46
2.2 Model Building......Page 47
3.2 Estimating the Probability of Out-of Specification Limit......Page 48
3.3 Test Concerning the Population Means......Page 50
4 Quality Goal Setting Using Simulation......Page 52
References......Page 53
1 Introduction......Page 54
2.1 Second-Order Linear Model......Page 55
2.2 Central Composite Design......Page 56
3 Correlation Induction Strategy......Page 57
4.1 Parameter Estimators and Their Covariance......Page 58
4.2 Performance of Parameter Estimator......Page 59
5.1 (s, S) Inventory System......Page 60
5.3 Numerical Results......Page 61
6 Summary and Conclusions......Page 62
References......Page 63
1 Introduction......Page 64
2.1 Statements of MLP......Page 65
2.2 Hopfield Network......Page 66
3.1 Energy Function of MLP......Page 67
4.1 Experimental Description......Page 68
4.2 Results of Experiment......Page 69
5 Conclusion......Page 71
References......Page 72
1 Introduction......Page 73
2.1 Existing Disassembly Systems......Page 74
2.1.3 Hanger Type Disassembly System (HTDS)......Page 75
2.2.1 Pit Type Disassembly System (PTDS)......Page 76
3.3 Simulation Modeling......Page 77
4 Four Alternatives for Performance Improvement......Page 78
4.3 A3: Balance the Workloads......Page 79
5 Conclusions......Page 80
References......Page 81
1 Introduction......Page 82
2.2 Geometrical Modeling of Objects......Page 83
2.3 Function and Action Modeling of Object......Page 85
3.1 Layout of Virtual FMS......Page 86
3.3 A Case of Virtual FMS......Page 87
3.3.1 Ready for Layout......Page 88
3.3.3 Control Codes and NC Program for Milling Machine Tool......Page 89
References......Page 90
1 Introduction......Page 91
2 ROA and an Economic Evaluation of Investment Projects......Page 92
3.1 Calculating a Product Cost......Page 94
3.2 Performing a Net Present Value Analysis......Page 95
3.3 Evaluating the Value of the Deferral Option......Page 96
4 Concluding Remarks......Page 98
References......Page 99
1 Introduction......Page 100
2.1 Kinetics of a Missile on the Earth......Page 101
2.2 Attack/Interceptor Missile System......Page 102
3.1 Simulation Cost Reduction......Page 103
3.2 Simulation Error Reduction......Page 104
4 Performance Analysis......Page 105
5.1 Experiment......Page 106
5.2 Performance Evaluation......Page 107
References......Page 108
1 Introduction......Page 109
2 Railway Simulators......Page 110
2.2 Host CPU......Page 111
2.4 Visual Computers......Page 112
2.7 GUI Group (IOS) S/W......Page 113
2.8 Host Group S/W......Page 114
2.9 Modeling Group S/W......Page 115
3 Airplane Simulators......Page 116
4 Portability Study of S/W and H/W......Page 117
5 Conclusions......Page 119
References......Page 120
1 Introduction......Page 121
2 Forward-Backward Kalman Based Noise Subspace Estimator......Page 122
3 Time-Varying Forgetting Factor in Kalman Based Noise Subspace Estimator......Page 123
4 Simulation Results......Page 124
5 Conclusion......Page 125
References......Page 126
1 Introduction......Page 127
2 Computational Method......Page 128
2.1 Actuator Disk Modeling of the Fan......Page 129
2.3 Thrust Calculation......Page 130
3.1 Diffuser Angle Changes (Uniform Fan)......Page 131
3.3 Fan Strength Distribution Models......Page 133
References......Page 135
1 Introduction......Page 136
2 System Architecture......Page 138
3.1 Domain-Specific Object Modeling (DOM)......Page 139
3.2 HLA-Based Modelling......Page 141
3.3 Time Management Modeling(TMM)......Page 142
References......Page 144
1 Introduction......Page 145
2.1 Interoperability Framework of Complex Distributed Simulation System......Page 146
2.2 Interoperability Conceptual Model of CDSS......Page 147
3.1.1 Conceptual Model of C2 Object......Page 149
3.1.2 Battle Command Center Level C4I Modeling......Page 150
3.2 SNE Modeling and Simulation......Page 151
3.3 Some Problems on CDSS FOM Design......Page 152
4 An Example of CDSS FOM Application......Page 153
References......Page 154
1 Introduction......Page 155
2.1 Interest Management......Page 156
3.1 AOI Monitor......Page 157
3.2 DOI Estimation......Page 158
4.1 Dynamic Resolution Spatial Model......Page 159
5 Experimental Results......Page 160
References......Page 163
1 Introduction......Page 164
2.1 From SIMNET to HLA and Beyond......Page 165
2.3 The Next Generation of M&S Based on Web Services......Page 166
3.2 XRML for Web Service: XRML-S......Page 167
3.3 M&S Based on XRML-S: Intelligent XMSF......Page 168
4 Suggestion of M&S Development Policy in Korea......Page 170
5 Conclusion and Further Research......Page 171
References......Page 172
1 Introduction......Page 173
2.1 Dynamic Baseline Method......Page 174
2.2 Base Type Definition for Noise Cancellation......Page 175
2.3 Vertex Point Analysis......Page 176
3.2 Detailed Shape Definition......Page 177
4 Recognition Results......Page 178
References......Page 180
1 Introduction......Page 181
2 Three-Dimensional CT-DSA......Page 182
2.1 Automatic Feature Points Selection......Page 183
2.3 Selective Cross-Correlation and Optimization......Page 184
2.4 Bone Masking and Removal......Page 185
3 Experimental Results......Page 186
4 Conclusion......Page 188
References......Page 190
1 Introduction......Page 191
2 Embedded Healthcare System......Page 192
3 Process Scenarios and Message Flows......Page 193
3.1 User Operated Normal Mode......Page 194
3.2 User Operated Emergency Mode......Page 195
3.3 Remote Monitoring Mode......Page 196
3.4 Remote Activation Mode......Page 197
3.5 Snapshots of Embedded Healthcare System......Page 199
References......Page 200
1 Introduction......Page 201
2 Related Work......Page 202
3.2 Overview of Our Approach......Page 203
4.2 Pairwise Collision Detection......Page 204
5.1 AABB Culling......Page 205
5.3 Hierarchical Readback......Page 206
6 Results and Analysis......Page 207
7 Conclusions......Page 208
References......Page 209
1 Introduction......Page 211
2 Equivalent Circuit Modelling......Page 212
3.1 Electrical Resistive Loading......Page 213
3.2 Electrical Inductive Loading......Page 214
4.1 Modal Parameters of the Vibrator......Page 215
4.3 Damping with Additional Shunt Inductor......Page 216
5 Conclusions......Page 217
References......Page 218
1 Introduction......Page 219
2.1 Path Sensitization......Page 220
2.2 Partitioning of CUT......Page 221
3 Proposed Algorithm for Pseudo-exhaustive Testing......Page 222
4.1 Path Sensitization......Page 224
5 Conclusion......Page 225
Acknowledgement......Page 226
References......Page 227
2.1 Method of Analysis......Page 228
2.2 Computer Simulation......Page 230
3.1 Theoretical Formulation......Page 231
3.2 Computer Simulation......Page 233
References......Page 235
1 Introduction......Page 236
3 Graphic Editor......Page 237
5.2 Model Interface for General Access to Model Objects......Page 238
7 Test of Component Expansion......Page 239
Creation of a New Component Icon......Page 240
Development of a New Model Builder......Page 241
Creating a Definition File......Page 242
References......Page 243
1 Introduction......Page 244
2 Related Work......Page 245
3.2 Tiling......Page 246
3.3 Branch Processing......Page 248
4 Experimental Results......Page 251
References......Page 252
1 Introduction......Page 254
2.2 Contention Free Scheme (PCF) [8]......Page 255
2.3 EDCA and HCCA [6]......Page 256
3.1 WGPS Algorithm [9]......Page 257
3.2 Modified WGPS Algorithm......Page 258
3.3 New-CF Scheme for IEEE 802.11x WLAN......Page 259
4 Simulation Result......Page 260
References......Page 262
1 Introduction......Page 264
2.2 Wireless Capture Model......Page 265
3.1 System Model......Page 266
4.1 Average Waiting Time Before a Reservation Request......Page 267
4.2 Average Waiting Time Until the Channel Reservation Is Success......Page 268
4.3 Average Queueing Time Until a Tagged Message Is Scheduled......Page 269
4.6 Packet Waiting Time Distribution Function......Page 271
5 Numerical Results......Page 272
References......Page 273
1 Introduction......Page 274
2 MAC Protocol for Sensor Networks......Page 275
4 Message Redundancy......Page 276
5 Design of MAC......Page 277
6.1 Experiment Setup......Page 279
6.2 Result and Analysis......Page 280
7 Conclusions......Page 281
References......Page 282
1 Introduction......Page 284
2 System Description......Page 285
3.1 Steady-State Distribution of the Number of Messages in System......Page 286
4.1 Expected Access Delay of Message......Page 288
4.2 Throughput......Page 289
5 Numerical and Simulation Analysis......Page 290
6 Conclusion......Page 291
References......Page 292
1 Introduction......Page 293
3 Agent Environments in B2B EC......Page 294
3.2 Simulation Environments for Agent System......Page 295
4.4 Message Interfaces......Page 296
5 Performance Model and Simulation Result......Page 297
6 Conclusions......Page 300
References......Page 301
1 Introduction......Page 303
2.2 Simple and Symbiotic Hypergame......Page 304
2.3 Two-Level Hierarchical Hypergame Model......Page 306
3 Existence Condition of HHNE......Page 308
References......Page 309
1 Introduction......Page 310
2.1 Web Usage Mining......Page 311
2.3 Product Taxonomy......Page 312
3.2 Phase 2: Customer Preference Analysis......Page 313
3.4 Phase 4: Recommendation Generation......Page 315
4.1 Experiments......Page 316
4.2 Results and Discussion......Page 317
5 Conclusion......Page 318
References......Page 319
1 Introduction......Page 320
2 Related Work......Page 321
3 Recommendation System Using Association Rules......Page 322
4 Simulation......Page 326
References......Page 327
1 Introduction......Page 329
2 Constraint Enforcement......Page 330
3 Implicit Constraint Using Improved First-Order Scheme......Page 331
4 Applications and Experimental Results......Page 333
References......Page 336
1 Introduction......Page 338
2.1 Constructs of Pneumatic Servo Table System......Page 339
2.3 Control Theorem......Page 341
3.2 Air Consumption......Page 342
3.3 Consideration of System Nonlinearity......Page 344
5 Experimental Result......Page 345
References......Page 346
1 Introduction......Page 348
2.1 System Equations and Its Solution......Page 350
2.2 Empirical Analysis of the Probability of Reneging......Page 352
3 Performance Analysis of ACD Systems with Using Simulation......Page 353
4 Conclusions......Page 355
References......Page 356
1 Introduction......Page 357
2.1 Information Heterogeneity......Page 358
3.1 Interface 1: Metadata Registration and Service......Page 359
3.2 Interface 2: Metadata Description......Page 361
3.3 Interface 3: XML Document Transformation......Page 362
4 Comparison......Page 363
References......Page 364
1 Introduction......Page 366
2 Simulation-Based Web Service Composition Methodology......Page 368
3 QoS Analysis: Travel Planner Example......Page 369
3.1 Performance Analysis for Service Providers......Page 370
3.2 Performance Analysis for Service Users......Page 371
4 Conclusion......Page 373
References......Page 374
1.1 The Whole Structure of AST_RTI......Page 375
1.2 Thread Model......Page 376
3 Resource Storage......Page 377
4 Communication Mechanism......Page 378
References......Page 380
1 Introduction......Page 381
2 Related Work......Page 382
3.1 Federation and Federate......Page 383
3.2 Dispatching Operation......Page 384
3.3 Data Compensation Model......Page 385
4 Simulation Results......Page 386
5 Conclusions......Page 388
References......Page 389
1 Introduction......Page 390
2.2 Data Gain and Taking Video Process......Page 392
3 Model Research and Analysis of Inadvertently Red Light Violations......Page 393
3.2 Mathematics Model of Calculating Yellow Time......Page 394
3.3 Generation and Analysis of Dilemma Zone Based on Yellow Interval......Page 395
4 Further Discuss About Dilemma Zone and Inadvertently Red Violation......Page 396
5.2 Model Parameters and Simulation......Page 397
5.3 Simulation Results Analysis......Page 398
References......Page 399
2 Proposed Method to Widen Screen Display......Page 400
3.2 Problems with Real-Time Simulation......Page 402
4 Evaluation......Page 403
5 Conclusion......Page 404
References......Page 405
1 Introduction......Page 406
2.2 System Model......Page 407
4.1.1 Introduction......Page 408
4.1.4 Calculation......Page 409
4.1.5 Simulation......Page 411
4.1.6 Simulation Result......Page 412
4.2.2 Investigation and Results......Page 413
4.2.3 Simulation......Page 414
5 Conclusions......Page 415
References......Page 416
2 Outline of System Which Is Proposed......Page 417
3.1 Observation in Model Intersection [3]......Page 419
3.3 Simulation Result......Page 420
4 Comparison and Consideration......Page 422
References......Page 423
1 Introduction......Page 424
2.2 Guard Channel Scheme (GCS)......Page 425
3 Mobility Prediction Dynamic Channel Reservation Scheme (MPDCRS)......Page 426
4 Performance Evaluation......Page 428
5 Conclusion......Page 431
References......Page 432
1 Introduction......Page 433
2 Cell Structure and Zoned Mobility History Base (ZMHB) Algorithm......Page 434
3 Simulation Environment and Results......Page 436
Previous Cell Location Not in the History Base......Page 438
Previous Cell Location in the History Base......Page 440
4 Conclusions and Future Works......Page 441
References......Page 442
1 Introduction......Page 443
2 Mobility Management Schemes......Page 444
2.3 Threshold Scheme......Page 445
3 Simulations and Results......Page 446
3.1 Evaluating Always Push Scheme......Page 447
3.3 Determining the Thresholdsys......Page 448
3.4 Comparing Always Push Scheme, On Demand Scheme, and Threshold Scheme......Page 449
3.5 Comparing the Threshold Scheme with MIP and MIPRO......Page 450
4 Conclusions......Page 451
References......Page 452
1 Introduction......Page 453
2 System Model......Page 454
3 System Analysis......Page 455
3.1 Cell Dwell Time......Page 456
3.2 Steady-State Probabilities......Page 458
B Blocking Probability......Page 459
D Channel Efficiency......Page 460
4 Numerical Result......Page 461
5 Conclusion......Page 462
References......Page 463
1 Introduction......Page 464
2.1 Derivation of Aerodynamic Data......Page 465
2.2.2 Computational Method Using CATIA......Page 467
3.2 Subjective Tests in FAA AC120-40B......Page 469
3.3 Subjective Test and Evaluation by Experienced RC Pilots......Page 470
References......Page 471
1.1 SIM Functional Description......Page 472
1.3 SIM S/W Implementation Environment......Page 474
2.2 Domain Model......Page 475
2.4 Implementation View Design......Page 476
3.1 KOMPSAT-2 Flight Software Embedding......Page 477
3.2 SIM GUI......Page 478
4 Kompsat-2 SIM Validation......Page 479
References......Page 480
1 Introduction......Page 481
2.2 Design Procedure of Automatic Loop-Shaping......Page 483
2.2.3 Fitness Function......Page 485
3.1 Problem Definitions......Page 486
3.2 Controller Design Using the Automatic Loop-Shaping......Page 488
Acknowledgement......Page 490
References......Page 491
1 Introduction......Page 492
2.1 Requirements for SSL Component......Page 493
2.2 Design of SSL Component......Page 494
3 Implementation and Performance Evaluation of SSLComponent......Page 498
References......Page 500
1 Introduction......Page 501
2 TheContext: An Object-Oriented Network Security Simulator......Page 502
3 Our Proposed Work: A Scalable, Ordered Scenario-Based Network Security Simulator......Page 503
4 A Case Study: Slammer Worm......Page 505
References......Page 507
1 Introduction......Page 509
2.2 Software Components......Page 511
2.3 User Authentication Model......Page 512
2.4 Symmetric-Keys in the Model......Page 514
3 Implementation and Evaluation......Page 515
References......Page 517
1 Introduction......Page 519
2 Security Risk Analysis Model......Page 520
2.1 Identification and Evaluation of Assets, Threats and Vulnerabilities (STEP 1)......Page 521
2.2 Risk Analysis (STEP 2)......Page 522
2.3 Risk Mitigation and Effectiveness Evaluation (STEP 3)......Page 523
2.4 Damage Estimation and Reporting Result (Step 4)......Page 524
3 Related Work......Page 525
References......Page 527
1 Introduction......Page 528
2.3 Simulation Procedure......Page 529
5 Input Parameters......Page 530
6.2 Selecting the Shortest Path......Page 531
8.1 FAB-in Lots per Day......Page 532
9 Conclusion and Future Work......Page 533
References......Page 534
2 TCAM Overview......Page 535
3.1 Fault Models with only Single TCAM Cell......Page 536
3.2 Fault Models Among Adjacent TCAM Cells......Page 537
4.3 Proposed Algorithm for High Density TCAMs......Page 538
5 Verification......Page 540
6 Conclusion......Page 541
References......Page 542
2 Transient Tests of ARTS......Page 543
2.1 Development of the NIST Environment......Page 544
2.3 Transient Test......Page 545
2.4 Site Acceptance Test......Page 546
3 Conclusions......Page 548
References......Page 549
1 Introduction......Page 550
2.1 Vadose Zone Transport......Page 551
2.2 Saturated Zone Mixing......Page 552
3.1 Vadose Zone Leaching......Page 553
3.3 Numerical Stability......Page 554
4.1 Simulation Setting......Page 555
4.2 Simulation Results and Their Validation......Page 556
5 Conclusion......Page 557
References......Page 558
1 Introduction......Page 559
2.2 Scenario 2: VMI Supply Chain Model......Page 561
3 Simulation Experiment Design......Page 563
4.2 The Effect of the Cost Parameters......Page 564
5 Conclusions......Page 565
References......Page 566
2 Features of ATV......Page 567
3.3 Model of Road Files......Page 568
5.1 Climbing Ramp with a Slope of 32 Degrees......Page 569
5.2 Getting over a 2.8m Wide Ditch......Page 570
5.3 Crossing a 0.8m High Obstacle Wall......Page 571
References......Page 572
1 Introduction......Page 573
2.1 Distinction Criteria......Page 574
3 Cost Analysis......Page 575
4.1 Model and Plan......Page 576
4.3 Results and Analysis: Machine Utilization......Page 578
4.4 Results and Analysis: Throughput......Page 579
5.2 Comparative Judgment and Priorities......Page 580
References......Page 581
1 Introduction......Page 582
2 Capacity Reservation Scheme......Page 583
3 Simulation Modeling......Page 587
4 Simulation Results......Page 588
5 Conclusions......Page 590
References......Page 591
1 Introduction......Page 592
2 The Sort-First Parallel Rendering Architecture......Page 593
3.2 Parallel Phase......Page 595
3.4 The Controller......Page 596
4 The Frame Synchronization Algorithm......Page 597
5.1 The Accuracy......Page 599
5.2 Software vs. Hardware......Page 600
6 Conclusion and Future Works......Page 601
References......Page 602
1 Introduction......Page 603
2.1 Components of the VENUS System......Page 604
2.2 A Dual Layered Management Structure of the VENUS System......Page 605
3.1 Application of the VENUS System on Simple Online Game......Page 606
3.2 Application of the VENUS System on Commercial MMORPG......Page 608
4 Conclusions......Page 609
References......Page 610
1 Introduction......Page 611
2 Related Works......Page 612
3.1 Notation......Page 613
4 Error Metric for Feature Preservation......Page 614
4.2 Error Metric......Page 615
5 Experimental Results......Page 617
6 Conclusions......Page 619
References......Page 620
1 Introduction......Page 621
2 Simulation Framework Design for Scene Matching Simulation System......Page 622
3 Solar and Atmospheric Modeling......Page 623
4.1 The Structure of IICCD [10]......Page 624
4.2.2 II Tube MTF - MTF_II......Page 625
4.4 Implementing of the Sensor Model......Page 626
5 SMRT-SS: Simulated Real Time Image Synthesis System......Page 627
References......Page 629
1 Introduction......Page 631
2.1 Alteon Web Cluster......Page 632
2.3 ALBM Web Cluster......Page 633
3 Experimental Results......Page 634
3.1 Fine-Grain Workload......Page 635
3.3 Dynamic Mixed Workload......Page 636
4 Conclusion......Page 637
References......Page 638
1 Introduction......Page 639
2 Session Distribution Algorithms......Page 640
3 Simulation......Page 643
4 Conclusion......Page 647
References......Page 648
1 Introduction......Page 649
2.2 Bridging Support Mechanism......Page 650
3 Cache-Based Bridging Support Mechanism......Page 652
4 Structure of the Simulator......Page 653
5 Performance Evaluation......Page 654
References......Page 656
1 Introduction......Page 657
2 The Context: Object-Oriented Network Security Simulator......Page 658
3 Our Proposed Work: Modeling Ordered UML-Based Scenarios......Page 659
4.1 Simulation Setting......Page 662
4.3 Verification of Simulation Results......Page 663
5 Conclusions......Page 664
References......Page 665
1 Introduction......Page 666
2 Automatic Global Matching......Page 667
2.1 Automatic Lung Segmentation......Page 668
2.3 Narrow Band Distance Propagation......Page 669
2.4 Selective Distance Measure and Optimization......Page 670
3 Experimental Results......Page 671
4 Conclusion......Page 674
References......Page 675
1 Introduction......Page 677
3 Volume Rendering Algorithm......Page 679
3.1 Voxel Counter Table......Page 681
3.3 Subvolume Prefetch......Page 682
3.4 Rendering Loop......Page 683
4.1 Implementation Issues......Page 685
5 Conclusions......Page 686
References......Page 687
1 Introduction......Page 689
2 Structure of Algorithm......Page 690
4 Tooth Segmentation Using Genetic Snake......Page 691
5 Reconstruction of Tooth......Page 693
6 Experimental Results......Page 694
References......Page 697
1 Introduction......Page 699
2.1 Facial Feature Points......Page 700
3 Feature Vertex Clustering......Page 701
4 Results and Discussion......Page 704
5 Conclusions......Page 706
References......Page 707
1 Introduction......Page 708
2.1 Magnetic Analysis......Page 709
2.2.1 Constitutive Equation for Shape Memory Alloy......Page 710
2.2.2 Finite Element Formulation......Page 713
3.1 Superelastic Analysis of SMA Beam......Page 714
3.2 Magneto-superelastic Analysis of FSMA Helical Spring......Page 715
4 Concluding Remarks......Page 716
References......Page 717
1 Introduction......Page 718
2.1 Problem Definition......Page 719
3 LSTAFF (Large STAFF)......Page 720
3.2 Large Block Extension......Page 721
4.1 Cost Estimation......Page 723
4.2 Experimental Result......Page 724
5 Conclusion......Page 725
References......Page 726
1 Introduction......Page 727
2 The Conventional Redundancy Analysis Algorithm......Page 728
3.2 Experiment......Page 730
3.3 CRA (Correlation Repair Algorithm) Define......Page 731
3.5 Result of the Simulation......Page 732
3.6 Performance Evaluation......Page 733
References......Page 734
1 Introduction......Page 735
2.1 Modeling Issue at IBIS Model......Page 736
2.2 SPICE Behavioral Model......Page 737
2.3 Modeling Using Switching Time Coefficient......Page 738
2.4 Proposed Algorithm......Page 739
3 SPICE Simulation......Page 740
4 Conclusion......Page 742
References......Page 744
Back matter......Page 745