Skip to main content

Simulation & Modeling (ASSIGNMENTS) [LAB + Theory}

































Roll No. Assignments
2032,4501 Music Shop Inventory Problem,Simulation of computer system
4502,4506 Web Simulation,
4507,4568,4538 Food bazaar, Simulation of Queuing System and its applications e.g. Food Bazaar
4508,4536,4546
Simulating a banquet hall,Input Output modeling for simulation
4509
Random Number generation for simulation
4510,4525,4520 Telephone Simulation System, Application of Simulation for solving network flow problems
4511,4543 Simulating Car Parking
4513,4533,4531 Monte-carlo Simulation
4514 Simulating grocery Shop
4516,4535,4551/08 Traffic Simulation, Simulation of websites to improve traffic for a website
4515,4528,4529 Understanding GPSS
4518,4554,4566 Gaming Simulation
4519,4524 Conducing web simulation on e-commerce portals
4530,4551,4556 Simulating Delhi Metro, Understanding Object oriented simulation
4534,4557 Learning to solve Problems using simulation
4539,4542 Developing a Simulation Database: Studying case studies/FAQs
4540,4547,4543 Online Traffic Monitoring system
4541,4545,4555 Developing a Simulator for keyword analysis,Application of Simulation for Forecasting
4537,4532,4521 Random Number Generation in C++,Studying Simulation languages like SIMSCRIPT,GPSS,MODSIM
4550,4563 Solving problems for input modeling [17,18,20,21]
4523,4552 Study applications of random generators in simulation and other fields illustrating by solving problems [2,9,10,15]
4545660,4562 Application of Simulation for security and anti-spamming
4522,4526 Understanding DEVS
44532,4533,4568 Using general purpose simulation language for problem solving [pg 119 1,2,3,4,5)
4535,4538,4541 Developing simulation program in C [pros & cons] [Pg. 119 7,8,9,10]
4544,4548 Output Analysis for a single model
4549,4552 Comparison & Evaluation of Alternative system designs
4553,4558 Simulation of computer networks

Comments

Popular posts from this blog

Advantages and Disadvantages of EIS Advantages of EIS Easy for upper-level executives to use, extensive computer experience is not required in operations Provides timely delivery of company summary information Information that is provided is better understood Filters data for management Improves to tracking information Offers efficiency to decision makers Disadvantages of EIS System dependent Limited functionality, by design Information overload for some managers Benefits hard to quantify High implementation costs System may become slow, large, and hard to manage Need good internal processes for data management May lead to less reliable and less secure data

Inter-Organizational Value Chain

The value chain of   a company is part of over all value chain. The over all competitive advantage of an organization is not just dependent on the quality and efficiency of the company and quality of products but also upon the that of its suppliers and wholesalers and retailers it may use. The analysis of overall supply chain is called the value system. Different parts of the value chain 1.  Supplier     2.  Firm       3.   Channel 4 .   Buyer

Big-M Method and Two-Phase Method

Big-M Method The Big-M method of handling instances with artificial  variables is the “commonsense approach”. Essentially, the notion is to make the artificial variables, through their coefficients in the objective function, so costly or unprofitable that any feasible solution to the real problem would be preferred, unless the original instance possessed no feasible solutions at all. But this means that we need to assign, in the objective function, coefficients to the artificial variables that are either very small (maximization problem) or very large (minimization problem); whatever this value,let us call it Big M . In fact, this notion is an old trick in optimization in general; we  simply associate a penalty value with variables that we do not want to be part of an ultimate solution(unless such an outcome is unavoidable). Indeed, the penalty is so costly that unless any of the  respective variables' inclusion is warranted algorithmically, such variables will never be p