Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society for Simulation
Journal Basic Information
Journal DOI :
The Korea Society for Simulation
Editor in Chief :
Volume & Issues
Volume 15, Issue 4 - Dec 2006
Volume 15, Issue 3 - Sep 2006
Volume 15, Issue 2 - Jun 2006
Volume 15, Issue 1 - Mar 2006
Selecting the target year
The Study on the Deadlock Avoidance using the DAPN and the Adjacency Matrix
Song, Yu-Jin ; Lee, Jong-Kun ;
Journal of the Korea Society for Simulation, volume 15, issue 1, 2006, Pages 1~10
The Flexible Management System (FMS) consists of parallel and concurrent machines, pieces of equipment, and carrying systems classified as buffers, tools, and routers, respectively. The concurrent flow of multiple productions in a system is competed with one another for resources and this resulting competition can cause a deadlock in FMS. Since a deadlock is a condition in which the excessive demand for the resources being used by others causes activities to stop, it is very important to detect and prevent a deadlock. Herein a new algorithm has been studied in order to detect and prevent deadlocks, after defining a relationship between the general places and resource share places in Petri nets like as DAPN: Deadlock Avoidance Petri Net. For presenting the results, the suggested algorithms were also adapted to the models that demonstrated FMS features.
Design of A PLC Program Simulator for Nuclear Plant Using Compiler Technology
Lee, Wan-Bok ; Roh, Chang-Hyun ;
Journal of the Korea Society for Simulation, volume 15, issue 1, 2006, Pages 11~17
This paper shows a case study of designing a PLC logic simulator that was developed to simulate and verify PLC control programs for nuclear plant systems. The nuclear control system requires strict restrictions rather than normal process control system does, as it works with a high-risky and dangerous nuclear plant. One is that it should assure the safeness of the control programs by exploiting severe testing. The other restriction is that the control programs should be executed fast enough such that they could control multi devices concurrently in real-time. To cope with these restrictions, we devised a logic compiler which generates C-code programs from given PLC logic programs. Once the logic program was translated into C-code, the program could be analyzed by conventional software analysis tools and could be used to construct a fast logic simulator after cross-compiling, in fact, that is a kind of compiled-code simulator.
Effectiveness Analysis of HOV Lane Using Simulation
Ki, Yong-Kul ; Hong, Sung-Ho ; Kim, Jin-Woo ; Baik, Doo-Kwon ;
Journal of the Korea Society for Simulation, volume 15, issue 1, 2006, Pages 19~25
As metropolitan areas are rapidly growing in both a lot of population and traffic volume, it causes traffic congestion. Generally, High Occupancy Vehicle (HOV) lanes may increase the efficiency of road usage. The main contribution in this paper is to provide the scientific attempt to measure the effectiveness with regard to HOV lanes adaptation using an Integration simulation tool in order to alleviate the traffic congestion in Olympic highway.
Performance evaluations of a link state update mechanism considering traffic variation
Choi, Seung-Hyuk ; Jung, Myoung-Hee ; Yang, Mi-Jeong ; Kim, Tae-Il ; Park, Jae-Hyung ; Chung, Min-Young ;
Journal of the Korea Society for Simulation, volume 15, issue 1, 2006, Pages 27~33
To guarantee QoS (Quality of Service), routers should determine routing paths satisfying service requirements, based on link state information as well as network topology. Link status database (LSD) in routers should be efficiently managed to effectively reflect the current state of all links. However, there is a trade off between the exact reflection of the current link status and its update cost. For exactly reflecting the current link status, each router immediately notifies its neighbors that link state information is changed. This may degrade performance of the router due to the processing of link state update messages. On the other side, if the current link state information is not updated appropriately, a route setup request can be rejected because of the discrepancy between the current link state information and previously updated link state information in LSD. In this paper, we propose a traffic variation based link state update algorithm for adaptively controlling the generation of link state update messages and compare its performance with those of four existing algorithms by intensive simulations.
Development of Sensor Network Simulator for Estimating Power Consumption and Execution Time
Kim, Bang-Hyun ; Kim, Tae-Kyu ; Jung, Yong-Doc ; Kim, Jong-Hyun ;
Journal of the Korea Society for Simulation, volume 15, issue 1, 2006, Pages 35~42
Sensor network, that is an infrastructure of ubiquitous computing, consists of a number of sensor nodes of which hardware is very small. The network topology and routing scheme of the network should be determined according to its purpose, and its hardware and software may have to be changed as needed from time to time. Thus, the sensor network simulator being capable of verifying its behavior and estimating performance is required for better design. Sensor network simulators currently existing have been developed for specific hardwares or operating systems, so that they can only be used for such systems and do not provide any means to estimate the amount of power consumption and program execution time which are major issues for system design. In this study, we develop the sensor network simulator that can be used to design and verify various sensor networks without regarding to types of applications or operating systems, and also has the capability of predicting the amount of power consumption and program execution time. For this purpose, the simulator is developed by using machine instruction-level discrete-event simulation scheme. As a result, the simulator can be used to analyze program execution timings and related system behaviors in the actual sensor nodes in detail. Instruction traces used as workload for simulations are executable images produced by the cross-compiler for ATmega128L microcontroller.
A study on the co-operative modeling between discrete-event system and continuous-time system for UAV system
Kang, Kwang-Chun ; Choi, Sung-Do ; You, Yong-Jun ;
Journal of the Korea Society for Simulation, volume 15, issue 1, 2006, Pages 43~50
The major objective of this paper is to propose a hybrid simulation environment for autonomous UAV system by integrating the continuous-time model with discrete-event model. Proposed system is able to support high autonomous behavior by combining the planner, recognizer, and controller model to deal with the HL20 AIRPLANE model. Thus, the high level decision may be efficiently issued even upon the unexpected circumstance. The proposed system model has been successfully verified by several simulation test performed on the DEVS simulation S/W environment.
A Case Study of the Design of Robot Welding Station in an Excavator Factory Using 3D Simulation
Moon, Dug-Hee ; Cho, Hyun-Il ; Baek, Seung-Geun ;
Journal of the Korea Society for Simulation, volume 15, issue 1, 2006, Pages 51~58
Virtual Manufacturing is a powerful methodology for developing a new product, new equipment and new production system. It enables the checking errors in design before production. This paper is a case study of virtual manufacturing in an excavator factory. The final welding operations of the boom and the rotating table of upper body are selected for application. 3D models of parts and fixtures are developed with
and 3D simulation models are developed with
. These models are used for verifying the design of fixture and for the motion design of robot. As a result, the manual welding systems are replaced by automatic systems and many design errors are corrected in the design phase, which reduces the developing cost and time.
Efficient Media Publication Using SuperSQL Processor
Shin, Sang-Gyu ; Motomichi, Toyama ; Kim, Tai-Suk ;
Journal of the Korea Society for Simulation, volume 15, issue 1, 2006, Pages 59~67
In this paper, we propose an effective use of SuperSQL for efficient media publication that utilizes relational databases. SuperSQL is an enhanced SQL processing system that converts data stored in relational databases into a variety or applied formats, such as XML and HTML, as a result or query. In order to integrate various media generators in SuperSQL query processor, we discuss methods to prepare both for new media promptly and for efficient media publication processing system. This research makes two main contributions: (1) it is a study about methods to integrate media generators by combining common processes in SuperSQL query processor, and (2) it introduces the trinity data model, which divide the media generating processes into three aspects, which are value, structure and medium abstraction. We also show the good performance and feasibility of our system.
Interest Based Clustering Mechanism for Hybrid P2P
Lee, Lee-Sub ;
Journal of the Korea Society for Simulation, volume 15, issue 1, 2006, Pages 69~75
P2P services occupy more then 50% of the internet traffics. A huge number of query packets are generated since pure P2P based models rely on message flooding for their query mechanisms. In this study, the numbers of query messages generated in the pure P2P and hybrid P2P model are analyzed. The results show that hybrid P2P models also could suffer from message flooding. To reduce the message flooding, this study proposes an interest based clustering mechanism for hybrid P2P services. By applying this clustering algorithm, it could reduce 99.998% of the message flooding. The proposed algorithm also reduces the cost of the joining operations by storing previous supernodes.
Provisioning Anonymous Communication in Ad Hoc Networks
Kang, Seung-Seok ;
Journal of the Korea Society for Simulation, volume 15, issue 1, 2006, Pages 77~85
The cost of downloading content from the Internet may be costly for mobile device users using its 3G connection, because the 3G connection cost to download data from the Internet is a function of the amount of data downloaded. This paper introduces an approach in which mobile devices, called peers, form an ad hoc network and share their downloaded content with others. As an example, spectators may want to collect/share information about players and game records in a stadium. In an art gallery, visitors may want to retrieve some background information about the displayed work from the nearby ad hoc network. In an outdoor class, a teacher may download today's topic files from the Internet, and all students may share the content with minimal or no cost paid. This is possible if mobile device has both a 3G interface and a wireless LAN interface. If the peers want to improve privacy md discourage traffic analysis when sharing content, this paper describes a low-delay anonymous connection between the sending peer and the receiving peer using two additional peers. Simulation results show that the transmission time overhead of the anonymous connection may increase 50% or less as the number of peers increase or the peers are scattered over the larger area.
Modeling and Implementation of IDS for Security System simulation using SSFNet
Kim, Yong-Tak ; Kwon, Oh-Jun ; Seo, Dong-Il ; Kim, Tai-Suk ;
Journal of the Korea Society for Simulation, volume 15, issue 1, 2006, Pages 87~95
We need to check into when a security system is newly developed, we against cyber attack which is expected in real network. However it is impossible to check it under the environment of a large-scale distributive network. So it is need to simulate it under the virtual network environment. SSFNet is a event-driven simulator which can be represent a large-scale network. Unfortunately, it doesn't have the module to simulate security functions. In this paper, we added the IDS module to SSFNet. We implement the IDS module by modeling a key functions of Snort. In addition, we developed some useful functions using Java language which can manipulate easily a packet for network simulation. Finally, we performed the simulation to verify the function if our developed IDS and Packets Manipulation. The simulation shows that our expanded SSFNet can be used to further large-scale security system simulator.