Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society for Simulation
Journal Basic Information
Journal DOI :
The Korea Society for Simulation
Editor in Chief :
Volume & Issues
Volume 16, Issue 4 - Dec 2007
Volume 16, Issue 3 - Sep 2007
Volume 16, Issue 2 - Jul 2007
Volume 16, Issue 1 - Mar 2007
Selecting the target year
New Factor for Balancing Cost and Delay Unicast Algorithm Based on Statistic Interval Estimation
Kim, Moon-Seong ; Bang, Young-Cheol ; Choo, Hyun-Seung ;
Journal of the Korea Society for Simulation, volume 16, issue 1, 2007, Pages 1~9
The development of efficient Qualify of Service (QoS) routing algorithms in high speed networks is extremely difficult to achieve, because in order to operate, divergent services require various quality conditions. If the parameter of concern is to measure the delay on a specific link, the routing algorithm obtains the Least Delay (LD) path. Meanwhile, if the parameter is to measure the link cost, the Least Cost (LC) path is calculated. The Delay Constrained Least Cost (DCLC) path problem of the mixed issues on the LD and LC has been shown to be NP-hard. The path cost of LD path is relatively more expensive than that of the LC path, and the path delay of the LC path is relatively higher than that of the LD path in the DCLC problem. In this paper, we introduce the new factor for balancing cost and delay. The simulation result shows that our introduced factor is satisfied to solve the DCLC problem.
Implementation of the Metadata Registry-based Framework for Semantic Interoperability of Application in Ubiquitous Environment
Kim, Jeong-Dong ; Jeong, Dong-Won ; Kim, Jin-Hyung ; Baik, Doo-Kwon ;
Journal of the Korea Society for Simulation, volume 16, issue 1, 2007, Pages 11~19
Under ubiquitous environment, applications can gather and utilize various sensing information. There are many issues such as energy management, protocol standardization, independency on sensor fields, and security to be resolved for the complete ubiquitous computing. Especially, the independent information access in the sensor field is one of the most important issues to maximize the usability of sensors in various sensor fields. However, existing frameworks are not suitable for the ubiquitous computing environment because of data heterogeneity between data elements in sensor fields. Existing applications are dependent to sensor fields and sensors in the existing ubiquitous computing on environment is dependent to the application in the sensor field. In other word, an application can utilize just information from a specific sensor field. To overcome this restriction, many issues from a hardware or software view must be resolved. In this paper, we provide the design and implementation of the Metadata Registry-based framework (UbiMDR) of the Ubiquitous environment. This framework can provides the semantic interoperability among ubiquitous applications or various sensor fields. In addition, we describe comparison evaluation between conventional Ubiquitous computing framework and UbiMDR framework with data accuracy of interoperability.
Automated Measurement System of Carotid Artery Intima-Media Thickness based on Dynamic Programming
Lee, Yu-Bu ; Kim, Myoung-Hee ;
Journal of the Korea Society for Simulation, volume 16, issue 1, 2007, Pages 21~29
In this paper, we present a method of detecting the boundary of the intima-media complex for automated measurement based on dynamic programming from carotid artery B-mode ultrasound images and then show the experimental results. We apply the dynamic programming for determining the optimal locations that a cost function is minimized. The cost function includes cost terms which are representing image features such as intensity, intensity gradient and geometrical continuity of the vessel interfaces. Moreover, we improve the boundary continuity by applying the B-spline to smooth the rough boundary due to noise such as speckle, dropout and weak edges. The proposed method has obtained more accurate reproducible results than conventional edge-detection by considering multiple image features and ensures efficient automated measurement by solving the problems of the inter- and intra-observer variability and its inefficiency due to manual measurement.
Movement Simulation on the Path Planned by a Generalized Visibility Graph
Yu, Kyeon-Ah ; Jeon, Hyun-Joo ;
Journal of the Korea Society for Simulation, volume 16, issue 1, 2007, Pages 31~37
The importance of NPC's role in computer games is increasing. An NPC must perform its tasks by perceiving obstacles and other characters and by moving through them. It has been proposed to plan a natural-looking path against fixed obstacles by using a generalized visibility graph. In this paper we develop the execution module for an NPC to move efficiently along the path planned on the generalized visibility graph. The planned path consists of line segments and arc segments, so we define steering behaviors such as linear behaviors, circular behaviors, and an arriving behavior for NPC's movements to be realistic and utilize them during execution. The execution module also includes the collision detection capability to be able to detect dynamic obstacles and uses a decision tree to react differently according to the detected obstacles. The execution module is tested through the simulation based on the example scenario in which an NPC interferes the other moving NPC.
Vehicle Routing Problem with Delay Time in the Downtown
Yun, Tae-Sik ; Kim, Kyung-Sup ; Jeong, Suk-Jae ;
Journal of the Korea Society for Simulation, volume 16, issue 1, 2007, Pages 39~47
The travel speed between two locations within the downtown differs according to time horizon and district. Also, There is delay time on numerous traffic signals and bottle neck areas. It has an influence on planning the vehicle routing. However, there are almost no studies focusing on delay time for distance and travel time between two locations among the existing researches for vehicle routing problem (VRP). In this paper, we approach the real VRP by designing the model which estimates the delay time for traffic signal and bottle neck areas. The results of computation experiment demonstrate that proposed method performs well and have better solution than other method not considering the delay time.
System Modeling for Web Service based on Service-Oriented Architecture
Lee, Seong-Kyu ; Jin, Chan-Uk ; Kim, Tai-Suk ;
Journal of the Korea Society for Simulation, volume 16, issue 1, 2007, Pages 49~57
Service-Oriented Architecture(SOA) is improving rapidly in IT Environment. Enterprise companies interest in implementation infrastructure based on SOA to adapt quick changes of large and complex distributed environment. SOA is a component model that inter-relates the different functional units of an application, called services, through interfaces and contacts between theses services. In this paper, we studied the concept of the relationship between SOA and standard web service core and therefore, we model the web service based on SOA. We implemented the application and business service architecture using web service that include the XML and SOAP. We confirmed that how the each SOA characters like interoperability, reusability, scalability and flexible business process adapted to web service and present a web service modeling that is maintained the neutrality using loose service coupling through the method of service model process and web service architecture designing methodology based on SOA.
A Dependability Analysis of the Group Management Protocol for Intrusion Tolerance of Essential Service
Kim, Hyung-Jong ; Lee, Tai-Jin ;
Journal of the Korea Society for Simulation, volume 16, issue 1, 2007, Pages 59~68
IT (Intrusion Tolerant) technology is for guaranteeing the availability of service for certain amount time against the attacks which couldn't be prevented by the currently deployed information security countermeasures. IT (Intrusion Tolerant) technology mainly makes use of the replication of service and system fur enhancing availability, and voting scheme and GMP (Croup Management Protocol) are used for the correctness of service. This paper presents a scheme to analyze dependability of IT (Intrusion Tolerant) technology through probabilistic and simulation method. Using suggested analysis scheme, we can analyze the robustness and make a sensible trade-offs in of IT (Intrusion Tolerant) technology.