Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society for Simulation
Journal Basic Information
Journal DOI :
The Korea Society for Simulation
Editor in Chief :
Volume & Issues
Volume 16, Issue 4 - Dec 2007
Volume 16, Issue 3 - Sep 2007
Volume 16, Issue 2 - Jul 2007
Volume 16, Issue 1 - Mar 2007
Selecting the target year
Decentralized Broker-BBsed Model for Resource Management in Grid Computing Environment
Ma, Yong-Beom ; Lee, Jong-Sik ;
Journal of the Korea Society for Simulation, volume 16, issue 2, 2007, Pages 1~8
Resource management in grid computing environment is essential for integration and interaction among heterogeneous resources. This paper discusses resource management methods of centralized and decentralized broker-based modeling for solving complex problems of resource management and presents design and development of the decentralized broker-based resource management modeling in grid computing environment. This model comprises a global resource broker and a local resource broker, and we derive reduction of communication and functional dispersion of Job management using a local resource broker. The simulation experiment shows the improvement of resource utilization and average response time and proves that this model improves utilization of resources and replies to user requests promptly.
Application of Group Master Cache for the Integrated Environment of SAN and NAS
Lee, Won-Bok ; Park, Jin-Won ;
Journal of the Korea Society for Simulation, volume 16, issue 2, 2007, Pages 9~15
As the Internet grows and the mass multimedia data become popular, the storage system migrates from DAS, where the storage and the server are directly connected, to SAN and NAS. SAN connects the storages with a separate network, and NAS provides only file services, connects the storages with IP network. However, SAN and NAS can not fulfill the needs for companies if used separately, thus are asked to be integrated. In this research, we propose an efficient data sharing method which employees the concept of GMC, Croup Master Cache for the integrated environment of SAN and NAS. GMC is based on MCI, Metadata server and Cluster system Integration, but tries to solve the high expansion cost problem with MCI. We introduce the basic concept of GMC, compare the performance of GMC with that of MCI using computer simulation.
A Virtual Grid-Based Routing Algorithm in Ad Hoc Networks
Lee, Jong-Min ; Kim, Seong-Woo ;
Journal of the Korea Society for Simulation, volume 16, issue 2, 2007, Pages 17~26
In this paper, we propose a basic virtual grid-based routing algorithm in order to devise an efficient routing method in ad hoc networks using the location information of nodes, energy level, etc. A packet is forwarded to the X-axis direction at first based on the location information of a destination node, and then it is forwarded to the Y-axis direction as its location becomes close to the destination from the viewpoint of the X-axis. Due to the selection of next hop nodes to deliver a packet from a certain node to a destination node, we can regard the whole network as a virtual grid network. The proposed routing algorithm determines routing paths using the local information such as the location information of a destination and its neighbor nodes. Thus, the routing path setup is achieved locally, by which we can expect reduction in network traffics and routing delays to a destination. To evaluate the performance of the proposed routing algorithm, we used the network simulator ns2 and compared its network throughput with that of an existing routing algorithm.
Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks
Kim, Sang-Ryul ; Cho, Tae-Ho ;
Journal of the Korea Society for Simulation, volume 16, issue 2, 2007, Pages 27~35
When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.
A Simulation study of EWMA control using dynamic control parameter
Kang, Seok-Chan ; Hwang, Ji-Bin ; Kim, Sung-Shick ; Kim, Ji-Hyun ;
Journal of the Korea Society for Simulation, volume 16, issue 2, 2007, Pages 37~44
EWMA is one of the most popular controller method used in Run-to-Run control system for semiconductor manufacturing. The value of the control parameter in EWMA has major effect on the result. Therefore, it is important to use control parameter value fitting for the process state. When the process is unstable, it is more efficient to change EWMA control parameter dynamically to compensate for the changing process state than using fixed control parameter. In this paper, we review previous studies using dynamic EWMA control parameter and propose a new algorithm complementing the weaknesses of the previous studies. The performance of the proposed algorithm is validated using simulation.
A Simulation-based Optimization Approach for the Selection of Design Factors
Um, In-Sup ; Cheon, Hyeon-Jae ; Lee, Hong-Chul ;
Journal of the Korea Society for Simulation, volume 16, issue 2, 2007, Pages 45~54
In this article, we propose a different modeling approach, which aims at the simulation optimization so as to meet the design specification. Generally, Multi objective optimization problem is formulated by dependent factors as objective functions and independent factors as constraints. However, this paper presents the critical(dependent) factors as objective function and design(independent) factors as constraints for the selection of design factors directly. The objective function is normalized far the generalization of design factors while the constraints are composed of the simulation-based regression metamodels fer the critical factors and design factor's domain. Then the effective and fast solution procedure based on the pareto optimal solution set is proposed. This paper provides a comprehensive framework for the system design using the simulation and metamodels. Therefore, the method developed for this research can be adopted for other enhancements in different but comparable situations.
Directional Messsging Scheme for considering Nodes Energy Consumption in Sensor Networks
Jeon, Jin-Hwan ; Jeong, Eun-Joo ; Park, Sang-Joon ; Khil, A-Ra ; Kim, Byung-Gi ;
Journal of the Korea Society for Simulation, volume 16, issue 2, 2007, Pages 55~64
The sensor nodes on the sensor network transmit the reply for the queries of ADV(Advertisement) message from sink node, and the sink node presents the received information to users. To find the relevant sensor nodes, routing algorithms disseminates ADV messages to the whole network. Thus not only the relevant sensor nodes but also the irrelevant ones consume considerable amount of energy. To alleviate such kind of energy consumption, this thesis proposes a new routing algorithm and coins it Directed Messaging. It propagates ADV message only to the limited direction and changes the direction until the requested sensor node is found. In this way, Directed Messaging reduces unnecessary energy consumption and enhance the efficiency of the networks. Performance of the Directed Messaging algorithm is evaluated through simulation and compared with Directed Diffusion algorithm. Simulation results show that it has better performance than Directed Diffusion.
Developing Automatic Lens Module Assembly System Using 3D Simulation
Moon, Dug-Hee ; Lee, Jun-Seok ; Baek, Seung-Geun ; Zhang, Bing-Lin ; Kim, Yeong-Gyoo ;
Journal of the Korea Society for Simulation, volume 16, issue 2, 2007, Pages 65~74
Virtual manufacturing (VM) is a powerful technology for developing a new product, new equipment and new manufacturing system, and three-dimensional (3D) simulation is a core technology in VM. 3D simulation involves both mechanical simulation and discrete event simulation. This paper introduces a case study of implementing 3D simulation for developing an automatic assembly line in a Korean optical factory. This factory produces a lens module that is the part of a phone-camera. 3D simulation technology is applied from the early stage of development. In the conceptual design and the initial design phases for individual equipment, 3D mechanical simulation using
is conducted. 3D discrete event simulation with
is applied to the detailed design of the equipment and of the whole system. The focus of the simulation is to verify the technical and economical feasibility of the new automatic system. As a result, the takt time is reduced to the quarter of the manual system, and the number of workers in a line is reduced tremendously.
Ana1ysis of Unobservable Queueing Model with Arrival and Departure Points: LCFS
Kim, Yun-Bae ; Park, Jin-Soo ;
Journal of the Korea Society for Simulation, volume 16, issue 2, 2007, Pages 75~81
Previous queue inference has been studied with some limits. Larson's inference engine, which is the basis for this paper, also processed with basic assumption that arrival process is poisson process. Our inference method, which relaxes the poisson process assumption, must be a useful tool for looking into unobservable inside of queueing systems, as well as calculating accurate system performance. This paper employs these inference methods and proves the validity. Then we apply this method to system analysis for more complicated models. At first, we suggest methods to system with known number of servers, then expand to unknown number of servers. For validating our inference approach, we run some simulation models and compare true values with our results.