Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society for Simulation
Journal Basic Information
Journal DOI :
The Korea Society for Simulation
Editor in Chief :
Volume & Issues
Volume 17, Issue 4 - Dec 2008
Volume 17, Issue 3 - Sep 2008
Volume 17, Issue 2 - Jun 2008
Volume 17, Issue 1 - Mar 2008
Selecting the target year
Cell Selection Method using Multi-Criteria Decision Making in Heterogeneous Networks
Lee, Jong-Chan ; Park, Sang-Joon ;
Journal of the Korea Society for Simulation, volume 17, issue 3, 2008, Pages 1~8
It is essential to maintain constant QoS despite of cell overload or erroneous wireless link during transmission because QoS of a multimedia service may be severely degraded by small delay or packet loss. This paper deals with a cell selection method for supporting the QoS of multimedia services over heterogeneous networks. The proposed scheme is based on Fuzzy Multi-Criteria Decision Making (FMCDM), in which uncertain parameters such as user system preference, the communication cost and cell load, and the transmission delay are used in the decision process using the aggregation function in fuzzy set theory. In this scheme, errors in the evaluation parameters impose milder changes on the total evaluation value than in binary logics. Simulation is focused on the average delay and packet loss rate, and the simulation results show that our proposed method provides mobile terminals the optimal performance.
A Study on performance improvement of network security system applying fuzzy logic
Seo, Hee-Suk ;
Journal of the Korea Society for Simulation, volume 17, issue 3, 2008, Pages 9~18
Unlike conventional researches, we are able to i) compare the fuzzy logic based BBA with non-fuzzy BBA for verifying the effective performance of the proposed fuzzy logic application ii) dynamically respond to the intrusion using BBA whereas the previous IDS was responding statically and iii) expect that this would be a cornerstone for more practical application researches (analyzing vulnerability and examining countermeasures, etc.) of security simulation. Several simulation tests performed on the targer network will illustrate our techniques. And this paper applies fuzzy logic to reduce the false negative that is one of the main problems of IDS. Intrusion detection is complicated decision-making process, which generally involves enormous factors about the monitored system. Fuzzy evaluation component model, which is a decision agent in the distributed IDS, can consider various factors based on fuzzy logic when an intrusion behavior is detected. The performance obtained from the coordination of intrusion detection agent with fuzzy logic is compared against the corresponding non fuzzy type intrusion detection agent. The results of these comparisons allow us to evaluate a relevant improvement on the fuzzy logic based BBA.
Accurate Prediction of the Pricing of Bond Using Random Number Generation Scheme
Park, Ki-Soeb ; Kim, Moon-Seong ; Kim, Se-Ki ;
Journal of the Korea Society for Simulation, volume 17, issue 3, 2008, Pages 19~26
In this paper, we propose a dynamic prediction algorithm to predict the bond price using actual data set of treasure note (T-Note). The proposed algorithm is based on term structure model of the interest rates, which takes place in various financial modelling, such as the standard Gaussian Wiener process. To obtain cumulative distribution functions (CDFs) of actual data for the interest rate measurement used, we use the natural cubic spline (NCS) method, which is generally used as numerical methods for interpolation. Then we also use the random number generation scheme (RNGS) to calculate the pricing of bond through the obtained CDF. In empirical computer simulations, we show that the lower values of precision in the proposed prediction algorithm corresponds to sharper estimates. It is very reasonable on prediction.
A Fuzzy Logic-Based False Report Detection Method in Wireless Sensor Networks
Kim, Mun-Su ; Lee, Hae-Young ; Cho, Tae-Ho ;
Journal of the Korea Society for Simulation, volume 17, issue 3, 2008, Pages 27~34
Wireless sensor networks are comprised of sensor nodes with resource-constrained hardware. Nodes in the sensor network without adequate protection may be compromised by adversaries. Such compromised nodes are vulnerable to the attacks like false reports injection attacks and false data injection attacks on legitimate reports. In false report injection attacks, an adversary injects false report into the network with the goal of deceiving the sink or the depletion of the finite amount of energy in a battery powered network. In false data injection attacks on legitimate reports, the attacker may inject a false data for every legitimate report. To address such attacks, the probabilistic voting-based filtering scheme (PVFS) has been proposed by Li and Wu. However, each cluster head in PVFS needs additional transmission device. Therefore, this paper proposes a fuzzy logic-based false report detection method (FRD) to mitigate the threat of these attacks. FRD employs the statistical en-route filtering scheme as a basis and improves upon it. We demonstrate that FRD is efficient with respect to the security it provides, and allows a tradeoff between security and energy consumption, as shown in the simulation.
A Facility Location Model Considering the Urban Spatial Structure by Genetic Algorithm
Na, Ho-Young ; Lee, Sang-Heon ;
Journal of the Korea Society for Simulation, volume 17, issue 3, 2008, Pages 35~44
Facility location problem is an important subject in many areas of modern business environment. In this paper, we deal with uncapacitated and multi-period facility location problem where the object is a maximization of total profit within predetermined cost. We assume that all demand have to be met. Particularly, we represent various types of customer based on four well-known urban spatial structures to represent a spread of customers. Those are concentric zone model, sector model, multiple nuclei model and star model respectively. We apply to the genetic algorithm to simulate a large scaled problem and develop simulator. We analyze both optimal numbers and locations of facilities for each urban structure. Furthermore, we examine the appropriate time to further expansion of the facilities in the planning horizon. The experimental results show that the developed algorithm can be applied effectively to the facility location problem in the various types of urban area.
A Study on Mine Artillery Hit Using DEVS
Chung, Young-Ho ; Shin, Ki-Tae ; Park, Jin-Woo ;
Journal of the Korea Society for Simulation, volume 17, issue 3, 2008, Pages 45~51
The enemy will attempt to destroy our troop's core facilities using various fire supports at the beginning of war. Among these fire supports, artillery is given a most deal of weight and mine artillery is a great threat to our troops because it has a superior predominance on the ability of survival. A study about hitting mine artillery has been developed inside the military field only. However, these studies had been mostly qualitative analyses, thus having limitations in the aspects of nonobjectiveness and simplicity. Current study attempts to develop theory on hitting mine artillery beginning from mine opening until the target got hit, based on the assumption that one side which has inferior force will attack first. We studied on hitting mine artillery in a quantitative way using DEVS method.
Design and Implementation of the RDF Web Ontology Access Control Model based on Oracle VPD
Jeong, Hye-Jin ; Jeong, Dong-Won ;
Journal of the Korea Society for Simulation, volume 17, issue 3, 2008, Pages 53~62
This paper proposes a new implementational model based on the security model of Oracle for Web ontology. Recently, several access control models using relational database security model for access control to Web ontology have been developing, and one of the most representative access control model is the RAC model. However, the RAC model is based on the standard security model, and thus it does not provide a implementational model for practical relational database management systems. In this paper, we propose an implementational model based on Oracle which is widely used and providing various security policies. This paper shows the implementation and experimental evaluation. Especially, the proposed model uses the VPD security model of Oracle and support high application and usability.
A Study on the Relationship Between Berth Occupancy Rate and Ship Size at Exclusive Bulk Terminal
Kim, Chang-Gon ; Jang, Seong-Yong ;
Journal of the Korea Society for Simulation, volume 17, issue 3, 2008, Pages 63~73
The aim of study is to analyze the berth occupancy rate according to the ship size. P Iron and steel company operate exclusive bulk terminal at P port and G port and the depth of water at berth are not so equal each other. And to reduce the sea transport cost between loading port and unloading port P and G, P company increases the number of large ship while ship scheduling. But it causes to increase the berth congestion at the specific water depth berth owing to the draught of large ship. At this point, usually ship waiting time starts to rise even at low levels of berth occupancy rate, and will rise more and more sharply at the level of full utilization. But it is not common at exclusive terminal like P port and G port. Bulk ships arrive at port according to the early planned arrival time and the coefficient of variation of ship arrival time is not so big. So queueing time at exclusive terminal does not rise sharply near 80-90 berth occupancy rate.
An Efficient Deadlock Detection Policy Using the Transitive Matrix of Resource Share Places
Kim, Jong-Woog ; Lee, Jong-Kun ;
Journal of the Korea Society for Simulation, volume 17, issue 3, 2008, Pages 75~83
A deadlock is a condition in which the excessive demand for the resources being used by others causes activities to stop and it is one of the important problems in process control system to detect and prevent deadlocks. While the reachability analyze methods or divide subnets for analyzing methods are well used, it requires a lot of times and effects to analyze the detection of the deadlock status. Furthermore, it could not be effective if the model is complex or huge. Therefore, it is necessary to develop a new and more efficient deadlock detection algorithm. In this paper, a deadlock detection conditions after analyzed the Petri Net using the transitive matrix has been proposed to solve these problems. For presenting the results, the suggested deadlock detection algorithm was also adapted to an illustrated FMS (Flexible Manufacturing System) model.
Constructing a Reservation Table for Automated Guided Vehicles in Port Container Terminal
Jeon, Su-Min ; Kim, Kap-Hwan ;
Journal of the Korea Society for Simulation, volume 17, issue 3, 2008, Pages 85~94
Automated Guided Vehicles (AGVs) are important equipment in automated container terminals. To utilize AGVs for transporting containers from a position to another, the deadlock is a serious problem that must be solved before they are deployed to real operations. This study assumes that traveling area for AGVs are divided into a large number of grid-blocks and, as a method of traffic control, grid-blocks are reserved in advance during the travel of AGVs. The purposes of the reservation are to make the room between AGVs and to prevent deadlocks. Because the size of an AGV is much larger than the size of a grid-block on guide paths, this study assumes an AGV may occupy more than one grid-block at the same time. This study suggests a method for constructing a table of reservation schedules by using a simulation. A sensitivity analysis was conducted to evaluate the performance of the reservation method in this study.
Distributed Authentication Model using Multi-Level Cluster for Wireless Sensor Networks
Shin, Jong-Whoi ; Yoo, Dong-Young ; Kim, Seog-Gyu ;
Journal of the Korea Society for Simulation, volume 17, issue 3, 2008, Pages 95~105
In this paper, we propose the DAMMC(Distributed Authentication Model using Multi-level Cluster) for wireless sensor networks. The proposed model is that one cluster header in m-layer has a role of CA(Certificate Authority) but it just authenticates sensor nodes in lower layer for providing an efficient authentication without authenticating overhead among clusters. In here, the m-layer for authentication can be properly predefined by user in consideration of various network environments. And also, the DAMMC uses certificates based on the threshold cryptography scheme for more reliable configuration of WSN. Experimental results show that the cost of generation and reconfiguration certification are decreased but the security performance are increased compared to the existing method.