Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society for Simulation
Journal Basic Information
Journal DOI :
The Korea Society for Simulation
Editor in Chief :
Volume & Issues
Volume 18, Issue 4 - Dec 2009
Volume 18, Issue 3 - Sep 2009
Volume 18, Issue 2 - Jun 2009
Volume 18, Issue 1 - Mar 2009
Selecting the target year
A Study on the Optimal Number of Interfaces in Wireless Mesh Network
Oh, Chi-Moon ; Kim, Hwa-Jong ; Lee, Goo-Yeon ; Jeong, Choong-Kyo ;
Journal of the Korea Society for Simulation, volume 18, issue 1, 2009, Pages 1~7
In this paper, we obtain the optimal number of interfaces/channels in wireless mesh networks by simulation. The simulation study is done in static multi-channel multi-interface environment. When many nodes use a single interface and channel and contend for the channel, collisions of RTS/CTS results in network performance degradation. To avoid such degradation and reduce interferences between the adjacent nodes, use of multi-interface/channel is considered. 802.11a and 802.11b systems offer 12 and 3 orthogonal channels respectively and multi-interface/channel scheme could be applied. But rare research about the optimal number of interfaces/channels has been studied. Therefore, in this paper, simulation study for the optimal number of interfaces/channels in wireless mesh network is made.
An Performance Evaluation of the Deadlock Detection Algorithm in Petri Nets
Kim, Jong-Woog ; Lee, Jong-Kun ;
Journal of the Korea Society for Simulation, volume 18, issue 1, 2009, Pages 9~16
Since a deadlock is a condition in which the excessive demand for the resources being used by others causes activities to stop, it is very important to detect and prevent a deadlock. About the deadlock detection analysis methods are may divide like as Siphon, DAPN and transitive matrix, but it's very difficult to evaluate the performance. Since DES (Discrete Event Systems) is NP-hard, and these detection and avoidance methods used various factors in each technique, it's made difficult to compare with each other's. In this paper, we are benchmarked these deadlock detection analyze methods based on the complexity, the detection time and the understanding after approached to one example.
Fuzzy-based Segment-Boost Method for Effective Face Recognition
Chang, Won-Suk ; Noh, Chang-Hyeon ; Lee, Jong-Sik ;
Journal of the Korea Society for Simulation, volume 18, issue 1, 2009, Pages 17~25
This paper suggests fuzzy-based Segment-Boost method and an effective method for face recognition using the fuzzy-based Segment-Boost. Fuzzy-based Segment-Boost eliminates the limitations of Segment-Boost, and it guarantees improved learning performance and the stability of the performance. By using the fuzzy theory, fuzzy-based Segment-Boost optimizes the selection number of sub-vectors, and leads the optimized learning performance. The fuzzy controller designed in this paper measures learning performance of the fuzzy-based Segment-Boost, and it controls the selection number of sub-vectors by inferring the optimized selection number. The simulation results show that the fuzzy controller inferred the selection number which is very approximate to the true optimized value. As a result, fuzzy-based Segment-Boost showed higher face recognition rate than compared boosting methods and it preserves the velocity of feature selection as fast as that of Segment-Boost. From the experimental results, it was proved that fuzzy-based Segment-Boost has improved and stable performances of learning, feature selection and face recognition.
Network Traffic Analysis System Based on Data Engineering Methodology
Han, Young-Shin ; Kim, Tae-Kyu ; Jung, Jason J. ; Jung, Chan-Ki ; Lee, Chil-Gee ;
Journal of the Korea Society for Simulation, volume 18, issue 1, 2009, Pages 27~34
Currently network users, especially the number of internet users, increase rapidly. Also, high quality of service is required and this requirement results a sudden network traffic increment. As a result, an efficient management system for huge network traffic becomes an important issue. Ontology/data engineering based context awareness using the System Entity Structure (SES) concepts enables network administrators to access traffic data easily and efficiently. The network traffic analysis system, which is studied in this paper, is designed and implemented based on a model and simulation using data engineering methodology to be avaiable in evaluating large network traffic data. Extensible Markup Language (XML) is used for metadata language in this system. The information which is extracted from the network traffic analysis system could be modeled and simulated in Discrete Event Simulation (DEVS) methodology for further works such as post simulation evaluation, web services, and etc.
A Study for Algorithm of Safe Transmission in Distributed Network
Kim, Tae-Kyung ; Seo, Hee-Suk ; Lee, Dong-Young ;
Journal of the Korea Society for Simulation, volume 18, issue 1, 2009, Pages 35~40
The reliability of processing the distributed application becomes more and more important issues in distributed network as the usage of distributed network increases. Because the distributed network applications are processed in the available resources of Internet. It is important factors that the user can efficiently access the available resources and processed results can be delivered to the user of job request. Therefore in this paper, we suggested the survivability factor for sending data safely whether it can be efficiently accessed between the user and available resource which processes the distributed application. And evaluated the performance of the suggested factor using the data transmission time. Also we suggested the transmission algorithm for safe transmission using the survivability factor.
A Simulation Study on the Performances of Revenue Management Models for an Air Cargo Network
Lee, Kwang-Ryul ; Yoon, Soo-Jeong ; Lee, Chul-Ung ;
Journal of the Korea Society for Simulation, volume 18, issue 1, 2009, Pages 41~51
A discrete event simulation model is developed to evaluate the performances of three different revenue management methods for an air cargo network from Northeast China to North America and Europe. In the first method, a bid price model is applied only to the routes that pass through Incheon. In the second method, the bid price model is applied to all the routes. In third method, bid price and virtual nesting models are applied to the routes that pass through Incheon. The results show that the total revenue significantly increases with the employment of pricing and capacity control. The developed simulation model is a useful research tool to study marketing strategies for air cargo operations.
A Stochastic Combat Simulation Model with Heterogeneous Weapon Systems
Chung, Yong-Hun ; Hong, Yoon-Gee ;
Journal of the Korea Society for Simulation, volume 18, issue 1, 2009, Pages 53~62
The real data obtained from field exercises has a crucial role in modeling and simulation of a combat or a wargame. This becomes an important input especially in analyzing weapon systems realization. Many existing models have been using the mean value of the time between each fire. The firing data can be incorporated into a known probability distribution or used directly as an empirical distribution. Data of field exercises are very useful instead of the real combat outcomes. This study finds a new modeling approach and techniques to compare the data with the previously generated outcomes. This fundamental research work will continue to consider more of the various weapon systems, the sizes, and other tactical aspects.
A Study on Windows Malicious Code Classification System
Seo, Hee-Suk ; Choi, Joong-Sup ; Chu, Pill-Hwan ;
Journal of the Korea Society for Simulation, volume 18, issue 1, 2009, Pages 63~70
This project presents a classification methodology for malicious codes in Windows OS (Operating System) environment, develops a test classification system. Thousands of malicious codes are brought in every day. In a result, classification system is needed to analyzers for supporting information which newly brought malicious codes are a new species or a variety. This system provides the similarity for analyzers to judge how much a new species or a variety is different to the known malicious code. It provides to save time and effort, to less a faulty analysis. This research includes the design of classification system and test system. We classify the malicious codes to 9 groups and then 9 groups divide the clusters according to the each property. This system provides the similarity for analyzers to save time and effort. It is used prospect system of malicious code in the future.