Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society for Simulation
Journal Basic Information
Journal DOI :
The Korea Society for Simulation
Editor in Chief :
Volume & Issues
Volume 18, Issue 4 - Dec 2009
Volume 18, Issue 3 - Sep 2009
Volume 18, Issue 2 - Jun 2009
Volume 18, Issue 1 - Mar 2009
Selecting the target year
A Study of PLC Simulation for Automobile Panel AS/RS
Ko, Min-Suk ; Koo, Lock-Jo ; Kwak, Jong-Geun ; Hong, Sang-Hyun ; Wang, Gi-Nam ; Park, Sang-Chul ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 1~11
This paper illustrates a case study of PLC logic simulation in a car manufacturing system. It was developed to simulate and verify PLC control program for automobile panel AS/RS. Because car models become varied, the complexity of supply problem is increasing in the car manufacturing system. To cope with this problem, companies use the AS (automated storage) and RS (retrieval system) but it has logical complexity. Industrial automated process uses PLC code to control the AS/RS, however control information and control codes (PLC code) are difficult to understand. This paper suggests a PLC simulation environment, using 3D models and PLC code with realistic data. Data used in this simulation is based on realistic 3D model and I/O model, using actual size and PLC signals, respectively. The environment is similar to a real factory; users can verify and test the PLC code using this simulation before the implementation of AS/RS. Proposed simulation environment can be used for test run of AS/RS to reduce implementation time and cost.
The Algorithm for an Energy-efficient Particle Sensor Applied LEACH Routing Protocol in Wireless Sensor Networks
Hong, Sung-Hwa ; Kim, Hoon-Ki ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 13~21
The sensor nodes that form a wireless sensor network must perform both routing and sensing roles, since each sensor node always has a regular energy drain. The majority of sensors being used in wireless sensor networks are either unmanned or operated in environments that make them difficult for humans to approach. Furthermore, since many wireless sensor networks contain large numbers of sensors, thus requiring the sensor nodes to be small in size and cheap in price, the amount of power that can be supplied to the nodes and their data processing capacity are both limited. In this paper, we proposes the WSN(Wireless Sensor Network) algorithm which is applied sensor node that has low power consumption and efficiency measurement. Moreover, the efficiency routing protocol is proposed in this paper. The proposed algorithm reduces power consumption of sensor node data communication. It has not researched in LEACH(Low-Energy Adaptive Clustering Hierarchy) routing protocol. As controlling the active/sleep mode based on the measured data by sensor node, the energy consumption is able to be managed. In the event, the data is transferred to the local cluster head already set. The other side, this algorithm send the data as dependent on the information such as initial and present energy, and the number of rounds that are transformed into cluster header and then transferred. In this situation, the assignment of each node to cluster head evenly is very important. We selected cluster head efficiently and uniformly distributed the energy to each cluster node through the proposed algorithm. Consequently, this caused the extension of the WSN life time.
An Evaluation of Development Plans for Rolling Stock Maintenance Shop Using Computer Simulation - Emphasizing CDC and Generator Car -
Jeon, Byoung-Hack ; Jang, Seong-Yong ; Lee, Won-Young ; Oh, Jeong-Heon ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 23~34
In the railroad rolling stock depot, long-term maintenance tasks is done regularly every two or four year basis to maintain the functionality of equipments and rolling stock body or for the repair operation of the heavily damaged rolling stocks by fatal accidents. This paper addresses the computer simulation model building for the rolling stock maintenance shop for the CDC(Commuter Diesel Car) and Generator Car planned to be constructed at Daejon Rolling Stock Depot, which will be moved from Yongsan Rolling Stock Depot. We evaluated the processing capacity of two layout design alternatives based on the maintenance process chart through the developed simulation models. The performance measures are the number of processed cars per year, the cycle time, shop utilization, work in process and the average number waiting car for input. The simulation result shows that one design alternative outperforms another design alternative in every aspect and superior design alternative can process total 340 number of trains per year 15% more than the proposed target within the current average cycle time.
A Simulation Study for Improving Operations of an Emergency Medical Center
Mo, Chang-Woo ; Choi, Seong-Hoon ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 35~45
Emergency medical center(EMC) is the place for patients who need medical treatment immediately due to a disease, childbirth, or all sorts of accidents. Currently, most of EMCs use temporary beds because regular EMC beds cannot afford to serve all incoming patients. However, since it decreases the quality of service(QoS) of EMC patients and their guardians and efficiency of the EMC, some improvements are highly required to diminish the usage of temporary beds. The system duration time is one of the typical QoSs. This thesis proposes the information which is critical to make a better decision for cut down the number of temporary beds without sacrificing QoS of patients. The key point is to control the duration time of medical treatments for the consultation and hospitalization process, since it is the major reason of overcrowding in EMC and the usage of temporary beds. In this paper, we proposed an Arena simulation model reflecting real world substantially. Arena is one of the most widely accepted simulation softwares in the world. Using the developed model, we can obtain the optimal EMC operation parameters through simulation experiments. Optquest, included in the Arena, is used to make the developed simulation model collaborate with an optimization model. The results showed one can determine the set of optimal operation parameters decreasing the required number of temporary beds without deteriorating EMC patient's QoS.
Cluster-based Delay-adaptive Sensor Scheduling for Energy-saving in Wireless Sensor Networks
Choi, Wook ; Lee, Yong ; Chung, Yoo-Jin ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 47~59
Due to the application-specific nature of wireless sensor networks, the sensitivity to such a requirement as data reporting latency may vary depending on the type of applications, thus requiring application-specific algorithm and protocol design paradigms which help us to maximize energy conservation and thus the network lifetime. In this paper, we propose a novel delay-adaptive sensor scheduling scheme for energy-saving data gathering which is based on a two phase clustering (TPC). The ultimate goal is to extend the network lifetime by providing sensors with high adaptability to the application-dependent and time-varying delay requirements. The TPC requests sensors to construct two types of links: direct and relay links. The direct links are used for control and forwarding time critical sensed data. On the other hand, the relay links are used only for data forwarding based on the user delay constraints, thus allowing the sensors to opportunistically use the most energy-saving links and forming a multi-hop path. Simulation results demonstrate that cluster-based delay-adaptive data gathering strategy (CD-DGS) saves a significant amount of energy for dense sensor networks by adapting to the user delay constraints.
Availability-based Server Redirection System for Effective Content Delivery on Web
Song, Seung-Hyeon ; Jang, Sung-Ho ; Lee, Jong-Sik ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 61~71
The server redirection system replicates contents on replica servers in the distributed network environment. When users make a request for contents, the system can provide the contents much faster than the client-server network system. In the server redirection system, it is the most important to select the optimal replica server with user's information because many replica servers are geographically distributed. And, the system can serve contents to users flexibly if a redirector is well constructed. In this paper, the redirector makes a list of candidates suitable for user conditions by the decision tree method and calculates the availability of each replica server. And, the redirector selects the replica server with the highest availability. This paper also proposes an availability-based server redirection system that predicts the availability of each replica server in order to reduce the workload of replica servers and the repetitive communication messages between a redirector and replica servers. If a user accesses the network path for the replica server selected and noticed by the proposed system, the user can get contents effectively and efficiently.
Multiple SL-AVS(Small size & Low power Around View System) Synchronization Maintenance Method
Park, Hyun-Moon ; Park, Soo-Huyn ; Seo, Hae-Moon ; Park, Woo-Chool ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 73~82
Due to the many advantages including low price, low power consumption, and miniaturization, the CMOS camera has been utilized in many applications, including mobile phones, the automotive industry, medical sciences and sensoring, robotic controls, and research in the security field. In particular, the 360 degree omni-directional camera when utilized in multi-camera applications has displayed issues of software nature, interface communication management, delays, and a complicated image display control. Other issues include energy management problems, and miniaturization of a multi-camera in the hardware field. Traditional CMOS camera systems are comprised of an embedded system that consists of a high-performance MCU enabling a camera to send and receive images and a multi-layer system similar to an individual control system that consists of the camera's high performance Micro Controller Unit. We proposed the SL-AVS (Small Size/Low power Around-View System) to be able to control a camera while collecting image data using a high speed synchronization technique on the foundation of a single layer low performance MCU. It is an initial model of the omni-directional camera that takes images from a 360 view drawing from several CMOS camera utilizing a 110 degree view. We then connected a single MCU with four low-power CMOS cameras and implemented controls that include synchronization, controlling, and transmit/receive functions of individual camera compared with the traditional system. The synchronization of the respective cameras were controlled and then memorized by handling each interrupt through the MCU. We were able to improve the efficiency of data transmission that minimizes re-synchronization amongst a target, the CMOS camera, and the MCU. Further, depending on the choice of users, respective or groups of images divided into 4 domains were then provided with a target. We finally analyzed and compared the performance of the developed camera system including the synchronization and time of data transfer and image data loss, etc.
Detection of False Data Injection Attacks in Wireless Sensor Networks
Lee, Hae-Young ; Cho, Tae-Ho ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 83~90
Since wireless sensor networks are deployed in open environments, an attacker can physically capture some sensor nodes. Using information of compromised nodes, an attacker can launch false data injection attacks that report nonexistent events. False data can cause false alarms and draining the limited energy resources of the forwarding nodes. In order to detect and discard such false data during the forwarding process, various security solutions have been proposed. But since they are prevention-based solutions that involve additional operations, they would be energy-inefficient if the corresponding attacks are not launched. In this paper, we propose a detection method that can detect false data injection attacks without extra overheads. The proposed method is designed based on the signature of false data injection attacks that has been derived through simulation. The proposed method detects the attacks based on the number of reporting nodes, the correctness of the reports, and the variation in the number of the nodes for each event. We show the proposed method can detect a large portion of attacks through simulation.
The Performance Analysis of TRC Dropper to improve fairness on DiffServ Networks
Kim, Hoon-Ki ; Hong, Sung-Hwa ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 91~102
The average window size is most closely related to average throughput. In order to improve fairness, the proposed dropper tries to control the window size of each flow to equal level by intentional packet drop. Intentional packet drop is performed only to the flows that have been occupied bandwidth in a large amount. Because of intentional packet drop, this flow cut down its transmission rate to a half. Accordingly, somewhat capacity of core link comes into existence. And other flow can use this new capacity of this link. Hence other flows have more throughput than before. In this paper, we propose the TRC (Transmission Rate Control) Dropper improving the fairness between individual flows of aggregated sources on DiffServ network. It has the fairness improvement mechanism mentioned above paragraph.
Statistical Techniques to Detect Sensor Drifts
Seo, In-Yong ; Shin, Ho-Cheol ; Park, Moon-Ghu ; Kim, Seong-Jun ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 103~112
In a nuclear power plant (NPP), periodic sensor calibrations are required to assure sensors are operating correctly. However, only a few faulty sensors are found to be calibrated. For the safe operation of an NPP and the reduction of unnecessary calibration, on-line calibration monitoring is needed. In this paper, principal component-based Auto-Associative support vector regression (PCSVR) was proposed for the sensor signal validation of the NPP. It utilizes the attractive merits of principal component analysis (PCA) for extracting predominant feature vectors and AASVR because it easily represents complicated processes that are difficult to model with analytical and mechanistic models. With the use of real plant startup data from the Kori Nuclear Power Plant Unit 3, SVR hyperparameters were optimized by the response surface methodology (RSM). Moreover the statistical techniques are integrated with PCSVR for the failure detection. The residuals between the estimated signals and the measured signals are tested by the Shewhart Control Chart, Exponentially Weighted Moving Average (EWMA), Cumulative Sum (CUSUM) and generalized likelihood ratio test (GLRT) to detect whether the sensors are failed or not. This study shows the GLRT can be a candidate for the detection of sensor drift.
Software Formal Verification Methodology using Aspect DEVS Verification Framework
Choi, Chang-Beom ; Kim, Tag-Gon ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 113~122
Software is getting more complex due to a variety of requirements that include desired functions and properties. Therefore, verifying and testing the software are complicated problems. Moreover, if the software is already implemented, inserting and deleting tracing/logging code into the source code may cause several problems, such as the code tangling and the code scattering problems. This paper proposes the Aspect DEVS Verification Framework which supports the verification and testing process. The Aspect DEVS Verification Framework utilizes Aspect Oriented Programming features to handle the code tangling and the code scattering problems. By applying aspect oriented features, a user can find and fix the inconsistency between requirement and implementation of a software without suffering the problems. The first step of the verification process is the building aspect code to make a software act as a generator. The second step is developing a requirement specification using DEVS diagrams and implementing it using the DEVSIM++. The final step is comparing the event traces from the software with the possible execution sequences from DEVS model.
A Study on a Multi-path ATP Protocol at Ad-hoc Networks
Lee, Hak-Ju ; Jang, Jae-Shin ; Lee, Jong-Hyup ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 123~131
Wireless networks have several unique features : node mobility, restricted bandwidth, time-variable bandwidth, large latency, and high bit error rates time due to channel fading. These features at wireless networks intend to decrease the performance TCP protocols are used in wireless networks. Lots of studies have been done for finding appropriate wireless transport protocols for current wireless communications. However, related studies have not provided good performance or some protocols have a good performance only in specific circumstances. Thus, these are not suitable for general wireless circumstance. Therefore, we propose a new wireless transport protocol which provides better performance than the previous ones. And we'd like to solve a problem that previous protocols cannot maintain their connections even though they have multiple paths until another path is successfully set up. To solve these problems, a new protocol ATP-M is proposed which is designed on already known TCP-M and ATP protocols. With NS-2 computer simulation, it is shown that this newly proposed protocol has better system throughput than TCP, TCP-M and ATP protocols.
Interleaved Hop-by-Hop Authentication in Wireless Sensor Network Using Fuzzy Logic to Defend against Denial of Service Attack
Kim, Jong-Hyun ; Cho, Tac-Ho ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 133~138
When sensor networks are deployed in open environments, an adversary may compromise some sensor nodes and use them to inject false sensing reports. False report attack can lead to not only false alarms but also the depletion of limited energy resources in battery powered networks. The Interleaved hop-by-hop authentication (IHA) scheme detects such false reports through interleaved authentication. In IHA, when a report is forwarded to the base station, all nodes on the path must spend energies on receiving, authenticating, and transmitting it. An dversary can spend energies in nodes by using the methods as a relaying attack which uses macro. The Adversary aim to drain the finite amount of energies in sensor nodes without sending false reports to BS, the result paralyzing sensor network. In this paper, we propose a countermeasure using fuzzy logic from the Denial of Service(DoS) attack and show an efficiency of energy through the simulataion result.
The Research of the Modularity of Federation Object Model to Improve Interoperability of RTI-based Simulations
Shim, Jun-Yong ; Cho, Won-Seob ; Jin, Jung-Hun ; Kim, Sae-Hwan ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 139~146
Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This paper presents a characteristic of Base Object Model, SISO standardization for improving reuse and interoperability of Federation Object Model applied simulation network manager based HLA/RTI and suggests method of designing the structure of simulation network manager through the modularity of Federation Object Model.
Modeling and Simulation Analysis of the Setup Reduction Method in Automobile Painting Process
Han, Yong-Hee ;
Journal of the Korea Society for Simulation, volume 18, issue 3, 2009, Pages 147~154
In this study we investigate the problem of reducing color change cost at painting operations in an automobile assembly plant. Changing control logic at conveyor junction points prior to the top coat line has been proposed and analyzed using the discrete event simulation model we developed using AutoMod. We also discussed the project which initiated this research as well as the details of painting operations. Simulation analysis showed that the grouping ratio increases from 1.8 to 2.5 if the proposed control logic change is applied to the plant. Contrary to other approaches such as using dedicated equipment for resequencing, our approach has the merit of less investment cost, no need for additional space consumption. We finally note that the grouping ratio can be further increased if our algorithms is implemented as well as CRS (Color Rescheduling Storage) is installed.