Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society for Simulation
Journal Basic Information
Journal DOI :
The Korea Society for Simulation
Editor in Chief :
Volume & Issues
Volume 18, Issue 4 - Dec 2009
Volume 18, Issue 3 - Sep 2009
Volume 18, Issue 2 - Jun 2009
Volume 18, Issue 1 - Mar 2009
Selecting the target year
Network Traffic Control for War-game Simulation in Distributed Computing Environment
Jang, Sung-Ho ; Kim, Tae-Young ; Lee, Jong-Sik ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 1~8
The distributed war-game simulation system has been used to represent the virtual battlefield environment. In order to produce a simulation result, simulators connected from a network transfer messages with location information of simulated objects to a central simulation server. This network traffic is an immediate cause of system performance degradation. Therefore, the paper proposes a system to manage and control network traffic generated from distributed war-game simulation. The proposed system determines the moving distance of simulated objects and filters location messages by a distance threshold which is controlled according to system conditions like network traffic and location error. And, the system predicts the next location of simulated objects to minimize location error caused by message filtering. Experimental results demonstrate that the proposed system is effective to control the network traffic of distributed war-game simulation systems and reduce the location error of simulated objects.
Cognitive and Behavioral Effects of Augmented Reality Navigation System
Kim, Kyong-Ho ; Cho, Sung-Ik ; Lee, Jae-Sik ; Wohn, Kwang-Yun ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 9~20
Navigation system providing route-guidance and traffic information is one of the most widely used driver-support system these days. Most of the navigation system is based on the 2D map paradigm so the information is ed and encoded from the real world. As a result it imposes a cognitive burden to the driver to interpret and translate the ed information to real world information. As a new concept of navigation system, augmented-reality navigation system (AR navigation) is suggested recently. It provides navigational guidance by imposing graphical information on real image captured by camera mounted on a vehicle in real-time. The ultimate goal of navigation system is to assist the driving task with least driving workload whether it is based on the abstracted graphic paradigm or realistic image paradigm. In this paper, we describe the comparative studies on how map navigation and AR navigation affect for driving tasks by experimental research. From the result of this research we obtained a basic knowledge about the two paradigms of navigation systems. On the basis of this knowledge, we are going to find the optimal design of navigation system supporting driving task most effectively, by analyzing characteristics of driving tasks and navigational information from the human-vehicle interface point of view.
Applying Fractals and Agent-Based Simulation to Explore the Role of Terrain in Combat Effectiveness
Cho, Sung-Jin ; Lee, Sang-Heon ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 21~28
In the past, most of battle occurred in flatland and simple military force size gave a big influence in combat result. However, after the World War I, most of battles took place at the various terrain features such as forest, downtown, jungle and many others. Therefore, terrain factor exerts big influence on battle with weapon system in the ground warfare. However, effect of terrain has been explained only by quantitative manner in the battle. Furthermore, combat simulation and modeling applied a method that lower the combat capability of battle factors. In this paper, we present instrumentation that evaluate impact of terrain using fractal dimension. We determine the fractal dimension value by the "box counting dDimension" and density to calculate impact of terrain. Furthermore, we analyzed correlation with fractal dimension and density for battle result that obtained from the EINSTein model which is an agent-based simulation. We compare with 'Stalingrad battle' result out of battle example and analyzed. This study presented a method combat effectiveness that effect of terrain calculate quantitatively using fractal dimension.
An Improved MList for Efficient Event List Management in Discrete Event Simulation
Kim, Seong-Gon ; Yim, Dong-Soon ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 29~37
This paper deals with the priority queues exploited for the management of future event list in discrete event simulation. Among several implementations of priority queues, MList which consists of 3 tiers has been known to reveal the good performance. To improve the performance of MList, Dynamic-Shift MList (DSMList) is proposed in this paper. Whenever the number of events in tier 3 exceeds a critical number, DSMList creates new calendar queue in tier 2, then moves events from Tier 3 to the calendar queue. Instead of one calendar queue, therefore, a number of calendar queues are dynamically created in tier 2. Throughout experiments for the performance evaluation of DSMList, it shows that at least 20% improvement is obtained compared with MList.
A study of Modeling and Simulation for Analyzing DDoS Attack Damage Scale and Defence Mechanism Expense
Kim, Ji-Yeon ; Lee, Ju-Li ; Park, Eun-Ji ; Jang, Eun-Young ; Kim, Hyung-Jong ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 39~47
Recently, the threat of DDoS attacks is increasing and many companies are planned to deploy the DDoS defense solutions in their networks. The DDoS attack usually transmits heavy traffic data to networks or servers and they cannot handle the normal service requests because of running out of resources. Since it is very hard to prevent the DDoS attack beforehand, the strategic plan is very important. In this work, we have conducted modeling and simulation of the DDoS attack by changing the number of servers and estimated the duration that services are available. In this work, the modeling and simulation is conducted using OPNET Modeler. The simulation result can be used as a parameter of trade-off analysis of DDoS defense cost and the service's value. In addition, we have presented a way of estimating the cost effectiveness in deployment of the DDoS defense system.
Verification of Modified Flocking Algorithm for Group Robot Control
Lee, Eun-Bok ; Shin, Suk-Hoon ; You, Yong-Jun ; Chi, Sung-Do ; Kim, Jae-Ick ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 49~58
Top-down approach in the intelligent robot research has focused on the single object intelligence however, it has two weaknesses. One is that has a high cost and a long spending time of sensing, calculating and communications. The other is the difficulty of responding to react changes in the unpredictable environment. we propose the collective intelligence algorithm based on Bottom-up approach for improving these weaknesses and the applied agent model and verify by simulation. The Modified Flocking Algorithm proposed in this research is the algorithm which is modified version of the concept of the Flocking (Craig Reynolds) which is used to model the flocks, herds, and schools in the graphics or games, and simplified the operation of conventional Flocking algorithm to make it easy to apply for the number of group robots. We modeled the Boid agent and verified possibility collectivization of the Modified Flocking Algorithm by simulation. And We validated by the actual multiple mobile robot experiment.
RRAM (Redundant Random Access Memory) Spare Allocation in Semiconductor Manufacturing for Yield Improvement
Han, Young-Shin ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 59~66
This has been possible by integration techniques such as very large scale integration (VLSI) and wafer scale integration (WSI). Redundancy has been extensively used for manufacturing memory chips and to provide repair of these devices in the presence of faulty cells. If there are too many defects, the momory has to be rejected. But if there are a few defects, it will be more efficient and cost reducing for the company to use it by repairing. Therefore, laser-repair process is nedded for such a reason and redundancy analysis is needed to establish correct target of laser-repair process. The proposed CRA (Correlation Repair Algorithm) simulation, beyond the idea of the conventional redundancy analysis algorithm, aims at reducing the time spent in the process and strengthening cost competitiveness by performing redundancy analysis after simulating each case of defect.
Control Level Process Modeling Methodology Based on PLC
Ko, Min-Suk ; Kwak, Jong-Geun ; Wang, Gi-Nam ; Park, Sang-Chul ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 67~79
Because a product in the car industry has a short life cycle in recent years, the process planning and the manufacturing lines have to be changed frequently. Most of time, repositioning an existing facility and modifying used control information are faster than making completely new process planning. However, control information and control code such as PLC code are difficult to understand. Hence, industries prefer writing a new control code instead of using the existing complex one. It shows the lack of information reusability in the existing process planning. As a result, to reduce this redundancy and lack of reusability, we propose a SOS-Net modeling method. SOS-Net is a standard methodology used to describe control information. It is based on the Device Structure which consists of sensor information derived from device hardware information. Thus, SOS-Net can describe a real control state for automated manufacturing systems. The SOS-Net model is easy to understand and can be converted into PLC Code easily. It also enables to modify control information, thus increases the reusability of the new process planning. Proposed model in this paper plays an intermediary role between the process planning and PLC code generation. It can reduce the process planning and implementation time as well as cost.
A Reusability Enhancement Technique of Embedded System using Plug-In Method
Kim, Chul-Jin ; Lee, Sook-Hee ; Cho, Eun-Sook ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 81~94
Research of reusability and variability design for embedded system development is insufficient. An embedded system should be designed to support new devices. If extensibility of embedded system is not considered, it is difficult to reconstruct. Currently, the development productivity and reusability of embedded system are very poor, and this will be cased about problems of increasing maintenance and development cost, and decreasing system quality such as software crisis. In this paper, we present framework of embedded system that address those problems of embedded system. We suggest a plug-in technique, based on reusability framework, which can support various devices dynamically. Also, we propose a dynamic Meta model which is base on plug-in technique.
Certified Missile Rounds Concepts Using Modeling and Simulation
Kim, Byung-Soo ; Lee, Kye-Shin ; Kim, Dong-Seok ; Moon, Ki-Sung ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 95~105
In this study, we presented the periodic inspection method of the Certified Missile Round Concepts usuing M&S(Modeling and Simulation) techniques. Firstly, We drew up the scenario from the application concepts and the predicted dormant reliability Secondly, we performed the modeling for a simulation program based on the scenario. Lastly we embodied the simulation program. After comparing and examining the difference between the simulation results and the theoretical estimates, we present the best periodic inspection plan for achieving the probability of success.
A Task Assignment Rule for the Registered Nurses of the Emergency Department of Hospital Using Multiple System Attributes
Kim, Dae-Beom ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 107~116
Overcrowding in an Emergency Department (ED) of hospital is a common phenomenon. To improve the service quality and system performance of the ED, a task assignment rule for the Registered Nurses (RNs) is proposed in this paper. At each task assignment point, the rule prioritizes all treatment requests based on the urgency which is determined by the multiple attributes such as accomplishment time of treatment task, elapsed time of treatment request, total remain time to patient discharge, and number of remain treatments. The values of partial urgency with a single criterion are determined and then overall urgency is computed to find the most urgent one among current requests with the importance weights assigned to the criteria. Through computer simulation, the performance of the proposed rule is compared with current rule in terms of the length of stay and system throughput in a simplified ED system of the hospital M.
Multi-Platform Warship M&S System Using the Hierarchical Multi-Agent System
Jung, Chan-Ho ; You, Yong-Jun ; Ryu, Han-Eul ; Lee, Jang-Se ; Kim, Jae-Ick ; Chi, Sung-Do ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 117~125
Recently the intelligent agent systems have been emerged as one of key issues for developing the defense M&S systems. However, most conventional agent architecture of M&S systems utilize the script-based models and can only deal with the individual behaviors so that they cannot suitably describe the precise tactical/strategic behavior and/or complex warfare environment. To overcome these problems, we have proposed the hierarchical multi-agent system architecture that is able to intelligently cope with the complex missions based on the functional role of each agent on the hierarchy such as an intelligence officer, captain, warship commander. Several simulation tests performed on 2:2 warship warfare models will illustrate our techniques.
A DEVS-based Modeling & Simulation Methodology of Enabling Node Mobility for Ad Hoc Network
Song, Sang-Bok ; Lee, Kyou-Ho ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 127~136
Modeling and Simulation, especially in mobile ad hoc network(MANET), are the most effective way to analyze performance or optimize system parameters without establishing real network environment. Focusing mainly on overall network behaviors in MANET concerns dynamics of network transport operations, which can efficiently be characterized with event based system states rather than execution details of protocols. We thus consider the network as a discrete event system to analyze dynamics of network transport performance. Zeigler's set-theoretic DEVS(Discrete Event Systems Specification) formalism can support specification of a discrete event system in hierarchical, modular manner. The DEVSim++ simulation environment can not only provide a rigorous modeling methodology based on the DEVS formalism but also support modelers to develop discrete event models using the hierarchical composition methodology in object-orientation. This environment however hardly supports to specify connection paths of network nodes, which are continuously altered due to mobility of nodes. This paper proposes a DEVS-based modeling and simulation methodology of enabling node mobility, and develops DEVS models for the mobile ad hoc network. We also simulate developed models with the DEVSim++ engine to verify the proposal.
Multi-objective Genetic Algorithm for Variable Selection in Linear Regression Model and Application
Kim, Dong-Il ; Park, Cheong-Sool ; Baek, Jun-Geol ; Kim, Sung-Shick ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 137~148
The purpose of this study is to implement variable selection algorithm which helps construct a reliable linear regression model. If we use all candidate variables to construct a linear regression model, the significance of the model will be decreased and it will cause 'Curse of Dimensionality'. And if the number of data is less than the number of variables (dimension), we cannot construct the regression model. Due to these problems, we consider the variable selection problem as a combinatorial optimization problem, and apply GA (Genetic Algorithm) to the problem. Typical measures of estimating statistical significance are
, F-value of regression model, t-value of regression coefficients, and standard error of estimates. We design GA to solve multi-objective functions, because statistical significance of model is not to be estimated by a single measure. We perform experiments using simulation data, designed to consider various kinds of situations. As a result, it shows better performance than LARS (Least Angle Regression) which is an algorithm to solve variable selection problems. We modify algorithm to solve portfolio selection problem which construct portfolio by selecting stocks. We conclude that the algorithm is able to solve real problems.
Determination Method of TTL for Improving Energy Efficiency of Wormhole Attack Defense Mechanism in WSN
Lee, Sun-Ho ; Cho, Tae-Ho ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 149~155
Attacks in wireless sensor networks (WSN), are similar to the attacks in ad-hoc networks because there are deployed on a wireless environment. However existing security mechanism cannot apply to WSN, because it has limited resource and hostile environment. One of the typical attack in WSN is setting up wrong route that using wormhole. To overcome this threat, Ji-Hoon Yun et al. proposed WODEM (WOrmhole attack DEfense Mechanism) which can detect and counter with wormhole. In this scheme, it can detect and counter with wormhole attacks by comparing hop count and initial TTL (Time To Live) which is pre-defined. The selection of a initial TTL is important since it can provide a tradeoff between detection ability ratio and energy consumption. In this paper, we proposed a fuzzy rule-based system for TTL determination that can conserve energy, while it provides sufficient detection ratio in wormhole attack.
A Study on Application and Promotion of DM&S VV&A(Focused on M&S for Test and Evaluation)
Kim, Hyeong-Hyeon ; Lee, Chang-Hee ; Cho, Nae-Hyeon ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 157~164
As computer industry has been rapidly developed since 1980's, it has been highly increasing to use M&S. The use of M&S can reduce development cost, time to market, and so on, and using it we can get the results of experiments which are impossible to test in real environments. But there is an important precondition on the dependability of M&S which is being developed or used. In this paper, We introduce the Key concepts of VV&A, and so forth, and We finally present the DM&S VV&A application and promotion method.
Efficient Content Sharing using the Selection of Minimum Forwarding Peers in an Ad Hoc Network
Kang, Seung-Seok ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 165~173
Recent portable devices are so versatile that they have multiple communication channels and play several multimedia formats. Especially, many services are under development for users who connect Internet or nearby devices via WWAN (Wireless Wide Area Network) and/or WLAN (Wireless LAN). In case of paying the telecommunication cost proportional to the amount of data downloaded, it is necessary to reduce the cost by constructing a special ad hoc network in which each participating peer downloads a specific portion of the want-to-be-shared content over the payable WWAN channel and exchanges the remaining portion with other peers using the cost-free WLAN channel. If all peers participate in forwarding packets, some transmissions are redundant which results in the unnecessary consumption of bandwidth as well as the delayed content distribution time. In order to reduce the redundant transmission, this paper proposes both the excluding method which discourages some peers not to forward redundant packets, and the minimum cover set method in which only the minimum number of peers are in charge of forwarding packets. These two methods obviate redundant packet forwarding, and result in reduction of content distribution time by up to around 29%.
Scheduled Interest Table(SIT) based Multiple Path Configuration Technique in Ocean Sensor Network
Yun, Nam-Yeol ; NamGung, Jung-Il ; Park, Soo-Hyun ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 175~184
The distance of sensor nodes is an important factor in having influence on capability of networks in underwater acoustic sensor networks. Our proposed scheme is to establish an efficient distance to design a route of communication in underwater environment and it proposes a Level scheme that the areas divided by transmit/receive distance in network are given different levels. Our proposed scheme is pursued research to maintain a established route and maximize an energy efficiency. The established route will have fluid modification by an internal and external factors and it will construct more robust underwater sensor networks over our proposed multiple path configuration scheme.
Validation Technique of Trace-Driven Simulation Model Using Weighted F-measure
HwangBo, Hoon ; Cheon, Hyeon-Jae ; Lee, Hong-Chul ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 185~195
As most systems get more complicated, system analysis using simulation has been taken notice of. One of the core parts of simulation analysis is validation of a simulation model, and we can identify how well the simulation model represents the real system with this validation process. The difference between input data of two systems has an effect on the comparison between a simulation model and a real system at validation stage, and the result with such difference is not enough to ensure high credibility of the model. Accordingly, in this paper, we construct a model based on Trace-driven simulation which uses identical input data with the real system. On the other hand, to validate a model by each class, not by an unique statistic, we validate the model using a metric transformed from F-measure which estimates performance of a classifier in data mining field. Finally, this procedure enables precise validation process of a model, and it helps modification by offering feedback at the validation phase.
Classification of Brain MR Images Using Spatial Information
Kim, Hyung-Il ; Kim, Yong-Uk ; Kim, Jun-Tae ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 197~206
The medical information system is an effective medical diagnosis assistance system which offers an environment in which medial images and diagnosis information can be shared. However, this system can only stored and transmitted information without other functions. To resolve this problem and to enhance the efficiency of diagnostic activities, a medical image classification and retrieval system is necessary. The medical image classification and retrieval system can improve efficiency in a medical diagnosis by providing disease-related images and can be useful in various medical practices by checking diverse cases. However, it is difficult to understand the meanings contained in images because the existing image classification and retrieval system has handled superficial information only. Therefore, a medical image classification system which can classify medical images by analyzing the relation among the elements of the image as well as the superficial information has been required. In this paper, we propose the method for learning and classification of brain MRI, in which the superficial information as well as the spatial information extracted from images are used. The superficial information of images, which is color, shape, etc., is called low-level image information and the logical information of the image is called high-level image information. In extracting both low-level and high-level image information in this paper, the anatomical names and structure of the brain have been used. The low-level information is used to give an anatomical name in brain images and the high-level image information is extracted by analyzing the relation among the anatomical parts. Each information is used in learning and classification. In an experiment, the MRI of the brain including disease have been used.
DDoS Defense using Address Prefix-based Priority Service
Jin, Jinghe ; Lee, Tai-Jin ; Nam, Seung-Yeob ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 207~217
We propose a two-stage Distributed Denial of Service (DDoS) defense system, which can protect a given subnet by serving existing flows and new flows with a different priority based on IP history information. Denial of Service (DoS) usually occurs when the resource of a network node or link is limited and the demand of the users for that resource exceeds the capacity. The objective of the proposed defense system is to provide continued service to existing flows even in the presence of DDoS attacks. The proposed scheme can protect existing connections effectively with a smaller memory size by reducing the monitored IP address set through sampling and per-prefix history management. We evaluate the performance of the proposed scheme through simulation.
The Design and Implementation of an Educational Computer Model for Semiconductor Manufacturing Courses
Han, Young-Shin ; Jeon, Dong-Hoon ;
Journal of the Korea Society for Simulation, volume 18, issue 4, 2009, Pages 219~225
The primary purpose of this study is to build computer models referring overall flow of complex and various semiconductor wafer manufacturing process and to implement a educational model which operates with a presentation tool showing device design. It is important that Korean semiconductor industries secure high competitive power on efficient manufacturing management and to develop technology continuously. Models representing the FAB processes and the functions of each process are developed for Seoul National University Semiconductor Research Center. However, it is expected that the models are effective as visually educational tools in Korean semiconductor industries. In addition, it is anticipated that these models are useful for semiconductor process courses in academia. Scalability and flexibility allow semiconductor manufacturers to customize the models and perform simulation education. Subsequently, manufacturers save budget.