Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society for Simulation
Journal Basic Information
Journal DOI :
The Korea Society for Simulation
Editor in Chief :
Volume & Issues
Volume 19, Issue 4 - Dec 2010
Volume 19, Issue 3 - Sep 2010
Volume 19, Issue 2 - Jun 2010
Volume 19, Issue 1 - Mar 2010
Selecting the target year
Advanced Evacuation Analysis for Passenger Ship Using Penalty Walking Velocity Algorithm for Obstacle Avoid
Park, Kwang-Phil ; Ha, Sol ; Cho, Yoon-Ok ; Lee, Kyu-Yeul ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 1~9
In this paper, advanced evacuation analysis simulation on a passenger ship is performed. Velocity based model has been implemented and used to calculate the movement of the individual passengers under the evacuation situation. The age and gender of each passenger are considered as the factors of walking speed. Flocking algorithm is applied for the passenger's group behavior. Penalty walking velocity is introduced to avoid collision between the passengers and obstacles, and to prevent the position overlap among passengers. Application of flocking algorithm and penalty walking velocity to evacuation simulation is verified through implementation of the 11 test problems in IMO (International Maritime Organization) MSC (Maritime Safety Committee) Circulation 1238.
An Efficient Routing Scheme based on Link Quality and Load Balancing for Wireless Sensor Networks
Kim, Sun-Myeng ; Yang, Yeon-Mo ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 11~19
ZigBee is a standard for wireless personal area networks(WPANs) based on the IEEE 802.15.4 standard. It has been developed for low cost and low power consumption. There are two alternative routing schemes that have been proposed for the ZigBee standard: Ad-hoc On-Demand Distance Vector(AODV) and tree routing. The tree routing forwards packets from sensors to a sink node based on the parent-child relationships established by the IEEE 802.15.4 MAC topology formation procedure. In order to join the network, a sensor node chooses an existing node with the strongest RSSI(Received signal strength indicator) signal as a parent node. Therefore, some nodes carry a large amount of traffic load and exhaust their energy rapidly. To overcome this problem, we introduce a new metric based on link quality and traffic load for load balancing. Instead of the strength of RSSI, the proposed scheme uses the new metric to choose a parent node during the topology formation procedure. Extensive simulation results using TOSSIM(TinyOS mote SIMulator) show that the CFR scheme outperforms well in comparison to the conventional tree routing scheme.
Developing the Performance Analysis Model of the Heat-Shrink-Tube Manufacturing Process using a Simulation Method
Cho, Gyu-Sung ; Lee, Seung-Hoon ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 21~29
This research suggests a simulation model regarding the performance analysis of the Heat-Shrink-Tube manufacturing process using a simulation method. To analyze this study, firstly, we have collected the operating data from 'A' automobile parts company. Secondly, we have analyzed the collected data to apply a simulation model. Thirdly, we have developed a simulation model to experiment the process analysis and the line balancing methodology. The proposed simulation model can be executed by various input data without changing the simulation model and the performance of the Heat-Shrink-Tube Manufacturing system can be calculated by this model.
A Simulation Case Study of Congestion Assessment for Validation of Naval Ship's Operability Performance in a Crew Mess Room
Oh, Dae-Kyun ; Lee, Dong-Kun ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 31~41
So far, many simulation researches associated with naval ships have been concentrated on the tactical systems and naval ship development. However, studies on the improvement of living conditions for naval ship crews were limited. This study targets a crew mess room which is a typical welfare facility in naval ships and existing modeling and simulation methodologies for naval tactical and strategic systems cannot be applied to the crew room simulations. This paper suggests a simulation modeling framework based on 3-dimensional discrete event simulation methodology for crew mess room congestion assessment and operation scenarios. The simulation modeling framework is verified through practical case simulations. The purpose of simulation modeling framework consists of process and system architecture for operation feasibility tests of welfare facilities in naval ships and is to guide an assessment of the operability performance of a crew mess room.
A Non-Linear Overload Control Scheme for SIP Proxy Queues
Lee, Jong-Min ; Jeon, Heung-Jin ; Kwon, Oh-Jun ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 43~50
Recently, the Internet telephony has been used rather than the traditional telephony by many Internet users, with low cost. Session Initiation Protocol(SIP) is the standard of application layer protocol for establishment and disconnection of the session for Internet telephony. SIP mainly runs over the UDP for transport. So in case of the loss of the INVITE request message, the message is retransmitted by an appropriate timer for reliable transmission of the UDP message. Though the retransmission is useful for ensuring the reliability of SIP messages sent by the users, it may cause the overload traffic in the SIP proxy server. The overload in SIP proxy servers results in the loss of many input messages. This paper presents a non-linear overload control algorithm to resolve the overload condition of the server. we simulate our proposed algorithm using the network simulator ns-2. The simulation results show that the throughput of the server with the proposed algorithm have been improved about 12% compared to the existing linear control algorithm.
A Bypass Scheme for INVITE Messages With Priority in SIP Proxies
Kwon, Oh-Jun ; Jang, Hee-Suk ; Lee, Jong-Min ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 51~58
SIP is a flexible and extensible call setup protocol that may be combined with other protocols used in the Internet to make various services like voice communication. Voice communication can be classified into normal calls used for communication between common users and emergency calls for 112, 119 and other services through public safety networks. It is required to research to process effectively these normal calls and emergency calls through public networks such as the Internet. In this paper, we propose a bypass scheme for emergency calls by giving priority to INVITE messages for them and processing them with priority in the SIP proxy queue. We perform simulation studies using the network simulator ns-2 for the performance evaluation. Simulation results show that the proposed scheme processes emergency calls faster than normal calls and thus it is expected to make a special purpose network like the national disaster network efficiently by using the existing Internet.
A Personalized Clothing Recommender System Based on the Algorithm for Mining Association Rules
Lee, Chong-Hyeon ; Lee, Suk-Hoon ; Kim, Jang-Won ; Baik, Doo-Kwon ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 59~66
We present a personalized clothing recommender system - one that mines association rules from transaction described in ontologies and infers a recommendation from the rules. The recommender system can forecast frequently changing trends of clothing using the Onto-Apriori algorithm, and it makes appropriate recommendations for each users possible through the inference marked as meta nodes. We simulates the rule generator and the inferential search engine of the system with focus on accuracy and efficiency, and our results validate the system.
A Policy to Find All Siphons using Transitive Matrix
Kim, Oe-Yeong ; Lee, Jong-Kun ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 67~75
Deadlock usually appears in contain subsystem which is run in parallel and resources share modules. Siphons and traps have been well introduced to characterize deadlocks of Petri nets. Siphon concept be well used for proposing the detect and prevent deadlock by the pleasure researchers. But it's need many times and efforts to detect all siphon sub-nets in the Petri model. Since transitive matrix could explain all relations between the place and transitions in Petri nets, we propose an algorithm to detect all siphon sub-nets after analyzed the transitive matrix's properties. Examples are givens to illustrate the method.
A Study on the Method of Constructive Simulation Operation Analysis for Warfighting Experiment Supplied with the Validation Evaluation
Park, Jin-Woo ; Kim, Nung-Jin ; Kang, Sung-Jin ; Soo, Hyuk ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 77~87
Currently, our society has been changed from the industrial society to the information society. As the war progresses to Information Warfare, Network-Centric Warfare, Long-Range Precision Engagement and Robot Warfare, the military should advance to High-tech Scientific force. For this creation of the war potential, it is regarded as the warfighting experiment is a critical method. Surely it is rational that LVC(Live Virtual Constructive simulation) is desirable to make the warfighting experiment. But because it is limited by the cost, the time, the place and the resource, the constructive simulation(M&S : Modeling&Simulation) is a good tool to solve those problems. There are some studies about the evaluation process for developing the model, but it is unsatisfying in the process of the constructive simulations' operation. This study focuses on the way of constructive simulation operation, which is supplied with the evaluation process(VV&A : Verification Validation & Accreditation). We introduce the example of the rear area operation simulation for "appropriateness evaluation to the organization of logistic corps" by the AWAM(Army Weapon Analysis Model). This study presents the effective methods of the constructive simulations, which is based on the reliable evaluation process, so it will contribute to the warfighting experiments.
QoS Provisioning for Forced Inter-System Handover
Lee, Moon-Ho ; Lee, Jong-Chan ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 89~98
In the heterogeneous system of various wired or wireless network with IP-based backbone, the continuities of agreedon QoS for multimedia services should be guaranteed regardless of network types and terminal mobility through seamless vertical handover. This paper proposes a QoS provisioning mechanism called D-ISHO which guarantees the continuities of agreed-on QoS and seamless for multimedia services by considering both such characteristics as delay, loss rate and jitter per each service and such status as available band-width, call arrival rate and data transmission rate during the vertical handover. Simulation is done for performance analysis with the measure of handover failure rate and packet loss rate.
A study of Cluster Tool Scheduler Algorithm which is Support Various Transfer Patterns and Improved Productivity
Song, Min-Gi ; Jung, Chan-Ho ; Chi, Sung-Do ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 99~109
Existing research about automated wafer transport management strategy for semiconductor manufacturing equipment was mainly focused on dispatching rules which is optimized to specific system layout, process environment or transfer patterns. But these methods can cause problem as like requiring additional rules or changing whole transport management strategy when applied to new type of process or system. In addition, a lack of consideration for interconnectedness of the added rules can cause unexpected deadlock. In this study, in order to improve these problems, propose dynamic priority based transfer job decision making algorithm which is applicable with regardless of system lay out and transfer patterns. Also, extra rule handling part proposed to support special transfer requirement which is available without damage to generality for maintaining a consistent scheduling policies and minimize loss of stability due to expansion and lead to improve productivity at the same time. Simulation environment of Twin-slot type semiconductor equipment was built In order to measure performance and examine validity about proposed wafer scheduling algorithm.
A Method to Adjust Cyclic Signal Length Using Time Invariant Feature Point Extraction and Matching(TIFEM)
Han, A-Hyang ; Park, Cheong-Sool ; Kim, Sung-Shick ; Baek, Jun-Geol ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 111~122
In this study, a length adjustment algorithm for cyclic signals in manufacturing process using Time Invariant Feature point Extraction and Matching(TIFEM) is proposed. In order to precisely compensate the length of cyclic signals which have irregular length in the middle of signal as well as in the full length more feature points are needed. The extracted feature must involve information about the pattern of signal and should have invariant properties on time and scale. The proposed TIFEM algorithm extracts features having the intrinsic properties of the signal characteristics at first. By using those extracted features, feature vector is constructed for each time point. Among those extracted features, the only effective features are filtered and are chosen such as basis for the length adjustment. And then the partial length adjustment is performed by matching feature points. To verify the performance of the proposed algorithm, the experiments were performed with the experimental data mimicking the three kinds of signals generated from the actual semiconductor process.
Study on the design of GEO Satellite System in Space Radiation Environment
Hong, Sang-Pyo ; Heo, Jong-Wan ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 123~128
The space radiation/total ionizing Dose(TID) and its effects, and the GEO satellite system design considerations in space radiation environment are studied in this paper using Spenvis(Space Environment Information System). The GEO satellite system in space environment is simulated by NASA AP8/AE8, JPL91 and NRL CREME models, repectively for trapped particle, solar proton and cosmic-ray. The total ionizing Dose which is accumulated continuously to spacecraft electronics has been expressed as the function of aluminum thickness. These values can be used as the criteria for the selection of electronic parts and shielding thickness of the Digital Channel Amplifier(DCAMP) structure.
A Shortest Bypass Search Algorithm by using Positions of a Certain Obstacle Boundary
Kim, Yun-Sung ; Park, Soo-Hyun ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 129~137
Currently used shortest path search algorithms involve graphs with vertices and weighted edges between each vertex. However, when finding the shortest path with a randomly shaped obstacle(an island, for instance) positioned in between the starting point and the destination, using such algorithms involves high memory inefficiency and is significantly time consuming - all positions in the map should be considered as vertices and every line connecting any of the two adjacent vertices should be considered an edge. Therefore, we propose a new method for finding the shortest path in such conditions without using weighted graphs. This algorithm will allow finding the shortest obstacle bypass given only the positions of the obstacle boundary, the starting point and the destination. When the row and column size of the minimum boundary rectangle to include an obstacle is m and n, respectively, the proposed algorithm has the maximum time complexity, O(mn). This performance shows the proposed algorithm is very efficient comparing with the currently used algorithms.
Performance Analysis of DoS/DDoS Attack Detection Algorithms using Different False Alarm Rates
Jang, Beom-Soo ; Lee, Joo-Young ; Jung, Jae-Il ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 139~149
Internet was designed for network scalability and best-effort service which makes all hosts connected to Internet to be vulnerable against attack. Many papers have been proposed about attack detection algorithms against the attack using IP spoofing and DoS/DDoS attack. Purpose of DoS/DDoS attack is achieved in short period after the attack begins. Therefore, DoS/DDoS attack should be detected as soon as possible. Attack detection algorithms using false alarm rates consist of the false negative rate and the false positive rate. Moreover, they are important metrics to evaluate the attack detections. In this paper, we analyze the performance of the attack detection algorithms using the impact of false negative rate and false positive rate variation to the normal traffic and the attack traffic by simulations. As the result of this, we find that the number of passed attack packets is in the proportion to the false negative rate and the number of passed normal packets is in the inverse proportion to the false positive rate. We also analyze the limits of attack detection due to the relation between the false negative rate and the false positive rate. Finally, we propose a solution to minimize the limits of attack detection algorithms by defining the network state using the ratio between the number of packets classified as attack packets and the number of packets classified as normal packets. We find the performance of attack detection algorithm is improved by passing the packets classified as attacks.
DoS/DDoS attacks Detection Algorithm and System using Packet Counting
Kim, Tae-Won ; Jung, Jae-Il ; Lee, Joo-Young ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 151~159
Currently, by using the Internet, We can do varius things such as Web surfing, email, on-line shopping, stock trading on your home or office. However, as being out of the concept of security from the beginning, it is the big social issues that malicious user intrudes into the system through the network, on purpose to steal personal information or to paralyze system. In addition, network intrusion by ordinary people using network attack tools is bringing about big worries, so that the need for effective and powerful intrusion detection system becomes very important issue in our Internet environment. However, it is very difficult to prevent this attack perfectly. In this paper we proposed the algorithm for the detection of DoS attacks, and developed attack detection tools. Through learning in a normal state on Step 1, we calculate thresholds, the number of packets that are coming to each port, the median and the average utilization of each port on Step 2. And we propose values to determine how to attack detection on Step 3. By programing proposed attack detection algorithm and by testing the results, we can see that the difference between the median of packet mounts for unit interval and the average utilization of each port number is effective in detecting attacks. Also, without the need to look into the network data, we can easily be implemented by only using the number of packets to detect attacks.
System Specification-based Design and Verification of Mobile Patient Monitoring System
Choi, Eun-Jung ; Kim, Myuhng-Joo ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 161~167
To realize the U-healthcare system, the mobile patient monitoring system is of the essence. In this monitoring system, a patient's real-time data on biometrics and location must be transferred to predeterminate destination server ceaselessly. As the number of mobile patients increases steadily or mobile patients are moving into some specific area, the load balancing solution to real-time data congestion problem is needed. In this paper, we propose a new mobile patient monitoring system with Torus topology where three layers are connected hierarchically and the intermediate layer takes charge of priority-based load balancing. For the formalized design and verification of proposed system, we describe the overall structure with connectivity among its components and implement major components in pseudo-code by adopting a system specification-based approach. This approach makes the design and verification of our mobile patient monitoring system more flexible and accurate.
An Agent Based Simulation Model for the Analysis of Team Formation
Yee, Soung-Ryong ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 169~178
Agent based simulation is an approach for the analysis of a system's long term behavior where the entities in the system behave independently by their own judgement and memory, but influence each other to cope with given environment. In this paper we developed an agent based simulation model for the analysis of behavioral mechanism of team formation. In the process of team formation members' mutual preference is an important factor although each member can join up with one's own will. Also a team performance can vary by the member's own experience. We implemented the developed model using Netlogo 4.1, and verified the model by simulation. From the simulation results we found that the model successfully performed necessary functions using behavioral rules, judgments, and evolutionary processes by memory. As a further study we will be able to apply the model for analyzing various ecological behavior of team formation.
A Development of The Dynamic Reconfigurable Components based on Software Product Line : Guided Weapon System
Lee, Jae-Oh ; Lee, Jae-Jin ; Suk, Jee-Beom ; Seo, Yoon-Ho ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 179~188
The concern of Software Product Line(SPL) engineering is spreading widely because the program or product developers are able to satisfy the customer's demands quickly and give a way to handle maintenance efficiently. SPL is a reuse paradigm that reuse common parts and adopts variable parts optionally to form a differentiated product by analyzing domains. Purposes of this paper are to design an architecture which has a dynamic reconfiguration function and to develop basic components which are the basic unit of reconfiguration to raise the reuse level of the guided weapon system using the SPL. Initially we design an architecture and define basic components for developing a dynamic reconfigurable components based on SPL. Then we develop the composer for physical components and behavior components referenced by behavior models of OneSAF.
The VV&A Process Design for CMMS in consideration of Korean mission space characteristics
Kim, Gyo-Seob ; Lee, Jung-Man ; Bae, Young-Min ; Lee, Young-Hoon ; Pyun, Jai-Jeong ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 189~198
Conceptual Model of the Mission Spaces(CMMS) is a first abstraction model of the military real world and serves as a knowledge(mission spaces) reference models for development, interoperability and reusability of defense modeling and simulation(M&S) systems, by capturing basic information about entities involved in any mission and their key actions and interactions. Therefore, the completeness of CMMS is the key to success for the quality of M&S systems based on it. To improve quality and credibility of CMMS, the Verification, Validation and Accreditation(VV&A) processes of CMMS is very important. This paper briefly describes the K-CMMS(Korean Conceptual Model of Mission Space) and the VV&A process.
Filtering Algorithms for Position Evaluation and Tracking of Tactical Objects
Kim, Seok-Kwon ; Jin, Seung-Ri ; Son, Jae-Won ; Park, Dong-Jo ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 199~208
Positions of tactical objects are represented as Time, Space and Position Information(TSPI) in modeling and simulations(M&S). The format and required information record for TSPI is investigated by referring the TSPI object model of the Test and Training Enabling Architecture(TENA), which has been developed by the United States Department of Defense. The most sophisticated tactical data link, Link-16 has a Precise Participant Location and Information (PPLI) message. We study the data format for exchanging TSPI data based on the PPLI message. To evaluate and track positions of tactical objects, we consider the Kalman filter for linear systems, and the extended Kalman filter and the unscented Kalman filter for nonlinear systems. Based on motion equations of a ballistic missile, the tracking performance for the trajectory of the ballistic missile is simulated by the unscented Kalman filter.
Data Fusion and Pursuit-Evasion Simulations for Position Evaluation of Tactical Objects
Jin, Seung-Ri ; Kim, Seok-Kwon ; Son, Jae-Won ; Park, Dong-Jo ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 209~218
The aim of the study on the tactical object representation techniques in synthetic environment is on acquiring fundamental techniques for detection and tracking of tactical objects, and evaluating the strategic situation in the virtual ground. In order to acquire these techniques, there need the tactical objects' position tracking and evaluation, and an inter-sharing technique between tactical models. In this paper, we study the algorithms on the sensor data fusion and coordinate conversion, proportional navigation guidance(PNG), and pursuit-evasion technique for engineering and higher level models. Additionally, we simulate the position evaluation of tractical objects using the pursuit and evasion maneuvers between a submarine and a torpedo.
Test-Bed for the Interoperation of Virtual-Constructive Simulation
Kwon, Soon-Geol ; Choi, Mi-Seon ; Kim, Mun-Su ; Lee, Tae-Eog ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 219~233
The objective of the interoperation of L-V-C Simulation is to enable practical integration training by taking advantages and compensating disadvantages of simulation models, such as Live, Virtual and Constructive models. As a study on the interoperation of L-V-C simulation, this paper suggests effective interoperation method between Virtual and Constructive simulation models and demonstrates small-size intagrated combat training model through V-C Test-Bed.
The Application of Distributed Synthetic Environment Data to a Military Simulation
Cho, Nae-Hyun ; Park, Jong-Chul ; Kim, Man-Kyu ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 235~247
An environmental factor is very important in a war game model supporting military training. Most war game models in Korean armed forces apply the same weather conditions to all operation areas. As a result, it fails to derive a high-fidelity simulation result. For this reason this study attempts to develop factor techniques for a high-fidelity war game that can apply distributed synthetic atmospheric environment modeling data to a military simulation. The major developed factor technology of this study applies regional distributed precipitation data to the 2D-GIS based Simplified Detection Probability Model(SDPM) that was developed for this study. By doing this, this study shows that diversely distributed local weather conditions can be applied to a military simulation depending on the model resolution from theater level to engineering level, on the use from training model to analytical model, and on the description level from corps level to battalion level.
Standard Representation of Simulation Data Based on SEDRIS
Kim, Hyung-Ki ; Kang, Yun-A ; Han, Soon-Hung ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 249~259
Synthetic environment data used in defense M&S fields, which came from various organization and source, are consumed and managed by their own native database system in distributed environment. But to manage these diverse data while interoperation in HLA/RTI environment, neutral synthetic environment data model is necessary to transmit the data between native database. By the support of DMSO, SEDRIS was developed to achieve this requirement and this specification guarantees loss-less data representation, interchange and interoperability. In this research, to use SEDRIS as a standard simulation database, base research, visualization for validation, data interchange experiment through test-bed was done. This paper shows each research case, result and future research direction, to propose standardized SEDRIS usage process.
Services of an Integrated Simulation Engine for Weapons Analysis
Kim, Tae-Sup ; Park, Joon-Ho ; Kim, Hyun-Hwi ; Park, Chan-Jong ; Lee, Kang-Sun ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 261~270
An integrated simulation engine provides tools, services, and standards to support various activities in the entire M&S from modeling and simulation to analysis of the simulation results. Many countries have developed integrated simulation engines to efficiently assist complex M&S activities. However, we do not have domestic simulation engines especially designed for defense M&S, therefore, developing M&S softwares still remains as a hard task with high cost and tine. OpenSIM(Open Simulation engine for Interoperable Models) is an integrated simulation engine and provides tools, services and standard interfaces for weapons analysis. OpenSIM's services are comprised of classes, member functions and data attributes which are commonly used in modeling, simulating and analyzing weapons systems. In this paper, we introduce OpenSIM's services in C++ APIs and illustrate them through an ASM example(Air to Surface Missile).
Design of the Agent-based Network-Centric Warfare Modeling System
Park, Se-Youn ; Shin, Ha-Yong ; Lee, Tae-Sik ; Choi, Bong-Wan ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 271~280
While the future warfare is expected to be appeared as network-centric, effect-based, and coordinated cooperative, most current M&S systems reflect only the unit behaviors and interactions of each weapon system. There are limitations to analyze the behaviors of managing weapons cooperatively and sharing the situational awareness over the networks of distributed sensors, C2, and shooters using them. Therefore, we introduce the new design of the networkcentric warfare modeling system using the agent-based modeling and simulation approach. We have developed a system for engagement-level warfare models and tested with multi-platform battleship warfare. In this paper, we propose the method to design battle agents, environments, and networks for network centric warfare modeling.
A Study of HEAP-based Intelligent Agent applied to Warship Combat Simulation
You, Yong-Jun ; Chi, Sung-Do ; Kim, Jae-Ick ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 281~289
Recently the intelligent agent systems have been emerged as one of key issues for developing the defense M&S systems. However, most conventional agent architecture of M&S systems utilize the script-based models and can only deal with the individual behaviors so that they cannot suitably describe the precise tactical/strategic behavior and/or complex warfare environment. To overcome these problems, we have proposed the HEAP(Hierarchical Encapsulation and Abstraction Principle)-based hierarchical multi-agent system architecture that is able to intelligently cope with the complex missions based on the functional role of each agent on the hierarchy such as an intelligence officer, captain, commander.
A Technology on the Framework Design of Virtual based on the Synthetic Environment Test for Analyzing Effectiveness of the Weapon Systems of Underwater Engagement Model
Hong, Jung-Wan ; Park, Yong-Min ; Park, Sang-C. ; Kwon, Yong-Jin(James) ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 291~299
As recent advances in science, technology and performance requirements of the weapons system are getting highly diversified and complex, the performance requirements also get stringent and strict. Moreover, the weapons system should be intimately connected with other systems such as watchdog system, command and control system, C4I system, etc. However, a tremendous amount of time, cost and risk being spent to acquire new weapons system, and not being diminished compared to the rapid pace of its development speed. Defense Modeling and Simulation(M&S) comes into the spotlight as an alternative to overcoming these difficulties as well as constraints. In this paper, we propose the development process of virtual test framework based on the synthetic environment as a tool to analyze the effectiveness of the weapons system of underwater engagement model. To prove the proposed concept, we develop the test-bed of virtual test using Delta3D simulation engine, which is open source S/W. We also design the High Level Architecture and Real-time Infrastructure(HLA/RTI) based Federation for the interoperation with heterogeneous simulators. The significance of the study entails (1)the rapid and easy development of simulation tools that are customized for the Korean Theater of War; (2)the federation of environmental entities and the moving equations of the combat entities to manifest a realistic simulation.
Capability and Maturity Model for Simulation Based Acquisition
Park, Jin-Soo ; Kim, Yun-Bae ; Yoon, Jae-Wook ; Kim, Jong-Won ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 301~308
As a new paradigm called modeling and simulation(M&S) or simulation based acquisition(SBA) has arisen, necessity of applying it to Korea has been increased. Not only rational construction of SBA but development of model which can evaluate driving results and improve relating processes to SBA is needed. Therefore we suggests the framework of capability maturity model for M&S development and SBA. The ultimate purpose of our model is improving processes relating to M&S development and SBA. The last section include detailed model which has practices for improving some SBA processes.
Research on a Conceptual Model of Architecture Framework for Simulation based Acquisition
Sohn, MyE ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 309~318
Simulation-based acquisition(SBA) is a new acquisition paradigm to deliver combat systems cheaper, faster, and better. ROK MND adopts the vision of SBA and is pushing ahead with dramatic reform. However, ROK MND does not develop the SBA architecture framework which facilitates the reuse of tools and techniques and data software code and algorithms among participants of collaborative environments. In this paper, we propose a conceptual Model of architecture framework for SBA. To do so, we analyse acquisition process of MND and propose the to-be operational view that describes fundamental concept for how Government, Industry, and Academia can collaborate and share information more effectively throughout the acquisition process. Furthermore, we identify the tools and techniques that supports the operational nodes, and propose technical view and all view, too. technical view compose of set of standards that can ensure interoperability among tools, techniques and data, and all view provide an overarching description of the architecture.
Interoperation between Engineering- and Engagement-level Models for System Effectiveness Analysis
Hong, Jeong-Hee ; Kim, Tag-Gon ;
Journal of the Korea Society for Simulation, volume 19, issue 4, 2010, Pages 319~326
Effectiveness analysis of weapon system has been accomplished using engagement-level model alone. However, most previous works are prone to errors due to lack of behavioral information about the weapon systems. In order to overcome these limitations, this paper proposes an interoperation approach between the engagement- and engineering-level models. The proposed approach enables the engagement-level model to be supported by the engineering-level model representing the detailed behavior of weapon systems. Our methodology consider a limited combat situation including operational environments, dynamics and operational errors of weapons, and engagement orders. The paper describes a formalization of the system effectiveness analysis and defines an interface for interoperation between engagement- and engineering-level models. Then, we perform an anti-torpedo combat simulation as a case study.