Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Society for Simulation
Journal Basic Information
Journal DOI :
The Korea Society for Simulation
Editor in Chief :
Volume & Issues
Volume 20, Issue 4 - Dec 2011
Volume 20, Issue 3 - Sep 2011
Volume 20, Issue 2 - Jun 2011
Volume 20, Issue 1 - Mar 2011
Selecting the target year
Effectiveness Analysis for a Lightweight Torpedo Considering Evasive Maneuvering and TACM of a Target
Pak, Jung-Min ; Ku, Bon-Hwa ; Lee, Young-Hyun ; Ryu, Dong-Gi ; Hong, Woo-Young ; Ko, Han-Seok ; Lim, Myo-Taeg ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 1~11
DOI : 10.9709/JKSS.2011.20.4.001
In the development phase of a torpedo, the effectiveness analysis is carried out to predict the performance and to learn how to use the torpedo. In order to obtain reliable data, it is required to model the tactical situation closely to the actual one. Because the submarine is a target of a lightweight torpedo, the anti-torpedo countermeasures of a submarine such as evasive maneuvering and TACM (Torpedo Acoustic Counter Measure) should be modeled in detail. In this paper, the evasive maneuvering is modeled reflecting the movement characteristics of the submarine. Furthermore various TACMs such as a floating-type decoy, a self-propelled decoy and jammers are also modeled. Then, effectiveness of a lightweight torpedo is measured and analyzed using the simulation program which is developed through the above modeling procedure.
Face Feature Selection and Face Recognition using GroupMutual-Boost
Choi, Hak-Jin ; Lee, Jong-Sik ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 13~20
DOI : 10.9709/JKSS.2011.20.4.013
The face recognition has been used in a variety fields, such as identification and security. The procedure of the face recognition is as follows; extracting face features of face images, learning the extracted face features, and selecting some features among all extracted face features. The selected features have discrimination and are used for face recognition. However, there are numerous face features extracted from face images. If a face recognition system uses all extracted features, a high computing time is required for learning face features and the efficiency of computing resources decreases. To solve this problem, many researchers have proposed various Boosting methods, which improve the performance of learning algorithms. Mutual-Boost is the typical Boosting method and efficiently selects face features by using mutual information between two features. In this paper, we propose a GroupMutual-Boost method for improving Mutual-Boost. Our proposed method can shorten the time required for learning and recognizing face features and use computing resources more effectively since the method does not learn individual features but a feature group.
A Method to Improve Energy Efficiency Using a Function that Evaluate the Probability of Attempts to Verify a Report at Intermediate Node in USN
Lee, Hyun-Woo ; Moon, Soo-Young ; Cho, Tae-Ho ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 21~29
DOI : 10.9709/JKSS.2011.20.4.021
Wireless sensor nodes operate in open environments. The deployed sensor nodes are very vulnerable to physical attacks from outside. Attackers compromise some sensor nodes. The compromised nodes by attackers can lead to false data injection into sensor networks. These attacks deplete the limited energy of sensor nodes. Ye et al. proposed the Statistical En-Route Filtering (SEF) as a countermeasure of the attacks. The sensor node in SEF examines the event reports based on certain uniform probability. Thus, the same energies are consumed in both legitimate reports and false reports. In this paper, we propose a method that each node controls the probability of attempts to verify a report to reduce energy consumption of sensor nodes. The probability is determined in consideration of the remaining energy of the node, the number of hops from the node to SINK node, the ratio of false reports. the proposed method can have security which is similar with SEF and consumes lower energy than SEF.
The Secure Path Cycle Selection Method for Improving Energy Efficiency in Statistical En-route Filtering Based WSNs
Nam, Su-Man ; Sun, Chung-Il ; Cho, Tae-Ho ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 31~40
DOI : 10.9709/JKSS.2011.20.4.031
Sensor nodes are easily exposed to malicious attackers by physical attacks. The attacker can generate various attacks using compromised nodes in a sensor network. The false report generating application layers injects the network by the compromised node. If a base station has the injected false report, a false alarm also occurs and unnecessary energy of the node is used. In order to defend the attack, a statistical en-route filtering method is proposed to filter the false report that goes to the base station as soon as possible. A path renewal method, which improves the method, is proposed to maintain a detection ability of the statistical en-route filtering method and to consume balanced energy of the node. In this paper, we proposed the secure path cycle method to consume effective energy for a path renewal. To select the secure path cycle, the base station determines through hop counts and the quantity of report transmission by an evaluation function. In addition, three methods, which are statistical en-route filter, path selection method, and path renewal method, are evaluated with our proposed method for efficient energy use. Therefore, the proposed method keeps the secure path and makes the efficiency of energy consumption high.
A Method of Integration Testing for Federation using Mock Object Patterns
Shim, Jun-Yong ; Lee, Young-Heon ; Lee, Seung-Young ; Kim, Seh-Hwan ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 41~48
DOI : 10.9709/JKSS.2011.20.4.041
The act of writing a unit test is more an act of design than of verification. It is also more an act of documentation than of verification. The act of writing a unit test closes a remarkable number of feedback loops, the least of which is the one pertaining to verification of function. Unit testing is a fundamental practice in Extreme Programming, but most non-trivial code is difficult to test in isolation. Normal unit testing is hard because It is trying to test the code from outside. On the other hand, developing unit tests with Mock Objects leads to stronger tests and to better structure of both domain and test code. In this paper, I first describe how Mock Objects are used for unit testing of federation integration. Then I describe the benefits and costs of Mock Objects when writing unit tests and code. Finally I describe a design of Mock federate for using Mock objects.
Development of a High Pressure Turbine Bypass System Pressure Control Model for Power Plant Simulator
Byun, Seung-Hyun ; Lee, Joo-Hyun ; Lim, Ick-Hun ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 49~58
DOI : 10.9709/JKSS.2011.20.4.049
It is required that a developed control system should be verified using simulator in terms of functionality and reliability prior to application to a power plant that is a very critical facility in the industry. In this paper, the control model for turbine bypass system was developed for power plant simulator. In order to develop the control model for turbine bypass system, the tool that can be used to implement turbine bypass control logic was developed based on the turbine bypass control system manual. The developed tool was merged into the simulator development environment. The functionality of the developed tool was verified via the simulation based on the each function block specification. The HP turbine bypass pressure control logic was implemented using the developed tool and was integrated with process models and other control models such as boiler control model, turbine control model and boiler feed water pump turbine control model for 500 MW korean standard type fossil power plant. Finally, the validity of the developed control model was shown via simulation result under the integrated simulation environment.
Design of an Algorithm for Generating m-RUN Deadlock Avoidance Policy Based on Simulated Annealing
Choi, Jin-Young ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 59~66
DOI : 10.9709/JKSS.2011.20.4.059
This work presents an algorithm for generating multi-RUN (m-RUN) deadlock avoidance policy based on simulated annealing algorithm. The basic idea of this method is to gradually improve the current m-RUN DAP after constructing an initial m-DAP by using simple m RUN DAPs. The search for a neighbor of the current m-RUN DAP is done by selecting and changing only one component of the current m-RUN, while accepting some unimproved solutions with some probability. It is examined for its performance by generating some sample system configurations.
Model Parameter Based Fault Detection for Time-series Data
Park, Si-Jeo ; Park, Cheong-Sool ; Kim, Sung-Shick ; Baek, Jun-Geol ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 67~79
DOI : 10.9709/JKSS.2011.20.4.067
The statistical process control (SPC) assumes that observations follow the particular statistical distribution and they are independent to each other. However, the time-series data do not always follow the particular distribution, and most of cases are autocorrelated, therefore, it has limit to adopt the general SPC in tim series process. In this study, we propose a MPBC (Model Parameter Based Control-chart) method for fault detection in time-series processes. The MPBC builds up the process as a time-series model, and it can determine the faults by detecting changes parameters in the model. The process we analyze in the study assumes that the data follow the ARMA (p,q) model. The MPBC estimates model parameters using RLS (Recursive Least Square), and
-control chart is used for detecting out-of control process. The results of simulations support the idea that our proposed method performs better in time-series process.
Media Access Control Protocol based on Dynamic Time Slot Assignment in Underwater Mobile Ad-hoc Network
Shin, Seung-Won ; Kim, Yung-Pyo ; Yun, Nam-Yeol ; Park, Soo-Hyun ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 81~89
DOI : 10.9709/JKSS.2011.20.4.081
Underwater wireless network can be useful in various fields such as underwater environment observation, catastrophe prevention, ocean resources exploration, ocean organism research, and vessel sinking exploration. We need to develop an efficient design for Medium Access Control (MAC) protocol to improve multiple data communication in underwater environment. Aloha protocol is one of the basic and simple protocols, but it has disadvantage such as collision occurs oftenly in communication. If there is collision occured in RF communication, problem can be solved by re-sending the data, but using low frequency in underwater, the re-transmission has difficulties due to slow bit-rate. So, Time Division Multiple Access (TDMA) based MAC protocol is going to be used to avoid collisions, but if there is no data to send in existing TDMA, time slot should not be used. Therefore, this paper proposes dynamic TDMA protocol mechanism with reducing the time slots by sending short "I Have No Data" (IHND) message, if there is no data to transmit. Also, this paper presents mathematic analysis model in relation to data throughput, channel efficiency and verifies performance superiority by comparing the existing TDMA protocols.
Performance Analysis of MMSE-Based Equalization of IMT-Advanced System in Time-Varing Channels
Park, Sung-Joon ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 91~96
DOI : 10.9709/JKSS.2011.20.4.091
As the user`s demand for ultra high-speed wireless internet has increased, the standardization, research and development of future mobile communication systems have been done for several years. IMT-Advanced system which is called fourth generation mobile communication should support the data rate of 1 Gbps for nomadic users and 100 Mbps for mobile users. Also, the system should hold call connection at the mobile speed of 350 km/h. Meanwhile, since Doppler spread is linearly proportional to mobile speed, high mobility leads to the increase of interference between subcarriers and the deterioration of detection performance consequently. In this paper, we evaluate and analyze detection probability with respect to equalization methods in time-varying channels under system parameters complying with IMT-Advanced requirements. According to computer simulation conducted by varying mobile speed and code rate, MMSE based equalization can mitigate performance degradation of IMT-Advanced system considerably in time-varying channels.
Design and Implementation of Distributed Object Communication Framework for the Development of Simulation Software based HLA
Shim, Jun-Yong ; Wi, Soung-Hyouk ; Kim, Sae-Hwan ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 97~104
DOI : 10.9709/JKSS.2011.20.4.097
Defense M&S software industry has carried out a variety of studies related to an efficient implementation of large-scale simulation and interoperability with respect to each of the system and HLA has been developed to provide a common architecture for distributed simulation of them. HLA defines Federate interface specification and provides services through RTI. Meanwhile, the difficulty lies in developing the software based HLA. Federate developer needs to understand how to handle Metadata produced RTI and has to modify the interface code whenever FDD is modified. This paper presents the implementation method of SOM interface using the code generation technique and middleware architecture for providing simple API. It solves the problem for implementing the framework of distributed object communication by using proposed method.
Simulating Group Movement on a Roadmap-based Path
Yu, Kyeon-Ah ; Cho, Su-Jin ; Kim, Kyung-Hye ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 105~114
DOI : 10.9709/JKSS.2011.20.4.105
The roadmap-based planning is a path planning method which is used widely for a goal-directed movement in Robotics and has been applied to the world of computer animation such as computer games. However it is unnatural for computer characters to follow the path planned by the roadmap method as it is performed in Robotics. Flocking which is used for realistic and natural movements in computer animation enables character`s movement by using a few simple rules without planning unlike the roadmap method. However it is impossible to achieve a goal-directed movement with flocking only because it does not keep states. In this paper we propose a simulation method which combines planning based on the road map with reactive actions for natural movements along the path planned. We define and implement steering behaviors for a leader which are needed to follow the trajectory naturally by analysing characteristics of roadmap-based paths and for the rest of members which follow the leader in various manners by detecting obstacles. The simulations are performed and demonstrated by using the implemented steering behaviors on every possible combination of roadmap-based path planning methods and models of configuration spaces. We also show that the detection of obstacle-collisions can be done effectively because paths are planned in the configuration space in which a moving object is reduced to a point.
Recognition of Control Chart Pattern using Bi-Directional Kohonen Network and Artificial Neural Network
Yun, Jae-Jun ; Park, Cheong-Sool ; Kim, Jun-Seok ; Baek, Jun-Geol ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 115~125
DOI : 10.9709/JKSS.2011.20.4.115
Manufacturing companies usually manage the process to achieve high quality using various types of control chart in statistical process control. When an assignable cause occurs in a process, the data in the control chart changes with different patterns by the specific causes. It is important in process control to classify the CCP (Control Chart Pattern) recognition for fast decision making. In former research, gathered data from process used to apply as raw data, leads to degrade the performance of recognizer and to decrease the learning speed. Therefore, feature based recognizer, employing feature extraction method, has been studied to enhance the classification accuracy and to reduce the dimension of data. We propose the method to extract features that take the distances between CCP data and reference vector generated from BDK (Bi-Directional Kohonen Network). We utilize those features as the input vectors in ANN (Artificial Neural Network) and compare with raw data applied ANN to evaluate the performance.
Study of Simulation Method for Certified Missile Rounds Concepts with Constraints
Lee, Kye-Shin ; Lee, Youn-Ho ; Cho, Yong-Seok ; Kim, Hyo-Chang ; Kim, Sang-Moon ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 127~138
DOI : 10.9709/JKSS.2011.20.4.127
Certified Missile Round Concepts that is one-shot device use the periodic inspection policy to improve the continuously deteriorated reliability. In this paper, we suggest dormant reliability prediction model by simulation with real operational environment. The suggested prediction model is based on optimal inspection period decision model and additionally considers various constraints; moving, inspection or repair service time. The simulation results show the constraints affect dormant reliability and missile availability. Lastly, we suggest building up a depot to resolve the above problems by the suggested simulation model.
Virtual Machine Provisioning Scheduling with Conditional Probability Inference for Transport Information Service in Cloud Environment
Kim, Jae-Kwon ; Lee, Jong-Sik ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 139~147
DOI : 10.9709/JKSS.2011.20.4.139
There is a growing tendency toward a vehicle demand and a utilization of traffic information systems. Due to various kinds of traffic information systems and increasing of communication data, the traffic information service requires a very high IT infrastructure. A cloud computing environment is an essential approach for reducing a IT infrastructure cost. And the traffic information service needs a provisioning scheduling method for managing a resource. So we propose a provisioning scheduling with conditional probability inference (PSCPI) for the traffic information service on cloud environment. PSCPI uses a naive bayse inference technique based on a status of a virtual machine. And PSCPI allocates a job to the virtual machines on the basis of an availability of each virtual machine. Naive bayse based PSCPI provides a high throughput and an high availability of virtual machines for real-time traffic information services.
Evacuation Analysis for a Passenger Ship Using a Cellular Automata Model with Group Behavior
Cha, Ju-Hwan ; Ha, Sol ; Lee, Kyu-Yeul ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 149~155
DOI : 10.9709/JKSS.2011.20.4.149
This paper presents simulations of advance evacuation analysis using a cellular automata model for passenger behavior in an emergency of passenger ship. The proposed cellular automata model divides the space in a uniform grid called "cell." Each passenger is located in a cell and moves to another cell according to a set of local rules assumed to be associated with the individual and crowd behaviors of the passengers. To verify the usefulness of the proposed cellular automata model, 11 tests, all of which are specified in International Maritime Organization Maritime Safety Committee/ Circulation 1238 (IMO MSC/Circ. 1238), were implemented, and it was confirmed that all the requirements of these tests had been met.
Design and Performance Evaluation of Hierarchical Protocol for Underwater Acoustic Sensor Networks
Kim, Ji-Eon ; Yun, Nam-Yeol ; Kim, Yung-Pyo ; Shin, Soo-Young ; Park, Soo-Hyun ; Jeon, Jun-Ho ; Park, Sung-Joon ; Kim, Sang-Kyung ; Kim, Chang-Hwa ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 157~166
DOI : 10.9709/JKSS.2011.20.4.157
As underwater environment monitoring system`s interest has increased, the research is proceeding about underwater acoustic sensor network. Underwater sensor network can be applicable to many fields, such as underwater environment monitoring, underwater resource exploration, oceanic data collection, military purposes, etc. It is essential to define the PHY-MAC protocol for revitalization of the underwater acoustic sensor network which is available utilization in a variety of fields. However, underwater acoustic sensor network has to implement by consideration of underwater environmental characteristics, such as limited bandwidth, multi-path, fading, long propagation delay caused by low acoustic speed. In this paper, we define frequency of adjusted PHY protocol, network topology, MAC protocol, PHY-MAC interface, data frame format by consideration of underwater environmental characteristics. We also present system configuration of our implementation and evaluate performance based on our implementation with test in real underwater field.
A Study on Evaluation Criteria for M&S Analysis of Command and Control Effectiveness in Joint Operations
Sohn, Young-Hwan ; Kim, Weon-Bae ;
Journal of the Korea Society for Simulation, volume 20, issue 4, 2011, Pages 167~175
DOI : 10.9709/JKSS.2011.20.4.167
Concerning the effectiveness of command and control is increasing worldwide as future warfare is changing into Network Centric Warfare (NCW). Unlike the old attrition warfare that depends mainly on mobility and strike assets, the modern warfare is based on information and network which regards acquisition and circulation of information as important. Therefore, there`s no room for rediscussion that C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) system will play an important role in warfare. In spite of this fact, there isn`t any way to explain clearly how to measure the effectiveness of command and control system in a battle and to reflect it systematically in a system effectiveness. In this study, we examined NCO-CF (Network Centric Operations-Conceptual Framework), developed by the Department of Defense (DOD), which can conceptually explain the increment of effectiveness of C4ISR system that is the basis of NCO. And we suggested methodology based on NCO-CF to establish the evaluation criteria for M&S analysis of command and control effectiveness. As a case study we derived the evaluation criteria for the command and control system in joint operations by applying the suggested methodology.