• Title/Summary/Keyword: Flooding Simulation

Search Result 289, Processing Time 0.026 seconds

A Study on Low-Overhead Collision Warning Scheme using Vehicle-to-Vehicle Communications (차량 간 통신을 이용한 저비용 사고 위험 방지 기술에 관한 연구)

  • Lee, Ji-Hoon;Kim, Dae-Youb
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.10
    • /
    • pp.1221-1227
    • /
    • 2012
  • It is expected that the vehicle safety systems using vehicle-to-vehicle communication can reduce the possibility of vehicle collision and prevent the chain crash by promptly delivering the status of neighboring vehicles. Many IEEE 802.11 DCF based Flooding schemes have been proposed, but they may generally expose the problems that the transmission efficiency is sharply declined as the vehicle density has increased and then is related to the low possibility of the channel access. Therefore, this paper proposes a collision prevention scheme using adaptively controlling the frequency of the message exchanges based on the current status of neighboring vehicles. Moreover, it is shown from simulation that the proposed scheme provides the performance gains over the existing Flooding based scheme.

Design of Hybrid Network Probe Intrusion Detector using FCM

  • Kim, Chang-Su;Lee, Se-Yul
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2009
  • The advanced computer network and Internet technology enables connectivity of computers through an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and can not detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We proposed a network based hybrid Probe Intrusion Detection model using Fuzzy cognitive maps (PIDuF) that detects intrusion by DoS (DDoS and PDoS) attack detection using packet analysis. A DoS attack typically appears as a probe and SYN flooding attack. SYN flooding using FCM model captures and analyzes packet information to detect SYN flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.064% and the max-average false negative rate of 2.936%. The true positive error rate of the PIDuF is similar to that of Bernhard's true positive error rate.

Application of adaptive mesh refinement technique on digital surface model-based urban flood simulation

  • Dasallas, Lea;An, Hyunuk
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.122-122
    • /
    • 2020
  • Urban flood simulation plays a vital role in national flood early warning, prevention and mitigation. In recent studies on 2-dimensional flood modeling, the integrated run-off inundation model is gaining grounds due to its ability to perform in greater computational efficiency. The adaptive quadtree shallow water numerical technique used in this model implements the adaptive mesh refinement (AMR) in this simulation, a procedure in which the grid resolution is refined automatically following the flood flow. The method discounts the necessity to create a whole domain mesh over a complex catchment area, which is one of the most time-consuming steps in flood simulation. This research applies the dynamic grid refinement method in simulating the recent extreme flood events in Metro Manila, Philippines. The rainfall events utilized were during Typhoon Ketsana 2009, and Southwest monsoon surges in 2012 and 2013. In order to much more visualize the urban flooding that incorporates the flow within buildings and high-elevation areas, Digital Surface Model (DSM) resolution of 5m was used in representing the ground elevation. Results were calibrated through the flood point validation data and compared to the present flood hazard maps used for policy making by the national government agency. The accuracy and efficiency of the method provides a strong front in making it commendable to use for early warning and flood inundation analysis for future similar flood events.

  • PDF

Quantifying Inundation Analysis in Misari motorboat racing stadium using MOUSE (MOUSE를 활용한 미사리 조정경기장의 정량적 침수해석)

  • Hwang, Hwan-Kook;Han, Sang-Jong;Chong, Yon-Kyu
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.24 no.5
    • /
    • pp.549-560
    • /
    • 2010
  • Recently, heavy rainfalls due to the climate change in Korea have caused inundation problems in urban sewer networks. In july 2006, a flooding accident at Misari motorboat racing stadium near the Han river occurred due to the effect of record-breaking outflow discharge from Paldang-dam. The purpose of this study was to simulate and analyze the flooding accident at Misari stadium by MOUSE model. The results of simulation analysis indicated that the total flood volume was $1,313,450m^3$. The effect of back water was 85.9% of the total volume which was caused by the manhole accident, and the effect of accumulated runoff was 14.1% of total volume which was caused by non-return valve shutdown. The simulation results of this MOUSE modeling that was linked to the boundary condition of the dynamic flows in the river by DWOPER model showed the potential of successful inundation analysis for sewer networks.

Cause Investigation for the Flooding and Sinking Accident of the Ro-Ro Ferry Ship (로로 여객선의 침수 및 침몰사고 원인규명)

  • Chung, Young-Gu;Lee, Jae-Seok;Ha, Jung-Hoon;Lee, Sang-Gab
    • Journal of Navigation and Port Research
    • /
    • v.44 no.3
    • /
    • pp.264-274
    • /
    • 2020
  • The Ro-Ro ferry ship capsized and sank to the bottom of the sea because of the rapid turning for several reasons, such as lack of stability due to the center of gravity rise from the extension and rebuilding of the stern cabin, excessive cargo loading, and shortage ballast, poor lashing, etc. The purpose of this study was to investigate and analyze the cause of the ship's rapid flooding, capsizing, and sinking accident according to rapid turning scientifically and accurately using the Fluid-Structure Interaction( FSI) analysis technique. Several tests were conducted for this cause investigation of the flooding and sinking accident correctly and objectively, such as the realization of the accurate ship posture tracks according to the accident time using several accident movies and photos, the validation of cargo moving track, and sea water inflow amount through the exterior openings and interior paths compared with the ship's posture according to the accident time using the floating simulation and hydrostatic characteristics program calculation, and the performance of a full-scale ship flooding·sinking simulation.

An Efficient Flooding Algorithm for Position-based Wireless Ad hoc Networks (위치 기반 무선 애드 혹 네트워크에서의 효율적인 플러딩 기법)

  • JaeGal, Chan;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.17-28
    • /
    • 2008
  • Rapid transmission of packets is important in mobile ad hoc networks. Therefore, a flooding algorithm which can guarantee a short delay is useful in various ways of packet transmission. Flooding algorithm is one of the packet transmission methods that broadcasts a packet to all nodes within a transmission range. It does not rebroadcast the same packet which is already received from other nodes. Basically, flooding algorithm's advantages are that it simply writes an address and a sequence number in a packet, and it can be adapted for topological changes easily. However, the basic flooding algorithm has a shortcoming that causes excessive traffic because all nodes transmit a packet at least once. To solve this problem, research about flooding algorithms that constrains duplicated transmission of packets based on probabilistic and geographical information is going on. However, the existing algorithm cannot guarantee short delay and low traffic. To reduce a delay, in this paper we propose a flooding scheme where a node which receives a broadcasted packet chooses and allocates a priority to one of its neighbor nodes and then the node transmits the packet promptly to the node to whom the priority was given. Moreover, we propose a totally fresh a roach to constrain duplicated transmission by searching a node that already received the same packet by using node's geographical position information. Lastly, we compare the performance of the proposed algorithm with the existing algorithm through simulation. The results show that the proposed algorithm can distribute packets through a lower number of total packet transmissions and faster delivery time than the existing algorithm.

Adaptive Query Flooding using Neighbor Information for Routing Performance Enhancement in Ad Hoc Networks (Ad Hoc Network에서 라우팅 성능 향상을 위한 이웃 노드 정보를 이용한 적응성 경로 구성 전송 방식)

  • Lee Hakhu;Kang Sangwook;An Sunshin
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.673-684
    • /
    • 2004
  • As the wireless mobile communication is being widespread, mobile technologies will have important roles in the communication with the explosive growth of demanding for wireless portable devices. Among the mobile technologies, a great deal of interest has been taken in mobile ad hoc network (MANET), which is a collection of wireless mobile nodes forming a temporary network without the aid of stationary infrastructure in recent. Furthermore, considering characteristic of ad hoc networks, the design of efficient routing protocols is an important issue. In recent years, on-demand protocols among routing protocols have noticed because of the low routing overhead. However, on-demand protocols suffer from production of the enormous query Packets by broadcasting in order to setup routes, that is, a flooding scheme. The flooding scheme is very costly and results in serious problem, which we refer as the broadcast storm problem. In this paper, we propose a Dynamic Adaptation Query flooding Using Neighbor Topology (NT-DAQ) scheme, in order to resolve the broadcast storm Problem. When a route discovery is in progress, each mobile node decides on the basis of neighbor topology information whether discovery process participates or not. Therefore, our proposed scheme enables to improve network performance in which minimize the number of query rackets. We evaluate the efficiency of our proposed scheme through simulation.

City Information Model-based Information Management of Flood Damages (도시정보모델의 침수피해정보관리에서의 활용)

  • Park, Sang Il;Kim, Min-Su;Kim, Jong Myung;Lee, Sang-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.28 no.4
    • /
    • pp.385-392
    • /
    • 2015
  • Open city information model can increase the understanding of the situation, enable the effective reuse of information due to access the semantic and relational conditions of objects, and support the reliable decision-making through linking with external references. The city information model focused on terrain and buildings was implemented based on the actual data. In addition, a process for flooding simulation was proposed using hydraulic analysis data and the city information model. The deaths and damages were estimated by flooding simulation. The availabilities were examined by detailed queries and responses based on model data of the city information model, hydraulic analysis data and the estimated damages.

Knowledge-based Modeling for System Security (시스템 보안을 위한 지식기반 모델링)

  • 서희석;김희원
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.491-500
    • /
    • 2003
  • The need for network security is being increasing due to the development of information communication and internet technology, In this paper, firewall models, operating system models and other network component models are constructed. Each model Is defined by basic or compound model using MODSIM III. In this simulation environment with representative attacks, the following attacks are generated, SYN flooding and Smurf attack as an attack type of denial of service. The simulation is performed with the models that exploited various security policies against these attacks. In addition, the results of the simulation show that the analysis of security performance according to various security policies, and the analysis of correlation between availability and confidentiality according to security empowerment.

  • PDF