• Title/Summary/Keyword: Internet-Based Simulation

Search Result 1,608, Processing Time 0.03 seconds

Practical Swarm Optimization based Fault-Tolerance Algorithm for the Internet of Things

  • Luo, Shiliang;Cheng, Lianglun;Ren, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1178-1191
    • /
    • 2014
  • The fault-tolerance routing problem is one of the most important issues in the application of the Internet of Things, and has been attracting growing research interests. In order to maintain the communication paths from source sensors to the macronodes, we present a hybrid routing scheme and model, in which alternate paths are created once the previous routing is broken. Then, we propose an improved efficient and intelligent fault-tolerance algorithm (IEIFTA) to provide the fast routing recovery and reconstruct the network topology for path failure in the Internet of Things. In the IEIFTA, mutation direction of the particle is determined by multi-swarm evolution equation, and its diversity is improved by the immune mechanism, which can improve the ability of global search and improve the converging rate of the algorithm. The simulation results indicate that the IEIFTA-based fault-tolerance algorithm outperforms the EARQ algorithm and the SPSOA algorithm due to its ability of fast routing recovery mechanism and prolonging the lifetime of the Internet of Things.

Development of Online Quantum Chemistry Experiment Environment Based on Computational Science Platform (계산과학플랫폼 기반 온라인 양자화학 실험 환경 개발)

  • Jeon, Inho;On, Noori;Kwon, Yejin;Seo, Jerry H.;Lee, Jongsuk Ruth
    • Journal of Internet Computing and Services
    • /
    • v.21 no.5
    • /
    • pp.97-107
    • /
    • 2020
  • This paper introduces an online experiment environment based on a computational science platform that can be used for various purposes ranging from basic education to quantum chemistry and professional quantum chemistry research. The simulation environment was constructed using a simulation workbench and simulation workflow, which are execution environment services of Science App provided by the computational science platform. We developed an environment in which learners can learn independently without an instructor by selecting experiment topics that can be used in various areas of chemistry, and offering the learning materials of the topics in a form of e-learning content that includes theory and simulation exercises. To verify the superiority of the proposed system, it was compared with WebMO, a state-of-the-art web-based quantum chemistry simulation service.

An AI-Based Prevention Program to Protect Youth from Cybergrooming

  • Kee Jeong Kim;Lifu Huang;Jin-Hee Cho
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.67-73
    • /
    • 2023
  • The Digital Age calls for improvement of information literacy particularly among children and youth who are vulnerable to cybergrooming. Taking an interdisciplinary approach by leveraging our team's expertise including child and adolescent development, data analytics, and cybersecurity, this study proposes an interactive artificial intelligence (AI)-based preventive simulation program that raises youth knowledge and awareness about the risk of cybergrooming as well as increases resilient self-efficacy in their cybersecurity-relevant skills. The primary purpose of this project is to evaluate the effectiveness of the simulation program on preventing cybergrooming. More specifically, this study is designed to examine developmental changes in self-efficacy of cybersecurity-relevant skills among youth participants as a function of the preventive simulation program. Further, this study will identify risk and protective factors that explain interindividual differences in the ability of children and youth either to fall victim to advances from a cyber predator or to recognize and deter such threats. The preliminary data will help improve the effectiveness of the preventive simulation program as well as the methods of implementation to large groups of youth. The findings from the proposed study will contribute to making specific recommendations to parents, educators, practitioners, and policy makers for the prevention of cybergrooming.

Modeling and Simulation Framework for Assessing Interference in Multi-Hop Wireless Ad Hoc Networks

  • Woo, Shin-Uk;Hong, Jin-Pyo;Kim, Hwang-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.26-51
    • /
    • 2009
  • In this paper, we propose an empirical framework for modeling and emulating interference in multi-hop wireless ad-hoc networks. Wireless interference causes wide variation in the frame delivery rate at a link, and thus we cannot represent the state of the link with only two states, connected state and disconnected state, as in wired networks. We first investigate wireless interference in detail, in order to accurately calibrate the interference and identify its underlying attributes, and then we simulate the diverse occurrences and effects of interference, after incorporating the scheme into a simulation tool. Based on these observations, we devise a modeling and simulation framework with several control parameters, and perform an extensive set of simulation studies. The simulation results indicate that the proposed framework enables us to examine various attributes of wireless interferences and their effects on wireless network protocols and systems.

Development of Web-based Statistical System for Bootstrap on the Internet Environment (인터넷 환경에서 붓스트랩 통계 시스템의 개발)

  • 최성운;임인섭
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.2
    • /
    • pp.241-250
    • /
    • 2004
  • Recently, growth of internet causes rapid changes in many areas of statistics such as statistical computation and education. Especially, bootstrap is the most interesting statistical methods applying computer resampling simulation. In this study, we try to present how to use a method of bootstrap on the internet. We also develop to user a statistical system which is programed with java applet for user to handle easily.

Development of Web-based Quality & Reliability System for Bootstrap on the Internet Environment (인터넷 환경에서 붓스트랩 품질 및 신뢰성 시스템의 개발)

  • Choi Sung woon;Lim In sup
    • Journal of the Korea Safety Management & Science
    • /
    • v.7 no.1
    • /
    • pp.147-157
    • /
    • 2005
  • Recently, growth of internet causes rapid changes in many areas of statistics such as statistical computation and analysis. Especially, bootstrap is the most interesting statistical methods applying computer resampling simulation. In this paper, we try to present how to use a method of bootstrap on the internet. We also develop to user a statistical system which is programed with ASP for user to handle easily in manufacturing system.

A Tree-Based Approach for the Internet Connectivity of Mobile Ad Hoc Networks

  • Oh, Ro-An
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.261-270
    • /
    • 2009
  • We propose a tree-based integration of infrastructure networks and MANETs (TUM) to efficiently extend the scope of mobile Internet protocol to mobile ad hoc networks and devise a tree-based routing protocol (TBRP) that is suitable for the TUM architecture. Infrastructure networks have a number of fixed Internet Gateways that connect two heterogeneous networks. Mobile nodes form a number of small trees named pMANETs, each of them growing from anchor node which can communicate directly with an Internet Gateway. A new node registers with foreign agent and home agent along the tree path without resorting to an inefficient flooding. Furthermore, the TBRP sets up a routing path efficiently by exploiting the tree information without relying on flooding. We show by resorting to simulation that our approach is competitive against the conventional AODV based approach.

A Packet Scheduling Algorithm for High-speed Portable Internet System (휴대 인터넷 시스템에서의 패킷 스케줄링 알고리즘 연구)

  • Choi, Seong-Hoon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.30 no.1
    • /
    • pp.59-65
    • /
    • 2007
  • HPI (High-speed Portable Internet) system which provides high speed internet services is going to be commercialized soon. Since HPI provides simultaneously four different service types such as UGS (Unsolicited Grant Service), rtPS (real time Polling Service), nrtPS(non-real time Polling Service), and BE (Best Effort) under different QoS (Quality of Service) requirements and limited wireless channel resources, efficient packet scheduling mechanisms are necessary to increase the utilization of channels as well as to satisfy the various QoS requirements. This study regards the traffic data to be served as time series and proposes a new packet scheduling algorithm based on the nonparametric statistical test. The performance of the newly proposed algorithm is evaluated through the simulation analysis using a simulator that can evaluate the performance of packet scheduling mechanisms under various values of system parameters and measures such as packet delay time, data transmission rate, number of loss packets, and channel utilization.

Adaptive Rate Control Scheme for Streaming-based Content Sharing Service

  • Lee, Sunghee;Chung, Kwangsue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.784-799
    • /
    • 2013
  • This paper presents an adaptive rate control scheme for streaming-based content sharing service. This scheme delivers multimedia contents from a user device to another device or seamlessly redirects streaming service across heterogeneous user devices. In the proposed scheme, a streaming server adjusts video quality level according to the network and client status. Our scheme is different from other rate control schemes, because the video quality at the server is decided not only based on the available bandwidth, but also based on the device characteristics and bandwidth requirement at the access network. We also propose a bandwidth estimation method to achieve more equitable bandwidth allocations among streaming flows competing for the same narrow link with different Round Trip Times (RTTs). Through the simulation, we prove that our scheme improves the network stability and the quality of streaming service by appropriately adjusting the quality of the video stream. The simulation results also demonstrate the ability of the proposed scheme in ensuring RTT-fairness while remaining throughput efficient.

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.