• Title/Summary/Keyword: Worm Simulation

Search Result 51, Processing Time 0.017 seconds

Energy Efficient Cluster Head Selection and Routing Algorithm using Hybrid Firefly Glow-Worm Swarm Optimization in WSN

  • Bharathiraja S;Selvamuthukumaran S;Balaji V
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2140-2156
    • /
    • 2023
  • The Wireless Sensor Network (WSN), is constructed out of teeny-tiny sensor nodes that are very low-cost, have a low impact on the environment in terms of the amount of power they consume, and are able to successfully transmit data to the base station. The primary challenges that are presented by WSN are those that are posed by the distance between nodes, the amount of energy that is consumed, and the delay in time. The sensor node's source of power supply is a battery, and this particular battery is not capable of being recharged. In this scenario, the amount of energy that is consumed rises in direct proportion to the distance that separates the nodes. Here, we present a Hybrid Firefly Glow-Worm Swarm Optimization (HF-GSO) guided routing strategy for preserving WSNs' low power footprint. An efficient fitness function based on firefly optimization is used to select the Cluster Head (CH) in this procedure. It aids in minimising power consumption and the occurrence of dead sensor nodes. After a cluster head (CH) has been chosen, the Glow-Worm Swarm Optimization (GSO) algorithm is used to figure out the best path for sending data to the sink node. Power consumption, throughput, packet delivery ratio, and network lifetime are just some of the metrics measured and compared between the proposed method and methods that are conceptually similar to those already in use. Simulation results showed that the proposed method significantly reduced energy consumption compared to the state-of-the-art methods, while simultaneously increasing the number of functioning sensor nodes by 2.4%. Proposed method produces superior outcomes compared to alternative optimization-based methods.

Simulation-based Network Vulnerability Analysis Using the SIMVA (SIMVA를 이용한 시뮬레이션 기반의 네트워크 취약성 분석)

  • You Yong-Jun;Lee Jang-Se;Chi Sung-Do
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.21-29
    • /
    • 2004
  • The major objective of this paper is to analyze network vulnerabilities using the SIMVA (SIMualtion-based Vulnerability Analyzer). SIMVA is capable of monitor network status and analyze vulnerabilities automatically. To do this, we have employed the advanced modeling and simulation concepts such as SES/MB (System Entity Structure / Model Base) framework, DEVS (Discrete Event System Specification) formalism, and experimental frame for developing network security models and simulation-based analysis of vulnerability. SIMVA can analyze static vulnerability as well as dynamic vulnerability consistently and quantitatively. In this paper, we verified and tested the capability of application of SIMVA by slammer worm attack scenario.

  • PDF

Image segmentation using fuzzy worm searching and adaptive MIN-MAX clustering based on genetic algorithm (유전 알고리즘에 기반한 퍼지 벌레 검색과 자율 적응 최소-최대 군집화를 이용한 영상 영역화)

  • Ha, Seong-Wook;Kang, Dae-Seong;Kim, Dai-Jin
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.12
    • /
    • pp.109-120
    • /
    • 1998
  • An image segmentation approach based on the fuzzy worm searching and MIN-MAX clustering algorithm is proposed in this paper. This algorithm deals with fuzzy worm value and min-max node at a gross scene level, which investigates the edge information including fuzzy worm action and spatial relationship of the pixels as the parameters of its objective function. But the conventional segmentation methods for edge extraction generally need the mask information for the algebraic model, and take long run times at mask operation, whereas the proposed algorithm has single operation according to active searching of fuzzy worms. In addition, we also propose both genetic fuzzy worm searching and genetic min-max clustering using genetic algorithm to complete clustering and fuzzy searching on grey-histogram of image for the optimum solution, which can automatically determine the size of ranges and has both strong robust and speedy calculation. The simulation results showed that the proposed algorithm adaptively divided the quantized images in histogram region and performed single searching methods, significantly alleviating the increase of the computational load and the memory requirements.

  • PDF

Image Enhancement Using Error Diffusion with APL in PDP (APL 적용 오차 확산법을 이용한 PDP 화질 개선)

  • Jang Soo-Wook;Pyo Se-Jin;Lee Sung-Hak;Sohng Kyu-Ik;Kim Eun-Su
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.10
    • /
    • pp.1360-1368
    • /
    • 2005
  • PDP is the flat panel display, suitable for high definition television because of large-sire and high-brightness. It has many advantages such as fast response, wide viewing angle, low weight, and simple manufacturing process for fabrication. However, there are some disadvantages and one of them is the image quality degradation, which is dependent on the digital signal processing. Although image quality of PDP is improving by many researches and experimentations, it still isn't as good as that of CRT because of various factors. One of them is worm-like pattern generated by an error diffusion process. And the worm-like pattern is severely increased after an APL process. An increased worm-like pattern occur a drop of resolution in image and a change of CCT according to each grayscale. In this paper, a method for improvement of image quality using the error diffusion which considers the APL process is proposed. In the proposed method, the APL process is performed before the error diffusion process. Simulation results showed that the proposed method has better performances for resolution in images and CCT uniformity according to each grayscale than the conventional method.

  • PDF

A deadlock-Free Fault-Tolerant routing Method Using Partial-Adaptiveness in a N-Dimensional Meshed Network (N-차원 메쉬 네트워크에서의 부분적 적응성을 이용한 Deadlock-Free 결함포용 라우팅 기법)

  • Mun, Dae-Geun;Gam, Hak-Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.1090-1097
    • /
    • 1999
  • the multi computers operated in harsh environments should be designed to guarantee normal operations in the presence of the component faults. One solution for this is a fault-tolerant routing. In the paper, we consider n-dimensional meshed network for the basic topology and propose a simple fault-tolerant routing algorithm that can transfer messages to their destination as desired in the presence of some component faults. the built algorithms basically adopts a WormHole(WH) routing method and uses the virtual channels sharing a physical channel for deadlock-freedom. Consequently, we show that the suggested algorithm has a higher performance than the X-Y routing algorithm through simulation results.

  • PDF

Detection Algorithm of Scanning worms using network traffic characteristics (네트워크 트래픽 특성을 이용한 스캐닝 웜 탐지기법)

  • Kim, Jae-Hyun;Kang, Shin-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.57-66
    • /
    • 2007
  • Scanning worms increase network traffic load because they randomly scan network addresses to find hosts that are susceptible to infection. Since propagation speed is faster than human reaction, scanning worms cause severe network congestion. So we need to build an early detection system which can automatically detect and quarantine such attacks. We propose algorithms to detect scanning worms using network traffic characteristics such as variance, variance to mean ratio(VMR) and correlation coefficient. The proposed algorithm have been verified by computer simulation. Compared to existing algorithm, the proposed algorithm not only reduced computational complexity but also improved detection accuracy.

Development of the CAMSsystem for CNC Hob Relieving Lathe (CNC 호브 릴리빙 선반의 CAM 시스템 개발)

  • 양희구;김석일;박천홍;류근수
    • Korean Journal of Computational Design and Engineering
    • /
    • v.1 no.2
    • /
    • pp.150-157
    • /
    • 1996
  • The hob is considered as an effective gear cutting tool for achieving the various gears such as spur gear, helical gear, worm gear and so on. To enhance the productivity and precision of hobs and the competitive ability of domestic CNC hob relieving lathes, a CAM system for CNC hob relieving lathe needs to be realized. In this study, the CAM system is developed based on the personal computer and C language. Besides the automatic generation of CNC data, the developed CAM system has the various capabilities related to the generation of tool path, the cutting simulation for verifying the generated CNC data and forecasting the cutting time, the DNC operation for communicating the CNC data with CNC controller by RS232C port, and the estimation of undercut length for verifying the hob cutting conditions.

  • PDF

An Analysis on the Forming Process of a Power Assisted Steering Part (PAS 부품의 성형공정해석)

  • 박성호;이호용;황병복
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 1996.03b
    • /
    • pp.7-15
    • /
    • 1996
  • A Manufacturing process of the power steering worm blank is analyzed by FEM aimulation. The process includes mainly three operations such as indentation, extrusion, and upsetting, which was designed bya forming equipment expert. The results of simulation are summarized in terms of load-stroke relationships, die pressure distributions, effective strain distribution, and deforming patterns for each forming operation. Also, Efforts are focused to get the reason that the tool expert designed the forming process in three operations. The results of the simulation are to be useful for the next advanced process planning in terms of good dimesional accuracy, savings in material and machining, no deforaming defects and imporvements in mechanical properties.

  • PDF

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

A Study on the Design/Simulation and Manufacturing for Localization of Parts in Scoop Control Assembly of Small Military Boat (소형 선박 제어 헤드 조립체의 국산화를 위한 설계/해석, 제작에 관한 연구)

  • Yeog, Gyeong-Hwan;Kim, Jae-Hyun;Jin, Chul-Kyu;Chun, Hyeon-Uk
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.5
    • /
    • pp.597-608
    • /
    • 2021
  • The control head components used in small military vessels are designed to be domestically produced, prototypes, structural analysis, and casting methods are designed and cast. The control head assembly consists of a lever, an aluminum outside cover, Middle, front gear cover, back gear cover, and a zinc worm gear. In order to reverse the design of each component, 3D scanning device was used, 3D modeling was performed by CATIA, and prototype productions were carried out by 3D printer. In order to reduce the cost of components, gating system is used by gravity casting method. The SRG ratio of 1:0.9:0.6 was set by applying non-pressurized gating system to aluminum parts, 1:2.2:2.0 and pressurized gating system to zinc parts, and the shapes of sprue, runner and gate were designed. The results of porosity were also confirmed by casting analysis in order to determine whether the appropriate gating system can be designed. The results showed that all parts started solidification after filling completely. ANSYS was used for structural analysis, and the results confirmed that all five components had a safety factor of 15 more. All castings are free of defects in appearance, and CT results show only very small porosity. ZnDC1 zinc alloy worm gear has a tensile strength of 285 MPa and an elongation of 8%. The tensile strength of the four components of A356 aluminum alloy is about 137-162 MPa and the elongation is 4.8-6.5%.