• Title/Summary/Keyword: ns-2 simulation

Search Result 409, Processing Time 0.031 seconds

Parameter Estimation of SWAT Model Using SWAT-CUP in Seom-river Experimental Watershed (섬강시험유역에서 SWAT-CUP을 이용한 SWAT모형 매개변수 추정)

  • Choi, Heung Sik
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.2
    • /
    • pp.529-536
    • /
    • 2013
  • The semi-distributed rainfall runoff model of SWAT is applied to the Seom-river experimental watershed. The simulations of various antecedent periods before the targeted simulation periods of 2002 to 2009 are not necessary despite of the slight appearance of corresponding changes in simulated total runoff. The simulated results of total runoff by using various numbers of soil layer maps have little differentiated nevertheless the slight changes in simulated results have been appeared. The 7 parameters of CANMX, $CN_2$, ESCO, GW_REVAP, SOL_ALB, SOL_AWC, and SOL_K greatly govern the rainfall runoff are confirmed and their sensitivity analyses have been carried out. The optimal parameters used in SWAT are derived by SUFI-2 of SWAT-CUP. The NS and $R^2$ are 0.99 and 0.98, respectively which is shown the good agreement between the observed and the simulated results. The uncertainty factors of P-factor and R-factor are 0.85 and 0.06, respectively which is also shown the high efficiency of the model. The high applicability is also shown with improving the RMSE in SWAT model simulation using the parameters estimated by SUFI-2 of SWAT-CUP.

A Combined Pharmacophore-Based Virtual Screening, Docking Study and Molecular Dynamics (MD) Simulation Approach to Identify Inhibitors with Novel Scaffolds for Myeloid cell leukemia (Mcl-1)

  • Bao, Guang-Kai;Zhou, Lu;Wang, Tai-Jin;He, Lu-Fen;Liu, Tao
    • Bulletin of the Korean Chemical Society
    • /
    • v.35 no.7
    • /
    • pp.2097-2108
    • /
    • 2014
  • Chemical feature based quantitative pharmacophore models were generated using the HypoGen module implemented in DS2.5. The best hypothesis, Hypo1, which was characterized by the highest correlation coefficient (0.96), the highest cost difference (61.60) and the lowest RMSD (0.74), consisted of one hydrogen bond acceptor, one hydrogen bond donor, one hydrophobic and one ring aromatic. The reliability of Hypo1 was validated on the basis of cost analysis, test set, Fischer's randomization method and GH test method. The validated Hypo1 was used as a 3D search query to identify novel inhibitors. The screened molecules were further refined by employing ADMET, docking studies and visual inspection. Three compounds with novel scaffolds were selected as the most promising candidates for the designing of Mcl-1 antagonists. Finally, a 10 ns molecular dynamics simulation was carried out on the complex of receptor and the retrieved ligand to demonstrate that the binding mode was stable during the MD simulation.

An Improved EPS Handover Scheme for Seamless D2D Communications (끊김없는 D2D 통신을 위한 EPS 핸드오버 개선 방안)

  • Kim, Jong-Chan;Min, Sang-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.4
    • /
    • pp.168-180
    • /
    • 2018
  • Due to the spread of mobile devices and the introduction of high-quality services, mobile traffic is expected to increase sharply and overload of cellular networks is expected. D2D communication is a way to reduce the load and evolve to 5th generation. Since D2D communication directly communicates between the terminals, it can reduce the overload of the cellular network and improve energy efficiency, data rate and network performance. This paper proposes a D2D handover scheme for D2D communication in cellular networks. The cellular network is a 3GPP EPS, and the proposed D2D handover method improves the existing EPS handover process considering compatibility between existing EPS and D2D communication. We also demonstrate the superiority of the proposed handover scheme using the network simulator ns-3. Simulation results show that the proposed handover scheme is superior to existing handover methods in terms of CUE variation, packet transmission delay time, and throughput.

Simulation-based Worm Damage Assessment on ATCIS (시뮬레이션 기반 육군전술지휘정보체계에 대한 웜 피해평가)

  • Kim, Gi-Hwan;Kim, Wan-Joo;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.115-127
    • /
    • 2007
  • The army developed the ATCIS(Army Tactical Command Information System) for the battlefield information system with share the command control information through the realtime. The using the public key and the encryption equipment in the ATCIS is enough to the confidentiality, integrity. but, it is vulnerable about the availability with the zero day attack. In this paper, we implement the worm propagation simulation on the ATCIS infrastructure through the modelling on the ATCIS operation environment. We propose the countermeasures based on the results from the simulation.

Dynamic Test of Structural Models Using $4m{\times}4m$ Shaking Table ($4m{\times}4m$ 진동대를 이용한 구조모델의 동적실험)

  • 이한선;우성우;김병현
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.1 no.1
    • /
    • pp.51-56
    • /
    • 1997
  • The objective of this study is to review the current state of earthquake simulation tecniques using the shaking table and check the reliability. One degree-of-freedom(d.o.f) and three d.o.f aluminium shear models were used and $4m{\times}4m$ 6 d.o.f shaking table was excitated in one horizontal direction to simulate 1940 El centro earthquake accelerogram (NS component). When the actual acceleration history of shaking table is compared to the desired one, it can be found that the overall histories are very similar, but that the lower frequency range (0~2 Hz) of the actual excitation has generally lower amplitude than that of the desired in Fourier transform amplitude. Free vibration and white noise tests have shown almost the some values for natural frequencies, but shown quite different values for damping rations, that is, 1.37% in case of free vibration test vs 14.76 % in case of white noise test. The time histories of story shear driff show the globally linear elastic behaviors. But the elliptical shape of the histories with one of the axis being the stiffness of the story implies the effect of viscous damping.

  • PDF

An Enhanced Greedy Message Forwarding Protocol for Increasing Reliability of Mobile Inter-Vehicle Communication (이동하는 차량 간 통신의 신뢰성 향상을 위한 개선된 탐욕 메시지 포워딩 프로토콜)

  • Ryu, Min-Woo;Cha, Si-Ho;Cho, Kuk-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.43-50
    • /
    • 2010
  • Vehicle-to-Vehicle (V2V) is a special type of vehicle ad-hoc network (VANET), and known as a solution to provide communication among vehicles and reduce vehicle accidents. Geographical routing protocols as Greedy Perimeter Sateless Routing (GPSR) are very suitable for the V2V communication due to special characters of highway and device for vehicles. However, the GPSR has problem that appears local maximum by some stale neighbor nodes in the greedy mode of the GPSR. It can lose transmission data in recovery mode, even if the problem is can be solved by the recovery mode of the GPSR. We therefore propose a Greedy Perimeter Reliable Routing (GPRR), can provide more reliable data transmission, to resolve the GPSR problem in the V2V environment. Simulation results using ns-2 shown that the GPRR reveals much better performance than the GPSR by remarkably reducing the local maximum rate in the greedy mode.

Clustering and Routing Algorithm for QoS Guarantee in Wireless Sensor Networks (무선 센서 네트워크에서 QoS 보장을 위한 클러스터링 및 라우팅 알고리즘)

  • Kim, Soo-Bum;Kim, Sung-Chun
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.189-196
    • /
    • 2010
  • The LEACH does not use flooding method for data transmission and this makes low power consumption. So performance of the WSN is increased. On the other hand, QoS based algorithm which use restricted flooding method in WSN also achieves low power consuming rate by reducing the number of nodes that are participated in routing path selection. But when the data is delivered to the sink node, the LEACH choose a routing path which has a small hop count. And it leads that the performance of the entire network is worse. In the paper we propose a QoS based energy efficient clustering and routing algorithm in WSN. I classify the type of packet with two classes, based on the energy efficiency that is the most important issue in WSN. We provide the differentiated services according to the different type of packet. Simulation results evaluated by the NS-2 show that proposed algorithm extended the network lifetime 2.47 times at average. And each of the case in the class 1 and class 2 data packet, the throughput is improved 312% and 61% each.

A Vehicle Communication Routing Algorithm Considering Road Characteristics and 2-Hop Neighbors in Urban Areas (도심 환경에서 도로의 특성과 2-홉 이웃 노드를 고려한 차량 통신 라우팅 알고리즘)

  • Ryu, Min-Woo;Cha, Si-Ho;Cho, Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.464-470
    • /
    • 2011
  • V2V (Vehicle-to-Vehicle) is a special kind of VANET (Vehicular Ad-hoc Network), which has high mobility and frequent topology changes and causes the link breakage problem. To resolve this problem, geographic routing protocols such as greedy forwarding are proposed. However, the greedy forwarding approach selects the node closest to the destination node as the transfer node within the transmission range so that it may cause many problems owing to many intersections and many changes in vehicular traffic in urban areas. The paper proposes a greedy perimeter urban routing (GPUR) algorithm considering the presence of 2-hop neighbor nodes and the road characteristics. Simulation results using ns-2 reveal that the proposed GPUR algorithm significantly reduces the routing error problem and the probability of local maximum than the existing routing protocols.

An AODV-Based Two Hops Dynamic Route Maintenance in MANET (MANET에서의 AODV 기반 2홉 동적 경로유지 기법 연구)

  • Moon, Dae-Keun;Kim, Hag-Bae
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.191-198
    • /
    • 2007
  • A mobile ad-hoc network (MANET) is an autonomous, infrastructure-less system that consists of mobile nodes. In MANET, on demand routing protocols are usually used because network topology changes frequently. AODV, which is a representative on demand routing protocol, operates using the routing table of each node that includes next hop of a route for forwarding packets. It maintains the established route if there is not an expiration of route or any link break. In the paper, we propose a partially adaptive route maintenance scheme (AODV-PA) based on AODV, which provides dynamic route modification of initial route for selecting the effective route using not only next hop but also next-hop of next-hop (i.e. 2-hop next node) acquired through route discovery process. In addition, the proposed scheme additionally manages the routing table for preventing exceptional link breaks by route modification using HELLO messages. We use NS 2 for the computer simulation and validate that the proposed scheme is better than general AODV in terms of packet delivery ratio, latency, routing overhead.

Cluster Based Multi-tier MAC Protocol for Dense Wireless Sensor Network (밀집된 무선센서네트워크를 위한 클러스터 기반의 멀티티어 MAC 프로토콜)

  • Hwan, Moon-Ji;Mu, Chang-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.101-111
    • /
    • 2011
  • A new MAC protocol, MT-MAC(Multi-Tier Medium Access Control) by name, is proposed for dense sensor networks. Depending on the density of nodes in a virtual cluster, the cluster header performs the splitting to several tiers in nodes of virtual cluster. MT-MAC split the tiers to use modfied-SYNC message after receiving the beacon message from the cluster header. Because only the sensor nodes in the same tier communicate each other, less power is consumed and longer network life time is guaranteed. By a simulation method with NS-2, we evaluated our protocol. In dense nodes environments, MT-MAC protocol shows better results than S-MAC in terms of packet delivery rates throughput and energy consumption.