• Title/Summary/Keyword: 유비쿼터스시스템

Search Result 2,312, Processing Time 0.027 seconds

Design of a Message Protocol for The Convergence of a URC-Robot and Information Technologies (URC 로봇과 IT 기술의 컨버전스를 위한 메시지 프로토콜 설계)

  • Lim, Yong-Muk;Kim, Woo-Sung;Park, Sung-Jun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.822-827
    • /
    • 2009
  • As research for URC robot to advance the robot system dissemination and pracical use becomes active, also interest for robot platform and standardization is increasing. However, URC robot middleware does not involve a convergence with IT. Although it seems to be a high connection between robots and IT, the existing middleware has not considered different environments, thus making convergence efforts difficult. The middleware should improve their functions in order to synchronize with IT and to interact through formatted messages. In this paper, we present the necessity of the formatted message in the development of URC platform. In addition, design of the message protocol for the convergence based on the analysis of RUPI, OPC and SECS-II.

  • PDF

Implementation of Flooding Routing Protocol for Field sever using Weather Monitoring System (국지기상 모니터링용 필드서버를 위한 플러딩 라우팅 프로토콜의 구현)

  • Yoo, Jae-Ho;Lee, Seung-Chul;Chung, Wan-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.233-240
    • /
    • 2011
  • A field server was developed by using ubiquitous sensor network technology to monitor the abrupt weather variation in local or mountain area. The data transmissions between deployed field servers in local terrain are very important technology in disaster prevention monitoring system. Weather related information such as temperature, humidity, illumination, atmospheric pressure, dew point and meteorological data are collected from the designated field at a regular interval. The received information from the multiple sensors located at the sensor field is used flooding routing protocol transmission techniques and the sensing data is transferred to gateway through multi-hop method. Telosb sensor node are programmed by nesC language in TinyOS platform to monitor the weather parameters of the local terrain.

A Study of Promoting Method a traditional market by implementing RFID technology and 6W1H context awareness (RFID 기술과 6W1H 상황인식 구현을 통한 전통시장 홍보 방법에 대한 연구)

  • Jung, Sungmo;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.9-14
    • /
    • 2020
  • With the distribution modernization policy advanced by the government and consumers preference toward it, the so called "modern market" has undergone rapid growth. Conversely, traditional market is losing popularity with consumers as a result of inadequate modern structures, small market size, convoluted relationships, inefficient operation and disordered transactions, among others. Therefore, this study seeks to utilize ubiquitous computing, that is, the upgrade of context aware information to 6W1H and promote the market through the interface with Smartphone and provide advanced information through the augmented reality technology. For the construction of context-aware system using user context, the results may significantly differ according to how reference rules are applied to and implemented on knowledge base. In light of above, through the use of RFID technology and 6W1H context awareness, we seek to promote traditional markets.

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Measurement of floodwater reach time in Gum river using Ubiquitous technology (유비쿼터스 기술을 이용한 금강 홍수도달시간 계측)

  • Hwang, Eui-Ho;Kwon, Hyung-Joong;Lee, Geun-Sang;Koh, Deuk-Koo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2008.05a
    • /
    • pp.2238-2243
    • /
    • 2008
  • 홍수 방류량 하류 도달시간 산정은 댐운영 및 홍수예경보의 기초자료로 인식되고 있어 정확한 유하시간 산정이 필요하다. 수자원공사에서는 댐 방류에 따른 하류도달시간을 댐운영실무편람('06)에 있는 자료를 활용하여 댐 운영에 활용하고 있다. 금강 하류부의 경우 '97년 금강홍수예경보 자료를 활용하고 있으나, 수치모형 결과 자료로 실측에 의한 검증이 이루어지지 않았다. 댐 방류수에 대한 하류도달 시간에 대한 실측 기술을 확보하여 실측을 통한 수치모형의 검증 및 보완 필요하며, 보정된 수치모형을 이용한 홍수도달시간 실시간 예측을 통한 댐운영의 효율성 확보 및 대내외 검증된 결과 제시가 요구되고 있다. 현재 댐 방류에 따른 하류도달 시간에 대한 실측이 요구되고 있으나, 관련 기술에 대한 국내외 개발 및 적용 사례가 전무한 실정으로 본 연구에서는 현장계측과 수치모형을 연계한 신뢰성 높은 도달시간을 분석하는 기술을 개발하고자 하였다. 이를 위해 장구간 내에서 홍수의 흐름과 동일하게 하천에 흘러갈 수 있는 부유물을 개발하였으며, 주야간에 상관없어 주요 계측지점에서 도달시간 산정을 위해 자동 인식될 수 있는 센서기술을 개발하였다. 또한, 인식된 센서를 안정적으로 통신망에 연동하여 실시간 계측이 가능하며, GIS 기반의 원격 모니터링이 가능하도록 시스템을 구성하였다. 나아가. 기존 수치모형에 의존하여 예측된 도달시간 산정방법을 개선하기 위하여 수치모형의 매개변수를 검보정을 위한 시계열 및 지속적으로 자료를 취득하였다. 이러한 센서기술, 모니터링기술, 분석기술을 융합하여 향후 매개변수를 보정한 홍수도달시간 수치모형을 이용하여 신뢰성 높은 예측결과를 홍수예경보 및 댐 운영에 있어 활용함으로써 홍수재해로부터 안전성을 확보하고 물관리의 효율화를 달성할 수 있을 것으로 판단된다.

  • PDF

A Feature-Oriented Requirement Tracing Method with Value Analysis (가치분석을 통한 휘처 기반의 요구사항 추적 기법)

  • Ahn, Sang-Im;Chong, Ki-Won
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.1-15
    • /
    • 2007
  • Traceability links are logical links between individual requirements and other system elements such as architecture descriptions, source code, and test cases. These are useful for requirements change impact analysis, requirements conflict analysis, and requirements consistency checking. However, establishing and maintaining traceability links places a big burden since complex systems have especially yield an enormous number of various artifacts. We propose a feature-oriented requirements tracing method to manage requirements with cost benefit analysis, including value consideration and intermediate catalysis using features. Our approach offers two contributions to the study of requirements tracing: (1)We introduce feature modeling as intermediate catalysis to generate traceability links between user requirements and implementation artifacts. (2)We provide value consideration with cost and efforts to identify traceability links based on prioritized requirements, thus assigning a granularity level to each feature. In this paper, we especially present the results of a case study which is carried out in Apartment Ubiquitous Platform to integrate and connect home services in an apartment complex in details.

  • PDF

A Study on Lost Child Prevention Service Using LBS and Map Information (LBS와 지도 정보를 이용한 미아방지 서비스에 관한 연구)

  • Kim, Seung-Jae;Jung, Chai-Yeoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.181-186
    • /
    • 2017
  • Child crimes such as child abduction and lost children(MIA) have long been pointed out as social problems. However, there are few ways to solve these problems. According to MIA statistics, about 3,000 babies are lost each year. This paper presents a study on prevention of lost children ratio using mobile LBS in order to reduce the incidence of lost children ratio in dense space. First, we input the personal information of the child and the contact information of the parent. Second, we use the Google Maps API to get the location (parent's location, child's location) information. Third, the personal information of the child and the parent is indicated in the obtained location information. In future research, based on SNS, we will carry out research on sending child location information and parent location information via SMS. It is expected that the prevention system of lost child using LBS and SNS will make a great contribution to reduce the lost children ratio in the ubiquitous society.

An Integrated Design of Middleware and EPCIS for RFID and Sensor Data (RFID와 센서 데이터 처리를 위한 미들웨어와 EPCIS 통합 설계)

  • Hyun, Seung-Ryul;Lee, Sang-Jeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.193-202
    • /
    • 2012
  • RFID tag awareness information and sensor data continuously change, and are categorized with the position. They are able to similar data in the side, called massive data to change in time. If two data are managed together, a convergence process of object awareness along change of environment is possible. If RFID middleware and EPCIS repository realized the integrated system, it is usable with the functions of middleware and repository at the same time. The real-time awareness information retrieval is possible without process, getting information from another middleware. In this paper, it is able to continuously read information from RFID reader and sensor equipment and store to database in order to make general object awareness and an object retrieval dependent on an environmental information change possible by real time. ALE-compliant middleware and EPCIS repository proposing for standards at EPCglobal is designed and implemented to be able to deal with RFID and sensor data to bases on the collected data.

A Study on Media Security in Ubiquitous Network System (유비쿼터스 네트워크 시스템에서의 미디어 보안에 관한 연구)

  • Ju, Min-Seong;Ahn, Seong-Soo;Woo, Young-Hwan;Kim, Yong-Tae;Kim, Tai-Hoon;Park, Gil-Cheol;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.29-34
    • /
    • 2007
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a technique which supports copyright protection to track redistributers of electronic information using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before re-contributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction.

  • PDF

Concept Design of Marine-RFID (해상 RFID 개념 설계)

  • Ku, Ja-Young;Yim, Jeong-Bin;Jeong, Jung-Sik;Nam, Taek-Keun;Lee, Jae-Eung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.29 no.1
    • /
    • pp.153-161
    • /
    • 2005
  • Recently, The government of Korea declared to develop RFID(Radio Frequency IDentification) as one of key strategic technology to perform U-Government using Ubiquitous technology. But, most of the related technologies for RFID are mainly focused on the inlaned application excepting marine applications. The last target of this study is to implement new Marine RFID(M-RFID) that can cover all of EEZ areas as large five times as inland volume. In this paper, as a basic study for the M-RFID, we carried out an establishing the concept design of M-RFID, developing the construction method of M-RFID and, extending the idea of M-RFID. As studying results, it is known that the M-RFID can be use in many practical areas such as the protection of EEZ area and aqua culture, the safety of fisher man, the disaster control for inlander and, fisheries ligistics with real-time.

  • PDF