• Title/Summary/Keyword: 유비쿼터스시스템

Search Result 2,312, Processing Time 0.03 seconds

Finding Isolated Zones through Connectivity Relationship Analysis in Indoor Space (실내공간의 연결성 분석을 통한 고립지역 탐색)

  • Lee, Seul-Ji;Lee, Ji-Yeong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.3
    • /
    • pp.229-240
    • /
    • 2012
  • In Korea, u-City has been constructed as IT-based new city with introduction of the ubiquitous concept. However, most currently provided u-services are just monitoring services based on the USN(Ubiquitous Sensor Network) technology, so spatial analysis is insufficient. Especially, buildings have been rapidly constructed and expanded in multi-levels, and people spend a lot of time in indoor space, so indoor spatial analysis is necessary. Therefore, connectivity relationship in indoor space is analyzed using the topological data model. Topological relationships could be redefined due to the dynamic changes of environment in indoor space, and changes could have an effect on analysis results. In this paper, the algorithms of finding isolated zones is developed by analyzing connectivity relationship between space objects in built-environments after changes of environment in indoor space due to specific situation such as fire. And the system that visualizes isolated zones as well as three-dimensional data structure of indoor space is developed to get the analysis result by using the analysis algorithms.

Using a Spatial Databases for Indoor Location Based Services (실내위치기반서비스를 위한 공간데이터베이스 활용기법)

  • Cho, Yong-Joo;Kim, Hye-Young;Jun, Chul-Min
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.1
    • /
    • pp.157-166
    • /
    • 2009
  • There is a growing interest in ubiquitous-related research and applications. Among them, GPS-based LBS have been developed and used actively. Recently, with the increase of large size buildings and disastrous events, indoor spaces are getting attention and related research activities are being carried out. Core technologies regarding indoor applications may include 3D indoor data modeling and localization sensor techniques that can integrate with indoor data. However, these technologies have not been standardized and established enough to be applied to indoor implementation. Thus, in this paper, we propose a method to build a relatively simple 3D indoor data modeling technique that can be applied to indoor location based applications. The proposed model takes the form of 2D-based multi-layered structure and has capability for 2D and 3D visualization. We tested three prototype applications using the proposed model; CA(cellular automata)-based 3D evacuation simulation, network-based routing, and indoor moving objects tracking using a stereo camera.

  • PDF

Comparing the Survey Package of Land Administration Domain Model with the Cadastral Information Model in Korea (ISO TC 211 Land Administration Domain Model의 SurveyPackage와 국내지적정보모델의 비교 연구)

  • Kim, Sang-Min;Han, Soo-Hee;Heo, Joon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.4
    • /
    • pp.113-119
    • /
    • 2009
  • In Ubiquitous Information society, real shape of spatial information and accurate position information are required. Spatial information standardization is needed to service for the people. International standard was defined to ensure compatibilities of various standards, technologies, and terminologies and to promote mutual trade certain criteria and standard forms were established through international agreement. International standard is made by International Organization for Standardization, and International Standard Organization Technical Committee 211 manages the geographic information field. ISO TC 211 is working on LADM (Land Administration Domain Model) which defines administration law and spatial surveying component related to land and efficiently manages data and land systems of the countries. This study introduced processing of standardization of a surveying package which is related with LADM and comparing it with Korea Cadastral information system.

  • PDF

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

A Study on N-IDS Detection and Packet Analysis regarding a DoS attack (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.217-224
    • /
    • 2008
  • EThis paper is study regarding banking institution and DoS attack regarding government organization which occurred in 2008. We used a tool aggressive actual DoS You install the N-IDS which used Snort in networks in order to detect a DoS attack. Storages of Winpcap and a packet to detect a packet and MySQL, HSC, to analyze. We install NET Framework etc. E-Watch etc. analyzes Packet regarding a DoS attack of a hacker and TCP, UDP etc. information, Port, MAC and IP information etc. through packet analysis tools. There is a meaning you analyze data regarding the cyber DoS, DDoS attack that is dysfunction of Ubiquitous Information Society, and it generates forensics data regarding an invader and back-tracking analysis data, and to ensure safe Internet information system through this paper study.

  • PDF

A Study on The Enactment of Regulations for Construction of u-City Operation Center (도시통합운영센터 구현의 법.제도 정비를 위한 기반연구)

  • Kang, Seung-Lim;You, Jin-Soo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.05a
    • /
    • pp.121-121
    • /
    • 2009
  • u-City는 첨단 정보통신 인프라를 활용하여 유비쿼터스 서비스를 도시공간에 제공함으로써 도시민의 생활편의 증대와 삶의 질을 높이고 체계적인 도시관리 및 도시의 제반 기능의 혁신을 통해 도시 경쟁력 향상을 목표로 한다. 최근 u-City의 핵심부문으로, u-City의 성공적 구축을 위해 관심이 집중되고 있는 도시통합운영센터는 기존 도시에서는 시도해 보지 않았던 새로운 개념으로, U-City법에서 향후 U-서비스의 관리 운영에 필수적인 U-City기반시설로 규정되어 있기는 하지만 도시통합운영센터에 대한 명확한 기준이 없다. 또한 구축 관리 운영을 위해 필요한 법 제도적 기반환경이 미흡한 실정으로, 법적 근거없이 개별법에 의한 사업추진으로 실제로 도시통합운영센터를 구현하는데 많은 어려움을 겪고 있다. 이와 같이 u-City와 도시통합운영센터는 기존 도시에서는 시도해 보지 않았던 새로운 개념이기 때문에 현행 법에 맞지 않는 경우 발생하기 때문에 이에 적합한 새로운 법/제도가 필요하다. 본 연구는 기존 관련법과의 연계를 통한 도시통합운영센터 구축 운영에 대한 법 제도적 기반환경 마련을 위한 연구로서, u-City 관련 법/제도 중 도시통합운영센터 구축 및 운영 관련 사항에 대한 검토를 통해, 법/제도적 측면에서 도시통합운영센터 구현에 필요한 제반사항을 검토하였다. 구축측면 (계획/건설)에서 시스템 공동활용 및 연계 구축 방안 마련을 위해 도시통합운영센터 구축주체, 재원조달방법을 검토하였으며, 운영측면에서 도시통합운영센터 운영 방안을 마련하기 위해 도시통합운영센터의 공공기능 수행 및 운영에 대한 사항을 분석하였다. 도시통합운영센터 구축 운영에 대한 법 제도 정비를 위한 기반연구를 통해 도시통합운영센터의 성공적인 구축 및 운영을 도모하고자 한다.

  • PDF

Experimental Performance Comparison for Prediction of Red Tide Phenomenon (적조현상의 실험적 예측성능 비교)

  • Heo, Won-Ji;Won, Jae-Kang;Jung, Yong-Gyu
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.1-6
    • /
    • 2012
  • In recent years global climate change of hurricanes and torrential rains are going to significantly, that increase damages to property and human life. The disasters have been several claimed in every field. In future, climate changes blowing are keen to strike released to the world like in several movies. Reducing the damage of long-term weather phenomena are emerging with predicting changes in weather. In this study, it is shown how to predict the red tide phenomenon with multiple linear regression analysis and artificial neural network techniques. The red tide phenomenon causing risk could be reduced by filtering sensor data which are transmitted and forecasted in real time. It could be ubiquitous driven custom marine information service system, and forecasting techniques to use throughout the meteorological disasters to minimize damage.

Method to Reduce the Time when Identifying RFID Tag by using Computational Grid (계산 그리드를 이용한 대량의 RFID 태그 판별 시간 단축 방법)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.547-554
    • /
    • 2010
  • RFID is core technology to lead ubiquitous computing, and attract the notice of the world. It also improves social transparency, creates employment, and invigorates the allied industries. However, The technical characteristic with RFID has some problems with security and privacy. The commercialization of RFID is delayed due to these problems. This paper introduces the technical method to find solutions about an invasion of privacy to be due to introduce RFID system. First, this method applies Hash-Chain proposed by M. Ohkubo and some other researchers. The more tags increase, the more it demands lots of computation time. We divide SPs equally to solve these problems. And then, We'll suggest solutions to shorten the identification time of tag by implementing SPs with multi nodes of Grid environment at the same time. This makes it possible to keep the privacy protection of RFID tag, and process RFID tag in real time at the same time.

Implementation for Baby Care System Using ARM11 (ARM11 기반의 Baby Care System Platform 구현)

  • Shin, Hyo-Seob;Lee, Kwang-Hyun;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.719-724
    • /
    • 2011
  • Most recent birth rate at home raising children, only one has come out well. Accordingly, children born to parents is to have a strong interest, and healthcare (Healthcare) sector, while emerging as a new growth industry (Baby Care) Baby Care also increased the interest. Baby Care products until now the food, toiletries and clothing, etc. Although it advances the development of ubiquitous computing environment with the development of the healthcare industry, Baby Care Electronics products have been developed. Europe and the U.S. infant from another room deungeseoneun feeder. At this time SIDS infants to prevent this phenomenon often takes place in order to measure the status of children and away from parents to children, also can check the status of children was used to implement the Platform. In this paper, using the radio frequency real-time observation of data storage without the parents were determined only by the speed of the ARM11-based systems using the S3C6410 CPU and wireless WI-FI (IEEE8.2.11) technology to prevent sudden infant death using Platform for the implementation study was conducted.