• Title/Summary/Keyword: 유비쿼터스 정보환경

Search Result 2,052, Processing Time 0.031 seconds

Configuration of clustering and routing algorithms for energy efficiency by wireless sensor network in ship (선박 내 무선 센서 네트워크에서 에너지 효율을 위한 클러스터링 및 라우팅 알고리즘의 구성)

  • Kim, Mi-jin;Yu, Yun-Sik;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.435-438
    • /
    • 2012
  • Today, In all fields, As combination of ubiquitous computing-based technologies between electronic space and physical space, has been active trend research about wireless integration sensor network between sensors and wireless technology. Also, but in ship is underway research about Ship Area Network(SAN) of intelligent ship to integrate wireless technology, ship is required SAN-bridge technology of a variety of wired, wireless network integration and heterogeneous sensor and interoperability of the controller and SAN configuration management technology of remote control. Ship keep safe of all the surrounding environment including crew besides structural safety and freight management monitoring. In this paper, for monitoring design such as on climate change detection and temperature, pressure about various structures, there identify technology trends for routing and data aggregation to use energy efficiency in wireless sensor network. And to analyze self-organizing clustering method, study For wireless sensor network configuration in ship.

  • PDF

A Recommendation System using Context-based Collaborative Filtering (컨텍스트 기반 협력적 필터링을 이용한 추천 시스템)

  • Lee, Se-Il;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.2
    • /
    • pp.224-229
    • /
    • 2011
  • Collaborative filtering is used the most for recommendation systems because it can recommend potential items. However, when there are not many items to be evaluated, collaborative filtering can be subject to the influence of similarity or preference depending on the situation or the whim of the evaluator. In addition, by recommending items only on the basis of similarity with items that have been evaluated previously without relation to the present situation of the user, the recommendations become less accurate. In this paper, in order to solve the above problems, before starting the collaborative filtering procedure, we calculated similarity not by comparing all the values evaluated by users but rather by comparing only those users who were above the average in order to improve the accuracy of the recommendations. In addition, in the ceaselessly changing ubiquitous computing environment, it is not proper to recommend service information based only on the items evaluated by users. Therefore, we used methods of calculating similarity wherein the users' real time context information was used and a high weight was assigned to similar users. Such methods improved the recommendation accuracy by 16.2% on average.

Implementation for Baby Care System Using ARM11 (ARM11 기반의 Baby Care System Platform 구현)

  • Shin, Hyo-Seob;Lee, Kwang-Hyun;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.719-724
    • /
    • 2011
  • Most recent birth rate at home raising children, only one has come out well. Accordingly, children born to parents is to have a strong interest, and healthcare (Healthcare) sector, while emerging as a new growth industry (Baby Care) Baby Care also increased the interest. Baby Care products until now the food, toiletries and clothing, etc. Although it advances the development of ubiquitous computing environment with the development of the healthcare industry, Baby Care Electronics products have been developed. Europe and the U.S. infant from another room deungeseoneun feeder. At this time SIDS infants to prevent this phenomenon often takes place in order to measure the status of children and away from parents to children, also can check the status of children was used to implement the Platform. In this paper, using the radio frequency real-time observation of data storage without the parents were determined only by the speed of the ARM11-based systems using the S3C6410 CPU and wireless WI-FI (IEEE8.2.11) technology to prevent sudden infant death using Platform for the implementation study was conducted.

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

RFID Authentication System with ID Synchronization (ID 동기화를 가지는 RFID 인증 시스템)

  • Park Jang-Su;Lee Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.615-623
    • /
    • 2006
  • It has been estimated that 'RFID' technology would be playing an important role in the incoming ubiquitous environment. For this reason, many studies on 'RFID' have been conducted and its application has been on the increase in various fields such as finance, medicine, transportation and culture as well as in logistics distribution. However, the communication between Tag and Reader in RFID system has been conducted by wireless communication of radio frequency so that the information on identification could be eavesdropped by the third party maliciously. Such eavesdropped information could be also used as basic information in attacking others; in this regard, it could impair the privacy of its users and the users have avoided using 'RFID.' To solve theses problems, many studies are being performed to different output of tags by renewing ID. However, protocols have been devised without considering an ID Synchronization in the ID renewal process between database and tag in the existing studies. In this regard, this study has suggested a RFID Authentication Protocol while considering the ID Synchronization.

  • PDF

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

Tag Identification Time Reduction Scheme of Back-End Server for Secure RFID Privacy Protection Protocol (안전한 RFID 프라이버시 보호 프로토콜을 위한 백엔드 서버의 태그 판별 시간 절감 기법)

  • Yeo Sang-Soo;Kim Soon-Seok;Kim Sung-Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.13-26
    • /
    • 2006
  • RFID technology is evaluated as one of core technologies for ubiquitous environment, because of its various characteristics which barcode systems don't have. However, RFID systems have consumer's privacy infringement problems, such like information leakage and location tracing. We need RFID privacy protection protocols, that satisfy three essential security requirements; confidentiality, indistinguishability and forward security, in order to protect consumer's privacy perfectly. The most secure protocol, that satisfies all of the three essential security requirements, among existing protocols, is the hash-chain based protocol that Ohkubo proposed. Unfortunately this protocol has a big disadvantage that it takes very long time to identify a tag in the back-end server. In this paper, we propose a scheme to keep security just as it is and to reduce computation time for identifying a tag in back-end server. The proposed scheme shows the results that the identification time in back-end server is reduced considerably compared to the original scheme of Ohkubo protocol.

Classification of the Architectures of Web based Expert Systems (웹기반 전문가시스템의 구조 분류)

  • Lim, Gyoo-Gun
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.4
    • /
    • pp.1-16
    • /
    • 2007
  • According to the expansion of the Internet use and the utilization of e-business, there are an increasing number of studies of intelligent-based systems for the preparation of ubiquitous environment. In addition, expert systems have been developed from Stand Alone types to web-based Client-Server types, which are now used in various Internet environments. In this paper, we investigated the environment of development for web-based expert systems, we classified and analyzed them according to type, and suggested general typical models of web-based expert systems and their architectures. We classified the web-based expert systems with two perspectives. First, we classified them into the Server Oriented model and Client Oriented model based on the Load Balancing aspect between client and server. Second, based on the degree of knowledge and inference-sharing, we classified them into the No Sharing model, Server Sharing model, Client Sharing model and Client-Server Sharing model. By combining them we derived eight types of web-based expert systems. We also analyzed the location problems of Knowledge Bases, Fact Bases, and Inference Engines on the Internet, and analyzed the pros & cons, the technologies, the considerations, and the service types for each model. With the framework proposed from this study, we can develop more efficient expert systems in future environments.

  • PDF

A Study on the Characteristics of Urban Public Transportation Information Services Use (도시 대중교통정보 이용 행동 특성 연구)

  • Joh, Chang-Hyeon;Lee, Back-Jin;Bin, Mi-Young
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.12 no.1
    • /
    • pp.56-66
    • /
    • 2009
  • As the amount of information is rapidly growing, and the ubiquitous urban environments are emerging, the question which information type to provide and which communication media to support is a major challenge for commercial and public travel-information service providers. The current research reports the first findings of analyses of recent data, collected in metropolitan Seoul, about the acquisition of travel information and the communication media used. The study is based on the assumption that information acquisition and choice of communication medium is strongly context-driven. The study applies CHAID analysis to find homogeneous segments in information acquisition and use of communication media. Findings indicate that transport mode and activity are important determinant of information acquisition and choice of media. The type of travel information acquired co-varies strongly with transport mode and activity. In addition, we found evidence of time of day effects. Similarly, the choice of communication medium depends on the type of travel information searched for, transport mode and activity. The results suggest important implications of managerial and policy measures, in particular the dynamic, contextual market segmentation.

  • PDF

An Intelligent Service Middleware Using Ontology and Rule in Ubiquitous Sensor Network Environments (유비쿼터스 센서 네트워크 환경에서 온톨로지와 규칙을 이용한 지능형 서비스 미들웨어)

  • Park, Jong-Hyun;Kang, Ji-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.10
    • /
    • pp.147-156
    • /
    • 2010
  • There are some of the studies on sensor middleware. However the standard middleware has not yet been defined. Especially, this paper focuses on the processing an intelligent service of the main functions of middleware. Several applications in the sensor network environment support not only monitoring services, but also sensor-based context-awareness and intelligent services based on sensors. However, the previous studies about USN middleware only mentioned the need for intelligent service and did not discuss the architecture and method for supporting the intelligent service in detail. Therefore this paper designs a USN middleware for providing intelligent services and proposes the method for processing the services. For this purpose, this paper proposes the Sensor-Service ontology to define the concept of services and sensors for USN applications and the relationship between them. The Sensor-Service ontology is used to infer high-level information from low-level information. To apply a variety of environmental context to intelligent services, the paper uses the rule-based reasoning. This paper implements the proposed intelligent service middleware as a prototype and then shows that the middleware can be used for a variety of USN applications through the performance evaluation.