• Title/Summary/Keyword: 유비쿼터스 컴퓨팅 기술

Search Result 770, Processing Time 0.032 seconds

XML Fragmentation for Resource-Efficient Query Processing over XML Fragment Stream (자원 효율적인 XML 조각 스트림 질의 처리를 위한 XML 분할)

  • Kim, Jin;Kang, Hyun-Chul
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.27-42
    • /
    • 2009
  • In realizing ubiquitous computing, techniques of efficiently using the limited resource at client such as mobile devices are required. With a mobile device with limited amount of memory, the techniques of XML stream query processing should be employed to process queries over a large volume of XML data. Recently, several techniques were proposed which fragment XML documents into XML fragments and stream them for query processing at client. During query processing, there could be great difference in resource usage (query processing time and memory usage) depending on how the source XML documents are fragmented. As such, an efficient fragmentation technique is needed. In this paper, we propose an XML fragmentation technique whereby resource efficiency in query processing at client could be enhanced. For this, we first present a cost model of query processing over XML fragment stream. Then, we propose an algorithm for resource-efficient XML fragmentation. Through implementation and experiments, we showed that our fragmentation technique outperformed previous techniques both in processing time and memory usage. The contribution of this paper is to have made the techniques of query processing over XML fragment stream more feasible for practical use.

The Design and Implementation of User Authorization Module based on Zigbee for Automotive Smart-key System (차량용 스마트키 시스템을 위한 지그비 기반의 사용자 인증 모듈 설계 및 구현)

  • Kim, Kyeong-Seob;Lee, Yun-Seob;Yun, Hyun-Min;Choi, Sang-Bang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2442-2450
    • /
    • 2010
  • Using sensor devices applied to various objects will be needed wireless network that it is easy to install in them. Tiny devices configured to processor that bas comparatively low computing ability are inappropriate to use devices that are wireless LAN, etc. In result, network devices needed to not only have simple communication protocol, but have Plug and Play function that it works as soon as it connects without installing any device driver. it also will industrially have both low power and low cost because of mobility of it. From IEEE 802.11 standard, WPAN(Wireless Personal Area Network) included in LAN is being developed by WPAN WG(Working Group) on area with low power consumption and low complexity. In addition to, it is standardizing MAC and PRY of the standard that is expected to wirelessly communicate within 10m. WPAN will be used generally in the more near future because of both low power and low cost of Zigbee. In this paper we designed zigbee based user authentication module for a automotive smart-key system.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

UbiCore : An Effective XML-based RFID Middleware System (UbiCore : XML 기반 RFID 미들웨어 시스템)

  • Lee, Hun-Soon;Choi, Hyun-Hwa;Kim, Byoung-Seob;Lee, Myung-Cheol;Park, Jae-Hong;Lee, Mi-Young;Kim, Myung-Joon;Jin, Sung-Il
    • Journal of KIISE:Databases
    • /
    • v.33 no.6
    • /
    • pp.578-589
    • /
    • 2006
  • Owing to the proliferation of Radio Frequency Identification (RFID) technologies which is being watched as a core technology of ubiquitous computing, applications which offer convenience to people using RFID technologies are more and more increased. To easily develop these applications, a middleware system which acts as a bridge between RFID hardware and application is essential. In this paper, we propose a novel XML-based RFID middleware system called UbiCore (Ubiquitous Core). UbiCore has following features: First, UbiCore employs its own query language called XQueryStream (XQuery for Stream Data) which is originated from XQuery. Second, UbiCore has the preprocessing phase called pre-filtering prior to query evaluation and reuses the intermediate result of previous evaluation to speed up the processing of RFID tag data stream. Third, UbiCore supports query on both continuously generated stream data and archived historical data. And last, UbiCore offers a distinct markup language called Context-driven Service Markup Language (CSML) to easily specify the linking information between context and service.

User-centric Context Model for Context-aware Application (맥락 인식 애플리케이션을 위한 사용자 중심의 맥락 모델)

  • Hong, Dong-Pyo;Woo, Woon-Tack
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.810-813
    • /
    • 2007
  • 본 논문에서는 맥락 인식 (context-aware) 애플리케이션 개발에 있어서 사용자의 맥락 정보를 보다 효과적으로 처리할 수 있는 사용자 중심의 맥락 모델을 제안한다. 유비쿼터스 컴퓨팅 개념의 확산과 함께 맥락 인식 애플리케이션들에 관한 많은 연구가 진행되고 있다. 하지만, 맥락에 대한 정의는 여전히 모호하며, 애플리케이션들 마다 서로 다른 형태의 맥락을 활용하고 있기 때문에, 맥락에 대한 보다 구체적인 정의와 다양한 애플리케이션에 활용 가능한 형태의 맥락 모델이 필요하다. 제안된 사용자 중심의 맥락 모델에서는 사용자가 애플리케이션과 상호작용할 때 사용자의 직접적인 명령을 제외한 사용자와 관련된 정보를 맥락으로 정의한다. 또한, 제안된 사용자 중심의 맥락은 5W1H 형태로 구조화한 맥락요소 (ContextElement), 맥락 요소들을 편리하게 처리할 수 있는 연산자들을 포함하는 맥락 (Context), 그리고 단편적인 맥락 정보뿐만 아니라 기존의 맥락 정보까지도 활용할 수 있는 맥락메모리 (ContextMemory)로 구성된다. 특히, 다양한 센서들로부터 획득된 정보를 맥락 모델의 인터페이스를 통해서 맥락 인식 애플리케이션에서 활용할 수 있기 때문에, 서로 다른 맥락 인식 애플리케이션들을 개발함에 있어서도 동일한 맥락 모델을 사용할 수 있는 장점이 있다. 제안된 맥락 모델의 유용함을 보이기 위해서, 센서로부터 획득된 맥락 정보를 처리하는데 소요되는 시간을 측정하는 실험을 하였다. 따라서 제안된 사용자 중심의 맥락 모델은 사용자와 맥락 인식 애플리케이션간 자연스러운 상호작용을 지원할 것으로 기대된다.) kcal/mol의 생성활성화 에너지 감을 나타내었고, TGA로부터의 분해활성화 에너지는 각각 31.94, 30.84, 24.16 kcal/mol의 값을 나타내었다.로 감소되었다(35.2% vs. 77.4%; p<0.01). 실험 2에서 다양한 정자 농도에 의한 정자 침투율과 정상 수정률을 바탕으로 판단했을 때 $4.6{\times}10^6/ml$의 정자 농도가 다른 정자 농도에 비해 난구 세포부착 난자의 체외 수정에 적합한 것으로 나타났다. 체외 수정과정에서 난구 세포 부착된 상태로 수정된 난자는 나화 난자에 비해 유의적으로(p<0.05) 높은 분할률(48.8% vs. 58.9%), 배반포 형성률(11.0% vs. 22.8%)과 배반포 세포수$(22{\pm}2\;vs.\;29{\pm}2)$를 나타내었다. 본 연구의 결과로부터 돼지의 체외 수정과정에서 난구 세포의 존재는 정자 침투를 저해하지만 분할률, 배반포 형성률 및 배반포의 세포수를 증가시키는 것으로 사료된다.수의 유출입 지점에 온도센서를 부착하여 냉각수의 온도를 측정하고 냉각수의 공급량과 대기의 온도 등을 측정하여 대사열의 발생을 추정할 수 있었다. 동시에 이를 이용하여 유가배양시 기질을 공급하는 공정변수로 사용하였다 [8]. 생물학적인 폐수처리장치인 활성 슬러지법에서 미생물의 활성을 측정하는 방법은 아직 그다지 개발되어있지 않다. 본 연구에서는 슬러지의 주 구성원이 미생물인 점에 착안하여 침전시 슬러지층과 상등액의 온도차를 측정하여 대사열량의 발생량을 측정하고 슬러지의 활성을 측정할 수 있는 방법을 개발하였다.enin과

Implementation of a Sensor Node with Convolutional Channel Coding Capability (컨벌루션 채널코딩 기능의 센서노드 구현)

  • Jin, Young Suk;Moon, Byung Hyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.13-18
    • /
    • 2014
  • Sensor nodes are used for monitoring and collecting the environmental data via wireless sensor network. The wireless sensor network with various sensor nodes draws attention as a key technology in ubiquitous computing. Sensor nodes has very small memory capacity and limited power resource. Thus, it is essential to have energy efficient strategy for the sensor nodes. Since the sensor nodes are operating on the same frequency bands with ISM frequency bands, the interference by the devices operating on the ISM band degrades the quality of communication integrity. In this paper, the convolutional code is proposed instead of ARQ for the error control for the sensor network. The proposed convolutional code was implemented and the BER performance is measured. For the fixed transmitting powers of -19.2 dBm and -25dBm, the BER with various communication distances are measured. The packet loss rate and the retransmission rate are calculated from the measured BER. It is shown that the porposed method obtained about 9~12% and 12-19% reduction in retransmission rate for -19.2 dBm and -25 dBm respectively.

Implementing Finite State Machine Based Operating System for Wireless Sensor Nodes (무선 센서 노드를 위한 FSM 기반 운영체제의 구현)

  • Ha, Seung-Hyun;Kim, Tae-Hyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.85-97
    • /
    • 2011
  • Wireless sensor networks have emerged as one of the key enabling technologies for ubiquitous computing since wireless intelligent sensor nodes connected by short range communication media serve as a smart intermediary between physical objects and people in ubiquitous computing environment. We recognize the wireless sensor network as a massively distributed and deeply embedded system. Such systems require concurrent and asynchronous event handling as a distributed system and resource-consciousness as an embedded system. Since the operating environment and architecture of wireless sensor networks, with the seemingly conflicting requirements, poses unique design challenges and constraints to developers, we propose a very new operating system for sensor nodes based on finite state machine. In this paper, we clarify the design goals reflected from the characteristics of sensor networks, and then present the heart of the design and implementation of a compact and efficient state-driven operating system, SenOS. We describe how SenOS can operate in an extremely resource constrained sensor node while providing the required reactivity and dynamic reconfigurability with low update cost. We also compare our experimental results after executing some benchmark programs on SenOS with those on TinyOS.

Clustering Analysis by Customer Feature based on SOM for Predicting Purchase Pattern in Recommendation System (추천시스템에서 구매 패턴 예측을 위한 SOM기반 고객 특성에 의한 군집 분석)

  • Cho, Young Sung;Moon, Song Chul;Ryu, Keun Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.193-200
    • /
    • 2014
  • Due to the advent of ubiquitous computing environment, it is becoming a part of our common life style. And tremendous information is cumulated rapidly. In these trends, it is becoming a very important technology to find out exact information in a large data to present users. Collaborative filtering is the method based on other users' preferences, can not only reflect exact attributes of user but also still has the problem of sparsity and scalability, though it has been practically used to improve these defects. In this paper, we propose clustering method by user's features based on SOM for predicting purchase pattern in u-Commerce. it is necessary for us to make the cluster with similarity by user's features to be able to reflect attributes of the customer information in order to find the items with same propensity in the cluster rapidly. The proposed makes the task of clustering to apply the variable of featured vector for the user's information and RFM factors based on purchase history data. To verify improved performance of proposing system, we make experiments with dataset collected in a cosmetic internet shopping mall.

An Exploratory Study of Purchasing Decision Making and Adoption on the RFID Purchasing Customer (RFID 구매고객의 구매 의사결정과 수용에 대한 탐색적 연구)

  • Seo, Pil-Su;Jang, Jang-Yi;Shim, Kyeng-Su
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.3 no.4
    • /
    • pp.89-116
    • /
    • 2008
  • RFID (Radio Frequency Identification) is regarded as a core technology of ubiquitous computing. Although it has some technical limitations such as technological standardization of RFID tags as well as economical limitations, many companies around the world have already accepted RFID to improve their management efficiency. In this regard, this study is to meet with results that the adoption of RFID technology willbring opportunities that companies' operational process are improved and customer satisfaction is highly strengthened. This research focuses on providing more understanding for building RFID marketing strategy to suppliers who want to sell their RFID products to customers through analyzing purchasing process. The findings are as follows; First, the study shows that buying center members usually take product reliability and precision of technical specification in the case of new-task buying situation while they put their first purchasing priority on prices in the straight rebuy. Second, the finding presents that in new-task buying situation and the straight rebuy purchasing personnel get information about new products through product performance test, organizational engineers, opinions from other companies' purchasing personnel, and checking out samples. Third, this research demonstrates when it comes to purchasing risk in their first purchasing, the persons who are in charge of material purchasing are inclined to be aware of the risk most in technical problems, followed by financial problems and time delay problems in order. And in addition to those risks are mentioned above, once-again-purchasers take the risk like an opportunity loss for better products into consideration. Fourth, the study shows that the role of concerning departments makes no difference in each purchasing stage. Accordingly marketers need to beef up the differentiated strategy to persuade their customers Fifth, the findings of this study demonstrate that purchasing decision making is much influenced by the final users. So suppliers are supposed to perform the most active marketing strategy at the first stage of purchasing through various resources. Finally, the study presents that the suppliers who will have had close relationships with their customers need to give consistent information to them so that their customers can have lower motive in purchasing products from competitors.

  • PDF

A Study on Purchasing Decision Making and Adoption : Focused on the RFID Purchasing Customer (구매의사 결정과 수용에 대한 연구 : RFID 구매고객 중심으로)

  • Seo, Pil-Su;Jang, Jang-Yi;Shim, Kyeng-Su
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.257-282
    • /
    • 2008
  • RFID (Radio Frequency Identification) is regarded as a core technology of ubiquitous computing. Although it has some technical limitations such as technological standardization of RFID tags as well as economical limitations, many companies around the world have already accepted RFID to improve their management efficiency. In this regard, this study is to meet with results that the adoption of RFID technology willbring opportunities that companies' operational process are improved and customer satisfaction is highly strengthened. This research focuses on providing more understanding for building RFID marketing strategy to suppliers who want to sell their RFID products to customers through analyzing purchasing process. The findings are as follows; First, the study shows that buying center members usually take product reliability and precision of technical specification in the case of new-task buying situation while they put their first purchasing priority on prices in the straight rebuy. Second, the finding presents that in new-task buying situation and the straight rebuy purchasing personnel get information about new products through product performance test, organizational engineers, opinions from other companies' purchasing personnel, and checking out samples. Third, this research demonstrates when it comes to purchasing risk in their first purchasing, the persons who are in charge of material purchasing are inclined to be aware of the risk most in technical problems, followed by financial problems and time delay problems in order. And in addition to those risks are mentioned above, once-again-purchasers take the risk like an opportunity loss for better products into consideration. Fourth, the study shows that the role of concerning departments makes no difference in each purchasing stage. Accordingly marketers need to beef up the differentiated strategy to persuade their customers. Fifth, the findings of this study demonstrate that purchasing decision making is much influenced by the final users. So suppliers are supposed to perform the most active marketing strategy at the first stage of purchasing through various resources. Finally, the study presents that the suppliers who will have had close relationships with their customers need to give consistent information to them so that their customers can have lower motive in purchasing products from competitors.

  • PDF