• Title/Summary/Keyword: 유비쿼터스 홈

Search Result 291, Processing Time 0.025 seconds

The implementation of OSCi bundle for digital convergence based on middleware of UPnP (UPnP 미들웨어 기반 디지털 컨버전스를 위한 OSGi 번들 개발)

  • Jun, Jaeh-Yan;Kang, Sung-In;Kim, Gwan-Hyung;Choi, Sung-Wook;Kwon, Oh-Hyun;Oh, Am-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.105-108
    • /
    • 2007
  • In this paper, we have developed a UPnP-OSGi Bundle for digital convergence based on UPnP middleware. UPnP-OSGi bundle is demanded sustaining realtime monitering system based on UPnP middleware that is possible multimedia ability of a piece with a multiplicity of service and joint user data , service lifecycle , management division service for home network system offered convergence service. This bundle is possible a multiplicity of control and monitering service segmentation so develop a multiplicity of service is easy. and provide zero-configuration system.

  • PDF

Indoor Positioning System Using Fingerprinting Technique (Fingerprinting기법을 이용한 실내 위치측위시스템)

  • Nam, Doo-Hee;Han, Ho-Yeon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.1
    • /
    • pp.1-9
    • /
    • 2008
  • According to the ubiquitous trend, the needs for the context based application service have been increased. These services take on Location Based Service which is based on the current location of users. It is widely used that localization techniques use GPS or ground wave and more efficient and accurate methods have been studied. Recently, not only services which targeted outdoor but also services which targeted indoor, for example home services and facility guidance of the building come into the spotlight. In case of the outdoor positioning area, COTH (Commercial Off-The-Shelf) has been released and used but relatively it doesn't produce an outcome in the indoor positioning area. Therefore, this paper Proposes the indoor positioning technique using wireless LAN (Local Area Network) which is one of the widely used wireless communication technique. It analyzes the typical WLAN location positioning methodology has been studied and their advantage and disadvantage also suggests how to design and implement the specific WLAN positioning system. In addition, it suggests new methods that progress the accuracy of the existing systems and improve the efficient computation.

  • PDF

IEEE 802.11a Interference Suppression Method Using by SVD Algorithm in LR-UWB Systems (LR-UWB 시스템에서 특이값 분해를 이용한 IEEE 802.11a 간섭억압기법)

  • Kim, Dong-Hee;Kim, Tae-Hun;Jang, Hong-Mo;Park, Ho-Hwan;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1A
    • /
    • pp.74-84
    • /
    • 2008
  • UWB radio systems have drawn attention during the last few years. These systems are the core technique for ubiquitous home and enable to co-exist with other narrow band systems over the same frequency without interfering them. But UWB signals have a very low power per pulse, so they are affected by strong narrow band interferences. Specially, IEEE 802.11a systems which operate around 5GHz overlap the band of UWB signals and they will interfere with UWB systems significantly. In this paper, we propose a novel narrow band interference suppression method based on singular value decomposition(SVD) algorithm for DS-UWB in IEEE 802.15.4a channel model. The proposed method is very effective and robust for both a single user DS-UWB system and a multiuser DS-UWB system to reduce the narrow band interference.

Multiplication optimization technique for Elliptic Curve based sensor network security (Elliptic curve기반 센서네트워크 보안을 위한 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1836-1842
    • /
    • 2010
  • Sensor network, which is technology to realize the ubiquitous environment, recently, could apply to the field of Mechanic & electronic Security System, Energy management system, Environment monitoring system, Home automation and health care application. However, feature of wireless networking of sensor network is vulnerable to eavesdropping and falsification about message. Presently, PKC(public key cryptography) technique using ECC(elliptic curve cryptography) is used to build up the secure networking over sensor network. ECC is more suitable to sensor having restricted performance than RSA, because it offers equal strength using small size of key. But, for high computation cost, ECC needs to enhance the performance to implement over sensor. In this paper, we propose the optimizing technique for multiplication, core operation in ECC, to accelerate the speed of ECC.

An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone (스마트 폰의 소프트웨어 보안성 분석을 위한 FTA와 FMEA의 통합적 방법)

  • Kim, Myong-Hee;Toyib, Wildan;Park, Man-Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.541-552
    • /
    • 2013
  • Recently software security of the smart phone is an important issue in the field of information science and technology due to fast propagation of smart technology in our life. The smart phone as the security critical systems which are utilizing in terminal systems of the banking, ubiquitous home management, airline passengers screening, and so on are related to the risk of costs, risk of loss, risk of availability, and risk by usage. For the security issues, software hazard analysis of smart phone is the key approaching method by use of observed failures. In this paper, we propose an efficient integrative framework for software security analysis of the smart phone using Fault Tree Analysis (FTA) and Failure Mode Effect Analysis (FMEA) to gain a convergence security and reliability analysis technique on hand handle devices. And we discuss about that if a failure mode effect analysis performs simpler, not only for improving security but also reducing failure effects on this smart device, the proposed integrative framework is a key solution.

A Study on Network Service Using Authorization Ticket in AAA system (AAA시스템의 인가 티켓을 이용한 네트워크 서비스에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2007
  • A ubiquitous network environment is a system where the user can avail of the network's services anytime, anywhere. To establish such an environment, studies continue being conducted on wireless communication technology and mobile terminals. The company that provides such services should have an established system for authentication, authorization and charging for users. This service is referred to as Authentication, Authorization, Accounting(AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with regard to the authentication and efficiency of the mobile terminal. One of the method is that the mobile terminal contacts to the home authentication server through the external authentication server every time it is required and; another one is to use a medium server to provide authentication in the middle between them. Thus, this study aims to determine the best method to use ticketing, where tickets are provided through a mobile terminal, complete with authentication and authorization features. Also, as it uses ticket, it can efficiently provide mobile verification processing.

센서 네트워크용 초소형 OS

  • Song, Jun-Geun;Ma, Pyeong-Su;Park, Seung-Min
    • Information and Communications Magazine
    • /
    • v.24 no.7
    • /
    • pp.26-35
    • /
    • 2007
  • 최근 몇 년간 유비쿼터스 서비스를 구현하기 위한 핵심 기술 중 하나인 무선 센서 네트워크에 대한 관심이 높아지고 있다. 무선 센서 네트워크 기술은 물류, 유통, 환경 감시, 홈오토메이션, 군사 분야 등 다양한 분야에 적용 될 수 있기 때문에 앞으로 관련 분야의 시장 또한 커질 것으로 예상되고 있다 [1]. 무선 센서 네트워크는 기존 유선 센서 네트워크나 무선 네트워크 환경과는 많은 차이를 가진다. 우선 극도로 제한된 시스템 자원만을 가질 수 있으며, 열악한 환경 속에서 무선매체를 통해 유기적으로 동작하여야 하는 특징을 가지고 있다. 적게는 수십 개에서 많게는 수백, 수천 개의 자율적인 하드웨어 노드들로 구성되는 무선 센서 네트워크에서 제한된 자원을 효과적으로 활용하기 위해서는 센서 노드에 적합한 운영체제가 필수적으로 요구된다. 지난 몇 년간 센서 노드하드웨어의 발달과 더불어 많은 센서 네트워크용 초소형 운영체제가 개발되어왔다. 현재 많이 알려져 있는 센서 네트워크용 OS로는, 가장 활발한 참여를 보이고 있는 TinyOS[3]부터 SOS[4], MANTIS[5], Contiki[6], T-kernel[7] 등이 있으며, 국내 기술로 개발된 Nano-Qplus[8] 등이 존재한다. 본고에서는 우선 센서 네트워크에 대한 배경 지식과 플랫폼 등에 대한 내용을 간단히 다루고, 본론에서 센서 네트워크용 운영체제가 가져야 할 조건과 현재 개발되어 있는 센서 네트워크 OS들의 특징에 대해 간략히 살펴보도록 하겠다. 또한 센서 네트워크 OS와 밀접한 연관성을 가지는 분야에 대해 간단히 살펴보고, 마지막으로 앞으로의 방향에 대해 알아본다.고려해 볼 때 atlas의 장축의 시계방향 회전은 액티베이터의 사용 효과로 생각되며, 이는 차후 II급 부정교합자에서 액티베이터 치료 효과를 판단하는 또 하나의 지표가 될 수 있다고 생각한다.인해 한반도를 포함한 동아시아 대륙이 태평양판 쪽으로 밀려감으로써 섭입하던 태평양판의 각도가 급해져 동아시아 연변에 강력한 흡입력이 발생하였으며, 이 때문에 태평양판의 운동 방향이 북북서에서 서북서방향으로 회전되었을 가능성이 있다. 따라서 약 51 Ma부터 한반도 동남부에는 지판 경계의 강력한 흡입력으로 동서 내지 서북서-동남동의 인장력이 작동되어 B그룹 암맥군이 관입한 것으로 해석된다.Ledge는 세 군 모두에서 나타나지 않았다. 4. 파일 binding 횟수는 MC군이 가장 적고 PT군이 가장 많았다 (p < 0.05). 이상의 결과를 볼 때, Mtwo 전동 파일을 crown-down technique으로 사용하는 것이 single length technique과 유사한 성형 효율을 보이면서도 더 안전할 것으로 추정된다.고 1명(3%)에서 원격전이를 보였다. 치료 중 급성 합병증으로 11명(37%)에서 RTOG grade 1-2의 장염을 보였으며 1명은 대장의 천공이 발생하여 수술로 치유되었다. 12명(40%)에서 RTOG grade 1-2의 급성 방광염을 보였다. 3명(10%)에서 RTOG grade 1-2의 백혈구 감소증이 보였으며 1명에서 심한 백혈구 감소증(RTOG grade 4)이 나타났으나 회복되어 치료를 완료하였다. 만성 합병증으로 5명(15%)에서 RTOG grade 1-2의 만성 장염을 보였으며 별다른 치료 없이 지내고 있으며

Methodology for Designing Inter-device Connectivity by Classifying User Experience Step (사용자 경험단계의 분류를 통한 기기간 연결성디자인 방법론)

  • Hong, Sung-Soo;Yoo, Soung-Min;Ahn, Hyo-In;Ko, Chang-Suk
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.456-459
    • /
    • 2008
  • We are now in the era of digital convergence with CE products and PC at the center, but product diversification occurs in the same breath. Each device may perform its own functions itself independently, but proportion of the inter-device usage is increasing gradually by concept of a home network and ubiquitous widely prevailed. The consumer's need of inter-device connection will take the dominative position of the market. Therefore, we can easily forecast that diversification of the products may inevitably lead connectivity patterns complicated considering recent market situation and trends. In this paper, we propose the methodology for designing inter-device connectivity which covers issues such like segmenting numerous number of connectivity pattern, and establishing their structure of control. Our methodology also supports the inter-device connection with extensive latitudes and a multi-device simultaneous control. In order to present inter-device connectivity guideline, we define four stages of a user experience - Connection, Configuration, Use, Disconnection. Based on the 4 user experience stages, we suggest a specific connectivity designing guideline for each step.

  • PDF

Principal Component analysis based Ambulatory monitoring of elderly (주성분 분석 기반의 노약자 응급 모니터링)

  • Sharma, Annapurna;Lee, Hoon-Jae;Chung, Wan-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2105-2110
    • /
    • 2008
  • Embedding the compact wearable units to monitor the health status of a person has been analysed as a convenient solution for the home health care. This paper presents a method to detect fall from the other activities of daily living and also to classify those activities. This kind of ambulatory monitoring of the elderly and people with limited mobility can not only provide their general health status but also alarms whenever an emergency such as fall or gait has been occurred and a help is needed. A timely assistance in such a situation can reduce the loss of life. This work shows a detailed analysis of the data received from a chest worn sensor unit embedding a 3-axis accelerometer and depicts which features are important for the classification of human activities. How to arrange and reduce the features to a new feature set so that it can be classified using a simple classifier and also improving the classification resolution. Principal component analysis (PCA) has been used for modifying the feature set and afterwards for reducing the size of the same. Finally a Neural network classifier has been used to analyse the classification accuracies. The accuracy for detection of fall events was found to be 86%. The overall accuracy for the classification of Activities or daily living (ADL) and fall was around 94%.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).