• Title/Summary/Keyword: Context-Aware Application

Search Result 137, Processing Time 0.028 seconds

Intelligent Surveillance System for Urban Transit using Context-aware technology (도시철도 지능형 종합 감시시스템을 위한 상황인식기술 적용방안 연구)

  • An, Tae-Ki;Shin, Jeong-Ryol;Lee, Woo-Dong;Kim, Moon-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.399-400
    • /
    • 2007
  • The one of the necessary technologies to live in the ubiquitous society that we can exchange some informations whenever it is and wherever we are, is the technology of context-awareness. The technology of context-awareness can be used various fields-medical science, national defense, national security and etc. and the technology can affect our society by and large. The technology of context-awareness is also applicable to many fields in the urban transit. In this paper, we describe the present condition of the technology of context-awareness and the examples of practical application of it and suggest some plans that are applicable to build an intelligent surveillance system for urban transit. We can connect the operating officer who is in the nearest to the place where the some events happened within the urban transit service area through the intelligent surveillance system for urban transit and we can eel a foothold in perceiving automatically various events within urban transit service area. So, the technology of context-awareness is the basic technology to realize an intelligent surveillance for urban transit, for the security of passengers and the protection of facilities in urban transit.

  • PDF

Design of an Experience Monitoring and Sampling System for Context-aware Mobile Applications (상황 인지형 모바일 애플리케이션의 사용자 경험 모니터링 및 수집 시스템의 디자인)

  • Seo, Jung-Suk;Lee, Seung-Hwan;Kim, Ho-Jin;Lee, Gee-Hyuk
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.834-840
    • /
    • 2009
  • This paper discusses about an empirical study to design a suitable experience monitoring and sampling system for mobile phone applications. We designed a new experience sampling method (ESM) research system iteratively. The research system is characterized by context-aware experience sampling, real-time data management, supporting data analyzing tools, and integrating ESM with ex-situ diary. From literature review, we derived initial design of the ESM research system. With the first system, we held the first experiment that evaluates three applications. From the experiment, we found that more functions are required, thus we improved the ESM system. Finally, we propose an ESM system design goal for the third iteration with experience of two experiments.

  • PDF

A design and implementation of a priority and context-aware event ID for U-City integrated urban management platform in U-City (U-City 도시통합관제플랫폼의 상황 이벤트 ID, 우선순위 기능 설계 및 구현)

  • Song, Kyu-Seog;Ryou, Jae-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.901-907
    • /
    • 2010
  • This paper proposes a standard method for linking data between the U-City Integrated Urban Management Platform and u-service systems through systemization of event identification and standardization of event priority. By applying the proposed method, the incoming events to the Management Platform are listed and processed according to their priority of urgency. The application of the systemized event ID and standardized event priority enables prompt counter-measures against urban emergencies and disasters, which improves the efficiency of business processes by reducing the time and cost to complete required actions.

A Context-aware Security Architecture for RFID Application (RFID 애플리케이션을 위한 상황 인식 보안 아키텍처)

  • Kwon Jung-Kyu;Chung Mok-Dong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.280-282
    • /
    • 2006
  • 동적인 환경 정보를 제공하는 RFID 플랫폼 환경을 위한 보안 서비스를 제공하기 위해서는 동적인 분산 환경에 대한 고려가 필요하고, 한 번의 인증으로 여러 서비스를 이용할 수 있어야 하고, 다양한 자원의 보안 정책을 단순화 시키고, 보안 정책의 설정과 변경이 쉬워야 있어야 한다. 본 논문에서는 RFID 애플리케이션을 위한 상황 인식 보안 아키텍처로서 Single Sign-On 개념을 구현한 Kerberos를 이용한 통합 인증 모델과 단순한 권한 관리를 위해서 RBAC를 이용한 권한 관리 모델을 제시한다.

  • PDF

Design and implementation of the dynamic context-aware application development platform (동적 상황 기반 응용 개발 플랫폼의 설계 및 구현)

  • 송호근;서주홍;최정희;신승중;류대현;나종화
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.199-201
    • /
    • 2004
  • 유비쿼터스 컴퓨팅의 응용분야에서 거시적이고 동적인 개념을 쉽게 구현할 수 있는 플랫폼을 설계하고 구현하였다. 주위 정보를 수집하는 센서들과 이 정보들을 서버에게 보내는 PDA 그리고 여러 지역을 감지하기 위해 이동이 가능하게 하는 이동체 등으로 구성되어 있다. 응용하는 곳에 따라 이동체, 센서, 룰셋 등을 변경할 수 있도록 플랫폼을 설계하였다. 이 논문에서는 이 플랫폼의 H/W의 구성과 S/W의 구성을 살펴보고 이를 응용한 곳에 대해 설명한다. 그리고 향후 개발 방향에 대해 언급한 후 끝을 맺는다.

  • PDF

Semantics-aware Obfuscation for Location Privacy

  • Damiani, Maria Luisa;Silvestri, Claudio;Bertino, Elisa
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.2
    • /
    • pp.137-160
    • /
    • 2008
  • The increasing availability of personal location data pushed by the widespread use of location-sensing technologies raises concerns with respect to the safeguard of location privacy. To address such concerns location privacy-preserving techniques are being investigated. An important area of application for such techniques is represented by Location Based Services (LBS). Many privacy-preserving techniques designed for LBS are based on the idea of forwarding to the LBS provider obfuscated locations, namely position information at low spatial resolution, in place of actual users' positions. Obfuscation techniques are generally based on the use of geometric methods. In this paper, we argue that such methods can lead to the disclosure of sensitive location information and thus to privacy leaks. We thus propose a novel method which takes into account the semantic context in which users are located. The original contribution of the paper is the introduction of a comprehensive framework consisting of a semantic-aware obfuscation model, a novel algorithm for the generation of obfuscated spaces for which we report results from an experimental evaluation and reference architecture.

Development of Data Collection Application using Smart Phone (스마트 폰을 이용한 데이터 수집 어플리케이션 개발)

  • Jung, Yong-jin;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.664-666
    • /
    • 2014
  • Recently, it is issued that the big data collecting meaningless data, and then extracting meaningful data from analyzed relationship to provide various information for users. However, original data collecting methods have difficulty in collecting information Because they analyze data by using sensors installed at exterior and interior of buildings and information of users. In this paper, we develop a data collection application using smart phone to resolve this problem. Developed application transmits data about Wi-Fi and measured information such as temperature, humidity, acceleration, gyro to server through web. The data transmitted is used as a context inference for users. According to the inference result, it is possible to provide various services on user conditions.

  • PDF

ENTERPRISE WIDE CENTRALIZED APPLICATION LEVEL ACCESS CONTROL USING XACML

  • Shaikh, Riaz A.;Rajput, Saeed;Zaidi, S.M.H.;Sharif, Kashif
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.62-67
    • /
    • 2005
  • In traditional approach, enterprise-wide consistent security policy enforcement for applications is very difficult task. Therefore, industry is now moving towards new unified enterprise application security concept that consist of centralized authentication and authorization mechanism. The eXtensible Access Control Markup Language (XACML); an XML-based standard defined by OASIS, is most suitable choice which can support centralized, role based, context aware access control mechanism. It is designed to provide universal standard for writing authorization policies and access control request/response language for managing access to the resources. This paper includes a brief overview on XACML and discusses its benefits, limitations and a data flow process. We propose a new generic access control architecture that supports enterprise wide centralized application level access control mechanism using XACML. The other benefits which can be achieved through this architecture are, reduce adnministration cost and complexity, support of heterogeneous computing platforms, centralized monitoring system, automatic fail over, scalability and availability, open standard based solution and secure communication.

  • PDF

Design and Implementation of Context-aware Application on Smartphone Using Speech Recognizer

  • Kim, Kyuseok
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.49-59
    • /
    • 2020
  • As technologies have been developing, our lives are getting easier. Today we are surrounded by the new technologies such as AI and IoT. Moreover, the word, "smart" is a very broad one because we are trying to change our daily environment into smart one by using those technologies. For example, the traditional workplaces have changed into smart offices. Since the 3rd industrial revolution, we have used the touch interface to operate the machines. In the 4th industrial revolution, however, we are trying adding the speech recognition module to the machines to operate them by giving voice commands. Today many of the things are communicated with human by voice commands. Many of them are called AI things and they do tasks which users request and do tasks more than what users request. In the 4th industrial revolution, we use smartphones all the time every day from the morning to the night. For this reason, the privacy using phone is not guaranteed sometimes. For example, the caller's voice can be heard through the phone speaker when accepting a call. So, it is needed to protect privacy on smartphone and it should work automatically according to the user context. In this aspect, this paper proposes a method to adjust the voice volume for call to protect privacy on smartphone according to the user context.