• Title/Summary/Keyword: Context-Communication

Search Result 1,171, Processing Time 0.03 seconds

Implementation of a Context-awareness based UoC Architecture for MANET (MANET에서 상황인식 기반의 UoC Architecture 구현)

  • Doo, Kyoung-Min;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1128-1133
    • /
    • 2008
  • Context-aware computing has been attracting the attention as an approach to alleviating the inconvenience in human-computer interactions. This paper proposes a context-aware system architecture to be implemented on an UoC (Ubiquitous system on Chip). A new proposed technology of CRS (Context Recognition Switch) and DOS (Dynamic and Optimal Standard) based on Context-awareness system architecture with pre-processor, HPSP(High Performance Signal Processor) in this paper. And proposed a new algorithm using in network topology processor shows for Ubiquitous Computing System. implementing in UoC (Ubiquitous System on Chip) base on the IEEE 802.15.4 WPAN (Wireless Personal Area Network) standard. Also, This context-aware based UoC architecture has been developed to apply to mobile intelligent robots which would support human in a context-aware manner.

An authentication service application using Context-awareness (상황인식 기법을 이용한 인증 서비스 응용)

  • Lee, Myung-jun;Lee, Tae-sik;Hong, Ho-jung;Hwang, Hyeon-seo;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.169-172
    • /
    • 2013
  • In this paper, we develop an application service of user authentication system using context awareness technology. The proposed security printer system service is applying 'NFC(Near Field Communication) technology', 'authentication system using communication with server, according to context awareness to application system. Our system extracts several context-awareness elements that happen through the user's printing with server communication. The proposed system property elements contain as print time, number of printing and name of document, etc. based on working memory operation as DB. This proposed system provide with context-awareness weight algorithm and analyzes the service which decides success or failure of user's printing. The develop app service is formed and applied when approved user who gets request. Approved user according to these context awareness tech will be provided with final service after authenticating again for the certain NFC card to reader. This results cab be contributed an authentication service based on context awareness weight algorithm and improved performance of management service in secure service applications.

  • PDF

Web Service for Traffic Information Using Focus+Context Visualization Technique (Focus + Context 시각화 기법을 사용한 교통정보 웹 서비스)

  • Kim, Kwangseob;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.101-106
    • /
    • 2014
  • Information and Communication Technology environment has been developing rapidly and variety of services are in service. As data becomes increasingly sophisticated. These data was applied techniques of visualization in order to visualize efficiently. Various agencies are providing the map based data in real-time. However, traffic information is getting more complex and users are having a difficulty to understand with convential visualization techniques. This study was designed and implemented in the web service of traffic information using Focus+Context. Web service implemented HTML5(Hyper Text Markup Language 5), and it runs on browser of either desktop or mobile devices. This study sets an example as web application from a user perspective by combining information visualization and traffic information.

Harmful Disinformation in Southeast Asia: "Negative Campaigning", "Information Operations" and "Racist Propaganda" - Three Forms of Manipulative Political Communication in Malaysia, Myanmar, and Thailand

  • Radue, Melanie
    • Journal of Contemporary Eastern Asia
    • /
    • v.18 no.2
    • /
    • pp.68-89
    • /
    • 2019
  • When comparing media freedom in Malaysia, Myanmar, and Thailand, so-called "fake news" appears as threats to a deliberative (online) public sphere in these three diverse contexts. However, "racist propaganda", "information operations" and "negative campaigning" might be more accurate terms that explain these forms of systematic manipulative political communication. The three cases show forms of disinformation in under-researched contexts and thereby expand the often Western focused discourses on hate speech and fake news. Additionally, the analysis shows that harmful disinformation disseminated online originates from differing contextual trajectories and is not an "online phenomenon". Drawing on an analysis of connotative context factors, this explorative comparative study enables an understanding of different forms of harmful disinformation in Malaysia, Myanmar, and Thailand. The connotative context factors were inductively inferred from 32 expert interviews providing explanations for the formation of political communication (control) mechanisms.

Context-ID detection method for Robust Header Compression in wireless packet communication

  • Lee, Chul-Soo;Park, Hae-Wook
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1602-1605
    • /
    • 2002
  • Communication schemes are currently changing from circuit switched towards packet switched. These changes enable access to Internet and multimedia services in wireless network. Provision of real-time IP services in air interface introduces relatively large overhead in RTP/UDP/IP headers. To reduce the overhead, the header compression schemes are required. There exist two header compression schemes (CRTP, ROHC) which are IETF standards. We propose Context-ID detection method which reduces more efficiently the packet loss rate than two existing schemes. Its performance in WCDMA system environment is evaluated for CRTP and ROHC schemes.

  • PDF

Design and Implementation of Social Search System using user Context and Tag (사용자 컨텍스트와 태그를 이용한 소셜 검색 시스템의 설계 및 구현)

  • Yoon, Tae Hyun;Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.1-10
    • /
    • 2012
  • Recently, Social Network services(SNS) is gaining popularity as Facebook and Twitter. Popularity of SNS leads to active service and social data is to be increased. Thus, social search is remarkable that provide more meaningful information to users. but previous studies using social network structure, network distance is calculated using only familiarity. It is familiar as distance on network, has been demonstrated through several experiments. If taking advantage of social context data that users are using SNS to produce, then familiarity will be helpful to evaluate further. In this paper, reflect user's attention through comments and tags, Facebook context is determined using familiarity between friends in SNS. Facebook context is advantageous finding a friend who has a similar propensity users in context of profiles and interests. As a result, we provide a blog post that interest with a close friend. We also assist in the retrieval facilities using Near Field Communication(NFC) technology. By the experiment, we show the proposed soicial search method is more effective than only tag.

Design of Cloud-based Context-aware System Based on Falling Type

  • Kwon, TaeWoo;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.44-50
    • /
    • 2017
  • To understand whether Falling, which is one of the causes of injuries, occurs, various behavior recognition research is proceeding. However, in most research recognize only the fact that Falling has occurred and provide the service. As well as the occurrence of the Falling, the risk varies greatly based on the type of Falling and the situation before and after the Falling. Therefore, when Falling occurs, it is necessary to infer the user's current situation and provide appropriate services. In this paper, we propose to base on Fog Computing and Cloud Computing to design Context-aware System using analysis of behavior data and process sensor data in real-time. This system solved the problem of increase latency and server overload due to large capacity sensor data.

Implementation of Context-Based Recommendation System to Verify Schema of MPEG-UD Standard (MPEG-UD 표준 요소 검증을 위한 콘텍스트 기반 추천 시스템 구현)

  • Baek, Jong-Hyun;Choi, Jang-Sik;Byun, Hyung-Gi
    • Journal of Sensor Science and Technology
    • /
    • v.24 no.1
    • /
    • pp.62-68
    • /
    • 2015
  • The MPEG user description (MPEG-UD) which is a standard under exploration to ensure interoperability among customized recommendation services has been contributed since MPEG $104^{th}$ meeting at 2013. Twenty-two use cases that were divided into different applications have been proposed in the MEPG meetings. Most of use cases were referred to specific and restricted regarding to applications, it appears to miss an overall and explicit infra-structure. In this paper we describe a reference model, namely methodology to overcome aforementioned problems. Thereafter, we have applied reference model to context-based recommendation system to demonstrate the methodology and MPEG-UD schemas. In addition, we propose a development process of recommendation system in compliance with MPEG-UD.

Design of U-Healthcare Access Authority Control Model Using Context Constrain RBAC Model (상황제한 RBAC 모델을 이용한 U-헬스케어 접근권한 제어모델 설계)

  • Kim, Chang-Bok;Kim, Nam-Il;Park, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.233-242
    • /
    • 2009
  • The security of medical information need continued research about steady and flexible security model because of privacy of patient's as well as directly relation in the patient's life. In particular, u-healthcare environment is need flexible and detailed access control by variety changes of context. Control model analyzed relation of resource and authority, and analyzed authority about all accessible resource from access point using K2BASE. The context-based access control model can change flexibly authority change and role, and can obtain resource of authority granted and meaningly connected resource. As a result, this thesis can apply flexible and adaptive access control model at u-healthcare domain which context change various.

  • PDF

Context-aware Protype for Adaptive Recommendation Service on Mobile (모바일 환경에서 능동적 추천 서비스를 위한 상황인식 프로토타입)

  • Chang, Hyo-Kyung;Kang, Yong-Ho;Choi, Eui-In
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.257-264
    • /
    • 2012
  • The development of mobile devices and the spread of wireless network help share and exchange information and resources more easily. The bond them to Cloud Computing technology help pay attention to "Mobile Cloud" service, so there have been being a lot of studies on "Mobile Cloud" service. Especially, the important of 'Recommendation Service' which is customized for each user's preference and context has been increasing. In order to provide appropriate recommendation services, it enables to recognize user's current state, analyze the user's profile like user's tendency and preference, and draw the service answering the user's request. Most existing frameworks, however, are not very suitable for mobile devices because they were proposed on the web-based. And other context information except location information among user's context information are not much considered. Therefore, this paper proposed the context-aware framework, which provides more suitable services by using user's context and profile.