• Title/Summary/Keyword: Ubiquitous Computing Service

Search Result 504, Processing Time 0.026 seconds

JXTA based P2P communication in MANET Networks (MANET 네트워크에서의 JXTA 기반의 P2P 통신)

  • Jeong Wang-Boo;Suh Hyun-Gon;Kim Ki-Hyung;Sohn Young-Ho
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.139-143
    • /
    • 2005
  • The P2P is a network environment supporting data exchange which is directly connected peers without limit of existing server-client and intervening central server for resource or offered service with each peer. JXTA is a representative of P2P system. JXTA is a typical distributed computing model that proposed by Sun Microsystems. JXTA that doesn't require centralized services or resources is adaptable in extreme changes of network organization. MANET(Mobile Ad Hoc Network) is a representative wireless network that is composed of mobile nodes without infrastructure. So MANET establishes the path for the communication of each peers and maintains the newest routing information by exchanging routing information. In this paper, we propose a technique of JXTAMAUET which implements JXTA which is the P2P network system from the wireless network which is becoming the foundation of ubiquitous computing. For the performance evaluation of the JXTAMANET, we use simulation.

  • PDF

Self-adaptive Content Service Networks (자치적응성 컨텐츠 서비스 네트워크)

  • Hong Sung-June;Lee Yongsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.149-155
    • /
    • 2004
  • This paper describes the self-adaptive Content Service Network (CSN) on Application Level Active Network (ALAN). Web caching technology comprises Content Delivery Network (CDN) for content distribution as well as Content Service Network (CSN) for service distribution. The IETF working group on Open Pluggalble Edge Service (OPES) is the works closely related to CSN. But it can be expected that the self-adaptation in ubiquitous computing environment will be deployed. The existing content service on CSN lacks in considering self-adaptation. This results in inability of existing network to support the additional services. Therefore, in order to address the limitations of the existing networks, this paper suggests Self-adaptive Content Service Network (CSN) using the GME and the extended ALAN to insert intelligence into the existing network.

  • PDF

A Design of Lightweight Mutual Authentication Based on Trust Model (신용모델 기반의 경량 상호인증 설계)

  • Kim Hong-Seop;Cho Jin-Ki;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.237-247
    • /
    • 2005
  • Ubiquitous Sensor Network(USN) is the very core of a technology for the Ubiquitous environments. There is the weakness from various security attacks such that tapping of sensor informations, flowing of abnormal packets, data modification and Denial of Service(DoS) etc. And it's required counterplan with them. Especially it's restricted by the capacity of battery and computing. By reasons of theses. positively, USN security technology needs the lightweighted design for the low electric energy and the minimum computing. In this paper, we propose lightweight USN mutual authentication methology based on trust model to solve above problems. The proposed authentication model can minimize the measure of computing because it authenticates the sensor nodes based on trust information represented by subjective logic model. So it can economize battery consumption and resultingly increse the lifetime of sensor nodes.

  • PDF

A Context Classification for Collecting Situational Information on Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서 상황정보를 수집하기 위한 컨텍스트 분류)

  • Park, Yoosang;Cho, Yongseong;Choi, Jongsun;Choi, Jaeyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.387-392
    • /
    • 2016
  • Context-aware systems require sensor data collecting model and context representing model to provide user-demand services. Sensor data collecting model consists of sensor access information, sensor value, and definition of value types. Context representing model involves certain keywords to symbolize environmental information including the field from sensor data collecting model that is described in markup language such as XML. However, duplicated keywords could be assigned to different contextual information by service developers. As a result, the system may cause misunderstanding and misleading wrong situational information from unintended contextual information. In this paper, we propose a context classification model for collecting appropriate access information and defining the specification of context.

Study on the physical vulnerability factors in the convergence IT environment (융합 IT 환경의 물리적 취약요인에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.59-68
    • /
    • 2016
  • Recently, many domestic and foreign industries is increasing gradually in the importance of security such as the emergence of a Convergence Information Technology(internet of things, cloud computing service, big data etc). Among these techniques, the industrial security market is expected to grow gradually and the evolution of security technologies, as well as vulnerabilities are also expected to increase. Therefore, an increase in physical vulnerability factors it is no exaggeration to standards that are determining the security of industrial security. In this paper will be analyzed to the physical security technology and case study, physical vulnerability factor. Thereby this is expected to be utilized as a basis for the countermeasure of physical corresponding infringement and attack in a future.

A study on the factors influencing the ASP service users' repurchase intent and organization benefits (ASP(Application Service Provider) 서비스 사용자의 재구매 의사와 조직 이익에 미치는 영향요인 연구)

  • Kim, Kyung-Kyu;Shin, Ho-Kyoung;Kim, Su-Hyun
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.1
    • /
    • pp.55-81
    • /
    • 2010
  • ASP service users' needs for flexible and customized services to deal with changes in business environments and user contexts seems to be appealing due to the progress of technology and IT paradigm such as ubiquitous computing and web 2.0. Through the lens of expectancy confirmation and flexibility, we explored factors that influence users' repurchase intent and organizational benefit in ASP services. With an empirical study, we examined information quality, service quality, flexibility, customization, user satisfaction, trust in ASP services can contribute to the repurchase intent and organizational benefit. In addition to, business type and company size are added to the research model as control variables for user satisfaction, trust, and repurchase intent. Our findings suggested that the service quality and flexibility significantly were cruicial determinant of user satisfaction in ASP services. Furthermore, user satisfaction significantly influenceS repurchase intent, and organization benefits were affected by repurchase intent. This study has important implications for academic researchers and practitioners who seek to understand factors that affect ASP service users' repurchase intent and organization benefits.

  • PDF

Real-Time Tracking of Human Location and Motion using Cameras in a Ubiquitous Smart Home

  • Shin, Dong-Kyoo;Shin, Dong-Il;Nguyen, Quoc Cuong;Park, Se-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.84-95
    • /
    • 2009
  • The ubiquitous smart home is the home of the future, which exploits context information from both the human and the home environment, providing an automatic home service for the human. Human location and motion are the most important contexts in the ubiquitous smart home. In this paper, we present a real-time human tracker that predicts human location and motion for the ubiquitous smart home. The system uses four network cameras for real-time human tracking. This paper explains the architecture of the real-time human tracker, and proposes an algorithm for predicting human location and motion. To detect human location, three kinds of images are used: $IMAGE_1$ - empty room image, $IMAGE_2$ - image of furniture and home appliances, $IMAGE_3$ - image of $IMAGE_2$ and the human. The real-time human tracker decides which specific furniture or home appliance the human is associated with, via analysis of three images, and predicts human motion using a support vector machine (SVM). The performance experiment of the human's location, which uses three images, lasted an average of 0.037 seconds. The SVM feature of human motion recognition is decided from the pixel number by the array line of the moving object. We evaluated each motion 1,000 times. The average accuracy of all types of motion was 86.5%.

Space Reengineering and Amended UML Approach to Requirement Analysis for Ubiquitous Smart Space Development (유비쿼터스 지능 공간 요구분석을 위한 공간재설계법 및 수정된 UML 접근법)

  • Kwon, Oh-Byung;Lee, Nam-Yeon;Sim, Jae-Mun
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.99-125
    • /
    • 2007
  • Recently, as the development of Ubiquitous Smart Space (USS) such as U-City is proliferating, preparing a development methodology dedicated to USS characteristics has become one of the crucial issues to increase the productivity of the USS projects. However, since the legacy development methodologies such as traditional UML do not consider the critical components of ubiquitous computing space such as context-awareness, service oriented architecture and multi-agent communication, they are not optimized for USS analysis and design. Hence, the purpose of this paper is to propose a USS-sophisticated development methodology. To do so, a hybrid approach, BPR-USS for space reengineering and UML-USS by amending UML with corresponding toolkit based on StarUML has been implemented. To show the feasibility of the approach described in this paper, an illustrative example with an actual USS development project for a multiplex space in Seoul is shown.

  • PDF

Design and Implementation of the Interoperability method for the Remote OSGi services (원격 OSGi 서비스의 상호운용 기술 설계 및 구현)

  • Kim, Eun-Hoe;Yun, Ki-Hyun;Choi, Jae-Young
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.11-25
    • /
    • 2011
  • In ubiquitous computing environment, OSGi has applied to many areas such as digital mobile phones, vehicles, telematics, embedded appliances, residential gateways, industrial computers, desktop PCs, and high-end servers including mainframes. Therefore, interoperability is required for remote OSGi services which are built on various devices. In this paper, we proposed a method which was able to interoperate remote OSGi services using RMI paradigm. RMI is a representative middleware technology in distributed computing environment. The suggested method is based on the standard OSGi technology. It is possible to provide remote OSGi service registration, finding, and binding methods which were suitable for the OSGi service-oriented architecture. We also provided reliability of the dynamic remote OSGi services by maintaining consistent properties of them, and we could provide location transparency of the remote OSGi services by generating proxy bundles and proxy services dynamically.

A Study on the Acceptance Factors of Healthcare Information Services Converged with Cognitive Computing (인지 컴퓨팅 융합 헬스케어 정보서비스 수용요인에 관한 연구)

  • Pae, Young-Woo;Bong, Jin-Sook;Min, Wonki;Shin, Yongtae
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.734-747
    • /
    • 2015
  • The aging population and the advancement of science and technology are transforming the healthcare industry to focus on health management for the prevention of diseases. The U-health and remote healthcare services have not yet achieved the social agreement in the nation; however, these have been extensively used in the global scale. The innovation of user experience through cognitive computing are expected to increase the health effects of consumers, by converging with healthcare information services. This study suggests the conceptual model of healthcare information service converged with cognitive computing. Then, the acceptance factors for consumers have been investigated. For this purpose, reliability and validity analysis have been conducted using an online survey. The path analysis was performed to verify the hypotheses and moderating effect based upon the gender, by using structural equation modeling.