• Title/Summary/Keyword: Ubiquitous Computing Service

Search Result 504, Processing Time 0.026 seconds

Scalable Stereoscopic Video Coding for Heterogeneous Environments (이질적인 환경을 위한 스케러블 스테레오 영상 부호화)

  • 오세찬;이영호;우운택
    • Journal of Broadcast Engineering
    • /
    • v.9 no.3
    • /
    • pp.225-235
    • /
    • 2004
  • In this paper, we propose a new stereoscopic video coding approach for heterogeneous consumer devices by exploiting the concept of spatio-temporal scalability. The proposed method uses MPEG-2 standard for coding the left or main sequence and an enhanced compatible coding scheme for predicting the P- and B-type of frames of the right or auxiliary sequence. The enhanced compatible coding scheme predicts matching block by interpolating both two forward and backward motion predicted macroblocks and disparity predicted macroblock. To provide flexible stereo video service, we define both a temporally scalable layer and a spatially scalable layer for each eye-view. The experimental results show the efficiency of proposed coding scheme by comparison with already known methods and the advantages of disparity estimation in terms of scalability overhead. According to the experimental results, we expect the proposed functionalities will play a key role in establishing highly flexible stereo video service for ubiquitous computing environment where devices and network connections are heterogeneous.

Short-term Power Load Forecasting using Time Pattern for u-City Application (u-City응용에서의 시간 패턴을 이용한 단기 전력 부하 예측)

  • Park, Seong-Seung;Shon, Ho-Sun;Lee, Dong-Gyu;Ji, Eun-Mi;Kim, Hi-Seok;Ryu, Keun-Ho
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.177-181
    • /
    • 2009
  • Developing u-Public facilities for application u-City is to combine both the state-of-the art of the construction and ubiquitous computing and must be flexibly comprised of the facilities for the basic service of the building such as air conditioning, heating, lighting and electric equipments to materialize a new format of spatial planning and the public facilities inside or outside. Accordingly, in this paper we suggested the time pattern system for predicting the most basic power system loads for the basic service. To application the tim e pattern we applied SOM algorithm and k-means method and then clustered the data each weekday and each time respectively. The performance evaluation results of suggestion system showed that the forecasting system better the ARIMA model than the exponential smoothing method. It has been assumed that the plan for power supply depending on demand and system operation could be performed efficiently by means of using such power load forecasting.

  • PDF

A Structure of Users이 Context-Awareness and Service processing based P2P Mobile Agent using Collaborative Filtering (협력적 필터링 기법을 이용한 P2P 모바일 에이전트 기반 사용자 컨텍스트 인식 및 서비스 처리 구조)

  • Yun Hyo-Gun;Lee Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.104-109
    • /
    • 2005
  • Context-awareness is an important element that can provide service of good quality according to users' surrounding environment and status in ubiquitous computing environment. Information gathering tools for context-awareness use small size mobile devices which have easy movement and a mobile agent in mobile device. Now, Mobile agents are consuming much times and expense to collect and recognize each users' context information. Therefore, needs research about structure for users' context information awareness in early time to reduce mobile agent's load. This paper proposes a P2P mobile agent structure that mikes filtering techniques and a P2P agent in mobile agent. The proposed structure analyzes each user's context information in same area, and groups users who have similar preference degree. Grouped users share information using a P2P mobile agent. Also this structure observes and learns to continue on users' action and service, and measures new interrelation.

Design and Implementation of Realtime Information Service based on Ubiquitous Sensor Network Using MySQL and Tiny-DB (Tiny-DB와 MySQL을 이용한 유비쿼터스 센서 네트워크 기반의 실시간 정보 서비스 설계 및 구현)

  • Kang, Kyoung-Ok;Kim, Yong-Woo;Kwon, Hoon;Kim, Bu-Rim;Kim, Do-Hyeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.2
    • /
    • pp.175-181
    • /
    • 2006
  • Wireless sensor network forms the self-organization network, and transfers the information among sensor nodes that have computing technology ability and wireless communication ability. The recent sensor network is study for low-power, micro, low cost of node is proceeded. Recently, the research of application services in wireless sensor networks is proceeded. Therefore, in this paper, we design the prototype of the real-time information service that support a user the information of temperature, illumination etc. And, we implement the alarm application service fer the disaster prevention on Internet base on IPv4/IPv6. We develop the module of the extract information using the query processing based on TinyOS, and the module of the server's database using MySQL data base management system and JDBC. Additionally, we develop the client module that receive the real-time sensing data using ODBC in Internet based on IPv4/IPv6.

  • PDF

A Dynamic Service Supporting Model for Semantic Web-based Situation Awareness Service (시맨틱 웹 기반 상황인지 서비스를 위한 동적 서비스 제공 모델)

  • Choi, Jung-Hwa;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.732-748
    • /
    • 2009
  • The technology of Semantic Web realizes the base technology for context-awareness that creates new services by dynamically and flexibly combining various resources (people, concepts, etc). According to the realization of ubiquitous computing technology, many researchers are currently working for the embodiment of web service. However, most studies of them bring about the only predefined results those are limited to the initial description by service designer. In this paper, we propose a new service supporting model to provide an automatic method for plan related tasks which achieve goal state from initial state. The inputs on an planner are intial and goal descriptions which are mapped to the current situation and to the user request respectively. The idea of the method is to infer context from world model by DL-based ontology reasoning using OWL domain ontology. The context guide services to be loaded into planner. Then, the planner searches and plans at least one service to satisfy the goal state from initial state. This is STRIPS-style backward planner, and combine OWL-S services based on AI planning theory that enabling reduced search scope of huge web-service space. Also, when feasible service do not find using pattern matching, we give user alternative services through DL-based semantic searching. The experimental result demonstrates a new possibility for realizing dynamic service modeler, compared to OWLS-XPlan, which has been known as an effective application for service composition.

Markov Chain Analysis of Opportunistic Cognitive Radio with Imperfect Sensing (불완전 센싱 기회적 인지 전파망의 Markov Chain 분석)

  • Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.1-8
    • /
    • 2010
  • Wireless multimedia service through the access to mobile telephone network or data network is a vital part of contemporary life, and the demand for frequency spectrum for new services is expected to explode as the ubiquitous computing proliferate. Cognitive radio is a technology, which automatically recognizes and searches for temporally and spatially unused frequency spectrum, then actively determines the communication method, bandwidth, etc. according to the environment, thus utilizing the limited spectrum resources efficiently. In this paper, we investigate the effects of imperfect sensing, misdetection and false alarm, on the primary and secondary users' spectrum usage through the analysis of continuous time Markov Chain. We analyzed the effects of the parameters such as sensing error, offered load on the system performance.

A Study on MD5 Security Routing based on MANET (MANET 기반 MD5 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.797-803
    • /
    • 2012
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. In this study, hashed AODV routing is used to protect from counterfeiting messages by malicious nodes in the course of path finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

Extended Kalman Filter Method for Wi-Fi Based Indoor Positioning (Wi-Fi 기반 옥내측위를 위한 확장칼만필터 방법)

  • Yim, Jae-Geol;Park, Chan-Sik;Joo, Jae-Hun;Jeong, Seung-Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.2
    • /
    • pp.51-65
    • /
    • 2008
  • The purpose of this paper is introducing WiFi based EKF(Extended Kalman Filter) method for indoor positioning. The advantages of our EKF method include: 1) Any special equipment dedicated for positioning is not required. 2) implementation of EKF does not require off-line phase of fingerprinting methods. 3) The EKF effectively minimizes squared deviation of the trilateration method. In order to experimentally prove the advantages of our method, we implemented indoor positioning systems making use of the K-NN(K Nearest Neighbors), Bayesian, decision tree, trilateration, and our EKF methods. Our experimental results show that the average-errors of K-NN, Bayesian and decision tree methods are all close to 2.4 meters whereas the average errors of trilateration and EKF are 4.07 meters and 3.528 meters, respectively. That is, the accuracy of our EKF is a bit inferior to those of fingerprinting methods. Even so, our EKF is accurate enough to be used for practical indoor LBS systems. Moreover, our EKF is easier to implement than fingerprinting methods because it does not require off-line phase.

  • PDF

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.1
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF

Active Contours Level Set Based Still Human Body Segmentation from Depth Images For Video-based Activity Recognition

  • Siddiqi, Muhammad Hameed;Khan, Adil Mehmood;Lee, Seok-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2839-2852
    • /
    • 2013
  • Context-awareness is an essential part of ubiquitous computing, and over the past decade video based activity recognition (VAR) has emerged as an important component to identify user's context for automatic service delivery in context-aware applications. The accuracy of VAR significantly depends on the performance of the employed human body segmentation algorithm. Previous human body segmentation algorithms often engage modeling of the human body that normally requires bulky amount of training data and cannot competently handle changes over time. Recently, active contours have emerged as a successful segmentation technique in still images. In this paper, an active contour model with the integration of Chan Vese (CV) energy and Bhattacharya distance functions are adapted for automatic human body segmentation using depth cameras for VAR. The proposed technique not only outperforms existing segmentation methods in normal scenarios but it is also more robust to noise. Moreover, it is unsupervised, i.e., no prior human body model is needed. The performance of the proposed segmentation technique is compared against conventional CV Active Contour (AC) model using a depth-camera and obtained much better performance over it.