• Title/Summary/Keyword: Ubiquitous Computing Service

Search Result 504, Processing Time 0.027 seconds

Analysis of Keyword Trend for ICT Convergence Services (ICT 융합 서비스의 키워드 트렌드 분석)

  • Jang, HeeSeon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.35-41
    • /
    • 2014
  • With ubiquitous computing and network, the concern of government, business and academy for IT or ICT convergence has been increased. In this paper, through the analysis of keyword trend for ICT convergence services from 2000's mid, the efficient policy is proposed by estimating the understanding and concern of common people. In addition to, the concept and development step of convergence are analyzed, and the keyword analysis for the ICT convergence services defined in TTA is performed. The services are classified into smart home work transportation, Health ICT, RFID USN, M2M IoT, e-Navigation, intelligent robot, and the keywords for each service are analyzed. The analytic results indicate that the keyword trend varies in the time, and highly indexing keywords and new trend are defined. To provide the efficient ICT services, the new ICT convergence services needed for customer will be proposed with new IT technology development, IT standard, law management, and policy provisioining.

Analysis on Children's Response Depending on Teaching Assistant Robots' Styles (교사 보조 로봇 스타일에 따른 아동 반응 분석)

  • Jung, Jae-Gyeong;Choi, Jong-Hong;Han, Jeong-Hye
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.195-203
    • /
    • 2007
  • Together with the development of ubiquitous computing technology and robot technology, intelligent type robots are being utilized in many areas and the range is expected to become wider and wider. Among many service robots, the educational robots are being diversely studied in the field with the concept of r-Learning. Presently, teaching assistant robots require a lot of HRI studies prior to their practical use in the very near future and are not sufficient yet. Especially, the reactions of students based of the styles of robots (e.g. serious robot, playful robot) are very important in producing robot contents but there has been no case study on them. Therefore, in this study, the appearance of the IROBI was changed to become a teaching assistant robot and was used to test and compare elementary school students' interest, achievement and concentration depending on the styles of robot (playful, serious). The results showed that the interest was high in the group that had studied with the playful robot. The achievement however, did not show significant relations with the style of robot and that the concentration was high in the group that had studied with the serious robot.

  • PDF

Privacy Model based on RBAC for U-Healthcare Service Environment (u-헬스케어 환경에서 환자의 무결성을 보장하는 RFID 보안 프로토콜)

  • Rhee, Bong-Keun;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.605-614
    • /
    • 2012
  • Nowadays u-healthcare which is very sensitive to the character of user's information among other ubiquitous computing field is popular in medical field. u-healthcare deals extremely personal information including personal health/medical information so it is exposed to various weaknees and threats in the part of security and privacy. In this paper, RFID based patient's information protecting protocol that prevents to damage the information using his or her mobile unit illegally by others is proposed. The protocol separates the authority of hospital(doctor, nurse, pharmacy) to access to patient's information by level of access authority of hospital which is registered to management server and makes the hospital do the minimum task. Specially, the management server which plays the role of gateway makes access permission key periodically not to be accessed by others about unauthorized information except authorized information and improves patient's certification and management.

A Study on Security Routing using MD5 in MANET Environments (MANET 환경에서 MD5를 이용한 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung;Jung, Sung-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.728-731
    • /
    • 2008
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on IETF MANET working group, Bluetooth, and HomeRF working group and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. For perfect MANET setting, routing is required which can guarantee security and efficiency through secure routing. In routing in this study, hashed AODV is used to protect from counterfeiting messages by malicious nodes in the course of path 'finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

  • PDF

A Recommendation System using Context-based Collaborative Filtering (컨텍스트 기반 협력적 필터링을 이용한 추천 시스템)

  • Lee, Se-Il;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.2
    • /
    • pp.224-229
    • /
    • 2011
  • Collaborative filtering is used the most for recommendation systems because it can recommend potential items. However, when there are not many items to be evaluated, collaborative filtering can be subject to the influence of similarity or preference depending on the situation or the whim of the evaluator. In addition, by recommending items only on the basis of similarity with items that have been evaluated previously without relation to the present situation of the user, the recommendations become less accurate. In this paper, in order to solve the above problems, before starting the collaborative filtering procedure, we calculated similarity not by comparing all the values evaluated by users but rather by comparing only those users who were above the average in order to improve the accuracy of the recommendations. In addition, in the ceaselessly changing ubiquitous computing environment, it is not proper to recommend service information based only on the items evaluated by users. Therefore, we used methods of calculating similarity wherein the users' real time context information was used and a high weight was assigned to similar users. Such methods improved the recommendation accuracy by 16.2% on average.

Discovery of Behavior Sequence Pattern using Mining in Smart Home (스마트 홈에서 마이닝을 이용한 행동 순차 패턴 발견)

  • Chung, Kyung-Yong;Kim, Jong-Hun;Kang, Un-Gu;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.19-26
    • /
    • 2008
  • With the development of ubiquitous computing and the construction of infrastructure for one-to-one personalized services, the importance of context-aware services based on user's situation and environment is being spotlighted. The smart home technology connects real space and virtual space, and converts situations in reality into information in a virtual space, and provides user-oriented intelligent services using this information. In this paper, we proposed the discovery of the behavior sequence pattern using the mining in the smart home. We discovered the behavior sequence pattern by using mining to add time variation to the association rule between locations that occur in location transactions. We can predict the path or behavior of user according to the recognized time sequence and provide services accordingly. To evaluate the performance of behavior consequence pattern using mining, we conducted sample t-tests so as to verify usefulness. This evaluation found that the difference of satisfaction by service was statistically meaningful, and showed high satisfaction.

Experimental Performance Comparison for Prediction of Red Tide Phenomenon (적조현상의 실험적 예측성능 비교)

  • Heo, Won-Ji;Won, Jae-Kang;Jung, Yong-Gyu
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.1-6
    • /
    • 2012
  • In recent years global climate change of hurricanes and torrential rains are going to significantly, that increase damages to property and human life. The disasters have been several claimed in every field. In future, climate changes blowing are keen to strike released to the world like in several movies. Reducing the damage of long-term weather phenomena are emerging with predicting changes in weather. In this study, it is shown how to predict the red tide phenomenon with multiple linear regression analysis and artificial neural network techniques. The red tide phenomenon causing risk could be reduced by filtering sensor data which are transmitted and forecasted in real time. It could be ubiquitous driven custom marine information service system, and forecasting techniques to use throughout the meteorological disasters to minimize damage.

Measurement of Velocity for Mobile Units Using RFID Location Sensing System (RFID를 이용한 이동체의 속도계측 기술에 관한 연구 - RFID 측위기술을 기반으로 -)

  • Song, Woo-Seok;Lee, Jea-Bin;Chang, An-Jin;Yu, Ki-Yun;Kim, Yong-Il
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.25 no.3
    • /
    • pp.215-221
    • /
    • 2007
  • In Ubiquitous computing, RFID has been become a key technology to provide the real-time location information of users. For this purpose, many recent researches have been conducted regarding RTLS based on the RFID system. In this study, we evaluated the efficiency and feasibility of the velocity gauging system using RTLS based on the RFID system. By using this system, the velocity of mobile units were measured and the accuracy was evaluated with data obtained from DGPS. The results demonstrated that RTLS based on the RFID system would be suitable to measure with relatively low velocity information of mobile units. When RFID infrastructures are being constructed, the developed system will be a better position to increase popularity of velocity information service.

A Study on Secure Key Management Technology between Heterogeneous Networks in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 이기종 네트워크간 안전한 키 관리 기술에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.504-515
    • /
    • 2008
  • Fast transmission speeds and various wired network services have been combined with the convenience and mobility of wireless services. The combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security flaws. In existing homogeneous networks, user authentication and key management between heterogeneous networks are required for these new technologies. The establishment of security technologies for heterogeneous devices is a very important task between homogeneous networks. In this paper, we propose a secure and efficient key management system for a heterogeneous network environment. Our system provides secure communications between heterogeneous network devices.

  • PDF

Main/Sub Device Authentication and Authorization Protocol in Ubiquitous Office Network (유비쿼터스 오피스 네트워크에서의 Main/Sub 디바이스 인증/인가 프로토콜)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.105-118
    • /
    • 2009
  • In modern society, as the rapid development of IT technology combined with the computer-based high-speed communication networks makes it possible to provide a wide spectrum of services and devices, we have been confronting a new cultural transformation era, referred to as the information society. However, the requirements to be considered in security aspect have became more complicated and diversified, and there remains the same security weaknesses as in the existing media or protocol. Particularly, the office network device with roaming is susceptible to the different kinds of attacks such as terminal hacking, virus attacks, and information leakage because the computing capacity is relatively low and the loading of already developed security functions is difficult. Although developed as one solution to this problems, PKI security authentication technology isn't suitable for multi-domain environments providing uonments proffice network service, and so the development of a novel authentication system is needed. Therefore, in this paper researched the roaming and device authentication/auth for multitechnology using an ID-based public key, authorization ticket, and Sub-device ticket with a purpose to contribute to the development of the secured and efficient technology.