• Title/Summary/Keyword: Ubiquitous Computing System

Search Result 742, Processing Time 0.029 seconds

A Formal Model of Coordination for Supporting Community Computing in a Ubiquitous Environment (유비쿼터스 환경에서 커뮤니티 컴퓨팅 지원을 위한 코디네이터 개발)

  • Nam, Jin-Gyu;Kim, Hyun-Woo;Shin, Dong-Min;Park, Jae-Il;Hur, Sun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.3
    • /
    • pp.43-51
    • /
    • 2008
  • Recent advances in mobile computing technologies and platform-independent information systems have enabled to realize a ubiquitous environment. Community computing has been developed as a useful tool for realizing collaborative services in a ubiquitous environment. In this paper, we present a formal model of a ubiquitous space that takes community concept into consideration and propose two management frameworks that prevent conflicts among communities. To demonstrate the validity of the proposed frameworks, an example for coordinating two communities is provided.

Vision and Research Challenges of the Next Generation Knowledge Management Systems : A Pervasive Computing Technology Perspective (편재형 컴퓨팅 기술을 적용한 차세대형 지식경영시스템의 비전과 연구 이슈)

  • Yoo, Keedong;Kwon, Ohbyung
    • Knowledge Management Research
    • /
    • v.10 no.1
    • /
    • pp.1-15
    • /
    • 2009
  • As pervasive computing technology, which aims to get linked to useful knowledge, information or services anytime, anywhere, using any devices and/or artifacts, is proliferating, desirable impacts on knowledge management systems are now available. The pervasive computing technology will potentially enable the knowledge management systems to realize individualization and socialization and ultimately increase the knowledge processing productivity. However, researchers who apply the pervasive computing methodologies to novel way of knowledge management have been very few. These result in unsatisfactory consideration of establishing pervasive knowledge management systems. Hence, the purpose of this paper is to cast the vision of pervasive knowledge management and search for a couple of possible research issues and possibilities. This paper suggests a framework of ubiDSS, an amended knowledge management system for the next generation deploying pervasive and autonomous knowledge acquisition capabilities of ubiquitous computing technologies. Also the CKAM, context-based knowledge acquisition module, is illustrated as a prototype of future knowledge management systems.

  • PDF

Privacy-Preserving ID-based Service in Anonymity-based Ubiquitous Computing Environment (익명기반 유비쿼터스 환경의 프라이버시 보장 ID기반 서비스)

  • Kim Hak-Joon;Hwang Kyoung-Soon;Lee Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.65-68
    • /
    • 2005
  • Privacy preservation is crucial in ubiquitous computing environment in which lots of privacy- sensitive information can be collected and distributed without appropriate control. The anonymity-based approach is a famous one used for privacy preservation communication, which allows users to use pseudonyms instead of real ID so as not to reveal their identities. This approach is effective in that it can hide the identity of users. However, it makes it difficult to provide ID-based services like buddy service, dangerous area alert, P2P communication in the ubiquitous computing. We proposes a system architecture which enables ID-based services in the ubiquitous computing environment employing anonymity - based privacy - preserving approach.

A Study on the RFID Security Technologies in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 RFID보안 기술에 대한 연구)

  • Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.6 no.4
    • /
    • pp.267-272
    • /
    • 2005
  • The ubiquitous computing environment is a new paradigm that represents the future life and is expected to bring about great changes in IT and in the lives of individuals. However, since a good deal of information can be easily obtained and shared in the ubiquitous computing environment, problems such as a security threat and infringement of privacy are getting serious. The present study is intended to explore some ways to minimize such problems by introducing RFID technology in the ubiquitous computing environment. This study also examines the causes of violation of security and privacy that might occur in the RFID system and requirement for security. In addition it seeks possible technical solutions to those causes.

  • PDF

Community Computing Model and Development Tool for Community-based Ubiquitous System in Multi-agent Platform (다중 에이전트 환경에서의 커뮤니티 기반 유비쿼터스 시스템을 위한 모델과 개발 도구)

  • Jung, You-Na;Lee, Jung-Tae;Kim, Min-Koo
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.12
    • /
    • pp.1031-1051
    • /
    • 2006
  • To develop a ubiquitous system, several researches have been tried to apply multi-agent models to design a system. Even though current multi-agent models provide many benefits with ubiquitous system developments, there are still some deficiencies in completely supporting the characteristics of ubiquitous systems such as dynamic formation and termination of mission-oriented organizations and interrelationship between organizations. In addition, existing agent-based models only concern aboutananalysis and design of a system, then place a burden of implementation on developers. Therefore, in this paper, we propose the high-level abstraction model of a multi-agent based ubiquitous system and the development process concerning implementation as well as design of systems. In addition, we implemented a development toolkit, called as CDTK(Community computing system Development Tool Kit), then developed a small community computing system using the CDTK.

Extracting Requirements for Ubiquitous Computing Technology-based IS Deploying Factor Analysis (Factor Analysis를 이용한 유비쿼터스 컴퓨팅 기반 정보시스템의 요구사항 분석)

  • Em, Natalia V.;Yoo, Kee-Dong;Suh, Eui-Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.140-151
    • /
    • 2005
  • This paper discusses an empirical study on extracting requirements for ubiquitous computing technology-based information system (ubi-IS) using factor analysis. After preliminary review of related literature, features specific to ubiquitous computing technology have been retrieved, selected in terms of main elements of information system (IS) (network, device, user interface, and operating system), and further used as variables during conducting factor analysis. Quantitative data was collected through questionnaire approach. The results of factor analysis manifested 5 factors containing 15 variables, and eventually, based upon the extracted factors the requirements for ubi-IS were identified.

  • PDF

A Jini-Based Ubiquitous Messaging System Supporting Context Awareness and User Mobility

  • Choi, Tae-Uk;Chung, Ki-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.6
    • /
    • pp.832-840
    • /
    • 2004
  • In ubiquitous environments, context is any information that can be used to characterize the situation of an entity such as a person or an object. Many sensors and small computers collect contexts and provide applications with them. Thus, ubiquitous applications need to represent contexts and exploit them effectively. In this paper, we design and implement a context-aware messaging system, called UMS (Ubiquitous Messaging System), based on Java and Jini. UMS can represent various contexts using XML scripts, and communicate text messages regardless of user's location using the proxy mechanism of Jini.

  • PDF

Implementation of u-Safety System for Preventing Industrial Disaster in Manufacturing Industries : The Case Study of 'H' Cooperation (제조업의 산업재해 예방을 위한 u-Safety 시스템 구축: 'H'기업 적용사례)

  • Jang, Gil-San;Lee, Jong-Sub
    • The Journal of Information Systems
    • /
    • v.18 no.1
    • /
    • pp.145-157
    • /
    • 2009
  • If industrial disasters happen at workplace, work's desires of workers and business activities may be dispirited. Especially, industrial disasters frequently happen in the field of heavy and chemical industry companies. According to report of the korea occupational safety and health agency(KOSHA), damage due to industrial disasters is more 5 times than losses due to industrial strifes. Thus, in these manufacturing companies, a safety management field for preventing industrial disasters is emerging as an important factor of business activities. This paper proposes an industrial disaster prediction model for safety management and also implements industrial safety management system(after this, is called as u-Safety system) based on the proposed model using ubiquitous computing technologies like USN(ubiquitous sensor networks) which are given much attention among recent information technologies. The implemented system is successfully operating in the shipbuilding division of 'H' companies.

A Multi-Layered Approach for the Valuation of Location Based Services

  • Kim, Ji-Hoon;Kwon, Oh-Byung
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.147-156
    • /
    • 2005
  • In developing the ubiquitous computing technology based services (ubiquitous services), evaluating how much value of those services is created or added is very crucial. The efforts to evaluate the ubiquitous services have been progressed in two perspectives - technical perspective and behavioral perspective. Despite its importance, however, the methodologies which integrate both perspectives have been still very rare. Hence, this paper aims perspectives have been still very rare. Hence, this paper aims to propose an integrated ubiquitous service valuation methodology based on the multi-layered approach including technical and behavioral perspectives. To do so, we conducted a case study with currently existing location based service (LBS) such as navigation systems by conducting focus group interview (FGI) and field survey.

  • PDF