• 제목/요약/키워드: Ubiquitous Environments

검색결과 574건 처리시간 0.03초

Towards a Ubiquitous Robotic Companion: Design and Implementation of Ubiquitous Robotic Service Framework

  • Ha, Young-Guk;Sohn, Joo-Chan;Cho, Young-Jo;Yoon, Hyun-Soo
    • ETRI Journal
    • /
    • 제27권6호
    • /
    • pp.666-676
    • /
    • 2005
  • In recent years, motivated by the emergence of ubiquitous computing technologies, a new class of networked robots, ubiquitous robots, has been introduced. The Ubiquitous Robotic Companion (URC) is our conceptual vision of ubiquitous service robots that provide users with the services they need, anytime and anywhere in ubiquitous computing environments. To realize the vision of URC, one of the essential requirements for robotic systems is to support ubiquity of services: that is, a robot service must be always available even though there are changes in the service environments. Specifically robotic systems need to be automatically interoperable with sensors and devices in current service environments, rather than statically preprogrammed for them. In this paper, the design and implementation of a semantic-based ubiquitous robotic space (SemanticURS) is presented. SemanticURS enables automated integration of networked robots into ubiquitous computing environments exploiting Semantic Web Services and AI-based planning technologies.

  • PDF

이종 시스템 환경하에서의 무선 네트워크의 보안 대책 (Analyses of Wireless Network Security in Heterogeneous Environments)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 추계종합학술대회
    • /
    • pp.717-720
    • /
    • 2007
  • With the convergence of mobile devices and the Internet ubiquitous computing promises to revolutionalize the way that we access services and run application. However, ubiquitous computing environments, in particular, mobile and wireless environments interfaced with the Internet, currently possess security vulnerabilities that are ripe for attack from cyber-threats. Thus, this paper discusses the Limitation of current security mechanisms in ubiquitous computing environments

  • PDF

유비쿼터스 환경에서 자발적 상호연동을 지원하는 역할 기반 응용 모델 (Role-Based Application Model for Supporting Spontaneous Interoperation in Ubiquitous Environments)

  • 정종윤;류기열;이정태
    • 한국IT서비스학회지
    • /
    • 제11권3호
    • /
    • pp.269-285
    • /
    • 2012
  • The spontaneous interoperation is an important characteristic of ubiquitous applications and is closely related with mobility. The mobile components in ubiquitous environments are liable to appear in and disappear from one physical space to another. Because this characteristic certainly influences the structure and behavior of applications, they should adapt themselves to the changed environments by configuring their structure and behaviors. Consequently, developers are faced with the above challenging issue when they design and implement ubiquitous applications. The role concept is an efficient tool to model participant entities, their relationship, and collaboration, so role-based model are appropriate to describe a structure and behavior of software system. But, little attention has been given to reflect characteristics of ubiquitous applications. To tackle the problem, this study considers a ubiquitous application as a software organization which consists of software components and proposes an enhanced role-based application model for supporting spontaneous interoperation.

A Taxonomy of Agent Technologies for Ubiquitous Computing Environments

  • Zhang, Daqiang;Wan, Jiafu;Liu, Qiang;Guan, Xin;Liang, Xuedong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권2호
    • /
    • pp.547-565
    • /
    • 2012
  • The design, development and deployment of Mobile Agent (MA) systems for high-level inference and surveillance in wireless sensor networks and RFID systems have drawn increasing attention in the past decade. To answer how the state-of-the-art of MA in a wide range of ubiquitous and sensor environments is, this paper investigates the current progress of MA. It proposes a taxonomy, by which MA systems in ubiquitous computing environments are decomposed and discussed. Then, this paper provides insights into the strengths and weaknesses of existing efforts. Finally, it presents a series of solutions from the viewpoint of various roles of MA in ubiquitous environments and situations.

주택 내에서의 사용자 행위 분석을 이용한 유비쿼터스 환경 구축 - 거실공간을 중심으로 - (A Modeling of Ubiquitous Environments Reflecting User's Behaviors in the House)

  • 이동화;박성준;이현수
    • 한국주거학회:학술대회논문집
    • /
    • 한국주거학회 2005년도 추계학술대회 논문집
    • /
    • pp.63-66
    • /
    • 2005
  • The purpose of this study is to suggest the modeling of ubiquitous environments according to the analysis of user's behaviors focused on the living area within the house. Recently, with appearing 'Ubiquitous environments', the applications of ubiquitous technologies on the our environment adopt a new paradigm. This new paradigm leads to the possibility of creating more intellectual dwelling environment according to user's behaviors. This paper suggests to change our dwelling by considering both engineering technology and the character of dwelling, because the house should provide causes humans with comfortability. Therefore, we need to understand user's behaviors in the dwelling, towards user friendly environment. Also, it very important for us to configure proper sensors and technologies by the priority based on user's behaviors. To sum up, this study is aimed to analyze user's behaviors and then, to suggest the guideline for users offering optimal ubiquitous environments.

  • PDF

Monitoring Systems for Embedded Equipment in Ubiquitous Environments

  • Bae, Ji-Hye;Kang, Hee-Kuk;Park, Yoon-Young;Park, Jung-Ho
    • Journal of Information Processing Systems
    • /
    • 제2권1호
    • /
    • pp.58-65
    • /
    • 2006
  • Accurate and efficient monitoring of dynamically changing environments is one of the most important requirements for ubiquitous network environments. Ubiquitous computing provides intelligent environments which are aware of spatial conditions and can provide timely and useful information to users or devices. Also, the growth of embedded systems and wireless communication technology has made it possible for sensor network environments to develop on a large scale and at low-cost. In this paper, we present the design and implementation of a monitoring system that collects, analyzes, and controls the status information of each sensor, following sensor data extracted from each sensor node. The monitoring system adopts Web technology for the implementation of a simple but efficient user interface that allows an operator to visualize any of the processes, elements, or related information in a convenient graphic form.

유비쿼터스 환경에서 다중 상황 적응적인 효과적인 권유 기법 (Effective Recommendation Method Adaptive to Multiple Contexts in Ubiquitous Environments)

  • 권준희
    • 한국콘텐츠학회논문지
    • /
    • 제6권5호
    • /
    • pp.1-8
    • /
    • 2006
  • 유비쿼터스 환경 하에서 다중 상황 기반 권유 서비스에 대한 요구가 증대하고 있다. 이러한 환경에서는 상황의 수가 증가함에 따라 권유 정보의 양이 크게 증가하게 되어 효과적인 정보 제공이 어려워진다는 문제를 가진다. 이를 위해 본 논문에서는 유비쿼터스 환경에서 다중 상황 적응적인 효과적인 권유 기법을 제안한다. 본 제안 기법에서는 상황별로 의미 있는 정보를 제공할 수 있도록 하기 위해 사용자들의 상황별 선호도와 행위를 권유 정보의 양을 결정하는 가중치 요소로서 사용한다. 이를 위해 권유 기법과 시나리오를 제시하고, 본 논문에서 제안하는 기법의 효과성을 실험을 통해 평가한다.

  • PDF

유비쿼터스 서비스 경영 환경에서 조직 구조 및 컴퓨터 보안 시스템에 관한 연구 - 외식 업체 적용 방안을 중심으로 - (A Study on Organizational Structure and Computer Security Systems in Ubiquitous Environments)

  • 이명희;유재언;정창덕
    • 한국조리학회지
    • /
    • 제13권4호
    • /
    • pp.305-316
    • /
    • 2007
  • This paper examines that a desirable organizational structure for a security policy in ubiquitous environments that are based on users' need to know and do their tasks in organizations. Tasks are a common entity which already exit and relate directly to both users(who are assigned to tasks and to information required for the completion of a task). Ubiquitous is highlighted as IT paradigm of the future generation. We propose a security model, called the Ubiquitous Group Security Model(UGSM), which associates with a task of processing the information which users need to know. The access type specification restricts the operations that users are permitted to perform, as defined by users' need to do for achieving their tasks in organizations.

  • PDF

유비쿼터스 학습공간과 OWL 상황 모델 설계를 통한 상황 인식 학습 시스템 구현 (Implementation of Context aware Learning System by Designing Ubiquitous Learning Space and OWL Context Model)

  • 홍명우;이용환
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권6호
    • /
    • pp.99-109
    • /
    • 2011
  • 유비쿼터스 컴퓨팅 기술은 유비쿼터스 학습 즉 u-러닝의 출현을 이끌며 미래 학교 교육의 개선 방향으로 제시되고 있다. 유비쿼터스 학습 환경에서는 우선 사용자들이 언제 어디서나 학습을 위해 다양한 내장형 컴퓨터들을 활용할 수 있도록 이러한 기기들을 도처에 편재시키고 네트워크를 통한 상호작용을 지원하는 것이다. 다음 단계는 지능적인 학습 서비스를 지원하는 것으로, 상황 정보를 이해하고 이를 공유하도록 상황 지식과 상황 추론이 가능한 상황 인식 서비스를 도입하는 것이다. 그러나 아직까지 실제 학교를 대상으로 상황 인식 서비스를 지원하기 위한 온톨로지 상황 모델 설계 및 적용에 대한 연구결과는 미비한 상태이다, 이에 본 논문은 상황 인식 기반의 유비쿼터스 학습 서비스를 지원하기 위해, 기존 LAN 환경에서 이루어지는 학교 네트워크를 대상으로 USN을 활용한 유비쿼터스 학습 공간을 제안하고, OWL을 사용해 유비쿼터스학교 환경에대한온톨로지기반의상황모델을설계한다. 또한제안한유비쿼터스학습공간과온톨로지상황모델이 유비쿼터스 학습 환경에 적합함을 확인하기 위해 유비쿼터스 환경에서의 상황 인식 학습 서비스들을 구현한다.

Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments

  • Zheng He;Kwak Jin;Son Kyung-Ho;Lee Wan-Suk;Kim Seung-Joo;Won Dong-Ho
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.329-333
    • /
    • 2006
  • New computing paradigm in ubiquitous computing environments is revolutionizing the way people interact with computers, services and the surrounding physical spaces. In order to provide stronger authentication, MIST proposed an authentication framework for ubiquitous computing environments and assigned confidence values to some authentication methods to facility the combining. However, the assigned confidence values lack sufficient evidence. In this paper reliable confidence values for each authentication method used in MIST is proposed. These confidence values can combine multiple confidence values in some manner, producing a more accurate net confidence value. Authentication entities with confidence values allows the authentication framework to blond nicely into ubiquitous computing environments.

  • PDF