• Title/Summary/Keyword: Ubiquitous computing environment

Search Result 658, Processing Time 0.023 seconds

Business Model of U-Intelligent Traffic Information and Control Services in U-City Environment (U-시티환경에서 U-교통정보제어서비스를 위한 비즈니스모델)

  • Choi, Hun;Yu, Sung-Yeol;Heo, Kap-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.351-359
    • /
    • 2010
  • Recently, interesting of U-city with ubiquitous computing technologies has increased and u-city services can improve people's quality of life. Among the u-city services, traffice service is actively developed in our lives. In this paper, we propose the business model and business model process in u-intelligence traffic service. To propose the research purpose, we examined the prior business model and investigated u-intelligence traffic information and control services. And also, we draw scenario and used it to identify business model. To efficiently understand proposed business model, we built business model process of u-intelligence traffic information and control services. The results of study, we draw 4 representative U-intelligence traffic information and control service. Based on representative services, we proposed business model and business model process with stakeholder, benefiter and value model. This study concludes with implications of the study results as well as limitations and future research directions.

Privacy Model based on RBAC for U-Healthcare Service Environment (u-헬스케어 환경에서 환자의 무결성을 보장하는 RFID 보안 프로토콜)

  • Rhee, Bong-Keun;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.605-614
    • /
    • 2012
  • Nowadays u-healthcare which is very sensitive to the character of user's information among other ubiquitous computing field is popular in medical field. u-healthcare deals extremely personal information including personal health/medical information so it is exposed to various weaknees and threats in the part of security and privacy. In this paper, RFID based patient's information protecting protocol that prevents to damage the information using his or her mobile unit illegally by others is proposed. The protocol separates the authority of hospital(doctor, nurse, pharmacy) to access to patient's information by level of access authority of hospital which is registered to management server and makes the hospital do the minimum task. Specially, the management server which plays the role of gateway makes access permission key periodically not to be accessed by others about unauthorized information except authorized information and improves patient's certification and management.

Configuration of clustering and routing algorithms for energy efficiency by wireless sensor network in ship (선박 내 무선 센서 네트워크에서 에너지 효율을 위한 클러스터링 및 라우팅 알고리즘의 구성)

  • Kim, Mi-jin;Yu, Yun-Sik;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.435-438
    • /
    • 2012
  • Today, In all fields, As combination of ubiquitous computing-based technologies between electronic space and physical space, has been active trend research about wireless integration sensor network between sensors and wireless technology. Also, but in ship is underway research about Ship Area Network(SAN) of intelligent ship to integrate wireless technology, ship is required SAN-bridge technology of a variety of wired, wireless network integration and heterogeneous sensor and interoperability of the controller and SAN configuration management technology of remote control. Ship keep safe of all the surrounding environment including crew besides structural safety and freight management monitoring. In this paper, for monitoring design such as on climate change detection and temperature, pressure about various structures, there identify technology trends for routing and data aggregation to use energy efficiency in wireless sensor network. And to analyze self-organizing clustering method, study For wireless sensor network configuration in ship.

  • PDF

A Study On The Wearable Embedded System Platform (입을 수 있는 내장형 시스템 플랫품에 관한 연구)

  • Yoo, Jin-Ho;Jeong, Hyun-Tae;Cho, Il-Yeon;Lee, Sang-Ho;Han, Dong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12B
    • /
    • pp.831-837
    • /
    • 2005
  • Personal general purpose computer(PC) has been evolved from desktop to portable mobile device such as tablet PC and PDA. Technology innovation on semiconductor have made it possible to package a reasonably Powerful Processor and memory subsystem with advanced input/output devices. At last these subsystems are miniaturized into wearable system. Wearable computer has recently gained attention as the post PC in the ubiquitous environment. Wearable computing becomes more and more feasible and receives growing attention throughout industry and the consumer marketplaces. This paper proposed and developed WPS that has multimedia features and network features as a wearable embedded platform. We explain the form, overall architecture, functions and user applications of this WPS. This paper also discusses the form of next generation computer platform with intuitive user interfaces and well designed applications in the future.

A Recommendation System using Context-based Collaborative Filtering (컨텍스트 기반 협력적 필터링을 이용한 추천 시스템)

  • Lee, Se-Il;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.2
    • /
    • pp.224-229
    • /
    • 2011
  • Collaborative filtering is used the most for recommendation systems because it can recommend potential items. However, when there are not many items to be evaluated, collaborative filtering can be subject to the influence of similarity or preference depending on the situation or the whim of the evaluator. In addition, by recommending items only on the basis of similarity with items that have been evaluated previously without relation to the present situation of the user, the recommendations become less accurate. In this paper, in order to solve the above problems, before starting the collaborative filtering procedure, we calculated similarity not by comparing all the values evaluated by users but rather by comparing only those users who were above the average in order to improve the accuracy of the recommendations. In addition, in the ceaselessly changing ubiquitous computing environment, it is not proper to recommend service information based only on the items evaluated by users. Therefore, we used methods of calculating similarity wherein the users' real time context information was used and a high weight was assigned to similar users. Such methods improved the recommendation accuracy by 16.2% on average.

A Suggestion for Adaptation of U-Learning in Inclusive Education (U-러닝시스템의 통합교육에의 적용을 위한 제언)

  • Kim, Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.295-302
    • /
    • 2007
  • The environment of education has been undergoing dramatic developments in recent years with the development of information technology such as digital information transfer, storage and communication methods. Education and training technology is constantly evolving and growing. Because we continually meet the new and interesting advances in our world. The evolution in education and training at a distance can be characterized as a move from traditional learning to u-learning. This paper concerns with the application of u-based education methodology for people with disabilities targeting to empower them. Instead of the classic educational support such as extended time to take exams, a reader and/or scribe to assist with exams and note taking services. In this paper, we introduce the definition of inclusion and disabilities which does not been fully understood what they mean and then possible implementing materials which can empower the students with disabilities with accomplishments. We would like to point out that we concentrate on the aspects of instructional science particularly related with inclusive classes.

  • PDF

Discovery of Behavior Sequence Pattern using Mining in Smart Home (스마트 홈에서 마이닝을 이용한 행동 순차 패턴 발견)

  • Chung, Kyung-Yong;Kim, Jong-Hun;Kang, Un-Gu;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.19-26
    • /
    • 2008
  • With the development of ubiquitous computing and the construction of infrastructure for one-to-one personalized services, the importance of context-aware services based on user's situation and environment is being spotlighted. The smart home technology connects real space and virtual space, and converts situations in reality into information in a virtual space, and provides user-oriented intelligent services using this information. In this paper, we proposed the discovery of the behavior sequence pattern using the mining in the smart home. We discovered the behavior sequence pattern by using mining to add time variation to the association rule between locations that occur in location transactions. We can predict the path or behavior of user according to the recognized time sequence and provide services accordingly. To evaluate the performance of behavior consequence pattern using mining, we conducted sample t-tests so as to verify usefulness. This evaluation found that the difference of satisfaction by service was statistically meaningful, and showed high satisfaction.

Energy-Effective Low-Cost Small Mobile Robot Implementation for Mobile Sensor Network (모바일 센서 네트워크를 위한 에너지 효율적이고 경제적인 소형 이동 로봇의 개발)

  • Kim, Hong-Jun;Kim, Byung-Kook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.3
    • /
    • pp.284-294
    • /
    • 2008
  • In this paper, we describe an implementation of small mobile robot that can be used at research and application of mobile sensor networking. This robot that will constitute the sensor network, as a platform of multi-robot system for each to be used as sensor node, has to satisfy restrictions in many aspects in order to perform sensing, communication protocol, and application algorithms. First, the platform must be designed with a robust structure and low power consumption since its maintenance after deployment is difficult. Second, it must have flexibility and modularity to be used effectively in any structure so that it can be used in various applications. Third, it must support the technique of wireless network for ubiquitous computing environment. At last, to let many nodes be scattered, it must be cost-effective and small. Considering the above restrictions of the mobile platform for sensor network, we designed and implemented robots control the current of actuator by using additional circuit for power efficiency. And we chose MSP430 as MCU, CC2420 as RF transceiver, and etc, that have the strength in the aspect of power. For flexibility and modularity, the platform has expansion ports. The results of experiments are described to show that this robot can act as sensor node by RF communication process with Zigbee standard protocol, execute the navigation process with simple obstacle avoidance and the moving action with RSSI(Received Signal Strength Indicator), operate at low-power, and be made with approx. $100.

Cross-layer Design and its Performance Evaluation of Joint Routing and Scheduling for Maximizing Network Capacity of Wireless Mesh Networks (무선 메쉬 네트워크의 최대 전송 성능을 위한 라우팅과 스케쥴링의 계층 교차적 설계 및 성능 분석)

  • Min, Seokhong;Kim, Byungchul;Lee, Jaeyong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.30-45
    • /
    • 2014
  • Recently, multimedia application users who demand for ubiquitous computing environment are rapidly increasing, and wireless mesh network is receiving attention as a cost-effective key technology for next generation wireless networking. When multiple flows are transmitting data at the same time in the network, routing for path selection of each flow and link resource allocation for data transmission of each flow are one of the key factors that influence to the effectiveness of the network directly. In this paper, we consider problems for path discovery and resource allocation of links at the same time and we propose an algorithm based on mathematical modeling using a technique for cross-layer optimization design in STDMA-based wireless mesh networks that can enhance transfer performance for each flow. We show by performance analysis that the proposed algorithm can enhance the throughput performance by maximally utilizing given bandwidth resources when the number of flows increase in multi-hop wireless mesh networks.

Method to Reduce the Time when Identifying RFID Tag by using Computational Grid (계산 그리드를 이용한 대량의 RFID 태그 판별 시간 단축 방법)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.547-554
    • /
    • 2010
  • RFID is core technology to lead ubiquitous computing, and attract the notice of the world. It also improves social transparency, creates employment, and invigorates the allied industries. However, The technical characteristic with RFID has some problems with security and privacy. The commercialization of RFID is delayed due to these problems. This paper introduces the technical method to find solutions about an invasion of privacy to be due to introduce RFID system. First, this method applies Hash-Chain proposed by M. Ohkubo and some other researchers. The more tags increase, the more it demands lots of computation time. We divide SPs equally to solve these problems. And then, We'll suggest solutions to shorten the identification time of tag by implementing SPs with multi nodes of Grid environment at the same time. This makes it possible to keep the privacy protection of RFID tag, and process RFID tag in real time at the same time.