• Title/Summary/Keyword: Ubiquitous network

Search Result 1,672, Processing Time 0.036 seconds

Ubiquitous Computing and Statistics; What's the Connection?

  • Jun, Sung-Hae;Jorn, Hongsuk
    • Communications for Statistical Applications and Methods
    • /
    • v.11 no.2
    • /
    • pp.287-295
    • /
    • 2004
  • Mark Weiser introduced ubiquitous computing in his article titled 'The computer for 21st Century' in 1991. This has been new paradigm after internet. Now, the rapid development of mobile computer, wireless network, and intelligent system has supported ubiquitous computing environment. In the related area of information science, the researchers have studied on ubiquitous computing. But in the field of Korea statistics, this research has not been worked yet. So, we proposed the connection between statistics and ubiquitous computing in this paper. As an example, we showed an efficient cache hoarding for ubiquitous computing using statistical methods. In experimental results, we verified our proposed issue.

A Structure of University Library for Ubiquitous Environment (유비쿼터스 환경에서의 대학도서관 조직)

  • Hong, Mi-Ra;Moon, Sung-Been
    • Journal of Information Management
    • /
    • v.35 no.3
    • /
    • pp.75-107
    • /
    • 2004
  • The concept of "ubiquitous", which has been recently discussed in several industries, implies accessing a network using a computer from anywhere at anytime. The ubiquitous technology has been widely researched for distribution, construction, and medical treatments. Now, it has extended its application to libraries. The ubiquitous technology currently applied to a number of national libraries calls for a systematic study of an ubiquitous library. This thesis aims at presenting a model of introducing the ubiquitous technology to university libraries.

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF

Context Adaptive User Interface Generation in Ubiquitous Home Using Bayesian Network and Behavior Selection Network (베이지안 네트워크와 행동 선택 네트워크를 이용한 유비쿼터스 홈에서의 상황 적응적 인터페이스 생성)

  • Park, Han-Saem;Song, In-Jee;Cho, Sung-Bea
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.573-578
    • /
    • 2008
  • Recently, we should control various devices such as TV, audio, DVD player, video player, and set-top box simultaneously to manipulate home theater system. To execute the function the user want in this situation, user should know functions and positions of the buttons in several remote controllers. Normally, people feel difficult due to these realistic problems. Besides, the number of the devices that we can control shall increase, and people will confuse more if the ubiquitous home environment is realized. Therefore, user adaptive interface that provides the summarized functions is required. Moreover there can be a lot of mobile and stationary controller devices in ubiquitous computing environment, so user interface should be adaptive in selecting the functions that user wants and in adjusting the features of UI to fit in specific controller. To implement the user and controller adaptive interface, we modeled the ubiquitous home environment and used modeled context and device information. We have used Bayesian network to get the degree of necessity in each situation. Behavior selection network uses predicted user situation and the degree of necessity, and it selects necessary functions in current situation. Selected functions are used to construct adaptive interface for each controller using presentation template. For experiments, we have implemented ubiquitous home environment and generated controller usage log in this environment. We have confirmed the BN predicted user requirements effectively as evaluating the inferred results of controller necessity based on generated scenario. Finally, comparing the adaptive home UI with the fixed one to 14 subjects, we confirmed that the generated adaptive UI was more useful for general tasks than fixed UI.

  • PDF

Rule-based network fault self-recovery system (규칙 기반의 네트워크 장애 자기 복구 시스템)

  • Lee, Jae-Wook;Ahn, Seong-Jin;Chung, Jin-Wook
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.10 no.1
    • /
    • pp.83-93
    • /
    • 2006
  • This paper introduces rule-based reasoning (RBR) based self-recovery system for network fault in ubiquitous computing. This system is fault management system for fault recovery of rule-based for self-recovery in ubiquitous computing environment. We proposed rules of network fault recovery applied the system as a distinguished reason of network fault. And, in this paper, the network fault self-recovery system proved the rules that applied each situatpion through the simulation.

  • PDF

Echelons Scale Identification Scheme of Surveillance and Reconnaissance Sensor Network (감시정찰 센서네트워크에서 제대규모 식별 기법)

  • Choi, Ji-Hye;Kwon, Tae-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.438-444
    • /
    • 2010
  • Surveillance and reconnaissance sensor network system is an application system based on ubiquitous sensor network technology. This technique is to avoid accidental close combat, to minimize the consumption of limited military resources and personnel, and to provide battlefield situational awareness information for the unit's future combat missions. In this paper, we have proposed a echelons scale identification scheme based on information obtained from surveillance and reconnaissance sensor network system.

Method of Profile Storage for Improving Accuracy and Searching Time on Ubiquitous Computing

  • Jang, Chang-Bok;Lee, Joon-Dong;Lee, Moo-Hun;Cho, Sung-Hoon;Choi, Eui-In
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1709-1718
    • /
    • 2006
  • Users are able to use the information and service more free than previous wire network due to development of wireless network and device. For this reason, various studies on ubiquitous networks have been conducted. Various contexts brought in this ubiquitous environment, have recognized user's action through sensors. This results in the provision of better services. Because services exist in various places in ubiquitous networks, the application has the time of services searching. In addition, user's context is very dynamic, so a method needs to be found to recommend services to user by context. Therefore, techniques for reducing the time of service and increasing accuracy of recommendation are being studied. But it is difficult to quickly and appropriately provide large numbers of services, because only basic context information is stored. For this reason, we suggest DUPS(Dimension User Profile System), which stores location, time, and frequency information of often used services. Because previous technique used to simple information for recommending service without predicting services which is going to use on future, we can provide better service, and improve accuracy over previous techniques.

  • PDF

Technical Trends of Ubiquitous Home in Korea and Japan (국내 및 일본의 유비쿼터스 홈 기술 동향)

  • Lim Shin-Young;Huh Jae-Doo
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.1
    • /
    • pp.102-115
    • /
    • 2004
  • Recently, the cooperation among Korea, Japan, and China for the standardization of information technology is very well done due to the mutual countries' interests. Especially, in the field of digital home, that is consisted of next generation digital home technology and service based on the ubiquitous computing, the Korea and Japan have endeavored for several years, and now they are in good will competition in technology and the mutual cooperation for the standardization. In this article, the current trends of Japanese and Korean technology and service in ubiquitous home are discussed. From this discussion, the comparison between Japan and Korea will be used for the industrialization based on the best aspects from the view points of each other's technology and approach.

  • PDF

An Application of Ubiquitous Information Technology for Integrated Management of National Park (국립공원 통합관리를 위한 유비쿼터스 정보기술 활용방안)

  • Bae, Min-Ki
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.10 no.3
    • /
    • pp.134-148
    • /
    • 2007
  • There is not enough knowledge on how to use, build, and apply ubiquitous technologies such as the ubiquitous sensor network, GIS, statistic analysis system, mobile GPS system etc. Also there are other questions such as, how should the knowledge information resources be managed and web decision making system developed for national park management. The purpose of this study is to propose a framework for the national park integrated management system based on ubiquitous information technology. This study will include followings: 1) this study explores what ubiquitous information technologies are needed for national park management, 2) this study proposes building strategies about the spatial and attribute database using ubiquitous information technologies, and links methods among geographic information system, analysis program, sensor network, etc. The results of this study will contribute towards deciding a direction for national park policy in preparation for the ubiquitous computing oriented society.

  • PDF

An Efficient Resource Allocation Algorithm for Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크를 위한 효율적인 자원할당 알고리즘)

  • Hwang, Jeewon;Cho, Juphil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2769-2774
    • /
    • 2013
  • The key of USN(Ubiquitous Sensor Network) technology is low power wireless communication technology and proper resource allocation technology for efficient routing. The distinguished resource allocation method is needed for efficient routing in sensor network. To solve this problems, we propose an algorithm that can be adopted in USN with making up for weak points of PQ and WRR in this paper. The proposed algorithm produces the control discipline by the fuzzy theory to dynamically assign the weight of WRR scheduler with checking the Queue status of each class in sensor network. From simulation results, the proposed algorithm improves the packet loss rate of the EF class traffic to 6.5% by comparison with WRR scheduling method and that of the AF4 class traffic to 45% by comparison with PQ scheduling method.