• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.035 seconds

A Service Identification Scheme for the Convergence of Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크 융합을 위한 서비스 식별 체계)

  • Uhm, Huy-Jung;Eun, Seong-Bae;Jun, Jung-Ho;Kang, Gwon-U;Ju, Yong-Wan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.104-113
    • /
    • 2011
  • While converging USN Services, a single physical infrastructure can be used in several services and in several physical infrastructures can make up a single service. Therefore the physical infrastructure and service have to manage separately for effective convergence of USN Services. However, established Identification Scheme is not suitable to distinguish various services that USN provides. This paper suggests USN Service Identification Scheme that can be separated and managed. Through USN Service Identification Scheme suggested, firstly, it is possible to obtain Service Identification Scheme utilizing various technology such as RFID TAG, QR Code, radio broadcasting, etc. because it is possible to process USN Service Identification Scheme. Secondly, it is easy to mange the service, develope the user application program and interlock with established USN Standard technique as view from service provider. Thirdly, it is possible to manage systematically USN Service. Fourthly, users can search USN Service easily, so it can contribute actively for invigoration of USN service. This thesis, firstly, has analyzed about standard related USN Service and USN Identification Scheme. Secondly, this has suggested brand-new USN Service Identification Scheme based on established USN Identification Scheme.

A Study on The Complex Event Detection Methods Based on Bitmap Index for Stream data Processing (스트림 데이터 처리를 위한 비트맵 인덱스 기반 복합 이벤트 검출 기법에 관한 연구)

  • Park, Yong-Min;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.4
    • /
    • pp.61-68
    • /
    • 2011
  • Event-based service technology integrate service to detect events that occur in real time by analyzing the response. Is the core technology for real-time business and ubiquitous service environment construction. Is required event-based service technology on business processes in real-time business environment that providing rapid response to changing and custom service using a variety of information real-time monitoring and analysis in ubiquitous service environment. Last event-driven business processes can be used as a CEP(Complex Event Processing). The core of CEP technology, the event from multiple event sources analysis of events affecting and the way to handle action, is detect complex event to user. In previous studies, an event occurs that continue to perform without the need for partial operations. so many operations and spend a lot of memory is a problem. To solve these problems, event detection technique is proposed that large streams of data without processing any events, registered to configure a complex event occurs when all events in the application layer, complex event processing. The proposed method, first using a bitmap index to manage the event occurs. The complex events of the last event in response to define a trigger event. The occurrence of an event to display a bitmap index, a composite event occurrence of all event to configure the test through the point at which a trigger event occurs. Is proposed, If any event occurs to perform the operation. The proposed scheme perform operations when all event occurs without events having to perform each of the tests. As a result, avoid unnecessary operations and reducing the number of events to handle the increased efficiency of operations.

New Observational Design and Construction Method in Tunnels and Its Application to Very Large Cross Section Tunnel (터널의 신 정보화 설계시공법과 극대단면 터널에의 적용)

  • Hwang Jae-Yun
    • Journal of the Korean Geotechnical Society
    • /
    • v.20 no.7
    • /
    • pp.5-14
    • /
    • 2004
  • The observational design and construction method in tunnels is becoming important recently. In many tunnels, enormous cost and time are consumed to cope with the failing or sliding of rock blocks, which could not be predicted because of the complexity of rock discontinuities. It is difficult to estimate the properties of rock masses before the construction. In this paper, a new observational design and construction method in tunnels are proposed, and then applied to the example of the very large cross section tunnel based on actual discontinuity information observed in situ. The items examined in developing a program for the new observational design and construction method are the following ones: generality, precision, high speed, and friendly usability. At the very large cross section tunnel, 7 key blocks were judged to be unstable because they could not be supported by standard supports. Supplementary supports were installed to these 7 key blocks before the excavation. It is possible to detect key blocks all along the tunnel exactly by using the numerical analysis program developed for the new observational design and construction method in the very large cross section tunnel. This computer simulation method with user-friendly interfaces can calculate not only the stability of key blocks but also the design of supplementary supports.

A Study on Application of Resource Types of RDA to KCR4 (RDA 자원유형의 KCR4 적용에 관한 연구)

  • Lee, Mi-Hwa
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.3
    • /
    • pp.103-121
    • /
    • 2011
  • This study is to seek to apply resource types of RDA to KCR4. It is difficult to choose appropriate term and to embody FRBR model because GMD of KCR4 is the mixture of content-based vocabularies and carrier-based vocabularies. SMD is to need to reflect the current technological terms. Resource type of RDA was already developed to overcome limitation of AACR2's GMD, and would affect the world cataloging environment, therefore it is need to apply resource type of RDA to Korean cataloging rule. For this study, case study and survey were used. In case study, it was to scan all GMD term for one university library to build by programming and to grape librarian and users' potential need. In the survey by cataloging librarian, it was to figure out the current description of resource type in university library and to test RDA resource type. As a result, it was needed to revise the vocabulary to the obvious and user-understandable list. Also it was different in correction rate in RDA testing by resource type. Based on the case study and the survey, RDA resource type was applied to KCR4 resource list by adding term such as computer game in content type, and by inserting terms such as DVD, CD-ROM, Blu-Ray, computer file in carrier type. It also applied RDA description method and display means to KCR4. This study would apply RDA resource type to KCR4 and contribute to revise KCR4 resource type.

Emotional Network System Based On M2P Technology Using Context Awareness (상황인식 기반의 M2P 감성통신 서비스 응용)

  • Ahn, Hyoung-joo;Kim, Ji-man;Choi, Seon-suk;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.48-51
    • /
    • 2013
  • This paper described an emotional communication service based on context awareness. Especially it provides with a natural as-like a person communication in the interactive object service between machine and person. The machine should behave as naturally like human. For these things the service object has to provide the function which analyzing and storing users' behavior and handling it. This paper contains the way how to analyze and handle users' pattern by using context awareness. Furthermore, we have studied the method which makes users feel like talking with machine by re-writing messages through 'purpose-extraction algorithm' and 'message re-writing algorithm', which allow service become M2P on networks environment. Moreover we developed 'message recommending algorithm' which recommend several messages by analyzing users' past messages. This emotional communication technology can provide more efficient and user-friendly service by providing personified service on network. Furthermore we can expect this messenger system provided from emotional communication service based on context awareness can be applied a plenty of application services.

  • PDF

Distance measurement System from detected objects within Kinect depth sensor's field of view and its applications (키넥트 깊이 측정 센서의 가시 범위 내 감지된 사물의 거리 측정 시스템과 그 응용분야)

  • Niyonsaba, Eric;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.279-282
    • /
    • 2017
  • Kinect depth sensor, a depth camera developed by Microsoft as a natural user interface for game appeared as a very useful tool in computer vision field. In this paper, due to kinect's depth sensor and its high frame rate, we developed a distance measurement system using Kinect camera to test it for unmanned vehicles which need vision systems to perceive the surrounding environment like human do in order to detect objects in their path. Therefore, kinect depth sensor is used to detect objects in its field of view and enhance the distance measurement system from objects to the vision sensor. Detected object is identified in accuracy way to determine if it is a real object or a pixel nose to reduce the processing time by ignoring pixels which are not a part of a real object. Using depth segmentation techniques along with Open CV library for image processing, we can identify present objects within Kinect camera's field of view and measure the distance from them to the sensor. Tests show promising results that this system can be used as well for autonomous vehicles equipped with low-cost range sensor, Kinect camera, for further processing depending on the application type when they reach a certain distance far from detected objects.

  • PDF

An Automatic Access Registration System using Beacon and Deep Learning Technology (비콘과 딥러닝 기술을 활용한 전자출입명부 자동등록시스템)

  • Huh, Ji-Won;Ohm, Seong-Yong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.807-812
    • /
    • 2020
  • In order to prevent the national wide spread of the COVID-19 virus, the government enforces to use an electronic access registration system for public facilities to effectively track and manage the spread. Initially, there was a lot of hassle to write a directory, but recently a system for creating an electronic access list using QR codes, what is called KI-Pass, is mainly used. However, the procedure for generating a QR code is somewhat cumbersome. In this paper, we propose a new electronic access registration system that does not require QR code. This system effectively controls the suspicious visitor by using a mask wearing discriminator which has been implemented using deep learning technology, and a non-contact thermometer package. In addition, by linking the beacon, a short-range wireless communication technology, and the visitor's smartphone application, basic information of the facility visitor is automatically registered to KDCA through the server. On the other hand, the user access information registered in the server is encrypted and stored, and is automatically destroyed after up to 4 weeks. This system is expected to be very effective in preventing the spread of other new infectious diseases as well as responding to the coronavirus which is recording a high spread worldwide.

A Study on Low-Cost RFID System Mutual Authentication Scheme using Key Division (키 분할을 이용한 Low-Cost RFID 시스템 상호 인증 방안에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.431-438
    • /
    • 2007
  • RFID system is core technology that construct ubiquitous environment for replacement of barcode technology. Use ratio of RFID system rapidly increase because the technology has many good points such as identification speed, storage space, convenience etc. But low-cost tag operates easily by query of reader, so the system happened user privacy violent problem by tag information exposure. The system studied many ways for security application, but operation capability of low-cost tag is about $5K{\sim}10K$ gates, but only $250{\sim}3K$ gates allocated security part. So it is difficult to apply security to the system. Therefore, this scheme uses dividing 64 bits and reduces arithmetic, so proposed scheme provide mutual authentication that can apply to low-cost RFID system. Existing methods divide by 4 and used 96 bits. However, that reduces 32 bits length for lightweight and reduced from communication number of times of 7 times to 5 times. Also, because offer security by random number than existing scheme that generate two random numbers, that is more efficient. However, uses hash function for integrity that was not offered by XOR arithmetic and added extension of proposed scheme. Extended scheme is not offered efficiency than methods that use XOR arithmetic, but identification distance is mode that is proposed secure so that can use in for RFID system.

Low Power TLB Supporting Multiple Page Sizes without Operation System (운영체제 도움 없이 멀티 페이지를 지원하는 저전력 TLB 구조)

  • Jung, Bo-Sung;Lee, Jung-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.1-9
    • /
    • 2013
  • Even though the multiple pages TLB are effective in improving the performance, a conventional method with OS support cannot utilize multiple page sizes in user application. Thus, we propose a new multiple-TLB structure supporting multiple page sizes for high performance and low power consumption without any operating system support. The proposed TLB is organised as two parts of a S-TLB(Small TLB) with a small page size and a L-TLB(Large TLB) with a large page size. Both are designed as fully associative bank structures. The S-TLB stores small pages are evicted from the L-TLB, and the L-TLB stores large pages including a small page generated by the CPU. Each one bank module of S-TLB and L-TLB can be selectively accessed base on particular one and two bits of the virtual address generated from CPU, respectively. Energy savings are achieved by reducing the number of entries accessed at a time. Also, this paper proposed the simple 1-bit LRU policy to improve the performance. The proposed LRU policy can present recently referenced block by using an additional one bit of each entry on TLBs. This method can simply select a least recently used page from the L-TLB. According to the simulation results, the proposed TLB can reduce Energy * Delay by about 76%, 57%, and 6% compared with a fully associative TLB, a ARM TLB, and a Dual TLB, respectively.

Shared Key and Public Key based Mobile Agent Authentication Scheme supporting Multiple Domain in Home Network Environments (홈 네트워크 환경에서 다중 도메인을 지원하는 공유키 및 공개키 기반의 이동 에이전트 인증 기법)

  • 김재곤;김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.109-119
    • /
    • 2004
  • The home network environment can be defined as a network environment, connecting digital home devices such as computer systems, digital appliances, and mobile devices. In this kind of home network environments, there will be numerous local/remote interactions to monitor and control the home network devices and the home gateway. Such an environment may result in communication bottleneck. By applying the mobile agents that can migrate among the computing devices autonomously and work on behalf of the user, remote interactions and network traffics can be reduced enormously. The mobile agent authentication is necessary to apply mobile agent concept to the home network environments, as a prerequisite technology for authorization or access control to the home network devices and resources. The existing mobile agent systems have mainly used the public key based authentication scheme, which is not suitable to the home network environments, composed of digital devices of limited computation capability. In this paper, we propose a shared key based mobile agent authentication scheme for single home domain and expand the scheme to multiple domain environments with the public key based authentication scheme. Application of the shared key encryption scheme to the single domain mobile agent authentication enables to authenticate the mobile agent with less overhead than the public key based authentication scheme.