• Title/Summary/Keyword: ubiquitous Korea

Search Result 3,093, Processing Time 0.037 seconds

Ubiscript: A Script Language for Ubiquitous Environment

  • Lee, Min-Kyu;Han, Dong-Soo
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.2
    • /
    • pp.141-149
    • /
    • 2011
  • Many distributed and heterogeneous services and devices are accessible in ubiquitous computing environment, so interoperating those services and devices is one of the key tasks in implementing ubiquitous applications. We used to use script languages in integrating such interoperating components and services. However currently available most script languages are not suitable for ubiquitous environment because there are so diverse forms of interoperation targets such as service objects, web, legacy objects and programmable devices. So it is worthwhile designing a new script language well-suited to ubiquitous environment. In this paper, we propose a new script language, called Ubiscript, for the ubiquitous environment. We develop and adopt several unique language features such as remote scope, multiple contexts, web and legacy objects, remote exception handling, etc. in Ubiscript to overcome the limitations of conventional script languages. In this paper, we also describe the implementation of Ubiscript and its runtime system. A couple of ubiquitous applications were developed in Ubiscript, and the applications are tested on the runtime system. According to our experiences and evaluation, Ubiscript turned out to have a high potential in its expression power and contribution to improving ubiquitous application developers' productivity.

The Sensor Network based Home Control System: Supporting the Next Generation Home Gateway System for a Ubiquitous Home Environments

  • Park, Young-Choong;Ahn, Yang-Keun;Choi, Kwang-Soon;Jung, Kwang-Mo;Kim, Seong-Dong
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.1 no.1
    • /
    • pp.23-27
    • /
    • 2007
  • Fruition for a diverse uIT(Ubiquitous Information Technology) service is currently required through the convergence of what is known as ubiquitous computing technology. In recent years, with the rapid growth of the need for information services, heavier demands have been made upon the supply of high-quality multimedia services that require a high bandwidth. Today, various home network solutions have been proposed to manage these service smoothly and a system able to deal with various types of network traffic without delays. In addition, in established home network environments that mix wired and wireless networks, along with the steady evolution of wireless network technology and the earnest development of ubiquitous computing technology, sensor-based wireless networks have emerged as a core solution for home networks. In this paper, a sensor network-based home control system supporting the next generation home gateway system for ubiquitous home environments is designed and implemented.

  • PDF

Reliability of the Ubiquitous Home-Based Simulator Developed for the Eerror Control (유비쿼터스 홈 기반의 신뢰성 제공을 위한 오류 제어 시뮬레이터 개발)

  • Lee, Si-Heung;Kim, Hong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5885-5894
    • /
    • 2011
  • Ubiquitous environment is expected to be result of researches and studies in ubiquitous home base on. However, because of the complexity of the ubiquitous home base on, the realization of error handling seems impossible. In this paper, we present how to detect and recover from these errors for the Ubiquitous Home utilizing a fault simulator developed for the study and through a variety of experiments, results were discussed and analyzed. Base on the said results, future works are also discussed.

A Structural Model on Usage Behavior of Ubiquitous Campus Service (유비쿼터스 특성이 U-서비스 이용에 미치는 영향: U-캠퍼스 환경을 중심으로)

  • Park, Cheol;You, Jae-Hyun
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.81-99
    • /
    • 2006
  • Recently, the area of ubiquitous has gained a great attention both in academics and in business organizations as we are entering an ubiquitous society where people can interact at "anytime" and "anywhere". To preoccupy the leading status for the next generation of IT technology, many countries such as Korea, Japan, and US are concerned the ubiquitous. In this tendency, companies want to identify what factors make people use ubiquitous in order to develop the effective ubiquitous service and to supply the higher quality service. However, prior researches on ubiquitous are focused on technical area such as higher data delivery, efficient compression of images, so they do not have given companies beneficial materials for making fascinating ubiquitous services. To offer the service materials for development, from the viewpoint of the customer, important factors to use ubiquitous services are investigated in this study. Moreover, the study was progressed up to the new area of investigation how much these factors influenced ubiquitous service actual usage. To achieve these goals, Ubiquitous service adopting reflected in ubiquitous service characteristics was suggested in this study. The results of this study are as follows. First, contextual offer, ubiquity, invisibility are positively related to perceived value. Second, perceived value is positively related to usage intention but perceived risk is negatively related to usage intention. Third, usage intention is positively related to usage frequency. Based on these results, managerial implications for ubiquitous service vitalization are discussed. Lastly, the limitation of this research and further research issues are suggested.

Requirements Analysis for Access Control Model on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 접근제어 모델을 위한 요구사항 분석)

  • Oh Sejong;Park Jeho
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.563-570
    • /
    • 2004
  • Ubiquitous computing environment requires strong security and privacy. Access control is one of security areas. Access control on Ubiquitous computing is different from it on traditional information systems so that traditional access control models are not suitable for Ubiquitous comput-ing environment. This research defines Ubiquitous computing environment as an access control point of view, and shows requirements to consid-er for developing access control model for Ubiquitous computing environment. It also brings up three implementing types of access control on Ubiquitous computing environment.

The Impact of Ubiquitous Factors on Intention to Use Mobile Services (유비쿼터스 특성요인이 모바일 서비스의 사용의도에 미치는 영향)

  • Cha, Yoon-Sook;Chung, Moon-Sang
    • The Journal of Information Systems
    • /
    • v.16 no.2
    • /
    • pp.69-91
    • /
    • 2007
  • The mobile computing environment has already matured and mobile services are activated throughout many industries. In the following years, these changes are expected to evolve into a ubiquitous computing environment. In the meantime, whether newly developed information technologies will thrive or diminished depends on user's intention to adopt them. Hence, the necessity of user-centered research considering ubiquitous computing in mobile computing environment is obvious. This study, thus, investigated ubiquitous factors in various literature related to ubiquitous computing and technology acceptance and it proposes a research model of the ubiquitous factors affecting user's intention to use mobile services, in terms of meaning(connectivity, mobility), service(contextual offer), compatibility(compatibility), and infrastructure(privacy, truth). The proposed model is expected to help both researchers and practitioners extend their understanding about the ubiquitous factors in mobile computing environment

  • PDF

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF

A Study on Factors Affecting the Continued Usage Intention of Ubiquitous Services (유비쿼터스 서비스의 지속적 이용의도에 영향을 미치는 요인에 관한 연구: 유비쿼터스 시스템적 특성과 서비스 품질 요인을 중심으로)

  • Jang, Ki-Sup;Kim, Ki-Su
    • The Journal of Information Systems
    • /
    • v.17 no.3
    • /
    • pp.175-204
    • /
    • 2008
  • Ubiquitous computing is enhancing computer use by making many computers available throughout the physical environment without being noticed to the users. To facilitate successful adoption and diffusion of ubiquitous systems, it is important to find out the factors affecting their uses. Although researches related to ubiquitous computing have been vigorously conducted from the aspect of system and service provider, there have been very few studies that focus on the user's perspective. This study attempts to find out major factors which are dedicated to the development of ubiquitous systems and services and the relationships between these factors and user satisfaction factors. This study derived the specific factors that characterize ubiquitous services, such as ubiquity, contextual offer, user affinity, privacy, reliability, responsiveness, assurance, and empathy. We also considered service quality factors of ubiquitous services. Then these factors were combined with the Expectation Confirmation Theory (ECT) model and the path analysis was applied to find out the factors affecting user satisfaction and the intention to use the systems. The research findings indicate that ubiquity, contextual offer, privacy, reliability, and responsiveness affect the perceived usefulness. The perceived ease of use and confirmation were found to affect the perceived usefulness. The perceived usefulness, perceived ease of use, and confirmation fumed out to influence the satisfaction. It turned out that the result of this study on the relationship between the perceived usefulness and user satisfaction was identical with the findings in previous related ECT researches. We think this study makes two significant contributions to the development of ubiquitous services. First, this study provides basic implications for better ubiquitous services by considering important characteristics of ubiquitous systems as services. Second, this study also suggests important factors that need to be considered when ubiquitous service providers develop new ubiquitous services to improve user satisfaction and the intention to use the services.

Design and Implementation of an Ubiquitous Manufacture Execution System based on RFID/USN (RFID/USN 기반의 유비쿼터스 제조실행시스템 설계 및 구현)

  • Jung, Se Hoon;Kim, Kyung Jong;Sim, Chun Bo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.21-31
    • /
    • 2010
  • A manufacturing execution system in the process according to automation system of installation management has been growing interest about effective system design and effective system manage. In this paper, we propose an ubiquitous Manufacturing Execution System based on RFID/USN for checkup monitoring and history management of installation in manufacturing execution systems. For this, we design and implement installation history and statistics management system based on RFID grafting RFID for efficient installation equipment history and statistics management of ubiquitous Manufacturing Execution System, and was implemented checkup monitoring system based on USN using temperature sensor, humidity sensor, hydraulic pressure sensor for failure prevention of ubiquitous Manufacturing Execution System. And proposed ubiquitous Manufacturing Execution System is implemented based on JSP for access through Web in real time.

A Study on Organizational Structure and Computer Security Systems in Ubiquitous Environments (유비쿼터스 서비스 경영 환경에서 조직 구조 및 컴퓨터 보안 시스템에 관한 연구 - 외식 업체 적용 방안을 중심으로 -)

  • Yi, Myoung-Hee;Yu, Jae-Eon;Jung, Chang-Duk
    • Culinary science and hospitality research
    • /
    • v.13 no.4
    • /
    • pp.305-316
    • /
    • 2007
  • This paper examines that a desirable organizational structure for a security policy in ubiquitous environments that are based on users' need to know and do their tasks in organizations. Tasks are a common entity which already exit and relate directly to both users(who are assigned to tasks and to information required for the completion of a task). Ubiquitous is highlighted as IT paradigm of the future generation. We propose a security model, called the Ubiquitous Group Security Model(UGSM), which associates with a task of processing the information which users need to know. The access type specification restricts the operations that users are permitted to perform, as defined by users' need to do for achieving their tasks in organizations.

  • PDF