• Title/Summary/Keyword: ubiquitous age

Search Result 117, Processing Time 0.026 seconds

Implementation of IPv6 Neighbor Discovery Protocol supporting CGA

  • Kim Joong Min;Park In Kap;Yu Jae Wook
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.571-575
    • /
    • 2004
  • Having age of ubiquitous ahead, existing IPv4's address space insufficiency phenomenon appears because of increasing network usage as well as multimedia data transmission becomes much, necessity of new IP address system that guarantee QoS are needed. IPv6 was made to solve these problem. IPv6 solves address space insufficiency phenomenon offering by 128bit address space, and also offers hierarchical address layer that support improved QoS. IPv6 defines relation between surrounding node using Neighbor Discovery protocol. Used Neighbor Discovery messages, grasp surrounding node, include important informations about network. These network information outcrops can give rise in network attack and also service that use network will paralysis. Various kinds of security limitation was found in Present Neighbor Discovery protocol therefore security function to supplement tris problem was required. In this thesis, Secure Neighbor Discovery protocol that add with security function was design and embody by CGA module and SEND module.

  • PDF

IMPLEMENTATION OF STRUCTURAL DIAGRAM FOR INTELLECTUAL PROPERTY MANAGEMENT AND PROTECTION(IPMP)

  • Park, Jung-Hee;Lee, Ki-Dong;Lee, Sang-Jae
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.435-448
    • /
    • 2004
  • While Internet promises ubiquitous access, it also creates a fundamental challenge to the traditional ownership toward digital assets traded in e-commerce market. Sharing digital information freely through shared networks leads to many untapped business opportunities, but uncontrolled digital asset transaction undermines many electronic business models. Thus, in this Internet age, proper protection and safe delivery of Intellectual Property (IP) and its representation as digital assets would be a crucial ingredient of building trust in upcoming e-business environment. In this paper, we give a general structural diagram of Intellectual Property Management and Protection (IPMP) and implement an IPMP prototype based on the RSA encryption algorithm and XrML (eXtensible rights Markup Language) WORK tags to show how proper protection and safe delivery of the intellectual property is achieved. This study concludes that IPMP mechanism may contribute significantly to the volume and quality of e-commerce market.

  • PDF

A Study of Computer-Creativity Development for Bringing up of Creative Man of Ability in the Ubiquitous Age (유비쿼터스 시대의 창의적 인재양성을 위한 컴퓨터 창의성 개발에 관한 연구)

  • Kim, Woo-Kyung;Kim, Jong-Jin;Kim, Jong-Hoon
    • 한국정보교육학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.193-201
    • /
    • 2005
  • 제 3의 혁명이라 불리고 IT 분야의 새로운 패러다임으로써 부각되는 유비쿼터스 패러다임의 도래에 따른 컴퓨터 교육의 방향을 모색함과 동시에 유비쿼터스 패러다임을 반영한 컴퓨터 창의성 개발 과정을 설계하여 적용해 보고자 한다. 유비쿼터스 패러다임을 반영한 컴퓨터 창의성 개발은 창의적인 마인드와 사고를 지닌 미래 유비쿼터스 시대를 담당할 창의적인 인재를 육성하는데 그 목적이 있다. 따라서 유비쿼터스 시대의 IT 동향과 발전 방향을 이해하고, 실제 유비쿼터스가 구현되는 생활 모습을 통하여 우리 생활과 유비쿼터스와의 관계를 더욱 창의적인 시각에서 바라볼 수 있도록 하는데 역점을 두었다. 또한 미래의 유비쿼터스를 예견해 보는 과정을 통하여 제기되는 여러 가지 문제를 찾고 그 해결 방안을 모색해 봄으로써 학습자 자신이 미래 유비쿼터스 시대를 만들어 나가는 주역임을 스스로 깨닫도록 하는데 역점을 두어 교육 과정을 설계해 보았다.

  • PDF

A Study on Space Requirement and Planning for Residents Characteristics (거주자 특성에 따른 아파트 각 실의 요구 및 계획방향에 관한 연구)

  • Oh, Hye-Kyung;Hong, Yi-Kyung
    • Journal of Families and Better Life
    • /
    • v.26 no.6
    • /
    • pp.159-166
    • /
    • 2008
  • According to the change in diverse tendency of residents, construction companies has developed the brands of apartments with the concepts of LOHAS, well-being, ubiquitous, etc. The purpose of this study was to suggest space requirement and planning for residents characteristics. The questionnaire survey was adopted in this study and 252 cases were used for data analysis. The survey analysis has been made by using of SPSS WIN 12.0. The major findings were as follows; (1) Resident opinion about the direction of each space was investigated into the need of South-facing in master bedroom highly. (2) The residents didn't want to decrease the current size of each space, the space which wanted to increase was livingroom. (3) The significant variables of space requirement and planning for residents characteristics were family life cycle, the age of householder, the occupation of householder, the size of apartment.

A designed u-Printing Server based on Location Information (위치 정보 기반의 프린팅 서버 설계)

  • Kwon, Hoon;Kim, Jeoung-Hee;Kwak, Ho-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.764-767
    • /
    • 2008
  • In the age of ubiquitous computing, computer systems will be seamlessly integrated into our everyday life, providing services and information to us in an anywhere, anytime fashion. In this paper, A designed u-Printing Server based on Location Information(u-PSbLI). User location and data sending to u-PSbLI, searching neighboring resource suggest on printing through Internet Printing Protocol(IPP).

  • PDF

Development of Concrete IoT Management System using internal of things technique (IoT 기술을 활용한 콘크리트 초기 품질관리 시스템(CIMS)의 개발)

  • Seo, Hang-Goo;Sin, Se-Jun;Lee, Young-Jun;Hyun, Seung-Yong;Han, Min-Cheol;Han, Cheon-Goo
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2019.05a
    • /
    • pp.61-62
    • /
    • 2019
  • With development of IT technology, the ubiquitous has been realized in various industry. In construction industry, as well, end-edge techniques have been introduced such as managing technique the temperature and compressive strength of the concrete placed in structure in domestic and abroad project sites. However, several problems were found during application at the actual field regarding difficulties of connecting Bluetooth communication due to the short communication range, diffuse reflection caused by aluminum formwork, and high cost by using one-time sensor. Therefore to recover these shortages, and improve the performances, the wireless sensor network based concrete IoT management system for concrete early-age quality management was developed.

  • PDF

A Proposal of Intellect Database Using Bluetooth (BlueTooth를 이용한 지능형 데이터베이스 제안)

  • Kong Whue-Sik;Han Sang-Woo;Choi Jong-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.328-331
    • /
    • 2006
  • In Ubiquitous age, data collection that using wireless sensor node is increasing necessity. In this paper, collect data because uses PIC16F877 and Bluetooth, and constructs database in PC. The PIC16F877 is control radio sensor node. The PC construct to propose algorithm that updates control data with table. It is changes sensing cycle time of node into intelligence style because compare collected data of DB. Result of study inexpensive , and practical, and I can apply to industry spot constructing system briefly.

  • PDF

MA : Multiple Acknowledgement Mechanism for UWSN (UnderWater Sensor Network)

  • Shin, Soo-Young;Lee, Seung-Joo;Park, Soo-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.12
    • /
    • pp.1769-1777
    • /
    • 2009
  • With the advent of the ubiquitous technology age, the progress of network technology has enabled a robust sensor communication, not just in cities, but also in poor surroundings such as deserts, polar regions, or underwater environments. In this paper, we propose a Multiple Acknowledgement (MA) technique to replace the conventional Automatic Repeat request (ARQ) technique. The MA mechanism is to send an Ack to many receivers simultaneously. The CH (master, coordinator) of the unit cluster broadcasts a Beacon frame where Ack information of the previously transmitted data is included. This technique can reduce the number of transmissions and overhead significantly. The proposed technique is a scheme improving the efficiency of an underwater sensor network where the uplink data transmission is the mainstream. The Performance of the ARQ, Block Ack, Pervasive Block Ack and the proposed method were compared with one another and analyzed. The proposed method showed significant performance improvement as compared with the ARQ, BA, and PBA in its channel efficiency.

  • PDF

The Algorithm for Selecting Parking Lots Considering Drivers' Preference (운전자 선호를 고려한 주차장선택 알고리즘)

  • Jo, Mi-Jeong;Park, Chang-Ho;Lee, Sung-Mo
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.3
    • /
    • pp.223-232
    • /
    • 2008
  • It can be expected, recently, that the traffic congestion grows worse because the 48% of passenger cars are concentrated in the metropolitan area. However, there is an enforcement regulation that must limit onsite parking lot establishment in some downtown, so it is forecasted that parking lot supply is insufficient. Therefore, this study concentrate upon the subject that solves the problem which drivers are difficult to find parking lots because of increasing demand for parking. This study includes the concept about walking distance because the choice of parking lots is happened within walking distance. The algorithm of this study applies to toy-network, and then this study analyze the result of toy-network. It is proper to consider user's preference because the patterns of choice are different. Moreover, this study suggests the vision that will can offer drivers more correct information by real time information sharing in course of ubiquitous age.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF