• Title/Summary/Keyword: ubiquitous environment

Search Result 1,821, Processing Time 0.029 seconds

A Fundamental Study on the Planning of Classroom Space in the Ubiquitous Environments (유비쿼터스 환경의 교실 공간 계획에 관한 기초적 연구)

  • Cho, Hyun-Ho;Lee, Jae-Hoon
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.14 no.4
    • /
    • pp.4-13
    • /
    • 2007
  • In 21st century, mankind greets an era of ubiquitous computing where physical and virtual space are merged through the innovation of digital and IT(Information Technology), meanwhile ubiquitous computing and network paradigm suggest a new direction which our future educational system should head for. A society where people, computers, and objects can be connected with each other anytime and anywhere, that is, a society of ubiquitous computing where everything in our living space are interconnected by a immense network system may bring a variety of changes into our educational environment in schools. In this study I analysed the forecast of school educational orientation and ubiquitous educational environment and facilities in developed countries, and on the basis of the result, I performed a fundamental work for formation of a ubiquitous classroom environment which is feasible in Korea. In the section of conclusion, I present a model of ubiquitous classroom as a scenario based on ubiquitous computing technology applicable to future classroom environment.

Requirements Analysis for Access Control Model on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 접근제어 모델을 위한 요구사항 분석)

  • Oh Sejong;Park Jeho
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.563-570
    • /
    • 2004
  • Ubiquitous computing environment requires strong security and privacy. Access control is one of security areas. Access control on Ubiquitous computing is different from it on traditional information systems so that traditional access control models are not suitable for Ubiquitous comput-ing environment. This research defines Ubiquitous computing environment as an access control point of view, and shows requirements to consid-er for developing access control model for Ubiquitous computing environment. It also brings up three implementing types of access control on Ubiquitous computing environment.

A study on analysis for awareness of teachers and students about ubiquitous environment and u-learning in model schools and general schools (Ubiquitous 교육환경과 U-Learning에 대한 시범학교와 일반학교의 교사, 학생의 인지도 분석에 관한 연구)

  • Kim, Dong-Hui;Choi, Jin-Seek
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.179-184
    • /
    • 2005
  • Computer Education form is rapidly growing and has been developed in a variety of forms such as off-line. on-line, multimedia, ICT education . These forms are changed to E-Learning, Blended-Learning and Ubiquitous-Learning. Ubiquitous-Learning model schools have already been running on a national scale according to the policy of the Ministry of Education. In this study, to understand the necessity for the Ubiquitous-Learning and Ubiquitous-Environment, the awareness of the Ubiquitous environment and U-learning in model schools and general schools is analyzed and compared. Through this study, a desirable model about Ubiquitous-Learning and Environment will be explored.

  • PDF

The Impact of Ubiquitous Factors on Intention to Use Mobile Services (유비쿼터스 특성요인이 모바일 서비스의 사용의도에 미치는 영향)

  • Cha, Yoon-Sook;Chung, Moon-Sang
    • The Journal of Information Systems
    • /
    • v.16 no.2
    • /
    • pp.69-91
    • /
    • 2007
  • The mobile computing environment has already matured and mobile services are activated throughout many industries. In the following years, these changes are expected to evolve into a ubiquitous computing environment. In the meantime, whether newly developed information technologies will thrive or diminished depends on user's intention to adopt them. Hence, the necessity of user-centered research considering ubiquitous computing in mobile computing environment is obvious. This study, thus, investigated ubiquitous factors in various literature related to ubiquitous computing and technology acceptance and it proposes a research model of the ubiquitous factors affecting user's intention to use mobile services, in terms of meaning(connectivity, mobility), service(contextual offer), compatibility(compatibility), and infrastructure(privacy, truth). The proposed model is expected to help both researchers and practitioners extend their understanding about the ubiquitous factors in mobile computing environment

  • PDF

Ubiscript: A Script Language for Ubiquitous Environment

  • Lee, Min-Kyu;Han, Dong-Soo
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.2
    • /
    • pp.141-149
    • /
    • 2011
  • Many distributed and heterogeneous services and devices are accessible in ubiquitous computing environment, so interoperating those services and devices is one of the key tasks in implementing ubiquitous applications. We used to use script languages in integrating such interoperating components and services. However currently available most script languages are not suitable for ubiquitous environment because there are so diverse forms of interoperation targets such as service objects, web, legacy objects and programmable devices. So it is worthwhile designing a new script language well-suited to ubiquitous environment. In this paper, we propose a new script language, called Ubiscript, for the ubiquitous environment. We develop and adopt several unique language features such as remote scope, multiple contexts, web and legacy objects, remote exception handling, etc. in Ubiscript to overcome the limitations of conventional script languages. In this paper, we also describe the implementation of Ubiscript and its runtime system. A couple of ubiquitous applications were developed in Ubiscript, and the applications are tested on the runtime system. According to our experiences and evaluation, Ubiscript turned out to have a high potential in its expression power and contribution to improving ubiquitous application developers' productivity.

U-Learning: An Interactive Social Learning Model

  • Caytiles, Ronnie D.;Kim, Hye-jin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.1
    • /
    • pp.9-13
    • /
    • 2013
  • This paper presents the concepts of ubiquitous computing technology to construct a ubiquitous learning environment that enables learning to take place anywhere at any time. This ubiquitous learning environment is described as an environment that supports students' learning using digital media in geographically distributed environments. The u-learning model is a web-based e-learning system that could enable learners to acquire knowledge and skills through interaction between them and the ubiquitous learning environment. Students are allowed to be in an environment of their interest. The communication between devices and the embedded computers in the environment allows learner to learn while they are moving, hence, attaching them to their learning environment.

A survey on residential environment's improvement plan of silver town by means of applying ubiquitous system (유비쿼터스시스템 적용을 통한 실버타운의 주거환경 개선방안 연구)

  • Lee, Chulgoo
    • Journal of the Korean Society for Geothermal and Hydrothermal Energy
    • /
    • v.10 no.4
    • /
    • pp.8-14
    • /
    • 2014
  • With the advancement of the industry such as information technology, residential facilities has been consistently achieved high standard. Ubiquitous system has been introduced in apartments nowadays, and it will be general facilities in the near future. However elderly people is not generally accustomed to ubiquitous or internet environment, so degree of ubiquitous system usage is able to be less than young people. This study aims to grasp the relative importance of ubiquitous environment, and offer materials to realize residential environment's improvement of silver towns under investigation through a questionnaire survey. Skin recognition system was most preferred among various functions. Energy management system, protection system of solitude elderly person and security system by CCTV was also preferred at a high rate. Housework part such as cooking aid, height control of sink and basin etc., was not less important system relatively.

Fashion Product Purchase Behaviors in the Development Stages of Ubiquitous Environment -Focusing on Clothing Shopping Orientation and Consumer Purchase Decision Making- (유비쿼터스 환경의 발전 단계에 따른 패션 제품 구매행동 연구 -의복쇼핑성향 집단별 구매의사 결정의 차이를 중심으로-)

  • Chung Mi-Jae
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.4 s.103
    • /
    • pp.33-47
    • /
    • 2006
  • In 21 century, the ubiquitous environment is advanced fast through the so-called digital convergence. This research experts what is the next generation of traditional fashion product purchase behaviors. The purpose of this study is to analyze the fashion product purchase decision making in the development stages of ubiquitous environment. The quantitative Investigation was executed for 487 collegians and the data were analyzed with Frequency, percentage, ANOVA, Duncan test and multiple regression by using SPSS win version 10 package. The results of this research were as followed: First, in the 1st stages of ubiquitous developmental environment, using internet pc or mobile phone was analyze the difference between fashion shopping orientation group and purchase restricted factor Second, as a result of the factor analysis of the ubiquitous 2nd stages, four lower dimensions were made: giving information; wearable effect, buying facility; interest from purchase. as a result of ANOVA, there were any differences between fashion shopping orientation group and ubiquitous 2nd stages. Third, in the 3rd stages of ubiquitous developmental environment, there are differences between fashion shopping orientation group and ubiquitous 3rd stages. And the result from regression analysis of the ubiquitous 2nd stages and 3rd stages showed that buying facility factor in increasing need recognition, wearable effect factor in fashion information acquisition, giving information factor in have a intention to buy in ubiquitous #3 rendition are most influential.

A Design of Management Architecture and Ubiquitous Profile Based on CC/PP for Content Adaptation in Ubiquitous Environment (유비쿼터스 환경에서 콘텐츠 적응화를 위한 CC/PP 기반의 유비쿼터스 프로파일 및 운영 아키텍쳐 설계)

  • Kim Kyung-Sik;Lee Jae-Dong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.491-500
    • /
    • 2006
  • In this paper, the management architecture and the ubiquitous profile based on CC/PP for contents adaptation in the ubiquitous environment is designed. The components and the attributes of the ubiquitous profile are defined based on the services scenario of contents adaptation in the ubiquitous environment. The ubiquitous profile was applied to techniques such as standard vocabulary, CC/PP structure, RDF schema and RDF to use effectively in the ubiquitous environment during the design. Also we design and propose the another management architecture based on ideas such as the dynamic constitution method, the metadata constitution method using a repository and the management method of gateway on center for the effective management of the ubiquitous profile. The result of performance evaluation for the proposed management architecture is more effective compared with the previous management method of the profile. The proposed the ubiquitous profile and the management architecture has provided the foundation of the research for a user to adaptation contents services in the ubiquitous environment.

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF