• Title/Summary/Keyword: ubiquitous home network

Search Result 215, Processing Time 0.031 seconds

Autonomic Service Composition of Localized Ubiquitous Services for Open Service Gateways (개방형 서비스 게이트웨이를 위한 유비쿼터스 지역서비스 자동구성)

  • No, Ji-Hoon;Yoon, Won-Sik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.9
    • /
    • pp.17-26
    • /
    • 2011
  • Many types of services appear in a ubiquitous environment promulgated by the evolution of web service technology with the advances in wireless network technologies and mobile computing devices. These services differ according to their location environments, such as home, office, airport, and exhibition. It is required that a different set of services dynamically drops into the mobile user's device depending on their context and the distributed localized services are efficiently managed to seamlessly provide these localized services to the user. This paper proposes an Autonomic Service Composition System (ASCS) to provide useful services to the user with minimal or no effort for service selection. ASCS seamlessly installs the programs of localized services in the user's mobile device. It automatically provides localized services to users that are in the local service zone. Also ASCS can manage distributed localized services remotely and efficiently. ASCS is composed of a Remote Manager, Service Gateway, and Mobile Device. The prototype implementation uses 802.11b Wireless Network and Bundles using the OSGi Framework.

A Study on Embedded DSP Implementation of Keyword-Spotting System using Call-Command (호출 명령어 방식 핵심어 검출 시스템의 임베디드 DSP 구현에 관한 연구)

  • Song, Ki-Chang;Kang, Chul-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.9
    • /
    • pp.1322-1328
    • /
    • 2010
  • Recently, keyword spotting system is greatly in the limelight as UI(User Interface) technology of ubiquitous home network system. Keyword spotting system is vulnerable to non-stationary noises such as TV, radio, dialogue. Especially, speech recognition rate goes down drastically under the embedded DSP(Digital Signal Processor) environments because it is relatively low in the computational capability to process input speech in real-time. In this paper, we propose a new keyword spotting system using the call-command method, which is consisted of small number of recognition networks. We select the call-command such as 'narae', 'home manager' and compose the small network as a token which is consisted of silence with the noise and call commands to carry the real-time recognition continuously for input speeches.

The Study of Models for Multimeia Digital rights Managements in Home Network (홈네트워크 환경에서의 멀티미디어 디지털 컨텐트 권한 관리 모델에 관한 연구)

  • Jung, Jong-Jin;Kim, Yun-Sang;Lim, Tae-Bum;Lee, Suk-Pil
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.518-520
    • /
    • 2006
  • Due to the rapid popularization of mobile multimedia devices and the Internet as well as the realization of high-speed data transmission and large-volume data recording media, high quality content distribution and ubiquitous information services are making progress and a new type of information distribution and network sharing service has gradually emerged into the market. It is capable of utilizing terabyte sized home servers also in private homes. Under these circumstances, in distribution of content over shared networks, it is crucial to establish DRM (Digital Rights Management) technologies to protect the content from illegal copying and usage. A truly successful DRM system must be built on open worldwide specifications and provide maximum interoperability and user acceptance. An open interoperability of DRM is able to construct highly expandable PKI based DRM, targeting usage between systems, considering the expansion of recent content distribution services and clients This document gives protocol specifications for the exchange of rights information between the DRM module, description of specifications for rights information and encrypted content formats.

  • PDF

Development of Voice, Data Integrated Access Point for Ubiquitous Home/Office (유비쿼터스 홈/오피스를 위한 음성, 데이터 통합 액세스 포인트 개발에 관한 연구)

  • Lee Sang-Hak;Kim Dae-Hwan;Chung Tae-Choong
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.1
    • /
    • pp.5-14
    • /
    • 2004
  • "언제, 어디에서, 어떤 형태의 접속"도 가능하게 하는 유비쿼터스 네트워크 환경의 실현을 위해 음성, 데이터의 통합은 우선 지원되어야 할 애플리케이션이다. 블루투스는 음성, 데이터의 동시 처리가 가능한 무선 개인 영역 네트워크(WPAN: Wireless Personal Area Network) 표준이다. 저가, 저전력의 무선 통신을 기반으로 휴대폰, 무전 전화기(Cordless Telephone) 의 음성 통화와 노트북, PDA 등의 정보기기의 인터넷 접속을 가능하게 한다. 본 논문에서는 블루투스의 음성, 데이터 통합처리를 구현한 블루투스 액세스 포인트(Access Point)에 대해 기술한다. 근거리 무선 데이터 통신과 유실 네트워크의 연결을 이루어 노트북, PDA 등 단말기의 인터넷 동시 접속을 지원하며 블루투스 폰의 VoIP 통화를 구현하였다. 개발 완료된 시스템의 테스트 결과 다양한 벤더들의 제품들과 호환성을 이루어 표준안을 만족하였으며 성능 면에서 역시 규격에서 제시한 최대치에 근접한 매우 우수함을 나타내었다.

  • PDF

The Design and Implementation of a CSS based Location Aware System (CSS기반 위치인식 시스템 구현에 관한 연구)

  • Ju, Jun-Hyeong;Kim, Hyun-Wook;Yang, Sung-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1549-1558
    • /
    • 2012
  • Location-aware system is utilized in various fields such as Logistics, Home Network, Healthcare, Military and Transportation systems. In this paper, we designed and implemented a Location-aware system based on IEEE 802.15.4a CSS (Chirp Spread Spectrum) technology in variable environment. The CSS is possible to precision location awareness using RF signal. According to experimental result, the implemented system has recognition error less than 0.5m within 20m radius in space.

IEEE 802.22 WG에서의 CR 응용: WRAN OFDMA 기술

  • Seon Tae-Hyeong;Jang Gyeong-Hui
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.2 s.58
    • /
    • pp.28-37
    • /
    • 2006
  • 전파 자원은 국가의 무형 자산으로서 자원이 한정되어 있는 반면에 이에 대한 수요가 급증하면서 전파 자원의 가치가 점점 높아지고 있다. 특히 국내의 경우 IT839 전략으로 추진 중인 WiBro(Wireless Broadband), DMB(Digital Multimedia Broadcasting), Home Network, Telematics(Telecommunication Informatics), WCDMA(Wide Code Division Multiple Access), RFID/USN(Radio Frequency Identification/Ubiquitous Sensor Network) 등 무선 주파수를 이용하는 새로운 서비스가 증가하면서 주파수 자원에 대한 중요성은 더욱 강조되고 있다. 종래의 전파 정책이 정부가 정책을 세우고 이를 관리하는 Command-and-Control 위주였다면, 향후의 전파 정책은 OpYN1020en Spectrum 정책으로 전환될 것으로 전망된다. 본 고에서는 전파 자원의 효율적인 이용을 도모하는 일반적인 CR(Cognitive Radio) 기술에 대하여 언급하고, 이를 이동성이 없는 고정 환경에 적용하기 위한 IEEE 802.22 WRAN 시스템의 물리계층 전송 규격 사양, 프레임구조 및 현재 논의되고 있는 기술에 대하여 논의한다.

Common Command-Scripting Language for network-based Robots (CCSLR) and Translator System Architecture (네트워크 기반 로봇을 조종하기 위한 공통 명령 프로그래밍 언어(CCSLR)와 번역 시스템 구조)

  • Lee, Il-Gu;Nguyen, Dong To;Kim, Do-Ik
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.1
    • /
    • pp.48-54
    • /
    • 2007
  • A network-based robot [1] is a robot that explores service servers in the network environment for analyzing sensor data and making decision. Since network-based robot architecture was proposed, it's possible to reduce costs of robots. We hope robots would be all around at home environment. Therefore, normal users who are not experts need to be able to control those robots by using easy commands. We developed a scripting language, named CCSLR, to help users and developers who control various robots in ubiquitous environment. We focused on how to design the common language for various robots and how to translate a CCSLR script into a sequence of low-level commands of the target robot. In this paper, we propose scripting methods, with three layers. The CCSLR system reads the profile information from the knowledge representation database. Users don't have to know all about kinematical and mechanical details of a robot. Then again, the CCSLR system will use the profile information to translate the script into separated executable library commands. The CCSLR system manages robot's changing state every time a robot executes a command.

  • PDF

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

A Study on Security Routing using MD5 in MANET Environments (MANET 환경에서 MD5를 이용한 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung;Jung, Sung-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.728-731
    • /
    • 2008
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on IETF MANET working group, Bluetooth, and HomeRF working group and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. For perfect MANET setting, routing is required which can guarantee security and efficiency through secure routing. In routing in this study, hashed AODV is used to protect from counterfeiting messages by malicious nodes in the course of path 'finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

  • PDF

A Study on the Implementation of a Portable Healthcare System using Zigbee (Zigbee를 이용한 휴대형 헬스케어 시스템 구현에 관한 연구)

  • Kang, Sung-In;Kim, Gwan-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1793-1798
    • /
    • 2007
  • Recently there are some trends to construct smart home system infrastructure depending upon the development of Information and Communication Technology. Also requirements of the Ubiquitous Healthcare Systems at home which can monitor the status of health continuously are increased rapidly comparing with hospitals. Healthcare service can be divided into two categories. The first one is Alarm Service that can be used for the emergency status and the other one is Remote Support Service which can monitor the patient including home environments and give those diagnosis information to medical office or to his family. Generally wired networks and fixed healthcare measuring system have some limits to transmit reliable realtime based information for both categories described above comparing with portable monitoring system. Getting over the inefficiency we will design and implement portable healthcare system under the wireless Zigbee network environments.