• Title/Summary/Keyword: ubiquitous home network

Search Result 215, Processing Time 0.025 seconds

The politic suggestion and the design of integrate-construction model for installation of the residential IT facility. (구내 정보통신설비를 위한 정책제안과 통합구축모델 설계)

  • Kang, Young-Chang;Lim, Sang-Chul;Kim, Sun-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.845-853
    • /
    • 2009
  • This study recognize the problems about the High-speed IT building certification system and the technical standards of telecommunication facility, broadcasting public receiving facility including Home-network facility which are installed at apartments for the successful building of the Ubiquitous city that the government is driving and suggested a sweeping change of the housing law interrelated for making up a housing efficiency grade-display system and systematizing the maintenance by solutions. Also, presented the integrate-construction model designs separately of the residential IT line about the buildings applied to technical standards, the building acquired second grade below of High-speed IT building and the building when the above solutions get to he systematized.

Fuzzy Inductive Learning System for Learning Preference of the User's Behavior Pattern (사용자 행동 패턴 선호도 학습을 위한 퍼지 귀납 학습 시스템)

  • Lee Hyong-Euk;Kim Yong-Hwi;Park Kwang-Hyun;Kim Yong-Su;June Jin-Woo;Cho Joonmyun;Kim MinGyoung;Bien Z. Zenn
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.7
    • /
    • pp.805-812
    • /
    • 2005
  • Smart home is one of the ubiquitous environment platforms with various complex sensor-and-control network. In this paper, a now learning methodology for learning user's behavior preference pattern is proposed in the sense of reductive user's cognitive load to access complex interfaces and providing personalized services. We propose a fuzzy inductive learning methodology based on life-long learning paradigm for knowledge discovery, which tries to construct efficient fuzzy partition for each input space and to extract fuzzy association rules from the numerical data pattern.

Trends of Public Wi-Fi Technologies (공공 와이파이 기술 동향)

  • Chung, H.S.;Kim, J.H.;Noh, G.S.;Park, J.H.;Lee, J.H.;Lee, J.H.;Kim, I.G.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.5
    • /
    • pp.64-75
    • /
    • 2018
  • People usually check their social media, e-mail, and online news on their smartphones using their carrier network. During this process, much of the data traffic is offloaded to ubiquitous Wi-Fi networks. Such offloading will continue to increase rapidly because of flourishing public Wi-Fi networks located around the world. In this technical report, we first investigate domestic public Wi-Fi projects, and followed by foreign projects. In addition, we investigate the Wi-Fi technology evolution that has been standardized in IEEE 802. More and more people are tending to use Wi-Fi, not only at home or work, but also on public transport such as buses and trains. Hence, it is important to come up with ideas that can realize Wi-Fi onboard. The key technologies needed here are related to a mobile wireless backhaul between trains and trackside radio equipment, or between buses and roadside units. Thus, we also investigate the mobile wireless backhaul technologies and their trends.

Implementation of Zigbee/PLC Gateway System for U-Health Care (유비쿼터스 헬스케어를 위한 Zigbee/PLC 게이트웨이 시스템 구현)

  • Kim, Sung-Yun;Kang, Kyung-Il;Kweon, Min-Su;Rhee, Young-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.3
    • /
    • pp.332-338
    • /
    • 2010
  • In this paper, Zigbee/PLC gateway system is designed for Ubiquitous health care. A protocol conversion algorithm for smooth information exchange between Zigbee and PLC communication has been implemented on the gatway. If a moving object is detected by wireless sensor, the data is transmitted to gateway. Zigbee/PLC gateway analyzes received data and transmits to Power Line Communication for real-time monitoring. Implemented system is can support elder who lives alone activity analysis, crime prevention system, Home network service.

Consumers' acceptance and resistance to virtual bank: views of non-users (인터넷전문은행 수용 의도와 저항에 관한 연구: 소비자, 혁신, 환경 특성을 중심으로)

  • Kim, Hyo Jung;Lee, Seung Sin
    • Human Ecology Research
    • /
    • v.57 no.2
    • /
    • pp.171-183
    • /
    • 2019
  • Convergence between technology and financial services is ubiquitous and widespread. Virtual banks represent an important aspect of financial markets that can generate value added for consumers and enhance the quality of financial services. This study explores the effect of innovation characteristics (relative advantage, compatibility, and perceived risk), consumer characteristics (status quo bias), and social mechanisms (network externality: complementarity, numbers of peers) on consumers' adoption intention and resistance to virtual banks. This study adopted an innovation resistance model with two dependent variables: adoption intention and resistance to virtual banks. An online self-administered survey was conducted and 532 or non-users of virtual banks aged 20 to 69 years old were analyzed. Frequency analysis, descriptive analysis, and hierarchical multiple regression indicated that status quo bias, relative advantage, perceived risk, complementarity, and number of peers insignificantly influence the adoption intention regarding virtual banks. Furthermore, status quo bias, relative advantage, perceived risk, and number of peers insignificantly influence the resistance to virtual banks. Female respondents have a lower adoption intention and higher resistance to virtual banks than male respondents. The findings suggest that the innovation resistance model can be useful in understanding consumers'adoption and resistance behavior as well as reveal that innovation characteristics, consumer characteristics, and social mechanism are important antecedent variables of the innovation adoption decision.

A Design of ALE-compliant RFID Middleware System (ALE 기반 RFID 미들웨어 시스템 설계)

  • Hong, Yeon-Mi;Cho, Yoon-Sang;Byun, Ji-Woong;No, Young-Sik;Park, Sang-Yeol;Oh, Sang-Hyun;Byun, Yung-Cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.469-473
    • /
    • 2006
  • Nowadays, to realize ubiquitous computing environment, many research activities have been going on within various kinds of research domains including automatic identification, sensor network, home network, telematics and so on. Especially, RFID middle-ware that supports the aggregation of RFID tag data, control and management, and the integration with legacy systems has recently gained a lot of attention. Meanwhile, EPCglobal defined an ALE(Application Level Events) standard specification, which exists between RFID readers and applications, and substitutes the previous systems called Savant. In the specification internal structures and implementation technologies of ALE are not mentioned and only external interfaces are defined. This approach easies the verification of standard compliance and inter-operability of the layer. In this paper, we present the design of ALE-compliant RFID middle-ware systems that process RFID tag data efficiently.

  • PDF

A Study on Distributed Gateway for The Bio-signal Management in U-Healthcare (유 헬스케어에서 생체신호관리를 위한 분산형 게이트웨이에 관한 연구)

  • Lee, Seok-Hee;Woo, Sung-Hee;Ryu, Geun-Taek
    • 전자공학회논문지 IE
    • /
    • v.49 no.2
    • /
    • pp.58-64
    • /
    • 2012
  • In this paper, we proposed a distributed gateway for ubiquitous healthcare system. We also designed and implemented protocol conversion and processing algorithms to exchange a seamless information, the bio signals between the databases and the receiving devices from ZigBee to gateway and from the gateway to database and network. The distributed gateway system consists of the bio signal acquisition, ZigBee modules, distributed databases, and gateways. The bio signals detected by the ZigBee module are sent to the gateway. The distributed gateway analyzes the data being transferred, sends those to the receiving devices, and lets the authorized personnel access. The proposed system can be utilized in various fields including activity analysis for the elderly, security systems, home network service, and so on.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

RIPE: RSVP-in-IP Encapsulation to Support QoS for Mobile IP Networks (RIPE: Mobile IP망에세 QoS를 지원하기 위한 RSVP-in-IP 캡슐화 방안)

  • Min-Kyu, Kim;Myong-Soon, Park
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.501-510
    • /
    • 2004
  • While the Internet keeps its permeation into every aspect of human life, two things stand out. One is the requirement for high quality of services to support multimedia data service.'The other is the desire for ubiquitous network connection. Combining the two things makes the Internet possible in supporting multimedia communications for nomadic users on the locomotion. To support QoS communication for mobile users by applying RSVP to Mobile IP, RSVP Tunnel, which specifies building separately a RSVP session between the home agent and the foreign agent, was proposed. However, the RSVP Tunnel method breeds bandwidth overhead and association problems in tunnel because of duplicated RSVP messages use. To resolve these problems, in this paper, we propose the new encapsulation method, the RSVP-in-IP Encapsulation (RIPE) that can support QoS guaranteed service efficicntly in Mobile IP networks. The proposed method supports RSVP mobility to Mobile If tunneling mechanism efficiently without any additional session as the RSVP Tunnel scheme. Moreover it removes the critical problems of bandwidth overhead in a tunnel and association by duplicated messages. We compared the performance of our proposed scheme with RSVP Tunnel scheme in term of mean delay, mean data rate and bandwidth overhead in tunnel.

An Efficient Hierarchical Authentication Scheme through Brokers in Mobile IPv6 Networks (브로커를 통한 모바일 IPv6 네트워크의 효율적인 계층적 인증기법)

  • Jung, Ha-Gwon;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.15-26
    • /
    • 2011
  • As quick and secure mobility service is becoming a critical issue in the ubiquitous environment. Internet Engineering Task Force (IETF) has done a lot of meaningful work in order to cope with the critical issues, which is a key technology of guaranteeing the legally and safely using of network resources, they has proposed Hierarchical Mobile IPv6 (HMIPv6) to complement for such problems as handover latency and signaling overhead in existing MIPv6. Most of the current research about HMIPv6 focuses on how to optimize the interactive processes between the HMIPv6 and AAA (Authentication, Authorization, Accounting) protocol. This paper describes a cost-effective hierarchical authentication scheme, which makes its focus on minimizing the authentication latency in AAA processing. In this scheme, a hierarchical AAA architecture is proposed, in which the AAA servers are deployed on the Mobility Anchor Point (MAP), the Root AAA server manages several Leaf AAA servers and the Brokers on behalf of the AAA server in home domain. The simulation results shows that the proposed scheme reduces the handoff and authentication latency evidently compared to the previous traditional authentication combination modeling.