• Title/Summary/Keyword: wireless location

Search Result 1,174, Processing Time 0.029 seconds

A Hierarchical Bitmap-based Spatial Index for Efficient Spatial Query Processing on Air (무선환경에서 효과적인 공간질의 처리를 위한 계층적 비트맵 기반 공간 색인)

  • Song, Doo-Hee;Park, Kwang-Jin
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.43-51
    • /
    • 2011
  • The recent development of the technology for wireless mobile computing and applied technology for location-based services has made it possible to support query processing faster than that in the past. However, some technological limitations on hardware and software still exist. The most critical aspects of query processing are accuracy and speed. For improving the accuracy, it is required that detailed information on the data involved in query processing be saved. In this case, the amount of information on the data increases, which decreases the speed. On the other hand, for increasing the speed, it is necessary to reduce the broadcast cycle, which enables rapid data acquisition as desired. In this case, because of insufficient index information, the listen time for the client increases, which may cause unnecessary energy consumption. Therefore, a trade-off occurs between the accuracy and speed. This paper proposes a hierarchical bitmap-based spatial index (HBI) as a solution for the aforementioned problems. HBI describes an object with 0 and 1 on the Hilbert curve map. It reduces the broadcast cycle by decreasing the index size on the basis of bit information and tree structure. Therefore, it is able to shorten the listen time and query processing time. In addition, HBI enables the detection of the locations of all the objects so that it is possible selectively listen to a broadcast. A performance evaluation of the proposed technique demonstrates that it is excellent.

A Study on Implementation Integrated Operation & Management System for Intermodal Connectivity Center (복합환승센터 통합운영시스템 구축방안에 관한 연구)

  • Kim, Sung-Eun;Lim, Jung-Sil;Moon, Young-Jun;Oh, Jae-Hak;Lee, Won-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.4
    • /
    • pp.24-35
    • /
    • 2011
  • This paper demonstrates a methodology of integrated operation and management system for intermodal connectivity center (ICC), which is planning to be build up as a large scale public transit facilities for green growth strategy by the national government. The ICC needs to be capable of providing the integrated location based information for the public transit users in terms of collaborating a variety of transit modes and complex facility in a large scale center. Recently, the upcoming information and communication technologies enable to come up with real time information provision on nomadic and portable devices, i.e. smart phones and/or tablet PCs, as what the users actually need to get on demand. In order to provide the public transit users in ICC with the integrated information on their smart phones for example, the integrated operation and management system plays a key role to collect the data utilizing the wireless communication with real time location tracking and to manage them to be effective and operational sources for applicable personalized services. Thus, this paper defines a type of services, subsystems, and relevant technologies for the system integration so called a "Smart Garatagi Service" and shows a filed test demonstration case in the existing airport terminal, Gimpo Domestic.

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.

Distributed Certificate Authority under the GRID-Location Aided Routing Protocol (Ad hoc 네트워크에서 GRID-Location Aided Routing 프로토콜을 이용한 분산 CA 구성)

  • Lim, Ji-Hyung;Kang, Jeon-Il;Koh, Jae-Young;Han, Kwang-Taek;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.59-69
    • /
    • 2005
  • Ad hoc network is the network which can be considered without a pre-constructed infrastructure, and a mobile node can join the network freely. However, the participation of the mobile nodes to the ad hoc network brings up much burden of re-computation for new routes, because it leads to losing the connection frequently. And, also, it causes serious security problem to be broadcasted wrong information by the malicious user. Therefore, it needs authentication against the mobile nodes. To make that Possible, we have two methods: single CA and distributed CA. In the case of CA method, the wireless network can be collapsed owing to expose the CA, but still the distributed CA method is a little more safe than previous one because it needs attacks toward a lot of CAs to collapse the network We can consider Secret Share scheme as the method that constructs the distributed CA system, but it is weak when the network size is too large. In this paper, we suggest hierarchical structure for the authentication method to solve this problem, and we will show the results of simulation for this suggestion.

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

Design Self-Organization Routing Protocol for supporting Data Security in Healthcare Sensor Network (헬스케어 센서 네트워크에서 데이터 보안을 지원한 자기구성 라우팅 프로토콜 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.517-520
    • /
    • 2008
  • Wireless sensor network supporting healthcare environment should provide customized service in accordance with context information such as continuous location change and status information for people or movable object. In addition, we should consider data transmission guarantees a person's bio information and privacy security provided through sensor network. In this paper analyzes LEACH protocol which guarantees the dynamic self-configuration, energy efficiency through configuration of inter-node hierarchical cluster between nodes and key distribution protocol used for security for data transmission between nodes. Based on this analysis result, we suggested self-configuration routing protocol supporting node mobility which is weakness of the existing LEACH protocol and data transmission method by applying key-pool pre-distribution method whose memory consumption is low, cluster unit public key method to sensor node.

  • PDF

An Effective Hotspot Cell Management Scheme Using Adaptive Handover Time in 4G Mobile Networks (4G 이동 망에서 적응적 핸드오버 시간을 활용한 효과적인 핫스팟 셀 관리 기법)

  • Kim Dong-Wook;Lee Han-Jin;Jeon Seung-Woo;Sawhney Mrinalini;Yoon Hyun-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.217-219
    • /
    • 2006
  • 4G mobile networks are expected to support various multimedia services over IP networks and also satisfy high spectral efficiency requirement. In cellular systems including 4G networks, hotspot cells can occur when available wireless resources at some location are not enough to sustain the needs of users. The hotspot cell can potentially lead to blocked and dropped calls, which can deteriorate the service quality for users. In a 4G mobile network, a band of users enjoying multimedia services can move around, which may generate heavy flows of traffic load. This situation can generate the hotspot cell which has a short life span of only a few minutes. In this paper, we propose a handover-based scheme which can effectively manage hotspot cells in 4G mobile networks. With the scheme, the current serving cell can recognize the load status of the target cell in advance before handover execution. Adaptive handover time control according to the amount of traffic load of cells can effectively and flexibly manage the hotspot cell in the network. And, through our hotspot cell management scheme, acceptable service quality can be supported as users continuously maintain connections with the network. In the simulation results, we find that our scheme generates smaller number of hotspot cells and supports higher service quality than the compared schemes.

  • PDF

Consideration for cognitive effects in smart environments for effective UXD(User eXperience Design) (스마트환경의 효과적인 UXD를 위한 인지작용 고찰)

  • Lee, Chang Wook;Chung, Jean-Hun
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.397-405
    • /
    • 2013
  • The development of the technology of the 21st century, wireless Internet technology development in smart environments, was rapidly settled. In such an environment, the user is faced with many smart devices and smart content. This study is the analysis of the smart environment and smart devices, and user-to-user cognitive out about the effects reported. Cognitive effects observed behavior, technology, and user-centered system design, and plays a very important role to play in educating the users. And theoretical consideration about the UX (User eXperience) and UXD (User eXperience Design), by case analysis on the technical aspects of 'effective' visual aspect of interoperation aspects (interaction), and the cognitive effects of UXD (User eXperience Design) examined. As a result, on the visual aspects of the user experience based on the design that can be used to know, and be sound or through interaction with the user of the machine-to-machine interaction (and interaction) that must be provided, such as location-based or speech recognition technology will help you through the convenience of the user. Through this research, the smart environment and helping act of understanding, effective UXD (User eXperience Design) to take advantage of to help.

Design of ICT-based Agricultural Safety Monitoring System Models

  • Kim, Insoo;Lee, Kyung-Suk;Chae, Hye-Seon;Seo, Min-Tea
    • Journal of the Ergonomics Society of Korea
    • /
    • v.35 no.4
    • /
    • pp.193-204
    • /
    • 2016
  • Objective: This study carried out base research to build an agricultural safety monitoring system through ICT convergence to reduce safety accidents and enhance welfare in life in the agricultural field. Background: The functions and values of rural villages as the space of living are recognized anew, but occupational accident rate due to farm work accidents is on the rise each year. Therefore, the seriousness of such a problem emerges. The convergence technology combining ICT is recently applied to industries overall, and therefore better services are offered. However, studies on ICT convergence has not yet been applied to the agricultural safety field. Method: This study identified ICT convergence service technology trends and representative serious accident types mainly occurring in agricultural activities. This study defined the major factors of farm work accidents and ICT to solve those accident factors including the sensor technology, wired/wireless communication technology and location information service, and applied them to prototype PCB for the development of an agricultural safety monitoring system. Results: This study proposed an emergency monitoring system for farmers and a harmful environment monitoring system. The ICT technology to prevent farm work accidents can be summarized as sensing technology, ICT and network technology and user interface technology. This study also designed PCB module configuration and situation judgment algorithm as basic research for proposed monitoring system development. Conclusion: The ICT-based agricultural safety monitoring research proposed in this study is expected to become the basis to build a future real time monitoring system, and also is expected to contribute to social safety and welfare service improvement for farmers. Application: The ICT convergence farmer accident prevention system will make contributions to the prevention of serious farm work accidents.

Design of Integrated Urban Management System and its Applications Based on RoF and PON Technologies (RoF 및 PON 기술 기반 통합 도심 관리 시스템 (IUMS)의 설계와 그 응용)

  • Yun Chang-Ho;Cho Tae-Sik;Lim Wan-Su;Lee Hyun-Ju;Shin Sung-Moon;Kim Myun-Sik;Kim Ki-Seon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.5 s.347
    • /
    • pp.51-58
    • /
    • 2006
  • A variety of systems have been attempted for effective urban management. In this paper we introduce the Integrated Urban Management System (IUMS), which consists mainly of an optical line terminal (OLT), optical network terminals (ONTs) and wireless access points (APs), by combining passive optical network (PON) and radio over fiber (RoF) technologies so as to take advantage of both systems. Further, several IUMS services such as a disaster detection and prevention system (DDPS), a bus information system (BIS) and a real time location system (RTLS) we demonstrated in order to verify the employment of IUMS for the realization of a future ubiquitous city (U-city).