• Title/Summary/Keyword: 능동 서비스

Search Result 610, Processing Time 0.025 seconds

Design of efficient Context Awareness System for Home Network Constitution (홈 네트워크 구성을 위한 효율적인 상황 인식 시스템 설계)

  • Jung, Min-Six;Lee, Yun-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.683-686
    • /
    • 2008
  • 최근 홈 네트워크라는 용어가 대중매체에 등장하고, 해외 선진국은 물론 세계 여러 나라들은 수년 동안 이러한 분야에 중점을 두고 연구 개발에 집중하고 있다. 현재 우리나라에서도 홈 네트워크에 관한 다양한 연구 개발이 이루어지고 있다. 특히 홈은 개인이 사용할 수 도 있지만, 다수의 가족이란 구성원이 존재하는 공간이다. 따라서 가정환경에 맞추어 능동적인 홈 네트워크 시스템이 작동하려면 다양한 상황과 각각의 상황에 맞는 서비스를 제공 받을 수 있어야 한다. 이를 위해 상황 인식 기반 홈 네트워크 개발 연구가 활발히 진행 중이다. 본 논문에서는 효율적인 홈 네트워크 구성을 위한 상황 인식과 컴퓨팅에 관해 고찰하고 이를 통해 보다 개선된 상황 인식 시스템을 설계한다.

A Mechanism of Dynamic Rendering-Device Switching based on Location-Awareness for the Ubiquitous Environment (유비쿼터스 환경에서 위치 인지 기반한 재생 장치 동적 전환 메커니즘)

  • Jung, Egun;Kim, Sangwook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.805-807
    • /
    • 2007
  • 컴퓨팅 환경이 유비쿼터스 환경으로 변화함에 따라 정보의 량은 증가하지만, 사용자가 이 모든 정보를 수용하기에는 한계가 있다. 그래서 유비쿼터스 환경에서는 장치 스스로 상황을 인지하고 능동적으로 처리할 필요가 있다. 본 논문에서는 블루투스 라디오 신호 세기를 기반하여 위치 인지를 하고 이를 바탕으로 이동중인 사용자에게 동적으로 멀티미디어 스트리밍 스위칭 서비스를 제공하는 u-MESSAGE(ubiquitous MEdia Stream Switcher At Genius home Entertainment) 시스템을 소개한다.

A Study on the Active Transit Signal Priority Control Algorithm based on Bus Demand using UTIS (UTIS를 활용한 수요 기반의 능동형 버스우선신호 제어 알고리즘에 관한 연구)

  • Hong, Gyeong-Sik;Jeong, Jun-Ha;An, Gye-Hyeong;Lee, Yeong-In
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.6
    • /
    • pp.107-116
    • /
    • 2011
  • In this paper, we implement an algorithm of transit signal priority control that not only maximizes service quality and efficiency of bus, but also minimizes the control delay of passenger cars using UTIS currently being deployed and operated in Seoul national capital area. For this purpose, we propose an algorithm that coordinates the strength of TSP by estimating bus demand. Typically, the higher the strength of TSP is on main street, the bigger the control delay is on the cross street. Motivated by this practical difficulty, we proposes an algorithm that coordinates TSP's strength by checking the degree of saturation of cross street. Also, we verify the possibility of field implementation via simulation analysis using CORSIM RTE based HILS (Hardware In the Loop Simulation). The result shows that travel time of bus improves about 10 percent without increasing control delay of passenger cars by TSP. We expect the result of this research to contribute to increasing the overall transit ridership in this country.

A Study on the Process of Making City Image by Developing a New City Brand : A Case of 'Medicity Daegu' (도시 브랜드 개발을 통한 도시 이미지 구축에 대한 연구 - '메디시티 대구'를 사례로 -)

  • Yoon, Ok-Kyong
    • Journal of the Korean association of regional geographers
    • /
    • v.17 no.6
    • /
    • pp.726-737
    • /
    • 2011
  • This study reviews in detail the background of the establishment of 'Medicity Daegu', new city brand of Daegu Metropolitan City. This study also analyses both passive and active aspects of place image named 'Medicity Daegu'. To reveal passive images toward the city's new brand name, this study examines the perception of university students in Daegu Metropolitan City. On the other hand, active images are explored by analyzing strategies the city government and research institutes has adopted for the image-making and examining diverse landscapes and events the city have taken place. It was expected in the first place that the new image could help the city make more competitive, and boost its regional economy through the spread of the new city image. However, the city has currently faced difficulties to spread the new city image and has a limitation to acquire uniquely distinctive image because of overlapped images pursued by other city governments in the fields of medical industry and medical services. Some considerations are then suggested regarding the current status of the image of "Medicity Daegu".

  • PDF

A Study on The Development of Container Security Device(CSD) based on Active RFID (능동형 RFID 기반 컨테이너 보안 장치(CSD)의 개발에 관한 연구)

  • Choi, Hyung-Rim;Kim, Jae-Joong;Kang, Moo-Hong;Shin, Joong-Jo;Shon, Jung-Rock;Moon, Young-Sik;Lee, Eun-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.244-251
    • /
    • 2010
  • CSD is Active RFID based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the temperature/humidity/shock sensors. Moreover, its RFID frequency bandwidth uses 433MHz and 2.4GHz to correspond actively to the radio regulations used by different countries. This paper introduces the development trend of CSD, compares the ConTracer which is developed thru this research and other company's CSD, and introduces CSD System which is designed and established using ConTracer. Finally, the implemented CSD System is verified by applying the demonstration service to container distribution between Korea and China.

Forward Migration of an Active Rule Mobile Agent using the Meta_data (메타데이터를 이용한 능동규칙 이동에이전트의 정 방향 이주)

  • Lee, Yon-Sik;Lee, Jun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1567-1574
    • /
    • 2012
  • Since a migration method of the mobile agent is a factor that affects the overall performance of the entire distributed system, it is necessary to find efficient migration methods of the mobile agent within the sensor network and to collect and store data related to various components(server, sink and sensor node) of the sensor network, thereby providing consistent naming services. Accordingly, this paper presents design and implementation of MetaTable that is divided into MetaData where information on the sensor data server is stored and SubMetaData where various types of information on sink nodes and data on sensor nodes connected with the sink nodes is stored. Moreover, the paper also presented the implementation of forward migration of an active rule mobile agent applying the naming method based on RMI that used the meta_table and proposed the possibility of constructing efficient sensor network application environment. In this paper, for registration, release and retrieval methods suitable for new sensor network environment, we designed and implemented the naming agent by applying J2EE model based on RMI-IIOP(Internet Inter-ORB Protocol) technique.

A Semi-automatic Construction method of a Named Entity Dictionary Based on Wikipedia (위키피디아 기반 개체명 사전 반자동 구축 방법)

  • Song, Yeongkil;Jeong, Seokwon;Kim, Harksoo
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1397-1403
    • /
    • 2015
  • A named entity(NE) dictionary is an important resource for the performance of NE recognition. However, it is not easy to construct a NE dictionary manually since human annotation is time consuming and labor-intensive. To save construction time and reduce human labor, we propose a semi-automatic system for the construction of a NE dictionary. The proposed system constructs a pseudo-document with Wiki-categories per NE class by using an active learning technique. Then, it calculates similarities between Wiki entries and pseudo-documents using the BM25 model, a well-known information retrieval model. Finally, it classifies each Wiki entry into NE classes based on similarities. In experiments with three different types of NE class sets, the proposed system showed high performance(macro-average F1-score of 0.9028 and micro-average F1-score 0.9554).

Active ITS Infrastructure Management Strategy for Enhanced ITS Service (기존 ITS 서비스의 성능 강화를 위한 능동형 ITS 인프라 관리 전략)

  • Choi, Dongwon
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.45-53
    • /
    • 2014
  • In this study, we analyzed the next generation ITS (C-ITS) technology trends, focusing on the national and international C-ITS projects. Based on the promotion practices of developed countries, we pointed out the lack of linkages with the existing ITS infrastructure. As a way to overcome this problem, we proposed the three-direction to enable the existing ITS infrastructure corresponding to the C-ITS. First one is developing a technique to improve the performance of the existing ITS infrastructure and automate the performance management (Performance-enhanced ITS). Second, developing active sensors or fusion sensor which along with V2X communication technology implement of an active safety driving support system (Safety-enhanced ITS). Third, we need to develop a technology that generate the new advanced traffic data by integrating the collected data from existing ITS infrastructure and nomadic device (Cloud-ITS). By improving the function of the existing ITS infrastructure for adaptation to the new V2X communication environment, we enhanced the efficiency of maintenance performance and would maximize the benefit of the introduction of C-ITS.

Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments (이동통신 환경에서 네트워크 제공자 및 제 3자로부터 안전한 위치정보 보호기법)

  • Kim, Soon-Seok;Lee, Chang-Hun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.867-878
    • /
    • 2003
  • In thls Paper, we Propose a new scheme, protecting information about the location of a mobile user against attacks from inside users of the mobile communication, especially the network providers. There have already been some proposals about how to protect location information of user in mobile communication environments〔1-5〕. Among them, Kesdogan et al.〔2, 3〕 proposed a new method, using so-called temporary pseudonyms and also described protection method against a passive and an active attack of network providers. However, the description of protection method against the active attack between the two is not clear. Moreover, there is an additional load that it should append a reachability manager〔1, 6〕 to the proposed system. Therefore, we propose a new scheme improving the above method of Kesdogan et al. and analyze its security and effectiveness.

A Formal Modeling for Temporal and Active Properties of Managed Object Behavior (망관리 객체의 시간지원 능동 특성에 대한 전형적 모델링)

  • Choe, Eun-Bok;Lee, Hyeong-Ho;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2479-2492
    • /
    • 1999
  • Network management system(NMS) provides not only effective monitoring and controlling of network which consists of heterogeneous network elements but prompt response to users' need for high-level communication services. Recommendations of ITU-T and ISO stipulate the managerial abstraction of static and dynamic characteristics of network elements, management functions as well as management communication protocol. But the current description method does not provide the formal mechanism for the behavior characteristics of managed objects in clear manner but in natural language form, the complete specification of managed objects is not fully described. In this paper, we describe determinants for the behaviour of managed objects applicable to every managed object, and present a language for specifying behavioral aspects of managed objects based on their temporal and active properties.

  • PDF