• 제목/요약/키워드: 무선 컴퓨팅

Search Result 760, Processing Time 0.025 seconds

A Data Mining Tool for Massive Trajectory Data (대규모 궤적 데이타를 위한 데이타 마이닝 툴)

  • Lee, Jae-Gil
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.3
    • /
    • pp.145-153
    • /
    • 2009
  • Trajectory data are ubiquitous in the real world. Recent progress on satellite, sensor, RFID, video, and wireless technologies has made it possible to systematically track object movements and collect huge amounts of trajectory data. Accordingly, there is an ever-increasing interest in performing data analysis over trajectory data. In this paper, we develop a data mining tool for massive trajectory data. This mining tool supports three operations, clustering, classification, and outlier detection, which are the most widely used ones. Trajectory clustering discovers common movement patterns, trajectory classification predicts the class labels of moving objects based on their trajectories, and trajectory outlier detection finds trajectories that are grossly different from or inconsistent with the remaining set of trajectories. The primary advantage of the mining tool is to take advantage of the information of partial trajectories in the process of data mining. The effectiveness of the mining tool is shown using various real trajectory data sets. We believe that we have provided practical software for trajectory data mining which can be used in many real applications.

A Study on the Aspects and Counter Systems of the Cyber Terrorism in the Era of Changing Information Circumstances (정보환경변화시대의 사이버테러 양상 및 대응체계에 관한 연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.237-260
    • /
    • 2005
  • Development of IT technology as well as arrival of information-oriented society raise the curtain of 'the era of Ubiquitous Computing', implying accessing computers beyond boundary of time and space. In this era, it is expected that IT paradigms and life-styles would be transformed immensely above the experiences of 20th century. However, improvement of technology summons a new risk of cyber terrorism which have not been in the past. Thus, it is urgent to prepare for the threats in the national level. This paper point out five major threats relating to 'the security in the era of Ubiquitous Computing'. : First, spread of threats in connection with BcN establishment, second, vulnerable information-security for wireless communication, third, leakage of private information, fourth, cyber terror and deterioration of security, fifth, security problems of Korea including the drain of military information and solutions in the views of organization, personnel, technology and budget, comparing with other countries.

  • PDF

Intelligent Safe Network Technology for the Smart Working Environments based on Cloud (클라우드 기반 스마트 사무환경 구축을 위한 지능형 세이프 네트워크 기술)

  • Kim, Seok-Hoon;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.345-350
    • /
    • 2014
  • According to the necessity of smart working with various mobile devices, and the increasing services based on the converged infrastructures such as Cloud, Wearable Computing, Next Generation Wired/Wireless Mobile Networks, the network reliability has been one of the most important things. However, the research related to the network reliability is still insufficient. To solve these problems, we propose the ISNTC (Intelligent Safe Network Technology based on Cloud), which uses the safe network technique based on SDN, to be adopted to the smart working environments. The proposed ISNTC guarantees secure data forwarding through the synchronized transmission path and timing. We have verified the throughput which outperformed the existing techniques through the computer simulations using OPnet.

A Big Data Application for Anomaly Detection in VANETs (VANETs에서 비정상 행위 탐지를 위한 빅 데이터 응용)

  • Kim, Sik;Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.175-181
    • /
    • 2014
  • With rapid growth of the wireless mobile computing network technologies, various mobile ad hoc network applications converged with other related technologies are rapidly disseminated nowadays. Vehicular Ad Hoc Networks are self-organizing mobile ad hoc networks that typically have moving vehicle nodes with high speeds and maintaining its topology very short with unstable communication links. Therefore, VANETs are very vulnerable for the malicious noise of sensors and anomalies of the nodes in the network system. In this paper, we propose an anomaly detection method by using big data techniques that efficiently identify malicious behaviors or noises of sensors and anomalies of vehicle node activities in these VANETs, and the performance of the proposed scheme is evaluated by a simulation study in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

Ontology Knowledge-Driven Context-awere U-Healthcare Service Application Service Framework using Secure Health Information Exchange (보안 헬스 정보 교환을 이용한 온톨로지 지식기반 상황인식 U-헬스케어 어플리케이션 서비스 프레임워크 설계)

  • Kim, Donghyun;Kim, Seoksoo;Choi, E-Jung
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.75-84
    • /
    • 2014
  • The advancement in ubiquitous healthcare specifically in preventive healthcare can lead to longer life expectancy especially for the elderly patients. To aid in preventing premature loss of lives as well as lengthening life span, this research aims to implement the use of mobile and wireless sensor technology to improve the quality of life and lengthen life expectancy. The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. Therefore, we propose Context-aware Service of U-Healthcare Application based Knowledge using Ontology in secure health information exchange. This research also applies ontology in secure information exchange to support knowledge base, context modeling, and context reasoning by applying the general application areas for ontologies to the domain of context in ubiquitous computing environments. This paper also demonstrates how knowledge base, context technologies, and mobile web services can help enhance the quality of services in preventive ubiquitous healthcare to elderly patients.

Multimodal biometrics system using PDA under ubiquitous environments (유비쿼터스 환경에서 PDA를 이용한 다중생체인식 시스템 구현)

  • Kwon Man-Jun;Yang Dong-Hwa;Kim Yong-Sam;Lee Dae-Jong;Chun Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.4
    • /
    • pp.430-435
    • /
    • 2006
  • In this paper, we propose a method based on multimodal biometrics system using the face and signature under ubiquitous computing environments. First, the face and signature images are obtained by PDA and then these images with user ID and name are transmitted via WLAN(Wireless LAN) to the server and finally the PDA receives verification result from the server. The multimodal biometrics recognition system consists of two parts. In client part located in PDA, user interface program executes the user registration and verification process. The server consisting of the PCA and LDA algorithm shows excellent face recognition performance and the signature recognition method based on the Kernel PCA and LDA algorithm for signature image projected to vertical and horizontal axes by grid partition method. The proposed algorithm is evaluated with several face and signature images and shows better recognition and verification results than previous unimodal biometrics recognition techniques.

Implementation of Mobile Authentication System for Context-Awareness based on Near Field Communication (근거리 통신 기반의 상황 인식을 위한 모바일 인증 시스템의 구현)

  • Park, Hung-Bog;Seo, Jung-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.39-46
    • /
    • 2017
  • Today, mobile devices are becoming essential for everyday life, and integration of mobile computing, situation recognition and intellectual service accelerates mobile interaction. Surrounding intelligence detection technology is extremely important. These technologies can automatically acquire and recognize surrounding information and situations. Situation recognition can realize wide-range mobile recognition for intellectual services of users' diverse activities, by distinguishing many surrounding devices and recognizing their situations. Thus, this paper suggests application for students' mobile authentication such as college campus attendance authentication, and redesign existing plastic student ID as NFC-compatible mobile authentication system. Experiment results proved NFC-compatible mobile touch-based interactions can maximize the strengths of NFC technology because it can recognize limits in some situations such as tardiness and absences by automating student validation and preventing far-distance reading.

An Efficient Scheme to Create Data Delivery Tree for Community Group Communication (커뮤니티 그룹 통신을 위한 효율적인 데이터 전달 트리 구성 방안)

  • Oh, Je-Jun;Kang, Nam-Hi;Kim, Yong-Hyuk;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.55-63
    • /
    • 2007
  • Multicast is an efficient transport mechanism for community communications and MANET is recently regarded as a promising solution for support ubiquitous computing as an underlying network technology. However, it is hard to deploy multicast mechanism into MANET owing to scarce resources in wireless networks and unpredictable changes in network topology. Several multicast mechanisms have been proposed in the literature to overcome the limitations. Especially, overlay multicasting schemes present several advantages over network based multicasting schemes. Yet, the overlay multicasting schemes still introduce redundant data transmissions that waste network bandwidth and battery of relay nodes. As a result the performance of the network is degraded. To reduce the redundancy, we propose an efficient way to construct an overlay structure as a multicast data delivery tree that utilizes a branch node which belongs to the tree. By using network simulation, we show that the proposed scheme presents higher packet delivery ratio and lower transmission cost than previously proposed schemes.

Design of the Smart Application based on IoT (사물 인터넷 기반 스마트 응용의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.151-155
    • /
    • 2017
  • With the rapid growth of the up-to-date wireless network and Internet technologies, huge and various types of things around us are connected to the Internet and build the hyper-connected society, and lots of smart applications using these technologies are actively developed recently. IoT connects human, things, space, and data with various types of networks to construct the hyper-connected network that can create, collect, share and appling realtime information. Furthermore, most of the smart applications are concentrated on the service that can collect and store realtime contexts using various sensors and cloud technology, and provide intelligence by making inferences and decisions from them nowadays. In this paper, we design a smart application that can accurately control and process the current state of the specific context in realtime by using the state-of-the-art ICT techniques such as various sensors and cloud technologies on the IoT based mobile computing environment.

Health Information Monitoring System using Context Sensors based Band (상황센서 기반의 밴드를 이용한 건강정보 모니터링 시스템)

  • Chung, Kyung-Yong;Lee, Young-Ho;Ryu, Joong-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.14-22
    • /
    • 2011
  • It is important for the strategy of service to provide the health information in the environment that the healthcare has been changed focusing on the preventive medicine. Recently, the various applications of u-healthcare have been presented by researchers. In this paper, we proposed the health information monitoring system using the context sensors based band. By wearing the proposed hand, the health status is gathered and vital signals are transmitted to the connected UMPC. It can be easily monitored according to the user locations in real time. To provide the health index according to the temperature, the air conditioning, the illumination, the humidity, and the ultraviolet rays, we use the various XML links extracted from RSS of the Korea Meteorological Administration. The health information is analyzed in terms of factors, such as, the asthma index, the stroke index, the skin disease index, the pulmonary disease index, the pollen concentration index, and the city high temperature index. Ultimately, this paper suggests empirical application to verify the adequacy and the validity with the proposed system. Accordingly, the satisfaction and the quality of services will be improved the healthcare.