• Title/Summary/Keyword: 무선 컴퓨팅

Search Result 762, Processing Time 0.024 seconds

Service-Oriented Wireless Sensor Networks Ontology for Ubiquitous Services (유비쿼터스 서비스를 위한 서비스 지향 센서 네트워크 온톨로지)

  • Kim, Jeong-Hee;Kwon, Hoon;Kim, Do-Hyeun;Kwak, Ho-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.971-978
    • /
    • 2008
  • This paper designs a service-oriented wireless sensor network ontology model which can be used as a knowledge base in future ubiquitous computing. In contrast to legacy approaches, this paper defines the new service classes (ServiceProperty, LocationProperty, and PhysicalProperty), as well as their properties and constraints that enable the service-oriented service based on service items. The service item merging between the proposed model and the legacy ontology was processed using the "equivalentClass" object property of OWL. The Protege 3.3.1 and RACER 1.9.0 inference tools were used for the validation and consistency check of the proposed ontology model, respectively, and the results of service query was applied to the newly defined property in SPARQL language without reference to the properties of legacy ontology.

A Design of Framework based on SyncML for Smart Synchronization of u-GIS (u-GIS 스마트 동기화를 위한 SyncML 기반 프레임워크 설계)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1039-1044
    • /
    • 2008
  • Owing to rapid advancements of the mobile computing technologies and the performance of mobile device recently, the data synchronization techniques between severs and mobile clients are getting more and more important. OMA also proposes and recommends standard synchronization methods to use SyncML. However, the feasible data in the method are limited to normal document data, scheduler data, etc. This paper a standard framework based on SyncML. We call it SCGFG. The SCGFG is able to synchronize not only the above data but also GIS data which is very useful in mobile applications. It applies GML, international GIS standard, to the synchronization. By means of using XML, it is also able to resolve the serious problem that is the increase of data volume occurred by SyncML and GML. efficiently. It is highly expected to be useful in the smart synchronization of GIS data among several servers and mobile clients.

Design And Implementation of Zone Based Location Tracking System Using ZigBee in Indoor Environment (실내 환경에서 ZigBee를 이용한 Zone 기반 위치추적 시스템 설계 및 구현)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.1003-1006
    • /
    • 2009
  • Recently, Ubiquitous computing technology is increasing necessity for object recognition and a location tracking technology to meet various applications. The location tracking technology is the fundamental to the Context-Aware of users in Ubiquitous environment and its efficiency has to be improved using IEEE 802.15.4 ZigBee used in current infra such as ubiquitous sensor network. But because the IEEE 802.15.4 ZigBee protocol has limitation to apply location tracking technology such as ToA and TDoA, Zone-based Location Tracking technology using RSSI is needed. In this paper suggests RSSI-based 802.15.4 ZigBee local positioning protocol to support a positioning tracking service in Ubiqutous environment. And Zone-based location tracking system is designed for actual the indoor location tracking service.

  • PDF

A mobile data caching synchronization strategy based on in-demand replacement priority (수요에 따른 교체 우선 순위 기반 모바일 데이터베이스 캐쉬 동기화 정책)

  • Zhao, Jinhua;Xia, Ying;Lee, Soon-Jo;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.13-21
    • /
    • 2012
  • Mobile data caching is usually used as an effective way to improve the speed of local transaction processing and reduce server load. In mobile database environment, due to its characters - low bandwidth, excessive latency and intermittent network, caching is especially crucial. A lot of mobile data caching strategies have been proposed to handle these problems over the last few years. However, with smart phone widely application these approaches cannot support vast data requirements efficiently. In this paper, to make full use of cache data, lower wireless transmission quantity and raise transaction success rate, we design a new mobile data caching synchronization strategy based on in-demand and replacement priority. We experimentally verify that our techniques significantly reduce quantity of wireless transmission and improve transaction success rate, especially when mobile client request a large amount of data.

Space-Efficient Compressed-Column Management for IoT Collection Servers (IoT 수집 서버를 위한 공간효율적 압축-칼럼 관리)

  • Byun, Siwoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.1
    • /
    • pp.179-187
    • /
    • 2019
  • With the recent development of small computing devices, IoT sensor network can be widely deployed and is now readily available with sensing, calculation and communi-cation functions at low cost. Sensor data management is a major component of the Internet of Things environment. The huge volume of data produced and transmitted from sensing devices can provide a lot of useful information but is often considered the next big data for businesses. New column-wise compression technology is mounted to the large data server because of its superior space efficiency. Since sensor nodes have narrow bandwidth and fault-prone wireless channels, sensor-based storage systems are subject to incomplete data services. In this study, we will bring forth a short overview through providing an analysis on IoT sensor networks, and will propose a new storage management scheme for IoT data. Our management scheme is based on RAID storage model using column-wise segmentation and compression to improve space efficiency without sacrificing I/O performance. We conclude that proposed storage control scheme outperforms the previous RAID control by computer performance simulation.

A Secure Maintenance Scheme of Secret Data on Trusted Mobile Platform Environment (Trusted Mobile Platform 환경에서의 안전한 비밀 데이터 유지(이전) 방안)

  • Kang, Dong-Wan;Lee, Im-Yeong;Han, Jin-Hee;Jun, Sung-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.79-91
    • /
    • 2008
  • Modern society as an information society, a lot of information is communicated in on-line. Specially, mobile environment based on radio communication has a characteristic of flexibility compared with wire communication and is developed rapidly. However, the more mobile technology is developed the more security for sensitive information is needed. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM, hardware security module for mobile environment, offers user's privacy protection, platform integrity verification, and individual platform attestation. On the other hand, secure migration scheme is required in case secret data or key is transferred from one platform to the other platform. In this paper, we analyze migration schemes which were described in TCG standard and other papers and then propose security maintenance scheme for secret data using USIM(Universal Subscriber Identity Module).

Efficient authenticate protocol for very Low-Cost RFID (저가형 RFID 시스템을 위한 효율적인 인증 프로토콜)

  • Choi Eun Young;Choi Dong Hee;Lim Jong In;Lee Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.59-71
    • /
    • 2005
  • A RFID (Radio Frequency Identification) system receives attention as the technology which can realize the ubiquitous computing environment. However, the feature of the RFID tags may bring about new threats to the security and privacy of individuals. Recently, Juels proposed the minimalist cryptography for very low-cost RFID tags, which is secure. but only under the impractical assumption such that an adversary is allowed to eavesdrop only the pre-defined number of sessions. In this paper, we propose a scheme to protect privacy for very low-cost RFID systems. The proposed protocol uses only bit-wise operations without my costly cryptographic function such as hashing, encryption which is secure which is secure against an adversary who is allowed to eavesdrop transmitted message in every session any impractical assumption. The proposed scheme also is more efficient since our scheme requires less datas as well as few number of computations than Juels's scheme.

Analysis of the Valuation Model for the state-of-the-art ICT Technology (첨단 ICT 기술에 대한 가치평가 모델 분석)

  • Oh, Sun-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.705-710
    • /
    • 2021
  • Nowadays, cutting-edge information communication technology is the genuine core technology of the fourth Industrial Revolution and is still making great progress rapidly among various technology fields. The biggest issue in ICT fields is the machine learning based Artificial Intelligence applications using big data in cloud computing environment on the basis of wireless network, and also the technology fields of autonomous control applications such as Autonomous Car or Mobile Robot. Since value of the high-tech ICT technology depends on the surrounded environmental factors and is very flexible, the precise technology valuation method is urgently needed in order to get successful technology transfer, transaction and commercialization. In this research, we analyze the characteristics of the high-tech ICT technology and the main factors in technology transfer or commercialization process, and propose the precise technology valuation method that reflects the characteristics of the ICT technology through phased analysis of the existing technology valuationmodel.

Regionalized TSCH Slotframe-Based Aerial Data Collection Using Wake-Up Radio (Wake-Up Radio를 활용한 지역화 TSCH 슬롯프레임 기반 항공 데이터 수집 연구)

  • Kwon, Jung-Hyok;Choi, Hyo Hyun;Kim, Eui-Jik
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.1-6
    • /
    • 2022
  • This paper presents a regionalized time slotted channel hopping (TSCH) slotframe-based aerial data collection using wake-up radio. The proposed scheme aims to minimize the delay and energy consumption when an unmanned aerial vehicle (UAV) collects data from sensor devices in the large-scale service area. To this end, the proposed scheme divides the service area into multiple regions, and determines the TSCH slotframe length for each region according to the number of cells required by sensor devices in each region. Then, it allocates the cells dedicated for data transmission to the TSCH slotframe using the ID of each sensor device. For energy-efficient data collection, the sensor devices use a wake-up radio. Specifically, the sensor devices use a wake-up radio to activate a network interface only in the cells allocated for beacon reception and data transmission. The simulation results showed that the proposed scheme exhibited better performance in terms of delay and energy consumption compared to the existing scheme.

Development of External Expansion Devices and Convergence Contents for Future Education based on Software Teaching Tools (소프트웨어 교육용 교구 활용 미래 교육을 위한 융합 콘텐츠 및 외부 확장장치 개발)

  • Ju, Yeong-Tae;Kim, Jong-Sil;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1317-1322
    • /
    • 2021
  • Software in the era of the Fourth Industrial Revolution is becoming a key foundation in an intelligent information society. Therefore, it is necessary to study the new direction of manpower training and education that can cope with the times. To this end, the Ministry of Education reorganized the curriculum and is implementing software education based on a logical problem-solving process based on computing thinking skills rather than acquiring general ICT knowledge. However, there is a lack of securing high-quality educational content for software education, and there is also a lack of teaching aids that can be taught in connection with advanced IT technologies. To overcome this, this paper proposes the development of external expansion devices to expand educational content and functions capable of convergent software education such as artificial intelligence using coding robots for software education. Through this, effective software education is possible by improving the curriculum of the existing simple problem-solving method and developing various learning materials.