• Title/Summary/Keyword: 유비쿼터스 서비스 요구도

Search Result 462, Processing Time 0.03 seconds

Reliable Extension Scheme using Multiple Paths in Wireless Ad-hoc Networks (무선 애드-혹 네트워크의 다중 경로를 이용한 신뢰적인 확장 기법)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.218-225
    • /
    • 2007
  • As the research on home network technologies, sensor network technologies, and ubiquitous network technologies makes rapid progresses, wireless ad-hoc network have attracted a lot of attention. A wireless mobile ad-hoc network is a temporary network formed by a collection of wireless mobile nodes without the aid of any existing network infrastructure or centralized administration, and it is suitable for ubiquitous computing environments. In this paper, we suggest an extension scheme of a wireless mobile ad-hoc network based on limited multiple paths source routing protocol. This scheme reduces the overhead of route re-establishment and re-registration by maintaining link/node non-disjoint multiple paths between mobile hosts in a wireless mobile ad-hoc network or a mobile host in a wireless mobile ad-hoc network and a base station supporting fixed network services. By maintaining multiple paths, our scheme provides short end-to-end delay and is reliable extension scheme of a wireless mobile ad-hoc network to a fixed network. In this paper, our simulations show that our scheme outperforms existing schemes with regards to throughput and end-to-end delay. Also we show that our scheme outperforms multi-paths approach using disjoint routes with regards to routing overhead.

Design and Implementation of Picture Archiving and Communication System Component using the RFID for Mobile Web Environments (모바일 웹 환경을 위한 의료영상저장전송시스템 컴포넌트의 설계 및 구현)

  • Kim Chang-Soo;Yim Jae-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1124-1131
    • /
    • 2006
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. Moreover, MIS, PACS(Picture Archiving and Communication System), OCS, EMR are also developing. Medical Information System is evolved toward integration of medical IT and situation is changing with increasing high speed in the ICT convergence. Mobile component refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to internet whenever and wherever. It is the core technology to implement automatic medical processing system. This paper provides a basic review of RFID model, PACS application component services. In addition, designed and implemented database server's component program and client program of mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented mobile PACS that performed patient data based db environments, and so reduced delay time of requisition, medical treatment, lab.

A Study on the Agent Component Development Support to PDA (PDA 지원 에이전트 컴포넌트 개발에 대한 연구)

  • Kim Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.37-50
    • /
    • 2006
  • In the focusing on the important of wireless internet, mobile terminal device plays a central role in tracking and coordinating terms in mobile business processing. Especially, mobile device has been considered as a key technology for embedded software and ubiquitous era. Because existing web environments is moving to wireless internet, the new concepts for wireless internet computing environments has gained increasing interest. Mobile agents provide a new abstraction for deploying over the existing infrastructures. Mobile application systems require the flexibility, adaptability, extensibility, and autonomous. New software developments methodology is required to meet the requirements. In this paper, we present an agent architectures model that allows compassable components with pluggable and independable. Our approach involves wrapping components inside a servlet. We have used the model and components to develop the PDA mobile agent.

Analysis on Children's Response Depending on Teaching Assistant Robots' Styles (교사 보조 로봇 스타일에 따른 아동 반응 분석)

  • Jung, Jae-Gyeong;Choi, Jong-Hong;Han, Jeong-Hye
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.195-203
    • /
    • 2007
  • Together with the development of ubiquitous computing technology and robot technology, intelligent type robots are being utilized in many areas and the range is expected to become wider and wider. Among many service robots, the educational robots are being diversely studied in the field with the concept of r-Learning. Presently, teaching assistant robots require a lot of HRI studies prior to their practical use in the very near future and are not sufficient yet. Especially, the reactions of students based of the styles of robots (e.g. serious robot, playful robot) are very important in producing robot contents but there has been no case study on them. Therefore, in this study, the appearance of the IROBI was changed to become a teaching assistant robot and was used to test and compare elementary school students' interest, achievement and concentration depending on the styles of robot (playful, serious). The results showed that the interest was high in the group that had studied with the playful robot. The achievement however, did not show significant relations with the style of robot and that the concentration was high in the group that had studied with the serious robot.

  • PDF

A Study on the Characteristic of Ubiquitous Infrastructure for u-City (u-City 도시기반시절의 특성에 관한 연구)

  • Eum, Min-Kyung;Song, Seung-Min;Kim, Do-Nyun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.5
    • /
    • pp.93-102
    • /
    • 2011
  • IT technologies applied in the urban places are being promoted in each area. Especially infrastructure is performed in the central role of technical support in urban area. However, u-City infrastructure has lack of integrated way and concentrated on only feasible technology which cause frequent substitution and the nested technology in urban area. Therefore this study sheds light on infrastructure through a overall considerations of urban compositional elements and interactions, and apply technology in the process of the industrial era, the domestic supply of urban infrastructure and the cycle comparison-analysis deal with the domestic implications when applied. The results of the study, first, the u-City infrastructure should be supplied by public. Second, u-City infrastructure is in need of the agile character, and standardization of the subtleties is needed. Third, a new system of integrated-macroscopic perspective should be established by changes that influenced by convergences of IT technologies and infrastructures. Fourth, u-City infrastructures planning should consider interactions of services, devices and systems.

A Study on Security Routing using MD5 in MANET Environments (MANET 환경에서 MD5를 이용한 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung;Jung, Sung-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.728-731
    • /
    • 2008
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on IETF MANET working group, Bluetooth, and HomeRF working group and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. For perfect MANET setting, routing is required which can guarantee security and efficiency through secure routing. In routing in this study, hashed AODV is used to protect from counterfeiting messages by malicious nodes in the course of path 'finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

  • PDF

Comparing the Survey Package of Land Administration Domain Model with the Cadastral Information Model in Korea (ISO TC 211 Land Administration Domain Model의 SurveyPackage와 국내지적정보모델의 비교 연구)

  • Kim, Sang-Min;Han, Soo-Hee;Heo, Joon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.4
    • /
    • pp.113-119
    • /
    • 2009
  • In Ubiquitous Information society, real shape of spatial information and accurate position information are required. Spatial information standardization is needed to service for the people. International standard was defined to ensure compatibilities of various standards, technologies, and terminologies and to promote mutual trade certain criteria and standard forms were established through international agreement. International standard is made by International Organization for Standardization, and International Standard Organization Technical Committee 211 manages the geographic information field. ISO TC 211 is working on LADM (Land Administration Domain Model) which defines administration law and spatial surveying component related to land and efficiently manages data and land systems of the countries. This study introduced processing of standardization of a surveying package which is related with LADM and comparing it with Korea Cadastral information system.

  • PDF

Experimental Performance Comparison for Prediction of Red Tide Phenomenon (적조현상의 실험적 예측성능 비교)

  • Heo, Won-Ji;Won, Jae-Kang;Jung, Yong-Gyu
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.1-6
    • /
    • 2012
  • In recent years global climate change of hurricanes and torrential rains are going to significantly, that increase damages to property and human life. The disasters have been several claimed in every field. In future, climate changes blowing are keen to strike released to the world like in several movies. Reducing the damage of long-term weather phenomena are emerging with predicting changes in weather. In this study, it is shown how to predict the red tide phenomenon with multiple linear regression analysis and artificial neural network techniques. The red tide phenomenon causing risk could be reduced by filtering sensor data which are transmitted and forecasted in real time. It could be ubiquitous driven custom marine information service system, and forecasting techniques to use throughout the meteorological disasters to minimize damage.

Analyses of Security Consideration and Vulnerability based on Internet of Things (사물인터넷 기반의 시스템을 위한 보안 취약성 및 고려사항 분석)

  • Jang, Chang-hwan;Jo, Sung-ho;Lee, Jin-hyup;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.491-494
    • /
    • 2017
  • Recently, IoT has been supported by ICT technology with a variety of ICT powers. In May 2014, Information and Communication Strategy Committee announced the 'Basic plan for Internet of Things'. Also on Febuary 24 this SAME year, KISA(Korea Internet&Security Agency) provides many projects related to IoT, such as announcement of 'K-Global Project' for start-up and venture support related to IoT and ICT companies. In contrast to the various services of Internet of Things, when a connection is made between object-to-object or person-to-object wired and wireless networks, security threats have occurred in the process of communication. We analyzed these kinds of security threats related to Internet of things, and gave a consideration for requirement.

  • PDF

Multiplication optimization technique for Elliptic Curve based sensor network security (Elliptic curve기반 센서네트워크 보안을 위한 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1836-1842
    • /
    • 2010
  • Sensor network, which is technology to realize the ubiquitous environment, recently, could apply to the field of Mechanic & electronic Security System, Energy management system, Environment monitoring system, Home automation and health care application. However, feature of wireless networking of sensor network is vulnerable to eavesdropping and falsification about message. Presently, PKC(public key cryptography) technique using ECC(elliptic curve cryptography) is used to build up the secure networking over sensor network. ECC is more suitable to sensor having restricted performance than RSA, because it offers equal strength using small size of key. But, for high computation cost, ECC needs to enhance the performance to implement over sensor. In this paper, we propose the optimizing technique for multiplication, core operation in ECC, to accelerate the speed of ECC.