• Title/Summary/Keyword: 유비쿼터스 서비스 요구도

Search Result 462, Processing Time 0.022 seconds

Design of Dynamic Location Privacy Protection Scheme Based an CS-RBAC (CS-RBAC 기반의 동적 Location Privacy 보호 구조 설계)

  • Song You-Jin;Han Seoung-Hyun;Lee Dong-Hyeok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.415-426
    • /
    • 2006
  • The essential characteristic of ubiquitous is context-awareness, and that means ubiquitous computing can automatically process the data that change according to space and time, without users' intervention. However, in circumstance of context awareness, since location information is able to be collected without users' clear approval, users cannot control their location information completely. These problems can cause privacy issue when users access their location information. Therefore, it is important to construct the location information system, which decides to release the information considering privacy under the condition such as location, users' situation, and people who demand information. Therefore, in order to intercept an outflow information and provide securely location-based information, this paper suggests a new system based CS-RBAC with the existing LBS, which responds sensitively as customer's situation. Moreover, it accommodates a merit of PCP reflecting user's preference constructively. Also, through privacy weight, it makes information not only decide to providing information, but endow 'grade'. By this method, users' data can be protected safely with foundation of 'Role' in context-aware circumstance.

A Study on U-Service for Security in U-City Newtown Planning (신도시계획의 계획지표를 반영한 U-City의 U-방범서비스 개선방안 연구)

  • Yoon, Hyo Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.5D
    • /
    • pp.645-654
    • /
    • 2009
  • This study started with necessity of historical spatial planning skills in U-city planning. Though U-city technology and information are very important, U-city development should be considered on the base of various experience of spatial planning. This study explored spatial planning indexes change in the recent newtown plans. In particular, safety and security were intensively analyzed. In addition, many theories on safe urban space, ubiquitous technology, traditional defensible space, and CPTED (Crime Prevention through Environmental Design) are compared. The findings are as follows. First, each planning is not integrated and there is lack of network among each planning. Specifically, from the crime prevention perspective, there is only mechanical monitoring such as CCTV without architectural approach. Even though CCTV is social needs, it is necessary to adopt it with architectural environment in order to improve the synergy effect of spatial planning and non-spatial planning.

Study on the Standardization of Management Form through Integrated Management of CCTV (CCTV 통합관리를 위한 관리대장 표준화 연구)

  • PARK, Jeong-Woo;LEE, Seong-Ho;NAM, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.2
    • /
    • pp.63-72
    • /
    • 2016
  • Closed-circuit television(CCTV) is a facility that forms the backbone of the ubiquitous services provided by the Integrated Management Center of the Ministry of Land, Infrastructure and Transport and the Integrated Control Center of the Ministry of the Interior. However, it is installed and managed according to different laws, as it is operated and managed by each department. Moreover, because there are no regulatory grounds for unified management of CCTV, each municipality responsible for the actual management manages it based on the individual standards of each department. Thus, the purpose of this study is to develop a standardized management form to establish an integrated management plan. The author inspected the existing situation by examining the legal system and public data and through hands-on worker interviews, and discovered the managed element by reviewing the specifications of the bidding system. The management form for integrated management comprises the above requirements along with the management histories and linkage of intelligent facilities. A uniform management form for integrated management containing specifications of the CCTVs installed by various departments is created, and is easily searched for facilities to check requirements for joint use. The result of this study can contribute to building the database of facility management system for integrated management of facilities at the integrated management center as well as for a detailed simulation of the selection of location of CCTV depending on the CCTV's specifications.

A Similarity-based Inference System for Identifying Insects in the Ubiquitous Environments (유비쿼터스 환경에서의 유사도 기반 곤충 종 추론검색시스템)

  • Jun, Eung-Sup;Chang, Yong-Sik;Kwon, Young-Dae;Kim, Yong-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.175-187
    • /
    • 2011
  • Since insects play important roles in existence of plants and other animals in the natural environment, they are considered as necessary biological resources from the perspectives of those biodiversity conservation and national utilization strategy. For the conservation and utilization of insect species, an observational learning environment is needed for non-experts such as citizens and students to take interest in insects in the natural ecosystem. The insect identification is a main factor for the observational learning. A current time-consuming search method by insect classification is inefficient because it needs much time for the non-experts who lack insect knowledge to identify insect species. To solve this problem, we proposed an smart phone-based insect identification inference system that helps the non-experts identify insect species from observational characteristics in the natural environment. This system is based on the similarity between the observational information by an observer and the biological insect characteristics. For this system, we classified the observational characteristics of insects into 27 elements according to order, family, and species, and proposed similarity indexes to search similar insects. In addition, we developed an insect identification inference prototype system to show this study's viability and performed comparison experimentation between our system and a general insect classification search method. As the results, we showed that our system is more effective in identifying insect species and it can be more efficient in search time.

An Intelligent Land Vehicle Information System for CDMA-based Wireless Remote Diagnosis and Management (CDMA기반 무선 원격진단 및 관리를 위한 지능형 차량 정보 시스템)

  • Kim, Tae-Hwan;Lee, Seung-Il;Hong, Won-Kee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.2
    • /
    • pp.91-101
    • /
    • 2006
  • Researches on services of vehicles have been mainly focused on how to provide useful information and entertainment for an in-vehicle driver. However, the needs are appreciably increased for more advanced services that help drivers to check and manage their vehicles conveniently, without requiring drivers to attach to their vehicles. It is a sort of ubiquitous computing, providing an intelligent interactive services for human at any time and any where. In this paper, we present an intelligent vehicle information system to enable a driver to remotely diagnose and control a vehicle via CDMA communication network connected to the Internet. The system improves mobility for diagnosis and control of vehicle by implementing a cut and call back mechanism, which allows the vehicle terminal to have access to the information server on the Internet via CDMA call. No matter where the driver is, he can obtain the remote diagnosis and control services on the web browser without any additional application installation. Design methodology is introduced and evaluation results are analyzed for the CDMA-based intelligent vehicle information system. The experimental results show that the response time of the vehicle terminal to a web client request is 10.302 seconds at the beginning and 646.44ms thereafter. The average response time of CAN sensor node to a vehicle terminal request is 6.669ms.

The Design of Maternity Monitoring System Using USN in Maternity Hospital (USN을 이용한 산모 모니터링 시스템 모델 설계)

  • Lee, Seo-Joon;Sim, Hyun-Jin;Lee, A-Rom;Lee, Tae-Ro
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.347-354
    • /
    • 2013
  • In contrast to the increase in demand for high quality healthcare, there is limited medical human resources such as doctors and nurses so an excessive amount of workload is being forced to them. Therefore, a patient monitoring system using USN(Ubiquitous Sensor Network) is becoming a solution. This paper proposes a patient monitoring system applying USN in maternity hospital to reduce the workload of nurses. According to the efficiency evaluation test based on the model of two university hospitals(S, K University Hospital) and their doctor's diagnosis, the results showed that under the circumstances that one nurse is in charge of 12 patients(6 normal delivery patients and 6 cesarean delivery patients), a total of 1,260 minutes of workload was saved during hospitalization period(5 days). Also, we compared the workload of nurses with or without our proposed system, and the figures showed that in case of normal delivery patients, the workload of nurses decreased by 50 minutes per patient, whereas in case of cesarean delivery patients, the workload of nurses decreased by 130 minutes per patient.

센서 네트워크용 초소형 OS

  • Song, Jun-Geun;Ma, Pyeong-Su;Park, Seung-Min
    • Information and Communications Magazine
    • /
    • v.24 no.7
    • /
    • pp.26-35
    • /
    • 2007
  • 최근 몇 년간 유비쿼터스 서비스를 구현하기 위한 핵심 기술 중 하나인 무선 센서 네트워크에 대한 관심이 높아지고 있다. 무선 센서 네트워크 기술은 물류, 유통, 환경 감시, 홈오토메이션, 군사 분야 등 다양한 분야에 적용 될 수 있기 때문에 앞으로 관련 분야의 시장 또한 커질 것으로 예상되고 있다 [1]. 무선 센서 네트워크는 기존 유선 센서 네트워크나 무선 네트워크 환경과는 많은 차이를 가진다. 우선 극도로 제한된 시스템 자원만을 가질 수 있으며, 열악한 환경 속에서 무선매체를 통해 유기적으로 동작하여야 하는 특징을 가지고 있다. 적게는 수십 개에서 많게는 수백, 수천 개의 자율적인 하드웨어 노드들로 구성되는 무선 센서 네트워크에서 제한된 자원을 효과적으로 활용하기 위해서는 센서 노드에 적합한 운영체제가 필수적으로 요구된다. 지난 몇 년간 센서 노드하드웨어의 발달과 더불어 많은 센서 네트워크용 초소형 운영체제가 개발되어왔다. 현재 많이 알려져 있는 센서 네트워크용 OS로는, 가장 활발한 참여를 보이고 있는 TinyOS[3]부터 SOS[4], MANTIS[5], Contiki[6], T-kernel[7] 등이 있으며, 국내 기술로 개발된 Nano-Qplus[8] 등이 존재한다. 본고에서는 우선 센서 네트워크에 대한 배경 지식과 플랫폼 등에 대한 내용을 간단히 다루고, 본론에서 센서 네트워크용 운영체제가 가져야 할 조건과 현재 개발되어 있는 센서 네트워크 OS들의 특징에 대해 간략히 살펴보도록 하겠다. 또한 센서 네트워크 OS와 밀접한 연관성을 가지는 분야에 대해 간단히 살펴보고, 마지막으로 앞으로의 방향에 대해 알아본다.고려해 볼 때 atlas의 장축의 시계방향 회전은 액티베이터의 사용 효과로 생각되며, 이는 차후 II급 부정교합자에서 액티베이터 치료 효과를 판단하는 또 하나의 지표가 될 수 있다고 생각한다.인해 한반도를 포함한 동아시아 대륙이 태평양판 쪽으로 밀려감으로써 섭입하던 태평양판의 각도가 급해져 동아시아 연변에 강력한 흡입력이 발생하였으며, 이 때문에 태평양판의 운동 방향이 북북서에서 서북서방향으로 회전되었을 가능성이 있다. 따라서 약 51 Ma부터 한반도 동남부에는 지판 경계의 강력한 흡입력으로 동서 내지 서북서-동남동의 인장력이 작동되어 B그룹 암맥군이 관입한 것으로 해석된다.Ledge는 세 군 모두에서 나타나지 않았다. 4. 파일 binding 횟수는 MC군이 가장 적고 PT군이 가장 많았다 (p < 0.05). 이상의 결과를 볼 때, Mtwo 전동 파일을 crown-down technique으로 사용하는 것이 single length technique과 유사한 성형 효율을 보이면서도 더 안전할 것으로 추정된다.고 1명(3%)에서 원격전이를 보였다. 치료 중 급성 합병증으로 11명(37%)에서 RTOG grade 1-2의 장염을 보였으며 1명은 대장의 천공이 발생하여 수술로 치유되었다. 12명(40%)에서 RTOG grade 1-2의 급성 방광염을 보였다. 3명(10%)에서 RTOG grade 1-2의 백혈구 감소증이 보였으며 1명에서 심한 백혈구 감소증(RTOG grade 4)이 나타났으나 회복되어 치료를 완료하였다. 만성 합병증으로 5명(15%)에서 RTOG grade 1-2의 만성 장염을 보였으며 별다른 치료 없이 지내고 있으며

Technical problems of Li-Fi wireless network (무선 네트워크 기술 Li-Fi의 문제점)

  • Park, Hyun Uk;Kim, Hyun Ho;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.186-188
    • /
    • 2014
  • In recent years, domestic as well as LTE wireless network of Wi-Fi and most used. In addition, mobile-intensive services that used mainly in our society makes it easier, SNS, application (APP), and file downloads. As such, the amount of data requested, while living at the time of mobile users will want to be safe from the earliest. And the wireless network communications mortality (3G, 4G (LTE), LTE-A) and Wi-Fi (802.11 n-2.4 G H z z H a c-5, 802.11 G), and users are mainly used in the death 4G (LTE), communication Wi-Fi, 802.11 n-2.4 GHz are used most frequently. As above, use the wireless network in order to safely and quickly developed the technology of the Li-Fi. Li-Fi light (visible light) technology to communicate with, and Wi-Fi (802.11 n-2.4 G z H) 100 times faster, LTE-A 66 times faster. However, the current Li-Fi to commercialise the big issue exists. In this paper, there are a lot of existing problems in the commercialization of Li-Fi being used in Wi-Fi, and a comparative analysis.

  • PDF

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

An Analysis of Big Video Data with Cloud Computing in Ubiquitous City (클라우드 컴퓨팅을 이용한 유시티 비디오 빅데이터 분석)

  • Lee, Hak Geon;Yun, Chang Ho;Park, Jong Won;Lee, Yong Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.45-52
    • /
    • 2014
  • The Ubiquitous-City (U-City) is a smart or intelligent city to satisfy human beings' desire to enjoy IT services with any device, anytime, anywhere. It is a future city model based on Internet of everything or things (IoE or IoT). It includes a lot of video cameras which are networked together. The networked video cameras support a lot of U-City services as one of the main input data together with sensors. They generate huge amount of video information, real big data for the U-City all the time. It is usually required that the U-City manipulates the big data in real-time. And it is not easy at all. Also, many times, it is required that the accumulated video data are analyzed to detect an event or find a figure among them. It requires a lot of computational power and usually takes a lot of time. Currently we can find researches which try to reduce the processing time of the big video data. Cloud computing can be a good solution to address this matter. There are many cloud computing methodologies which can be used to address the matter. MapReduce is an interesting and attractive methodology for it. It has many advantages and is getting popularity in many areas. Video cameras evolve day by day so that the resolution improves sharply. It leads to the exponential growth of the produced data by the networked video cameras. We are coping with real big data when we have to deal with video image data which are produced by the good quality video cameras. A video surveillance system was not useful until we find the cloud computing. But it is now being widely spread in U-Cities since we find some useful methodologies. Video data are unstructured data thus it is not easy to find a good research result of analyzing the data with MapReduce. This paper presents an analyzing system for the video surveillance system, which is a cloud-computing based video data management system. It is easy to deploy, flexible and reliable. It consists of the video manager, the video monitors, the storage for the video images, the storage client and streaming IN component. The "video monitor" for the video images consists of "video translater" and "protocol manager". The "storage" contains MapReduce analyzer. All components were designed according to the functional requirement of video surveillance system. The "streaming IN" component receives the video data from the networked video cameras and delivers them to the "storage client". It also manages the bottleneck of the network to smooth the data stream. The "storage client" receives the video data from the "streaming IN" component and stores them to the storage. It also helps other components to access the storage. The "video monitor" component transfers the video data by smoothly streaming and manages the protocol. The "video translator" sub-component enables users to manage the resolution, the codec and the frame rate of the video image. The "protocol" sub-component manages the Real Time Streaming Protocol (RTSP) and Real Time Messaging Protocol (RTMP). We use Hadoop Distributed File System(HDFS) for the storage of cloud computing. Hadoop stores the data in HDFS and provides the platform that can process data with simple MapReduce programming model. We suggest our own methodology to analyze the video images using MapReduce in this paper. That is, the workflow of video analysis is presented and detailed explanation is given in this paper. The performance evaluation was experiment and we found that our proposed system worked well. The performance evaluation results are presented in this paper with analysis. With our cluster system, we used compressed $1920{\times}1080(FHD)$ resolution video data, H.264 codec and HDFS as video storage. We measured the processing time according to the number of frame per mapper. Tracing the optimal splitting size of input data and the processing time according to the number of node, we found the linearity of the system performance.