• Title/Summary/Keyword: 유비쿼터스 컴퓨팅 기술

Search Result 769, Processing Time 0.028 seconds

A Methodology of Optimal Technology Combination Selection for Developing a Specific Ubiquitous Smart Space (특정 유비쿼터스 지능공간 구축을 위한 기술조합에 대한 최적 선정 방법론)

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.3
    • /
    • pp.109-131
    • /
    • 2008
  • Ubiquitous Smart Space(USS) like u-City has been expected to create a high added value. However, developing USS has a high risk because it should use future technologies and development methodologies that have been never tried in the past. Hence, it has to be considered thoroughly in the very first stage of development. Moreover, USS usually uses several ubiquitous computing technologies combinationally because of the nature of USS. Despite of this, existing technology selection methodologies or technology evaluation methodologies only focus on a single technology. This leads us to develop a methodology of optimal technology combination for developing a specific USS. The purpose of this paper is to propose the methodology and to apply it to develop a real USS. We use portfolio theory and constraint satisfaction problem to determine an optimal technology combination. We also apply our methodology to the national ubiquitous computing project which carries out at present to validate it.

  • PDF

The Study for Context Aware Information Retrieval in Ubiquitous Computing Environment Using UCC Resources (UCC자원을 이용한 유비쿼터스 컴퓨팅 환경에서의 상황인식 정보검색기법에 대한 연구)

  • Lee, Haesung;Kwon, Joonhee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.12-16
    • /
    • 2009
  • Exponentially increasing UCC, experiences which some people get at the specific time and in the specific location are shared on the Web more easily. Also, UCC have been more reliable and more efficient resources, because of many people's natural valuation on each UCC. UCC have potential possibility to be primary factor in all ubiquitous computing environment. However, like ubiquitous computing techniques themselves the current availability and utilization of online UCC is far from realizing their full potential. In this paper, we propose a technique that integrates existing methods from information retrieval and tagging technologies to correspond with user's underlying need for some information in ubiquitous computing environment.

  • PDF

A Trend of Lightweight Block Ciphers (경량 블록 암호 개발 동향)

  • Kang, Jinkeon;Lee, Changhoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.749-752
    • /
    • 2012
  • 유비쿼터스 환경에서 보다 안전하고 편리하게 정보를 교환하기 위해서 암호 기술은 필수적인 요소이다. 유비쿼터스 컴퓨팅 및 네트워크 환경에서 사용되는 장치들은 기존의 장치보다 저사양이기 때문에 기존의 암호 기술을 그대로 적용하기는 어렵다. 이를 위해서 최근 경량 암호에 대한 연구가 활발히 진행되고 있다. 본 논문에서는 RFID/USN 등과 같이 자원이 제한적인 유비쿼터스 컴퓨팅 환경에 적합한 경량 블록 암호의 개발 동향을 분석한다. 기 제안된 경량 블록 암호의 구조와 특징을 분석하여 경량블록 암호 개발 시 고려해야 할 사항들을 살펴본다.

A Ubiquitous Workflow Language based on Web Services (웹 서비스 기반의 유비쿼터스 워크플로우 언어)

  • Han, Joo-Hyun;Cho, Yong-Yoon;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.485-492
    • /
    • 2005
  • Currently workflows in business processes and distributed computing environments have provided service automation by connecting many tasks with rules and/or orderings. The services in ubiquitous computing environments have to automatically provide users with adaptive services according to dynamically changing contort information, which is obtained from both the users and their environment. To adapt these workflows to ubiquitous computing, we must specify the situation information on the transition conditions. In this paper, we propose uWDL, Ubiquitous Workflow Description Language, based on Web Services to use the situation information on the transition constraints of workflow's services. uWDL can select adaptive services according to contexts, profiles, and events information, which are situation information. Furthermore, we verified the execution of a scenario document described with uWDL using the parser and the context handler for uWDL. The scenario developers can use the uWDL scenario editor for a design of scenarios, and they can easily specify the transition condition of the services according the situation information of ubiquitous environments using the uWDL.

A Study on Safe Authentication Method for Security Communication in RFID Environment (RFID 환경에서 보안 통신을 위한 안전한 인증 방안에 관한 연구)

  • Ko, Hoon;Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user's position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.

  • PDF