• Title/Summary/Keyword: 유비쿼터스 컴퓨팅 기술

Search Result 769, Processing Time 0.024 seconds

XML Fragmentation for Resource-Efficient Query Processing over XML Fragment Stream (자원 효율적인 XML 조각 스트림 질의 처리를 위한 XML 분할)

  • Kim, Jin;Kang, Hyun-Chul
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.27-42
    • /
    • 2009
  • In realizing ubiquitous computing, techniques of efficiently using the limited resource at client such as mobile devices are required. With a mobile device with limited amount of memory, the techniques of XML stream query processing should be employed to process queries over a large volume of XML data. Recently, several techniques were proposed which fragment XML documents into XML fragments and stream them for query processing at client. During query processing, there could be great difference in resource usage (query processing time and memory usage) depending on how the source XML documents are fragmented. As such, an efficient fragmentation technique is needed. In this paper, we propose an XML fragmentation technique whereby resource efficiency in query processing at client could be enhanced. For this, we first present a cost model of query processing over XML fragment stream. Then, we propose an algorithm for resource-efficient XML fragmentation. Through implementation and experiments, we showed that our fragmentation technique outperformed previous techniques both in processing time and memory usage. The contribution of this paper is to have made the techniques of query processing over XML fragment stream more feasible for practical use.

The Design and Implementation of User Authorization Module based on Zigbee for Automotive Smart-key System (차량용 스마트키 시스템을 위한 지그비 기반의 사용자 인증 모듈 설계 및 구현)

  • Kim, Kyeong-Seob;Lee, Yun-Seob;Yun, Hyun-Min;Choi, Sang-Bang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2442-2450
    • /
    • 2010
  • Using sensor devices applied to various objects will be needed wireless network that it is easy to install in them. Tiny devices configured to processor that bas comparatively low computing ability are inappropriate to use devices that are wireless LAN, etc. In result, network devices needed to not only have simple communication protocol, but have Plug and Play function that it works as soon as it connects without installing any device driver. it also will industrially have both low power and low cost because of mobility of it. From IEEE 802.11 standard, WPAN(Wireless Personal Area Network) included in LAN is being developed by WPAN WG(Working Group) on area with low power consumption and low complexity. In addition to, it is standardizing MAC and PRY of the standard that is expected to wirelessly communicate within 10m. WPAN will be used generally in the more near future because of both low power and low cost of Zigbee. In this paper we designed zigbee based user authentication module for a automotive smart-key system.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

UbiCore : An Effective XML-based RFID Middleware System (UbiCore : XML 기반 RFID 미들웨어 시스템)

  • Lee, Hun-Soon;Choi, Hyun-Hwa;Kim, Byoung-Seob;Lee, Myung-Cheol;Park, Jae-Hong;Lee, Mi-Young;Kim, Myung-Joon;Jin, Sung-Il
    • Journal of KIISE:Databases
    • /
    • v.33 no.6
    • /
    • pp.578-589
    • /
    • 2006
  • Owing to the proliferation of Radio Frequency Identification (RFID) technologies which is being watched as a core technology of ubiquitous computing, applications which offer convenience to people using RFID technologies are more and more increased. To easily develop these applications, a middleware system which acts as a bridge between RFID hardware and application is essential. In this paper, we propose a novel XML-based RFID middleware system called UbiCore (Ubiquitous Core). UbiCore has following features: First, UbiCore employs its own query language called XQueryStream (XQuery for Stream Data) which is originated from XQuery. Second, UbiCore has the preprocessing phase called pre-filtering prior to query evaluation and reuses the intermediate result of previous evaluation to speed up the processing of RFID tag data stream. Third, UbiCore supports query on both continuously generated stream data and archived historical data. And last, UbiCore offers a distinct markup language called Context-driven Service Markup Language (CSML) to easily specify the linking information between context and service.

Implementation of a Sensor Node with Convolutional Channel Coding Capability (컨벌루션 채널코딩 기능의 센서노드 구현)

  • Jin, Young Suk;Moon, Byung Hyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.13-18
    • /
    • 2014
  • Sensor nodes are used for monitoring and collecting the environmental data via wireless sensor network. The wireless sensor network with various sensor nodes draws attention as a key technology in ubiquitous computing. Sensor nodes has very small memory capacity and limited power resource. Thus, it is essential to have energy efficient strategy for the sensor nodes. Since the sensor nodes are operating on the same frequency bands with ISM frequency bands, the interference by the devices operating on the ISM band degrades the quality of communication integrity. In this paper, the convolutional code is proposed instead of ARQ for the error control for the sensor network. The proposed convolutional code was implemented and the BER performance is measured. For the fixed transmitting powers of -19.2 dBm and -25dBm, the BER with various communication distances are measured. The packet loss rate and the retransmission rate are calculated from the measured BER. It is shown that the porposed method obtained about 9~12% and 12-19% reduction in retransmission rate for -19.2 dBm and -25 dBm respectively.

Implementing Finite State Machine Based Operating System for Wireless Sensor Nodes (무선 센서 노드를 위한 FSM 기반 운영체제의 구현)

  • Ha, Seung-Hyun;Kim, Tae-Hyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.85-97
    • /
    • 2011
  • Wireless sensor networks have emerged as one of the key enabling technologies for ubiquitous computing since wireless intelligent sensor nodes connected by short range communication media serve as a smart intermediary between physical objects and people in ubiquitous computing environment. We recognize the wireless sensor network as a massively distributed and deeply embedded system. Such systems require concurrent and asynchronous event handling as a distributed system and resource-consciousness as an embedded system. Since the operating environment and architecture of wireless sensor networks, with the seemingly conflicting requirements, poses unique design challenges and constraints to developers, we propose a very new operating system for sensor nodes based on finite state machine. In this paper, we clarify the design goals reflected from the characteristics of sensor networks, and then present the heart of the design and implementation of a compact and efficient state-driven operating system, SenOS. We describe how SenOS can operate in an extremely resource constrained sensor node while providing the required reactivity and dynamic reconfigurability with low update cost. We also compare our experimental results after executing some benchmark programs on SenOS with those on TinyOS.

Clustering Analysis by Customer Feature based on SOM for Predicting Purchase Pattern in Recommendation System (추천시스템에서 구매 패턴 예측을 위한 SOM기반 고객 특성에 의한 군집 분석)

  • Cho, Young Sung;Moon, Song Chul;Ryu, Keun Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.193-200
    • /
    • 2014
  • Due to the advent of ubiquitous computing environment, it is becoming a part of our common life style. And tremendous information is cumulated rapidly. In these trends, it is becoming a very important technology to find out exact information in a large data to present users. Collaborative filtering is the method based on other users' preferences, can not only reflect exact attributes of user but also still has the problem of sparsity and scalability, though it has been practically used to improve these defects. In this paper, we propose clustering method by user's features based on SOM for predicting purchase pattern in u-Commerce. it is necessary for us to make the cluster with similarity by user's features to be able to reflect attributes of the customer information in order to find the items with same propensity in the cluster rapidly. The proposed makes the task of clustering to apply the variable of featured vector for the user's information and RFM factors based on purchase history data. To verify improved performance of proposing system, we make experiments with dataset collected in a cosmetic internet shopping mall.

An Exploratory Study of Purchasing Decision Making and Adoption on the RFID Purchasing Customer (RFID 구매고객의 구매 의사결정과 수용에 대한 탐색적 연구)

  • Seo, Pil-Su;Jang, Jang-Yi;Shim, Kyeng-Su
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.3 no.4
    • /
    • pp.89-116
    • /
    • 2008
  • RFID (Radio Frequency Identification) is regarded as a core technology of ubiquitous computing. Although it has some technical limitations such as technological standardization of RFID tags as well as economical limitations, many companies around the world have already accepted RFID to improve their management efficiency. In this regard, this study is to meet with results that the adoption of RFID technology willbring opportunities that companies' operational process are improved and customer satisfaction is highly strengthened. This research focuses on providing more understanding for building RFID marketing strategy to suppliers who want to sell their RFID products to customers through analyzing purchasing process. The findings are as follows; First, the study shows that buying center members usually take product reliability and precision of technical specification in the case of new-task buying situation while they put their first purchasing priority on prices in the straight rebuy. Second, the finding presents that in new-task buying situation and the straight rebuy purchasing personnel get information about new products through product performance test, organizational engineers, opinions from other companies' purchasing personnel, and checking out samples. Third, this research demonstrates when it comes to purchasing risk in their first purchasing, the persons who are in charge of material purchasing are inclined to be aware of the risk most in technical problems, followed by financial problems and time delay problems in order. And in addition to those risks are mentioned above, once-again-purchasers take the risk like an opportunity loss for better products into consideration. Fourth, the study shows that the role of concerning departments makes no difference in each purchasing stage. Accordingly marketers need to beef up the differentiated strategy to persuade their customers Fifth, the findings of this study demonstrate that purchasing decision making is much influenced by the final users. So suppliers are supposed to perform the most active marketing strategy at the first stage of purchasing through various resources. Finally, the study presents that the suppliers who will have had close relationships with their customers need to give consistent information to them so that their customers can have lower motive in purchasing products from competitors.

  • PDF

A Study on Purchasing Decision Making and Adoption : Focused on the RFID Purchasing Customer (구매의사 결정과 수용에 대한 연구 : RFID 구매고객 중심으로)

  • Seo, Pil-Su;Jang, Jang-Yi;Shim, Kyeng-Su
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.257-282
    • /
    • 2008
  • RFID (Radio Frequency Identification) is regarded as a core technology of ubiquitous computing. Although it has some technical limitations such as technological standardization of RFID tags as well as economical limitations, many companies around the world have already accepted RFID to improve their management efficiency. In this regard, this study is to meet with results that the adoption of RFID technology willbring opportunities that companies' operational process are improved and customer satisfaction is highly strengthened. This research focuses on providing more understanding for building RFID marketing strategy to suppliers who want to sell their RFID products to customers through analyzing purchasing process. The findings are as follows; First, the study shows that buying center members usually take product reliability and precision of technical specification in the case of new-task buying situation while they put their first purchasing priority on prices in the straight rebuy. Second, the finding presents that in new-task buying situation and the straight rebuy purchasing personnel get information about new products through product performance test, organizational engineers, opinions from other companies' purchasing personnel, and checking out samples. Third, this research demonstrates when it comes to purchasing risk in their first purchasing, the persons who are in charge of material purchasing are inclined to be aware of the risk most in technical problems, followed by financial problems and time delay problems in order. And in addition to those risks are mentioned above, once-again-purchasers take the risk like an opportunity loss for better products into consideration. Fourth, the study shows that the role of concerning departments makes no difference in each purchasing stage. Accordingly marketers need to beef up the differentiated strategy to persuade their customers. Fifth, the findings of this study demonstrate that purchasing decision making is much influenced by the final users. So suppliers are supposed to perform the most active marketing strategy at the first stage of purchasing through various resources. Finally, the study presents that the suppliers who will have had close relationships with their customers need to give consistent information to them so that their customers can have lower motive in purchasing products from competitors.

  • PDF