• Title/Summary/Keyword: 유비쿼터스 IT

Search Result 1,509, Processing Time 0.028 seconds

Legal improvement for U-City (정보도시와 제도정비)

  • Choi, Yun-Soo;Jun, Chul-Min;Park, Ji-Hye
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.87-91
    • /
    • 2005
  • 최근 언론매체나 인터넷을 통해 자주 접하게 되는 용어 중 하나가 '유비쿼터스'이다. 각종 서비스, 도시건설, 아파트 등 다양한 대상에 'Ubiquitous' 또는 'U-'라는 수식어를 붙이는 것을 흔히 접할 수 있으며, 마치 매우 편리한 환경을 상징하는 키워드처럼 인식되고 있다. 이와 관련하여 현재 우리나라에서는 정보화도시(U-City 또는 디지털시티라고도 함) 건설 추진 및 그에 대한 논의가 활기를 띠고 있다. 이를 통한다면 우리나라는 건설 및 IT강국이라는 핵심역량을 바탕으로 내수경기 부양뿐만 아니라 지역 간 불균형을 해소할 수 있고, 국내성공 사례로 글로벌 시장개척을 위할 수 있으며 넓게는 동북아 비즈니스 허브구축의 발판이 마련될 수 있겠다. 이밖에도 정보화도시(U-City)건설은 많은 산업화의 가치를 가지고 있기 때문에 정부와 지자체, 또한 기업체에서 기술 개발 및 시범사업에 박차를 가하고 있다. 그러나 새로운 도시유형으로서 정보화도시(U-City)의 개념은 아직까지 제도적으로 정립되어 있지 않을 뿐만 아니라 도시건설 시 어떤 특별한 유인책도 마련되어 있지 않다. 그리하여 지방자치단체, 공기업 등 추진주체마다 전개되는 양상이 다르며 이에 수반되는 다양한 문제가 발생한다. 따라서 정보화도시(U-City)의 성공을 위해서는 글로벌 인재들이 유인할 수 있는 매력을 갖추어야 하며 사회적 투자를 지속시킬 수 있는 효과적 방안이 필요하겠고 핵심기술과 이의 활용방안이 마련되어야겠다. 그러나 무엇보다도 정보화도시 건설관련 법, 제도, 사회시스템 정비가 선행되어야하겠다.

  • PDF

Fire Protection System for Ubiquitous Environment (유비쿼터스 환경을 위한 소방시스템)

  • Kang, Won-Chan;Kim, Nam-Oh;Min, Wan-Ki;Shin, Suck-Doo;Kim, Young-Dong
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.54 no.3
    • /
    • pp.141-147
    • /
    • 2005
  • In this paper, We are going to propose the fire protection system with using CAN(Controller Area Network). The larger, higher and deeper buildings are, the more dangerous people are when fire happens. We should be aware of the problems of prior fire protection system. Therefore, we construct embedded system based on CAN communication that is capable of N:N communication, and build independent fire protection system. If the fire is occurred on the building, the problem is that how fast we can detect the fire and put off it by using available system. this is major factor that reduces damage of our wealth. therefore in this studies We would like to design more stable system than current system. this system that is based on CAN communication which is available N:N communication constructs and is designed to compensate for each fault so that our aim is to reduce the line of system and cost of installation and to suppose future type fire protection system. We are simulated by NIST FDS(Fire Dynamics Simulator) to prove the efficiency of this system.

RFID Information Protection using Biometric Information (생체정보를 이용한 RFID 정보보호)

  • Ahn, Hyo-Chang;Rhee, Sang-Burm
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.545-554
    • /
    • 2006
  • RFID could be applied in the various fields such as distribution beside, circulation, traffic and environment on information communication outside. So this can speak as point of ubiquitous computing's next generation technology. However, it is discussed problem of RFID security recently, so we must prepare thoroughly about RFID security for secure information. In this paper, we proposed a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. Our method which is improved linear discriminant analysis has reduced dimension of feature information which has large size of data. Therefore, we can sore face feature information in small memory field of RFID tag. Our propose d algorithm has shown 92% recognition rate in experimental results and can be applied to entrance control management system, digital identification card and others.

  • PDF

Structural Equation Model for Customer Satisfaction Index for Ubiquitous Home Network System (유비쿼터스 홈 네트워크 주거환경 만족도 증진을 위한 구조방정식 모형 연구)

  • Chun, Soo-Bong;Woo, Nam-Min;Yi, Jae-In;Sohn, So-Young
    • Journal of Korean Society for Quality Management
    • /
    • v.35 no.4
    • /
    • pp.26-37
    • /
    • 2007
  • The demand of ubiquitous home network system is rapidly increasing in Korea as each construction enterprise makes a huge effort to introduce it to apartment complex. However, the design of home network system is rather technology oriented than the customer focused. Lack of knowledge about customer needs is an obstacle in spreading the ubiquitous home network system to the market regardless of technology development. In this paper, we propose a HCSI(customer satisfaction index for home network system) using an SEM(structural equation model) where structural relationship among several factors influential on users' satisfaction is considered. This model enables to calculate the satisfaction index for target customer group so that one can provide necessary feedback information for improvement of the home network system used for each group.

EOL Reasoner : Ontology-based knowledge reasoning engine (EOL Reasoner : 온톨로지 기반 지식 추론 엔진)

  • Jeon, Hyeong-Baek;Lee, Keon-Soo;Kim, Min-Koo
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.663-668
    • /
    • 2008
  • These days, computing systems need to be intelligent for satisfying general users' ambiguous requests. In order to make a system intelligent, several methods of managing knowledge have been proposed. Especially, in ubiquitous computing environment, where various computing objects are working together for achieving the given goal, ontology can be the best solutionfor knowledge management. In this paper, we proposed a novel reasoner processing ontology-based knowledge which is expressed in EOL. As this EOL reasoner uses less computing resource, it can be easily adapted to various computing objects in ubiquitous computing environment providing easy usability of knowledge.

  • PDF

Development of Half-Mirror Interface System and Its Application for Ubiquitous Environment (유비쿼터스 환경을 위한 하프미러형 인터페이스 시스템 개발과 응용)

  • Kwon Young-Joon;Kim Dae-Jin;Lee Sang-Wan;Bien Zeungnam
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.1020-1026
    • /
    • 2005
  • In the era of ubiquitous computing, human-friendly man-machine interface is getting more attention due to its possibility to offer convenient services. For this, in this paper, we introduce a 'Half-Mirror Interface System (HMIS)' as a novel type of human-friendly man-machine interfaces. Basically, HMIS consists of half-mirror, USB-Webcam, microphone, 2ch-speaker, and high-speed processing unit. In our HMIS, two principal operation modes are selected by the existence of the user in front of it. The first one, 'mirror-mode', is activated when the user's face is detected via USB-Webcam. In this mode, HMIS provides three basic functions such as 1) make-up assistance by magnifying an interested facial component and TTS (Text-To-Speech) guide for appropriate make-up, 2) Daily weather information provider via WWW service, 3) Health monitoring/diagnosis service using Chinese medicine knowledge. The second one, 'display-mode' is designed to show decorative pictures, family photos, art paintings and so on. This mode is activated when the user's face is not detected for a time being. In display-mode, we also added a 'healing-window' function and 'healing-music player' function for user's psychological comfort and/or relaxation. All these functions are accessible by commercially available voice synthesis/recognition package.

An Active Mining Framework Design using Spatial-Temporal Ontology (시공간 온톨로지를 이용한 능동 마이닝 프레임워크 설계)

  • Hwang, Jeong-Hee;Noh, Si-Choon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3524-3531
    • /
    • 2010
  • In order to supply suitable services to users in ubiquitous computing environments, it is important to consider both location and time information which is related to all object and user's activity. To do this, in this paper, we design a spatial-temporal ontology considering user context and propose a system architecture for active mining user activity and service pattern. The proposed system is a framework for active mining user activity and service pattern by considering the relation between user context and object based on trigger system.

Research on Wireless Sensor Network System Design for Safety Management of Marine Structures (선박 및 해양 구조물의 안전 관리를 위한 무선 센서 네트워크 시스템 설계에 관한 연구)

  • Han, Young-Soo;Lee, Kyung-Ho;Choi, Si-Young;Kim, Chung-Hyun
    • Journal of Ocean Engineering and Technology
    • /
    • v.23 no.6
    • /
    • pp.136-145
    • /
    • 2009
  • There are two purposes for the marine structures used for fossil fuel: transporting huge amounts of crude oil and petroleum products and producing petroleum resources on the ocean in an isolated operational environment. Both types of structures are exposed to dangerous situations by sea conditions. Such marine structures are greatly affected by ocean climate conditions and its changes. Because of such ocean climate changes, it has been necessary to monitor marine structures. This research discusses the difficulties with adopting a new methodology based on a ubiquitous sensor network and develops an optimized sensor network management system design for a marine structure.

A Routing Security Authentication using S-EKE in MANET Environments (MANET 환경에서 S-EKE를 이용한 라우팅 보안 인증)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.433-438
    • /
    • 2014
  • The demanding in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on MANET and the application of MANET has been paid much attention as a Ubiquitous computing which is growing fast in the field of computer science. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing but have vulnerable points, about lack of dynamic network topology due to mobility, network scalability, passive attacks, and active attacks which make it impossible to manage continuous security authentication service. In this study, proposes S-EKE authentication mechanism for a robust authentication based on MANET and through identify wireless environment security vulnerabilities, currently being used in OTP S/Key and DH-EKE analyzes.

Functions for RFID Middleware Development on Mobile Device Emulator (모바일 단말 에뮬레이터에서 RFID 미들웨어 구현을 위한 기능 연구)

  • Ye, Seoung-Bin;Han, Soon-Hee;Ceong, Hee-Taek
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.2
    • /
    • pp.106-111
    • /
    • 2008
  • At the ubiquitous computing, Mobile RFID, which the convergence RFID and mobile device, researches are core method and infra to service B2B, B2C, and B2B2C service domain. We propose the functions of middleware to develop the mobile RFID device. It consists of multi-code integrated recognition module, the reader control module, the module code interpretation, and Dispatcher module. These functions can recognize the tag of EPC/ISO and mCode type. We describe the zone file of local ODS and the implemented module to read the 13.56MHz tag.

  • PDF