• Title/Summary/Keyword: 유비쿼터스 IT

Search Result 1,509, Processing Time 0.027 seconds

A Development of Multi-Emotional Signal Receiving Modules for Ubiquitous RCP Interaction (유비쿼터스 RCP 상호작용을 위한 다감각 착신기능모듈의 개발)

  • Jang Kyung-Jun;Jung Yong-Rae;Kim Dong-Wook;Kim Seung-Woo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.1
    • /
    • pp.33-40
    • /
    • 2006
  • We present a new technological concept named RCP (Robotic Cellular Phone), which combines RT and CP. That is an ubiquitous robot. RCP consists of 3 sub-modules, RCP Mobility, RCP interaction, and RCP Integration. RCP Interaction is the main focus of this paper. It is an interactive emotion system which provides CP with multi-emotional signal receiving functionalities. RCP Interaction is linked with communication functions of CP in order to interface between CP and user through a variety of emotional models. It is divided into a tactile, an olfactory and a visual mode. The tactile signal receiving module is designed by patterns and beat frequencies which are made by mechanical-vibration conversion of the musical melody, rhythm and harmony. The olfactory signal receiving module is designed by switching control of perfume-injection nozzles which are able to give the signal receiving to the CP-called user through a special kind of smell according to the CP-calling user. The visual signal receiving module is made by motion control of DC-motored wheel-based system which can inform the CP-called user of the signal receiving through a desired motion according to the CP-calling user. In this paper, a prototype system is developed far multi-emotional signal receiving modes of CP. We describe an overall structure of the system and provide experimental results of the functional modules.

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

A Study on the Design of u-Safety Service and Monitoring Infrastructure (u-방재 서비스 및 모니터링 인프라의 설계에 관한 연구)

  • Ock, Young-Seok;Ahn, Chang-Won;Kim, Min-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.3
    • /
    • pp.59-70
    • /
    • 2009
  • By the time the interest on the u-City is continuously growing as a test bed for verifying the potentials of ubiquitous convergence industries, research on the u-Safety gradually increases as well, as a typical service and application area of u-City. Like the other service areas of u-City, in order to provide u-Safety services smoothly, it is crucial to integrally connect u-City services and infrastructures that have operated under distributed environment. In this study, we suggest an approach for design of u-Safety service and monitoring architecture by combing CIM/WBEM standard with GMA. CIM/WBEM and GMA are broadly applied in the distributed resource monitoring environment and are widely recognized as data acquisition architecture under massive monitoring data volumes respectively. Considering the growing research needs for standardization and extension of u-City service infrastructure, it is expected that our integrated infrastructure model will be used as a reference model for effective integration of distributed resources with newly added services.

  • PDF

The Design and Implementation of Mobile base on Access Control System Using ZigBee Method (지그비 기술을 이용한 무선기반의 출입 통제 시스템 설계 및 구현)

  • Joo, Heon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.211-220
    • /
    • 2008
  • The home network technology which used USN is developing quickly. Use yet line to a lot of part as home network technology. Recently be leap into prominence to technology core of home network as wireless technology a ZigBee. ZigBee Perceive with cognition from tag and sensor as use USN, and processing, save, integration, and provide information. Implement the access control system which used technology BigBee with design at these papers. The wireless-based construction that used ZigBee. The influence that can let you implement early a Ubiquitous society is technology there being. Also, show by a large spinoff in an allied industry field, and improve the quality of life, and invention calls value added of leading edge IT service and product. The implementation of mobile base on access control system using zigbee method is expected to be helpful for the convenience in home network use.

  • PDF

The State of Art of RFID Technology for Construction Project in Korea (RFID 기술의 국내적용 실태)

  • Chang, Sang-Hyeok;Song, Nak-Hyun;Lee, Chan-Sik
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.819-822
    • /
    • 2007
  • Recently, U-Construction is a topic word of construction industry. U-construction is construction with IT technology that is ubiquitous. That will help that domestic construction industry which is lower technology than developed countries overcomes the competition. RFID technology which can be transmission of massage and the receipt of a massage with non touch is core of U-construction. The RFID technology has a big range of application. Man ${\cdot}$ Quality ${\cdot}$ Process ${\cdot}$ Safety ${\cdot}$ Distribution management is already applied to construction industry and especially, The Man ${\cdot}$ Safety management are spreaded widely. This thesis analyzes that the State of Art of RFID Technology to Construction in Korea through the survey and RFID Technology becoming wider by construction scale and period. Process' Distribution management show the trend which becomes wider by construction scale and period.

  • PDF

The Study of Analysis Algorithm and Wave Characteristic Control Environment for Wireless Communication (무선이동통신 제어환경에서 전파특성 및 알고리즘 분석에 관한 연구)

  • Kang, Jeong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.371-377
    • /
    • 2011
  • Users of the Information Age, IT usage patterns of the wired broadband information services and various forms of the same quality wireless multimedia services are required. Changes of these times the next-generation mobile communications (IMT-Advanced) has emerged as the necessity of developing its current voice and packet data communications on the move in the high-speed 100Mbps, 1Gbps in stationary and slow data transmission rates up to fixed-mobile convergence based on needed to provide ubiquitous service platform for the realization of IMT-Advanced is the time for preparation. In particular, 3-5GHz band, focused on mobile communications can be used to secure the necessary frequency band relocated and the existing crosstalk analysis methodology developed for the services rendered, and the frequency of such results to obtain new spectrum for IMT-Advanced for the country to secure the frequency characteristics and IMT-Advanced 3-5GHz band for the radio frequency of the characterization techniques necessary to develop a national wireless communication interference and frequency-based technology acquisition and management skills were identified.

Context Based User Profile for Personalization in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서 개인화를 위한 상황정보 기반 사용자 프로파일)

  • Moon, Ae-Kyung;Kim, Hyung-Hwan;Park, Ju-Young;Choi, Young-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.542-551
    • /
    • 2009
  • We proposed the context based user profile which is aware of its user's situation and based on user's situation it recommends personalized services. The user profile which consists of (context, service) pair can be acquired by the context and the service usage of a user; it then can be used to recommend personalized services for the user. In this paper, we show how they can be evolved without previously known user information so that not to violate privacy during the learning phase; in the result our user profile can be applied to any new environment without any modification to model only except context profiles. Using context-awareness based user profile, the service usage pattern of a user can be learned by the union of contexts and the preferred services can be recommended by the current environments. Finally, we evaluate the precision of proposed approach using simulation with data sets of UCI depository and Weka tool-kit.

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF

Tangible Interaction : Application for A New Interface Method for Mobile Device -Focused on development of virtual keyboard using camera input - (체감형 인터랙션 : 모바일 기기의 새로운 인터페이스 방법으로서의 활용 -카메라 인식에 의한 가상 키보드입력 방식의 개발을 중심으로 -)

  • 변재형;김명석
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.441-448
    • /
    • 2004
  • Mobile devices such as mobile phones or PDAs are considered as main interlace tools in ubiquitous computing environment. For searching information in mobile device, it should be possible for user to input some text as well as to control cursor for navigation. So, we should find efficient interlace method for text input in limited dimension of mobile devices. This study intends to suggest a new approach to mobile interaction using camera based virtual keyboard for text input in mobile devices. We developed a camera based virtual keyboard prototype using a PC camera and a small size LCD display. User can move the prototype in the air to control the cursor over keyboard layout in screen and input text by pressing a button. The new interaction method in this study is evaluated as competitive compared to mobile phone keypad in left input efficiency. And the new method can be operated by one hand and make it possible to design smaller device by eliminating keyboard part. The new interaction method can be applied to text input method for mobile devices requiring especially small dimension. And this method can be modified to selection and navigation method for wireless internet contents on small screen devices.

  • PDF

A Study on Broadband Integrated Modem LAN Switching Technology of Environment Facility (환경 시설물의 광대역 통합모뎀 근거리 통신망 스위칭 기술 연구)

  • Cho, Juphil;Shin, Jaekwon;Yoon, Kyounghwa;Lee, Junghoon
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.87-90
    • /
    • 2014
  • Recently, environment facilities are able to manage real-time data collection and record management through integrated broadband modem LAN switching technology. Therefore, it need more stable and efficient facility management. So, we required practical use of environmental facilities convergence based on broadband integrated modem. In this paper, we proposed an integrated broadband modem LAN switching technology which can applicable to the environment facility. Also, we presented integrated broadband modem of design plan and communication system. And it received data inside of environment facility using the two communication methods(IEEE802.11x and IEEE802.15.4x). Then, our proposed integrated broadband modem LAN switching technology will prioritize processing data when emergency happen through collecting data, analysis data and processing. Lastly, we proved usefulness by experiment and simulation analysis.