• Title/Summary/Keyword: 유비쿼터스 IT

Search Result 1,509, Processing Time 0.025 seconds

Development Plan of Guard Service According to the LBS Introduction (경호경비 발전전략에 따른 위치기반서비스(LBS) 도입)

  • Kim, Chang-Ho;Chang, Ye-Chin
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.145-168
    • /
    • 2007
  • Like to change to the information-oriented society, the guard service needs to be changed. The communication and hardware technology develop rapidly and according to the internet environment change from cable to wireless, modern person can approach every kinds of information service using wireless communication machinery which can be moved such as laptop, computer, PDA, mobile phone and so on, LBS field which presents the needing information and service at anytime, anywhere, and which kinds of device expands it's territory all the more together with the appearance of ubiquitous concept. LBS use the chip in the mobile phone and make to confirm the position of the joining member anytime within several tens centimeters to hundreds meters. LBS can be divided by the service method which use mobile communication base station and apply satellite. Also each service type can be divided by location chase service, public safe service, location based information service and so on, and it is the part which will plan with guard service development. It will be prospected 8.460 hundred million in 2005 years and 16.561 hundred million in 2007 years scale of market. Like this situation, it can be guessed that the guard service has to change rapidly according to the LBS application. Study method chooses documentary review basically, and at first theory method mainly uses the second documentary examination which depends on learned journal and independent volume which published in the inside and the outside of the country, internet searching, other kinds of all study report, statute book, thesis which published at public order research institute of the Regional Police Headquarter, police operation data, data which related with statute, documents and statistical data which depend on private guard company and so on. So the purpose of the study gropes in accordance with the LBS application, and present the problems and improvement method to analyze indirect of manager side of operate guard adaptation service of LBS, government side which has to activate LBS, systematical, operation management, manpower management and education training which related with guard course side which has to study and educate in accordance with application of the new guard service, as well as intents to excellent quality service of guard.

  • PDF

The Design and Implementation of User Authorization Module based on Zigbee for Automotive Smart-key System (차량용 스마트키 시스템을 위한 지그비 기반의 사용자 인증 모듈 설계 및 구현)

  • Kim, Kyeong-Seob;Lee, Yun-Seob;Yun, Hyun-Min;Choi, Sang-Bang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2442-2450
    • /
    • 2010
  • Using sensor devices applied to various objects will be needed wireless network that it is easy to install in them. Tiny devices configured to processor that bas comparatively low computing ability are inappropriate to use devices that are wireless LAN, etc. In result, network devices needed to not only have simple communication protocol, but have Plug and Play function that it works as soon as it connects without installing any device driver. it also will industrially have both low power and low cost because of mobility of it. From IEEE 802.11 standard, WPAN(Wireless Personal Area Network) included in LAN is being developed by WPAN WG(Working Group) on area with low power consumption and low complexity. In addition to, it is standardizing MAC and PRY of the standard that is expected to wirelessly communicate within 10m. WPAN will be used generally in the more near future because of both low power and low cost of Zigbee. In this paper we designed zigbee based user authentication module for a automotive smart-key system.

A study on unmanned watch system using ubiquitous sensor network technology (유비쿼터스 센서 네트워크 기술을 활용한 무인감시체계 연구)

  • Wee, Kyoum-Bok
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.271-303
    • /
    • 2009
  • "Ubiquitous sensor network" definition is this-Someone attaches electro-magnetic tag everything which needs communication between man to man, man to material and material to material(Ubiquitous). By using attached every electro-magnetic tag, someone detects it's native information as well as environmental information such as temperature, humidity, pollution and infiltration information(Sensor). someone connects it realtime network and manage generated information(Network). 21st century's war is joint combined operation connecting with ground, sea and air smoothly in digitalized war field, and is systematic war provided realtime information from sensor to shooter. So, it needs dramatic development on watch reconnaissance, command and control, pinpoint strike etc. Ubiquitous computing and network technologies are essential in national defense to operate 21st century style war. It is possible to use many parts such as USN combined smart dust and sensor network to protect friend unit as well as to watch enemy's deep area by unmanned reconnaissance, wearable computer upgrading soldier's operational ability and combat power dramatically, RFID which can be used material management as well as on time support. Especially, unmanned watch system using USN is core part to transit network centric military service and to get national defense efficiency which overcome the dilemma of national defense person resource reducing, and upgrade guard quality level, and improve combat power by normalizing guardian's bio rhythm. According to the test result of sensor network unmanned watch system, it needs more effort and time to stabilize because of low USN technology maturity and using maturity. In the future, USN unmanned watch system project must be decided the application scope such as application area and starting point by evaluating technology maturity and using maturity. And when you decide application scope, you must consider not only short period goal as cost reduction, soldier decrease and guard power upgrade but also long period goal as advanced defense ability strength. You must build basic infra in advance such as light cable network, frequency allocation and power facility etc. First of all, it must get budget guarantee and driving force for USN unmanned watch system project related to defense policy. You must forwarded the USN project assuming posses of operation skill as procedure, system, standard, training in advance. Operational skill posses is come from step by step application strategy such as test phase, introduction phase, spread phase, stabilization phase and also repeated test application taking example project.

  • PDF

A Service Identification Scheme for the Convergence of Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크 융합을 위한 서비스 식별 체계)

  • Uhm, Huy-Jung;Eun, Seong-Bae;Jun, Jung-Ho;Kang, Gwon-U;Ju, Yong-Wan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.104-113
    • /
    • 2011
  • While converging USN Services, a single physical infrastructure can be used in several services and in several physical infrastructures can make up a single service. Therefore the physical infrastructure and service have to manage separately for effective convergence of USN Services. However, established Identification Scheme is not suitable to distinguish various services that USN provides. This paper suggests USN Service Identification Scheme that can be separated and managed. Through USN Service Identification Scheme suggested, firstly, it is possible to obtain Service Identification Scheme utilizing various technology such as RFID TAG, QR Code, radio broadcasting, etc. because it is possible to process USN Service Identification Scheme. Secondly, it is easy to mange the service, develope the user application program and interlock with established USN Standard technique as view from service provider. Thirdly, it is possible to manage systematically USN Service. Fourthly, users can search USN Service easily, so it can contribute actively for invigoration of USN service. This thesis, firstly, has analyzed about standard related USN Service and USN Identification Scheme. Secondly, this has suggested brand-new USN Service Identification Scheme based on established USN Identification Scheme.

An Embedded System Design of Collusion Attack Prevention for Multimedia Content Protection on Ubiquitous Network Environment (유비쿼터스 네트워크 환경의 멀티미디어 콘텐츠 보호를 위한 공모공격 방지 임베디드 시스템 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.15-21
    • /
    • 2010
  • This paper proposes the multimedia fingerprinting code insertion algorithm when video content is distributed in P2P environment, and designs the collusion codebook SRP(Small RISC Processor) embedded system for the collusion attack prevention. In the implemented system, it is detecting the fingerprinting code inserted in the video content of the client user in which it requests an upload to the web server and in which if it is certified content then transmitted to the streaming server then the implemented system allowed to distribute in P2P network. On the contrary, if it detects the collusion code, than the implemented system blocks to transmit the video content to the streaming server and discontinues to distribute in P2P network. And also it traces the colluders who generate the collusion code and participates in the collusion attack. The collusion code of the averaging attack is generated with 10% of BIBD code v. Based on the generated collusion code, the codebook is designed. As a result, when the insert quantity of the fingerprinting code is 0.15% upper in bitplane 0~3 of the Y(luminance) element of I-frame at the video compression of ASF for a streaming service and MP4 for an offline offer of video content, the correlation coefficient of the inserted original code and the detected code is above 0.15. At the correlation coefficient is above 0.1 then the detection ratio of the collusion code is 38%, and is above 0.2 then the trace ratio of the colluder is 20%.

IPTV and User Scenario-Based Interface in Home Network Service (홈 네트워크 환경에서 사용자 중심 시나리오를 활용한 IPTV 인터페이스 분석)

  • Lee, Jee-Hee;Kim, So-Hyun;Kim, Hyun-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.92-100
    • /
    • 2010
  • Due to the development of digital appliance, role of TV causes both-way by introducing IPTV, and SNS service causes big change of watching environment and residence environment. There are good conditions on the role of integrated control because it is arranged in the living room which secures movement most effectively and because family members can easily use, and the degree of use is high. Therefore, we infer user's needs by analyzing user scenario and current role of TV in home network environment. Primarily, we collect surveys of development scenario and technology which companies suggest TV applied by home network service, and secondly, we comparatively study scenario which the companies mentioned above suggest through observing user scenario, and study the role of IPTV in the future through actual scenario-based experiment by ethnography. After analyzing user scenario through case study and experiment, there are integrated device studies mainly in company study because it can be made up inside home, security and entertainment. On the other hand, there are patterns of user behavior by scenario experiment mainly in auto-tainment, security, and it showed that it is insufficient for interaction between TV and home media peripheral. Through this paper, we analyze context of home user, and based on this, we could suggest effective use of service development. Also after analyzing user form, we could know it also should be considered of ratio between activity inside home and activity outside home.

Wearable System for Real-time Monitoring of Multiple Vital Signs (인체 착용형 다중 생체신호 실시간 모니터링 시스템)

  • Lee, Young-Dong;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.249-252
    • /
    • 2008
  • A wearable ubiquitous health care monitoring system using integrated ECG and accelerometersensors based on WSN is designed and developed. Wireless sensor network technology is applied for non intrusive healthcare in some wide area coverage with small battery support for RF transmission. We developed wearable devices which are wearable USN node, sensor board and base-station. Low power operating ECG and accelerometer sensor board was integrated to wearable USN node for user's health monitoring. The wearable ubiquitous healthcare monitoring system allows physiological data to be transmitted in wireless sensor network from on body wearable sensor devices to a base-station connected to server PC using IEEE 802.15.4. Physiological data displays and stores on server PC continuously.

  • PDF

A Implementation of VNC Server Based Message Transfer and Remote Computer Control System (VNC 서버 기반의 메시지 전송 및 원격 컴퓨터 제어 시스템 구현)

  • Kim, Kil-Young;Seo, Jung-Hee;Park, Hung-Bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.933-936
    • /
    • 2008
  • Mobile devices such as cellular phones and PDA become a part of our life by extreme improvement of Wireless internet and arriving the age of Ubiquitous. Especially it makes increasing rapidly the expectations about a field of remote control that is great advantage of Mobile devices. Existing computer remote control systems are hard to meet user's appropriate manage when error happened because Clients could not recognize the state of several remote controlled computers which connected to web server. This paper Implementation remote computer control system that immediately after errors happen by send error massages in the from of a SMS to client by set the clients with cellular phone that most generally used Mobile devices.

  • PDF

Event and Service Registry for USN application services (USN 응용 서비스를 위한 이벤트 및 서비스 레지스트리)

  • Yeom, Sung-Kun;Kim, Yong-Woon;Yoo, Sang-Keun;Kim, Eun-Sook;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.853-856
    • /
    • 2008
  • With development of computer network technique it joins in recently and ubiquitous computing comes true the research for is actively advanced. The creation rule of registration and search of the event is necessary because the USN sensor data must be possible to specific the multi condition of event which relates on using time. And for using a numerous sensor data provision service, service provider can publish its service in standardized registry for users to search and use the service registry. Currently there is the web service for a WS-Eventing and a UDDI with standard, but the event and the service registry is unnecessary or there is a portion which is insufficient. In this paper, we studied standardization of event definition for USN application service and service registry structure, standard API.

  • PDF

Ambient Display: Picture Navigation Based on User Movement (앰비언트 디스플레이: 사용자 위치 이동 기반의 사진 내비게이션)

  • Yoon, Yeo-Jin;Ryu, Han-Sol;Park, Chan-Yong;Park, Soo-Jun;Choi, Soo-Mi
    • Journal of the HCI Society of Korea
    • /
    • v.2 no.2
    • /
    • pp.27-34
    • /
    • 2007
  • In ubiquitous computing, there is increasing demand for ubiquitous displays that react to a user's actions. We propose a method of navigating pictures on an ambient display using implicit interactions. The ambient display can identify the user and measure how far away they are using an RFID reader and ultrasonic sensors. When the user is a long way from the display, it acts as a digital picture and does not attract attention. When the user comes within an appropriate range for interaction, the display shows pictures that are related to the user and provides quasi-3D navigation using the TIP(tour into the picture) method. In addition, menus can be manipulated directly on a touch-screen or remotely using an air mouse. In an emergency, LEDs around the display flash to alert the user.

  • PDF