• Title/Summary/Keyword: 유비쿼터스 IT

Search Result 1,509, Processing Time 0.03 seconds

ICT Utilized Learning in Korean Primary and Secondary Schools (힌국 초.중등학교 정보통신기술활용 교육 현황)

  • Nam, Sang-Zo;Lee, Nam-Suk;Cho, Eun-Soon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.9
    • /
    • pp.220-230
    • /
    • 2007
  • Recently, u-learning passing over ICT learning and e-learning becomes influential in Korean primary and secondary schools. U-learning is to be proliferated in accordance with the development of ubiquitous environment. In this paper, we introduced the situation and implications of the model cases of ICT learning, e-learning and u-learning designated by the Korean Ministry of Education and Human Resources Development.

Implementation of Role Based Access Control Model for U-healthcare (유비쿼터스 헬스케어를 위한 역할 기반 접근제어 모델의 구현)

  • Lee, You-Ri;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1256-1264
    • /
    • 2009
  • When unapproved users access to healthcare system and use medical information for other malicious purposes, it could severely threaten important information related to patients' life, because in ubiquitous environment healthcare service makes patient's various examination results, medical records or most information of a patient into data. Therefore, to solve these problems, we design RBAC(Role Based Access Control) for U-healthcare that can access control with location, time and context-awareness information like status information of user and protect patient's privacy. With implementation of the proposed model, we verify effectiveness of the access control model for healthcare in ubiquitous environment.

Suitable IP Currency Quality Measurement Model in Ubiquitous Environment (유비쿼터스 환경에 적합한 IP 통화품질 측정 모델)

  • Choi Seung-Kwon;Lee Byeong-Rok;Sin Byung-Gok;Kim Sun-Chul;Cho Young-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.8
    • /
    • pp.20-29
    • /
    • 2006
  • This paper proposes a quality measurement model for video phone service over IP environment. Proposed model enhances conventional E-Model by using quality analysis and this model is suitable for ubiquitous environment. This research measures video phone quality by applying bust packet loss and recency effect. It uses delay and recency effect for compensating actual quality and recognized quality of user using NR and UR factor. Simulation results show that this model can provide more precise results than conventional model by considering recency effect of video phone service quality measurement model.

  • PDF

A Design CORBA Security Service for DataBase Security in Ubiquitous Computing (유비쿼터스 환경의 데이터베이스 보안을 위한 CSS 설계)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.15-22
    • /
    • 2005
  • The spread of Internet and the appear of Downsizing, SI(System Integration) is chaning centralized computing to distributed computing. Also distributed computing is rapidly changing to Ubiquitous computing escape from hard wire connected network. CORBA(Common Object Request Broker Architecture) is a middleware that used for smoothness communication between application program and operation system in a different environment. However distributed computing environment is not safe from the danger, the attack like virus, worm is too intellectual and variety. In this paper, we design a new DB security model and suggest efficiency of it in Ubiquitous environment base on CSS(CORBA Security Service) that present ed from OMG(Object Management Group).

  • PDF

Implementation of Lightweight Block Cipher for Ubiquitous Computing Security (유비쿼터스 컴퓨팅 보안을 위한 경량 블록 암호 구현)

  • Kim, Sung-Hwan;Kim, Dong-Seong;Song, Young-Deog;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.23-32
    • /
    • 2005
  • This paper presents a 128-bit Reversible Cellular Automata (RCA) based lightweight block cipher for Ubiquitous computing security. To satisfy resource-constraints for Ubiquitous computing, it is designed as block architecture based on Cellular Automata with high pseudo-randomness. Our implementation requires 704 clock cycles and consumes 2,874 gates for encryption of a 128-bit data block. In conclusion, the processing time outperformed that of AES and NTRU by 31%, and the number of gate was saved by 20%. We evaluate robustness of our implementation against both Differential Cryptanalysis and Strict Avalanche Criterion.

  • PDF

Embedded File System for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 임베디드 파일시스템)

  • Lee, Byung-Kwon;Ju, Young-Kwan;Kim, Suk-Il;Jeon, Joong-Nam
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.424-430
    • /
    • 2004
  • This paper explains the construction of the filesystems which could be utilized in embedded systems as an implementation of ubiquitous computing. It includes the formal architecture of filesystem hierarchy for the DOC (Disk-On-Chip) filesystem and the flash filesystem based on the MTD (Memory Technology Devices). For DOC, the root filesystem and the user filesystem are constructed by the TrueFFS supported by the M-Systems. For MTD filesystem, the root filesystem is implemented in the fast RAM disk, and the user filesystem is implemented in the JFFS2 that supports large capacity. In order to support the GUI filesystem, the porting process of Qt/E is also included in this paper.

A Consideration of the Application of RFID on the Ubiquitous Construction;In View of Establishment (유비쿼터스 건설에의 RFID 활용에 대한 고찰;창업관점에서)

  • Shin, Ho-Sang;Hwang, Chan-Kou
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.1 no.1
    • /
    • pp.91-104
    • /
    • 2006
  • Telematics is spotlighted as the future industry and anticipated the rapid growth. But it is not showing the expected development because of technical and economical blocks. So that there would happen a setback in setting the u-Transportation strategy which is the advanced national transportation system by the year 2020. In this paper, the stat of arts about related technology are introduced, which could give a solution in the technical and economical demerits and design the revitalization in ITS based on Telematics. And also the present application condition in RFID (Radio Frequency Identification) which would be the Blue Ocean in the Ubiquitous construction industry is researched and the commercialization scheme is studied.

  • PDF

The Effect of Tourism Contents on U-Tourism Convention Service Adoption Using TAM (관광콘텐츠가 U-관광컨벤션 서비스 수용의도에 미치는 영향 : TAM 적용)

  • Park Bong-Gyu;Cho Jae-Wan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.88-93
    • /
    • 2005
  • Recently many researchers are keen interested in the concept of ubiquitous using mobile internet and RFID. Busan also plans to build a first U-city in the areas of port logistics, traffic, tourism convention, medical service. It is important to be accepted by consumers for U-tourism convention service adoption to determine the future growth potential. The purpose of this paper thus examines the effect of tourism contents on U-tourism convention service adoption using technology acceptance model.

  • PDF

An Access Control System for Ubiquitous Computing based on Context Awareness (상황 인식 기반의 유비쿼터스 컴퓨팅을 위한 접근 제어 시스템)

  • Lee, Ji-Yeon;Ahn, Joon-Seon;Doh, Kyung-Goo;Chang, Byeong-Mo
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.35-44
    • /
    • 2008
  • It is important to manage access control for secure ubiquitous applications. In this paper, we present an access-control system for executing policy file which includes access control rules. We implemented Context-aware Access Control Manager(CACM) based on Java Context-Awareness Framework(JCAF) which provides infrastructure and API for creating context-aware applications. CACM controls accesses to method call based on the access control rules in the policy file. We also implemented a support tool to help programmers modify incorrect access control rules using static analysis information, and a simulator for simulating ubiquitous applications. We describe simulation results for several ubiquitous applications.

Establishment of advancement and usage-enhancement method of water service GIS system (수도GIS 시스템 고도화 및 활용성 증대 방안)

  • Hwang, Eui-Ho;Koh, Deuk-Koo;Lee, Geun-Sang
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.366-372
    • /
    • 2007
  • In this research, a ubiquitous-based strategy for managing waterworks facilities is proposed to increase the usability of the existing related databases and to ensure the systematic way of distributing information. The current status of the existing waterworks GIS and GIS database were analyzed to achieve the goal. By studying the state-of-the-art technology, we found that importing the LBS(Location Based Service) technology to the databases is necessary. The results of these efforts are exclusive waterworks-mobile-terminals and LBS system supporting them. Furthermore, the applicability of the ubiquitous technology to waterworks has been examined to realize the real-time waterworks management.

  • PDF