• Title/Summary/Keyword: 유비쿼터스 IT

Search Result 1,509, Processing Time 0.026 seconds

Study on the Relationship Establishment among u-City Service, Technology and Infrastructure (u-City서비스.기술.기반시설의 연계성 확보방안)

  • Cho, Chun-Man;Kim, Jung-Hoon
    • Spatial Information Research
    • /
    • v.17 no.3
    • /
    • pp.287-299
    • /
    • 2009
  • For the development and management of u-City(ubiquitous city), Ubiquitous City Construction Law was enacted(March 3, 2008) to form the legal basis of u-City plan, construction and managements afterwards. The ultimate goal of the u-City construction is the advancement of national territory utilization and management using Korea's high level of IT and spatial information infrastructure. Based on the definition of the u-City Construction Law, the u-City refers to a city where u-City services are provided through the u-City infrastructure applying u-City technology. But, based on the current level of relationship model among u-City service, technology and infrastructure, it is not enough to guide the local municipalities to plan and provide the successful u-City services in its vicinity. So as one of the core issues for the legal arrangements of successful u-City services, the purpose of the study is to suggest the basic directions and execution strategies for the relationship establishment among u-City service, technology and infrastructure.

  • PDF

Association Based Reasoning Method Using Rescorla-Wagner Model and Galton Free Association Test for Augmented Reality E-Commerce (증강현실 전자상거래 위한 Rescorla-Wagner 모형과 Galton 자유연상 실험을 활용한 연상 기반 추론 방법)

  • Kwon, Oh-Byung;Jung, Dong-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.3
    • /
    • pp.131-151
    • /
    • 2009
  • Natural interface is important to select and provide the services in ubiquitous smart space such as u-plant, u-distribution. Augmented Reality(AR) has recently begun to receive attention as a realization tool for natural interface. AR provides virtual object on real environment and it differs from virtual reality. When AR is used, it has advantage to provide information intuitively and collaboratively. However AR is rarely used in e-commerce domain of ubiquitous smart space, and it has limitation which predefined information and services provide in a static manner. Hence, the purpose of this paper is to propose a methodology of AR based e-commerce which provides personalized association service by considering user's dynamic context. To do so, association algorithm is developed based on Rescorla-Wagner model and Galton's free association test.

  • PDF

The Influence of Logistics Information System Utilization under Ubiquitous Environment on Business Performance (유비쿼터스 추진 환경을 고려한 물류정보시스템 활용이 기업성과에 미치는 영향)

  • Park, Jong-Gic;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1465-1479
    • /
    • 2007
  • This study set up a hypothesis that the main variables (business environment, business strategy, business policy, logistics information system) of logistics information system utilization under ubiquitous environment would contribute to business performance, and then verified the relation between each variables that have an effect on business performance. The analysis results between each main variable can be summarized as follows. First, among main variables under ubiquitous environment, business environment closely made influence on business performance. Second, business environment, business strategy, and business policy were meaningful among other variables, whereas logistics information system was not meaningful. But, it is known that corporate performance is only meaningful to business environment and business policy. In conclusion, business performance is not achieved by each variable of business strategy, business policy and logistics information system. It is recognized that business performance is influenced by business environment that combines a given condition of business strategy, business policy and logistics information system.

  • PDF

Hierarchical Image Processing Method For Context-Awareness On Ubiquitous-Safety(U-Safety) (유비쿼터스 안전관리(U-Safety) 상에서의 상황인지를 위한 계층적 영상 처리 시스템)

  • Lim, Chul-Hoo;Song, Kang-Suk;Jeong, Moo-Il;Lee, Yong-Woog;Moon, SungMo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.553-557
    • /
    • 2009
  • USS(Ubiquitous Smart Space) give services, that fit in with customer's goal, by cognizing various situations that happens in a space and cooperating autonomously objects or services in a space. In USS, U-Safety is a system that cognizes more exact situations with multiple sensors in USS, deals with this and take proper actions. When men reason on situations objectively, it is most ideal that image data among collected data with used various sensors in U-Safety. A senter collects a lot of image data from image input devices equipped in various points and work a multiple situation cognition and inference that are based on this. So, senters spend many resources for processing massive data. This paper proposes hierarchical image processing method that does the first situation cognization in image input devices, blocks only points that situation cognization possibility is high among a total image, and transfers to senters. It improves the efficiency of smooth situation cognization by reducing resources that a senter spends on image processing. So, it reduces proportion of image data in U-Safety.

  • PDF

Main/Sub Device Authentication and Authorization Protocol in Ubiquitous Office Network (유비쿼터스 오피스 네트워크에서의 Main/Sub 디바이스 인증/인가 프로토콜)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.105-118
    • /
    • 2009
  • In modern society, as the rapid development of IT technology combined with the computer-based high-speed communication networks makes it possible to provide a wide spectrum of services and devices, we have been confronting a new cultural transformation era, referred to as the information society. However, the requirements to be considered in security aspect have became more complicated and diversified, and there remains the same security weaknesses as in the existing media or protocol. Particularly, the office network device with roaming is susceptible to the different kinds of attacks such as terminal hacking, virus attacks, and information leakage because the computing capacity is relatively low and the loading of already developed security functions is difficult. Although developed as one solution to this problems, PKI security authentication technology isn't suitable for multi-domain environments providing uonments proffice network service, and so the development of a novel authentication system is needed. Therefore, in this paper researched the roaming and device authentication/auth for multitechnology using an ID-based public key, authorization ticket, and Sub-device ticket with a purpose to contribute to the development of the secured and efficient technology.

Implement for Addiction Patient-Care System based on Status-Information Recognition in Ubiquitous-Zone (u-Zone에서 상태정보 감지를 통한 중독환자 케어 시스템 구현)

  • Lim, Myung-Jae;Lee, Seung-Ho;Lee, Ki-Young;Choi, Mi-Lim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.123-128
    • /
    • 2010
  • ularly, a points of view Health-care system, it can reduce costs and efforts in order to management of patients. However, Health-care system keep a level of service for person and extends of hospital inner parts system. Although the rate of an addict grow by alcoholic but it is difficult to manage and diagnosis because of patient data gathering. Therefore in this thesis, it is proposed to patient data gathering and monitering method in u-zone. It can collect patient data by pulse, temperature and acceleration sensor and it can diagnosis correct based on emotion change data.

Study on Process Modeling of u-SCM using USN (USN을 이용한 u-SCM 프로세스 모델링 연구)

  • Park, Hyoun-Shil;Choi, Eun-Mi
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.05a
    • /
    • pp.379-384
    • /
    • 2007
  • USN (Ubiquitous Sensor Network)의 인프라 기술은 여러 센서를 이용하여 사용자의 요구사항을 처리 및 동작하는 지능화된 상호운용성 네트워크로서, 유비쿼터스 환경에서의 다양한 서비스를 창출하고 실생활에 적용할 수 있는 기술로 정착하고 있다. 설치의 간편성, 저전력, 저가격, 확장성, 내장성의 특정을 가지고 있는 USN은 많은 센서들의 이질적인 데이터와 사용자를 위한 다양한 멀티미디어 정보 그리고, 장치간의 상호운용을 위한 제어 정보 등이 포함되며, 산업분야에서는 RFID의 기술과 함께 기존 기업의 ERP, CRM, SCM 등 애플리케이션과의 호환성 확보를 통해 활용될 수 있다. 본 논문에서는, USN 을 비즈니스 서비스 모델에 적용하여 SCM 상에서의 프로세스 모델링 연구를 하였다. 유비쿼터스 컴퓨팅 기술을 SCM 에 적용하는 u-SCM을 공급단계에서 시작하여 소비자관리 및 분석의 프로세스로 모델링 및 구축하였다. 부품공급/조달물류관리, 생산관리, 재고/유통/발주관리, 소비자 관리 및 분석 프로세스를, 소규모 센서의 서비스 환경 탑재 및 감지, 위치 측정 등의 감지 센서들을 이용한 센서 노드(node)의 정보 습득, 무선 센서 네트워크 통신을 이용한 추출된 감지 정보 통신, USN 서버의 관리 및 정보의 저장과 분석 등으로 USN 기술을 이용한 u-SCM 의 관리 운영의 프로세스 모델로 제안하였다.

  • PDF

A Lighting Control System of Underground Parking Lot Based on Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크 기반 지하주차장 조명제어시스템)

  • Son, Byung-Rak;Kim, Jung-Gyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.125-135
    • /
    • 2010
  • Recently, the problem of global warming has issued seriously, so Green IT(Information Technology) using RFID/USN is concerned in order to solve environmental problems. In this paper, we implemented that public area like an underground parking lot could reduce unnecessary energy consumption used by lighting control system based on Ubiquitous Sensor Networks. The lighting control system for underground parking lot is comprised of intersection nodes for watching cars enter and leave, and light node for controlling light. It applies the routing protocol based on hierarchical cluster, hierarchical addressing method, and probability filtering method for the specific place like an underground parking lot. The result after experiments shows that the lighting control system could decrease electrical energy consumption to around 61.7%.

A Study on the Mobile Context construct Algorism Modeling for Ubiquitous (유비쿼터스 이동통신 한경 구축 알고리즘 구현에 관한 연구)

  • Kang, Myoung-Ku
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1883-1889
    • /
    • 2008
  • In order to realize future ubiquitous, it needs to establish an environment witch service is provided to an user without user's awareness. This study suggests the mobile context awareness algorithm for that. With DB collected using LBS technology, it aims to recognize service status of a terminal and to maximize user's convenience by offering service through continuous inter-operability for various demand and environment of users against the status of a terminal. To realize the algorithm, it adds a terminal status deduction process to MSC. And then, it suggests the algorithm witch determines terminal status depending on status parameter defined by analyzing LBS-based short information by MSC. It realize C code.

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.