• Title/Summary/Keyword: Context Awareness Information

Search Result 549, Processing Time 0.04 seconds

A Study on the Selection Process of RFID Middleware and Quality Factor Evaluation in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서 RFID 미들웨어 선정 프로세스 및 품질 요소 평가에 대한 연구)

  • Oh, Gi-Oug;Park, Jung-Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.257-263
    • /
    • 2011
  • Conventional middleware is software providing services between clients and servers efficiently, but it is not applicable to RFID systems because of low consistency due to the absence of context awareness function, and problems in the management of meaning, security system, etc. Accordingly, we need a quality selection process and a quality evaluation method for selecting RFID middleware based on new criteria. This Paper proposed a new selection process based on international standard ISO/IEC 14598, and extracted and selected optimal quality factors through the proposed process. The selected quality factors were mapped to the quality characteristics of standard quality model ISO/IEC 9126, and to quality factors of RFID middleware of SUN, Microsoft, EPCglobal, IBM, etc. The results of these works showed that the quality factors extracted and selected through the proposed process were fair and adequate for evaluating the quality of RFID middleware.

Aerial Video Summarization Approach based on Sensor Operation Mode for Real-time Context Recognition (실시간 상황 인식을 위한 센서 운용 모드 기반 항공 영상 요약 기법)

  • Lee, Jun-Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.87-97
    • /
    • 2015
  • An Aerial video summarization is not only the key to effective browsing video within a limited time, but also an embedded cue to efficiently congregative situation awareness acquired by unmanned aerial vehicle. Different with previous works, we utilize sensor operation mode of unmanned aerial vehicle, which is global, local, and focused surveillance mode in order for accurately summarizing the aerial video considering flight and surveillance/reconnaissance environments. In focused mode, we propose the moving-react tracking method which utilizes the partitioning motion vector and spatiotemporal saliency map to detect and track the interest moving object continuously. In our simulation result, the key frames are correctly detected for aerial video summarization according to the sensor operation mode of aerial vehicle and finally, we verify the efficiency of video summarization using the proposed mothed.

The Experience of Miners Relocated to Alternative Positions due to Silicosis in the Andean of CODELCO, Chile, 2010

  • Delgado, Diemen;Aguilera, Maria De Los Angeles;Delgado, Fabian;Rug, Ani
    • Safety and Health at Work
    • /
    • v.3 no.2
    • /
    • pp.140-145
    • /
    • 2012
  • Objectives: To understand the personal experiences of mine workers that have experienced job relocation due to silicosis at the Andina Division of Corporaci$\acute{o}$n Nacional del Cobre (CODELCO), Chile. The purpose of the study was to provide useful information for the development of new local, business and public policies for the care of workers with silicosis. Methods: A qualitative study based on a practical case study of 5 workers. The information was collected by means of structured individual interviews. The method of analysis was phenomenology. Results: The corporal axis was the most commented upon. It included awareness of the illness, body pains, fatigue, and antagonistic mood disorders (sadness, or the difficulty in finding meaning in life). As far as personal relationships, there was evidence of strong relationships with family, coworkers and friends, as well as extended family. Over all, the experience of relocation was positive with periods of impatience and uncertainty. The job reassignment provided a new and pleasant context for the relocated workers and in the process improved their perception of their quality of life. Conclusions: A multidisciplinary team should attend mine workers relocated because of silicosis by addressing the mental and physical aspects of their disease, along with the integral participation of close family members. It is suggested that this investigation be maintain over time to record the personal experiences in the medium-term, adding new cases with the intention of shedding more light on the phenomenon being studied. As a preventive measure, continual workshops are needed on the proper use of respiratory protection in addition, a group of monitors is required.

Intelligence Security and Surveillance System in Sensor Network Environment Using Integrated Heterogeneous Sensors (이 기종간 통합 센서를 이용한 센서네트워크 환경에서의 지능형 보안감시 시스템)

  • Oh, Suk-Jun;Moon, Seung-Jin;Choi, Sun-O
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.551-562
    • /
    • 2013
  • Current CCTV systems, which require continuous monitoring of the screens, have the limitation to detect and respond to the crime scenes in timely manner. Therefore, in recent years, the request for more intlligent surveillance system, with a ubiquitous sensor network, is increasing in order to behave more humanly fashions. Such systems require cllective data processing of the environments based on various sensors. In this article, we suggests a new paradigm based surveillance system which integrates PSD and dual PIR sensors. The proposed system evlves from a existing indoor intrusion detection system which can only identify the intrusion event to a better inteligent system with context awareness. We have conducted the various simulations in order to prove the effectiveness of the proposed system.

Study on abnormal behavior prediction models using flexible multi-level regression (유연성 다중 회귀 모델을 활용한 보행자 이상 행동 예측 모델 연구)

  • Jung, Yu Jin;Yoon, Yong Ik
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • In the recently, violent crime and accidental crime has been generated continuously. Consequently, people anxiety has been heightened. The Closed Circuit Television (CCTV) has been used to ensure the security and evidence for the crimes. However, the video captured from CCTV has being used in the post-processing to apply to the evidence. In this paper, we propose a flexible multi-level models for estimating whether dangerous behavior and the environment and context for pedestrians. The situation analysis builds the knowledge for the pedestrians tracking. Finally, the decision step decides and notifies the threat situation when the behavior observed object is determined to abnormal behavior. Thereby, tracking the behavior of objects in a multi-region, it can be seen that the risk of the object behavior. It can be predicted by the behavior prediction of crime.

Big Data Meets Telcos: A Proactive Caching Perspective

  • Bastug, Ejder;Bennis, Mehdi;Zeydan, Engin;Kader, Manhal Abdel;Karatepe, Ilyas Alper;Er, Ahmet Salih;Debbah, Merouane
    • Journal of Communications and Networks
    • /
    • v.17 no.6
    • /
    • pp.549-557
    • /
    • 2015
  • Mobile cellular networks are becoming increasingly complex to manage while classical deployment/optimization techniques and current solutions (i.e., cell densification, acquiring more spectrum, etc.) are cost-ineffective and thus seen as stopgaps. This calls for development of novel approaches that leverage recent advances in storage/memory, context-awareness, edge/cloud computing, and falls into framework of big data. However, the big data by itself is yet another complex phenomena to handle and comes with its notorious 4V: Velocity, voracity, volume, and variety. In this work, we address these issues in optimization of 5G wireless networks via the notion of proactive caching at the base stations. In particular, we investigate the gains of proactive caching in terms of backhaul offloadings and request satisfactions, while tackling the large-amount of available data for content popularity estimation. In order to estimate the content popularity, we first collect users' mobile traffic data from a Turkish telecom operator from several base stations in hours of time interval. Then, an analysis is carried out locally on a big data platformand the gains of proactive caching at the base stations are investigated via numerical simulations. It turns out that several gains are possible depending on the level of available information and storage size. For instance, with 10% of content ratings and 15.4Gbyte of storage size (87%of total catalog size), proactive caching achieves 100% of request satisfaction and offloads 98% of the backhaul when considering 16 base stations.

A Feature-based Method to Identify Services in Ubiquitous Environment (유비쿼터스 환경에서 피쳐 기반 서비스 식별 방법)

  • Shin, Hyun-Suk;Song, Chee-Yang;Kang, Dong-Su;Baik, Doo-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.37-49
    • /
    • 2008
  • Services are reusable units in business level. Ubiquitous computing provides computing services anytime and anywhere. The combination of both is becoming an important paradigm of computing environment. Fundamentals of services require flexibility and interoperability, and key elements of ubiquitous modeling require interoperability and context-awareness. There are two kinds of methods to identify services. The top-down approach is based on business process, and the bottom-up approach is based on components. The first approach depends on experts' intuitions, while the second approach suffers the incapability of expressing non-functional expression through components. Although a feature-based approach is capable of expressing non-functional expression and identifying services in ubiquitous environment, the research on this issue is not adequately addressed by far. To promote this research, this paper proposes a feature-based method to identify services in ubiquitous computing. The method extracts initial-candidate-services from a feature model. Then, the ultimate services are identified through optimizing and analyzing the candidate-services. The proposed method is expected to enhance the service reusability by effectively analyzing ubiquitous domain based on feature, and varying reusable service units.

  • PDF

Hierarchical Image Processing Method For Context-Awareness On Ubiquitous-Safety(U-Safety) (유비쿼터스 안전관리(U-Safety) 상에서의 상황인지를 위한 계층적 영상 처리 시스템)

  • Lim, Chul-Hoo;Song, Kang-Suk;Jeong, Moo-Il;Lee, Yong-Woog;Moon, SungMo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.553-557
    • /
    • 2009
  • USS(Ubiquitous Smart Space) give services, that fit in with customer's goal, by cognizing various situations that happens in a space and cooperating autonomously objects or services in a space. In USS, U-Safety is a system that cognizes more exact situations with multiple sensors in USS, deals with this and take proper actions. When men reason on situations objectively, it is most ideal that image data among collected data with used various sensors in U-Safety. A senter collects a lot of image data from image input devices equipped in various points and work a multiple situation cognition and inference that are based on this. So, senters spend many resources for processing massive data. This paper proposes hierarchical image processing method that does the first situation cognization in image input devices, blocks only points that situation cognization possibility is high among a total image, and transfers to senters. It improves the efficiency of smooth situation cognization by reducing resources that a senter spends on image processing. So, it reduces proportion of image data in U-Safety.

  • PDF

A Study in the Efficient Collection and Integration of a Sensed Data in a Cloud Computing Environment (클라우드 컴퓨팅 환경에서 센싱된 데이터의 효율적 수집 및 통합에 관한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.324-325
    • /
    • 2016
  • The sensor network-based service collects data by using the sensor, the data is aware of the situation via the analysis, and the service provider provides a service suitable for the user via the context-awareness. However, this data is generated, it is difficult to match the metadata and standard units. The data integration is required to use the data generated by the different specifications of the sensor efficiently. Accordingly, in this paper we propose a method using an ontology as a method to integrate the data generated by the existing sensors and the new sensor. The ontology is mapping to the standard item and sensors, also include a type and structural difference. The mapping is comprised of two:data mapping, and metadata mapping. There are standard items that are created in this way, type of data exchange between services. This can solve the heterogeneous problem generated by sensors.

  • PDF

A Meta-Model for Development Process of IoT Application by Using UML

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.121-128
    • /
    • 2019
  • An Internet of Things(IoT) technology which provides intelligent services by combining context-awareness based intelligences, inter-communication is made of between things and things or between things and person through the network connected with intelligent things is spreading rapidly. Especially as this technology is converged into smart device, mobile, cloud, big data technologies, it is applied into various domains. Therefore, this is different from existing Web or Mobile Application. New types of IoT applications are emerging by adapting IoT into Web or mobile. Because IoT application is not only focused on software but also considering hardware or things aspect, there are limitations existing development process. Existing development processes don't consider analysis and design techniques considering both hardware and things. We propose not only a meta-model for development process which can support IoT application's development but also meta-models for main activities in this paper. Especially we define modeling elements by using UML's extension mechanisms, provide development process, and suggest design techniques how to apply those elements into IoT application's modeling phase. Because there are many types of IoT application's type, we propose an Android and Arduino-based on IoT application as a case study. We expect that proposed technique can be applied into many of various IoT application development and design with a form of flexible and extensible as well as main functionalities or elements are more concretely described. As a result, it brings IoT application's flexibility and the effect of quality improvement.