• 제목/요약/키워드: Location-Aware Services

검색결과 104건 처리시간 0.027초

Ad-Hoc 네트워크에서 위치와 에너지를 고려한 지오캐스팅 알고리즘 (Geographic and Energy Aware Geocasting in Ad-Hoc Networks)

  • 이주영
    • 인터넷정보학회논문지
    • /
    • 제5권2호
    • /
    • pp.75-84
    • /
    • 2004
  • 지오캐스팅(geocasting)이란 멀티캐스팅의 특별한 한 종류로서, 어떤 특정한 지역(지오캐스트 영역이라 함)에 있는 모든 노드들에게 데이터를 전송하는 통신형태를 말하며, location-based multicasting(LBM) 이라고 부르기도 한다(1). Ad-hoc 네트워크는 중앙 집중화된 관리나 표준화된 지원 서비스 없이 배터리를 에너지원으로 사용하는 휴대용 기기들이 동적으로 연결되어 구성되는 임시적인 망이다. 따라서, 제한된 에너지 자원을 효율적으로 관리하는 것은 네트워크 활동시간(lifetime)을 최대화하기 위한 중요한 문제가 된다. 본 논문에서는 Ad-hoc 네트워크 환경에서 라우팅 설정시 에너지 값을 고려하여 중간 노드를 선택하는 LBPA(Location-Based Power Aware) 지오캐스팅 알고리즘을 제안한다. 전송 에너지를 균형있게 소비하여 각 이동 호스트의 잔여 에너지의 비율을 일정하게 유지시키는 방법으로 네트워크 활동시간 측면에서 볼 때 기존의 LBM 알고리즘보다 평균적으로 49%, 더 좋은 결과를 실험을 통하여 보여주었다.

  • PDF

위치추적을 위한 UWB 센서 튜닝 및 상황인지형 서비스에의 응용 (Ultra-Wide Band Sensor Tuning for Localization and its Application to Context-Aware Services)

  • 정다운;추영열
    • 한국정보통신학회논문지
    • /
    • 제12권6호
    • /
    • pp.1120-1127
    • /
    • 2008
  • 본 논문은 UWB 센서를 이용한 위치인식 시스템의 구현 및 실험결과와 상황인지형 서비스 구현에 대하여 기술한다. 정확한 위치측정을 위해 UWB 센서의 경사도(pitch), 편주(yaw), 센서 개수, tag 높이 등의 변화에 따른 위치인식 오차를 측정하여 각 변수의 설정 방법을 실험하였다. 이를 이용한 응용으로 상황인지 기술에 바탕한 지능형 헬스트레이닝 관리 시스템 구현하였다. 지능형 헬스 트레이닝 관리 시스템은 헬스장에서 피 훈련자의 위치와 장비의 사용 상태를 인식하여, 적절한 훈련 스케줄을 피 훈련자에게 제공하며, 그에 따른 훈련 장비들의 사용법을 PDA를 통해 안내한다. 상황인지형 서비스의 제공을 위해서는 사용자의 위치와 이동 정보에 대한 오차 보정이 요구되어 사용자의 이동하는 속도를 이용한 위치 보정 알고리즘을 제안하였다. 실험 결과는 제안된 보정 알고리즘을 적용함으로써 이 알고리즘이 적용하지 않았을 때에 비해 오류 데이터가 30% 정도 감소하였다.

유비쿼터스 환경의 위치 기반 모바일 전자상거래 서비스 통합 구조에 관한 연구 (An Integrated Architecture for Location-Based Mobile Commerce Service in Ubiquitous Environment)

  • 이민석;이훈일;이미영
    • Journal of Information Technology Applications and Management
    • /
    • 제12권3호
    • /
    • pp.97-109
    • /
    • 2005
  • The internet and wireless communication technologies are creating ubiquitous environments in which various services are expected anytime and anywhere. Many hardware facilities have been developed and system structures are suggested for mobile services to realize a ubiquitous computing environment with appropriate quality. But these applications are not designed in the consideration of the general capabilities to perform user's wireless and mobile communication/transaction. Consequently, different needs from users are not sufficiently satisfied yet. In this study, we suggest structure of the emerging network system for mobile commerce that provides users with seamless and ubiquitous environments using location information which exploit context-aware technology.

  • PDF

Framework Design of Pervasive Computing System for Inter Space Interactions between Private and Public Smart Spaces

  • Lim, Shin-Young;Chung, Lawrence;Helal, Sumi;Yang, Hen-I
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제9권3호
    • /
    • pp.198-205
    • /
    • 2009
  • In this paper, design of framework architecture of pervasive computing system providing seamless inter space interactions between private and public smart spaces is presented. The seamless inter space interaction issues are related to establishing user's service environment by allocating relevant resources in a new location where there are no prior settings for the user or where there are current users already being served in the new location. In the realm of pervasive computing, we can have different types of smart spaces, offering proactive and intelligent services, which are islands of smart spaces independent from each other. As users move about, they will have to roam from private smart space to public smart space and vice versa. When they enter a new island of smart space, they will have to setup their devices and service manually to get the same or different services they had at the previous location. Users might be living in a non-pervasive computing environment because this manual operation is inappropriate to its generic features of proactive and intelligent services of pervasive computing. The framework architecture will provide seamless inter space interactions initiated by changes in users' location to acquire negotiations of resources for new and current residents regarding service provision with limited available networked devices.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Link Stability aware Reinforcement Learning based Network Path Planning

  • Quach, Hong-Nam;Jo, Hyeonjun;Yeom, Sungwoong;Kim, Kyungbaek
    • 스마트미디어저널
    • /
    • 제11권5호
    • /
    • pp.82-90
    • /
    • 2022
  • Along with the growing popularity of 5G technology, providing flexible and personalized network services suitable for requirements of customers has also become a lucrative venture and business key for network service providers. Therefore, dynamic network provisioning is needed to help network service providers. Moreover, increasing user demand for network services meets specific requirements of users, including location, usage duration, and QoS. In this paper, a routing algorithm, which makes routing decisions using Reinforcement Learning (RL) based on the information about link stability, is proposed and called Link Stability aware Reinforcement Learning (LSRL) routing. To evaluate this algorithm, several mininet-based experiments with various network settings were conducted. As a result, it was observed that the proposed method accepts more requests through the evaluation than the past link annotated shorted path algorithm and it was demonstrated that the proposed approach is an appealing solution for dynamic network provisioning routing.

A Survey of System Architectures, Privacy Preservation, and Main Research Challenges on Location-Based Services

  • Tefera, Mulugeta K.;Yang, Xiaolong;Sun, Qifu Tyler
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3199-3218
    • /
    • 2019
  • Location-based services (LBSs) have become popular in recent years due to the ever-increasing usage of smart mobile devices and mobile applications through networks. Although LBS application provides great benefits to mobile users, it also raises a sever privacy concern of users due to the untrusted service providers. In the lack of privacy enhancing mechanisms, most applications of the LBS may discourage the user's acceptance of location services in general, and endanger the user's privacy in particular. Therefore, it is a great interest to discuss on the recent privacy-preserving mechanisms in LBSs. Many existing location-privacy protection-mechanisms (LPPMs) make great efforts to increase the attacker's uncertainty on the user's actual whereabouts by generating a multiple of fake-locations together with user's actual positions. In this survey, we present a study and analysis of existing LPPMs and the state-of-art privacy measures in service quality aware LBS applications. We first study the general architecture of privacy qualification system for LBSs by surveying the existing framework and outlining its main feature components. We then give an overview of the basic privacy requirements to be considered in the design and evaluation of LPPMs. Furthermore, we discuss the classification and countermeasure solutions of existing LPPMs for mitigating the current LBS privacy protection challenges. These classifications include anonymization, obfuscation, and an encryption-based technique, as well as the combination of them is called a hybrid mechanism. Finally, we discuss several open issues and research challenges based on the latest progresses for on-going LBS and location privacy research.

OSGi플렛폼 기반의 상황인식 서비스지향아키텍쳐에 관한 연구 (Study on Context-Aware SOA based on Open Service Gateway initiative platform)

  • 최성욱;오암석;권오현;강시협;홍순구;최형림
    • 한국정보통신학회논문지
    • /
    • 제10권11호
    • /
    • pp.2083-2090
    • /
    • 2006
  • 제안된 OSGi 플렛폼(Platform) 기반의 상황인식 서비스지향 아키텍쳐에서 서비스공급자는 다양한 센서들로부터 상대적인 서비스들을 통합하여 각각 서비스를 SOAP 메시지로 묶어서 웹서비스를 서비스중재자의 UDDI서버에 등록하면, 서비스요청자는 UDDI서버에서 특정한 서비스를 검색하고, 서비스공급자에게 해당 SOAP메시지를 호출한다. 최근 유비쿼터스 홈네트워크 상황인식기술은 RFID/USN. 위치기반 기술을 중심으로 연구가 진행되고 있으나 이를 위한 서비스 지향 아키텍쳐에 대한 연구는 원만하게 진행되지 않고 있다. 따라서, 본 논문에서는 OSGi Platform 기반에서 다양한 센서 들로부터 수많은 상황인식 서비스가 동적 으로 움직이게 되고 사용자 요구 및 필요성에 따라 신규서비스의 제공 및 기존 서비스의 변경과 제공된 서비스간에 데이터 공유, 서비스 라이프사이클, 서비스분배의 효과적인 관리를 위하여 ATAM으로부터 추출된 성능 유티리티 트리에서 이산 Little's Law를 적용함에 따라 546 TPS 에서 초당 상황인식트랜잭션 처리횟수를 향상시키는 OSGi Platform을 이용한 eclipse STP 기반의 상황인식 SOA를 제안하고자 한다.

An IoT-Aware System for Managing Patients' Waiting Time Using Bluetooth Low-Energy Technology

  • Reham Alabduljabbar
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.83-92
    • /
    • 2024
  • It is a common observation that whenever any patient arrives at the front desk of a hospital, outpatient clinic, or other health-associated centers, they have to first queue up in a line and wait to fill in their registration form to get admitted. The long waiting time without any status updates is the most common complaint, worrying health officials. In this paper, UrNext, a location-aware mobile-based solution using Bluetooth low-energy (BLE) technology, is presented to solve the problem. Recently, a technology-oriented method has been gaining popularity in solving the healthcare sector's problems, namely the Internet of Things (IoT). The implementation of this solution could be explained through a simple example that when a patient arrives at a clinic for her consultation. There, instead of having to wait in long lines, she will be greeted automatically, receive a push notification telling her that she has been admitted along with an estimated waiting time for her consultation session. This will not only provide the patients with a sense of freedom but would also reduce uncertainty levels that are generally observed, thus saving both time and money. This work aimed to improve clinics' quality of services and organize queues and minimize waiting times in clinics, leading to patient comfortability and reducing the burden on nurses and receptionists. The results demonstrated that the presented system was successful in its performance and helped achieve high usability.