• Title/Summary/Keyword: Pervasive System

Search Result 126, Processing Time 0.026 seconds

Context-Aware Modeling with User Demand in an Internet of Things Environment (사물 인터넷 환경에서 사용자 요구를 포함한 상황 인지 모델)

  • Ryu, Shinhye;Kim, Sangwook
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.11
    • /
    • pp.641-649
    • /
    • 2017
  • As Internet of Things devices become pervasive, services improve to better assess the context and to alert other users to deal with emergencies. Such services use Internet of Things devices to detect the context around the user and promptly notify public institutions, hospitals or other parental users in emergencies. Most of these systems analyze an event when the value of the device is unchanged for a period of time or if it detects an abnormal value. However, just monitoring sensor values makes it difficult to accurately understand the context surrounding a user. Also if the device is inactive, it can not identify the context or provide services again. However, understanding the user requirements, services provided through other devices, information sent to other users lets, appropriate actions be taken. This paper, proposes a device search method and system based on a context-aware model that includes user demands. The proposed system analyzes the user's context and demands by using data collected from the internet of things devices. If user devices are inactive, they can recognize other devices by searching for other devices and providing services to users again. Through the proposed method, the user-centric services are provided. This method also analyzes and responds to requirements in various emergencies.

Design of the Autogenous Context Service and Middleware for Ubiquitous Environments (유비쿼터스 환경을 위한 자생적 컨텍스트 서비스와 미들웨어의 설계)

  • Oh Hae-Seok;Oh Dong-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1088-1098
    • /
    • 2005
  • Context-Aware is a one of the important researches in ubiquitous computing for providing optimal service to users by acquiring user's intentions and environmental information. Diverse researches are focused on the users and its environment facts for Context-Aware base and introduce a sensing based middleware which engages sever/sensor that operates identifier information to provide services. Context-Aware service which is limited by users and environment facts has the problem of overlapping sensing, unnecessary searching and anonymity of users. Also Server-Centric Context-Aware system requires very high cost to manage and operate the services. On this paper, We introduce Autogenous Context service model to simplify the Context-Aware process and design the middleware which performs decentralize management for Context-Aware information of user's portable devices to minimize problems which is occurred during the management and operation of existing Context-Aware system.

  • PDF

A Study on Effective Peer Search Algorithm Considering Peer's Attribute using JXTA in Peer-to-Peer Network (JXTA를 이용한 Peer-to-Peer 환경에서 Peer의 성향을 고려한 Peer 탐색 알고리즘의 연구)

  • Lee, Jong-Seo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.632-639
    • /
    • 2011
  • Searching distributed resource efficiently is very important in distributed computing, cloud computing environment. Distributed resource searching may have system overheads and take much time in proportion to the searching number, because distributed resource searching has to circuit many peers for searching information. The open-source community project JXTA defines an open set of standard protocols for ad hoc, pervasive, peer-to-peer computing as a common platform for developing a wide variety of decentralized network applications. In this paper, we proposed peer search algorithm based on JXTA-Sim. original JXTA peer searching algorithm selected a loosely-consistent DHT. Our Lookup algorithm decreases message number of WALK_LOOKUP and reduce the network system overload, and we make a result of same performance both original algorithm and our proposed algorithm.

A review on deep learning-based structural health monitoring of civil infrastructures

  • Ye, X.W.;Jin, T.;Yun, C.B.
    • Smart Structures and Systems
    • /
    • v.24 no.5
    • /
    • pp.567-585
    • /
    • 2019
  • In the past two decades, structural health monitoring (SHM) systems have been widely installed on various civil infrastructures for the tracking of the state of their structural health and the detection of structural damage or abnormality, through long-term monitoring of environmental conditions as well as structural loadings and responses. In an SHM system, there are plenty of sensors to acquire a huge number of monitoring data, which can factually reflect the in-service condition of the target structure. In order to bridge the gap between SHM and structural maintenance and management (SMM), it is necessary to employ advanced data processing methods to convert the original multi-source heterogeneous field monitoring data into different types of specific physical indicators in order to make effective decisions regarding inspection, maintenance and management. Conventional approaches to data analysis are confronted with challenges from environmental noise, the volume of measurement data, the complexity of computation, etc., and they severely constrain the pervasive application of SHM technology. In recent years, with the rapid progress of computing hardware and image acquisition equipment, the deep learning-based data processing approach offers a new channel for excavating the massive data from an SHM system, towards autonomous, accurate and robust processing of the monitoring data. Many researchers from the SHM community have made efforts to explore the applications of deep learning-based approaches for structural damage detection and structural condition assessment. This paper gives a review on the deep learning-based SHM of civil infrastructures with the main content, including a brief summary of the history of the development of deep learning, the applications of deep learning-based data processing approaches in the SHM of many kinds of civil infrastructures, and the key challenges and future trends of the strategy of deep learning-based SHM.

Application Suite for Autonomous Management and Service of Verbal Knowledge (음성형 지식의 자율적 관리 및 서비스를 위한 애플리케이션 스위트 개발)

  • Yoo, Keedong
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.1
    • /
    • pp.79-90
    • /
    • 2016
  • Autonomous knowledge service, a fully-automated and pervasive service for knowledge acquisition and support based on the power of recent ITs is gaining tremendous interest more and more, as not only the level of users' intelligence increases but also the maturity of IT infrastructure improves. Conventional approaches of knowledge service, however, could not satisfy users because they usually provided undesired knowledge which had been acquired without considering users' want. In other words, knowledge acquisition and distribution were separately performed. This research, therefore, suggests an amended autonomous knowledge service framework by fully-automating the whole phases of knowledge life cycle, from knowledge acquisition to distribution. ASKs, the prototype system of this research, is also implemented by defining and specifying component technologies which constituently compose suggested framework. More user-friendly and applicable way of knowledge service will be derived and facilitated through this research.

Serpentinization of the Ultramafic Rock in the Yesan-Gongju-Cheongyang Area, Korea (충남 예산-공주-청양지역의 초염기성암의 사문암화 작용)

  • 김건영;김수진
    • Journal of the Mineralogical Society of Korea
    • /
    • v.10 no.2
    • /
    • pp.126-138
    • /
    • 1997
  • Serpentinite of the Yesan-Gongju-Cheongyang area has been formed by serpentinization of ultramafic rocks. The ultramafic rock might be composed mainly of oilvine with minor pyroxene and amphibole. Olivine has a considerably restricted chemical compositional ranging from Fo90 to Fo93. Fresh serpentinite containing large amount of oilvine is usually massive in occurrence and dark green to black in color. Serpentine minerals occur not only as major mineral of serpentinite, but also as remnants in the talc ore which was formed from serpentinite. XRD study indicates that antigorie is the most abundant serpentine mineral of the serpentinite. Serpentinite consisting of antigorite usually shows non-pseudomorphic texture, whereas that consisting of lizardite shows pseudomorphic texture. Antigorite is found along the margins or fractures of olivine grains resulting in the formation of network of magnetite which was formed at the time of serpentinization. Lizardite, subordinate constituent mineral of serpentinite, frequently shows pseudomorphic mesh-texture after olivine. The chemical differences between antigorite and lizardite/chrysotile are small, so both minerals are not easily discernible with the electron microprobe. Antigorite occuers as elongate blades, flakes, or plates forming interpenetrating texture to obliterate previous textures. SEM study also shows that most serpentine minerals occur in platy or tabular form rather than in asbestiform. Fractures formed after main serpentinization are observed within the pseudomorphic central olivine grain. Careful observation of the serpentine pseudomorphs gives a great deal of data on the pre-serpentinization nature of the serpentine pseudomorphs gives a great deal of data on the pre-serpentinization nature of the ultramafic rocks. It is inferred that the serpentinization took place after the emplacement of ultramafic body into the relatively wet environment ceased and the cooling intrusive body crossed into the stability field of serpentine. It is inferred that the final pervasive serpentinization took place over a long time, by hydrothermal water supplied through the fracture system produced during emplacement of ultramafic rock.

  • PDF

Sexual Discrimination towards Female Nurses in the Male Dominated Hospital Environment (간호사가 지각한 의료체계의 남성중심성)

  • Koh, Hyo-Jung;Jeong, Geum-Hee
    • Women's Health Nursing
    • /
    • v.5 no.3
    • /
    • pp.265-276
    • /
    • 1999
  • Female nurses in Korea have historically experienced discrimination on the basis of their gender as part of the traditional society views on woman and as a result of the male dominated hospital environments. This discrimination may interfere with the ability of female nurses to promote the health of their patients. To better understand this bias, we collected and analyzed 16 cases of alleged sexual discrimination reported by female nurses with more than 5 years work experience. The cases were classified into 10 subjects and further into 4 categories: personnel administration, daily working environment, female gender bias, and health care delivery. There were 7 cases (11.3%) of unjust personnel changes consisting of demotion(1), termination(4), and reallocation of position(3). Twenty three (37.1%) of cases related to problems in the daily workplace including biases in communication between female nurses and male physicians(12), daily work(8), and responsibility for adverse outcomes(3). We noted 17 cases (27.4%) of female gender bias as reported by female nurses(7), female physicians(7), and female patients(3). Lastly, there were 15 (24.3%) cases of problems with health care delivery due to sexual discrimination, including enrollment in the health care system(4),and decisions regarding medical care(4). These results suggest that sexual discrimination towards women is pervasive in the Korea hospitals, not only towards female nurses but also towards female physicians and patients. More discriminatory practices in a timely fashion such that better nursing care can be provided to patients and their families.

  • PDF

The Meaning of 'Golden Hour' in Prehospital Time for Abdominal Trauma Victims with Emergency Laparotomy (복부외상으로 응급개복술을 시행한 환자에서 병원전단계 황금시간의 의의)

  • Jang, Tae-Chang;Lee, Kyung-Won
    • Journal of Trauma and Injury
    • /
    • v.23 no.2
    • /
    • pp.180-187
    • /
    • 2010
  • Purpose: The "golden hour" concept in trauma is pervasive despite little evidence to support it. This study addressed the association between prehospital time and in-hospital mortality in seriously injured abdominal trauma victims. Methods: A retrospective study was conducted over a three-year period from 2006 to 2008. We analyzed trauma victims with abdominal injuries who underwent an emergency laparotomy in a local emergency center located in a city with a population of 2,500,000. According to the 'golden hour' oncept, we separated the trauma victims into two groups (Gourp 1: prehospital time ${\leq}$ 1 hour, Group 2: prehospital time > 1hour) and investigated several factors, such as time, process, and outcome. Results: During the period from January 2006 to December 2008 139 trauma victims underwent an emergency laparotomy, and 89 of them were enrolled in this study. Between the two groups, emergency department (ED) access, transportation, and injury mechanism showed statistically meaningful differences, but no statistically meaningful differences were observed in various measures of the outcome, such as length of hospital stay, length of Intensive Care Unit stay, and mortality. In a univariate logistic regression study, age (odds ratio [OR]: 1.101; 95% confidence interval [CI]: 1.026 to 1.182), Revised Trauma Score (RTS) (OR: 0.444; 95% CI 0.278 to 0.710), hemoglobin (OR: 0.749; 95% CI: 0.585 to 0.960), and creatinine (OR: 24.584; 95% CI: 2.019 to 299.364) were significant prognostic factors, but prehospital time was not. In a multivariate logistic regression study, age and RTS were significant associated with mortality. Conclusion: In this study, we found no association between prehospital time and mortality among abdominal trauma patient who underwent an emergency laparotomy. We suggest that in our current out-of-hospital and emergency care system, until arrival at the hospital time may be less crucial for trauma victims than once thought.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.

Implementation of Context aware Learning System by Designing Ubiquitous Learning Space and OWL Context Model (유비쿼터스 학습공간과 OWL 상황 모델 설계를 통한 상황 인식 학습 시스템 구현)

  • Hong, Myoung-Woo;Lee, Young-Whan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.99-109
    • /
    • 2011
  • Ubiquitous computing technology makes an impact on the appearance of u-learning and presents an advanced direction of futuristic school education. In ubiquitous learning environments, various embedded computational devices will be pervasive and interoperable across the network for supporting the learning, so users may utilize these devices anytime anywhere. An important next step for ubiquitous learning is the introduction of context-aware learning service that employing knowledge and reasoning to understand the local context and share this information in support of intelligent learning services. However, the existing studies on design and application of ontology context model to support context-aware service in actual school environments are incomplete state. This paper, therefore, suggests a scheme of constructing ubiquitous learning space for existing school network by introducing USN to support context-aware ubiquitous learning services. This paper, also, designs an ontology based context model for ubiquitous school environments which describes context information through OWL. To determine the suitability of proposed ubiquitous learning space and ontology context model, we implement some of context-aware learning services in the ubiquitous learning environments.