• Title/Summary/Keyword: Pervasive System

Search Result 125, Processing Time 0.029 seconds

Evaluation of RFID System for Location Based Services in the Building (건물 내의 위치기반 서비스를 위한 RFID 시스템)

  • Nam, Sang-Yep;An, Jin-Ung;Kim, Dong-Han
    • 전자공학회논문지 IE
    • /
    • v.48 no.1
    • /
    • pp.45-50
    • /
    • 2011
  • In this paper, different RFID tag types compliant with UHF frequency based RFID system were chosen to build RFID tag embedded concrete blocks. Then, by placing the tags in systematically varied depths of a concrete block, we could measure the RF signal attenuation pattern as the performance indicator of a specific concrete embedded RFID system. Experiments show that the concrete mixing ratio makes no significant difference in tag detection performance level. The significance of the developed RFID system lies in its capability of eliminating GPS's error and shadow area as well as providing smart infrastructure for supporting truly pervasive ubiquitous computing applications especially in outdoor environment.

Design of Mobile Agent Management System based on OSGi (OSGi 기반 이동 에이전트 관리 시스템 설계)

  • Lee, Seung-Keun;Kim, In-Tae;Kim, Tae-Gan;Lee, Kyoung-Mo;Rim, Ki-Wook;Lee, Jung-Hyun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.5
    • /
    • pp.41-48
    • /
    • 2005
  • OSGi(Open Service Gateway Initiative) offers a unique opportunity for pervasive computing as a potential framework for achieving interoperability between various sensors, home appliances, and networked devices. The OSGi framework supports a remote installation of a bundle, which is a unit that installs and deploys services. However, in order for the bundle in execution to migrate, a specific form of bundle such a mobile agent, is needed one which is able to move through a heterogeneous network. This paper proposes a method that can manage bundles like these dynamic agents, in order to ensure the mobility of entities in multiple OSGi framework environments. For our purposes, we have designed the mobile agent management system for managing the lifecycle and mobility of agents in the OSGi framework. The mobile agent management system we are proposing implements a bundle form which can perform in an OSGi framework as well as manage autonomous mobile services. As a result, mobility in a pervasive environment will be supported more efficiently.

Context categorization of physiological signal for protecting user's privacy (사생활 보호를 위한 생체 신호기반 컨택스트 분석 및 구분기법)

  • Choi, Ah-Young;Rashid, Umar;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.960-965
    • /
    • 2006
  • Privacy and security are latent problems in pervasive healthcare system. For the sake of protecting health monitoring information, it is necessary to classify and categorize the various contexts in terms of obfuscation. In this paper, we propose the physiological context categorization and specification methodology by exploiting data fusion network for automatic context alignment. In addition, we introduce the methodologies for making various level of physiological context on the context aware application model, which is wear-UCAM. This physiological context has several layers of context according to the level of abstraction such as user-friendly level or parametric level. This mechanism facilitates a user to restrict access to his/her monitoring results based on the level of details in context.

  • PDF

Ubiquitous Computing-Driven Business Models : An Analytical Structure & Empirical Validations (유비쿼터스 컴퓨팅 기반의 비즈니스 모델에 관한 연구 : 연구 분석 프레임워크 수립 및 실증 분석)

  • Hwang Kyung Tae;Shin Bongsik;Kim Kyoung-jae
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.105-121
    • /
    • 2005
  • Ubiquitous computing(UC) is an emerging paradigm. Its arrival as a mainstream is expected to trigger innovative UC-driven business models (UCBMs). Currently, there is no Parsimonious methodology to analyze and provide diagnostics for UCBMs. With this research, we propose a analytical architecture that enables the assessment of an UCBM in its structural strengths and weaknesses. With value logic as the cornerstone, the architecture is composed of value actors, value assets, value context, business value Propositions, customer value propositions, value creation logics, and value assumptions. Dimensional variables are initially Identified based on the review of business model literature. Then, their significance is empirically examined through 14 UCBM scenarios, and variables that are expected to Play an important role in the UCBM assessment are decided. Finally, by analyzing the scenarios in terms of the dimensional variables, we attempted to summarize general characteristics of emerging UCBMs.

  • PDF

Pervasive computing with Qplus-P real-time embedded operating system (편재형 컴퓨팅을 위한 Qplus-P 실시간 임베디드 운영체제)

  • 강우철;정영준;손동환;김가규;윤희철;이형석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.130-132
    • /
    • 2004
  • 프로세서, 센서 등의 소형화와 저가격화는 어느 곳에서나 유무선 네트웍과 연결되는 편재형 디바이스들의 출연을 가능하게 했다. 이러한 디바이스들은 점점 많은 기능을 가지고 인텔리전트한 기능을 제공하고 있다. 그러나 기존의 상용 RTOS는 특정 제품에의 의존도가 높고, 멀티미디어 응용과 같은 새로운 편재환경에의 요구 사항을 지원하고 있지 않으므로 이러한 환경변화에 적응하는 것이 어렵다. 따라서 소형의 휴대 정보 단말에서부터 홈 서버에 이르기까지 다양한 종류의 편재형 기기에 사용될 수 있는 확장성과 풍부한 기능을 갖춘 표준 실시간 OS의 개발이 필요하다. Qplus-P는 이와 같은 편재형 컴퓨팅을 지원하기 위한 실시간 소프트웨어 플랫폼이다. 이에는 실시간 운영체제 커널, 라이브러리 및 응용, 사용자 개발 도구가 포함된다. 특히 커널은 확장 가능한 구조를 채택하여 다양한 내장형 기기에 적용 가능한 이식성을 지원하며, 사용자 개발 도구는 특정 내장형 기기에서의 OS의 이식을 지원하는 개발 도구로 편리한 사용자 인터페이스를 제공한다.

  • PDF

A Metadata-enabled Approach for Scalable Video Streaming in Heterogeneous Networks

  • Thang, Truong Cong;Le, Hung T.;Nguyen, Duc V.;Pham, Anh T.
    • Journal of Multimedia Information System
    • /
    • v.2 no.1
    • /
    • pp.153-162
    • /
    • 2015
  • In today's pervasive computing environments, multimedia content should be adapted to meet various conditions of network connections, terminals, and user characteristics. Scalable Video Coding (SVC) is a key solution for video communication over heterogeneous networks, where user terminals have different capabilities. This paper presents a standard-compliant approach that adapts an SVC bitstream to support multiple users. The adaptation problem is formulated as an optimization problem, focusing on the tradeoff between qualities of different spatial layers of an SVC video. Then the adaptation process is represented by standard metadata of MPEG-21, which can be solved by universal processing to enable interoperable and automatic operation. Our approach provides the users with optimal quality, a wide flexibility, and seamless adaptation. To the best of our knowledge, this is the first study that shows the adaptation tradeoff between spatial layers of a conforming SVC bitstream.

A New MDR-based RFID System Architecture for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 MDR 기반의 새로운 RFID 시스템 구조)

  • Jeong Dongwon;Lee Lee-Sub
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.4
    • /
    • pp.43-53
    • /
    • 2005
  • 유비쿼터스 컴퓨팅은 무수히 많은 센서들이 관련 데이터 처리 시스템들과 또는 센서들 간의 정보 공유를 통해 서비스를 제공하면서 특정한 장치나 위치에 구애받지 않고 사용자들이 서비스를 이용할 수 있도록 해 준다. 이 논문에서는 유비쿼터스 환경하에서 현재 가장 활발하게 활용되고 있는 RFID(Radio Frequency IDentification) 시스템이 지니는 문제점을 정의하고 이를 극복할 수 있는 새로운 RFID 시스템 구조를 제안한다. 현재의 RFID 시스템은 특정 분야에만 한정하여 단순히 미리 주어진 태그의 식별자를 통해 대상을 식별하는 응용만으로 그 활용성이 제한되어 있다. 이 논문에서는 이러한 제한된 현재의 RFID 시스템의 문제점을 해결하고 유비쿼터스 환경에 적합한 활용성을 극대화할 수 있는 MDR(Metadata registry) 기반의 RFID 시스템 구조를 제안한다. 제안된 시스템은 특정 응용 분야에 종속되지 않고 다양한 분야와의 원활한 연계성을 제공한다. 또한 새로운 정보의 의미를 동적으로 처리할 수 있기 때문에 보다 넓은 응용 범위를 제공한다.

  • PDF

Design of Tourism Application Based on RFID Technology

  • Lee, JiHyun;Lee, JoonGoo;Kim, SeonWook
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.74-82
    • /
    • 2014
  • Automatic identification is pervasive in many areas and its applicable areas are increasing gradually. 2D bar-code, NFC, and RFID technologies are representative examples of the automatic identification. This paper explains the implementation of mobile tourism application software on RFID technology. The mobile application provides the location and navigation information by combining the tag inventory and web database. The interactions among the user, application and database server are described in detail. This paper proposes a simple way of minimizing the efforts to build the entire system by storing the URLs for the tag and accessing existing tourism information services through the URLs.

Real-time EtherCAT Master Implementation on Xenomai for a Robot System

  • Moon, Yong-Seon;Ko, Nak-Yong;Lee, Kwang-Seok;Bae, Young-Chul;Park, Jong-Kyu
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.9 no.3
    • /
    • pp.244-248
    • /
    • 2009
  • This paper describes a real-time EtherCAT Master library. The library is developed using Xenomai. Xenomai is a real-time development framework. It cooperates with the Linux kernel, in order to provide a pervasive, interface-agnostic, hard real-time support to user-space applications, seamlessly integrated into the GNU/Linux environment. The proposed master library implements EtherCAT protocol for master side, and supports Application Programming Interfaces(APIs) for programming of real-time application which controls EtherCAT slave.

I-section flange compactness under minor axis flexure

  • Aktas, M.;Earls, C.J.
    • Steel and Composite Structures
    • /
    • v.6 no.4
    • /
    • pp.335-351
    • /
    • 2006
  • The present paper hopes to elucidate the problem of determining if a given I-shaped cross-section is properly proportioned to accommodate sufficient plastic hinge rotation capacity to facilitate the redistribution of moments in a structural system as needed to accommodate the formation of a collapse mechanism. It might be tempting to believe that application of the limiting flange plate slenderness value for the case of major axis flexure are applicable in this case; since the pervasive belief is that this approach ought to be conservative. However, the present research study indicates that this is not the case and thus more sophisticated analysis techniques are required to better understand this case.