• Title/Summary/Keyword: Service Gateway

Search Result 454, Processing Time 0.032 seconds

Design of Smart TV-based Integrated Gateway Solution for Wellness Service (웰니스 서비스를 위한 스마트 TV 기반 통합 게이트웨이 솔루션 설계)

  • Kim, Jong-Pan;Heo, Sung-uk;Oh, Am-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.950-953
    • /
    • 2013
  • 본 논문은 헬스케어 서비스에 대한 소비자 인식의 변화에 따라 최근 대두되고 있는 웰니스 서비스에 관한 연구이다. 현재 많은 소비자들이 여러 가지의 홈 헬스케어 개인건강기기를 통해 자신의 건강을 관리하고 있지만 제조사 별 고유의 소프트웨어와 통신 프로토콜을 내장되어있어 개인건강기기마다 각기 다른 방식의 서비스가 제공되고 있다. 이처럼 현재 제공되고 있는 헬스케어 서비스를 보다 효율적으로 제공하기 위해서는 다양한 개인건강기기와 서비스 제공 시스템간의 표준화된 인터페이스를 지원하기 위해서는 통합 게이트웨이 솔루션이 필요하다. 특히, 각 시스템 구성요소 간에 IEEE11073 PHD(Pelsonal Health Devices), HL7(Health Level Seven) 등의 표준을 통하여 건강정보 데이터 센싱, 취합 및 전송, 분석 및 피드백이 표준적인 방법으로 운용되어야한다. 이에 본 논문에서는 스마트 TV 환경에서 ISO/IEEE11073 표준을 준용하여 다양한 통신 인터페이스를 통한 개인건강기기의 연결성을 지원하는 통합 게이트웨이 솔루션 및 헬스케어, 건강관리와 관련된 서비스를 위한 건강정보 모니터링 앱을 설계하였다.

  • PDF

A Study on Smart health-care System based on Mobile Gateway (스마트 헬스케어 서비스의 의료정보시스템 표준에 대한 연구)

  • Jeon, Jae-Hwan;Kang, Sung-in;Kim, Gwan-hyung;Choi, Sung-wook;Oh, Am-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.915-917
    • /
    • 2012
  • 본 논문은 기존의 헬스케어 서비스의 한계를 극복하기 위해 최근 대두되고 있는 스마트 헬스케어 서비스(smart healthcare service)에 관한 연구이다. 스마트 헬스케어는 스마트폰의 기능에 맞추어 기초체력 운동 지수, 섭취 칼로리, 심박 체크 등의 다양한 서비스를 제공할 수 있지만, 최근에는 보건의료서비스에 특화시켜 환자와 의사가 직 간접적으로 진료를 할 수 있게끔 하는 스마트폰 환경에서의 원격진료 서비스가 부각되고 있다. 그러나 스마트 헬스케어 시스템에 기존의 병원정보시스템과 연동되기 위해서는 의료정보전송 표준인 HL7을 지원해야 한다. 이에 본 논문에서는 스마트 헬스케어 시스템의 게이트웨이에서 동작하는 HL7 표준 변환 모듈을 설계 구현하였다.

  • PDF

Design and Implementation of User Authentication Schemes for Roaming in Public Wireless LAM Systems (공중 무선랜 시스템에서 로밍을 고려한 사용자 인증방식의 설계 및 구현)

  • Lee, Hyun-Woo;Kim, Jeong-Hwan;Ryu, Won;Yoon, Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8B
    • /
    • pp.755-761
    • /
    • 2004
  • Currently, Wireless LAN(WLAN) service is widely deployed to provide high speed wireless Internet access through the mobile stations such as notebook and PDA. To provide enhanced security and user access control in the public WLAN area, WLAM access points should have the capability of IEEE 802.1x-based user authentication and authorization functionality. In this paper, we provide a brief understanding of IEEE 802. 1x standards and related protocols likeEAPoL(Extended Authentication Protocol Over LAN), EAP, RADIUS and describe how the IEEE 802.1x is designed and implemented in our embedded linux-based WLAN AP which is named i-WiNG.(Intelligent Wireless Internet Gateway).

A Study on the Role Model of Subject Specialization in Academic Libraries (지식기반시대 대학도서관의 주제전문화 역할 방향에 관한 연구)

  • Jeong, Dong-Youl
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.3
    • /
    • pp.5-23
    • /
    • 2002
  • With the rapid change of information environment, this study suggests role models and strategies for the university library in Korea based on the subject specialization. By analyzing the current situation and problems of university library, this research presents various directions for the subject specialization. Major research issues are (1) university library's subject specialization directions, models, and factors, (2) subject specialized librarian' s role and education system, (3) basic framework for customized information service and user education, (4) enhancement of subject specialization through subject gateway, (5) academic information sharing system.

An Efficient On-Demand Routing Approach with Directional Flooding for Wireless Mesh Networks

  • Kum, Dong-Won;Le, Anh-Ngoc;Cho, You-Ze;Toh, Chai Keong;Lee, In-Soo
    • Journal of Communications and Networks
    • /
    • v.12 no.1
    • /
    • pp.67-73
    • /
    • 2010
  • Current on-demand ad-hoc routing protocols are not appropriate for wireless mesh networks (WMNs), because flooding-based route discovery is both redundant and expensive in terms of control message overhead. In this paper, we propose an efficient on-demand routing approach with directional flooding (DF), which is suitable for the WMNs with limited mobility. In the route discovery process to reach a gateway, our DF scheme can reduce the number of route request (RREQ) packets broadcast by using a restricted directional flooding technique. Simulation results show that ad hoc on-demand distance vector (AODV) with DF (AODV-DF) can significantly reduce routing overhead by RREQ packets and enhance overall performance compared with the original AODV.

Design and Implementation of a Connected Car Platform Architecture for New ICT Convergence Services

  • Kook, Joongjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.47-54
    • /
    • 2017
  • In this paper, we propose a connected car platform architecture called Mobile Second for developing of verity convergence services. A Mobile Second platform architecture is designed to provide more powerful and diverse convergence services for vehicles and drivers by applying technologies of Connected Car and ICT Convergence in various ways. The Mobile Second platform is implemented by applying Tizen IVI and Android to hardware platforms for IVI, Nexcom's VTC1010 and Freescale's i.MX6q/dl respectively. The Mobile Second platform provides the driver with the vehicle's information via IVI devices, mobile devices and PCs, etc., and provides Vehicle Selective Gateway(VSG) and Vehicle Control Framework for the driver to control his/her vehicle, and also provides a web framework to enable the use of VSG's APIs for the monitoring and controlling the vehicle information in various mobile environments as well as IVI devices. Since the Mobile Second platform aims to create new variety of services for Connected Car, it includes service frameworks for Smart Care / Self diagonostics, Mood & Entertainment services, and Runtime, libraries and APIs needed for the development of related applications. The libraries given by the Mobile Second Platform provides both a native library for native application support and a Java Script-based library for web application support, minimizing the dependency on the platform and contributing the convenience of developers at the same time.

Design and Implementation of Federation of Connection management for Interworking (망간 연동을 위한 연결관리 연합기능의 설계 및 구현)

  • Lee, Han-Yeong;Im, Gyeong-Jun;Seo, Dong-Seon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1515-1521
    • /
    • 1996
  • Object-oriented and distributed processing methods are adopted next -generation telecommunications management architecture. In this paper, we design and implement gradual federation function on connection management system providing connection services to transport network for interworking and encapsulated trader and gateway function for testing interoperability of these service objects between distributed processing environments. These techniques are practically applicable to support interworking between heterogeneous management network systems according to a tendency of integrating telecommunications management systems.

  • PDF

Be study technical information protection in ubiqutious home networks (유비쿼터스 홈 네트워크에서의 정보보호 기술 연구)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.65-75
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at these papers, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS, DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding an external denial of service attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack like DoS, DDoS, IP Spoofing, and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

A Study on The Personal Wallet Management System Using Beacon Signal Processing (비콘 신호 처리를 활용한 개인소지품 지갑 관리 시스템에 대한 연구)

  • Kim, Dong-Ik;Nam, Kang-Hyun;Lee, Hyeon-Yeong;Ahn, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1109-1116
    • /
    • 2018
  • The purpose of this study is to solve the loss of personal belongings by utilizing monitoring function of IoT platform. The beacon to combined with personal belongings are registered with the application server, the trigger processing function according to the occurrence of the lost event is performed intelligently through the device, the app, the IoT network, and the application server.

Design and Implementation of a Management Framework for Ubiquitous Home Networks (유비쿼터스 홈 네트워크를 위한 JMX 기반 관리 프레임워크의 설계 및 구현)

  • Kim, Dae-Young;Lee, Jong-Eon;Cha, Si-Ho;Cho, Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.275-284
    • /
    • 2008
  • In this paper we design and implement a management framework base on JMX to control and manage ubiquitous home networks. To do this, we organize the ubiquitous home network test-bed that consists of information electronics and sensor devices. In the test-bed network, we implement the management framework which can control and manage various applications and devices in home network environment. In addition, it can also define and add new services easily. Moreover, it is possible to provide various management interfaces with multi-protocols. The framework is formed to integrate legacy management systems readily.