• Title/Summary/Keyword: UBIQUITOUS

Search Result 5,261, Processing Time 0.033 seconds

Prospects for U-PPBEES Under the U-Society (유비쿼터스 사회의 도래에 따른 u-국방기획관리제도의 특성 전망)

  • Lee, Pil-Jung
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.91-128
    • /
    • 2009
  • Society is developing fast. Nobody could expect that computer could be used in purpose of trajectory calculation when the ANIAC was developed in the past. However, nowadays technology development brought computerization which substitutes to mankind's working. And personal computer including internet make our society to be IT age. Such age is in revolutionizing now that could be able to bring a new paradigm. We should prepare to such change which scholars predict the end of revolution could be reached at ubiquitous age. This study is purposing firstly for predicting which changes are arisen in the defence sector when social system will become ubiquitous age. That is how change of ubiquitous paradigm could influence to the defence sector and which appearance could be arisen in ubiquitous defence environment. The second purpose of this study is to predict the characteristics of Planing, Programing, Budgeting, Executing, Evaluating, System (PPBEES) of the defence sector.

  • PDF

A study on the Planning of Ubiquitous System for Instrumentation management of Retaining wall in Building Construction (건축공사 흙막이 계측관리를 위한 유비쿼터스 시스템 구축 방안에 관한 연구)

  • Lee Ung-Kyun;Jo Ho-Kyoo;Kim Gwang-Hee;Kang Kyung-In
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • v.y2004m10
    • /
    • pp.67-70
    • /
    • 2004
  • The ubiquitous computing environment is widely expanded in almost all industries such as transportation. physical distribution, manufacturing, communication, tourist industry, financial business, and so on. But the construction industry is not well applied yet. Thus this study investigate the ubiquitous computing environment and propose a way for applying this technology to the construction industry. To achieve this aim, this study consider about a instrumentation management of retaining wall system in earthmoving operations, and suggest the ubiquitous system configuration to measure the variance of retaining wall. Through this system, the efficiency of the instrumentation management of retaining wall will be improved.

  • PDF

A Study on E-trade Security Issue and Strategy in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경 하에서의 전자무역 보안 쟁점과 전략에 관한 소고)

  • Jung, Sung-Hoon;Kang, Jang-Mook;Lee, Chun-Su
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.135-156
    • /
    • 2005
  • The rapidly developed environment by ubiquitous computing make the paradigm from e-trade to u-trade. The purpose of the study is to find out issue and the strategic suggestions that could link together between the e-trade and ubiquitous computing in side of information security. The study include the contents as follows; firstly, the technical explanations under the ubiquitous computing, secondly, e-trade's risks in security technology and lastly, issue and strategic suggestions how link them together in integrated view.

  • PDF

CRS and DOS based Context-Aware System architecture for Ubiquitous Computing (Ubiquitous Computing을 위한 CRS와 DOS 기반의 Context-Aware System Architecture)

  • Doo, Kyoung-Min;Kim, Sun-Guk;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.501-505
    • /
    • 2007
  • 현재 기술 동향에 따라, 언제 어디서나 통신 및 컴퓨팅이 가능한 유비쿼터스 컴퓨팅 시스템(Ubiquitous Computing System)을 위해 사용자 및 주변 환경의 상황을 인식하는 기술(Context-Aware Computing System)이 필수적인 요소로 부각되고 있다. 하지만, Context-Aware Computing System을 구현하기 위해서 사용자 및 주변 환경으로부터 입력되는 불확실하거나 모호한 상황정보에 대한 표현과 추론에 대한 연구는 부족한 실정이다. 이를 해결하기 위해 Rule-based System을 기반으로 CRS와 DOS의 개념을 도입하여 상황인식 기술을 SoC로 구현할 수 있도록 새로운 Architecture를 제안한다. 마지막으로는 CRS와 DOS가 Network Topolgy에 적용된 RODMRP(Resilient Ontology-based Dynamic Multicast Routing Protocol)의 예를 통해 그 효용성을 입증하고, Ubiquitous Computing System에서 활용 가능한 방법 등을 제시한다.

  • PDF

A Study on the Design Concept of Stream Cipher Algorithm in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서의 스트림 암호 설계 고찰)

  • Kim, Whayoung;Kim, Eunhong
    • Journal of Information Technology Services
    • /
    • v.3 no.1
    • /
    • pp.101-115
    • /
    • 2004
  • The phrase "Ubiquitous Computing" has become popular ever since Mark Weiser used it in an article. It is to realize a computerized environment in which small computers are embedded and cooperate with each other. This environment will support many activities of our daily life. In a Ubiquitous Computing environment, various devices will be connected to the network from houses and buildings. Therefore it is necessary to ensure network security and to protect private data from tapping, falsification and the disguising of identity by others. This study reviews the Ubiquitous Computing technologies in detail and outlines the design concept of the Stream Cipher Algorithm.

Ubiquitous Integration Monitoring System for the Feeding and Environment Management of Livestock Production (가축 생산성 향상을 위한 유비쿼터스 통합 모니터링 시스템)

  • So, Sunsup;Kim, Byeongho;Eun, Seongbae;Jun, Jungho
    • Journal of Information Technology Services
    • /
    • v.11 no.sup
    • /
    • pp.75-88
    • /
    • 2012
  • This research aims to propose a ubiquitous integration monitoring system for the feeding and environment management of livestock production. The integration monitoring system proposed in this research is based on an integrated platform, and consists of livestock shed environment monitoring system, livestock monitoring system, livestock remote medical treatment, and feeding and management system. This research conducts the followings. First, we review the previous researches on livestock related ubiquitous monitoring system to examine the factors to be considered in the proposed system. Then, we design the system and implement the prototype to demonstrate the possibility of the application of this system to real stockbreeding environment.

Study of e-learning and ICT Education in the Knowledge Society (지식정보화 사회에서의 e-learning과 ICT 활용 학습연구)

  • Park Young Chul;Baek Jong Sil
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.6 no.1
    • /
    • pp.64-71
    • /
    • 2005
  • In this paper we are investigating how ubiquitous revolution in knowledge society changes the education system. By the help of ubiquitous computing and networking techniques we estimates the configuration of e-teaming in the age of knowledge -based society, and we examines Education Model with e-teaming and ICT (Information and Communication Technology) at e-School. We also suggest the feasible design of the e-School and a Blended-learning scheme based on cooperative education as a way of teaching Education.

  • PDF

An analysis of security requirements and a technical security management plan of U-City computer centre for the construction of Ubiquitous City. (Ubiquitous City 구축을 위한 U-City전산센터의 보안요구사항 분석 및 기술적 보안관리 대책)

  • Hong, Ji-Boum;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1051-1054
    • /
    • 2005
  • 최근 건설되어지는 도시들은 정부의 신도시 정책의 일환인 첨단 도시 건설을 목적으로 하는 Ubiquitous City를 계획하고 있다. Ubiquitous City는 언제 어디서나 유비쿼터스 서비스와 인프라가 제공되는 환경을 가지고 있으므로 노출 위험이 높다. 보안을 고려한 개별 시스템들의 설계는 정부 정책과 함께 활발히 진행되지만 통합 시스템을 관리하는 면에서의 방안은 제시되지 못하고 있다. 보안관리방안이 성립되지 못한다면 침해 유형이 고도화되면서 항상 변화하는 유비쿼터스 시대에 보안은 취약해질 수밖에 없다. 시스템을 총괄 관리 및 관제하는 통합네트워크전산센터인 U-City전산센터의 보안 관리망을 구성하고 취약한 시스템들의 보안을 관리하는 대책이 필요하다. 본 논문에서는 유비쿼터스 보안망의 체계적인 관리 방안을 통합보안관리(ESM)를 중심으로 기술적인 보안관리대책을 제안한다. 제안된 보안관리대책이 Ubiquitous City를 계획하는 모든 신도시들의 플랫폼이 되도록 한다.

  • PDF

A Taxonomy of Agent Technologies for Ubiquitous Computing Environments

  • Zhang, Daqiang;Wan, Jiafu;Liu, Qiang;Guan, Xin;Liang, Xuedong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.547-565
    • /
    • 2012
  • The design, development and deployment of Mobile Agent (MA) systems for high-level inference and surveillance in wireless sensor networks and RFID systems have drawn increasing attention in the past decade. To answer how the state-of-the-art of MA in a wide range of ubiquitous and sensor environments is, this paper investigates the current progress of MA. It proposes a taxonomy, by which MA systems in ubiquitous computing environments are decomposed and discussed. Then, this paper provides insights into the strengths and weaknesses of existing efforts. Finally, it presents a series of solutions from the viewpoint of various roles of MA in ubiquitous environments and situations.

A plan research about a Ubiquitous RFID infringe private information (유비쿼터스 RFID 개인정보 침해에 대한 방안 연구)

  • Choi, Hee Sik;Park, Jae Pyo;Jun, Mun Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.143-151
    • /
    • 2010
  • RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information, the purpose of Ubiquitous and potential problems in individual privacy in computer environment. In main part, the content will handle the practices and weakness in security of computer environment in Ubiquitous. Last part of presentation going to examine, futuristic views in solving existing problems with alternative solutions to prohibit invasion in privacy.