• Title/Summary/Keyword: UBIQUITOUS COMPUTING

Search Result 1,432, Processing Time 0.03 seconds

A Design CORBA Security Service for DataBase Security in Ubiquitous Computing (유비쿼터스 환경의 데이터베이스 보안을 위한 CSS 설계)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.15-22
    • /
    • 2005
  • The spread of Internet and the appear of Downsizing, SI(System Integration) is chaning centralized computing to distributed computing. Also distributed computing is rapidly changing to Ubiquitous computing escape from hard wire connected network. CORBA(Common Object Request Broker Architecture) is a middleware that used for smoothness communication between application program and operation system in a different environment. However distributed computing environment is not safe from the danger, the attack like virus, worm is too intellectual and variety. In this paper, we design a new DB security model and suggest efficiency of it in Ubiquitous environment base on CSS(CORBA Security Service) that present ed from OMG(Object Management Group).

  • PDF

Mobile Computing Algorithm on IEEE 802.11b for Ubiquitous Computing

  • Kim, Wu-Woan
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.1
    • /
    • pp.11-24
    • /
    • 2008
  • In this paper, the patterns of movement used in the mobile communication systems are adopted in the mobile computing environment to reduce handover delay and to support seamless handover for MIPv6 based on IEEE 802.11 networks. That is, RtSolPr message and PrRtAdv message can be treated before handover. As the result, it is possible to assign NCoA to MN and Next Access Router(NAR) before handover starts. This can minimize handover delay and reduce the total handover delay.

  • PDF

A Review on Approach of International Trade Practice Under RFID System Environment (RFID 시스템 환경 하에서 무역업무의 접근에 관한 고찰)

  • Seo, Gab-Sung
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.153-169
    • /
    • 2008
  • The purpose of this paper is to review the major issues of between electronic trade and Ubiquitous computing. The rapidly developed environment by ubiquitous computing make the paradigm form e-trade to u-trade. This Article suggests an a-trade performance framework based on both field and literatures surveys. We propose some research subjects as well as practical implications for improving the performance of global c-trade under ubiquitous.

  • PDF

Energy-Efficient Traffic Grooming in Bandwidth Constrained IP over WDM Networks

  • Chen, Bin;Yang, Zijian;Lin, Rongping;Dai, Mingjun;Lin, Xiaohui;Su, Gongchao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2711-2733
    • /
    • 2018
  • Minimizing power consumption in bandwidth limited optical traffic grooming networks is presented as a two-objective optimization problem. Since the main objective is to route a connection, the network throughput is maximized first, and then the minimum power consumption solution is found for this maximized throughput. Both transparent IP over WDM (Tp-IPoWDM) and translucent IP over WDM (Tl-IPoWDM) network may be applied to examine such bi-objective algorithms. Simulations show that the bi-objective algorithms are more energy-efficient than the single objective algorithms where only the throughput is optimized. For a Tp-IPoWDM network, both link based ILP (LB-ILP) and path based ILP (PB-ILP) methods are formulated and solved. Simulation results show that PB-ILP can save more power than LB-ILP because PB-ILP has more path selections when lightpath lengths are limited. For a Tl-IPoWDM network, only PB-ILP is formulated and we show that the Tl-IPoWDM network consumes less energy than the Tp-IPoWDM network, especially under a sparse network topology. For both kinds of networks, it is shown that network energy efficiency can be improved by over-provisioning wavelengths, which gives the network more path choices.

Developing a User-Perceived Value Framework for Ubiquitous Computing (유비쿼터스 컴퓨팅에 관한 사용자 가치구조 연구)

  • Lee, Jung-Woo;Lee, Bong-Gyou;Park, Jae-Sung
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • In this study, a value framework for ubiquitous computing is developed and presented. Using 'value focused thinking' approach suggested by Keeney, twenty-two potential users of ubiquitous computing were interviewed and 435 statements were obtained from these interviews. Subsequent purification and redundancy removal process reduces these 435 statements into 166 objectives users have in their mind when thinking about ubiquitous computing. These 166 objectives were again simplified into 37 objectives by clustering. Through a focus group interview, these objectives were again classified into a means-ends network diagram by analyzing reciprocal relationships among them. Resulting means-ends network reveals the value framework inherent within the perception of users. This framework will be useful as a reference in developing new business models in ubiquitous computing as well as developing technologies themselves.

  • PDF

Architecture of RFID Application Services for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 RFID 응용 서비스 아키텍처에 관한 연구)

  • Lee Sang-Jo;Cho Tae-Beom;Yunn Hwa-Mook;Kim Chang-Su;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.1011-1014
    • /
    • 2006
  • Recently, The Ubiquitous Computing which appears by issue in the latest IT field is actualized possibility and interest intensively becomes in many disciplines through rapid advancement of the network and the semiconductor. RFID is a base technology of the Ubiquitous Computing and it is technology to identifies information of the electronic tag which attaches in the object. and it guides the commercial business anger of Ubiquitous Computing. But currently, most of RFID research is becoming intensively in hardware field as tag and leader, whereas the research of software field relativy is insufficient. In this paper, we compared and analyzed architecture of existing which uses the RFID to rise point of Ubiquitous Computing then we complemented the problem point which is analyzed and proposed a new architecture to provides an intelligence application service.

  • PDF

A Study on Ubiquitous Convention using RFID (RFID를 활용한 유비쿼터스 컨벤션에 관한 연구)

  • Noh, Young;Byun, Jeung Woo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.175-184
    • /
    • 2009
  • We are entering into a era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge s haring, and calm services. Some people refer to this as the "ubiquitous" computing because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Ubiquitous computing technology, "RF" stands for "radio frequency"; the "ID" means "identifer". The tag itself of a computer chip and an antenna. The shortest metaphor is that RFID is like a bar-code but is read with an electromagnetic field rather than by a laser beam. Much has already been written about the use of RFID. But there is no has written about the use of RFID in the convention industry. Therefore this study have specific objectives as follows. 1. To give details on the use of RFID in convention. 2. To introduces the key concepts behind RFID technology. 3. To identify advantage & disadvantage of RFID technology using a BEXCO CASE study. 4. To study on ubiquitous convention using RFID and effective operation methods such as entrance identification system, session management, machine management, CRM management, visitor management, and contents management. This results provide into the current status of ubiquitous computing technology in convention industries. Specific advantages by using ubiquitous computing technology(RFID) are one-stop differentiate service, wireless internet service, use of visitor management system, entrance by tag, and U-logistics. On other side, disadvantages are security, stabilization of RFID system, higher price of RFID tag, and commercial scale. Convention by using of RFID technology is currently at an early stage. Convention company as BEXCO need to have the capabilities to adapt, to customize, to commercialize, and to modify technology to suit our circumstances.

Response and Threat of Home Network System in Ubiquitous Environment (유비쿼터스 환경에서의 홈네트워크 시스템 침해 위협 및 대응 방안)

  • Oh, Dae-Gyun;Jeong, Jin-Young
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.27-32
    • /
    • 2005
  • Recently The social interest regarding is coming to be high about Home Network accordong to intelligence anger of diffusions and the family home appliance machineries and tools of the superhigh speed Internet In the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases in the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases Beacaues of Home network is starting point to go ubiquitous computing enviorment, The Increase of Cyber attack through Internet will raise its head with the obstacle to disrupt the activation of the groove network. So there is a possibility of saying that the counter-measure preparation is urgent, In the various environment like this, It means the threat which present time than is complicated will exist. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment.

  • PDF

A Study on the Characteristic Office Space in the Information Society through Ubiquitous Theory (Ubiquitous 개념에 의한 정보화사회의 업무공간 특성에 관한 연구)

  • Yoo, Je-Whan;Shin, Hong-Kyung
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2004.11a
    • /
    • pp.46-49
    • /
    • 2004
  • A contemporary office space is changed by the transformation to an information-oriented society from an industrial society. A contemporary office space is recognized as an interactional space which is more of a mental and psychological space than a physical space. I studied the basic concept of an office space and the relationship of a social change and an office space on this study. I also studied the concept of an ubiquitous computing and the relationship of an ubiquitous computing and an office space. Through this study, we can establish the new concept of an office space to be applied to an ubiquitous concept. The ubiquitous concept of an office space will be brought into a new prototype of an office space, and then there is no more important to a physical place and time. The office space must be redesigned by an ubiquitous space nowadays.

  • PDF

Ubiquitous Data Mining Using Hybrid Support Vector Machine (변형된 Support Vector Machine을 이용한 유비쿼터스 데이터 마이닝)

  • Jun Sung-Hae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.312-317
    • /
    • 2005
  • Ubiquitous computing has had an effect to politics, economics, society, culture, education and so forth. For effective management of huge Ubiquitous networks environment, various computers which are connected to networks has to decide automatic optimum with intelligence. Currently in many areas, data mining has been used effectively to construct intelligent systems. We proposed a hybrid support vector machine for Ubiquitous data mining which realized intelligent Ubiquitous computing environment. Many data were collected by sensor networks in Ubiquitous computing environment. There are many noises in these data. The aim of proposed method was to eliminate noises from stream data according to sensor networks. In experiment, we verified the performance of our proposed method by simulation data for Ubiquitous sensor networks.