• Title/Summary/Keyword: Ubiquitous Business

Search Result 354, Processing Time 0.028 seconds

A Site Application verification of technology and Equipment for Construction Application of Construction CALS System (건설 CALS 시스템 건설공사 활용을 위한 요소기술 및 장비의 현장 적용성 검증)

  • Choi, Sang-Yong;Shin, Tae-Hong;Kim, Byung-Kon;Kim, Tea-Hak;Kwon, Soon-Wook;Chin, Sang-Yoon
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.767-771
    • /
    • 2008
  • From industrial field spearhead IT and new create an added value and market with fusion of traditional industry composition researches actively to be in the process of advancing. The application possibility of high-tech IT technique is coming to be high in construction industry. Currently, the user requirements that upgrade existing system to high-tech construction project information system combined construction CALS system applying in road/river business management service with high-tech IT such as ubiquitous and mobile techniques are increasing. Therefore, the objective of this study is to verify site application of RFID and mobile equipment for applying in high-tech field with ubiquitous and mobile techniques so that construction CALS system gets advanced increasingly.

  • PDF

The Role of Technology and Organization in Building Trust in Mobile Content Services (모바일 콘텐츠 서비스의 신뢰구축을 위한 기술과 조직의 역할)

  • Cho, Nam-Jae;Joun, Hyo-Jae
    • Journal of Digital Convergence
    • /
    • v.8 no.1
    • /
    • pp.11-26
    • /
    • 2010
  • The purpose of this paper is to study building and maintaining consumer trust in mobile contents for tourism and travel in perspective of public sector. Mobile contents services are increasing rapidly. Tourism contents in mobile services are non profit business model in an early and immature stage toward the ubiquitous era. Non-profit organization plays a role as service provider through Internet and wireless telecommunication in an information-intensive and network-oriented environment. This article is proposed nonprofit organizations as tourism contents service provider to identify a conceptual framework that can build continuous trusted mobile contents under ubiquitous environment according to developing and maintaining stage. The results based on the focus group interview methodology highlights a conceptual foundation for service providers in nonprofit domain.

  • PDF

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

The Study of Web Services Adaptation in Ubiquitous Environments (유비쿼터스 환경에서의 웹서비스 적용 기술)

  • Lee, Won-Suk;Lee, Kang-Chan;Jeon, Jong-Hong;Lee, Seung-Yun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1031-1034
    • /
    • 2005
  • The beginning of Web Services was aware of efficient technology for application integration, thus it was used to integrating the distributed enterprise applications or the applications between business partners. But, recently the usage of Web Services is spreaded out not only internet applications but also wireless network applications. The main reasons are that Web Services is the international standard of W3C, and Web Services is based on XML that has the neutralized characteristics. Currently Major company of Web Services such as MS, IBM, etc. focus on the inte In this paper, we define and explain technical issues for adapting web services to ubiquitous Environment.

  • PDF

A Study for Performance Estimation Standard and Standardization of u-IT Convergence Equipment (u-IT Convergence 기기의 성능평가기준과 표준화 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Lee, Sang-Ick;Kim, Eung-Sik;Kim, Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.457-460
    • /
    • 2009
  • u-IT Convergence appliances study and are developed in communication by development of u-IT technology, broadcasting, portal, contents, equipment and all fields of business such as solution. This treatise presents valuation basis of, economic performance, administration sex etc. by temperature, pressure, own, storehouse, gas, justice for humidity sensors and valuation basis that define u-IT Convergence, and sense information u-IT Convergence devices and terminal. Also, studied standardization standard of u-IT Convergence network appliance that follow in valuation basis for u-IT Convergence devices. Is going to contribute establish value as estimation product that equip stability and authoritativeness through correct certification assessment for technological development and appliances on Ubiquitous information-oriented society through this research and accomplish standardization.

  • PDF

A Comparison of Internet Practices between U.S. and South Korean Firms from Value Chain Perspective (한.미 기업의 인터넷 활용 비교 연구: 가치사슬을 중심으로)

  • Lee, Seog-Jun;Nam, Kyung-Doo;Koh, Chang-E.
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.79-94
    • /
    • 2004
  • The Internet is now an ubiquitous technology in business and possesses the potential to make the concept of value chain into an attainable reality. We posit that the way the Internet is utilized, the extent of the Internet's impact on business performance, and the extent the firms are prepared to take advantage of the Internet varies from country to country and from industry to industry. Based on data collected from 54 firms in the U.S. and 135 in South Korea, we compared the two countries (U.S. and South Korea) and two major industry groups (manufacturing and service) regarding the pattern of Internet utilization on the Internet from a value chain perspective. The findings show that U.S. companies utilize the Internet more extensively in such areas as human resources management, automation, sales, and advertising than the South Korean counterparts. However, we did not find a statistically significant difference in the way the two countries use the Internet within a value chain model. We also compared Internet practices by industry sector (i.e., service vs. manufacturing) within each country. The results show that firms in the service sector tend to use the Internet more extensively than the manufacturing counterparts in both countries. Particularly in Korea the difference between the sectors was significant in the extent to which they utilized the Internet to support such business activities as inter-organizational alliance, communication, and marketing.

A Study on Factors for Adopting of RFID Application Technology (RFID 응용 기술의 도입에 미치는 영향 요인에 관한 연구)

  • Park, Cha-Gil;Yi, Seon-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.1018-1029
    • /
    • 2008
  • Recently, RFID(Radio Frequency Identification) application technology is the core of ubiquitous technology. this research examines the factors for adopting the RFID application technology together with factors for adopting the related information system such as ERP, SCM, EDI by researching relevant literature. this research attempts to derive the factors for adopting RFID application technology by using the Delphi Method. The factors for adopting the information technology of the above-mentioned three areas totaled 116 adoption factors. Based on these 116 adoption factors, the factors for adopting RFID application technology were to be derived. A total of 27 adoption factors were derived in the first Delphi investigation. Of the total 27 adoption factors, final 9 adoption factors could be derived by conducting frequency analysis and relative importance analysis. In other words, 9 adoption factors that were derived last were found to be the cost related to tag, relationship with customer firms, compatibility of technology, information technology-based structure, trust and coordination between business firms, intensity of competition within the industry, the standardization of RFID technology, the top management's support and participation degree of client companies. When business firms try to adopt RFID application technology afterwards, concrete and close examination from this point of view was found to be necessary.

Implementation of an operation module for an integrated network management system of ship-based and offshore plants (해양플랜트 및 선박의 네트워크 통합 관리 시스템 운용 모듈 개발)

  • Kang, Nam-Seon;Lee, Seon-Ho;Lee, Beom-Seok;Kim, Yong-Dae
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.7
    • /
    • pp.613-621
    • /
    • 2016
  • This research connected network equipment, including CCTV, PAGA, IP-PBX, and Legacy, in order to enable the operation and configuration of internal IP-based network equipment in maritime plants and vessels, both in the field and from remote places, and to allow for the support of remotely controlling such equipment. It also realized an operating program for the integrated network equipment management system to enable the monitoring and control of equipment status, operation condition, and notifications from distant places. By applying the operating program to satellite stations and vessels sailing on the sea, a performance test was conducted to evaluate data loss and transmission/reception delay in the communication section between the land and vessels. As a result, this research verified the normal operation of CCTV control and of real-time monitoring and control of the network equipment, including PAGA, IP-PBX, and Legacy under the FBB and MVSAT environments. It was observed that the transmission of CCTV video images with a large volume of data as well as the transmission and reception of voice data were found to be slightly delayed, indicating the need to develop technology to compress and convert data for real-time transmission and reception.

A Split Synchronizable Mobile Transaction Processing Model for e-Business Applications in Ubiquitous Computing Environment (편재형 컴퓨팅 환경에서의 e-비즈니스 응용을 위한 분할 동기화 이동 트랜잭션 처리 모델)

  • Choi, Mi-Seon;Kim, Young-Kuk
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.783-798
    • /
    • 2004
  • An e-business client application in ubiquitous mobile computing environment may become disconnected from the enterprise server due to broken communication connections caused by the limitation of mobile computing environments(limited battery life of the mobile device, low bandwidth communication, incomplete wireless communication infrastructure, etc). It Is even Possible that mobile client application Intentionally operates in disconnected mode to reduce communication cost and the power consumption of the mobile device. We use “data hoarding” as a means of providing local autonomy to allow transactions to be processed and committed on the mobile host despite of disconnection. The key problem to this approach is the synchronization problem that serialize potentially conflicting updates from disconnected clients on master objects of the server database. In this paper, we present a new transaction synchronizing method that splits a transaction into a set of independent component transactions and give the synchronization priority on each component taking the possibility of use and conflicts in the server into consideration. Synchronization is performed component by component based un synchronization priority. After the Preferred component of a no bile transaction succeeds in synchronization with the server, the mobile transaction can pre-commit at server. A pre-committed transaction's updated value is made visible at server before the final commit of the transaction. The synchronization of the component with low synchronization priority can be delayed in adaption to wireless bandwidth and computing resources. As a result, the availability of important data updated by mobile client is increased and it can maximize the utilization of the limited wireless bandwidth and computing resources.

A Study on the Traditional Culture of Japan in Modern Ubiquitous Society - Interdisciplinary Studies (현대 일본의 유비쿼터스 사회에 나타난 전통 문화에 관한 고찰 - 학제 간 연구)

  • Kim, Yun-Ho
    • Cartoon and Animation Studies
    • /
    • s.27
    • /
    • pp.221-247
    • /
    • 2012
  • In this study, we examined the sense of tradition and cultural traditions which make up Japanese ubiquitous society. These include the traditional elements which affect the lives of contemporary Japanese people. In this research we looked for various media (mobile phones, blog, characters goods, cinema) which appeared in the traditional elements. The results of the study are as follows: The traditional elements which affect contemporary Japanese lives include modern devices such as use of anonymous "blogging", mobile phones "youth culture"(especially by males), and "cute" character vocabulary use (especially by females), while traditional values(yakuza, sumo, human relationships) are represented in Japanese cinema. Through this study, we have found the points where traditional Japanese culture and cultural sense have been reinterpreted and affected both directly and indirectly through modern media. This study contributes to cultural research by delineating the various stimuli to consider for successful content service adoption in a global setting, which can account for differential impacts across regions. The results not only help develop a sophisticated understanding of customer behavior theories for researchers, but they also offer useful knowledge to those involved in promoting culture content to potential purchasers.