• Title/Summary/Keyword: Ubiquitous Computing

Search Result 1,432, Processing Time 0.027 seconds

A 3d Viewing System for Real-time 3d Display General Monitors (범용 모니터에서 실시간 3d 디스플레이가 가능한 입체 뷰잉 시스템 개발)

  • Lee, Sang-Yong;Chin, Seong-Ah
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.13-19
    • /
    • 2012
  • The techniques of 3d image processing have broadly used in the areas including movies, games, performances, exhibitions. In addition, increasing demands for practical uses have gradually extended to the areas of architecture, medicine, nuclear power plant. However, dominant techniques for 3d image processing seem to depend on multi-camera in which two stereo images are merged into one image. Also the pipeline has limitations to provide real-time 3d viewer in ubiquitous computing. It is not able to be applicable onto most general screens as well. In addition, the techniques can be utilized for the real-time 3d game play without a particular monitor or convertor. Hence, the research presented here is to aim at developing an efficient real-time 3d viewer using only mono camera which do not need post processing for editing as well.

Experimental Performance Comparison for Prediction of Red Tide Phenomenon (적조현상의 실험적 예측성능 비교)

  • Heo, Won-Ji;Won, Jae-Kang;Jung, Yong-Gyu
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.1-6
    • /
    • 2012
  • In recent years global climate change of hurricanes and torrential rains are going to significantly, that increase damages to property and human life. The disasters have been several claimed in every field. In future, climate changes blowing are keen to strike released to the world like in several movies. Reducing the damage of long-term weather phenomena are emerging with predicting changes in weather. In this study, it is shown how to predict the red tide phenomenon with multiple linear regression analysis and artificial neural network techniques. The red tide phenomenon causing risk could be reduced by filtering sensor data which are transmitted and forecasted in real time. It could be ubiquitous driven custom marine information service system, and forecasting techniques to use throughout the meteorological disasters to minimize damage.

Cross-layer Design and its Performance Evaluation of Joint Routing and Scheduling for Maximizing Network Capacity of Wireless Mesh Networks (무선 메쉬 네트워크의 최대 전송 성능을 위한 라우팅과 스케쥴링의 계층 교차적 설계 및 성능 분석)

  • Min, Seokhong;Kim, Byungchul;Lee, Jaeyong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.30-45
    • /
    • 2014
  • Recently, multimedia application users who demand for ubiquitous computing environment are rapidly increasing, and wireless mesh network is receiving attention as a cost-effective key technology for next generation wireless networking. When multiple flows are transmitting data at the same time in the network, routing for path selection of each flow and link resource allocation for data transmission of each flow are one of the key factors that influence to the effectiveness of the network directly. In this paper, we consider problems for path discovery and resource allocation of links at the same time and we propose an algorithm based on mathematical modeling using a technique for cross-layer optimization design in STDMA-based wireless mesh networks that can enhance transfer performance for each flow. We show by performance analysis that the proposed algorithm can enhance the throughput performance by maximally utilizing given bandwidth resources when the number of flows increase in multi-hop wireless mesh networks.

Method to Reduce the Time when Identifying RFID Tag by using Computational Grid (계산 그리드를 이용한 대량의 RFID 태그 판별 시간 단축 방법)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.547-554
    • /
    • 2010
  • RFID is core technology to lead ubiquitous computing, and attract the notice of the world. It also improves social transparency, creates employment, and invigorates the allied industries. However, The technical characteristic with RFID has some problems with security and privacy. The commercialization of RFID is delayed due to these problems. This paper introduces the technical method to find solutions about an invasion of privacy to be due to introduce RFID system. First, this method applies Hash-Chain proposed by M. Ohkubo and some other researchers. The more tags increase, the more it demands lots of computation time. We divide SPs equally to solve these problems. And then, We'll suggest solutions to shorten the identification time of tag by implementing SPs with multi nodes of Grid environment at the same time. This makes it possible to keep the privacy protection of RFID tag, and process RFID tag in real time at the same time.

Implementation for Baby Care System Using ARM11 (ARM11 기반의 Baby Care System Platform 구현)

  • Shin, Hyo-Seob;Lee, Kwang-Hyun;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.719-724
    • /
    • 2011
  • Most recent birth rate at home raising children, only one has come out well. Accordingly, children born to parents is to have a strong interest, and healthcare (Healthcare) sector, while emerging as a new growth industry (Baby Care) Baby Care also increased the interest. Baby Care products until now the food, toiletries and clothing, etc. Although it advances the development of ubiquitous computing environment with the development of the healthcare industry, Baby Care Electronics products have been developed. Europe and the U.S. infant from another room deungeseoneun feeder. At this time SIDS infants to prevent this phenomenon often takes place in order to measure the status of children and away from parents to children, also can check the status of children was used to implement the Platform. In this paper, using the radio frequency real-time observation of data storage without the parents were determined only by the speed of the ARM11-based systems using the S3C6410 CPU and wireless WI-FI (IEEE8.2.11) technology to prevent sudden infant death using Platform for the implementation study was conducted.

A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini (악의적 지니 프록시로부터 비밀 정보 보호를 위한 암호학적 모델)

  • Yang Jong-Phil;Rhee Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.27-34
    • /
    • 2006
  • In the near future, people will wish to access many kinds of heterogeneous networks to use their services anytime and anywhere. Owing to the heterogeneity of networks, there must be many kinds of protocols to guarantee secure services. The mobile device can depend in a middleware for accessing services in the heterogeneous networks and the middleware helps the mobile device to communicate with services without blowing concrete protocols. If a secure channel is necessary, the middleware may access a private key in the mobile device to perform a security protocol. In this paper, we focus on the security of a private key in the mobile device against malicious middlewares. To do so, we introduce two models for a user to protect his/her private key against malicious middlewares by generating authentication data(e.g., digital signatures) without keeping the private key in the mobile device.

Fair EPC System (사용자 프라이버시 보호 및 추적이 가능한 EPC 시스템)

  • Kwak Jin;Oh Soohyun;Rhee Keunwoo;Kim Seungjoo;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1C
    • /
    • pp.116-128
    • /
    • 2005
  • The low-cost REID system is expected to be widely used in the ubiquitous computing environment as an intelligent device. Although REID systems have several advantages, they may create new threats to users' privacy. In this paper, a traceable and unlinkable REID system called 'Fair EPC system' is proposed for low-cost RFID tags. The proposed system enables the protection of users' privacy from unwanted scanning, and it is traceable to the tag by authorized administrators when necessary. The proposed system has some advantages; (1) eliminating any danger of exposing users' information via tag tracking through the cooperation between readers or back-end databases, (2) enabling the tracking of real serial number of the tag only through the cooperation of authorized administrators using a cryptographic secret sharing scheme, and (3) providing the efficiency of the proposed system reduce the computational workloads of back-end databases.

Secure Sharing and Recovering Scheme of e-Business Data Based on Weight Table (가중치 테이블 기반 안전한 e-비즈니스 데이터 분할 복원 방식)

  • Song, You-Jin;Kim, Jin-Seog
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.27-36
    • /
    • 2009
  • The leaking of personal information is mostly occurred by internal users. The confidential information such as credit card number can be disclosed or modified by system manager easily. The secure storaging and managing scheme for sensitive data of individual and enterprise is required for distributed data management. The manager owning private data is needed to have a weight which is a right to disclose a private data. For deciding a weight, it is required that system is able to designate the level of user's right. In this paper, we propose the new algorithm named digit-independent algorithm. And we propose a new data management scheme of gathering and processing the data based on digit-independent algorithm. Our sharing and recovering scheme have the efficient computation operation for managing a large quantity of data using weight table. The proposed scheme is able to use for secure e-business data management and storage in ubiquitous computing environment.

Mobile Context Based User Behavior Pattern Inference and Restaurant Recommendation Model (모바일 컨텍스트 기반 사용자 행동패턴 추론과 음식점 추천 모델)

  • Ahn, Byung-Ik;Jung, Ku-Imm;Choi, Hae-Lim
    • Journal of Digital Contents Society
    • /
    • v.18 no.3
    • /
    • pp.535-542
    • /
    • 2017
  • The ubiquitous computing made it happen to easily take cognizance of context, which includes user's location, status, behavior patterns and surrounding places. And it allows providing the catered service, designed to improve the quality and the interaction between the provider and its customers. The personalized recommendation service needs to obtain logical reasoning to interpret the context information based on user's interests. We researched a model that connects to the practical value to users for their daily life; information about restaurants, based on several mobile contexts that conveys the weather, time, day and location information. We also have made various approaches including the accurate rating data review, the equation of Naïve Bayes to infer user's behavior-patterns, and the recommendable places pre-selected by preference predictive algorithm. This paper joins a vibrant conversation to demonstrate the excellence of this approach that may prevail other previous rating method systems.

Design and Implementation of a 3D Pointing Device using Inertial Navigation System (관성항법시스템을 이용한 3D 포인팅 디바이스의 설계 및 구현)

  • Kim, Hong-Sop;Yim, Geo-Su;Han, Man-Hyung;Lee, Keum-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.83-92
    • /
    • 2007
  • In this paper, we present a design and implementation of three dimensional pointing device using Inertial Navigation System(INS) that acquires coordinates and location information without environmental dependancy. The INS measures coordinates based on the data from gyroscope and accelerometer and corrects the measured data from accelerometer using Kalman-Filter. In order to implement the idea of three dimensional pointing device, we choose a three dimensional Space-recognition mouse and use RFIC wireless communication to send a measured data to receiver for printing out the coordinate on display equipment. Based on INS and Kalman-Filter theoretical knowledge, we design and implement a three dimensional pointing device and verified the usability as an input device that can capture a human's move. also, we describe the applicability of this device in ubiquitous computing environment.

  • PDF