• Title/Summary/Keyword: Ubiquitous Computing Environments

Search Result 260, Processing Time 0.027 seconds

A Model Driven Architecture and Product Line Engineering Technique for Adaptable Contents Service of Ubiquitous Computing : Applying to Vessel U-Safety Monitoring (유비쿼터스 환경에서 적응적 컨텐츠 서비스를 위한 모델기반 아키텍처와 프로덕트라인 기법 : 선발 U-안전모니터링 시스템응용)

  • Lee, Seo-Jeong;Choi, Mi-Sook
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.32 no.4
    • /
    • pp.611-617
    • /
    • 2008
  • In ubiquitous environments, the content adaptable services can be dynamically provided to adapt the frequent changes of contexts. These services have common things that the kinds of context factors are limited to ubiquitous environment, though the contexts are flexible. To reuse service architecture can be reasonable for effective adaptable service. In this paper, we design a software architecture with product line techniques for content adaptable applications in ubiquitous environment. Description of product line is to define variation points and their variants, to find out the dependencies between them and to keep the model based architecture, their alternatives.

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

The Framework to Support a Common Way for Context-aware Applications

  • Baek, Jong-Kwun;Jung, Hae-Sun;Jeong, Chang-Sung
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.279-282
    • /
    • 2007
  • In this paper, we introduce the general way for producing context information to support context-aware applications. It can fetch raw data from the service environments, translate it to reasonable context information, and provide to multiple applications. It is designed originally for the ubiquitous computing middleware and based on the ontology processing model. Automated service applications can use this system as the form of libraries or of web services for deciding its semantic cause of action.

  • PDF

Toward A Totally Solving Interference Problem for Ultrasound Localization System (초음파 위치인지 시스템의 간섭 문제의 해결을 위한 연구)

  • Song, Byung-Hun;Ham, Kyung-Sun;Lee, Hyung-Su
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.177-178
    • /
    • 2006
  • The real-time tracking system is an essential factor for the development of low cost sensor networks for use in pervasive computing and ubiquitous networking. In this paper, we address the interference problems of the sensor network platform with ultrasonic for location tracking system. Ubiquitous indoor environments often contain substantial amounts of metal and other such reflective materials that affect the propagation of radio frequency signals in non-trivial ways, causing severe multi-path effects, dead-spots, noise, and interference. Especially we present a novel reducing interference location system that is particularly well suited to support context-aware computing. The system called Pharos, aims to combine the advantages of real-time tracking systems that implement distributed environment with regardless of infrastructure or infrastructure-less wireless sensor networks.

  • PDF

Toward Socially Agreeable Aggregate Functions for Group Recommender Systems (Group Recommender System을 위한 구성원 합의 도출 함수에 관한 연구)

  • Ok, Chang-Soo;Lee, Seok-Cheon;Jeong, Byung-Ho
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.4
    • /
    • pp.61-75
    • /
    • 2007
  • In ubiquitous computing, shared environments are required to adapt to people intelligently. Based on information about user preferences, the shared environments should be adjusted so that all users in a group are satisfied as possible. Although many group recommender systems have been proposed to obtain this purpose, they only consider average and misery. However, a broad range of philosophical approaches suggest that high inequality reduces social agreeability, and consequently causes users' dissatisfactions. In this paper, we propose social welfare functions, which consider inequalities in users' preferences, as alternative aggregation functions to achieve a social agreeability. Using an example in a previous work[7], we demonstrate the effectiveness of proposed welfare functions as socially agreeable aggregate functions in group recommender systems.

A Calm GIS: Smart Mobile Applications

  • Lee, Eun-Kyu;Kim, Mi-Jeong;Oh, Byoung-Woo;Jang, Byung-Tae
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.631-633
    • /
    • 2003
  • Invisible networks have hidden bits flows from human being and become the periphery in the Internet overload; technologies become invisible and everywhere computing. The appearance of the calm environment requires a new relationship between human being and machines and geographic features: a paradigm shift. However no one says what next steps to those environments on details are, a reason why lots of people focus on the endeavors. In this paper, we touch the geographic features on ubiquitous environments and research the transition step of GIS mobile applications in order to achieve a natural integration of connectivity, capability and functionality.

  • PDF

3D Simulation of Environmental Conflict Resolution in Intelligent Environments

  • Lee, Jae-Wook
    • Architectural research
    • /
    • v.14 no.1
    • /
    • pp.3-9
    • /
    • 2012
  • Owing to the advent of ubiquitous computing technologies, the concept of Intelligent Environments has emerged, as an alternative approach to overcome the limitation of the built environment. Intelligent Environments can be more responsive to user-and context-specific human activities by automatically and dynamically modifying their settings without explicit human intervention. However, the conventional approach to the development of Intelligent Environments has mainly focused on the technical issues without paying much attention to the dynamic interrelationship between the user and the built environment. Therefore, differing or conflicting needs of multiple simultaneous users remain unresolved. The objective of this study is to present types of environmental conflicts and their resolution through agent collaboration and negotiation. For the demonstration and validation of the conflict resolution process, a set of hypothetical test cases is simulated in a 3D test environment. The result of the case simulations shows that the proposed approach is computationally feasible and applicable to the development of Intelligent Environments, and, furthermore, it can overcome the drawback of the conventional approach.

Design and Implementation of Scalable ID Federation System in Mobile Computing Environments (모바일 컴퓨팅 환경에서 확장 가능한 ID 연동 시스템 설계 및 구현)

  • Ryoo, In-Tae;Kim, Bae-Hyun;Moon, Young-Jun;Cho, Yeong-Sub;Jin, Seung-Hun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.155-166
    • /
    • 2005
  • Currently, almost of all the Internet users have as many IDs as the number of sites they have subscribed for, The users should memorize and input every independent ID and password whenever they want to login to the system. Although ID management system is used to solve this problem, 10 and password management will become more complicated in the forthcoming ubiquitous computing environments because so many computers will be interconnected on various kinds of wired and wireless networks, Furthermore, it is not enough to use the existing single Circle of Trust (COT) ID management system for the forthcoming computing environments. To solve this problem, the paper proposes ID federation models in multiple COT domain and implements an ID federation system that can be scaled to mobile computing environment as well as wired computing environment. The proposed ID federation models has been verified to operate with no problem between the systems in different trust domains by doing the ID scaability test.

  • PDF

A Design and Implementation of A Robot Client Middleware for Network-based Intelligent Robot based on Service-Oriented (지능형 네트워크 로봇을 위한 서비스 지향적인 로봇 클라이언트 미들웨어 설계와 구현)

  • Kwak, Dong-Gyu;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.1-8
    • /
    • 2012
  • Network-based intelligent robot is connected with network system, provides interactions with humans, and carries out its own roles on ubiquitous computing environments. URC (Ubiquitous Robot Companion) robot has been proposed to develop network-based robot by applying distributed computing techniques. On URC robot, it is possible to save the computing power of robot client by environments, has been proposed to develop robot software using service-oriented architecture on server-client computing environments. The SOMAR client robot consists of two layers - device service layer and robot service layer. The device service controls physical devices, and the robot service abstracts robot's services, which are newly defined and generated by combining many device services. RSEL (Robot Service Executing Language) is defined in this paper to represent relations and connections between device services and robot services. A RESL document, including robot services by combining several device services, is translated to a programming language for robot client system using RSEL translator, then the translated source program is compiled and uploaded to robot client system with RPC (Remote Procedure Call) command. A SOMAR client system is easy to be applied to embedded systems of host/target architecture. Moreover it is possible to produce a light-weight URC client robot by reducing workload of RSEL processing engine.

Certificate Management System of MANET for Stable Ubiquitous Service (안전한 유비쿼터스 서비스를 위한 MANET의 인증서 관리 시스템에 관한 연구)

  • Oh Suk-Sim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1558-1564
    • /
    • 2006
  • This study addressed security requirements for ad-hoc network environments, which lies at the hour of the ubiquitous computing revolution and proposed a partially-distributed certificate management system that can ensure security in mobile ad-hoc networks. The proposed model is characterized by ie ability to handle dynamic mobility of nodes, minimize routing load and enhance expandability of network by allowing participating nodes to authenticate each other without being interrupted by joining the cluster. The security, efficiency and robustness of the proposed model were evaluated through simulation.