• Title/Summary/Keyword: Ubiquitous Computing Environments

Search Result 260, Processing Time 0.03 seconds

Multiple Object Recognize Algorithm using Ultrasound Overlap Analysis for the Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서 초음파 중첩 분석을 이용한 다중 객체 식별 알고리즘)

  • Seong, dong-ook;Park, jun-ho;Lee, Ji-hee;Bao, weiwei;Kang, gwang-goo;Jang, yong-jin;Lim, jong-tae;Yoo, jae-soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.16-18
    • /
    • 2010
  • 유비쿼터스 컴퓨팅 환경에서 다양한 위치 기반 서비스(LBS)를 위해 객체 식별은 필수적인 기술이다. 객체 식별을 위해서 영상 분석 식별, 무선 신호(RF: Radio Frequency) 식별, MIT Cricket 시스템의 RF 신호와 초음파를 활용한 객체 식별 등의 시스템들이 제안되었다. 그 중 가장 널리 이용되는 Cricket 시스템은 RF 신호에 객체의 식별 정보를 포함시켜 초음파 신호와 동시에 송신하고, 수신단에서 RF 신호의 정보를 통해 객체를 식별하는 방식을 이용한다. 하지만 유비쿼터스 컴퓨팅 환경에서 이용되는 단말 노드의 소형의 특성을 유지하기위해 다수의 장치 모듈을 내장하기 힘들다. 본 논문에서는 신호의 정확도가 높은 초음파를 활용하여 RF 통신모듈 없이 신호 중첩 분석으로 통해 다중 객체를 인식하기 위한 기술을 제안한다. 본 논문에서 제안하는 알고리즘의 가능성을 시뮬레이션을 통해 입증하였다.

  • PDF

An Efficient Publish/Subscribe Scheme for Supporting Context-aware Interactions in Ad-hoc Ubiquitous Computing Environments (애드혹 유비쿼터스 컴퓨팅 환경에서의 컨텍스트 인지 기반 상호작용 지원을 위한 효율적인 Publish/Subscribe 기법)

  • Moon, Sang-Chul;Lee, Kyung-Min;Lee, Dong-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.723-727
    • /
    • 2006
  • 애드혹 유비쿼터스 컴퓨팅 환경에서 상호작용 미들웨어는 컨텍스트의 변화에 따라 애플리케이션간의 상호작용을 재구성할 수 있도록 지원해야 한다. 또한 미들웨어는 컨텍스트 인지 상호작용을 지원하는데 있어 컨텍스트 종류나 애플리케이션들 혹은 환경의 다양성에 따라 컨텍스트 변화에 대한 적응성을 동적으로 변화시킬 수 있도록 기능을 제공해야 한다. 하지만 기존 연구들은 컨텍스트 변화에 대한 적응성을 변화시키는 이러한 요소들에 대해 고려하지 않으며 그로 인해 컨텍스트 변화에 대한 적응 정도를 정적으로 설정함으로써 컨텍스트 인지 상호작용을 지원하는데 있어 경우에 따라 오버헤드가 발생하거나 컨텍스트 변화에 빠르게 대응하지 못한다. 따라서 본 연구는 애드혹 유비쿼터스 컴퓨팅 환경에서 동작하는 Publish/Subscribe 기반의 상호작용 미들웨어에서 이벤트 중계의 정확성과 컨텍스트 변화 적응성간의 관계를 기반으로 다양한 컨텍스트 종류나 사용자, 환경에 따라 이벤트 중계의 정확도를 동적으로 조절하는 기법을 제안한다. 그리고 이를 기반으로 이벤트 중계 정보를 동적으로 재구성하여 컨텍스트에 맞춰 효율적으로 컨텍스트 인지 상호작용을 구성할 수 있는 기법을 제안한다. 비교 분석 결과 기존 연구에 비해 컨텍스트 변화에 대한 적응성에서 더 나은 결과를 보여주었다.

  • PDF

Context Source Selection for Federated Context Management in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서 연합 상황 정보 관리를 위한 상황 정보 제공자 선택 기법)

  • Han, Joo-Yeon;Cho, Ho-Yun;Park, In-Suk;Hyun, Soon-Joo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10c
    • /
    • pp.78-83
    • /
    • 2007
  • 최근 상황정보 관리의 범위가 단일 도메인에서 다중 도메인으로 확장되면서 사용자의 상황정보는 사용자가 위치하고 있는 도메인뿐만 아니라 여러 도메인에 연관되게 되고 그로 인해 제공될 수 있는 유비쿼터스 컴퓨팅 서비스가 점점 다양해졌다. 다중도메인 환경에서 같은 종류의 상황정보는 다수의 로컬 상황정보 관리자에 의해 제공될 수 있기 때문에, 해당 상황정보에 대한 적합한 로컬 상황정보 관리자가 글로벌 상황정보관리자에 의해 선택되어야 한다. 본 논문에서 우리는 하나의 글로벌 상황정보 관리자와 여러개의 로컬 상황정보 관리자로 구성된 연합 구조를 제안하고, 연합 상황정보 처리를 위해 상황정보 제공자 선택 문제에 대해 논하고 선택 방법을 제안한다. 또한 연합 상황정보 관리에서 어떻게 이 선택 방법이 상황추론의 결과를 향상시키는지 보여준다.

  • PDF

Context-Aware Reasoning System for Personalized u-City Services (맞춤형 u-City 서비스 제공을 위한 상황인지 추론 시스템)

  • Lee, Chang-Hun;Kim, Ji-Ho;Song, Oh-Young
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.109-116
    • /
    • 2009
  • Recently, there are many researches to realize context-awareness service that recognizes surrounding environments as context and provide the citizens with pervasive convenience based on ubiquitous computing technology. In the u-City, various sensors collect information as context, and citizens will receive various context-awareness service, making use of their wireless and mobile devices and the infrastructures of the u-City. We designed ontology that is useful to structure information of sensor or device that is linked to networks and use OWL (Web Ontology Language) that can express information of mutual relation and partial situation. And we propose a context-aware reasoning system for personalized u-City services based on collected context information and user's intention.

RFID Tag's Security Level Based RFID Authentication Protocol (전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜)

  • Oh Soo-hyun;kwak Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.593-600
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.

Design and Implementation of Precision Time Synchronization in Wireless Networks Using ZigBee (ZigBee를 이용한 무선 네트워크 환경에서의 정밀 시각 동기 기법 설계 및 구현)

  • Cho, Hyun-Tae;Son, Sang-Hyun;Baek, Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.561-570
    • /
    • 2008
  • Time synchronization is essential for a number of network applications such as high speed communication and parallel/distribution processing systems. As the era of ubiquitous computing is ushered in, the high precise time synchronization in wireless networks have been required in. This paper presents the design ana the implementation of the high precision time synchronization in wireless networks using ZigBee. To achieve high precision requirements, we have tried to analyze and reduce error factors such as the latency and jitters of a protocol stack on wireless environments. In addition, this paper includes some experiments and performance evaluations of our system. The result is that we established for nodes in a network to maintain their elects to within a 50 nanosecond offset from the reference clock.

Improved RFID Authentication Protocol Based on SSG (SSG기반 개선된 RFID 인증 프로토콜)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.311-317
    • /
    • 2011
  • Recently, RFID is substituted for bar codes according to advance in the ubiquitous computing environments, but the RFID system has several problems such as security and privacy because it uses radio frequencies. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Attacker can easily fake the legitimate reader using the collected Tag ID information,such as the any legitimate tag. This paper proposed improved RFID authentication protocol based on SSG. SSG is organized only one LFSR and selection logic. Thus SSG is suitable for implementation of hardware logic in system with extremely limited resources such as RFID tag and it has resistance to known various attacks because of output bit stream for the use as pseudorandom generator. The proposed protocol is secure and effective because it is based on SSG.

Non-Preemptive Fixed Priority Scheduling for Design of Real-Time Embedded Systems (실시간 내장형 시스템의 설계를 위할 비선점형 고정우선순위 스케줄링)

  • Park, Moon-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.2
    • /
    • pp.89-97
    • /
    • 2009
  • Embedded systems widely used in ubiquitous environments usually employ an event-driven programming model instead of thread-based programming model in order to create a more robust system that uses less memory. However, as the software for embedded systems becomes more complex, it becomes hard to program as a single event handler using the event-driven programming model. This paper discusses the implementation of non-preemptive real-time scheduling theory for the design of embedded systems. To this end, we present an efficient schedulability test method for a given non-preemptive task set using a sufficient condition. This paper also shows that the notion of sub-tasks in embedded systems can overcome the problem of low utilization that is a main drawback of non-preemptive scheduling.

A Design and Implementation of Ubiquitous Museum(U-Seum) Using Location Based Service and Augmented Reality (위치기반 서비스 및 증강현실을 이용한 유비쿼터스 박물관(U-Seum)의 설계 및 구현)

  • Lee, Sun-Ho;Lee, Woo-Ski;Kim, Nam-Gi;Chun, Jun-Chul
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.63-71
    • /
    • 2012
  • This paper presents a design and implementation of U-Seum(Ubiquitous Museum) system based on the LBS(Location Based Service) and mobile augmented reality technique. The mobile services under the smart space of the ubiquitous environments have been expanded in the various fields. In this study, we introduce U-Seum which supports tourists in the museum. U-Seum is developed by use of the position tracking technique based on Wi-Fi and mobile augmented reality. The GPS which is widely used in the position tracking has a difficulty to be utilized in the inside of the building because it requires the Line-of-Sight between a sender and a receiver. Therefore, in this paper, we develop a realtime tour-supported service through experience and evaluate the performance of the system in the world famous UNESCO's Hwa-Seong Museum by measuring the distance from the Wi-Fi signal which is suitable to track the position interior of the museum. U-Seum provides various push services such as mobile augmented reality service for explanation of the artifacts of the museum, game services and the statistics information of the tourist when the tourist approach a specific AP. U-Seum is developed in the Haw-Seong Museum by the support of the Swon Haw-Seong Cultural Foundation. With a field test, we prove that the excellence and expandability of the system.

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.