• Title/Summary/Keyword: Ubiquitous Computing Environments

Search Result 260, Processing Time 0.026 seconds

An Empirical Analysis on the u-Business's Environments and Conditions in the Ubiquitous Era (유비쿼터스 시대의 비즈니스 인식에 대한 실증분석)

  • Lee, Chan-Do;Jian, Jiao
    • International Commerce and Information Review
    • /
    • v.7 no.4
    • /
    • pp.37-57
    • /
    • 2005
  • The business in the Ubiquitous era has to be developed by combing a traditional marketing concept with a new concept system on Chip. The objective of this paper is researching on the attention or interest, understanding, positive effects, etc., for Ubiquitous Computing to realize u-Korea and u-Business. The paper result which is the stepwise developing scheme of u-Business could be useful in the policy, publicity and education, strategic implementation of the Ubiquitous Computing. And the proposed new services for u-Commerce can be applied to new business model of future IT industry. Actually, the awareness and understanding about Ubiquitous are low, But, We can't overemphasize the value of Ubiquitous. First of all, The publicity and education about It's may have to be emphasized.

  • PDF

Effective Recommendation Method Adaptive to Multiple Contexts in Ubiquitous Environments (유비쿼터스 환경에서 다중 상황 적응적인 효과적인 권유 기법)

  • Kwon Joon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.5
    • /
    • pp.1-8
    • /
    • 2006
  • In ubiquitous environments, recommendation service based on multiple contexts is required. The total amount of information is larger due to the greater number of contexts in multiple context environments. This paper proposes a new effective recommendation method adaptive to multiple contexts in ubiquitous environments. A new method of recommendations in multiple context environments is suggested that uses user's preferences and behavior as a weighting factor. This paper describes the recommendation method, scenario and the experimental results. The results verify that the proposed method's recommendation performance is better than other existing method.

  • PDF

Context aware Modeling and Services Implementation With Event Driven in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 Event Driven 상황정보 모델링 및 서비스 구현)

  • Kim, Hyoung-Sun;Kim, Hyun;Moon, Ae-Kyung;Cho, Jun-Myun;Hong, Chung-Sung
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.13-24
    • /
    • 2006
  • Context aware computing is an emerging paradigm to achieve ubiquitous computing environments by enabling computer systems to understand their situational contexts. A context aware system uses context to provide relevant information and services to the user depending on the user's task. In this paper, we propose an ontology based context aware modeling methodology that transmits low level contexts acquired by directly accessing various sensors in the physical environments to high level contexts. With these high level contexts, context aware application can provides proactive and intelligent services using ECA (Event Condition Action) rules. We implemented a presentation service in smart office environment.

  • PDF

A Qualitative Research on the Structure and Determinants of Personal Device Network in the Ubiquitous Computing Context (유비쿼터스 컴퓨팅 환경에서 PDN의 구조와 결정 요인에 대한 정성적 연구)

  • Jeon Seok-Won;Jang Youn-Sun;Kim Jin-Woo
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.3
    • /
    • pp.1-28
    • /
    • 2006
  • In the ubiquitous computing environments. people usually carry multiple information technology devices with them. Personal device network (PDN) refers to the way how people connect multiple IT devices for their personal as well as professional purposes. Even though it has been Quite popular to construct the PDN in ubiquitous computing context, not much research has been conducted on how people actually connected multiple devices and what influences their methods of connection. In this paper we conducted a content analysis on community bulletin boards of IT devices and a contextual inquiry with expert users of PDN for investigating the configurations with which users connect multiple IT devices. Base on the results of two related studies, we identified three major types of PDN configurations, and key factors that influence the configurations of PDN. We conclude this research with guidelines to design a set of devices for each of the three configuration types.

  • PDF

Probability-annotated Ontology Model for Context Awareness in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 상황 인식을 위한 확률 확장 온톨로지 모델)

  • Jung, Heon-Man;Lee, Jung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.239-248
    • /
    • 2006
  • Current context-aware applications In ubiquitous computing environments make the assumption that the context they are dealing with is correct. However, in reality, both sensed and interpreted context informations are often uncertain or imperfect. In this paper, we propose a probability extension model to ontology-based model for rep resenting uncertain contexts and use Bayesian networks to resolve about uncertainty of context informations. The proposed model can support the development and operation of various context-aware services, which are required in the ubiquitous computing environment.

  • PDF

Employing SNMP to Manage Ubiquitous Environments

  • Murtaza Syed Shariyar;Amin Syed Obaid;Hong Choong Seon;Choi Sang Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.196-198
    • /
    • 2005
  • The vision of ubiquitous computing is becoming a reality now .Service discovery in ubiquitous environment, as well as adding semantics to the data is quite established. But, not many researchers have thought about the management of these devices. We envisage that by integrating SNMP with service discovery protocols, we could leverage the use of management factors (like performance, fault and security management etc) in the business, organizations, and other multi-user environments.

  • PDF

Server-Aided Delegation in Ubiquitous Computing Environment

  • Shim Mi Sun;Yang Jong-Phil;Rhee Kyung Hyune
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.52-56
    • /
    • 2004
  • Computing today is becoming ubiquitous. In such ubiquitous computing environments, entities expect to access resources and services at any time from anywhere. Therefore, the question rises of how to establish trust relationship in previously unknown devices or resources with such environment. After reviewing a model to delegate trust to communicating entities in ubiquitous environment and its security problems, we present a new model for secure delegation over communication entities. We adopt two-party signature scheme as cryptographic primitives. Additionally, we apply threshold cryptosystems to our model for more secure enhancement.

  • PDF

Analysis of Trend in Dynamic Service Composition Technology for Context-Aware Computing Environments (상황인식 컴퓨팅 환경에서 동적 서비스 컴포지션 기술 동향 분석)

  • Shin, Dong-Cheon;Jang, Hyo-Sun
    • Journal of Information Technology Services
    • /
    • v.9 no.3
    • /
    • pp.163-178
    • /
    • 2010
  • A service composition has received much interest to provide users with the ad-hoc, seamless, and context-sensitive services dynamically composed from various networked services in context-aware computing environments. In this paper, with the purpose of guiding trends in the researches for dynamic service composition technologies, we investigate and analyze the major related works. For this, we separate semantic based composition from syntax based composition and then establish the comparison criteria by dividing the service composition processes into 3 steps:definition, construction, and execution.

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.