• Title/Summary/Keyword: Ubiquitous Computing Service

Search Result 504, Processing Time 0.034 seconds

Context-Awareness for Ubiquitous Computing System

  • Kang, Dong-Hoon;Ahn, Sang-Chul;Ko, Hee-Dong;Cho, We-Duke;Park, Young-Tack
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2004.11a
    • /
    • pp.158-161
    • /
    • 2004
  • In this paper, we propose a level of contexts such as low level and high level contexts, and its criteria of categorization are the existence of interaction and composite process done by the inference mechanism. When there is no matching high level service for the associated high level context, this context is described as meaningless. If the services cannot be provided with the entities by the system, this situational information is of little consequence. To provide services with the entities, we propose "community computing" architectural concept which provide the high level service to a group of agents in a community, and can be managed by the service scenario

  • PDF

Developing Ubiquitous Computing Service Model for the Waste Management at the Convention Center (유비쿼터스 컴퓨팅 서비스 모델 분석: 전시장 폐기물 관리 서비스 사례)

  • Ryoo, Sung-Yul;Kim, Kyung-Kyu;Chang, Hang-Bae;Lee, Chang-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.312-322
    • /
    • 2009
  • Linking between a virtual space and a physical space, ubiquitous computing is expected to create new business value. So far, however, there is no broadly accepted methodology to develop the services based on ubiquitous computing technology. Hence, this study aims to seek a systematic methodology for developing new services based on the concept of business model and to apply this in the areas of waste management practices. In addition, based on the evaluation of u-business services in waste management domain, killer services were selected, and then linked with the latest ubiquitous computing technologies. The results of this study are to be applicable to an environment friendly ubiquitous service model of u-City.

A Study on the Demand for Ubiquitous Computing Services (유비쿼터스 서비스 수요에 관한 연구)

  • KIm, Ji-Soo;Kim, Jong-Myoung;Lee, Tae-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.103-110
    • /
    • 2007
  • Ubiquitous computing is a vogue word, and its service is very popular in Korea. However, present ubiquitous service(u-Service) is thought to be more oriented to the provider's point of view, not the consumer's. To complement this problem, an online survey was performed for internet users, which consists of 24 single choice questions on six fields such as transportation, healthcare, environment/city-management, culture/education, administration, and industry. 2463 people joined the survey, who were grouped according to their age, resident region, level of education, and sex. Each group's demand for specific field of u-Service was examined. General level of demand was higher in case of the elderly and male than the younger and female for overall u-Service.

  • PDF

An Efficient USR system design and implementation based on the USN (USN을 이용한 효율적인 USR 시스템 설계 및 구현)

  • Jin, Woo-Jeong;Xiao, Huang;Jeong, Dae-Ryeong;Shin, Geuk-Jae;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.451-453
    • /
    • 2010
  • The world is rapidly evolving in the future society is based on intelligence. In such circumstances, USN(Ubiquitous Sensor Network) to implement the future ubiquitous(Ubiquitous) society have been highlighted as a key infrastructure. For realization of Ubiquitous computing(Ubiquitous Computing), The data recognized from each sensors must be collected on real-time and transferred to applied service so that they may be used as data for providing service to users. USN sensor data on the use for using a numerous sensor data provision service, service provider can publish its service in standardized registry for users to search and use the service registry. However, in previous studies using Web services standards WS-Eventing, and UDDI(Universal Description, Discovery, and Integration) as USR(USN Service Registry) for USN Application Service is unnecessary or insufficient. In this paper, data from sensors that provide information to service providers register their services and use the information for service users to explore and views on the registry of the system was designed and implemented.

  • PDF

A Layered Architecture for Robot Automated Services on Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서 로봇 자동화 서비스를 위한 계층적 아키텍처)

  • Choi, Jong-Sun;Choi, Jae-Young;Cho, Yong-Yun
    • The Journal of Korea Robotics Society
    • /
    • v.6 no.4
    • /
    • pp.353-364
    • /
    • 2011
  • In ubiquitous computing environments, users want to receive the robot services regardless of various physical status or devices such as time, place, various sensors, and high-performance servers. Thus, the ubiquitous service robots have to provide users with automated services according to situational information that they properly recognize. Beyond these problems, robot software has to establish a foundation to support the functions with the network infrastructure that are not able to be solved by a single independent resource. On the basis of a robot middleware that is capable of minimizing dependencies among hierarchy structures, the robot software also has to provide execution environment to control the flow of robot application services. In this paper, we propose a layered architecture to provide users with automated services through ubiquitous robots. The proposed architecture is based on CAWL (Context-Aware Workflow Language) and RSEL (Robot Services Execution Language). CAWL easily represents the flow of robot services from user application service levels, and RSEL is able to support the composition and reusability of robot services through abstraction of robot device services. In our experiments, we applied the proposed architecture to an example of "booth guide robot service".

BcN based Ubiquitous Network and Service (BcN기반 유비퀴터스 네트워크 및 서비스)

  • Shin, Yong-Sik;Park, Yong-Gil
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.290-296
    • /
    • 2005
  • In this paper, we describe ubiquitous environments and the trend of convergence that is an evolution path of current telecommunication, and show the concept of broadband convergence network, service feature and evolution path. In order to converge wire and wireless communication, telecommunication and broadcasting, voice and data efficiently, broadband convergence network divides a network into service layer, control layer, transport layer, ubiquitous access and terminal layer. Broadband convergence network will be a network that can provide and control broadband multimedia services with QoS and securityof different and customized level. Then we depict characteristics and types of broadband multimedia service, and describe the characteristic of broadband convergence network. Finally, we show ubiquitous network based on the broadband convergence network to provide ubiquitous service which is a future telecommunication service. We also describe requirements of ubiquitous network such as an intelligent and context based platform, convergence terminals, ubiquitous computing devices, etc., and give various emerging technologies and those applications.

  • PDF

Privacy-Preserving ID-based Service in Anonymity-based Ubiquitous Computing Environment (익명기반 유비쿼터스 환경의 프라이버시 보장 ID기반 서비스)

  • Kim Hak-Joon;Hwang Kyoung-Soon;Lee Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.65-68
    • /
    • 2005
  • Privacy preservation is crucial in ubiquitous computing environment in which lots of privacy- sensitive information can be collected and distributed without appropriate control. The anonymity-based approach is a famous one used for privacy preservation communication, which allows users to use pseudonyms instead of real ID so as not to reveal their identities. This approach is effective in that it can hide the identity of users. However, it makes it difficult to provide ID-based services like buddy service, dangerous area alert, P2P communication in the ubiquitous computing. We proposes a system architecture which enables ID-based services in the ubiquitous computing environment employing anonymity - based privacy - preserving approach.

A Study on the Multidimensional Service Scenario Evaluation Methodology for ITSM Considering Ubiquitous Computing Technology (유비쿼터스 컴퓨팅 기술을 고려한 ITSM구축을 위한 서비스 시나리오 다면평가방법론에 관한 연구)

  • Lee, Sang-Hoon;Kim, Hyung-Jin;Kwon, Oh-Byung
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.2
    • /
    • pp.155-194
    • /
    • 2007
  • Currently, Ubiquitous Computing Technology(UCT)-based service scenarios play an important role in estimating the potential of UCT-based service. The purpose of the study is to propose a multidimensional evaluation(ME) methodology for UCT-based service scenarios regarding their possibilities of realization for the future. Our approach contributes to extend service level management in Information Technology Service Management(ITSM) by evaluating the level of a new service in advance. ME consists of three dimensions: technological evaluations, business-oriented evaluations, and user-oriented evaluations. The three types of evaluations are mutually harmonized to check the overall possibility of realization and validity for certain UCT-based service scenarios. Theoretically, ME is developed to overcome the extant evaluation methods for UCT-based service scenarios, which are limited in the number of evaluation criterions. It is also conceived to cope with the limitation of economical evaluation methods (e.g., technological valuation, estimation of financial outcomes such as ROI, ROA, etc. that are difficult to give meaningful results because most of UCT-based services are not fully realized so far. From the practical perspectives, in addition, our approach can be applied to a variety of scenarios due to its domain-independent approach.

  • PDF

A Design CORBA Security Service for DataBase Security in Ubiquitous Computing (유비쿼터스 환경의 데이터베이스 보안을 위한 CSS 설계)

  • Lee, Dae-Sik;Yun, Dong-Sic;Ahn, Heui-Hak
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.15-22
    • /
    • 2005
  • The spread of Internet and the appear of Downsizing, SI(System Integration) is chaning centralized computing to distributed computing. Also distributed computing is rapidly changing to Ubiquitous computing escape from hard wire connected network. CORBA(Common Object Request Broker Architecture) is a middleware that used for smoothness communication between application program and operation system in a different environment. However distributed computing environment is not safe from the danger, the attack like virus, worm is too intellectual and variety. In this paper, we design a new DB security model and suggest efficiency of it in Ubiquitous environment base on CSS(CORBA Security Service) that present ed from OMG(Object Management Group).

  • PDF

Context-Aware Middleware based on Ontology in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 온톨로지 기반 상황 인식 미들웨어)

  • Jung Heon-Man
    • KSCI Review
    • /
    • v.14 no.1
    • /
    • pp.165-173
    • /
    • 2006
  • To support service based on context-aware in ubiquitous computing environment, there are required context managing, context reasoning and context modeling technologies. In this paper, we propose a hierarchical ontology-based context management model and design a context-aware middleware based on this model for supporting active application adaptability and reflecting users' requirements dynamically in contextual changes. It also provides efficient support for inferencing, interpreting, acquiring and discovering various contexts to build context-aware services and presents a resolution method for context conflict which is occurred in execution of service. The proposed middleware can support the development and operation of various context-aware services, which are required in the ubiquitous computing environment.

  • PDF