• Title/Summary/Keyword: Ubiquitous Environments

Search Result 574, Processing Time 0.029 seconds

Towards a Ubiquitous Robotic Companion: Design and Implementation of Ubiquitous Robotic Service Framework

  • Ha, Young-Guk;Sohn, Joo-Chan;Cho, Young-Jo;Yoon, Hyun-Soo
    • ETRI Journal
    • /
    • v.27 no.6
    • /
    • pp.666-676
    • /
    • 2005
  • In recent years, motivated by the emergence of ubiquitous computing technologies, a new class of networked robots, ubiquitous robots, has been introduced. The Ubiquitous Robotic Companion (URC) is our conceptual vision of ubiquitous service robots that provide users with the services they need, anytime and anywhere in ubiquitous computing environments. To realize the vision of URC, one of the essential requirements for robotic systems is to support ubiquity of services: that is, a robot service must be always available even though there are changes in the service environments. Specifically robotic systems need to be automatically interoperable with sensors and devices in current service environments, rather than statically preprogrammed for them. In this paper, the design and implementation of a semantic-based ubiquitous robotic space (SemanticURS) is presented. SemanticURS enables automated integration of networked robots into ubiquitous computing environments exploiting Semantic Web Services and AI-based planning technologies.

  • PDF

Analyses of Wireless Network Security in Heterogeneous Environments (이종 시스템 환경하에서의 무선 네트워크의 보안 대책)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.717-720
    • /
    • 2007
  • With the convergence of mobile devices and the Internet ubiquitous computing promises to revolutionalize the way that we access services and run application. However, ubiquitous computing environments, in particular, mobile and wireless environments interfaced with the Internet, currently possess security vulnerabilities that are ripe for attack from cyber-threats. Thus, this paper discusses the Limitation of current security mechanisms in ubiquitous computing environments

  • PDF

Role-Based Application Model for Supporting Spontaneous Interoperation in Ubiquitous Environments (유비쿼터스 환경에서 자발적 상호연동을 지원하는 역할 기반 응용 모델)

  • Jung, Jong-Yun;Ryu, Ki-Yeol;Lee, Jung-Tae
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.269-285
    • /
    • 2012
  • The spontaneous interoperation is an important characteristic of ubiquitous applications and is closely related with mobility. The mobile components in ubiquitous environments are liable to appear in and disappear from one physical space to another. Because this characteristic certainly influences the structure and behavior of applications, they should adapt themselves to the changed environments by configuring their structure and behaviors. Consequently, developers are faced with the above challenging issue when they design and implement ubiquitous applications. The role concept is an efficient tool to model participant entities, their relationship, and collaboration, so role-based model are appropriate to describe a structure and behavior of software system. But, little attention has been given to reflect characteristics of ubiquitous applications. To tackle the problem, this study considers a ubiquitous application as a software organization which consists of software components and proposes an enhanced role-based application model for supporting spontaneous interoperation.

A Taxonomy of Agent Technologies for Ubiquitous Computing Environments

  • Zhang, Daqiang;Wan, Jiafu;Liu, Qiang;Guan, Xin;Liang, Xuedong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.547-565
    • /
    • 2012
  • The design, development and deployment of Mobile Agent (MA) systems for high-level inference and surveillance in wireless sensor networks and RFID systems have drawn increasing attention in the past decade. To answer how the state-of-the-art of MA in a wide range of ubiquitous and sensor environments is, this paper investigates the current progress of MA. It proposes a taxonomy, by which MA systems in ubiquitous computing environments are decomposed and discussed. Then, this paper provides insights into the strengths and weaknesses of existing efforts. Finally, it presents a series of solutions from the viewpoint of various roles of MA in ubiquitous environments and situations.

A Modeling of Ubiquitous Environments Reflecting User's Behaviors in the House (주택 내에서의 사용자 행위 분석을 이용한 유비쿼터스 환경 구축 - 거실공간을 중심으로 -)

  • Lee, Dong-Hwa;Park, Sung-Jun;Lee, Hyun-Soo
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2005.11a
    • /
    • pp.63-66
    • /
    • 2005
  • The purpose of this study is to suggest the modeling of ubiquitous environments according to the analysis of user's behaviors focused on the living area within the house. Recently, with appearing 'Ubiquitous environments', the applications of ubiquitous technologies on the our environment adopt a new paradigm. This new paradigm leads to the possibility of creating more intellectual dwelling environment according to user's behaviors. This paper suggests to change our dwelling by considering both engineering technology and the character of dwelling, because the house should provide causes humans with comfortability. Therefore, we need to understand user's behaviors in the dwelling, towards user friendly environment. Also, it very important for us to configure proper sensors and technologies by the priority based on user's behaviors. To sum up, this study is aimed to analyze user's behaviors and then, to suggest the guideline for users offering optimal ubiquitous environments.

  • PDF

Monitoring Systems for Embedded Equipment in Ubiquitous Environments

  • Bae, Ji-Hye;Kang, Hee-Kuk;Park, Yoon-Young;Park, Jung-Ho
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.58-65
    • /
    • 2006
  • Accurate and efficient monitoring of dynamically changing environments is one of the most important requirements for ubiquitous network environments. Ubiquitous computing provides intelligent environments which are aware of spatial conditions and can provide timely and useful information to users or devices. Also, the growth of embedded systems and wireless communication technology has made it possible for sensor network environments to develop on a large scale and at low-cost. In this paper, we present the design and implementation of a monitoring system that collects, analyzes, and controls the status information of each sensor, following sensor data extracted from each sensor node. The monitoring system adopts Web technology for the implementation of a simple but efficient user interface that allows an operator to visualize any of the processes, elements, or related information in a convenient graphic form.

Effective Recommendation Method Adaptive to Multiple Contexts in Ubiquitous Environments (유비쿼터스 환경에서 다중 상황 적응적인 효과적인 권유 기법)

  • Kwon Joon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.5
    • /
    • pp.1-8
    • /
    • 2006
  • In ubiquitous environments, recommendation service based on multiple contexts is required. The total amount of information is larger due to the greater number of contexts in multiple context environments. This paper proposes a new effective recommendation method adaptive to multiple contexts in ubiquitous environments. A new method of recommendations in multiple context environments is suggested that uses user's preferences and behavior as a weighting factor. This paper describes the recommendation method, scenario and the experimental results. The results verify that the proposed method's recommendation performance is better than other existing method.

  • PDF

A Study on Organizational Structure and Computer Security Systems in Ubiquitous Environments (유비쿼터스 서비스 경영 환경에서 조직 구조 및 컴퓨터 보안 시스템에 관한 연구 - 외식 업체 적용 방안을 중심으로 -)

  • Yi, Myoung-Hee;Yu, Jae-Eon;Jung, Chang-Duk
    • Culinary science and hospitality research
    • /
    • v.13 no.4
    • /
    • pp.305-316
    • /
    • 2007
  • This paper examines that a desirable organizational structure for a security policy in ubiquitous environments that are based on users' need to know and do their tasks in organizations. Tasks are a common entity which already exit and relate directly to both users(who are assigned to tasks and to information required for the completion of a task). Ubiquitous is highlighted as IT paradigm of the future generation. We propose a security model, called the Ubiquitous Group Security Model(UGSM), which associates with a task of processing the information which users need to know. The access type specification restricts the operations that users are permitted to perform, as defined by users' need to do for achieving their tasks in organizations.

  • PDF

Implementation of Context aware Learning System by Designing Ubiquitous Learning Space and OWL Context Model (유비쿼터스 학습공간과 OWL 상황 모델 설계를 통한 상황 인식 학습 시스템 구현)

  • Hong, Myoung-Woo;Lee, Young-Whan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.99-109
    • /
    • 2011
  • Ubiquitous computing technology makes an impact on the appearance of u-learning and presents an advanced direction of futuristic school education. In ubiquitous learning environments, various embedded computational devices will be pervasive and interoperable across the network for supporting the learning, so users may utilize these devices anytime anywhere. An important next step for ubiquitous learning is the introduction of context-aware learning service that employing knowledge and reasoning to understand the local context and share this information in support of intelligent learning services. However, the existing studies on design and application of ontology context model to support context-aware service in actual school environments are incomplete state. This paper, therefore, suggests a scheme of constructing ubiquitous learning space for existing school network by introducing USN to support context-aware ubiquitous learning services. This paper, also, designs an ontology based context model for ubiquitous school environments which describes context information through OWL. To determine the suitability of proposed ubiquitous learning space and ontology context model, we implement some of context-aware learning services in the ubiquitous learning environments.

Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments

  • Zheng He;Kwak Jin;Son Kyung-Ho;Lee Wan-Suk;Kim Seung-Joo;Won Dong-Ho
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.329-333
    • /
    • 2006
  • New computing paradigm in ubiquitous computing environments is revolutionizing the way people interact with computers, services and the surrounding physical spaces. In order to provide stronger authentication, MIST proposed an authentication framework for ubiquitous computing environments and assigned confidence values to some authentication methods to facility the combining. However, the assigned confidence values lack sufficient evidence. In this paper reliable confidence values for each authentication method used in MIST is proposed. These confidence values can combine multiple confidence values in some manner, producing a more accurate net confidence value. Authentication entities with confidence values allows the authentication framework to blond nicely into ubiquitous computing environments.

  • PDF