• Title/Summary/Keyword: Ubiquitous Environments

Search Result 574, Processing Time 0.023 seconds

A SOA Web Service Implementation for Adapting to Context Changes using Polymorphism (상황정보 적응을 위하여 다형성을 이용한 SOA 웹서비스 구현 방안)

  • Yoon, Hoi-Jin
    • Journal of Internet Computing and Services
    • /
    • v.9 no.5
    • /
    • pp.73-83
    • /
    • 2008
  • This paper proposes an implementation of an orchestration service of web services, which work as context aware applications in Ubiquitous Computing. The proposed method alms to decrease the cost of adapting to the context changes. UC requires the context adaptation more than any other computing environments, and it works based on networks of various heterogeneous platforms. Web services on SOA could be one of the solutions for the requirements. This paper proposes the way how to implement an orchestration service of SOA to handle the context adaptation while keeping the performance high. We develops an implementation model of orchestration services of web services, and the model decreases the number of code lines of the orchestration service. This paper also shows a simple empirical study, and it also analyzes two different method implementing the polymorphism, overloading and overriding.

  • PDF

The High Performance Liquid Chromatography (HPLC) Analysis of Polycyclic Aromatic Hydrocarbons (PAHs) in Oysters from the Intertidal and Subtidal Zones of Chinhae Bay, Korea

  • Lee Ki Seok;Noh Il;Lim Cheol Soo;Chu Su Dong
    • Environmental Sciences Bulletin of The Korean Environmental Sciences Society
    • /
    • v.2 no.1
    • /
    • pp.57-68
    • /
    • 1998
  • Polycyclic aromatic hydrocarbons (PAMs) are ubiquitous contaminants in marine environments. PAMs enter estuarine and nearshore marine environment via several routes such as combustion of fossil fuels, domestic and industrial effluents and oil spills. PAHs have been the focus of numerous studies in the world because they are potentially carcinogenic, mutagenic, and teratogenic to aquatic organisms and humans from consuming contaminated food. However, one can hardly find any available data on PAM content in marine organisms in Korea. The present study was carried out in order to determine PAM content in oysters from the intertidal and subtidal zones of Chinhae Bay, which is located in near urban communities and an industrial complex, and the bay is considered to be a major repositories of PAHs. 16 PAHs were analyzed by High Performance Liquid Chromatography (HPLC) with uv/vis and fluorescence detectors in oysters: they are naphthalene (NPTHL), acenaphthylene (ANCPL), acenaphthylene (ACNPN), fluorene (FLURN), phenanthrene (PHEN), anthracene (ANTHR), fluoranthene (FLRTH), pyrene (PYR), benzo(a)anthracene (BaA), chrysene (CHRY), benzo(b)fluoranthene (BbF), benzo(k)fluoranthene (BkF), benzo(a)pyrene (BaP), dibenz(a,h)anthracene(DahA), benzo(g,h,i)peryne (BghiP) and indeno(1,2,3,-cd)pyrene (I123cdP). The PAM contents in oysters from the intertidal and subtidal zones of Chinhae Bay ranged from < 0.1 to 992.0 ug/kg (mean $69.8\pm9.8$ ug/kg).

  • PDF

Security Analysis of Light-weight Block Cipher mCrypton Suitable for Ubiquitous Computing Environment (유비쿼터스 환경에 적합한 경량 블록암호 mCrypton에 대한 안전성 분석)

  • Lee, Chang-Hoon;Lee, Yu-Seop;Sung, Jae-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.644-652
    • /
    • 2009
  • New communication environments such as USN, WiBro and RFID have been realized nowadays. Thus, in order to ensure security and privacy protection, various light-weight block ciphers, e.g., mCrypton, HIGHT, SEA and PRESENT, have been proposed. The block cipher mCrypton, which is a light-weight version of Crypton, is a 64-bit block cipher with three key size options (64 bits, 96 bits, 128 bits). In this paper we show that 8-round mCrypton with 128-bit key is vulnerable to related-key rectangle attack. It is the first known cryptanalytic result on mCrypton. We first describe how to construct two related-key truncated differentials on which 7-round related-key rectangle distinguisher is based and then exploit it to attack 8-round mCrypton. This attack requires $2^{45.5}$dada and $2^{45.5}$time complexities which is faster than exhaustive key search.

  • PDF

Routing Protocol Based on Zone Master for Hybrid Wireless Networks (하이브리드 무선 네트워크를 위한 존 마스터 기반의 라우팅 프로토콜)

  • Lim, Se-Young;Kim, Hun;Yoo, Myung-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.4
    • /
    • pp.269-275
    • /
    • 2007
  • Since being constructed without any infrastructure-based network, ad hoc network has been received much attention as a key technology for ubiquitous networks. Due to high bit error rate and dynamically changing network topology in ad hoc network, the routing protocol that provides stable multi-hop communication path is the one of the key issues to address. The previously proposed ad hoc routing protocols have their limitations on network overhead, stability, and scalability. In this paper, we consider hybrid wireless network, which can overcome shortcomings of ad hoc network, and propose a novel routing protocol called zone master-based routing protocol. We verify with computer simulations that the proposed routing protocol outperforms other existing routing protocols in the various wireless environments.

A Traffic-Classification Method Using the Correlation of the Network Flow (네트워크 플로우의 연관성 모델을 이용한 트래픽 분류 방법)

  • Goo, YoungHoon;Lee, Sungho;Shim, Kyuseok;Sija, Baraka D.;Kim, MyungSup
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.433-438
    • /
    • 2017
  • Presently, the ubiquitous emergence of high-speed-network environments has led to a rapid increase of various applications, leading to constantly complicated network traffic. To manage networks efficiently, the traffic classification of specific units is essential. While various traffic-classification methods have been studied, a methods for the complete classification of network traffic has not yet been developed. In this paper, a correlation model of the network flow is defined, and a traffic-classification method for which this model is used is proposed. The proposed network-correlation model for traffic classification consists of a similarity model and a connectivity model. Suggestion for the effectiveness of the proposed method is demonstrated in terms of accuracy and completeness through experiments.

Remote control of individual modules based on mobile phone and web (모바일 폰과 웹을 연동한 개별모듈 원격제어)

  • Park, Sang-Gug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.780-788
    • /
    • 2011
  • This paper suggests one model, which can be monitor and control target system at anytime and anywhere by a WAP and ME based personal cellular phone(Feature phone) and internet connection. The suggesting model tried to overcome constraints of distance and mobility of conventional methods, TCP/IP based remote data monitoring system, which combine PDA and WLAN technologies. For the experiments of suggesting model, the target systems are constructed with individual modules, which need AC or DC power control. The development software for the control and monitor of local system use NI Labview for the easy-programming and confidence. Also, web server use APM setup for the general user. The mobile connection environments of personal cellular phone are programmed by use WML and mHTML language for the general access. Through the experiments, we have showed that suggesting model can overcome constraints of distance and mobility of conventional system.

A Survey of Code Dissemination Mechanisms on Sensor Networks (센서 네트워크에서 코드분배 메커니즘에 대한 조사 연구)

  • Kim, Mi-Hui;Kim, Ji-Sun;Kim, Jee-Hyun;Lim, Ji-Young;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.423-438
    • /
    • 2009
  • The sensor network is highlighted because it is one of the essentialbase networks in the ubiquitous computing realization. Researches for providing security and efficiency are being perfomed in the various isuues because of the characteristics of sensor nodes and sensor networks. Recently, code dissemination mechanism is recognized as an important research issue since sensor nodes are in the need of updating new software or the need of modifying bugs in dynamically. Generally lots of nodes are in the sensor networks and they are ramdomly deployed in hostile environments. Thus it is especially important that the code dissemination from the base station to nodes should be processed efficienctly and securely. In this paper, we check up the recent existing code dissemination mechanisms, and comparatively analyze the requirements of the code dissemination and the characteristicsof existing mechanisms. Through the analysis, we present future research issues for the code dissemination area. This research can expedite the research on the code dissemination and improve the usability of sensor networks with efficiency and security.

A Study on the Performance Improvements of Congestion Control of Multiple Time Scale Under in TCP-MT network (TCP-MT네트워크에서 다중 시간 간격을 이용한 혼잡제어 성능 개선에 관한 연구)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.1
    • /
    • pp.75-80
    • /
    • 2008
  • Measurement of network traffic have shown that the self-similarity is a ubiquitous phenomenon spanning across diverse network environments. In previous work, we have explored the feasibility of exploiting the long-range correlation structure in a self-similar traffic for the congestion control. We have advanced the framework of the multiple time scale congestion control and showed its effectiveness at enhancing performance for the rate-based feedback control. Our contribution is threefold. First, we define a modular extension of the TCP-a function called with a simple interface-that applies to various flavours of the TCP-e.g., Tahoe, Reno, Vegas and show that it significantly improves performance. Second, we show that a multiple time scale TCP endows the underlying feedback control with proactivity by bridging the uncertainty gap associated with reactive controls which is exacerbated by the high delay-bandwidth product in broadband wide area networks. Third, we investigate the influence of the three traffic control dimensions-tracking ability, connection duration, and fairness-on performance.

Research on the Participation Types and Strategies for Facilitating Learning based on the Analyses of Social Media Contents (소셜 미디어 콘텐츠 분석에 따른 참여유형 및 학습촉진방안 탐구)

  • Lim, Keol
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.6
    • /
    • pp.495-509
    • /
    • 2011
  • According to the rapid technological development such as ubiquitous environments, there has been growing interest in learning with social media as known as social learning. This study was conducted to analyze various participation types of social media contents aiming to explore strategies for facilitating learning. Specifically, the research model was established by two aspects in using social media contents. First was classified by writings and readings in contents, which consists of prosumers, producers, consumers, and non-participants. Second criterion was categorized by instruction-related and instruction-nonrelated, which is learning contents, learning management, emotional expression, and social activities. In order to acquire empirical data, a set of fourteen undergraduate students participated in this research for eight weeks using a microblog. Based on the analyses on the data through learning activities, three learning strategies were suggested to facilitate social media based learning: analysis on learners, role of the instructor, and instructional model design.

A Study on the Health Information Standards for Health Information System Implementation (의료정보시스템 구축을 위한 의료정보 표준에 관한 연구)

  • Jung, Yong Sik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.7
    • /
    • pp.167-175
    • /
    • 2012
  • Ubiquitous health care system, which is one of the developing solution technologies of IT, BT and NT, could give us new medical environments in future. Implementing health information systems can be complex, expensive and frustrating. Healthcare professionals seeking to acquire or upgrade systems do not have convenient, reliable way of specifying a level of adherence to communication standards sufficient to achieve truly efficient interoperability. Great progress has been made in establishing such standards-DICOM, IHE and HL7, notably, are now highly advanced. In this paper, there are suggestions that provide a test bed, demonstration and specification of how standards such a IHE, HL7, ASTM can be used to provide an integrated environment.