• Title/Summary/Keyword: Ubiquitous IT

Search Result 2,253, Processing Time 0.025 seconds

Ubiquitous computing Technology for Shipbuilding (조선 산업에서의 유비쿼터스 기술 활용)

  • Lee, Kyung-Ho;Kim, Dong-Geun;Park, Jong-Hoon;Kim, Dae-Seok
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2007.04a
    • /
    • pp.731-736
    • /
    • 2007
  • Ubiquitous computing is a model of computing in which computer functions are integrated into everyday life, providing services and information in anywhere and anytime fashion. Augmented Reality is one of ubiquitous computing technologies to provide new paradigm utilized to interact between human and computer. By adding computer-generated non-visual information to real information and their interaction. user can get the improved and more knowledgeable information about real world. The purpose of this paper is the integration of AR and knowledge-base reasoning technology in ubiquitous computing. Through the introduced concept, it is enable to provide adequate knowledge in the process of ship design and manufacturing easily (Knowledge Everywhere). That is, this is a basic research to construct knowledge-based ubiquitous environment (KAD/KAM) in shipbuilding industry.

  • PDF

A Study on Organizational Structure and Computer Security Systems in Ubiquitous Environments (유비쿼터스 서비스 경영 환경에서 조직 구조 및 컴퓨터 보안 시스템에 관한 연구 - 외식 업체 적용 방안을 중심으로 -)

  • Yi, Myoung-Hee;Yu, Jae-Eon;Jung, Chang-Duk
    • Culinary science and hospitality research
    • /
    • v.13 no.4
    • /
    • pp.305-316
    • /
    • 2007
  • This paper examines that a desirable organizational structure for a security policy in ubiquitous environments that are based on users' need to know and do their tasks in organizations. Tasks are a common entity which already exit and relate directly to both users(who are assigned to tasks and to information required for the completion of a task). Ubiquitous is highlighted as IT paradigm of the future generation. We propose a security model, called the Ubiquitous Group Security Model(UGSM), which associates with a task of processing the information which users need to know. The access type specification restricts the operations that users are permitted to perform, as defined by users' need to do for achieving their tasks in organizations.

  • PDF

Personal Mutual Authentication System for Ubiquitous Wireless Environments (유비쿼터스 무선환경을 위한 개인 상호인증 시스템)

  • Kim Byung-Gi;Hong Sang-Sun;Jouhn Young-Keel
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.99-111
    • /
    • 2004
  • Two general security measures in computing networks are secure data transmission and user authentication, These problems are still critical in the wireless LAN environments. Thus security becomes most significant issue in personal network environments and ubiquitous networks based on wireless LANs. We purpose a new authentication system for these kind of environments, and coined it UPMA(Ubiquitous Personal Mutual Authen-tication) model. UPMA supports authenticating configurations which provides personal verification for each system. It guarantees secure communications through the session key setup, and provides mutual authentication by verifying each user and his/her station. UPMA solves security problems in ubiquitous networks without accessing authentication server, Instead it performs mutual authentication between terminals or between systems. It is a global authentication system which enables global roaming service through the Internet or other public networks, It can be used to guarantee safe and convenient access to a company Intranet or to a home network.

  • PDF

Study of an Accurate and Efficient Data Integration for Decision Making in Data Management of Ubiquitous (유비쿼터스 데이터 관리에서 의사결정을 위한 정확하고 효율적인 데이터 통합 연구)

  • Lee Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.145-151
    • /
    • 2006
  • In conjunction with the rapid progress of IT(information technology) an increasing amount of data are being generated. The amount of new data is so big and the type of new data generated from clients or sensor devices needed to be in ubiquitous environment is so various that it is hard to manage and control them. Especially data to be occurred in ubiquitous environment are generated through PDA(personal digital assistant) smart phone, mobile device or sensor units etc. Therefore, to manage and control them generated from ubiquitous devices for decision making, we can use data warehouse as an integrated storage. A data warehouse integrates and aggregates data of several different DBMS into one DBMS. Also the updated data from source data have to be effectively propagated to the data warehouse. Therefore, in this paper, we proposed a mode) for an exact and efficient data management methodology in new IT paradigm environment, ubiquitous computing environment, to apply updated data on the warehouse to make decision. We also show brief result compared to conventional methodology.

  • PDF

A Study on the Analysis of Ubiquitous Self Home Service for Elderly Residents - The Usage of Senior Aids Products and Design Strategies - (고령자의 자립형 유비쿼터스 홈 서비스 분석에 관한 연구 - 노인용품에 대한 활용도 및 디자인 방안 -)

  • Kim, Mi-Yun;Kim, Bo-Ram
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.13 no.1
    • /
    • pp.15-22
    • /
    • 2013
  • Recently, the korean statistical information service reported that the elder people aged over 65 years take 11 percentage point of all population, indicating that the hyper-elder era will advent shortly. As a result, there are remarkably increasing demands for providing self-organizable home agent system for elder people. Of the home agent system, the ubiquitous home service is known to be useful to overcome this problem. However, current ubiquitous home services limited to provide functional services, and it can be observed that there is lack of consideration for elder-support products which are closely interacted with elder people in the living situation. In this paper, we analyze senior aids products that can be combined to the ubiquitous home service, and propose design procedure for senior aids products that can be applied to self-organizable ubiquitous services. We studied characteristics of elder people, current state of affairs for senior aids products, and home services that are highly required by elder people. Moreover, we observed that the ubiquitous home services related to health, safety, and amenity are urgently needed, and those services can be categorized according to residential areas. Following those observances, we proposed a design principle based on the universal design paradigm to provide self-organizable ubiquitous home service environment for elder people using senior aids products.

Job Analysis of Ubiquitous Medical Electronic Device Export by the Method of DACUM (DACUM 법을 활용한 유비쿼터스 의료전자기기 전문가의 직무분석)

  • Cho, Dong-Heon;Koo, Kyung-Wan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.8
    • /
    • pp.1192-1197
    • /
    • 2013
  • In this paper Ubiquitous Medical Electronic Device Export was defined, and it's job analysis. The authors have been defined the job and classified duties and tasks of Ubiquitous Medical Electronic Device Export. To fine what is the most efficient task for Ubiquitous Medical Electronic Device Export, we have been investigated the levels of importance, difficulty, frequency and entry in each task. A DACUM committee is composed of total 12 members, which are one facilitator, 10 panel members, one coordinator & recorder to analyze the job of Ubiquitous Medical Electronic Device Export. Following is the result of this study. First, The process began with the identification of a job title and definition of Ubiquitous Medical Electronic Device Export. Second, a job model of Ubiquitous Medical Electronic Device Export is constructed based on the results of DACUM job analysis. 5 duties and 33 tasks are analyzed. Third, occupational specification was drawn up in consultation with SME council. Fourth, duty specification was drawn up in consultation. 33 tasks that are essential in entry level of occupation are identified. Fifth, task specification was drawn up in consultation. Detail task component which include skill, materials, knowledge, equipment, achievement level and tool was specified in task specification.

Response and Threat of Home Network System in Ubiquitous Environment (유비쿼터스 환경에서의 홈네트워크 시스템 침해 위협 및 대응 방안)

  • Oh, Dae-Gyun;Jeong, Jin-Young
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.27-32
    • /
    • 2005
  • Recently The social interest regarding is coming to be high about Home Network accordong to intelligence anger of diffusions and the family home appliance machineries and tools of the superhigh speed Internet In the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases in the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases Beacaues of Home network is starting point to go ubiquitous computing enviorment, The Increase of Cyber attack through Internet will raise its head with the obstacle to disrupt the activation of the groove network. So there is a possibility of saying that the counter-measure preparation is urgent, In the various environment like this, It means the threat which present time than is complicated will exist. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment.

  • PDF

The Influence of Logistics Information System Utilization under Ubiquitous Environment on Business Performance (유비쿼터스 추진 환경을 고려한 물류정보시스템 활용이 기업성과에 미치는 영향)

  • Park, Jong-Gic;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1465-1479
    • /
    • 2007
  • This study set up a hypothesis that the main variables (business environment, business strategy, business policy, logistics information system) of logistics information system utilization under ubiquitous environment would contribute to business performance, and then verified the relation between each variables that have an effect on business performance. The analysis results between each main variable can be summarized as follows. First, among main variables under ubiquitous environment, business environment closely made influence on business performance. Second, business environment, business strategy, and business policy were meaningful among other variables, whereas logistics information system was not meaningful. But, it is known that corporate performance is only meaningful to business environment and business policy. In conclusion, business performance is not achieved by each variable of business strategy, business policy and logistics information system. It is recognized that business performance is influenced by business environment that combines a given condition of business strategy, business policy and logistics information system.

  • PDF

Suggesting a Virtual Smart Test-bed to Verify Effectiveness for Ubiquitous Space (유비쿼터스 공간의 효용성 검증을 위한 가상 스마트 테스트베드 시스템의 제안)

  • Han, Soo-Yeon;Choi, Jin-Won
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.741-746
    • /
    • 2006
  • Future space is currently getting a great deal of attention to apply ubiquitous computing technology. At the same time, various ubiquitous technology-based products are being developed with service scenarios in the views of diverse user groups predicted. Since these service models and scenarios need to be tested to verify effectiveness, it requires researchers to predict spatial shapes and service scenarios for future domestic environment that fulfills diverse future spatial requirements including ecological and user-oriented spaces, extended amenity getting maximum benefits from technology, etc. To support these developments, the need to make a physical test-bed, a real building model, is essential. However building a physical test-bed generally is economically expensive and even if the test-bed could be settled, it must be carefully designed before it is built In this paper, we suggest a virtual smart test-bed, called "V-PlaceLab", using virtual reality techniques. This system allows not only to inspect a scenario with the aid of computer simulation on a virtual environment, but also to design a virtual test-bed mentioned above.

  • PDF

Privacy-Preserving ID-based Service in Anonymity-based Ubiquitous Computing Environment (익명기반 유비쿼터스 환경의 프라이버시 보장 ID기반 서비스)

  • Kim Hak-Joon;Hwang Kyoung-Soon;Lee Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.65-68
    • /
    • 2005
  • Privacy preservation is crucial in ubiquitous computing environment in which lots of privacy- sensitive information can be collected and distributed without appropriate control. The anonymity-based approach is a famous one used for privacy preservation communication, which allows users to use pseudonyms instead of real ID so as not to reveal their identities. This approach is effective in that it can hide the identity of users. However, it makes it difficult to provide ID-based services like buddy service, dangerous area alert, P2P communication in the ubiquitous computing. We proposes a system architecture which enables ID-based services in the ubiquitous computing environment employing anonymity - based privacy - preserving approach.