• Title/Summary/Keyword: Ubiquitous IT

Search Result 2,253, Processing Time 0.03 seconds

A Taxonomy of Agent Technologies for Ubiquitous Computing Environments

  • Zhang, Daqiang;Wan, Jiafu;Liu, Qiang;Guan, Xin;Liang, Xuedong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.547-565
    • /
    • 2012
  • The design, development and deployment of Mobile Agent (MA) systems for high-level inference and surveillance in wireless sensor networks and RFID systems have drawn increasing attention in the past decade. To answer how the state-of-the-art of MA in a wide range of ubiquitous and sensor environments is, this paper investigates the current progress of MA. It proposes a taxonomy, by which MA systems in ubiquitous computing environments are decomposed and discussed. Then, this paper provides insights into the strengths and weaknesses of existing efforts. Finally, it presents a series of solutions from the viewpoint of various roles of MA in ubiquitous environments and situations.

An Intelligent Decision Making System for Effective Ubiquitous City (효율적 유비쿼터스 도시건설을 위한 지능적 의사결정 시스템)

  • Cho, Young-Im
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.248-253
    • /
    • 2009
  • In this paper, we have studied about the ubiquitous service map for the effective u-City service providing. Through the research, we are going to propose the fact that it can be implemented ubiquitous services according to city characteristics. The proposed research could make it possible to be an intelligent decision making system by city characteristics. Also, nation, local government, companies can be assigned their appropriate load according to the proposed system for the effective u-City services.

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher

  • Marpaung, Jonathan A.P.;Ndibanje, Bruce;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.237-245
    • /
    • 2014
  • In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv's Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the algorithm, and introducing a key refreshment scheme. Our contribution brings improvements to previous countermeasures making the implementation resistant to higher-order attacks. Four functional metrics, namely resiliency, robustness, resistance, and scalability, were used for the assessment. Finally, performance costs were measured using memory usage and execution time. In this work, it was demonstrated that although attacks can be feasibly carried out on unprotected systems, the proposed countermeasures can also be feasibly developed and deployed on resource-constrained devices, such as wireless sensors.

A Qualitative Research on the Structure and Determinants of Personal Device Network in the Ubiquitous Computing Context (유비쿼터스 컴퓨팅 환경에서 PDN의 구조와 결정 요인에 대한 정성적 연구)

  • Jeon Seok-Won;Jang Youn-Sun;Kim Jin-Woo
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.3
    • /
    • pp.1-28
    • /
    • 2006
  • In the ubiquitous computing environments. people usually carry multiple information technology devices with them. Personal device network (PDN) refers to the way how people connect multiple IT devices for their personal as well as professional purposes. Even though it has been Quite popular to construct the PDN in ubiquitous computing context, not much research has been conducted on how people actually connected multiple devices and what influences their methods of connection. In this paper we conducted a content analysis on community bulletin boards of IT devices and a contextual inquiry with expert users of PDN for investigating the configurations with which users connect multiple IT devices. Base on the results of two related studies, we identified three major types of PDN configurations, and key factors that influence the configurations of PDN. We conclude this research with guidelines to design a set of devices for each of the three configuration types.

  • PDF

Tag-based Evaluation Model for Economic Feasibility Analysis of Mobile RFID System in Ubiquitous Space (유비쿼터스 공간 구축을 위한 모바일 RFID 시스템의 경제성 평가에 대한 연구 : 태그 기반평가모델을 중심으로)

  • Lee, Kyoung-Jun;Choi, Hyung-Kwang;Jun, Jung-Ho
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.189-202
    • /
    • 2011
  • It is important issue how to evaluate the economic feasibility of computing factors in the real world when we build ubiquitous spaces. In this paper, we propose a simple model that can evaluate the economic feasibility of mobile RFID-based ubiquitous computing system which enables seamless communication between offline and online via embedded computing factors in the real world. To achieve this, we explore the meaning of mobile RFID system, the difference between our research and extant researches concerning the evaluation of economic feasibility in RFID system, and propose the so-called 'Tag-based Evaluation Model' (TEM) which is an evaluation model to access the economic feasibility of mobile RFID systems. We also analyze the TEM via simulation cases based on proposed model and discuss the future of TEM.

u-Manufacturing needs M2M (Machine to Machine) for Ubiquitous Computing World

  • Cha, Suk-Keun;Song, Jun-Yeob;Choi, Jin-Seok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1112-1114
    • /
    • 2005
  • Core position of the M2M (Machine to Machine) is device integration fusion using an emerging wireless and next internet technologies as well as IEEE 802.x, Bluetooth, Zigbee, DMB, Wibro etc. for ubiquitous environment that is complementary with IT839 strategy from Ministry of Information & Communication. This paper define and deploy about major functional requirements of M2M devices and middleware for how to it works, worldwide M2M technology trend & activities with its current & future application in manufacturing area that is called u-Manufacturing (Ubiquitous Manufacturing).

  • PDF

3D Visualization of Partially Occluded Objects Using Axially Distributed Image Sensing With a Wide-Angle Lens

  • Kim, Nam-Woo;Hong, Seok-Min;Lee, Hoon Jae;Lee, Byung-Gook;Lee, Joon-Jae
    • Journal of the Optical Society of Korea
    • /
    • v.18 no.5
    • /
    • pp.517-522
    • /
    • 2014
  • In this paper we propose an axially distributed image-sensing method with a wide-angle lens to capture the wide-area scene of 3D objects. A lot of parallax information can be collected by translating the wide-angle camera along the optical axis. The recorded wide-area elemental images are calibrated using compensation of radial distortion. With these images we generate volumetric slice images using a computational reconstruction algorithm based on ray back-projection. To show the feasibility of the proposed method, we performed optical experiments for visualization of a partially occluded 3D object.

New way of approach method for Ubiquitous Strategy Planning based on the Green competitiveness (USP(Ubiquitous Strategy Planning)을 통한 Ubiquitous City Service Model Green 접근 방법론)

  • Cho, Young-Suk
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.05a
    • /
    • pp.126-129
    • /
    • 2009
  • 2006년 초반부터 한국의 IT 경쟁력을 기반하여 도시 계획 및 공공 단지에 USP(Ubiquitous Strategy Planning)의 접근 방법을 적용하여 각 지역 지방자치단계 및 공공 주택 사업 단지 조성에 활용하고 있다. 그러나 그 결과물을 보면 초고속 인터넷을 이용한 생활에 필요 할 것이라 생각이 되는 정보화 사업 방향으로 결말이 되고 있다. 물론 약간의 차이는 있지만 실제 서비스 중심의 사고 에서 본다면 USP를 통하여 얻을 수 있는 것은 매우 현실적으로 공감을 가지기가 어렵다. 그러나 녹색 경영을 중심의 USP 접근 방법은 서비스와 이익을 동시에 제공 한다는 점에서 그 공감대 형성 및 새로운 Vision을 보인다는 것에서 새로운 시도가 될 것이다.

  • PDF

A MAC Protocol based on Priority for controlling Biomimetic Remotely Operated Underwater Vehicles (생체모방형 ROV 제어를 위한 우선순위 기반의 MAC 프로토콜)

  • Lee, Jin-Young;Yun, Nam-Yeol;Shin, Seung-Won;Park, Soo-Hyun;Kim, Chang-Hwa
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.15-16
    • /
    • 2012
  • 본 논문에서는 우선순위 기반의 RTS/CTS 통신 기법을 적용하여 생체모방형 ROV 를 제어하기 위한 수중 MAC 프로토콜을 제안하였다. MANET 기반의 하천 수질 환경 감시 시스템이 효율적으로 운용되기 위한 수중 MAC 프로토콜이 지원됨으로써 이동성이 강조되는 생체모방형 ROV 제어를 위한 실시간성을 보장할 수 있다.

A Study on BPR and Modeling for Ubiquitous-City Construction Projects - Focused on the application of the Ubiquitous-City Construction laws - (유비쿼터스도시건설사업 BPR 및 모델링 연구 - "유비쿼터스도시의 건설 등에 관한 법률" 적용을 중심으로 -)

  • Lee, Sung-Pyo;Shin, Yong-Jin
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.11a
    • /
    • pp.535-540
    • /
    • 2008
  • It is a fact that we are yet to recognize and sense the U-City even though the business of U-City construction has been started many years ago. One of the causes is that UCity was thoughtlessly developed in the industry-centered environment for a tangible achievement, despite of need on more systematic development and organized management. Fortunately, it is expected that the most part of the situation will be solved, since "laws on the construction of the ubiquitous city" for planning, construction and management has been promulgated on March, and U-City project will be systematically promoted by the related laws from now. Therefore, intention of this study is the sustainable development of the U-City by analyzing the previous process and problems of the U-City Construction project of local governments and reengineering U-City construction project process in accordance with new laws, using the BPR methodology.

  • PDF