• 제목/요약/키워드: Ubiquitous Machine

검색결과 88건 처리시간 0.024초

Control Variables of Remote Joint Analysis Realization on the M2M Case

  • Lim, Sung-Ryel;Choi, Bo-Yun;Lee, Hong-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.98-115
    • /
    • 2012
  • New trend called ubiquitous leads the recent business by standardization and integration. It should be the main issue how to guarantee the integration and accountability on each business, especially in mission critical system which is mainly supported by M2M (Machine to Machine) control mechanism. This study is from the analysis of digital forensics case study that is from the M2M Sensing Control Mechanism problem of the "Imjin River" case in 2009, where a group of family is swept away to death by water due to M2M control error. The ubiquitous surroundings bring the changes in the field of criminal investigation to real time controls such as M2M systems. The needs of digital forensics on M2M control are increasing on every crime scene but we suffer from the lack of control metrics to get this done efficiently. The court asks for more accurately analyzed results accounting high quality product development design. Investigators in the crime scene need real-time analysis against the crime caused by poor quality of mission critical systems. It seems to be every need of Real-Time-Enterprise, so called ubiquitous society on the case. We try to find the efficiency and productivity in discovering non-functional design defects in M2M convergence products focusing on three metrics in study model with quick implementation. Digital forensics system in present status depends on know-how of each investigator and is hard to expect professional analysis on every field. This study set up a hypothesis "Co-working of professional investigators on each field will qualify Performance and Integrity" especially in mission critical system such as M2M and suggests "Online co-work analysis model" to efficiently detect and prevent mission critical errors in advance. At the conclusion, this study proved the statistical research that was surveyed by digital forensics specialists around M2M crime scene cases with quick implementation of dash board.

신호의 복원된 위상 공간을 이용한 오디오 상황 인지 (A new approach technique on Speech-to-Speech Translation)

  • ;이승룡
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2009년도 추계학술발표대회
    • /
    • pp.239-240
    • /
    • 2009
  • We live in a flat world in which globalization fosters communication, travel, and trade among more than 150 countries and thousands of languages. To surmount the barriers among these languages, translation is required; Speech-to-Speech translation will automate the process. Thanks to recent advances in Automatic Speech Recognition (ASR), Machine Translation (MT), and Text-to-Speech (TTS), one can now utilize a system to translate a speech of source language to a speech of target language and vice versa in affordable manner. The three phase process establishes that the source speech be transcribed into a (set of) text of the source language (ASR) before the source text is translated into the target text (MT). Finally, the target speech is synthesized from the target text (TTS).

RFID를 활용한 유비쿼터스 컨벤션에 관한 연구 (A Study on Ubiquitous Convention using RFID)

  • 노영;변정우
    • 디지털산업정보학회논문지
    • /
    • 제5권3호
    • /
    • pp.175-184
    • /
    • 2009
  • We are entering into a era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge s haring, and calm services. Some people refer to this as the "ubiquitous" computing because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Ubiquitous computing technology, "RF" stands for "radio frequency"; the "ID" means "identifer". The tag itself of a computer chip and an antenna. The shortest metaphor is that RFID is like a bar-code but is read with an electromagnetic field rather than by a laser beam. Much has already been written about the use of RFID. But there is no has written about the use of RFID in the convention industry. Therefore this study have specific objectives as follows. 1. To give details on the use of RFID in convention. 2. To introduces the key concepts behind RFID technology. 3. To identify advantage & disadvantage of RFID technology using a BEXCO CASE study. 4. To study on ubiquitous convention using RFID and effective operation methods such as entrance identification system, session management, machine management, CRM management, visitor management, and contents management. This results provide into the current status of ubiquitous computing technology in convention industries. Specific advantages by using ubiquitous computing technology(RFID) are one-stop differentiate service, wireless internet service, use of visitor management system, entrance by tag, and U-logistics. On other side, disadvantages are security, stabilization of RFID system, higher price of RFID tag, and commercial scale. Convention by using of RFID technology is currently at an early stage. Convention company as BEXCO need to have the capabilities to adapt, to customize, to commercialize, and to modify technology to suit our circumstances.

유비쿼터스 환경에서 2차원 바코드 및 RFID 응용에 관한 연구 (A Study On Usage Of the dimension barcode and the RFID based on Ubiquitous)

  • 김병찬;정성훈;임재홍
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2004년도 춘계학술대회 논문집
    • /
    • pp.49-54
    • /
    • 2004
  • 유비쿼터스 컴퓨팅은 언제 어디서나 어떠한 기기를 통해서 자유롭게 컴퓨터에 연결해 각종 정보를 이용할 수 있다. 최근 들어 바코드와 RFID(Radio Frequency IDentification) 기술이 발전하여 고밀도 대량의 정보저장 및 암호인증까지 보유한 특수코드 및 유ㆍ무선 인터넷과 연결시키는 비즈니스모델 등이 등장하면서 신용카드 및 각종 지급결제 서비스 분야 등에 적용되고 있다. 그러나 RFID 칩의 가격이 고가이고 다른 전파의 간섭이 기술적인 문제가 될 수 있다는 점이 상용화가 되는 걸림돌이 되고 있으며, 2차원 바코드 역시 규격화를 이루고 있는 리더기와 소프트웨어 등 대부분 비싼 로열티를 지급하고 들여와야 하는 것이 문제이다. 본 논문은 유비쿼터스 환경에서 2차원 바코드와 RFID를 이용한 사례 및 적용 분야에 대한 최근 기술의 특성을 비교ㆍ분석하여 이에 따른 문제점의 파악 및 활성화 방안에 대해 고찰하고자 한다.

  • PDF

Virtual Machine Placement Methods using Metaheuristic Algorithms in a Cloud Environment - A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.147-158
    • /
    • 2022
  • Cloud Computing offers flexible, on demand, ubiquitous resources for cloud users. Cloud users are provided computing resources in a virtualized environment. In order to meet the growing demands for computing resources, data centres contain a large number of physical machines accommodating multiple virtual machines. However, cloud data centres cannot utilize their computing resources to their total capacity. Several policies have been proposed for improving energy proficiency and computing resource utilization in cloud data centres. Virtual machine placement is an effective method involving efficient mapping of virtual machines to physical machines. However, the availability of many physical machines accommodating multiple virtual machines in a data centre has made the virtual machine placement problem a non deterministic polynomial time hard (NP hard) problem. Metaheuristic algorithms have been widely used to solve the NP hard problems of multiple and conflicting objectives, such as the virtual machine placement problem. In this context, we presented essential concepts regarding virtual machine placement and objective functions for optimizing different parameters. This paper provides a taxonomy of metaheuristic algorithms for the virtual machine placement method. It is followed by a review of prominent research of virtual machine placement methods using meta heuristic algorithms and comparing them. Finally, this paper provides a conclusion and future research directions in virtual machine placement of cloud computing.

Probabilistic Support Vector Machine Localization in Wireless Sensor Networks

  • Samadian, Reza;Noorhosseini, Seyed Majid
    • ETRI Journal
    • /
    • 제33권6호
    • /
    • pp.924-934
    • /
    • 2011
  • Sensor networks play an important role in making the dream of ubiquitous computing a reality. With a variety of applications, sensor networks have the potential to influence everyone's life in the near future. However, there are a number of issues in deployment and exploitation of these networks that must be dealt with for sensor network applications to realize such potential. Localization of the sensor nodes, which is the subject of this paper, is one of the basic problems that must be solved for sensor networks to be effectively used. This paper proposes a probabilistic support vector machine (SVM)-based method to gain a fairly accurate localization of sensor nodes. As opposed to many existing methods, our method assumes almost no extra equipment on the sensor nodes. Our experiments demonstrate that the probabilistic SVM method (PSVM) provides a significant improvement over existing localization methods, particularly in sparse networks and rough environments. In addition, a post processing step for PSVM, called attractive/repulsive potential field localization, is proposed, which provides even more improvement on the accuracy of the sensor node locations.

국내외 물류산업의 사물인터넷(IoT) 현황과 발전방향에 관한 연구 (A Study on Logistics Distribution Industry's IoT Situation and Development Direction)

  • 박영태
    • 경영과정보연구
    • /
    • 제34권3호
    • /
    • pp.141-160
    • /
    • 2015
  • USNs, NFC, M2M에서 확장된 사물인터넷은 새로운 컨버전스 기술로써 주요 이슈가 되고 있다. 사물인터넷은 인간의 개입 없이 센싱 네트워크와 프로세싱 간에 공동으로 지능형 연결을 구축할 수 있는 네트워킹으로 정의된다. 본 연구의 목적은 사물인터넷이 물류 산업에 기여하는 것과 미래 사회에 대한 변화를 예측하는 것이다. 실제 세계 시장의 리더가 되기 위해서는 물류 산업의 사물인터넷 개발을 더 많이 요구하고 새로운 서비스 창조와 차별화된 시장을 위한 전략이 필요하다. 그러므로 물류 산업의 세계 리더가 되기 위해서는 다른 것들 보다 사물인터넷 표준화, 사생활 보호, 보안문제 등이 중요하다는 것을 알 수 있다. 따라서, 본 연구에서는 물류 산업의 사물인터넷 개발을 위해서 고객편의를 높이도록 노력하고 소비자의 수요를 잘 고려하여 차별화된 사물인터넷 물류 서비스를 제공할 수 있게 하여야 한다는 것을 보여주고자 함이 본 논문의 목적이며, 이를 위해 국내외 사례를 분석하고자 한다.

  • PDF

머신러닝 기반 스마트 단말기 Lithium-Ion Cell의 잔량 추정 방법의 실증적 연구 (An Empirical Study on Machine Learning based Smart Device Lithium-Ion Cells Capacity Estimation)

  • 장성진
    • 문화기술의 융합
    • /
    • 제6권4호
    • /
    • pp.797-802
    • /
    • 2020
  • 지난 몇 년 동안 스마트 폰을 비롯한 다양한 스마트 기기들은 휴대성을 기반으로 사용자의 요구에 의해 지속적으로 성능이 향상 되고 있다. 유비쿼터스 컴퓨팅 (Ubiquitous Computing) 환경과 센서 네트워크 (Sensor network)등의 다양한 망 접속 기술로 인하여 휴대성을 기반으로 하는 단말기들이 다양하게 보급되어 사용되고 있다. 스마트 단말들은 사용 중에 보다 안정적인 동작을 위하여 에너지 모니터링을 세밀하게 할 수 있는 기술이 필요하게 되었다. 소형 경량화 된 스마트 단말기는 다양한 멀티미디어 작업으로 인하여 단말 운용 중에 전원 부족 문제가 발생하게 된다. 이와 같은 상황을 미리 방지하고 안정적인 단말 운용을 위해서 기존에 다양한 추정 하드웨어가 개발 되었다. 그러나 잔량 추정을 하는 방법이나 성능이 비교적 우수하지 못하였다. 본 논문에서는 스마트 단말의 운용 중에 발생 할 수 있는 잔여 잔량 문제를 미리 예측하여 보다 안정적인 운용을 위한 리튬이온 셀의 잔량 추정 방법을 머신러닝에 기초를 두고 연구 하였다. 기존의 하드웨어적인 추정 방법이 아니라 사용 중인 리튬이온 셀의 특성을 머신러닝 기법을 이용한 학습 알고리즘으로 학습 시키고 최적화된 결과를 추정하여 적용 하고자 한다.

Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜 (Sparse DTMNs routihg protocol for the M2M environment)

  • 왕종수;서두옥
    • 디지털산업정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.11-18
    • /
    • 2014
  • Recently, ICT technology has been evolving towards an M2M (Machine to Machine) environment that allows communication between machine and machine from the communication between person and person, and now the IoT (Internet of Things) technology that connects all things without human intervention is receiving great attention. In such a network environment, the communication network between object and object as well as between person and person, and person and object is available which leads to the sharing of information between all objects, which is the essential technical element for us to move forward to the information service society of the era of future ubiquitous computing. On this paper, the protocol related to DTMNs in a Sparse M2M environment was applied and the improved routing protocol was applied by using the azimuth and density of the moving node in order to support a more efficient network environment to deliver the message between nodes in an M2M environment. This paper intends to verify the continuity of the study related to efficient routing protocols to provide an efficient network environment in the IoT and IoE (Internet of Everything) environment which is as of recently in the spotlight.