• Title/Summary/Keyword: Ubiquitous Machine

Search Result 88, Processing Time 0.026 seconds

A Study on Implementation of Ubiquitous Home Mess-Cleanup Robot (유비쿼터스 홈 메스클린업 로봇의 구현에 관한 연구)

  • Cha Hyun-Koo;Kim Seung-Woo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.1011-1019
    • /
    • 2005
  • In this paper, Ubiquitous Home Mess-Cleanup Robot(UHMR), which has a practical function of the automatic mess-cleanup, is developed. The vacuum-cleaner had made the burden of house chore lighten but the operation labour of a vacuum-cleaner had been so severe. Recently, the cleaning robot was producted to perfectly solve the cleaning labour of a house but it also was not successful because it still had a problem of mess-cleaning, which was the clean-up of big trash and the arrangement of newspapers, clothes, etc. The cleaning robot is to just vacuum dust and small trash but has no function to arrange and take away before the automatic vacuum-cleaning. For this reason, the market for the cleaning robot is not yet built up. So, we need a design method and technological algorithm of new automatic machine to solve the problem of mess-cleanup in house. It needs functions of agile automatic navigation, novel manipulation system for mess-cleanup. The automatic navigation system has to be controlled for the full scanning of living room, to recognize the absolute position and orientation of tile self, the precise tracking of the desired path, and to distinguish the mess object to clean-up from obstacle object to just avoid. The manipulate,, which is not needed in the vacuum-cleaning robot, must have the functions, how to distinguish big trash to clean from mess objects to arrange, how to grasp in according to the form of mess objects, how to move to the destination in according to mess objects and arrange them. We use the RFID system to solve the problems in this paper and propose the reading algorithm of RFID tags installed in indoor objects and environments. Then, it should be an intelligent system so that the mess cleaning task can be autonomously performed in a wide variety of situations and environments. It needs to also has the entertainment functions for the good communication between the human and UHMR. Finally, the good performance of the designed UHMR is confirmed through the results of the mess clean-up and arrangement.

Study on the Next Disaster Safety Communication Network in M2M Communication (사물지능통신을 이용한 차세대 재난안전통신망에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.585-590
    • /
    • 2011
  • In the past few years, M2M (Machine-to-Machine) applications have become a hot topic in the wireless industry. While M2M applications can be used for many purposes (smart homes, smart metering/electricity meter reading, fleet management, mobile workforce, automobile insurance, vending machines, etc), and in many sectors (healthcare, agriculture, commercial, industrial, retail, utility, etc.), smart metering applications or smart grids present the biggest growth potential in the M2M market today. M2M platform is the future ubiquitous network technologies which provide the integrated service with the networks and devices. The promising technologies to tackle these problems are the Semantic technologies, for interoperability, and the Agent technologies for management of complex systems. In this paper the information communication technique based on the disaster prevention system's for the M2M, concepts and its requirement technology and application are studied.

Implementing Finite State Machine Based Operating System for Wireless Sensor Nodes (무선 센서 노드를 위한 FSM 기반 운영체제의 구현)

  • Ha, Seung-Hyun;Kim, Tae-Hyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.85-97
    • /
    • 2011
  • Wireless sensor networks have emerged as one of the key enabling technologies for ubiquitous computing since wireless intelligent sensor nodes connected by short range communication media serve as a smart intermediary between physical objects and people in ubiquitous computing environment. We recognize the wireless sensor network as a massively distributed and deeply embedded system. Such systems require concurrent and asynchronous event handling as a distributed system and resource-consciousness as an embedded system. Since the operating environment and architecture of wireless sensor networks, with the seemingly conflicting requirements, poses unique design challenges and constraints to developers, we propose a very new operating system for sensor nodes based on finite state machine. In this paper, we clarify the design goals reflected from the characteristics of sensor networks, and then present the heart of the design and implementation of a compact and efficient state-driven operating system, SenOS. We describe how SenOS can operate in an extremely resource constrained sensor node while providing the required reactivity and dynamic reconfigurability with low update cost. We also compare our experimental results after executing some benchmark programs on SenOS with those on TinyOS.

Provision of Effective Spatial Interaction for Users in Advanced Collaborative Environment (지능형 협업 환경에서 사용자를 위한 효과적인 공간 인터랙션 제공)

  • Ko, Su-Jin;Kim, Jong-Won
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.677-684
    • /
    • 2009
  • With various sensor network and ubiquitous technologies, we can extend interaction area from a virtual domain to physical space domain. This spatial interaction is differ in that traditional interaction is mainly processed by direct interaction with the computer machine which is a target machine or provides interaction tools and the spatial interaction is performed indirectly between users with smart interaction tools and many distributed components of space. So, this interaction gives methods to users to control whole manageable space components by registering and recognizing objects. Finally, this paper provides an effective spatial interaction method with template-based task mapping algorithm which is sorted by historical interaction data for support of users' intended task. And then, we analyze how much the system performance would be improved with the task mapping algorithm and conclude with an introduction of a GUI method to visualize results of spatial interaction.

  • PDF

A Study on the Security Framework for IoT Services based on Cloud and Fog Computing (클라우드와 포그 컴퓨팅 기반 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1928-1939
    • /
    • 2017
  • Fog computing is another paradigm of the cloud computing, which extends the ubiquitous services to applications on many connected devices in the IoT (Internet of Things). In general, if we access a lot of IoT devices with existing cloud, we waste a huge amount of bandwidth and work efficiency becomes low. So we apply the paradigm called fog between IoT devices and cloud. The network architecture based on cloud and fog computing discloses the security and privacy issues according to mixed paradigm. There are so many security issues in many aspects. Moreover many IoT devices are connected at fog and they generate much data, therefore light and efficient security mechanism is needed. For example, with inappropriate encryption or authentication algorithm, it causes a huge bandwidth loss. In this paper, we consider issues related with data encryption and authentication mechanism in the network architecture for cloud and fog-based M2M (Machine to Machine) IoT services. This includes trusted encryption and authentication algorithm, and key generation method. The contribution of this paper is to provide efficient security mechanisms for the proposed service architecture. We implemented the envisaged conceptual security check mechanisms and verified their performance.

Ensemble-By-Session Method on Keystroke Dynamics based User Authentication

  • Ho, Jiacang;Kang, Dae-Ki
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.19-25
    • /
    • 2016
  • There are many free applications that need users to sign up before they can use the applications nowadays. It is difficult to choose a suitable password for your account. If the password is too complicated, then it is hard to remember it. However, it is easy to be intruded by other users if we use a very simple password. Therefore, biometric-based approach is one of the solutions to solve the issue. The biometric-based approach includes keystroke dynamics on keyboard, mice, or mobile devices, gait analysis and many more. The approach can integrate with any appropriate machine learning algorithm to learn a user typing behavior for authentication system. Preprocessing phase is one the important role to increase the performance of the algorithm. In this paper, we have proposed ensemble-by-session (EBS) method which to operate the preprocessing phase before the training phase. EBS distributes the dataset into multiple sub-datasets based on the session. In other words, we split the dataset into session by session instead of assemble them all into one dataset. If a session is considered as one day, then the sub-dataset has all the information on the particular day. Each sub-dataset will have different information for different day. The sub-datasets are then trained by a machine learning algorithm. From the experimental result, we have shown the improvement of the performance for each base algorithm after the preprocessing phase.

A Design of Weather Ontology for Intelligent Weather Service (지능형 기상 서비스를 위한 기상 온톨로지의 설계)

  • Jung, Eui-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.185-193
    • /
    • 2008
  • In spite of rapid development of IT-related meteorology and services, human users still ought to check the weather information manually as they did before because traditional weather information retrieval is based on pull-type and human interpretation. Furthermore, the automatic machine-driven weather information processing has been neglected for a long time although the intelligent weather information processing is expected to be very useful for personal daily life and ubiquitous computing. In this paper, we discussed a design of GRIB based ontology to enable smart weather information processing. GRIB is the general purposed and world-wildly used weather data format approved by the World Meteorological Organization. With the designed ontology and the inference system containing Jess engine, several intelligent weather applications have been implemented and tested to verify the virtue of machine-driven weather information processing.

  • PDF

Applications and Strategies on Defense Acquisition based CPS & IoT Technology (사이버물리시스템(CPS)과 사물인터넷(loT) 기술의 군사적 활용방안 및 추진전략)

  • Kye, J.E.;Park, P.J.;Kim, W.T.;Lim, C.D.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.4
    • /
    • pp.92-101
    • /
    • 2015
  • 미래 전장은 정보 지식 기반의 첨단 전력체계를 확충하기 위해 향후 전력구조를 통합, 지휘통제통신(C4I) 체계와 생존성과 통합성이 향상된 전장의 네트워크중심전(NCW) 수행능력을 향상시킬 것이다. 사이버물리시스템(Cyber-Physical Systems: CPS)은 함정전투체계에 적용되고 있는 DDS를 포함하여 국방 M&S의 근간인 Live, Virture, Constructive(L-V-C) 체계의 큰 축을 형성하고 있다. 사물인터넷(Internet of Things: IoT) 기술은 센서네트워크, 통신, Radio Frequency Identification(RFID), Ubiquitous Sensor Network(USN), Machine to Machine(M2M), D2D 기술 및 상황인지, 지능서비스를 위한 정보수집/가공/융합/분석/예측기술을 포괄적으로 포함한 기술로서 미래산업을 이끌어 갈 차세대 선도 기술이며, 특히 군사적으로도 감시정찰 센서네트워크(USN), 견마형로봇, 경전투로봇과 무인기 기술 및 전술정보통신망체계(TICN) 등 첨단 통신네트워크 기술의 전력화 추세는 IoT 기술의 적용영역을 넓혀주고 있다. 감시정찰체계(Sensor)에서는 감시정찰 분야 영상정보 처리, 표적탐지 등과 관련된 IoT 기술 소요와 지휘통제통신(C4I) 체계의 상호운용성, 데이터링크, 지능형 통신체계 등 C4I 관련 IoT 기술 소요 및 타격체계(Shooter)의 내장형 SW 등 유 무인 무기체계 관련 IoT 기술의 소요가 증대될 것으로 예상된다. 본고는 CPS 및 IoT 기술의 군사적 활용방안 및 획득전략에 대한 적용기술 및 발전방향을 살펴본다.

  • PDF

Running Large-scale Mobile Software using PDA Cluster Computing (PDA 클러스터 컴퓨팅을 활용한 대용량 모바일 소프트웨어 실행)

  • Min, Hye-Rhyn;Lee, Jong-Woo
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.249-258
    • /
    • 2009
  • As wireless internet markets become larger than before, many mobile applications are also being developed actively. In this circumstances mobile devices such as cell phones, PDAs are playing an important role to satisfy the user's need of ubiquitous computing. Due to the hardware limitations, however, the mobile devices like PDA can not run large-scale softwares by itself. The main goal of this paper is to make large-scale applications runnable on PDA. To accomplish this, we used the PDA-JPVM cluster computing engine which has been already developed by us. We found out by running the applications and the performance evaluation that large-scale Java softwares can easily run on the hardware-limited PDA. And the performance evaluation results are also presented.

  • PDF

A Comprehensive Analyses of Intrusion Detection System for IoT Environment

  • Sicato, Jose Costa Sapalo;Singh, Sushil Kumar;Rathore, Shailendra;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.975-990
    • /
    • 2020
  • Nowadays, the Internet of Things (IoT) network, is increasingly becoming a ubiquitous connectivity between different advanced applications such as smart cities, smart homes, smart grids, and many others. The emerging network of smart devices and objects enables people to make smart decisions through machine to machine (M2M) communication. Most real-world security and IoT-related challenges are vulnerable to various attacks that pose numerous security and privacy challenges. Therefore, IoT offers efficient and effective solutions. intrusion detection system (IDS) is a solution to address security and privacy challenges with detecting different IoT attacks. To develop an attack detection and a stable network, this paper's main objective is to provide a comprehensive overview of existing intrusion detections system for IoT environment, cyber-security threats challenges, and transparent problems and concerns are analyzed and discussed. In this paper, we propose software-defined IDS based distributed cloud architecture, that provides a secure IoT environment. Experimental evaluation of proposed architecture shows that it has better detection and accuracy than traditional methods.