• Title/Summary/Keyword: Ubiquitous Technique

Search Result 300, Processing Time 0.022 seconds

Comparison of Error and Enhancement: Effect of Image Interpolation

  • Siddiqi, Muhammad Hameed;Fatima, Iram;Lee, Young-Koo;Lee, Sung-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06c
    • /
    • pp.188-190
    • /
    • 2011
  • Image interpolation is a technique that pervades many an application. Interpolation is almost never the goal in itself, yet it affects both the desired results and the ways to obtain them. In this paper, we proposed a technique that is capable to find out the error when the common two methods (bilinear and nearest neighbor interpolation) are applied on an image for rotation. The proposed technique also includes the comparison results of bilinear interpolation and nearest neighbor interpolation. Among them nearest neighbor interpolation gives us a better result regarding to the enhancement and due to least error. The error is found by using Mean Square Error (MSE).

A Study on the Application of U-SAT System for the Indoor Positioning Technology of Ubiquitous Computing (유비쿼터스 컴퓨팅의 실내 측위 기술을 위한 U-SAT 시스템의 적용에 관한 연구)

  • Lee, Dong-Hwal;Park, Jong-Jin;Kim, Su-Yong;Mun, Young-Song;Lee, Man-Hyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.9
    • /
    • pp.876-882
    • /
    • 2006
  • This study presents an ultrasonic location awareness system for the ubiquitous computing with absolute position. The flight time of ultrasonic waves is determined by a period detecting technique which is able to extend the sensing range compared with traditional methods. For location awareness, ultrasonic waves are sent successively from each ultrasonic transmitter and synchronized by radio frequency (RF) signal, where the transmitting part is fixed and the receiving part is movable. To expand the recognizing range, cell matching technique and coded ultrasonic technique are introduced. The experimentation for various distances is accomplished to verify the used period detecting technique of U-SAT system. The positioning accuracy by using cell matching is also verified by finding the locations of settled points and the usability of coded ultrasonic technique is verified. As a result, the possibility of ultrasonic location awareness system for the ubiquitous computing can be discussed as a pseudo-satellite system with low cost, a high update rate, and relatively high precision, in the places where CPS is not available.

U-City요구분석 단계에서 유비쿼터스 공간 서비스 인식을 위한 분석방법론 개발

  • Gwon O Byeong;Chon Geun Ho;kim Ji Hun;Jeong Gi Uk
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2005.12a
    • /
    • pp.349-358
    • /
    • 2005
  • Recently, developing U-City as an integrated set of ubiquitous spaces has been regarded as a promising field in realizing ubiquitous computing technology. However, well-organized requirement analyses of U-City to declare what kinds of ubiquitous space services are needed and which ubiquitous computing technology should be incorporated to come up with the needs are still insufficient. Hence, the aims of this Paper are to Propose a set of unique U-City construction philosophies and to analyze which services Should be offered in the ubiquitous Space services in U-Cities. A field survey to the citizens who are potential end users of the ubiquitous space services was conducted to analyze the success factors of U-City using CSF methodology. Focused group interview with professionals in the field of ubiquitous computing technology in Korea was then performed to identify the relationship of the ubiquitous space services and the critical success factors.

  • PDF

Design and Implementation of facility Management System based Ubiquitous (u-기반 시설물 관리 시스템 설계 및 구현)

  • Kim, Jung Jae;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.1-8
    • /
    • 2008
  • The USN is important in technique, unmanned observation using wireless network camera, detection technique that use intrusion detection sensor. But these encrypted data transmission and processing technique through sensor network, method of the staff's location recognition and arrangement aren't serviced still as a integrated system in facility security industry. This paper proposed that improve facility management, the staff present recognition and system efficiency using RFID, USN and wireless camera.

Ubiquitous Network and Wireless Embedded System with Intelligent Channel Scheduling Method (지능형 채널 할당 기법의 유비쿼터스 네트워크 및 무선 임베디드 시스템)

  • Park, Hyoung-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1336-1340
    • /
    • 2011
  • In this paper, the efficient prevention of cross talk technique for basically avoiding the confusion problem between the overlapped ubiquitous network of the other object is developed within the same area. The intelligent unified wireless network remote meter reading system of the ubiquitous ZigBee base is developed based on this technology. Therefore, in this paper, each meter reading equipments managed the information of its own adjacent ZigBee channel. The intelligent network system steadily transmitting data a relay was developed based upon this information in each region through the flexible channel conversion technique.

A Model Driven Architecture and Product Line Engineering Technique for Adaptable Contents Service of Ubiquitous Computing : Applying to Vessel U-Safety Monitoring (유비쿼터스 환경에서 적응적 컨텐츠 서비스를 위한 모델기반 아키텍처와 프로덕트라인 기법 : 선발 U-안전모니터링 시스템응용)

  • Lee, Seo-Jeong;Choi, Mi-Sook
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.32 no.4
    • /
    • pp.611-617
    • /
    • 2008
  • In ubiquitous environments, the content adaptable services can be dynamically provided to adapt the frequent changes of contexts. These services have common things that the kinds of context factors are limited to ubiquitous environment, though the contexts are flexible. To reuse service architecture can be reasonable for effective adaptable service. In this paper, we design a software architecture with product line techniques for content adaptable applications in ubiquitous environment. Description of product line is to define variation points and their variants, to find out the dependencies between them and to keep the model based architecture, their alternatives.

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF

Ubiquitous Architectural Framework for UbiSAS using Context Adaptive Rule Inference Engine

  • Yoo, Yoon-Sik;Huh, Jae-Doo
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.243-246
    • /
    • 2005
  • Recent ubiquitous computing environments increasingly impact on our lives using the current technologies of sensor network and ubiquitous services. In this paper, we propose ubiquitous architectural framework for ubiquitous sleep aid service(UbiSAS) in the subset of ubiquitous computing for refreshing of human's sleep. And we examine technical feasibility. Human can recover his health through refreshing sleep from fatigue. Ubiquitous architectural framework for UbiSAS in digital home offers agreeable sleeping environment and improves recovery from fatigue. So we present new concept of ubiquitous architectural framework dissolving stress. Specially, we apply context to context-aware framework module. This context is transferred to context adaptive inference engine which has service invocation function in intelligent agent module. Ubiquitous architectural framework for UbiSAS using context adaptive rule inference engine without user intervention is technical issue. That is to say, we should take sleep comfortably during our sleeping. And sensed information during sleeping is changed to context-aware information. This presents significant information in context adaptive rule inference engine for UbiSAS. This information includes all sleeping state during sleeping in context-aware computing technique. So we propose more effective and most suitable ubiquitous architectural framework using context adaptive rule inference engine for refreshing sleep in this paper.

  • PDF

A Quantitative Assessment Modeling Technique for Survivality Improvement of Ubiquitous Computing System (유비쿼터스 컴퓨팅 시스템의 생존성 개선을 위한 정량적 분석 모델링 기법)

  • Choi, Chang-Yeol;Kim, Sung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.633-642
    • /
    • 2005
  • Ubiquitous computing system is about networked processors, which is constructed with one or more computers interconnected by the networks. However, traditional security solution lacks a Proactive maintenance technique because of its focusing on developing the qualitative detection and countermeasure after attack. Thus, in this paper, we propose a quantitative assessment modeling technique, by which the general infrastructure can be improved and the attacks on a specific infrastructure be detected and protected. First of all, we develop the definition of survivality and modeling technique for quantitative assessment modeling with the static information on the system random information, and attack-type modeling. in addition, the survivality analysis on TCP-SYN attack and code-Red worm attack is performed for validating the proposed technique.

Ubiquitous Computing & Network Security Analysis (유비쿼터스 컴퓨팅 & 트워크 보안분석)

  • 정상일;송원덕;이원찬;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.35-42
    • /
    • 2004
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this situation we must analytics that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.struction.

  • PDF