• Title/Summary/Keyword: Ubiquitous access

Search Result 406, Processing Time 0.034 seconds

The application of Ubiquitous Technology To The Remote Control System for Unmanned Power Plant (무인원격발전소 원격제어시스템 유비쿼터스 기술적용 방안)

  • Ahn, Byung-Woo;NamKung, Bung;Ka, Pil-Sun;Go, Young-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.1674_1675
    • /
    • 2009
  • This paper aims to analyze characteristics of Network administration and its security and study a method of applying new Ubiquitous technology which can raise up the stability and efficiency of remote control systems in unmanned power plants so that the states of systems are recognized by unrestricted and diverse access in the ubiquitous circumstance and services wanted are supplied for anyone to access to them anytime and anywhere.

  • PDF

Diet Contents using Ubiquitous Computing -A Case Study on the Mobile Contents of C Company- (유비쿼터스 컴퓨팅을 이용한 다이어트 컨텐츠 - C사의 모바일 컨텐츠 사례 -)

  • Jeon Geonho;Kim Giun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.233-238
    • /
    • 2004
  • Thanks to the recent rapid development of the Internet, we can access networks whenever we like and wherever we are. This development allows access to desired information on a truly global scale. This thesis investigates the case of Diet Contents to use the mobile service in the era of Ubiquitous Computing. Also this study suggests foundations for the development of more varied and effective mobile contents, which can provide audio and video information as well as simple text information.

  • PDF

The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing

  • Zhang, Zhijun;Lim, HyoTaek;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.1
    • /
    • pp.15-20
    • /
    • 2015
  • The limited battery power in the mobile environment, lack of sufficient wireless bandwidth, limited resources of mobile terminals, and frequent breakdowns of the wireless network have become major hurdles in the development of mobile cloud computing (MCC). In order to solve the abovementioned problems, This paper propose a proxy-based MCC framework by adding a proxy server between mobile devices and cloud services to optimize the access to cloud services by mobile devices on the network transmission, application support, and service mode levels. Finally, we verify the effectiveness of the developed framework through an experimental analysis. This framework can ensure that mobile users have efficient access to cloud services.

BcN Based Ubiquitous Network (광대역 통합망 기반 유비퀴터스 네트워크)

  • Shin, Yong-Sik;Park, Yong-Gil;Chung, Won-Suk
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.2
    • /
    • pp.81-89
    • /
    • 2004
  • In this paper, we describe ubiquitous environments and the trend of convergence that is an evolution path of. current telecommunication, and show the concept of broadband convergence network, service feature and evolution path. In order to converge wire and wireless communication, telecommunication and broadcasting, voice and data efficiently, broadband convergence network divides a network into service layer, control layer, transport layer, ubiquitous access and terminal layer. Broadband convergence network will be a network that can provide and control broadband multimedia services with QoS and security of different and customized level. Then we depict characteristics and types of broadband multimedia service, and describe the characteristic of broadband convergence network. Finally, we show ubiquitous network based on the broadband convert- gence network to provide ubiquitous service which is a future telecommunication service. We also describe requirements of ubiquitous network such as an intelligent and context based platform, convergence terminals, ubi- quitous computing devices, etc.

  • PDF

Greedy Heuristic Resource Allocation Algorithm for Device-to-Device Aided Cellular Systems with System Level Simulations

  • Wang, Xianxian;Lv, Shaobo;Wang, Xing;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1415-1435
    • /
    • 2018
  • Resource allocation in device-to-device (D2D) aided cellular systems, in which the proximity users are allowed to communicate directly with each other without relying on the intervention of base stations (BSs), is investigated in this paper. A new uplink resource allocation policy is proposed by exploiting the relationship between D2D-access probability and channel gain among variant devices, such as cellular user equipments (CUEs), D2D user equipments (DUEs) and BSs, etc., under the constraints of their minimum signal to interference-plus-noise ratio (SINR) requirements. Furthermore, the proposed resource-allocation problem can be formulated as the cost function of "maximizing the number of simultaneously activated D2D pairs subject to the SINR constraints at both CUEs and DUEs". Numerical results relying on system-level simulations show that the proposed scheme is capable of substantially improving both the D2D-access probability and the network throughput without sacrificing the performance of conventional CUEs.

An Access Log Management System by User Directed Managing in Ubiquitous Environment (유비쿼터유비쿼터스 환경에서 프라이버시 보호를 위한 사용자 직접 관리 방식의 접근 기록 관리 시스템)

  • Lee, J.;Kim, S.
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.269-273
    • /
    • 2008
  • In ubiquitous environments, clients move between domains freely and its activities in the other domains are growth. Like this environment, the service provider makes access or activity records what they are provided to clients. This record can make a privacy problem to recognize a person or trace some works. So this record must be kept and managed by user instead of the service provider. In this paper, we propose a system that can gather those records from the service provider to home domain server which client's managing by themselves. In addition, if remote domain manager requests that record by the legal process, system can transfer only a range of information which allowed by client to keep personal privacy.

  • PDF

A Study on Preference of the Consumer for Multimedia Contents Service in Communication and Broadcasting Convergent Environment (통방 융합 환경 멀티미디어 콘텐츠 서비스를 위한 소비자 선호도 연구)

  • Kim Kwang-Yong;Kim Jae-Gon;Han Hyun-Soo;Park Sun-Young
    • Journal of Broadcast Engineering
    • /
    • v.11 no.1 s.30
    • /
    • pp.130-137
    • /
    • 2006
  • In this paper. we introduce technologies that service multimedia contents (in brief, we call it UCA (Ubiquitous Contents Access)) to end consumer that have various communication terminal on communication & broadcasting convergence environment and propose system that this technologies are applied. Also, we analyzed relative advantage and playfulness of service technology that is looked in consumer side about proposed service technology. When analyzed relative advantage and playfulness in consumer's view point, proposed communication & broadcasting convergence service model could see that is worth service that consumer can prefer.

A Quantitative Analysis of System-Level Performance of the Wireless LAN in Digital Home Environments

  • Son, Byoung-Hee;Kim, Hag-Bae
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.1
    • /
    • pp.51-55
    • /
    • 2008
  • A digital home is a ubiquitous environment that is expected to be realized in the near future. All information appliances in a house are connected to each other through wired and/or wireless home networks. Authenticated user can access the various services provided by the digital home, and the access is not restricted by equipment, time, or location. The technologies that form the digital home can be grouped into two categories: wired networking technologies and wireless networking technologies. For the purpose of ubiquitous environments, wireless-networks offer suitable and seamless high-quality services. A wireless LAN can be created simply by equipping a single access point. For that reason, the cost of establishing such a network is low and using it is easy. Of course, there is an exciting new wireless technology. It is the Ultra Wide Band (UWB). However, it is not enough to bring wireless convenience, although offering a broad range of high-speed data transfer capabilities, Because of unstable. Thus, of the wireless-networking systems, we focus on the wireless LAN. We quantitatively analyze its capabilities. The dynamic and adaptive wireless LAN provides a foundation for the evolution toward the next generation of wireless and adaptive networks. The difference between wired LAN and wireless LAN in upload and download rates is small. Although the wireless LAN experiences a greater loss rate than the wired LAN, the difference is minimal. We conclude that a wireless LAN is suitable for use in an apartment environment.

  • PDF

A Multi-hop routing protocol for bluetooth devices (블루투스 멀티 홉 라우팅 프로토콜)

  • Yang, Il-Sik;Kim, Myung-Gyu;Son, Ji-Yeon;Park, Jun-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.448-450
    • /
    • 2005
  • A ubiquitous network allows all users to access and exchange information of any kind freely at any time, from anywhere, and from any appliance through the use of broadband and mobile access. Bluetooth commincation can provide the missing wireless extension to the heterogeneous network, allowing a more ubiquitous access. In this point of view, the BT specifications define ways for which each BT device can set up multiple connections with neighboring devices to communicate in a multi-hop fashion. this paper provides insights on the Bluetooth technology and on some limitations of the scatternet formations. so that, we describe a new multi-hop routing protocol for the establishment of scatternets. this protocol defines rules for forming a multi-hop topology in two phases. the first phase, topology discovery, concerns the discovery of the node's depth from a root node initiating inquiry process. the second phase forms scatternet topology based on the result of topology discovery.

  • PDF

A Study on An Real-time Identifying User Location System based on AP in Wireless LANs (무선랜 AP를 기반으로 한 실시간 위치추적시스템에 관한 연구)

  • Choi, Jae-Hyun;Park, Jae-Won;Shin, Young-Woo;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.9 no.3
    • /
    • pp.145-161
    • /
    • 2010
  • Recently, identifying user locations is becoming important as the society evolves into an ubiquitous society with the innovation of information technology. Particularly, many researches on identifying user locations are headed in direction to identify locations of users in the indoors, because a GPS that is widely used to identify the locations of users in the outdoors is inapplicable in the indoors. However, those researches are mostly not useful to general indoor environment because they are performed in a specific environment with specialized or customized devices such as UWB, RFID. Therefore, in this paper we propose a effective method to identify user locations in general indoor environments with wireless local network access points. Our approach enables to identify user location efficiently by measuring signal power of access points around the user and using the FRIIS formula which is used to calculate the distance among the things.