• Title/Summary/Keyword: Ubiquitous access

Search Result 406, Processing Time 0.03 seconds

Development of Web-Based Experiments for Undergraduate Mechatronics Education

  • KIM, Young-Suk;Yang, Seung-Han
    • Educational Technology International
    • /
    • v.14 no.2
    • /
    • pp.215-228
    • /
    • 2013
  • In engineering education practical experiments is very important for each student, but due to the limitation of time and available resources such as laboratory equipment, space and instructors enough hands-on real experiments could not be provided to all students enrolled in the program throughout the academic year. In this sense web-based remote experiments through internet become a solution for engineering education and an emerging new paradigm for students and teachers. This paper presents the development of the web-based remote vibration experiment system for mechatronics education. Students can access this experimental equipment through an internet and conduct vibration experiment remotely without any restriction on time and place. IP address for data communication and web-service are assigned in local computer and then students receive experimental results and the captured pictures using network. The developed system provides real-time feedback of the tested results. Ubiquitous access to the system gained popularity from students.

Improved Access Control using Context-Aware Security Service (상황인식 보안 서비스를 이용한 개선된 접근제어)

  • Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.133-142
    • /
    • 2010
  • As the ubiquitous technology has penetrated into almost every aspect of modern life, the research of the security technology to solve the weakness of security in the ubiquitous environment is received much attention. Because, however, today's security systems are usually based on the fixed rules, many security systems can not handle diverse situations in the ubiquitous environment appropriately. Although many existing researches on context aware security service are based on ACL (Access Control List) or RBAC (Role Based Access Control), they have an overhead in the management of security policy and can not manipulate unexpected situations. Therefore, in this paper, we propose a context-aware security service providing multiple authentications and authorization from a security level which is decided dynamically in a context-aware environment using FCM (Fuzzy C-Means) clustering algorithm and Fuzzy Decision Tree. We show proposed model can solve typical conflict problems of RBAC system due to the fixed rules and improve overhead problem in the security policy management. We expect to apply the proposed model to the various applications using contextual information of the user such as healthcare system, rescue systems, and so on.

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

Analyses of Wireless Network Security in Heterogeneous Environments (이종 시스템 환경하에서의 무선 네트워크의 보안 대책)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.717-720
    • /
    • 2007
  • With the convergence of mobile devices and the Internet ubiquitous computing promises to revolutionalize the way that we access services and run application. However, ubiquitous computing environments, in particular, mobile and wireless environments interfaced with the Internet, currently possess security vulnerabilities that are ripe for attack from cyber-threats. Thus, this paper discusses the Limitation of current security mechanisms in ubiquitous computing environments

  • PDF

A Study of Developing the Ubiquitous Library for the Improvement of Information Accessability of the Blind (시각 장애인의 정보접근성 향상을 위한 유비쿼터스 도서관 구축에 관한 연구)

  • Bae Kyung-Jae;Kwak Seung-Jin
    • Journal of Korean Library and Information Science Society
    • /
    • v.37 no.2
    • /
    • pp.273-290
    • /
    • 2006
  • Recently, a digital divide has gotten worse in the information age. So LG Sangnam library developed the ubiquitous library for the improvement of information accessability of the blind. It utilizes a mobile phone applied with NFC (Near Field Communication) technology and automates a user's identification process and serve library services at anytime from anywhere. Users can use three access points of a web service, a mobile service and a telephone library service. As a conclusion of this paper. Several recommendations were proposed. For the development of ubiquitous library, various instruments should be considered to diversify user's access points and a usability test and analysis about user's environmental context should be done simultaneously.

  • PDF

Design and Implementation of an Ubiquitous Manufacture Execution System based on RFID/USN (RFID/USN 기반의 유비쿼터스 제조실행시스템 설계 및 구현)

  • Jung, Se Hoon;Kim, Kyung Jong;Sim, Chun Bo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.21-31
    • /
    • 2010
  • A manufacturing execution system in the process according to automation system of installation management has been growing interest about effective system design and effective system manage. In this paper, we propose an ubiquitous Manufacturing Execution System based on RFID/USN for checkup monitoring and history management of installation in manufacturing execution systems. For this, we design and implement installation history and statistics management system based on RFID grafting RFID for efficient installation equipment history and statistics management of ubiquitous Manufacturing Execution System, and was implemented checkup monitoring system based on USN using temperature sensor, humidity sensor, hydraulic pressure sensor for failure prevention of ubiquitous Manufacturing Execution System. And proposed ubiquitous Manufacturing Execution System is implemented based on JSP for access through Web in real time.

A Study on Organizational Structure and Computer Security Systems in Ubiquitous Environments (유비쿼터스 서비스 경영 환경에서 조직 구조 및 컴퓨터 보안 시스템에 관한 연구 - 외식 업체 적용 방안을 중심으로 -)

  • Yi, Myoung-Hee;Yu, Jae-Eon;Jung, Chang-Duk
    • Culinary science and hospitality research
    • /
    • v.13 no.4
    • /
    • pp.305-316
    • /
    • 2007
  • This paper examines that a desirable organizational structure for a security policy in ubiquitous environments that are based on users' need to know and do their tasks in organizations. Tasks are a common entity which already exit and relate directly to both users(who are assigned to tasks and to information required for the completion of a task). Ubiquitous is highlighted as IT paradigm of the future generation. We propose a security model, called the Ubiquitous Group Security Model(UGSM), which associates with a task of processing the information which users need to know. The access type specification restricts the operations that users are permitted to perform, as defined by users' need to do for achieving their tasks in organizations.

  • PDF

Server-Aided Delegation in Ubiquitous Computing Environment

  • Shim Mi Sun;Yang Jong-Phil;Rhee Kyung Hyune
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.52-56
    • /
    • 2004
  • Computing today is becoming ubiquitous. In such ubiquitous computing environments, entities expect to access resources and services at any time from anywhere. Therefore, the question rises of how to establish trust relationship in previously unknown devices or resources with such environment. After reviewing a model to delegate trust to communicating entities in ubiquitous environment and its security problems, we present a new model for secure delegation over communication entities. We adopt two-party signature scheme as cryptographic primitives. Additionally, we apply threshold cryptosystems to our model for more secure enhancement.

  • PDF

Design of Gateway for In-vehicle Sensor Network

  • Kim, Tae-Hwan;Lee, Seung-Il;Hong, Won-Kee
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.73-76
    • /
    • 2005
  • The advanced information and communication technology gives vehicles another role of the third digital space, merging a physical space with a virtual space in a ubiquitous society. In the ubiquitous environment, the vehicle becomes a sensor node, which has a computing and communication capability in the digital space of wired and wireless network. An intelligent vehicle information system with a remote control and diagnosis is one of the future vehicle systems that we can expect in the ubiquitous environment. However, for the intelligent vehicle system, many issues such as vehicle mobility, in-vehicle communication, service platform and network convergence should be resolved. In this paper, an in-vehicle gateway is presented for an intelligent vehicle information system to make an access to heterogeneous networks. It gives an access to the server systems on the internet via CDMA-based hierarchical module architecture. Some experiments was made to find out how long it takes to communicate between a vehicle's intelligent information system and an external server in the various environment. The results show that the average response time amounts to 776ms at fixec place, 707ms at rural area and 910ms at urban area.

  • PDF

A Survey of Self-optimization Approaches for HetNets

  • Chai, Xiaomeng;Xu, Xu;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.1979-1995
    • /
    • 2015
  • Network convergence is regarded as the development tendency of the future wireless networks, for which self-organization paradigms provide a promising solution to alleviate the upgrading capital expenditures (CAPEX) and operating expenditures (OPEX). Self-optimization, as a critical functionality of self-organization, employs a decentralized paradigm to dynamically adapt the varying environmental circumstances while without relying on centralized control or human intervention. In this paper, we present comprehensive surveys of heterogeneous networks (HetNets) and investigate the enhanced self-optimization models. Self-optimization approaches such as dynamic mobile access network selection, spectrum resource allocation and power control for HetNets, etc., are surveyed and compared, with possible methodologies to achieve self-optimization summarized. We hope this survey paper can provide the insight and the roadmap for future research efforts in the self-optimization of convergence networks.