• Title/Summary/Keyword: Ubiquitous computing environment

Search Result 658, Processing Time 0.031 seconds

Tangible Sound and Interactive Technology (탠저블 사운드와 인터액티브 테크놀로지)

  • 윤중선
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.503-506
    • /
    • 2003
  • The most profound technologies are those that disappear. Silicon-based information technology, in contrast, is far from having become part of the environment. The idea of integrating computers seamlessly into the world at large runs counter to a number of present-day trends. Ubiquitous computing is not just aiming nomad multimedia. Rather, this computing environment lets us free to use computers without thinking and so to focus beyond them on new goals. In that context, Mom is such a fundamental membrane through which humans can interact with the environment. An embodied interaction paradigm, based on Mom, is investigated. Mom, space. sensing/perception, ubiquitous computing, and interactive technology are some of the key ideas to explore.

  • PDF

A Context-Aware System in Ubiquitous Environment (유비쿼터스 환경에서의 상황 인지 시스템 연구 활동 소개 도우미 - -)

  • 박지형;이승수;김성주;염기원;이석호
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.1048-1052
    • /
    • 2004
  • The ubiquitous environment is to support people in their everyday life in an inconspicuous and unobtrusive way. This requires that information of the person and her preferences, liking, and habits are available in the ubiquitous system. In this paper, we propose the context aware system that can provide the tailored information service for user in ubiquitous computing environment. The system architecture is composed of 4 domain models that can perform some pre-defined tasks independently. And we suggest the hybrid algorithm combined with fuzzy and Bayesian network to reason what information is suitable for user environment. Finally, we apply to agent based RGA(Research Guide Assistant).

  • PDF

A Study on development of the framework and prototype for user interface using Avatar (Avatar를 이용한 사용자 인터페이스의 Framework에 관한 연구)

  • Mun, Jae-Seung;Choi, Jong-Kyu;Ji, Yong-Gu
    • IE interfaces
    • /
    • v.20 no.4
    • /
    • pp.560-567
    • /
    • 2007
  • The opening of ubiquitous computing era prompted rapid increase in information transfer between human and computer. Such changes in computing environment requires new computing interface. In this paper, we develop a user interface prototype and framework using Avatar in Ubiquitous computing environment, which can support an active communication between human and computer based on context information. To develop the new interface, its conceptual framework with specific context information is designed in advance. In addition, this study suggests the future goal of user interface using Avatar by suggesting the requirements of constructed prototype.

Image capture and compression system for tiny microcontroller over Ubiquitous Environment (유비쿼터스 환경에서의 소형 마이크로 컨트롤러를 위한 영상 촬영 및 압축 시스템)

  • Song, Mi-Nan;Kim, Jae-Ho;Ahn, Il-Yeup;Kim, Tae-Hyun;Won, Kwang-Ho;Lee, Sang-Shin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.923-926
    • /
    • 2007
  • 유비쿼터스 환경에서 소형, 저전력의 임베디드 시스템은 저가로 구성되는 시스템이라는 특성으로 인해 넓고 다양한 지역에 분포될 수 있고 분포 시킬 시스템의 개수와 설치 방법등에 있어 큰 유연성을 가지고 있어 그 활용에 있어 매우 큰 잠재적인 요소를 보유하고 있다. 이러한 시스템에 채용되는 마이크로컨트롤러는 매우 제한된 메모리 용량과 낮은 클럭속도, 낮은 레벨의 연산 성능을 가지는게 일반적이다. 본 논문에서의 마이크로 컨트롤러를 위한 영상 촬영 및 압축 시스템은 이러한 소형의 마이크로 컨트롤러를 사용한 소형의 저전력 임베디드 시스템에서 사용하기 위한 목적의 영상 촬영 및 압축을 위한 시스템이다. 본 시스템은 영상을 촬영하고 촬영된 영상을 JPEG로 압축하며 이를 내부 메모리에 보관함으로써 저사양의 마이크로컨트롤러를 가지는 시스템과 낮은 데이터 전송률을 가지는 통신 환경에서도 이미지 기반의 서비스를 제공할 수 있는 환경을 제공하면서 동시에 매우 소형의 시스템으로 배터리 동작 기반의 저전력 시스템을 위한 설계로 유비쿼터스 환경의 구성에 매우 유용한 기능을 제공한다.

  • PDF

Development of Service Mobility Management Systembetween Service Gateways for Ubiquitous Environment (유비쿼터스 환경을 위한 서비스 게이트웨이간의서비스 이동 관리 시스템 개발)

  • Lee Seung-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.355-364
    • /
    • 2005
  • Ubiquitous environment can be supported by various service on networked appliance, sensors and devices. In home network and telematics, open service gateway is widely used for ubiquitous environment and Present environment for service installation, deployment and execution. Service gateway is a middle layer which is located between service and various devices in ubiquitous environment and offers a unique opportunity for pervasive computing as a potential framework for achieving interoperability between various sensors, home appliances. and networked devices. In ubiquitous environments, these services must support the mobility among service gateway because users and devices has a mobility characteristic. However the OSGi framework supports only a remote installation of a bundle, which is a unit that installs and deploys services. This paper develops a system that can manage bundles for supporting this dynamic bundle's mobility between service gateway. This system we are proposing implements a bundle form which can perform in an OSGi framework as well as manage the mobile services. As a result, mobility in a ubiquitous computing environment will be supported more efficiently.

  • PDF

Sensor Network Test Bed Construction using mica2 mote (Mica2 mote를 이용한 센서 네트워크 테스트 베드 구축)

  • 이윤경;박영수;전성익
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.61-64
    • /
    • 2003
  • Technological progress in integrated, low-power, CMOS communication devices and sensors makes a rich design space of networked sensors viable. These sensors can be deeply embedded in the physical world and spread throughout sensor network environment like smart dust. So ubiquitous computing will be come true. SmartDust project is the one of ubiquitous computing approach. It produces TinyOS, mote(mica, mica2, rene2, mica2dot, etc.), NesC, TinyDB, etc. We constructs sensor network test bed and tests to approach sensor network and ubiquitous computing.

  • PDF

The Patterns of Mobile Internet Service for Post PCs in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 포스트 PC의 모바일 인터넷 서비스 유형)

  • Kim, In-Jai;Shim, Hyoung-Seop;Jung, Min-Ho
    • Journal of Information Technology Services
    • /
    • v.6 no.3
    • /
    • pp.179-193
    • /
    • 2007
  • Mobile Internet Service has been accelerated in ubiquitous computing environment. The purpose of this study is to suggest the patterns of mobile internet services based upon the current and future environments. The types of mobile internet service are explicated on the basis of current and future usage. A two-dimensional framework using level of timeliness and service purpose is utilized for classifying mobile internet service. Future trends of mobile internet service are carefully suggested.

A Study on the Distribute Authentication Method Scheme through Authentication and Right Mechanism Trend of the Ubiquitous Environment (유비쿼터스 환경의 인증 및 권한 메커니즘 동향을 통한 분산 인증기법 방안 연구)

  • Oh, Dong-Yeol;Sung, Kyung-Sang;Kim, Bae-Hyun;Oh, Hae-Seok
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2008
  • While an information system and administration for an application that a user contacts with raise a head by an important problem, a system approach and methodology for administration are mentioned. Authentication technology of various configuration is used, but non-efficiency by complicated authentication administration and operation inappropriate use are for a successful expansion of various and new business of wire/wireless environment. In addition, under the mobile computer environment with different authentic method each other, it is difficult at all to expect flexible and continuous service. Under the ubiquitous computing environment, It is very important thing plan to research and develop compatibility and the side of variance authentication plan that preservation characteristics are helped. Hereby, This paper look around an requirement items and authority mechanism for the administration and the operation mechanism of the distributed authentication considering expansion possibility of the ubiquitous computing environment not only fixed computing environment but also mobile computing. In future, we expect it by can guide positive participation about distributed authentication technique of the genuine ubiquitous environment.

  • PDF

A Study for Security and Efficient Broadcasting of Sensor Network

  • Cho, Nam-Pil;Han, Young-Ju;Chung, Tai-Myung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.315-318
    • /
    • 2005
  • Lots of researches have been focusing on ubiquitous computing which means wherever, whenever, whatever the required information must be accessible. In ubiquitous computing environment, ubiquitous sensor network (USN) is the basis technology for gathering and transferring the required information. However sensor network characteristically has more severe vulnerability than the existing networks do. The paper presents operation of secure protocols for delivering information in secure in ubiquitous computing environment and show improvement of the secure transferring protocol.

  • PDF

The Study for Context Aware Information Retrieval in Ubiquitous Computing Environment Using UCC Resources (UCC자원을 이용한 유비쿼터스 컴퓨팅 환경에서의 상황인식 정보검색기법에 대한 연구)

  • Lee, Haesung;Kwon, Joonhee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.12-16
    • /
    • 2009
  • Exponentially increasing UCC, experiences which some people get at the specific time and in the specific location are shared on the Web more easily. Also, UCC have been more reliable and more efficient resources, because of many people's natural valuation on each UCC. UCC have potential possibility to be primary factor in all ubiquitous computing environment. However, like ubiquitous computing techniques themselves the current availability and utilization of online UCC is far from realizing their full potential. In this paper, we propose a technique that integrates existing methods from information retrieval and tagging technologies to correspond with user's underlying need for some information in ubiquitous computing environment.

  • PDF