• Title/Summary/Keyword: Ubiquitous computing environment

Search Result 658, Processing Time 0.027 seconds

Context-Aware Middleware based on Ontology in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 온톨로지 기반 상황 인식 미들웨어)

  • Jung Heon-Man
    • KSCI Review
    • /
    • v.14 no.1
    • /
    • pp.165-173
    • /
    • 2006
  • To support service based on context-aware in ubiquitous computing environment, there are required context managing, context reasoning and context modeling technologies. In this paper, we propose a hierarchical ontology-based context management model and design a context-aware middleware based on this model for supporting active application adaptability and reflecting users' requirements dynamically in contextual changes. It also provides efficient support for inferencing, interpreting, acquiring and discovering various contexts to build context-aware services and presents a resolution method for context conflict which is occurred in execution of service. The proposed middleware can support the development and operation of various context-aware services, which are required in the ubiquitous computing environment.

  • PDF

Personal Kiosk : A Mobile Service Model for Ubiquitous Computing Environment (Personal Kiosk : 유비쿼터스 컴퓨팅 환경을 위한 모바일 서비스 모델)

  • Park Jeong-Kyu;Seo Seung-Ho;Kim Yang-Nam;Lee Keung-Hae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.3
    • /
    • pp.170-182
    • /
    • 2006
  • Last few years have seen a rapid increase in research on ubiquitous computing. Ubiquitous computing is often touted as a technology that will make computing available to the user anywhere and anytime. One important problem to be addressed in building such a ubiquitous computing environment is how to manage services and deliver them to the user in an effective manner. This paper presents our model called Personal Kiosk(PK) as a way of solving the problem. PK is a model of ubiquitous service provisioning that enables the user to use desired services anytime and anywhere. The design and implementation of the current PK in the 'Local Area' setting with related technical issues are also presented. A location-sensing technique for indoor users and a personalized service provisioning based on user location and privileges are discussed in detail.

A Study for Electronic Surveillance (REID, CCTV, Electronic Resident Card) in Augmented Reality Environment (증강현실 환경 하에서 전자감시(REID, 감시카메라, 전자주민카드)에 관한 소고)

  • Kang, Jang-Mook;Jung, Jo-Nam;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.7 no.2
    • /
    • pp.75-82
    • /
    • 2006
  • Ubiquitous Computing is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous Computing. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the information revolution that Cyber Space saw a prime while world wide web service was expanded was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous Computing revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. This paper checks the present situation of currently proceeding Ubiquitous computing technology(RFID, CCTV) in augmented reality environment. Also, The main purpose of this paper is to analyze the concepts analysis of privacy, personal information, and electronic surveillance in augmented reality environment. Thus this paper treated the analysis of case, technological issue, problem and solution and so on.

  • PDF

Ubiquitous Computing Strategy and Policy (유비쿼터스 컴퓨팅 전략 및 정책)

  • Kim, Wan-Seok;Kim, Jeng-Kuk;Park, Bum-Soo
    • Journal of Digital Convergence
    • /
    • v.1 no.1
    • /
    • pp.93-112
    • /
    • 2003
  • This thesis reviewed following issues that are required in the policies and reaction strategies in the ubiquitous computing environment that continuously create domino effect of changes on the technology, services and business models. - Search for solutions in relation to timing difference of customer needs and emerging technology. - Deployment of management structure that is capable to adapt and react to environmental changes - Re-establishment or re-structuring of policies with the changes to portfolios. Thus, for the IT industry and ubiquitous computing strategies and policies which is based on intangble services and businesses that are accompanied with domino effect changes, must firstly consider above factors then establish the systematic architecture.

  • PDF

Empirical Study on the Ubiquitous Computing Characteristics Affecting the Use of U-Service (U-서비스 이용에 영향을 미치는 유비쿼터스 특성에 관한 실증연구)

  • Jang, Ki-Sup;Kim, Chang-Su;Kim, Ki-Su
    • The Journal of Information Systems
    • /
    • v.16 no.4
    • /
    • pp.51-73
    • /
    • 2007
  • Ubiquitous computing is enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user. To facilitate the successful adoption and diffusion of ubiquitous computing, it is necessary to figure out the factors affecting the use of U-service. Though the research related to ubiquitous computing has been vigorously conducted from the aspect of system and service provider, there have been very few studies that focus on the user's perspective. Therefore, this study attempts to figure out major factors which are dedicated to the development of ubiquitous computing and u-service, and that ultimately influence the u-business outcome. This study derived the factors that characterize u-service, such as ubiquity, contextual offer, reliability, invisibility, and confidentiality, which are then combined in the TAM model and carry out the path analysis. The research findings indicate that ubiquity affects both the perceived usefulness and perceived ease of use. The reliability and confidentiality were found to affect the perceived usefulness, whereas the contextual offer and invisibility turned out to influence the perceived ease of use. Finally, the relationship among the perceived usefulness, perceived ease of use, and the attitude toward using are identical with the previous research findings related to the technology acceptance model(TAM).

  • PDF

Dynamic Access Control for Personalized Environment in Ubiquitous Computing

  • Kim, Yuna;Shin, IlShik;Hong, Sung Je;Kim, Jong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.4
    • /
    • pp.233-241
    • /
    • 2007
  • In an ubiquitous environment, for controlling user access according to environment of users, a number of access control models enforcing dynamic environment of users have been proposed. However, they do not support personalized environments of each user and have a run-time overhead of searching active roles. In this paper, we propose a new model, PE-RBAC, that extends the RBAC architecture by addition of a personalized environment component as a constraint to accommodate dynamic and mobile users. In this model, a dynamic role activation is presented by using a new role-to-environment structure instead of the conventional role hierarchy, which makes it efficient to find the active roles according to a user's personalized environment.

  • PDF

Implementation of Context-Aware Middleware for Sensor Network in Ubiquitous Environment

  • Kim Bo-Seong;Lee Byoung-Hoon;Kim Jai-Hoon
    • International Journal of Contents
    • /
    • v.2 no.1
    • /
    • pp.9-16
    • /
    • 2006
  • Recently many researches are investigating for ubiquitous computing and network. In the real world many sensor devices must be equipped to provide many services for users. To make computing environment easy and more user friendly, middleware system not only hides all complexities (network, system, services, etc), but also needs to have efficient context inference scheme and system reconfiguration capability. In this paper we suggest context-aware middleware design for sensor network which provides efficient computing environment for end-users. We also present XML based implementation of our system.

  • PDF

Mobile Computing Algorithm on IEEE 802.11b for Ubiquitous Computing

  • Kim, Wu-Woan
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.1
    • /
    • pp.11-24
    • /
    • 2008
  • In this paper, the patterns of movement used in the mobile communication systems are adopted in the mobile computing environment to reduce handover delay and to support seamless handover for MIPv6 based on IEEE 802.11 networks. That is, RtSolPr message and PrRtAdv message can be treated before handover. As the result, it is possible to assign NCoA to MN and Next Access Router(NAR) before handover starts. This can minimize handover delay and reduce the total handover delay.

  • PDF

A Feature-based Method to Identify Services in Ubiquitous Environment (유비쿼터스 환경에서 피쳐 기반 서비스 식별 방법)

  • Shin, Hyun-Suk;Song, Chee-Yang;Kang, Dong-Su;Baik, Doo-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.37-49
    • /
    • 2008
  • Services are reusable units in business level. Ubiquitous computing provides computing services anytime and anywhere. The combination of both is becoming an important paradigm of computing environment. Fundamentals of services require flexibility and interoperability, and key elements of ubiquitous modeling require interoperability and context-awareness. There are two kinds of methods to identify services. The top-down approach is based on business process, and the bottom-up approach is based on components. The first approach depends on experts' intuitions, while the second approach suffers the incapability of expressing non-functional expression through components. Although a feature-based approach is capable of expressing non-functional expression and identifying services in ubiquitous environment, the research on this issue is not adequately addressed by far. To promote this research, this paper proposes a feature-based method to identify services in ubiquitous computing. The method extracts initial-candidate-services from a feature model. Then, the ultimate services are identified through optimizing and analyzing the candidate-services. The proposed method is expected to enhance the service reusability by effectively analyzing ubiquitous domain based on feature, and varying reusable service units.

  • PDF

New Paradigm of e-Logistics System Management - An Proactive u-Logistics System Based on Ubiquitous Technology -

  • Hwang Heung-Suk;Cho Gyu-Sung
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.153-158
    • /
    • 2006
  • The emergence of ubiquitous autonomic computing and network environment will change the service architecture information system which will be a new application area in SCM/logistics systems. In this study we surveyed the technical trend map of ubiquitous and its application in SCM/logistics support system design. We described the evolutional model of ubiquitous computing community for SCM/logistics system. It is consisted of three view points; self-growing, autonomic, and context-aware, which will allow the decision makers to be benefited from web and mobile technology and are useful for proactive SCM/logistics support system. Finally, we suggested a cooperative research planning for the development ubiquitous system between the government research center, university, and industry research activities.

  • PDF