• Title/Summary/Keyword: Ubiquitous pervasive computing

Search Result 47, Processing Time 0.026 seconds

A Study on Strategy Plan for Ubiquitous Urban Transit Total Information System (U-도시철도통합정보시스템 개발 방향 연구)

  • Chung, Jong-Duk;Pyun, Jang-Sik;An, Tae-Ki
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1543-1548
    • /
    • 2008
  • Ubiquitous technology is the trend towards increasingly ubiquitous, connected computing devices in the environment, a trend being brought about by a convergence of advanced electronic - and particularly, wireless - technologies and the internet. Ubiquitous technology is pervasive in nature and unobtrusively embedded in the environment, completely connected, intuitive, effortlessly portable, and constantly available. The object of this paper is to describe the strategy plan for Ubiquitous-Urban Transit Total Information System.

  • PDF

An U-Healthcare Implementation for Diabetes Patient based on Context Awareness

  • Kim, Jeong-Won
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.412-417
    • /
    • 2009
  • With ubiquitous computing aid, it can improve human being's life quality if all people have more convenient medical service under pervasive computing environment. In this paper, for a pervasive health care application for diabetes patient, we've implemented a health care system, which is composed of three parts. Various sensors monitor both outer and inner environment of human such as temperature, blood pressure, pulse, and glycemic index, etc. These sensors form zigbee-based sensor network. And as a backend, medical information server accumulates sensing data and performs back-end processing. To simply transfer these sensing values to a medical team may be a low level's medical service. So, we've designed a model with context awareness for more improved medical service which is based on ART(adaptive resonance theory) neural network. Our experiments show that a proposed healthcare system can provide improved medical service because it can recognize current context of patient more concretely.

The Study on the Status and Development of International Ubiquitous Computing (유비쿼터스 컴퓨팅의 실태와 발전에 관한 연구)

  • Kim Kyung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.221-231
    • /
    • 2004
  • Ubiquitous computing is not radical as Mark Weiser argues and includes things. The status of each nation is as follows. Project of America or Europe are practice for computing infra. intelligence of things and space and man-computer co-relation study, otherwise Japan centers the studying of network ubiquity utilizing computing competence. In this thesis I analyzed real status on the ubiquitous computing case study of each nation. and I proposed computing development model. factor, structured value system. five type business and technology model.

  • PDF

Service@Ubiqutous Computing

  • Oh, Jay-In
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.1-11
    • /
    • 2004
  • ◎Origin ·Mark Weiser(52-99):Xerox PARC CTO ·Ubique in Latin = Everywhere ◎Simila Terms ·Ubiquitous Network/IT ·Pervasive/Nomadic/Wearable/Disappearing Computing ◎ Characteristics ·Everywhere, Mobility ·w/o Awareness w/ Awareness tech: e.g., Speedpass of Mobil, Intelligent cart of Wal-Mart(omitted)

  • PDF

An Implementation of Cyber View schema tool for Ubiquitous Data Integration and Management (유비쿼터스 데이터 관리를 위한 Cyber View 명세화 도구개발)

  • Park, Sang-Hyun;Min, Soo-Young;Ko, Jae-Jin;Ju, Hyun-Tae
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.763-764
    • /
    • 2006
  • The rapid growth of Hardware technologies and Network fitted to us Ubiquitous Computing Life[1]. Ubiquitous Computing integrates computation into the environment, rather than having computers which are distinct objects. There are many computational things like a Sensor Network, RFID, GPS, Mobile devices, and so on. Ubiquitous Data Integration and Management are new paradigms. The goals of UDI Service Platform are data protection for the distributed data on pervasive computing devices and data distribution to appropriate users with best distribution policies. To implement the idea we evaluate the logical schema Cyber View that is a management tool.

  • PDF

Ubiquitous Computing-Driven Business Models : An Analytical Structure & Empirical Validations (유비쿼터스 컴퓨팅 기반의 비즈니스 모델에 관한 연구 : 연구 분석 프레임워크 수립 및 실증 분석)

  • Hwang Kyung Tae;Shin Bongsik;Kim Kyoung-jae
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.105-121
    • /
    • 2005
  • Ubiquitous computing(UC) is an emerging paradigm. Its arrival as a mainstream is expected to trigger innovative UC-driven business models (UCBMs). Currently, there is no Parsimonious methodology to analyze and provide diagnostics for UCBMs. With this research, we propose a analytical architecture that enables the assessment of an UCBM in its structural strengths and weaknesses. With value logic as the cornerstone, the architecture is composed of value actors, value assets, value context, business value Propositions, customer value propositions, value creation logics, and value assumptions. Dimensional variables are initially Identified based on the review of business model literature. Then, their significance is empirically examined through 14 UCBM scenarios, and variables that are expected to Play an important role in the UCBM assessment are decided. Finally, by analyzing the scenarios in terms of the dimensional variables, we attempted to summarize general characteristics of emerging UCBMs.

  • PDF

Concord: A Proactive Lightweight Middleware to Enable Seamless Connectivity in a Pervasive Environment

  • Hsu Sam;Mutha Mahesh;Pandya A.S.;Lho Young-Uhg
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.5 no.3
    • /
    • pp.189-195
    • /
    • 2005
  • One of the major components of any pervasive system is its proactive behavior. Various models have been developed to provide system wide changes which would enable proactive behavior. A major drawback of these approaches is that they do not address the need to make use of existing applications without modifying the applications. To overcome this drawback, a middleware architecture called 'Concord' is proposed. Concord is based on a simple model which consists of Lookup Server and Database. The rewards for this simple model are many. First, Concord uses the existing computing infrastructure. Second, Concord standardizes the interfaces for all services and platforms. Third, new services can be added dynamically without any need for reconfiguration. Finally, Concord consists of Database that can maintain and publish the active set of available resources. Thus Concord provides a solid system for integration of various entities to provide seamless connectivity and enable proactive behavior.

Study on mobile agents for the intrusion detection in pervasive computing environment (퍼베이시브 컴퓨팅 환경에서의 침입탐지용 모바일 에이전트에 대한 연구)

  • Oh, Byung-Jin;Um, Nam-Kyoung;Mun, Hyung-Jin;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.231-237
    • /
    • 2006
  • Pervasive computing environment is similar to the meaning of ubiquitous computing, however it is a kind of the commercial product, which is made from the collaboration between NIST and IBM. On the basis of this environment, the research of mobile agents for intrusion detection is going on in progress. In this paper, we study the research about mobile agents for the intrusion detection and then suggest scenarios using moving mobile agents based on the multiple mobile agents in the intrusion detection. Subsequently, we could figure out the problems which occurred through progress of integrity movement as a matter of the intrusion detection.

  • PDF

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Context-Awareness Scenario for Ubiquitous Environment : Case of Water Supply (유비쿼터스 환경기반의 상황인식 시나리오 연구 - 상수도 사례를 중심으로 -)

  • Jeong, Jin-Seok;Lee, Yong-Joo;Byun, In-Sun;Kim, Tae-Hoon;Song, Yong-Hak
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.2
    • /
    • pp.47-53
    • /
    • 2009
  • Recently, context-awareness computing becomes prerequisite to pervasive computing, called ubiquitous paradigm. Especially, it plays much of roll as a part of the ubiquitous infrastructures, one of three ubiquitous city components. This paper proposes the optimized procedures to deal with the various hypothetical water-leaking situations in the water supply systems. These procedures suggested in this paper will be employed to develop the context-awareness modules or models for urban infrastructure maintenance in the future works.

  • PDF