• Title/Summary/Keyword: context aware System

Search Result 412, Processing Time 0.02 seconds

The Smart Electronic Tagging System for Sexual Offenses Prevention Context-Aware Services in Extreme Situations such as Location Unrecognized (위치인식 불가의 극한상황에서 성범죄 예방 상황인지 서비스를 위한 스마트 전자발찌 시스템)

  • Lee, Gil-Yong;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.11
    • /
    • pp.118-131
    • /
    • 2012
  • The existing electronic tagging system traces the location of a sex offender through communicating with GPS satellites and mobile phone base stations in order to prevent repeated crimes. However, the GPS satellite communication method does not work well in the interiors of downtown buildings or on the subways where it is difficult to receive satellite signals. In such cases, the location can be traced through communication with mobile phone base stations. But the distance between mobile phone base stations is several hundred meters, and as a result the margin of error for location tracing can be maximum of 2km in accuracy reduction. Take for example, if a kindergarten is located on the 2nd floor and a coffee shop and the sex offender are located on the 3rd floor in a 5-story building that is downtown, the existing electronic tagging system cannot trace the location of the sex offender as the GPS satellite communication does not work in the interior of the building and the exact floor that the sex offender is located on cannot be recognized through communication with mobile phone base stations. This occurrence is a big problem for the existing electronic tagging system, which is based on position recognition. Therefore, this study suggests a smart electronic tagging system that can monitor sex offenders by using a Ubiquitous Sensor Network in such extreme situations where position recognition is not possible.

Arbitration Method of Beacon Transmissions in a Positioning System for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 측위시스템에서 비콘의 전송 중재 기법)

  • 송문규
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.10
    • /
    • pp.35-43
    • /
    • 2004
  • An arbitration method is proposed to resolve a collision and arbitrate beacon transmissions in an indoor Positioning system consisting of multiple beacons and listeners. Although two or more beacons may compete to transmit signals simultaneously, a single winner in the competition is determined autonomously through the arbitration process while they are transmitting. So, it can continue to send its data, but the others give up their transmissions during the arbitration process. As a consequence, update rate for location information and channel utilization can be improved by avoiding that all beacons fail due to a collision. Once a beacon succeeds in transmitting its signal, a low-level priority is assigned to it. And a high-level priority is allocated to a beacon which gave up its transmission during arbitration process. This will guarantee every beacon has fair transmission opportunity with the arbitration method. As no centralized control is required among beacons, a Positioning system can still be easily deployed and expanded with this arbitration method.

A Context-Aware System for Reliable RFID-based Logistics Management (RFID 기반 물류관리의 신뢰성 향상을 위한 상황인지 시스템 개발)

  • Jin, Hee-Ju;Kim, Hoontae;Lee, Yong-Han
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.223-240
    • /
    • 2013
  • RFID(Radio Frequency Identification) is use of an RFID tag applied to object for the purpose of identification and tracking using radio waves. Recently, it is being actively researched and introduced in logistics and manufacturing. RFID portals in supply chains are meant to identify all the tags within a given interrogation zone. Hence the hardware and software mechanisms for RFID tag identification mostly focus on successful read of multiple tags simultaneously. Such mechanisms, however, are inefficient for determining moving direction of tags, sequence of consecutive tags, and validity of the tag reads from the viewpoint of workflow. These types of problems usually cause many difficulties in RFID portal implementation in manufacturing environment, there by having RFID-system developers waste a considerable amount of time. In this research, we designated an RFID portal system with SDO(Sequence, Direction, and Object-flow)-perception capability by using fundamental data supplied by ordinary RFID readers. Using our work, RFID system developers can save a great amount of time building RFID data-capturing applications in manufacturing environment.

Backlight Control on The PDA by A User's Activity and Posture (사용자의 활동과 자세에 의한 PDA의 백라이트 제어 기법)

  • Baek, Jong-Hun;Yun, Byoung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.6
    • /
    • pp.36-42
    • /
    • 2009
  • In the mobile device environment, the context-aware computing has been emerging as a core technology of ubiquitous computing. Compared with a desktop computer, a user interface and resource of mobile device is very limited. Traditional desktop-based user interface has been developed on the basis that a user's activity is static state. In contrast, mobile devices are not able to utilize representative desktop-based interaction mechanisms such as a keyboard and mouse, not only because the activity of a user is dynamic state, but mobile devices have limited resources and small LCD display. In this paper, we introduce an intelligent control system for the mobile device that can utility effectively the limited resource and complement the poor user interface by using an accelerometer being able to sense the physical activity and posture. The proposed system can estimate the user activity, static and dynamic states, and posture watching the PDA at the same time, and the proposed intelligent control system as its application, the backlight ON/OFF on the PDA, is run by the result of the user's behavior.

A Need-awaring Multi-agent Approach to Nomadic Community Computing for Ad Hoc Need Identification and Group Formation (유목커뮤니티 컴퓨팅에서 임의적 욕구파악과 그룹형성을 위한 욕구인지 다중에이전트 접근법)

  • Choi Keun-Ho;Kwon Oh-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.2
    • /
    • pp.17-32
    • /
    • 2006
  • Recently, community computing has been proposed for group formation and group decision-making. However, legacy community computing systems do not support group need identification for ad hoc group formation, which would be one of key features of ubiquitous decision support systems and services. Hence, this paper aims to provide a multi-agent based methodology to enable nomadic community computing which supports ad hoc need identification and group formation. Focusing on supporting group decision-making of relatively small sized multiple individual in a community, the methodology copes with the following three characteristics: (1) ad hoc group formation, (2) context-aware group need identification and (3) using mobile devices working in- and out-doors. NAMA-US, an RFID-based prototype system has been developed to show the feasibility of the idea proposed in this paper.

  • PDF

Recognition of Fire Levels based on Fuzzy Inference System using by FCM (Fuzzy Clustering 기반의 화재 상황 인식 모델)

  • Song, Jae-Won;An, Tae-Ki;Kim, Moon-Hyun;Hong, You-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.125-132
    • /
    • 2011
  • Fire monitoring system detects a fire based on the values of various sensors, such as smoke, CO, temperature, or change of temperature. It detects a fire by comparing sensed values with predefined threshold values for each sensor. However, to prevent a fire it is required to predict a situation which has a possibility of fire occurrence. In this work, we propose a fire recognition system using a fuzzy inference method. The rule base is constructed as a combination of fuzzy variables derived from various sensed values. In addition, in order to solve generalization and formalization problems of rule base construction from expert knowledge, we analyze features of fire patterns. The constructed rule base results in an improvement of the recognition accuracy. A fire possibility is predicted as one of 3 levels(normal, caution, danger). The training data of each level is converted to fuzzy rules by FCM(fuzzy C-means clustering) and those rules are used in the inference engine. The performance of the proposed approach is evaluated by using forest fire data from the UCI repository.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

User Dynamic Access Control for Privacy Protection in Smart Home (스마트 홈에서 프라이버시 보호를 위한 사용자 동적 접근제어)

  • Cho, Do-eun;Kim, Si-jung
    • Journal of Platform Technology
    • /
    • v.6 no.3
    • /
    • pp.17-22
    • /
    • 2018
  • Smart home is a technology for monitoring and controlling all the information about a house by integrating various home applications like cooling, heating, lighting, kitchen and security systems into a network. Although home appliances have become more convenient to use due to the development of smart home technology, they are also more vulnerable to information security hazards. Unauthorized visitors may have access to any of home appliance to arbitrarily control it or acquire information. This causes serious privacy and security problems, which should be solved to further smart home technology. This present paper proposed a dynamic user access control system for privacy protection in smart homes. The proposed system defines the role of a user of smart home services by automatically identifying the status information of the user and dynamically controls the access range for the service. In this way, the privacy of a user can be protected and the inter-smart device service is effectively provided. Consequently, the proposed dynamic user access control for smart home will improve the security service for protecting privacy in smart home devices.

Utilizing Distributed Ontology Repository in Multi-Agent System Environment (다중 에이전트 시스템 환경에서 분산된 온톨로지 저장소의 사용)

  • Kim, Sung-Tae;Jee, Kyeng-Whan;Yang, Jung-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.3
    • /
    • pp.129-139
    • /
    • 2005
  • The rapid growth of IT technologies enables the quality of human's daily life to be improved dramatically, Contrasting to the services in previous computing environment directed by user's request, the services in ubiquitous computing era of new IT technology are provided through recognizing users intention and utilizing context-aware information suited to the user. According to the contextual information, agents need to set a dynamic goal to achieve and work collaboratively with other agents. Agents that take control over their behaviors with capability of communicating with other agents become a thrust in this up-coming computing environment. This work focuses on building ontologies, shared knowledge bases among agents, to improve semantical interoperability among agents. More attention is given to the construction and effective management of ontology repository along with its requirement and organization. Ontology agent suggested takes an initiative role to manage the repository in a distributed manner and to facilitate the use of ontology in a multi-agent environment.

  • PDF