• Title/Summary/Keyword: pervasive

Search Result 419, Processing Time 0.023 seconds

Vision and Research Challenges of the Next Generation Knowledge Management Systems : A Pervasive Computing Technology Perspective (편재형 컴퓨팅 기술을 적용한 차세대형 지식경영시스템의 비전과 연구 이슈)

  • Yoo, Keedong;Kwon, Ohbyung
    • Knowledge Management Research
    • /
    • v.10 no.1
    • /
    • pp.1-15
    • /
    • 2009
  • As pervasive computing technology, which aims to get linked to useful knowledge, information or services anytime, anywhere, using any devices and/or artifacts, is proliferating, desirable impacts on knowledge management systems are now available. The pervasive computing technology will potentially enable the knowledge management systems to realize individualization and socialization and ultimately increase the knowledge processing productivity. However, researchers who apply the pervasive computing methodologies to novel way of knowledge management have been very few. These result in unsatisfactory consideration of establishing pervasive knowledge management systems. Hence, the purpose of this paper is to cast the vision of pervasive knowledge management and search for a couple of possible research issues and possibilities. This paper suggests a framework of ubiDSS, an amended knowledge management system for the next generation deploying pervasive and autonomous knowledge acquisition capabilities of ubiquitous computing technologies. Also the CKAM, context-based knowledge acquisition module, is illustrated as a prototype of future knowledge management systems.

  • PDF

Authentication Mechanism for Pervasive Computing Environments (Pervasive Computing 환경을 위한 인증기법에 관한 연구)

  • 정철현;송주석
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.35-38
    • /
    • 2002
  • 시대의 흐름에 따라 컴퓨팅 환경에서도 많은 변화가 이루어져 왔다. 이는 컴퓨팅 환경이 초기 독립적인 환경에서 네트워크를 이용한 분산환경으로, 이이서 무선통신을 이용한 이동통신으로 발전되어 왔음을 의미한다. 이에 따라, 언제/어디에서나 원하는 자원에 접근할 수 있는 환경이 제공되게 되었고, 이동성을 지원하는 Mobile IP, Ad Hoc 등의 개념에 의해 제한된 환경에서의 컴퓨팅이 아닌 이동이 가능한 환경에서의 컴퓨팅으로 확장되기에 이르렀다. 현재에 이르러서는 디바이스의 소형화를 통해 사용자의 이동성을 극대화시키는 개념인 “Pervasive Computing”에 대한 연구가 활발히 진행 중에 있다. 이러한 Pervasive 컴퓨팅 환경에서도 보안기능에 대한 기능이 최근 중요시되고 있다. 특히 pervasive computing 환경은 기존의 컴퓨팅 환경과는 차별화 되는 특징들을 내포하고 있기 때문에 상호 인증의 제공이 필요하다. 본 논문에서는 Pervasive Computing 환경에서 현재 진행중인 인증 기법에 대한 연구들을 알아본 후, 이러한 인증기법들의 취약점을 보완할 수 있는 상호 인증을 고려한 새로운 인증 기법을 제안하고자 한다.

  • PDF

The Fourth Industrial Revolution and Multimedia Converging Technology: Pervasive AR Platform Construction using a Mobile Robot based Projection Technology (4 산업혁명과 멀티미디어 융합 기술 : 모바일 로봇 기반 이동형 프로젝션 기술을 이용한 Pervasive AR 플랫폼 구축)

  • Chae, Seungho;Yang, Yoonsik;Han, Tack-Don
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.298-312
    • /
    • 2017
  • The fourth industrial revolution is expected to show technological innovation that develops among different fields beyond boundaries through the convergence and integration of fields. With the development and convergence of digital technology, users can receive information anywhere in the world. In this paper, we propose an adaptive interaction concept in a various environment by using a mobile robot based on projection augmented reality (AR). Most previous studies have aimed fixed projector or projection for a pre-designed environment. Thus, they provide only limited information. To overcome the abovementioned problem, we provide the adaptive information by implementing a projection AR system that can be mounted on the mobile robot. For that, the mobile robot based on the projection system was defined as Pervasive AR. Pervasive AR is configured with a pervasive display, a pervasive interface, and seamless interaction. The Pervasive AR technology enables the user to access information immediately by expanding the display area into real space, which implies an environment of intuitive and convenient interaction by expanding the user interface. This system can be applied to various areas, such as a home environment and a public space.

A Pervasive P3P Negotiation Mechanism for Robust Ubiquitous services

  • Kwon, Oh-Byung
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.411-416
    • /
    • 2007
  • Only a few P3P-based privacy aware systems address the discrepancy between a service provider's privacy policy and the user's typical concerns-hence, putting service usage at risk. Moreover, since users are typically nomadic in pervasive computing services, their specific privacy concerns would dynamically change according to the surrounding context. This leads us to develop a dynamically adjusting P3P-based policy for a personalized, privacy-aware service as a core element of secure pervasive computing. Hence, the purpose of this paper is to propose a pervasive P3P-based negotiation mechanism for privacy control which functions in a dynamic and flexible way.

  • PDF

A Unified Trust Model for Pervasive Environments - Simulation and Analysis

  • Khiabani, Hamed;Idris, Norbik Bashah;Manan, Jamalul-Lail Ab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1569-1584
    • /
    • 2013
  • Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by known and even unknown parties. Huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to calculate the trust level of each party precisely. Trusted computing enables effective solutions to verify the trustworthiness of computing platforms. In this paper, we elaborate Unified Trust Model (UTM) which calculates entity's trustworthiness based on history, recommendation, context and platform integrity measurement, and formally use these factors in trustworthiness calculation. We evaluate UTM behaviour by simulating in different scenario experiments using a Trust and Reputation Models Simulator for Wireless Sensor Networks. We show that UTM offers responsive behaviour and can be used effectively in the low interaction environments.

Proactive Friend Recommendation Method using Social Network in Pervasive Computing Environment (퍼베이시브 컴퓨팅 환경에서 소셜네트워크를 이용한 프로액티브 친구 추천 기법)

  • Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.43-52
    • /
    • 2013
  • Pervasive computing and social network are good resources in recommendation method. Collaborative filtering is one of the most popular recommendation methods, but it has some limitations such as rating sparsity. Moreover, it does not consider social network in pervasive computing environment. We propose an effective proactive friend recommendation method using social network and contexts in pervasive computing environment. In collaborative filtering method, users need to rate sufficient number of items. However, many users don't rate items sufficiently, because the rating information must be manually input into system. We solve the rating sparsity problem in the collaboration filtering method by using contexts. Our method considers both a static and a dynamic friendship using contexts and social network. It makes more effective recommendation. This paper describes a new friend recommendation method and then presents a music friend scenario. Our work will help e-commerce recommendation system using collaborative filtering and friend recommendation applications in social network services.

Expressive Exceptions for Safe Pervasive Spaces

  • Cho, Eun-Sun;Helal, Sumi
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.279-300
    • /
    • 2012
  • Uncertainty and dynamism surrounding pervasive systems require new and sophisticated approaches to defining, detecting, and handling complex exceptions. This is because the possible erroneous conditions in pervasive systems are more complicated than conditions found in traditional applications. We devised a novel exception description and detection mechanism based on "situation"- a novel extension of context, which allows programmers to devise their own handling routines targeting sophisticated exceptions. This paper introduces the syntax of a language support that empowers the expressiveness of exceptions and their handlers, and suggests an implementation algorithm with a straw man analysis of overhead.

Framework Design of Pervasive Computing System for Inter Space Interactions between Private and Public Smart Spaces

  • Lim, Shin-Young;Chung, Lawrence;Helal, Sumi;Yang, Hen-I
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.9 no.3
    • /
    • pp.198-205
    • /
    • 2009
  • In this paper, design of framework architecture of pervasive computing system providing seamless inter space interactions between private and public smart spaces is presented. The seamless inter space interaction issues are related to establishing user's service environment by allocating relevant resources in a new location where there are no prior settings for the user or where there are current users already being served in the new location. In the realm of pervasive computing, we can have different types of smart spaces, offering proactive and intelligent services, which are islands of smart spaces independent from each other. As users move about, they will have to roam from private smart space to public smart space and vice versa. When they enter a new island of smart space, they will have to setup their devices and service manually to get the same or different services they had at the previous location. Users might be living in a non-pervasive computing environment because this manual operation is inappropriate to its generic features of proactive and intelligent services of pervasive computing. The framework architecture will provide seamless inter space interactions initiated by changes in users' location to acquire negotiations of resources for new and current residents regarding service provision with limited available networked devices.

Inter-space Interaction Issues Impacting Middleware Architecture of Ubiquitous Pervasive Computing

  • Lim, Shin-Young;Helal, Sumi
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.1
    • /
    • pp.42-51
    • /
    • 2008
  • We believe that smart spaces, offering pervasive services, will proliferate. However, at present, those islands of smart spaces should be joined seamlessly with each other. As users move about, they will have to roam from one autonomous smart space to another. When they move into the new island of smart space, they should setup their devices and service manually or not have access to the services available in their home spaces. Sometimes, there will conflicts between users when they try to occupy the same space or use a specific device at the same time. It will also be critical to elder people who suffer from Alzheimer or other cognitive impairments when they travel from their smart space to other visited spaces (e.g., grocery stores, museums). Furthermore our experience in building the Gator Tech Smart House reveals to us that home residents generally do not want to lose or be denied all the features or services they have come to expect simply because they move to a new smart space. The seamless inter-space interaction requirements and issues are raised automatically when the ubiquitous pervasive computing system tries to establish the user's service environment by allocating relevant resources after the user moves to a new location where there are no prior settings for the new environment. In this paper, we raise and present several critical inter-space interactions issues impacting middleware architecture design of ubiquitous pervasive computing. We propose requirements for resolving these issues on seamless inter-space operation. We also illustrate our approach and ideas via a service scenario moving around two smart spaces.

The Difference of Duration of Post-rotatory Nystagmus Test Between Normal Children and Children With Pervasive Developmental Disorder (비장애 아동과 전반적 발달장애 아동에서 회전 후 안구진탕 기간의 비교)

  • Kim, Jin-Mi;Song, Ji-Won;Hong, Eung-Kyoung;Kim, Sung-Hee;Kim, Kyeong-Mi
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.3 no.1
    • /
    • pp.1-11
    • /
    • 2005
  • Objective : The purpose of this study was to get the mean of duration of post-rotatory nystagmus test in normal children and to differentiate the duration of post-rotatory nystagmus test between normal children and children with pervasive developmental disorder. Method : 84 subjects were between 3 and 5 years of age and consisted of 64 normal children and 20 children with the pervasive developmental disorder. Analysis of the data was done by using t-test and ANOVA. Results : The results were as follows: 1. Range of duration of post-rotatory nyatagmus test in normal children was $5{\sim}22$second on left and $7{\sim}21$ second on right and the mean was 12.63 second on left and 12.59 second on right. 2. Range of duration of post-rotatory nystagmus test in children with the pervasive developmental disorder was $3{\sim}11$ second on both and the mean was 5.65 second on left and 5.60 second on right. 3. There was no significant difference between males and females with normal children in duration of post-rotatory nystagmus test. However, there was a significant difference of the mean duration between 3 and 5 years old normal group. 4. Children with pervasive developmental disorder significantly have relatively lower duration than the duration of post-rotatory nystagmus test of normal children. Conclusions : The results of the study showed significant difference between normal children and children with pervasive developmental disorder in duration of post-rotatory nystagmus test and suggest that they could be applied to the baseline of clinical therapy.

  • PDF