• Title/Summary/Keyword: ubiquitous Computing

Search Result 1,432, Processing Time 0.027 seconds

A Study on the Business Service Design in Ubiquitous Computing:the Case Study in Bookstore (유비쿼터스 비즈니스 서비스 설계 사례연구 : 대형 도서매장을 중심으로)

  • Kim, Kyung-Kyu;Chang, Hang-Bae;Kim, Heung-Gook;Kwon, Hyuk-Jun
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.165-179
    • /
    • 2008
  • In this study we designed the killer services for the scene of bookstore in ubiquitous computing. To achieve this study, we have explored the unmet needs of employees and users in bookstores and examined whether the unmet needs could be served by the resources and capabilities of ubiquitous computing. Then we have extracted detailed killer services that includes value propositions and resource map by using statistical methodology. Finally, the killer services were designed to serve employees and users in bookstores with the service architecture. The result of this study will be applied to develop new business model in ubiquitous computing as the basic research.

  • PDF

A Study on the Application Service Model and Platform for Web Services Based on USN Application Developments (웹 서비스 기반의 USN 응용 개발을 위한 응용서비스 모델 및 플랫폼에 관한 연구)

  • Kim, Chang-Su;Cao, Ke-Rang;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.485-488
    • /
    • 2010
  • Recently, as the dissemination of the Internet and development of computer network technology, Research is actively underway for realization of the next-generation computing paradigm called Ubiquitous Computing. It will not be constrained by Space-time and It will be a cornerstone of human-oriented services. Such ubiquitous computing as a core technology for USN (Ubiquitous Sensor Network) is presented. In this paper, the sensor information into a standardized form to describe the information describing standards and USN sensor applications for the service standard for directory services protocols were investigated.

  • PDF

Design and Evaluation of Telematics User Interface for Ubiquitous Vehicle

  • Hong, Won-Kee;Kim, Tae-Hwan;Ko, Jaepil
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.3
    • /
    • pp.9-15
    • /
    • 2014
  • In the ubiquitous computing environment, a ubiquitous vehicle will be a communication node in the vehicular network as well as the means of ground transportation. It will make humans and vehicles seamlessly and remotely connected. Especially, one of the prominent services in the ubiquitous vehicle is the vehicle remote operation. However, mutual-collaboration with the in-vehicle communication network, the vehicle-to-vehicle communication network and the vehicle-to-roadside communication network is required to provide vehicle remote operation services. In this paper, an Internet-based human-vehicle interfaces and a network architecture is presented to provide remote vehicle control and diagnosis services. The performance of the proposed system is evaluated through a design and implementation in terms of the round trip time taken to get a vehicle remote operation service.

Developing Ubiquitous Computing Service Model for the Waste Management at the Convention Center (유비쿼터스 컴퓨팅 서비스 모델 분석: 전시장 폐기물 관리 서비스 사례)

  • Ryoo, Sung-Yul;Kim, Kyung-Kyu;Chang, Hang-Bae;Lee, Chang-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.312-322
    • /
    • 2009
  • Linking between a virtual space and a physical space, ubiquitous computing is expected to create new business value. So far, however, there is no broadly accepted methodology to develop the services based on ubiquitous computing technology. Hence, this study aims to seek a systematic methodology for developing new services based on the concept of business model and to apply this in the areas of waste management practices. In addition, based on the evaluation of u-business services in waste management domain, killer services were selected, and then linked with the latest ubiquitous computing technologies. The results of this study are to be applicable to an environment friendly ubiquitous service model of u-City.

A Study for Electronic Surveillance (REID, CCTV, Electronic Resident Card) in Augmented Reality Environment (증강현실 환경 하에서 전자감시(REID, 감시카메라, 전자주민카드)에 관한 소고)

  • Kang, Jang-Mook;Jung, Jo-Nam;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.7 no.2
    • /
    • pp.75-82
    • /
    • 2006
  • Ubiquitous Computing is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous Computing. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the information revolution that Cyber Space saw a prime while world wide web service was expanded was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous Computing revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. This paper checks the present situation of currently proceeding Ubiquitous computing technology(RFID, CCTV) in augmented reality environment. Also, The main purpose of this paper is to analyze the concepts analysis of privacy, personal information, and electronic surveillance in augmented reality environment. Thus this paper treated the analysis of case, technological issue, problem and solution and so on.

  • PDF

A Study on U-Learning (U-Learning에 관한 연구)

  • Park, Chun-Myeong
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.605-615
    • /
    • 2005
  • This paper represent a method of U-Learning based on advanced e-Learning. Ubiquitous computing configuration and advanced Information technology. As we know well, the 21th century is called knowledge based informational society. Many scholar stress that the improved 21th century's educational paradigm be able to success based on advanced educational paradigm. Therefore, we discuss the material for e-Learning fields including with necessity, vision, law, quality authorization etc. Also, we discuss the relational technologies including with meta data, standardization, identification etc. Finally, we propose a method for constructing the U-Learning based on advanced e-Learning and Ubiquitous computing configuration.

  • PDF

A Study on the RFID system in the Ubiquitous Home Network (유비쿼터스 홈 네트워크에서 RFID 시스템에 관한 연구)

  • Kim, Jun-Ju;Park, Sang-Uh;Lee, Ju-Hyun;Kim, Yong-Hwan;Ko, Duck-Young
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1247-1252
    • /
    • 2005
  • Recently, Ubiquitous Computing is being actively researched and one of the main technology in ubiquitous computing environment is recognized as RFID system. The RFID system is automatic recognition technique using radio frequency that attached a tag to product read information and able to record without physical contact. In this paper, classification of tag, an operation, structure and etc of the RFID system and described on the 900MHz region radio antenna radiation characteristics.

  • PDF

A Study for Security and Efficient Broadcasting of Sensor Network

  • Cho, Nam-Pil;Han, Young-Ju;Chung, Tai-Myung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.315-318
    • /
    • 2005
  • Lots of researches have been focusing on ubiquitous computing which means wherever, whenever, whatever the required information must be accessible. In ubiquitous computing environment, ubiquitous sensor network (USN) is the basis technology for gathering and transferring the required information. However sensor network characteristically has more severe vulnerability than the existing networks do. The paper presents operation of secure protocols for delivering information in secure in ubiquitous computing environment and show improvement of the secure transferring protocol.

  • PDF

Developing Ubiquitous Computing Service Model for Family Restaurant Management

  • Kim, Kyung-Kyu;Choi, Seo-Yun Chris;Ryoo, Sung-Yul
    • International Journal of Contents
    • /
    • v.5 no.2
    • /
    • pp.20-25
    • /
    • 2009
  • The purpose of this study is to seek new u-business services in restaurant management. Using the concept of business model methodology in family restaurant management domain, this study identifies customers' needs in services at the stage of management of purchase of materials, the production management, and the sales management. In addition, this study suggests two killer applications of a family restaurant management linking with the latest ubiquitous computing technologies: the service of the customer-oriented menu recommendation and the service of the inventory-oriented menu recommendation. These findings may offer practical insights in the context of ubiquitous service model of restaurant management.

An Implementation of Cyber View schema tool for Ubiquitous Data Integration and Management (유비쿼터스 데이터 관리를 위한 Cyber View 명세화 도구개발)

  • Park, Sang-Hyun;Min, Soo-Young;Ko, Jae-Jin;Ju, Hyun-Tae
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.763-764
    • /
    • 2006
  • The rapid growth of Hardware technologies and Network fitted to us Ubiquitous Computing Life[1]. Ubiquitous Computing integrates computation into the environment, rather than having computers which are distinct objects. There are many computational things like a Sensor Network, RFID, GPS, Mobile devices, and so on. Ubiquitous Data Integration and Management are new paradigms. The goals of UDI Service Platform are data protection for the distributed data on pervasive computing devices and data distribution to appropriate users with best distribution policies. To implement the idea we evaluate the logical schema Cyber View that is a management tool.

  • PDF